Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 24.986152] ================================================================== [ 24.987845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4210/0x49c8 [ 24.988611] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 24.989805] [ 24.990206] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.990475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.990546] Hardware name: linux,dummy-virt (DT) [ 24.990593] Call trace: [ 24.990623] dump_backtrace+0x9c/0x128 [ 24.990726] show_stack+0x20/0x38 [ 24.990782] dump_stack_lvl+0x8c/0xd0 [ 24.990830] print_report+0x118/0x5f0 [ 24.990886] kasan_report+0xdc/0x128 [ 24.990934] __asan_report_load4_noabort+0x20/0x30 [ 24.991021] kasan_atomics_helper+0x4210/0x49c8 [ 24.991082] kasan_atomics+0x1a0/0x2e8 [ 24.991135] kunit_try_run_case+0x170/0x3f0 [ 24.991184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.991241] kthread+0x24c/0x2d0 [ 24.991290] ret_from_fork+0x10/0x20 [ 24.991343] [ 24.999088] Allocated by task 253: [ 24.999755] kasan_save_stack+0x3c/0x68 [ 25.000279] kasan_save_track+0x20/0x40 [ 25.000773] kasan_save_alloc_info+0x40/0x58 [ 25.001398] __kasan_kmalloc+0xd4/0xd8 [ 25.001899] __kmalloc_cache_noprof+0x154/0x320 [ 25.002695] kasan_atomics+0xb8/0x2e8 [ 25.003224] kunit_try_run_case+0x170/0x3f0 [ 25.004060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.004650] kthread+0x24c/0x2d0 [ 25.005177] ret_from_fork+0x10/0x20 [ 25.005721] [ 25.006080] The buggy address belongs to the object at fff00000c4205580 [ 25.006080] which belongs to the cache kmalloc-64 of size 64 [ 25.007107] The buggy address is located 0 bytes to the right of [ 25.007107] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.008928] [ 25.009283] The buggy address belongs to the physical page: [ 25.009945] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.010741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.011696] page_type: f5(slab) [ 25.012215] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.013033] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.013877] page dumped because: kasan: bad access detected [ 25.014649] [ 25.014992] Memory state around the buggy address: [ 25.015546] fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.016587] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.017328] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.018086] ^ [ 25.018680] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.019698] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.020443] ================================================================== [ 26.408980] ================================================================== [ 26.409906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf94/0x49c8 [ 26.410697] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.412022] [ 26.412441] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.412644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.412728] Hardware name: linux,dummy-virt (DT) [ 26.412832] Call trace: [ 26.412893] dump_backtrace+0x9c/0x128 [ 26.412952] show_stack+0x20/0x38 [ 26.413034] dump_stack_lvl+0x8c/0xd0 [ 26.413085] print_report+0x118/0x5f0 [ 26.413134] kasan_report+0xdc/0x128 [ 26.413180] kasan_check_range+0x100/0x1a8 [ 26.413231] __kasan_check_write+0x20/0x30 [ 26.413281] kasan_atomics_helper+0xf94/0x49c8 [ 26.413338] kasan_atomics+0x1a0/0x2e8 [ 26.413389] kunit_try_run_case+0x170/0x3f0 [ 26.413441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.413497] kthread+0x24c/0x2d0 [ 26.413548] ret_from_fork+0x10/0x20 [ 26.413599] [ 26.420294] Allocated by task 253: [ 26.420761] kasan_save_stack+0x3c/0x68 [ 26.421350] kasan_save_track+0x20/0x40 [ 26.421866] kasan_save_alloc_info+0x40/0x58 [ 26.422410] __kasan_kmalloc+0xd4/0xd8 [ 26.422925] __kmalloc_cache_noprof+0x154/0x320 [ 26.423518] kasan_atomics+0xb8/0x2e8 [ 26.424030] kunit_try_run_case+0x170/0x3f0 [ 26.424526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.425237] kthread+0x24c/0x2d0 [ 26.425642] ret_from_fork+0x10/0x20 [ 26.426267] [ 26.426596] The buggy address belongs to the object at fff00000c4205580 [ 26.426596] which belongs to the cache kmalloc-64 of size 64 [ 26.427696] The buggy address is located 0 bytes to the right of [ 26.427696] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.428940] [ 26.429330] The buggy address belongs to the physical page: [ 26.430038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.430949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.431689] page_type: f5(slab) [ 26.432179] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.432898] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.433580] page dumped because: kasan: bad access detected [ 26.434189] [ 26.434524] Memory state around the buggy address: [ 26.435070] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.435794] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.436574] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.437354] ^ [ 26.437885] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.438637] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.439363] ================================================================== [ 25.061040] ================================================================== [ 25.062164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f8/0x49c8 [ 25.062836] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.063561] [ 25.063913] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.064132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.064203] Hardware name: linux,dummy-virt (DT) [ 25.064281] Call trace: [ 25.064347] dump_backtrace+0x9c/0x128 [ 25.064454] show_stack+0x20/0x38 [ 25.064551] dump_stack_lvl+0x8c/0xd0 [ 25.064655] print_report+0x118/0x5f0 [ 25.064780] kasan_report+0xdc/0x128 [ 25.064902] kasan_check_range+0x100/0x1a8 [ 25.065077] __kasan_check_read+0x20/0x30 [ 25.065248] kasan_atomics_helper+0x1f8/0x49c8 [ 25.065411] kasan_atomics+0x1a0/0x2e8 [ 25.065533] kunit_try_run_case+0x170/0x3f0 [ 25.065649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.065762] kthread+0x24c/0x2d0 [ 25.065817] ret_from_fork+0x10/0x20 [ 25.065867] [ 25.075991] Allocated by task 253: [ 25.076581] kasan_save_stack+0x3c/0x68 [ 25.077253] kasan_save_track+0x20/0x40 [ 25.077821] kasan_save_alloc_info+0x40/0x58 [ 25.078510] __kasan_kmalloc+0xd4/0xd8 [ 25.079108] __kmalloc_cache_noprof+0x154/0x320 [ 25.080121] kasan_atomics+0xb8/0x2e8 [ 25.080791] kunit_try_run_case+0x170/0x3f0 [ 25.081446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.082213] kthread+0x24c/0x2d0 [ 25.082758] ret_from_fork+0x10/0x20 [ 25.083352] [ 25.083855] The buggy address belongs to the object at fff00000c4205580 [ 25.083855] which belongs to the cache kmalloc-64 of size 64 [ 25.085318] The buggy address is located 0 bytes to the right of [ 25.085318] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.086700] [ 25.087038] The buggy address belongs to the physical page: [ 25.088436] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.089418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.090120] page_type: f5(slab) [ 25.090696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.091903] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.092784] page dumped because: kasan: bad access detected [ 25.093425] [ 25.093774] Memory state around the buggy address: [ 25.094388] fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.095203] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.096559] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.097449] ^ [ 25.097954] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.098638] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.099770] ================================================================== [ 25.216165] ================================================================== [ 25.216900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x344/0x49c8 [ 25.217573] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.218395] [ 25.218740] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.218946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.219045] Hardware name: linux,dummy-virt (DT) [ 25.219135] Call trace: [ 25.219207] dump_backtrace+0x9c/0x128 [ 25.219334] show_stack+0x20/0x38 [ 25.219500] dump_stack_lvl+0x8c/0xd0 [ 25.219622] print_report+0x118/0x5f0 [ 25.219738] kasan_report+0xdc/0x128 [ 25.219858] kasan_check_range+0x100/0x1a8 [ 25.219995] __kasan_check_write+0x20/0x30 [ 25.220122] kasan_atomics_helper+0x344/0x49c8 [ 25.220243] kasan_atomics+0x1a0/0x2e8 [ 25.220404] kunit_try_run_case+0x170/0x3f0 [ 25.220522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.220653] kthread+0x24c/0x2d0 [ 25.220777] ret_from_fork+0x10/0x20 [ 25.220895] [ 25.228095] Allocated by task 253: [ 25.228720] kasan_save_stack+0x3c/0x68 [ 25.229362] kasan_save_track+0x20/0x40 [ 25.229913] kasan_save_alloc_info+0x40/0x58 [ 25.230461] __kasan_kmalloc+0xd4/0xd8 [ 25.230891] __kmalloc_cache_noprof+0x154/0x320 [ 25.231575] kasan_atomics+0xb8/0x2e8 [ 25.232182] kunit_try_run_case+0x170/0x3f0 [ 25.232810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.233432] kthread+0x24c/0x2d0 [ 25.233897] ret_from_fork+0x10/0x20 [ 25.234403] [ 25.234733] The buggy address belongs to the object at fff00000c4205580 [ 25.234733] which belongs to the cache kmalloc-64 of size 64 [ 25.235938] The buggy address is located 0 bytes to the right of [ 25.235938] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.237329] [ 25.237608] The buggy address belongs to the physical page: [ 25.239068] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.239837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.240442] page_type: f5(slab) [ 25.240942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.243003] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.244626] page dumped because: kasan: bad access detected [ 25.245698] [ 25.246138] Memory state around the buggy address: [ 25.246718] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.247787] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.248587] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.249532] ^ [ 25.250122] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.250930] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.251808] ================================================================== [ 25.552651] ================================================================== [ 25.553430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6bc/0x49c8 [ 25.554222] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.555033] [ 25.555390] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.555591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.555704] Hardware name: linux,dummy-virt (DT) [ 25.555793] Call trace: [ 25.555867] dump_backtrace+0x9c/0x128 [ 25.556009] show_stack+0x20/0x38 [ 25.556130] dump_stack_lvl+0x8c/0xd0 [ 25.556249] print_report+0x118/0x5f0 [ 25.556369] kasan_report+0xdc/0x128 [ 25.556485] kasan_check_range+0x100/0x1a8 [ 25.556603] __kasan_check_write+0x20/0x30 [ 25.556729] kasan_atomics_helper+0x6bc/0x49c8 [ 25.556866] kasan_atomics+0x1a0/0x2e8 [ 25.557008] kunit_try_run_case+0x170/0x3f0 [ 25.557129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.557201] kthread+0x24c/0x2d0 [ 25.557250] ret_from_fork+0x10/0x20 [ 25.557300] [ 25.563993] Allocated by task 253: [ 25.564474] kasan_save_stack+0x3c/0x68 [ 25.565075] kasan_save_track+0x20/0x40 [ 25.565693] kasan_save_alloc_info+0x40/0x58 [ 25.566241] __kasan_kmalloc+0xd4/0xd8 [ 25.566730] __kmalloc_cache_noprof+0x154/0x320 [ 25.567368] kasan_atomics+0xb8/0x2e8 [ 25.567867] kunit_try_run_case+0x170/0x3f0 [ 25.568429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.569246] kthread+0x24c/0x2d0 [ 25.569744] ret_from_fork+0x10/0x20 [ 25.570679] [ 25.571153] The buggy address belongs to the object at fff00000c4205580 [ 25.571153] which belongs to the cache kmalloc-64 of size 64 [ 25.572238] The buggy address is located 0 bytes to the right of [ 25.572238] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.573802] [ 25.574244] The buggy address belongs to the physical page: [ 25.574912] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.575886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.576718] page_type: f5(slab) [ 25.577219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.577995] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.578744] page dumped because: kasan: bad access detected [ 25.579531] [ 25.580018] Memory state around the buggy address: [ 25.580530] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.581219] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.581938] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.582670] ^ [ 25.583228] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.583914] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.584672] ================================================================== [ 25.101201] ================================================================== [ 25.101978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x25c/0x49c8 [ 25.102649] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.103590] [ 25.103987] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.104192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.104276] Hardware name: linux,dummy-virt (DT) [ 25.104362] Call trace: [ 25.104461] dump_backtrace+0x9c/0x128 [ 25.104574] show_stack+0x20/0x38 [ 25.104676] dump_stack_lvl+0x8c/0xd0 [ 25.104789] print_report+0x118/0x5f0 [ 25.104886] kasan_report+0xdc/0x128 [ 25.105006] kasan_check_range+0x100/0x1a8 [ 25.105119] __kasan_check_write+0x20/0x30 [ 25.105286] kasan_atomics_helper+0x25c/0x49c8 [ 25.105417] kasan_atomics+0x1a0/0x2e8 [ 25.105538] kunit_try_run_case+0x170/0x3f0 [ 25.105651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.105734] kthread+0x24c/0x2d0 [ 25.105785] ret_from_fork+0x10/0x20 [ 25.105836] [ 25.114394] Allocated by task 253: [ 25.114919] kasan_save_stack+0x3c/0x68 [ 25.115877] kasan_save_track+0x20/0x40 [ 25.116515] kasan_save_alloc_info+0x40/0x58 [ 25.117072] __kasan_kmalloc+0xd4/0xd8 [ 25.117690] __kmalloc_cache_noprof+0x154/0x320 [ 25.118334] kasan_atomics+0xb8/0x2e8 [ 25.118980] kunit_try_run_case+0x170/0x3f0 [ 25.119516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.120109] kthread+0x24c/0x2d0 [ 25.120508] ret_from_fork+0x10/0x20 [ 25.120955] [ 25.122003] The buggy address belongs to the object at fff00000c4205580 [ 25.122003] which belongs to the cache kmalloc-64 of size 64 [ 25.123442] The buggy address is located 0 bytes to the right of [ 25.123442] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.125059] [ 25.125566] The buggy address belongs to the physical page: [ 25.126243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.126980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.127693] page_type: f5(slab) [ 25.128199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.128996] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.129730] page dumped because: kasan: bad access detected [ 25.130743] [ 25.131035] Memory state around the buggy address: [ 25.131614] fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.132534] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.133242] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.134405] ^ [ 25.134893] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.135594] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.136606] ================================================================== [ 25.922813] ================================================================== [ 25.923597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f34/0x49c8 [ 25.924493] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.925313] [ 25.925625] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.925850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.925938] Hardware name: linux,dummy-virt (DT) [ 25.926050] Call trace: [ 25.926125] dump_backtrace+0x9c/0x128 [ 25.926254] show_stack+0x20/0x38 [ 25.926374] dump_stack_lvl+0x8c/0xd0 [ 25.926500] print_report+0x118/0x5f0 [ 25.926615] kasan_report+0xdc/0x128 [ 25.926718] __asan_report_load4_noabort+0x20/0x30 [ 25.926780] kasan_atomics_helper+0x3f34/0x49c8 [ 25.926835] kasan_atomics+0x1a0/0x2e8 [ 25.926887] kunit_try_run_case+0x170/0x3f0 [ 25.926938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.927026] kthread+0x24c/0x2d0 [ 25.927078] ret_from_fork+0x10/0x20 [ 25.927130] [ 25.933463] Allocated by task 253: [ 25.933938] kasan_save_stack+0x3c/0x68 [ 25.934532] kasan_save_track+0x20/0x40 [ 25.935103] kasan_save_alloc_info+0x40/0x58 [ 25.935665] __kasan_kmalloc+0xd4/0xd8 [ 25.936170] __kmalloc_cache_noprof+0x154/0x320 [ 25.936701] kasan_atomics+0xb8/0x2e8 [ 25.937239] kunit_try_run_case+0x170/0x3f0 [ 25.937819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.938498] kthread+0x24c/0x2d0 [ 25.938980] ret_from_fork+0x10/0x20 [ 25.939439] [ 25.939760] The buggy address belongs to the object at fff00000c4205580 [ 25.939760] which belongs to the cache kmalloc-64 of size 64 [ 25.940951] The buggy address is located 0 bytes to the right of [ 25.940951] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.942286] [ 25.942607] The buggy address belongs to the physical page: [ 25.943153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.944020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.944668] page_type: f5(slab) [ 25.945201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.946507] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.947453] page dumped because: kasan: bad access detected [ 25.948059] [ 25.948357] Memory state around the buggy address: [ 25.948872] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.949665] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.950433] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.951392] ^ [ 25.951826] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.954514] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.956391] ================================================================== [ 26.791743] ================================================================== [ 26.792356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x406c/0x49c8 [ 26.793321] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.794129] [ 26.794481] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.794697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.794784] Hardware name: linux,dummy-virt (DT) [ 26.794876] Call trace: [ 26.794951] dump_backtrace+0x9c/0x128 [ 26.795094] show_stack+0x20/0x38 [ 26.795214] dump_stack_lvl+0x8c/0xd0 [ 26.795333] print_report+0x118/0x5f0 [ 26.795631] kasan_report+0xdc/0x128 [ 26.795757] __asan_report_load8_noabort+0x20/0x30 [ 26.795898] kasan_atomics_helper+0x406c/0x49c8 [ 26.796053] kasan_atomics+0x1a0/0x2e8 [ 26.796178] kunit_try_run_case+0x170/0x3f0 [ 26.796266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.796327] kthread+0x24c/0x2d0 [ 26.796378] ret_from_fork+0x10/0x20 [ 26.796429] [ 26.802616] Allocated by task 253: [ 26.803121] kasan_save_stack+0x3c/0x68 [ 26.803722] kasan_save_track+0x20/0x40 [ 26.804284] kasan_save_alloc_info+0x40/0x58 [ 26.804909] __kasan_kmalloc+0xd4/0xd8 [ 26.805471] __kmalloc_cache_noprof+0x154/0x320 [ 26.805998] kasan_atomics+0xb8/0x2e8 [ 26.806564] kunit_try_run_case+0x170/0x3f0 [ 26.807244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.807908] kthread+0x24c/0x2d0 [ 26.808429] ret_from_fork+0x10/0x20 [ 26.808887] [ 26.809227] The buggy address belongs to the object at fff00000c4205580 [ 26.809227] which belongs to the cache kmalloc-64 of size 64 [ 26.810487] The buggy address is located 0 bytes to the right of [ 26.810487] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.811691] [ 26.812047] The buggy address belongs to the physical page: [ 26.812605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.813428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.814445] page_type: f5(slab) [ 26.814852] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.816065] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.816996] page dumped because: kasan: bad access detected [ 26.817542] [ 26.817823] Memory state around the buggy address: [ 26.818469] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.819407] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.820233] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.821036] ^ [ 26.821699] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.822543] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.823337] ================================================================== [ 26.239863] ================================================================== [ 26.240595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe3c/0x49c8 [ 26.241458] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.242237] [ 26.242617] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.242819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.242909] Hardware name: linux,dummy-virt (DT) [ 26.243017] Call trace: [ 26.243091] dump_backtrace+0x9c/0x128 [ 26.243215] show_stack+0x20/0x38 [ 26.243333] dump_stack_lvl+0x8c/0xd0 [ 26.243455] print_report+0x118/0x5f0 [ 26.243591] kasan_report+0xdc/0x128 [ 26.243710] kasan_check_range+0x100/0x1a8 [ 26.243832] __kasan_check_read+0x20/0x30 [ 26.243981] kasan_atomics_helper+0xe3c/0x49c8 [ 26.244114] kasan_atomics+0x1a0/0x2e8 [ 26.244236] kunit_try_run_case+0x170/0x3f0 [ 26.244364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.244479] kthread+0x24c/0x2d0 [ 26.244533] ret_from_fork+0x10/0x20 [ 26.244585] [ 26.251253] Allocated by task 253: [ 26.251775] kasan_save_stack+0x3c/0x68 [ 26.252399] kasan_save_track+0x20/0x40 [ 26.252883] kasan_save_alloc_info+0x40/0x58 [ 26.253461] __kasan_kmalloc+0xd4/0xd8 [ 26.253920] __kmalloc_cache_noprof+0x154/0x320 [ 26.254546] kasan_atomics+0xb8/0x2e8 [ 26.255132] kunit_try_run_case+0x170/0x3f0 [ 26.255706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.257112] kthread+0x24c/0x2d0 [ 26.257595] ret_from_fork+0x10/0x20 [ 26.258110] [ 26.258399] The buggy address belongs to the object at fff00000c4205580 [ 26.258399] which belongs to the cache kmalloc-64 of size 64 [ 26.259520] The buggy address is located 0 bytes to the right of [ 26.259520] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.260803] [ 26.261123] The buggy address belongs to the physical page: [ 26.261759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.262829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.263573] page_type: f5(slab) [ 26.264030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.264799] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.265550] page dumped because: kasan: bad access detected [ 26.266158] [ 26.266478] Memory state around the buggy address: [ 26.267041] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.267725] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.268469] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.269195] ^ [ 26.269762] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.270464] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.271216] ================================================================== [ 26.373486] ================================================================== [ 26.374162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf28/0x49c8 [ 26.374952] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.375638] [ 26.376037] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.376238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.376326] Hardware name: linux,dummy-virt (DT) [ 26.376419] Call trace: [ 26.376491] dump_backtrace+0x9c/0x128 [ 26.376615] show_stack+0x20/0x38 [ 26.376732] dump_stack_lvl+0x8c/0xd0 [ 26.376862] print_report+0x118/0x5f0 [ 26.376996] kasan_report+0xdc/0x128 [ 26.377114] kasan_check_range+0x100/0x1a8 [ 26.377194] __kasan_check_write+0x20/0x30 [ 26.377246] kasan_atomics_helper+0xf28/0x49c8 [ 26.377300] kasan_atomics+0x1a0/0x2e8 [ 26.377351] kunit_try_run_case+0x170/0x3f0 [ 26.377400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.377455] kthread+0x24c/0x2d0 [ 26.377504] ret_from_fork+0x10/0x20 [ 26.377554] [ 26.386085] Allocated by task 253: [ 26.386673] kasan_save_stack+0x3c/0x68 [ 26.387313] kasan_save_track+0x20/0x40 [ 26.387974] kasan_save_alloc_info+0x40/0x58 [ 26.388657] __kasan_kmalloc+0xd4/0xd8 [ 26.389165] __kmalloc_cache_noprof+0x154/0x320 [ 26.389677] kasan_atomics+0xb8/0x2e8 [ 26.390424] kunit_try_run_case+0x170/0x3f0 [ 26.390951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.391536] kthread+0x24c/0x2d0 [ 26.392010] ret_from_fork+0x10/0x20 [ 26.392543] [ 26.392977] The buggy address belongs to the object at fff00000c4205580 [ 26.392977] which belongs to the cache kmalloc-64 of size 64 [ 26.394161] The buggy address is located 0 bytes to the right of [ 26.394161] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.395367] [ 26.395707] The buggy address belongs to the physical page: [ 26.396386] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.397343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.398090] page_type: f5(slab) [ 26.398551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.399357] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.400191] page dumped because: kasan: bad access detected [ 26.400939] [ 26.401394] Memory state around the buggy address: [ 26.401851] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.402770] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.403640] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.404479] ^ [ 26.405189] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.406031] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.406843] ================================================================== [ 26.550796] ================================================================== [ 26.551582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1144/0x49c8 [ 26.552412] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.553577] [ 26.554020] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.554218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.554347] Hardware name: linux,dummy-virt (DT) [ 26.554441] Call trace: [ 26.554502] dump_backtrace+0x9c/0x128 [ 26.554564] show_stack+0x20/0x38 [ 26.554610] dump_stack_lvl+0x8c/0xd0 [ 26.554656] print_report+0x118/0x5f0 [ 26.554703] kasan_report+0xdc/0x128 [ 26.554751] kasan_check_range+0x100/0x1a8 [ 26.554802] __kasan_check_write+0x20/0x30 [ 26.554852] kasan_atomics_helper+0x1144/0x49c8 [ 26.554906] kasan_atomics+0x1a0/0x2e8 [ 26.554955] kunit_try_run_case+0x170/0x3f0 [ 26.555035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.555092] kthread+0x24c/0x2d0 [ 26.555142] ret_from_fork+0x10/0x20 [ 26.555192] [ 26.562525] Allocated by task 253: [ 26.563109] kasan_save_stack+0x3c/0x68 [ 26.563692] kasan_save_track+0x20/0x40 [ 26.564245] kasan_save_alloc_info+0x40/0x58 [ 26.565020] __kasan_kmalloc+0xd4/0xd8 [ 26.565539] __kmalloc_cache_noprof+0x154/0x320 [ 26.566243] kasan_atomics+0xb8/0x2e8 [ 26.566789] kunit_try_run_case+0x170/0x3f0 [ 26.567426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.568153] kthread+0x24c/0x2d0 [ 26.568627] ret_from_fork+0x10/0x20 [ 26.569281] [ 26.569617] The buggy address belongs to the object at fff00000c4205580 [ 26.569617] which belongs to the cache kmalloc-64 of size 64 [ 26.571286] The buggy address is located 0 bytes to the right of [ 26.571286] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.572456] [ 26.573011] The buggy address belongs to the physical page: [ 26.573572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.574558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.575310] page_type: f5(slab) [ 26.575807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.576653] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.577473] page dumped because: kasan: bad access detected [ 26.578110] [ 26.578455] Memory state around the buggy address: [ 26.579035] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.579796] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.580610] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.581437] ^ [ 26.582008] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.582790] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.583579] ================================================================== [ 26.857213] ================================================================== [ 26.857751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1518/0x49c8 [ 26.858705] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.859622] [ 26.860015] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.860217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.860302] Hardware name: linux,dummy-virt (DT) [ 26.860394] Call trace: [ 26.860471] dump_backtrace+0x9c/0x128 [ 26.860597] show_stack+0x20/0x38 [ 26.860715] dump_stack_lvl+0x8c/0xd0 [ 26.860841] print_report+0x118/0x5f0 [ 26.860978] kasan_report+0xdc/0x128 [ 26.861100] kasan_check_range+0x100/0x1a8 [ 26.861226] __kasan_check_write+0x20/0x30 [ 26.861351] kasan_atomics_helper+0x1518/0x49c8 [ 26.861486] kasan_atomics+0x1a0/0x2e8 [ 26.861613] kunit_try_run_case+0x170/0x3f0 [ 26.861725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.861791] kthread+0x24c/0x2d0 [ 26.861843] ret_from_fork+0x10/0x20 [ 26.861892] [ 26.868740] Allocated by task 253: [ 26.869242] kasan_save_stack+0x3c/0x68 [ 26.869827] kasan_save_track+0x20/0x40 [ 26.870333] kasan_save_alloc_info+0x40/0x58 [ 26.870870] __kasan_kmalloc+0xd4/0xd8 [ 26.871322] __kmalloc_cache_noprof+0x154/0x320 [ 26.872068] kasan_atomics+0xb8/0x2e8 [ 26.872627] kunit_try_run_case+0x170/0x3f0 [ 26.873240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.873830] kthread+0x24c/0x2d0 [ 26.874351] ret_from_fork+0x10/0x20 [ 26.874878] [ 26.875231] The buggy address belongs to the object at fff00000c4205580 [ 26.875231] which belongs to the cache kmalloc-64 of size 64 [ 26.876331] The buggy address is located 0 bytes to the right of [ 26.876331] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.877539] [ 26.877869] The buggy address belongs to the physical page: [ 26.878477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.879229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.880081] page_type: f5(slab) [ 26.880533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.881329] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.882082] page dumped because: kasan: bad access detected [ 26.882725] [ 26.883067] Memory state around the buggy address: [ 26.883646] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.884453] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.885182] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.885912] ^ [ 26.886493] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.887245] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.887938] ================================================================== [ 26.688659] ================================================================== [ 26.689306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1300/0x49c8 [ 26.690072] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.690981] [ 26.691312] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.691545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.691630] Hardware name: linux,dummy-virt (DT) [ 26.691722] Call trace: [ 26.691799] dump_backtrace+0x9c/0x128 [ 26.691927] show_stack+0x20/0x38 [ 26.692065] dump_stack_lvl+0x8c/0xd0 [ 26.692185] print_report+0x118/0x5f0 [ 26.692303] kasan_report+0xdc/0x128 [ 26.692403] kasan_check_range+0x100/0x1a8 [ 26.692457] __kasan_check_write+0x20/0x30 [ 26.692508] kasan_atomics_helper+0x1300/0x49c8 [ 26.692563] kasan_atomics+0x1a0/0x2e8 [ 26.692613] kunit_try_run_case+0x170/0x3f0 [ 26.692662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.692718] kthread+0x24c/0x2d0 [ 26.692781] ret_from_fork+0x10/0x20 [ 26.692834] [ 26.699494] Allocated by task 253: [ 26.700002] kasan_save_stack+0x3c/0x68 [ 26.700546] kasan_save_track+0x20/0x40 [ 26.701138] kasan_save_alloc_info+0x40/0x58 [ 26.701677] __kasan_kmalloc+0xd4/0xd8 [ 26.702158] __kmalloc_cache_noprof+0x154/0x320 [ 26.702866] kasan_atomics+0xb8/0x2e8 [ 26.703440] kunit_try_run_case+0x170/0x3f0 [ 26.703989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.704532] kthread+0x24c/0x2d0 [ 26.705076] ret_from_fork+0x10/0x20 [ 26.705619] [ 26.705945] The buggy address belongs to the object at fff00000c4205580 [ 26.705945] which belongs to the cache kmalloc-64 of size 64 [ 26.707216] The buggy address is located 0 bytes to the right of [ 26.707216] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.708407] [ 26.708776] The buggy address belongs to the physical page: [ 26.709346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.710219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.710895] page_type: f5(slab) [ 26.711417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.712345] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.713089] page dumped because: kasan: bad access detected [ 26.713655] [ 26.714025] Memory state around the buggy address: [ 26.714582] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.715286] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.716058] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.716730] ^ [ 26.717327] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.718067] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.718788] ================================================================== [ 25.995683] ================================================================== [ 25.996396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f24/0x49c8 [ 25.998252] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.999198] [ 25.999583] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.999848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.999940] Hardware name: linux,dummy-virt (DT) [ 26.000051] Call trace: [ 26.000091] dump_backtrace+0x9c/0x128 [ 26.000151] show_stack+0x20/0x38 [ 26.000199] dump_stack_lvl+0x8c/0xd0 [ 26.000249] print_report+0x118/0x5f0 [ 26.000300] kasan_report+0xdc/0x128 [ 26.000351] __asan_report_load4_noabort+0x20/0x30 [ 26.000407] kasan_atomics_helper+0x3f24/0x49c8 [ 26.000464] kasan_atomics+0x1a0/0x2e8 [ 26.000518] kunit_try_run_case+0x170/0x3f0 [ 26.000569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.000627] kthread+0x24c/0x2d0 [ 26.000677] ret_from_fork+0x10/0x20 [ 26.000728] [ 26.008033] Allocated by task 253: [ 26.008468] kasan_save_stack+0x3c/0x68 [ 26.009010] kasan_save_track+0x20/0x40 [ 26.009551] kasan_save_alloc_info+0x40/0x58 [ 26.010187] __kasan_kmalloc+0xd4/0xd8 [ 26.010838] __kmalloc_cache_noprof+0x154/0x320 [ 26.011561] kasan_atomics+0xb8/0x2e8 [ 26.012062] kunit_try_run_case+0x170/0x3f0 [ 26.012754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.013453] kthread+0x24c/0x2d0 [ 26.013999] ret_from_fork+0x10/0x20 [ 26.014540] [ 26.014917] The buggy address belongs to the object at fff00000c4205580 [ 26.014917] which belongs to the cache kmalloc-64 of size 64 [ 26.016155] The buggy address is located 0 bytes to the right of [ 26.016155] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.017471] [ 26.017810] The buggy address belongs to the physical page: [ 26.018414] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.019325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.020093] page_type: f5(slab) [ 26.020591] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.021459] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.022273] page dumped because: kasan: bad access detected [ 26.022883] [ 26.023249] Memory state around the buggy address: [ 26.023847] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.024727] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.025535] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.026307] ^ [ 26.026901] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.027693] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.028506] ================================================================== [ 25.586203] ================================================================== [ 25.586882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x728/0x49c8 [ 25.588781] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.589753] [ 25.590074] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.590277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.590365] Hardware name: linux,dummy-virt (DT) [ 25.590454] Call trace: [ 25.590514] dump_backtrace+0x9c/0x128 [ 25.590589] show_stack+0x20/0x38 [ 25.590653] dump_stack_lvl+0x8c/0xd0 [ 25.590731] print_report+0x118/0x5f0 [ 25.590779] kasan_report+0xdc/0x128 [ 25.590828] kasan_check_range+0x100/0x1a8 [ 25.590879] __kasan_check_write+0x20/0x30 [ 25.590929] kasan_atomics_helper+0x728/0x49c8 [ 25.591010] kasan_atomics+0x1a0/0x2e8 [ 25.591064] kunit_try_run_case+0x170/0x3f0 [ 25.591113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.591169] kthread+0x24c/0x2d0 [ 25.591216] ret_from_fork+0x10/0x20 [ 25.591267] [ 25.597893] Allocated by task 253: [ 25.598493] kasan_save_stack+0x3c/0x68 [ 25.599142] kasan_save_track+0x20/0x40 [ 25.599618] kasan_save_alloc_info+0x40/0x58 [ 25.600200] __kasan_kmalloc+0xd4/0xd8 [ 25.600715] __kmalloc_cache_noprof+0x154/0x320 [ 25.601329] kasan_atomics+0xb8/0x2e8 [ 25.601825] kunit_try_run_case+0x170/0x3f0 [ 25.602416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.603804] kthread+0x24c/0x2d0 [ 25.604221] ret_from_fork+0x10/0x20 [ 25.604684] [ 25.604979] The buggy address belongs to the object at fff00000c4205580 [ 25.604979] which belongs to the cache kmalloc-64 of size 64 [ 25.606115] The buggy address is located 0 bytes to the right of [ 25.606115] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.607323] [ 25.607596] The buggy address belongs to the physical page: [ 25.608269] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.609078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.609730] page_type: f5(slab) [ 25.610260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.611098] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.611825] page dumped because: kasan: bad access detected [ 25.612448] [ 25.612791] Memory state around the buggy address: [ 25.613322] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.614174] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.615018] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.615721] ^ [ 25.616340] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.617050] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.617774] ================================================================== [ 27.067396] ================================================================== [ 27.068853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f5c/0x49c8 [ 27.069933] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.070767] [ 27.071151] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.071395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.071510] Hardware name: linux,dummy-virt (DT) [ 27.071607] Call trace: [ 27.071685] dump_backtrace+0x9c/0x128 [ 27.071815] show_stack+0x20/0x38 [ 27.072001] dump_stack_lvl+0x8c/0xd0 [ 27.072287] print_report+0x118/0x5f0 [ 27.072361] kasan_report+0xdc/0x128 [ 27.072421] __asan_report_load8_noabort+0x20/0x30 [ 27.072488] kasan_atomics_helper+0x3f5c/0x49c8 [ 27.072548] kasan_atomics+0x1a0/0x2e8 [ 27.072601] kunit_try_run_case+0x170/0x3f0 [ 27.072652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.072711] kthread+0x24c/0x2d0 [ 27.072773] ret_from_fork+0x10/0x20 [ 27.072831] [ 27.081188] Allocated by task 253: [ 27.081699] kasan_save_stack+0x3c/0x68 [ 27.082232] kasan_save_track+0x20/0x40 [ 27.082776] kasan_save_alloc_info+0x40/0x58 [ 27.083338] __kasan_kmalloc+0xd4/0xd8 [ 27.084056] __kmalloc_cache_noprof+0x154/0x320 [ 27.084541] kasan_atomics+0xb8/0x2e8 [ 27.084912] kunit_try_run_case+0x170/0x3f0 [ 27.085322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.085810] kthread+0x24c/0x2d0 [ 27.086890] ret_from_fork+0x10/0x20 [ 27.087944] [ 27.088293] The buggy address belongs to the object at fff00000c4205580 [ 27.088293] which belongs to the cache kmalloc-64 of size 64 [ 27.089423] The buggy address is located 0 bytes to the right of [ 27.089423] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.090550] [ 27.090880] The buggy address belongs to the physical page: [ 27.091722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.092522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.093531] page_type: f5(slab) [ 27.094461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.095770] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.096597] page dumped because: kasan: bad access detected [ 27.097357] [ 27.097666] Memory state around the buggy address: [ 27.098477] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.099343] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.100217] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.101080] ^ [ 27.101615] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.102613] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.103473] ================================================================== [ 26.923349] ================================================================== [ 26.924283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15f0/0x49c8 [ 26.925238] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.926315] [ 26.926705] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.927009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.927097] Hardware name: linux,dummy-virt (DT) [ 26.927187] Call trace: [ 26.927260] dump_backtrace+0x9c/0x128 [ 26.927349] show_stack+0x20/0x38 [ 26.927399] dump_stack_lvl+0x8c/0xd0 [ 26.927446] print_report+0x118/0x5f0 [ 26.927494] kasan_report+0xdc/0x128 [ 26.927542] kasan_check_range+0x100/0x1a8 [ 26.927594] __kasan_check_write+0x20/0x30 [ 26.927645] kasan_atomics_helper+0x15f0/0x49c8 [ 26.927702] kasan_atomics+0x1a0/0x2e8 [ 26.927756] kunit_try_run_case+0x170/0x3f0 [ 26.927809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.927867] kthread+0x24c/0x2d0 [ 26.927918] ret_from_fork+0x10/0x20 [ 26.927995] [ 26.935319] Allocated by task 253: [ 26.936017] kasan_save_stack+0x3c/0x68 [ 26.936674] kasan_save_track+0x20/0x40 [ 26.937369] kasan_save_alloc_info+0x40/0x58 [ 26.938082] __kasan_kmalloc+0xd4/0xd8 [ 26.938507] __kmalloc_cache_noprof+0x154/0x320 [ 26.939383] kasan_atomics+0xb8/0x2e8 [ 26.940018] kunit_try_run_case+0x170/0x3f0 [ 26.940709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.941476] kthread+0x24c/0x2d0 [ 26.942026] ret_from_fork+0x10/0x20 [ 26.942655] [ 26.943061] The buggy address belongs to the object at fff00000c4205580 [ 26.943061] which belongs to the cache kmalloc-64 of size 64 [ 26.944379] The buggy address is located 0 bytes to the right of [ 26.944379] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.945736] [ 26.946150] The buggy address belongs to the physical page: [ 26.946783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.947705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.948534] page_type: f5(slab) [ 26.949075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.949954] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.950780] page dumped because: kasan: bad access detected [ 26.951497] [ 26.951863] Memory state around the buggy address: [ 26.952503] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.953359] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.954219] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.955016] ^ [ 26.955661] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.956505] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.957347] ================================================================== [ 25.857657] ================================================================== [ 25.858441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xabc/0x49c8 [ 25.860102] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.860827] [ 25.861169] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.861373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.861458] Hardware name: linux,dummy-virt (DT) [ 25.861553] Call trace: [ 25.861624] dump_backtrace+0x9c/0x128 [ 25.861739] show_stack+0x20/0x38 [ 25.861838] dump_stack_lvl+0x8c/0xd0 [ 25.861909] print_report+0x118/0x5f0 [ 25.861985] kasan_report+0xdc/0x128 [ 25.862038] kasan_check_range+0x100/0x1a8 [ 25.862090] __kasan_check_write+0x20/0x30 [ 25.862139] kasan_atomics_helper+0xabc/0x49c8 [ 25.862195] kasan_atomics+0x1a0/0x2e8 [ 25.862247] kunit_try_run_case+0x170/0x3f0 [ 25.862300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.862356] kthread+0x24c/0x2d0 [ 25.862406] ret_from_fork+0x10/0x20 [ 25.862458] [ 25.869167] Allocated by task 253: [ 25.869624] kasan_save_stack+0x3c/0x68 [ 25.870147] kasan_save_track+0x20/0x40 [ 25.870771] kasan_save_alloc_info+0x40/0x58 [ 25.871466] __kasan_kmalloc+0xd4/0xd8 [ 25.871975] __kmalloc_cache_noprof+0x154/0x320 [ 25.872599] kasan_atomics+0xb8/0x2e8 [ 25.873127] kunit_try_run_case+0x170/0x3f0 [ 25.873705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.874422] kthread+0x24c/0x2d0 [ 25.874976] ret_from_fork+0x10/0x20 [ 25.875440] [ 25.875764] The buggy address belongs to the object at fff00000c4205580 [ 25.875764] which belongs to the cache kmalloc-64 of size 64 [ 25.877092] The buggy address is located 0 bytes to the right of [ 25.877092] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.878324] [ 25.878662] The buggy address belongs to the physical page: [ 25.879227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.880174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.880884] page_type: f5(slab) [ 25.881375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.882173] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.882948] page dumped because: kasan: bad access detected [ 25.883596] [ 25.883935] Memory state around the buggy address: [ 25.884539] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.885345] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.886149] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.886886] ^ [ 25.887528] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.888292] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.889145] ================================================================== [ 25.403730] ================================================================== [ 25.404501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50c/0x49c8 [ 25.405438] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.406649] [ 25.407116] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.407322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.407421] Hardware name: linux,dummy-virt (DT) [ 25.407512] Call trace: [ 25.407580] dump_backtrace+0x9c/0x128 [ 25.407700] show_stack+0x20/0x38 [ 25.407830] dump_stack_lvl+0x8c/0xd0 [ 25.407944] print_report+0x118/0x5f0 [ 25.408071] kasan_report+0xdc/0x128 [ 25.408171] kasan_check_range+0x100/0x1a8 [ 25.408281] __kasan_check_write+0x20/0x30 [ 25.408384] kasan_atomics_helper+0x50c/0x49c8 [ 25.408498] kasan_atomics+0x1a0/0x2e8 [ 25.408620] kunit_try_run_case+0x170/0x3f0 [ 25.408740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.408843] kthread+0x24c/0x2d0 [ 25.408897] ret_from_fork+0x10/0x20 [ 25.408946] [ 25.417816] Allocated by task 253: [ 25.418676] kasan_save_stack+0x3c/0x68 [ 25.419401] kasan_save_track+0x20/0x40 [ 25.420060] kasan_save_alloc_info+0x40/0x58 [ 25.420471] __kasan_kmalloc+0xd4/0xd8 [ 25.420885] __kmalloc_cache_noprof+0x154/0x320 [ 25.421336] kasan_atomics+0xb8/0x2e8 [ 25.421713] kunit_try_run_case+0x170/0x3f0 [ 25.422344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.423524] kthread+0x24c/0x2d0 [ 25.425844] ret_from_fork+0x10/0x20 [ 25.426846] [ 25.427291] The buggy address belongs to the object at fff00000c4205580 [ 25.427291] which belongs to the cache kmalloc-64 of size 64 [ 25.430431] The buggy address is located 0 bytes to the right of [ 25.430431] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.433718] [ 25.434247] The buggy address belongs to the physical page: [ 25.435055] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.436362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.437032] page_type: f5(slab) [ 25.437495] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.438185] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.438940] page dumped because: kasan: bad access detected [ 25.440244] [ 25.440598] Memory state around the buggy address: [ 25.441123] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.441836] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.442574] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.443710] ^ [ 25.444191] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.444883] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.445609] ================================================================== [ 26.993326] ================================================================== [ 26.994135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f18/0x49c8 [ 26.995009] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.996023] [ 26.996407] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.996653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.996778] Hardware name: linux,dummy-virt (DT) [ 26.996876] Call trace: [ 26.996952] dump_backtrace+0x9c/0x128 [ 26.997145] show_stack+0x20/0x38 [ 26.997268] dump_stack_lvl+0x8c/0xd0 [ 26.997407] print_report+0x118/0x5f0 [ 26.997550] kasan_report+0xdc/0x128 [ 26.997604] __asan_report_load8_noabort+0x20/0x30 [ 26.997663] kasan_atomics_helper+0x3f18/0x49c8 [ 26.997719] kasan_atomics+0x1a0/0x2e8 [ 26.997771] kunit_try_run_case+0x170/0x3f0 [ 26.997821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.997879] kthread+0x24c/0x2d0 [ 26.997931] ret_from_fork+0x10/0x20 [ 26.998012] [ 27.005746] Allocated by task 253: [ 27.006128] kasan_save_stack+0x3c/0x68 [ 27.006512] kasan_save_track+0x20/0x40 [ 27.006901] kasan_save_alloc_info+0x40/0x58 [ 27.009105] __kasan_kmalloc+0xd4/0xd8 [ 27.010096] __kmalloc_cache_noprof+0x154/0x320 [ 27.011791] kasan_atomics+0xb8/0x2e8 [ 27.013077] kunit_try_run_case+0x170/0x3f0 [ 27.014391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.015928] kthread+0x24c/0x2d0 [ 27.016802] ret_from_fork+0x10/0x20 [ 27.017501] [ 27.017936] The buggy address belongs to the object at fff00000c4205580 [ 27.017936] which belongs to the cache kmalloc-64 of size 64 [ 27.019157] The buggy address is located 0 bytes to the right of [ 27.019157] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.020378] [ 27.020738] The buggy address belongs to the physical page: [ 27.021426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.022280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.023069] page_type: f5(slab) [ 27.023607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.024484] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.025307] page dumped because: kasan: bad access detected [ 27.025952] [ 27.026302] Memory state around the buggy address: [ 27.026929] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.027742] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.028525] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.029310] ^ [ 27.029915] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.030712] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.031456] ================================================================== [ 25.366395] ================================================================== [ 25.367143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x49c8 [ 25.368305] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.369226] [ 25.369586] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.369774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.369844] Hardware name: linux,dummy-virt (DT) [ 25.369926] Call trace: [ 25.370008] dump_backtrace+0x9c/0x128 [ 25.370135] show_stack+0x20/0x38 [ 25.370255] dump_stack_lvl+0x8c/0xd0 [ 25.370379] print_report+0x118/0x5f0 [ 25.370542] kasan_report+0xdc/0x128 [ 25.370662] kasan_check_range+0x100/0x1a8 [ 25.370780] __kasan_check_write+0x20/0x30 [ 25.370948] kasan_atomics_helper+0x4a0/0x49c8 [ 25.371097] kasan_atomics+0x1a0/0x2e8 [ 25.371244] kunit_try_run_case+0x170/0x3f0 [ 25.371431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.371584] kthread+0x24c/0x2d0 [ 25.371696] ret_from_fork+0x10/0x20 [ 25.371804] [ 25.380235] Allocated by task 253: [ 25.381151] kasan_save_stack+0x3c/0x68 [ 25.381645] kasan_save_track+0x20/0x40 [ 25.382327] kasan_save_alloc_info+0x40/0x58 [ 25.383033] __kasan_kmalloc+0xd4/0xd8 [ 25.384044] __kmalloc_cache_noprof+0x154/0x320 [ 25.385521] kasan_atomics+0xb8/0x2e8 [ 25.386229] kunit_try_run_case+0x170/0x3f0 [ 25.386900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.387983] kthread+0x24c/0x2d0 [ 25.388562] ret_from_fork+0x10/0x20 [ 25.389127] [ 25.389271] The buggy address belongs to the object at fff00000c4205580 [ 25.389271] which belongs to the cache kmalloc-64 of size 64 [ 25.389753] The buggy address is located 0 bytes to the right of [ 25.389753] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.390732] [ 25.391081] The buggy address belongs to the physical page: [ 25.391788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.393539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.394400] page_type: f5(slab) [ 25.394608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.394943] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.396023] page dumped because: kasan: bad access detected [ 25.396735] [ 25.397307] Memory state around the buggy address: [ 25.398102] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.398856] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.399619] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.400332] ^ [ 25.401129] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.401863] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.402590] ================================================================== [ 25.181160] ================================================================== [ 25.181732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4264/0x49c8 [ 25.182586] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.183337] [ 25.183777] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.184002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.184082] Hardware name: linux,dummy-virt (DT) [ 25.184159] Call trace: [ 25.184213] dump_backtrace+0x9c/0x128 [ 25.184319] show_stack+0x20/0x38 [ 25.184422] dump_stack_lvl+0x8c/0xd0 [ 25.184524] print_report+0x118/0x5f0 [ 25.184616] kasan_report+0xdc/0x128 [ 25.184712] __asan_report_load4_noabort+0x20/0x30 [ 25.184834] kasan_atomics_helper+0x4264/0x49c8 [ 25.184938] kasan_atomics+0x1a0/0x2e8 [ 25.185069] kunit_try_run_case+0x170/0x3f0 [ 25.185173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.185286] kthread+0x24c/0x2d0 [ 25.185380] ret_from_fork+0x10/0x20 [ 25.185482] [ 25.192190] Allocated by task 253: [ 25.192772] kasan_save_stack+0x3c/0x68 [ 25.193547] kasan_save_track+0x20/0x40 [ 25.194348] kasan_save_alloc_info+0x40/0x58 [ 25.195034] __kasan_kmalloc+0xd4/0xd8 [ 25.195625] __kmalloc_cache_noprof+0x154/0x320 [ 25.196357] kasan_atomics+0xb8/0x2e8 [ 25.196922] kunit_try_run_case+0x170/0x3f0 [ 25.197523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.198198] kthread+0x24c/0x2d0 [ 25.198605] ret_from_fork+0x10/0x20 [ 25.199054] [ 25.199432] The buggy address belongs to the object at fff00000c4205580 [ 25.199432] which belongs to the cache kmalloc-64 of size 64 [ 25.201108] The buggy address is located 0 bytes to the right of [ 25.201108] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.202414] [ 25.202737] The buggy address belongs to the physical page: [ 25.204693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.205462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.206205] page_type: f5(slab) [ 25.206667] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.207897] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.209061] page dumped because: kasan: bad access detected [ 25.209614] [ 25.209919] Memory state around the buggy address: [ 25.210486] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.211232] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.212006] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.212686] ^ [ 25.213432] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.214314] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.214908] ================================================================== [ 26.959697] ================================================================== [ 26.960312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x165c/0x49c8 [ 26.961234] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.962199] [ 26.962615] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.962937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.963054] Hardware name: linux,dummy-virt (DT) [ 26.963147] Call trace: [ 26.963221] dump_backtrace+0x9c/0x128 [ 26.963463] show_stack+0x20/0x38 [ 26.963578] dump_stack_lvl+0x8c/0xd0 [ 26.963633] print_report+0x118/0x5f0 [ 26.963683] kasan_report+0xdc/0x128 [ 26.963731] kasan_check_range+0x100/0x1a8 [ 26.963783] __kasan_check_write+0x20/0x30 [ 26.963834] kasan_atomics_helper+0x165c/0x49c8 [ 26.963889] kasan_atomics+0x1a0/0x2e8 [ 26.963940] kunit_try_run_case+0x170/0x3f0 [ 26.964021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.964081] kthread+0x24c/0x2d0 [ 26.964134] ret_from_fork+0x10/0x20 [ 26.964184] [ 26.971900] Allocated by task 253: [ 26.972478] kasan_save_stack+0x3c/0x68 [ 26.973416] kasan_save_track+0x20/0x40 [ 26.974111] kasan_save_alloc_info+0x40/0x58 [ 26.974651] __kasan_kmalloc+0xd4/0xd8 [ 26.975189] __kmalloc_cache_noprof+0x154/0x320 [ 26.975825] kasan_atomics+0xb8/0x2e8 [ 26.976398] kunit_try_run_case+0x170/0x3f0 [ 26.977058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.977559] kthread+0x24c/0x2d0 [ 26.977770] ret_from_fork+0x10/0x20 [ 26.978031] [ 26.978358] The buggy address belongs to the object at fff00000c4205580 [ 26.978358] which belongs to the cache kmalloc-64 of size 64 [ 26.979555] The buggy address is located 0 bytes to the right of [ 26.979555] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.980774] [ 26.981168] The buggy address belongs to the physical page: [ 26.981825] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.982804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.983512] page_type: f5(slab) [ 26.984116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.985006] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.985785] page dumped because: kasan: bad access detected [ 26.986431] [ 26.986763] Memory state around the buggy address: [ 26.987385] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.988209] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.989000] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.989743] ^ [ 26.990361] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.991151] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.991903] ================================================================== [ 27.105994] ================================================================== [ 27.106642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x49c8 [ 27.107576] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.108656] [ 27.109014] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.109180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.109224] Hardware name: linux,dummy-virt (DT) [ 27.109274] Call trace: [ 27.109342] dump_backtrace+0x9c/0x128 [ 27.109469] show_stack+0x20/0x38 [ 27.109585] dump_stack_lvl+0x8c/0xd0 [ 27.109702] print_report+0x118/0x5f0 [ 27.109819] kasan_report+0xdc/0x128 [ 27.109873] kasan_check_range+0x100/0x1a8 [ 27.109926] __kasan_check_write+0x20/0x30 [ 27.110007] kasan_atomics_helper+0x1780/0x49c8 [ 27.110068] kasan_atomics+0x1a0/0x2e8 [ 27.110119] kunit_try_run_case+0x170/0x3f0 [ 27.110170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.110225] kthread+0x24c/0x2d0 [ 27.110276] ret_from_fork+0x10/0x20 [ 27.110328] [ 27.116996] Allocated by task 253: [ 27.117409] kasan_save_stack+0x3c/0x68 [ 27.117990] kasan_save_track+0x20/0x40 [ 27.118480] kasan_save_alloc_info+0x40/0x58 [ 27.118982] __kasan_kmalloc+0xd4/0xd8 [ 27.119552] __kmalloc_cache_noprof+0x154/0x320 [ 27.120207] kasan_atomics+0xb8/0x2e8 [ 27.120736] kunit_try_run_case+0x170/0x3f0 [ 27.121311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.122059] kthread+0x24c/0x2d0 [ 27.122652] ret_from_fork+0x10/0x20 [ 27.123200] [ 27.123510] The buggy address belongs to the object at fff00000c4205580 [ 27.123510] which belongs to the cache kmalloc-64 of size 64 [ 27.124623] The buggy address is located 0 bytes to the right of [ 27.124623] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.125817] [ 27.126206] The buggy address belongs to the physical page: [ 27.126875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.127818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.128522] page_type: f5(slab) [ 27.129057] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.129817] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.130652] page dumped because: kasan: bad access detected [ 27.131223] [ 27.131546] Memory state around the buggy address: [ 27.132141] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.132895] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.133589] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.134401] ^ [ 27.134905] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.135694] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.136464] ================================================================== [ 25.485655] ================================================================== [ 25.486335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5e4/0x49c8 [ 25.487230] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.488004] [ 25.488334] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.488505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.488568] Hardware name: linux,dummy-virt (DT) [ 25.488653] Call trace: [ 25.488721] dump_backtrace+0x9c/0x128 [ 25.488854] show_stack+0x20/0x38 [ 25.488987] dump_stack_lvl+0x8c/0xd0 [ 25.489113] print_report+0x118/0x5f0 [ 25.489230] kasan_report+0xdc/0x128 [ 25.489353] kasan_check_range+0x100/0x1a8 [ 25.489476] __kasan_check_write+0x20/0x30 [ 25.489606] kasan_atomics_helper+0x5e4/0x49c8 [ 25.489734] kasan_atomics+0x1a0/0x2e8 [ 25.489856] kunit_try_run_case+0x170/0x3f0 [ 25.490039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.490206] kthread+0x24c/0x2d0 [ 25.490371] ret_from_fork+0x10/0x20 [ 25.490497] [ 25.497989] Allocated by task 253: [ 25.498543] kasan_save_stack+0x3c/0x68 [ 25.499080] kasan_save_track+0x20/0x40 [ 25.499693] kasan_save_alloc_info+0x40/0x58 [ 25.500362] __kasan_kmalloc+0xd4/0xd8 [ 25.500899] __kmalloc_cache_noprof+0x154/0x320 [ 25.501563] kasan_atomics+0xb8/0x2e8 [ 25.502183] kunit_try_run_case+0x170/0x3f0 [ 25.502779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.503475] kthread+0x24c/0x2d0 [ 25.503939] ret_from_fork+0x10/0x20 [ 25.504647] [ 25.504950] The buggy address belongs to the object at fff00000c4205580 [ 25.504950] which belongs to the cache kmalloc-64 of size 64 [ 25.506186] The buggy address is located 0 bytes to the right of [ 25.506186] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.507530] [ 25.507904] The buggy address belongs to the physical page: [ 25.508649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.509595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.510452] page_type: f5(slab) [ 25.510988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.511812] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.512599] page dumped because: kasan: bad access detected [ 25.513275] [ 25.513605] Memory state around the buggy address: [ 25.514227] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.515039] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.515810] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.516579] ^ [ 25.517190] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.517949] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.518706] ================================================================== [ 25.023320] ================================================================== [ 25.024491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40e4/0x49c8 [ 25.024917] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.025955] [ 25.026363] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.026579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.026665] Hardware name: linux,dummy-virt (DT) [ 25.026759] Call trace: [ 25.026835] dump_backtrace+0x9c/0x128 [ 25.026978] show_stack+0x20/0x38 [ 25.027095] dump_stack_lvl+0x8c/0xd0 [ 25.027207] print_report+0x118/0x5f0 [ 25.027320] kasan_report+0xdc/0x128 [ 25.027482] __asan_report_store4_noabort+0x20/0x30 [ 25.027606] kasan_atomics_helper+0x40e4/0x49c8 [ 25.027727] kasan_atomics+0x1a0/0x2e8 [ 25.027826] kunit_try_run_case+0x170/0x3f0 [ 25.027882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.027937] kthread+0x24c/0x2d0 [ 25.028021] ret_from_fork+0x10/0x20 [ 25.028074] [ 25.034905] Allocated by task 253: [ 25.035861] kasan_save_stack+0x3c/0x68 [ 25.036499] kasan_save_track+0x20/0x40 [ 25.037526] kasan_save_alloc_info+0x40/0x58 [ 25.038448] __kasan_kmalloc+0xd4/0xd8 [ 25.039104] __kmalloc_cache_noprof+0x154/0x320 [ 25.040131] kasan_atomics+0xb8/0x2e8 [ 25.040563] kunit_try_run_case+0x170/0x3f0 [ 25.041123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.042047] kthread+0x24c/0x2d0 [ 25.042382] ret_from_fork+0x10/0x20 [ 25.042929] [ 25.043296] The buggy address belongs to the object at fff00000c4205580 [ 25.043296] which belongs to the cache kmalloc-64 of size 64 [ 25.044618] The buggy address is located 0 bytes to the right of [ 25.044618] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.046132] [ 25.046482] The buggy address belongs to the physical page: [ 25.047027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.048251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.048850] page_type: f5(slab) [ 25.049253] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.050099] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.050915] page dumped because: kasan: bad access detected [ 25.051826] [ 25.052214] Memory state around the buggy address: [ 25.052794] fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.053636] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.054516] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.055284] ^ [ 25.056227] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.057421] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.058748] ================================================================== [ 25.138444] ================================================================== [ 25.139204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c4/0x49c8 [ 25.140042] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.140823] [ 25.141223] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.141468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.141555] Hardware name: linux,dummy-virt (DT) [ 25.141641] Call trace: [ 25.141706] dump_backtrace+0x9c/0x128 [ 25.141973] show_stack+0x20/0x38 [ 25.142094] dump_stack_lvl+0x8c/0xd0 [ 25.142416] print_report+0x118/0x5f0 [ 25.142580] kasan_report+0xdc/0x128 [ 25.142697] kasan_check_range+0x100/0x1a8 [ 25.142760] __kasan_check_read+0x20/0x30 [ 25.142813] kasan_atomics_helper+0x2c4/0x49c8 [ 25.142865] kasan_atomics+0x1a0/0x2e8 [ 25.142918] kunit_try_run_case+0x170/0x3f0 [ 25.142994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.143057] kthread+0x24c/0x2d0 [ 25.143108] ret_from_fork+0x10/0x20 [ 25.143157] [ 25.150718] Allocated by task 253: [ 25.151238] kasan_save_stack+0x3c/0x68 [ 25.151710] kasan_save_track+0x20/0x40 [ 25.152144] kasan_save_alloc_info+0x40/0x58 [ 25.152607] __kasan_kmalloc+0xd4/0xd8 [ 25.155288] __kmalloc_cache_noprof+0x154/0x320 [ 25.156660] kasan_atomics+0xb8/0x2e8 [ 25.157084] kunit_try_run_case+0x170/0x3f0 [ 25.157726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.158414] kthread+0x24c/0x2d0 [ 25.159131] ret_from_fork+0x10/0x20 [ 25.160326] [ 25.160593] The buggy address belongs to the object at fff00000c4205580 [ 25.160593] which belongs to the cache kmalloc-64 of size 64 [ 25.162762] The buggy address is located 0 bytes to the right of [ 25.162762] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.165590] [ 25.166085] The buggy address belongs to the physical page: [ 25.166948] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.168516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.170008] page_type: f5(slab) [ 25.170527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.171713] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.172522] page dumped because: kasan: bad access detected [ 25.173184] [ 25.173502] Memory state around the buggy address: [ 25.174148] fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.175012] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.175771] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.176932] ^ [ 25.177514] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.178452] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.179233] ================================================================== [ 26.201573] ================================================================== [ 26.202316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f6c/0x49c8 [ 26.203129] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.204283] [ 26.204580] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.204814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.204906] Hardware name: linux,dummy-virt (DT) [ 26.205023] Call trace: [ 26.205097] dump_backtrace+0x9c/0x128 [ 26.205223] show_stack+0x20/0x38 [ 26.205341] dump_stack_lvl+0x8c/0xd0 [ 26.205459] print_report+0x118/0x5f0 [ 26.205573] kasan_report+0xdc/0x128 [ 26.205636] __asan_report_load4_noabort+0x20/0x30 [ 26.205690] kasan_atomics_helper+0x3f6c/0x49c8 [ 26.205745] kasan_atomics+0x1a0/0x2e8 [ 26.205796] kunit_try_run_case+0x170/0x3f0 [ 26.205847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.205901] kthread+0x24c/0x2d0 [ 26.205950] ret_from_fork+0x10/0x20 [ 26.206031] [ 26.212231] Allocated by task 253: [ 26.213263] kasan_save_stack+0x3c/0x68 [ 26.213736] kasan_save_track+0x20/0x40 [ 26.214314] kasan_save_alloc_info+0x40/0x58 [ 26.214936] __kasan_kmalloc+0xd4/0xd8 [ 26.217485] __kmalloc_cache_noprof+0x154/0x320 [ 26.217901] kasan_atomics+0xb8/0x2e8 [ 26.218296] kunit_try_run_case+0x170/0x3f0 [ 26.218698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.220863] kthread+0x24c/0x2d0 [ 26.222349] ret_from_fork+0x10/0x20 [ 26.223705] [ 26.224558] The buggy address belongs to the object at fff00000c4205580 [ 26.224558] which belongs to the cache kmalloc-64 of size 64 [ 26.226679] The buggy address is located 0 bytes to the right of [ 26.226679] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.228027] [ 26.228362] The buggy address belongs to the physical page: [ 26.228998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.229861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.230587] page_type: f5(slab) [ 26.231066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.231796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.232593] page dumped because: kasan: bad access detected [ 26.233190] [ 26.233507] Memory state around the buggy address: [ 26.234030] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.234867] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.235674] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.236426] ^ [ 26.237000] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.237711] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.238419] ================================================================== [ 26.340726] ================================================================== [ 26.342020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3fc4/0x49c8 [ 26.342906] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.344196] [ 26.344660] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.344888] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.345114] Hardware name: linux,dummy-virt (DT) [ 26.345159] Call trace: [ 26.345192] dump_backtrace+0x9c/0x128 [ 26.345251] show_stack+0x20/0x38 [ 26.345299] dump_stack_lvl+0x8c/0xd0 [ 26.345347] print_report+0x118/0x5f0 [ 26.345394] kasan_report+0xdc/0x128 [ 26.345441] __asan_report_store8_noabort+0x20/0x30 [ 26.345494] kasan_atomics_helper+0x3fc4/0x49c8 [ 26.345548] kasan_atomics+0x1a0/0x2e8 [ 26.345599] kunit_try_run_case+0x170/0x3f0 [ 26.345648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.345704] kthread+0x24c/0x2d0 [ 26.345752] ret_from_fork+0x10/0x20 [ 26.345803] [ 26.352418] Allocated by task 253: [ 26.352990] kasan_save_stack+0x3c/0x68 [ 26.353573] kasan_save_track+0x20/0x40 [ 26.354181] kasan_save_alloc_info+0x40/0x58 [ 26.354784] __kasan_kmalloc+0xd4/0xd8 [ 26.355302] __kmalloc_cache_noprof+0x154/0x320 [ 26.355978] kasan_atomics+0xb8/0x2e8 [ 26.356486] kunit_try_run_case+0x170/0x3f0 [ 26.357164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.357886] kthread+0x24c/0x2d0 [ 26.358422] ret_from_fork+0x10/0x20 [ 26.359029] [ 26.359357] The buggy address belongs to the object at fff00000c4205580 [ 26.359357] which belongs to the cache kmalloc-64 of size 64 [ 26.360674] The buggy address is located 0 bytes to the right of [ 26.360674] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.361947] [ 26.362306] The buggy address belongs to the physical page: [ 26.362887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.363571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.364332] page_type: f5(slab) [ 26.364827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.365644] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.366453] page dumped because: kasan: bad access detected [ 26.367028] [ 26.367365] Memory state around the buggy address: [ 26.367926] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.368663] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.369390] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.370081] ^ [ 26.370691] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.371431] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.372176] ================================================================== [ 26.653312] ================================================================== [ 26.654150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1288/0x49c8 [ 26.655467] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.656460] [ 26.656947] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.657169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.657290] Hardware name: linux,dummy-virt (DT) [ 26.657383] Call trace: [ 26.657458] dump_backtrace+0x9c/0x128 [ 26.657549] show_stack+0x20/0x38 [ 26.657597] dump_stack_lvl+0x8c/0xd0 [ 26.657644] print_report+0x118/0x5f0 [ 26.657691] kasan_report+0xdc/0x128 [ 26.657738] kasan_check_range+0x100/0x1a8 [ 26.657788] __kasan_check_write+0x20/0x30 [ 26.657840] kasan_atomics_helper+0x1288/0x49c8 [ 26.657895] kasan_atomics+0x1a0/0x2e8 [ 26.657949] kunit_try_run_case+0x170/0x3f0 [ 26.658035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.658094] kthread+0x24c/0x2d0 [ 26.658145] ret_from_fork+0x10/0x20 [ 26.658196] [ 26.666336] Allocated by task 253: [ 26.666844] kasan_save_stack+0x3c/0x68 [ 26.667455] kasan_save_track+0x20/0x40 [ 26.667934] kasan_save_alloc_info+0x40/0x58 [ 26.668593] __kasan_kmalloc+0xd4/0xd8 [ 26.669229] __kmalloc_cache_noprof+0x154/0x320 [ 26.669853] kasan_atomics+0xb8/0x2e8 [ 26.670368] kunit_try_run_case+0x170/0x3f0 [ 26.671015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.671688] kthread+0x24c/0x2d0 [ 26.672201] ret_from_fork+0x10/0x20 [ 26.672797] [ 26.673196] The buggy address belongs to the object at fff00000c4205580 [ 26.673196] which belongs to the cache kmalloc-64 of size 64 [ 26.674382] The buggy address is located 0 bytes to the right of [ 26.674382] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.675693] [ 26.676090] The buggy address belongs to the physical page: [ 26.676754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.677599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.678325] page_type: f5(slab) [ 26.678850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.679651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.680485] page dumped because: kasan: bad access detected [ 26.681189] [ 26.681537] Memory state around the buggy address: [ 26.682106] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.682855] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.683662] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.684344] ^ [ 26.685008] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.685951] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.686700] ================================================================== [ 26.824990] ================================================================== [ 26.825719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14ac/0x49c8 [ 26.826733] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.827490] [ 26.828095] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.828795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.828834] Hardware name: linux,dummy-virt (DT) [ 26.828873] Call trace: [ 26.828904] dump_backtrace+0x9c/0x128 [ 26.828992] show_stack+0x20/0x38 [ 26.829112] dump_stack_lvl+0x8c/0xd0 [ 26.829230] print_report+0x118/0x5f0 [ 26.829341] kasan_report+0xdc/0x128 [ 26.829395] kasan_check_range+0x100/0x1a8 [ 26.829447] __kasan_check_write+0x20/0x30 [ 26.829498] kasan_atomics_helper+0x14ac/0x49c8 [ 26.829554] kasan_atomics+0x1a0/0x2e8 [ 26.829606] kunit_try_run_case+0x170/0x3f0 [ 26.829656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.829713] kthread+0x24c/0x2d0 [ 26.829764] ret_from_fork+0x10/0x20 [ 26.829812] [ 26.836521] Allocated by task 253: [ 26.837049] kasan_save_stack+0x3c/0x68 [ 26.837694] kasan_save_track+0x20/0x40 [ 26.838258] kasan_save_alloc_info+0x40/0x58 [ 26.838765] __kasan_kmalloc+0xd4/0xd8 [ 26.839325] __kmalloc_cache_noprof+0x154/0x320 [ 26.840101] kasan_atomics+0xb8/0x2e8 [ 26.840572] kunit_try_run_case+0x170/0x3f0 [ 26.841170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.841781] kthread+0x24c/0x2d0 [ 26.842248] ret_from_fork+0x10/0x20 [ 26.842793] [ 26.843143] The buggy address belongs to the object at fff00000c4205580 [ 26.843143] which belongs to the cache kmalloc-64 of size 64 [ 26.844152] The buggy address is located 0 bytes to the right of [ 26.844152] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.845295] [ 26.845627] The buggy address belongs to the physical page: [ 26.846372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.847166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.847954] page_type: f5(slab) [ 26.848380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.849223] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.850020] page dumped because: kasan: bad access detected [ 26.850673] [ 26.851284] Memory state around the buggy address: [ 26.851827] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.852563] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.853281] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.854034] ^ [ 26.854601] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.855321] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.856097] ================================================================== [ 25.329363] ================================================================== [ 25.330440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x434/0x49c8 [ 25.331200] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.332217] [ 25.332574] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.332779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.332858] Hardware name: linux,dummy-virt (DT) [ 25.332943] Call trace: [ 25.333037] dump_backtrace+0x9c/0x128 [ 25.333165] show_stack+0x20/0x38 [ 25.333279] dump_stack_lvl+0x8c/0xd0 [ 25.333396] print_report+0x118/0x5f0 [ 25.333513] kasan_report+0xdc/0x128 [ 25.333607] kasan_check_range+0x100/0x1a8 [ 25.333661] __kasan_check_write+0x20/0x30 [ 25.333712] kasan_atomics_helper+0x434/0x49c8 [ 25.333765] kasan_atomics+0x1a0/0x2e8 [ 25.333815] kunit_try_run_case+0x170/0x3f0 [ 25.333864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.333919] kthread+0x24c/0x2d0 [ 25.333995] ret_from_fork+0x10/0x20 [ 25.334058] [ 25.342472] Allocated by task 253: [ 25.342938] kasan_save_stack+0x3c/0x68 [ 25.344184] kasan_save_track+0x20/0x40 [ 25.344737] kasan_save_alloc_info+0x40/0x58 [ 25.345493] __kasan_kmalloc+0xd4/0xd8 [ 25.345872] __kmalloc_cache_noprof+0x154/0x320 [ 25.346314] kasan_atomics+0xb8/0x2e8 [ 25.346687] kunit_try_run_case+0x170/0x3f0 [ 25.347840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.348850] kthread+0x24c/0x2d0 [ 25.349552] ret_from_fork+0x10/0x20 [ 25.349982] [ 25.350407] The buggy address belongs to the object at fff00000c4205580 [ 25.350407] which belongs to the cache kmalloc-64 of size 64 [ 25.351598] The buggy address is located 0 bytes to the right of [ 25.351598] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.353092] [ 25.353411] The buggy address belongs to the physical page: [ 25.353999] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.354871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.355753] page_type: f5(slab) [ 25.356223] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.357167] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.358002] page dumped because: kasan: bad access detected [ 25.358606] [ 25.358985] Memory state around the buggy address: [ 25.359656] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.360560] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.361643] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.362467] ^ [ 25.363059] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.363908] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.364854] ================================================================== [ 25.447074] ================================================================== [ 25.447750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x578/0x49c8 [ 25.449239] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.450824] [ 25.451307] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.451551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.451632] Hardware name: linux,dummy-virt (DT) [ 25.451716] Call trace: [ 25.451781] dump_backtrace+0x9c/0x128 [ 25.451922] show_stack+0x20/0x38 [ 25.452036] dump_stack_lvl+0x8c/0xd0 [ 25.452141] print_report+0x118/0x5f0 [ 25.452237] kasan_report+0xdc/0x128 [ 25.452344] kasan_check_range+0x100/0x1a8 [ 25.452463] __kasan_check_write+0x20/0x30 [ 25.452560] kasan_atomics_helper+0x578/0x49c8 [ 25.452616] kasan_atomics+0x1a0/0x2e8 [ 25.452667] kunit_try_run_case+0x170/0x3f0 [ 25.452714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.452783] kthread+0x24c/0x2d0 [ 25.452835] ret_from_fork+0x10/0x20 [ 25.452885] [ 25.460944] Allocated by task 253: [ 25.461356] kasan_save_stack+0x3c/0x68 [ 25.461937] kasan_save_track+0x20/0x40 [ 25.462510] kasan_save_alloc_info+0x40/0x58 [ 25.463000] __kasan_kmalloc+0xd4/0xd8 [ 25.463583] __kmalloc_cache_noprof+0x154/0x320 [ 25.465020] kasan_atomics+0xb8/0x2e8 [ 25.465469] kunit_try_run_case+0x170/0x3f0 [ 25.466228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.467028] kthread+0x24c/0x2d0 [ 25.467546] ret_from_fork+0x10/0x20 [ 25.468003] [ 25.468286] The buggy address belongs to the object at fff00000c4205580 [ 25.468286] which belongs to the cache kmalloc-64 of size 64 [ 25.470266] The buggy address is located 0 bytes to the right of [ 25.470266] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.471906] [ 25.472287] The buggy address belongs to the physical page: [ 25.472930] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.473787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.474528] page_type: f5(slab) [ 25.475026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.476626] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.477563] page dumped because: kasan: bad access detected [ 25.478242] [ 25.478705] Memory state around the buggy address: [ 25.479282] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.480377] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.481129] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.481979] ^ [ 25.482629] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.483447] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.484318] ================================================================== [ 26.169126] ================================================================== [ 26.170008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xda0/0x49c8 [ 26.171181] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.172464] [ 26.172799] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.173025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.173107] Hardware name: linux,dummy-virt (DT) [ 26.173199] Call trace: [ 26.173275] dump_backtrace+0x9c/0x128 [ 26.173365] show_stack+0x20/0x38 [ 26.173413] dump_stack_lvl+0x8c/0xd0 [ 26.173461] print_report+0x118/0x5f0 [ 26.173506] kasan_report+0xdc/0x128 [ 26.173552] kasan_check_range+0x100/0x1a8 [ 26.173601] __kasan_check_write+0x20/0x30 [ 26.173650] kasan_atomics_helper+0xda0/0x49c8 [ 26.173705] kasan_atomics+0x1a0/0x2e8 [ 26.173755] kunit_try_run_case+0x170/0x3f0 [ 26.173802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.173857] kthread+0x24c/0x2d0 [ 26.173903] ret_from_fork+0x10/0x20 [ 26.173951] [ 26.180703] Allocated by task 253: [ 26.181262] kasan_save_stack+0x3c/0x68 [ 26.181860] kasan_save_track+0x20/0x40 [ 26.182315] kasan_save_alloc_info+0x40/0x58 [ 26.182911] __kasan_kmalloc+0xd4/0xd8 [ 26.183488] __kmalloc_cache_noprof+0x154/0x320 [ 26.184128] kasan_atomics+0xb8/0x2e8 [ 26.184661] kunit_try_run_case+0x170/0x3f0 [ 26.185186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.185855] kthread+0x24c/0x2d0 [ 26.186403] ret_from_fork+0x10/0x20 [ 26.186875] [ 26.187204] The buggy address belongs to the object at fff00000c4205580 [ 26.187204] which belongs to the cache kmalloc-64 of size 64 [ 26.188296] The buggy address is located 0 bytes to the right of [ 26.188296] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.189560] [ 26.189877] The buggy address belongs to the physical page: [ 26.190591] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.191508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.192246] page_type: f5(slab) [ 26.192725] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.193584] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.194398] page dumped because: kasan: bad access detected [ 26.195017] [ 26.195302] Memory state around the buggy address: [ 26.195984] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.196665] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.197436] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.198233] ^ [ 26.198718] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.199620] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.200268] ================================================================== [ 26.064274] ================================================================== [ 26.065348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f4c/0x49c8 [ 26.066374] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.068143] [ 26.068535] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.068690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.068789] Hardware name: linux,dummy-virt (DT) [ 26.068887] Call trace: [ 26.068971] dump_backtrace+0x9c/0x128 [ 26.069117] show_stack+0x20/0x38 [ 26.069250] dump_stack_lvl+0x8c/0xd0 [ 26.069306] print_report+0x118/0x5f0 [ 26.069354] kasan_report+0xdc/0x128 [ 26.069400] __asan_report_load4_noabort+0x20/0x30 [ 26.069457] kasan_atomics_helper+0x3f4c/0x49c8 [ 26.069510] kasan_atomics+0x1a0/0x2e8 [ 26.069559] kunit_try_run_case+0x170/0x3f0 [ 26.069609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.069663] kthread+0x24c/0x2d0 [ 26.069713] ret_from_fork+0x10/0x20 [ 26.069764] [ 26.076642] Allocated by task 253: [ 26.077070] kasan_save_stack+0x3c/0x68 [ 26.077621] kasan_save_track+0x20/0x40 [ 26.078122] kasan_save_alloc_info+0x40/0x58 [ 26.078728] __kasan_kmalloc+0xd4/0xd8 [ 26.079353] __kmalloc_cache_noprof+0x154/0x320 [ 26.080013] kasan_atomics+0xb8/0x2e8 [ 26.080620] kunit_try_run_case+0x170/0x3f0 [ 26.081259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.081917] kthread+0x24c/0x2d0 [ 26.082468] ret_from_fork+0x10/0x20 [ 26.083044] [ 26.083402] The buggy address belongs to the object at fff00000c4205580 [ 26.083402] which belongs to the cache kmalloc-64 of size 64 [ 26.084646] The buggy address is located 0 bytes to the right of [ 26.084646] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.085980] [ 26.086321] The buggy address belongs to the physical page: [ 26.087020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.087929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.088666] page_type: f5(slab) [ 26.089287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.090130] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.090919] page dumped because: kasan: bad access detected [ 26.091570] [ 26.091894] Memory state around the buggy address: [ 26.092522] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.093360] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.094132] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.094887] ^ [ 26.095467] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.096228] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.096825] ================================================================== [ 26.760261] ================================================================== [ 26.761071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x141c/0x49c8 [ 26.761913] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.762624] [ 26.762997] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.763202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.763287] Hardware name: linux,dummy-virt (DT) [ 26.763379] Call trace: [ 26.763477] dump_backtrace+0x9c/0x128 [ 26.763603] show_stack+0x20/0x38 [ 26.763714] dump_stack_lvl+0x8c/0xd0 [ 26.763827] print_report+0x118/0x5f0 [ 26.763920] kasan_report+0xdc/0x128 [ 26.763997] kasan_check_range+0x100/0x1a8 [ 26.764053] __kasan_check_write+0x20/0x30 [ 26.764103] kasan_atomics_helper+0x141c/0x49c8 [ 26.764158] kasan_atomics+0x1a0/0x2e8 [ 26.764208] kunit_try_run_case+0x170/0x3f0 [ 26.764257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.764314] kthread+0x24c/0x2d0 [ 26.764363] ret_from_fork+0x10/0x20 [ 26.764414] [ 26.771045] Allocated by task 253: [ 26.771478] kasan_save_stack+0x3c/0x68 [ 26.771950] kasan_save_track+0x20/0x40 [ 26.772540] kasan_save_alloc_info+0x40/0x58 [ 26.773058] __kasan_kmalloc+0xd4/0xd8 [ 26.773491] __kmalloc_cache_noprof+0x154/0x320 [ 26.774196] kasan_atomics+0xb8/0x2e8 [ 26.774747] kunit_try_run_case+0x170/0x3f0 [ 26.775351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.775980] kthread+0x24c/0x2d0 [ 26.776503] ret_from_fork+0x10/0x20 [ 26.776957] [ 26.777287] The buggy address belongs to the object at fff00000c4205580 [ 26.777287] which belongs to the cache kmalloc-64 of size 64 [ 26.778513] The buggy address is located 0 bytes to the right of [ 26.778513] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.779689] [ 26.780029] The buggy address belongs to the physical page: [ 26.780518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.781721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.782906] page_type: f5(slab) [ 26.783427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.784275] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.785047] page dumped because: kasan: bad access detected [ 26.785604] [ 26.785905] Memory state around the buggy address: [ 26.786482] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.787221] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.787953] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.788667] ^ [ 26.789218] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.789991] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.790697] ================================================================== [ 27.202073] ================================================================== [ 27.203002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f88/0x49c8 [ 27.204094] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.205069] [ 27.205459] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.205680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.205769] Hardware name: linux,dummy-virt (DT) [ 27.205861] Call trace: [ 27.205896] dump_backtrace+0x9c/0x128 [ 27.205955] show_stack+0x20/0x38 [ 27.206035] dump_stack_lvl+0x8c/0xd0 [ 27.206086] print_report+0x118/0x5f0 [ 27.206133] kasan_report+0xdc/0x128 [ 27.206179] __asan_report_load8_noabort+0x20/0x30 [ 27.206236] kasan_atomics_helper+0x3f88/0x49c8 [ 27.206295] kasan_atomics+0x1a0/0x2e8 [ 27.206348] kunit_try_run_case+0x170/0x3f0 [ 27.206399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.206456] kthread+0x24c/0x2d0 [ 27.206507] ret_from_fork+0x10/0x20 [ 27.206560] [ 27.212716] Allocated by task 253: [ 27.213224] kasan_save_stack+0x3c/0x68 [ 27.213791] kasan_save_track+0x20/0x40 [ 27.214383] kasan_save_alloc_info+0x40/0x58 [ 27.214919] __kasan_kmalloc+0xd4/0xd8 [ 27.215530] __kmalloc_cache_noprof+0x154/0x320 [ 27.216214] kasan_atomics+0xb8/0x2e8 [ 27.216834] kunit_try_run_case+0x170/0x3f0 [ 27.217342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.218059] kthread+0x24c/0x2d0 [ 27.218511] ret_from_fork+0x10/0x20 [ 27.219014] [ 27.219342] The buggy address belongs to the object at fff00000c4205580 [ 27.219342] which belongs to the cache kmalloc-64 of size 64 [ 27.220450] The buggy address is located 0 bytes to the right of [ 27.220450] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.221721] [ 27.222061] The buggy address belongs to the physical page: [ 27.222648] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.223475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.224142] page_type: f5(slab) [ 27.224663] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.225397] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.226221] page dumped because: kasan: bad access detected [ 27.226816] [ 27.227158] Memory state around the buggy address: [ 27.227690] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.228413] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.229125] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.229808] ^ [ 27.230506] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.231162] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.231917] ================================================================== [ 25.254202] ================================================================== [ 25.254756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x49c8 [ 25.255664] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.256451] [ 25.256831] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.257073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.257161] Hardware name: linux,dummy-virt (DT) [ 25.257259] Call trace: [ 25.257337] dump_backtrace+0x9c/0x128 [ 25.257468] show_stack+0x20/0x38 [ 25.257591] dump_stack_lvl+0x8c/0xd0 [ 25.257715] print_report+0x118/0x5f0 [ 25.257834] kasan_report+0xdc/0x128 [ 25.257950] __asan_report_store4_noabort+0x20/0x30 [ 25.258152] kasan_atomics_helper+0x40fc/0x49c8 [ 25.258297] kasan_atomics+0x1a0/0x2e8 [ 25.258359] kunit_try_run_case+0x170/0x3f0 [ 25.258410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.258468] kthread+0x24c/0x2d0 [ 25.258518] ret_from_fork+0x10/0x20 [ 25.258569] [ 25.266495] Allocated by task 253: [ 25.266983] kasan_save_stack+0x3c/0x68 [ 25.268674] kasan_save_track+0x20/0x40 [ 25.269141] kasan_save_alloc_info+0x40/0x58 [ 25.269767] __kasan_kmalloc+0xd4/0xd8 [ 25.270330] __kmalloc_cache_noprof+0x154/0x320 [ 25.270917] kasan_atomics+0xb8/0x2e8 [ 25.271879] kunit_try_run_case+0x170/0x3f0 [ 25.272696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.273446] kthread+0x24c/0x2d0 [ 25.273977] ret_from_fork+0x10/0x20 [ 25.274518] [ 25.274900] The buggy address belongs to the object at fff00000c4205580 [ 25.274900] which belongs to the cache kmalloc-64 of size 64 [ 25.276613] The buggy address is located 0 bytes to the right of [ 25.276613] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.277788] [ 25.278371] The buggy address belongs to the physical page: [ 25.279028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.280244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.280926] page_type: f5(slab) [ 25.281560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.282480] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.283352] page dumped because: kasan: bad access detected [ 25.284056] [ 25.284342] Memory state around the buggy address: [ 25.284911] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.285613] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.287056] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.287645] ^ [ 25.288574] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.289438] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.290320] ================================================================== [ 25.725893] ================================================================== [ 25.727009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4440/0x49c8 [ 25.728043] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.728834] [ 25.729193] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.729424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.729511] Hardware name: linux,dummy-virt (DT) [ 25.729609] Call trace: [ 25.729680] dump_backtrace+0x9c/0x128 [ 25.729813] show_stack+0x20/0x38 [ 25.729908] dump_stack_lvl+0x8c/0xd0 [ 25.729992] print_report+0x118/0x5f0 [ 25.730049] kasan_report+0xdc/0x128 [ 25.730096] __asan_report_load4_noabort+0x20/0x30 [ 25.730151] kasan_atomics_helper+0x4440/0x49c8 [ 25.730208] kasan_atomics+0x1a0/0x2e8 [ 25.730260] kunit_try_run_case+0x170/0x3f0 [ 25.730312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.730369] kthread+0x24c/0x2d0 [ 25.730422] ret_from_fork+0x10/0x20 [ 25.730477] [ 25.736856] Allocated by task 253: [ 25.737417] kasan_save_stack+0x3c/0x68 [ 25.737942] kasan_save_track+0x20/0x40 [ 25.738511] kasan_save_alloc_info+0x40/0x58 [ 25.739044] __kasan_kmalloc+0xd4/0xd8 [ 25.739652] __kmalloc_cache_noprof+0x154/0x320 [ 25.740230] kasan_atomics+0xb8/0x2e8 [ 25.740742] kunit_try_run_case+0x170/0x3f0 [ 25.741316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.741929] kthread+0x24c/0x2d0 [ 25.742472] ret_from_fork+0x10/0x20 [ 25.743126] [ 25.743455] The buggy address belongs to the object at fff00000c4205580 [ 25.743455] which belongs to the cache kmalloc-64 of size 64 [ 25.744561] The buggy address is located 0 bytes to the right of [ 25.744561] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.745749] [ 25.746142] The buggy address belongs to the physical page: [ 25.746767] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.747509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.748291] page_type: f5(slab) [ 25.748803] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.749722] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.750462] page dumped because: kasan: bad access detected [ 25.751083] [ 25.751431] Memory state around the buggy address: [ 25.752050] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.752758] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.753591] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.754380] ^ [ 25.754955] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.755646] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.756404] ================================================================== [ 26.440372] ================================================================== [ 26.441235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1000/0x49c8 [ 26.441927] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.443169] [ 26.443866] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.444089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.444174] Hardware name: linux,dummy-virt (DT) [ 26.444286] Call trace: [ 26.444371] dump_backtrace+0x9c/0x128 [ 26.444495] show_stack+0x20/0x38 [ 26.444566] dump_stack_lvl+0x8c/0xd0 [ 26.444616] print_report+0x118/0x5f0 [ 26.444666] kasan_report+0xdc/0x128 [ 26.444714] kasan_check_range+0x100/0x1a8 [ 26.444772] __kasan_check_write+0x20/0x30 [ 26.444828] kasan_atomics_helper+0x1000/0x49c8 [ 26.444883] kasan_atomics+0x1a0/0x2e8 [ 26.444935] kunit_try_run_case+0x170/0x3f0 [ 26.445017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.445078] kthread+0x24c/0x2d0 [ 26.445128] ret_from_fork+0x10/0x20 [ 26.445178] [ 26.452212] Allocated by task 253: [ 26.452778] kasan_save_stack+0x3c/0x68 [ 26.453441] kasan_save_track+0x20/0x40 [ 26.454054] kasan_save_alloc_info+0x40/0x58 [ 26.454611] __kasan_kmalloc+0xd4/0xd8 [ 26.455206] __kmalloc_cache_noprof+0x154/0x320 [ 26.455879] kasan_atomics+0xb8/0x2e8 [ 26.456487] kunit_try_run_case+0x170/0x3f0 [ 26.457098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.457808] kthread+0x24c/0x2d0 [ 26.458340] ret_from_fork+0x10/0x20 [ 26.458892] [ 26.459276] The buggy address belongs to the object at fff00000c4205580 [ 26.459276] which belongs to the cache kmalloc-64 of size 64 [ 26.460474] The buggy address is located 0 bytes to the right of [ 26.460474] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.461800] [ 26.462195] The buggy address belongs to the physical page: [ 26.462812] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.463685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.464304] page_type: f5(slab) [ 26.464759] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.465624] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.466381] page dumped because: kasan: bad access detected [ 26.466988] [ 26.467266] Memory state around the buggy address: [ 26.467874] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.468618] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.469371] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.470045] ^ [ 26.470627] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.471449] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.472236] ================================================================== [ 25.618953] ================================================================== [ 25.619693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7a0/0x49c8 [ 25.620610] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.621409] [ 25.621828] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.622054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.622180] Hardware name: linux,dummy-virt (DT) [ 25.622276] Call trace: [ 25.622350] dump_backtrace+0x9c/0x128 [ 25.622477] show_stack+0x20/0x38 [ 25.622594] dump_stack_lvl+0x8c/0xd0 [ 25.622716] print_report+0x118/0x5f0 [ 25.622836] kasan_report+0xdc/0x128 [ 25.622955] kasan_check_range+0x100/0x1a8 [ 25.623098] __kasan_check_write+0x20/0x30 [ 25.623162] kasan_atomics_helper+0x7a0/0x49c8 [ 25.623217] kasan_atomics+0x1a0/0x2e8 [ 25.623268] kunit_try_run_case+0x170/0x3f0 [ 25.623318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.623373] kthread+0x24c/0x2d0 [ 25.623424] ret_from_fork+0x10/0x20 [ 25.623474] [ 25.630110] Allocated by task 253: [ 25.630505] kasan_save_stack+0x3c/0x68 [ 25.631146] kasan_save_track+0x20/0x40 [ 25.631764] kasan_save_alloc_info+0x40/0x58 [ 25.632370] __kasan_kmalloc+0xd4/0xd8 [ 25.632810] __kmalloc_cache_noprof+0x154/0x320 [ 25.633581] kasan_atomics+0xb8/0x2e8 [ 25.634978] kunit_try_run_case+0x170/0x3f0 [ 25.635581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.636166] kthread+0x24c/0x2d0 [ 25.636567] ret_from_fork+0x10/0x20 [ 25.637233] [ 25.637698] The buggy address belongs to the object at fff00000c4205580 [ 25.637698] which belongs to the cache kmalloc-64 of size 64 [ 25.638940] The buggy address is located 0 bytes to the right of [ 25.638940] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.640500] [ 25.640795] The buggy address belongs to the physical page: [ 25.641393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.642261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.643190] page_type: f5(slab) [ 25.643755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.644659] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.645538] page dumped because: kasan: bad access detected [ 25.646232] [ 25.646647] Memory state around the buggy address: [ 25.647285] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.648120] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.648941] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.649736] ^ [ 25.650381] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.651268] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.652047] ================================================================== [ 25.654255] ================================================================== [ 25.654940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x810/0x49c8 [ 25.655846] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.657036] [ 25.657383] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.657759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.657798] Hardware name: linux,dummy-virt (DT) [ 25.657837] Call trace: [ 25.657869] dump_backtrace+0x9c/0x128 [ 25.657926] show_stack+0x20/0x38 [ 25.658005] dump_stack_lvl+0x8c/0xd0 [ 25.658058] print_report+0x118/0x5f0 [ 25.658105] kasan_report+0xdc/0x128 [ 25.658151] kasan_check_range+0x100/0x1a8 [ 25.658201] __kasan_check_write+0x20/0x30 [ 25.658250] kasan_atomics_helper+0x810/0x49c8 [ 25.658305] kasan_atomics+0x1a0/0x2e8 [ 25.658356] kunit_try_run_case+0x170/0x3f0 [ 25.658405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.658461] kthread+0x24c/0x2d0 [ 25.658511] ret_from_fork+0x10/0x20 [ 25.658562] [ 25.665427] Allocated by task 253: [ 25.665994] kasan_save_stack+0x3c/0x68 [ 25.666590] kasan_save_track+0x20/0x40 [ 25.667167] kasan_save_alloc_info+0x40/0x58 [ 25.667763] __kasan_kmalloc+0xd4/0xd8 [ 25.668207] __kmalloc_cache_noprof+0x154/0x320 [ 25.669000] kasan_atomics+0xb8/0x2e8 [ 25.669627] kunit_try_run_case+0x170/0x3f0 [ 25.670272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.671003] kthread+0x24c/0x2d0 [ 25.671582] ret_from_fork+0x10/0x20 [ 25.672073] [ 25.672447] The buggy address belongs to the object at fff00000c4205580 [ 25.672447] which belongs to the cache kmalloc-64 of size 64 [ 25.673456] The buggy address is located 0 bytes to the right of [ 25.673456] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.674614] [ 25.674944] The buggy address belongs to the physical page: [ 25.675571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.676379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.677070] page_type: f5(slab) [ 25.677475] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.678329] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.679099] page dumped because: kasan: bad access detected [ 25.679736] [ 25.680092] Memory state around the buggy address: [ 25.680649] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.681433] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.682274] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.682904] ^ [ 25.683544] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.684242] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.684804] ================================================================== [ 25.757622] ================================================================== [ 25.758422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x978/0x49c8 [ 25.759116] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.759723] [ 25.759938] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.760218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.760331] Hardware name: linux,dummy-virt (DT) [ 25.760484] Call trace: [ 25.760558] dump_backtrace+0x9c/0x128 [ 25.760685] show_stack+0x20/0x38 [ 25.760806] dump_stack_lvl+0x8c/0xd0 [ 25.760929] print_report+0x118/0x5f0 [ 25.761068] kasan_report+0xdc/0x128 [ 25.761184] kasan_check_range+0x100/0x1a8 [ 25.761377] __kasan_check_write+0x20/0x30 [ 25.761511] kasan_atomics_helper+0x978/0x49c8 [ 25.761645] kasan_atomics+0x1a0/0x2e8 [ 25.761740] kunit_try_run_case+0x170/0x3f0 [ 25.761797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.761856] kthread+0x24c/0x2d0 [ 25.761907] ret_from_fork+0x10/0x20 [ 25.761976] [ 25.770235] Allocated by task 253: [ 25.770643] kasan_save_stack+0x3c/0x68 [ 25.771331] kasan_save_track+0x20/0x40 [ 25.771974] kasan_save_alloc_info+0x40/0x58 [ 25.772540] __kasan_kmalloc+0xd4/0xd8 [ 25.773149] __kmalloc_cache_noprof+0x154/0x320 [ 25.773764] kasan_atomics+0xb8/0x2e8 [ 25.774439] kunit_try_run_case+0x170/0x3f0 [ 25.775029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.775733] kthread+0x24c/0x2d0 [ 25.776236] ret_from_fork+0x10/0x20 [ 25.776795] [ 25.777184] The buggy address belongs to the object at fff00000c4205580 [ 25.777184] which belongs to the cache kmalloc-64 of size 64 [ 25.778418] The buggy address is located 0 bytes to the right of [ 25.778418] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.779643] [ 25.780008] The buggy address belongs to the physical page: [ 25.780703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.781572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.782336] page_type: f5(slab) [ 25.782848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.783700] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.784552] page dumped because: kasan: bad access detected [ 25.785196] [ 25.785549] Memory state around the buggy address: [ 25.786162] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.786984] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.787767] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.788561] ^ [ 25.789134] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.789900] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.790779] ================================================================== [ 26.474101] ================================================================== [ 26.474829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x106c/0x49c8 [ 26.475725] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.476623] [ 26.476942] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.477408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.477479] Hardware name: linux,dummy-virt (DT) [ 26.477553] Call trace: [ 26.477613] dump_backtrace+0x9c/0x128 [ 26.477725] show_stack+0x20/0x38 [ 26.477819] dump_stack_lvl+0x8c/0xd0 [ 26.477923] print_report+0x118/0x5f0 [ 26.478055] kasan_report+0xdc/0x128 [ 26.478164] kasan_check_range+0x100/0x1a8 [ 26.478281] __kasan_check_write+0x20/0x30 [ 26.478395] kasan_atomics_helper+0x106c/0x49c8 [ 26.478515] kasan_atomics+0x1a0/0x2e8 [ 26.478629] kunit_try_run_case+0x170/0x3f0 [ 26.478743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.478858] kthread+0x24c/0x2d0 [ 26.478979] ret_from_fork+0x10/0x20 [ 26.479092] [ 26.493022] Allocated by task 253: [ 26.493571] kasan_save_stack+0x3c/0x68 [ 26.494078] kasan_save_track+0x20/0x40 [ 26.494717] kasan_save_alloc_info+0x40/0x58 [ 26.495328] __kasan_kmalloc+0xd4/0xd8 [ 26.495890] __kmalloc_cache_noprof+0x154/0x320 [ 26.496559] kasan_atomics+0xb8/0x2e8 [ 26.497114] kunit_try_run_case+0x170/0x3f0 [ 26.497691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.498400] kthread+0x24c/0x2d0 [ 26.498895] ret_from_fork+0x10/0x20 [ 26.499456] [ 26.499805] The buggy address belongs to the object at fff00000c4205580 [ 26.499805] which belongs to the cache kmalloc-64 of size 64 [ 26.501028] The buggy address is located 0 bytes to the right of [ 26.501028] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.502283] [ 26.502595] The buggy address belongs to the physical page: [ 26.503217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.504153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.504899] page_type: f5(slab) [ 26.505404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.506248] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.507045] page dumped because: kasan: bad access detected [ 26.507667] [ 26.508005] Memory state around the buggy address: [ 26.508592] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.509450] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.510255] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.511006] ^ [ 26.511578] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.512361] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.513173] ================================================================== [ 26.720317] ================================================================== [ 26.721065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1370/0x49c8 [ 26.721925] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.723997] [ 26.724340] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.724545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.724630] Hardware name: linux,dummy-virt (DT) [ 26.724718] Call trace: [ 26.724800] dump_backtrace+0x9c/0x128 [ 26.724919] show_stack+0x20/0x38 [ 26.725023] dump_stack_lvl+0x8c/0xd0 [ 26.725079] print_report+0x118/0x5f0 [ 26.725125] kasan_report+0xdc/0x128 [ 26.725171] kasan_check_range+0x100/0x1a8 [ 26.725219] __kasan_check_write+0x20/0x30 [ 26.725270] kasan_atomics_helper+0x1370/0x49c8 [ 26.725325] kasan_atomics+0x1a0/0x2e8 [ 26.725374] kunit_try_run_case+0x170/0x3f0 [ 26.725423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.725480] kthread+0x24c/0x2d0 [ 26.725530] ret_from_fork+0x10/0x20 [ 26.725580] [ 26.732523] Allocated by task 253: [ 26.733063] kasan_save_stack+0x3c/0x68 [ 26.733749] kasan_save_track+0x20/0x40 [ 26.734325] kasan_save_alloc_info+0x40/0x58 [ 26.734944] __kasan_kmalloc+0xd4/0xd8 [ 26.735487] __kmalloc_cache_noprof+0x154/0x320 [ 26.736144] kasan_atomics+0xb8/0x2e8 [ 26.736675] kunit_try_run_case+0x170/0x3f0 [ 26.737255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.737911] kthread+0x24c/0x2d0 [ 26.738412] ret_from_fork+0x10/0x20 [ 26.738939] [ 26.739277] The buggy address belongs to the object at fff00000c4205580 [ 26.739277] which belongs to the cache kmalloc-64 of size 64 [ 26.740360] The buggy address is located 0 bytes to the right of [ 26.740360] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.741679] [ 26.742569] The buggy address belongs to the physical page: [ 26.743831] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.744452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.744995] page_type: f5(slab) [ 26.745363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.745911] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.750203] page dumped because: kasan: bad access detected [ 26.751760] [ 26.752381] Memory state around the buggy address: [ 26.754099] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.754822] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.755531] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.756324] ^ [ 26.756920] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.757672] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.758343] ================================================================== [ 26.584804] ================================================================== [ 26.585516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11b0/0x49c8 [ 26.586228] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.587273] [ 26.587569] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.587773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.587857] Hardware name: linux,dummy-virt (DT) [ 26.588001] Call trace: [ 26.588073] dump_backtrace+0x9c/0x128 [ 26.588200] show_stack+0x20/0x38 [ 26.588367] dump_stack_lvl+0x8c/0xd0 [ 26.588487] print_report+0x118/0x5f0 [ 26.588589] kasan_report+0xdc/0x128 [ 26.588640] kasan_check_range+0x100/0x1a8 [ 26.588690] __kasan_check_write+0x20/0x30 [ 26.588746] kasan_atomics_helper+0x11b0/0x49c8 [ 26.588817] kasan_atomics+0x1a0/0x2e8 [ 26.588871] kunit_try_run_case+0x170/0x3f0 [ 26.588922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.589006] kthread+0x24c/0x2d0 [ 26.589063] ret_from_fork+0x10/0x20 [ 26.589114] [ 26.597124] Allocated by task 253: [ 26.597632] kasan_save_stack+0x3c/0x68 [ 26.598203] kasan_save_track+0x20/0x40 [ 26.598814] kasan_save_alloc_info+0x40/0x58 [ 26.599536] __kasan_kmalloc+0xd4/0xd8 [ 26.600074] __kmalloc_cache_noprof+0x154/0x320 [ 26.600648] kasan_atomics+0xb8/0x2e8 [ 26.601269] kunit_try_run_case+0x170/0x3f0 [ 26.601880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.602596] kthread+0x24c/0x2d0 [ 26.603111] ret_from_fork+0x10/0x20 [ 26.603713] [ 26.604062] The buggy address belongs to the object at fff00000c4205580 [ 26.604062] which belongs to the cache kmalloc-64 of size 64 [ 26.605240] The buggy address is located 0 bytes to the right of [ 26.605240] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.606550] [ 26.606928] The buggy address belongs to the physical page: [ 26.607580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.608491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.609269] page_type: f5(slab) [ 26.609806] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.610664] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.611465] page dumped because: kasan: bad access detected [ 26.612094] [ 26.612455] Memory state around the buggy address: [ 26.613071] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.613878] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.614671] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.615488] ^ [ 26.616068] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.616890] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.617649] ================================================================== [ 26.134839] ================================================================== [ 26.135557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f40/0x49c8 [ 26.136525] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.137471] [ 26.138003] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.138227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.138426] Hardware name: linux,dummy-virt (DT) [ 26.138526] Call trace: [ 26.138598] dump_backtrace+0x9c/0x128 [ 26.138725] show_stack+0x20/0x38 [ 26.138807] dump_stack_lvl+0x8c/0xd0 [ 26.138882] print_report+0x118/0x5f0 [ 26.138933] kasan_report+0xdc/0x128 [ 26.139004] __asan_report_load4_noabort+0x20/0x30 [ 26.139064] kasan_atomics_helper+0x3f40/0x49c8 [ 26.139120] kasan_atomics+0x1a0/0x2e8 [ 26.139169] kunit_try_run_case+0x170/0x3f0 [ 26.139216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.139272] kthread+0x24c/0x2d0 [ 26.139320] ret_from_fork+0x10/0x20 [ 26.139370] [ 26.146084] Allocated by task 253: [ 26.146621] kasan_save_stack+0x3c/0x68 [ 26.147354] kasan_save_track+0x20/0x40 [ 26.147890] kasan_save_alloc_info+0x40/0x58 [ 26.148589] __kasan_kmalloc+0xd4/0xd8 [ 26.149164] __kmalloc_cache_noprof+0x154/0x320 [ 26.149887] kasan_atomics+0xb8/0x2e8 [ 26.150461] kunit_try_run_case+0x170/0x3f0 [ 26.151178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.151890] kthread+0x24c/0x2d0 [ 26.152344] ret_from_fork+0x10/0x20 [ 26.152897] [ 26.153270] The buggy address belongs to the object at fff00000c4205580 [ 26.153270] which belongs to the cache kmalloc-64 of size 64 [ 26.154479] The buggy address is located 0 bytes to the right of [ 26.154479] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.155802] [ 26.156168] The buggy address belongs to the physical page: [ 26.156788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.157772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.158682] page_type: f5(slab) [ 26.159504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.160352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.161238] page dumped because: kasan: bad access detected [ 26.161845] [ 26.162379] Memory state around the buggy address: [ 26.162906] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.163627] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.164372] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.165111] ^ [ 26.165646] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.166373] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.167143] ================================================================== [ 25.520141] ================================================================== [ 25.521150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x650/0x49c8 [ 25.522327] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.523274] [ 25.523745] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.523987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.524072] Hardware name: linux,dummy-virt (DT) [ 25.524165] Call trace: [ 25.524223] dump_backtrace+0x9c/0x128 [ 25.524284] show_stack+0x20/0x38 [ 25.524329] dump_stack_lvl+0x8c/0xd0 [ 25.524377] print_report+0x118/0x5f0 [ 25.524422] kasan_report+0xdc/0x128 [ 25.524470] kasan_check_range+0x100/0x1a8 [ 25.524519] __kasan_check_write+0x20/0x30 [ 25.524568] kasan_atomics_helper+0x650/0x49c8 [ 25.524622] kasan_atomics+0x1a0/0x2e8 [ 25.524672] kunit_try_run_case+0x170/0x3f0 [ 25.524719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.524788] kthread+0x24c/0x2d0 [ 25.524837] ret_from_fork+0x10/0x20 [ 25.524887] [ 25.531535] Allocated by task 253: [ 25.532050] kasan_save_stack+0x3c/0x68 [ 25.532669] kasan_save_track+0x20/0x40 [ 25.533204] kasan_save_alloc_info+0x40/0x58 [ 25.533812] __kasan_kmalloc+0xd4/0xd8 [ 25.534462] __kmalloc_cache_noprof+0x154/0x320 [ 25.535102] kasan_atomics+0xb8/0x2e8 [ 25.535535] kunit_try_run_case+0x170/0x3f0 [ 25.536084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.536852] kthread+0x24c/0x2d0 [ 25.537411] ret_from_fork+0x10/0x20 [ 25.538047] [ 25.538416] The buggy address belongs to the object at fff00000c4205580 [ 25.538416] which belongs to the cache kmalloc-64 of size 64 [ 25.539507] The buggy address is located 0 bytes to the right of [ 25.539507] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.540832] [ 25.541188] The buggy address belongs to the physical page: [ 25.541972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.542815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.543482] page_type: f5(slab) [ 25.544167] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.544939] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.545664] page dumped because: kasan: bad access detected [ 25.546275] [ 25.546596] Memory state around the buggy address: [ 25.547137] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.547901] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.548570] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.549351] ^ [ 25.549899] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.550639] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.551409] ================================================================== [ 25.960381] ================================================================== [ 25.962049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbc8/0x49c8 [ 25.963293] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.964379] [ 25.964708] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.965163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.965206] Hardware name: linux,dummy-virt (DT) [ 25.965289] Call trace: [ 25.965325] dump_backtrace+0x9c/0x128 [ 25.965382] show_stack+0x20/0x38 [ 25.965429] dump_stack_lvl+0x8c/0xd0 [ 25.965477] print_report+0x118/0x5f0 [ 25.965524] kasan_report+0xdc/0x128 [ 25.965568] kasan_check_range+0x100/0x1a8 [ 25.965615] __kasan_check_write+0x20/0x30 [ 25.965664] kasan_atomics_helper+0xbc8/0x49c8 [ 25.965716] kasan_atomics+0x1a0/0x2e8 [ 25.965765] kunit_try_run_case+0x170/0x3f0 [ 25.965814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.965870] kthread+0x24c/0x2d0 [ 25.965919] ret_from_fork+0x10/0x20 [ 25.966031] [ 25.974302] Allocated by task 253: [ 25.974898] kasan_save_stack+0x3c/0x68 [ 25.975619] kasan_save_track+0x20/0x40 [ 25.976238] kasan_save_alloc_info+0x40/0x58 [ 25.976845] __kasan_kmalloc+0xd4/0xd8 [ 25.977432] __kmalloc_cache_noprof+0x154/0x320 [ 25.978009] kasan_atomics+0xb8/0x2e8 [ 25.978571] kunit_try_run_case+0x170/0x3f0 [ 25.979209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.979863] kthread+0x24c/0x2d0 [ 25.980442] ret_from_fork+0x10/0x20 [ 25.980993] [ 25.981370] The buggy address belongs to the object at fff00000c4205580 [ 25.981370] which belongs to the cache kmalloc-64 of size 64 [ 25.982560] The buggy address is located 0 bytes to the right of [ 25.982560] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.983504] [ 25.983645] The buggy address belongs to the physical page: [ 25.983902] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.985172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.985887] page_type: f5(slab) [ 25.986368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.987237] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.988032] page dumped because: kasan: bad access detected [ 25.988662] [ 25.989050] Memory state around the buggy address: [ 25.989601] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.990454] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.991246] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.992026] ^ [ 25.992642] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.993423] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.994201] ================================================================== [ 25.825284] ================================================================== [ 25.826030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa50/0x49c8 [ 25.826851] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.827632] [ 25.828056] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.828262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.828345] Hardware name: linux,dummy-virt (DT) [ 25.828439] Call trace: [ 25.828507] dump_backtrace+0x9c/0x128 [ 25.828634] show_stack+0x20/0x38 [ 25.828747] dump_stack_lvl+0x8c/0xd0 [ 25.828873] print_report+0x118/0x5f0 [ 25.829010] kasan_report+0xdc/0x128 [ 25.829130] kasan_check_range+0x100/0x1a8 [ 25.829251] __kasan_check_write+0x20/0x30 [ 25.829375] kasan_atomics_helper+0xa50/0x49c8 [ 25.829505] kasan_atomics+0x1a0/0x2e8 [ 25.829592] kunit_try_run_case+0x170/0x3f0 [ 25.829642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.829700] kthread+0x24c/0x2d0 [ 25.829751] ret_from_fork+0x10/0x20 [ 25.829803] [ 25.836479] Allocated by task 253: [ 25.836944] kasan_save_stack+0x3c/0x68 [ 25.837541] kasan_save_track+0x20/0x40 [ 25.838074] kasan_save_alloc_info+0x40/0x58 [ 25.838643] __kasan_kmalloc+0xd4/0xd8 [ 25.839175] __kmalloc_cache_noprof+0x154/0x320 [ 25.839766] kasan_atomics+0xb8/0x2e8 [ 25.840240] kunit_try_run_case+0x170/0x3f0 [ 25.840829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.841578] kthread+0x24c/0x2d0 [ 25.842080] ret_from_fork+0x10/0x20 [ 25.842554] [ 25.842886] The buggy address belongs to the object at fff00000c4205580 [ 25.842886] which belongs to the cache kmalloc-64 of size 64 [ 25.844023] The buggy address is located 0 bytes to the right of [ 25.844023] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.845153] [ 25.845434] The buggy address belongs to the physical page: [ 25.846127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.847001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.847699] page_type: f5(slab) [ 25.848271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.849028] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.849801] page dumped because: kasan: bad access detected [ 25.850396] [ 25.850707] Memory state around the buggy address: [ 25.851264] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.852391] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.853051] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.853881] ^ [ 25.854436] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.855190] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.855903] ================================================================== [ 27.033084] ================================================================== [ 27.034193] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16f0/0x49c8 [ 27.035082] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.036061] [ 27.036441] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.036674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.036797] Hardware name: linux,dummy-virt (DT) [ 27.036891] Call trace: [ 27.036984] dump_backtrace+0x9c/0x128 [ 27.037157] show_stack+0x20/0x38 [ 27.037277] dump_stack_lvl+0x8c/0xd0 [ 27.037445] print_report+0x118/0x5f0 [ 27.037550] kasan_report+0xdc/0x128 [ 27.037603] kasan_check_range+0x100/0x1a8 [ 27.037654] __kasan_check_write+0x20/0x30 [ 27.037749] kasan_atomics_helper+0x16f0/0x49c8 [ 27.037810] kasan_atomics+0x1a0/0x2e8 [ 27.037864] kunit_try_run_case+0x170/0x3f0 [ 27.037918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.038004] kthread+0x24c/0x2d0 [ 27.038060] ret_from_fork+0x10/0x20 [ 27.038112] [ 27.045349] Allocated by task 253: [ 27.045748] kasan_save_stack+0x3c/0x68 [ 27.046455] kasan_save_track+0x20/0x40 [ 27.047037] kasan_save_alloc_info+0x40/0x58 [ 27.047634] __kasan_kmalloc+0xd4/0xd8 [ 27.048296] __kmalloc_cache_noprof+0x154/0x320 [ 27.048913] kasan_atomics+0xb8/0x2e8 [ 27.049540] kunit_try_run_case+0x170/0x3f0 [ 27.050015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.050762] kthread+0x24c/0x2d0 [ 27.051251] ret_from_fork+0x10/0x20 [ 27.051866] [ 27.052236] The buggy address belongs to the object at fff00000c4205580 [ 27.052236] which belongs to the cache kmalloc-64 of size 64 [ 27.053467] The buggy address is located 0 bytes to the right of [ 27.053467] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.054747] [ 27.055107] The buggy address belongs to the physical page: [ 27.055813] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.056675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.057452] page_type: f5(slab) [ 27.058019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.058849] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.059626] page dumped because: kasan: bad access detected [ 27.060260] [ 27.060617] Memory state around the buggy address: [ 27.061261] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.062021] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.062838] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.063604] ^ [ 27.064205] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.065008] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.065777] ================================================================== [ 26.272801] ================================================================== [ 26.273466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40c0/0x49c8 [ 26.274470] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.275160] [ 26.275731] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.275845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.275882] Hardware name: linux,dummy-virt (DT) [ 26.275924] Call trace: [ 26.275955] dump_backtrace+0x9c/0x128 [ 26.276105] show_stack+0x20/0x38 [ 26.276222] dump_stack_lvl+0x8c/0xd0 [ 26.276345] print_report+0x118/0x5f0 [ 26.276468] kasan_report+0xdc/0x128 [ 26.276589] __asan_report_load8_noabort+0x20/0x30 [ 26.276723] kasan_atomics_helper+0x40c0/0x49c8 [ 26.276865] kasan_atomics+0x1a0/0x2e8 [ 26.277016] kunit_try_run_case+0x170/0x3f0 [ 26.277139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.277281] kthread+0x24c/0x2d0 [ 26.277390] ret_from_fork+0x10/0x20 [ 26.277501] [ 26.284659] Allocated by task 253: [ 26.285128] kasan_save_stack+0x3c/0x68 [ 26.285907] kasan_save_track+0x20/0x40 [ 26.286551] kasan_save_alloc_info+0x40/0x58 [ 26.287202] __kasan_kmalloc+0xd4/0xd8 [ 26.287664] __kmalloc_cache_noprof+0x154/0x320 [ 26.288202] kasan_atomics+0xb8/0x2e8 [ 26.288650] kunit_try_run_case+0x170/0x3f0 [ 26.289458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.290118] kthread+0x24c/0x2d0 [ 26.290627] ret_from_fork+0x10/0x20 [ 26.291182] [ 26.291538] The buggy address belongs to the object at fff00000c4205580 [ 26.291538] which belongs to the cache kmalloc-64 of size 64 [ 26.292933] The buggy address is located 0 bytes to the right of [ 26.292933] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.294121] [ 26.294447] The buggy address belongs to the physical page: [ 26.295060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.295998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.296759] page_type: f5(slab) [ 26.297339] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.298163] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.298972] page dumped because: kasan: bad access detected [ 26.299595] [ 26.299948] Memory state around the buggy address: [ 26.300515] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.301368] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.302155] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.302973] ^ [ 26.303573] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.304354] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.305130] ================================================================== [ 26.029948] ================================================================== [ 26.030922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc64/0x49c8 [ 26.031790] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.032613] [ 26.032998] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.033249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.033317] Hardware name: linux,dummy-virt (DT) [ 26.033359] Call trace: [ 26.033390] dump_backtrace+0x9c/0x128 [ 26.033470] show_stack+0x20/0x38 [ 26.033588] dump_stack_lvl+0x8c/0xd0 [ 26.033752] print_report+0x118/0x5f0 [ 26.033881] kasan_report+0xdc/0x128 [ 26.034045] kasan_check_range+0x100/0x1a8 [ 26.034172] __kasan_check_write+0x20/0x30 [ 26.034229] kasan_atomics_helper+0xc64/0x49c8 [ 26.034284] kasan_atomics+0x1a0/0x2e8 [ 26.034336] kunit_try_run_case+0x170/0x3f0 [ 26.034384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.034441] kthread+0x24c/0x2d0 [ 26.034492] ret_from_fork+0x10/0x20 [ 26.034549] [ 26.041740] Allocated by task 253: [ 26.042214] kasan_save_stack+0x3c/0x68 [ 26.042865] kasan_save_track+0x20/0x40 [ 26.043433] kasan_save_alloc_info+0x40/0x58 [ 26.044053] __kasan_kmalloc+0xd4/0xd8 [ 26.044625] __kmalloc_cache_noprof+0x154/0x320 [ 26.045287] kasan_atomics+0xb8/0x2e8 [ 26.045892] kunit_try_run_case+0x170/0x3f0 [ 26.046479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.047217] kthread+0x24c/0x2d0 [ 26.047785] ret_from_fork+0x10/0x20 [ 26.048373] [ 26.048722] The buggy address belongs to the object at fff00000c4205580 [ 26.048722] which belongs to the cache kmalloc-64 of size 64 [ 26.050010] The buggy address is located 0 bytes to the right of [ 26.050010] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.051298] [ 26.051678] The buggy address belongs to the physical page: [ 26.052289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.053206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.053987] page_type: f5(slab) [ 26.054466] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.055348] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.056157] page dumped because: kasan: bad access detected [ 26.056788] [ 26.057117] Memory state around the buggy address: [ 26.057663] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.058537] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.059364] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.060247] ^ [ 26.060793] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.061451] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.062333] ================================================================== [ 27.137560] ================================================================== [ 27.138323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f78/0x49c8 [ 27.139174] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.140000] [ 27.140333] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.140553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.140642] Hardware name: linux,dummy-virt (DT) [ 27.140738] Call trace: [ 27.140823] dump_backtrace+0x9c/0x128 [ 27.140951] show_stack+0x20/0x38 [ 27.141091] dump_stack_lvl+0x8c/0xd0 [ 27.141183] print_report+0x118/0x5f0 [ 27.141280] kasan_report+0xdc/0x128 [ 27.141395] __asan_report_load8_noabort+0x20/0x30 [ 27.141530] kasan_atomics_helper+0x3f78/0x49c8 [ 27.141666] kasan_atomics+0x1a0/0x2e8 [ 27.141793] kunit_try_run_case+0x170/0x3f0 [ 27.141893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.141955] kthread+0x24c/0x2d0 [ 27.142038] ret_from_fork+0x10/0x20 [ 27.142092] [ 27.149205] Allocated by task 253: [ 27.149616] kasan_save_stack+0x3c/0x68 [ 27.150213] kasan_save_track+0x20/0x40 [ 27.150721] kasan_save_alloc_info+0x40/0x58 [ 27.151222] __kasan_kmalloc+0xd4/0xd8 [ 27.151773] __kmalloc_cache_noprof+0x154/0x320 [ 27.152504] kasan_atomics+0xb8/0x2e8 [ 27.152979] kunit_try_run_case+0x170/0x3f0 [ 27.153563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.154286] kthread+0x24c/0x2d0 [ 27.154708] ret_from_fork+0x10/0x20 [ 27.155250] [ 27.155536] The buggy address belongs to the object at fff00000c4205580 [ 27.155536] which belongs to the cache kmalloc-64 of size 64 [ 27.156678] The buggy address is located 0 bytes to the right of [ 27.156678] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.157923] [ 27.158287] The buggy address belongs to the physical page: [ 27.158887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.159567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.160356] page_type: f5(slab) [ 27.160856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.161648] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.162448] page dumped because: kasan: bad access detected [ 27.163041] [ 27.163333] Memory state around the buggy address: [ 27.163858] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.164607] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.165275] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.165899] ^ [ 27.166543] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.167306] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.168049] ================================================================== [ 26.306276] ================================================================== [ 26.307001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb0/0x49c8 [ 26.307856] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.308694] [ 26.309104] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.309311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.309394] Hardware name: linux,dummy-virt (DT) [ 26.309485] Call trace: [ 26.309578] dump_backtrace+0x9c/0x128 [ 26.309731] show_stack+0x20/0x38 [ 26.309844] dump_stack_lvl+0x8c/0xd0 [ 26.309997] print_report+0x118/0x5f0 [ 26.310163] kasan_report+0xdc/0x128 [ 26.310314] kasan_check_range+0x100/0x1a8 [ 26.310435] __kasan_check_write+0x20/0x30 [ 26.310510] kasan_atomics_helper+0xeb0/0x49c8 [ 26.310565] kasan_atomics+0x1a0/0x2e8 [ 26.310616] kunit_try_run_case+0x170/0x3f0 [ 26.310665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.310722] kthread+0x24c/0x2d0 [ 26.310771] ret_from_fork+0x10/0x20 [ 26.310819] [ 26.318645] Allocated by task 253: [ 26.319021] kasan_save_stack+0x3c/0x68 [ 26.319398] kasan_save_track+0x20/0x40 [ 26.319765] kasan_save_alloc_info+0x40/0x58 [ 26.321031] __kasan_kmalloc+0xd4/0xd8 [ 26.321469] __kmalloc_cache_noprof+0x154/0x320 [ 26.322034] kasan_atomics+0xb8/0x2e8 [ 26.322564] kunit_try_run_case+0x170/0x3f0 [ 26.323175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.323848] kthread+0x24c/0x2d0 [ 26.324466] ret_from_fork+0x10/0x20 [ 26.325038] [ 26.325353] The buggy address belongs to the object at fff00000c4205580 [ 26.325353] which belongs to the cache kmalloc-64 of size 64 [ 26.326478] The buggy address is located 0 bytes to the right of [ 26.326478] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.327746] [ 26.328139] The buggy address belongs to the physical page: [ 26.328810] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.329689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.330501] page_type: f5(slab) [ 26.331026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.331868] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.332822] page dumped because: kasan: bad access detected [ 26.333385] [ 26.333660] Memory state around the buggy address: [ 26.334551] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.335456] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.336322] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.337194] ^ [ 26.337906] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.338796] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.339644] ================================================================== [ 27.233430] ================================================================== [ 27.234137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18a4/0x49c8 [ 27.235383] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.236276] [ 27.236672] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.236948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.237050] Hardware name: linux,dummy-virt (DT) [ 27.237142] Call trace: [ 27.237211] dump_backtrace+0x9c/0x128 [ 27.237334] show_stack+0x20/0x38 [ 27.237423] dump_stack_lvl+0x8c/0xd0 [ 27.237475] print_report+0x118/0x5f0 [ 27.237526] kasan_report+0xdc/0x128 [ 27.237574] kasan_check_range+0x100/0x1a8 [ 27.237624] __kasan_check_write+0x20/0x30 [ 27.237673] kasan_atomics_helper+0x18a4/0x49c8 [ 27.237730] kasan_atomics+0x1a0/0x2e8 [ 27.237781] kunit_try_run_case+0x170/0x3f0 [ 27.237832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.237888] kthread+0x24c/0x2d0 [ 27.237939] ret_from_fork+0x10/0x20 [ 27.238027] [ 27.245351] Allocated by task 253: [ 27.245946] kasan_save_stack+0x3c/0x68 [ 27.246526] kasan_save_track+0x20/0x40 [ 27.247218] kasan_save_alloc_info+0x40/0x58 [ 27.247859] __kasan_kmalloc+0xd4/0xd8 [ 27.248537] __kmalloc_cache_noprof+0x154/0x320 [ 27.249266] kasan_atomics+0xb8/0x2e8 [ 27.249795] kunit_try_run_case+0x170/0x3f0 [ 27.250444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.251036] kthread+0x24c/0x2d0 [ 27.251603] ret_from_fork+0x10/0x20 [ 27.252162] [ 27.252440] The buggy address belongs to the object at fff00000c4205580 [ 27.252440] which belongs to the cache kmalloc-64 of size 64 [ 27.253528] The buggy address is located 0 bytes to the right of [ 27.253528] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.254542] [ 27.254818] The buggy address belongs to the physical page: [ 27.255584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.256579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.257386] page_type: f5(slab) [ 27.258017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.258864] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.259757] page dumped because: kasan: bad access detected [ 27.260318] [ 27.260664] Memory state around the buggy address: [ 27.261314] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.262135] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.262974] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.263709] ^ [ 27.264310] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.265040] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.265842] ================================================================== [ 25.687271] ================================================================== [ 25.688649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x49c8 [ 25.690871] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.692090] [ 25.692374] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.692571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.692647] Hardware name: linux,dummy-virt (DT) [ 25.692734] Call trace: [ 25.692805] dump_backtrace+0x9c/0x128 [ 25.692920] show_stack+0x20/0x38 [ 25.693347] dump_stack_lvl+0x8c/0xd0 [ 25.693529] print_report+0x118/0x5f0 [ 25.693652] kasan_report+0xdc/0x128 [ 25.693754] kasan_check_range+0x100/0x1a8 [ 25.693864] __kasan_check_write+0x20/0x30 [ 25.693998] kasan_atomics_helper+0x8d8/0x49c8 [ 25.694124] kasan_atomics+0x1a0/0x2e8 [ 25.694237] kunit_try_run_case+0x170/0x3f0 [ 25.694349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.694476] kthread+0x24c/0x2d0 [ 25.694580] ret_from_fork+0x10/0x20 [ 25.694681] [ 25.703886] Allocated by task 253: [ 25.704400] kasan_save_stack+0x3c/0x68 [ 25.704922] kasan_save_track+0x20/0x40 [ 25.705519] kasan_save_alloc_info+0x40/0x58 [ 25.706145] __kasan_kmalloc+0xd4/0xd8 [ 25.706701] __kmalloc_cache_noprof+0x154/0x320 [ 25.707239] kasan_atomics+0xb8/0x2e8 [ 25.707811] kunit_try_run_case+0x170/0x3f0 [ 25.708420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.709142] kthread+0x24c/0x2d0 [ 25.709618] ret_from_fork+0x10/0x20 [ 25.710111] [ 25.710432] The buggy address belongs to the object at fff00000c4205580 [ 25.710432] which belongs to the cache kmalloc-64 of size 64 [ 25.711540] The buggy address is located 0 bytes to the right of [ 25.711540] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.712729] [ 25.713097] The buggy address belongs to the physical page: [ 25.713755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.714528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.715223] page_type: f5(slab) [ 25.715666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.716522] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.717318] page dumped because: kasan: bad access detected [ 25.718003] [ 25.718326] Memory state around the buggy address: [ 25.718896] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.719643] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.720398] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.721200] ^ [ 25.721866] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.722549] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.723276] ================================================================== [ 25.792823] ================================================================== [ 25.793704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9e4/0x49c8 [ 25.794579] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.795625] [ 25.796246] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.796422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.796537] Hardware name: linux,dummy-virt (DT) [ 25.796632] Call trace: [ 25.796705] dump_backtrace+0x9c/0x128 [ 25.796796] show_stack+0x20/0x38 [ 25.796846] dump_stack_lvl+0x8c/0xd0 [ 25.796896] print_report+0x118/0x5f0 [ 25.796943] kasan_report+0xdc/0x128 [ 25.797026] kasan_check_range+0x100/0x1a8 [ 25.797077] __kasan_check_write+0x20/0x30 [ 25.797128] kasan_atomics_helper+0x9e4/0x49c8 [ 25.797183] kasan_atomics+0x1a0/0x2e8 [ 25.797233] kunit_try_run_case+0x170/0x3f0 [ 25.797283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.797339] kthread+0x24c/0x2d0 [ 25.797394] ret_from_fork+0x10/0x20 [ 25.797444] [ 25.804629] Allocated by task 253: [ 25.805229] kasan_save_stack+0x3c/0x68 [ 25.805714] kasan_save_track+0x20/0x40 [ 25.806293] kasan_save_alloc_info+0x40/0x58 [ 25.806832] __kasan_kmalloc+0xd4/0xd8 [ 25.807299] __kmalloc_cache_noprof+0x154/0x320 [ 25.807916] kasan_atomics+0xb8/0x2e8 [ 25.808430] kunit_try_run_case+0x170/0x3f0 [ 25.808918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.809616] kthread+0x24c/0x2d0 [ 25.810034] ret_from_fork+0x10/0x20 [ 25.810506] [ 25.810830] The buggy address belongs to the object at fff00000c4205580 [ 25.810830] which belongs to the cache kmalloc-64 of size 64 [ 25.812065] The buggy address is located 0 bytes to the right of [ 25.812065] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.813244] [ 25.813557] The buggy address belongs to the physical page: [ 25.814087] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.814850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.815652] page_type: f5(slab) [ 25.816165] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.817098] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.817861] page dumped because: kasan: bad access detected [ 25.818474] [ 25.818772] Memory state around the buggy address: [ 25.819327] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.820058] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.820867] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.821481] ^ [ 25.822123] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.823084] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.823887] ================================================================== [ 25.292205] ================================================================== [ 25.293340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c8/0x49c8 [ 25.294167] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.295623] [ 25.296132] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.296341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.296424] Hardware name: linux,dummy-virt (DT) [ 25.296513] Call trace: [ 25.296677] dump_backtrace+0x9c/0x128 [ 25.296864] show_stack+0x20/0x38 [ 25.296918] dump_stack_lvl+0x8c/0xd0 [ 25.296999] print_report+0x118/0x5f0 [ 25.297054] kasan_report+0xdc/0x128 [ 25.297099] kasan_check_range+0x100/0x1a8 [ 25.297149] __kasan_check_write+0x20/0x30 [ 25.297196] kasan_atomics_helper+0x3c8/0x49c8 [ 25.297250] kasan_atomics+0x1a0/0x2e8 [ 25.297298] kunit_try_run_case+0x170/0x3f0 [ 25.297346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.297402] kthread+0x24c/0x2d0 [ 25.297449] ret_from_fork+0x10/0x20 [ 25.297500] [ 25.305600] Allocated by task 253: [ 25.306051] kasan_save_stack+0x3c/0x68 [ 25.306644] kasan_save_track+0x20/0x40 [ 25.308271] kasan_save_alloc_info+0x40/0x58 [ 25.309057] __kasan_kmalloc+0xd4/0xd8 [ 25.309620] __kmalloc_cache_noprof+0x154/0x320 [ 25.310232] kasan_atomics+0xb8/0x2e8 [ 25.310729] kunit_try_run_case+0x170/0x3f0 [ 25.311302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.311941] kthread+0x24c/0x2d0 [ 25.312382] ret_from_fork+0x10/0x20 [ 25.312935] [ 25.313546] The buggy address belongs to the object at fff00000c4205580 [ 25.313546] which belongs to the cache kmalloc-64 of size 64 [ 25.314702] The buggy address is located 0 bytes to the right of [ 25.314702] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.316453] [ 25.316816] The buggy address belongs to the physical page: [ 25.317454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.318178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.318890] page_type: f5(slab) [ 25.319650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.320705] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.321648] page dumped because: kasan: bad access detected [ 25.322290] [ 25.322640] Memory state around the buggy address: [ 25.323237] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.324318] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.324646] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.325154] ^ [ 25.325661] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.326425] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.327159] ================================================================== [ 25.890441] ================================================================== [ 25.891258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb28/0x49c8 [ 25.892126] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.892889] [ 25.893277] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.893489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.893576] Hardware name: linux,dummy-virt (DT) [ 25.893673] Call trace: [ 25.893743] dump_backtrace+0x9c/0x128 [ 25.893868] show_stack+0x20/0x38 [ 25.893998] dump_stack_lvl+0x8c/0xd0 [ 25.894119] print_report+0x118/0x5f0 [ 25.894243] kasan_report+0xdc/0x128 [ 25.894356] kasan_check_range+0x100/0x1a8 [ 25.894475] __kasan_check_write+0x20/0x30 [ 25.894597] kasan_atomics_helper+0xb28/0x49c8 [ 25.894728] kasan_atomics+0x1a0/0x2e8 [ 25.894816] kunit_try_run_case+0x170/0x3f0 [ 25.894866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.894923] kthread+0x24c/0x2d0 [ 25.895009] ret_from_fork+0x10/0x20 [ 25.895067] [ 25.901824] Allocated by task 253: [ 25.902228] kasan_save_stack+0x3c/0x68 [ 25.902781] kasan_save_track+0x20/0x40 [ 25.903369] kasan_save_alloc_info+0x40/0x58 [ 25.904019] __kasan_kmalloc+0xd4/0xd8 [ 25.904504] __kmalloc_cache_noprof+0x154/0x320 [ 25.905058] kasan_atomics+0xb8/0x2e8 [ 25.905665] kunit_try_run_case+0x170/0x3f0 [ 25.906251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.906871] kthread+0x24c/0x2d0 [ 25.907376] ret_from_fork+0x10/0x20 [ 25.907886] [ 25.908213] The buggy address belongs to the object at fff00000c4205580 [ 25.908213] which belongs to the cache kmalloc-64 of size 64 [ 25.909412] The buggy address is located 0 bytes to the right of [ 25.909412] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.910574] [ 25.910848] The buggy address belongs to the physical page: [ 25.911484] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.912398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.913130] page_type: f5(slab) [ 25.913603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.914374] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.915179] page dumped because: kasan: bad access detected [ 25.915816] [ 25.916145] Memory state around the buggy address: [ 25.916627] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.917514] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.918229] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.919036] ^ [ 25.919568] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.920361] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.921109] ================================================================== [ 26.514701] ================================================================== [ 26.516182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10d8/0x49c8 [ 26.516932] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.517695] [ 26.518262] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.518525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.518637] Hardware name: linux,dummy-virt (DT) [ 26.518729] Call trace: [ 26.518802] dump_backtrace+0x9c/0x128 [ 26.518941] show_stack+0x20/0x38 [ 26.519089] dump_stack_lvl+0x8c/0xd0 [ 26.519197] print_report+0x118/0x5f0 [ 26.519253] kasan_report+0xdc/0x128 [ 26.519300] kasan_check_range+0x100/0x1a8 [ 26.519350] __kasan_check_write+0x20/0x30 [ 26.519401] kasan_atomics_helper+0x10d8/0x49c8 [ 26.519455] kasan_atomics+0x1a0/0x2e8 [ 26.519505] kunit_try_run_case+0x170/0x3f0 [ 26.519554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.519609] kthread+0x24c/0x2d0 [ 26.519660] ret_from_fork+0x10/0x20 [ 26.519711] [ 26.526884] Allocated by task 253: [ 26.527519] kasan_save_stack+0x3c/0x68 [ 26.528097] kasan_save_track+0x20/0x40 [ 26.528644] kasan_save_alloc_info+0x40/0x58 [ 26.529320] __kasan_kmalloc+0xd4/0xd8 [ 26.529765] __kmalloc_cache_noprof+0x154/0x320 [ 26.530565] kasan_atomics+0xb8/0x2e8 [ 26.531044] kunit_try_run_case+0x170/0x3f0 [ 26.531728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.532462] kthread+0x24c/0x2d0 [ 26.533037] ret_from_fork+0x10/0x20 [ 26.533589] [ 26.534017] The buggy address belongs to the object at fff00000c4205580 [ 26.534017] which belongs to the cache kmalloc-64 of size 64 [ 26.535158] The buggy address is located 0 bytes to the right of [ 26.535158] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.536438] [ 26.536799] The buggy address belongs to the physical page: [ 26.537479] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.538390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.539041] page_type: f5(slab) [ 26.539440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.540561] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.541533] page dumped because: kasan: bad access detected [ 26.542149] [ 26.542690] Memory state around the buggy address: [ 26.543589] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.544452] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.545287] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.546142] ^ [ 26.546848] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.547593] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.548491] ================================================================== [ 26.619144] ================================================================== [ 26.619714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x121c/0x49c8 [ 26.620854] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.622425] [ 26.623059] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.623281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.623366] Hardware name: linux,dummy-virt (DT) [ 26.623447] Call trace: [ 26.623516] dump_backtrace+0x9c/0x128 [ 26.623630] show_stack+0x20/0x38 [ 26.623734] dump_stack_lvl+0x8c/0xd0 [ 26.623856] print_report+0x118/0x5f0 [ 26.624066] kasan_report+0xdc/0x128 [ 26.624172] kasan_check_range+0x100/0x1a8 [ 26.624227] __kasan_check_write+0x20/0x30 [ 26.624278] kasan_atomics_helper+0x121c/0x49c8 [ 26.624335] kasan_atomics+0x1a0/0x2e8 [ 26.624386] kunit_try_run_case+0x170/0x3f0 [ 26.624435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.624491] kthread+0x24c/0x2d0 [ 26.624541] ret_from_fork+0x10/0x20 [ 26.624591] [ 26.632326] Allocated by task 253: [ 26.632947] kasan_save_stack+0x3c/0x68 [ 26.633614] kasan_save_track+0x20/0x40 [ 26.634079] kasan_save_alloc_info+0x40/0x58 [ 26.634828] __kasan_kmalloc+0xd4/0xd8 [ 26.635504] __kmalloc_cache_noprof+0x154/0x320 [ 26.636217] kasan_atomics+0xb8/0x2e8 [ 26.636812] kunit_try_run_case+0x170/0x3f0 [ 26.637496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.638090] kthread+0x24c/0x2d0 [ 26.638499] ret_from_fork+0x10/0x20 [ 26.638938] [ 26.639679] The buggy address belongs to the object at fff00000c4205580 [ 26.639679] which belongs to the cache kmalloc-64 of size 64 [ 26.640755] The buggy address is located 0 bytes to the right of [ 26.640755] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.642064] [ 26.642383] The buggy address belongs to the physical page: [ 26.643032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.643810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.644576] page_type: f5(slab) [ 26.645158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.645988] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.646755] page dumped because: kasan: bad access detected [ 26.647354] [ 26.647691] Memory state around the buggy address: [ 26.648250] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.649011] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.649835] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.650500] ^ [ 26.650988] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.651541] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.652098] ================================================================== [ 26.099305] ================================================================== [ 26.100042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd00/0x49c8 [ 26.100740] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.101469] [ 26.102032] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.102275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.102359] Hardware name: linux,dummy-virt (DT) [ 26.102452] Call trace: [ 26.102580] dump_backtrace+0x9c/0x128 [ 26.102736] show_stack+0x20/0x38 [ 26.102805] dump_stack_lvl+0x8c/0xd0 [ 26.102855] print_report+0x118/0x5f0 [ 26.102900] kasan_report+0xdc/0x128 [ 26.102946] kasan_check_range+0x100/0x1a8 [ 26.103030] __kasan_check_write+0x20/0x30 [ 26.103085] kasan_atomics_helper+0xd00/0x49c8 [ 26.103139] kasan_atomics+0x1a0/0x2e8 [ 26.103187] kunit_try_run_case+0x170/0x3f0 [ 26.103234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.103290] kthread+0x24c/0x2d0 [ 26.103338] ret_from_fork+0x10/0x20 [ 26.103388] [ 26.111312] Allocated by task 253: [ 26.111850] kasan_save_stack+0x3c/0x68 [ 26.112514] kasan_save_track+0x20/0x40 [ 26.113159] kasan_save_alloc_info+0x40/0x58 [ 26.113921] __kasan_kmalloc+0xd4/0xd8 [ 26.114579] __kmalloc_cache_noprof+0x154/0x320 [ 26.115396] kasan_atomics+0xb8/0x2e8 [ 26.115945] kunit_try_run_case+0x170/0x3f0 [ 26.116418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.117057] kthread+0x24c/0x2d0 [ 26.117627] ret_from_fork+0x10/0x20 [ 26.118139] [ 26.118660] The buggy address belongs to the object at fff00000c4205580 [ 26.118660] which belongs to the cache kmalloc-64 of size 64 [ 26.119909] The buggy address is located 0 bytes to the right of [ 26.119909] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.121367] [ 26.121736] The buggy address belongs to the physical page: [ 26.122480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.123436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.124271] page_type: f5(slab) [ 26.124793] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.125682] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.126522] page dumped because: kasan: bad access detected [ 26.127225] [ 26.127570] Memory state around the buggy address: [ 26.128313] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.129135] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.130005] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.130792] ^ [ 26.131444] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.132278] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.133109] ================================================================== [ 26.889659] ================================================================== [ 26.890422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1584/0x49c8 [ 26.891182] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.892124] [ 26.892512] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.892719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.892851] Hardware name: linux,dummy-virt (DT) [ 26.892943] Call trace: [ 26.893069] dump_backtrace+0x9c/0x128 [ 26.893197] show_stack+0x20/0x38 [ 26.893317] dump_stack_lvl+0x8c/0xd0 [ 26.893419] print_report+0x118/0x5f0 [ 26.893473] kasan_report+0xdc/0x128 [ 26.893523] kasan_check_range+0x100/0x1a8 [ 26.893577] __kasan_check_write+0x20/0x30 [ 26.893628] kasan_atomics_helper+0x1584/0x49c8 [ 26.893683] kasan_atomics+0x1a0/0x2e8 [ 26.893735] kunit_try_run_case+0x170/0x3f0 [ 26.893784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.893841] kthread+0x24c/0x2d0 [ 26.893892] ret_from_fork+0x10/0x20 [ 26.893940] [ 26.901219] Allocated by task 253: [ 26.901675] kasan_save_stack+0x3c/0x68 [ 26.902435] kasan_save_track+0x20/0x40 [ 26.903112] kasan_save_alloc_info+0x40/0x58 [ 26.903756] __kasan_kmalloc+0xd4/0xd8 [ 26.904404] __kmalloc_cache_noprof+0x154/0x320 [ 26.905017] kasan_atomics+0xb8/0x2e8 [ 26.905619] kunit_try_run_case+0x170/0x3f0 [ 26.906227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.906980] kthread+0x24c/0x2d0 [ 26.907482] ret_from_fork+0x10/0x20 [ 26.908011] [ 26.908345] The buggy address belongs to the object at fff00000c4205580 [ 26.908345] which belongs to the cache kmalloc-64 of size 64 [ 26.909604] The buggy address is located 0 bytes to the right of [ 26.909604] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.910780] [ 26.911117] The buggy address belongs to the physical page: [ 26.911702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.912539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.913378] page_type: f5(slab) [ 26.913982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.914811] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.915659] page dumped because: kasan: bad access detected [ 26.916244] [ 26.916602] Memory state around the buggy address: [ 26.917220] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.918008] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.918729] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.919635] ^ [ 26.920335] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.921237] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.922030] ================================================================== [ 27.170141] ================================================================== [ 27.170681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1810/0x49c8 [ 27.171614] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.172374] [ 27.172703] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.172885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.172978] Hardware name: linux,dummy-virt (DT) [ 27.173058] Call trace: [ 27.173111] dump_backtrace+0x9c/0x128 [ 27.173214] show_stack+0x20/0x38 [ 27.173306] dump_stack_lvl+0x8c/0xd0 [ 27.173406] print_report+0x118/0x5f0 [ 27.173516] kasan_report+0xdc/0x128 [ 27.173638] kasan_check_range+0x100/0x1a8 [ 27.173754] __kasan_check_write+0x20/0x30 [ 27.173877] kasan_atomics_helper+0x1810/0x49c8 [ 27.174025] kasan_atomics+0x1a0/0x2e8 [ 27.174152] kunit_try_run_case+0x170/0x3f0 [ 27.174282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.174423] kthread+0x24c/0x2d0 [ 27.174548] ret_from_fork+0x10/0x20 [ 27.174670] [ 27.181251] Allocated by task 253: [ 27.181775] kasan_save_stack+0x3c/0x68 [ 27.182332] kasan_save_track+0x20/0x40 [ 27.182873] kasan_save_alloc_info+0x40/0x58 [ 27.183523] __kasan_kmalloc+0xd4/0xd8 [ 27.184037] __kmalloc_cache_noprof+0x154/0x320 [ 27.184543] kasan_atomics+0xb8/0x2e8 [ 27.185113] kunit_try_run_case+0x170/0x3f0 [ 27.185656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.186352] kthread+0x24c/0x2d0 [ 27.186760] ret_from_fork+0x10/0x20 [ 27.187320] [ 27.187656] The buggy address belongs to the object at fff00000c4205580 [ 27.187656] which belongs to the cache kmalloc-64 of size 64 [ 27.188745] The buggy address is located 0 bytes to the right of [ 27.188745] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.190002] [ 27.190336] The buggy address belongs to the physical page: [ 27.191084] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.191894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.192707] page_type: f5(slab) [ 27.193241] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.193916] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.194748] page dumped because: kasan: bad access detected [ 27.195419] [ 27.195752] Memory state around the buggy address: [ 27.196276] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.197163] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.197930] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.198631] ^ [ 27.199400] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.199916] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.200802] ==================================================================
[ 22.107158] ================================================================== [ 22.107900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 22.108711] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.109336] [ 22.109618] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.109736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.109776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.109908] Call Trace: [ 22.109964] <TASK> [ 22.110026] dump_stack_lvl+0x73/0xb0 [ 22.110107] print_report+0xd1/0x640 [ 22.110188] ? __virt_addr_valid+0x1db/0x2d0 [ 22.110285] ? kasan_atomics_helper+0x4b56/0x5450 [ 22.110361] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.110462] ? kasan_atomics_helper+0x4b56/0x5450 [ 22.110608] kasan_report+0x140/0x180 [ 22.110693] ? kasan_atomics_helper+0x4b56/0x5450 [ 22.110788] __asan_report_load4_noabort+0x18/0x20 [ 22.111009] kasan_atomics_helper+0x4b56/0x5450 [ 22.111050] ? kasan_save_alloc_info+0x3b/0x50 [ 22.111083] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.111118] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.111149] ? trace_hardirqs_on+0x37/0xe0 [ 22.111187] kasan_atomics+0x1dd/0x310 [ 22.111214] ? __pfx_kasan_atomics+0x10/0x10 [ 22.111292] ? __pfx_read_tsc+0x10/0x10 [ 22.111321] ? ktime_get_ts64+0x84/0x230 [ 22.111358] kunit_try_run_case+0x1a6/0x480 [ 22.111390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.111418] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.111447] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.111482] ? __kthread_parkme+0x82/0x160 [ 22.111509] ? preempt_count_sub+0x50/0x80 [ 22.111540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.111567] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.111604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.111640] kthread+0x257/0x310 [ 22.111664] ? __pfx_kthread+0x10/0x10 [ 22.111690] ret_from_fork+0x41/0x80 [ 22.111717] ? __pfx_kthread+0x10/0x10 [ 22.111742] ret_from_fork_asm+0x1a/0x30 [ 22.111782] </TASK> [ 22.111795] [ 22.129119] Allocated by task 270: [ 22.129566] kasan_save_stack+0x45/0x70 [ 22.129940] kasan_save_track+0x18/0x40 [ 22.130447] kasan_save_alloc_info+0x3b/0x50 [ 22.130955] __kasan_kmalloc+0xb7/0xc0 [ 22.131298] __kmalloc_cache_noprof+0x168/0x350 [ 22.131747] kasan_atomics+0x96/0x310 [ 22.132254] kunit_try_run_case+0x1a6/0x480 [ 22.132670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.133097] kthread+0x257/0x310 [ 22.133581] ret_from_fork+0x41/0x80 [ 22.134094] ret_from_fork_asm+0x1a/0x30 [ 22.134436] [ 22.134649] The buggy address belongs to the object at ffff888102314e80 [ 22.134649] which belongs to the cache kmalloc-64 of size 64 [ 22.135691] The buggy address is located 0 bytes to the right of [ 22.135691] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.136679] [ 22.136870] The buggy address belongs to the physical page: [ 22.137243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.137934] flags: 0x200000000000000(node=0|zone=2) [ 22.138494] page_type: f5(slab) [ 22.138866] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.139318] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.142407] page dumped because: kasan: bad access detected [ 22.142755] [ 22.143732] Memory state around the buggy address: [ 22.144558] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.145101] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.145478] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.145822] ^ [ 22.146130] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.148847] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.149493] ================================================================== [ 22.404680] ================================================================== [ 22.406051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 22.408267] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.408760] [ 22.408980] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.409095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.409129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.409182] Call Trace: [ 22.409246] <TASK> [ 22.409298] dump_stack_lvl+0x73/0xb0 [ 22.409390] print_report+0xd1/0x640 [ 22.409473] ? __virt_addr_valid+0x1db/0x2d0 [ 22.409549] ? kasan_atomics_helper+0x7c8/0x5450 [ 22.409620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.409693] ? kasan_atomics_helper+0x7c8/0x5450 [ 22.409774] kasan_report+0x140/0x180 [ 22.409862] ? kasan_atomics_helper+0x7c8/0x5450 [ 22.409953] kasan_check_range+0x10c/0x1c0 [ 22.410039] __kasan_check_write+0x18/0x20 [ 22.410117] kasan_atomics_helper+0x7c8/0x5450 [ 22.410198] ? kasan_save_alloc_info+0x3b/0x50 [ 22.410439] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.410533] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.410587] ? trace_hardirqs_on+0x37/0xe0 [ 22.410655] kasan_atomics+0x1dd/0x310 [ 22.410706] ? __pfx_kasan_atomics+0x10/0x10 [ 22.410761] ? __pfx_read_tsc+0x10/0x10 [ 22.410808] ? ktime_get_ts64+0x84/0x230 [ 22.410886] kunit_try_run_case+0x1a6/0x480 [ 22.410944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.410993] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.411047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.411107] ? __kthread_parkme+0x82/0x160 [ 22.411156] ? preempt_count_sub+0x50/0x80 [ 22.411214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.411296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.411360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.411422] kthread+0x257/0x310 [ 22.411468] ? __pfx_kthread+0x10/0x10 [ 22.411518] ret_from_fork+0x41/0x80 [ 22.411583] ? __pfx_kthread+0x10/0x10 [ 22.411647] ret_from_fork_asm+0x1a/0x30 [ 22.411739] </TASK> [ 22.411772] [ 22.434008] Allocated by task 270: [ 22.434253] kasan_save_stack+0x45/0x70 [ 22.434446] kasan_save_track+0x18/0x40 [ 22.434607] kasan_save_alloc_info+0x3b/0x50 [ 22.434775] __kasan_kmalloc+0xb7/0xc0 [ 22.435172] __kmalloc_cache_noprof+0x168/0x350 [ 22.436065] kasan_atomics+0x96/0x310 [ 22.436406] kunit_try_run_case+0x1a6/0x480 [ 22.436779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.437435] kthread+0x257/0x310 [ 22.437809] ret_from_fork+0x41/0x80 [ 22.438151] ret_from_fork_asm+0x1a/0x30 [ 22.438536] [ 22.438890] The buggy address belongs to the object at ffff888102314e80 [ 22.438890] which belongs to the cache kmalloc-64 of size 64 [ 22.439907] The buggy address is located 0 bytes to the right of [ 22.439907] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.441106] [ 22.441356] The buggy address belongs to the physical page: [ 22.441862] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.442778] flags: 0x200000000000000(node=0|zone=2) [ 22.443496] page_type: f5(slab) [ 22.443844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.444432] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.445071] page dumped because: kasan: bad access detected [ 22.445659] [ 22.445998] Memory state around the buggy address: [ 22.446437] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.447113] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.447902] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.448520] ^ [ 22.449023] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.449679] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.450496] ================================================================== [ 22.579273] ================================================================== [ 22.580085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 22.580594] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.581173] [ 22.581472] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.581593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.581635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.581699] Call Trace: [ 22.581754] <TASK> [ 22.581810] dump_stack_lvl+0x73/0xb0 [ 22.581937] print_report+0xd1/0x640 [ 22.582019] ? __virt_addr_valid+0x1db/0x2d0 [ 22.582099] ? kasan_atomics_helper+0xa2c/0x5450 [ 22.582177] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.582273] ? kasan_atomics_helper+0xa2c/0x5450 [ 22.582352] kasan_report+0x140/0x180 [ 22.582414] ? kasan_atomics_helper+0xa2c/0x5450 [ 22.582501] kasan_check_range+0x10c/0x1c0 [ 22.582577] __kasan_check_write+0x18/0x20 [ 22.582704] kasan_atomics_helper+0xa2c/0x5450 [ 22.582786] ? kasan_save_alloc_info+0x3b/0x50 [ 22.582906] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.582992] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.583073] ? trace_hardirqs_on+0x37/0xe0 [ 22.583168] kasan_atomics+0x1dd/0x310 [ 22.583279] ? __pfx_kasan_atomics+0x10/0x10 [ 22.583362] ? __pfx_read_tsc+0x10/0x10 [ 22.583430] ? ktime_get_ts64+0x84/0x230 [ 22.583517] kunit_try_run_case+0x1a6/0x480 [ 22.583606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.583689] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.583769] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.583873] ? __kthread_parkme+0x82/0x160 [ 22.583953] ? preempt_count_sub+0x50/0x80 [ 22.584041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.584115] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.584201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.584346] kthread+0x257/0x310 [ 22.584420] ? __pfx_kthread+0x10/0x10 [ 22.584492] ret_from_fork+0x41/0x80 [ 22.584563] ? __pfx_kthread+0x10/0x10 [ 22.584633] ret_from_fork_asm+0x1a/0x30 [ 22.584699] </TASK> [ 22.584717] [ 22.598097] Allocated by task 270: [ 22.598449] kasan_save_stack+0x45/0x70 [ 22.598785] kasan_save_track+0x18/0x40 [ 22.599245] kasan_save_alloc_info+0x3b/0x50 [ 22.599732] __kasan_kmalloc+0xb7/0xc0 [ 22.600151] __kmalloc_cache_noprof+0x168/0x350 [ 22.600632] kasan_atomics+0x96/0x310 [ 22.601190] kunit_try_run_case+0x1a6/0x480 [ 22.601640] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.602189] kthread+0x257/0x310 [ 22.602546] ret_from_fork+0x41/0x80 [ 22.602979] ret_from_fork_asm+0x1a/0x30 [ 22.603405] [ 22.603613] The buggy address belongs to the object at ffff888102314e80 [ 22.603613] which belongs to the cache kmalloc-64 of size 64 [ 22.604400] The buggy address is located 0 bytes to the right of [ 22.604400] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.605102] [ 22.605318] The buggy address belongs to the physical page: [ 22.605846] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.606833] flags: 0x200000000000000(node=0|zone=2) [ 22.607388] page_type: f5(slab) [ 22.607787] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.608392] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.609065] page dumped because: kasan: bad access detected [ 22.609533] [ 22.609723] Memory state around the buggy address: [ 22.610063] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.610523] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.611625] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.612208] ^ [ 22.612696] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.613367] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.613917] ================================================================== [ 21.938646] ================================================================== [ 21.939366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 21.940499] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 21.941499] [ 21.941682] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.941744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.941761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.941791] Call Trace: [ 21.941809] <TASK> [ 21.941853] dump_stack_lvl+0x73/0xb0 [ 21.941913] print_report+0xd1/0x640 [ 21.941950] ? __virt_addr_valid+0x1db/0x2d0 [ 21.941986] ? kasan_atomics_helper+0x4ba4/0x5450 [ 21.942019] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.942052] ? kasan_atomics_helper+0x4ba4/0x5450 [ 21.942085] kasan_report+0x140/0x180 [ 21.942121] ? kasan_atomics_helper+0x4ba4/0x5450 [ 21.942163] __asan_report_store4_noabort+0x1b/0x30 [ 21.942195] kasan_atomics_helper+0x4ba4/0x5450 [ 21.942265] ? kasan_save_alloc_info+0x3b/0x50 [ 21.942358] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.942450] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.942535] ? trace_hardirqs_on+0x37/0xe0 [ 21.942589] kasan_atomics+0x1dd/0x310 [ 21.942620] ? __pfx_kasan_atomics+0x10/0x10 [ 21.942653] ? __pfx_read_tsc+0x10/0x10 [ 21.942681] ? ktime_get_ts64+0x84/0x230 [ 21.942758] kunit_try_run_case+0x1a6/0x480 [ 21.942797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.942846] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.942889] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.942926] ? __kthread_parkme+0x82/0x160 [ 21.942954] ? preempt_count_sub+0x50/0x80 [ 21.942984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.943012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.943049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.943086] kthread+0x257/0x310 [ 21.943111] ? __pfx_kthread+0x10/0x10 [ 21.943139] ret_from_fork+0x41/0x80 [ 21.943167] ? __pfx_kthread+0x10/0x10 [ 21.943192] ret_from_fork_asm+0x1a/0x30 [ 21.943261] </TASK> [ 21.943283] [ 21.959493] Allocated by task 270: [ 21.959895] kasan_save_stack+0x45/0x70 [ 21.960354] kasan_save_track+0x18/0x40 [ 21.961029] kasan_save_alloc_info+0x3b/0x50 [ 21.961481] __kasan_kmalloc+0xb7/0xc0 [ 21.961922] __kmalloc_cache_noprof+0x168/0x350 [ 21.962334] kasan_atomics+0x96/0x310 [ 21.962626] kunit_try_run_case+0x1a6/0x480 [ 21.963069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.963779] kthread+0x257/0x310 [ 21.964400] ret_from_fork+0x41/0x80 [ 21.965077] ret_from_fork_asm+0x1a/0x30 [ 21.965522] [ 21.965904] The buggy address belongs to the object at ffff888102314e80 [ 21.965904] which belongs to the cache kmalloc-64 of size 64 [ 21.967081] The buggy address is located 0 bytes to the right of [ 21.967081] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 21.968200] [ 21.968539] The buggy address belongs to the physical page: [ 21.969192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 21.969952] flags: 0x200000000000000(node=0|zone=2) [ 21.970334] page_type: f5(slab) [ 21.970620] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.971374] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 21.972104] page dumped because: kasan: bad access detected [ 21.972644] [ 21.972915] Memory state around the buggy address: [ 21.973423] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.974192] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.974937] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.975498] ^ [ 21.976241] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.976932] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.977537] ================================================================== [ 21.981106] ================================================================== [ 21.981784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 21.982592] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 21.983269] [ 21.983596] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.983766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.983804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.983947] Call Trace: [ 21.984028] <TASK> [ 21.984084] dump_stack_lvl+0x73/0xb0 [ 21.984165] print_report+0xd1/0x640 [ 21.984284] ? __virt_addr_valid+0x1db/0x2d0 [ 21.984364] ? kasan_atomics_helper+0x4b8a/0x5450 [ 21.984437] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.984509] ? kasan_atomics_helper+0x4b8a/0x5450 [ 21.984559] kasan_report+0x140/0x180 [ 21.984595] ? kasan_atomics_helper+0x4b8a/0x5450 [ 21.984636] __asan_report_load4_noabort+0x18/0x20 [ 21.984666] kasan_atomics_helper+0x4b8a/0x5450 [ 21.984699] ? kasan_save_alloc_info+0x3b/0x50 [ 21.984727] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.984762] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.984793] ? trace_hardirqs_on+0x37/0xe0 [ 21.984873] kasan_atomics+0x1dd/0x310 [ 21.984904] ? __pfx_kasan_atomics+0x10/0x10 [ 21.984934] ? __pfx_read_tsc+0x10/0x10 [ 21.984960] ? ktime_get_ts64+0x84/0x230 [ 21.984995] kunit_try_run_case+0x1a6/0x480 [ 21.985026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.985054] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.985082] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.985118] ? __kthread_parkme+0x82/0x160 [ 21.985144] ? preempt_count_sub+0x50/0x80 [ 21.985174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.985201] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.985264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.985303] kthread+0x257/0x310 [ 21.985329] ? __pfx_kthread+0x10/0x10 [ 21.985355] ret_from_fork+0x41/0x80 [ 21.985384] ? __pfx_kthread+0x10/0x10 [ 21.985408] ret_from_fork_asm+0x1a/0x30 [ 21.985451] </TASK> [ 21.985465] [ 22.000982] Allocated by task 270: [ 22.001434] kasan_save_stack+0x45/0x70 [ 22.002003] kasan_save_track+0x18/0x40 [ 22.002475] kasan_save_alloc_info+0x3b/0x50 [ 22.002985] __kasan_kmalloc+0xb7/0xc0 [ 22.003465] __kmalloc_cache_noprof+0x168/0x350 [ 22.003929] kasan_atomics+0x96/0x310 [ 22.004428] kunit_try_run_case+0x1a6/0x480 [ 22.004815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.005457] kthread+0x257/0x310 [ 22.005857] ret_from_fork+0x41/0x80 [ 22.006316] ret_from_fork_asm+0x1a/0x30 [ 22.006745] [ 22.007059] The buggy address belongs to the object at ffff888102314e80 [ 22.007059] which belongs to the cache kmalloc-64 of size 64 [ 22.008185] The buggy address is located 0 bytes to the right of [ 22.008185] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.009260] [ 22.009599] The buggy address belongs to the physical page: [ 22.010215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.010978] flags: 0x200000000000000(node=0|zone=2) [ 22.011630] page_type: f5(slab) [ 22.012086] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.012733] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.013456] page dumped because: kasan: bad access detected [ 22.013990] [ 22.014340] Memory state around the buggy address: [ 22.014808] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.015595] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.016435] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.016909] ^ [ 22.018300] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.018783] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.019295] ================================================================== [ 22.151772] ================================================================== [ 22.152816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 22.155552] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.157452] [ 22.157894] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.158154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.158193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.158280] Call Trace: [ 22.158335] <TASK> [ 22.158389] dump_stack_lvl+0x73/0xb0 [ 22.158465] print_report+0xd1/0x640 [ 22.158503] ? __virt_addr_valid+0x1db/0x2d0 [ 22.158540] ? kasan_atomics_helper+0x4a1/0x5450 [ 22.158575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.158608] ? kasan_atomics_helper+0x4a1/0x5450 [ 22.158641] kasan_report+0x140/0x180 [ 22.158675] ? kasan_atomics_helper+0x4a1/0x5450 [ 22.158715] kasan_check_range+0x10c/0x1c0 [ 22.158745] __kasan_check_write+0x18/0x20 [ 22.158774] kasan_atomics_helper+0x4a1/0x5450 [ 22.158807] ? kasan_save_alloc_info+0x3b/0x50 [ 22.158886] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.158925] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.158958] ? trace_hardirqs_on+0x37/0xe0 [ 22.158998] kasan_atomics+0x1dd/0x310 [ 22.159027] ? __pfx_kasan_atomics+0x10/0x10 [ 22.159057] ? __pfx_read_tsc+0x10/0x10 [ 22.159085] ? ktime_get_ts64+0x84/0x230 [ 22.159120] kunit_try_run_case+0x1a6/0x480 [ 22.159153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.159181] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.159210] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.159294] ? __kthread_parkme+0x82/0x160 [ 22.159325] ? preempt_count_sub+0x50/0x80 [ 22.159357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.159384] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.159421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.159459] kthread+0x257/0x310 [ 22.159485] ? __pfx_kthread+0x10/0x10 [ 22.159510] ret_from_fork+0x41/0x80 [ 22.159541] ? __pfx_kthread+0x10/0x10 [ 22.159568] ret_from_fork_asm+0x1a/0x30 [ 22.159612] </TASK> [ 22.159625] [ 22.176976] Allocated by task 270: [ 22.177561] kasan_save_stack+0x45/0x70 [ 22.178199] kasan_save_track+0x18/0x40 [ 22.178678] kasan_save_alloc_info+0x3b/0x50 [ 22.179168] __kasan_kmalloc+0xb7/0xc0 [ 22.179857] __kmalloc_cache_noprof+0x168/0x350 [ 22.180355] kasan_atomics+0x96/0x310 [ 22.180789] kunit_try_run_case+0x1a6/0x480 [ 22.181358] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.181924] kthread+0x257/0x310 [ 22.182332] ret_from_fork+0x41/0x80 [ 22.182769] ret_from_fork_asm+0x1a/0x30 [ 22.183329] [ 22.183644] The buggy address belongs to the object at ffff888102314e80 [ 22.183644] which belongs to the cache kmalloc-64 of size 64 [ 22.184592] The buggy address is located 0 bytes to the right of [ 22.184592] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.185587] [ 22.185913] The buggy address belongs to the physical page: [ 22.186465] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.187292] flags: 0x200000000000000(node=0|zone=2) [ 22.187826] page_type: f5(slab) [ 22.188293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.189115] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.189613] page dumped because: kasan: bad access detected [ 22.190266] [ 22.190578] Memory state around the buggy address: [ 22.191107] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.191830] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.192547] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.193090] ^ [ 22.193646] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.194407] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.195140] ================================================================== [ 23.005079] ================================================================== [ 23.006650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 23.007343] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.008011] [ 23.008325] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.008447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.008488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.008551] Call Trace: [ 23.008641] <TASK> [ 23.008701] dump_stack_lvl+0x73/0xb0 [ 23.008788] print_report+0xd1/0x640 [ 23.008905] ? __virt_addr_valid+0x1db/0x2d0 [ 23.008951] ? kasan_atomics_helper+0x4a38/0x5450 [ 23.009021] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.009102] ? kasan_atomics_helper+0x4a38/0x5450 [ 23.009246] kasan_report+0x140/0x180 [ 23.009336] ? kasan_atomics_helper+0x4a38/0x5450 [ 23.009435] __asan_report_load4_noabort+0x18/0x20 [ 23.009555] kasan_atomics_helper+0x4a38/0x5450 [ 23.009644] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.009724] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.009769] ? trace_hardirqs_on+0x37/0xe0 [ 23.009814] kasan_atomics+0x1dd/0x310 [ 23.009889] ? __pfx_kasan_atomics+0x10/0x10 [ 23.009924] ? __pfx_read_tsc+0x10/0x10 [ 23.009953] ? ktime_get_ts64+0x84/0x230 [ 23.009990] kunit_try_run_case+0x1a6/0x480 [ 23.010023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.010053] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.010084] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.010121] ? __kthread_parkme+0x82/0x160 [ 23.010150] ? preempt_count_sub+0x50/0x80 [ 23.010181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.010211] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.010278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.010319] kthread+0x257/0x310 [ 23.010346] ? __pfx_kthread+0x10/0x10 [ 23.010374] ret_from_fork+0x41/0x80 [ 23.010406] ? __pfx_kthread+0x10/0x10 [ 23.010433] ret_from_fork_asm+0x1a/0x30 [ 23.010478] </TASK> [ 23.010493] [ 23.024870] Allocated by task 270: [ 23.025390] kasan_save_stack+0x45/0x70 [ 23.025797] kasan_save_track+0x18/0x40 [ 23.026410] kasan_save_alloc_info+0x3b/0x50 [ 23.026843] __kasan_kmalloc+0xb7/0xc0 [ 23.027246] __kmalloc_cache_noprof+0x168/0x350 [ 23.027715] kasan_atomics+0x96/0x310 [ 23.028156] kunit_try_run_case+0x1a6/0x480 [ 23.028515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.028909] kthread+0x257/0x310 [ 23.029309] ret_from_fork+0x41/0x80 [ 23.029937] ret_from_fork_asm+0x1a/0x30 [ 23.030404] [ 23.030650] The buggy address belongs to the object at ffff888102314e80 [ 23.030650] which belongs to the cache kmalloc-64 of size 64 [ 23.031561] The buggy address is located 0 bytes to the right of [ 23.031561] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.032510] [ 23.032778] The buggy address belongs to the physical page: [ 23.033458] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.033941] flags: 0x200000000000000(node=0|zone=2) [ 23.034520] page_type: f5(slab) [ 23.034965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.035652] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.036561] page dumped because: kasan: bad access detected [ 23.037135] [ 23.037341] Memory state around the buggy address: [ 23.037675] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.038251] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.038883] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.039809] ^ [ 23.040375] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.041029] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.041570] ================================================================== [ 23.583743] ================================================================== [ 23.584309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 23.584790] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.585570] [ 23.585898] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.585958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.585975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.586006] Call Trace: [ 23.586030] <TASK> [ 23.586052] dump_stack_lvl+0x73/0xb0 [ 23.586090] print_report+0xd1/0x640 [ 23.586125] ? __virt_addr_valid+0x1db/0x2d0 [ 23.586159] ? kasan_atomics_helper+0x15b7/0x5450 [ 23.586193] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.586253] ? kasan_atomics_helper+0x15b7/0x5450 [ 23.587434] kasan_report+0x140/0x180 [ 23.587531] ? kasan_atomics_helper+0x15b7/0x5450 [ 23.587626] kasan_check_range+0x10c/0x1c0 [ 23.587703] __kasan_check_write+0x18/0x20 [ 23.587775] kasan_atomics_helper+0x15b7/0x5450 [ 23.587861] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.587944] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.587999] ? trace_hardirqs_on+0x37/0xe0 [ 23.588044] kasan_atomics+0x1dd/0x310 [ 23.588076] ? __pfx_kasan_atomics+0x10/0x10 [ 23.588107] ? __pfx_read_tsc+0x10/0x10 [ 23.588137] ? ktime_get_ts64+0x84/0x230 [ 23.588173] kunit_try_run_case+0x1a6/0x480 [ 23.588206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.588271] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.588347] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.588447] ? __kthread_parkme+0x82/0x160 [ 23.588550] ? preempt_count_sub+0x50/0x80 [ 23.588637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.588705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.588839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.588948] kthread+0x257/0x310 [ 23.589014] ? __pfx_kthread+0x10/0x10 [ 23.589046] ret_from_fork+0x41/0x80 [ 23.589077] ? __pfx_kthread+0x10/0x10 [ 23.589104] ret_from_fork_asm+0x1a/0x30 [ 23.589146] </TASK> [ 23.589161] [ 23.602903] Allocated by task 270: [ 23.603367] kasan_save_stack+0x45/0x70 [ 23.603792] kasan_save_track+0x18/0x40 [ 23.604281] kasan_save_alloc_info+0x3b/0x50 [ 23.604771] __kasan_kmalloc+0xb7/0xc0 [ 23.605219] __kmalloc_cache_noprof+0x168/0x350 [ 23.605589] kasan_atomics+0x96/0x310 [ 23.606026] kunit_try_run_case+0x1a6/0x480 [ 23.606496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.607120] kthread+0x257/0x310 [ 23.607436] ret_from_fork+0x41/0x80 [ 23.607734] ret_from_fork_asm+0x1a/0x30 [ 23.608168] [ 23.608451] The buggy address belongs to the object at ffff888102314e80 [ 23.608451] which belongs to the cache kmalloc-64 of size 64 [ 23.609686] The buggy address is located 0 bytes to the right of [ 23.609686] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.610564] [ 23.610761] The buggy address belongs to the physical page: [ 23.611508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.612198] flags: 0x200000000000000(node=0|zone=2) [ 23.612746] page_type: f5(slab) [ 23.613352] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.613899] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.614829] page dumped because: kasan: bad access detected [ 23.615366] [ 23.615597] Memory state around the buggy address: [ 23.616169] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.618788] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.619320] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.620182] ^ [ 23.620612] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.621485] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.622353] ================================================================== [ 22.067020] ================================================================== [ 22.067451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 22.068218] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.069579] [ 22.070098] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.070218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.070277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.070334] Call Trace: [ 22.070386] <TASK> [ 22.070434] dump_stack_lvl+0x73/0xb0 [ 22.070516] print_report+0xd1/0x640 [ 22.070599] ? __virt_addr_valid+0x1db/0x2d0 [ 22.070680] ? kasan_atomics_helper+0x3e0/0x5450 [ 22.070772] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.070929] ? kasan_atomics_helper+0x3e0/0x5450 [ 22.071026] kasan_report+0x140/0x180 [ 22.071105] ? kasan_atomics_helper+0x3e0/0x5450 [ 22.071182] kasan_check_range+0x10c/0x1c0 [ 22.071217] __kasan_check_read+0x15/0x20 [ 22.071291] kasan_atomics_helper+0x3e0/0x5450 [ 22.071328] ? kasan_save_alloc_info+0x3b/0x50 [ 22.071359] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.071395] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.071425] ? trace_hardirqs_on+0x37/0xe0 [ 22.071465] kasan_atomics+0x1dd/0x310 [ 22.071493] ? __pfx_kasan_atomics+0x10/0x10 [ 22.071523] ? __pfx_read_tsc+0x10/0x10 [ 22.071550] ? ktime_get_ts64+0x84/0x230 [ 22.071586] kunit_try_run_case+0x1a6/0x480 [ 22.071619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.071650] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.071680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.071717] ? __kthread_parkme+0x82/0x160 [ 22.071743] ? preempt_count_sub+0x50/0x80 [ 22.071774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.071802] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.071880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.071924] kthread+0x257/0x310 [ 22.071951] ? __pfx_kthread+0x10/0x10 [ 22.071978] ret_from_fork+0x41/0x80 [ 22.072008] ? __pfx_kthread+0x10/0x10 [ 22.072033] ret_from_fork_asm+0x1a/0x30 [ 22.072074] </TASK> [ 22.072087] [ 22.088370] Allocated by task 270: [ 22.088784] kasan_save_stack+0x45/0x70 [ 22.089384] kasan_save_track+0x18/0x40 [ 22.089934] kasan_save_alloc_info+0x3b/0x50 [ 22.090474] __kasan_kmalloc+0xb7/0xc0 [ 22.091022] __kmalloc_cache_noprof+0x168/0x350 [ 22.091601] kasan_atomics+0x96/0x310 [ 22.092215] kunit_try_run_case+0x1a6/0x480 [ 22.092567] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.092995] kthread+0x257/0x310 [ 22.093370] ret_from_fork+0x41/0x80 [ 22.093770] ret_from_fork_asm+0x1a/0x30 [ 22.094328] [ 22.094566] The buggy address belongs to the object at ffff888102314e80 [ 22.094566] which belongs to the cache kmalloc-64 of size 64 [ 22.095658] The buggy address is located 0 bytes to the right of [ 22.095658] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.096725] [ 22.096963] The buggy address belongs to the physical page: [ 22.097369] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.098159] flags: 0x200000000000000(node=0|zone=2) [ 22.098752] page_type: f5(slab) [ 22.099213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.099987] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.100746] page dumped because: kasan: bad access detected [ 22.101305] [ 22.101522] Memory state around the buggy address: [ 22.102015] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.102680] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.103430] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.104073] ^ [ 22.104475] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.105166] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.105782] ================================================================== [ 24.345182] ================================================================== [ 24.345914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 24.346555] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.347146] [ 24.347428] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.347552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.347594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.347656] Call Trace: [ 24.347710] <TASK> [ 24.347764] dump_stack_lvl+0x73/0xb0 [ 24.347892] print_report+0xd1/0x640 [ 24.347981] ? __virt_addr_valid+0x1db/0x2d0 [ 24.348062] ? kasan_atomics_helper+0x2007/0x5450 [ 24.348143] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.348219] ? kasan_atomics_helper+0x2007/0x5450 [ 24.348316] kasan_report+0x140/0x180 [ 24.348397] ? kasan_atomics_helper+0x2007/0x5450 [ 24.348494] kasan_check_range+0x10c/0x1c0 [ 24.348571] __kasan_check_write+0x18/0x20 [ 24.348646] kasan_atomics_helper+0x2007/0x5450 [ 24.348732] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.348854] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.348939] ? trace_hardirqs_on+0x37/0xe0 [ 24.349035] kasan_atomics+0x1dd/0x310 [ 24.349115] ? __pfx_kasan_atomics+0x10/0x10 [ 24.349197] ? __pfx_read_tsc+0x10/0x10 [ 24.349285] ? ktime_get_ts64+0x84/0x230 [ 24.349366] kunit_try_run_case+0x1a6/0x480 [ 24.349438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.349470] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.349504] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.349542] ? __kthread_parkme+0x82/0x160 [ 24.349570] ? preempt_count_sub+0x50/0x80 [ 24.349602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.349631] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.349669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.349707] kthread+0x257/0x310 [ 24.349733] ? __pfx_kthread+0x10/0x10 [ 24.349760] ret_from_fork+0x41/0x80 [ 24.349789] ? __pfx_kthread+0x10/0x10 [ 24.349835] ret_from_fork_asm+0x1a/0x30 [ 24.349915] </TASK> [ 24.349931] [ 24.368710] Allocated by task 270: [ 24.369668] kasan_save_stack+0x45/0x70 [ 24.370069] kasan_save_track+0x18/0x40 [ 24.370697] kasan_save_alloc_info+0x3b/0x50 [ 24.371500] __kasan_kmalloc+0xb7/0xc0 [ 24.372039] __kmalloc_cache_noprof+0x168/0x350 [ 24.372502] kasan_atomics+0x96/0x310 [ 24.372831] kunit_try_run_case+0x1a6/0x480 [ 24.373283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.373759] kthread+0x257/0x310 [ 24.374087] ret_from_fork+0x41/0x80 [ 24.374448] ret_from_fork_asm+0x1a/0x30 [ 24.374895] [ 24.375114] The buggy address belongs to the object at ffff888102314e80 [ 24.375114] which belongs to the cache kmalloc-64 of size 64 [ 24.376480] The buggy address is located 0 bytes to the right of [ 24.376480] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.378359] [ 24.378925] The buggy address belongs to the physical page: [ 24.379489] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.380084] flags: 0x200000000000000(node=0|zone=2) [ 24.380746] page_type: f5(slab) [ 24.381415] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.382258] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.383878] page dumped because: kasan: bad access detected [ 24.384449] [ 24.384940] Memory state around the buggy address: [ 24.385477] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.385721] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.386552] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.387427] ^ [ 24.387908] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.388471] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.389134] ================================================================== [ 24.561025] ================================================================== [ 24.561774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 24.562487] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.563121] [ 24.563476] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.563598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.563640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.563724] Call Trace: [ 24.563807] <TASK> [ 24.563890] dump_stack_lvl+0x73/0xb0 [ 24.563963] print_report+0xd1/0x640 [ 24.564042] ? __virt_addr_valid+0x1db/0x2d0 [ 24.564122] ? kasan_atomics_helper+0x4fa7/0x5450 [ 24.564199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.564298] ? kasan_atomics_helper+0x4fa7/0x5450 [ 24.564378] kasan_report+0x140/0x180 [ 24.564458] ? kasan_atomics_helper+0x4fa7/0x5450 [ 24.564551] __asan_report_load8_noabort+0x18/0x20 [ 24.564627] kasan_atomics_helper+0x4fa7/0x5450 [ 24.564727] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.564875] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.564955] ? trace_hardirqs_on+0x37/0xe0 [ 24.565045] kasan_atomics+0x1dd/0x310 [ 24.565117] ? __pfx_kasan_atomics+0x10/0x10 [ 24.565194] ? __pfx_read_tsc+0x10/0x10 [ 24.565283] ? ktime_get_ts64+0x84/0x230 [ 24.565367] kunit_try_run_case+0x1a6/0x480 [ 24.565422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.565453] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.565484] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.565521] ? __kthread_parkme+0x82/0x160 [ 24.565550] ? preempt_count_sub+0x50/0x80 [ 24.565582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.565611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.565649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.565687] kthread+0x257/0x310 [ 24.565713] ? __pfx_kthread+0x10/0x10 [ 24.565739] ret_from_fork+0x41/0x80 [ 24.565769] ? __pfx_kthread+0x10/0x10 [ 24.565794] ret_from_fork_asm+0x1a/0x30 [ 24.565872] </TASK> [ 24.565891] [ 24.579436] Allocated by task 270: [ 24.579824] kasan_save_stack+0x45/0x70 [ 24.580302] kasan_save_track+0x18/0x40 [ 24.580753] kasan_save_alloc_info+0x3b/0x50 [ 24.581306] __kasan_kmalloc+0xb7/0xc0 [ 24.581820] __kmalloc_cache_noprof+0x168/0x350 [ 24.582457] kasan_atomics+0x96/0x310 [ 24.582763] kunit_try_run_case+0x1a6/0x480 [ 24.583089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.583508] kthread+0x257/0x310 [ 24.583987] ret_from_fork+0x41/0x80 [ 24.584445] ret_from_fork_asm+0x1a/0x30 [ 24.584847] [ 24.585081] The buggy address belongs to the object at ffff888102314e80 [ 24.585081] which belongs to the cache kmalloc-64 of size 64 [ 24.586304] The buggy address is located 0 bytes to the right of [ 24.586304] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.587307] [ 24.587494] The buggy address belongs to the physical page: [ 24.587853] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.588591] flags: 0x200000000000000(node=0|zone=2) [ 24.589458] page_type: f5(slab) [ 24.589891] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.590593] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.591316] page dumped because: kasan: bad access detected [ 24.591796] [ 24.592027] Memory state around the buggy address: [ 24.592790] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.593366] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.594997] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.595755] ^ [ 24.596811] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.597571] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.598624] ================================================================== [ 24.600343] ================================================================== [ 24.601482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 24.602316] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.603362] [ 24.603618] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.603683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.603701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.603732] Call Trace: [ 24.603756] <TASK> [ 24.603778] dump_stack_lvl+0x73/0xb0 [ 24.603829] print_report+0xd1/0x640 [ 24.604190] ? __virt_addr_valid+0x1db/0x2d0 [ 24.604348] ? kasan_atomics_helper+0x224d/0x5450 [ 24.604428] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.604470] ? kasan_atomics_helper+0x224d/0x5450 [ 24.604507] kasan_report+0x140/0x180 [ 24.604544] ? kasan_atomics_helper+0x224d/0x5450 [ 24.604586] kasan_check_range+0x10c/0x1c0 [ 24.604617] __kasan_check_write+0x18/0x20 [ 24.604648] kasan_atomics_helper+0x224d/0x5450 [ 24.604685] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.604722] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.604753] ? trace_hardirqs_on+0x37/0xe0 [ 24.604793] kasan_atomics+0x1dd/0x310 [ 24.604833] ? __pfx_kasan_atomics+0x10/0x10 [ 24.604903] ? __pfx_read_tsc+0x10/0x10 [ 24.604933] ? ktime_get_ts64+0x84/0x230 [ 24.604971] kunit_try_run_case+0x1a6/0x480 [ 24.605005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.605035] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.605066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.605104] ? __kthread_parkme+0x82/0x160 [ 24.605132] ? preempt_count_sub+0x50/0x80 [ 24.605165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.605194] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.605256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.605300] kthread+0x257/0x310 [ 24.605328] ? __pfx_kthread+0x10/0x10 [ 24.605355] ret_from_fork+0x41/0x80 [ 24.605386] ? __pfx_kthread+0x10/0x10 [ 24.605413] ret_from_fork_asm+0x1a/0x30 [ 24.605455] </TASK> [ 24.605471] [ 24.619180] Allocated by task 270: [ 24.619523] kasan_save_stack+0x45/0x70 [ 24.619876] kasan_save_track+0x18/0x40 [ 24.620341] kasan_save_alloc_info+0x3b/0x50 [ 24.621000] __kasan_kmalloc+0xb7/0xc0 [ 24.621490] __kmalloc_cache_noprof+0x168/0x350 [ 24.622080] kasan_atomics+0x96/0x310 [ 24.622497] kunit_try_run_case+0x1a6/0x480 [ 24.623024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.623540] kthread+0x257/0x310 [ 24.623825] ret_from_fork+0x41/0x80 [ 24.624133] ret_from_fork_asm+0x1a/0x30 [ 24.624536] [ 24.624804] The buggy address belongs to the object at ffff888102314e80 [ 24.624804] which belongs to the cache kmalloc-64 of size 64 [ 24.625844] The buggy address is located 0 bytes to the right of [ 24.625844] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.626762] [ 24.627097] The buggy address belongs to the physical page: [ 24.627649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.628410] flags: 0x200000000000000(node=0|zone=2) [ 24.628985] page_type: f5(slab) [ 24.629354] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.630062] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.630625] page dumped because: kasan: bad access detected [ 24.630983] [ 24.631160] Memory state around the buggy address: [ 24.631701] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.633407] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.635492] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.636374] ^ [ 24.636908] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.637671] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.638481] ================================================================== [ 22.236754] ================================================================== [ 22.238591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 22.239358] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.239967] [ 22.240337] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.240459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.240520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.240612] Call Trace: [ 22.240670] <TASK> [ 22.240724] dump_stack_lvl+0x73/0xb0 [ 22.240810] print_report+0xd1/0x640 [ 22.240911] ? __virt_addr_valid+0x1db/0x2d0 [ 22.240996] ? kasan_atomics_helper+0x566/0x5450 [ 22.241121] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.241205] ? kasan_atomics_helper+0x566/0x5450 [ 22.241308] kasan_report+0x140/0x180 [ 22.241374] ? kasan_atomics_helper+0x566/0x5450 [ 22.241418] kasan_check_range+0x10c/0x1c0 [ 22.241449] __kasan_check_write+0x18/0x20 [ 22.241480] kasan_atomics_helper+0x566/0x5450 [ 22.241516] ? kasan_save_alloc_info+0x3b/0x50 [ 22.241546] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.241582] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.241613] ? trace_hardirqs_on+0x37/0xe0 [ 22.241652] kasan_atomics+0x1dd/0x310 [ 22.241681] ? __pfx_kasan_atomics+0x10/0x10 [ 22.241712] ? __pfx_read_tsc+0x10/0x10 [ 22.241738] ? ktime_get_ts64+0x84/0x230 [ 22.241774] kunit_try_run_case+0x1a6/0x480 [ 22.241807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.241875] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.241911] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.241949] ? __kthread_parkme+0x82/0x160 [ 22.241977] ? preempt_count_sub+0x50/0x80 [ 22.242010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.242038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.242076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.242115] kthread+0x257/0x310 [ 22.242141] ? __pfx_kthread+0x10/0x10 [ 22.242169] ret_from_fork+0x41/0x80 [ 22.242199] ? __pfx_kthread+0x10/0x10 [ 22.242249] ret_from_fork_asm+0x1a/0x30 [ 22.242295] </TASK> [ 22.242311] [ 22.256084] Allocated by task 270: [ 22.256540] kasan_save_stack+0x45/0x70 [ 22.257172] kasan_save_track+0x18/0x40 [ 22.257649] kasan_save_alloc_info+0x3b/0x50 [ 22.258213] __kasan_kmalloc+0xb7/0xc0 [ 22.258644] __kmalloc_cache_noprof+0x168/0x350 [ 22.259001] kasan_atomics+0x96/0x310 [ 22.259498] kunit_try_run_case+0x1a6/0x480 [ 22.259970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.260551] kthread+0x257/0x310 [ 22.261025] ret_from_fork+0x41/0x80 [ 22.261453] ret_from_fork_asm+0x1a/0x30 [ 22.261901] [ 22.262146] The buggy address belongs to the object at ffff888102314e80 [ 22.262146] which belongs to the cache kmalloc-64 of size 64 [ 22.263152] The buggy address is located 0 bytes to the right of [ 22.263152] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.264280] [ 22.264451] The buggy address belongs to the physical page: [ 22.265041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.265643] flags: 0x200000000000000(node=0|zone=2) [ 22.266004] page_type: f5(slab) [ 22.267519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.269070] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.269673] page dumped because: kasan: bad access detected [ 22.270529] [ 22.271010] Memory state around the buggy address: [ 22.271484] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.272091] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.272622] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.273119] ^ [ 22.273560] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.274150] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.274768] ================================================================== [ 22.196993] ================================================================== [ 22.197675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 22.198512] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.199336] [ 22.199582] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.199754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.199850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.199934] Call Trace: [ 22.200016] <TASK> [ 22.200065] dump_stack_lvl+0x73/0xb0 [ 22.200145] print_report+0xd1/0x640 [ 22.200218] ? __virt_addr_valid+0x1db/0x2d0 [ 22.200397] ? kasan_atomics_helper+0x4b3c/0x5450 [ 22.200549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.200630] ? kasan_atomics_helper+0x4b3c/0x5450 [ 22.200704] kasan_report+0x140/0x180 [ 22.200785] ? kasan_atomics_helper+0x4b3c/0x5450 [ 22.200875] __asan_report_store4_noabort+0x1b/0x30 [ 22.201011] kasan_atomics_helper+0x4b3c/0x5450 [ 22.201115] ? kasan_save_alloc_info+0x3b/0x50 [ 22.201188] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.201357] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.201434] ? trace_hardirqs_on+0x37/0xe0 [ 22.201499] kasan_atomics+0x1dd/0x310 [ 22.201530] ? __pfx_kasan_atomics+0x10/0x10 [ 22.201562] ? __pfx_read_tsc+0x10/0x10 [ 22.201590] ? ktime_get_ts64+0x84/0x230 [ 22.201626] kunit_try_run_case+0x1a6/0x480 [ 22.201660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.201688] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.201716] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.201755] ? __kthread_parkme+0x82/0x160 [ 22.201783] ? preempt_count_sub+0x50/0x80 [ 22.201818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.201888] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.201927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.201965] kthread+0x257/0x310 [ 22.201991] ? __pfx_kthread+0x10/0x10 [ 22.202016] ret_from_fork+0x41/0x80 [ 22.202045] ? __pfx_kthread+0x10/0x10 [ 22.202070] ret_from_fork_asm+0x1a/0x30 [ 22.202111] </TASK> [ 22.202124] [ 22.217889] Allocated by task 270: [ 22.218257] kasan_save_stack+0x45/0x70 [ 22.218747] kasan_save_track+0x18/0x40 [ 22.219195] kasan_save_alloc_info+0x3b/0x50 [ 22.219661] __kasan_kmalloc+0xb7/0xc0 [ 22.220320] __kmalloc_cache_noprof+0x168/0x350 [ 22.220666] kasan_atomics+0x96/0x310 [ 22.221044] kunit_try_run_case+0x1a6/0x480 [ 22.221773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.222383] kthread+0x257/0x310 [ 22.222737] ret_from_fork+0x41/0x80 [ 22.223173] ret_from_fork_asm+0x1a/0x30 [ 22.223669] [ 22.223912] The buggy address belongs to the object at ffff888102314e80 [ 22.223912] which belongs to the cache kmalloc-64 of size 64 [ 22.224650] The buggy address is located 0 bytes to the right of [ 22.224650] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.225476] [ 22.225747] The buggy address belongs to the physical page: [ 22.226343] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.227191] flags: 0x200000000000000(node=0|zone=2) [ 22.227687] page_type: f5(slab) [ 22.228102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.228809] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.229605] page dumped because: kasan: bad access detected [ 22.230184] [ 22.230496] Memory state around the buggy address: [ 22.231012] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.231648] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.232421] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.233140] ^ [ 22.233626] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.234199] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.235007] ================================================================== [ 23.843114] ================================================================== [ 23.844551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 23.845487] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.846774] [ 23.847008] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.847268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.847310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.847360] Call Trace: [ 23.847388] <TASK> [ 23.847415] dump_stack_lvl+0x73/0xb0 [ 23.847457] print_report+0xd1/0x640 [ 23.847494] ? __virt_addr_valid+0x1db/0x2d0 [ 23.847530] ? kasan_atomics_helper+0x194b/0x5450 [ 23.847564] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.847599] ? kasan_atomics_helper+0x194b/0x5450 [ 23.847637] kasan_report+0x140/0x180 [ 23.847675] ? kasan_atomics_helper+0x194b/0x5450 [ 23.847717] kasan_check_range+0x10c/0x1c0 [ 23.847748] __kasan_check_write+0x18/0x20 [ 23.847779] kasan_atomics_helper+0x194b/0x5450 [ 23.847823] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.847947] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.848068] ? trace_hardirqs_on+0x37/0xe0 [ 23.848182] kasan_atomics+0x1dd/0x310 [ 23.848278] ? __pfx_kasan_atomics+0x10/0x10 [ 23.848318] ? __pfx_read_tsc+0x10/0x10 [ 23.848349] ? ktime_get_ts64+0x84/0x230 [ 23.848385] kunit_try_run_case+0x1a6/0x480 [ 23.848421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.848452] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.848483] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.848521] ? __kthread_parkme+0x82/0x160 [ 23.848551] ? preempt_count_sub+0x50/0x80 [ 23.848585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.848614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.848651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.848690] kthread+0x257/0x310 [ 23.848718] ? __pfx_kthread+0x10/0x10 [ 23.848746] ret_from_fork+0x41/0x80 [ 23.848777] ? __pfx_kthread+0x10/0x10 [ 23.848803] ret_from_fork_asm+0x1a/0x30 [ 23.848874] </TASK> [ 23.848893] [ 23.864461] Allocated by task 270: [ 23.865005] kasan_save_stack+0x45/0x70 [ 23.865530] kasan_save_track+0x18/0x40 [ 23.866046] kasan_save_alloc_info+0x3b/0x50 [ 23.866585] __kasan_kmalloc+0xb7/0xc0 [ 23.867076] __kmalloc_cache_noprof+0x168/0x350 [ 23.867564] kasan_atomics+0x96/0x310 [ 23.868156] kunit_try_run_case+0x1a6/0x480 [ 23.868696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.869319] kthread+0x257/0x310 [ 23.869745] ret_from_fork+0x41/0x80 [ 23.870100] ret_from_fork_asm+0x1a/0x30 [ 23.870586] [ 23.871026] The buggy address belongs to the object at ffff888102314e80 [ 23.871026] which belongs to the cache kmalloc-64 of size 64 [ 23.872149] The buggy address is located 0 bytes to the right of [ 23.872149] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.873137] [ 23.873423] The buggy address belongs to the physical page: [ 23.874119] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.874892] flags: 0x200000000000000(node=0|zone=2) [ 23.875483] page_type: f5(slab) [ 23.875939] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.876682] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.877405] page dumped because: kasan: bad access detected [ 23.877906] [ 23.878086] Memory state around the buggy address: [ 23.878536] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.879345] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.880138] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.880656] ^ [ 23.881188] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.881741] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.882509] ================================================================== [ 22.795608] ================================================================== [ 22.796163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 22.796932] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.797528] [ 22.797820] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.797959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.797996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.798058] Call Trace: [ 22.798116] <TASK> [ 22.798175] dump_stack_lvl+0x73/0xb0 [ 22.798331] print_report+0xd1/0x640 [ 22.798449] ? __virt_addr_valid+0x1db/0x2d0 [ 22.798561] ? kasan_atomics_helper+0xd48/0x5450 [ 22.798673] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.798757] ? kasan_atomics_helper+0xd48/0x5450 [ 22.798840] kasan_report+0x140/0x180 [ 22.798921] ? kasan_atomics_helper+0xd48/0x5450 [ 22.799019] kasan_check_range+0x10c/0x1c0 [ 22.799096] __kasan_check_write+0x18/0x20 [ 22.799167] kasan_atomics_helper+0xd48/0x5450 [ 22.799297] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.799385] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.799504] ? trace_hardirqs_on+0x37/0xe0 [ 22.799630] kasan_atomics+0x1dd/0x310 [ 22.799711] ? __pfx_kasan_atomics+0x10/0x10 [ 22.799791] ? __pfx_read_tsc+0x10/0x10 [ 22.799858] ? ktime_get_ts64+0x84/0x230 [ 22.799964] kunit_try_run_case+0x1a6/0x480 [ 22.800039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.800087] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.800120] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.800157] ? __kthread_parkme+0x82/0x160 [ 22.800184] ? preempt_count_sub+0x50/0x80 [ 22.800217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.800278] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.800317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.800357] kthread+0x257/0x310 [ 22.800383] ? __pfx_kthread+0x10/0x10 [ 22.800411] ret_from_fork+0x41/0x80 [ 22.800440] ? __pfx_kthread+0x10/0x10 [ 22.800465] ret_from_fork_asm+0x1a/0x30 [ 22.800506] </TASK> [ 22.800521] [ 22.814566] Allocated by task 270: [ 22.815055] kasan_save_stack+0x45/0x70 [ 22.815556] kasan_save_track+0x18/0x40 [ 22.815997] kasan_save_alloc_info+0x3b/0x50 [ 22.816510] __kasan_kmalloc+0xb7/0xc0 [ 22.816990] __kmalloc_cache_noprof+0x168/0x350 [ 22.817488] kasan_atomics+0x96/0x310 [ 22.817935] kunit_try_run_case+0x1a6/0x480 [ 22.818410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.818942] kthread+0x257/0x310 [ 22.819353] ret_from_fork+0x41/0x80 [ 22.819664] ret_from_fork_asm+0x1a/0x30 [ 22.820285] [ 22.820561] The buggy address belongs to the object at ffff888102314e80 [ 22.820561] which belongs to the cache kmalloc-64 of size 64 [ 22.821925] The buggy address is located 0 bytes to the right of [ 22.821925] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.822887] [ 22.823126] The buggy address belongs to the physical page: [ 22.823673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.825440] flags: 0x200000000000000(node=0|zone=2) [ 22.827188] page_type: f5(slab) [ 22.827555] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.828020] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.828753] page dumped because: kasan: bad access detected [ 22.829597] [ 22.829758] Memory state around the buggy address: [ 22.830589] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.831318] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.832106] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.833050] ^ [ 22.833538] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.834475] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.835012] ================================================================== [ 22.753254] ================================================================== [ 22.753897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 22.754483] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.755089] [ 22.756251] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.756468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.756585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.756694] Call Trace: [ 22.756756] <TASK> [ 22.756901] dump_stack_lvl+0x73/0xb0 [ 22.756992] print_report+0xd1/0x640 [ 22.757077] ? __virt_addr_valid+0x1db/0x2d0 [ 22.757146] ? kasan_atomics_helper+0x4a86/0x5450 [ 22.757186] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.757242] ? kasan_atomics_helper+0x4a86/0x5450 [ 22.757289] kasan_report+0x140/0x180 [ 22.757327] ? kasan_atomics_helper+0x4a86/0x5450 [ 22.757370] __asan_report_load4_noabort+0x18/0x20 [ 22.757403] kasan_atomics_helper+0x4a86/0x5450 [ 22.757440] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.757478] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.757509] ? trace_hardirqs_on+0x37/0xe0 [ 22.757550] kasan_atomics+0x1dd/0x310 [ 22.757579] ? __pfx_kasan_atomics+0x10/0x10 [ 22.757610] ? __pfx_read_tsc+0x10/0x10 [ 22.757638] ? ktime_get_ts64+0x84/0x230 [ 22.757674] kunit_try_run_case+0x1a6/0x480 [ 22.757708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.757737] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.757767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.757803] ? __kthread_parkme+0x82/0x160 [ 22.757884] ? preempt_count_sub+0x50/0x80 [ 22.757919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.757949] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.757986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.758025] kthread+0x257/0x310 [ 22.758052] ? __pfx_kthread+0x10/0x10 [ 22.758078] ret_from_fork+0x41/0x80 [ 22.758109] ? __pfx_kthread+0x10/0x10 [ 22.758135] ret_from_fork_asm+0x1a/0x30 [ 22.758178] </TASK> [ 22.758192] [ 22.774777] Allocated by task 270: [ 22.775250] kasan_save_stack+0x45/0x70 [ 22.775756] kasan_save_track+0x18/0x40 [ 22.776421] kasan_save_alloc_info+0x3b/0x50 [ 22.776914] __kasan_kmalloc+0xb7/0xc0 [ 22.777373] __kmalloc_cache_noprof+0x168/0x350 [ 22.778028] kasan_atomics+0x96/0x310 [ 22.778521] kunit_try_run_case+0x1a6/0x480 [ 22.778998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.779778] kthread+0x257/0x310 [ 22.780341] ret_from_fork+0x41/0x80 [ 22.780716] ret_from_fork_asm+0x1a/0x30 [ 22.781106] [ 22.781357] The buggy address belongs to the object at ffff888102314e80 [ 22.781357] which belongs to the cache kmalloc-64 of size 64 [ 22.782286] The buggy address is located 0 bytes to the right of [ 22.782286] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.783927] [ 22.784220] The buggy address belongs to the physical page: [ 22.785069] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.785738] flags: 0x200000000000000(node=0|zone=2) [ 22.786465] page_type: f5(slab) [ 22.787011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.787649] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.788627] page dumped because: kasan: bad access detected [ 22.788999] [ 22.789624] Memory state around the buggy address: [ 22.790320] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.791180] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.791895] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.792707] ^ [ 22.793361] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.793861] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.794408] ================================================================== [ 23.042777] ================================================================== [ 23.043585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 23.044276] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.044727] [ 23.044941] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.045059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.045105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.045250] Call Trace: [ 23.045314] <TASK> [ 23.045370] dump_stack_lvl+0x73/0xb0 [ 23.045459] print_report+0xd1/0x640 [ 23.045540] ? __virt_addr_valid+0x1db/0x2d0 [ 23.045624] ? kasan_atomics_helper+0x107a/0x5450 [ 23.045740] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.045816] ? kasan_atomics_helper+0x107a/0x5450 [ 23.045880] kasan_report+0x140/0x180 [ 23.045960] ? kasan_atomics_helper+0x107a/0x5450 [ 23.046087] kasan_check_range+0x10c/0x1c0 [ 23.046172] __kasan_check_write+0x18/0x20 [ 23.046300] kasan_atomics_helper+0x107a/0x5450 [ 23.046402] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.046522] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.046605] ? trace_hardirqs_on+0x37/0xe0 [ 23.046733] kasan_atomics+0x1dd/0x310 [ 23.046812] ? __pfx_kasan_atomics+0x10/0x10 [ 23.046907] ? __pfx_read_tsc+0x10/0x10 [ 23.046976] ? ktime_get_ts64+0x84/0x230 [ 23.047062] kunit_try_run_case+0x1a6/0x480 [ 23.047145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.047216] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.047328] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.047407] ? __kthread_parkme+0x82/0x160 [ 23.047479] ? preempt_count_sub+0x50/0x80 [ 23.047556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.047625] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.047706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.047793] kthread+0x257/0x310 [ 23.047865] ? __pfx_kthread+0x10/0x10 [ 23.047935] ret_from_fork+0x41/0x80 [ 23.048004] ? __pfx_kthread+0x10/0x10 [ 23.048077] ret_from_fork_asm+0x1a/0x30 [ 23.048175] </TASK> [ 23.048216] [ 23.061691] Allocated by task 270: [ 23.062265] kasan_save_stack+0x45/0x70 [ 23.062662] kasan_save_track+0x18/0x40 [ 23.063085] kasan_save_alloc_info+0x3b/0x50 [ 23.063811] __kasan_kmalloc+0xb7/0xc0 [ 23.064173] __kmalloc_cache_noprof+0x168/0x350 [ 23.064539] kasan_atomics+0x96/0x310 [ 23.064843] kunit_try_run_case+0x1a6/0x480 [ 23.065238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.065755] kthread+0x257/0x310 [ 23.066287] ret_from_fork+0x41/0x80 [ 23.066722] ret_from_fork_asm+0x1a/0x30 [ 23.067409] [ 23.067682] The buggy address belongs to the object at ffff888102314e80 [ 23.067682] which belongs to the cache kmalloc-64 of size 64 [ 23.068480] The buggy address is located 0 bytes to the right of [ 23.068480] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.069423] [ 23.069689] The buggy address belongs to the physical page: [ 23.070429] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.071338] flags: 0x200000000000000(node=0|zone=2) [ 23.071696] page_type: f5(slab) [ 23.072153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.072825] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.073423] page dumped because: kasan: bad access detected [ 23.073785] [ 23.074008] Memory state around the buggy address: [ 23.074473] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.075480] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.075920] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.076633] ^ [ 23.077819] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.078703] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.079642] ================================================================== [ 23.199264] ================================================================== [ 23.200155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 23.201626] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.203150] [ 23.203568] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.203685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.203727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.203787] Call Trace: [ 23.203843] <TASK> [ 23.203895] dump_stack_lvl+0x73/0xb0 [ 23.203980] print_report+0xd1/0x640 [ 23.204066] ? __virt_addr_valid+0x1db/0x2d0 [ 23.204145] ? kasan_atomics_helper+0x1218/0x5450 [ 23.204183] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.204218] ? kasan_atomics_helper+0x1218/0x5450 [ 23.204289] kasan_report+0x140/0x180 [ 23.204327] ? kasan_atomics_helper+0x1218/0x5450 [ 23.204369] kasan_check_range+0x10c/0x1c0 [ 23.204399] __kasan_check_write+0x18/0x20 [ 23.204430] kasan_atomics_helper+0x1218/0x5450 [ 23.204465] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.204502] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.204532] ? trace_hardirqs_on+0x37/0xe0 [ 23.204570] kasan_atomics+0x1dd/0x310 [ 23.204599] ? __pfx_kasan_atomics+0x10/0x10 [ 23.204630] ? __pfx_read_tsc+0x10/0x10 [ 23.204656] ? ktime_get_ts64+0x84/0x230 [ 23.204692] kunit_try_run_case+0x1a6/0x480 [ 23.204724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.204753] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.204784] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.204835] ? __kthread_parkme+0x82/0x160 [ 23.204895] ? preempt_count_sub+0x50/0x80 [ 23.204929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.204959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.204998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.205036] kthread+0x257/0x310 [ 23.205062] ? __pfx_kthread+0x10/0x10 [ 23.205089] ret_from_fork+0x41/0x80 [ 23.205118] ? __pfx_kthread+0x10/0x10 [ 23.205145] ret_from_fork_asm+0x1a/0x30 [ 23.205185] </TASK> [ 23.205200] [ 23.227320] Allocated by task 270: [ 23.228168] kasan_save_stack+0x45/0x70 [ 23.229017] kasan_save_track+0x18/0x40 [ 23.229466] kasan_save_alloc_info+0x3b/0x50 [ 23.229854] __kasan_kmalloc+0xb7/0xc0 [ 23.230311] __kmalloc_cache_noprof+0x168/0x350 [ 23.230767] kasan_atomics+0x96/0x310 [ 23.231492] kunit_try_run_case+0x1a6/0x480 [ 23.231843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.232730] kthread+0x257/0x310 [ 23.233303] ret_from_fork+0x41/0x80 [ 23.233753] ret_from_fork_asm+0x1a/0x30 [ 23.234221] [ 23.234486] The buggy address belongs to the object at ffff888102314e80 [ 23.234486] which belongs to the cache kmalloc-64 of size 64 [ 23.235486] The buggy address is located 0 bytes to the right of [ 23.235486] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.236523] [ 23.236773] The buggy address belongs to the physical page: [ 23.237245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.238023] flags: 0x200000000000000(node=0|zone=2) [ 23.238517] page_type: f5(slab) [ 23.238932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.239652] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.240332] page dumped because: kasan: bad access detected [ 23.240879] [ 23.241116] Memory state around the buggy address: [ 23.241589] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.242253] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.242892] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.243546] ^ [ 23.244083] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.244708] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.245384] ================================================================== [ 23.375304] ================================================================== [ 23.375831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 23.376557] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.377000] [ 23.377213] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.377330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.377368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.377421] Call Trace: [ 23.377470] <TASK> [ 23.377513] dump_stack_lvl+0x73/0xb0 [ 23.377630] print_report+0xd1/0x640 [ 23.377729] ? __virt_addr_valid+0x1db/0x2d0 [ 23.377810] ? kasan_atomics_helper+0x13b6/0x5450 [ 23.377909] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.377998] ? kasan_atomics_helper+0x13b6/0x5450 [ 23.378096] kasan_report+0x140/0x180 [ 23.378184] ? kasan_atomics_helper+0x13b6/0x5450 [ 23.378302] kasan_check_range+0x10c/0x1c0 [ 23.378385] __kasan_check_read+0x15/0x20 [ 23.378462] kasan_atomics_helper+0x13b6/0x5450 [ 23.378544] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.378628] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.378703] ? trace_hardirqs_on+0x37/0xe0 [ 23.378794] kasan_atomics+0x1dd/0x310 [ 23.378890] ? __pfx_kasan_atomics+0x10/0x10 [ 23.378972] ? __pfx_read_tsc+0x10/0x10 [ 23.379040] ? ktime_get_ts64+0x84/0x230 [ 23.379129] kunit_try_run_case+0x1a6/0x480 [ 23.379213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.379323] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.379401] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.379481] ? __kthread_parkme+0x82/0x160 [ 23.379560] ? preempt_count_sub+0x50/0x80 [ 23.379641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.379712] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.379794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.379904] kthread+0x257/0x310 [ 23.379974] ? __pfx_kthread+0x10/0x10 [ 23.380044] ret_from_fork+0x41/0x80 [ 23.380113] ? __pfx_kthread+0x10/0x10 [ 23.380179] ret_from_fork_asm+0x1a/0x30 [ 23.380298] </TASK> [ 23.380328] [ 23.394573] Allocated by task 270: [ 23.394972] kasan_save_stack+0x45/0x70 [ 23.395528] kasan_save_track+0x18/0x40 [ 23.395859] kasan_save_alloc_info+0x3b/0x50 [ 23.396204] __kasan_kmalloc+0xb7/0xc0 [ 23.396594] __kmalloc_cache_noprof+0x168/0x350 [ 23.397081] kasan_atomics+0x96/0x310 [ 23.397506] kunit_try_run_case+0x1a6/0x480 [ 23.398266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.398755] kthread+0x257/0x310 [ 23.399108] ret_from_fork+0x41/0x80 [ 23.400217] ret_from_fork_asm+0x1a/0x30 [ 23.400643] [ 23.400838] The buggy address belongs to the object at ffff888102314e80 [ 23.400838] which belongs to the cache kmalloc-64 of size 64 [ 23.403249] The buggy address is located 0 bytes to the right of [ 23.403249] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.404677] [ 23.404868] The buggy address belongs to the physical page: [ 23.405752] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.406728] flags: 0x200000000000000(node=0|zone=2) [ 23.407211] page_type: f5(slab) [ 23.407611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.408184] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.408821] page dumped because: kasan: bad access detected [ 23.409303] [ 23.409519] Memory state around the buggy address: [ 23.410033] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.410579] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.411361] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.411839] ^ [ 23.412439] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.412915] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.413630] ================================================================== [ 23.333007] ================================================================== [ 23.333614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 23.334357] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.335422] [ 23.335687] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.335805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.335938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.336002] Call Trace: [ 23.336054] <TASK> [ 23.336105] dump_stack_lvl+0x73/0xb0 [ 23.336184] print_report+0xd1/0x640 [ 23.336282] ? __virt_addr_valid+0x1db/0x2d0 [ 23.336364] ? kasan_atomics_helper+0x49d0/0x5450 [ 23.336441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.336519] ? kasan_atomics_helper+0x49d0/0x5450 [ 23.336599] kasan_report+0x140/0x180 [ 23.336682] ? kasan_atomics_helper+0x49d0/0x5450 [ 23.336930] __asan_report_load4_noabort+0x18/0x20 [ 23.337018] kasan_atomics_helper+0x49d0/0x5450 [ 23.337104] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.337186] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.337266] ? trace_hardirqs_on+0x37/0xe0 [ 23.337313] kasan_atomics+0x1dd/0x310 [ 23.337344] ? __pfx_kasan_atomics+0x10/0x10 [ 23.337375] ? __pfx_read_tsc+0x10/0x10 [ 23.337404] ? ktime_get_ts64+0x84/0x230 [ 23.337441] kunit_try_run_case+0x1a6/0x480 [ 23.337474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.337503] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.337532] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.337569] ? __kthread_parkme+0x82/0x160 [ 23.337597] ? preempt_count_sub+0x50/0x80 [ 23.337628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.337657] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.337697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.337734] kthread+0x257/0x310 [ 23.337760] ? __pfx_kthread+0x10/0x10 [ 23.337787] ret_from_fork+0x41/0x80 [ 23.337838] ? __pfx_kthread+0x10/0x10 [ 23.337899] ret_from_fork_asm+0x1a/0x30 [ 23.337943] </TASK> [ 23.337959] [ 23.356760] Allocated by task 270: [ 23.357646] kasan_save_stack+0x45/0x70 [ 23.358053] kasan_save_track+0x18/0x40 [ 23.358461] kasan_save_alloc_info+0x3b/0x50 [ 23.358830] __kasan_kmalloc+0xb7/0xc0 [ 23.359285] __kmalloc_cache_noprof+0x168/0x350 [ 23.359705] kasan_atomics+0x96/0x310 [ 23.360253] kunit_try_run_case+0x1a6/0x480 [ 23.360641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.361213] kthread+0x257/0x310 [ 23.361601] ret_from_fork+0x41/0x80 [ 23.362008] ret_from_fork_asm+0x1a/0x30 [ 23.362361] [ 23.362588] The buggy address belongs to the object at ffff888102314e80 [ 23.362588] which belongs to the cache kmalloc-64 of size 64 [ 23.363612] The buggy address is located 0 bytes to the right of [ 23.363612] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.364441] [ 23.364676] The buggy address belongs to the physical page: [ 23.365184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.365801] flags: 0x200000000000000(node=0|zone=2) [ 23.366427] page_type: f5(slab) [ 23.366914] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.367553] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.368203] page dumped because: kasan: bad access detected [ 23.369566] [ 23.369780] Memory state around the buggy address: [ 23.370258] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.370881] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.371466] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.372255] ^ [ 23.372616] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.373297] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.373941] ================================================================== [ 24.515951] ================================================================== [ 24.516572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 24.517182] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.517775] [ 24.518077] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.518182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.518222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.518305] Call Trace: [ 24.518357] <TASK> [ 24.518408] dump_stack_lvl+0x73/0xb0 [ 24.518531] print_report+0xd1/0x640 [ 24.518609] ? __virt_addr_valid+0x1db/0x2d0 [ 24.518690] ? kasan_atomics_helper+0x218b/0x5450 [ 24.518766] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.518893] ? kasan_atomics_helper+0x218b/0x5450 [ 24.518997] kasan_report+0x140/0x180 [ 24.519110] ? kasan_atomics_helper+0x218b/0x5450 [ 24.519215] kasan_check_range+0x10c/0x1c0 [ 24.519333] __kasan_check_write+0x18/0x20 [ 24.519408] kasan_atomics_helper+0x218b/0x5450 [ 24.519485] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.519568] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.519642] ? trace_hardirqs_on+0x37/0xe0 [ 24.519735] kasan_atomics+0x1dd/0x310 [ 24.519808] ? __pfx_kasan_atomics+0x10/0x10 [ 24.519967] ? __pfx_read_tsc+0x10/0x10 [ 24.520040] ? ktime_get_ts64+0x84/0x230 [ 24.520169] kunit_try_run_case+0x1a6/0x480 [ 24.520271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.520342] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.520390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.520430] ? __kthread_parkme+0x82/0x160 [ 24.520460] ? preempt_count_sub+0x50/0x80 [ 24.520492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.520522] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.520560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.520598] kthread+0x257/0x310 [ 24.520624] ? __pfx_kthread+0x10/0x10 [ 24.520651] ret_from_fork+0x41/0x80 [ 24.520680] ? __pfx_kthread+0x10/0x10 [ 24.520707] ret_from_fork_asm+0x1a/0x30 [ 24.520748] </TASK> [ 24.520763] [ 24.534488] Allocated by task 270: [ 24.535036] kasan_save_stack+0x45/0x70 [ 24.535492] kasan_save_track+0x18/0x40 [ 24.536104] kasan_save_alloc_info+0x3b/0x50 [ 24.536640] __kasan_kmalloc+0xb7/0xc0 [ 24.539582] __kmalloc_cache_noprof+0x168/0x350 [ 24.540002] kasan_atomics+0x96/0x310 [ 24.541668] kunit_try_run_case+0x1a6/0x480 [ 24.542202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.543024] kthread+0x257/0x310 [ 24.543352] ret_from_fork+0x41/0x80 [ 24.543604] ret_from_fork_asm+0x1a/0x30 [ 24.544977] [ 24.545640] The buggy address belongs to the object at ffff888102314e80 [ 24.545640] which belongs to the cache kmalloc-64 of size 64 [ 24.546645] The buggy address is located 0 bytes to the right of [ 24.546645] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.547297] [ 24.548469] The buggy address belongs to the physical page: [ 24.549529] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.550405] flags: 0x200000000000000(node=0|zone=2) [ 24.550701] page_type: f5(slab) [ 24.550927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.552197] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.553086] page dumped because: kasan: bad access detected [ 24.555142] [ 24.555393] Memory state around the buggy address: [ 24.556075] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.556689] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.557342] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.557993] ^ [ 24.558540] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.559283] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.559955] ================================================================== [ 23.797190] ================================================================== [ 23.797975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 23.798643] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.799133] [ 23.799392] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.799511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.799550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.799616] Call Trace: [ 23.799673] <TASK> [ 23.799761] dump_stack_lvl+0x73/0xb0 [ 23.799871] print_report+0xd1/0x640 [ 23.799946] ? __virt_addr_valid+0x1db/0x2d0 [ 23.800028] ? kasan_atomics_helper+0x18b2/0x5450 [ 23.800106] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.800185] ? kasan_atomics_helper+0x18b2/0x5450 [ 23.800288] kasan_report+0x140/0x180 [ 23.800370] ? kasan_atomics_helper+0x18b2/0x5450 [ 23.800469] kasan_check_range+0x10c/0x1c0 [ 23.800545] __kasan_check_write+0x18/0x20 [ 23.800618] kasan_atomics_helper+0x18b2/0x5450 [ 23.800739] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.800863] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.800947] ? trace_hardirqs_on+0x37/0xe0 [ 23.801034] kasan_atomics+0x1dd/0x310 [ 23.801109] ? __pfx_kasan_atomics+0x10/0x10 [ 23.801182] ? __pfx_read_tsc+0x10/0x10 [ 23.801272] ? ktime_get_ts64+0x84/0x230 [ 23.801356] kunit_try_run_case+0x1a6/0x480 [ 23.801436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.801504] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.801576] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.801655] ? __kthread_parkme+0x82/0x160 [ 23.801723] ? preempt_count_sub+0x50/0x80 [ 23.801804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.801896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.801939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.801980] kthread+0x257/0x310 [ 23.802007] ? __pfx_kthread+0x10/0x10 [ 23.802034] ret_from_fork+0x41/0x80 [ 23.802066] ? __pfx_kthread+0x10/0x10 [ 23.802093] ret_from_fork_asm+0x1a/0x30 [ 23.802135] </TASK> [ 23.802149] [ 23.820288] Allocated by task 270: [ 23.821550] kasan_save_stack+0x45/0x70 [ 23.822430] kasan_save_track+0x18/0x40 [ 23.822957] kasan_save_alloc_info+0x3b/0x50 [ 23.823425] __kasan_kmalloc+0xb7/0xc0 [ 23.823738] __kmalloc_cache_noprof+0x168/0x350 [ 23.824769] kasan_atomics+0x96/0x310 [ 23.825504] kunit_try_run_case+0x1a6/0x480 [ 23.825992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.826751] kthread+0x257/0x310 [ 23.827216] ret_from_fork+0x41/0x80 [ 23.827580] ret_from_fork_asm+0x1a/0x30 [ 23.828328] [ 23.828970] The buggy address belongs to the object at ffff888102314e80 [ 23.828970] which belongs to the cache kmalloc-64 of size 64 [ 23.830263] The buggy address is located 0 bytes to the right of [ 23.830263] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.831666] [ 23.831852] The buggy address belongs to the physical page: [ 23.832472] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.833441] flags: 0x200000000000000(node=0|zone=2) [ 23.834456] page_type: f5(slab) [ 23.834780] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.835701] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.836422] page dumped because: kasan: bad access detected [ 23.836845] [ 23.837013] Memory state around the buggy address: [ 23.837381] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.838346] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.838805] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.839457] ^ [ 23.839918] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.841024] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.841863] ================================================================== [ 24.640055] ================================================================== [ 24.641484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 24.642300] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.642787] [ 24.642967] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.643030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.643048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.643080] Call Trace: [ 24.643106] <TASK> [ 24.643129] dump_stack_lvl+0x73/0xb0 [ 24.643170] print_report+0xd1/0x640 [ 24.643206] ? __virt_addr_valid+0x1db/0x2d0 [ 24.643291] ? kasan_atomics_helper+0x5117/0x5450 [ 24.643370] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.643452] ? kasan_atomics_helper+0x5117/0x5450 [ 24.643534] kasan_report+0x140/0x180 [ 24.643620] ? kasan_atomics_helper+0x5117/0x5450 [ 24.643715] __asan_report_load8_noabort+0x18/0x20 [ 24.643797] kasan_atomics_helper+0x5117/0x5450 [ 24.644324] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.644380] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.644416] ? trace_hardirqs_on+0x37/0xe0 [ 24.644460] kasan_atomics+0x1dd/0x310 [ 24.644490] ? __pfx_kasan_atomics+0x10/0x10 [ 24.644521] ? __pfx_read_tsc+0x10/0x10 [ 24.644549] ? ktime_get_ts64+0x84/0x230 [ 24.644585] kunit_try_run_case+0x1a6/0x480 [ 24.644619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.644650] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.644680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.644717] ? __kthread_parkme+0x82/0x160 [ 24.644746] ? preempt_count_sub+0x50/0x80 [ 24.644778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.644807] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.644900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.644942] kthread+0x257/0x310 [ 24.644970] ? __pfx_kthread+0x10/0x10 [ 24.644997] ret_from_fork+0x41/0x80 [ 24.645027] ? __pfx_kthread+0x10/0x10 [ 24.645054] ret_from_fork_asm+0x1a/0x30 [ 24.645097] </TASK> [ 24.645112] [ 24.658667] Allocated by task 270: [ 24.659060] kasan_save_stack+0x45/0x70 [ 24.659703] kasan_save_track+0x18/0x40 [ 24.660024] kasan_save_alloc_info+0x3b/0x50 [ 24.660384] __kasan_kmalloc+0xb7/0xc0 [ 24.660800] __kmalloc_cache_noprof+0x168/0x350 [ 24.661342] kasan_atomics+0x96/0x310 [ 24.661755] kunit_try_run_case+0x1a6/0x480 [ 24.662421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.663020] kthread+0x257/0x310 [ 24.663411] ret_from_fork+0x41/0x80 [ 24.663784] ret_from_fork_asm+0x1a/0x30 [ 24.664242] [ 24.664472] The buggy address belongs to the object at ffff888102314e80 [ 24.664472] which belongs to the cache kmalloc-64 of size 64 [ 24.665455] The buggy address is located 0 bytes to the right of [ 24.665455] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.666524] [ 24.666789] The buggy address belongs to the physical page: [ 24.668253] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.669765] flags: 0x200000000000000(node=0|zone=2) [ 24.670285] page_type: f5(slab) [ 24.670698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.671308] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.671907] page dumped because: kasan: bad access detected [ 24.672488] [ 24.672727] Memory state around the buggy address: [ 24.673176] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.673889] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.674516] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.675171] ^ [ 24.675579] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.676321] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.676971] ================================================================== [ 23.081511] ================================================================== [ 23.082797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 23.084048] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.084561] [ 23.084675] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.084740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.084757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.084789] Call Trace: [ 23.084830] <TASK> [ 23.085085] dump_stack_lvl+0x73/0xb0 [ 23.085267] print_report+0xd1/0x640 [ 23.085371] ? __virt_addr_valid+0x1db/0x2d0 [ 23.085458] ? kasan_atomics_helper+0x4a1e/0x5450 [ 23.085536] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.085612] ? kasan_atomics_helper+0x4a1e/0x5450 [ 23.085671] kasan_report+0x140/0x180 [ 23.085712] ? kasan_atomics_helper+0x4a1e/0x5450 [ 23.085754] __asan_report_load4_noabort+0x18/0x20 [ 23.085789] kasan_atomics_helper+0x4a1e/0x5450 [ 23.085865] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.085910] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.085943] ? trace_hardirqs_on+0x37/0xe0 [ 23.085984] kasan_atomics+0x1dd/0x310 [ 23.086014] ? __pfx_kasan_atomics+0x10/0x10 [ 23.086046] ? __pfx_read_tsc+0x10/0x10 [ 23.086075] ? ktime_get_ts64+0x84/0x230 [ 23.086112] kunit_try_run_case+0x1a6/0x480 [ 23.086146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.086177] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.086208] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.086293] ? __kthread_parkme+0x82/0x160 [ 23.086338] ? preempt_count_sub+0x50/0x80 [ 23.086372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.086402] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.086441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.086481] kthread+0x257/0x310 [ 23.086508] ? __pfx_kthread+0x10/0x10 [ 23.086535] ret_from_fork+0x41/0x80 [ 23.086566] ? __pfx_kthread+0x10/0x10 [ 23.086592] ret_from_fork_asm+0x1a/0x30 [ 23.086635] </TASK> [ 23.086650] [ 23.100305] Allocated by task 270: [ 23.100722] kasan_save_stack+0x45/0x70 [ 23.101220] kasan_save_track+0x18/0x40 [ 23.101587] kasan_save_alloc_info+0x3b/0x50 [ 23.101966] __kasan_kmalloc+0xb7/0xc0 [ 23.102435] __kmalloc_cache_noprof+0x168/0x350 [ 23.102967] kasan_atomics+0x96/0x310 [ 23.103395] kunit_try_run_case+0x1a6/0x480 [ 23.103941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.104514] kthread+0x257/0x310 [ 23.104942] ret_from_fork+0x41/0x80 [ 23.105270] ret_from_fork_asm+0x1a/0x30 [ 23.105695] [ 23.106029] The buggy address belongs to the object at ffff888102314e80 [ 23.106029] which belongs to the cache kmalloc-64 of size 64 [ 23.106994] The buggy address is located 0 bytes to the right of [ 23.106994] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.108927] [ 23.109517] The buggy address belongs to the physical page: [ 23.110349] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.111054] flags: 0x200000000000000(node=0|zone=2) [ 23.111434] page_type: f5(slab) [ 23.111771] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.112605] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.113127] page dumped because: kasan: bad access detected [ 23.113748] [ 23.114217] Memory state around the buggy address: [ 23.114686] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.115557] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.116323] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.117265] ^ [ 23.117983] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.118618] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.119195] ================================================================== [ 22.322153] ================================================================== [ 22.323481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 22.324209] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.324966] [ 22.325264] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.325428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.325474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.325540] Call Trace: [ 22.325597] <TASK> [ 22.325654] dump_stack_lvl+0x73/0xb0 [ 22.325793] print_report+0xd1/0x640 [ 22.325917] ? __virt_addr_valid+0x1db/0x2d0 [ 22.326003] ? kasan_atomics_helper+0x698/0x5450 [ 22.326118] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.326203] ? kasan_atomics_helper+0x698/0x5450 [ 22.326296] kasan_report+0x140/0x180 [ 22.326338] ? kasan_atomics_helper+0x698/0x5450 [ 22.326379] kasan_check_range+0x10c/0x1c0 [ 22.326409] __kasan_check_write+0x18/0x20 [ 22.326458] kasan_atomics_helper+0x698/0x5450 [ 22.326521] ? kasan_save_alloc_info+0x3b/0x50 [ 22.326553] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.326589] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.326620] ? trace_hardirqs_on+0x37/0xe0 [ 22.326660] kasan_atomics+0x1dd/0x310 [ 22.326690] ? __pfx_kasan_atomics+0x10/0x10 [ 22.326721] ? __pfx_read_tsc+0x10/0x10 [ 22.326749] ? ktime_get_ts64+0x84/0x230 [ 22.326785] kunit_try_run_case+0x1a6/0x480 [ 22.326846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.326898] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.326932] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.326970] ? __kthread_parkme+0x82/0x160 [ 22.327000] ? preempt_count_sub+0x50/0x80 [ 22.327033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.327061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.327099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.327136] kthread+0x257/0x310 [ 22.327161] ? __pfx_kthread+0x10/0x10 [ 22.327188] ret_from_fork+0x41/0x80 [ 22.327216] ? __pfx_kthread+0x10/0x10 [ 22.327286] ret_from_fork_asm+0x1a/0x30 [ 22.327328] </TASK> [ 22.327345] [ 22.341352] Allocated by task 270: [ 22.341803] kasan_save_stack+0x45/0x70 [ 22.342311] kasan_save_track+0x18/0x40 [ 22.342763] kasan_save_alloc_info+0x3b/0x50 [ 22.343298] __kasan_kmalloc+0xb7/0xc0 [ 22.343732] __kmalloc_cache_noprof+0x168/0x350 [ 22.344240] kasan_atomics+0x96/0x310 [ 22.344650] kunit_try_run_case+0x1a6/0x480 [ 22.345121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.345543] kthread+0x257/0x310 [ 22.345841] ret_from_fork+0x41/0x80 [ 22.346150] ret_from_fork_asm+0x1a/0x30 [ 22.346603] [ 22.346870] The buggy address belongs to the object at ffff888102314e80 [ 22.346870] which belongs to the cache kmalloc-64 of size 64 [ 22.348194] The buggy address is located 0 bytes to the right of [ 22.348194] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.348943] [ 22.349300] The buggy address belongs to the physical page: [ 22.349840] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.351976] flags: 0x200000000000000(node=0|zone=2) [ 22.352508] page_type: f5(slab) [ 22.352897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.353771] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.354717] page dumped because: kasan: bad access detected [ 22.355324] [ 22.355545] Memory state around the buggy address: [ 22.356057] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.356743] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.357190] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.357865] ^ [ 22.358383] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.358950] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.359645] ================================================================== [ 23.160126] ================================================================== [ 23.161403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 23.162285] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.163115] [ 23.163480] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.163650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.163716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.163781] Call Trace: [ 23.163833] <TASK> [ 23.163887] dump_stack_lvl+0x73/0xb0 [ 23.163967] print_report+0xd1/0x640 [ 23.164068] ? __virt_addr_valid+0x1db/0x2d0 [ 23.164195] ? kasan_atomics_helper+0x4a04/0x5450 [ 23.164315] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.164399] ? kasan_atomics_helper+0x4a04/0x5450 [ 23.164568] kasan_report+0x140/0x180 [ 23.164654] ? kasan_atomics_helper+0x4a04/0x5450 [ 23.164747] __asan_report_load4_noabort+0x18/0x20 [ 23.164827] kasan_atomics_helper+0x4a04/0x5450 [ 23.164912] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.164996] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.165129] ? trace_hardirqs_on+0x37/0xe0 [ 23.165309] kasan_atomics+0x1dd/0x310 [ 23.165417] ? __pfx_kasan_atomics+0x10/0x10 [ 23.165492] ? __pfx_read_tsc+0x10/0x10 [ 23.165561] ? ktime_get_ts64+0x84/0x230 [ 23.165610] kunit_try_run_case+0x1a6/0x480 [ 23.165647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.165678] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.165711] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.165751] ? __kthread_parkme+0x82/0x160 [ 23.165780] ? preempt_count_sub+0x50/0x80 [ 23.165814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.165887] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.165931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.165970] kthread+0x257/0x310 [ 23.165998] ? __pfx_kthread+0x10/0x10 [ 23.166025] ret_from_fork+0x41/0x80 [ 23.166055] ? __pfx_kthread+0x10/0x10 [ 23.166082] ret_from_fork_asm+0x1a/0x30 [ 23.166123] </TASK> [ 23.166138] [ 23.180472] Allocated by task 270: [ 23.180933] kasan_save_stack+0x45/0x70 [ 23.181514] kasan_save_track+0x18/0x40 [ 23.182332] kasan_save_alloc_info+0x3b/0x50 [ 23.182866] __kasan_kmalloc+0xb7/0xc0 [ 23.183351] __kmalloc_cache_noprof+0x168/0x350 [ 23.183833] kasan_atomics+0x96/0x310 [ 23.184248] kunit_try_run_case+0x1a6/0x480 [ 23.184582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.185019] kthread+0x257/0x310 [ 23.185423] ret_from_fork+0x41/0x80 [ 23.185993] ret_from_fork_asm+0x1a/0x30 [ 23.186510] [ 23.186829] The buggy address belongs to the object at ffff888102314e80 [ 23.186829] which belongs to the cache kmalloc-64 of size 64 [ 23.187683] The buggy address is located 0 bytes to the right of [ 23.187683] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.188840] [ 23.189217] The buggy address belongs to the physical page: [ 23.189908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.190492] flags: 0x200000000000000(node=0|zone=2) [ 23.190847] page_type: f5(slab) [ 23.191311] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.192009] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.192902] page dumped because: kasan: bad access detected [ 23.193497] [ 23.193757] Memory state around the buggy address: [ 23.194311] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.194757] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.195332] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.196003] ^ [ 23.196551] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.197325] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.198021] ================================================================== [ 23.414840] ================================================================== [ 23.415800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 23.416411] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.417399] [ 23.417676] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.417838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.417914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.417982] Call Trace: [ 23.418039] <TASK> [ 23.418091] dump_stack_lvl+0x73/0xb0 [ 23.418179] print_report+0xd1/0x640 [ 23.418281] ? __virt_addr_valid+0x1db/0x2d0 [ 23.418366] ? kasan_atomics_helper+0x4eb0/0x5450 [ 23.418462] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.418574] ? kasan_atomics_helper+0x4eb0/0x5450 [ 23.418653] kasan_report+0x140/0x180 [ 23.418736] ? kasan_atomics_helper+0x4eb0/0x5450 [ 23.418829] __asan_report_load8_noabort+0x18/0x20 [ 23.418938] kasan_atomics_helper+0x4eb0/0x5450 [ 23.419069] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.419186] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.419293] ? trace_hardirqs_on+0x37/0xe0 [ 23.419386] kasan_atomics+0x1dd/0x310 [ 23.419447] ? __pfx_kasan_atomics+0x10/0x10 [ 23.419482] ? __pfx_read_tsc+0x10/0x10 [ 23.419510] ? ktime_get_ts64+0x84/0x230 [ 23.419548] kunit_try_run_case+0x1a6/0x480 [ 23.419583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.419613] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.419644] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.419681] ? __kthread_parkme+0x82/0x160 [ 23.419710] ? preempt_count_sub+0x50/0x80 [ 23.419742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.419772] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.419810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.419892] kthread+0x257/0x310 [ 23.419925] ? __pfx_kthread+0x10/0x10 [ 23.419956] ret_from_fork+0x41/0x80 [ 23.419989] ? __pfx_kthread+0x10/0x10 [ 23.420019] ret_from_fork_asm+0x1a/0x30 [ 23.420062] </TASK> [ 23.420077] [ 23.435187] Allocated by task 270: [ 23.435643] kasan_save_stack+0x45/0x70 [ 23.436267] kasan_save_track+0x18/0x40 [ 23.436733] kasan_save_alloc_info+0x3b/0x50 [ 23.437326] __kasan_kmalloc+0xb7/0xc0 [ 23.437771] __kmalloc_cache_noprof+0x168/0x350 [ 23.438287] kasan_atomics+0x96/0x310 [ 23.438598] kunit_try_run_case+0x1a6/0x480 [ 23.439251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.440078] kthread+0x257/0x310 [ 23.440536] ret_from_fork+0x41/0x80 [ 23.440994] ret_from_fork_asm+0x1a/0x30 [ 23.441418] [ 23.441671] The buggy address belongs to the object at ffff888102314e80 [ 23.441671] which belongs to the cache kmalloc-64 of size 64 [ 23.442855] The buggy address is located 0 bytes to the right of [ 23.442855] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.443947] [ 23.444133] The buggy address belongs to the physical page: [ 23.444671] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.445532] flags: 0x200000000000000(node=0|zone=2) [ 23.446139] page_type: f5(slab) [ 23.446557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.447386] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.448174] page dumped because: kasan: bad access detected [ 23.448738] [ 23.449067] Memory state around the buggy address: [ 23.449579] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.450321] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.451105] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.451792] ^ [ 23.452387] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.453068] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.453751] ================================================================== [ 22.492920] ================================================================== [ 22.493535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 22.494444] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.495271] [ 22.495490] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.495608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.495645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.495703] Call Trace: [ 22.495755] <TASK> [ 22.495894] dump_stack_lvl+0x73/0xb0 [ 22.496044] print_report+0xd1/0x640 [ 22.496181] ? __virt_addr_valid+0x1db/0x2d0 [ 22.496348] ? kasan_atomics_helper+0x8fa/0x5450 [ 22.496469] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.496559] ? kasan_atomics_helper+0x8fa/0x5450 [ 22.496643] kasan_report+0x140/0x180 [ 22.496725] ? kasan_atomics_helper+0x8fa/0x5450 [ 22.496897] kasan_check_range+0x10c/0x1c0 [ 22.496985] __kasan_check_write+0x18/0x20 [ 22.497060] kasan_atomics_helper+0x8fa/0x5450 [ 22.497121] ? kasan_save_alloc_info+0x3b/0x50 [ 22.497157] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.497196] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.497256] ? trace_hardirqs_on+0x37/0xe0 [ 22.497302] kasan_atomics+0x1dd/0x310 [ 22.497334] ? __pfx_kasan_atomics+0x10/0x10 [ 22.497367] ? __pfx_read_tsc+0x10/0x10 [ 22.497396] ? ktime_get_ts64+0x84/0x230 [ 22.497432] kunit_try_run_case+0x1a6/0x480 [ 22.497465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.497494] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.497525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.497562] ? __kthread_parkme+0x82/0x160 [ 22.497590] ? preempt_count_sub+0x50/0x80 [ 22.497621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.497649] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.497686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.497725] kthread+0x257/0x310 [ 22.497751] ? __pfx_kthread+0x10/0x10 [ 22.497778] ret_from_fork+0x41/0x80 [ 22.497807] ? __pfx_kthread+0x10/0x10 [ 22.497883] ret_from_fork_asm+0x1a/0x30 [ 22.497928] </TASK> [ 22.497943] [ 22.517830] Allocated by task 270: [ 22.518255] kasan_save_stack+0x45/0x70 [ 22.518600] kasan_save_track+0x18/0x40 [ 22.519660] kasan_save_alloc_info+0x3b/0x50 [ 22.520194] __kasan_kmalloc+0xb7/0xc0 [ 22.520558] __kmalloc_cache_noprof+0x168/0x350 [ 22.521582] kasan_atomics+0x96/0x310 [ 22.521889] kunit_try_run_case+0x1a6/0x480 [ 22.522612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.523301] kthread+0x257/0x310 [ 22.523607] ret_from_fork+0x41/0x80 [ 22.524007] ret_from_fork_asm+0x1a/0x30 [ 22.524847] [ 22.525058] The buggy address belongs to the object at ffff888102314e80 [ 22.525058] which belongs to the cache kmalloc-64 of size 64 [ 22.526184] The buggy address is located 0 bytes to the right of [ 22.526184] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.527296] [ 22.527588] The buggy address belongs to the physical page: [ 22.528152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.529176] flags: 0x200000000000000(node=0|zone=2) [ 22.529573] page_type: f5(slab) [ 22.529910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.531039] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.531606] page dumped because: kasan: bad access detected [ 22.532857] [ 22.533028] Memory state around the buggy address: [ 22.533352] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.534318] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.534843] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.535369] ^ [ 22.535735] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.537388] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.537886] ================================================================== [ 23.709289] ================================================================== [ 23.710134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 23.710850] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.711493] [ 23.711743] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.711879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.711918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.711982] Call Trace: [ 23.712032] <TASK> [ 23.712082] dump_stack_lvl+0x73/0xb0 [ 23.712164] print_report+0xd1/0x640 [ 23.712262] ? __virt_addr_valid+0x1db/0x2d0 [ 23.712347] ? kasan_atomics_helper+0x1780/0x5450 [ 23.712427] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.712552] ? kasan_atomics_helper+0x1780/0x5450 [ 23.712674] kasan_report+0x140/0x180 [ 23.712765] ? kasan_atomics_helper+0x1780/0x5450 [ 23.712929] kasan_check_range+0x10c/0x1c0 [ 23.713026] __kasan_check_write+0x18/0x20 [ 23.713098] kasan_atomics_helper+0x1780/0x5450 [ 23.713182] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.713287] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.713364] ? trace_hardirqs_on+0x37/0xe0 [ 23.713491] kasan_atomics+0x1dd/0x310 [ 23.713571] ? __pfx_kasan_atomics+0x10/0x10 [ 23.713646] ? __pfx_read_tsc+0x10/0x10 [ 23.713755] ? ktime_get_ts64+0x84/0x230 [ 23.713842] kunit_try_run_case+0x1a6/0x480 [ 23.713958] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.714030] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.714104] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.714243] ? __kthread_parkme+0x82/0x160 [ 23.714321] ? preempt_count_sub+0x50/0x80 [ 23.714402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.714451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.714492] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.714532] kthread+0x257/0x310 [ 23.714559] ? __pfx_kthread+0x10/0x10 [ 23.714587] ret_from_fork+0x41/0x80 [ 23.714617] ? __pfx_kthread+0x10/0x10 [ 23.714644] ret_from_fork_asm+0x1a/0x30 [ 23.714686] </TASK> [ 23.714701] [ 23.733717] Allocated by task 270: [ 23.734435] kasan_save_stack+0x45/0x70 [ 23.735167] kasan_save_track+0x18/0x40 [ 23.735550] kasan_save_alloc_info+0x3b/0x50 [ 23.736168] __kasan_kmalloc+0xb7/0xc0 [ 23.736595] __kmalloc_cache_noprof+0x168/0x350 [ 23.737451] kasan_atomics+0x96/0x310 [ 23.737772] kunit_try_run_case+0x1a6/0x480 [ 23.738490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.739075] kthread+0x257/0x310 [ 23.739379] ret_from_fork+0x41/0x80 [ 23.739731] ret_from_fork_asm+0x1a/0x30 [ 23.740673] [ 23.740863] The buggy address belongs to the object at ffff888102314e80 [ 23.740863] which belongs to the cache kmalloc-64 of size 64 [ 23.742267] The buggy address is located 0 bytes to the right of [ 23.742267] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.743408] [ 23.743639] The buggy address belongs to the physical page: [ 23.745882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.746383] flags: 0x200000000000000(node=0|zone=2) [ 23.746706] page_type: f5(slab) [ 23.746966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.747387] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.747761] page dumped because: kasan: bad access detected [ 23.748048] [ 23.748212] Memory state around the buggy address: [ 23.751144] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.752951] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.754657] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.756142] ^ [ 23.756560] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.757167] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.757791] ================================================================== [ 24.222899] ================================================================== [ 24.223623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 24.224213] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.224815] [ 24.225083] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.225207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.225264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.225331] Call Trace: [ 24.225390] <TASK> [ 24.225448] dump_stack_lvl+0x73/0xb0 [ 24.225543] print_report+0xd1/0x640 [ 24.225631] ? __virt_addr_valid+0x1db/0x2d0 [ 24.225711] ? kasan_atomics_helper+0x1eab/0x5450 [ 24.225785] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.225869] ? kasan_atomics_helper+0x1eab/0x5450 [ 24.225955] kasan_report+0x140/0x180 [ 24.226041] ? kasan_atomics_helper+0x1eab/0x5450 [ 24.226137] kasan_check_range+0x10c/0x1c0 [ 24.226218] __kasan_check_write+0x18/0x20 [ 24.226301] kasan_atomics_helper+0x1eab/0x5450 [ 24.226368] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.226453] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.226531] ? trace_hardirqs_on+0x37/0xe0 [ 24.226621] kasan_atomics+0x1dd/0x310 [ 24.226698] ? __pfx_kasan_atomics+0x10/0x10 [ 24.226778] ? __pfx_read_tsc+0x10/0x10 [ 24.226849] ? ktime_get_ts64+0x84/0x230 [ 24.226936] kunit_try_run_case+0x1a6/0x480 [ 24.227015] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.227105] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.227180] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.227293] ? __kthread_parkme+0x82/0x160 [ 24.227371] ? preempt_count_sub+0x50/0x80 [ 24.227450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.227518] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.227600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.227687] kthread+0x257/0x310 [ 24.227760] ? __pfx_kthread+0x10/0x10 [ 24.227834] ret_from_fork+0x41/0x80 [ 24.227930] ? __pfx_kthread+0x10/0x10 [ 24.228002] ret_from_fork_asm+0x1a/0x30 [ 24.228102] </TASK> [ 24.228140] [ 24.240971] Allocated by task 270: [ 24.241368] kasan_save_stack+0x45/0x70 [ 24.241746] kasan_save_track+0x18/0x40 [ 24.242178] kasan_save_alloc_info+0x3b/0x50 [ 24.242633] __kasan_kmalloc+0xb7/0xc0 [ 24.243045] __kmalloc_cache_noprof+0x168/0x350 [ 24.243427] kasan_atomics+0x96/0x310 [ 24.243748] kunit_try_run_case+0x1a6/0x480 [ 24.244180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.244702] kthread+0x257/0x310 [ 24.245089] ret_from_fork+0x41/0x80 [ 24.245515] ret_from_fork_asm+0x1a/0x30 [ 24.245998] [ 24.246247] The buggy address belongs to the object at ffff888102314e80 [ 24.246247] which belongs to the cache kmalloc-64 of size 64 [ 24.246982] The buggy address is located 0 bytes to the right of [ 24.246982] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.247906] [ 24.248097] The buggy address belongs to the physical page: [ 24.248759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.249494] flags: 0x200000000000000(node=0|zone=2) [ 24.250063] page_type: f5(slab) [ 24.250377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.251080] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.251684] page dumped because: kasan: bad access detected [ 24.252178] [ 24.252434] Memory state around the buggy address: [ 24.252865] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.253447] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.254050] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.254619] ^ [ 24.255134] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.255605] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.256039] ================================================================== [ 23.885385] ================================================================== [ 23.886100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 23.886871] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.887941] [ 23.888248] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.888363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.888384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.888418] Call Trace: [ 23.888444] <TASK> [ 23.888467] dump_stack_lvl+0x73/0xb0 [ 23.888531] print_report+0xd1/0x640 [ 23.888907] ? __virt_addr_valid+0x1db/0x2d0 [ 23.888952] ? kasan_atomics_helper+0x19e4/0x5450 [ 23.888988] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.889025] ? kasan_atomics_helper+0x19e4/0x5450 [ 23.889061] kasan_report+0x140/0x180 [ 23.889097] ? kasan_atomics_helper+0x19e4/0x5450 [ 23.889140] kasan_check_range+0x10c/0x1c0 [ 23.889172] __kasan_check_write+0x18/0x20 [ 23.889203] kasan_atomics_helper+0x19e4/0x5450 [ 23.889267] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.889309] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.889340] ? trace_hardirqs_on+0x37/0xe0 [ 23.889378] kasan_atomics+0x1dd/0x310 [ 23.889408] ? __pfx_kasan_atomics+0x10/0x10 [ 23.889439] ? __pfx_read_tsc+0x10/0x10 [ 23.889470] ? ktime_get_ts64+0x84/0x230 [ 23.889508] kunit_try_run_case+0x1a6/0x480 [ 23.889541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.889569] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.889599] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.889635] ? __kthread_parkme+0x82/0x160 [ 23.889664] ? preempt_count_sub+0x50/0x80 [ 23.889695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.889724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.889761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.889799] kthread+0x257/0x310 [ 23.889840] ? __pfx_kthread+0x10/0x10 [ 23.889895] ret_from_fork+0x41/0x80 [ 23.889928] ? __pfx_kthread+0x10/0x10 [ 23.889954] ret_from_fork_asm+0x1a/0x30 [ 23.889996] </TASK> [ 23.890010] [ 23.904087] Allocated by task 270: [ 23.904563] kasan_save_stack+0x45/0x70 [ 23.905097] kasan_save_track+0x18/0x40 [ 23.905519] kasan_save_alloc_info+0x3b/0x50 [ 23.905855] __kasan_kmalloc+0xb7/0xc0 [ 23.906211] __kmalloc_cache_noprof+0x168/0x350 [ 23.906674] kasan_atomics+0x96/0x310 [ 23.907187] kunit_try_run_case+0x1a6/0x480 [ 23.907608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.908245] kthread+0x257/0x310 [ 23.908615] ret_from_fork+0x41/0x80 [ 23.909139] ret_from_fork_asm+0x1a/0x30 [ 23.909630] [ 23.909832] The buggy address belongs to the object at ffff888102314e80 [ 23.909832] which belongs to the cache kmalloc-64 of size 64 [ 23.910631] The buggy address is located 0 bytes to the right of [ 23.910631] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.911760] [ 23.911947] The buggy address belongs to the physical page: [ 23.912326] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.913127] flags: 0x200000000000000(node=0|zone=2) [ 23.913638] page_type: f5(slab) [ 23.914006] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.914867] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.915483] page dumped because: kasan: bad access detected [ 23.915844] [ 23.916080] Memory state around the buggy address: [ 23.916627] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.917504] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.917956] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.918486] ^ [ 23.918958] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.919781] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.920472] ================================================================== [ 24.389934] ================================================================== [ 24.390525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 24.391167] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.391748] [ 24.392048] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.392168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.392207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.392287] Call Trace: [ 24.392340] <TASK> [ 24.392392] dump_stack_lvl+0x73/0xb0 [ 24.392476] print_report+0xd1/0x640 [ 24.392554] ? __virt_addr_valid+0x1db/0x2d0 [ 24.392638] ? kasan_atomics_helper+0x4f9a/0x5450 [ 24.392717] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.392795] ? kasan_atomics_helper+0x4f9a/0x5450 [ 24.392927] kasan_report+0x140/0x180 [ 24.393011] ? kasan_atomics_helper+0x4f9a/0x5450 [ 24.393106] __asan_report_load8_noabort+0x18/0x20 [ 24.393189] kasan_atomics_helper+0x4f9a/0x5450 [ 24.393294] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.393378] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.393456] ? trace_hardirqs_on+0x37/0xe0 [ 24.393549] kasan_atomics+0x1dd/0x310 [ 24.393629] ? __pfx_kasan_atomics+0x10/0x10 [ 24.393699] ? __pfx_read_tsc+0x10/0x10 [ 24.393768] ? ktime_get_ts64+0x84/0x230 [ 24.393895] kunit_try_run_case+0x1a6/0x480 [ 24.393984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.394059] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.394136] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.394220] ? __kthread_parkme+0x82/0x160 [ 24.394315] ? preempt_count_sub+0x50/0x80 [ 24.394392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.394462] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.394545] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.394637] kthread+0x257/0x310 [ 24.394705] ? __pfx_kthread+0x10/0x10 [ 24.394770] ret_from_fork+0x41/0x80 [ 24.394802] ? __pfx_kthread+0x10/0x10 [ 24.394870] ret_from_fork_asm+0x1a/0x30 [ 24.394918] </TASK> [ 24.394934] [ 24.410676] Allocated by task 270: [ 24.411147] kasan_save_stack+0x45/0x70 [ 24.412391] kasan_save_track+0x18/0x40 [ 24.412717] kasan_save_alloc_info+0x3b/0x50 [ 24.413214] __kasan_kmalloc+0xb7/0xc0 [ 24.413913] __kmalloc_cache_noprof+0x168/0x350 [ 24.414529] kasan_atomics+0x96/0x310 [ 24.415173] kunit_try_run_case+0x1a6/0x480 [ 24.415603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.415830] kthread+0x257/0x310 [ 24.416243] ret_from_fork+0x41/0x80 [ 24.416645] ret_from_fork_asm+0x1a/0x30 [ 24.417080] [ 24.417304] The buggy address belongs to the object at ffff888102314e80 [ 24.417304] which belongs to the cache kmalloc-64 of size 64 [ 24.418142] The buggy address is located 0 bytes to the right of [ 24.418142] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.419847] [ 24.420269] The buggy address belongs to the physical page: [ 24.420983] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.421569] flags: 0x200000000000000(node=0|zone=2) [ 24.421964] page_type: f5(slab) [ 24.422311] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.422949] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.424156] page dumped because: kasan: bad access detected [ 24.424700] [ 24.425193] Memory state around the buggy address: [ 24.425519] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.426209] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.427081] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.427742] ^ [ 24.428364] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.429078] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.429653] ================================================================== [ 24.188084] ================================================================== [ 24.188640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 24.189188] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.189904] [ 24.190170] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.190312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.190353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.190416] Call Trace: [ 24.190472] <TASK> [ 24.190545] dump_stack_lvl+0x73/0xb0 [ 24.190657] print_report+0xd1/0x640 [ 24.190735] ? __virt_addr_valid+0x1db/0x2d0 [ 24.190816] ? kasan_atomics_helper+0x1e13/0x5450 [ 24.190937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.191022] ? kasan_atomics_helper+0x1e13/0x5450 [ 24.191103] kasan_report+0x140/0x180 [ 24.191186] ? kasan_atomics_helper+0x1e13/0x5450 [ 24.191313] kasan_check_range+0x10c/0x1c0 [ 24.191376] __kasan_check_write+0x18/0x20 [ 24.191437] kasan_atomics_helper+0x1e13/0x5450 [ 24.191521] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.191630] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.191732] ? trace_hardirqs_on+0x37/0xe0 [ 24.191826] kasan_atomics+0x1dd/0x310 [ 24.191945] ? __pfx_kasan_atomics+0x10/0x10 [ 24.192055] ? __pfx_read_tsc+0x10/0x10 [ 24.192126] ? ktime_get_ts64+0x84/0x230 [ 24.192214] kunit_try_run_case+0x1a6/0x480 [ 24.192320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.192386] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.192463] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.192549] ? __kthread_parkme+0x82/0x160 [ 24.192623] ? preempt_count_sub+0x50/0x80 [ 24.192704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.192778] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.192863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.192954] kthread+0x257/0x310 [ 24.193022] ? __pfx_kthread+0x10/0x10 [ 24.193090] ret_from_fork+0x41/0x80 [ 24.193160] ? __pfx_kthread+0x10/0x10 [ 24.193217] ret_from_fork_asm+0x1a/0x30 [ 24.193298] </TASK> [ 24.193314] [ 24.206168] Allocated by task 270: [ 24.206547] kasan_save_stack+0x45/0x70 [ 24.207159] kasan_save_track+0x18/0x40 [ 24.207536] kasan_save_alloc_info+0x3b/0x50 [ 24.207876] __kasan_kmalloc+0xb7/0xc0 [ 24.208305] __kmalloc_cache_noprof+0x168/0x350 [ 24.208865] kasan_atomics+0x96/0x310 [ 24.209259] kunit_try_run_case+0x1a6/0x480 [ 24.209640] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.210186] kthread+0x257/0x310 [ 24.210571] ret_from_fork+0x41/0x80 [ 24.210981] ret_from_fork_asm+0x1a/0x30 [ 24.211378] [ 24.211623] The buggy address belongs to the object at ffff888102314e80 [ 24.211623] which belongs to the cache kmalloc-64 of size 64 [ 24.212308] The buggy address is located 0 bytes to the right of [ 24.212308] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.213499] [ 24.213778] The buggy address belongs to the physical page: [ 24.214262] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.214866] flags: 0x200000000000000(node=0|zone=2) [ 24.215287] page_type: f5(slab) [ 24.215580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.216210] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.217086] page dumped because: kasan: bad access detected [ 24.217546] [ 24.217744] Memory state around the buggy address: [ 24.218381] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.218881] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.219361] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.219790] ^ [ 24.220128] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.220774] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.221433] ================================================================== [ 22.836216] ================================================================== [ 22.837842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 22.838392] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.839712] [ 22.840149] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.840293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.840334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.840385] Call Trace: [ 22.840426] <TASK> [ 22.840464] dump_stack_lvl+0x73/0xb0 [ 22.840525] print_report+0xd1/0x640 [ 22.840577] ? __virt_addr_valid+0x1db/0x2d0 [ 22.840631] ? kasan_atomics_helper+0xde1/0x5450 [ 22.840682] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.840740] ? kasan_atomics_helper+0xde1/0x5450 [ 22.840800] kasan_report+0x140/0x180 [ 22.840862] ? kasan_atomics_helper+0xde1/0x5450 [ 22.840927] kasan_check_range+0x10c/0x1c0 [ 22.840975] __kasan_check_write+0x18/0x20 [ 22.841025] kasan_atomics_helper+0xde1/0x5450 [ 22.841081] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.841142] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.841194] ? trace_hardirqs_on+0x37/0xe0 [ 22.841276] kasan_atomics+0x1dd/0x310 [ 22.841330] ? __pfx_kasan_atomics+0x10/0x10 [ 22.841390] ? __pfx_read_tsc+0x10/0x10 [ 22.841622] ? ktime_get_ts64+0x84/0x230 [ 22.841774] kunit_try_run_case+0x1a6/0x480 [ 22.841845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.841905] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.841942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.841982] ? __kthread_parkme+0x82/0x160 [ 22.842012] ? preempt_count_sub+0x50/0x80 [ 22.842045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.842073] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.842111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.842150] kthread+0x257/0x310 [ 22.842178] ? __pfx_kthread+0x10/0x10 [ 22.842206] ret_from_fork+0x41/0x80 [ 22.842277] ? __pfx_kthread+0x10/0x10 [ 22.842319] ret_from_fork_asm+0x1a/0x30 [ 22.842362] </TASK> [ 22.842378] [ 22.857254] Allocated by task 270: [ 22.857621] kasan_save_stack+0x45/0x70 [ 22.857919] kasan_save_track+0x18/0x40 [ 22.858461] kasan_save_alloc_info+0x3b/0x50 [ 22.858856] __kasan_kmalloc+0xb7/0xc0 [ 22.859360] __kmalloc_cache_noprof+0x168/0x350 [ 22.859779] kasan_atomics+0x96/0x310 [ 22.860218] kunit_try_run_case+0x1a6/0x480 [ 22.860676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.861400] kthread+0x257/0x310 [ 22.861838] ret_from_fork+0x41/0x80 [ 22.862074] ret_from_fork_asm+0x1a/0x30 [ 22.864596] [ 22.866410] The buggy address belongs to the object at ffff888102314e80 [ 22.866410] which belongs to the cache kmalloc-64 of size 64 [ 22.867349] The buggy address is located 0 bytes to the right of [ 22.867349] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.868380] [ 22.868593] The buggy address belongs to the physical page: [ 22.869116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.869789] flags: 0x200000000000000(node=0|zone=2) [ 22.870198] page_type: f5(slab) [ 22.870561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.871425] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.872063] page dumped because: kasan: bad access detected [ 22.872539] [ 22.872773] Memory state around the buggy address: [ 22.873214] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.873877] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.874503] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.875110] ^ [ 22.875568] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.876241] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.876793] ================================================================== [ 24.106310] ================================================================== [ 24.107350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 24.108040] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.108487] [ 24.109186] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.109296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.109337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.109400] Call Trace: [ 24.109590] <TASK> [ 24.109644] dump_stack_lvl+0x73/0xb0 [ 24.109691] print_report+0xd1/0x640 [ 24.109728] ? __virt_addr_valid+0x1db/0x2d0 [ 24.109765] ? kasan_atomics_helper+0x1ce2/0x5450 [ 24.109799] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.109855] ? kasan_atomics_helper+0x1ce2/0x5450 [ 24.109902] kasan_report+0x140/0x180 [ 24.109939] ? kasan_atomics_helper+0x1ce2/0x5450 [ 24.109982] kasan_check_range+0x10c/0x1c0 [ 24.110013] __kasan_check_write+0x18/0x20 [ 24.110044] kasan_atomics_helper+0x1ce2/0x5450 [ 24.110082] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.110118] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.110150] ? trace_hardirqs_on+0x37/0xe0 [ 24.110190] kasan_atomics+0x1dd/0x310 [ 24.110220] ? __pfx_kasan_atomics+0x10/0x10 [ 24.110276] ? __pfx_read_tsc+0x10/0x10 [ 24.110306] ? ktime_get_ts64+0x84/0x230 [ 24.110342] kunit_try_run_case+0x1a6/0x480 [ 24.110377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.110407] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.110439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.110476] ? __kthread_parkme+0x82/0x160 [ 24.110503] ? preempt_count_sub+0x50/0x80 [ 24.110537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.110567] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.110605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.110645] kthread+0x257/0x310 [ 24.110673] ? __pfx_kthread+0x10/0x10 [ 24.110700] ret_from_fork+0x41/0x80 [ 24.110730] ? __pfx_kthread+0x10/0x10 [ 24.110757] ret_from_fork_asm+0x1a/0x30 [ 24.110799] </TASK> [ 24.110815] [ 24.129602] Allocated by task 270: [ 24.129982] kasan_save_stack+0x45/0x70 [ 24.130421] kasan_save_track+0x18/0x40 [ 24.130775] kasan_save_alloc_info+0x3b/0x50 [ 24.131712] __kasan_kmalloc+0xb7/0xc0 [ 24.132017] __kmalloc_cache_noprof+0x168/0x350 [ 24.132708] kasan_atomics+0x96/0x310 [ 24.133364] kunit_try_run_case+0x1a6/0x480 [ 24.134026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.134485] kthread+0x257/0x310 [ 24.135309] ret_from_fork+0x41/0x80 [ 24.135579] ret_from_fork_asm+0x1a/0x30 [ 24.136329] [ 24.136690] The buggy address belongs to the object at ffff888102314e80 [ 24.136690] which belongs to the cache kmalloc-64 of size 64 [ 24.137524] The buggy address is located 0 bytes to the right of [ 24.137524] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.138458] [ 24.138736] The buggy address belongs to the physical page: [ 24.139302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.140055] flags: 0x200000000000000(node=0|zone=2) [ 24.140567] page_type: f5(slab) [ 24.141001] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.141623] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.142402] page dumped because: kasan: bad access detected [ 24.142935] [ 24.143223] Memory state around the buggy address: [ 24.143702] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.144343] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.145005] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.145609] ^ [ 24.146125] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.146681] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.147403] ================================================================== [ 24.150054] ================================================================== [ 24.150484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 24.151395] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.152009] [ 24.152335] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.152482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.152523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.152582] Call Trace: [ 24.152637] <TASK> [ 24.152690] dump_stack_lvl+0x73/0xb0 [ 24.152771] print_report+0xd1/0x640 [ 24.152896] ? __virt_addr_valid+0x1db/0x2d0 [ 24.152984] ? kasan_atomics_helper+0x1d7b/0x5450 [ 24.153065] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.153144] ? kasan_atomics_helper+0x1d7b/0x5450 [ 24.153269] kasan_report+0x140/0x180 [ 24.153358] ? kasan_atomics_helper+0x1d7b/0x5450 [ 24.153455] kasan_check_range+0x10c/0x1c0 [ 24.153560] __kasan_check_write+0x18/0x20 [ 24.153665] kasan_atomics_helper+0x1d7b/0x5450 [ 24.153748] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.153792] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.153838] ? trace_hardirqs_on+0x37/0xe0 [ 24.153903] kasan_atomics+0x1dd/0x310 [ 24.153933] ? __pfx_kasan_atomics+0x10/0x10 [ 24.153964] ? __pfx_read_tsc+0x10/0x10 [ 24.153991] ? ktime_get_ts64+0x84/0x230 [ 24.154027] kunit_try_run_case+0x1a6/0x480 [ 24.154061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.154089] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.154119] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.154154] ? __kthread_parkme+0x82/0x160 [ 24.154183] ? preempt_count_sub+0x50/0x80 [ 24.154216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.154275] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.154315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.154353] kthread+0x257/0x310 [ 24.154379] ? __pfx_kthread+0x10/0x10 [ 24.154407] ret_from_fork+0x41/0x80 [ 24.154438] ? __pfx_kthread+0x10/0x10 [ 24.154464] ret_from_fork_asm+0x1a/0x30 [ 24.154506] </TASK> [ 24.154521] [ 24.168459] Allocated by task 270: [ 24.168768] kasan_save_stack+0x45/0x70 [ 24.170453] kasan_save_track+0x18/0x40 [ 24.170775] kasan_save_alloc_info+0x3b/0x50 [ 24.171574] __kasan_kmalloc+0xb7/0xc0 [ 24.172190] __kmalloc_cache_noprof+0x168/0x350 [ 24.172683] kasan_atomics+0x96/0x310 [ 24.173360] kunit_try_run_case+0x1a6/0x480 [ 24.173843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.174352] kthread+0x257/0x310 [ 24.174736] ret_from_fork+0x41/0x80 [ 24.175091] ret_from_fork_asm+0x1a/0x30 [ 24.175445] [ 24.175634] The buggy address belongs to the object at ffff888102314e80 [ 24.175634] which belongs to the cache kmalloc-64 of size 64 [ 24.176719] The buggy address is located 0 bytes to the right of [ 24.176719] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.177547] [ 24.177804] The buggy address belongs to the physical page: [ 24.178372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.179246] flags: 0x200000000000000(node=0|zone=2) [ 24.179687] page_type: f5(slab) [ 24.180320] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.180937] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.181683] page dumped because: kasan: bad access detected [ 24.182251] [ 24.182530] Memory state around the buggy address: [ 24.183029] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.183570] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.184129] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.184965] ^ [ 24.185424] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.185901] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.186627] ================================================================== [ 22.539461] ================================================================== [ 22.539899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 22.541045] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.541653] [ 22.542347] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.542478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.542522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.542579] Call Trace: [ 22.542615] <TASK> [ 22.542654] dump_stack_lvl+0x73/0xb0 [ 22.542699] print_report+0xd1/0x640 [ 22.542735] ? __virt_addr_valid+0x1db/0x2d0 [ 22.542778] ? kasan_atomics_helper+0x993/0x5450 [ 22.542816] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.543053] ? kasan_atomics_helper+0x993/0x5450 [ 22.543095] kasan_report+0x140/0x180 [ 22.543133] ? kasan_atomics_helper+0x993/0x5450 [ 22.543175] kasan_check_range+0x10c/0x1c0 [ 22.543207] __kasan_check_write+0x18/0x20 [ 22.543278] kasan_atomics_helper+0x993/0x5450 [ 22.543316] ? kasan_save_alloc_info+0x3b/0x50 [ 22.543347] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.543385] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.543416] ? trace_hardirqs_on+0x37/0xe0 [ 22.543459] kasan_atomics+0x1dd/0x310 [ 22.543487] ? __pfx_kasan_atomics+0x10/0x10 [ 22.543518] ? __pfx_read_tsc+0x10/0x10 [ 22.543545] ? ktime_get_ts64+0x84/0x230 [ 22.543581] kunit_try_run_case+0x1a6/0x480 [ 22.543614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.543643] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.543674] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.543711] ? __kthread_parkme+0x82/0x160 [ 22.543741] ? preempt_count_sub+0x50/0x80 [ 22.543774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.543804] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.543870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.543913] kthread+0x257/0x310 [ 22.543941] ? __pfx_kthread+0x10/0x10 [ 22.543969] ret_from_fork+0x41/0x80 [ 22.544000] ? __pfx_kthread+0x10/0x10 [ 22.544025] ret_from_fork_asm+0x1a/0x30 [ 22.544067] </TASK> [ 22.544082] [ 22.561028] Allocated by task 270: [ 22.561455] kasan_save_stack+0x45/0x70 [ 22.561940] kasan_save_track+0x18/0x40 [ 22.562381] kasan_save_alloc_info+0x3b/0x50 [ 22.562885] __kasan_kmalloc+0xb7/0xc0 [ 22.563358] __kmalloc_cache_noprof+0x168/0x350 [ 22.564798] kasan_atomics+0x96/0x310 [ 22.565348] kunit_try_run_case+0x1a6/0x480 [ 22.565710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.566203] kthread+0x257/0x310 [ 22.566563] ret_from_fork+0x41/0x80 [ 22.566967] ret_from_fork_asm+0x1a/0x30 [ 22.567421] [ 22.567634] The buggy address belongs to the object at ffff888102314e80 [ 22.567634] which belongs to the cache kmalloc-64 of size 64 [ 22.568603] The buggy address is located 0 bytes to the right of [ 22.568603] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.569526] [ 22.569762] The buggy address belongs to the physical page: [ 22.570214] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.570936] flags: 0x200000000000000(node=0|zone=2) [ 22.571422] page_type: f5(slab) [ 22.571725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.572437] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.573051] page dumped because: kasan: bad access detected [ 22.573552] [ 22.573801] Memory state around the buggy address: [ 22.574314] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.574900] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.575579] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.576137] ^ [ 22.576628] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.577210] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.577794] ================================================================== [ 23.292307] ================================================================== [ 23.293699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 23.294532] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.296139] [ 23.296397] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.296519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.296558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.296635] Call Trace: [ 23.296663] <TASK> [ 23.296715] dump_stack_lvl+0x73/0xb0 [ 23.296769] print_report+0xd1/0x640 [ 23.296806] ? __virt_addr_valid+0x1db/0x2d0 [ 23.296981] ? kasan_atomics_helper+0x12e7/0x5450 [ 23.297024] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.297060] ? kasan_atomics_helper+0x12e7/0x5450 [ 23.297095] kasan_report+0x140/0x180 [ 23.297131] ? kasan_atomics_helper+0x12e7/0x5450 [ 23.297172] kasan_check_range+0x10c/0x1c0 [ 23.297203] __kasan_check_write+0x18/0x20 [ 23.297260] kasan_atomics_helper+0x12e7/0x5450 [ 23.297302] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.297340] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.297371] ? trace_hardirqs_on+0x37/0xe0 [ 23.297409] kasan_atomics+0x1dd/0x310 [ 23.297438] ? __pfx_kasan_atomics+0x10/0x10 [ 23.297471] ? __pfx_read_tsc+0x10/0x10 [ 23.297499] ? ktime_get_ts64+0x84/0x230 [ 23.297535] kunit_try_run_case+0x1a6/0x480 [ 23.297570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.297599] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.297628] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.297665] ? __kthread_parkme+0x82/0x160 [ 23.297694] ? preempt_count_sub+0x50/0x80 [ 23.297726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.297756] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.297795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.297848] kthread+0x257/0x310 [ 23.297904] ? __pfx_kthread+0x10/0x10 [ 23.297932] ret_from_fork+0x41/0x80 [ 23.297963] ? __pfx_kthread+0x10/0x10 [ 23.297990] ret_from_fork_asm+0x1a/0x30 [ 23.298033] </TASK> [ 23.298048] [ 23.315216] Allocated by task 270: [ 23.315520] kasan_save_stack+0x45/0x70 [ 23.315851] kasan_save_track+0x18/0x40 [ 23.316337] kasan_save_alloc_info+0x3b/0x50 [ 23.316810] __kasan_kmalloc+0xb7/0xc0 [ 23.317315] __kmalloc_cache_noprof+0x168/0x350 [ 23.317753] kasan_atomics+0x96/0x310 [ 23.318236] kunit_try_run_case+0x1a6/0x480 [ 23.318668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.319117] kthread+0x257/0x310 [ 23.319522] ret_from_fork+0x41/0x80 [ 23.320029] ret_from_fork_asm+0x1a/0x30 [ 23.320522] [ 23.320793] The buggy address belongs to the object at ffff888102314e80 [ 23.320793] which belongs to the cache kmalloc-64 of size 64 [ 23.321869] The buggy address is located 0 bytes to the right of [ 23.321869] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.322885] [ 23.323123] The buggy address belongs to the physical page: [ 23.323659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.324391] flags: 0x200000000000000(node=0|zone=2) [ 23.324960] page_type: f5(slab) [ 23.325316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.326108] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.326725] page dumped because: kasan: bad access detected [ 23.327287] [ 23.327522] Memory state around the buggy address: [ 23.327977] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.328551] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.329216] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.329781] ^ [ 23.330165] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.330867] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.331565] ================================================================== [ 24.257487] ================================================================== [ 24.260287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 24.260776] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.261247] [ 24.261623] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.261743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.261783] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.261846] Call Trace: [ 24.262803] <TASK> [ 24.262859] dump_stack_lvl+0x73/0xb0 [ 24.262959] print_report+0xd1/0x640 [ 24.263042] ? __virt_addr_valid+0x1db/0x2d0 [ 24.263125] ? kasan_atomics_helper+0x1f44/0x5450 [ 24.263201] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.263312] ? kasan_atomics_helper+0x1f44/0x5450 [ 24.263392] kasan_report+0x140/0x180 [ 24.263475] ? kasan_atomics_helper+0x1f44/0x5450 [ 24.263568] kasan_check_range+0x10c/0x1c0 [ 24.263644] __kasan_check_write+0x18/0x20 [ 24.263719] kasan_atomics_helper+0x1f44/0x5450 [ 24.263770] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.263808] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.264728] ? trace_hardirqs_on+0x37/0xe0 [ 24.264823] kasan_atomics+0x1dd/0x310 [ 24.264899] ? __pfx_kasan_atomics+0x10/0x10 [ 24.264976] ? __pfx_read_tsc+0x10/0x10 [ 24.265048] ? ktime_get_ts64+0x84/0x230 [ 24.265195] kunit_try_run_case+0x1a6/0x480 [ 24.265273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.265305] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.265339] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.265378] ? __kthread_parkme+0x82/0x160 [ 24.265407] ? preempt_count_sub+0x50/0x80 [ 24.265442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.265472] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.265510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.265549] kthread+0x257/0x310 [ 24.265576] ? __pfx_kthread+0x10/0x10 [ 24.265603] ret_from_fork+0x41/0x80 [ 24.265634] ? __pfx_kthread+0x10/0x10 [ 24.265660] ret_from_fork_asm+0x1a/0x30 [ 24.265702] </TASK> [ 24.265718] [ 24.289426] Allocated by task 270: [ 24.290093] kasan_save_stack+0x45/0x70 [ 24.290716] kasan_save_track+0x18/0x40 [ 24.291171] kasan_save_alloc_info+0x3b/0x50 [ 24.291648] __kasan_kmalloc+0xb7/0xc0 [ 24.292074] __kmalloc_cache_noprof+0x168/0x350 [ 24.292583] kasan_atomics+0x96/0x310 [ 24.293099] kunit_try_run_case+0x1a6/0x480 [ 24.293507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.294126] kthread+0x257/0x310 [ 24.294508] ret_from_fork+0x41/0x80 [ 24.295005] ret_from_fork_asm+0x1a/0x30 [ 24.295444] [ 24.295679] The buggy address belongs to the object at ffff888102314e80 [ 24.295679] which belongs to the cache kmalloc-64 of size 64 [ 24.296724] The buggy address is located 0 bytes to the right of [ 24.296724] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.297791] [ 24.298077] The buggy address belongs to the physical page: [ 24.298634] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.299383] flags: 0x200000000000000(node=0|zone=2) [ 24.299799] page_type: f5(slab) [ 24.300276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.300999] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.301626] page dumped because: kasan: bad access detected [ 24.302167] [ 24.302426] Memory state around the buggy address: [ 24.302906] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.303528] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.304150] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.304662] ^ [ 24.305105] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.305792] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.306442] ================================================================== [ 21.892335] ================================================================== [ 21.893542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 21.894235] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 21.895472] [ 21.895695] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.895813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.895850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.895912] Call Trace: [ 21.895949] <TASK> [ 21.896000] dump_stack_lvl+0x73/0xb0 [ 21.896084] print_report+0xd1/0x640 [ 21.896160] ? __virt_addr_valid+0x1db/0x2d0 [ 21.896261] ? kasan_atomics_helper+0x4bbe/0x5450 [ 21.896340] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.896422] ? kasan_atomics_helper+0x4bbe/0x5450 [ 21.896512] kasan_report+0x140/0x180 [ 21.896597] ? kasan_atomics_helper+0x4bbe/0x5450 [ 21.896686] __asan_report_load4_noabort+0x18/0x20 [ 21.896764] kasan_atomics_helper+0x4bbe/0x5450 [ 21.896825] ? kasan_save_alloc_info+0x3b/0x50 [ 21.896936] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.896975] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.897006] ? trace_hardirqs_on+0x37/0xe0 [ 21.897047] kasan_atomics+0x1dd/0x310 [ 21.897076] ? __pfx_kasan_atomics+0x10/0x10 [ 21.897106] ? __pfx_read_tsc+0x10/0x10 [ 21.897133] ? ktime_get_ts64+0x84/0x230 [ 21.897169] kunit_try_run_case+0x1a6/0x480 [ 21.897202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.897259] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.897293] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.897330] ? __kthread_parkme+0x82/0x160 [ 21.897357] ? preempt_count_sub+0x50/0x80 [ 21.897388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.897416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.897466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.897566] kthread+0x257/0x310 [ 21.897602] ? __pfx_kthread+0x10/0x10 [ 21.897630] ret_from_fork+0x41/0x80 [ 21.897660] ? __pfx_kthread+0x10/0x10 [ 21.897684] ret_from_fork_asm+0x1a/0x30 [ 21.897727] </TASK> [ 21.897741] [ 21.915240] Allocated by task 270: [ 21.915882] kasan_save_stack+0x45/0x70 [ 21.916350] kasan_save_track+0x18/0x40 [ 21.917021] kasan_save_alloc_info+0x3b/0x50 [ 21.917656] __kasan_kmalloc+0xb7/0xc0 [ 21.918155] __kmalloc_cache_noprof+0x168/0x350 [ 21.918856] kasan_atomics+0x96/0x310 [ 21.919290] kunit_try_run_case+0x1a6/0x480 [ 21.919902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.920415] kthread+0x257/0x310 [ 21.921055] ret_from_fork+0x41/0x80 [ 21.921646] ret_from_fork_asm+0x1a/0x30 [ 21.922094] [ 21.922373] The buggy address belongs to the object at ffff888102314e80 [ 21.922373] which belongs to the cache kmalloc-64 of size 64 [ 21.923578] The buggy address is located 0 bytes to the right of [ 21.923578] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 21.924971] [ 21.925203] The buggy address belongs to the physical page: [ 21.925994] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 21.926632] flags: 0x200000000000000(node=0|zone=2) [ 21.927362] page_type: f5(slab) [ 21.927869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.928699] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 21.929389] page dumped because: kasan: bad access detected [ 21.929935] [ 21.930142] Memory state around the buggy address: [ 21.930609] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.931136] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.932284] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.933290] ^ [ 21.933910] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.934642] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.935533] ================================================================== [ 23.968982] ================================================================== [ 23.969483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 23.971452] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.972029] [ 23.972629] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.972702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.972743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.972804] Call Trace: [ 23.972858] <TASK> [ 23.973089] dump_stack_lvl+0x73/0xb0 [ 23.973136] print_report+0xd1/0x640 [ 23.973173] ? __virt_addr_valid+0x1db/0x2d0 [ 23.973209] ? kasan_atomics_helper+0x1b23/0x5450 [ 23.973273] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.973310] ? kasan_atomics_helper+0x1b23/0x5450 [ 23.973346] kasan_report+0x140/0x180 [ 23.973383] ? kasan_atomics_helper+0x1b23/0x5450 [ 23.973425] kasan_check_range+0x10c/0x1c0 [ 23.973457] __kasan_check_write+0x18/0x20 [ 23.973488] kasan_atomics_helper+0x1b23/0x5450 [ 23.973525] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.973562] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.973593] ? trace_hardirqs_on+0x37/0xe0 [ 23.973633] kasan_atomics+0x1dd/0x310 [ 23.973663] ? __pfx_kasan_atomics+0x10/0x10 [ 23.973694] ? __pfx_read_tsc+0x10/0x10 [ 23.973722] ? ktime_get_ts64+0x84/0x230 [ 23.973759] kunit_try_run_case+0x1a6/0x480 [ 23.973792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.973829] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.973883] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.973922] ? __kthread_parkme+0x82/0x160 [ 23.973950] ? preempt_count_sub+0x50/0x80 [ 23.973985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.974016] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.974053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.974092] kthread+0x257/0x310 [ 23.974120] ? __pfx_kthread+0x10/0x10 [ 23.974148] ret_from_fork+0x41/0x80 [ 23.974178] ? __pfx_kthread+0x10/0x10 [ 23.974205] ret_from_fork_asm+0x1a/0x30 [ 23.974269] </TASK> [ 23.974286] [ 23.991783] Allocated by task 270: [ 23.992074] kasan_save_stack+0x45/0x70 [ 23.993779] kasan_save_track+0x18/0x40 [ 23.994598] kasan_save_alloc_info+0x3b/0x50 [ 23.996266] __kasan_kmalloc+0xb7/0xc0 [ 23.996953] __kmalloc_cache_noprof+0x168/0x350 [ 23.997469] kasan_atomics+0x96/0x310 [ 23.997846] kunit_try_run_case+0x1a6/0x480 [ 23.998305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.998793] kthread+0x257/0x310 [ 23.999515] ret_from_fork+0x41/0x80 [ 23.999841] ret_from_fork_asm+0x1a/0x30 [ 24.000567] [ 24.001016] The buggy address belongs to the object at ffff888102314e80 [ 24.001016] which belongs to the cache kmalloc-64 of size 64 [ 24.001622] The buggy address is located 0 bytes to the right of [ 24.001622] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.003052] [ 24.003410] The buggy address belongs to the physical page: [ 24.004239] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.005072] flags: 0x200000000000000(node=0|zone=2) [ 24.005456] page_type: f5(slab) [ 24.005722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.007303] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.007760] page dumped because: kasan: bad access detected [ 24.008095] [ 24.009542] Memory state around the buggy address: [ 24.011398] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.011872] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.012489] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.014215] ^ [ 24.014569] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.014996] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.015402] ================================================================== [ 23.455139] ================================================================== [ 23.455719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 23.456724] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.457581] [ 23.457966] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.458118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.458160] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.458239] Call Trace: [ 23.458296] <TASK> [ 23.458348] dump_stack_lvl+0x73/0xb0 [ 23.458440] print_report+0xd1/0x640 [ 23.458604] ? __virt_addr_valid+0x1db/0x2d0 [ 23.458694] ? kasan_atomics_helper+0x1468/0x5450 [ 23.458747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.458785] ? kasan_atomics_helper+0x1468/0x5450 [ 23.458849] kasan_report+0x140/0x180 [ 23.458905] ? kasan_atomics_helper+0x1468/0x5450 [ 23.458949] kasan_check_range+0x10c/0x1c0 [ 23.458981] __kasan_check_write+0x18/0x20 [ 23.459012] kasan_atomics_helper+0x1468/0x5450 [ 23.459051] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.459087] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.459119] ? trace_hardirqs_on+0x37/0xe0 [ 23.459157] kasan_atomics+0x1dd/0x310 [ 23.459186] ? __pfx_kasan_atomics+0x10/0x10 [ 23.459216] ? __pfx_read_tsc+0x10/0x10 [ 23.459284] ? ktime_get_ts64+0x84/0x230 [ 23.459324] kunit_try_run_case+0x1a6/0x480 [ 23.459359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.459389] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.459419] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.459456] ? __kthread_parkme+0x82/0x160 [ 23.459484] ? preempt_count_sub+0x50/0x80 [ 23.459516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.459546] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.459583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.459623] kthread+0x257/0x310 [ 23.459653] ? __pfx_kthread+0x10/0x10 [ 23.459683] ret_from_fork+0x41/0x80 [ 23.459715] ? __pfx_kthread+0x10/0x10 [ 23.459742] ret_from_fork_asm+0x1a/0x30 [ 23.459784] </TASK> [ 23.459800] [ 23.475527] Allocated by task 270: [ 23.476022] kasan_save_stack+0x45/0x70 [ 23.476711] kasan_save_track+0x18/0x40 [ 23.477289] kasan_save_alloc_info+0x3b/0x50 [ 23.477909] __kasan_kmalloc+0xb7/0xc0 [ 23.478341] __kmalloc_cache_noprof+0x168/0x350 [ 23.478890] kasan_atomics+0x96/0x310 [ 23.481953] kunit_try_run_case+0x1a6/0x480 [ 23.483087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.484242] kthread+0x257/0x310 [ 23.485172] ret_from_fork+0x41/0x80 [ 23.486390] ret_from_fork_asm+0x1a/0x30 [ 23.487266] [ 23.487450] The buggy address belongs to the object at ffff888102314e80 [ 23.487450] which belongs to the cache kmalloc-64 of size 64 [ 23.488067] The buggy address is located 0 bytes to the right of [ 23.488067] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.492162] [ 23.492478] The buggy address belongs to the physical page: [ 23.493574] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.494174] flags: 0x200000000000000(node=0|zone=2) [ 23.494662] page_type: f5(slab) [ 23.495095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.495848] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.496873] page dumped because: kasan: bad access detected [ 23.497387] [ 23.497548] Memory state around the buggy address: [ 23.498645] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.499370] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.499930] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.500725] ^ [ 23.501801] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.502707] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.503452] ================================================================== [ 24.307710] ================================================================== [ 24.308347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 24.309053] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.309636] [ 24.309993] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.310113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.310174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.310275] Call Trace: [ 24.310333] <TASK> [ 24.310383] dump_stack_lvl+0x73/0xb0 [ 24.310467] print_report+0xd1/0x640 [ 24.310547] ? __virt_addr_valid+0x1db/0x2d0 [ 24.310630] ? kasan_atomics_helper+0x4f73/0x5450 [ 24.310710] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.310792] ? kasan_atomics_helper+0x4f73/0x5450 [ 24.310954] kasan_report+0x140/0x180 [ 24.311038] ? kasan_atomics_helper+0x4f73/0x5450 [ 24.311134] __asan_report_load8_noabort+0x18/0x20 [ 24.311211] kasan_atomics_helper+0x4f73/0x5450 [ 24.311324] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.311411] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.311506] ? trace_hardirqs_on+0x37/0xe0 [ 24.311624] kasan_atomics+0x1dd/0x310 [ 24.311746] ? __pfx_kasan_atomics+0x10/0x10 [ 24.311864] ? __pfx_read_tsc+0x10/0x10 [ 24.311937] ? ktime_get_ts64+0x84/0x230 [ 24.312011] kunit_try_run_case+0x1a6/0x480 [ 24.312048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.312080] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.312112] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.312148] ? __kthread_parkme+0x82/0x160 [ 24.312176] ? preempt_count_sub+0x50/0x80 [ 24.312208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.312266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.312307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.312344] kthread+0x257/0x310 [ 24.312371] ? __pfx_kthread+0x10/0x10 [ 24.312398] ret_from_fork+0x41/0x80 [ 24.312428] ? __pfx_kthread+0x10/0x10 [ 24.312454] ret_from_fork_asm+0x1a/0x30 [ 24.312495] </TASK> [ 24.312510] [ 24.325723] Allocated by task 270: [ 24.326164] kasan_save_stack+0x45/0x70 [ 24.326729] kasan_save_track+0x18/0x40 [ 24.327183] kasan_save_alloc_info+0x3b/0x50 [ 24.327710] __kasan_kmalloc+0xb7/0xc0 [ 24.328113] __kmalloc_cache_noprof+0x168/0x350 [ 24.328645] kasan_atomics+0x96/0x310 [ 24.329092] kunit_try_run_case+0x1a6/0x480 [ 24.329569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.330004] kthread+0x257/0x310 [ 24.330323] ret_from_fork+0x41/0x80 [ 24.330722] ret_from_fork_asm+0x1a/0x30 [ 24.331219] [ 24.331583] The buggy address belongs to the object at ffff888102314e80 [ 24.331583] which belongs to the cache kmalloc-64 of size 64 [ 24.332674] The buggy address is located 0 bytes to the right of [ 24.332674] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.333704] [ 24.333935] The buggy address belongs to the physical page: [ 24.334322] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.335093] flags: 0x200000000000000(node=0|zone=2) [ 24.335636] page_type: f5(slab) [ 24.336114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.336865] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.337560] page dumped because: kasan: bad access detected [ 24.338075] [ 24.338410] Memory state around the buggy address: [ 24.339631] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.340156] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.340679] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.341198] ^ [ 24.342529] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.343214] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.343913] ================================================================== [ 23.668114] ================================================================== [ 23.668641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 23.669543] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.670219] [ 23.670666] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.670784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.670821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.671038] Call Trace: [ 23.671442] <TASK> [ 23.671506] dump_stack_lvl+0x73/0xb0 [ 23.671621] print_report+0xd1/0x640 [ 23.671663] ? __virt_addr_valid+0x1db/0x2d0 [ 23.671719] ? kasan_atomics_helper+0x16e8/0x5450 [ 23.671759] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.671795] ? kasan_atomics_helper+0x16e8/0x5450 [ 23.671850] kasan_report+0x140/0x180 [ 23.671896] ? kasan_atomics_helper+0x16e8/0x5450 [ 23.671940] kasan_check_range+0x10c/0x1c0 [ 23.671971] __kasan_check_write+0x18/0x20 [ 23.672002] kasan_atomics_helper+0x16e8/0x5450 [ 23.672039] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.672076] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.672107] ? trace_hardirqs_on+0x37/0xe0 [ 23.672146] kasan_atomics+0x1dd/0x310 [ 23.672175] ? __pfx_kasan_atomics+0x10/0x10 [ 23.672206] ? __pfx_read_tsc+0x10/0x10 [ 23.672257] ? ktime_get_ts64+0x84/0x230 [ 23.672299] kunit_try_run_case+0x1a6/0x480 [ 23.672335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.672366] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.672397] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.672435] ? __kthread_parkme+0x82/0x160 [ 23.672463] ? preempt_count_sub+0x50/0x80 [ 23.672495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.672523] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.672562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.672599] kthread+0x257/0x310 [ 23.672625] ? __pfx_kthread+0x10/0x10 [ 23.672653] ret_from_fork+0x41/0x80 [ 23.672683] ? __pfx_kthread+0x10/0x10 [ 23.672710] ret_from_fork_asm+0x1a/0x30 [ 23.672753] </TASK> [ 23.672768] [ 23.689775] Allocated by task 270: [ 23.690160] kasan_save_stack+0x45/0x70 [ 23.690552] kasan_save_track+0x18/0x40 [ 23.690923] kasan_save_alloc_info+0x3b/0x50 [ 23.692214] __kasan_kmalloc+0xb7/0xc0 [ 23.692777] __kmalloc_cache_noprof+0x168/0x350 [ 23.693413] kasan_atomics+0x96/0x310 [ 23.694045] kunit_try_run_case+0x1a6/0x480 [ 23.694512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.695246] kthread+0x257/0x310 [ 23.695665] ret_from_fork+0x41/0x80 [ 23.695988] ret_from_fork_asm+0x1a/0x30 [ 23.696466] [ 23.696693] The buggy address belongs to the object at ffff888102314e80 [ 23.696693] which belongs to the cache kmalloc-64 of size 64 [ 23.697702] The buggy address is located 0 bytes to the right of [ 23.697702] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.698803] [ 23.699072] The buggy address belongs to the physical page: [ 23.699633] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.700371] flags: 0x200000000000000(node=0|zone=2) [ 23.700800] page_type: f5(slab) [ 23.701177] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.701884] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.702493] page dumped because: kasan: bad access detected [ 23.703106] [ 23.703385] Memory state around the buggy address: [ 23.703834] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.704478] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.705273] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.705843] ^ [ 23.706381] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.707012] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.708029] ================================================================== [ 22.664127] ================================================================== [ 22.665286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 22.665867] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.667089] [ 22.667206] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.667343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.667386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.667453] Call Trace: [ 22.667506] <TASK> [ 22.667562] dump_stack_lvl+0x73/0xb0 [ 22.667654] print_report+0xd1/0x640 [ 22.667741] ? __virt_addr_valid+0x1db/0x2d0 [ 22.667838] ? kasan_atomics_helper+0xb6b/0x5450 [ 22.667924] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.668012] ? kasan_atomics_helper+0xb6b/0x5450 [ 22.668064] kasan_report+0x140/0x180 [ 22.668104] ? kasan_atomics_helper+0xb6b/0x5450 [ 22.668147] kasan_check_range+0x10c/0x1c0 [ 22.668178] __kasan_check_write+0x18/0x20 [ 22.668210] kasan_atomics_helper+0xb6b/0x5450 [ 22.668272] ? kasan_save_alloc_info+0x3b/0x50 [ 22.668304] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.668342] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.668373] ? trace_hardirqs_on+0x37/0xe0 [ 22.668413] kasan_atomics+0x1dd/0x310 [ 22.668444] ? __pfx_kasan_atomics+0x10/0x10 [ 22.668474] ? __pfx_read_tsc+0x10/0x10 [ 22.668502] ? ktime_get_ts64+0x84/0x230 [ 22.668538] kunit_try_run_case+0x1a6/0x480 [ 22.668573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.668602] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.668632] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.668670] ? __kthread_parkme+0x82/0x160 [ 22.668698] ? preempt_count_sub+0x50/0x80 [ 22.668729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.668758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.668795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.668857] kthread+0x257/0x310 [ 22.668890] ? __pfx_kthread+0x10/0x10 [ 22.668918] ret_from_fork+0x41/0x80 [ 22.668948] ? __pfx_kthread+0x10/0x10 [ 22.668975] ret_from_fork_asm+0x1a/0x30 [ 22.669016] </TASK> [ 22.669031] [ 22.691639] Allocated by task 270: [ 22.692484] kasan_save_stack+0x45/0x70 [ 22.693094] kasan_save_track+0x18/0x40 [ 22.693549] kasan_save_alloc_info+0x3b/0x50 [ 22.693927] __kasan_kmalloc+0xb7/0xc0 [ 22.694346] __kmalloc_cache_noprof+0x168/0x350 [ 22.694730] kasan_atomics+0x96/0x310 [ 22.695217] kunit_try_run_case+0x1a6/0x480 [ 22.696270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.696924] kthread+0x257/0x310 [ 22.697438] ret_from_fork+0x41/0x80 [ 22.697973] ret_from_fork_asm+0x1a/0x30 [ 22.698536] [ 22.698931] The buggy address belongs to the object at ffff888102314e80 [ 22.698931] which belongs to the cache kmalloc-64 of size 64 [ 22.700212] The buggy address is located 0 bytes to the right of [ 22.700212] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.701158] [ 22.701442] The buggy address belongs to the physical page: [ 22.701970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.702645] flags: 0x200000000000000(node=0|zone=2) [ 22.703165] page_type: f5(slab) [ 22.703502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.704201] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.704882] page dumped because: kasan: bad access detected [ 22.705439] [ 22.705801] Memory state around the buggy address: [ 22.706315] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.707001] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.708154] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.708784] ^ [ 22.709742] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.710350] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.710965] ================================================================== [ 23.759312] ================================================================== [ 23.760093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 23.761689] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.762443] [ 23.762729] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.762889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.762935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.762997] Call Trace: [ 23.763093] <TASK> [ 23.763147] dump_stack_lvl+0x73/0xb0 [ 23.763266] print_report+0xd1/0x640 [ 23.763347] ? __virt_addr_valid+0x1db/0x2d0 [ 23.763388] ? kasan_atomics_helper+0x1819/0x5450 [ 23.763423] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.763457] ? kasan_atomics_helper+0x1819/0x5450 [ 23.763528] kasan_report+0x140/0x180 [ 23.763582] ? kasan_atomics_helper+0x1819/0x5450 [ 23.763630] kasan_check_range+0x10c/0x1c0 [ 23.763663] __kasan_check_write+0x18/0x20 [ 23.763695] kasan_atomics_helper+0x1819/0x5450 [ 23.763732] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.763769] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.763802] ? trace_hardirqs_on+0x37/0xe0 [ 23.763887] kasan_atomics+0x1dd/0x310 [ 23.763920] ? __pfx_kasan_atomics+0x10/0x10 [ 23.763951] ? __pfx_read_tsc+0x10/0x10 [ 23.763980] ? ktime_get_ts64+0x84/0x230 [ 23.764017] kunit_try_run_case+0x1a6/0x480 [ 23.764052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.764082] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.764112] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.764149] ? __kthread_parkme+0x82/0x160 [ 23.764177] ? preempt_count_sub+0x50/0x80 [ 23.764208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.764268] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.764310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.764349] kthread+0x257/0x310 [ 23.764376] ? __pfx_kthread+0x10/0x10 [ 23.764403] ret_from_fork+0x41/0x80 [ 23.764433] ? __pfx_kthread+0x10/0x10 [ 23.764460] ret_from_fork_asm+0x1a/0x30 [ 23.764503] </TASK> [ 23.764518] [ 23.779792] Allocated by task 270: [ 23.780297] kasan_save_stack+0x45/0x70 [ 23.780766] kasan_save_track+0x18/0x40 [ 23.781188] kasan_save_alloc_info+0x3b/0x50 [ 23.781711] __kasan_kmalloc+0xb7/0xc0 [ 23.782214] __kmalloc_cache_noprof+0x168/0x350 [ 23.782744] kasan_atomics+0x96/0x310 [ 23.783190] kunit_try_run_case+0x1a6/0x480 [ 23.783668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.784257] kthread+0x257/0x310 [ 23.784569] ret_from_fork+0x41/0x80 [ 23.784937] ret_from_fork_asm+0x1a/0x30 [ 23.785280] [ 23.785522] The buggy address belongs to the object at ffff888102314e80 [ 23.785522] which belongs to the cache kmalloc-64 of size 64 [ 23.786681] The buggy address is located 0 bytes to the right of [ 23.786681] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.787723] [ 23.787966] The buggy address belongs to the physical page: [ 23.788376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.789113] flags: 0x200000000000000(node=0|zone=2) [ 23.789664] page_type: f5(slab) [ 23.790123] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.790876] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.791398] page dumped because: kasan: bad access detected [ 23.791982] [ 23.792283] Memory state around the buggy address: [ 23.792719] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.793219] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.793935] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.794590] ^ [ 23.795121] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.795655] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.796108] ================================================================== [ 22.963962] ================================================================== [ 22.965327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 22.966692] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.967758] [ 22.968000] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.968110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.968153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.968217] Call Trace: [ 22.968443] <TASK> [ 22.968472] dump_stack_lvl+0x73/0xb0 [ 22.968518] print_report+0xd1/0x640 [ 22.968555] ? __virt_addr_valid+0x1db/0x2d0 [ 22.968592] ? kasan_atomics_helper+0xfaa/0x5450 [ 22.968626] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.968660] ? kasan_atomics_helper+0xfaa/0x5450 [ 22.968694] kasan_report+0x140/0x180 [ 22.968730] ? kasan_atomics_helper+0xfaa/0x5450 [ 22.968771] kasan_check_range+0x10c/0x1c0 [ 22.968802] __kasan_check_write+0x18/0x20 [ 22.968855] kasan_atomics_helper+0xfaa/0x5450 [ 22.968903] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.968941] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.968973] ? trace_hardirqs_on+0x37/0xe0 [ 22.969014] kasan_atomics+0x1dd/0x310 [ 22.969044] ? __pfx_kasan_atomics+0x10/0x10 [ 22.969076] ? __pfx_read_tsc+0x10/0x10 [ 22.969106] ? ktime_get_ts64+0x84/0x230 [ 22.969143] kunit_try_run_case+0x1a6/0x480 [ 22.969178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.969207] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.969272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.969312] ? __kthread_parkme+0x82/0x160 [ 22.969341] ? preempt_count_sub+0x50/0x80 [ 22.969373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.969403] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.969442] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.969481] kthread+0x257/0x310 [ 22.969508] ? __pfx_kthread+0x10/0x10 [ 22.969535] ret_from_fork+0x41/0x80 [ 22.969567] ? __pfx_kthread+0x10/0x10 [ 22.969594] ret_from_fork_asm+0x1a/0x30 [ 22.969636] </TASK> [ 22.969651] [ 22.987199] Allocated by task 270: [ 22.987632] kasan_save_stack+0x45/0x70 [ 22.988070] kasan_save_track+0x18/0x40 [ 22.988524] kasan_save_alloc_info+0x3b/0x50 [ 22.988903] __kasan_kmalloc+0xb7/0xc0 [ 22.989322] __kmalloc_cache_noprof+0x168/0x350 [ 22.989888] kasan_atomics+0x96/0x310 [ 22.990345] kunit_try_run_case+0x1a6/0x480 [ 22.990738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.991201] kthread+0x257/0x310 [ 22.991628] ret_from_fork+0x41/0x80 [ 22.992112] ret_from_fork_asm+0x1a/0x30 [ 22.992607] [ 22.992887] The buggy address belongs to the object at ffff888102314e80 [ 22.992887] which belongs to the cache kmalloc-64 of size 64 [ 22.993886] The buggy address is located 0 bytes to the right of [ 22.993886] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.994906] [ 22.995137] The buggy address belongs to the physical page: [ 22.995685] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.996415] flags: 0x200000000000000(node=0|zone=2) [ 22.996901] page_type: f5(slab) [ 22.997267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.997992] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.998672] page dumped because: kasan: bad access detected [ 22.999271] [ 22.999538] Memory state around the buggy address: [ 22.999990] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.000593] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.001208] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.001804] ^ [ 23.002352] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.002915] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.003583] ================================================================== [ 22.712947] ================================================================== [ 22.713636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 22.714376] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.715093] [ 22.715413] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.715570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.715616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.715680] Call Trace: [ 22.715769] <TASK> [ 22.715825] dump_stack_lvl+0x73/0xb0 [ 22.715912] print_report+0xd1/0x640 [ 22.715993] ? __virt_addr_valid+0x1db/0x2d0 [ 22.716076] ? kasan_atomics_helper+0xc71/0x5450 [ 22.716151] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.716252] ? kasan_atomics_helper+0xc71/0x5450 [ 22.716377] kasan_report+0x140/0x180 [ 22.716491] ? kasan_atomics_helper+0xc71/0x5450 [ 22.716594] kasan_check_range+0x10c/0x1c0 [ 22.716675] __kasan_check_write+0x18/0x20 [ 22.716750] kasan_atomics_helper+0xc71/0x5450 [ 22.716833] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.716925] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.716964] ? trace_hardirqs_on+0x37/0xe0 [ 22.717005] kasan_atomics+0x1dd/0x310 [ 22.717034] ? __pfx_kasan_atomics+0x10/0x10 [ 22.717067] ? __pfx_read_tsc+0x10/0x10 [ 22.717096] ? ktime_get_ts64+0x84/0x230 [ 22.717132] kunit_try_run_case+0x1a6/0x480 [ 22.717166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.717196] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.717255] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.717299] ? __kthread_parkme+0x82/0x160 [ 22.717328] ? preempt_count_sub+0x50/0x80 [ 22.717361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.717391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.717429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.717469] kthread+0x257/0x310 [ 22.717495] ? __pfx_kthread+0x10/0x10 [ 22.717523] ret_from_fork+0x41/0x80 [ 22.717553] ? __pfx_kthread+0x10/0x10 [ 22.717582] ret_from_fork_asm+0x1a/0x30 [ 22.717624] </TASK> [ 22.717639] [ 22.732427] Allocated by task 270: [ 22.732881] kasan_save_stack+0x45/0x70 [ 22.733390] kasan_save_track+0x18/0x40 [ 22.733963] kasan_save_alloc_info+0x3b/0x50 [ 22.734508] __kasan_kmalloc+0xb7/0xc0 [ 22.735014] __kmalloc_cache_noprof+0x168/0x350 [ 22.735631] kasan_atomics+0x96/0x310 [ 22.736098] kunit_try_run_case+0x1a6/0x480 [ 22.736570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.737380] kthread+0x257/0x310 [ 22.737749] ret_from_fork+0x41/0x80 [ 22.738478] ret_from_fork_asm+0x1a/0x30 [ 22.739679] [ 22.740931] The buggy address belongs to the object at ffff888102314e80 [ 22.740931] which belongs to the cache kmalloc-64 of size 64 [ 22.741655] The buggy address is located 0 bytes to the right of [ 22.741655] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.743135] [ 22.743473] The buggy address belongs to the physical page: [ 22.744003] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.744779] flags: 0x200000000000000(node=0|zone=2) [ 22.745295] page_type: f5(slab) [ 22.745687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.746336] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.746964] page dumped because: kasan: bad access detected [ 22.747418] [ 22.747648] Memory state around the buggy address: [ 22.748120] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.748621] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.749177] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.749760] ^ [ 22.750274] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.750911] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.751474] ================================================================== [ 23.120605] ================================================================== [ 23.121459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 23.122002] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.122737] [ 23.122929] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.123028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.123060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.123109] Call Trace: [ 23.123157] <TASK> [ 23.123201] dump_stack_lvl+0x73/0xb0 [ 23.123341] print_report+0xd1/0x640 [ 23.123425] ? __virt_addr_valid+0x1db/0x2d0 [ 23.123548] ? kasan_atomics_helper+0x1149/0x5450 [ 23.123636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.123716] ? kasan_atomics_helper+0x1149/0x5450 [ 23.123797] kasan_report+0x140/0x180 [ 23.123901] ? kasan_atomics_helper+0x1149/0x5450 [ 23.124035] kasan_check_range+0x10c/0x1c0 [ 23.124116] __kasan_check_write+0x18/0x20 [ 23.124246] kasan_atomics_helper+0x1149/0x5450 [ 23.124338] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.124425] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.124502] ? trace_hardirqs_on+0x37/0xe0 [ 23.124636] kasan_atomics+0x1dd/0x310 [ 23.124715] ? __pfx_kasan_atomics+0x10/0x10 [ 23.124784] ? __pfx_read_tsc+0x10/0x10 [ 23.124821] ? ktime_get_ts64+0x84/0x230 [ 23.124905] kunit_try_run_case+0x1a6/0x480 [ 23.124984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.125103] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.125204] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.125310] ? __kthread_parkme+0x82/0x160 [ 23.125419] ? preempt_count_sub+0x50/0x80 [ 23.125507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.125580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.125663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.125716] kthread+0x257/0x310 [ 23.125744] ? __pfx_kthread+0x10/0x10 [ 23.125774] ret_from_fork+0x41/0x80 [ 23.125805] ? __pfx_kthread+0x10/0x10 [ 23.125864] ret_from_fork_asm+0x1a/0x30 [ 23.125915] </TASK> [ 23.125932] [ 23.140625] Allocated by task 270: [ 23.141001] kasan_save_stack+0x45/0x70 [ 23.141481] kasan_save_track+0x18/0x40 [ 23.142280] kasan_save_alloc_info+0x3b/0x50 [ 23.142927] __kasan_kmalloc+0xb7/0xc0 [ 23.143454] __kmalloc_cache_noprof+0x168/0x350 [ 23.143864] kasan_atomics+0x96/0x310 [ 23.144297] kunit_try_run_case+0x1a6/0x480 [ 23.144637] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.145416] kthread+0x257/0x310 [ 23.145818] ret_from_fork+0x41/0x80 [ 23.146338] ret_from_fork_asm+0x1a/0x30 [ 23.146891] [ 23.147167] The buggy address belongs to the object at ffff888102314e80 [ 23.147167] which belongs to the cache kmalloc-64 of size 64 [ 23.148310] The buggy address is located 0 bytes to the right of [ 23.148310] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.149369] [ 23.149561] The buggy address belongs to the physical page: [ 23.150006] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.150801] flags: 0x200000000000000(node=0|zone=2) [ 23.151394] page_type: f5(slab) [ 23.151915] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.152683] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.153522] page dumped because: kasan: bad access detected [ 23.154091] [ 23.154308] Memory state around the buggy address: [ 23.154647] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.155155] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.155875] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.156755] ^ [ 23.157684] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.158458] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.158896] ================================================================== [ 23.247152] ================================================================== [ 23.248723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 23.249514] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.250136] [ 23.250453] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.250580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.250625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.250707] Call Trace: [ 23.250788] <TASK> [ 23.250875] dump_stack_lvl+0x73/0xb0 [ 23.250926] print_report+0xd1/0x640 [ 23.250963] ? __virt_addr_valid+0x1db/0x2d0 [ 23.251045] ? kasan_atomics_helper+0x49ea/0x5450 [ 23.251123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.251206] ? kasan_atomics_helper+0x49ea/0x5450 [ 23.251323] kasan_report+0x140/0x180 [ 23.251449] ? kasan_atomics_helper+0x49ea/0x5450 [ 23.251583] __asan_report_load4_noabort+0x18/0x20 [ 23.251659] kasan_atomics_helper+0x49ea/0x5450 [ 23.251717] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.251757] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.251791] ? trace_hardirqs_on+0x37/0xe0 [ 23.251870] kasan_atomics+0x1dd/0x310 [ 23.251909] ? __pfx_kasan_atomics+0x10/0x10 [ 23.251941] ? __pfx_read_tsc+0x10/0x10 [ 23.251970] ? ktime_get_ts64+0x84/0x230 [ 23.252006] kunit_try_run_case+0x1a6/0x480 [ 23.252041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.252071] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.252101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.252139] ? __kthread_parkme+0x82/0x160 [ 23.252168] ? preempt_count_sub+0x50/0x80 [ 23.252202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.252260] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.252303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.252343] kthread+0x257/0x310 [ 23.252370] ? __pfx_kthread+0x10/0x10 [ 23.252397] ret_from_fork+0x41/0x80 [ 23.252427] ? __pfx_kthread+0x10/0x10 [ 23.252454] ret_from_fork_asm+0x1a/0x30 [ 23.252499] </TASK> [ 23.252514] [ 23.270636] Allocated by task 270: [ 23.271296] kasan_save_stack+0x45/0x70 [ 23.271687] kasan_save_track+0x18/0x40 [ 23.272485] kasan_save_alloc_info+0x3b/0x50 [ 23.273140] __kasan_kmalloc+0xb7/0xc0 [ 23.273687] __kmalloc_cache_noprof+0x168/0x350 [ 23.274246] kasan_atomics+0x96/0x310 [ 23.274709] kunit_try_run_case+0x1a6/0x480 [ 23.275321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.275858] kthread+0x257/0x310 [ 23.276338] ret_from_fork+0x41/0x80 [ 23.276682] ret_from_fork_asm+0x1a/0x30 [ 23.277110] [ 23.277593] The buggy address belongs to the object at ffff888102314e80 [ 23.277593] which belongs to the cache kmalloc-64 of size 64 [ 23.279119] The buggy address is located 0 bytes to the right of [ 23.279119] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.280654] [ 23.280843] The buggy address belongs to the physical page: [ 23.281451] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.282615] flags: 0x200000000000000(node=0|zone=2) [ 23.282922] page_type: f5(slab) [ 23.283470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.284559] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.285119] page dumped because: kasan: bad access detected [ 23.285753] [ 23.286201] Memory state around the buggy address: [ 23.286729] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.288018] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.288521] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.289438] ^ [ 23.289756] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.290733] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.291302] ================================================================== [ 23.544666] ================================================================== [ 23.545278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 23.545962] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.546689] [ 23.546952] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.547098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.547172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.547272] Call Trace: [ 23.547335] <TASK> [ 23.547387] dump_stack_lvl+0x73/0xb0 [ 23.547518] print_report+0xd1/0x640 [ 23.547602] ? __virt_addr_valid+0x1db/0x2d0 [ 23.547642] ? kasan_atomics_helper+0x151e/0x5450 [ 23.547679] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.547713] ? kasan_atomics_helper+0x151e/0x5450 [ 23.547773] kasan_report+0x140/0x180 [ 23.547839] ? kasan_atomics_helper+0x151e/0x5450 [ 23.547941] kasan_check_range+0x10c/0x1c0 [ 23.548016] __kasan_check_write+0x18/0x20 [ 23.548111] kasan_atomics_helper+0x151e/0x5450 [ 23.548246] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.548336] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.548414] ? trace_hardirqs_on+0x37/0xe0 [ 23.548504] kasan_atomics+0x1dd/0x310 [ 23.548576] ? __pfx_kasan_atomics+0x10/0x10 [ 23.548646] ? __pfx_read_tsc+0x10/0x10 [ 23.548717] ? ktime_get_ts64+0x84/0x230 [ 23.548798] kunit_try_run_case+0x1a6/0x480 [ 23.548884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.548957] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.549052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.549163] ? __kthread_parkme+0x82/0x160 [ 23.549254] ? preempt_count_sub+0x50/0x80 [ 23.549337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.549407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.549490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.549574] kthread+0x257/0x310 [ 23.549643] ? __pfx_kthread+0x10/0x10 [ 23.549711] ret_from_fork+0x41/0x80 [ 23.549778] ? __pfx_kthread+0x10/0x10 [ 23.549808] ret_from_fork_asm+0x1a/0x30 [ 23.549888] </TASK> [ 23.549904] [ 23.565095] Allocated by task 270: [ 23.565723] kasan_save_stack+0x45/0x70 [ 23.566262] kasan_save_track+0x18/0x40 [ 23.566726] kasan_save_alloc_info+0x3b/0x50 [ 23.567350] __kasan_kmalloc+0xb7/0xc0 [ 23.567668] __kmalloc_cache_noprof+0x168/0x350 [ 23.568135] kasan_atomics+0x96/0x310 [ 23.568595] kunit_try_run_case+0x1a6/0x480 [ 23.569109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.569659] kthread+0x257/0x310 [ 23.570220] ret_from_fork+0x41/0x80 [ 23.570644] ret_from_fork_asm+0x1a/0x30 [ 23.571142] [ 23.571440] The buggy address belongs to the object at ffff888102314e80 [ 23.571440] which belongs to the cache kmalloc-64 of size 64 [ 23.572417] The buggy address is located 0 bytes to the right of [ 23.572417] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.573565] [ 23.573845] The buggy address belongs to the physical page: [ 23.574380] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.575050] flags: 0x200000000000000(node=0|zone=2) [ 23.575561] page_type: f5(slab) [ 23.575966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.576542] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.577176] page dumped because: kasan: bad access detected [ 23.577706] [ 23.577985] Memory state around the buggy address: [ 23.578494] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.579163] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.579839] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.580405] ^ [ 23.580886] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.581638] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.582413] ================================================================== [ 23.921834] ================================================================== [ 23.922536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 23.923246] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.924598] [ 23.924856] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.925033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.925069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.925118] Call Trace: [ 23.925168] <TASK> [ 23.925219] dump_stack_lvl+0x73/0xb0 [ 23.925382] print_report+0xd1/0x640 [ 23.925521] ? __virt_addr_valid+0x1db/0x2d0 [ 23.925663] ? kasan_atomics_helper+0x1a80/0x5450 [ 23.925751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.925884] ? kasan_atomics_helper+0x1a80/0x5450 [ 23.925974] kasan_report+0x140/0x180 [ 23.926062] ? kasan_atomics_helper+0x1a80/0x5450 [ 23.926157] kasan_check_range+0x10c/0x1c0 [ 23.926248] __kasan_check_write+0x18/0x20 [ 23.926327] kasan_atomics_helper+0x1a80/0x5450 [ 23.926413] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.926496] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.926571] ? trace_hardirqs_on+0x37/0xe0 [ 23.926659] kasan_atomics+0x1dd/0x310 [ 23.926735] ? __pfx_kasan_atomics+0x10/0x10 [ 23.926876] ? __pfx_read_tsc+0x10/0x10 [ 23.926955] ? ktime_get_ts64+0x84/0x230 [ 23.927101] kunit_try_run_case+0x1a6/0x480 [ 23.927193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.927294] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.927370] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.927507] ? __kthread_parkme+0x82/0x160 [ 23.927589] ? preempt_count_sub+0x50/0x80 [ 23.927673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.927747] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.927831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.927978] kthread+0x257/0x310 [ 23.928052] ? __pfx_kthread+0x10/0x10 [ 23.928179] ret_from_fork+0x41/0x80 [ 23.928273] ? __pfx_kthread+0x10/0x10 [ 23.928345] ret_from_fork_asm+0x1a/0x30 [ 23.928396] </TASK> [ 23.928413] [ 23.947894] Allocated by task 270: [ 23.948390] kasan_save_stack+0x45/0x70 [ 23.949070] kasan_save_track+0x18/0x40 [ 23.949425] kasan_save_alloc_info+0x3b/0x50 [ 23.949764] __kasan_kmalloc+0xb7/0xc0 [ 23.950745] __kmalloc_cache_noprof+0x168/0x350 [ 23.951321] kasan_atomics+0x96/0x310 [ 23.951700] kunit_try_run_case+0x1a6/0x480 [ 23.952468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.952835] kthread+0x257/0x310 [ 23.953461] ret_from_fork+0x41/0x80 [ 23.953852] ret_from_fork_asm+0x1a/0x30 [ 23.954341] [ 23.954531] The buggy address belongs to the object at ffff888102314e80 [ 23.954531] which belongs to the cache kmalloc-64 of size 64 [ 23.956519] The buggy address is located 0 bytes to the right of [ 23.956519] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.957779] [ 23.958005] The buggy address belongs to the physical page: [ 23.958465] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.959625] flags: 0x200000000000000(node=0|zone=2) [ 23.960088] page_type: f5(slab) [ 23.960483] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.961419] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.962172] page dumped because: kasan: bad access detected [ 23.962790] [ 23.963220] Memory state around the buggy address: [ 23.963960] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.964478] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.965183] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.965777] ^ [ 23.966465] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.967205] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.967984] ================================================================== [ 23.505695] ================================================================== [ 23.506867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 23.507836] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.509142] [ 23.509466] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.509591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.509631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.509694] Call Trace: [ 23.509774] <TASK> [ 23.509851] dump_stack_lvl+0x73/0xb0 [ 23.509958] print_report+0xd1/0x640 [ 23.510001] ? __virt_addr_valid+0x1db/0x2d0 [ 23.510039] ? kasan_atomics_helper+0x50d6/0x5450 [ 23.510073] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.510107] ? kasan_atomics_helper+0x50d6/0x5450 [ 23.510142] kasan_report+0x140/0x180 [ 23.510177] ? kasan_atomics_helper+0x50d6/0x5450 [ 23.510219] __asan_report_store8_noabort+0x1b/0x30 [ 23.510282] kasan_atomics_helper+0x50d6/0x5450 [ 23.510322] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.510360] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.510392] ? trace_hardirqs_on+0x37/0xe0 [ 23.510433] kasan_atomics+0x1dd/0x310 [ 23.510464] ? __pfx_kasan_atomics+0x10/0x10 [ 23.510496] ? __pfx_read_tsc+0x10/0x10 [ 23.510525] ? ktime_get_ts64+0x84/0x230 [ 23.510560] kunit_try_run_case+0x1a6/0x480 [ 23.510594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.510624] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.510654] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.510691] ? __kthread_parkme+0x82/0x160 [ 23.510720] ? preempt_count_sub+0x50/0x80 [ 23.510752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.510781] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.510827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.510898] kthread+0x257/0x310 [ 23.510927] ? __pfx_kthread+0x10/0x10 [ 23.510955] ret_from_fork+0x41/0x80 [ 23.510985] ? __pfx_kthread+0x10/0x10 [ 23.511012] ret_from_fork_asm+0x1a/0x30 [ 23.511056] </TASK> [ 23.511071] [ 23.525645] Allocated by task 270: [ 23.526211] kasan_save_stack+0x45/0x70 [ 23.526681] kasan_save_track+0x18/0x40 [ 23.527814] kasan_save_alloc_info+0x3b/0x50 [ 23.528249] __kasan_kmalloc+0xb7/0xc0 [ 23.528649] __kmalloc_cache_noprof+0x168/0x350 [ 23.529097] kasan_atomics+0x96/0x310 [ 23.529681] kunit_try_run_case+0x1a6/0x480 [ 23.530284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.530782] kthread+0x257/0x310 [ 23.531144] ret_from_fork+0x41/0x80 [ 23.531583] ret_from_fork_asm+0x1a/0x30 [ 23.532098] [ 23.532351] The buggy address belongs to the object at ffff888102314e80 [ 23.532351] which belongs to the cache kmalloc-64 of size 64 [ 23.533258] The buggy address is located 0 bytes to the right of [ 23.533258] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.534464] [ 23.534693] The buggy address belongs to the physical page: [ 23.535202] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.535947] flags: 0x200000000000000(node=0|zone=2) [ 23.536434] page_type: f5(slab) [ 23.536873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.537501] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.538177] page dumped because: kasan: bad access detected [ 23.538704] [ 23.538958] Memory state around the buggy address: [ 23.539497] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.540247] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.540850] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.541415] ^ [ 23.541908] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.542612] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.543307] ================================================================== [ 23.623887] ================================================================== [ 23.624477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 23.625529] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 23.626167] [ 23.626398] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.626507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.626545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.626600] Call Trace: [ 23.626644] <TASK> [ 23.626685] dump_stack_lvl+0x73/0xb0 [ 23.626757] print_report+0xd1/0x640 [ 23.626833] ? __virt_addr_valid+0x1db/0x2d0 [ 23.626907] ? kasan_atomics_helper+0x1650/0x5450 [ 23.626976] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.627053] ? kasan_atomics_helper+0x1650/0x5450 [ 23.627134] kasan_report+0x140/0x180 [ 23.627203] ? kasan_atomics_helper+0x1650/0x5450 [ 23.627326] kasan_check_range+0x10c/0x1c0 [ 23.627456] __kasan_check_write+0x18/0x20 [ 23.627610] kasan_atomics_helper+0x1650/0x5450 [ 23.627729] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.627813] ? __kmalloc_cache_noprof+0x168/0x350 [ 23.627964] ? trace_hardirqs_on+0x37/0xe0 [ 23.628060] kasan_atomics+0x1dd/0x310 [ 23.628132] ? __pfx_kasan_atomics+0x10/0x10 [ 23.628208] ? __pfx_read_tsc+0x10/0x10 [ 23.628296] ? ktime_get_ts64+0x84/0x230 [ 23.628380] kunit_try_run_case+0x1a6/0x480 [ 23.628425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.628457] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.628488] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.628532] ? __kthread_parkme+0x82/0x160 [ 23.628601] ? preempt_count_sub+0x50/0x80 [ 23.628738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.628848] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.628942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.629082] kthread+0x257/0x310 [ 23.629189] ? __pfx_kthread+0x10/0x10 [ 23.629282] ret_from_fork+0x41/0x80 [ 23.629326] ? __pfx_kthread+0x10/0x10 [ 23.629356] ret_from_fork_asm+0x1a/0x30 [ 23.629403] </TASK> [ 23.629418] [ 23.647658] Allocated by task 270: [ 23.648618] kasan_save_stack+0x45/0x70 [ 23.649402] kasan_save_track+0x18/0x40 [ 23.650160] kasan_save_alloc_info+0x3b/0x50 [ 23.650600] __kasan_kmalloc+0xb7/0xc0 [ 23.650926] __kmalloc_cache_noprof+0x168/0x350 [ 23.651442] kasan_atomics+0x96/0x310 [ 23.651825] kunit_try_run_case+0x1a6/0x480 [ 23.652270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.652715] kthread+0x257/0x310 [ 23.653123] ret_from_fork+0x41/0x80 [ 23.653550] ret_from_fork_asm+0x1a/0x30 [ 23.653983] [ 23.654214] The buggy address belongs to the object at ffff888102314e80 [ 23.654214] which belongs to the cache kmalloc-64 of size 64 [ 23.655022] The buggy address is located 0 bytes to the right of [ 23.655022] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 23.656043] [ 23.656354] The buggy address belongs to the physical page: [ 23.656831] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 23.657738] flags: 0x200000000000000(node=0|zone=2) [ 23.658472] page_type: f5(slab) [ 23.658735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.659971] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.660778] page dumped because: kasan: bad access detected [ 23.661520] [ 23.661750] Memory state around the buggy address: [ 23.662176] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.662977] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.663515] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.664441] ^ [ 23.665266] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.666256] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.666907] ================================================================== [ 24.475821] ================================================================== [ 24.476806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 24.477575] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.478824] [ 24.479281] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.479415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.479436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.479486] Call Trace: [ 24.479518] <TASK> [ 24.479568] dump_stack_lvl+0x73/0xb0 [ 24.479614] print_report+0xd1/0x640 [ 24.479650] ? __virt_addr_valid+0x1db/0x2d0 [ 24.479686] ? kasan_atomics_helper+0x4fb4/0x5450 [ 24.479719] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.479753] ? kasan_atomics_helper+0x4fb4/0x5450 [ 24.479788] kasan_report+0x140/0x180 [ 24.479831] ? kasan_atomics_helper+0x4fb4/0x5450 [ 24.479962] __asan_report_load8_noabort+0x18/0x20 [ 24.480033] kasan_atomics_helper+0x4fb4/0x5450 [ 24.480073] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.480111] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.480143] ? trace_hardirqs_on+0x37/0xe0 [ 24.480182] kasan_atomics+0x1dd/0x310 [ 24.480210] ? __pfx_kasan_atomics+0x10/0x10 [ 24.480267] ? __pfx_read_tsc+0x10/0x10 [ 24.480299] ? ktime_get_ts64+0x84/0x230 [ 24.480337] kunit_try_run_case+0x1a6/0x480 [ 24.480370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.480400] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.480431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.480468] ? __kthread_parkme+0x82/0x160 [ 24.480498] ? preempt_count_sub+0x50/0x80 [ 24.480532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.480564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.480602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.480640] kthread+0x257/0x310 [ 24.480666] ? __pfx_kthread+0x10/0x10 [ 24.480692] ret_from_fork+0x41/0x80 [ 24.480723] ? __pfx_kthread+0x10/0x10 [ 24.480748] ret_from_fork_asm+0x1a/0x30 [ 24.480791] </TASK> [ 24.480806] [ 24.496738] Allocated by task 270: [ 24.497270] kasan_save_stack+0x45/0x70 [ 24.498150] kasan_save_track+0x18/0x40 [ 24.498852] kasan_save_alloc_info+0x3b/0x50 [ 24.499454] __kasan_kmalloc+0xb7/0xc0 [ 24.499755] __kmalloc_cache_noprof+0x168/0x350 [ 24.500636] kasan_atomics+0x96/0x310 [ 24.501043] kunit_try_run_case+0x1a6/0x480 [ 24.501550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.502101] kthread+0x257/0x310 [ 24.502530] ret_from_fork+0x41/0x80 [ 24.502959] ret_from_fork_asm+0x1a/0x30 [ 24.503379] [ 24.503613] The buggy address belongs to the object at ffff888102314e80 [ 24.503613] which belongs to the cache kmalloc-64 of size 64 [ 24.504633] The buggy address is located 0 bytes to the right of [ 24.504633] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.505641] [ 24.505980] The buggy address belongs to the physical page: [ 24.506401] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.507171] flags: 0x200000000000000(node=0|zone=2) [ 24.507716] page_type: f5(slab) [ 24.508109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.508769] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.509378] page dumped because: kasan: bad access detected [ 24.509995] [ 24.510250] Memory state around the buggy address: [ 24.510654] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.511374] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.511964] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.512622] ^ [ 24.513088] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.513678] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.514310] ================================================================== [ 24.430886] ================================================================== [ 24.431427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 24.433327] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.433934] [ 24.434529] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.434651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.434995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.435041] Call Trace: [ 24.435069] <TASK> [ 24.435092] dump_stack_lvl+0x73/0xb0 [ 24.435133] print_report+0xd1/0x640 [ 24.435167] ? __virt_addr_valid+0x1db/0x2d0 [ 24.435203] ? kasan_atomics_helper+0x20c9/0x5450 [ 24.435273] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.435311] ? kasan_atomics_helper+0x20c9/0x5450 [ 24.435346] kasan_report+0x140/0x180 [ 24.435381] ? kasan_atomics_helper+0x20c9/0x5450 [ 24.435423] kasan_check_range+0x10c/0x1c0 [ 24.435454] __kasan_check_write+0x18/0x20 [ 24.435486] kasan_atomics_helper+0x20c9/0x5450 [ 24.435524] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.435563] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.435594] ? trace_hardirqs_on+0x37/0xe0 [ 24.435633] kasan_atomics+0x1dd/0x310 [ 24.435663] ? __pfx_kasan_atomics+0x10/0x10 [ 24.435694] ? __pfx_read_tsc+0x10/0x10 [ 24.435722] ? ktime_get_ts64+0x84/0x230 [ 24.435758] kunit_try_run_case+0x1a6/0x480 [ 24.435791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.435827] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.435897] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.435937] ? __kthread_parkme+0x82/0x160 [ 24.435968] ? preempt_count_sub+0x50/0x80 [ 24.436000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.436029] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.436067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.436105] kthread+0x257/0x310 [ 24.436133] ? __pfx_kthread+0x10/0x10 [ 24.436160] ret_from_fork+0x41/0x80 [ 24.436190] ? __pfx_kthread+0x10/0x10 [ 24.436215] ret_from_fork_asm+0x1a/0x30 [ 24.436284] </TASK> [ 24.436299] [ 24.453996] Allocated by task 270: [ 24.454303] kasan_save_stack+0x45/0x70 [ 24.454631] kasan_save_track+0x18/0x40 [ 24.456277] kasan_save_alloc_info+0x3b/0x50 [ 24.456582] __kasan_kmalloc+0xb7/0xc0 [ 24.457354] __kmalloc_cache_noprof+0x168/0x350 [ 24.458033] kasan_atomics+0x96/0x310 [ 24.458463] kunit_try_run_case+0x1a6/0x480 [ 24.458821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.459357] kthread+0x257/0x310 [ 24.459673] ret_from_fork+0x41/0x80 [ 24.460683] ret_from_fork_asm+0x1a/0x30 [ 24.461127] [ 24.461593] The buggy address belongs to the object at ffff888102314e80 [ 24.461593] which belongs to the cache kmalloc-64 of size 64 [ 24.462925] The buggy address is located 0 bytes to the right of [ 24.462925] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.464394] [ 24.464556] The buggy address belongs to the physical page: [ 24.465299] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.466187] flags: 0x200000000000000(node=0|zone=2) [ 24.466597] page_type: f5(slab) [ 24.466994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.467839] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.468652] page dumped because: kasan: bad access detected [ 24.469397] [ 24.469766] Memory state around the buggy address: [ 24.470191] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.471006] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.471746] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.472444] ^ [ 24.473094] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.473599] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.474481] ================================================================== [ 22.452494] ================================================================== [ 22.453143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 22.453898] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.454337] [ 22.454595] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.454715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.454755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.454864] Call Trace: [ 22.454996] <TASK> [ 22.455054] dump_stack_lvl+0x73/0xb0 [ 22.455136] print_report+0xd1/0x640 [ 22.455217] ? __virt_addr_valid+0x1db/0x2d0 [ 22.455336] ? kasan_atomics_helper+0x861/0x5450 [ 22.455416] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.455482] ? kasan_atomics_helper+0x861/0x5450 [ 22.455520] kasan_report+0x140/0x180 [ 22.455557] ? kasan_atomics_helper+0x861/0x5450 [ 22.455598] kasan_check_range+0x10c/0x1c0 [ 22.455629] __kasan_check_write+0x18/0x20 [ 22.455660] kasan_atomics_helper+0x861/0x5450 [ 22.455693] ? kasan_save_alloc_info+0x3b/0x50 [ 22.455727] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.455765] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.455797] ? trace_hardirqs_on+0x37/0xe0 [ 22.455865] kasan_atomics+0x1dd/0x310 [ 22.455900] ? __pfx_kasan_atomics+0x10/0x10 [ 22.455932] ? __pfx_read_tsc+0x10/0x10 [ 22.455959] ? ktime_get_ts64+0x84/0x230 [ 22.455996] kunit_try_run_case+0x1a6/0x480 [ 22.456031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.456059] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.456089] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.456127] ? __kthread_parkme+0x82/0x160 [ 22.456154] ? preempt_count_sub+0x50/0x80 [ 22.456187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.456216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.456285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.456325] kthread+0x257/0x310 [ 22.456353] ? __pfx_kthread+0x10/0x10 [ 22.456382] ret_from_fork+0x41/0x80 [ 22.456412] ? __pfx_kthread+0x10/0x10 [ 22.456440] ret_from_fork_asm+0x1a/0x30 [ 22.456483] </TASK> [ 22.456500] [ 22.473289] Allocated by task 270: [ 22.473773] kasan_save_stack+0x45/0x70 [ 22.474395] kasan_save_track+0x18/0x40 [ 22.474886] kasan_save_alloc_info+0x3b/0x50 [ 22.475415] __kasan_kmalloc+0xb7/0xc0 [ 22.476030] __kmalloc_cache_noprof+0x168/0x350 [ 22.476502] kasan_atomics+0x96/0x310 [ 22.477025] kunit_try_run_case+0x1a6/0x480 [ 22.477503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.478130] kthread+0x257/0x310 [ 22.478563] ret_from_fork+0x41/0x80 [ 22.479053] ret_from_fork_asm+0x1a/0x30 [ 22.479438] [ 22.479625] The buggy address belongs to the object at ffff888102314e80 [ 22.479625] which belongs to the cache kmalloc-64 of size 64 [ 22.480720] The buggy address is located 0 bytes to the right of [ 22.480720] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.481622] [ 22.481952] The buggy address belongs to the physical page: [ 22.482580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.483387] flags: 0x200000000000000(node=0|zone=2) [ 22.483806] page_type: f5(slab) [ 22.484334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.485068] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.485771] page dumped because: kasan: bad access detected [ 22.486415] [ 22.486631] Memory state around the buggy address: [ 22.487215] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.487895] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.488524] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.489284] ^ [ 22.489771] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.490449] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.491216] ================================================================== [ 22.277025] ================================================================== [ 22.278150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 22.278808] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.279578] [ 22.279779] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.279865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.279886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.279920] Call Trace: [ 22.279947] <TASK> [ 22.279970] dump_stack_lvl+0x73/0xb0 [ 22.280012] print_report+0xd1/0x640 [ 22.280048] ? __virt_addr_valid+0x1db/0x2d0 [ 22.280083] ? kasan_atomics_helper+0x5ff/0x5450 [ 22.280117] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.280150] ? kasan_atomics_helper+0x5ff/0x5450 [ 22.280185] kasan_report+0x140/0x180 [ 22.280239] ? kasan_atomics_helper+0x5ff/0x5450 [ 22.280334] kasan_check_range+0x10c/0x1c0 [ 22.280411] __kasan_check_write+0x18/0x20 [ 22.280491] kasan_atomics_helper+0x5ff/0x5450 [ 22.280570] ? kasan_save_alloc_info+0x3b/0x50 [ 22.280649] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.280734] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.280811] ? trace_hardirqs_on+0x37/0xe0 [ 22.280911] kasan_atomics+0x1dd/0x310 [ 22.280989] ? __pfx_kasan_atomics+0x10/0x10 [ 22.281133] ? __pfx_read_tsc+0x10/0x10 [ 22.281205] ? ktime_get_ts64+0x84/0x230 [ 22.281311] kunit_try_run_case+0x1a6/0x480 [ 22.281396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.281469] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.281524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.281565] ? __kthread_parkme+0x82/0x160 [ 22.281595] ? preempt_count_sub+0x50/0x80 [ 22.281626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.281656] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.281694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.281733] kthread+0x257/0x310 [ 22.281760] ? __pfx_kthread+0x10/0x10 [ 22.281788] ret_from_fork+0x41/0x80 [ 22.281830] ? __pfx_kthread+0x10/0x10 [ 22.281889] ret_from_fork_asm+0x1a/0x30 [ 22.281932] </TASK> [ 22.281948] [ 22.301172] Allocated by task 270: [ 22.301762] kasan_save_stack+0x45/0x70 [ 22.302167] kasan_save_track+0x18/0x40 [ 22.302902] kasan_save_alloc_info+0x3b/0x50 [ 22.303514] __kasan_kmalloc+0xb7/0xc0 [ 22.304057] __kmalloc_cache_noprof+0x168/0x350 [ 22.304493] kasan_atomics+0x96/0x310 [ 22.304841] kunit_try_run_case+0x1a6/0x480 [ 22.305638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.306364] kthread+0x257/0x310 [ 22.306886] ret_from_fork+0x41/0x80 [ 22.307275] ret_from_fork_asm+0x1a/0x30 [ 22.307927] [ 22.308164] The buggy address belongs to the object at ffff888102314e80 [ 22.308164] which belongs to the cache kmalloc-64 of size 64 [ 22.309371] The buggy address is located 0 bytes to the right of [ 22.309371] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.310709] [ 22.310978] The buggy address belongs to the physical page: [ 22.311464] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.312349] flags: 0x200000000000000(node=0|zone=2) [ 22.312941] page_type: f5(slab) [ 22.313560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.314269] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.315140] page dumped because: kasan: bad access detected [ 22.315807] [ 22.316130] Memory state around the buggy address: [ 22.316806] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.317398] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.318268] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.319038] ^ [ 22.319670] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.320394] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.320973] ================================================================== [ 24.062342] ================================================================== [ 24.062786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 24.064696] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.065527] [ 24.065789] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.065971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.066029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.066092] Call Trace: [ 24.066147] <TASK> [ 24.066197] dump_stack_lvl+0x73/0xb0 [ 24.066288] print_report+0xd1/0x640 [ 24.066324] ? __virt_addr_valid+0x1db/0x2d0 [ 24.066362] ? kasan_atomics_helper+0x4f32/0x5450 [ 24.066397] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.066430] ? kasan_atomics_helper+0x4f32/0x5450 [ 24.066465] kasan_report+0x140/0x180 [ 24.066501] ? kasan_atomics_helper+0x4f32/0x5450 [ 24.066544] __asan_report_load8_noabort+0x18/0x20 [ 24.066576] kasan_atomics_helper+0x4f32/0x5450 [ 24.066612] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.066649] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.066680] ? trace_hardirqs_on+0x37/0xe0 [ 24.066719] kasan_atomics+0x1dd/0x310 [ 24.066748] ? __pfx_kasan_atomics+0x10/0x10 [ 24.066778] ? __pfx_read_tsc+0x10/0x10 [ 24.066806] ? ktime_get_ts64+0x84/0x230 [ 24.066889] kunit_try_run_case+0x1a6/0x480 [ 24.066926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.066956] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.066986] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.067022] ? __kthread_parkme+0x82/0x160 [ 24.067048] ? preempt_count_sub+0x50/0x80 [ 24.067082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.067111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.067149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.067186] kthread+0x257/0x310 [ 24.067212] ? __pfx_kthread+0x10/0x10 [ 24.067277] ret_from_fork+0x41/0x80 [ 24.067311] ? __pfx_kthread+0x10/0x10 [ 24.067337] ret_from_fork_asm+0x1a/0x30 [ 24.067379] </TASK> [ 24.067394] [ 24.084494] Allocated by task 270: [ 24.084875] kasan_save_stack+0x45/0x70 [ 24.085307] kasan_save_track+0x18/0x40 [ 24.085697] kasan_save_alloc_info+0x3b/0x50 [ 24.086132] __kasan_kmalloc+0xb7/0xc0 [ 24.086668] __kmalloc_cache_noprof+0x168/0x350 [ 24.087018] kasan_atomics+0x96/0x310 [ 24.087784] kunit_try_run_case+0x1a6/0x480 [ 24.088376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.088940] kthread+0x257/0x310 [ 24.089521] ret_from_fork+0x41/0x80 [ 24.089917] ret_from_fork_asm+0x1a/0x30 [ 24.090377] [ 24.090605] The buggy address belongs to the object at ffff888102314e80 [ 24.090605] which belongs to the cache kmalloc-64 of size 64 [ 24.091719] The buggy address is located 0 bytes to the right of [ 24.091719] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.092832] [ 24.093462] The buggy address belongs to the physical page: [ 24.094277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.095304] flags: 0x200000000000000(node=0|zone=2) [ 24.095731] page_type: f5(slab) [ 24.096541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.097242] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.097847] page dumped because: kasan: bad access detected [ 24.098577] [ 24.098753] Memory state around the buggy address: [ 24.099697] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.100352] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.100979] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.101827] ^ [ 24.102659] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.103567] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.104477] ================================================================== [ 22.022119] ================================================================== [ 22.022770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 22.023575] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.024079] [ 22.024852] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.024951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.024987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.025047] Call Trace: [ 22.025268] <TASK> [ 22.025310] dump_stack_lvl+0x73/0xb0 [ 22.025354] print_report+0xd1/0x640 [ 22.025390] ? __virt_addr_valid+0x1db/0x2d0 [ 22.025425] ? kasan_atomics_helper+0x4b70/0x5450 [ 22.025461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.025495] ? kasan_atomics_helper+0x4b70/0x5450 [ 22.025529] kasan_report+0x140/0x180 [ 22.025563] ? kasan_atomics_helper+0x4b70/0x5450 [ 22.025602] __asan_report_store4_noabort+0x1b/0x30 [ 22.025634] kasan_atomics_helper+0x4b70/0x5450 [ 22.025667] ? kasan_save_alloc_info+0x3b/0x50 [ 22.025696] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.025731] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.025761] ? trace_hardirqs_on+0x37/0xe0 [ 22.025800] kasan_atomics+0x1dd/0x310 [ 22.025852] ? __pfx_kasan_atomics+0x10/0x10 [ 22.025892] ? __pfx_read_tsc+0x10/0x10 [ 22.025919] ? ktime_get_ts64+0x84/0x230 [ 22.025955] kunit_try_run_case+0x1a6/0x480 [ 22.025989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.026018] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.026048] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.026085] ? __kthread_parkme+0x82/0x160 [ 22.026112] ? preempt_count_sub+0x50/0x80 [ 22.026144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.026172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.026208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.026271] kthread+0x257/0x310 [ 22.026298] ? __pfx_kthread+0x10/0x10 [ 22.026324] ret_from_fork+0x41/0x80 [ 22.026354] ? __pfx_kthread+0x10/0x10 [ 22.026380] ret_from_fork_asm+0x1a/0x30 [ 22.026422] </TASK> [ 22.026436] [ 22.045420] Allocated by task 270: [ 22.045783] kasan_save_stack+0x45/0x70 [ 22.046825] kasan_save_track+0x18/0x40 [ 22.047462] kasan_save_alloc_info+0x3b/0x50 [ 22.047765] __kasan_kmalloc+0xb7/0xc0 [ 22.048384] __kmalloc_cache_noprof+0x168/0x350 [ 22.048845] kasan_atomics+0x96/0x310 [ 22.049188] kunit_try_run_case+0x1a6/0x480 [ 22.049876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.050636] kthread+0x257/0x310 [ 22.051553] ret_from_fork+0x41/0x80 [ 22.051834] ret_from_fork_asm+0x1a/0x30 [ 22.052459] [ 22.052619] The buggy address belongs to the object at ffff888102314e80 [ 22.052619] which belongs to the cache kmalloc-64 of size 64 [ 22.054150] The buggy address is located 0 bytes to the right of [ 22.054150] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.055627] [ 22.056138] The buggy address belongs to the physical page: [ 22.056783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.057469] flags: 0x200000000000000(node=0|zone=2) [ 22.057853] page_type: f5(slab) [ 22.058661] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.059247] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.060207] page dumped because: kasan: bad access detected [ 22.060798] [ 22.061058] Memory state around the buggy address: [ 22.061691] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.062440] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.063182] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.063918] ^ [ 22.064395] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.065135] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.065729] ================================================================== [ 24.017150] ================================================================== [ 24.018437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 24.019872] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 24.021488] [ 24.021669] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.021770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.021800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.021849] Call Trace: [ 24.021889] <TASK> [ 24.021930] dump_stack_lvl+0x73/0xb0 [ 24.021993] print_report+0xd1/0x640 [ 24.022054] ? __virt_addr_valid+0x1db/0x2d0 [ 24.022115] ? kasan_atomics_helper+0x1c19/0x5450 [ 24.022175] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.022272] ? kasan_atomics_helper+0x1c19/0x5450 [ 24.022333] kasan_report+0x140/0x180 [ 24.022392] ? kasan_atomics_helper+0x1c19/0x5450 [ 24.022459] kasan_check_range+0x10c/0x1c0 [ 24.022511] __kasan_check_write+0x18/0x20 [ 24.022565] kasan_atomics_helper+0x1c19/0x5450 [ 24.022641] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.022705] ? __kmalloc_cache_noprof+0x168/0x350 [ 24.022760] ? trace_hardirqs_on+0x37/0xe0 [ 24.022828] kasan_atomics+0x1dd/0x310 [ 24.022877] ? __pfx_kasan_atomics+0x10/0x10 [ 24.022932] ? __pfx_read_tsc+0x10/0x10 [ 24.022980] ? ktime_get_ts64+0x84/0x230 [ 24.023041] kunit_try_run_case+0x1a6/0x480 [ 24.023359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.023431] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.023547] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.023628] ? __kthread_parkme+0x82/0x160 [ 24.023699] ? preempt_count_sub+0x50/0x80 [ 24.023782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.023856] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.023933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.023975] kthread+0x257/0x310 [ 24.024004] ? __pfx_kthread+0x10/0x10 [ 24.024031] ret_from_fork+0x41/0x80 [ 24.024061] ? __pfx_kthread+0x10/0x10 [ 24.024087] ret_from_fork_asm+0x1a/0x30 [ 24.024130] </TASK> [ 24.024146] [ 24.044914] Allocated by task 270: [ 24.045354] kasan_save_stack+0x45/0x70 [ 24.045803] kasan_save_track+0x18/0x40 [ 24.046165] kasan_save_alloc_info+0x3b/0x50 [ 24.046639] __kasan_kmalloc+0xb7/0xc0 [ 24.047117] __kmalloc_cache_noprof+0x168/0x350 [ 24.047506] kasan_atomics+0x96/0x310 [ 24.047967] kunit_try_run_case+0x1a6/0x480 [ 24.048434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.048997] kthread+0x257/0x310 [ 24.049404] ret_from_fork+0x41/0x80 [ 24.049758] ret_from_fork_asm+0x1a/0x30 [ 24.050120] [ 24.050365] The buggy address belongs to the object at ffff888102314e80 [ 24.050365] which belongs to the cache kmalloc-64 of size 64 [ 24.051384] The buggy address is located 0 bytes to the right of [ 24.051384] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 24.052241] [ 24.052481] The buggy address belongs to the physical page: [ 24.053029] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 24.053710] flags: 0x200000000000000(node=0|zone=2) [ 24.054130] page_type: f5(slab) [ 24.054444] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.055155] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.055882] page dumped because: kasan: bad access detected [ 24.056336] [ 24.056565] Memory state around the buggy address: [ 24.057031] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.057588] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.058213] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.058762] ^ [ 24.059163] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.059802] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.060729] ================================================================== [ 22.361203] ================================================================== [ 22.362082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 22.362773] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.363384] [ 22.363683] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.363797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.363841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.363930] Call Trace: [ 22.363987] <TASK> [ 22.364038] dump_stack_lvl+0x73/0xb0 [ 22.364126] print_report+0xd1/0x640 [ 22.364204] ? __virt_addr_valid+0x1db/0x2d0 [ 22.364303] ? kasan_atomics_helper+0x730/0x5450 [ 22.364383] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.364462] ? kasan_atomics_helper+0x730/0x5450 [ 22.364542] kasan_report+0x140/0x180 [ 22.364628] ? kasan_atomics_helper+0x730/0x5450 [ 22.364720] kasan_check_range+0x10c/0x1c0 [ 22.364798] __kasan_check_write+0x18/0x20 [ 22.364871] kasan_atomics_helper+0x730/0x5450 [ 22.364949] ? kasan_save_alloc_info+0x3b/0x50 [ 22.365067] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.365157] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.365253] ? trace_hardirqs_on+0x37/0xe0 [ 22.365348] kasan_atomics+0x1dd/0x310 [ 22.365421] ? __pfx_kasan_atomics+0x10/0x10 [ 22.365495] ? __pfx_read_tsc+0x10/0x10 [ 22.365558] ? ktime_get_ts64+0x84/0x230 [ 22.365638] kunit_try_run_case+0x1a6/0x480 [ 22.365717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.365786] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.365861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.365945] ? __kthread_parkme+0x82/0x160 [ 22.365989] ? preempt_count_sub+0x50/0x80 [ 22.366024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.366053] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.366091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.366129] kthread+0x257/0x310 [ 22.366157] ? __pfx_kthread+0x10/0x10 [ 22.366185] ret_from_fork+0x41/0x80 [ 22.366215] ? __pfx_kthread+0x10/0x10 [ 22.366272] ret_from_fork_asm+0x1a/0x30 [ 22.366314] </TASK> [ 22.366330] [ 22.380538] Allocated by task 270: [ 22.380934] kasan_save_stack+0x45/0x70 [ 22.381458] kasan_save_track+0x18/0x40 [ 22.381777] kasan_save_alloc_info+0x3b/0x50 [ 22.382551] __kasan_kmalloc+0xb7/0xc0 [ 22.383302] __kmalloc_cache_noprof+0x168/0x350 [ 22.384790] kasan_atomics+0x96/0x310 [ 22.386064] kunit_try_run_case+0x1a6/0x480 [ 22.387612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.388363] kthread+0x257/0x310 [ 22.388516] ret_from_fork+0x41/0x80 [ 22.388674] ret_from_fork_asm+0x1a/0x30 [ 22.388905] [ 22.389297] The buggy address belongs to the object at ffff888102314e80 [ 22.389297] which belongs to the cache kmalloc-64 of size 64 [ 22.391438] The buggy address is located 0 bytes to the right of [ 22.391438] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.392660] [ 22.393543] The buggy address belongs to the physical page: [ 22.393944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.394692] flags: 0x200000000000000(node=0|zone=2) [ 22.395611] page_type: f5(slab) [ 22.396124] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.396830] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.397496] page dumped because: kasan: bad access detected [ 22.398313] [ 22.398503] Memory state around the buggy address: [ 22.398822] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.399610] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.400694] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.401514] ^ [ 22.401984] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.402803] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.403400] ================================================================== [ 22.878379] ================================================================== [ 22.878920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 22.881644] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.882272] [ 22.882509] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.882631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.882672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.882737] Call Trace: [ 22.882796] <TASK> [ 22.882857] dump_stack_lvl+0x73/0xb0 [ 22.882947] print_report+0xd1/0x640 [ 22.883032] ? __virt_addr_valid+0x1db/0x2d0 [ 22.883119] ? kasan_atomics_helper+0xe79/0x5450 [ 22.883200] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.883319] ? kasan_atomics_helper+0xe79/0x5450 [ 22.883400] kasan_report+0x140/0x180 [ 22.883483] ? kasan_atomics_helper+0xe79/0x5450 [ 22.883581] kasan_check_range+0x10c/0x1c0 [ 22.883660] __kasan_check_write+0x18/0x20 [ 22.883750] kasan_atomics_helper+0xe79/0x5450 [ 22.883856] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.883944] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.884031] ? trace_hardirqs_on+0x37/0xe0 [ 22.884121] kasan_atomics+0x1dd/0x310 [ 22.884203] ? __pfx_kasan_atomics+0x10/0x10 [ 22.884275] ? __pfx_read_tsc+0x10/0x10 [ 22.884329] ? ktime_get_ts64+0x84/0x230 [ 22.884386] kunit_try_run_case+0x1a6/0x480 [ 22.884436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.884482] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.884529] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.884592] ? __kthread_parkme+0x82/0x160 [ 22.884636] ? preempt_count_sub+0x50/0x80 [ 22.884688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.884732] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.884796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.884858] kthread+0x257/0x310 [ 22.884902] ? __pfx_kthread+0x10/0x10 [ 22.884945] ret_from_fork+0x41/0x80 [ 22.884991] ? __pfx_kthread+0x10/0x10 [ 22.885032] ret_from_fork_asm+0x1a/0x30 [ 22.885098] </TASK> [ 22.885130] [ 22.898734] Allocated by task 270: [ 22.899070] kasan_save_stack+0x45/0x70 [ 22.899376] kasan_save_track+0x18/0x40 [ 22.899607] kasan_save_alloc_info+0x3b/0x50 [ 22.899855] __kasan_kmalloc+0xb7/0xc0 [ 22.900071] __kmalloc_cache_noprof+0x168/0x350 [ 22.901620] kasan_atomics+0x96/0x310 [ 22.901971] kunit_try_run_case+0x1a6/0x480 [ 22.902433] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.902859] kthread+0x257/0x310 [ 22.903147] ret_from_fork+0x41/0x80 [ 22.903494] ret_from_fork_asm+0x1a/0x30 [ 22.903779] [ 22.904040] The buggy address belongs to the object at ffff888102314e80 [ 22.904040] which belongs to the cache kmalloc-64 of size 64 [ 22.905207] The buggy address is located 0 bytes to the right of [ 22.905207] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.906278] [ 22.906521] The buggy address belongs to the physical page: [ 22.907191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.907867] flags: 0x200000000000000(node=0|zone=2) [ 22.909582] page_type: f5(slab) [ 22.910037] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.910677] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.911295] page dumped because: kasan: bad access detected [ 22.911657] [ 22.911863] Memory state around the buggy address: [ 22.912238] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.912593] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.912967] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.913669] ^ [ 22.914153] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.915015] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.915486] ================================================================== [ 22.918455] ================================================================== [ 22.919343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 22.920129] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.920898] [ 22.921078] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.921170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.921197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.921259] Call Trace: [ 22.921302] <TASK> [ 22.921339] dump_stack_lvl+0x73/0xb0 [ 22.921399] print_report+0xd1/0x640 [ 22.921452] ? __virt_addr_valid+0x1db/0x2d0 [ 22.921505] ? kasan_atomics_helper+0xf11/0x5450 [ 22.921556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.921636] ? kasan_atomics_helper+0xf11/0x5450 [ 22.921714] kasan_report+0x140/0x180 [ 22.921792] ? kasan_atomics_helper+0xf11/0x5450 [ 22.921931] kasan_check_range+0x10c/0x1c0 [ 22.921996] __kasan_check_write+0x18/0x20 [ 22.922066] kasan_atomics_helper+0xf11/0x5450 [ 22.922154] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.922256] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.922339] ? trace_hardirqs_on+0x37/0xe0 [ 22.922436] kasan_atomics+0x1dd/0x310 [ 22.922511] ? __pfx_kasan_atomics+0x10/0x10 [ 22.922587] ? __pfx_read_tsc+0x10/0x10 [ 22.922657] ? ktime_get_ts64+0x84/0x230 [ 22.922738] kunit_try_run_case+0x1a6/0x480 [ 22.922801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.922866] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.922945] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.923030] ? __kthread_parkme+0x82/0x160 [ 22.923118] ? preempt_count_sub+0x50/0x80 [ 22.923207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.923314] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.923407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.923496] kthread+0x257/0x310 [ 22.923574] ? __pfx_kthread+0x10/0x10 [ 22.923645] ret_from_fork+0x41/0x80 [ 22.923719] ? __pfx_kthread+0x10/0x10 [ 22.923788] ret_from_fork_asm+0x1a/0x30 [ 22.923889] </TASK> [ 22.923930] [ 22.938107] Allocated by task 270: [ 22.938537] kasan_save_stack+0x45/0x70 [ 22.939164] kasan_save_track+0x18/0x40 [ 22.939674] kasan_save_alloc_info+0x3b/0x50 [ 22.940300] __kasan_kmalloc+0xb7/0xc0 [ 22.940573] __kmalloc_cache_noprof+0x168/0x350 [ 22.940884] kasan_atomics+0x96/0x310 [ 22.942605] kunit_try_run_case+0x1a6/0x480 [ 22.943678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.944274] kthread+0x257/0x310 [ 22.945502] ret_from_fork+0x41/0x80 [ 22.946333] ret_from_fork_asm+0x1a/0x30 [ 22.946675] [ 22.946861] The buggy address belongs to the object at ffff888102314e80 [ 22.946861] which belongs to the cache kmalloc-64 of size 64 [ 22.947422] The buggy address is located 0 bytes to the right of [ 22.947422] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.947984] [ 22.949138] The buggy address belongs to the physical page: [ 22.949474] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.950091] flags: 0x200000000000000(node=0|zone=2) [ 22.950609] page_type: f5(slab) [ 22.951130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.952130] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.953513] page dumped because: kasan: bad access detected [ 22.954838] [ 22.955136] Memory state around the buggy address: [ 22.955894] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.956625] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.957058] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.959815] ^ [ 22.960621] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.961164] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.962955] ================================================================== [ 22.617871] ================================================================== [ 22.619463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 22.620266] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270 [ 22.620864] [ 22.621250] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.621326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.621344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.621378] Call Trace: [ 22.621403] <TASK> [ 22.621428] dump_stack_lvl+0x73/0xb0 [ 22.621470] print_report+0xd1/0x640 [ 22.621506] ? __virt_addr_valid+0x1db/0x2d0 [ 22.621544] ? kasan_atomics_helper+0xac8/0x5450 [ 22.621580] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.621613] ? kasan_atomics_helper+0xac8/0x5450 [ 22.621648] kasan_report+0x140/0x180 [ 22.621682] ? kasan_atomics_helper+0xac8/0x5450 [ 22.621722] kasan_check_range+0x10c/0x1c0 [ 22.621752] __kasan_check_write+0x18/0x20 [ 22.621782] kasan_atomics_helper+0xac8/0x5450 [ 22.621823] ? kasan_save_alloc_info+0x3b/0x50 [ 22.621940] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.622179] ? __kmalloc_cache_noprof+0x168/0x350 [ 22.622286] ? trace_hardirqs_on+0x37/0xe0 [ 22.622380] kasan_atomics+0x1dd/0x310 [ 22.622456] ? __pfx_kasan_atomics+0x10/0x10 [ 22.622533] ? __pfx_read_tsc+0x10/0x10 [ 22.622605] ? ktime_get_ts64+0x84/0x230 [ 22.622687] kunit_try_run_case+0x1a6/0x480 [ 22.622767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.622850] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.622896] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.622936] ? __kthread_parkme+0x82/0x160 [ 22.622966] ? preempt_count_sub+0x50/0x80 [ 22.622999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.623028] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.623066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.623105] kthread+0x257/0x310 [ 22.623131] ? __pfx_kthread+0x10/0x10 [ 22.623160] ret_from_fork+0x41/0x80 [ 22.623190] ? __pfx_kthread+0x10/0x10 [ 22.623217] ret_from_fork_asm+0x1a/0x30 [ 22.623301] </TASK> [ 22.623317] [ 22.642676] Allocated by task 270: [ 22.643631] kasan_save_stack+0x45/0x70 [ 22.644574] kasan_save_track+0x18/0x40 [ 22.644947] kasan_save_alloc_info+0x3b/0x50 [ 22.645518] __kasan_kmalloc+0xb7/0xc0 [ 22.646163] __kmalloc_cache_noprof+0x168/0x350 [ 22.646623] kasan_atomics+0x96/0x310 [ 22.647312] kunit_try_run_case+0x1a6/0x480 [ 22.647989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.648473] kthread+0x257/0x310 [ 22.648817] ret_from_fork+0x41/0x80 [ 22.649190] ret_from_fork_asm+0x1a/0x30 [ 22.649939] [ 22.650175] The buggy address belongs to the object at ffff888102314e80 [ 22.650175] which belongs to the cache kmalloc-64 of size 64 [ 22.651580] The buggy address is located 0 bytes to the right of [ 22.651580] allocated 48-byte region [ffff888102314e80, ffff888102314eb0) [ 22.653204] [ 22.653423] The buggy address belongs to the physical page: [ 22.653756] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314 [ 22.654664] flags: 0x200000000000000(node=0|zone=2) [ 22.655408] page_type: f5(slab) [ 22.655801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.656770] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.657588] page dumped because: kasan: bad access detected [ 22.658065] [ 22.658284] Memory state around the buggy address: [ 22.658737] ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.659621] ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.660327] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.660933] ^ [ 22.661320] ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.662216] ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.662904] ==================================================================