Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 27.070534] ================================================================== [ 27.070697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 27.070814] Write of size 4 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.070959] [ 27.071031] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.071576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.072077] Hardware name: linux,dummy-virt (DT) [ 27.072192] Call trace: [ 27.072457] show_stack+0x20/0x38 (C) [ 27.072788] dump_stack_lvl+0x8c/0xd0 [ 27.072941] print_report+0x118/0x608 [ 27.073068] kasan_report+0xdc/0x128 [ 27.073182] kasan_check_range+0x100/0x1a8 [ 27.073298] __kasan_check_write+0x20/0x30 [ 27.073419] kasan_atomics_helper+0x99c/0x4858 [ 27.073538] kasan_atomics+0x198/0x2e0 [ 27.073646] kunit_try_run_case+0x170/0x3f0 [ 27.074668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.075236] kthread+0x328/0x630 [ 27.075509] ret_from_fork+0x10/0x20 [ 27.075705] [ 27.075823] Allocated by task 267: [ 27.075905] kasan_save_stack+0x3c/0x68 [ 27.076031] kasan_save_track+0x20/0x40 [ 27.076139] kasan_save_alloc_info+0x40/0x58 [ 27.076242] __kasan_kmalloc+0xd4/0xd8 [ 27.076355] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.076675] kasan_atomics+0xb8/0x2e0 [ 27.079029] kunit_try_run_case+0x170/0x3f0 [ 27.079150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.079309] kthread+0x328/0x630 [ 27.079421] ret_from_fork+0x10/0x20 [ 27.079534] [ 27.079593] The buggy address belongs to the object at fff00000c7615800 [ 27.079593] which belongs to the cache kmalloc-64 of size 64 [ 27.079759] The buggy address is located 0 bytes to the right of [ 27.079759] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.079954] [ 27.080014] The buggy address belongs to the physical page: [ 27.080095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.081486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.088713] Write of size 4 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.091514] ret_from_fork+0x10/0x20 [ 27.092003] [ 27.092284] Allocated by task 267: [ 27.092379] kasan_save_stack+0x3c/0x68 [ 27.092490] kasan_save_track+0x20/0x40 [ 27.093116] kasan_save_alloc_info+0x40/0x58 [ 27.093608] __kasan_kmalloc+0xd4/0xd8 [ 27.093722] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.093984] kasan_atomics+0xb8/0x2e0 [ 27.094345] kunit_try_run_case+0x170/0x3f0 [ 27.094452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.094563] kthread+0x328/0x630 [ 27.094655] ret_from_fork+0x10/0x20 [ 27.096529] [ 27.096816] The buggy address belongs to the object at fff00000c7615800 [ 27.096816] which belongs to the cache kmalloc-64 of size 64 [ 27.097655] The buggy address is located 0 bytes to the right of [ 27.097655] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.098769] [ 27.099480] The buggy address belongs to the physical page: [ 27.099564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.099707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.100458] page_type: f5(slab) [ 27.101537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.101867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.101989] page dumped because: kasan: bad access detected [ 27.103334] [ 27.103469] Memory state around the buggy address: [ 27.103549] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.104689] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.105253] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.105361] ^ [ 27.106567] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.107199] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.108645] ================================================================== [ 27.290955] ================================================================== [ 27.291542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 27.291969] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.292117] [ 27.292263] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.293271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.293615] Hardware name: linux,dummy-virt (DT) [ 27.293706] Call trace: [ 27.293768] show_stack+0x20/0x38 (C) [ 27.294734] dump_stack_lvl+0x8c/0xd0 [ 27.294973] print_report+0x118/0x608 [ 27.295562] kasan_report+0xdc/0x128 [ 27.296072] __asan_report_load8_noabort+0x20/0x30 [ 27.296393] kasan_atomics_helper+0x3f58/0x4858 [ 27.296767] kasan_atomics+0x198/0x2e0 [ 27.297515] kunit_try_run_case+0x170/0x3f0 [ 27.297670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.297808] kthread+0x328/0x630 [ 27.297927] ret_from_fork+0x10/0x20 [ 27.298074] [ 27.299341] Allocated by task 267: [ 27.299592] kasan_save_stack+0x3c/0x68 [ 27.299721] kasan_save_track+0x20/0x40 [ 27.299834] kasan_save_alloc_info+0x40/0x58 [ 27.300631] __kasan_kmalloc+0xd4/0xd8 [ 27.300999] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.301258] kasan_atomics+0xb8/0x2e0 [ 27.301353] kunit_try_run_case+0x170/0x3f0 [ 27.301453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.301560] kthread+0x328/0x630 [ 27.302453] ret_from_fork+0x10/0x20 [ 27.303199] [ 27.303462] The buggy address belongs to the object at fff00000c7615800 [ 27.303462] which belongs to the cache kmalloc-64 of size 64 [ 27.303793] The buggy address is located 0 bytes to the right of [ 27.303793] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.303983] [ 27.304223] The buggy address belongs to the physical page: [ 27.304983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.305274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.305730] page_type: f5(slab) [ 27.305828] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.305975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.306080] page dumped because: kasan: bad access detected [ 27.306913] [ 27.307221] Memory state around the buggy address: [ 27.307482] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.307976] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.308341] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.308447] ^ [ 27.309142] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.309271] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.309373] ================================================================== [ 27.528070] ================================================================== [ 27.528189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 27.528308] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.529558] [ 27.529749] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.530019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.530113] Hardware name: linux,dummy-virt (DT) [ 27.530201] Call trace: [ 27.530265] show_stack+0x20/0x38 (C) [ 27.530392] dump_stack_lvl+0x8c/0xd0 [ 27.531099] print_report+0x118/0x608 [ 27.531390] kasan_report+0xdc/0x128 [ 27.531560] kasan_check_range+0x100/0x1a8 [ 27.531781] __kasan_check_write+0x20/0x30 [ 27.532207] kasan_atomics_helper+0x154c/0x4858 [ 27.532346] kasan_atomics+0x198/0x2e0 [ 27.532738] kunit_try_run_case+0x170/0x3f0 [ 27.533185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.533688] kthread+0x328/0x630 [ 27.533808] ret_from_fork+0x10/0x20 [ 27.534606] [ 27.534900] Allocated by task 267: [ 27.535190] kasan_save_stack+0x3c/0x68 [ 27.535296] kasan_save_track+0x20/0x40 [ 27.535708] kasan_save_alloc_info+0x40/0x58 [ 27.536006] __kasan_kmalloc+0xd4/0xd8 [ 27.536119] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.536401] kasan_atomics+0xb8/0x2e0 [ 27.536518] kunit_try_run_case+0x170/0x3f0 [ 27.537797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.537923] kthread+0x328/0x630 [ 27.538039] ret_from_fork+0x10/0x20 [ 27.538133] [ 27.538186] The buggy address belongs to the object at fff00000c7615800 [ 27.538186] which belongs to the cache kmalloc-64 of size 64 [ 27.538487] The buggy address is located 0 bytes to the right of [ 27.538487] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.538670] [ 27.538725] The buggy address belongs to the physical page: [ 27.538804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.539134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.540020] page_type: f5(slab) [ 27.540126] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.540508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.540633] page dumped because: kasan: bad access detected [ 27.540723] [ 27.540777] Memory state around the buggy address: [ 27.540855] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.541432] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.542123] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.542270] ^ [ 27.542370] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.542476] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.542576] ================================================================== [ 27.518747] ================================================================== [ 27.518859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 27.518987] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.519109] [ 27.519180] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.519369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.519434] Hardware name: linux,dummy-virt (DT) [ 27.519510] Call trace: [ 27.519616] show_stack+0x20/0x38 (C) [ 27.519825] dump_stack_lvl+0x8c/0xd0 [ 27.520038] print_report+0x118/0x608 [ 27.520454] kasan_report+0xdc/0x128 [ 27.520579] kasan_check_range+0x100/0x1a8 [ 27.520729] __kasan_check_write+0x20/0x30 [ 27.521223] kasan_atomics_helper+0x14e4/0x4858 [ 27.521375] kasan_atomics+0x198/0x2e0 [ 27.521504] kunit_try_run_case+0x170/0x3f0 [ 27.521633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.522214] kthread+0x328/0x630 [ 27.522793] ret_from_fork+0x10/0x20 [ 27.523041] [ 27.523109] Allocated by task 267: [ 27.523203] kasan_save_stack+0x3c/0x68 [ 27.523407] kasan_save_track+0x20/0x40 [ 27.523723] kasan_save_alloc_info+0x40/0x58 [ 27.523897] __kasan_kmalloc+0xd4/0xd8 [ 27.524024] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.524172] kasan_atomics+0xb8/0x2e0 [ 27.524316] kunit_try_run_case+0x170/0x3f0 [ 27.524428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.524589] kthread+0x328/0x630 [ 27.524818] ret_from_fork+0x10/0x20 [ 27.524970] [ 27.525041] The buggy address belongs to the object at fff00000c7615800 [ 27.525041] which belongs to the cache kmalloc-64 of size 64 [ 27.525205] The buggy address is located 0 bytes to the right of [ 27.525205] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.525405] [ 27.525489] The buggy address belongs to the physical page: [ 27.525595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.525748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.525889] page_type: f5(slab) [ 27.526013] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.526160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.526278] page dumped because: kasan: bad access detected [ 27.526371] [ 27.526429] Memory state around the buggy address: [ 27.526508] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.526617] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.526794] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.526995] ^ [ 27.527102] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.527221] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.527329] ================================================================== [ 27.340493] ================================================================== [ 27.340629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 27.340749] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.340883] [ 27.340963] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.341205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.341281] Hardware name: linux,dummy-virt (DT) [ 27.341357] Call trace: [ 27.341425] show_stack+0x20/0x38 (C) [ 27.341645] dump_stack_lvl+0x8c/0xd0 [ 27.341786] print_report+0x118/0x608 [ 27.341905] kasan_report+0xdc/0x128 [ 27.342191] kasan_check_range+0x100/0x1a8 [ 27.342525] __kasan_check_write+0x20/0x30 [ 27.342860] kasan_atomics_helper+0xf20/0x4858 [ 27.343209] kasan_atomics+0x198/0x2e0 [ 27.343416] kunit_try_run_case+0x170/0x3f0 [ 27.343539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.343706] kthread+0x328/0x630 [ 27.343879] ret_from_fork+0x10/0x20 [ 27.344115] [ 27.344197] Allocated by task 267: [ 27.344284] kasan_save_stack+0x3c/0x68 [ 27.344401] kasan_save_track+0x20/0x40 [ 27.344510] kasan_save_alloc_info+0x40/0x58 [ 27.344653] __kasan_kmalloc+0xd4/0xd8 [ 27.344754] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.344968] kasan_atomics+0xb8/0x2e0 [ 27.345056] kunit_try_run_case+0x170/0x3f0 [ 27.345242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.345357] kthread+0x328/0x630 [ 27.345469] ret_from_fork+0x10/0x20 [ 27.345654] [ 27.345759] The buggy address belongs to the object at fff00000c7615800 [ 27.345759] which belongs to the cache kmalloc-64 of size 64 [ 27.346006] The buggy address is located 0 bytes to the right of [ 27.346006] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.346433] [ 27.346509] The buggy address belongs to the physical page: [ 27.346586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.346787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.347007] page_type: f5(slab) [ 27.347100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.347224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.347394] page dumped because: kasan: bad access detected [ 27.347513] [ 27.347567] Memory state around the buggy address: [ 27.347641] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.347783] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.347904] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.348073] ^ [ 27.348218] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.348375] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.348486] ================================================================== [ 27.506330] ================================================================== [ 27.506442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 27.506647] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.506765] [ 27.506967] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.507506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.507635] Hardware name: linux,dummy-virt (DT) [ 27.507748] Call trace: [ 27.507818] show_stack+0x20/0x38 (C) [ 27.507983] dump_stack_lvl+0x8c/0xd0 [ 27.508448] print_report+0x118/0x608 [ 27.508946] kasan_report+0xdc/0x128 [ 27.509205] kasan_check_range+0x100/0x1a8 [ 27.509453] __kasan_check_write+0x20/0x30 [ 27.509631] kasan_atomics_helper+0x147c/0x4858 [ 27.509773] kasan_atomics+0x198/0x2e0 [ 27.510159] kunit_try_run_case+0x170/0x3f0 [ 27.510295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.510439] kthread+0x328/0x630 [ 27.510776] ret_from_fork+0x10/0x20 [ 27.511115] [ 27.511223] Allocated by task 267: [ 27.511406] kasan_save_stack+0x3c/0x68 [ 27.511526] kasan_save_track+0x20/0x40 [ 27.511635] kasan_save_alloc_info+0x40/0x58 [ 27.511747] __kasan_kmalloc+0xd4/0xd8 [ 27.511870] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.512024] kasan_atomics+0xb8/0x2e0 [ 27.512133] kunit_try_run_case+0x170/0x3f0 [ 27.512833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.513096] kthread+0x328/0x630 [ 27.513566] ret_from_fork+0x10/0x20 [ 27.513865] [ 27.513951] The buggy address belongs to the object at fff00000c7615800 [ 27.513951] which belongs to the cache kmalloc-64 of size 64 [ 27.514213] The buggy address is located 0 bytes to the right of [ 27.514213] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.514413] [ 27.514479] The buggy address belongs to the physical page: [ 27.514569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.514987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.515658] page_type: f5(slab) [ 27.516032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.516644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.516761] page dumped because: kasan: bad access detected [ 27.516844] [ 27.516926] Memory state around the buggy address: [ 27.517031] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.517190] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.517563] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.517713] ^ [ 27.517899] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.518047] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.518158] ================================================================== [ 27.309959] ================================================================== [ 27.310079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 27.310357] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.310482] [ 27.310621] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.311160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.311345] Hardware name: linux,dummy-virt (DT) [ 27.311605] Call trace: [ 27.311687] show_stack+0x20/0x38 (C) [ 27.311834] dump_stack_lvl+0x8c/0xd0 [ 27.312501] print_report+0x118/0x608 [ 27.312728] kasan_report+0xdc/0x128 [ 27.312910] kasan_check_range+0x100/0x1a8 [ 27.313065] __kasan_check_write+0x20/0x30 [ 27.313218] kasan_atomics_helper+0xe44/0x4858 [ 27.313568] kasan_atomics+0x198/0x2e0 [ 27.313696] kunit_try_run_case+0x170/0x3f0 [ 27.313877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.314042] kthread+0x328/0x630 [ 27.314183] ret_from_fork+0x10/0x20 [ 27.314307] [ 27.314352] Allocated by task 267: [ 27.314441] kasan_save_stack+0x3c/0x68 [ 27.314546] kasan_save_track+0x20/0x40 [ 27.314640] kasan_save_alloc_info+0x40/0x58 [ 27.314740] __kasan_kmalloc+0xd4/0xd8 [ 27.314830] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.314952] kasan_atomics+0xb8/0x2e0 [ 27.315042] kunit_try_run_case+0x170/0x3f0 [ 27.315154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.315569] kthread+0x328/0x630 [ 27.315858] ret_from_fork+0x10/0x20 [ 27.316215] [ 27.316583] The buggy address belongs to the object at fff00000c7615800 [ 27.316583] which belongs to the cache kmalloc-64 of size 64 [ 27.316995] The buggy address is located 0 bytes to the right of [ 27.316995] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.317828] [ 27.317915] The buggy address belongs to the physical page: [ 27.318013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.318540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.319134] page_type: f5(slab) [ 27.319273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.319416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.320079] page dumped because: kasan: bad access detected [ 27.320189] [ 27.320307] Memory state around the buggy address: [ 27.320656] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.320768] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.321164] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.321638] ^ [ 27.321910] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.322296] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.322393] ================================================================== [ 27.585712] ================================================================== [ 27.585992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 27.586280] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.586507] [ 27.586580] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.586824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.586903] Hardware name: linux,dummy-virt (DT) [ 27.587070] Call trace: [ 27.587143] show_stack+0x20/0x38 (C) [ 27.587376] dump_stack_lvl+0x8c/0xd0 [ 27.587674] print_report+0x118/0x608 [ 27.587846] kasan_report+0xdc/0x128 [ 27.588017] kasan_check_range+0x100/0x1a8 [ 27.588195] __kasan_check_write+0x20/0x30 [ 27.588848] kasan_atomics_helper+0x16d0/0x4858 [ 27.589370] kasan_atomics+0x198/0x2e0 [ 27.589517] kunit_try_run_case+0x170/0x3f0 [ 27.589657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.589793] kthread+0x328/0x630 [ 27.590624] ret_from_fork+0x10/0x20 [ 27.590807] [ 27.591002] Allocated by task 267: [ 27.591080] kasan_save_stack+0x3c/0x68 [ 27.591561] kasan_save_track+0x20/0x40 [ 27.591757] kasan_save_alloc_info+0x40/0x58 [ 27.592432] __kasan_kmalloc+0xd4/0xd8 [ 27.592539] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.592711] kasan_atomics+0xb8/0x2e0 [ 27.592808] kunit_try_run_case+0x170/0x3f0 [ 27.592909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.593052] kthread+0x328/0x630 [ 27.593156] ret_from_fork+0x10/0x20 [ 27.593289] [ 27.593340] The buggy address belongs to the object at fff00000c7615800 [ 27.593340] which belongs to the cache kmalloc-64 of size 64 [ 27.593708] The buggy address is located 0 bytes to the right of [ 27.593708] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.593913] [ 27.593995] The buggy address belongs to the physical page: [ 27.594073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.594322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.594464] page_type: f5(slab) [ 27.594571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.594719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.594960] page dumped because: kasan: bad access detected [ 27.595046] [ 27.595436] Memory state around the buggy address: [ 27.595599] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.596367] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.596672] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.597194] ^ [ 27.597309] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.597482] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.597620] ================================================================== [ 27.448807] ================================================================== [ 27.448914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 27.449140] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.449435] [ 27.449511] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.450124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.450426] Hardware name: linux,dummy-virt (DT) [ 27.450673] Call trace: [ 27.451192] show_stack+0x20/0x38 (C) [ 27.451313] dump_stack_lvl+0x8c/0xd0 [ 27.451433] print_report+0x118/0x608 [ 27.451561] kasan_report+0xdc/0x128 [ 27.451689] kasan_check_range+0x100/0x1a8 [ 27.451810] __kasan_check_write+0x20/0x30 [ 27.451924] kasan_atomics_helper+0x12d8/0x4858 [ 27.452062] kasan_atomics+0x198/0x2e0 [ 27.452173] kunit_try_run_case+0x170/0x3f0 [ 27.452296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.452429] kthread+0x328/0x630 [ 27.452540] ret_from_fork+0x10/0x20 [ 27.452658] [ 27.452704] Allocated by task 267: [ 27.452774] kasan_save_stack+0x3c/0x68 [ 27.452867] kasan_save_track+0x20/0x40 [ 27.455224] kasan_save_alloc_info+0x40/0x58 [ 27.455429] __kasan_kmalloc+0xd4/0xd8 [ 27.455597] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.455756] kasan_atomics+0xb8/0x2e0 [ 27.455862] kunit_try_run_case+0x170/0x3f0 [ 27.456173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.457123] kthread+0x328/0x630 [ 27.457261] ret_from_fork+0x10/0x20 [ 27.457413] [ 27.457497] The buggy address belongs to the object at fff00000c7615800 [ 27.457497] which belongs to the cache kmalloc-64 of size 64 [ 27.457747] The buggy address is located 0 bytes to the right of [ 27.457747] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.458008] [ 27.458084] The buggy address belongs to the physical page: [ 27.459283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.459706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.459859] page_type: f5(slab) [ 27.460495] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.460644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.461348] page dumped because: kasan: bad access detected [ 27.461449] [ 27.461550] Memory state around the buggy address: [ 27.461631] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.462059] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.462337] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.462810] ^ [ 27.463070] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.463240] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.463337] ================================================================== [ 27.323088] ================================================================== [ 27.323191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 27.323299] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.323418] [ 27.323483] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.323712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.323954] Hardware name: linux,dummy-virt (DT) [ 27.324038] Call trace: [ 27.324103] show_stack+0x20/0x38 (C) [ 27.324283] dump_stack_lvl+0x8c/0xd0 [ 27.324412] print_report+0x118/0x608 [ 27.324534] kasan_report+0xdc/0x128 [ 27.324840] __asan_report_store8_noabort+0x20/0x30 [ 27.325024] kasan_atomics_helper+0x3e5c/0x4858 [ 27.325343] kasan_atomics+0x198/0x2e0 [ 27.325468] kunit_try_run_case+0x170/0x3f0 [ 27.325605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.325780] kthread+0x328/0x630 [ 27.326010] ret_from_fork+0x10/0x20 [ 27.326138] [ 27.326235] Allocated by task 267: [ 27.326321] kasan_save_stack+0x3c/0x68 [ 27.326440] kasan_save_track+0x20/0x40 [ 27.326544] kasan_save_alloc_info+0x40/0x58 [ 27.326644] __kasan_kmalloc+0xd4/0xd8 [ 27.326947] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.327061] kasan_atomics+0xb8/0x2e0 [ 27.327290] kunit_try_run_case+0x170/0x3f0 [ 27.327402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.327533] kthread+0x328/0x630 [ 27.327632] ret_from_fork+0x10/0x20 [ 27.327737] [ 27.327799] The buggy address belongs to the object at fff00000c7615800 [ 27.327799] which belongs to the cache kmalloc-64 of size 64 [ 27.328013] The buggy address is located 0 bytes to the right of [ 27.328013] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.328225] [ 27.328408] The buggy address belongs to the physical page: [ 27.328630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.328763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.328880] page_type: f5(slab) [ 27.328993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.329312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.329453] page dumped because: kasan: bad access detected [ 27.329532] [ 27.329582] Memory state around the buggy address: [ 27.329665] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.329765] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.329903] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.330034] ^ [ 27.330119] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.330312] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.330474] ================================================================== [ 27.252421] ================================================================== [ 27.252821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 27.252956] Write of size 4 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.253087] [ 27.253156] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.253351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.253416] Hardware name: linux,dummy-virt (DT) [ 27.253503] Call trace: [ 27.253663] show_stack+0x20/0x38 (C) [ 27.253787] dump_stack_lvl+0x8c/0xd0 [ 27.253944] print_report+0x118/0x608 [ 27.254076] kasan_report+0xdc/0x128 [ 27.254191] kasan_check_range+0x100/0x1a8 [ 27.254312] __kasan_check_write+0x20/0x30 [ 27.254429] kasan_atomics_helper+0xd3c/0x4858 [ 27.254547] kasan_atomics+0x198/0x2e0 [ 27.254660] kunit_try_run_case+0x170/0x3f0 [ 27.254780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.254913] kthread+0x328/0x630 [ 27.256473] ret_from_fork+0x10/0x20 [ 27.256618] [ 27.256667] Allocated by task 267: [ 27.256754] kasan_save_stack+0x3c/0x68 [ 27.256911] kasan_save_track+0x20/0x40 [ 27.257029] kasan_save_alloc_info+0x40/0x58 [ 27.257190] __kasan_kmalloc+0xd4/0xd8 [ 27.257293] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.257452] kasan_atomics+0xb8/0x2e0 [ 27.257667] kunit_try_run_case+0x170/0x3f0 [ 27.257784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.257911] kthread+0x328/0x630 [ 27.258096] ret_from_fork+0x10/0x20 [ 27.258217] [ 27.258313] The buggy address belongs to the object at fff00000c7615800 [ 27.258313] which belongs to the cache kmalloc-64 of size 64 [ 27.258472] The buggy address is located 0 bytes to the right of [ 27.258472] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.258635] [ 27.258742] The buggy address belongs to the physical page: [ 27.258892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.259081] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.259204] page_type: f5(slab) [ 27.259290] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.259445] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.259873] page dumped because: kasan: bad access detected [ 27.260047] [ 27.260173] Memory state around the buggy address: [ 27.260295] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.260412] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.260556] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.260686] ^ [ 27.260774] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.260881] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.261007] ================================================================== [ 27.436497] ================================================================== [ 27.436609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 27.436721] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.436850] [ 27.436924] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.437141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.437225] Hardware name: linux,dummy-virt (DT) [ 27.437318] Call trace: [ 27.437823] show_stack+0x20/0x38 (C) [ 27.438003] dump_stack_lvl+0x8c/0xd0 [ 27.438312] print_report+0x118/0x608 [ 27.438754] kasan_report+0xdc/0x128 [ 27.439675] kasan_check_range+0x100/0x1a8 [ 27.439844] __kasan_check_write+0x20/0x30 [ 27.439996] kasan_atomics_helper+0x126c/0x4858 [ 27.440240] kasan_atomics+0x198/0x2e0 [ 27.440405] kunit_try_run_case+0x170/0x3f0 [ 27.440638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.440876] kthread+0x328/0x630 [ 27.441104] ret_from_fork+0x10/0x20 [ 27.441549] [ 27.441632] Allocated by task 267: [ 27.441815] kasan_save_stack+0x3c/0x68 [ 27.442122] kasan_save_track+0x20/0x40 [ 27.442236] kasan_save_alloc_info+0x40/0x58 [ 27.442712] __kasan_kmalloc+0xd4/0xd8 [ 27.443034] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.443283] kasan_atomics+0xb8/0x2e0 [ 27.443657] kunit_try_run_case+0x170/0x3f0 [ 27.443783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.443956] kthread+0x328/0x630 [ 27.444067] ret_from_fork+0x10/0x20 [ 27.444330] [ 27.444408] The buggy address belongs to the object at fff00000c7615800 [ 27.444408] which belongs to the cache kmalloc-64 of size 64 [ 27.444550] The buggy address is located 0 bytes to the right of [ 27.444550] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.444752] [ 27.444908] The buggy address belongs to the physical page: [ 27.445022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.445231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.445540] page_type: f5(slab) [ 27.445638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.445826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.446022] page dumped because: kasan: bad access detected [ 27.446117] [ 27.446180] Memory state around the buggy address: [ 27.446272] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.446400] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.446820] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.447454] ^ [ 27.447702] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.447951] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.448090] ================================================================== [ 27.348841] ================================================================== [ 27.348963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 27.349066] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.349351] [ 27.349420] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.349896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.349983] Hardware name: linux,dummy-virt (DT) [ 27.350063] Call trace: [ 27.350118] show_stack+0x20/0x38 (C) [ 27.350246] dump_stack_lvl+0x8c/0xd0 [ 27.350543] print_report+0x118/0x608 [ 27.350975] kasan_report+0xdc/0x128 [ 27.351129] kasan_check_range+0x100/0x1a8 [ 27.351275] __kasan_check_write+0x20/0x30 [ 27.351406] kasan_atomics_helper+0xf88/0x4858 [ 27.351520] kasan_atomics+0x198/0x2e0 [ 27.351701] kunit_try_run_case+0x170/0x3f0 [ 27.351840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.352192] kthread+0x328/0x630 [ 27.352534] ret_from_fork+0x10/0x20 [ 27.352699] [ 27.352762] Allocated by task 267: [ 27.352968] kasan_save_stack+0x3c/0x68 [ 27.353203] kasan_save_track+0x20/0x40 [ 27.353397] kasan_save_alloc_info+0x40/0x58 [ 27.353516] __kasan_kmalloc+0xd4/0xd8 [ 27.354043] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.354153] kasan_atomics+0xb8/0x2e0 [ 27.354263] kunit_try_run_case+0x170/0x3f0 [ 27.354386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.354518] kthread+0x328/0x630 [ 27.354608] ret_from_fork+0x10/0x20 [ 27.354792] [ 27.354849] The buggy address belongs to the object at fff00000c7615800 [ 27.354849] which belongs to the cache kmalloc-64 of size 64 [ 27.355004] The buggy address is located 0 bytes to the right of [ 27.355004] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.355192] [ 27.355246] The buggy address belongs to the physical page: [ 27.355384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.355512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.355738] page_type: f5(slab) [ 27.355882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.356032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.356140] page dumped because: kasan: bad access detected [ 27.356235] [ 27.356292] Memory state around the buggy address: [ 27.356372] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.356553] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.356826] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.357007] ^ [ 27.357095] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.357374] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.357528] ================================================================== [ 27.422190] ================================================================== [ 27.422689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 27.422814] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.423018] [ 27.423228] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.423493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.423875] Hardware name: linux,dummy-virt (DT) [ 27.423980] Call trace: [ 27.424063] show_stack+0x20/0x38 (C) [ 27.424282] dump_stack_lvl+0x8c/0xd0 [ 27.424507] print_report+0x118/0x608 [ 27.424649] kasan_report+0xdc/0x128 [ 27.425208] kasan_check_range+0x100/0x1a8 [ 27.425351] __kasan_check_write+0x20/0x30 [ 27.425499] kasan_atomics_helper+0x11f8/0x4858 [ 27.425722] kasan_atomics+0x198/0x2e0 [ 27.425927] kunit_try_run_case+0x170/0x3f0 [ 27.426092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.426243] kthread+0x328/0x630 [ 27.426595] ret_from_fork+0x10/0x20 [ 27.426848] [ 27.426979] Allocated by task 267: [ 27.427091] kasan_save_stack+0x3c/0x68 [ 27.427265] kasan_save_track+0x20/0x40 [ 27.427371] kasan_save_alloc_info+0x40/0x58 [ 27.427487] __kasan_kmalloc+0xd4/0xd8 [ 27.427956] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.428158] kasan_atomics+0xb8/0x2e0 [ 27.428359] kunit_try_run_case+0x170/0x3f0 [ 27.428593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.428782] kthread+0x328/0x630 [ 27.428879] ret_from_fork+0x10/0x20 [ 27.429004] [ 27.429111] The buggy address belongs to the object at fff00000c7615800 [ 27.429111] which belongs to the cache kmalloc-64 of size 64 [ 27.429264] The buggy address is located 0 bytes to the right of [ 27.429264] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.429426] [ 27.429482] The buggy address belongs to the physical page: [ 27.429877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.430164] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.430299] page_type: f5(slab) [ 27.430812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.431160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.431565] page dumped because: kasan: bad access detected [ 27.431840] [ 27.432016] Memory state around the buggy address: [ 27.432220] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.432627] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.432746] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.432843] ^ [ 27.433218] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.433519] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.434221] ================================================================== [ 27.475987] ================================================================== [ 27.476097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 27.476440] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.476505] [ 27.476544] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.476640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.476673] Hardware name: linux,dummy-virt (DT) [ 27.476714] Call trace: [ 27.476742] show_stack+0x20/0x38 (C) [ 27.476805] dump_stack_lvl+0x8c/0xd0 [ 27.476866] print_report+0x118/0x608 [ 27.476923] kasan_report+0xdc/0x128 [ 27.477061] __asan_report_load8_noabort+0x20/0x30 [ 27.477219] kasan_atomics_helper+0x3f04/0x4858 [ 27.477421] kasan_atomics+0x198/0x2e0 [ 27.477621] kunit_try_run_case+0x170/0x3f0 [ 27.477757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.477893] kthread+0x328/0x630 [ 27.478029] ret_from_fork+0x10/0x20 [ 27.478151] [ 27.478197] Allocated by task 267: [ 27.478829] kasan_save_stack+0x3c/0x68 [ 27.479008] kasan_save_track+0x20/0x40 [ 27.479120] kasan_save_alloc_info+0x40/0x58 [ 27.479228] __kasan_kmalloc+0xd4/0xd8 [ 27.479325] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.479423] kasan_atomics+0xb8/0x2e0 [ 27.480759] kunit_try_run_case+0x170/0x3f0 [ 27.481089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.481496] kthread+0x328/0x630 [ 27.481921] ret_from_fork+0x10/0x20 [ 27.482670] [ 27.483043] The buggy address belongs to the object at fff00000c7615800 [ 27.483043] which belongs to the cache kmalloc-64 of size 64 [ 27.483830] The buggy address is located 0 bytes to the right of [ 27.483830] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.484036] [ 27.484111] The buggy address belongs to the physical page: [ 27.484190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.484396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.484805] page_type: f5(slab) [ 27.485185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.485319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.485423] page dumped because: kasan: bad access detected [ 27.486198] [ 27.486661] Memory state around the buggy address: [ 27.488016] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.488082] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.488140] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.488192] ^ [ 27.488236] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.488290] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.488338] ================================================================== [ 27.358407] ================================================================== [ 27.358514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 27.358619] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.358738] [ 27.358804] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.359016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.359088] Hardware name: linux,dummy-virt (DT) [ 27.359173] Call trace: [ 27.359340] show_stack+0x20/0x38 (C) [ 27.359697] dump_stack_lvl+0x8c/0xd0 [ 27.359821] print_report+0x118/0x608 [ 27.360013] kasan_report+0xdc/0x128 [ 27.360157] kasan_check_range+0x100/0x1a8 [ 27.360297] __kasan_check_write+0x20/0x30 [ 27.360443] kasan_atomics_helper+0xff0/0x4858 [ 27.360581] kasan_atomics+0x198/0x2e0 [ 27.360689] kunit_try_run_case+0x170/0x3f0 [ 27.360888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.361062] kthread+0x328/0x630 [ 27.361181] ret_from_fork+0x10/0x20 [ 27.361389] [ 27.361499] Allocated by task 267: [ 27.361570] kasan_save_stack+0x3c/0x68 [ 27.361777] kasan_save_track+0x20/0x40 [ 27.361924] kasan_save_alloc_info+0x40/0x58 [ 27.362230] __kasan_kmalloc+0xd4/0xd8 [ 27.362371] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.362573] kasan_atomics+0xb8/0x2e0 [ 27.362692] kunit_try_run_case+0x170/0x3f0 [ 27.362799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.362976] kthread+0x328/0x630 [ 27.363084] ret_from_fork+0x10/0x20 [ 27.363236] [ 27.363297] The buggy address belongs to the object at fff00000c7615800 [ 27.363297] which belongs to the cache kmalloc-64 of size 64 [ 27.363446] The buggy address is located 0 bytes to the right of [ 27.363446] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.363863] [ 27.364028] The buggy address belongs to the physical page: [ 27.364139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.364325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.364447] page_type: f5(slab) [ 27.364620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.364844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.364970] page dumped because: kasan: bad access detected [ 27.365098] [ 27.365151] Memory state around the buggy address: [ 27.365227] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.365460] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.365737] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.365865] ^ [ 27.366262] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.366389] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.366499] ================================================================== [ 27.630248] ================================================================== [ 27.630347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 27.630458] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.630579] [ 27.630645] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.630831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.630900] Hardware name: linux,dummy-virt (DT) [ 27.630997] Call trace: [ 27.631052] show_stack+0x20/0x38 (C) [ 27.631170] dump_stack_lvl+0x8c/0xd0 [ 27.631287] print_report+0x118/0x608 [ 27.631400] kasan_report+0xdc/0x128 [ 27.631552] __asan_report_load8_noabort+0x20/0x30 [ 27.631720] kasan_atomics_helper+0x3e20/0x4858 [ 27.631919] kasan_atomics+0x198/0x2e0 [ 27.632091] kunit_try_run_case+0x170/0x3f0 [ 27.632233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.632597] kthread+0x328/0x630 [ 27.632947] ret_from_fork+0x10/0x20 [ 27.633117] [ 27.633261] Allocated by task 267: [ 27.633547] kasan_save_stack+0x3c/0x68 [ 27.633654] kasan_save_track+0x20/0x40 [ 27.634106] kasan_save_alloc_info+0x40/0x58 [ 27.634563] __kasan_kmalloc+0xd4/0xd8 [ 27.634686] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.635221] kasan_atomics+0xb8/0x2e0 [ 27.635323] kunit_try_run_case+0x170/0x3f0 [ 27.635423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.635919] kthread+0x328/0x630 [ 27.636321] ret_from_fork+0x10/0x20 [ 27.636441] [ 27.636499] The buggy address belongs to the object at fff00000c7615800 [ 27.636499] which belongs to the cache kmalloc-64 of size 64 [ 27.637360] The buggy address is located 0 bytes to the right of [ 27.637360] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.637912] [ 27.638634] The buggy address belongs to the physical page: [ 27.638802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.638970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.639291] page_type: f5(slab) [ 27.639385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.639510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.639700] page dumped because: kasan: bad access detected [ 27.639797] [ 27.639858] Memory state around the buggy address: [ 27.640129] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.640257] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.640385] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.640634] ^ [ 27.640822] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.640951] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.641127] ================================================================== [ 27.620186] ================================================================== [ 27.620299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 27.620504] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.620775] [ 27.620972] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.621256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.621325] Hardware name: linux,dummy-virt (DT) [ 27.621403] Call trace: [ 27.621458] show_stack+0x20/0x38 (C) [ 27.621584] dump_stack_lvl+0x8c/0xd0 [ 27.621709] print_report+0x118/0x608 [ 27.621823] kasan_report+0xdc/0x128 [ 27.622168] kasan_check_range+0x100/0x1a8 [ 27.622375] __kasan_check_write+0x20/0x30 [ 27.622512] kasan_atomics_helper+0x175c/0x4858 [ 27.622637] kasan_atomics+0x198/0x2e0 [ 27.622746] kunit_try_run_case+0x170/0x3f0 [ 27.622869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.623027] kthread+0x328/0x630 [ 27.623144] ret_from_fork+0x10/0x20 [ 27.623264] [ 27.623312] Allocated by task 267: [ 27.623381] kasan_save_stack+0x3c/0x68 [ 27.623472] kasan_save_track+0x20/0x40 [ 27.623580] kasan_save_alloc_info+0x40/0x58 [ 27.623689] __kasan_kmalloc+0xd4/0xd8 [ 27.623785] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.623888] kasan_atomics+0xb8/0x2e0 [ 27.624070] kunit_try_run_case+0x170/0x3f0 [ 27.624190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.624321] kthread+0x328/0x630 [ 27.624436] ret_from_fork+0x10/0x20 [ 27.624554] [ 27.624614] The buggy address belongs to the object at fff00000c7615800 [ 27.624614] which belongs to the cache kmalloc-64 of size 64 [ 27.625556] The buggy address is located 0 bytes to the right of [ 27.625556] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.625735] [ 27.625804] The buggy address belongs to the physical page: [ 27.625893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.626053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.626187] page_type: f5(slab) [ 27.626374] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.626973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.627470] page dumped because: kasan: bad access detected [ 27.627594] [ 27.627736] Memory state around the buggy address: [ 27.627885] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.628076] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.628198] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.628296] ^ [ 27.628387] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.628504] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.628602] ================================================================== [ 27.048066] ================================================================== [ 27.048152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 27.048398] [ 27.049610] kasan_atomics+0x198/0x2e0 [ 27.050682] kasan_save_alloc_info+0x40/0x58 [ 27.050903] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.052648] [ 27.052842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.054742] ^ [ 27.059109] Call trace: [ 27.059471] show_stack+0x20/0x38 (C) [ 27.059741] dump_stack_lvl+0x8c/0xd0 [ 27.060123] print_report+0x118/0x608 [ 27.060412] kasan_report+0xdc/0x128 [ 27.060541] kasan_check_range+0x100/0x1a8 [ 27.060792] __kasan_check_write+0x20/0x30 [ 27.060945] kasan_atomics_helper+0x934/0x4858 [ 27.061085] kasan_atomics+0x198/0x2e0 [ 27.061203] kunit_try_run_case+0x170/0x3f0 [ 27.061332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.061492] kthread+0x328/0x630 [ 27.061687] ret_from_fork+0x10/0x20 [ 27.062231] [ 27.062330] Allocated by task 267: [ 27.062408] kasan_save_stack+0x3c/0x68 [ 27.062511] kasan_save_track+0x20/0x40 [ 27.062603] kasan_save_alloc_info+0x40/0x58 [ 27.062703] __kasan_kmalloc+0xd4/0xd8 [ 27.062793] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.062900] kasan_atomics+0xb8/0x2e0 [ 27.063022] kunit_try_run_case+0x170/0x3f0 [ 27.063170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.063436] kthread+0x328/0x630 [ 27.063664] ret_from_fork+0x10/0x20 [ 27.063825] [ 27.063881] The buggy address belongs to the object at fff00000c7615800 [ 27.063881] which belongs to the cache kmalloc-64 of size 64 [ 27.064873] The buggy address is located 0 bytes to the right of [ 27.064873] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.065248] [ 27.065369] The buggy address belongs to the physical page: [ 27.065445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.065570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.065698] page_type: f5(slab) [ 27.065799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.065918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.066039] page dumped because: kasan: bad access detected [ 27.066124] [ 27.066173] Memory state around the buggy address: [ 27.066770] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.067267] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.067646] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.067868] ^ [ 27.068117] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.068570] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.068674] ================================================================== [ 27.488653] ================================================================== [ 27.488757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 27.488994] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.489130] [ 27.489579] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.490513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.490589] Hardware name: linux,dummy-virt (DT) [ 27.490666] Call trace: [ 27.490727] show_stack+0x20/0x38 (C) [ 27.491745] dump_stack_lvl+0x8c/0xd0 [ 27.491922] print_report+0x118/0x608 [ 27.492413] kasan_report+0xdc/0x128 [ 27.492541] kasan_check_range+0x100/0x1a8 [ 27.492671] __kasan_check_write+0x20/0x30 [ 27.492792] kasan_atomics_helper+0x1414/0x4858 [ 27.493839] kasan_atomics+0x198/0x2e0 [ 27.494439] kunit_try_run_case+0x170/0x3f0 [ 27.494614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.494986] kthread+0x328/0x630 [ 27.495139] ret_from_fork+0x10/0x20 [ 27.495385] [ 27.495440] Allocated by task 267: [ 27.495530] kasan_save_stack+0x3c/0x68 [ 27.495711] kasan_save_track+0x20/0x40 [ 27.495823] kasan_save_alloc_info+0x40/0x58 [ 27.496085] __kasan_kmalloc+0xd4/0xd8 [ 27.496200] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.496474] kasan_atomics+0xb8/0x2e0 [ 27.496676] kunit_try_run_case+0x170/0x3f0 [ 27.497410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.497810] kthread+0x328/0x630 [ 27.498172] ret_from_fork+0x10/0x20 [ 27.498432] [ 27.498487] The buggy address belongs to the object at fff00000c7615800 [ 27.498487] which belongs to the cache kmalloc-64 of size 64 [ 27.499020] The buggy address is located 0 bytes to the right of [ 27.499020] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.499763] [ 27.499850] The buggy address belongs to the physical page: [ 27.500031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.500348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.500512] page_type: f5(slab) [ 27.501155] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.503037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.503160] page dumped because: kasan: bad access detected [ 27.503246] [ 27.503773] Memory state around the buggy address: [ 27.504974] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.505111] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.505237] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.505345] ^ [ 27.505449] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.505602] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.505766] ================================================================== [ 27.574005] ================================================================== [ 27.574117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 27.574241] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.574428] [ 27.574508] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.574723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.574826] Hardware name: linux,dummy-virt (DT) [ 27.574908] Call trace: [ 27.574987] show_stack+0x20/0x38 (C) [ 27.575110] dump_stack_lvl+0x8c/0xd0 [ 27.575244] print_report+0x118/0x608 [ 27.575651] kasan_report+0xdc/0x128 [ 27.575981] __asan_report_load8_noabort+0x20/0x30 [ 27.576243] kasan_atomics_helper+0x3df4/0x4858 [ 27.576404] kasan_atomics+0x198/0x2e0 [ 27.576728] kunit_try_run_case+0x170/0x3f0 [ 27.576912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.577115] kthread+0x328/0x630 [ 27.577234] ret_from_fork+0x10/0x20 [ 27.577418] [ 27.577559] Allocated by task 267: [ 27.577720] kasan_save_stack+0x3c/0x68 [ 27.577957] kasan_save_track+0x20/0x40 [ 27.578056] kasan_save_alloc_info+0x40/0x58 [ 27.578174] __kasan_kmalloc+0xd4/0xd8 [ 27.578422] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.578580] kasan_atomics+0xb8/0x2e0 [ 27.579028] kunit_try_run_case+0x170/0x3f0 [ 27.579145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.579320] kthread+0x328/0x630 [ 27.579633] ret_from_fork+0x10/0x20 [ 27.579790] [ 27.579845] The buggy address belongs to the object at fff00000c7615800 [ 27.579845] which belongs to the cache kmalloc-64 of size 64 [ 27.580008] The buggy address is located 0 bytes to the right of [ 27.580008] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.580250] [ 27.580305] The buggy address belongs to the physical page: [ 27.580390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.580527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.580645] page_type: f5(slab) [ 27.580738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.580861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.580985] page dumped because: kasan: bad access detected [ 27.581110] [ 27.581173] Memory state around the buggy address: [ 27.581331] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.581452] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.581605] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.582426] ^ [ 27.582533] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.583253] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.584263] ================================================================== [ 27.598057] ================================================================== [ 27.598156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 27.598278] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.598420] [ 27.598919] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.599458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.599789] Hardware name: linux,dummy-virt (DT) [ 27.599956] Call trace: [ 27.600025] show_stack+0x20/0x38 (C) [ 27.601249] dump_stack_lvl+0x8c/0xd0 [ 27.601581] print_report+0x118/0x608 [ 27.602034] kasan_report+0xdc/0x128 [ 27.602155] __asan_report_load8_noabort+0x20/0x30 [ 27.602286] kasan_atomics_helper+0x3e10/0x4858 [ 27.602433] kasan_atomics+0x198/0x2e0 [ 27.602546] kunit_try_run_case+0x170/0x3f0 [ 27.602913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.603830] kthread+0x328/0x630 [ 27.604357] ret_from_fork+0x10/0x20 [ 27.604490] [ 27.604538] Allocated by task 267: [ 27.604609] kasan_save_stack+0x3c/0x68 [ 27.604702] kasan_save_track+0x20/0x40 [ 27.604795] kasan_save_alloc_info+0x40/0x58 [ 27.606616] __kasan_kmalloc+0xd4/0xd8 [ 27.607584] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.608112] kasan_atomics+0xb8/0x2e0 [ 27.608859] kunit_try_run_case+0x170/0x3f0 [ 27.609445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.609954] kthread+0x328/0x630 [ 27.610099] ret_from_fork+0x10/0x20 [ 27.610509] [ 27.610835] The buggy address belongs to the object at fff00000c7615800 [ 27.610835] which belongs to the cache kmalloc-64 of size 64 [ 27.611842] The buggy address is located 0 bytes to the right of [ 27.611842] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.612032] [ 27.612092] The buggy address belongs to the physical page: [ 27.612166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.613461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.614692] page_type: f5(slab) [ 27.614845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.615567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.616245] page dumped because: kasan: bad access detected [ 27.617043] [ 27.617139] Memory state around the buggy address: [ 27.617308] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.617454] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.617648] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.617766] ^ [ 27.617967] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.618280] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.618951] ================================================================== [ 27.261596] ================================================================== [ 27.261697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 27.261802] Read of size 4 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.261920] [ 27.262008] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.262246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.262363] Hardware name: linux,dummy-virt (DT) [ 27.262481] Call trace: [ 27.262554] show_stack+0x20/0x38 (C) [ 27.262670] dump_stack_lvl+0x8c/0xd0 [ 27.262808] print_report+0x118/0x608 [ 27.262958] kasan_report+0xdc/0x128 [ 27.263113] __asan_report_load4_noabort+0x20/0x30 [ 27.263387] kasan_atomics_helper+0x3e04/0x4858 [ 27.263652] kasan_atomics+0x198/0x2e0 [ 27.263860] kunit_try_run_case+0x170/0x3f0 [ 27.264165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.264359] kthread+0x328/0x630 [ 27.264693] ret_from_fork+0x10/0x20 [ 27.264843] [ 27.264891] Allocated by task 267: [ 27.264984] kasan_save_stack+0x3c/0x68 [ 27.265131] kasan_save_track+0x20/0x40 [ 27.265228] kasan_save_alloc_info+0x40/0x58 [ 27.265380] __kasan_kmalloc+0xd4/0xd8 [ 27.265526] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.265653] kasan_atomics+0xb8/0x2e0 [ 27.265761] kunit_try_run_case+0x170/0x3f0 [ 27.265862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.265991] kthread+0x328/0x630 [ 27.266081] ret_from_fork+0x10/0x20 [ 27.266237] [ 27.266330] The buggy address belongs to the object at fff00000c7615800 [ 27.266330] which belongs to the cache kmalloc-64 of size 64 [ 27.266472] The buggy address is located 0 bytes to the right of [ 27.266472] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.266702] [ 27.266760] The buggy address belongs to the physical page: [ 27.266896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.267044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.267156] page_type: f5(slab) [ 27.267276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.267729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.267912] page dumped because: kasan: bad access detected [ 27.268345] [ 27.268424] Memory state around the buggy address: [ 27.268873] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.269361] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.269993] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.270479] ^ [ 27.271030] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.271142] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.272215] ================================================================== [ 27.543951] ================================================================== [ 27.544067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 27.544298] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.544430] [ 27.544503] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.544710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.544792] Hardware name: linux,dummy-virt (DT) [ 27.545023] Call trace: [ 27.545245] show_stack+0x20/0x38 (C) [ 27.545378] dump_stack_lvl+0x8c/0xd0 [ 27.545494] print_report+0x118/0x608 [ 27.545613] kasan_report+0xdc/0x128 [ 27.545800] kasan_check_range+0x100/0x1a8 [ 27.545927] __kasan_check_write+0x20/0x30 [ 27.546095] kasan_atomics_helper+0x15b4/0x4858 [ 27.546237] kasan_atomics+0x198/0x2e0 [ 27.546367] kunit_try_run_case+0x170/0x3f0 [ 27.546658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.546877] kthread+0x328/0x630 [ 27.547102] ret_from_fork+0x10/0x20 [ 27.547318] [ 27.547445] Allocated by task 267: [ 27.547612] kasan_save_stack+0x3c/0x68 [ 27.548101] kasan_save_track+0x20/0x40 [ 27.548296] kasan_save_alloc_info+0x40/0x58 [ 27.548458] __kasan_kmalloc+0xd4/0xd8 [ 27.548639] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.548883] kasan_atomics+0xb8/0x2e0 [ 27.549068] kunit_try_run_case+0x170/0x3f0 [ 27.549481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.549886] kthread+0x328/0x630 [ 27.550015] ret_from_fork+0x10/0x20 [ 27.550212] [ 27.550510] The buggy address belongs to the object at fff00000c7615800 [ 27.550510] which belongs to the cache kmalloc-64 of size 64 [ 27.550706] The buggy address is located 0 bytes to the right of [ 27.550706] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.551040] [ 27.551098] The buggy address belongs to the physical page: [ 27.551189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.551324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.551477] page_type: f5(slab) [ 27.551579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.551724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.552589] page dumped because: kasan: bad access detected [ 27.552683] [ 27.552833] Memory state around the buggy address: [ 27.553226] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.553349] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.553947] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.554186] ^ [ 27.554285] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.554390] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.554490] ================================================================== [ 27.555839] ================================================================== [ 27.556100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 27.556219] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.556534] [ 27.556723] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.556981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.557050] Hardware name: linux,dummy-virt (DT) [ 27.557128] Call trace: [ 27.557182] show_stack+0x20/0x38 (C) [ 27.557307] dump_stack_lvl+0x8c/0xd0 [ 27.557436] print_report+0x118/0x608 [ 27.558039] kasan_report+0xdc/0x128 [ 27.558196] __asan_report_load8_noabort+0x20/0x30 [ 27.558327] kasan_atomics_helper+0x3db0/0x4858 [ 27.558397] kasan_atomics+0x198/0x2e0 [ 27.558454] kunit_try_run_case+0x170/0x3f0 [ 27.558519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.558591] kthread+0x328/0x630 [ 27.558650] ret_from_fork+0x10/0x20 [ 27.558712] [ 27.558737] Allocated by task 267: [ 27.558774] kasan_save_stack+0x3c/0x68 [ 27.558825] kasan_save_track+0x20/0x40 [ 27.558874] kasan_save_alloc_info+0x40/0x58 [ 27.558923] __kasan_kmalloc+0xd4/0xd8 [ 27.559043] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.559143] kasan_atomics+0xb8/0x2e0 [ 27.559232] kunit_try_run_case+0x170/0x3f0 [ 27.559325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.559434] kthread+0x328/0x630 [ 27.559522] ret_from_fork+0x10/0x20 [ 27.559646] [ 27.559721] The buggy address belongs to the object at fff00000c7615800 [ 27.559721] which belongs to the cache kmalloc-64 of size 64 [ 27.560012] The buggy address is located 0 bytes to the right of [ 27.560012] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.560187] [ 27.560302] The buggy address belongs to the physical page: [ 27.560384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.560514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.560652] page_type: f5(slab) [ 27.560839] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.561052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.561170] page dumped because: kasan: bad access detected [ 27.561320] [ 27.561376] Memory state around the buggy address: [ 27.561466] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.561588] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.561706] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.561801] ^ [ 27.561881] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.562054] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.562166] ================================================================== [ 27.562663] ================================================================== [ 27.562768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 27.562872] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.563008] [ 27.563074] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.563265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.563334] Hardware name: linux,dummy-virt (DT) [ 27.563407] Call trace: [ 27.563475] show_stack+0x20/0x38 (C) [ 27.563597] dump_stack_lvl+0x8c/0xd0 [ 27.563729] print_report+0x118/0x608 [ 27.563844] kasan_report+0xdc/0x128 [ 27.564004] kasan_check_range+0x100/0x1a8 [ 27.564132] __kasan_check_write+0x20/0x30 [ 27.564249] kasan_atomics_helper+0x1644/0x4858 [ 27.564367] kasan_atomics+0x198/0x2e0 [ 27.564474] kunit_try_run_case+0x170/0x3f0 [ 27.564594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.564725] kthread+0x328/0x630 [ 27.564834] ret_from_fork+0x10/0x20 [ 27.566945] [ 27.567049] Allocated by task 267: [ 27.567168] kasan_save_stack+0x3c/0x68 [ 27.567283] kasan_save_track+0x20/0x40 [ 27.567395] kasan_save_alloc_info+0x40/0x58 [ 27.567507] __kasan_kmalloc+0xd4/0xd8 [ 27.567616] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.567778] kasan_atomics+0xb8/0x2e0 [ 27.567912] kunit_try_run_case+0x170/0x3f0 [ 27.568532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.568734] kthread+0x328/0x630 [ 27.568887] ret_from_fork+0x10/0x20 [ 27.569972] [ 27.570297] The buggy address belongs to the object at fff00000c7615800 [ 27.570297] which belongs to the cache kmalloc-64 of size 64 [ 27.570655] The buggy address is located 0 bytes to the right of [ 27.570655] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.571014] [ 27.571079] The buggy address belongs to the physical page: [ 27.571160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.571331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.571462] page_type: f5(slab) [ 27.571610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.571773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.571888] page dumped because: kasan: bad access detected [ 27.572104] [ 27.572244] Memory state around the buggy address: [ 27.572426] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.572587] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.572748] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.572877] ^ [ 27.572984] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.573240] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.573513] ================================================================== [ 27.407280] ================================================================== [ 27.407386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 27.407497] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.408126] [ 27.408207] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.409019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.409233] Hardware name: linux,dummy-virt (DT) [ 27.409329] Call trace: [ 27.409523] show_stack+0x20/0x38 (C) [ 27.409740] dump_stack_lvl+0x8c/0xd0 [ 27.409956] print_report+0x118/0x608 [ 27.410099] kasan_report+0xdc/0x128 [ 27.410524] kasan_check_range+0x100/0x1a8 [ 27.410822] __kasan_check_write+0x20/0x30 [ 27.411384] kasan_atomics_helper+0x1190/0x4858 [ 27.411651] kasan_atomics+0x198/0x2e0 [ 27.411954] kunit_try_run_case+0x170/0x3f0 [ 27.412084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.412219] kthread+0x328/0x630 [ 27.412335] ret_from_fork+0x10/0x20 [ 27.412465] [ 27.412521] Allocated by task 267: [ 27.412589] kasan_save_stack+0x3c/0x68 [ 27.414857] kasan_save_track+0x20/0x40 [ 27.415136] kasan_save_alloc_info+0x40/0x58 [ 27.415270] __kasan_kmalloc+0xd4/0xd8 [ 27.415406] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.415650] kasan_atomics+0xb8/0x2e0 [ 27.415768] kunit_try_run_case+0x170/0x3f0 [ 27.415887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.416044] kthread+0x328/0x630 [ 27.416156] ret_from_fork+0x10/0x20 [ 27.416537] [ 27.416898] The buggy address belongs to the object at fff00000c7615800 [ 27.416898] which belongs to the cache kmalloc-64 of size 64 [ 27.417112] The buggy address is located 0 bytes to the right of [ 27.417112] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.417690] [ 27.417776] The buggy address belongs to the physical page: [ 27.417896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.418055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.418191] page_type: f5(slab) [ 27.418302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.419170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.419520] page dumped because: kasan: bad access detected [ 27.420201] [ 27.420293] Memory state around the buggy address: [ 27.420375] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.420611] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.420907] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.421082] ^ [ 27.421271] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.421445] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.421607] ================================================================== [ 27.239917] ================================================================== [ 27.240050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 27.240333] Read of size 4 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.240624] [ 27.240696] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.240890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.241088] Hardware name: linux,dummy-virt (DT) [ 27.241176] Call trace: [ 27.241230] show_stack+0x20/0x38 (C) [ 27.241348] dump_stack_lvl+0x8c/0xd0 [ 27.241465] print_report+0x118/0x608 [ 27.241576] kasan_report+0xdc/0x128 [ 27.241692] __asan_report_load4_noabort+0x20/0x30 [ 27.241813] kasan_atomics_helper+0x3dd8/0x4858 [ 27.241947] kasan_atomics+0x198/0x2e0 [ 27.242059] kunit_try_run_case+0x170/0x3f0 [ 27.242206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.242445] kthread+0x328/0x630 [ 27.242587] ret_from_fork+0x10/0x20 [ 27.242714] [ 27.242772] Allocated by task 267: [ 27.242855] kasan_save_stack+0x3c/0x68 [ 27.243091] kasan_save_track+0x20/0x40 [ 27.243262] kasan_save_alloc_info+0x40/0x58 [ 27.243375] __kasan_kmalloc+0xd4/0xd8 [ 27.243470] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.243593] kasan_atomics+0xb8/0x2e0 [ 27.243714] kunit_try_run_case+0x170/0x3f0 [ 27.243875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.244039] kthread+0x328/0x630 [ 27.244132] ret_from_fork+0x10/0x20 [ 27.244225] [ 27.244300] The buggy address belongs to the object at fff00000c7615800 [ 27.244300] which belongs to the cache kmalloc-64 of size 64 [ 27.244533] The buggy address is located 0 bytes to the right of [ 27.244533] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.244870] [ 27.244951] The buggy address belongs to the physical page: [ 27.245439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.245579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.246587] page_type: f5(slab) [ 27.247415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.248170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.248560] page dumped because: kasan: bad access detected [ 27.248648] [ 27.249340] Memory state around the buggy address: [ 27.249431] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.249544] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.249649] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.249743] ^ [ 27.250824] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.250977] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.251500] ================================================================== [ 27.389317] ================================================================== [ 27.389435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 27.389743] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.389878] [ 27.390027] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.390295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.390751] Hardware name: linux,dummy-virt (DT) [ 27.390834] Call trace: [ 27.390896] show_stack+0x20/0x38 (C) [ 27.391111] dump_stack_lvl+0x8c/0xd0 [ 27.391243] print_report+0x118/0x608 [ 27.392019] kasan_report+0xdc/0x128 [ 27.392243] kasan_check_range+0x100/0x1a8 [ 27.392463] __kasan_check_write+0x20/0x30 [ 27.392595] kasan_atomics_helper+0x1128/0x4858 [ 27.392731] kasan_atomics+0x198/0x2e0 [ 27.393319] kunit_try_run_case+0x170/0x3f0 [ 27.393878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.394128] kthread+0x328/0x630 [ 27.394382] ret_from_fork+0x10/0x20 [ 27.394644] [ 27.394737] Allocated by task 267: [ 27.395012] kasan_save_stack+0x3c/0x68 [ 27.395118] kasan_save_track+0x20/0x40 [ 27.395736] kasan_save_alloc_info+0x40/0x58 [ 27.396441] __kasan_kmalloc+0xd4/0xd8 [ 27.396558] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.397056] kasan_atomics+0xb8/0x2e0 [ 27.397178] kunit_try_run_case+0x170/0x3f0 [ 27.398370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.398869] kthread+0x328/0x630 [ 27.399737] ret_from_fork+0x10/0x20 [ 27.399861] [ 27.400368] The buggy address belongs to the object at fff00000c7615800 [ 27.400368] which belongs to the cache kmalloc-64 of size 64 [ 27.400676] The buggy address is located 0 bytes to the right of [ 27.400676] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.400834] [ 27.401434] The buggy address belongs to the physical page: [ 27.401607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.401857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.402545] page_type: f5(slab) [ 27.402986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.403122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.403246] page dumped because: kasan: bad access detected [ 27.403439] [ 27.403510] Memory state around the buggy address: [ 27.404230] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.404482] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.404619] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.405135] ^ [ 27.405426] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.405896] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.406189] ================================================================== [ 27.464311] ================================================================== [ 27.464418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 27.464558] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.464870] [ 27.465139] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.465408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.465600] Hardware name: linux,dummy-virt (DT) [ 27.465803] Call trace: [ 27.466195] show_stack+0x20/0x38 (C) [ 27.466342] dump_stack_lvl+0x8c/0xd0 [ 27.467145] print_report+0x118/0x608 [ 27.467316] kasan_report+0xdc/0x128 [ 27.467436] kasan_check_range+0x100/0x1a8 [ 27.467647] __kasan_check_write+0x20/0x30 [ 27.467847] kasan_atomics_helper+0x1384/0x4858 [ 27.468227] kasan_atomics+0x198/0x2e0 [ 27.468554] kunit_try_run_case+0x170/0x3f0 [ 27.468837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.468994] kthread+0x328/0x630 [ 27.469299] ret_from_fork+0x10/0x20 [ 27.469634] [ 27.469696] Allocated by task 267: [ 27.469809] kasan_save_stack+0x3c/0x68 [ 27.470110] kasan_save_track+0x20/0x40 [ 27.470219] kasan_save_alloc_info+0x40/0x58 [ 27.470377] __kasan_kmalloc+0xd4/0xd8 [ 27.470479] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.470780] kasan_atomics+0xb8/0x2e0 [ 27.470913] kunit_try_run_case+0x170/0x3f0 [ 27.471181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.471302] kthread+0x328/0x630 [ 27.471394] ret_from_fork+0x10/0x20 [ 27.471516] [ 27.471648] The buggy address belongs to the object at fff00000c7615800 [ 27.471648] which belongs to the cache kmalloc-64 of size 64 [ 27.471818] The buggy address is located 0 bytes to the right of [ 27.471818] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.472068] [ 27.472514] The buggy address belongs to the physical page: [ 27.472651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.473163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.473382] page_type: f5(slab) [ 27.473554] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.473701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.473994] page dumped because: kasan: bad access detected [ 27.474110] [ 27.474162] Memory state around the buggy address: [ 27.474295] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.474453] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.474569] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.474667] ^ [ 27.474774] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.474895] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.475098] ================================================================== [ 27.274362] ================================================================== [ 27.274695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 27.275053] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.275195] [ 27.275267] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.275969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.276073] Hardware name: linux,dummy-virt (DT) [ 27.276186] Call trace: [ 27.276856] show_stack+0x20/0x38 (C) [ 27.277018] dump_stack_lvl+0x8c/0xd0 [ 27.277142] print_report+0x118/0x608 [ 27.277252] kasan_report+0xdc/0x128 [ 27.277372] kasan_check_range+0x100/0x1a8 [ 27.277503] __kasan_check_read+0x20/0x30 [ 27.278204] kasan_atomics_helper+0xdd4/0x4858 [ 27.278826] kasan_atomics+0x198/0x2e0 [ 27.279163] kunit_try_run_case+0x170/0x3f0 [ 27.279488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.279689] kthread+0x328/0x630 [ 27.280099] ret_from_fork+0x10/0x20 [ 27.280267] [ 27.280320] Allocated by task 267: [ 27.280436] kasan_save_stack+0x3c/0x68 [ 27.280809] kasan_save_track+0x20/0x40 [ 27.281118] kasan_save_alloc_info+0x40/0x58 [ 27.281227] __kasan_kmalloc+0xd4/0xd8 [ 27.281321] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.281427] kasan_atomics+0xb8/0x2e0 [ 27.282392] kunit_try_run_case+0x170/0x3f0 [ 27.282966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.283096] kthread+0x328/0x630 [ 27.283187] ret_from_fork+0x10/0x20 [ 27.283282] [ 27.283648] The buggy address belongs to the object at fff00000c7615800 [ 27.283648] which belongs to the cache kmalloc-64 of size 64 [ 27.284570] The buggy address is located 0 bytes to the right of [ 27.284570] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.285287] [ 27.285379] The buggy address belongs to the physical page: [ 27.285464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.285914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.286381] page_type: f5(slab) [ 27.287069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.287330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.287561] page dumped because: kasan: bad access detected [ 27.288258] [ 27.288346] Memory state around the buggy address: [ 27.288432] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.288541] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.288647] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.288744] ^ [ 27.288823] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.289715] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.289966] ================================================================== [ 27.115091] ================================================================== [ 27.115198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 27.115308] Write of size 4 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.116994] [ 27.117087] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.117284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.117356] Hardware name: linux,dummy-virt (DT) [ 27.119272] Call trace: [ 27.119652] show_stack+0x20/0x38 (C) [ 27.119996] dump_stack_lvl+0x8c/0xd0 [ 27.121013] print_report+0x118/0x608 [ 27.121156] kasan_report+0xdc/0x128 [ 27.121298] kasan_check_range+0x100/0x1a8 [ 27.122084] __kasan_check_write+0x20/0x30 [ 27.122238] kasan_atomics_helper+0xa6c/0x4858 [ 27.122494] kasan_atomics+0x198/0x2e0 [ 27.122591] kunit_try_run_case+0x170/0x3f0 [ 27.122657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.122845] kthread+0x328/0x630 [ 27.123065] ret_from_fork+0x10/0x20 [ 27.123731] kasan_save_track+0x20/0x40 [ 27.123895] kasan_save_alloc_info+0x40/0x58 [ 27.124031] __kasan_kmalloc+0xd4/0xd8 [ 27.124128] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.124242] kasan_atomics+0xb8/0x2e0 [ 27.124404] kunit_try_run_case+0x170/0x3f0 [ 27.124568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.124701] kthread+0x328/0x630 [ 27.125144] The buggy address belongs to the object at fff00000c7615800 [ 27.125144] which belongs to the cache kmalloc-64 of size 64 [ 27.125621] [ 27.125884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.126181] page_type: f5(slab) [ 27.126770] page dumped because: kasan: bad access detected [ 27.127419] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.129898] ================================================================== [ 27.367037] ================================================================== [ 27.367148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 27.367251] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.367581] [ 27.367654] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.367915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.368001] Hardware name: linux,dummy-virt (DT) [ 27.368083] Call trace: [ 27.368144] show_stack+0x20/0x38 (C) [ 27.368270] dump_stack_lvl+0x8c/0xd0 [ 27.368444] print_report+0x118/0x608 [ 27.368637] kasan_report+0xdc/0x128 [ 27.368790] kasan_check_range+0x100/0x1a8 [ 27.369132] __kasan_check_write+0x20/0x30 [ 27.369258] kasan_atomics_helper+0x1058/0x4858 [ 27.369388] kasan_atomics+0x198/0x2e0 [ 27.369691] kunit_try_run_case+0x170/0x3f0 [ 27.369821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.369977] kthread+0x328/0x630 [ 27.370157] ret_from_fork+0x10/0x20 [ 27.370371] [ 27.370463] Allocated by task 267: [ 27.370538] kasan_save_stack+0x3c/0x68 [ 27.370638] kasan_save_track+0x20/0x40 [ 27.370750] kasan_save_alloc_info+0x40/0x58 [ 27.370861] __kasan_kmalloc+0xd4/0xd8 [ 27.370985] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.371125] kasan_atomics+0xb8/0x2e0 [ 27.371257] kunit_try_run_case+0x170/0x3f0 [ 27.371416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.371677] kthread+0x328/0x630 [ 27.371807] ret_from_fork+0x10/0x20 [ 27.371928] [ 27.372397] The buggy address belongs to the object at fff00000c7615800 [ 27.372397] which belongs to the cache kmalloc-64 of size 64 [ 27.372581] The buggy address is located 0 bytes to the right of [ 27.372581] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.372881] [ 27.372968] The buggy address belongs to the physical page: [ 27.373158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.373496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.373618] page_type: f5(slab) [ 27.374280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.374765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.374876] page dumped because: kasan: bad access detected [ 27.375031] [ 27.375109] Memory state around the buggy address: [ 27.375235] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.375491] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.375648] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.375760] ^ [ 27.375909] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.376068] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.376230] ================================================================== [ 27.376670] ================================================================== [ 27.376894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 27.377150] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.377271] [ 27.377335] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.377536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.377718] Hardware name: linux,dummy-virt (DT) [ 27.377950] Call trace: [ 27.378086] show_stack+0x20/0x38 (C) [ 27.378467] dump_stack_lvl+0x8c/0xd0 [ 27.378790] print_report+0x118/0x608 [ 27.379180] kasan_report+0xdc/0x128 [ 27.379428] kasan_check_range+0x100/0x1a8 [ 27.379665] __kasan_check_write+0x20/0x30 [ 27.379902] kasan_atomics_helper+0x10c0/0x4858 [ 27.380034] kasan_atomics+0x198/0x2e0 [ 27.380288] kunit_try_run_case+0x170/0x3f0 [ 27.380475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.380661] kthread+0x328/0x630 [ 27.380994] ret_from_fork+0x10/0x20 [ 27.381148] [ 27.381204] Allocated by task 267: [ 27.381315] kasan_save_stack+0x3c/0x68 [ 27.381419] kasan_save_track+0x20/0x40 [ 27.381567] kasan_save_alloc_info+0x40/0x58 [ 27.381710] __kasan_kmalloc+0xd4/0xd8 [ 27.382130] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.382261] kasan_atomics+0xb8/0x2e0 [ 27.382395] kunit_try_run_case+0x170/0x3f0 [ 27.382510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.382615] kthread+0x328/0x630 [ 27.383001] ret_from_fork+0x10/0x20 [ 27.383227] [ 27.383289] The buggy address belongs to the object at fff00000c7615800 [ 27.383289] which belongs to the cache kmalloc-64 of size 64 [ 27.383441] The buggy address is located 0 bytes to the right of [ 27.383441] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.384186] [ 27.384323] The buggy address belongs to the physical page: [ 27.384514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.384680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.385142] page_type: f5(slab) [ 27.385285] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.385451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.385559] page dumped because: kasan: bad access detected [ 27.385699] [ 27.385755] Memory state around the buggy address: [ 27.385886] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.386030] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.386163] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.386270] ^ [ 27.386368] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.386475] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.386569] ================================================================== [ 27.332071] ================================================================== [ 27.332353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 27.332645] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.332773] [ 27.332838] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.333046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.333113] Hardware name: linux,dummy-virt (DT) [ 27.333197] Call trace: [ 27.333257] show_stack+0x20/0x38 (C) [ 27.333377] dump_stack_lvl+0x8c/0xd0 [ 27.333503] print_report+0x118/0x608 [ 27.333841] kasan_report+0xdc/0x128 [ 27.334075] kasan_check_range+0x100/0x1a8 [ 27.334224] __kasan_check_write+0x20/0x30 [ 27.334372] kasan_atomics_helper+0xeb8/0x4858 [ 27.334719] kasan_atomics+0x198/0x2e0 [ 27.334841] kunit_try_run_case+0x170/0x3f0 [ 27.334975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.335110] kthread+0x328/0x630 [ 27.335223] ret_from_fork+0x10/0x20 [ 27.335343] [ 27.335393] Allocated by task 267: [ 27.335470] kasan_save_stack+0x3c/0x68 [ 27.335711] kasan_save_track+0x20/0x40 [ 27.335829] kasan_save_alloc_info+0x40/0x58 [ 27.336288] __kasan_kmalloc+0xd4/0xd8 [ 27.336408] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.336534] kasan_atomics+0xb8/0x2e0 [ 27.336644] kunit_try_run_case+0x170/0x3f0 [ 27.336739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.336997] kthread+0x328/0x630 [ 27.337184] ret_from_fork+0x10/0x20 [ 27.337633] [ 27.337699] The buggy address belongs to the object at fff00000c7615800 [ 27.337699] which belongs to the cache kmalloc-64 of size 64 [ 27.337848] The buggy address is located 0 bytes to the right of [ 27.337848] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.338116] [ 27.338181] The buggy address belongs to the physical page: [ 27.338256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.338461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.338582] page_type: f5(slab) [ 27.338676] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.338800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.338899] page dumped because: kasan: bad access detected [ 27.338997] [ 27.339049] Memory state around the buggy address: [ 27.339128] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.339231] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.339337] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.339430] ^ [ 27.339548] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.339891] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.340007] ================================================================== [ 26.991255] ================================================================== [ 26.991359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 26.991479] Write of size 4 at addr fff00000c7615830 by task kunit_try_catch/267 [ 26.992348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.993641] kasan_check_range+0x100/0x1a8 [ 26.993916] kasan_atomics_helper+0x6ec/0x4858 [ 26.994359] kunit_try_run_case+0x170/0x3f0 [ 26.996267] kasan_save_stack+0x3c/0x68 [ 27.000873] The buggy address belongs to the object at fff00000c7615800 [ 27.000873] which belongs to the cache kmalloc-64 of size 64 [ 27.003185] [ 27.004312] ^ [ 27.007409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 27.012764] [ 27.015148] The buggy address is located 0 bytes to the right of [ 27.015148] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.016887] [ 27.018549] ================================================================== [ 27.641680] ================================================================== [ 27.641855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 27.642021] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267 [ 27.642177] [ 27.642243] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.642616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.642743] Hardware name: linux,dummy-virt (DT) [ 27.642818] Call trace: [ 27.642881] show_stack+0x20/0x38 (C) [ 27.643239] dump_stack_lvl+0x8c/0xd0 [ 27.643606] print_report+0x118/0x608 [ 27.643802] kasan_report+0xdc/0x128 [ 27.643985] kasan_check_range+0x100/0x1a8 [ 27.644130] __kasan_check_write+0x20/0x30 [ 27.644378] kasan_atomics_helper+0x17ec/0x4858 [ 27.644540] kasan_atomics+0x198/0x2e0 [ 27.644682] kunit_try_run_case+0x170/0x3f0 [ 27.644894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.645089] kthread+0x328/0x630 [ 27.645217] ret_from_fork+0x10/0x20 [ 27.645394] [ 27.645451] Allocated by task 267: [ 27.645527] kasan_save_stack+0x3c/0x68 [ 27.645628] kasan_save_track+0x20/0x40 [ 27.645719] kasan_save_alloc_info+0x40/0x58 [ 27.645818] __kasan_kmalloc+0xd4/0xd8 [ 27.645926] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.646123] kasan_atomics+0xb8/0x2e0 [ 27.646267] kunit_try_run_case+0x170/0x3f0 [ 27.646441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.646648] kthread+0x328/0x630 [ 27.646831] ret_from_fork+0x10/0x20 [ 27.646952] [ 27.647014] The buggy address belongs to the object at fff00000c7615800 [ 27.647014] which belongs to the cache kmalloc-64 of size 64 [ 27.647166] The buggy address is located 0 bytes to the right of [ 27.647166] allocated 48-byte region [fff00000c7615800, fff00000c7615830) [ 27.647370] [ 27.647437] The buggy address belongs to the physical page: [ 27.647525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615 [ 27.647794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.648005] page_type: f5(slab) [ 27.648115] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.648299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.648477] page dumped because: kasan: bad access detected [ 27.648560] [ 27.648611] Memory state around the buggy address: [ 27.648752] fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.649031] fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.649177] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.649282] ^ [ 27.649453] fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.649765] fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.650258] ==================================================================
[ 14.345304] ================================================================== [ 14.345756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.346311] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.346817] [ 14.346944] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.346994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.347007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.347029] Call Trace: [ 14.347047] <TASK> [ 14.347065] dump_stack_lvl+0x73/0xb0 [ 14.347092] print_report+0xd1/0x650 [ 14.347117] ? __virt_addr_valid+0x1db/0x2d0 [ 14.347140] ? kasan_atomics_helper+0xc70/0x5450 [ 14.347173] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.347198] ? kasan_atomics_helper+0xc70/0x5450 [ 14.347221] kasan_report+0x141/0x180 [ 14.347246] ? kasan_atomics_helper+0xc70/0x5450 [ 14.347274] kasan_check_range+0x10c/0x1c0 [ 14.347301] __kasan_check_write+0x18/0x20 [ 14.347335] kasan_atomics_helper+0xc70/0x5450 [ 14.347360] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.347383] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.347407] ? kasan_atomics+0x152/0x310 [ 14.347432] kasan_atomics+0x1dc/0x310 [ 14.347453] ? __pfx_kasan_atomics+0x10/0x10 [ 14.347475] ? __pfx_read_tsc+0x10/0x10 [ 14.347496] ? ktime_get_ts64+0x86/0x230 [ 14.347523] kunit_try_run_case+0x1a5/0x480 [ 14.347548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.347570] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.347594] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.347619] ? __kthread_parkme+0x82/0x180 [ 14.347641] ? preempt_count_sub+0x50/0x80 [ 14.347668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.347693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.347716] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.347740] kthread+0x337/0x6f0 [ 14.347761] ? trace_preempt_on+0x20/0xc0 [ 14.347786] ? __pfx_kthread+0x10/0x10 [ 14.347809] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.347832] ? calculate_sigpending+0x7b/0xa0 [ 14.347854] ? __pfx_kthread+0x10/0x10 [ 14.347878] ret_from_fork+0x41/0x80 [ 14.347900] ? __pfx_kthread+0x10/0x10 [ 14.347923] ret_from_fork_asm+0x1a/0x30 [ 14.347957] </TASK> [ 14.347968] [ 14.355460] Allocated by task 285: [ 14.355639] kasan_save_stack+0x45/0x70 [ 14.355848] kasan_save_track+0x18/0x40 [ 14.356025] kasan_save_alloc_info+0x3b/0x50 [ 14.356249] __kasan_kmalloc+0xb7/0xc0 [ 14.356420] __kmalloc_cache_noprof+0x189/0x420 [ 14.356642] kasan_atomics+0x95/0x310 [ 14.356813] kunit_try_run_case+0x1a5/0x480 [ 14.356994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.357224] kthread+0x337/0x6f0 [ 14.357370] ret_from_fork+0x41/0x80 [ 14.357555] ret_from_fork_asm+0x1a/0x30 [ 14.357741] [ 14.357816] The buggy address belongs to the object at ffff888102b4cd00 [ 14.357816] which belongs to the cache kmalloc-64 of size 64 [ 14.358256] The buggy address is located 0 bytes to the right of [ 14.358256] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.358626] [ 14.358699] The buggy address belongs to the physical page: [ 14.359224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.359584] flags: 0x200000000000000(node=0|zone=2) [ 14.359760] page_type: f5(slab) [ 14.359881] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.360111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.360468] page dumped because: kasan: bad access detected [ 14.360724] [ 14.360818] Memory state around the buggy address: [ 14.361053] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.361428] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.361647] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.361956] ^ [ 14.362222] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.362546] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.362835] ================================================================== [ 14.153954] ================================================================== [ 14.154540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.154858] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.155131] [ 14.155295] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.155355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.155368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.155390] Call Trace: [ 14.155407] <TASK> [ 14.155425] dump_stack_lvl+0x73/0xb0 [ 14.155450] print_report+0xd1/0x650 [ 14.155474] ? __virt_addr_valid+0x1db/0x2d0 [ 14.155497] ? kasan_atomics_helper+0x697/0x5450 [ 14.155542] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.155567] ? kasan_atomics_helper+0x697/0x5450 [ 14.155590] kasan_report+0x141/0x180 [ 14.155614] ? kasan_atomics_helper+0x697/0x5450 [ 14.155642] kasan_check_range+0x10c/0x1c0 [ 14.155668] __kasan_check_write+0x18/0x20 [ 14.155689] kasan_atomics_helper+0x697/0x5450 [ 14.155713] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.155737] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.155761] ? kasan_atomics+0x152/0x310 [ 14.155786] kasan_atomics+0x1dc/0x310 [ 14.155807] ? __pfx_kasan_atomics+0x10/0x10 [ 14.155829] ? __pfx_read_tsc+0x10/0x10 [ 14.155850] ? ktime_get_ts64+0x86/0x230 [ 14.155877] kunit_try_run_case+0x1a5/0x480 [ 14.155902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.155925] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.155950] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.155975] ? __kthread_parkme+0x82/0x180 [ 14.155998] ? preempt_count_sub+0x50/0x80 [ 14.156024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.156048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.156083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.156107] kthread+0x337/0x6f0 [ 14.156521] ? trace_preempt_on+0x20/0xc0 [ 14.156554] ? __pfx_kthread+0x10/0x10 [ 14.156578] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.156603] ? calculate_sigpending+0x7b/0xa0 [ 14.156625] ? __pfx_kthread+0x10/0x10 [ 14.156648] ret_from_fork+0x41/0x80 [ 14.156671] ? __pfx_kthread+0x10/0x10 [ 14.156694] ret_from_fork_asm+0x1a/0x30 [ 14.156727] </TASK> [ 14.156739] [ 14.171907] Allocated by task 285: [ 14.172050] kasan_save_stack+0x45/0x70 [ 14.172207] kasan_save_track+0x18/0x40 [ 14.172354] kasan_save_alloc_info+0x3b/0x50 [ 14.172500] __kasan_kmalloc+0xb7/0xc0 [ 14.172634] __kmalloc_cache_noprof+0x189/0x420 [ 14.172786] kasan_atomics+0x95/0x310 [ 14.172916] kunit_try_run_case+0x1a5/0x480 [ 14.173063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.173244] kthread+0x337/0x6f0 [ 14.173425] ret_from_fork+0x41/0x80 [ 14.173611] ret_from_fork_asm+0x1a/0x30 [ 14.173823] [ 14.173921] The buggy address belongs to the object at ffff888102b4cd00 [ 14.173921] which belongs to the cache kmalloc-64 of size 64 [ 14.174486] The buggy address is located 0 bytes to the right of [ 14.174486] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.175039] [ 14.175167] The buggy address belongs to the physical page: [ 14.175441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.175795] flags: 0x200000000000000(node=0|zone=2) [ 14.176035] page_type: f5(slab) [ 14.176234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.176590] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.176927] page dumped because: kasan: bad access detected [ 14.177210] [ 14.177304] Memory state around the buggy address: [ 14.177502] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.177716] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.177935] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.178173] ^ [ 14.178403] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.178734] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.179053] ================================================================== [ 13.977350] ================================================================== [ 13.977983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.978494] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 13.979033] [ 13.979305] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.979366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.979378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.979397] Call Trace: [ 13.979411] <TASK> [ 13.979428] dump_stack_lvl+0x73/0xb0 [ 13.979453] print_report+0xd1/0x650 [ 13.979476] ? __virt_addr_valid+0x1db/0x2d0 [ 13.979496] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.979518] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.979540] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.979563] kasan_report+0x141/0x180 [ 13.979585] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.979612] __asan_report_load4_noabort+0x18/0x20 [ 13.979633] kasan_atomics_helper+0x4b88/0x5450 [ 13.979656] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.979678] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.979700] ? kasan_atomics+0x152/0x310 [ 13.979723] kasan_atomics+0x1dc/0x310 [ 13.979742] ? __pfx_kasan_atomics+0x10/0x10 [ 13.979763] ? __pfx_read_tsc+0x10/0x10 [ 13.979781] ? ktime_get_ts64+0x86/0x230 [ 13.979806] kunit_try_run_case+0x1a5/0x480 [ 13.979830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.979852] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.979875] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.979899] ? __kthread_parkme+0x82/0x180 [ 13.979920] ? preempt_count_sub+0x50/0x80 [ 13.979945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.979968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.979992] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.980015] kthread+0x337/0x6f0 [ 13.980036] ? trace_preempt_on+0x20/0xc0 [ 13.980188] ? __pfx_kthread+0x10/0x10 [ 13.980212] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.980252] ? calculate_sigpending+0x7b/0xa0 [ 13.980275] ? __pfx_kthread+0x10/0x10 [ 13.980299] ret_from_fork+0x41/0x80 [ 13.980333] ? __pfx_kthread+0x10/0x10 [ 13.980357] ret_from_fork_asm+0x1a/0x30 [ 13.980390] </TASK> [ 13.980402] [ 13.991033] Allocated by task 285: [ 13.991537] kasan_save_stack+0x45/0x70 [ 13.991728] kasan_save_track+0x18/0x40 [ 13.992070] kasan_save_alloc_info+0x3b/0x50 [ 13.992389] __kasan_kmalloc+0xb7/0xc0 [ 13.992671] __kmalloc_cache_noprof+0x189/0x420 [ 13.992881] kasan_atomics+0x95/0x310 [ 13.993046] kunit_try_run_case+0x1a5/0x480 [ 13.993431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.993777] kthread+0x337/0x6f0 [ 13.994053] ret_from_fork+0x41/0x80 [ 13.994336] ret_from_fork_asm+0x1a/0x30 [ 13.994525] [ 13.994600] The buggy address belongs to the object at ffff888102b4cd00 [ 13.994600] which belongs to the cache kmalloc-64 of size 64 [ 13.995116] The buggy address is located 0 bytes to the right of [ 13.995116] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 13.995950] [ 13.996156] The buggy address belongs to the physical page: [ 13.996521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 13.996956] flags: 0x200000000000000(node=0|zone=2) [ 13.997389] page_type: f5(slab) [ 13.997642] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.997981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.998469] page dumped because: kasan: bad access detected [ 13.998819] [ 13.998896] Memory state around the buggy address: [ 13.999266] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.999719] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.000137] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.000541] ^ [ 14.000843] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.001298] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.001712] ================================================================== [ 14.363253] ================================================================== [ 14.363879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.364312] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.364618] [ 14.364704] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.364748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.364761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.364782] Call Trace: [ 14.364798] <TASK> [ 14.364813] dump_stack_lvl+0x73/0xb0 [ 14.364838] print_report+0xd1/0x650 [ 14.364862] ? __virt_addr_valid+0x1db/0x2d0 [ 14.364884] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.364907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.364930] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.364954] kasan_report+0x141/0x180 [ 14.364977] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.365006] __asan_report_load4_noabort+0x18/0x20 [ 14.365028] kasan_atomics_helper+0x4a84/0x5450 [ 14.365052] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.365076] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.365099] ? kasan_atomics+0x152/0x310 [ 14.365123] kasan_atomics+0x1dc/0x310 [ 14.365144] ? __pfx_kasan_atomics+0x10/0x10 [ 14.365166] ? __pfx_read_tsc+0x10/0x10 [ 14.365186] ? ktime_get_ts64+0x86/0x230 [ 14.365212] kunit_try_run_case+0x1a5/0x480 [ 14.365237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.365260] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.365285] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.365310] ? __kthread_parkme+0x82/0x180 [ 14.365343] ? preempt_count_sub+0x50/0x80 [ 14.365369] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.365393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.365417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.365440] kthread+0x337/0x6f0 [ 14.365462] ? trace_preempt_on+0x20/0xc0 [ 14.365497] ? __pfx_kthread+0x10/0x10 [ 14.365520] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.365543] ? calculate_sigpending+0x7b/0xa0 [ 14.365565] ? __pfx_kthread+0x10/0x10 [ 14.365588] ret_from_fork+0x41/0x80 [ 14.365609] ? __pfx_kthread+0x10/0x10 [ 14.365632] ret_from_fork_asm+0x1a/0x30 [ 14.365665] </TASK> [ 14.365677] [ 14.372878] Allocated by task 285: [ 14.373057] kasan_save_stack+0x45/0x70 [ 14.373293] kasan_save_track+0x18/0x40 [ 14.373437] kasan_save_alloc_info+0x3b/0x50 [ 14.373583] __kasan_kmalloc+0xb7/0xc0 [ 14.373715] __kmalloc_cache_noprof+0x189/0x420 [ 14.373872] kasan_atomics+0x95/0x310 [ 14.374001] kunit_try_run_case+0x1a5/0x480 [ 14.374252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.374514] kthread+0x337/0x6f0 [ 14.374682] ret_from_fork+0x41/0x80 [ 14.374864] ret_from_fork_asm+0x1a/0x30 [ 14.375057] [ 14.375169] The buggy address belongs to the object at ffff888102b4cd00 [ 14.375169] which belongs to the cache kmalloc-64 of size 64 [ 14.375681] The buggy address is located 0 bytes to the right of [ 14.375681] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.376043] [ 14.376115] The buggy address belongs to the physical page: [ 14.376384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.376737] flags: 0x200000000000000(node=0|zone=2) [ 14.376975] page_type: f5(slab) [ 14.377156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.377476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.377747] page dumped because: kasan: bad access detected [ 14.377920] [ 14.377989] Memory state around the buggy address: [ 14.378299] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.378633] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.378961] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.379274] ^ [ 14.379489] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.379750] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.380068] ================================================================== [ 14.866341] ================================================================== [ 14.866717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.867291] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.867560] [ 14.867646] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.867691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.867704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.867726] Call Trace: [ 14.867742] <TASK> [ 14.867780] dump_stack_lvl+0x73/0xb0 [ 14.867806] print_report+0xd1/0x650 [ 14.867830] ? __virt_addr_valid+0x1db/0x2d0 [ 14.867869] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.867892] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.867932] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.867956] kasan_report+0x141/0x180 [ 14.867980] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.868036] kasan_check_range+0x10c/0x1c0 [ 14.868075] __kasan_check_write+0x18/0x20 [ 14.868096] kasan_atomics_helper+0x18b1/0x5450 [ 14.868143] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.868168] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.868191] ? kasan_atomics+0x152/0x310 [ 14.868216] kasan_atomics+0x1dc/0x310 [ 14.868236] ? __pfx_kasan_atomics+0x10/0x10 [ 14.868259] ? __pfx_read_tsc+0x10/0x10 [ 14.868280] ? ktime_get_ts64+0x86/0x230 [ 14.868306] kunit_try_run_case+0x1a5/0x480 [ 14.868339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.868361] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.868386] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.868412] ? __kthread_parkme+0x82/0x180 [ 14.868434] ? preempt_count_sub+0x50/0x80 [ 14.868460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.868484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.868507] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.868531] kthread+0x337/0x6f0 [ 14.868573] ? trace_preempt_on+0x20/0xc0 [ 14.868597] ? __pfx_kthread+0x10/0x10 [ 14.868633] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.868669] ? calculate_sigpending+0x7b/0xa0 [ 14.868706] ? __pfx_kthread+0x10/0x10 [ 14.868730] ret_from_fork+0x41/0x80 [ 14.868763] ? __pfx_kthread+0x10/0x10 [ 14.868787] ret_from_fork_asm+0x1a/0x30 [ 14.868834] </TASK> [ 14.868846] [ 14.876575] Allocated by task 285: [ 14.876771] kasan_save_stack+0x45/0x70 [ 14.876990] kasan_save_track+0x18/0x40 [ 14.877201] kasan_save_alloc_info+0x3b/0x50 [ 14.877421] __kasan_kmalloc+0xb7/0xc0 [ 14.877664] __kmalloc_cache_noprof+0x189/0x420 [ 14.877933] kasan_atomics+0x95/0x310 [ 14.878138] kunit_try_run_case+0x1a5/0x480 [ 14.878353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.878603] kthread+0x337/0x6f0 [ 14.878752] ret_from_fork+0x41/0x80 [ 14.878883] ret_from_fork_asm+0x1a/0x30 [ 14.879022] [ 14.879093] The buggy address belongs to the object at ffff888102b4cd00 [ 14.879093] which belongs to the cache kmalloc-64 of size 64 [ 14.879630] The buggy address is located 0 bytes to the right of [ 14.879630] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.880239] [ 14.880361] The buggy address belongs to the physical page: [ 14.880636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.880921] flags: 0x200000000000000(node=0|zone=2) [ 14.881167] page_type: f5(slab) [ 14.881359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.881702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.882026] page dumped because: kasan: bad access detected [ 14.882295] [ 14.882403] Memory state around the buggy address: [ 14.882632] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.882969] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.883393] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.883709] ^ [ 14.883929] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.884267] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.884532] ================================================================== [ 15.199528] ================================================================== [ 15.199869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.200124] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.201109] [ 15.202577] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.202629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.202643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.202665] Call Trace: [ 15.202684] <TASK> [ 15.202702] dump_stack_lvl+0x73/0xb0 [ 15.202731] print_report+0xd1/0x650 [ 15.202756] ? __virt_addr_valid+0x1db/0x2d0 [ 15.202778] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.202802] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.202826] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.202850] kasan_report+0x141/0x180 [ 15.202874] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.202903] __asan_report_load8_noabort+0x18/0x20 [ 15.202924] kasan_atomics_helper+0x4fb2/0x5450 [ 15.202948] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.202972] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.202995] ? kasan_atomics+0x152/0x310 [ 15.203019] kasan_atomics+0x1dc/0x310 [ 15.203039] ? __pfx_kasan_atomics+0x10/0x10 [ 15.203060] ? __pfx_read_tsc+0x10/0x10 [ 15.203081] ? ktime_get_ts64+0x86/0x230 [ 15.203107] kunit_try_run_case+0x1a5/0x480 [ 15.203462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203495] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.203523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.203549] ? __kthread_parkme+0x82/0x180 [ 15.203572] ? preempt_count_sub+0x50/0x80 [ 15.203599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203623] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.203647] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.203671] kthread+0x337/0x6f0 [ 15.203693] ? trace_preempt_on+0x20/0xc0 [ 15.203717] ? __pfx_kthread+0x10/0x10 [ 15.203740] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.203763] ? calculate_sigpending+0x7b/0xa0 [ 15.203786] ? __pfx_kthread+0x10/0x10 [ 15.203810] ret_from_fork+0x41/0x80 [ 15.203831] ? __pfx_kthread+0x10/0x10 [ 15.203855] ret_from_fork_asm+0x1a/0x30 [ 15.203887] </TASK> [ 15.203900] [ 15.220347] Allocated by task 285: [ 15.220517] kasan_save_stack+0x45/0x70 [ 15.220704] kasan_save_track+0x18/0x40 [ 15.220870] kasan_save_alloc_info+0x3b/0x50 [ 15.221053] __kasan_kmalloc+0xb7/0xc0 [ 15.221919] __kmalloc_cache_noprof+0x189/0x420 [ 15.222758] kasan_atomics+0x95/0x310 [ 15.222975] kunit_try_run_case+0x1a5/0x480 [ 15.223429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.223649] kthread+0x337/0x6f0 [ 15.223801] ret_from_fork+0x41/0x80 [ 15.223964] ret_from_fork_asm+0x1a/0x30 [ 15.224782] [ 15.224910] The buggy address belongs to the object at ffff888102b4cd00 [ 15.224910] which belongs to the cache kmalloc-64 of size 64 [ 15.226383] The buggy address is located 0 bytes to the right of [ 15.226383] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.226899] [ 15.226990] The buggy address belongs to the physical page: [ 15.227457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.227952] flags: 0x200000000000000(node=0|zone=2) [ 15.228379] page_type: f5(slab) [ 15.228671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.228983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.229667] page dumped because: kasan: bad access detected [ 15.229943] [ 15.230165] Memory state around the buggy address: [ 15.230653] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.231157] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.231464] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.231742] ^ [ 15.231952] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.232644] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.233137] ================================================================== [ 15.261807] ================================================================== [ 15.262165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.262506] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.262788] [ 15.263022] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.263145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.263161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.263440] Call Trace: [ 15.263472] <TASK> [ 15.263489] dump_stack_lvl+0x73/0xb0 [ 15.263515] print_report+0xd1/0x650 [ 15.263540] ? __virt_addr_valid+0x1db/0x2d0 [ 15.263563] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.263585] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.263609] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.263631] kasan_report+0x141/0x180 [ 15.263655] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.263684] __asan_report_load8_noabort+0x18/0x20 [ 15.263706] kasan_atomics_helper+0x4fa5/0x5450 [ 15.263731] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.263754] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.263777] ? kasan_atomics+0x152/0x310 [ 15.263802] kasan_atomics+0x1dc/0x310 [ 15.263823] ? __pfx_kasan_atomics+0x10/0x10 [ 15.263845] ? __pfx_read_tsc+0x10/0x10 [ 15.263865] ? ktime_get_ts64+0x86/0x230 [ 15.263891] kunit_try_run_case+0x1a5/0x480 [ 15.263916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.263940] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.263965] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.263991] ? __kthread_parkme+0x82/0x180 [ 15.264013] ? preempt_count_sub+0x50/0x80 [ 15.264039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.264064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.264087] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.264111] kthread+0x337/0x6f0 [ 15.264411] ? trace_preempt_on+0x20/0xc0 [ 15.264441] ? __pfx_kthread+0x10/0x10 [ 15.264465] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.264488] ? calculate_sigpending+0x7b/0xa0 [ 15.264511] ? __pfx_kthread+0x10/0x10 [ 15.264535] ret_from_fork+0x41/0x80 [ 15.264556] ? __pfx_kthread+0x10/0x10 [ 15.264579] ret_from_fork_asm+0x1a/0x30 [ 15.264611] </TASK> [ 15.264623] [ 15.275232] Allocated by task 285: [ 15.275497] kasan_save_stack+0x45/0x70 [ 15.275912] kasan_save_track+0x18/0x40 [ 15.276104] kasan_save_alloc_info+0x3b/0x50 [ 15.276284] __kasan_kmalloc+0xb7/0xc0 [ 15.276594] __kmalloc_cache_noprof+0x189/0x420 [ 15.277033] kasan_atomics+0x95/0x310 [ 15.277349] kunit_try_run_case+0x1a5/0x480 [ 15.277649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.277994] kthread+0x337/0x6f0 [ 15.278316] ret_from_fork+0x41/0x80 [ 15.278608] ret_from_fork_asm+0x1a/0x30 [ 15.278896] [ 15.279026] The buggy address belongs to the object at ffff888102b4cd00 [ 15.279026] which belongs to the cache kmalloc-64 of size 64 [ 15.279742] The buggy address is located 0 bytes to the right of [ 15.279742] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.280446] [ 15.280541] The buggy address belongs to the physical page: [ 15.280862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.281458] flags: 0x200000000000000(node=0|zone=2) [ 15.281682] page_type: f5(slab) [ 15.281942] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.282343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.282669] page dumped because: kasan: bad access detected [ 15.283030] [ 15.283240] Memory state around the buggy address: [ 15.283547] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.283954] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.284317] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.284740] ^ [ 15.285042] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.285450] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.285854] ================================================================== [ 13.924366] ================================================================== [ 13.925667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.926050] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 13.926643] [ 13.926819] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.926868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.926882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.926904] Call Trace: [ 13.926916] <TASK> [ 13.926932] dump_stack_lvl+0x73/0xb0 [ 13.926960] print_report+0xd1/0x650 [ 13.926983] ? __virt_addr_valid+0x1db/0x2d0 [ 13.927007] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.927029] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.927051] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.927074] kasan_report+0x141/0x180 [ 13.927100] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.927150] __asan_report_load4_noabort+0x18/0x20 [ 13.927171] kasan_atomics_helper+0x4bbc/0x5450 [ 13.927195] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.927216] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.927238] ? kasan_atomics+0x152/0x310 [ 13.927261] kasan_atomics+0x1dc/0x310 [ 13.927280] ? __pfx_kasan_atomics+0x10/0x10 [ 13.927301] ? __pfx_read_tsc+0x10/0x10 [ 13.927320] ? ktime_get_ts64+0x86/0x230 [ 13.927359] kunit_try_run_case+0x1a5/0x480 [ 13.927384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.927405] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.927431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.927454] ? __kthread_parkme+0x82/0x180 [ 13.927477] ? preempt_count_sub+0x50/0x80 [ 13.927506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.927531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.927553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.927576] kthread+0x337/0x6f0 [ 13.927598] ? trace_preempt_on+0x20/0xc0 [ 13.927624] ? __pfx_kthread+0x10/0x10 [ 13.927646] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.927668] ? calculate_sigpending+0x7b/0xa0 [ 13.927691] ? __pfx_kthread+0x10/0x10 [ 13.927713] ret_from_fork+0x41/0x80 [ 13.927734] ? __pfx_kthread+0x10/0x10 [ 13.927755] ret_from_fork_asm+0x1a/0x30 [ 13.927789] </TASK> [ 13.927800] [ 13.938976] Allocated by task 285: [ 13.939307] kasan_save_stack+0x45/0x70 [ 13.939663] kasan_save_track+0x18/0x40 [ 13.940008] kasan_save_alloc_info+0x3b/0x50 [ 13.940424] __kasan_kmalloc+0xb7/0xc0 [ 13.940772] __kmalloc_cache_noprof+0x189/0x420 [ 13.941186] kasan_atomics+0x95/0x310 [ 13.941537] kunit_try_run_case+0x1a5/0x480 [ 13.941907] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.942395] kthread+0x337/0x6f0 [ 13.942695] ret_from_fork+0x41/0x80 [ 13.942883] ret_from_fork_asm+0x1a/0x30 [ 13.943023] [ 13.943094] The buggy address belongs to the object at ffff888102b4cd00 [ 13.943094] which belongs to the cache kmalloc-64 of size 64 [ 13.944140] The buggy address is located 0 bytes to the right of [ 13.944140] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 13.944919] [ 13.944992] The buggy address belongs to the physical page: [ 13.945279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 13.945944] flags: 0x200000000000000(node=0|zone=2) [ 13.946417] page_type: f5(slab) [ 13.946709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.947144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.947769] page dumped because: kasan: bad access detected [ 13.947937] [ 13.948004] Memory state around the buggy address: [ 13.948242] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.948839] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.949473] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.950064] ^ [ 13.950279] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.950500] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.950709] ================================================================== [ 15.123854] ================================================================== [ 15.124152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.124497] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.124851] [ 15.124961] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.125003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.125016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.125037] Call Trace: [ 15.125051] <TASK> [ 15.125065] dump_stack_lvl+0x73/0xb0 [ 15.125088] print_report+0xd1/0x650 [ 15.125110] ? __virt_addr_valid+0x1db/0x2d0 [ 15.125167] ? kasan_atomics_helper+0x2006/0x5450 [ 15.125191] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.125215] ? kasan_atomics_helper+0x2006/0x5450 [ 15.125238] kasan_report+0x141/0x180 [ 15.125262] ? kasan_atomics_helper+0x2006/0x5450 [ 15.125291] kasan_check_range+0x10c/0x1c0 [ 15.125316] __kasan_check_write+0x18/0x20 [ 15.125349] kasan_atomics_helper+0x2006/0x5450 [ 15.125374] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.125398] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.125421] ? kasan_atomics+0x152/0x310 [ 15.125445] kasan_atomics+0x1dc/0x310 [ 15.125466] ? __pfx_kasan_atomics+0x10/0x10 [ 15.125489] ? __pfx_read_tsc+0x10/0x10 [ 15.125509] ? ktime_get_ts64+0x86/0x230 [ 15.125536] kunit_try_run_case+0x1a5/0x480 [ 15.125560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.125583] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.125608] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.125651] ? __kthread_parkme+0x82/0x180 [ 15.125674] ? preempt_count_sub+0x50/0x80 [ 15.125700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.125724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.125748] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.125776] kthread+0x337/0x6f0 [ 15.125797] ? trace_preempt_on+0x20/0xc0 [ 15.125821] ? __pfx_kthread+0x10/0x10 [ 15.125845] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.125867] ? calculate_sigpending+0x7b/0xa0 [ 15.125890] ? __pfx_kthread+0x10/0x10 [ 15.125913] ret_from_fork+0x41/0x80 [ 15.125935] ? __pfx_kthread+0x10/0x10 [ 15.125960] ret_from_fork_asm+0x1a/0x30 [ 15.125992] </TASK> [ 15.126004] [ 15.133389] Allocated by task 285: [ 15.133516] kasan_save_stack+0x45/0x70 [ 15.133700] kasan_save_track+0x18/0x40 [ 15.133920] kasan_save_alloc_info+0x3b/0x50 [ 15.134136] __kasan_kmalloc+0xb7/0xc0 [ 15.134335] __kmalloc_cache_noprof+0x189/0x420 [ 15.134572] kasan_atomics+0x95/0x310 [ 15.134724] kunit_try_run_case+0x1a5/0x480 [ 15.134949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.135123] kthread+0x337/0x6f0 [ 15.135245] ret_from_fork+0x41/0x80 [ 15.135386] ret_from_fork_asm+0x1a/0x30 [ 15.135582] [ 15.135703] The buggy address belongs to the object at ffff888102b4cd00 [ 15.135703] which belongs to the cache kmalloc-64 of size 64 [ 15.136228] The buggy address is located 0 bytes to the right of [ 15.136228] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.136895] [ 15.136967] The buggy address belongs to the physical page: [ 15.137335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.137682] flags: 0x200000000000000(node=0|zone=2) [ 15.137920] page_type: f5(slab) [ 15.138098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.138374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.138627] page dumped because: kasan: bad access detected [ 15.138876] [ 15.138968] Memory state around the buggy address: [ 15.139204] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.139569] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.139783] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.140066] ^ [ 15.140489] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.140826] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.141078] ================================================================== [ 14.197617] ================================================================== [ 14.197975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.198347] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.198693] [ 14.198794] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.198839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.198852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.198874] Call Trace: [ 14.198889] <TASK> [ 14.198904] dump_stack_lvl+0x73/0xb0 [ 14.198928] print_report+0xd1/0x650 [ 14.198952] ? __virt_addr_valid+0x1db/0x2d0 [ 14.198975] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.198997] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.199021] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.199044] kasan_report+0x141/0x180 [ 14.199068] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.199096] kasan_check_range+0x10c/0x1c0 [ 14.199143] __kasan_check_write+0x18/0x20 [ 14.199165] kasan_atomics_helper+0x7c7/0x5450 [ 14.199190] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.199214] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.199237] ? kasan_atomics+0x152/0x310 [ 14.199261] kasan_atomics+0x1dc/0x310 [ 14.199282] ? __pfx_kasan_atomics+0x10/0x10 [ 14.199304] ? __pfx_read_tsc+0x10/0x10 [ 14.199333] ? ktime_get_ts64+0x86/0x230 [ 14.199360] kunit_try_run_case+0x1a5/0x480 [ 14.199384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.199407] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.199432] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.199458] ? __kthread_parkme+0x82/0x180 [ 14.199481] ? preempt_count_sub+0x50/0x80 [ 14.199507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.199531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.199555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.199579] kthread+0x337/0x6f0 [ 14.199602] ? trace_preempt_on+0x20/0xc0 [ 14.199627] ? __pfx_kthread+0x10/0x10 [ 14.199650] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.199673] ? calculate_sigpending+0x7b/0xa0 [ 14.199695] ? __pfx_kthread+0x10/0x10 [ 14.199719] ret_from_fork+0x41/0x80 [ 14.199741] ? __pfx_kthread+0x10/0x10 [ 14.199764] ret_from_fork_asm+0x1a/0x30 [ 14.199796] </TASK> [ 14.199808] [ 14.206927] Allocated by task 285: [ 14.207054] kasan_save_stack+0x45/0x70 [ 14.207222] kasan_save_track+0x18/0x40 [ 14.207384] kasan_save_alloc_info+0x3b/0x50 [ 14.207589] __kasan_kmalloc+0xb7/0xc0 [ 14.207778] __kmalloc_cache_noprof+0x189/0x420 [ 14.207997] kasan_atomics+0x95/0x310 [ 14.208207] kunit_try_run_case+0x1a5/0x480 [ 14.208422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.208673] kthread+0x337/0x6f0 [ 14.208795] ret_from_fork+0x41/0x80 [ 14.208924] ret_from_fork_asm+0x1a/0x30 [ 14.209062] [ 14.209166] The buggy address belongs to the object at ffff888102b4cd00 [ 14.209166] which belongs to the cache kmalloc-64 of size 64 [ 14.209689] The buggy address is located 0 bytes to the right of [ 14.209689] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.210234] [ 14.210306] The buggy address belongs to the physical page: [ 14.210520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.210871] flags: 0x200000000000000(node=0|zone=2) [ 14.211089] page_type: f5(slab) [ 14.211251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.211550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.211857] page dumped because: kasan: bad access detected [ 14.212077] [ 14.212196] Memory state around the buggy address: [ 14.212361] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.212577] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.212792] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.213106] ^ [ 14.213354] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.213675] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.214003] ================================================================== [ 14.966296] ================================================================== [ 14.966768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 14.967118] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.967815] [ 14.968064] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.968244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.968260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.968281] Call Trace: [ 14.968298] <TASK> [ 14.968313] dump_stack_lvl+0x73/0xb0 [ 14.968348] print_report+0xd1/0x650 [ 14.968372] ? __virt_addr_valid+0x1db/0x2d0 [ 14.968394] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.968417] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.968441] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.968464] kasan_report+0x141/0x180 [ 14.968487] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.968515] kasan_check_range+0x10c/0x1c0 [ 14.968540] __kasan_check_write+0x18/0x20 [ 14.968561] kasan_atomics_helper+0x1c18/0x5450 [ 14.968586] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.968609] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.968633] ? kasan_atomics+0x152/0x310 [ 14.968658] kasan_atomics+0x1dc/0x310 [ 14.968678] ? __pfx_kasan_atomics+0x10/0x10 [ 14.968700] ? __pfx_read_tsc+0x10/0x10 [ 14.968721] ? ktime_get_ts64+0x86/0x230 [ 14.968747] kunit_try_run_case+0x1a5/0x480 [ 14.968771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.968793] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.968817] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.968842] ? __kthread_parkme+0x82/0x180 [ 14.968864] ? preempt_count_sub+0x50/0x80 [ 14.968890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.968914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.968937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.968962] kthread+0x337/0x6f0 [ 14.968983] ? trace_preempt_on+0x20/0xc0 [ 14.969006] ? __pfx_kthread+0x10/0x10 [ 14.969029] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.969051] ? calculate_sigpending+0x7b/0xa0 [ 14.969073] ? __pfx_kthread+0x10/0x10 [ 14.969096] ret_from_fork+0x41/0x80 [ 14.969118] ? __pfx_kthread+0x10/0x10 [ 14.969149] ret_from_fork_asm+0x1a/0x30 [ 14.969181] </TASK> [ 14.969193] [ 14.978891] Allocated by task 285: [ 14.979097] kasan_save_stack+0x45/0x70 [ 14.979349] kasan_save_track+0x18/0x40 [ 14.979543] kasan_save_alloc_info+0x3b/0x50 [ 14.979753] __kasan_kmalloc+0xb7/0xc0 [ 14.979950] __kmalloc_cache_noprof+0x189/0x420 [ 14.980177] kasan_atomics+0x95/0x310 [ 14.980404] kunit_try_run_case+0x1a5/0x480 [ 14.980636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.980903] kthread+0x337/0x6f0 [ 14.981063] ret_from_fork+0x41/0x80 [ 14.981390] ret_from_fork_asm+0x1a/0x30 [ 14.981595] [ 14.981707] The buggy address belongs to the object at ffff888102b4cd00 [ 14.981707] which belongs to the cache kmalloc-64 of size 64 [ 14.982291] The buggy address is located 0 bytes to the right of [ 14.982291] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.982826] [ 14.982940] The buggy address belongs to the physical page: [ 14.983164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.983512] flags: 0x200000000000000(node=0|zone=2) [ 14.983773] page_type: f5(slab) [ 14.983977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.984351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.984735] page dumped because: kasan: bad access detected [ 14.984965] [ 14.985072] Memory state around the buggy address: [ 14.985380] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.985706] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.986038] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.986404] ^ [ 14.986670] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.987050] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.987418] ================================================================== [ 15.088668] ================================================================== [ 15.089006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.089498] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.089792] [ 15.089903] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.089947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.089960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.089981] Call Trace: [ 15.089996] <TASK> [ 15.090011] dump_stack_lvl+0x73/0xb0 [ 15.090036] print_report+0xd1/0x650 [ 15.090060] ? __virt_addr_valid+0x1db/0x2d0 [ 15.090082] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.090105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.090128] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.090153] kasan_report+0x141/0x180 [ 15.090177] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.090205] kasan_check_range+0x10c/0x1c0 [ 15.090231] __kasan_check_write+0x18/0x20 [ 15.090252] kasan_atomics_helper+0x1f43/0x5450 [ 15.090279] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.090305] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.090340] ? kasan_atomics+0x152/0x310 [ 15.090365] kasan_atomics+0x1dc/0x310 [ 15.090386] ? __pfx_kasan_atomics+0x10/0x10 [ 15.090409] ? __pfx_read_tsc+0x10/0x10 [ 15.090429] ? ktime_get_ts64+0x86/0x230 [ 15.090457] kunit_try_run_case+0x1a5/0x480 [ 15.090483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.090506] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.090531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.090557] ? __kthread_parkme+0x82/0x180 [ 15.090581] ? preempt_count_sub+0x50/0x80 [ 15.090619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.090644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.090669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.090693] kthread+0x337/0x6f0 [ 15.090714] ? trace_preempt_on+0x20/0xc0 [ 15.090740] ? __pfx_kthread+0x10/0x10 [ 15.090763] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.090786] ? calculate_sigpending+0x7b/0xa0 [ 15.090809] ? __pfx_kthread+0x10/0x10 [ 15.090832] ret_from_fork+0x41/0x80 [ 15.090855] ? __pfx_kthread+0x10/0x10 [ 15.090878] ret_from_fork_asm+0x1a/0x30 [ 15.090910] </TASK> [ 15.090922] [ 15.098269] Allocated by task 285: [ 15.098446] kasan_save_stack+0x45/0x70 [ 15.098633] kasan_save_track+0x18/0x40 [ 15.098806] kasan_save_alloc_info+0x3b/0x50 [ 15.098950] __kasan_kmalloc+0xb7/0xc0 [ 15.099084] __kmalloc_cache_noprof+0x189/0x420 [ 15.099524] kasan_atomics+0x95/0x310 [ 15.099712] kunit_try_run_case+0x1a5/0x480 [ 15.099923] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.100163] kthread+0x337/0x6f0 [ 15.100301] ret_from_fork+0x41/0x80 [ 15.100472] ret_from_fork_asm+0x1a/0x30 [ 15.100653] [ 15.100751] The buggy address belongs to the object at ffff888102b4cd00 [ 15.100751] which belongs to the cache kmalloc-64 of size 64 [ 15.101239] The buggy address is located 0 bytes to the right of [ 15.101239] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.101725] [ 15.101828] The buggy address belongs to the physical page: [ 15.102065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.102409] flags: 0x200000000000000(node=0|zone=2) [ 15.102620] page_type: f5(slab) [ 15.102764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.103065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.103401] page dumped because: kasan: bad access detected [ 15.103566] [ 15.103634] Memory state around the buggy address: [ 15.103780] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.103986] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.104225] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.104532] ^ [ 15.104798] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.105106] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.105406] ================================================================== [ 14.567592] ================================================================== [ 14.567930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.568290] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.568632] [ 14.568742] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.568786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.568799] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.568820] Call Trace: [ 14.568838] <TASK> [ 14.568855] dump_stack_lvl+0x73/0xb0 [ 14.568880] print_report+0xd1/0x650 [ 14.568903] ? __virt_addr_valid+0x1db/0x2d0 [ 14.568926] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.568948] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.568972] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.568996] kasan_report+0x141/0x180 [ 14.569020] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.569048] __asan_report_load4_noabort+0x18/0x20 [ 14.569072] kasan_atomics_helper+0x4a02/0x5450 [ 14.569098] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.569143] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.569170] ? kasan_atomics+0x152/0x310 [ 14.569194] kasan_atomics+0x1dc/0x310 [ 14.569215] ? __pfx_kasan_atomics+0x10/0x10 [ 14.569236] ? __pfx_read_tsc+0x10/0x10 [ 14.569257] ? ktime_get_ts64+0x86/0x230 [ 14.569283] kunit_try_run_case+0x1a5/0x480 [ 14.569308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.569348] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.569373] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.569398] ? __kthread_parkme+0x82/0x180 [ 14.569433] ? preempt_count_sub+0x50/0x80 [ 14.569458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.569482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.569506] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.569530] kthread+0x337/0x6f0 [ 14.569551] ? trace_preempt_on+0x20/0xc0 [ 14.569577] ? __pfx_kthread+0x10/0x10 [ 14.569600] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.569623] ? calculate_sigpending+0x7b/0xa0 [ 14.569645] ? __pfx_kthread+0x10/0x10 [ 14.569669] ret_from_fork+0x41/0x80 [ 14.569690] ? __pfx_kthread+0x10/0x10 [ 14.569713] ret_from_fork_asm+0x1a/0x30 [ 14.569746] </TASK> [ 14.569757] [ 14.576944] Allocated by task 285: [ 14.577137] kasan_save_stack+0x45/0x70 [ 14.577305] kasan_save_track+0x18/0x40 [ 14.577492] kasan_save_alloc_info+0x3b/0x50 [ 14.577723] __kasan_kmalloc+0xb7/0xc0 [ 14.577901] __kmalloc_cache_noprof+0x189/0x420 [ 14.578129] kasan_atomics+0x95/0x310 [ 14.578306] kunit_try_run_case+0x1a5/0x480 [ 14.578527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.578702] kthread+0x337/0x6f0 [ 14.578831] ret_from_fork+0x41/0x80 [ 14.579034] ret_from_fork_asm+0x1a/0x30 [ 14.579252] [ 14.579365] The buggy address belongs to the object at ffff888102b4cd00 [ 14.579365] which belongs to the cache kmalloc-64 of size 64 [ 14.579826] The buggy address is located 0 bytes to the right of [ 14.579826] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.580389] [ 14.580485] The buggy address belongs to the physical page: [ 14.580736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.581099] flags: 0x200000000000000(node=0|zone=2) [ 14.581397] page_type: f5(slab) [ 14.581619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.582016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.582424] page dumped because: kasan: bad access detected [ 14.582764] [ 14.582889] Memory state around the buggy address: [ 14.583152] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.583527] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.583849] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.584194] ^ [ 14.584426] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.584736] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.585030] ================================================================== [ 14.987948] ================================================================== [ 14.988884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 14.989451] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.989691] [ 14.989784] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.989830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.989843] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.989865] Call Trace: [ 14.989922] <TASK> [ 14.989962] dump_stack_lvl+0x73/0xb0 [ 14.989990] print_report+0xd1/0x650 [ 14.990041] ? __virt_addr_valid+0x1db/0x2d0 [ 14.990065] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.990087] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.990112] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.990146] kasan_report+0x141/0x180 [ 14.990170] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.990228] __asan_report_load8_noabort+0x18/0x20 [ 14.990250] kasan_atomics_helper+0x4f30/0x5450 [ 14.990275] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.990299] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.990333] ? kasan_atomics+0x152/0x310 [ 14.990359] kasan_atomics+0x1dc/0x310 [ 14.990379] ? __pfx_kasan_atomics+0x10/0x10 [ 14.990401] ? __pfx_read_tsc+0x10/0x10 [ 14.990421] ? ktime_get_ts64+0x86/0x230 [ 14.990448] kunit_try_run_case+0x1a5/0x480 [ 14.990504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.990528] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.990553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.990577] ? __kthread_parkme+0x82/0x180 [ 14.990600] ? preempt_count_sub+0x50/0x80 [ 14.990627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.990650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.990705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.990729] kthread+0x337/0x6f0 [ 14.990752] ? trace_preempt_on+0x20/0xc0 [ 14.990776] ? __pfx_kthread+0x10/0x10 [ 14.990828] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.990851] ? calculate_sigpending+0x7b/0xa0 [ 14.990873] ? __pfx_kthread+0x10/0x10 [ 14.990897] ret_from_fork+0x41/0x80 [ 14.990918] ? __pfx_kthread+0x10/0x10 [ 14.990969] ret_from_fork_asm+0x1a/0x30 [ 14.991004] </TASK> [ 14.991016] [ 14.999380] Allocated by task 285: [ 14.999569] kasan_save_stack+0x45/0x70 [ 14.999776] kasan_save_track+0x18/0x40 [ 14.999959] kasan_save_alloc_info+0x3b/0x50 [ 15.000207] __kasan_kmalloc+0xb7/0xc0 [ 15.000426] __kmalloc_cache_noprof+0x189/0x420 [ 15.000654] kasan_atomics+0x95/0x310 [ 15.000866] kunit_try_run_case+0x1a5/0x480 [ 15.001077] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.001401] kthread+0x337/0x6f0 [ 15.001609] ret_from_fork+0x41/0x80 [ 15.001803] ret_from_fork_asm+0x1a/0x30 [ 15.001989] [ 15.002075] The buggy address belongs to the object at ffff888102b4cd00 [ 15.002075] which belongs to the cache kmalloc-64 of size 64 [ 15.002653] The buggy address is located 0 bytes to the right of [ 15.002653] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.003239] [ 15.003314] The buggy address belongs to the physical page: [ 15.003496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.003842] flags: 0x200000000000000(node=0|zone=2) [ 15.004072] page_type: f5(slab) [ 15.004239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.004673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.004899] page dumped because: kasan: bad access detected [ 15.005068] [ 15.005151] Memory state around the buggy address: [ 15.005387] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.005772] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.006210] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.006571] ^ [ 15.006832] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.007158] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.007451] ================================================================== [ 14.513077] ================================================================== [ 14.513707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.513976] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.514447] [ 14.514545] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.514589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.514603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.514625] Call Trace: [ 14.514641] <TASK> [ 14.514657] dump_stack_lvl+0x73/0xb0 [ 14.514683] print_report+0xd1/0x650 [ 14.514710] ? __virt_addr_valid+0x1db/0x2d0 [ 14.514735] ? kasan_atomics_helper+0x1079/0x5450 [ 14.514758] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.514781] ? kasan_atomics_helper+0x1079/0x5450 [ 14.514806] kasan_report+0x141/0x180 [ 14.514832] ? kasan_atomics_helper+0x1079/0x5450 [ 14.514860] kasan_check_range+0x10c/0x1c0 [ 14.514886] __kasan_check_write+0x18/0x20 [ 14.514907] kasan_atomics_helper+0x1079/0x5450 [ 14.514932] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.514954] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.514978] ? kasan_atomics+0x152/0x310 [ 14.515003] kasan_atomics+0x1dc/0x310 [ 14.515024] ? __pfx_kasan_atomics+0x10/0x10 [ 14.515046] ? __pfx_read_tsc+0x10/0x10 [ 14.515068] ? ktime_get_ts64+0x86/0x230 [ 14.515095] kunit_try_run_case+0x1a5/0x480 [ 14.515119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.515151] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.515176] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.515201] ? __kthread_parkme+0x82/0x180 [ 14.515222] ? preempt_count_sub+0x50/0x80 [ 14.515248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.515272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.515296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.515319] kthread+0x337/0x6f0 [ 14.515351] ? trace_preempt_on+0x20/0xc0 [ 14.515375] ? __pfx_kthread+0x10/0x10 [ 14.515399] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.515421] ? calculate_sigpending+0x7b/0xa0 [ 14.515444] ? __pfx_kthread+0x10/0x10 [ 14.515467] ret_from_fork+0x41/0x80 [ 14.515489] ? __pfx_kthread+0x10/0x10 [ 14.515511] ret_from_fork_asm+0x1a/0x30 [ 14.515545] </TASK> [ 14.515557] [ 14.522834] Allocated by task 285: [ 14.522963] kasan_save_stack+0x45/0x70 [ 14.523104] kasan_save_track+0x18/0x40 [ 14.523295] kasan_save_alloc_info+0x3b/0x50 [ 14.523692] __kasan_kmalloc+0xb7/0xc0 [ 14.523883] __kmalloc_cache_noprof+0x189/0x420 [ 14.524062] kasan_atomics+0x95/0x310 [ 14.524191] kunit_try_run_case+0x1a5/0x480 [ 14.524346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.524522] kthread+0x337/0x6f0 [ 14.524643] ret_from_fork+0x41/0x80 [ 14.524835] ret_from_fork_asm+0x1a/0x30 [ 14.525034] [ 14.525126] The buggy address belongs to the object at ffff888102b4cd00 [ 14.525126] which belongs to the cache kmalloc-64 of size 64 [ 14.525867] The buggy address is located 0 bytes to the right of [ 14.525867] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.526459] [ 14.526559] The buggy address belongs to the physical page: [ 14.526773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.527068] flags: 0x200000000000000(node=0|zone=2) [ 14.527427] page_type: f5(slab) [ 14.527549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.527777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.528107] page dumped because: kasan: bad access detected [ 14.528372] [ 14.528467] Memory state around the buggy address: [ 14.528695] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.528977] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.529305] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.529590] ^ [ 14.529774] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.530039] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.530625] ================================================================== [ 15.286736] ================================================================== [ 15.287446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.287891] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.288344] [ 15.288703] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.288753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.288767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.288788] Call Trace: [ 15.288912] <TASK> [ 15.288933] dump_stack_lvl+0x73/0xb0 [ 15.288960] print_report+0xd1/0x650 [ 15.288985] ? __virt_addr_valid+0x1db/0x2d0 [ 15.289007] ? kasan_atomics_helper+0x224c/0x5450 [ 15.289029] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.289053] ? kasan_atomics_helper+0x224c/0x5450 [ 15.289076] kasan_report+0x141/0x180 [ 15.289100] ? kasan_atomics_helper+0x224c/0x5450 [ 15.289138] kasan_check_range+0x10c/0x1c0 [ 15.289164] __kasan_check_write+0x18/0x20 [ 15.289185] kasan_atomics_helper+0x224c/0x5450 [ 15.289209] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.289233] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.289256] ? kasan_atomics+0x152/0x310 [ 15.289282] kasan_atomics+0x1dc/0x310 [ 15.289302] ? __pfx_kasan_atomics+0x10/0x10 [ 15.289336] ? __pfx_read_tsc+0x10/0x10 [ 15.289357] ? ktime_get_ts64+0x86/0x230 [ 15.289383] kunit_try_run_case+0x1a5/0x480 [ 15.289407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.289430] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.289455] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.289480] ? __kthread_parkme+0x82/0x180 [ 15.289503] ? preempt_count_sub+0x50/0x80 [ 15.289528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.289552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.289576] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.289600] kthread+0x337/0x6f0 [ 15.289621] ? trace_preempt_on+0x20/0xc0 [ 15.289646] ? __pfx_kthread+0x10/0x10 [ 15.289669] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.289692] ? calculate_sigpending+0x7b/0xa0 [ 15.289715] ? __pfx_kthread+0x10/0x10 [ 15.289738] ret_from_fork+0x41/0x80 [ 15.289759] ? __pfx_kthread+0x10/0x10 [ 15.289786] ret_from_fork_asm+0x1a/0x30 [ 15.289819] </TASK> [ 15.289831] [ 15.301278] Allocated by task 285: [ 15.301475] kasan_save_stack+0x45/0x70 [ 15.301772] kasan_save_track+0x18/0x40 [ 15.302050] kasan_save_alloc_info+0x3b/0x50 [ 15.302423] __kasan_kmalloc+0xb7/0xc0 [ 15.302700] __kmalloc_cache_noprof+0x189/0x420 [ 15.303014] kasan_atomics+0x95/0x310 [ 15.303292] kunit_try_run_case+0x1a5/0x480 [ 15.303647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.304008] kthread+0x337/0x6f0 [ 15.304232] ret_from_fork+0x41/0x80 [ 15.304479] ret_from_fork_asm+0x1a/0x30 [ 15.304852] [ 15.304984] The buggy address belongs to the object at ffff888102b4cd00 [ 15.304984] which belongs to the cache kmalloc-64 of size 64 [ 15.305696] The buggy address is located 0 bytes to the right of [ 15.305696] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.306453] [ 15.306555] The buggy address belongs to the physical page: [ 15.306767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.307340] flags: 0x200000000000000(node=0|zone=2) [ 15.307696] page_type: f5(slab) [ 15.307970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.308542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.308962] page dumped because: kasan: bad access detected [ 15.309306] [ 15.309458] Memory state around the buggy address: [ 15.309844] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.310269] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.310691] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.311088] ^ [ 15.311471] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.311891] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.312338] ================================================================== [ 14.750216] ================================================================== [ 14.750647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.750973] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.751356] [ 14.751530] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.751574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.751588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.751609] Call Trace: [ 14.751625] <TASK> [ 14.751640] dump_stack_lvl+0x73/0xb0 [ 14.751687] print_report+0xd1/0x650 [ 14.751725] ? __virt_addr_valid+0x1db/0x2d0 [ 14.751761] ? kasan_atomics_helper+0x151d/0x5450 [ 14.751798] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.751836] ? kasan_atomics_helper+0x151d/0x5450 [ 14.751874] kasan_report+0x141/0x180 [ 14.751924] ? kasan_atomics_helper+0x151d/0x5450 [ 14.751967] kasan_check_range+0x10c/0x1c0 [ 14.751992] __kasan_check_write+0x18/0x20 [ 14.752012] kasan_atomics_helper+0x151d/0x5450 [ 14.752037] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.752061] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.752084] ? kasan_atomics+0x152/0x310 [ 14.752109] kasan_atomics+0x1dc/0x310 [ 14.752130] ? __pfx_kasan_atomics+0x10/0x10 [ 14.752152] ? __pfx_read_tsc+0x10/0x10 [ 14.752172] ? ktime_get_ts64+0x86/0x230 [ 14.752199] kunit_try_run_case+0x1a5/0x480 [ 14.752223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.752246] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.752271] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.752296] ? __kthread_parkme+0x82/0x180 [ 14.752319] ? preempt_count_sub+0x50/0x80 [ 14.752357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.752381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.752405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.752428] kthread+0x337/0x6f0 [ 14.752459] ? trace_preempt_on+0x20/0xc0 [ 14.752483] ? __pfx_kthread+0x10/0x10 [ 14.752506] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.752529] ? calculate_sigpending+0x7b/0xa0 [ 14.752552] ? __pfx_kthread+0x10/0x10 [ 14.752575] ret_from_fork+0x41/0x80 [ 14.752615] ? __pfx_kthread+0x10/0x10 [ 14.752639] ret_from_fork_asm+0x1a/0x30 [ 14.752672] </TASK> [ 14.752699] [ 14.760214] Allocated by task 285: [ 14.760429] kasan_save_stack+0x45/0x70 [ 14.760673] kasan_save_track+0x18/0x40 [ 14.760893] kasan_save_alloc_info+0x3b/0x50 [ 14.761134] __kasan_kmalloc+0xb7/0xc0 [ 14.761333] __kmalloc_cache_noprof+0x189/0x420 [ 14.761555] kasan_atomics+0x95/0x310 [ 14.761738] kunit_try_run_case+0x1a5/0x480 [ 14.761894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.762202] kthread+0x337/0x6f0 [ 14.762383] ret_from_fork+0x41/0x80 [ 14.762585] ret_from_fork_asm+0x1a/0x30 [ 14.762731] [ 14.762811] The buggy address belongs to the object at ffff888102b4cd00 [ 14.762811] which belongs to the cache kmalloc-64 of size 64 [ 14.763383] The buggy address is located 0 bytes to the right of [ 14.763383] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.763916] [ 14.763995] The buggy address belongs to the physical page: [ 14.764265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.764633] flags: 0x200000000000000(node=0|zone=2) [ 14.764851] page_type: f5(slab) [ 14.765031] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.765535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.765836] page dumped because: kasan: bad access detected [ 14.766074] [ 14.766250] Memory state around the buggy address: [ 14.766498] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.766815] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.767141] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.767463] ^ [ 14.767708] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.768023] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.768232] ================================================================== [ 14.090664] ================================================================== [ 14.091018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.091402] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.091900] [ 14.092013] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.092058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.092071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.092092] Call Trace: [ 14.092108] <TASK> [ 14.092124] dump_stack_lvl+0x73/0xb0 [ 14.092149] print_report+0xd1/0x650 [ 14.092172] ? __virt_addr_valid+0x1db/0x2d0 [ 14.092195] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.092218] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.092242] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.092266] kasan_report+0x141/0x180 [ 14.092289] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.092318] __asan_report_store4_noabort+0x1b/0x30 [ 14.092362] kasan_atomics_helper+0x4b3a/0x5450 [ 14.092387] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.092411] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.092434] ? kasan_atomics+0x152/0x310 [ 14.092459] kasan_atomics+0x1dc/0x310 [ 14.092480] ? __pfx_kasan_atomics+0x10/0x10 [ 14.092503] ? __pfx_read_tsc+0x10/0x10 [ 14.092524] ? ktime_get_ts64+0x86/0x230 [ 14.092551] kunit_try_run_case+0x1a5/0x480 [ 14.092575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.092597] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.092621] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.092646] ? __kthread_parkme+0x82/0x180 [ 14.092668] ? preempt_count_sub+0x50/0x80 [ 14.092694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.092718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.092741] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.092765] kthread+0x337/0x6f0 [ 14.092786] ? trace_preempt_on+0x20/0xc0 [ 14.092810] ? __pfx_kthread+0x10/0x10 [ 14.092833] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.092856] ? calculate_sigpending+0x7b/0xa0 [ 14.092879] ? __pfx_kthread+0x10/0x10 [ 14.092902] ret_from_fork+0x41/0x80 [ 14.092924] ? __pfx_kthread+0x10/0x10 [ 14.092946] ret_from_fork_asm+0x1a/0x30 [ 14.092979] </TASK> [ 14.092990] [ 14.100430] Allocated by task 285: [ 14.100566] kasan_save_stack+0x45/0x70 [ 14.100712] kasan_save_track+0x18/0x40 [ 14.100847] kasan_save_alloc_info+0x3b/0x50 [ 14.101053] __kasan_kmalloc+0xb7/0xc0 [ 14.101244] __kmalloc_cache_noprof+0x189/0x420 [ 14.101604] kasan_atomics+0x95/0x310 [ 14.101793] kunit_try_run_case+0x1a5/0x480 [ 14.102002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.102415] kthread+0x337/0x6f0 [ 14.102553] ret_from_fork+0x41/0x80 [ 14.102683] ret_from_fork_asm+0x1a/0x30 [ 14.102825] [ 14.102897] The buggy address belongs to the object at ffff888102b4cd00 [ 14.102897] which belongs to the cache kmalloc-64 of size 64 [ 14.103414] The buggy address is located 0 bytes to the right of [ 14.103414] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.103961] [ 14.104059] The buggy address belongs to the physical page: [ 14.104304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.104552] flags: 0x200000000000000(node=0|zone=2) [ 14.104712] page_type: f5(slab) [ 14.104893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.105367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.105710] page dumped because: kasan: bad access detected [ 14.105971] [ 14.106083] Memory state around the buggy address: [ 14.106341] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.106587] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.106804] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.107015] ^ [ 14.107170] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.107419] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.107735] ================================================================== [ 15.141594] ================================================================== [ 15.141971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.142465] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.142782] [ 15.142863] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.142904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.142916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.142936] Call Trace: [ 15.142950] <TASK> [ 15.142965] dump_stack_lvl+0x73/0xb0 [ 15.142988] print_report+0xd1/0x650 [ 15.143012] ? __virt_addr_valid+0x1db/0x2d0 [ 15.143058] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.143080] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.143104] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.143137] kasan_report+0x141/0x180 [ 15.143161] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.143190] __asan_report_load8_noabort+0x18/0x20 [ 15.143212] kasan_atomics_helper+0x4f98/0x5450 [ 15.143254] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.143278] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.143301] ? kasan_atomics+0x152/0x310 [ 15.143336] kasan_atomics+0x1dc/0x310 [ 15.143357] ? __pfx_kasan_atomics+0x10/0x10 [ 15.143379] ? __pfx_read_tsc+0x10/0x10 [ 15.143399] ? ktime_get_ts64+0x86/0x230 [ 15.143426] kunit_try_run_case+0x1a5/0x480 [ 15.143450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.143489] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.143514] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.143539] ? __kthread_parkme+0x82/0x180 [ 15.143561] ? preempt_count_sub+0x50/0x80 [ 15.143587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.143611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.143634] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.143658] kthread+0x337/0x6f0 [ 15.143680] ? trace_preempt_on+0x20/0xc0 [ 15.143703] ? __pfx_kthread+0x10/0x10 [ 15.143726] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.143749] ? calculate_sigpending+0x7b/0xa0 [ 15.143771] ? __pfx_kthread+0x10/0x10 [ 15.143795] ret_from_fork+0x41/0x80 [ 15.143816] ? __pfx_kthread+0x10/0x10 [ 15.143839] ret_from_fork_asm+0x1a/0x30 [ 15.143871] </TASK> [ 15.143882] [ 15.151255] Allocated by task 285: [ 15.151397] kasan_save_stack+0x45/0x70 [ 15.151551] kasan_save_track+0x18/0x40 [ 15.151751] kasan_save_alloc_info+0x3b/0x50 [ 15.151991] __kasan_kmalloc+0xb7/0xc0 [ 15.152254] __kmalloc_cache_noprof+0x189/0x420 [ 15.152468] kasan_atomics+0x95/0x310 [ 15.152644] kunit_try_run_case+0x1a5/0x480 [ 15.152854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.153108] kthread+0x337/0x6f0 [ 15.153267] ret_from_fork+0x41/0x80 [ 15.153409] ret_from_fork_asm+0x1a/0x30 [ 15.153549] [ 15.153621] The buggy address belongs to the object at ffff888102b4cd00 [ 15.153621] which belongs to the cache kmalloc-64 of size 64 [ 15.154552] The buggy address is located 0 bytes to the right of [ 15.154552] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.154935] [ 15.155009] The buggy address belongs to the physical page: [ 15.155313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.155699] flags: 0x200000000000000(node=0|zone=2) [ 15.155951] page_type: f5(slab) [ 15.156143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.156861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.157836] page dumped because: kasan: bad access detected [ 15.158218] [ 15.158380] Memory state around the buggy address: [ 15.158540] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.158756] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.158972] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.159192] ^ [ 15.159361] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.159576] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.159788] ================================================================== [ 14.380894] ================================================================== [ 14.381389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.381723] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.382024] [ 14.382119] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.382175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.382188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.382208] Call Trace: [ 14.382222] <TASK> [ 14.382236] dump_stack_lvl+0x73/0xb0 [ 14.382259] print_report+0xd1/0x650 [ 14.382282] ? __virt_addr_valid+0x1db/0x2d0 [ 14.382304] ? kasan_atomics_helper+0xd47/0x5450 [ 14.382337] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.382362] ? kasan_atomics_helper+0xd47/0x5450 [ 14.382385] kasan_report+0x141/0x180 [ 14.382408] ? kasan_atomics_helper+0xd47/0x5450 [ 14.382437] kasan_check_range+0x10c/0x1c0 [ 14.382462] __kasan_check_write+0x18/0x20 [ 14.382483] kasan_atomics_helper+0xd47/0x5450 [ 14.382507] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.382531] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.382554] ? kasan_atomics+0x152/0x310 [ 14.382578] kasan_atomics+0x1dc/0x310 [ 14.382599] ? __pfx_kasan_atomics+0x10/0x10 [ 14.382622] ? __pfx_read_tsc+0x10/0x10 [ 14.382642] ? ktime_get_ts64+0x86/0x230 [ 14.382668] kunit_try_run_case+0x1a5/0x480 [ 14.382692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.382715] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.382739] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.382764] ? __kthread_parkme+0x82/0x180 [ 14.382786] ? preempt_count_sub+0x50/0x80 [ 14.382811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.382836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.382859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.382883] kthread+0x337/0x6f0 [ 14.382905] ? trace_preempt_on+0x20/0xc0 [ 14.382929] ? __pfx_kthread+0x10/0x10 [ 14.382952] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.382975] ? calculate_sigpending+0x7b/0xa0 [ 14.382998] ? __pfx_kthread+0x10/0x10 [ 14.383022] ret_from_fork+0x41/0x80 [ 14.383043] ? __pfx_kthread+0x10/0x10 [ 14.383066] ret_from_fork_asm+0x1a/0x30 [ 14.383098] </TASK> [ 14.383109] [ 14.390350] Allocated by task 285: [ 14.390478] kasan_save_stack+0x45/0x70 [ 14.390619] kasan_save_track+0x18/0x40 [ 14.390755] kasan_save_alloc_info+0x3b/0x50 [ 14.390900] __kasan_kmalloc+0xb7/0xc0 [ 14.391092] __kmalloc_cache_noprof+0x189/0x420 [ 14.391557] kasan_atomics+0x95/0x310 [ 14.391749] kunit_try_run_case+0x1a5/0x480 [ 14.391957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.392246] kthread+0x337/0x6f0 [ 14.392409] ret_from_fork+0x41/0x80 [ 14.392572] ret_from_fork_asm+0x1a/0x30 [ 14.392731] [ 14.392827] The buggy address belongs to the object at ffff888102b4cd00 [ 14.392827] which belongs to the cache kmalloc-64 of size 64 [ 14.393282] The buggy address is located 0 bytes to the right of [ 14.393282] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.393789] [ 14.393886] The buggy address belongs to the physical page: [ 14.394115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.394440] flags: 0x200000000000000(node=0|zone=2) [ 14.394637] page_type: f5(slab) [ 14.394788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.395090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.395448] page dumped because: kasan: bad access detected [ 14.395618] [ 14.395690] Memory state around the buggy address: [ 14.395844] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.396059] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.396379] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.397016] ^ [ 14.397243] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.397573] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.397814] ================================================================== [ 14.631962] ================================================================== [ 14.632510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.632879] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.633214] [ 14.633314] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.633370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.633383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.633442] Call Trace: [ 14.633458] <TASK> [ 14.633473] dump_stack_lvl+0x73/0xb0 [ 14.633498] print_report+0xd1/0x650 [ 14.633523] ? __virt_addr_valid+0x1db/0x2d0 [ 14.633546] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.633568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.633592] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.633616] kasan_report+0x141/0x180 [ 14.633640] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.633668] kasan_check_range+0x10c/0x1c0 [ 14.633693] __kasan_check_write+0x18/0x20 [ 14.633714] kasan_atomics_helper+0x12e6/0x5450 [ 14.633739] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.633762] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.633792] ? kasan_atomics+0x152/0x310 [ 14.633817] kasan_atomics+0x1dc/0x310 [ 14.633837] ? __pfx_kasan_atomics+0x10/0x10 [ 14.633860] ? __pfx_read_tsc+0x10/0x10 [ 14.633880] ? ktime_get_ts64+0x86/0x230 [ 14.633907] kunit_try_run_case+0x1a5/0x480 [ 14.633931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.633954] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.633980] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.634004] ? __kthread_parkme+0x82/0x180 [ 14.634026] ? preempt_count_sub+0x50/0x80 [ 14.634052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.634076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.634099] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.634134] kthread+0x337/0x6f0 [ 14.634156] ? trace_preempt_on+0x20/0xc0 [ 14.634179] ? __pfx_kthread+0x10/0x10 [ 14.634203] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.634225] ? calculate_sigpending+0x7b/0xa0 [ 14.634248] ? __pfx_kthread+0x10/0x10 [ 14.634272] ret_from_fork+0x41/0x80 [ 14.634293] ? __pfx_kthread+0x10/0x10 [ 14.634316] ret_from_fork_asm+0x1a/0x30 [ 14.634360] </TASK> [ 14.634371] [ 14.642088] Allocated by task 285: [ 14.642286] kasan_save_stack+0x45/0x70 [ 14.642497] kasan_save_track+0x18/0x40 [ 14.642690] kasan_save_alloc_info+0x3b/0x50 [ 14.642882] __kasan_kmalloc+0xb7/0xc0 [ 14.643042] __kmalloc_cache_noprof+0x189/0x420 [ 14.643251] kasan_atomics+0x95/0x310 [ 14.643422] kunit_try_run_case+0x1a5/0x480 [ 14.643608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.643831] kthread+0x337/0x6f0 [ 14.643954] ret_from_fork+0x41/0x80 [ 14.644085] ret_from_fork_asm+0x1a/0x30 [ 14.644287] [ 14.644392] The buggy address belongs to the object at ffff888102b4cd00 [ 14.644392] which belongs to the cache kmalloc-64 of size 64 [ 14.645072] The buggy address is located 0 bytes to the right of [ 14.645072] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.645445] [ 14.645546] The buggy address belongs to the physical page: [ 14.645914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.646249] flags: 0x200000000000000(node=0|zone=2) [ 14.646422] page_type: f5(slab) [ 14.646543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.646773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.647072] page dumped because: kasan: bad access detected [ 14.647577] [ 14.647674] Memory state around the buggy address: [ 14.647904] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.648355] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.648685] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.648982] ^ [ 14.649210] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.649493] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.649783] ================================================================== [ 14.071841] ================================================================== [ 14.072232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.072829] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.073222] [ 14.073341] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.073388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.073401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.073424] Call Trace: [ 14.073441] <TASK> [ 14.073458] dump_stack_lvl+0x73/0xb0 [ 14.073484] print_report+0xd1/0x650 [ 14.073508] ? __virt_addr_valid+0x1db/0x2d0 [ 14.073531] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.073553] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.073577] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.073600] kasan_report+0x141/0x180 [ 14.073623] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.073651] kasan_check_range+0x10c/0x1c0 [ 14.073676] __kasan_check_write+0x18/0x20 [ 14.073697] kasan_atomics_helper+0x4a0/0x5450 [ 14.073721] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.073745] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.073771] ? kasan_atomics+0x152/0x310 [ 14.073795] kasan_atomics+0x1dc/0x310 [ 14.073816] ? __pfx_kasan_atomics+0x10/0x10 [ 14.073837] ? __pfx_read_tsc+0x10/0x10 [ 14.073858] ? ktime_get_ts64+0x86/0x230 [ 14.073884] kunit_try_run_case+0x1a5/0x480 [ 14.073908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.073930] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.073955] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.073980] ? __kthread_parkme+0x82/0x180 [ 14.074002] ? preempt_count_sub+0x50/0x80 [ 14.074029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.074053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.074076] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.074100] kthread+0x337/0x6f0 [ 14.074121] ? trace_preempt_on+0x20/0xc0 [ 14.074154] ? __pfx_kthread+0x10/0x10 [ 14.074176] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.074199] ? calculate_sigpending+0x7b/0xa0 [ 14.074222] ? __pfx_kthread+0x10/0x10 [ 14.074246] ret_from_fork+0x41/0x80 [ 14.074267] ? __pfx_kthread+0x10/0x10 [ 14.074290] ret_from_fork_asm+0x1a/0x30 [ 14.074333] </TASK> [ 14.074344] [ 14.081992] Allocated by task 285: [ 14.082186] kasan_save_stack+0x45/0x70 [ 14.082375] kasan_save_track+0x18/0x40 [ 14.082554] kasan_save_alloc_info+0x3b/0x50 [ 14.082732] __kasan_kmalloc+0xb7/0xc0 [ 14.082865] __kmalloc_cache_noprof+0x189/0x420 [ 14.083017] kasan_atomics+0x95/0x310 [ 14.083157] kunit_try_run_case+0x1a5/0x480 [ 14.083385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.083636] kthread+0x337/0x6f0 [ 14.083848] ret_from_fork+0x41/0x80 [ 14.084022] ret_from_fork_asm+0x1a/0x30 [ 14.084161] [ 14.084233] The buggy address belongs to the object at ffff888102b4cd00 [ 14.084233] which belongs to the cache kmalloc-64 of size 64 [ 14.084744] The buggy address is located 0 bytes to the right of [ 14.084744] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.085474] [ 14.085559] The buggy address belongs to the physical page: [ 14.085786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.086100] flags: 0x200000000000000(node=0|zone=2) [ 14.086315] page_type: f5(slab) [ 14.086456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.086759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.087063] page dumped because: kasan: bad access detected [ 14.087374] [ 14.087449] Memory state around the buggy address: [ 14.087639] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.087853] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.088065] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.088277] ^ [ 14.088491] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.089105] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.089448] ================================================================== [ 14.109352] ================================================================== [ 14.109717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.110059] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.110754] [ 14.110894] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.110940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.110953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.110974] Call Trace: [ 14.110990] <TASK> [ 14.111006] dump_stack_lvl+0x73/0xb0 [ 14.111033] print_report+0xd1/0x650 [ 14.111056] ? __virt_addr_valid+0x1db/0x2d0 [ 14.111079] ? kasan_atomics_helper+0x565/0x5450 [ 14.111101] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.111126] ? kasan_atomics_helper+0x565/0x5450 [ 14.111150] kasan_report+0x141/0x180 [ 14.111194] ? kasan_atomics_helper+0x565/0x5450 [ 14.111222] kasan_check_range+0x10c/0x1c0 [ 14.111248] __kasan_check_write+0x18/0x20 [ 14.111285] kasan_atomics_helper+0x565/0x5450 [ 14.111310] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.111343] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.111367] ? kasan_atomics+0x152/0x310 [ 14.111391] kasan_atomics+0x1dc/0x310 [ 14.111412] ? __pfx_kasan_atomics+0x10/0x10 [ 14.111434] ? __pfx_read_tsc+0x10/0x10 [ 14.111455] ? ktime_get_ts64+0x86/0x230 [ 14.111539] kunit_try_run_case+0x1a5/0x480 [ 14.111588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.111613] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.111638] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.111664] ? __kthread_parkme+0x82/0x180 [ 14.111686] ? preempt_count_sub+0x50/0x80 [ 14.111712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.111753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.111777] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.111801] kthread+0x337/0x6f0 [ 14.111823] ? trace_preempt_on+0x20/0xc0 [ 14.111848] ? __pfx_kthread+0x10/0x10 [ 14.111870] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.111893] ? calculate_sigpending+0x7b/0xa0 [ 14.111917] ? __pfx_kthread+0x10/0x10 [ 14.111940] ret_from_fork+0x41/0x80 [ 14.111962] ? __pfx_kthread+0x10/0x10 [ 14.111984] ret_from_fork_asm+0x1a/0x30 [ 14.112017] </TASK> [ 14.112029] [ 14.119402] Allocated by task 285: [ 14.119576] kasan_save_stack+0x45/0x70 [ 14.119967] kasan_save_track+0x18/0x40 [ 14.120172] kasan_save_alloc_info+0x3b/0x50 [ 14.120331] __kasan_kmalloc+0xb7/0xc0 [ 14.120466] __kmalloc_cache_noprof+0x189/0x420 [ 14.120686] kasan_atomics+0x95/0x310 [ 14.120873] kunit_try_run_case+0x1a5/0x480 [ 14.121074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.121456] kthread+0x337/0x6f0 [ 14.121630] ret_from_fork+0x41/0x80 [ 14.121796] ret_from_fork_asm+0x1a/0x30 [ 14.121935] [ 14.122006] The buggy address belongs to the object at ffff888102b4cd00 [ 14.122006] which belongs to the cache kmalloc-64 of size 64 [ 14.122500] The buggy address is located 0 bytes to the right of [ 14.122500] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.123171] [ 14.123255] The buggy address belongs to the physical page: [ 14.123437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.123714] flags: 0x200000000000000(node=0|zone=2) [ 14.123965] page_type: f5(slab) [ 14.124144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.124491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.124819] page dumped because: kasan: bad access detected [ 14.125035] [ 14.125135] Memory state around the buggy address: [ 14.125312] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.125537] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.125817] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.126749] ^ [ 14.126996] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.127287] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.127565] ================================================================== [ 14.548694] ================================================================== [ 14.548992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.550364] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.550682] [ 14.550787] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.550832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.550845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.550867] Call Trace: [ 14.550880] <TASK> [ 14.550895] dump_stack_lvl+0x73/0xb0 [ 14.550921] print_report+0xd1/0x650 [ 14.550945] ? __virt_addr_valid+0x1db/0x2d0 [ 14.550966] ? kasan_atomics_helper+0x1148/0x5450 [ 14.550989] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.551013] ? kasan_atomics_helper+0x1148/0x5450 [ 14.551036] kasan_report+0x141/0x180 [ 14.551060] ? kasan_atomics_helper+0x1148/0x5450 [ 14.551089] kasan_check_range+0x10c/0x1c0 [ 14.551122] __kasan_check_write+0x18/0x20 [ 14.551143] kasan_atomics_helper+0x1148/0x5450 [ 14.551168] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.551193] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.551216] ? kasan_atomics+0x152/0x310 [ 14.551240] kasan_atomics+0x1dc/0x310 [ 14.551260] ? __pfx_kasan_atomics+0x10/0x10 [ 14.551282] ? __pfx_read_tsc+0x10/0x10 [ 14.551302] ? ktime_get_ts64+0x86/0x230 [ 14.551337] kunit_try_run_case+0x1a5/0x480 [ 14.551361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.551410] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.551435] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.551471] ? __kthread_parkme+0x82/0x180 [ 14.551493] ? preempt_count_sub+0x50/0x80 [ 14.551518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.551542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.551575] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.551598] kthread+0x337/0x6f0 [ 14.551619] ? trace_preempt_on+0x20/0xc0 [ 14.551653] ? __pfx_kthread+0x10/0x10 [ 14.551676] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.551699] ? calculate_sigpending+0x7b/0xa0 [ 14.551729] ? __pfx_kthread+0x10/0x10 [ 14.551753] ret_from_fork+0x41/0x80 [ 14.551774] ? __pfx_kthread+0x10/0x10 [ 14.551807] ret_from_fork_asm+0x1a/0x30 [ 14.551839] </TASK> [ 14.551851] [ 14.559104] Allocated by task 285: [ 14.559250] kasan_save_stack+0x45/0x70 [ 14.559440] kasan_save_track+0x18/0x40 [ 14.559631] kasan_save_alloc_info+0x3b/0x50 [ 14.559860] __kasan_kmalloc+0xb7/0xc0 [ 14.560046] __kmalloc_cache_noprof+0x189/0x420 [ 14.560286] kasan_atomics+0x95/0x310 [ 14.560477] kunit_try_run_case+0x1a5/0x480 [ 14.560685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.560935] kthread+0x337/0x6f0 [ 14.561102] ret_from_fork+0x41/0x80 [ 14.561302] ret_from_fork_asm+0x1a/0x30 [ 14.561516] [ 14.561612] The buggy address belongs to the object at ffff888102b4cd00 [ 14.561612] which belongs to the cache kmalloc-64 of size 64 [ 14.562006] The buggy address is located 0 bytes to the right of [ 14.562006] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.562568] [ 14.562681] The buggy address belongs to the physical page: [ 14.562937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.563342] flags: 0x200000000000000(node=0|zone=2) [ 14.563574] page_type: f5(slab) [ 14.563735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.564076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.564430] page dumped because: kasan: bad access detected [ 14.564682] [ 14.564772] Memory state around the buggy address: [ 14.564928] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.565197] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.565532] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.565850] ^ [ 14.566069] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.566335] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.566635] ================================================================== [ 14.808582] ================================================================== [ 14.808931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.809467] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.809829] [ 14.809938] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.810001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.810015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.810036] Call Trace: [ 14.810048] <TASK> [ 14.810063] dump_stack_lvl+0x73/0xb0 [ 14.810087] print_report+0xd1/0x650 [ 14.810112] ? __virt_addr_valid+0x1db/0x2d0 [ 14.810145] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.810168] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.810191] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.810215] kasan_report+0x141/0x180 [ 14.810239] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.810286] kasan_check_range+0x10c/0x1c0 [ 14.810312] __kasan_check_write+0x18/0x20 [ 14.810345] kasan_atomics_helper+0x16e7/0x5450 [ 14.810369] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.810393] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.810416] ? kasan_atomics+0x152/0x310 [ 14.810458] kasan_atomics+0x1dc/0x310 [ 14.810479] ? __pfx_kasan_atomics+0x10/0x10 [ 14.810501] ? __pfx_read_tsc+0x10/0x10 [ 14.810521] ? ktime_get_ts64+0x86/0x230 [ 14.810548] kunit_try_run_case+0x1a5/0x480 [ 14.810572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.810594] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.810636] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.810662] ? __kthread_parkme+0x82/0x180 [ 14.810684] ? preempt_count_sub+0x50/0x80 [ 14.810710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.810735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.810758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.810798] kthread+0x337/0x6f0 [ 14.810820] ? trace_preempt_on+0x20/0xc0 [ 14.810843] ? __pfx_kthread+0x10/0x10 [ 14.810866] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.810889] ? calculate_sigpending+0x7b/0xa0 [ 14.810911] ? __pfx_kthread+0x10/0x10 [ 14.810951] ret_from_fork+0x41/0x80 [ 14.810973] ? __pfx_kthread+0x10/0x10 [ 14.810996] ret_from_fork_asm+0x1a/0x30 [ 14.811029] </TASK> [ 14.811040] [ 14.818966] Allocated by task 285: [ 14.819103] kasan_save_stack+0x45/0x70 [ 14.819302] kasan_save_track+0x18/0x40 [ 14.819535] kasan_save_alloc_info+0x3b/0x50 [ 14.819745] __kasan_kmalloc+0xb7/0xc0 [ 14.819936] __kmalloc_cache_noprof+0x189/0x420 [ 14.820150] kasan_atomics+0x95/0x310 [ 14.820348] kunit_try_run_case+0x1a5/0x480 [ 14.820721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.820971] kthread+0x337/0x6f0 [ 14.821165] ret_from_fork+0x41/0x80 [ 14.821304] ret_from_fork_asm+0x1a/0x30 [ 14.821457] [ 14.821527] The buggy address belongs to the object at ffff888102b4cd00 [ 14.821527] which belongs to the cache kmalloc-64 of size 64 [ 14.822074] The buggy address is located 0 bytes to the right of [ 14.822074] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.822685] [ 14.822799] The buggy address belongs to the physical page: [ 14.823102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.823484] flags: 0x200000000000000(node=0|zone=2) [ 14.823716] page_type: f5(slab) [ 14.823886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.824259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.824506] page dumped because: kasan: bad access detected [ 14.824677] [ 14.824746] Memory state around the buggy address: [ 14.824928] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.825356] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.825962] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.826303] ^ [ 14.826529] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.826856] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.827095] ================================================================== [ 14.712030] ================================================================== [ 14.712420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.712871] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.713190] [ 14.713341] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.713387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.713401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.713422] Call Trace: [ 14.713436] <TASK> [ 14.713471] dump_stack_lvl+0x73/0xb0 [ 14.713497] print_report+0xd1/0x650 [ 14.713522] ? __virt_addr_valid+0x1db/0x2d0 [ 14.713544] ? kasan_atomics_helper+0x1467/0x5450 [ 14.713567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.713591] ? kasan_atomics_helper+0x1467/0x5450 [ 14.713615] kasan_report+0x141/0x180 [ 14.713639] ? kasan_atomics_helper+0x1467/0x5450 [ 14.713684] kasan_check_range+0x10c/0x1c0 [ 14.713710] __kasan_check_write+0x18/0x20 [ 14.713731] kasan_atomics_helper+0x1467/0x5450 [ 14.713777] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.713802] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.713825] ? kasan_atomics+0x152/0x310 [ 14.713849] kasan_atomics+0x1dc/0x310 [ 14.713871] ? __pfx_kasan_atomics+0x10/0x10 [ 14.713893] ? __pfx_read_tsc+0x10/0x10 [ 14.713913] ? ktime_get_ts64+0x86/0x230 [ 14.713955] kunit_try_run_case+0x1a5/0x480 [ 14.713979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.714001] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.714025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.714051] ? __kthread_parkme+0x82/0x180 [ 14.714072] ? preempt_count_sub+0x50/0x80 [ 14.714098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.714132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.714155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.714179] kthread+0x337/0x6f0 [ 14.714200] ? trace_preempt_on+0x20/0xc0 [ 14.714224] ? __pfx_kthread+0x10/0x10 [ 14.714247] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.714269] ? calculate_sigpending+0x7b/0xa0 [ 14.714291] ? __pfx_kthread+0x10/0x10 [ 14.714315] ret_from_fork+0x41/0x80 [ 14.714347] ? __pfx_kthread+0x10/0x10 [ 14.714370] ret_from_fork_asm+0x1a/0x30 [ 14.714402] </TASK> [ 14.714413] [ 14.722081] Allocated by task 285: [ 14.722436] kasan_save_stack+0x45/0x70 [ 14.722628] kasan_save_track+0x18/0x40 [ 14.722766] kasan_save_alloc_info+0x3b/0x50 [ 14.722913] __kasan_kmalloc+0xb7/0xc0 [ 14.723102] __kmalloc_cache_noprof+0x189/0x420 [ 14.723339] kasan_atomics+0x95/0x310 [ 14.723544] kunit_try_run_case+0x1a5/0x480 [ 14.723774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.724046] kthread+0x337/0x6f0 [ 14.724255] ret_from_fork+0x41/0x80 [ 14.724476] ret_from_fork_asm+0x1a/0x30 [ 14.724674] [ 14.724769] The buggy address belongs to the object at ffff888102b4cd00 [ 14.724769] which belongs to the cache kmalloc-64 of size 64 [ 14.725417] The buggy address is located 0 bytes to the right of [ 14.725417] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.725785] [ 14.725857] The buggy address belongs to the physical page: [ 14.726106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.726502] flags: 0x200000000000000(node=0|zone=2) [ 14.726771] page_type: f5(slab) [ 14.726957] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.727340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.727686] page dumped because: kasan: bad access detected [ 14.727938] [ 14.728049] Memory state around the buggy address: [ 14.728294] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.728640] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.728901] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.729113] ^ [ 14.729346] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.729732] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.730033] ================================================================== [ 15.313045] ================================================================== [ 15.313700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.314150] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.314461] [ 15.314570] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.314615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.314630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.314746] Call Trace: [ 15.314762] <TASK> [ 15.314776] dump_stack_lvl+0x73/0xb0 [ 15.314804] print_report+0xd1/0x650 [ 15.314827] ? __virt_addr_valid+0x1db/0x2d0 [ 15.314849] ? kasan_atomics_helper+0x5115/0x5450 [ 15.314872] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.314895] ? kasan_atomics_helper+0x5115/0x5450 [ 15.314919] kasan_report+0x141/0x180 [ 15.314943] ? kasan_atomics_helper+0x5115/0x5450 [ 15.314971] __asan_report_load8_noabort+0x18/0x20 [ 15.314993] kasan_atomics_helper+0x5115/0x5450 [ 15.315017] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.315041] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.315063] ? kasan_atomics+0x152/0x310 [ 15.315088] kasan_atomics+0x1dc/0x310 [ 15.315108] ? __pfx_kasan_atomics+0x10/0x10 [ 15.315299] ? __pfx_read_tsc+0x10/0x10 [ 15.315331] ? ktime_get_ts64+0x86/0x230 [ 15.315358] kunit_try_run_case+0x1a5/0x480 [ 15.315383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.315405] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.315429] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.315454] ? __kthread_parkme+0x82/0x180 [ 15.315476] ? preempt_count_sub+0x50/0x80 [ 15.315503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.315526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.315550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.315574] kthread+0x337/0x6f0 [ 15.315595] ? trace_preempt_on+0x20/0xc0 [ 15.315618] ? __pfx_kthread+0x10/0x10 [ 15.315641] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.315664] ? calculate_sigpending+0x7b/0xa0 [ 15.315687] ? __pfx_kthread+0x10/0x10 [ 15.315709] ret_from_fork+0x41/0x80 [ 15.315731] ? __pfx_kthread+0x10/0x10 [ 15.315753] ret_from_fork_asm+0x1a/0x30 [ 15.315786] </TASK> [ 15.315797] [ 15.325800] Allocated by task 285: [ 15.325946] kasan_save_stack+0x45/0x70 [ 15.326347] kasan_save_track+0x18/0x40 [ 15.326623] kasan_save_alloc_info+0x3b/0x50 [ 15.326790] __kasan_kmalloc+0xb7/0xc0 [ 15.327092] __kmalloc_cache_noprof+0x189/0x420 [ 15.327373] kasan_atomics+0x95/0x310 [ 15.327693] kunit_try_run_case+0x1a5/0x480 [ 15.327909] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.328341] kthread+0x337/0x6f0 [ 15.328595] ret_from_fork+0x41/0x80 [ 15.328745] ret_from_fork_asm+0x1a/0x30 [ 15.329052] [ 15.329129] The buggy address belongs to the object at ffff888102b4cd00 [ 15.329129] which belongs to the cache kmalloc-64 of size 64 [ 15.329784] The buggy address is located 0 bytes to the right of [ 15.329784] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.330566] [ 15.330650] The buggy address belongs to the physical page: [ 15.331048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.331602] flags: 0x200000000000000(node=0|zone=2) [ 15.331817] page_type: f5(slab) [ 15.332129] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.332611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.332980] page dumped because: kasan: bad access detected [ 15.333268] [ 15.333376] Memory state around the buggy address: [ 15.333759] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.334104] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.334557] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.334817] ^ [ 15.335042] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.335496] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.335889] ================================================================== [ 14.650244] ================================================================== [ 14.650759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.651075] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.651473] [ 14.651585] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.651629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.651642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.651665] Call Trace: [ 14.651682] <TASK> [ 14.651698] dump_stack_lvl+0x73/0xb0 [ 14.651724] print_report+0xd1/0x650 [ 14.651747] ? __virt_addr_valid+0x1db/0x2d0 [ 14.651769] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.651792] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.651816] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.651839] kasan_report+0x141/0x180 [ 14.651863] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.651891] __asan_report_load4_noabort+0x18/0x20 [ 14.651913] kasan_atomics_helper+0x49ce/0x5450 [ 14.651938] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.651962] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.651986] ? kasan_atomics+0x152/0x310 [ 14.652010] kasan_atomics+0x1dc/0x310 [ 14.652031] ? __pfx_kasan_atomics+0x10/0x10 [ 14.652053] ? __pfx_read_tsc+0x10/0x10 [ 14.652073] ? ktime_get_ts64+0x86/0x230 [ 14.652100] kunit_try_run_case+0x1a5/0x480 [ 14.652125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.652147] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.652172] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.652196] ? __kthread_parkme+0x82/0x180 [ 14.652219] ? preempt_count_sub+0x50/0x80 [ 14.652246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.652270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.652295] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.652320] kthread+0x337/0x6f0 [ 14.652353] ? trace_preempt_on+0x20/0xc0 [ 14.652377] ? __pfx_kthread+0x10/0x10 [ 14.652399] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.652422] ? calculate_sigpending+0x7b/0xa0 [ 14.652445] ? __pfx_kthread+0x10/0x10 [ 14.652468] ret_from_fork+0x41/0x80 [ 14.652489] ? __pfx_kthread+0x10/0x10 [ 14.652512] ret_from_fork_asm+0x1a/0x30 [ 14.652544] </TASK> [ 14.652556] [ 14.659744] Allocated by task 285: [ 14.659897] kasan_save_stack+0x45/0x70 [ 14.660083] kasan_save_track+0x18/0x40 [ 14.660253] kasan_save_alloc_info+0x3b/0x50 [ 14.660410] __kasan_kmalloc+0xb7/0xc0 [ 14.660544] __kmalloc_cache_noprof+0x189/0x420 [ 14.660696] kasan_atomics+0x95/0x310 [ 14.660824] kunit_try_run_case+0x1a5/0x480 [ 14.660969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.661219] kthread+0x337/0x6f0 [ 14.661396] ret_from_fork+0x41/0x80 [ 14.661576] ret_from_fork_asm+0x1a/0x30 [ 14.661774] [ 14.661867] The buggy address belongs to the object at ffff888102b4cd00 [ 14.661867] which belongs to the cache kmalloc-64 of size 64 [ 14.662387] The buggy address is located 0 bytes to the right of [ 14.662387] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.662788] [ 14.662858] The buggy address belongs to the physical page: [ 14.663029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.663480] flags: 0x200000000000000(node=0|zone=2) [ 14.663714] page_type: f5(slab) [ 14.663885] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.664358] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.664675] page dumped because: kasan: bad access detected [ 14.664848] [ 14.664916] Memory state around the buggy address: [ 14.665084] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.665766] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.666084] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.666489] ^ [ 14.666644] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.666858] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.667131] ================================================================== [ 14.495318] ================================================================== [ 14.495959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.496489] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.497010] [ 14.497126] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.497172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.497187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.497209] Call Trace: [ 14.497226] <TASK> [ 14.497243] dump_stack_lvl+0x73/0xb0 [ 14.497271] print_report+0xd1/0x650 [ 14.497296] ? __virt_addr_valid+0x1db/0x2d0 [ 14.497334] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.497357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.497380] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.497404] kasan_report+0x141/0x180 [ 14.497429] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.497457] __asan_report_load4_noabort+0x18/0x20 [ 14.497479] kasan_atomics_helper+0x4a36/0x5450 [ 14.497503] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.497526] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.497548] ? kasan_atomics+0x152/0x310 [ 14.497573] kasan_atomics+0x1dc/0x310 [ 14.497595] ? __pfx_kasan_atomics+0x10/0x10 [ 14.497617] ? __pfx_read_tsc+0x10/0x10 [ 14.497637] ? ktime_get_ts64+0x86/0x230 [ 14.497663] kunit_try_run_case+0x1a5/0x480 [ 14.497688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.497711] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.497735] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.497760] ? __kthread_parkme+0x82/0x180 [ 14.497786] ? preempt_count_sub+0x50/0x80 [ 14.497812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.497836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.497860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.497884] kthread+0x337/0x6f0 [ 14.497906] ? trace_preempt_on+0x20/0xc0 [ 14.497929] ? __pfx_kthread+0x10/0x10 [ 14.497952] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.497975] ? calculate_sigpending+0x7b/0xa0 [ 14.497999] ? __pfx_kthread+0x10/0x10 [ 14.498022] ret_from_fork+0x41/0x80 [ 14.498043] ? __pfx_kthread+0x10/0x10 [ 14.498066] ret_from_fork_asm+0x1a/0x30 [ 14.498099] </TASK> [ 14.498111] [ 14.505294] Allocated by task 285: [ 14.505481] kasan_save_stack+0x45/0x70 [ 14.505663] kasan_save_track+0x18/0x40 [ 14.505849] kasan_save_alloc_info+0x3b/0x50 [ 14.506050] __kasan_kmalloc+0xb7/0xc0 [ 14.506228] __kmalloc_cache_noprof+0x189/0x420 [ 14.506391] kasan_atomics+0x95/0x310 [ 14.506575] kunit_try_run_case+0x1a5/0x480 [ 14.506784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.507042] kthread+0x337/0x6f0 [ 14.507221] ret_from_fork+0x41/0x80 [ 14.507391] ret_from_fork_asm+0x1a/0x30 [ 14.507571] [ 14.507643] The buggy address belongs to the object at ffff888102b4cd00 [ 14.507643] which belongs to the cache kmalloc-64 of size 64 [ 14.508115] The buggy address is located 0 bytes to the right of [ 14.508115] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.508604] [ 14.508678] The buggy address belongs to the physical page: [ 14.508851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.509089] flags: 0x200000000000000(node=0|zone=2) [ 14.509284] page_type: f5(slab) [ 14.509459] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.509986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.510241] page dumped because: kasan: bad access detected [ 14.510419] [ 14.510488] Memory state around the buggy address: [ 14.510649] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.510862] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.511252] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.511583] ^ [ 14.511807] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.512127] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.512455] ================================================================== [ 14.789745] ================================================================== [ 14.790104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.790697] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.791029] [ 14.791117] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.791170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.791183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.791224] Call Trace: [ 14.791239] <TASK> [ 14.791255] dump_stack_lvl+0x73/0xb0 [ 14.791280] print_report+0xd1/0x650 [ 14.791304] ? __virt_addr_valid+0x1db/0x2d0 [ 14.791340] ? kasan_atomics_helper+0x164f/0x5450 [ 14.791363] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.791406] ? kasan_atomics_helper+0x164f/0x5450 [ 14.791429] kasan_report+0x141/0x180 [ 14.791453] ? kasan_atomics_helper+0x164f/0x5450 [ 14.791481] kasan_check_range+0x10c/0x1c0 [ 14.791507] __kasan_check_write+0x18/0x20 [ 14.791528] kasan_atomics_helper+0x164f/0x5450 [ 14.791553] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.791576] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.791615] ? kasan_atomics+0x152/0x310 [ 14.791652] kasan_atomics+0x1dc/0x310 [ 14.791686] ? __pfx_kasan_atomics+0x10/0x10 [ 14.791720] ? __pfx_read_tsc+0x10/0x10 [ 14.791740] ? ktime_get_ts64+0x86/0x230 [ 14.791767] kunit_try_run_case+0x1a5/0x480 [ 14.791790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.791812] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.791837] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.791861] ? __kthread_parkme+0x82/0x180 [ 14.791883] ? preempt_count_sub+0x50/0x80 [ 14.791908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.791932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.791955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.791980] kthread+0x337/0x6f0 [ 14.792001] ? trace_preempt_on+0x20/0xc0 [ 14.792024] ? __pfx_kthread+0x10/0x10 [ 14.792047] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.792070] ? calculate_sigpending+0x7b/0xa0 [ 14.792110] ? __pfx_kthread+0x10/0x10 [ 14.792143] ret_from_fork+0x41/0x80 [ 14.792165] ? __pfx_kthread+0x10/0x10 [ 14.792188] ret_from_fork_asm+0x1a/0x30 [ 14.792221] </TASK> [ 14.792231] [ 14.799996] Allocated by task 285: [ 14.800210] kasan_save_stack+0x45/0x70 [ 14.800406] kasan_save_track+0x18/0x40 [ 14.800555] kasan_save_alloc_info+0x3b/0x50 [ 14.800701] __kasan_kmalloc+0xb7/0xc0 [ 14.800863] __kmalloc_cache_noprof+0x189/0x420 [ 14.801107] kasan_atomics+0x95/0x310 [ 14.801307] kunit_try_run_case+0x1a5/0x480 [ 14.801543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.801800] kthread+0x337/0x6f0 [ 14.801970] ret_from_fork+0x41/0x80 [ 14.802154] ret_from_fork_asm+0x1a/0x30 [ 14.802337] [ 14.802449] The buggy address belongs to the object at ffff888102b4cd00 [ 14.802449] which belongs to the cache kmalloc-64 of size 64 [ 14.802893] The buggy address is located 0 bytes to the right of [ 14.802893] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.803698] [ 14.803811] The buggy address belongs to the physical page: [ 14.803997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.804394] flags: 0x200000000000000(node=0|zone=2) [ 14.804651] page_type: f5(slab) [ 14.804833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.805167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.805573] page dumped because: kasan: bad access detected [ 14.805859] [ 14.805944] Memory state around the buggy address: [ 14.806102] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.806451] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.806771] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.807096] ^ [ 14.807394] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.807609] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.807819] ================================================================== [ 14.884944] ================================================================== [ 14.885298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.885645] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.885954] [ 14.886131] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.886175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.886188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.886209] Call Trace: [ 14.886223] <TASK> [ 14.886236] dump_stack_lvl+0x73/0xb0 [ 14.886260] print_report+0xd1/0x650 [ 14.886284] ? __virt_addr_valid+0x1db/0x2d0 [ 14.886306] ? kasan_atomics_helper+0x194a/0x5450 [ 14.886339] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.886364] ? kasan_atomics_helper+0x194a/0x5450 [ 14.886387] kasan_report+0x141/0x180 [ 14.886411] ? kasan_atomics_helper+0x194a/0x5450 [ 14.886440] kasan_check_range+0x10c/0x1c0 [ 14.886465] __kasan_check_write+0x18/0x20 [ 14.886487] kasan_atomics_helper+0x194a/0x5450 [ 14.886511] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.886536] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.886560] ? kasan_atomics+0x152/0x310 [ 14.886585] kasan_atomics+0x1dc/0x310 [ 14.886605] ? __pfx_kasan_atomics+0x10/0x10 [ 14.886627] ? __pfx_read_tsc+0x10/0x10 [ 14.886648] ? ktime_get_ts64+0x86/0x230 [ 14.886673] kunit_try_run_case+0x1a5/0x480 [ 14.886697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.886720] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.886744] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.886770] ? __kthread_parkme+0x82/0x180 [ 14.886792] ? preempt_count_sub+0x50/0x80 [ 14.886819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.886842] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.886866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.886889] kthread+0x337/0x6f0 [ 14.886910] ? trace_preempt_on+0x20/0xc0 [ 14.886935] ? __pfx_kthread+0x10/0x10 [ 14.886958] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.886980] ? calculate_sigpending+0x7b/0xa0 [ 14.887002] ? __pfx_kthread+0x10/0x10 [ 14.887025] ret_from_fork+0x41/0x80 [ 14.887048] ? __pfx_kthread+0x10/0x10 [ 14.887070] ret_from_fork_asm+0x1a/0x30 [ 14.887102] </TASK> [ 14.887133] [ 14.894178] Allocated by task 285: [ 14.894370] kasan_save_stack+0x45/0x70 [ 14.894564] kasan_save_track+0x18/0x40 [ 14.894760] kasan_save_alloc_info+0x3b/0x50 [ 14.894972] __kasan_kmalloc+0xb7/0xc0 [ 14.895185] __kmalloc_cache_noprof+0x189/0x420 [ 14.895368] kasan_atomics+0x95/0x310 [ 14.895550] kunit_try_run_case+0x1a5/0x480 [ 14.895733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.895958] kthread+0x337/0x6f0 [ 14.896107] ret_from_fork+0x41/0x80 [ 14.896285] ret_from_fork_asm+0x1a/0x30 [ 14.896455] [ 14.896550] The buggy address belongs to the object at ffff888102b4cd00 [ 14.896550] which belongs to the cache kmalloc-64 of size 64 [ 14.896995] The buggy address is located 0 bytes to the right of [ 14.896995] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.897501] [ 14.897600] The buggy address belongs to the physical page: [ 14.897806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.898045] flags: 0x200000000000000(node=0|zone=2) [ 14.898232] page_type: f5(slab) [ 14.898362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.898671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.899007] page dumped because: kasan: bad access detected [ 14.899282] [ 14.899385] Memory state around the buggy address: [ 14.899584] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.899801] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.900015] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.900253] ^ [ 14.900491] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.900823] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.901167] ================================================================== [ 14.398392] ================================================================== [ 14.398953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.399526] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.399867] [ 14.399979] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.400023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.400036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.400056] Call Trace: [ 14.400073] <TASK> [ 14.400090] dump_stack_lvl+0x73/0xb0 [ 14.400115] print_report+0xd1/0x650 [ 14.400152] ? __virt_addr_valid+0x1db/0x2d0 [ 14.400175] ? kasan_atomics_helper+0xde0/0x5450 [ 14.400197] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.400221] ? kasan_atomics_helper+0xde0/0x5450 [ 14.400244] kasan_report+0x141/0x180 [ 14.400267] ? kasan_atomics_helper+0xde0/0x5450 [ 14.400296] kasan_check_range+0x10c/0x1c0 [ 14.400332] __kasan_check_write+0x18/0x20 [ 14.400353] kasan_atomics_helper+0xde0/0x5450 [ 14.400377] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.400401] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.400424] ? kasan_atomics+0x152/0x310 [ 14.400449] kasan_atomics+0x1dc/0x310 [ 14.400469] ? __pfx_kasan_atomics+0x10/0x10 [ 14.400491] ? __pfx_read_tsc+0x10/0x10 [ 14.400511] ? ktime_get_ts64+0x86/0x230 [ 14.400537] kunit_try_run_case+0x1a5/0x480 [ 14.400563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.400585] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.400609] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.400635] ? __kthread_parkme+0x82/0x180 [ 14.400659] ? preempt_count_sub+0x50/0x80 [ 14.400685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.400709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.400733] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.400757] kthread+0x337/0x6f0 [ 14.400779] ? trace_preempt_on+0x20/0xc0 [ 14.400804] ? __pfx_kthread+0x10/0x10 [ 14.400828] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.400851] ? calculate_sigpending+0x7b/0xa0 [ 14.400874] ? __pfx_kthread+0x10/0x10 [ 14.400898] ret_from_fork+0x41/0x80 [ 14.400919] ? __pfx_kthread+0x10/0x10 [ 14.400942] ret_from_fork_asm+0x1a/0x30 [ 14.400975] </TASK> [ 14.400986] [ 14.408329] Allocated by task 285: [ 14.408507] kasan_save_stack+0x45/0x70 [ 14.408709] kasan_save_track+0x18/0x40 [ 14.408898] kasan_save_alloc_info+0x3b/0x50 [ 14.409045] __kasan_kmalloc+0xb7/0xc0 [ 14.409204] __kmalloc_cache_noprof+0x189/0x420 [ 14.409380] kasan_atomics+0x95/0x310 [ 14.409566] kunit_try_run_case+0x1a5/0x480 [ 14.409782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.410061] kthread+0x337/0x6f0 [ 14.410288] ret_from_fork+0x41/0x80 [ 14.410438] ret_from_fork_asm+0x1a/0x30 [ 14.410578] [ 14.410648] The buggy address belongs to the object at ffff888102b4cd00 [ 14.410648] which belongs to the cache kmalloc-64 of size 64 [ 14.411031] The buggy address is located 0 bytes to the right of [ 14.411031] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.411599] [ 14.411693] The buggy address belongs to the physical page: [ 14.411942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.412314] flags: 0x200000000000000(node=0|zone=2) [ 14.412556] page_type: f5(slab) [ 14.412702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.412932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.413206] page dumped because: kasan: bad access detected [ 14.413467] [ 14.413565] Memory state around the buggy address: [ 14.413792] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.414159] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.414482] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.414766] ^ [ 14.414994] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.415236] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.415459] ================================================================== [ 14.472149] ================================================================== [ 14.472471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.472763] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.473078] [ 14.473160] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.473218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.473231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.473251] Call Trace: [ 14.473265] <TASK> [ 14.473281] dump_stack_lvl+0x73/0xb0 [ 14.473305] print_report+0xd1/0x650 [ 14.473339] ? __virt_addr_valid+0x1db/0x2d0 [ 14.473361] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.473383] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.473406] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.473429] kasan_report+0x141/0x180 [ 14.473452] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.473480] kasan_check_range+0x10c/0x1c0 [ 14.473506] __kasan_check_write+0x18/0x20 [ 14.473526] kasan_atomics_helper+0xfa9/0x5450 [ 14.473550] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.473573] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.473596] ? kasan_atomics+0x152/0x310 [ 14.473619] kasan_atomics+0x1dc/0x310 [ 14.473640] ? __pfx_kasan_atomics+0x10/0x10 [ 14.473661] ? __pfx_read_tsc+0x10/0x10 [ 14.473681] ? ktime_get_ts64+0x86/0x230 [ 14.473707] kunit_try_run_case+0x1a5/0x480 [ 14.473731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.473753] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.473781] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.473806] ? __kthread_parkme+0x82/0x180 [ 14.473828] ? preempt_count_sub+0x50/0x80 [ 14.473853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.473878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.473902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.473926] kthread+0x337/0x6f0 [ 14.473947] ? trace_preempt_on+0x20/0xc0 [ 14.473971] ? __pfx_kthread+0x10/0x10 [ 14.473993] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.474016] ? calculate_sigpending+0x7b/0xa0 [ 14.474038] ? __pfx_kthread+0x10/0x10 [ 14.474061] ret_from_fork+0x41/0x80 [ 14.474083] ? __pfx_kthread+0x10/0x10 [ 14.474106] ret_from_fork_asm+0x1a/0x30 [ 14.474148] </TASK> [ 14.474160] [ 14.482788] Allocated by task 285: [ 14.482971] kasan_save_stack+0x45/0x70 [ 14.483464] kasan_save_track+0x18/0x40 [ 14.483788] kasan_save_alloc_info+0x3b/0x50 [ 14.484215] __kasan_kmalloc+0xb7/0xc0 [ 14.484531] __kmalloc_cache_noprof+0x189/0x420 [ 14.484874] kasan_atomics+0x95/0x310 [ 14.485051] kunit_try_run_case+0x1a5/0x480 [ 14.485519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.485944] kthread+0x337/0x6f0 [ 14.486245] ret_from_fork+0x41/0x80 [ 14.486544] ret_from_fork_asm+0x1a/0x30 [ 14.486750] [ 14.486843] The buggy address belongs to the object at ffff888102b4cd00 [ 14.486843] which belongs to the cache kmalloc-64 of size 64 [ 14.487685] The buggy address is located 0 bytes to the right of [ 14.487685] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.488582] [ 14.488805] The buggy address belongs to the physical page: [ 14.489268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.489636] flags: 0x200000000000000(node=0|zone=2) [ 14.489860] page_type: f5(slab) [ 14.490017] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.490603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.491044] page dumped because: kasan: bad access detected [ 14.491511] [ 14.491603] Memory state around the buggy address: [ 14.491930] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.492535] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.492953] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.493410] ^ [ 14.493628] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.493923] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.494537] ================================================================== [ 15.028231] ================================================================== [ 15.028663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.029131] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.029652] [ 15.029766] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.029814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.029827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.029848] Call Trace: [ 15.029865] <TASK> [ 15.029881] dump_stack_lvl+0x73/0xb0 [ 15.029907] print_report+0xd1/0x650 [ 15.029931] ? __virt_addr_valid+0x1db/0x2d0 [ 15.029953] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.029976] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.030000] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.030063] kasan_report+0x141/0x180 [ 15.030115] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.030153] kasan_check_range+0x10c/0x1c0 [ 15.030207] __kasan_check_write+0x18/0x20 [ 15.030228] kasan_atomics_helper+0x1d7a/0x5450 [ 15.030252] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.030276] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.030337] ? kasan_atomics+0x152/0x310 [ 15.030363] kasan_atomics+0x1dc/0x310 [ 15.030384] ? __pfx_kasan_atomics+0x10/0x10 [ 15.030406] ? __pfx_read_tsc+0x10/0x10 [ 15.030427] ? ktime_get_ts64+0x86/0x230 [ 15.030454] kunit_try_run_case+0x1a5/0x480 [ 15.030478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.030501] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.030526] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.030552] ? __kthread_parkme+0x82/0x180 [ 15.030575] ? preempt_count_sub+0x50/0x80 [ 15.030600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.030658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.030683] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.030708] kthread+0x337/0x6f0 [ 15.030729] ? trace_preempt_on+0x20/0xc0 [ 15.030755] ? __pfx_kthread+0x10/0x10 [ 15.030805] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.030830] ? calculate_sigpending+0x7b/0xa0 [ 15.030853] ? __pfx_kthread+0x10/0x10 [ 15.030877] ret_from_fork+0x41/0x80 [ 15.030900] ? __pfx_kthread+0x10/0x10 [ 15.030922] ret_from_fork_asm+0x1a/0x30 [ 15.030982] </TASK> [ 15.030993] [ 15.039410] Allocated by task 285: [ 15.039593] kasan_save_stack+0x45/0x70 [ 15.039796] kasan_save_track+0x18/0x40 [ 15.039984] kasan_save_alloc_info+0x3b/0x50 [ 15.040154] __kasan_kmalloc+0xb7/0xc0 [ 15.040371] __kmalloc_cache_noprof+0x189/0x420 [ 15.040531] kasan_atomics+0x95/0x310 [ 15.040661] kunit_try_run_case+0x1a5/0x480 [ 15.040825] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.041075] kthread+0x337/0x6f0 [ 15.041372] ret_from_fork+0x41/0x80 [ 15.041578] ret_from_fork_asm+0x1a/0x30 [ 15.041774] [ 15.041846] The buggy address belongs to the object at ffff888102b4cd00 [ 15.041846] which belongs to the cache kmalloc-64 of size 64 [ 15.042196] The buggy address is located 0 bytes to the right of [ 15.042196] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.043014] [ 15.043128] The buggy address belongs to the physical page: [ 15.043341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.043580] flags: 0x200000000000000(node=0|zone=2) [ 15.044044] page_type: f5(slab) [ 15.044213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.044628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.044855] page dumped because: kasan: bad access detected [ 15.045069] [ 15.045195] Memory state around the buggy address: [ 15.045453] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.045750] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.046068] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.046289] ^ [ 15.046627] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.046960] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.047299] ================================================================== [ 14.531259] ================================================================== [ 14.531875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.532147] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.532471] [ 14.532558] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.532604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.532617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.532639] Call Trace: [ 14.532654] <TASK> [ 14.532669] dump_stack_lvl+0x73/0xb0 [ 14.532694] print_report+0xd1/0x650 [ 14.532718] ? __virt_addr_valid+0x1db/0x2d0 [ 14.532794] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.532818] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.532842] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.532866] kasan_report+0x141/0x180 [ 14.532890] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.532919] __asan_report_load4_noabort+0x18/0x20 [ 14.532940] kasan_atomics_helper+0x4a1c/0x5450 [ 14.532965] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.532989] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.533011] ? kasan_atomics+0x152/0x310 [ 14.533036] kasan_atomics+0x1dc/0x310 [ 14.533056] ? __pfx_kasan_atomics+0x10/0x10 [ 14.533078] ? __pfx_read_tsc+0x10/0x10 [ 14.533098] ? ktime_get_ts64+0x86/0x230 [ 14.533134] kunit_try_run_case+0x1a5/0x480 [ 14.533158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.533180] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.533205] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.533230] ? __kthread_parkme+0x82/0x180 [ 14.533253] ? preempt_count_sub+0x50/0x80 [ 14.533279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.533302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.533338] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.533363] kthread+0x337/0x6f0 [ 14.533384] ? trace_preempt_on+0x20/0xc0 [ 14.533408] ? __pfx_kthread+0x10/0x10 [ 14.533430] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.533453] ? calculate_sigpending+0x7b/0xa0 [ 14.533475] ? __pfx_kthread+0x10/0x10 [ 14.533499] ret_from_fork+0x41/0x80 [ 14.533521] ? __pfx_kthread+0x10/0x10 [ 14.533543] ret_from_fork_asm+0x1a/0x30 [ 14.533577] </TASK> [ 14.533588] [ 14.541045] Allocated by task 285: [ 14.541231] kasan_save_stack+0x45/0x70 [ 14.541409] kasan_save_track+0x18/0x40 [ 14.541580] kasan_save_alloc_info+0x3b/0x50 [ 14.541765] __kasan_kmalloc+0xb7/0xc0 [ 14.541957] __kmalloc_cache_noprof+0x189/0x420 [ 14.542168] kasan_atomics+0x95/0x310 [ 14.542311] kunit_try_run_case+0x1a5/0x480 [ 14.542465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.542674] kthread+0x337/0x6f0 [ 14.542842] ret_from_fork+0x41/0x80 [ 14.543025] ret_from_fork_asm+0x1a/0x30 [ 14.543219] [ 14.543392] The buggy address belongs to the object at ffff888102b4cd00 [ 14.543392] which belongs to the cache kmalloc-64 of size 64 [ 14.543815] The buggy address is located 0 bytes to the right of [ 14.543815] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.544372] [ 14.544454] The buggy address belongs to the physical page: [ 14.544665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.544951] flags: 0x200000000000000(node=0|zone=2) [ 14.545230] page_type: f5(slab) [ 14.545404] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.545701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.545999] page dumped because: kasan: bad access detected [ 14.546253] [ 14.546357] Memory state around the buggy address: [ 14.546515] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.546730] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.546943] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.547168] ^ [ 14.547567] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.547880] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.548132] ================================================================== [ 14.129220] ================================================================== [ 14.129776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.130125] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.130386] [ 14.130494] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.130538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.130551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.130595] Call Trace: [ 14.130609] <TASK> [ 14.130624] dump_stack_lvl+0x73/0xb0 [ 14.130648] print_report+0xd1/0x650 [ 14.130671] ? __virt_addr_valid+0x1db/0x2d0 [ 14.130693] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.130715] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.130739] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.130762] kasan_report+0x141/0x180 [ 14.130785] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.130814] kasan_check_range+0x10c/0x1c0 [ 14.130856] __kasan_check_write+0x18/0x20 [ 14.130877] kasan_atomics_helper+0x5fe/0x5450 [ 14.130901] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.130925] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.130949] ? kasan_atomics+0x152/0x310 [ 14.130973] kasan_atomics+0x1dc/0x310 [ 14.131011] ? __pfx_kasan_atomics+0x10/0x10 [ 14.131034] ? __pfx_read_tsc+0x10/0x10 [ 14.131055] ? ktime_get_ts64+0x86/0x230 [ 14.131081] kunit_try_run_case+0x1a5/0x480 [ 14.131105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.131138] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.131162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.131188] ? __kthread_parkme+0x82/0x180 [ 14.131210] ? preempt_count_sub+0x50/0x80 [ 14.131235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.131259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.131283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.131308] kthread+0x337/0x6f0 [ 14.131339] ? trace_preempt_on+0x20/0xc0 [ 14.131364] ? __pfx_kthread+0x10/0x10 [ 14.131387] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.131409] ? calculate_sigpending+0x7b/0xa0 [ 14.131430] ? __pfx_kthread+0x10/0x10 [ 14.131473] ret_from_fork+0x41/0x80 [ 14.131495] ? __pfx_kthread+0x10/0x10 [ 14.131518] ret_from_fork_asm+0x1a/0x30 [ 14.131550] </TASK> [ 14.131561] [ 14.141723] Allocated by task 285: [ 14.141915] kasan_save_stack+0x45/0x70 [ 14.142121] kasan_save_track+0x18/0x40 [ 14.142597] kasan_save_alloc_info+0x3b/0x50 [ 14.142867] __kasan_kmalloc+0xb7/0xc0 [ 14.143119] __kmalloc_cache_noprof+0x189/0x420 [ 14.143438] kasan_atomics+0x95/0x310 [ 14.143739] kunit_try_run_case+0x1a5/0x480 [ 14.144044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.144432] kthread+0x337/0x6f0 [ 14.144699] ret_from_fork+0x41/0x80 [ 14.144989] ret_from_fork_asm+0x1a/0x30 [ 14.145293] [ 14.145388] The buggy address belongs to the object at ffff888102b4cd00 [ 14.145388] which belongs to the cache kmalloc-64 of size 64 [ 14.146141] The buggy address is located 0 bytes to the right of [ 14.146141] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.146859] [ 14.147099] The buggy address belongs to the physical page: [ 14.147382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.147834] flags: 0x200000000000000(node=0|zone=2) [ 14.148182] page_type: f5(slab) [ 14.148371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.148695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.149026] page dumped because: kasan: bad access detected [ 14.149533] [ 14.149629] Memory state around the buggy address: [ 14.149995] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.150475] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.150907] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.151411] ^ [ 14.151724] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.152182] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.152600] ================================================================== [ 15.161292] ================================================================== [ 15.162060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.163090] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.163925] [ 15.164269] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.164320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.164447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.164471] Call Trace: [ 15.164489] <TASK> [ 15.164517] dump_stack_lvl+0x73/0xb0 [ 15.164547] print_report+0xd1/0x650 [ 15.164601] ? __virt_addr_valid+0x1db/0x2d0 [ 15.164626] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.164649] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.164673] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.164696] kasan_report+0x141/0x180 [ 15.164720] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.164748] kasan_check_range+0x10c/0x1c0 [ 15.164773] __kasan_check_write+0x18/0x20 [ 15.164794] kasan_atomics_helper+0x20c8/0x5450 [ 15.164819] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.164843] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.164866] ? kasan_atomics+0x152/0x310 [ 15.164890] kasan_atomics+0x1dc/0x310 [ 15.164910] ? __pfx_kasan_atomics+0x10/0x10 [ 15.164932] ? __pfx_read_tsc+0x10/0x10 [ 15.164954] ? ktime_get_ts64+0x86/0x230 [ 15.164980] kunit_try_run_case+0x1a5/0x480 [ 15.165006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.165029] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.165054] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.165080] ? __kthread_parkme+0x82/0x180 [ 15.165103] ? preempt_count_sub+0x50/0x80 [ 15.165152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.165176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.165200] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.165225] kthread+0x337/0x6f0 [ 15.165246] ? trace_preempt_on+0x20/0xc0 [ 15.165270] ? __pfx_kthread+0x10/0x10 [ 15.165293] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.165315] ? calculate_sigpending+0x7b/0xa0 [ 15.165346] ? __pfx_kthread+0x10/0x10 [ 15.165370] ret_from_fork+0x41/0x80 [ 15.165392] ? __pfx_kthread+0x10/0x10 [ 15.165414] ret_from_fork_asm+0x1a/0x30 [ 15.165447] </TASK> [ 15.165458] [ 15.181967] Allocated by task 285: [ 15.182525] kasan_save_stack+0x45/0x70 [ 15.182911] kasan_save_track+0x18/0x40 [ 15.183480] kasan_save_alloc_info+0x3b/0x50 [ 15.184011] __kasan_kmalloc+0xb7/0xc0 [ 15.184531] __kmalloc_cache_noprof+0x189/0x420 [ 15.185136] kasan_atomics+0x95/0x310 [ 15.185645] kunit_try_run_case+0x1a5/0x480 [ 15.186040] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.186762] kthread+0x337/0x6f0 [ 15.187193] ret_from_fork+0x41/0x80 [ 15.187345] ret_from_fork_asm+0x1a/0x30 [ 15.187488] [ 15.187561] The buggy address belongs to the object at ffff888102b4cd00 [ 15.187561] which belongs to the cache kmalloc-64 of size 64 [ 15.187916] The buggy address is located 0 bytes to the right of [ 15.187916] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.189175] [ 15.189559] The buggy address belongs to the physical page: [ 15.190262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.191208] flags: 0x200000000000000(node=0|zone=2) [ 15.191846] page_type: f5(slab) [ 15.192267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.193196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.193454] page dumped because: kasan: bad access detected [ 15.193626] [ 15.193697] Memory state around the buggy address: [ 15.193861] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.194079] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.195827] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.196698] ^ [ 15.198018] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.198705] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.199034] ================================================================== [ 14.918491] ================================================================== [ 14.918783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.919045] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.919431] [ 14.919539] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.919582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.919594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.919615] Call Trace: [ 14.919630] <TASK> [ 14.919645] dump_stack_lvl+0x73/0xb0 [ 14.919669] print_report+0xd1/0x650 [ 14.919693] ? __virt_addr_valid+0x1db/0x2d0 [ 14.919715] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.919737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.919761] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.919784] kasan_report+0x141/0x180 [ 14.919808] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.919837] kasan_check_range+0x10c/0x1c0 [ 14.919862] __kasan_check_write+0x18/0x20 [ 14.919883] kasan_atomics_helper+0x1a7f/0x5450 [ 14.919908] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.919931] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.919955] ? kasan_atomics+0x152/0x310 [ 14.919980] kasan_atomics+0x1dc/0x310 [ 14.920001] ? __pfx_kasan_atomics+0x10/0x10 [ 14.920024] ? __pfx_read_tsc+0x10/0x10 [ 14.920044] ? ktime_get_ts64+0x86/0x230 [ 14.920071] kunit_try_run_case+0x1a5/0x480 [ 14.920095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.920138] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.920163] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.920189] ? __kthread_parkme+0x82/0x180 [ 14.920211] ? preempt_count_sub+0x50/0x80 [ 14.920237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.920261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.920285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.920308] kthread+0x337/0x6f0 [ 14.920339] ? trace_preempt_on+0x20/0xc0 [ 14.920362] ? __pfx_kthread+0x10/0x10 [ 14.920384] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.920408] ? calculate_sigpending+0x7b/0xa0 [ 14.920430] ? __pfx_kthread+0x10/0x10 [ 14.920453] ret_from_fork+0x41/0x80 [ 14.920475] ? __pfx_kthread+0x10/0x10 [ 14.920498] ret_from_fork_asm+0x1a/0x30 [ 14.920531] </TASK> [ 14.920542] [ 14.927675] Allocated by task 285: [ 14.927804] kasan_save_stack+0x45/0x70 [ 14.927948] kasan_save_track+0x18/0x40 [ 14.928082] kasan_save_alloc_info+0x3b/0x50 [ 14.928250] __kasan_kmalloc+0xb7/0xc0 [ 14.928393] __kmalloc_cache_noprof+0x189/0x420 [ 14.928570] kasan_atomics+0x95/0x310 [ 14.928753] kunit_try_run_case+0x1a5/0x480 [ 14.928959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.929227] kthread+0x337/0x6f0 [ 14.929405] ret_from_fork+0x41/0x80 [ 14.929591] ret_from_fork_asm+0x1a/0x30 [ 14.929787] [ 14.929880] The buggy address belongs to the object at ffff888102b4cd00 [ 14.929880] which belongs to the cache kmalloc-64 of size 64 [ 14.930433] The buggy address is located 0 bytes to the right of [ 14.930433] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.930971] [ 14.931064] The buggy address belongs to the physical page: [ 14.931308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.931556] flags: 0x200000000000000(node=0|zone=2) [ 14.931715] page_type: f5(slab) [ 14.931874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.932242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.932589] page dumped because: kasan: bad access detected [ 14.932812] [ 14.932895] Memory state around the buggy address: [ 14.933092] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.933385] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.933687] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.933985] ^ [ 14.934216] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.934500] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.934792] ================================================================== [ 14.935677] ================================================================== [ 14.937455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 14.937781] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.938007] [ 14.939360] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.939419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.939434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.939456] Call Trace: [ 14.939474] <TASK> [ 14.939492] dump_stack_lvl+0x73/0xb0 [ 14.939520] print_report+0xd1/0x650 [ 14.939546] ? __virt_addr_valid+0x1db/0x2d0 [ 14.939569] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.939592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.939616] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.939640] kasan_report+0x141/0x180 [ 14.939663] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.939692] kasan_check_range+0x10c/0x1c0 [ 14.939717] __kasan_check_write+0x18/0x20 [ 14.939738] kasan_atomics_helper+0x1b22/0x5450 [ 14.939763] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.939787] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.939810] ? kasan_atomics+0x152/0x310 [ 14.939835] kasan_atomics+0x1dc/0x310 [ 14.939856] ? __pfx_kasan_atomics+0x10/0x10 [ 14.939879] ? __pfx_read_tsc+0x10/0x10 [ 14.939899] ? ktime_get_ts64+0x86/0x230 [ 14.939926] kunit_try_run_case+0x1a5/0x480 [ 14.939951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.939973] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.939998] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.940023] ? __kthread_parkme+0x82/0x180 [ 14.940045] ? preempt_count_sub+0x50/0x80 [ 14.940070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.940095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.940118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.940144] kthread+0x337/0x6f0 [ 14.940165] ? trace_preempt_on+0x20/0xc0 [ 14.940190] ? __pfx_kthread+0x10/0x10 [ 14.940213] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.940235] ? calculate_sigpending+0x7b/0xa0 [ 14.940258] ? __pfx_kthread+0x10/0x10 [ 14.940282] ret_from_fork+0x41/0x80 [ 14.940303] ? __pfx_kthread+0x10/0x10 [ 14.940335] ret_from_fork_asm+0x1a/0x30 [ 14.940369] </TASK> [ 14.940380] [ 14.955095] Allocated by task 285: [ 14.955410] kasan_save_stack+0x45/0x70 [ 14.955615] kasan_save_track+0x18/0x40 [ 14.955860] kasan_save_alloc_info+0x3b/0x50 [ 14.956061] __kasan_kmalloc+0xb7/0xc0 [ 14.956197] __kmalloc_cache_noprof+0x189/0x420 [ 14.956361] kasan_atomics+0x95/0x310 [ 14.956495] kunit_try_run_case+0x1a5/0x480 [ 14.956907] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.957416] kthread+0x337/0x6f0 [ 14.957644] ret_from_fork+0x41/0x80 [ 14.957827] ret_from_fork_asm+0x1a/0x30 [ 14.958078] [ 14.958317] The buggy address belongs to the object at ffff888102b4cd00 [ 14.958317] which belongs to the cache kmalloc-64 of size 64 [ 14.958787] The buggy address is located 0 bytes to the right of [ 14.958787] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.959485] [ 14.959808] The buggy address belongs to the physical page: [ 14.960528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.960847] flags: 0x200000000000000(node=0|zone=2) [ 14.961199] page_type: f5(slab) [ 14.961341] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.961574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.961808] page dumped because: kasan: bad access detected [ 14.961979] [ 14.962050] Memory state around the buggy address: [ 14.962223] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.962705] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.963344] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.963690] ^ [ 14.963924] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.964479] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.964865] ================================================================== [ 13.952813] ================================================================== [ 13.953204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.953479] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 13.954236] [ 13.954524] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.954572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.954596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.954616] Call Trace: [ 13.954627] <TASK> [ 13.954644] dump_stack_lvl+0x73/0xb0 [ 13.954668] print_report+0xd1/0x650 [ 13.954732] ? __virt_addr_valid+0x1db/0x2d0 [ 13.954753] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.954775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.954819] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.954842] kasan_report+0x141/0x180 [ 13.954864] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.954902] __asan_report_store4_noabort+0x1b/0x30 [ 13.954924] kasan_atomics_helper+0x4ba2/0x5450 [ 13.954946] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.954969] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.954991] ? kasan_atomics+0x152/0x310 [ 13.955013] kasan_atomics+0x1dc/0x310 [ 13.955032] ? __pfx_kasan_atomics+0x10/0x10 [ 13.955053] ? __pfx_read_tsc+0x10/0x10 [ 13.955072] ? ktime_get_ts64+0x86/0x230 [ 13.955097] kunit_try_run_case+0x1a5/0x480 [ 13.955120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.955150] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.955175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.955198] ? __kthread_parkme+0x82/0x180 [ 13.955219] ? preempt_count_sub+0x50/0x80 [ 13.955244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.955266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.955289] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.955312] kthread+0x337/0x6f0 [ 13.955342] ? trace_preempt_on+0x20/0xc0 [ 13.955366] ? __pfx_kthread+0x10/0x10 [ 13.955387] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.955408] ? calculate_sigpending+0x7b/0xa0 [ 13.955430] ? __pfx_kthread+0x10/0x10 [ 13.955452] ret_from_fork+0x41/0x80 [ 13.955473] ? __pfx_kthread+0x10/0x10 [ 13.955494] ret_from_fork_asm+0x1a/0x30 [ 13.955526] </TASK> [ 13.955537] [ 13.964499] Allocated by task 285: [ 13.964861] kasan_save_stack+0x45/0x70 [ 13.965234] kasan_save_track+0x18/0x40 [ 13.965562] kasan_save_alloc_info+0x3b/0x50 [ 13.965899] __kasan_kmalloc+0xb7/0xc0 [ 13.966234] __kmalloc_cache_noprof+0x189/0x420 [ 13.966574] kasan_atomics+0x95/0x310 [ 13.966869] kunit_try_run_case+0x1a5/0x480 [ 13.967074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.967543] kthread+0x337/0x6f0 [ 13.967845] ret_from_fork+0x41/0x80 [ 13.968157] ret_from_fork_asm+0x1a/0x30 [ 13.968496] [ 13.968723] The buggy address belongs to the object at ffff888102b4cd00 [ 13.968723] which belongs to the cache kmalloc-64 of size 64 [ 13.969486] The buggy address is located 0 bytes to the right of [ 13.969486] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 13.970311] [ 13.970438] The buggy address belongs to the physical page: [ 13.970795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 13.971303] flags: 0x200000000000000(node=0|zone=2) [ 13.971695] page_type: f5(slab) [ 13.971843] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.972415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.972885] page dumped because: kasan: bad access detected [ 13.973304] [ 13.973534] Memory state around the buggy address: [ 13.973734] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.974022] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.974581] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.975020] ^ [ 13.975415] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.975823] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.976280] ================================================================== [ 15.047921] ================================================================== [ 15.048271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.048633] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.048910] [ 15.048992] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.049034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.049047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.049068] Call Trace: [ 15.049082] <TASK> [ 15.049095] dump_stack_lvl+0x73/0xb0 [ 15.049119] print_report+0xd1/0x650 [ 15.049177] ? __virt_addr_valid+0x1db/0x2d0 [ 15.049200] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.049223] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.049247] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.049271] kasan_report+0x141/0x180 [ 15.049294] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.049334] kasan_check_range+0x10c/0x1c0 [ 15.049360] __kasan_check_write+0x18/0x20 [ 15.049381] kasan_atomics_helper+0x1e12/0x5450 [ 15.049406] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.049430] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.049453] ? kasan_atomics+0x152/0x310 [ 15.049477] kasan_atomics+0x1dc/0x310 [ 15.049498] ? __pfx_kasan_atomics+0x10/0x10 [ 15.049519] ? __pfx_read_tsc+0x10/0x10 [ 15.049540] ? ktime_get_ts64+0x86/0x230 [ 15.049566] kunit_try_run_case+0x1a5/0x480 [ 15.049590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.049613] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.049637] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.049662] ? __kthread_parkme+0x82/0x180 [ 15.049684] ? preempt_count_sub+0x50/0x80 [ 15.049710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.049736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.049759] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.049788] kthread+0x337/0x6f0 [ 15.049810] ? trace_preempt_on+0x20/0xc0 [ 15.049833] ? __pfx_kthread+0x10/0x10 [ 15.049856] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.049895] ? calculate_sigpending+0x7b/0xa0 [ 15.049918] ? __pfx_kthread+0x10/0x10 [ 15.049941] ret_from_fork+0x41/0x80 [ 15.049963] ? __pfx_kthread+0x10/0x10 [ 15.049986] ret_from_fork_asm+0x1a/0x30 [ 15.050019] </TASK> [ 15.050030] [ 15.057557] Allocated by task 285: [ 15.057849] kasan_save_stack+0x45/0x70 [ 15.058055] kasan_save_track+0x18/0x40 [ 15.058268] kasan_save_alloc_info+0x3b/0x50 [ 15.058547] __kasan_kmalloc+0xb7/0xc0 [ 15.058705] __kmalloc_cache_noprof+0x189/0x420 [ 15.058925] kasan_atomics+0x95/0x310 [ 15.059108] kunit_try_run_case+0x1a5/0x480 [ 15.059339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.059583] kthread+0x337/0x6f0 [ 15.059739] ret_from_fork+0x41/0x80 [ 15.059912] ret_from_fork_asm+0x1a/0x30 [ 15.060051] [ 15.060122] The buggy address belongs to the object at ffff888102b4cd00 [ 15.060122] which belongs to the cache kmalloc-64 of size 64 [ 15.060686] The buggy address is located 0 bytes to the right of [ 15.060686] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.061406] [ 15.061479] The buggy address belongs to the physical page: [ 15.061645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.062109] flags: 0x200000000000000(node=0|zone=2) [ 15.062365] page_type: f5(slab) [ 15.062532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.062886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.063224] page dumped because: kasan: bad access detected [ 15.063898] [ 15.064064] Memory state around the buggy address: [ 15.064634] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.064851] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.065060] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.065627] ^ [ 15.066057] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.066690] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.067341] ================================================================== [ 15.106305] ================================================================== [ 15.106690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.107172] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.107507] [ 15.107591] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.107633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.107645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.107666] Call Trace: [ 15.107681] <TASK> [ 15.107696] dump_stack_lvl+0x73/0xb0 [ 15.107719] print_report+0xd1/0x650 [ 15.107742] ? __virt_addr_valid+0x1db/0x2d0 [ 15.107764] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.107786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.107809] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.107832] kasan_report+0x141/0x180 [ 15.107854] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.107880] __asan_report_load8_noabort+0x18/0x20 [ 15.107903] kasan_atomics_helper+0x4f71/0x5450 [ 15.107927] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.107951] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.107973] ? kasan_atomics+0x152/0x310 [ 15.107996] kasan_atomics+0x1dc/0x310 [ 15.108015] ? __pfx_kasan_atomics+0x10/0x10 [ 15.108036] ? __pfx_read_tsc+0x10/0x10 [ 15.108056] ? ktime_get_ts64+0x86/0x230 [ 15.108082] kunit_try_run_case+0x1a5/0x480 [ 15.108107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.108140] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.108166] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.108191] ? __kthread_parkme+0x82/0x180 [ 15.108238] ? preempt_count_sub+0x50/0x80 [ 15.108264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.108289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.108313] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.108348] kthread+0x337/0x6f0 [ 15.108370] ? trace_preempt_on+0x20/0xc0 [ 15.108395] ? __pfx_kthread+0x10/0x10 [ 15.108418] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.108441] ? calculate_sigpending+0x7b/0xa0 [ 15.108467] ? __pfx_kthread+0x10/0x10 [ 15.108492] ret_from_fork+0x41/0x80 [ 15.108514] ? __pfx_kthread+0x10/0x10 [ 15.108556] ret_from_fork_asm+0x1a/0x30 [ 15.108589] </TASK> [ 15.108601] [ 15.115817] Allocated by task 285: [ 15.116000] kasan_save_stack+0x45/0x70 [ 15.116203] kasan_save_track+0x18/0x40 [ 15.116374] kasan_save_alloc_info+0x3b/0x50 [ 15.116524] __kasan_kmalloc+0xb7/0xc0 [ 15.116741] __kmalloc_cache_noprof+0x189/0x420 [ 15.116965] kasan_atomics+0x95/0x310 [ 15.117147] kunit_try_run_case+0x1a5/0x480 [ 15.117309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.117499] kthread+0x337/0x6f0 [ 15.117671] ret_from_fork+0x41/0x80 [ 15.117882] ret_from_fork_asm+0x1a/0x30 [ 15.118117] [ 15.118217] The buggy address belongs to the object at ffff888102b4cd00 [ 15.118217] which belongs to the cache kmalloc-64 of size 64 [ 15.118610] The buggy address is located 0 bytes to the right of [ 15.118610] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.119036] [ 15.119129] The buggy address belongs to the physical page: [ 15.119390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.119914] flags: 0x200000000000000(node=0|zone=2) [ 15.120185] page_type: f5(slab) [ 15.120305] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.120542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.120935] page dumped because: kasan: bad access detected [ 15.121247] [ 15.121371] Memory state around the buggy address: [ 15.121603] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.121934] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.122198] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.122486] ^ [ 15.122708] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.122977] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.123317] ================================================================== [ 14.053734] ================================================================== [ 14.054087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.054810] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.055035] [ 14.055193] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.055239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.055252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.055273] Call Trace: [ 14.055287] <TASK> [ 14.055302] dump_stack_lvl+0x73/0xb0 [ 14.055340] print_report+0xd1/0x650 [ 14.055363] ? __virt_addr_valid+0x1db/0x2d0 [ 14.055385] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.055407] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.055431] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.055454] kasan_report+0x141/0x180 [ 14.055477] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.055527] __asan_report_load4_noabort+0x18/0x20 [ 14.055549] kasan_atomics_helper+0x4b54/0x5450 [ 14.055573] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.055596] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.055619] ? kasan_atomics+0x152/0x310 [ 14.055643] kasan_atomics+0x1dc/0x310 [ 14.055664] ? __pfx_kasan_atomics+0x10/0x10 [ 14.055704] ? __pfx_read_tsc+0x10/0x10 [ 14.055724] ? ktime_get_ts64+0x86/0x230 [ 14.055750] kunit_try_run_case+0x1a5/0x480 [ 14.055774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.055796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.055820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.055864] ? __kthread_parkme+0x82/0x180 [ 14.055886] ? preempt_count_sub+0x50/0x80 [ 14.055911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.055935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.055958] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.055982] kthread+0x337/0x6f0 [ 14.056003] ? trace_preempt_on+0x20/0xc0 [ 14.056028] ? __pfx_kthread+0x10/0x10 [ 14.056050] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.056073] ? calculate_sigpending+0x7b/0xa0 [ 14.056095] ? __pfx_kthread+0x10/0x10 [ 14.056119] ret_from_fork+0x41/0x80 [ 14.056141] ? __pfx_kthread+0x10/0x10 [ 14.056173] ret_from_fork_asm+0x1a/0x30 [ 14.056225] </TASK> [ 14.056237] [ 14.063720] Allocated by task 285: [ 14.063862] kasan_save_stack+0x45/0x70 [ 14.064073] kasan_save_track+0x18/0x40 [ 14.064434] kasan_save_alloc_info+0x3b/0x50 [ 14.064636] __kasan_kmalloc+0xb7/0xc0 [ 14.064785] __kmalloc_cache_noprof+0x189/0x420 [ 14.065022] kasan_atomics+0x95/0x310 [ 14.065252] kunit_try_run_case+0x1a5/0x480 [ 14.065444] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.065683] kthread+0x337/0x6f0 [ 14.065863] ret_from_fork+0x41/0x80 [ 14.066005] ret_from_fork_asm+0x1a/0x30 [ 14.066145] [ 14.066242] The buggy address belongs to the object at ffff888102b4cd00 [ 14.066242] which belongs to the cache kmalloc-64 of size 64 [ 14.066789] The buggy address is located 0 bytes to the right of [ 14.066789] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.067231] [ 14.067348] The buggy address belongs to the physical page: [ 14.067600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.067950] flags: 0x200000000000000(node=0|zone=2) [ 14.068190] page_type: f5(slab) [ 14.068332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.068645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.068943] page dumped because: kasan: bad access detected [ 14.069185] [ 14.069259] Memory state around the buggy address: [ 14.069425] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.069692] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.070008] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.070467] ^ [ 14.070625] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.070841] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.071103] ================================================================== [ 14.260982] ================================================================== [ 14.261313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.261685] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.261951] [ 14.262061] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.262104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.262116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.262487] Call Trace: [ 14.262512] <TASK> [ 14.262529] dump_stack_lvl+0x73/0xb0 [ 14.262557] print_report+0xd1/0x650 [ 14.262581] ? __virt_addr_valid+0x1db/0x2d0 [ 14.262605] ? kasan_atomics_helper+0x992/0x5450 [ 14.262628] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.262655] ? kasan_atomics_helper+0x992/0x5450 [ 14.262679] kasan_report+0x141/0x180 [ 14.262704] ? kasan_atomics_helper+0x992/0x5450 [ 14.262733] kasan_check_range+0x10c/0x1c0 [ 14.262758] __kasan_check_write+0x18/0x20 [ 14.262779] kasan_atomics_helper+0x992/0x5450 [ 14.262804] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.262827] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.262851] ? kasan_atomics+0x152/0x310 [ 14.262876] kasan_atomics+0x1dc/0x310 [ 14.262895] ? __pfx_kasan_atomics+0x10/0x10 [ 14.262917] ? __pfx_read_tsc+0x10/0x10 [ 14.262938] ? ktime_get_ts64+0x86/0x230 [ 14.262965] kunit_try_run_case+0x1a5/0x480 [ 14.262990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.263013] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.263041] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.263069] ? __kthread_parkme+0x82/0x180 [ 14.263091] ? preempt_count_sub+0x50/0x80 [ 14.263116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.263153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.263177] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.263201] kthread+0x337/0x6f0 [ 14.263222] ? trace_preempt_on+0x20/0xc0 [ 14.263248] ? __pfx_kthread+0x10/0x10 [ 14.263270] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.263293] ? calculate_sigpending+0x7b/0xa0 [ 14.263315] ? __pfx_kthread+0x10/0x10 [ 14.263351] ret_from_fork+0x41/0x80 [ 14.263373] ? __pfx_kthread+0x10/0x10 [ 14.263396] ret_from_fork_asm+0x1a/0x30 [ 14.263429] </TASK> [ 14.263441] [ 14.273092] Allocated by task 285: [ 14.273687] kasan_save_stack+0x45/0x70 [ 14.273994] kasan_save_track+0x18/0x40 [ 14.274220] kasan_save_alloc_info+0x3b/0x50 [ 14.274514] __kasan_kmalloc+0xb7/0xc0 [ 14.274834] __kmalloc_cache_noprof+0x189/0x420 [ 14.275056] kasan_atomics+0x95/0x310 [ 14.275362] kunit_try_run_case+0x1a5/0x480 [ 14.275711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.275977] kthread+0x337/0x6f0 [ 14.276266] ret_from_fork+0x41/0x80 [ 14.276480] ret_from_fork_asm+0x1a/0x30 [ 14.276800] [ 14.276901] The buggy address belongs to the object at ffff888102b4cd00 [ 14.276901] which belongs to the cache kmalloc-64 of size 64 [ 14.277644] The buggy address is located 0 bytes to the right of [ 14.277644] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.278148] [ 14.278404] The buggy address belongs to the physical page: [ 14.278701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.279089] flags: 0x200000000000000(node=0|zone=2) [ 14.279335] page_type: f5(slab) [ 14.279625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.280018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.280557] page dumped because: kasan: bad access detected [ 14.280874] [ 14.280972] Memory state around the buggy address: [ 14.281349] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.281691] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.281966] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.282476] ^ [ 14.282826] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.283125] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.283598] ================================================================== [ 14.179935] ================================================================== [ 14.180334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.180677] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.180975] [ 14.181061] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.181106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.181502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.181527] Call Trace: [ 14.181541] <TASK> [ 14.181556] dump_stack_lvl+0x73/0xb0 [ 14.181584] print_report+0xd1/0x650 [ 14.181608] ? __virt_addr_valid+0x1db/0x2d0 [ 14.181631] ? kasan_atomics_helper+0x72f/0x5450 [ 14.181653] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.181677] ? kasan_atomics_helper+0x72f/0x5450 [ 14.181700] kasan_report+0x141/0x180 [ 14.181723] ? kasan_atomics_helper+0x72f/0x5450 [ 14.181752] kasan_check_range+0x10c/0x1c0 [ 14.181781] __kasan_check_write+0x18/0x20 [ 14.181803] kasan_atomics_helper+0x72f/0x5450 [ 14.181827] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.181851] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.181875] ? kasan_atomics+0x152/0x310 [ 14.181900] kasan_atomics+0x1dc/0x310 [ 14.181920] ? __pfx_kasan_atomics+0x10/0x10 [ 14.181942] ? __pfx_read_tsc+0x10/0x10 [ 14.181963] ? ktime_get_ts64+0x86/0x230 [ 14.181990] kunit_try_run_case+0x1a5/0x480 [ 14.182015] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.182038] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.182062] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.182087] ? __kthread_parkme+0x82/0x180 [ 14.182131] ? preempt_count_sub+0x50/0x80 [ 14.182158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.182182] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.182207] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.182230] kthread+0x337/0x6f0 [ 14.182252] ? trace_preempt_on+0x20/0xc0 [ 14.182277] ? __pfx_kthread+0x10/0x10 [ 14.182299] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.182331] ? calculate_sigpending+0x7b/0xa0 [ 14.182353] ? __pfx_kthread+0x10/0x10 [ 14.182376] ret_from_fork+0x41/0x80 [ 14.182398] ? __pfx_kthread+0x10/0x10 [ 14.182421] ret_from_fork_asm+0x1a/0x30 [ 14.182454] </TASK> [ 14.182465] [ 14.189663] Allocated by task 285: [ 14.189851] kasan_save_stack+0x45/0x70 [ 14.190052] kasan_save_track+0x18/0x40 [ 14.190270] kasan_save_alloc_info+0x3b/0x50 [ 14.190485] __kasan_kmalloc+0xb7/0xc0 [ 14.190670] __kmalloc_cache_noprof+0x189/0x420 [ 14.190870] kasan_atomics+0x95/0x310 [ 14.191031] kunit_try_run_case+0x1a5/0x480 [ 14.191203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.191390] kthread+0x337/0x6f0 [ 14.191555] ret_from_fork+0x41/0x80 [ 14.191737] ret_from_fork_asm+0x1a/0x30 [ 14.191931] [ 14.192027] The buggy address belongs to the object at ffff888102b4cd00 [ 14.192027] which belongs to the cache kmalloc-64 of size 64 [ 14.192543] The buggy address is located 0 bytes to the right of [ 14.192543] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.192921] [ 14.192993] The buggy address belongs to the physical page: [ 14.193213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.193577] flags: 0x200000000000000(node=0|zone=2) [ 14.193818] page_type: f5(slab) [ 14.193984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.194372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.194703] page dumped because: kasan: bad access detected [ 14.194912] [ 14.194982] Memory state around the buggy address: [ 14.195190] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.195517] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.195814] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.196050] ^ [ 14.196304] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.196597] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.196876] ================================================================== [ 15.234644] ================================================================== [ 15.234986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.235826] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.236646] [ 15.236933] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.236984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.236998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.237020] Call Trace: [ 15.237037] <TASK> [ 15.237055] dump_stack_lvl+0x73/0xb0 [ 15.237082] print_report+0xd1/0x650 [ 15.237105] ? __virt_addr_valid+0x1db/0x2d0 [ 15.237140] ? kasan_atomics_helper+0x218a/0x5450 [ 15.237162] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.237185] ? kasan_atomics_helper+0x218a/0x5450 [ 15.237241] kasan_report+0x141/0x180 [ 15.237264] ? kasan_atomics_helper+0x218a/0x5450 [ 15.237390] kasan_check_range+0x10c/0x1c0 [ 15.237423] __kasan_check_write+0x18/0x20 [ 15.237444] kasan_atomics_helper+0x218a/0x5450 [ 15.237469] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.237493] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.237517] ? kasan_atomics+0x152/0x310 [ 15.237541] kasan_atomics+0x1dc/0x310 [ 15.237562] ? __pfx_kasan_atomics+0x10/0x10 [ 15.237584] ? __pfx_read_tsc+0x10/0x10 [ 15.237605] ? ktime_get_ts64+0x86/0x230 [ 15.237631] kunit_try_run_case+0x1a5/0x480 [ 15.237656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.237678] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.237702] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.237727] ? __kthread_parkme+0x82/0x180 [ 15.237751] ? preempt_count_sub+0x50/0x80 [ 15.237784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.237808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.237832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.237856] kthread+0x337/0x6f0 [ 15.237877] ? trace_preempt_on+0x20/0xc0 [ 15.237901] ? __pfx_kthread+0x10/0x10 [ 15.237924] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.237948] ? calculate_sigpending+0x7b/0xa0 [ 15.237970] ? __pfx_kthread+0x10/0x10 [ 15.237994] ret_from_fork+0x41/0x80 [ 15.238014] ? __pfx_kthread+0x10/0x10 [ 15.238039] ret_from_fork_asm+0x1a/0x30 [ 15.238071] </TASK> [ 15.238083] [ 15.251237] Allocated by task 285: [ 15.251777] kasan_save_stack+0x45/0x70 [ 15.251959] kasan_save_track+0x18/0x40 [ 15.252450] kasan_save_alloc_info+0x3b/0x50 [ 15.252660] __kasan_kmalloc+0xb7/0xc0 [ 15.252968] __kmalloc_cache_noprof+0x189/0x420 [ 15.253349] kasan_atomics+0x95/0x310 [ 15.253550] kunit_try_run_case+0x1a5/0x480 [ 15.253894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.254249] kthread+0x337/0x6f0 [ 15.254471] ret_from_fork+0x41/0x80 [ 15.254763] ret_from_fork_asm+0x1a/0x30 [ 15.254991] [ 15.255246] The buggy address belongs to the object at ffff888102b4cd00 [ 15.255246] which belongs to the cache kmalloc-64 of size 64 [ 15.255981] The buggy address is located 0 bytes to the right of [ 15.255981] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.256496] [ 15.256595] The buggy address belongs to the physical page: [ 15.256856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.257203] flags: 0x200000000000000(node=0|zone=2) [ 15.257395] page_type: f5(slab) [ 15.257568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.257948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.258255] page dumped because: kasan: bad access detected [ 15.258478] [ 15.258817] Memory state around the buggy address: [ 15.259010] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.259536] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.259904] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.260166] ^ [ 15.260540] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.260954] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.261331] ================================================================== [ 14.901658] ================================================================== [ 14.902006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.902426] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.902745] [ 14.902842] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.902887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.902900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.902920] Call Trace: [ 14.902937] <TASK> [ 14.902952] dump_stack_lvl+0x73/0xb0 [ 14.902977] print_report+0xd1/0x650 [ 14.903000] ? __virt_addr_valid+0x1db/0x2d0 [ 14.903023] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.903046] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.903069] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.903095] kasan_report+0x141/0x180 [ 14.903142] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.903171] kasan_check_range+0x10c/0x1c0 [ 14.903196] __kasan_check_write+0x18/0x20 [ 14.903217] kasan_atomics_helper+0x19e3/0x5450 [ 14.903241] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.903266] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.903289] ? kasan_atomics+0x152/0x310 [ 14.903314] kasan_atomics+0x1dc/0x310 [ 14.903345] ? __pfx_kasan_atomics+0x10/0x10 [ 14.903367] ? __pfx_read_tsc+0x10/0x10 [ 14.903387] ? ktime_get_ts64+0x86/0x230 [ 14.903414] kunit_try_run_case+0x1a5/0x480 [ 14.903439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.903461] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.903485] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.903510] ? __kthread_parkme+0x82/0x180 [ 14.903534] ? preempt_count_sub+0x50/0x80 [ 14.903560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.903584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.903607] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.903631] kthread+0x337/0x6f0 [ 14.903652] ? trace_preempt_on+0x20/0xc0 [ 14.903675] ? __pfx_kthread+0x10/0x10 [ 14.903699] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.903721] ? calculate_sigpending+0x7b/0xa0 [ 14.903743] ? __pfx_kthread+0x10/0x10 [ 14.903766] ret_from_fork+0x41/0x80 [ 14.903788] ? __pfx_kthread+0x10/0x10 [ 14.903811] ret_from_fork_asm+0x1a/0x30 [ 14.903844] </TASK> [ 14.903854] [ 14.910982] Allocated by task 285: [ 14.911127] kasan_save_stack+0x45/0x70 [ 14.911336] kasan_save_track+0x18/0x40 [ 14.911512] kasan_save_alloc_info+0x3b/0x50 [ 14.911657] __kasan_kmalloc+0xb7/0xc0 [ 14.911791] __kmalloc_cache_noprof+0x189/0x420 [ 14.911941] kasan_atomics+0x95/0x310 [ 14.912068] kunit_try_run_case+0x1a5/0x480 [ 14.912238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.912430] kthread+0x337/0x6f0 [ 14.912604] ret_from_fork+0x41/0x80 [ 14.912784] ret_from_fork_asm+0x1a/0x30 [ 14.912978] [ 14.913071] The buggy address belongs to the object at ffff888102b4cd00 [ 14.913071] which belongs to the cache kmalloc-64 of size 64 [ 14.913615] The buggy address is located 0 bytes to the right of [ 14.913615] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.914054] [ 14.914148] The buggy address belongs to the physical page: [ 14.914319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.914565] flags: 0x200000000000000(node=0|zone=2) [ 14.914792] page_type: f5(slab) [ 14.914964] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.915335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.915678] page dumped because: kasan: bad access detected [ 14.915933] [ 14.916025] Memory state around the buggy address: [ 14.916274] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.916550] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.916832] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.917187] ^ [ 14.917391] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.917664] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.917941] ================================================================== [ 14.609200] ================================================================== [ 14.609710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.610024] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.610447] [ 14.610539] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.610607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.610795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.610819] Call Trace: [ 14.610836] <TASK> [ 14.610854] dump_stack_lvl+0x73/0xb0 [ 14.610880] print_report+0xd1/0x650 [ 14.610904] ? __virt_addr_valid+0x1db/0x2d0 [ 14.610927] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.610952] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.610976] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.610999] kasan_report+0x141/0x180 [ 14.611023] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.611052] __asan_report_load4_noabort+0x18/0x20 [ 14.611073] kasan_atomics_helper+0x49e8/0x5450 [ 14.611098] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.611183] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.611210] ? kasan_atomics+0x152/0x310 [ 14.611234] kasan_atomics+0x1dc/0x310 [ 14.611255] ? __pfx_kasan_atomics+0x10/0x10 [ 14.611277] ? __pfx_read_tsc+0x10/0x10 [ 14.611298] ? ktime_get_ts64+0x86/0x230 [ 14.611338] kunit_try_run_case+0x1a5/0x480 [ 14.611363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.611387] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.611412] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.611437] ? __kthread_parkme+0x82/0x180 [ 14.611460] ? preempt_count_sub+0x50/0x80 [ 14.611485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.611509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.611533] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.611556] kthread+0x337/0x6f0 [ 14.611577] ? trace_preempt_on+0x20/0xc0 [ 14.611602] ? __pfx_kthread+0x10/0x10 [ 14.611625] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.611647] ? calculate_sigpending+0x7b/0xa0 [ 14.611670] ? __pfx_kthread+0x10/0x10 [ 14.611693] ret_from_fork+0x41/0x80 [ 14.611715] ? __pfx_kthread+0x10/0x10 [ 14.611738] ret_from_fork_asm+0x1a/0x30 [ 14.611772] </TASK> [ 14.611784] [ 14.621484] Allocated by task 285: [ 14.621639] kasan_save_stack+0x45/0x70 [ 14.621968] kasan_save_track+0x18/0x40 [ 14.622282] kasan_save_alloc_info+0x3b/0x50 [ 14.622601] __kasan_kmalloc+0xb7/0xc0 [ 14.622877] __kmalloc_cache_noprof+0x189/0x420 [ 14.623055] kasan_atomics+0x95/0x310 [ 14.623464] kunit_try_run_case+0x1a5/0x480 [ 14.623632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.623993] kthread+0x337/0x6f0 [ 14.624314] ret_from_fork+0x41/0x80 [ 14.624609] ret_from_fork_asm+0x1a/0x30 [ 14.624878] [ 14.624966] The buggy address belongs to the object at ffff888102b4cd00 [ 14.624966] which belongs to the cache kmalloc-64 of size 64 [ 14.625771] The buggy address is located 0 bytes to the right of [ 14.625771] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.626571] [ 14.626665] The buggy address belongs to the physical page: [ 14.626900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.627392] flags: 0x200000000000000(node=0|zone=2) [ 14.627674] page_type: f5(slab) [ 14.627808] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.628338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.628766] page dumped because: kasan: bad access detected [ 14.629079] [ 14.629222] Memory state around the buggy address: [ 14.629460] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.629771] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.630093] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.630499] ^ [ 14.630730] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.631003] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.631303] ================================================================== [ 14.214646] ================================================================== [ 14.214991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.215610] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.215908] [ 14.215993] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.216037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.216050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.216071] Call Trace: [ 14.216085] <TASK> [ 14.216099] dump_stack_lvl+0x73/0xb0 [ 14.216148] print_report+0xd1/0x650 [ 14.216171] ? __virt_addr_valid+0x1db/0x2d0 [ 14.216193] ? kasan_atomics_helper+0x860/0x5450 [ 14.216215] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.216239] ? kasan_atomics_helper+0x860/0x5450 [ 14.216262] kasan_report+0x141/0x180 [ 14.216287] ? kasan_atomics_helper+0x860/0x5450 [ 14.216316] kasan_check_range+0x10c/0x1c0 [ 14.216349] __kasan_check_write+0x18/0x20 [ 14.216371] kasan_atomics_helper+0x860/0x5450 [ 14.216394] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.216418] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.216441] ? kasan_atomics+0x152/0x310 [ 14.216466] kasan_atomics+0x1dc/0x310 [ 14.216486] ? __pfx_kasan_atomics+0x10/0x10 [ 14.216508] ? __pfx_read_tsc+0x10/0x10 [ 14.216528] ? ktime_get_ts64+0x86/0x230 [ 14.216554] kunit_try_run_case+0x1a5/0x480 [ 14.216579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.216602] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.216626] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.216651] ? __kthread_parkme+0x82/0x180 [ 14.216673] ? preempt_count_sub+0x50/0x80 [ 14.216699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.216723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.216747] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.216770] kthread+0x337/0x6f0 [ 14.216792] ? trace_preempt_on+0x20/0xc0 [ 14.216817] ? __pfx_kthread+0x10/0x10 [ 14.216840] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.216863] ? calculate_sigpending+0x7b/0xa0 [ 14.216885] ? __pfx_kthread+0x10/0x10 [ 14.216909] ret_from_fork+0x41/0x80 [ 14.216931] ? __pfx_kthread+0x10/0x10 [ 14.216954] ret_from_fork_asm+0x1a/0x30 [ 14.216987] </TASK> [ 14.216998] [ 14.226536] Allocated by task 285: [ 14.226863] kasan_save_stack+0x45/0x70 [ 14.227019] kasan_save_track+0x18/0x40 [ 14.227236] kasan_save_alloc_info+0x3b/0x50 [ 14.227586] __kasan_kmalloc+0xb7/0xc0 [ 14.227841] __kmalloc_cache_noprof+0x189/0x420 [ 14.228018] kasan_atomics+0x95/0x310 [ 14.228238] kunit_try_run_case+0x1a5/0x480 [ 14.228451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.228680] kthread+0x337/0x6f0 [ 14.228860] ret_from_fork+0x41/0x80 [ 14.229036] ret_from_fork_asm+0x1a/0x30 [ 14.229607] [ 14.229688] The buggy address belongs to the object at ffff888102b4cd00 [ 14.229688] which belongs to the cache kmalloc-64 of size 64 [ 14.230358] The buggy address is located 0 bytes to the right of [ 14.230358] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.230984] [ 14.231200] The buggy address belongs to the physical page: [ 14.231478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.231898] flags: 0x200000000000000(node=0|zone=2) [ 14.232209] page_type: f5(slab) [ 14.232398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.232834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.233309] page dumped because: kasan: bad access detected [ 14.233565] [ 14.233646] Memory state around the buggy address: [ 14.233864] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.234408] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.234715] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.235068] ^ [ 14.235345] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.235743] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.236155] ================================================================== [ 14.284197] ================================================================== [ 14.285112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.285551] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.285950] [ 14.286269] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.286318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.286344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.286366] Call Trace: [ 14.286470] <TASK> [ 14.286491] dump_stack_lvl+0x73/0xb0 [ 14.286519] print_report+0xd1/0x650 [ 14.286542] ? __virt_addr_valid+0x1db/0x2d0 [ 14.286564] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.286587] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.286611] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.286634] kasan_report+0x141/0x180 [ 14.286657] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.286685] kasan_check_range+0x10c/0x1c0 [ 14.286709] __kasan_check_write+0x18/0x20 [ 14.286731] kasan_atomics_helper+0xa2b/0x5450 [ 14.286757] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.286780] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.286802] ? kasan_atomics+0x152/0x310 [ 14.286827] kasan_atomics+0x1dc/0x310 [ 14.286846] ? __pfx_kasan_atomics+0x10/0x10 [ 14.286868] ? __pfx_read_tsc+0x10/0x10 [ 14.286888] ? ktime_get_ts64+0x86/0x230 [ 14.286914] kunit_try_run_case+0x1a5/0x480 [ 14.286939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.286961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.286985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.287010] ? __kthread_parkme+0x82/0x180 [ 14.287031] ? preempt_count_sub+0x50/0x80 [ 14.287057] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.287081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.287104] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.287137] kthread+0x337/0x6f0 [ 14.287159] ? trace_preempt_on+0x20/0xc0 [ 14.287185] ? __pfx_kthread+0x10/0x10 [ 14.287207] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.287230] ? calculate_sigpending+0x7b/0xa0 [ 14.287253] ? __pfx_kthread+0x10/0x10 [ 14.287276] ret_from_fork+0x41/0x80 [ 14.287296] ? __pfx_kthread+0x10/0x10 [ 14.287319] ret_from_fork_asm+0x1a/0x30 [ 14.287365] </TASK> [ 14.287376] [ 14.297632] Allocated by task 285: [ 14.297782] kasan_save_stack+0x45/0x70 [ 14.298044] kasan_save_track+0x18/0x40 [ 14.298387] kasan_save_alloc_info+0x3b/0x50 [ 14.298559] __kasan_kmalloc+0xb7/0xc0 [ 14.298864] __kmalloc_cache_noprof+0x189/0x420 [ 14.299156] kasan_atomics+0x95/0x310 [ 14.299503] kunit_try_run_case+0x1a5/0x480 [ 14.299707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.300036] kthread+0x337/0x6f0 [ 14.300291] ret_from_fork+0x41/0x80 [ 14.300524] ret_from_fork_asm+0x1a/0x30 [ 14.300678] [ 14.300775] The buggy address belongs to the object at ffff888102b4cd00 [ 14.300775] which belongs to the cache kmalloc-64 of size 64 [ 14.301558] The buggy address is located 0 bytes to the right of [ 14.301558] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.302125] [ 14.302313] The buggy address belongs to the physical page: [ 14.302622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.303015] flags: 0x200000000000000(node=0|zone=2) [ 14.303306] page_type: f5(slab) [ 14.303558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.303962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.304372] page dumped because: kasan: bad access detected [ 14.304624] [ 14.304829] Memory state around the buggy address: [ 14.304996] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.305379] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.305832] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.306192] ^ [ 14.306402] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.306790] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.307099] ================================================================== [ 14.585838] ================================================================== [ 14.586197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.586534] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.586858] [ 14.586972] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.587018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.587031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.587052] Call Trace: [ 14.587067] <TASK> [ 14.587083] dump_stack_lvl+0x73/0xb0 [ 14.587109] print_report+0xd1/0x650 [ 14.587132] ? __virt_addr_valid+0x1db/0x2d0 [ 14.587153] ? kasan_atomics_helper+0x1217/0x5450 [ 14.587175] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.587199] ? kasan_atomics_helper+0x1217/0x5450 [ 14.587222] kasan_report+0x141/0x180 [ 14.587246] ? kasan_atomics_helper+0x1217/0x5450 [ 14.587274] kasan_check_range+0x10c/0x1c0 [ 14.587334] __kasan_check_write+0x18/0x20 [ 14.587356] kasan_atomics_helper+0x1217/0x5450 [ 14.587381] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.587405] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.587428] ? kasan_atomics+0x152/0x310 [ 14.587453] kasan_atomics+0x1dc/0x310 [ 14.587474] ? __pfx_kasan_atomics+0x10/0x10 [ 14.587496] ? __pfx_read_tsc+0x10/0x10 [ 14.587516] ? ktime_get_ts64+0x86/0x230 [ 14.587543] kunit_try_run_case+0x1a5/0x480 [ 14.587568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.587590] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.587615] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.587641] ? __kthread_parkme+0x82/0x180 [ 14.587663] ? preempt_count_sub+0x50/0x80 [ 14.587688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.587713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.587736] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.587761] kthread+0x337/0x6f0 [ 14.587782] ? trace_preempt_on+0x20/0xc0 [ 14.587806] ? __pfx_kthread+0x10/0x10 [ 14.587829] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.587851] ? calculate_sigpending+0x7b/0xa0 [ 14.587873] ? __pfx_kthread+0x10/0x10 [ 14.587915] ret_from_fork+0x41/0x80 [ 14.587950] ? __pfx_kthread+0x10/0x10 [ 14.587974] ret_from_fork_asm+0x1a/0x30 [ 14.588033] </TASK> [ 14.588044] [ 14.597505] Allocated by task 285: [ 14.598004] kasan_save_stack+0x45/0x70 [ 14.598254] kasan_save_track+0x18/0x40 [ 14.598490] kasan_save_alloc_info+0x3b/0x50 [ 14.598721] __kasan_kmalloc+0xb7/0xc0 [ 14.598872] __kmalloc_cache_noprof+0x189/0x420 [ 14.599115] kasan_atomics+0x95/0x310 [ 14.599281] kunit_try_run_case+0x1a5/0x480 [ 14.599827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.600072] kthread+0x337/0x6f0 [ 14.600294] ret_from_fork+0x41/0x80 [ 14.600510] ret_from_fork_asm+0x1a/0x30 [ 14.600683] [ 14.600780] The buggy address belongs to the object at ffff888102b4cd00 [ 14.600780] which belongs to the cache kmalloc-64 of size 64 [ 14.601256] The buggy address is located 0 bytes to the right of [ 14.601256] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.601976] [ 14.602080] The buggy address belongs to the physical page: [ 14.602966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.603304] flags: 0x200000000000000(node=0|zone=2) [ 14.603638] page_type: f5(slab) [ 14.603923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.604275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.604686] page dumped because: kasan: bad access detected [ 14.605004] [ 14.605105] Memory state around the buggy address: [ 14.605475] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.605806] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.606115] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.606656] ^ [ 14.606966] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.607415] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.607784] ================================================================== [ 14.029432] ================================================================== [ 14.030188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.030931] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.031393] [ 14.031568] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.031635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.031649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.031671] Call Trace: [ 14.031689] <TASK> [ 14.031717] dump_stack_lvl+0x73/0xb0 [ 14.031744] print_report+0xd1/0x650 [ 14.031767] ? __virt_addr_valid+0x1db/0x2d0 [ 14.031789] ? kasan_atomics_helper+0x3df/0x5450 [ 14.031812] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.031835] ? kasan_atomics_helper+0x3df/0x5450 [ 14.031858] kasan_report+0x141/0x180 [ 14.031883] ? kasan_atomics_helper+0x3df/0x5450 [ 14.031911] kasan_check_range+0x10c/0x1c0 [ 14.031936] __kasan_check_read+0x15/0x20 [ 14.031957] kasan_atomics_helper+0x3df/0x5450 [ 14.031980] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.032003] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.032026] ? kasan_atomics+0x152/0x310 [ 14.032051] kasan_atomics+0x1dc/0x310 [ 14.032070] ? __pfx_kasan_atomics+0x10/0x10 [ 14.032092] ? __pfx_read_tsc+0x10/0x10 [ 14.032113] ? ktime_get_ts64+0x86/0x230 [ 14.032150] kunit_try_run_case+0x1a5/0x480 [ 14.032174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.032197] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.032221] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.032246] ? __kthread_parkme+0x82/0x180 [ 14.032269] ? preempt_count_sub+0x50/0x80 [ 14.032294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.032319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.032353] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.032377] kthread+0x337/0x6f0 [ 14.032398] ? trace_preempt_on+0x20/0xc0 [ 14.032423] ? __pfx_kthread+0x10/0x10 [ 14.032446] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.032469] ? calculate_sigpending+0x7b/0xa0 [ 14.032492] ? __pfx_kthread+0x10/0x10 [ 14.032516] ret_from_fork+0x41/0x80 [ 14.032537] ? __pfx_kthread+0x10/0x10 [ 14.032560] ret_from_fork_asm+0x1a/0x30 [ 14.032592] </TASK> [ 14.032604] [ 14.044846] Allocated by task 285: [ 14.045230] kasan_save_stack+0x45/0x70 [ 14.045450] kasan_save_track+0x18/0x40 [ 14.045816] kasan_save_alloc_info+0x3b/0x50 [ 14.046140] __kasan_kmalloc+0xb7/0xc0 [ 14.046529] __kmalloc_cache_noprof+0x189/0x420 [ 14.046769] kasan_atomics+0x95/0x310 [ 14.047116] kunit_try_run_case+0x1a5/0x480 [ 14.047407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.047584] kthread+0x337/0x6f0 [ 14.047705] ret_from_fork+0x41/0x80 [ 14.047833] ret_from_fork_asm+0x1a/0x30 [ 14.047973] [ 14.048044] The buggy address belongs to the object at ffff888102b4cd00 [ 14.048044] which belongs to the cache kmalloc-64 of size 64 [ 14.048411] The buggy address is located 0 bytes to the right of [ 14.048411] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.048979] [ 14.049063] The buggy address belongs to the physical page: [ 14.049415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.049666] flags: 0x200000000000000(node=0|zone=2) [ 14.049921] page_type: f5(slab) [ 14.050091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.050421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.050767] page dumped because: kasan: bad access detected [ 14.050963] [ 14.051033] Memory state around the buggy address: [ 14.051220] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.051579] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.051858] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.052141] ^ [ 14.052398] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.052637] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.052908] ================================================================== [ 14.446083] ================================================================== [ 14.447075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.447509] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.447818] [ 14.447922] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.447968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.447982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.448004] Call Trace: [ 14.448022] <TASK> [ 14.448038] dump_stack_lvl+0x73/0xb0 [ 14.448064] print_report+0xd1/0x650 [ 14.448088] ? __virt_addr_valid+0x1db/0x2d0 [ 14.448112] ? kasan_atomics_helper+0xf10/0x5450 [ 14.448335] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.448362] ? kasan_atomics_helper+0xf10/0x5450 [ 14.448387] kasan_report+0x141/0x180 [ 14.448412] ? kasan_atomics_helper+0xf10/0x5450 [ 14.448441] kasan_check_range+0x10c/0x1c0 [ 14.448624] __kasan_check_write+0x18/0x20 [ 14.448646] kasan_atomics_helper+0xf10/0x5450 [ 14.448671] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.448696] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.448719] ? kasan_atomics+0x152/0x310 [ 14.448744] kasan_atomics+0x1dc/0x310 [ 14.448764] ? __pfx_kasan_atomics+0x10/0x10 [ 14.448787] ? __pfx_read_tsc+0x10/0x10 [ 14.448808] ? ktime_get_ts64+0x86/0x230 [ 14.448835] kunit_try_run_case+0x1a5/0x480 [ 14.448859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.448881] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.448906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.448931] ? __kthread_parkme+0x82/0x180 [ 14.448953] ? preempt_count_sub+0x50/0x80 [ 14.448978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.449002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.449026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.449049] kthread+0x337/0x6f0 [ 14.449071] ? trace_preempt_on+0x20/0xc0 [ 14.449096] ? __pfx_kthread+0x10/0x10 [ 14.449119] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.449159] ? calculate_sigpending+0x7b/0xa0 [ 14.449183] ? __pfx_kthread+0x10/0x10 [ 14.449205] ret_from_fork+0x41/0x80 [ 14.449228] ? __pfx_kthread+0x10/0x10 [ 14.449251] ret_from_fork_asm+0x1a/0x30 [ 14.449283] </TASK> [ 14.449295] [ 14.460296] Allocated by task 285: [ 14.460530] kasan_save_stack+0x45/0x70 [ 14.460735] kasan_save_track+0x18/0x40 [ 14.460913] kasan_save_alloc_info+0x3b/0x50 [ 14.461106] __kasan_kmalloc+0xb7/0xc0 [ 14.461550] __kmalloc_cache_noprof+0x189/0x420 [ 14.461883] kasan_atomics+0x95/0x310 [ 14.462292] kunit_try_run_case+0x1a5/0x480 [ 14.462532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.462768] kthread+0x337/0x6f0 [ 14.462925] ret_from_fork+0x41/0x80 [ 14.463096] ret_from_fork_asm+0x1a/0x30 [ 14.463490] [ 14.463694] The buggy address belongs to the object at ffff888102b4cd00 [ 14.463694] which belongs to the cache kmalloc-64 of size 64 [ 14.464569] The buggy address is located 0 bytes to the right of [ 14.464569] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.465087] [ 14.465401] The buggy address belongs to the physical page: [ 14.465870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.466383] flags: 0x200000000000000(node=0|zone=2) [ 14.466611] page_type: f5(slab) [ 14.466773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.467086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.467683] page dumped because: kasan: bad access detected [ 14.468032] [ 14.468258] Memory state around the buggy address: [ 14.468699] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.469015] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.469721] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.470151] ^ [ 14.470509] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.471144] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.471455] ================================================================== [ 14.827967] ================================================================== [ 14.828393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.828732] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.829015] [ 14.829098] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.829141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.829154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.829175] Call Trace: [ 14.829190] <TASK> [ 14.829206] dump_stack_lvl+0x73/0xb0 [ 14.829229] print_report+0xd1/0x650 [ 14.829252] ? __virt_addr_valid+0x1db/0x2d0 [ 14.829274] ? kasan_atomics_helper+0x177f/0x5450 [ 14.829297] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.829321] ? kasan_atomics_helper+0x177f/0x5450 [ 14.829353] kasan_report+0x141/0x180 [ 14.829376] ? kasan_atomics_helper+0x177f/0x5450 [ 14.829404] kasan_check_range+0x10c/0x1c0 [ 14.829428] __kasan_check_write+0x18/0x20 [ 14.829449] kasan_atomics_helper+0x177f/0x5450 [ 14.829488] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.829512] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.829535] ? kasan_atomics+0x152/0x310 [ 14.829582] kasan_atomics+0x1dc/0x310 [ 14.829603] ? __pfx_kasan_atomics+0x10/0x10 [ 14.829625] ? __pfx_read_tsc+0x10/0x10 [ 14.829662] ? ktime_get_ts64+0x86/0x230 [ 14.829689] kunit_try_run_case+0x1a5/0x480 [ 14.829730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.829752] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.829780] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.829805] ? __kthread_parkme+0x82/0x180 [ 14.829828] ? preempt_count_sub+0x50/0x80 [ 14.829854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.829894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.829918] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.829942] kthread+0x337/0x6f0 [ 14.829963] ? trace_preempt_on+0x20/0xc0 [ 14.829987] ? __pfx_kthread+0x10/0x10 [ 14.830010] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.830048] ? calculate_sigpending+0x7b/0xa0 [ 14.830071] ? __pfx_kthread+0x10/0x10 [ 14.830094] ret_from_fork+0x41/0x80 [ 14.830116] ? __pfx_kthread+0x10/0x10 [ 14.830147] ret_from_fork_asm+0x1a/0x30 [ 14.830178] </TASK> [ 14.830190] [ 14.838191] Allocated by task 285: [ 14.838404] kasan_save_stack+0x45/0x70 [ 14.838584] kasan_save_track+0x18/0x40 [ 14.838810] kasan_save_alloc_info+0x3b/0x50 [ 14.839019] __kasan_kmalloc+0xb7/0xc0 [ 14.839188] __kmalloc_cache_noprof+0x189/0x420 [ 14.839390] kasan_atomics+0x95/0x310 [ 14.839521] kunit_try_run_case+0x1a5/0x480 [ 14.839667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.839841] kthread+0x337/0x6f0 [ 14.839970] ret_from_fork+0x41/0x80 [ 14.840155] ret_from_fork_asm+0x1a/0x30 [ 14.840385] [ 14.840481] The buggy address belongs to the object at ffff888102b4cd00 [ 14.840481] which belongs to the cache kmalloc-64 of size 64 [ 14.841063] The buggy address is located 0 bytes to the right of [ 14.841063] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.841727] [ 14.841853] The buggy address belongs to the physical page: [ 14.842099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.842484] flags: 0x200000000000000(node=0|zone=2) [ 14.842674] page_type: f5(slab) [ 14.842796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.843028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.843660] page dumped because: kasan: bad access detected [ 14.843933] [ 14.844038] Memory state around the buggy address: [ 14.844273] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.844652] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.844906] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.845148] ^ [ 14.845385] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.845741] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.846005] ================================================================== [ 14.769376] ================================================================== [ 14.769778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.770051] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.770495] [ 14.770597] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.770660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.770687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.770721] Call Trace: [ 14.770737] <TASK> [ 14.770766] dump_stack_lvl+0x73/0xb0 [ 14.770805] print_report+0xd1/0x650 [ 14.770855] ? __virt_addr_valid+0x1db/0x2d0 [ 14.770891] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.770926] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.770949] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.770972] kasan_report+0x141/0x180 [ 14.770996] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.771024] kasan_check_range+0x10c/0x1c0 [ 14.771049] __kasan_check_write+0x18/0x20 [ 14.771070] kasan_atomics_helper+0x15b6/0x5450 [ 14.771094] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.771117] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.771140] ? kasan_atomics+0x152/0x310 [ 14.771164] kasan_atomics+0x1dc/0x310 [ 14.771195] ? __pfx_kasan_atomics+0x10/0x10 [ 14.771217] ? __pfx_read_tsc+0x10/0x10 [ 14.771238] ? ktime_get_ts64+0x86/0x230 [ 14.771264] kunit_try_run_case+0x1a5/0x480 [ 14.771290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.771311] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.771347] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.771372] ? __kthread_parkme+0x82/0x180 [ 14.771396] ? preempt_count_sub+0x50/0x80 [ 14.771421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.771445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.771470] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.771494] kthread+0x337/0x6f0 [ 14.771516] ? trace_preempt_on+0x20/0xc0 [ 14.771540] ? __pfx_kthread+0x10/0x10 [ 14.771564] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.771587] ? calculate_sigpending+0x7b/0xa0 [ 14.771629] ? __pfx_kthread+0x10/0x10 [ 14.771653] ret_from_fork+0x41/0x80 [ 14.771675] ? __pfx_kthread+0x10/0x10 [ 14.771698] ret_from_fork_asm+0x1a/0x30 [ 14.771731] </TASK> [ 14.771742] [ 14.779676] Allocated by task 285: [ 14.779864] kasan_save_stack+0x45/0x70 [ 14.780057] kasan_save_track+0x18/0x40 [ 14.780296] kasan_save_alloc_info+0x3b/0x50 [ 14.780500] __kasan_kmalloc+0xb7/0xc0 [ 14.780685] __kmalloc_cache_noprof+0x189/0x420 [ 14.780938] kasan_atomics+0x95/0x310 [ 14.781145] kunit_try_run_case+0x1a5/0x480 [ 14.781375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.781634] kthread+0x337/0x6f0 [ 14.781921] ret_from_fork+0x41/0x80 [ 14.782270] ret_from_fork_asm+0x1a/0x30 [ 14.782424] [ 14.782497] The buggy address belongs to the object at ffff888102b4cd00 [ 14.782497] which belongs to the cache kmalloc-64 of size 64 [ 14.782948] The buggy address is located 0 bytes to the right of [ 14.782948] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.783587] [ 14.783731] The buggy address belongs to the physical page: [ 14.784042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.784628] flags: 0x200000000000000(node=0|zone=2) [ 14.784863] page_type: f5(slab) [ 14.785030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.785699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.785932] page dumped because: kasan: bad access detected [ 14.786103] [ 14.786172] Memory state around the buggy address: [ 14.786336] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.786622] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.787163] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.787515] ^ [ 14.787742] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.788063] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.788284] ================================================================== [ 14.692319] ================================================================== [ 14.692712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.692991] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.693375] [ 14.693472] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.693515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.693529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.693551] Call Trace: [ 14.693568] <TASK> [ 14.693585] dump_stack_lvl+0x73/0xb0 [ 14.693609] print_report+0xd1/0x650 [ 14.693633] ? __virt_addr_valid+0x1db/0x2d0 [ 14.693656] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.693679] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.693702] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.693726] kasan_report+0x141/0x180 [ 14.693749] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.693783] __asan_report_load8_noabort+0x18/0x20 [ 14.693805] kasan_atomics_helper+0x4eae/0x5450 [ 14.693830] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.693854] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.693878] ? kasan_atomics+0x152/0x310 [ 14.693902] kasan_atomics+0x1dc/0x310 [ 14.693923] ? __pfx_kasan_atomics+0x10/0x10 [ 14.693944] ? __pfx_read_tsc+0x10/0x10 [ 14.693965] ? ktime_get_ts64+0x86/0x230 [ 14.693990] kunit_try_run_case+0x1a5/0x480 [ 14.694014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.694037] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.694062] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.694087] ? __kthread_parkme+0x82/0x180 [ 14.694109] ? preempt_count_sub+0x50/0x80 [ 14.694135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.694159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.694183] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.694207] kthread+0x337/0x6f0 [ 14.694228] ? trace_preempt_on+0x20/0xc0 [ 14.694252] ? __pfx_kthread+0x10/0x10 [ 14.694275] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.694297] ? calculate_sigpending+0x7b/0xa0 [ 14.694320] ? __pfx_kthread+0x10/0x10 [ 14.694353] ret_from_fork+0x41/0x80 [ 14.694375] ? __pfx_kthread+0x10/0x10 [ 14.694397] ret_from_fork_asm+0x1a/0x30 [ 14.694429] </TASK> [ 14.694452] [ 14.701725] Allocated by task 285: [ 14.701927] kasan_save_stack+0x45/0x70 [ 14.702170] kasan_save_track+0x18/0x40 [ 14.702474] kasan_save_alloc_info+0x3b/0x50 [ 14.702891] __kasan_kmalloc+0xb7/0xc0 [ 14.703043] __kmalloc_cache_noprof+0x189/0x420 [ 14.703663] kasan_atomics+0x95/0x310 [ 14.703854] kunit_try_run_case+0x1a5/0x480 [ 14.704069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.704997] kthread+0x337/0x6f0 [ 14.705183] ret_from_fork+0x41/0x80 [ 14.705358] ret_from_fork_asm+0x1a/0x30 [ 14.705571] [ 14.705670] The buggy address belongs to the object at ffff888102b4cd00 [ 14.705670] which belongs to the cache kmalloc-64 of size 64 [ 14.706170] The buggy address is located 0 bytes to the right of [ 14.706170] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.706692] [ 14.706804] The buggy address belongs to the physical page: [ 14.707033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.707381] flags: 0x200000000000000(node=0|zone=2) [ 14.707620] page_type: f5(slab) [ 14.707782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.708147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.708439] page dumped because: kasan: bad access detected [ 14.708689] [ 14.708791] Memory state around the buggy address: [ 14.708970] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.709312] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.709673] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.710016] ^ [ 14.710226] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.710512] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.711110] ================================================================== [ 14.415896] ================================================================== [ 14.417308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.419644] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.419889] [ 14.419981] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.420028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.420041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.420064] Call Trace: [ 14.420081] <TASK> [ 14.420097] dump_stack_lvl+0x73/0xb0 [ 14.420124] print_report+0xd1/0x650 [ 14.420149] ? __virt_addr_valid+0x1db/0x2d0 [ 14.420171] ? kasan_atomics_helper+0xe78/0x5450 [ 14.420193] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.420217] ? kasan_atomics_helper+0xe78/0x5450 [ 14.420240] kasan_report+0x141/0x180 [ 14.420263] ? kasan_atomics_helper+0xe78/0x5450 [ 14.420292] kasan_check_range+0x10c/0x1c0 [ 14.420318] __kasan_check_write+0x18/0x20 [ 14.420365] kasan_atomics_helper+0xe78/0x5450 [ 14.420390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.420413] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.420436] ? kasan_atomics+0x152/0x310 [ 14.420460] kasan_atomics+0x1dc/0x310 [ 14.420481] ? __pfx_kasan_atomics+0x10/0x10 [ 14.420502] ? __pfx_read_tsc+0x10/0x10 [ 14.420522] ? ktime_get_ts64+0x86/0x230 [ 14.420549] kunit_try_run_case+0x1a5/0x480 [ 14.420574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.420595] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.421349] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.422149] ? __kthread_parkme+0x82/0x180 [ 14.422189] ? preempt_count_sub+0x50/0x80 [ 14.422219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.422244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.422269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.422297] kthread+0x337/0x6f0 [ 14.422319] ? trace_preempt_on+0x20/0xc0 [ 14.422356] ? __pfx_kthread+0x10/0x10 [ 14.422385] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.422408] ? calculate_sigpending+0x7b/0xa0 [ 14.422431] ? __pfx_kthread+0x10/0x10 [ 14.422455] ret_from_fork+0x41/0x80 [ 14.422477] ? __pfx_kthread+0x10/0x10 [ 14.422499] ret_from_fork_asm+0x1a/0x30 [ 14.422532] </TASK> [ 14.422544] [ 14.435685] Allocated by task 285: [ 14.435881] kasan_save_stack+0x45/0x70 [ 14.436087] kasan_save_track+0x18/0x40 [ 14.436388] kasan_save_alloc_info+0x3b/0x50 [ 14.436576] __kasan_kmalloc+0xb7/0xc0 [ 14.436787] __kmalloc_cache_noprof+0x189/0x420 [ 14.437000] kasan_atomics+0x95/0x310 [ 14.437374] kunit_try_run_case+0x1a5/0x480 [ 14.437599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.437777] kthread+0x337/0x6f0 [ 14.437913] ret_from_fork+0x41/0x80 [ 14.438103] ret_from_fork_asm+0x1a/0x30 [ 14.438312] [ 14.438426] The buggy address belongs to the object at ffff888102b4cd00 [ 14.438426] which belongs to the cache kmalloc-64 of size 64 [ 14.438927] The buggy address is located 0 bytes to the right of [ 14.438927] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.439492] [ 14.439588] The buggy address belongs to the physical page: [ 14.440001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.440687] flags: 0x200000000000000(node=0|zone=2) [ 14.440882] page_type: f5(slab) [ 14.441033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.441491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.441835] page dumped because: kasan: bad access detected [ 14.442372] [ 14.442475] Memory state around the buggy address: [ 14.442686] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.442981] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.443643] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.444096] ^ [ 14.444476] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.445001] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.445507] ================================================================== [ 14.307841] ================================================================== [ 14.308179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.308837] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.309144] [ 14.309231] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.309275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.309287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.309309] Call Trace: [ 14.309335] <TASK> [ 14.309350] dump_stack_lvl+0x73/0xb0 [ 14.309376] print_report+0xd1/0x650 [ 14.309399] ? __virt_addr_valid+0x1db/0x2d0 [ 14.309421] ? kasan_atomics_helper+0xac7/0x5450 [ 14.309444] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.309526] ? kasan_atomics_helper+0xac7/0x5450 [ 14.309550] kasan_report+0x141/0x180 [ 14.309575] ? kasan_atomics_helper+0xac7/0x5450 [ 14.309603] kasan_check_range+0x10c/0x1c0 [ 14.309628] __kasan_check_write+0x18/0x20 [ 14.309649] kasan_atomics_helper+0xac7/0x5450 [ 14.309673] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.309696] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.309719] ? kasan_atomics+0x152/0x310 [ 14.309743] kasan_atomics+0x1dc/0x310 [ 14.309764] ? __pfx_kasan_atomics+0x10/0x10 [ 14.309790] ? __pfx_read_tsc+0x10/0x10 [ 14.309811] ? ktime_get_ts64+0x86/0x230 [ 14.309836] kunit_try_run_case+0x1a5/0x480 [ 14.309861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.309884] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.309909] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.309933] ? __kthread_parkme+0x82/0x180 [ 14.309955] ? preempt_count_sub+0x50/0x80 [ 14.309981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.310005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.310028] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.310051] kthread+0x337/0x6f0 [ 14.310073] ? trace_preempt_on+0x20/0xc0 [ 14.310097] ? __pfx_kthread+0x10/0x10 [ 14.310120] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.310153] ? calculate_sigpending+0x7b/0xa0 [ 14.310175] ? __pfx_kthread+0x10/0x10 [ 14.310198] ret_from_fork+0x41/0x80 [ 14.310220] ? __pfx_kthread+0x10/0x10 [ 14.310242] ret_from_fork_asm+0x1a/0x30 [ 14.310275] </TASK> [ 14.310286] [ 14.317507] Allocated by task 285: [ 14.317659] kasan_save_stack+0x45/0x70 [ 14.317865] kasan_save_track+0x18/0x40 [ 14.318046] kasan_save_alloc_info+0x3b/0x50 [ 14.318272] __kasan_kmalloc+0xb7/0xc0 [ 14.318434] __kmalloc_cache_noprof+0x189/0x420 [ 14.318589] kasan_atomics+0x95/0x310 [ 14.318762] kunit_try_run_case+0x1a5/0x480 [ 14.318966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.319262] kthread+0x337/0x6f0 [ 14.319421] ret_from_fork+0x41/0x80 [ 14.319553] ret_from_fork_asm+0x1a/0x30 [ 14.319740] [ 14.319835] The buggy address belongs to the object at ffff888102b4cd00 [ 14.319835] which belongs to the cache kmalloc-64 of size 64 [ 14.320395] The buggy address is located 0 bytes to the right of [ 14.320395] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.320854] [ 14.320942] The buggy address belongs to the physical page: [ 14.321238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.321545] flags: 0x200000000000000(node=0|zone=2) [ 14.321757] page_type: f5(slab) [ 14.321910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.322139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.322372] page dumped because: kasan: bad access detected [ 14.322543] [ 14.322615] Memory state around the buggy address: [ 14.322838] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.323166] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.323499] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.323762] ^ [ 14.323914] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.324135] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.324456] ================================================================== [ 15.008041] ================================================================== [ 15.008304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.009163] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.009475] [ 15.009562] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.009606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.009620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.009641] Call Trace: [ 15.009656] <TASK> [ 15.009672] dump_stack_lvl+0x73/0xb0 [ 15.009698] print_report+0xd1/0x650 [ 15.009765] ? __virt_addr_valid+0x1db/0x2d0 [ 15.009794] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.009817] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.009841] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.009864] kasan_report+0x141/0x180 [ 15.009920] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.009950] kasan_check_range+0x10c/0x1c0 [ 15.009976] __kasan_check_write+0x18/0x20 [ 15.009996] kasan_atomics_helper+0x1ce1/0x5450 [ 15.010021] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.010074] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.010099] ? kasan_atomics+0x152/0x310 [ 15.010124] kasan_atomics+0x1dc/0x310 [ 15.010154] ? __pfx_kasan_atomics+0x10/0x10 [ 15.010177] ? __pfx_read_tsc+0x10/0x10 [ 15.010224] ? ktime_get_ts64+0x86/0x230 [ 15.010253] kunit_try_run_case+0x1a5/0x480 [ 15.010278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.010301] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.010336] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.010362] ? __kthread_parkme+0x82/0x180 [ 15.010384] ? preempt_count_sub+0x50/0x80 [ 15.010410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.010434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.010458] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.010509] kthread+0x337/0x6f0 [ 15.010530] ? trace_preempt_on+0x20/0xc0 [ 15.010555] ? __pfx_kthread+0x10/0x10 [ 15.010578] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.010602] ? calculate_sigpending+0x7b/0xa0 [ 15.010624] ? __pfx_kthread+0x10/0x10 [ 15.010648] ret_from_fork+0x41/0x80 [ 15.010670] ? __pfx_kthread+0x10/0x10 [ 15.010693] ret_from_fork_asm+0x1a/0x30 [ 15.010725] </TASK> [ 15.010736] [ 15.019236] Allocated by task 285: [ 15.019443] kasan_save_stack+0x45/0x70 [ 15.019661] kasan_save_track+0x18/0x40 [ 15.019859] kasan_save_alloc_info+0x3b/0x50 [ 15.020084] __kasan_kmalloc+0xb7/0xc0 [ 15.020359] __kmalloc_cache_noprof+0x189/0x420 [ 15.020565] kasan_atomics+0x95/0x310 [ 15.020709] kunit_try_run_case+0x1a5/0x480 [ 15.020999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.021178] kthread+0x337/0x6f0 [ 15.021357] ret_from_fork+0x41/0x80 [ 15.021539] ret_from_fork_asm+0x1a/0x30 [ 15.021735] [ 15.021883] The buggy address belongs to the object at ffff888102b4cd00 [ 15.021883] which belongs to the cache kmalloc-64 of size 64 [ 15.022600] The buggy address is located 0 bytes to the right of [ 15.022600] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.023069] [ 15.023257] The buggy address belongs to the physical page: [ 15.023525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.023893] flags: 0x200000000000000(node=0|zone=2) [ 15.024141] page_type: f5(slab) [ 15.024311] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.024663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.024963] page dumped because: kasan: bad access detected [ 15.025177] [ 15.025276] Memory state around the buggy address: [ 15.025509] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.025863] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.026245] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.026569] ^ [ 15.026800] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.027057] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.027601] ================================================================== [ 14.002666] ================================================================== [ 14.003394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.003719] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.004316] [ 14.004561] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.004612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.004625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.004749] Call Trace: [ 14.004764] <TASK> [ 14.004780] dump_stack_lvl+0x73/0xb0 [ 14.004808] print_report+0xd1/0x650 [ 14.004831] ? __virt_addr_valid+0x1db/0x2d0 [ 14.004854] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.004877] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.004900] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.004923] kasan_report+0x141/0x180 [ 14.004947] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.004975] __asan_report_store4_noabort+0x1b/0x30 [ 14.004997] kasan_atomics_helper+0x4b6e/0x5450 [ 14.005021] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.005044] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.005068] ? kasan_atomics+0x152/0x310 [ 14.005092] kasan_atomics+0x1dc/0x310 [ 14.005112] ? __pfx_kasan_atomics+0x10/0x10 [ 14.005143] ? __pfx_read_tsc+0x10/0x10 [ 14.005164] ? ktime_get_ts64+0x86/0x230 [ 14.005189] kunit_try_run_case+0x1a5/0x480 [ 14.005215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.005236] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.005261] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.005286] ? __kthread_parkme+0x82/0x180 [ 14.005308] ? preempt_count_sub+0x50/0x80 [ 14.005348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.005374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.005397] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.005422] kthread+0x337/0x6f0 [ 14.005444] ? trace_preempt_on+0x20/0xc0 [ 14.005467] ? __pfx_kthread+0x10/0x10 [ 14.005490] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.005513] ? calculate_sigpending+0x7b/0xa0 [ 14.005536] ? __pfx_kthread+0x10/0x10 [ 14.005559] ret_from_fork+0x41/0x80 [ 14.005581] ? __pfx_kthread+0x10/0x10 [ 14.005604] ret_from_fork_asm+0x1a/0x30 [ 14.005636] </TASK> [ 14.005648] [ 14.016686] Allocated by task 285: [ 14.016874] kasan_save_stack+0x45/0x70 [ 14.017061] kasan_save_track+0x18/0x40 [ 14.017647] kasan_save_alloc_info+0x3b/0x50 [ 14.017857] __kasan_kmalloc+0xb7/0xc0 [ 14.018115] __kmalloc_cache_noprof+0x189/0x420 [ 14.018439] kasan_atomics+0x95/0x310 [ 14.018739] kunit_try_run_case+0x1a5/0x480 [ 14.019026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.019375] kthread+0x337/0x6f0 [ 14.019645] ret_from_fork+0x41/0x80 [ 14.019827] ret_from_fork_asm+0x1a/0x30 [ 14.020022] [ 14.020110] The buggy address belongs to the object at ffff888102b4cd00 [ 14.020110] which belongs to the cache kmalloc-64 of size 64 [ 14.020989] The buggy address is located 0 bytes to the right of [ 14.020989] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.021687] [ 14.021795] The buggy address belongs to the physical page: [ 14.022208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.022683] flags: 0x200000000000000(node=0|zone=2) [ 14.023042] page_type: f5(slab) [ 14.023502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.023873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.024105] page dumped because: kasan: bad access detected [ 14.024766] [ 14.025087] Memory state around the buggy address: [ 14.025614] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.026420] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.026737] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.026949] ^ [ 14.027106] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.027745] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.028484] ================================================================== [ 14.730591] ================================================================== [ 14.731571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.731961] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.732296] [ 14.732402] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.732468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.732481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.732503] Call Trace: [ 14.732519] <TASK> [ 14.732535] dump_stack_lvl+0x73/0xb0 [ 14.732563] print_report+0xd1/0x650 [ 14.732586] ? __virt_addr_valid+0x1db/0x2d0 [ 14.732609] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.732632] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.732673] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.732697] kasan_report+0x141/0x180 [ 14.732722] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.732751] __asan_report_store8_noabort+0x1b/0x30 [ 14.732773] kasan_atomics_helper+0x50d4/0x5450 [ 14.732799] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.732824] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.732865] ? kasan_atomics+0x152/0x310 [ 14.732889] kasan_atomics+0x1dc/0x310 [ 14.732910] ? __pfx_kasan_atomics+0x10/0x10 [ 14.732932] ? __pfx_read_tsc+0x10/0x10 [ 14.732952] ? ktime_get_ts64+0x86/0x230 [ 14.732978] kunit_try_run_case+0x1a5/0x480 [ 14.733004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.733026] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.733050] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.733076] ? __kthread_parkme+0x82/0x180 [ 14.733098] ? preempt_count_sub+0x50/0x80 [ 14.733134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.733159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.733183] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.733207] kthread+0x337/0x6f0 [ 14.733228] ? trace_preempt_on+0x20/0xc0 [ 14.733252] ? __pfx_kthread+0x10/0x10 [ 14.733294] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.733318] ? calculate_sigpending+0x7b/0xa0 [ 14.733352] ? __pfx_kthread+0x10/0x10 [ 14.733375] ret_from_fork+0x41/0x80 [ 14.733397] ? __pfx_kthread+0x10/0x10 [ 14.733420] ret_from_fork_asm+0x1a/0x30 [ 14.733470] </TASK> [ 14.733481] [ 14.740923] Allocated by task 285: [ 14.741054] kasan_save_stack+0x45/0x70 [ 14.741393] kasan_save_track+0x18/0x40 [ 14.741591] kasan_save_alloc_info+0x3b/0x50 [ 14.741845] __kasan_kmalloc+0xb7/0xc0 [ 14.742035] __kmalloc_cache_noprof+0x189/0x420 [ 14.742480] kasan_atomics+0x95/0x310 [ 14.742660] kunit_try_run_case+0x1a5/0x480 [ 14.742867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.743062] kthread+0x337/0x6f0 [ 14.743360] ret_from_fork+0x41/0x80 [ 14.743552] ret_from_fork_asm+0x1a/0x30 [ 14.743742] [ 14.743836] The buggy address belongs to the object at ffff888102b4cd00 [ 14.743836] which belongs to the cache kmalloc-64 of size 64 [ 14.744365] The buggy address is located 0 bytes to the right of [ 14.744365] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.744871] [ 14.744964] The buggy address belongs to the physical page: [ 14.745184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.745571] flags: 0x200000000000000(node=0|zone=2) [ 14.745791] page_type: f5(slab) [ 14.746011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.746401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.746733] page dumped because: kasan: bad access detected [ 14.746988] [ 14.747080] Memory state around the buggy address: [ 14.747299] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.747619] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.747930] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.748335] ^ [ 14.748489] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.748704] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.749008] ================================================================== [ 14.325006] ================================================================== [ 14.325531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.325806] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.326029] [ 14.326137] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.326182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.326195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.326217] Call Trace: [ 14.326232] <TASK> [ 14.326249] dump_stack_lvl+0x73/0xb0 [ 14.326274] print_report+0xd1/0x650 [ 14.326297] ? __virt_addr_valid+0x1db/0x2d0 [ 14.326320] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.326353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.326377] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.326400] kasan_report+0x141/0x180 [ 14.326424] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.326452] kasan_check_range+0x10c/0x1c0 [ 14.326478] __kasan_check_write+0x18/0x20 [ 14.326499] kasan_atomics_helper+0xb6a/0x5450 [ 14.326523] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.326546] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.326569] ? kasan_atomics+0x152/0x310 [ 14.326593] kasan_atomics+0x1dc/0x310 [ 14.326613] ? __pfx_kasan_atomics+0x10/0x10 [ 14.326635] ? __pfx_read_tsc+0x10/0x10 [ 14.326655] ? ktime_get_ts64+0x86/0x230 [ 14.326681] kunit_try_run_case+0x1a5/0x480 [ 14.326705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.326728] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.326753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.326778] ? __kthread_parkme+0x82/0x180 [ 14.326800] ? preempt_count_sub+0x50/0x80 [ 14.326826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.326850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.326875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.326898] kthread+0x337/0x6f0 [ 14.326919] ? trace_preempt_on+0x20/0xc0 [ 14.326943] ? __pfx_kthread+0x10/0x10 [ 14.326966] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.326989] ? calculate_sigpending+0x7b/0xa0 [ 14.327011] ? __pfx_kthread+0x10/0x10 [ 14.327034] ret_from_fork+0x41/0x80 [ 14.327056] ? __pfx_kthread+0x10/0x10 [ 14.327078] ret_from_fork_asm+0x1a/0x30 [ 14.327110] </TASK> [ 14.327138] [ 14.334992] Allocated by task 285: [ 14.335141] kasan_save_stack+0x45/0x70 [ 14.335357] kasan_save_track+0x18/0x40 [ 14.335550] kasan_save_alloc_info+0x3b/0x50 [ 14.335735] __kasan_kmalloc+0xb7/0xc0 [ 14.335911] __kmalloc_cache_noprof+0x189/0x420 [ 14.336133] kasan_atomics+0x95/0x310 [ 14.336275] kunit_try_run_case+0x1a5/0x480 [ 14.336468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.336729] kthread+0x337/0x6f0 [ 14.336893] ret_from_fork+0x41/0x80 [ 14.337058] ret_from_fork_asm+0x1a/0x30 [ 14.337198] [ 14.337269] The buggy address belongs to the object at ffff888102b4cd00 [ 14.337269] which belongs to the cache kmalloc-64 of size 64 [ 14.337815] The buggy address is located 0 bytes to the right of [ 14.337815] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.338422] [ 14.338492] The buggy address belongs to the physical page: [ 14.338801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.339172] flags: 0x200000000000000(node=0|zone=2) [ 14.339418] page_type: f5(slab) [ 14.339579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.339880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.340170] page dumped because: kasan: bad access detected [ 14.340395] [ 14.340488] Memory state around the buggy address: [ 14.340653] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.340902] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.341223] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.341528] ^ [ 14.341683] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.341900] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.342111] ================================================================== [ 14.236860] ================================================================== [ 14.237136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.237829] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.238232] [ 14.238318] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.238376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.238389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.238704] Call Trace: [ 14.238723] <TASK> [ 14.238741] dump_stack_lvl+0x73/0xb0 [ 14.238768] print_report+0xd1/0x650 [ 14.238792] ? __virt_addr_valid+0x1db/0x2d0 [ 14.238815] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.238838] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.238862] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.238885] kasan_report+0x141/0x180 [ 14.238909] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.238938] kasan_check_range+0x10c/0x1c0 [ 14.238963] __kasan_check_write+0x18/0x20 [ 14.238985] kasan_atomics_helper+0x8f9/0x5450 [ 14.239009] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.239033] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.239056] ? kasan_atomics+0x152/0x310 [ 14.239080] kasan_atomics+0x1dc/0x310 [ 14.239100] ? __pfx_kasan_atomics+0x10/0x10 [ 14.239132] ? __pfx_read_tsc+0x10/0x10 [ 14.239153] ? ktime_get_ts64+0x86/0x230 [ 14.239180] kunit_try_run_case+0x1a5/0x480 [ 14.239204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.239227] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.239251] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.239276] ? __kthread_parkme+0x82/0x180 [ 14.239299] ? preempt_count_sub+0x50/0x80 [ 14.239339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.239364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.239388] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.239413] kthread+0x337/0x6f0 [ 14.239434] ? trace_preempt_on+0x20/0xc0 [ 14.239460] ? __pfx_kthread+0x10/0x10 [ 14.239483] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.239506] ? calculate_sigpending+0x7b/0xa0 [ 14.239528] ? __pfx_kthread+0x10/0x10 [ 14.239552] ret_from_fork+0x41/0x80 [ 14.239575] ? __pfx_kthread+0x10/0x10 [ 14.239598] ret_from_fork_asm+0x1a/0x30 [ 14.239631] </TASK> [ 14.239643] [ 14.249815] Allocated by task 285: [ 14.250106] kasan_save_stack+0x45/0x70 [ 14.250339] kasan_save_track+0x18/0x40 [ 14.250487] kasan_save_alloc_info+0x3b/0x50 [ 14.250707] __kasan_kmalloc+0xb7/0xc0 [ 14.250894] __kmalloc_cache_noprof+0x189/0x420 [ 14.251104] kasan_atomics+0x95/0x310 [ 14.251611] kunit_try_run_case+0x1a5/0x480 [ 14.251795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.252198] kthread+0x337/0x6f0 [ 14.252546] ret_from_fork+0x41/0x80 [ 14.252721] ret_from_fork_asm+0x1a/0x30 [ 14.253025] [ 14.253104] The buggy address belongs to the object at ffff888102b4cd00 [ 14.253104] which belongs to the cache kmalloc-64 of size 64 [ 14.253828] The buggy address is located 0 bytes to the right of [ 14.253828] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.254496] [ 14.254600] The buggy address belongs to the physical page: [ 14.254959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.255392] flags: 0x200000000000000(node=0|zone=2) [ 14.255694] page_type: f5(slab) [ 14.255874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.256371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.256730] page dumped because: kasan: bad access detected [ 14.256972] [ 14.257055] Memory state around the buggy address: [ 14.257525] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.257901] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.258339] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.258717] ^ [ 14.259027] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.259416] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.259750] ================================================================== [ 15.068302] ================================================================== [ 15.068905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.069163] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 15.069782] [ 15.069951] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 15.069994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.070007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.070028] Call Trace: [ 15.070044] <TASK> [ 15.070061] dump_stack_lvl+0x73/0xb0 [ 15.070085] print_report+0xd1/0x650 [ 15.070109] ? __virt_addr_valid+0x1db/0x2d0 [ 15.070131] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.070154] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.070179] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.070202] kasan_report+0x141/0x180 [ 15.070226] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.070254] kasan_check_range+0x10c/0x1c0 [ 15.070279] __kasan_check_write+0x18/0x20 [ 15.070300] kasan_atomics_helper+0x1eaa/0x5450 [ 15.070349] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.070373] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.070397] ? kasan_atomics+0x152/0x310 [ 15.070421] kasan_atomics+0x1dc/0x310 [ 15.070441] ? __pfx_kasan_atomics+0x10/0x10 [ 15.070463] ? __pfx_read_tsc+0x10/0x10 [ 15.070484] ? ktime_get_ts64+0x86/0x230 [ 15.070511] kunit_try_run_case+0x1a5/0x480 [ 15.070536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.070558] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.070584] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.070611] ? __kthread_parkme+0x82/0x180 [ 15.070635] ? preempt_count_sub+0x50/0x80 [ 15.070662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.070688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.070713] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.070738] kthread+0x337/0x6f0 [ 15.070760] ? trace_preempt_on+0x20/0xc0 [ 15.070784] ? __pfx_kthread+0x10/0x10 [ 15.070807] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.070830] ? calculate_sigpending+0x7b/0xa0 [ 15.070853] ? __pfx_kthread+0x10/0x10 [ 15.070878] ret_from_fork+0x41/0x80 [ 15.070900] ? __pfx_kthread+0x10/0x10 [ 15.070923] ret_from_fork_asm+0x1a/0x30 [ 15.070956] </TASK> [ 15.070966] [ 15.080733] Allocated by task 285: [ 15.080885] kasan_save_stack+0x45/0x70 [ 15.081076] kasan_save_track+0x18/0x40 [ 15.081313] kasan_save_alloc_info+0x3b/0x50 [ 15.081488] __kasan_kmalloc+0xb7/0xc0 [ 15.081679] __kmalloc_cache_noprof+0x189/0x420 [ 15.081863] kasan_atomics+0x95/0x310 [ 15.082041] kunit_try_run_case+0x1a5/0x480 [ 15.082249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.082559] kthread+0x337/0x6f0 [ 15.082730] ret_from_fork+0x41/0x80 [ 15.082871] ret_from_fork_asm+0x1a/0x30 [ 15.083011] [ 15.083083] The buggy address belongs to the object at ffff888102b4cd00 [ 15.083083] which belongs to the cache kmalloc-64 of size 64 [ 15.083515] The buggy address is located 0 bytes to the right of [ 15.083515] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 15.084049] [ 15.084133] The buggy address belongs to the physical page: [ 15.084342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 15.084587] flags: 0x200000000000000(node=0|zone=2) [ 15.084803] page_type: f5(slab) [ 15.084970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.085381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.085739] page dumped because: kasan: bad access detected [ 15.085912] [ 15.085981] Memory state around the buggy address: [ 15.086133] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.086354] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.086905] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.087320] ^ [ 15.087556] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.087875] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.088204] ================================================================== [ 14.667780] ================================================================== [ 14.668296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.668842] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.669089] [ 14.669230] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.669274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.669288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.669308] Call Trace: [ 14.669335] <TASK> [ 14.669350] dump_stack_lvl+0x73/0xb0 [ 14.669376] print_report+0xd1/0x650 [ 14.669401] ? __virt_addr_valid+0x1db/0x2d0 [ 14.669423] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.669457] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.669481] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.669504] kasan_report+0x141/0x180 [ 14.669529] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.669557] kasan_check_range+0x10c/0x1c0 [ 14.669583] __kasan_check_read+0x15/0x20 [ 14.669604] kasan_atomics_helper+0x13b5/0x5450 [ 14.669629] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.669652] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.669676] ? kasan_atomics+0x152/0x310 [ 14.669700] kasan_atomics+0x1dc/0x310 [ 14.669721] ? __pfx_kasan_atomics+0x10/0x10 [ 14.669743] ? __pfx_read_tsc+0x10/0x10 [ 14.669763] ? ktime_get_ts64+0x86/0x230 [ 14.669796] kunit_try_run_case+0x1a5/0x480 [ 14.669821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.669845] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.669870] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.669895] ? __kthread_parkme+0x82/0x180 [ 14.669917] ? preempt_count_sub+0x50/0x80 [ 14.669943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.669967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.669990] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.670014] kthread+0x337/0x6f0 [ 14.670036] ? trace_preempt_on+0x20/0xc0 [ 14.670059] ? __pfx_kthread+0x10/0x10 [ 14.670082] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.670104] ? calculate_sigpending+0x7b/0xa0 [ 14.670127] ? __pfx_kthread+0x10/0x10 [ 14.670151] ret_from_fork+0x41/0x80 [ 14.670173] ? __pfx_kthread+0x10/0x10 [ 14.670195] ret_from_fork_asm+0x1a/0x30 [ 14.670229] </TASK> [ 14.670239] [ 14.681125] Allocated by task 285: [ 14.682256] kasan_save_stack+0x45/0x70 [ 14.682486] kasan_save_track+0x18/0x40 [ 14.683232] kasan_save_alloc_info+0x3b/0x50 [ 14.683408] __kasan_kmalloc+0xb7/0xc0 [ 14.683546] __kmalloc_cache_noprof+0x189/0x420 [ 14.683702] kasan_atomics+0x95/0x310 [ 14.683833] kunit_try_run_case+0x1a5/0x480 [ 14.683983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.684167] kthread+0x337/0x6f0 [ 14.684291] ret_from_fork+0x41/0x80 [ 14.685316] ret_from_fork_asm+0x1a/0x30 [ 14.685558] [ 14.685660] The buggy address belongs to the object at ffff888102b4cd00 [ 14.685660] which belongs to the cache kmalloc-64 of size 64 [ 14.686386] The buggy address is located 0 bytes to the right of [ 14.686386] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.686925] [ 14.687024] The buggy address belongs to the physical page: [ 14.687838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.688188] flags: 0x200000000000000(node=0|zone=2) [ 14.688403] page_type: f5(slab) [ 14.688678] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.688951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.689313] page dumped because: kasan: bad access detected [ 14.689576] [ 14.689662] Memory state around the buggy address: [ 14.689856] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.690157] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.690410] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.690723] ^ [ 14.690874] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.691245] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.691548] ================================================================== [ 14.846742] ================================================================== [ 14.847105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.847405] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285 [ 14.847765] [ 14.847888] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 14.847930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.847943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.847965] Call Trace: [ 14.847981] <TASK> [ 14.847997] dump_stack_lvl+0x73/0xb0 [ 14.848022] print_report+0xd1/0x650 [ 14.848045] ? __virt_addr_valid+0x1db/0x2d0 [ 14.848068] ? kasan_atomics_helper+0x1818/0x5450 [ 14.848091] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.848115] ? kasan_atomics_helper+0x1818/0x5450 [ 14.848138] kasan_report+0x141/0x180 [ 14.848162] ? kasan_atomics_helper+0x1818/0x5450 [ 14.848191] kasan_check_range+0x10c/0x1c0 [ 14.848217] __kasan_check_write+0x18/0x20 [ 14.848239] kasan_atomics_helper+0x1818/0x5450 [ 14.848263] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.848305] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.848340] ? kasan_atomics+0x152/0x310 [ 14.848366] kasan_atomics+0x1dc/0x310 [ 14.848387] ? __pfx_kasan_atomics+0x10/0x10 [ 14.848409] ? __pfx_read_tsc+0x10/0x10 [ 14.848429] ? ktime_get_ts64+0x86/0x230 [ 14.848456] kunit_try_run_case+0x1a5/0x480 [ 14.848481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.848503] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.848545] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.848570] ? __kthread_parkme+0x82/0x180 [ 14.848605] ? preempt_count_sub+0x50/0x80 [ 14.848645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.848681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.848731] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.848768] kthread+0x337/0x6f0 [ 14.848803] ? trace_preempt_on+0x20/0xc0 [ 14.848853] ? __pfx_kthread+0x10/0x10 [ 14.848876] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.848899] ? calculate_sigpending+0x7b/0xa0 [ 14.848921] ? __pfx_kthread+0x10/0x10 [ 14.848945] ret_from_fork+0x41/0x80 [ 14.848966] ? __pfx_kthread+0x10/0x10 [ 14.848989] ret_from_fork_asm+0x1a/0x30 [ 14.849021] </TASK> [ 14.849033] [ 14.857076] Allocated by task 285: [ 14.857265] kasan_save_stack+0x45/0x70 [ 14.857537] kasan_save_track+0x18/0x40 [ 14.857796] kasan_save_alloc_info+0x3b/0x50 [ 14.858001] __kasan_kmalloc+0xb7/0xc0 [ 14.858186] __kmalloc_cache_noprof+0x189/0x420 [ 14.858412] kasan_atomics+0x95/0x310 [ 14.858595] kunit_try_run_case+0x1a5/0x480 [ 14.858869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.859041] kthread+0x337/0x6f0 [ 14.859163] ret_from_fork+0x41/0x80 [ 14.859291] ret_from_fork_asm+0x1a/0x30 [ 14.859719] [ 14.859817] The buggy address belongs to the object at ffff888102b4cd00 [ 14.859817] which belongs to the cache kmalloc-64 of size 64 [ 14.860568] The buggy address is located 0 bytes to the right of [ 14.860568] allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30) [ 14.860935] [ 14.861007] The buggy address belongs to the physical page: [ 14.861179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c [ 14.861541] flags: 0x200000000000000(node=0|zone=2) [ 14.861950] page_type: f5(slab) [ 14.862117] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.862725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.862978] page dumped because: kasan: bad access detected [ 14.863201] [ 14.863294] Memory state around the buggy address: [ 14.863551] ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.863893] ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.864285] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.864554] ^ [ 14.864710] ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.864929] ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.865229] ==================================================================
[ 25.394621] ================================================================== [ 25.395259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 25.395913] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.396566] [ 25.396704] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.396718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.396723] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.396728] Call trace: [ 25.396731] show_stack+0x20/0x38 (C) [ 25.396741] dump_stack_lvl+0x8c/0xd0 [ 25.396749] print_report+0x118/0x608 [ 25.396758] kasan_report+0xdc/0x128 [ 25.396766] kasan_check_range+0x100/0x1a8 [ 25.396776] __kasan_check_write+0x20/0x30 [ 25.396786] kasan_atomics_helper+0x15b4/0x4858 [ 25.396794] kasan_atomics+0x198/0x2e0 [ 25.396802] kunit_try_run_case+0x170/0x3f0 [ 25.396812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.396824] kthread+0x328/0x630 [ 25.396834] ret_from_fork+0x10/0x20 [ 25.396843] [ 25.402973] Allocated by task 319: [ 25.403278] kasan_save_stack+0x3c/0x68 [ 25.403623] kasan_save_track+0x20/0x40 [ 25.403967] kasan_save_alloc_info+0x40/0x58 [ 25.404350] __kasan_kmalloc+0xd4/0xd8 [ 25.404687] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.405093] kasan_atomics+0xb8/0x2e0 [ 25.405423] kunit_try_run_case+0x170/0x3f0 [ 25.405799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.406290] kthread+0x328/0x630 [ 25.406583] ret_from_fork+0x10/0x20 [ 25.406905] [ 25.407042] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.407042] which belongs to the cache kmalloc-64 of size 64 [ 25.408125] The buggy address is located 0 bytes to the right of [ 25.408125] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.409254] [ 25.409391] The buggy address belongs to the physical page: [ 25.409882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.410574] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.411153] page_type: f5(slab) [ 25.411437] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.412122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.412803] page dumped because: kasan: bad access detected [ 25.413295] [ 25.413432] Memory state around the buggy address: [ 25.413858] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.414494] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.415133] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.415769] ^ [ 25.416193] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.416830] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.417467] ================================================================== [ 24.312695] ================================================================== [ 24.313350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 24.314015] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.314684] [ 24.314835] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.314867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.314877] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.314887] Call trace: [ 24.314895] show_stack+0x20/0x38 (C) [ 24.314915] dump_stack_lvl+0x8c/0xd0 [ 24.314934] print_report+0x118/0x608 [ 24.314953] kasan_report+0xdc/0x128 [ 24.314972] kasan_check_range+0x100/0x1a8 [ 24.314993] __kasan_check_write+0x20/0x30 [ 24.315014] kasan_atomics_helper+0x47c/0x4858 [ 24.315033] kasan_atomics+0x198/0x2e0 [ 24.315050] kunit_try_run_case+0x170/0x3f0 [ 24.315074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.315099] kthread+0x328/0x630 [ 24.315121] ret_from_fork+0x10/0x20 [ 24.315141] [ 24.321319] Allocated by task 319: [ 24.321635] kasan_save_stack+0x3c/0x68 [ 24.321994] kasan_save_track+0x20/0x40 [ 24.322353] kasan_save_alloc_info+0x40/0x58 [ 24.322752] __kasan_kmalloc+0xd4/0xd8 [ 24.323104] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.323529] kasan_atomics+0xb8/0x2e0 [ 24.323871] kunit_try_run_case+0x170/0x3f0 [ 24.324262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.324771] kthread+0x328/0x630 [ 24.325080] ret_from_fork+0x10/0x20 [ 24.325418] [ 24.325565] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.325565] which belongs to the cache kmalloc-64 of size 64 [ 24.326666] The buggy address is located 0 bytes to the right of [ 24.326666] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.327815] [ 24.327962] The buggy address belongs to the physical page: [ 24.328466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.329173] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.329767] page_type: f5(slab) [ 24.330064] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.330765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.331461] page dumped because: kasan: bad access detected [ 24.331965] [ 24.332111] Memory state around the buggy address: [ 24.332547] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.333199] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.333853] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.334502] ^ [ 24.334940] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.335593] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.336243] ================================================================== [ 24.093589] ================================================================== [ 24.094262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 24.094966] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.095642] [ 24.095798] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.095836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.095847] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.095860] Call trace: [ 24.095870] show_stack+0x20/0x38 (C) [ 24.095894] dump_stack_lvl+0x8c/0xd0 [ 24.095919] print_report+0x118/0x608 [ 24.095941] kasan_report+0xdc/0x128 [ 24.095962] __asan_report_store4_noabort+0x20/0x30 [ 24.095988] kasan_atomics_helper+0x3f7c/0x4858 [ 24.096009] kasan_atomics+0x198/0x2e0 [ 24.096029] kunit_try_run_case+0x170/0x3f0 [ 24.096055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.096085] kthread+0x328/0x630 [ 24.096110] ret_from_fork+0x10/0x20 [ 24.096133] [ 24.102042] Allocated by task 319: [ 24.102362] kasan_save_stack+0x3c/0x68 [ 24.102724] kasan_save_track+0x20/0x40 [ 24.103085] kasan_save_alloc_info+0x40/0x58 [ 24.103487] __kasan_kmalloc+0xd4/0xd8 [ 24.103840] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.104270] kasan_atomics+0xb8/0x2e0 [ 24.104614] kunit_try_run_case+0x170/0x3f0 [ 24.105009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.105520] kthread+0x328/0x630 [ 24.105832] ret_from_fork+0x10/0x20 [ 24.106172] [ 24.106320] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.106320] which belongs to the cache kmalloc-64 of size 64 [ 24.107426] The buggy address is located 0 bytes to the right of [ 24.107426] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.108578] [ 24.108727] The buggy address belongs to the physical page: [ 24.109234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.109948] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.110548] page_type: f5(slab) [ 24.110851] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.111555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.112253] page dumped because: kasan: bad access detected [ 24.112760] [ 24.112907] Memory state around the buggy address: [ 24.113347] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.114001] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.114657] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.115308] ^ [ 24.115747] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.116403] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.117055] ================================================================== [ 24.621648] ================================================================== [ 24.622285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 24.622930] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.623584] [ 24.623723] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.623737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.623742] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.623747] Call trace: [ 24.623750] show_stack+0x20/0x38 (C) [ 24.623760] dump_stack_lvl+0x8c/0xd0 [ 24.623768] print_report+0x118/0x608 [ 24.623777] kasan_report+0xdc/0x128 [ 24.623786] kasan_check_range+0x100/0x1a8 [ 24.623795] __kasan_check_write+0x20/0x30 [ 24.623805] kasan_atomics_helper+0xa04/0x4858 [ 24.623814] kasan_atomics+0x198/0x2e0 [ 24.623821] kunit_try_run_case+0x170/0x3f0 [ 24.623832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.623843] kthread+0x328/0x630 [ 24.623854] ret_from_fork+0x10/0x20 [ 24.623863] [ 24.629986] Allocated by task 319: [ 24.630291] kasan_save_stack+0x3c/0x68 [ 24.630635] kasan_save_track+0x20/0x40 [ 24.630979] kasan_save_alloc_info+0x40/0x58 [ 24.631362] __kasan_kmalloc+0xd4/0xd8 [ 24.631699] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.632106] kasan_atomics+0xb8/0x2e0 [ 24.632435] kunit_try_run_case+0x170/0x3f0 [ 24.632811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.633302] kthread+0x328/0x630 [ 24.633594] ret_from_fork+0x10/0x20 [ 24.633916] [ 24.634053] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.634053] which belongs to the cache kmalloc-64 of size 64 [ 24.635136] The buggy address is located 0 bytes to the right of [ 24.635136] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.636265] [ 24.636402] The buggy address belongs to the physical page: [ 24.636893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.637585] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.638164] page_type: f5(slab) [ 24.638447] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.639131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.639813] page dumped because: kasan: bad access detected [ 24.640305] [ 24.640442] Memory state around the buggy address: [ 24.640867] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.641506] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.642143] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.642778] ^ [ 24.643203] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.643839] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.644475] ================================================================== [ 24.855414] ================================================================== [ 24.856052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 24.856698] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.857352] [ 24.857490] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.857504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.857508] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.857513] Call trace: [ 24.857516] show_stack+0x20/0x38 (C) [ 24.857526] dump_stack_lvl+0x8c/0xd0 [ 24.857534] print_report+0x118/0x608 [ 24.857543] kasan_report+0xdc/0x128 [ 24.857552] kasan_check_range+0x100/0x1a8 [ 24.857561] __kasan_check_write+0x20/0x30 [ 24.857570] kasan_atomics_helper+0xd3c/0x4858 [ 24.857579] kasan_atomics+0x198/0x2e0 [ 24.857587] kunit_try_run_case+0x170/0x3f0 [ 24.857597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.857609] kthread+0x328/0x630 [ 24.857618] ret_from_fork+0x10/0x20 [ 24.857627] [ 24.863746] Allocated by task 319: [ 24.864051] kasan_save_stack+0x3c/0x68 [ 24.864396] kasan_save_track+0x20/0x40 [ 24.864740] kasan_save_alloc_info+0x40/0x58 [ 24.865123] __kasan_kmalloc+0xd4/0xd8 [ 24.865460] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.865867] kasan_atomics+0xb8/0x2e0 [ 24.866195] kunit_try_run_case+0x170/0x3f0 [ 24.866572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.867063] kthread+0x328/0x630 [ 24.867357] ret_from_fork+0x10/0x20 [ 24.867679] [ 24.867816] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.867816] which belongs to the cache kmalloc-64 of size 64 [ 24.868898] The buggy address is located 0 bytes to the right of [ 24.868898] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.870028] [ 24.870165] The buggy address belongs to the physical page: [ 24.870657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.871349] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.871927] page_type: f5(slab) [ 24.872210] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.872894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.873576] page dumped because: kasan: bad access detected [ 24.874068] [ 24.874206] Memory state around the buggy address: [ 24.874632] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.875268] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.875905] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.876541] ^ [ 24.876967] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.877604] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.878241] ================================================================== [ 24.215679] ================================================================== [ 24.216334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 24.216996] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.217666] [ 24.217816] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.217849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.217859] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.217869] Call trace: [ 24.217877] show_stack+0x20/0x38 (C) [ 24.217897] dump_stack_lvl+0x8c/0xd0 [ 24.217916] print_report+0x118/0x608 [ 24.217935] kasan_report+0xdc/0x128 [ 24.217954] kasan_check_range+0x100/0x1a8 [ 24.217975] __kasan_check_write+0x20/0x30 [ 24.217996] kasan_atomics_helper+0x32c/0x4858 [ 24.218015] kasan_atomics+0x198/0x2e0 [ 24.218033] kunit_try_run_case+0x170/0x3f0 [ 24.218056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.218082] kthread+0x328/0x630 [ 24.218104] ret_from_fork+0x10/0x20 [ 24.218124] [ 24.224311] Allocated by task 319: [ 24.224626] kasan_save_stack+0x3c/0x68 [ 24.224986] kasan_save_track+0x20/0x40 [ 24.225344] kasan_save_alloc_info+0x40/0x58 [ 24.225744] __kasan_kmalloc+0xd4/0xd8 [ 24.226095] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.226520] kasan_atomics+0xb8/0x2e0 [ 24.226863] kunit_try_run_case+0x170/0x3f0 [ 24.227256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.227764] kthread+0x328/0x630 [ 24.228073] ret_from_fork+0x10/0x20 [ 24.228412] [ 24.228557] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.228557] which belongs to the cache kmalloc-64 of size 64 [ 24.229658] The buggy address is located 0 bytes to the right of [ 24.229658] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.230807] [ 24.230954] The buggy address belongs to the physical page: [ 24.231457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.232166] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.232760] page_type: f5(slab) [ 24.233058] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.233758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.234453] page dumped because: kasan: bad access detected [ 24.234957] [ 24.235102] Memory state around the buggy address: [ 24.235539] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.236192] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.236844] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.237494] ^ [ 24.237933] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.238585] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.239234] ================================================================== [ 24.692137] ================================================================== [ 24.692775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 24.693428] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.694074] [ 24.694213] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.694227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.694231] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.694236] Call trace: [ 24.694239] show_stack+0x20/0x38 (C) [ 24.694249] dump_stack_lvl+0x8c/0xd0 [ 24.694257] print_report+0x118/0x608 [ 24.694266] kasan_report+0xdc/0x128 [ 24.694274] __asan_report_load4_noabort+0x20/0x30 [ 24.694285] kasan_atomics_helper+0x3dcc/0x4858 [ 24.694293] kasan_atomics+0x198/0x2e0 [ 24.694301] kunit_try_run_case+0x170/0x3f0 [ 24.694311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.694323] kthread+0x328/0x630 [ 24.694333] ret_from_fork+0x10/0x20 [ 24.694342] [ 24.700168] Allocated by task 319: [ 24.700473] kasan_save_stack+0x3c/0x68 [ 24.700818] kasan_save_track+0x20/0x40 [ 24.701162] kasan_save_alloc_info+0x40/0x58 [ 24.701545] __kasan_kmalloc+0xd4/0xd8 [ 24.701883] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.702290] kasan_atomics+0xb8/0x2e0 [ 24.702618] kunit_try_run_case+0x170/0x3f0 [ 24.702994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.703485] kthread+0x328/0x630 [ 24.703778] ret_from_fork+0x10/0x20 [ 24.704100] [ 24.704237] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.704237] which belongs to the cache kmalloc-64 of size 64 [ 24.705320] The buggy address is located 0 bytes to the right of [ 24.705320] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.706450] [ 24.706588] The buggy address belongs to the physical page: [ 24.707080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.707770] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.708348] page_type: f5(slab) [ 24.708631] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.709315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.709997] page dumped because: kasan: bad access detected [ 24.710489] [ 24.710626] Memory state around the buggy address: [ 24.711051] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.711688] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.712326] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.712963] ^ [ 24.713389] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.714028] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.714663] ================================================================== [ 24.167190] ================================================================== [ 24.167846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 24.168511] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.169174] [ 24.169323] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.169356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.169367] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.169378] Call trace: [ 24.169385] show_stack+0x20/0x38 (C) [ 24.169406] dump_stack_lvl+0x8c/0xd0 [ 24.169426] print_report+0x118/0x608 [ 24.169445] kasan_report+0xdc/0x128 [ 24.169464] kasan_check_range+0x100/0x1a8 [ 24.169484] __kasan_check_read+0x20/0x30 [ 24.169507] kasan_atomics_helper+0x2b0/0x4858 [ 24.169526] kasan_atomics+0x198/0x2e0 [ 24.169543] kunit_try_run_case+0x170/0x3f0 [ 24.169566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.169592] kthread+0x328/0x630 [ 24.169613] ret_from_fork+0x10/0x20 [ 24.169633] [ 24.175809] Allocated by task 319: [ 24.176125] kasan_save_stack+0x3c/0x68 [ 24.176484] kasan_save_track+0x20/0x40 [ 24.176844] kasan_save_alloc_info+0x40/0x58 [ 24.177243] __kasan_kmalloc+0xd4/0xd8 [ 24.177595] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.178020] kasan_atomics+0xb8/0x2e0 [ 24.178362] kunit_try_run_case+0x170/0x3f0 [ 24.178755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.179265] kthread+0x328/0x630 [ 24.179574] ret_from_fork+0x10/0x20 [ 24.179911] [ 24.180057] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.180057] which belongs to the cache kmalloc-64 of size 64 [ 24.181159] The buggy address is located 0 bytes to the right of [ 24.181159] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.182308] [ 24.182454] The buggy address belongs to the physical page: [ 24.182957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.183665] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.184261] page_type: f5(slab) [ 24.184560] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.185260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.185955] page dumped because: kasan: bad access detected [ 24.186459] [ 24.186604] Memory state around the buggy address: [ 24.187042] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.187695] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.188347] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.188996] ^ [ 24.189435] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.190089] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.190738] ================================================================== [ 24.668645] ================================================================== [ 24.669282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 24.669928] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.670582] [ 24.670721] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.670735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.670740] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.670745] Call trace: [ 24.670748] show_stack+0x20/0x38 (C) [ 24.670757] dump_stack_lvl+0x8c/0xd0 [ 24.670766] print_report+0x118/0x608 [ 24.670775] kasan_report+0xdc/0x128 [ 24.670783] kasan_check_range+0x100/0x1a8 [ 24.670794] __kasan_check_write+0x20/0x30 [ 24.670804] kasan_atomics_helper+0xad4/0x4858 [ 24.670813] kasan_atomics+0x198/0x2e0 [ 24.670820] kunit_try_run_case+0x170/0x3f0 [ 24.670831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.670843] kthread+0x328/0x630 [ 24.670853] ret_from_fork+0x10/0x20 [ 24.670863] [ 24.676988] Allocated by task 319: [ 24.677293] kasan_save_stack+0x3c/0x68 [ 24.677637] kasan_save_track+0x20/0x40 [ 24.677980] kasan_save_alloc_info+0x40/0x58 [ 24.678363] __kasan_kmalloc+0xd4/0xd8 [ 24.678701] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.679108] kasan_atomics+0xb8/0x2e0 [ 24.679437] kunit_try_run_case+0x170/0x3f0 [ 24.679814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.680303] kthread+0x328/0x630 [ 24.680596] ret_from_fork+0x10/0x20 [ 24.680918] [ 24.681055] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.681055] which belongs to the cache kmalloc-64 of size 64 [ 24.682137] The buggy address is located 0 bytes to the right of [ 24.682137] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.683267] [ 24.683405] The buggy address belongs to the physical page: [ 24.683897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.684589] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.685168] page_type: f5(slab) [ 24.685453] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.686137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.686818] page dumped because: kasan: bad access detected [ 24.687310] [ 24.687447] Memory state around the buggy address: [ 24.687871] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.688508] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.689144] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.689781] ^ [ 24.690208] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.690844] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.691480] ================================================================== [ 24.738801] ================================================================== [ 24.739438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 24.740092] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.740737] [ 24.740875] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.740890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.740894] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.740899] Call trace: [ 24.740902] show_stack+0x20/0x38 (C) [ 24.740911] dump_stack_lvl+0x8c/0xd0 [ 24.740920] print_report+0x118/0x608 [ 24.740929] kasan_report+0xdc/0x128 [ 24.740937] __asan_report_load4_noabort+0x20/0x30 [ 24.740947] kasan_atomics_helper+0x3dbc/0x4858 [ 24.740956] kasan_atomics+0x198/0x2e0 [ 24.740964] kunit_try_run_case+0x170/0x3f0 [ 24.740974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.740985] kthread+0x328/0x630 [ 24.740995] ret_from_fork+0x10/0x20 [ 24.741005] [ 24.746837] Allocated by task 319: [ 24.747142] kasan_save_stack+0x3c/0x68 [ 24.747486] kasan_save_track+0x20/0x40 [ 24.747830] kasan_save_alloc_info+0x40/0x58 [ 24.748213] __kasan_kmalloc+0xd4/0xd8 [ 24.748550] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.748958] kasan_atomics+0xb8/0x2e0 [ 24.749287] kunit_try_run_case+0x170/0x3f0 [ 24.749663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.750153] kthread+0x328/0x630 [ 24.750446] ret_from_fork+0x10/0x20 [ 24.750768] [ 24.750905] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.750905] which belongs to the cache kmalloc-64 of size 64 [ 24.751987] The buggy address is located 0 bytes to the right of [ 24.751987] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.753117] [ 24.753254] The buggy address belongs to the physical page: [ 24.753747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.754439] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.755017] page_type: f5(slab) [ 24.755302] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.755986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.756668] page dumped because: kasan: bad access detected [ 24.757160] [ 24.757296] Memory state around the buggy address: [ 24.757721] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.758358] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.758996] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.759633] ^ [ 24.760059] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.760696] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.761332] ================================================================== [ 24.808673] ================================================================== [ 24.809310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 24.809956] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.810610] [ 24.810748] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.810762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.810767] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.810771] Call trace: [ 24.810775] show_stack+0x20/0x38 (C) [ 24.810785] dump_stack_lvl+0x8c/0xd0 [ 24.810793] print_report+0x118/0x608 [ 24.810801] kasan_report+0xdc/0x128 [ 24.810810] kasan_check_range+0x100/0x1a8 [ 24.810819] __kasan_check_write+0x20/0x30 [ 24.810829] kasan_atomics_helper+0xca0/0x4858 [ 24.810838] kasan_atomics+0x198/0x2e0 [ 24.810845] kunit_try_run_case+0x170/0x3f0 [ 24.810856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.810867] kthread+0x328/0x630 [ 24.810877] ret_from_fork+0x10/0x20 [ 24.810887] [ 24.817010] Allocated by task 319: [ 24.817315] kasan_save_stack+0x3c/0x68 [ 24.817660] kasan_save_track+0x20/0x40 [ 24.818006] kasan_save_alloc_info+0x40/0x58 [ 24.818389] __kasan_kmalloc+0xd4/0xd8 [ 24.818726] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.819134] kasan_atomics+0xb8/0x2e0 [ 24.819463] kunit_try_run_case+0x170/0x3f0 [ 24.819840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.820331] kthread+0x328/0x630 [ 24.820623] ret_from_fork+0x10/0x20 [ 24.820946] [ 24.821082] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.821082] which belongs to the cache kmalloc-64 of size 64 [ 24.822165] The buggy address is located 0 bytes to the right of [ 24.822165] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.823294] [ 24.823433] The buggy address belongs to the physical page: [ 24.823924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.824617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.825195] page_type: f5(slab) [ 24.825480] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.826163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.826845] page dumped because: kasan: bad access detected [ 24.827337] [ 24.827474] Memory state around the buggy address: [ 24.827899] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.828537] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.829174] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.829810] ^ [ 24.830236] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.830873] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.831509] ================================================================== [ 24.925584] ================================================================== [ 24.926222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 24.926876] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.927521] [ 24.927659] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.927674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.927678] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.927683] Call trace: [ 24.927687] show_stack+0x20/0x38 (C) [ 24.927696] dump_stack_lvl+0x8c/0xd0 [ 24.927705] print_report+0x118/0x608 [ 24.927713] kasan_report+0xdc/0x128 [ 24.927722] __asan_report_load8_noabort+0x20/0x30 [ 24.927733] kasan_atomics_helper+0x3f58/0x4858 [ 24.927741] kasan_atomics+0x198/0x2e0 [ 24.927749] kunit_try_run_case+0x170/0x3f0 [ 24.927760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.927771] kthread+0x328/0x630 [ 24.927782] ret_from_fork+0x10/0x20 [ 24.927791] [ 24.933618] Allocated by task 319: [ 24.933921] kasan_save_stack+0x3c/0x68 [ 24.934265] kasan_save_track+0x20/0x40 [ 24.934609] kasan_save_alloc_info+0x40/0x58 [ 24.934992] __kasan_kmalloc+0xd4/0xd8 [ 24.935328] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.935735] kasan_atomics+0xb8/0x2e0 [ 24.936064] kunit_try_run_case+0x170/0x3f0 [ 24.936441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.936932] kthread+0x328/0x630 [ 24.937225] ret_from_fork+0x10/0x20 [ 24.937547] [ 24.937685] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.937685] which belongs to the cache kmalloc-64 of size 64 [ 24.938768] The buggy address is located 0 bytes to the right of [ 24.938768] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.939897] [ 24.940036] The buggy address belongs to the physical page: [ 24.940528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.941218] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.941797] page_type: f5(slab) [ 24.942082] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.942766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.943448] page dumped because: kasan: bad access detected [ 24.943940] [ 24.944076] Memory state around the buggy address: [ 24.944502] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.945138] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.945775] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.946411] ^ [ 24.946837] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.947476] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.948111] ================================================================== [ 24.480221] ================================================================== [ 24.480866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 24.481518] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.482178] [ 24.482321] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.482342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.482349] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.482356] Call trace: [ 24.482361] show_stack+0x20/0x38 (C) [ 24.482375] dump_stack_lvl+0x8c/0xd0 [ 24.482387] print_report+0x118/0x608 [ 24.482401] kasan_report+0xdc/0x128 [ 24.482414] kasan_check_range+0x100/0x1a8 [ 24.482428] __kasan_check_write+0x20/0x30 [ 24.482443] kasan_atomics_helper+0x760/0x4858 [ 24.482456] kasan_atomics+0x198/0x2e0 [ 24.482468] kunit_try_run_case+0x170/0x3f0 [ 24.482484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.482502] kthread+0x328/0x630 [ 24.482516] ret_from_fork+0x10/0x20 [ 24.482530] [ 24.488678] Allocated by task 319: [ 24.488986] kasan_save_stack+0x3c/0x68 [ 24.489338] kasan_save_track+0x20/0x40 [ 24.489688] kasan_save_alloc_info+0x40/0x58 [ 24.490079] __kasan_kmalloc+0xd4/0xd8 [ 24.490422] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.490836] kasan_atomics+0xb8/0x2e0 [ 24.491171] kunit_try_run_case+0x170/0x3f0 [ 24.491554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.492051] kthread+0x328/0x630 [ 24.492351] ret_from_fork+0x10/0x20 [ 24.492679] [ 24.492819] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.492819] which belongs to the cache kmalloc-64 of size 64 [ 24.493909] The buggy address is located 0 bytes to the right of [ 24.493909] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.495046] [ 24.495187] The buggy address belongs to the physical page: [ 24.495684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.496382] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.496968] page_type: f5(slab) [ 24.497257] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.497947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.498634] page dumped because: kasan: bad access detected [ 24.499131] [ 24.499272] Memory state around the buggy address: [ 24.499702] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.500345] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.500988] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.501630] ^ [ 24.502060] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.502703] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.503345] ================================================================== [ 24.504064] ================================================================== [ 24.504709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 24.505362] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.506022] [ 24.506166] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.506188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.506195] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.506202] Call trace: [ 24.506207] show_stack+0x20/0x38 (C) [ 24.506221] dump_stack_lvl+0x8c/0xd0 [ 24.506233] print_report+0x118/0x608 [ 24.506247] kasan_report+0xdc/0x128 [ 24.506260] kasan_check_range+0x100/0x1a8 [ 24.506274] __kasan_check_write+0x20/0x30 [ 24.506289] kasan_atomics_helper+0x7cc/0x4858 [ 24.506302] kasan_atomics+0x198/0x2e0 [ 24.506313] kunit_try_run_case+0x170/0x3f0 [ 24.506329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.506347] kthread+0x328/0x630 [ 24.506361] ret_from_fork+0x10/0x20 [ 24.506376] [ 24.512522] Allocated by task 319: [ 24.512831] kasan_save_stack+0x3c/0x68 [ 24.513182] kasan_save_track+0x20/0x40 [ 24.513533] kasan_save_alloc_info+0x40/0x58 [ 24.513923] __kasan_kmalloc+0xd4/0xd8 [ 24.514265] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.514680] kasan_atomics+0xb8/0x2e0 [ 24.515014] kunit_try_run_case+0x170/0x3f0 [ 24.515397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.515895] kthread+0x328/0x630 [ 24.516194] ret_from_fork+0x10/0x20 [ 24.516522] [ 24.516663] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.516663] which belongs to the cache kmalloc-64 of size 64 [ 24.517752] The buggy address is located 0 bytes to the right of [ 24.517752] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.518889] [ 24.519030] The buggy address belongs to the physical page: [ 24.519527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.520226] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.520811] page_type: f5(slab) [ 24.521101] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.521791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.522477] page dumped because: kasan: bad access detected [ 24.522975] [ 24.523115] Memory state around the buggy address: [ 24.523544] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.524188] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.524831] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.525473] ^ [ 24.525904] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.526547] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.527189] ================================================================== [ 24.240009] ================================================================== [ 24.240663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 24.241332] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.242002] [ 24.242151] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.242183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.242193] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.242203] Call trace: [ 24.242210] show_stack+0x20/0x38 (C) [ 24.242231] dump_stack_lvl+0x8c/0xd0 [ 24.242249] print_report+0x118/0x608 [ 24.242269] kasan_report+0xdc/0x128 [ 24.242287] __asan_report_store4_noabort+0x20/0x30 [ 24.242311] kasan_atomics_helper+0x3f94/0x4858 [ 24.242330] kasan_atomics+0x198/0x2e0 [ 24.242347] kunit_try_run_case+0x170/0x3f0 [ 24.242371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.242396] kthread+0x328/0x630 [ 24.242418] ret_from_fork+0x10/0x20 [ 24.242438] [ 24.248336] Allocated by task 319: [ 24.248652] kasan_save_stack+0x3c/0x68 [ 24.249011] kasan_save_track+0x20/0x40 [ 24.249370] kasan_save_alloc_info+0x40/0x58 [ 24.249769] __kasan_kmalloc+0xd4/0xd8 [ 24.250119] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.250544] kasan_atomics+0xb8/0x2e0 [ 24.250887] kunit_try_run_case+0x170/0x3f0 [ 24.251280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.251788] kthread+0x328/0x630 [ 24.252098] ret_from_fork+0x10/0x20 [ 24.252435] [ 24.252582] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.252582] which belongs to the cache kmalloc-64 of size 64 [ 24.253683] The buggy address is located 0 bytes to the right of [ 24.253683] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.254832] [ 24.254978] The buggy address belongs to the physical page: [ 24.255481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.256189] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.256782] page_type: f5(slab) [ 24.257080] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.257780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.258476] page dumped because: kasan: bad access detected [ 24.258979] [ 24.259125] Memory state around the buggy address: [ 24.259562] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.260214] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.260867] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.261517] ^ [ 24.261954] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.262606] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.263255] ================================================================== [ 24.598157] ================================================================== [ 24.598794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 24.599440] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.600094] [ 24.600233] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.600248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.600252] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.600257] Call trace: [ 24.600261] show_stack+0x20/0x38 (C) [ 24.600270] dump_stack_lvl+0x8c/0xd0 [ 24.600279] print_report+0x118/0x608 [ 24.600288] kasan_report+0xdc/0x128 [ 24.600296] kasan_check_range+0x100/0x1a8 [ 24.600306] __kasan_check_write+0x20/0x30 [ 24.600316] kasan_atomics_helper+0x99c/0x4858 [ 24.600324] kasan_atomics+0x198/0x2e0 [ 24.600332] kunit_try_run_case+0x170/0x3f0 [ 24.600342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.600354] kthread+0x328/0x630 [ 24.600364] ret_from_fork+0x10/0x20 [ 24.600374] [ 24.606496] Allocated by task 319: [ 24.606800] kasan_save_stack+0x3c/0x68 [ 24.607144] kasan_save_track+0x20/0x40 [ 24.607488] kasan_save_alloc_info+0x40/0x58 [ 24.607871] __kasan_kmalloc+0xd4/0xd8 [ 24.608208] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.608614] kasan_atomics+0xb8/0x2e0 [ 24.608943] kunit_try_run_case+0x170/0x3f0 [ 24.609319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.609808] kthread+0x328/0x630 [ 24.610101] ret_from_fork+0x10/0x20 [ 24.610423] [ 24.610561] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.610561] which belongs to the cache kmalloc-64 of size 64 [ 24.611644] The buggy address is located 0 bytes to the right of [ 24.611644] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.612773] [ 24.612910] The buggy address belongs to the physical page: [ 24.613402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.614094] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.614673] page_type: f5(slab) [ 24.614956] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.615639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.616321] page dumped because: kasan: bad access detected [ 24.616813] [ 24.616949] Memory state around the buggy address: [ 24.617375] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.618011] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.618648] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.619284] ^ [ 24.619710] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.620348] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.620984] ================================================================== [ 24.785485] ================================================================== [ 24.786122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 24.786776] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.787422] [ 24.787561] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.787575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.787579] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.787584] Call trace: [ 24.787587] show_stack+0x20/0x38 (C) [ 24.787596] dump_stack_lvl+0x8c/0xd0 [ 24.787605] print_report+0x118/0x608 [ 24.787614] kasan_report+0xdc/0x128 [ 24.787623] __asan_report_load4_noabort+0x20/0x30 [ 24.787633] kasan_atomics_helper+0x3de4/0x4858 [ 24.787641] kasan_atomics+0x198/0x2e0 [ 24.787650] kunit_try_run_case+0x170/0x3f0 [ 24.787660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.787672] kthread+0x328/0x630 [ 24.787681] ret_from_fork+0x10/0x20 [ 24.787691] [ 24.793522] Allocated by task 319: [ 24.793826] kasan_save_stack+0x3c/0x68 [ 24.794171] kasan_save_track+0x20/0x40 [ 24.794515] kasan_save_alloc_info+0x40/0x58 [ 24.794898] __kasan_kmalloc+0xd4/0xd8 [ 24.795236] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.795643] kasan_atomics+0xb8/0x2e0 [ 24.795972] kunit_try_run_case+0x170/0x3f0 [ 24.796348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.796838] kthread+0x328/0x630 [ 24.797131] ret_from_fork+0x10/0x20 [ 24.797454] [ 24.797590] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.797590] which belongs to the cache kmalloc-64 of size 64 [ 24.798673] The buggy address is located 0 bytes to the right of [ 24.798673] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.799802] [ 24.799939] The buggy address belongs to the physical page: [ 24.800432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.801124] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.801701] page_type: f5(slab) [ 24.801986] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.802670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.803352] page dumped because: kasan: bad access detected [ 24.803844] [ 24.803981] Memory state around the buggy address: [ 24.804406] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.805043] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.805681] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.806317] ^ [ 24.806742] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.807379] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.808014] ================================================================== [ 24.948763] ================================================================== [ 24.949400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 24.950046] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.950699] [ 24.950838] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.950852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.950857] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.950862] Call trace: [ 24.950865] show_stack+0x20/0x38 (C) [ 24.950874] dump_stack_lvl+0x8c/0xd0 [ 24.950883] print_report+0x118/0x608 [ 24.950891] kasan_report+0xdc/0x128 [ 24.950900] kasan_check_range+0x100/0x1a8 [ 24.950909] __kasan_check_write+0x20/0x30 [ 24.950919] kasan_atomics_helper+0xe44/0x4858 [ 24.950928] kasan_atomics+0x198/0x2e0 [ 24.950936] kunit_try_run_case+0x170/0x3f0 [ 24.950946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.950957] kthread+0x328/0x630 [ 24.950967] ret_from_fork+0x10/0x20 [ 24.950976] [ 24.957095] Allocated by task 319: [ 24.957399] kasan_save_stack+0x3c/0x68 [ 24.957743] kasan_save_track+0x20/0x40 [ 24.958088] kasan_save_alloc_info+0x40/0x58 [ 24.958472] __kasan_kmalloc+0xd4/0xd8 [ 24.958809] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.959215] kasan_atomics+0xb8/0x2e0 [ 24.959544] kunit_try_run_case+0x170/0x3f0 [ 24.959920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.960411] kthread+0x328/0x630 [ 24.960705] ret_from_fork+0x10/0x20 [ 24.961027] [ 24.961163] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.961163] which belongs to the cache kmalloc-64 of size 64 [ 24.962246] The buggy address is located 0 bytes to the right of [ 24.962246] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.963375] [ 24.963512] The buggy address belongs to the physical page: [ 24.964004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.964696] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.965274] page_type: f5(slab) [ 24.965557] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.966241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.966923] page dumped because: kasan: bad access detected [ 24.967415] [ 24.967552] Memory state around the buggy address: [ 24.967977] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.968616] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.969252] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.969888] ^ [ 24.970314] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.970951] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.971587] ================================================================== [ 25.347618] ================================================================== [ 25.348255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 25.348908] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.349561] [ 25.349700] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.349714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.349719] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.349723] Call trace: [ 25.349726] show_stack+0x20/0x38 (C) [ 25.349736] dump_stack_lvl+0x8c/0xd0 [ 25.349745] print_report+0x118/0x608 [ 25.349753] kasan_report+0xdc/0x128 [ 25.349762] kasan_check_range+0x100/0x1a8 [ 25.349771] __kasan_check_write+0x20/0x30 [ 25.349781] kasan_atomics_helper+0x14e4/0x4858 [ 25.349789] kasan_atomics+0x198/0x2e0 [ 25.349797] kunit_try_run_case+0x170/0x3f0 [ 25.349808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.349819] kthread+0x328/0x630 [ 25.349829] ret_from_fork+0x10/0x20 [ 25.349838] [ 25.355966] Allocated by task 319: [ 25.356270] kasan_save_stack+0x3c/0x68 [ 25.356614] kasan_save_track+0x20/0x40 [ 25.356958] kasan_save_alloc_info+0x40/0x58 [ 25.357341] __kasan_kmalloc+0xd4/0xd8 [ 25.357678] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.358085] kasan_atomics+0xb8/0x2e0 [ 25.358413] kunit_try_run_case+0x170/0x3f0 [ 25.358789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.359278] kthread+0x328/0x630 [ 25.359571] ret_from_fork+0x10/0x20 [ 25.359893] [ 25.360030] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.360030] which belongs to the cache kmalloc-64 of size 64 [ 25.361113] The buggy address is located 0 bytes to the right of [ 25.361113] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.362242] [ 25.362379] The buggy address belongs to the physical page: [ 25.362871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.363563] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.364140] page_type: f5(slab) [ 25.364424] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.365107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.365789] page dumped because: kasan: bad access detected [ 25.366281] [ 25.366417] Memory state around the buggy address: [ 25.366843] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.367480] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.368117] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.368753] ^ [ 25.369179] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.369815] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.370451] ================================================================== [ 24.878899] ================================================================== [ 24.879537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 24.880191] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.880837] [ 24.880975] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.880989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.880994] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.880998] Call trace: [ 24.881002] show_stack+0x20/0x38 (C) [ 24.881011] dump_stack_lvl+0x8c/0xd0 [ 24.881019] print_report+0x118/0x608 [ 24.881028] kasan_report+0xdc/0x128 [ 24.881037] __asan_report_load4_noabort+0x20/0x30 [ 24.881047] kasan_atomics_helper+0x3e04/0x4858 [ 24.881056] kasan_atomics+0x198/0x2e0 [ 24.881063] kunit_try_run_case+0x170/0x3f0 [ 24.881074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.881086] kthread+0x328/0x630 [ 24.881095] ret_from_fork+0x10/0x20 [ 24.881105] [ 24.886935] Allocated by task 319: [ 24.887239] kasan_save_stack+0x3c/0x68 [ 24.887585] kasan_save_track+0x20/0x40 [ 24.887930] kasan_save_alloc_info+0x40/0x58 [ 24.888313] __kasan_kmalloc+0xd4/0xd8 [ 24.888651] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.889058] kasan_atomics+0xb8/0x2e0 [ 24.889386] kunit_try_run_case+0x170/0x3f0 [ 24.889763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.890254] kthread+0x328/0x630 [ 24.890547] ret_from_fork+0x10/0x20 [ 24.890869] [ 24.891006] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.891006] which belongs to the cache kmalloc-64 of size 64 [ 24.892089] The buggy address is located 0 bytes to the right of [ 24.892089] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.893218] [ 24.893355] The buggy address belongs to the physical page: [ 24.893847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.894538] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.895117] page_type: f5(slab) [ 24.895402] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.896086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.896768] page dumped because: kasan: bad access detected [ 24.897260] [ 24.897396] Memory state around the buggy address: [ 24.897822] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.898460] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.899097] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.899732] ^ [ 24.900158] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.900797] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.901432] ================================================================== [ 25.277449] ================================================================== [ 25.278086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 25.278740] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.279386] [ 25.279524] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.279538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.279542] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.279547] Call trace: [ 25.279550] show_stack+0x20/0x38 (C) [ 25.279560] dump_stack_lvl+0x8c/0xd0 [ 25.279568] print_report+0x118/0x608 [ 25.279577] kasan_report+0xdc/0x128 [ 25.279585] __asan_report_load8_noabort+0x20/0x30 [ 25.279596] kasan_atomics_helper+0x3f04/0x4858 [ 25.279604] kasan_atomics+0x198/0x2e0 [ 25.279612] kunit_try_run_case+0x170/0x3f0 [ 25.279622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.279634] kthread+0x328/0x630 [ 25.279644] ret_from_fork+0x10/0x20 [ 25.279653] [ 25.285481] Allocated by task 319: [ 25.285785] kasan_save_stack+0x3c/0x68 [ 25.286129] kasan_save_track+0x20/0x40 [ 25.286474] kasan_save_alloc_info+0x40/0x58 [ 25.286857] __kasan_kmalloc+0xd4/0xd8 [ 25.287194] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.287603] kasan_atomics+0xb8/0x2e0 [ 25.287932] kunit_try_run_case+0x170/0x3f0 [ 25.288307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.288797] kthread+0x328/0x630 [ 25.289089] ret_from_fork+0x10/0x20 [ 25.289412] [ 25.289548] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.289548] which belongs to the cache kmalloc-64 of size 64 [ 25.290631] The buggy address is located 0 bytes to the right of [ 25.290631] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.291761] [ 25.291897] The buggy address belongs to the physical page: [ 25.292389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.293081] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.293660] page_type: f5(slab) [ 25.293943] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.294627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.295309] page dumped because: kasan: bad access detected [ 25.295801] [ 25.295938] Memory state around the buggy address: [ 25.296363] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.297000] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.297637] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.298273] ^ [ 25.298699] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.299336] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.299972] ================================================================== [ 25.136431] ================================================================== [ 25.137068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 25.137722] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.138375] [ 25.138515] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.138530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.138534] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.138539] Call trace: [ 25.138542] show_stack+0x20/0x38 (C) [ 25.138552] dump_stack_lvl+0x8c/0xd0 [ 25.138560] print_report+0x118/0x608 [ 25.138569] kasan_report+0xdc/0x128 [ 25.138578] kasan_check_range+0x100/0x1a8 [ 25.138588] __kasan_check_write+0x20/0x30 [ 25.138598] kasan_atomics_helper+0x1128/0x4858 [ 25.138606] kasan_atomics+0x198/0x2e0 [ 25.138614] kunit_try_run_case+0x170/0x3f0 [ 25.138625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.138636] kthread+0x328/0x630 [ 25.138646] ret_from_fork+0x10/0x20 [ 25.138655] [ 25.144784] Allocated by task 319: [ 25.145089] kasan_save_stack+0x3c/0x68 [ 25.145434] kasan_save_track+0x20/0x40 [ 25.145778] kasan_save_alloc_info+0x40/0x58 [ 25.146161] __kasan_kmalloc+0xd4/0xd8 [ 25.146498] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.146905] kasan_atomics+0xb8/0x2e0 [ 25.147234] kunit_try_run_case+0x170/0x3f0 [ 25.147609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.148098] kthread+0x328/0x630 [ 25.148391] ret_from_fork+0x10/0x20 [ 25.148714] [ 25.148851] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.148851] which belongs to the cache kmalloc-64 of size 64 [ 25.149934] The buggy address is located 0 bytes to the right of [ 25.149934] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.151064] [ 25.151200] The buggy address belongs to the physical page: [ 25.151692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.152384] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.152961] page_type: f5(slab) [ 25.153246] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.153929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.154612] page dumped because: kasan: bad access detected [ 25.155104] [ 25.155241] Memory state around the buggy address: [ 25.155665] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.156301] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.156938] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.157576] ^ [ 25.158002] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.158639] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.159275] ================================================================== [ 25.300624] ================================================================== [ 25.301261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 25.301914] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.302567] [ 25.302705] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.302719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.302724] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.302728] Call trace: [ 25.302732] show_stack+0x20/0x38 (C) [ 25.302741] dump_stack_lvl+0x8c/0xd0 [ 25.302749] print_report+0x118/0x608 [ 25.302758] kasan_report+0xdc/0x128 [ 25.302766] kasan_check_range+0x100/0x1a8 [ 25.302776] __kasan_check_write+0x20/0x30 [ 25.302786] kasan_atomics_helper+0x1414/0x4858 [ 25.302794] kasan_atomics+0x198/0x2e0 [ 25.302802] kunit_try_run_case+0x170/0x3f0 [ 25.302812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.302824] kthread+0x328/0x630 [ 25.302833] ret_from_fork+0x10/0x20 [ 25.302843] [ 25.308974] Allocated by task 319: [ 25.309279] kasan_save_stack+0x3c/0x68 [ 25.309623] kasan_save_track+0x20/0x40 [ 25.309966] kasan_save_alloc_info+0x40/0x58 [ 25.310349] __kasan_kmalloc+0xd4/0xd8 [ 25.310687] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.311093] kasan_atomics+0xb8/0x2e0 [ 25.311422] kunit_try_run_case+0x170/0x3f0 [ 25.311798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.312288] kthread+0x328/0x630 [ 25.312581] ret_from_fork+0x10/0x20 [ 25.312903] [ 25.313040] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.313040] which belongs to the cache kmalloc-64 of size 64 [ 25.314122] The buggy address is located 0 bytes to the right of [ 25.314122] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.315252] [ 25.315389] The buggy address belongs to the physical page: [ 25.315882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.316574] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.317151] page_type: f5(slab) [ 25.317434] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.318118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.318800] page dumped because: kasan: bad access detected [ 25.319292] [ 25.319428] Memory state around the buggy address: [ 25.319854] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.320490] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.321129] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.321766] ^ [ 25.322192] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.322829] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.323466] ================================================================== [ 24.408629] ================================================================== [ 24.409274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 24.409926] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.410586] [ 24.410730] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.410752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.410759] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.410766] Call trace: [ 24.410771] show_stack+0x20/0x38 (C) [ 24.410785] dump_stack_lvl+0x8c/0xd0 [ 24.410798] print_report+0x118/0x608 [ 24.410810] kasan_report+0xdc/0x128 [ 24.410823] kasan_check_range+0x100/0x1a8 [ 24.410837] __kasan_check_write+0x20/0x30 [ 24.410852] kasan_atomics_helper+0x61c/0x4858 [ 24.410864] kasan_atomics+0x198/0x2e0 [ 24.410876] kunit_try_run_case+0x170/0x3f0 [ 24.410891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.410908] kthread+0x328/0x630 [ 24.410923] ret_from_fork+0x10/0x20 [ 24.410937] [ 24.417080] Allocated by task 319: [ 24.417388] kasan_save_stack+0x3c/0x68 [ 24.417739] kasan_save_track+0x20/0x40 [ 24.418089] kasan_save_alloc_info+0x40/0x58 [ 24.418480] __kasan_kmalloc+0xd4/0xd8 [ 24.418822] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.419236] kasan_atomics+0xb8/0x2e0 [ 24.419571] kunit_try_run_case+0x170/0x3f0 [ 24.419954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.420451] kthread+0x328/0x630 [ 24.420751] ret_from_fork+0x10/0x20 [ 24.421079] [ 24.421220] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.421220] which belongs to the cache kmalloc-64 of size 64 [ 24.422310] The buggy address is located 0 bytes to the right of [ 24.422310] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.423446] [ 24.423587] The buggy address belongs to the physical page: [ 24.424083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.424781] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.425366] page_type: f5(slab) [ 24.425656] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.426345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.427032] page dumped because: kasan: bad access detected [ 24.427529] [ 24.427670] Memory state around the buggy address: [ 24.428099] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.428743] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.429386] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.430028] ^ [ 24.430459] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.431102] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.431744] ================================================================== [ 24.832225] ================================================================== [ 24.832864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 24.833518] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.834163] [ 24.834303] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.834318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.834322] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.834327] Call trace: [ 24.834330] show_stack+0x20/0x38 (C) [ 24.834339] dump_stack_lvl+0x8c/0xd0 [ 24.834347] print_report+0x118/0x608 [ 24.834356] kasan_report+0xdc/0x128 [ 24.834364] __asan_report_load4_noabort+0x20/0x30 [ 24.834375] kasan_atomics_helper+0x3dd8/0x4858 [ 24.834384] kasan_atomics+0x198/0x2e0 [ 24.834391] kunit_try_run_case+0x170/0x3f0 [ 24.834401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.834413] kthread+0x328/0x630 [ 24.834423] ret_from_fork+0x10/0x20 [ 24.834432] [ 24.840262] Allocated by task 319: [ 24.840567] kasan_save_stack+0x3c/0x68 [ 24.840911] kasan_save_track+0x20/0x40 [ 24.841254] kasan_save_alloc_info+0x40/0x58 [ 24.841638] __kasan_kmalloc+0xd4/0xd8 [ 24.841974] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.842381] kasan_atomics+0xb8/0x2e0 [ 24.842710] kunit_try_run_case+0x170/0x3f0 [ 24.843087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.843578] kthread+0x328/0x630 [ 24.843871] ret_from_fork+0x10/0x20 [ 24.844193] [ 24.844330] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.844330] which belongs to the cache kmalloc-64 of size 64 [ 24.845413] The buggy address is located 0 bytes to the right of [ 24.845413] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.846542] [ 24.846680] The buggy address belongs to the physical page: [ 24.847172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.847864] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.848441] page_type: f5(slab) [ 24.848726] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.849409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.850091] page dumped because: kasan: bad access detected [ 24.850583] [ 24.850719] Memory state around the buggy address: [ 24.851145] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.851782] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.852420] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.853056] ^ [ 24.853482] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.854118] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.854754] ================================================================== [ 24.761992] ================================================================== [ 24.762629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 24.763275] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.763928] [ 24.764066] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.764081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.764085] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.764090] Call trace: [ 24.764094] show_stack+0x20/0x38 (C) [ 24.764102] dump_stack_lvl+0x8c/0xd0 [ 24.764111] print_report+0x118/0x608 [ 24.764119] kasan_report+0xdc/0x128 [ 24.764128] kasan_check_range+0x100/0x1a8 [ 24.764137] __kasan_check_write+0x20/0x30 [ 24.764147] kasan_atomics_helper+0xc08/0x4858 [ 24.764155] kasan_atomics+0x198/0x2e0 [ 24.764164] kunit_try_run_case+0x170/0x3f0 [ 24.764174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.764185] kthread+0x328/0x630 [ 24.764195] ret_from_fork+0x10/0x20 [ 24.764204] [ 24.770326] Allocated by task 319: [ 24.770630] kasan_save_stack+0x3c/0x68 [ 24.770974] kasan_save_track+0x20/0x40 [ 24.771319] kasan_save_alloc_info+0x40/0x58 [ 24.771702] __kasan_kmalloc+0xd4/0xd8 [ 24.772039] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.772446] kasan_atomics+0xb8/0x2e0 [ 24.772775] kunit_try_run_case+0x170/0x3f0 [ 24.773150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.773641] kthread+0x328/0x630 [ 24.773934] ret_from_fork+0x10/0x20 [ 24.774256] [ 24.774394] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.774394] which belongs to the cache kmalloc-64 of size 64 [ 24.775476] The buggy address is located 0 bytes to the right of [ 24.775476] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.776606] [ 24.776743] The buggy address belongs to the physical page: [ 24.777235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.777925] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.778503] page_type: f5(slab) [ 24.778787] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.779470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.780152] page dumped because: kasan: bad access detected [ 24.780644] [ 24.780781] Memory state around the buggy address: [ 24.781207] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.781843] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.782480] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.783116] ^ [ 24.783542] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.784178] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.784814] ================================================================== [ 25.018956] ================================================================== [ 25.019594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 25.020240] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.020893] [ 25.021032] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.021046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.021051] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.021056] Call trace: [ 25.021059] show_stack+0x20/0x38 (C) [ 25.021068] dump_stack_lvl+0x8c/0xd0 [ 25.021077] print_report+0x118/0x608 [ 25.021086] kasan_report+0xdc/0x128 [ 25.021095] kasan_check_range+0x100/0x1a8 [ 25.021104] __kasan_check_write+0x20/0x30 [ 25.021115] kasan_atomics_helper+0xf20/0x4858 [ 25.021123] kasan_atomics+0x198/0x2e0 [ 25.021132] kunit_try_run_case+0x170/0x3f0 [ 25.021142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.021154] kthread+0x328/0x630 [ 25.021164] ret_from_fork+0x10/0x20 [ 25.021174] [ 25.027295] Allocated by task 319: [ 25.027598] kasan_save_stack+0x3c/0x68 [ 25.027943] kasan_save_track+0x20/0x40 [ 25.028287] kasan_save_alloc_info+0x40/0x58 [ 25.028670] __kasan_kmalloc+0xd4/0xd8 [ 25.029007] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.029414] kasan_atomics+0xb8/0x2e0 [ 25.029743] kunit_try_run_case+0x170/0x3f0 [ 25.030118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.030608] kthread+0x328/0x630 [ 25.030901] ret_from_fork+0x10/0x20 [ 25.031224] [ 25.031360] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.031360] which belongs to the cache kmalloc-64 of size 64 [ 25.032443] The buggy address is located 0 bytes to the right of [ 25.032443] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.033572] [ 25.033709] The buggy address belongs to the physical page: [ 25.034202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.034894] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.035472] page_type: f5(slab) [ 25.035755] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.036439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.037121] page dumped because: kasan: bad access detected [ 25.037613] [ 25.037750] Memory state around the buggy address: [ 25.038175] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.038814] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.039450] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.040086] ^ [ 25.040512] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.041150] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.041786] ================================================================== [ 24.527967] ================================================================== [ 24.528605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 24.529251] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.529905] [ 24.530044] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.530059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.530063] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.530068] Call trace: [ 24.530072] show_stack+0x20/0x38 (C) [ 24.530081] dump_stack_lvl+0x8c/0xd0 [ 24.530089] print_report+0x118/0x608 [ 24.530098] kasan_report+0xdc/0x128 [ 24.530106] kasan_check_range+0x100/0x1a8 [ 24.530116] __kasan_check_write+0x20/0x30 [ 24.530126] kasan_atomics_helper+0x894/0x4858 [ 24.530134] kasan_atomics+0x198/0x2e0 [ 24.530142] kunit_try_run_case+0x170/0x3f0 [ 24.530152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.530164] kthread+0x328/0x630 [ 24.530174] ret_from_fork+0x10/0x20 [ 24.530183] [ 24.536305] Allocated by task 319: [ 24.536609] kasan_save_stack+0x3c/0x68 [ 24.536954] kasan_save_track+0x20/0x40 [ 24.537297] kasan_save_alloc_info+0x40/0x58 [ 24.537680] __kasan_kmalloc+0xd4/0xd8 [ 24.538017] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.538425] kasan_atomics+0xb8/0x2e0 [ 24.538755] kunit_try_run_case+0x170/0x3f0 [ 24.539130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.539621] kthread+0x328/0x630 [ 24.539913] ret_from_fork+0x10/0x20 [ 24.540236] [ 24.540372] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.540372] which belongs to the cache kmalloc-64 of size 64 [ 24.541455] The buggy address is located 0 bytes to the right of [ 24.541455] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.542585] [ 24.542722] The buggy address belongs to the physical page: [ 24.543214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.543906] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.544485] page_type: f5(slab) [ 24.544770] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.545454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.546136] page dumped because: kasan: bad access detected [ 24.546628] [ 24.546764] Memory state around the buggy address: [ 24.547190] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.547826] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.548464] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.549101] ^ [ 24.549527] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.550164] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.550800] ================================================================== [ 25.488002] ================================================================== [ 25.488640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 25.489295] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.489948] [ 25.490088] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.490103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.490108] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.490113] Call trace: [ 25.490116] show_stack+0x20/0x38 (C) [ 25.490125] dump_stack_lvl+0x8c/0xd0 [ 25.490134] print_report+0x118/0x608 [ 25.490143] kasan_report+0xdc/0x128 [ 25.490152] kasan_check_range+0x100/0x1a8 [ 25.490162] __kasan_check_write+0x20/0x30 [ 25.490172] kasan_atomics_helper+0x16d0/0x4858 [ 25.490180] kasan_atomics+0x198/0x2e0 [ 25.490188] kunit_try_run_case+0x170/0x3f0 [ 25.490199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.490211] kthread+0x328/0x630 [ 25.490221] ret_from_fork+0x10/0x20 [ 25.490231] [ 25.496359] Allocated by task 319: [ 25.496663] kasan_save_stack+0x3c/0x68 [ 25.497008] kasan_save_track+0x20/0x40 [ 25.497351] kasan_save_alloc_info+0x40/0x58 [ 25.497734] __kasan_kmalloc+0xd4/0xd8 [ 25.498072] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.498480] kasan_atomics+0xb8/0x2e0 [ 25.498809] kunit_try_run_case+0x170/0x3f0 [ 25.499185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.499674] kthread+0x328/0x630 [ 25.499967] ret_from_fork+0x10/0x20 [ 25.500289] [ 25.500426] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.500426] which belongs to the cache kmalloc-64 of size 64 [ 25.501508] The buggy address is located 0 bytes to the right of [ 25.501508] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.502638] [ 25.502776] The buggy address belongs to the physical page: [ 25.503269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.503961] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.504539] page_type: f5(slab) [ 25.504824] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.505508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.506190] page dumped because: kasan: bad access detected [ 25.506682] [ 25.506818] Memory state around the buggy address: [ 25.507244] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.507881] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.508518] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.509155] ^ [ 25.509581] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.510218] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.510854] ================================================================== [ 24.288365] ================================================================== [ 24.289019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 24.289682] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.290351] [ 24.290500] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.290532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.290542] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.290552] Call trace: [ 24.290560] show_stack+0x20/0x38 (C) [ 24.290580] dump_stack_lvl+0x8c/0xd0 [ 24.290599] print_report+0x118/0x608 [ 24.290618] kasan_report+0xdc/0x128 [ 24.290637] kasan_check_range+0x100/0x1a8 [ 24.290658] __kasan_check_write+0x20/0x30 [ 24.290680] kasan_atomics_helper+0x414/0x4858 [ 24.290699] kasan_atomics+0x198/0x2e0 [ 24.290716] kunit_try_run_case+0x170/0x3f0 [ 24.290738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.290764] kthread+0x328/0x630 [ 24.290785] ret_from_fork+0x10/0x20 [ 24.290806] [ 24.296989] Allocated by task 319: [ 24.297305] kasan_save_stack+0x3c/0x68 [ 24.297665] kasan_save_track+0x20/0x40 [ 24.298023] kasan_save_alloc_info+0x40/0x58 [ 24.298423] __kasan_kmalloc+0xd4/0xd8 [ 24.298773] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.299198] kasan_atomics+0xb8/0x2e0 [ 24.299539] kunit_try_run_case+0x170/0x3f0 [ 24.299932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.300441] kthread+0x328/0x630 [ 24.300751] ret_from_fork+0x10/0x20 [ 24.301088] [ 24.301234] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.301234] which belongs to the cache kmalloc-64 of size 64 [ 24.302336] The buggy address is located 0 bytes to the right of [ 24.302336] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.303485] [ 24.303632] The buggy address belongs to the physical page: [ 24.304135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.304843] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.305437] page_type: f5(slab) [ 24.305734] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.306433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.307128] page dumped because: kasan: bad access detected [ 24.307632] [ 24.307777] Memory state around the buggy address: [ 24.308214] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.308867] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.309519] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.310169] ^ [ 24.310608] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.311260] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.311910] ================================================================== [ 25.042443] ================================================================== [ 25.043081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 25.043726] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.044380] [ 25.044518] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.044532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.044536] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.044541] Call trace: [ 25.044544] show_stack+0x20/0x38 (C) [ 25.044554] dump_stack_lvl+0x8c/0xd0 [ 25.044562] print_report+0x118/0x608 [ 25.044571] kasan_report+0xdc/0x128 [ 25.044580] kasan_check_range+0x100/0x1a8 [ 25.044589] __kasan_check_write+0x20/0x30 [ 25.044599] kasan_atomics_helper+0xf88/0x4858 [ 25.044607] kasan_atomics+0x198/0x2e0 [ 25.044615] kunit_try_run_case+0x170/0x3f0 [ 25.044625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.044636] kthread+0x328/0x630 [ 25.044646] ret_from_fork+0x10/0x20 [ 25.044656] [ 25.050780] Allocated by task 319: [ 25.051084] kasan_save_stack+0x3c/0x68 [ 25.051429] kasan_save_track+0x20/0x40 [ 25.051772] kasan_save_alloc_info+0x40/0x58 [ 25.052155] __kasan_kmalloc+0xd4/0xd8 [ 25.052493] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.052899] kasan_atomics+0xb8/0x2e0 [ 25.053229] kunit_try_run_case+0x170/0x3f0 [ 25.053604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.054095] kthread+0x328/0x630 [ 25.054387] ret_from_fork+0x10/0x20 [ 25.054709] [ 25.054846] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.054846] which belongs to the cache kmalloc-64 of size 64 [ 25.055929] The buggy address is located 0 bytes to the right of [ 25.055929] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.057058] [ 25.057196] The buggy address belongs to the physical page: [ 25.057688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.058379] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.058958] page_type: f5(slab) [ 25.059241] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.059925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.060607] page dumped because: kasan: bad access detected [ 25.061099] [ 25.061236] Memory state around the buggy address: [ 25.061662] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.062298] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.062935] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.063573] ^ [ 25.063997] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.064635] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.065272] ================================================================== [ 25.464799] ================================================================== [ 25.465436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 25.466089] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.466734] [ 25.466873] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.466887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.466891] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.466896] Call trace: [ 25.466899] show_stack+0x20/0x38 (C) [ 25.466908] dump_stack_lvl+0x8c/0xd0 [ 25.466917] print_report+0x118/0x608 [ 25.466926] kasan_report+0xdc/0x128 [ 25.466934] __asan_report_load8_noabort+0x20/0x30 [ 25.466944] kasan_atomics_helper+0x3df4/0x4858 [ 25.466953] kasan_atomics+0x198/0x2e0 [ 25.466961] kunit_try_run_case+0x170/0x3f0 [ 25.466971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.466983] kthread+0x328/0x630 [ 25.466992] ret_from_fork+0x10/0x20 [ 25.467002] [ 25.472835] Allocated by task 319: [ 25.473138] kasan_save_stack+0x3c/0x68 [ 25.473482] kasan_save_track+0x20/0x40 [ 25.473827] kasan_save_alloc_info+0x40/0x58 [ 25.474210] __kasan_kmalloc+0xd4/0xd8 [ 25.474547] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.474954] kasan_atomics+0xb8/0x2e0 [ 25.475283] kunit_try_run_case+0x170/0x3f0 [ 25.475658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.476149] kthread+0x328/0x630 [ 25.476442] ret_from_fork+0x10/0x20 [ 25.476764] [ 25.476900] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.476900] which belongs to the cache kmalloc-64 of size 64 [ 25.477983] The buggy address is located 0 bytes to the right of [ 25.477983] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.479112] [ 25.479249] The buggy address belongs to the physical page: [ 25.479741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.480433] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.481011] page_type: f5(slab) [ 25.481296] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.481980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.482662] page dumped because: kasan: bad access detected [ 25.483154] [ 25.483290] Memory state around the buggy address: [ 25.483716] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.484354] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.484991] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.485627] ^ [ 25.486053] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.486690] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.487326] ================================================================== [ 24.645141] ================================================================== [ 24.645779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 24.646425] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.647078] [ 24.647218] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.647232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.647237] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.647242] Call trace: [ 24.647245] show_stack+0x20/0x38 (C) [ 24.647255] dump_stack_lvl+0x8c/0xd0 [ 24.647263] print_report+0x118/0x608 [ 24.647272] kasan_report+0xdc/0x128 [ 24.647281] kasan_check_range+0x100/0x1a8 [ 24.647290] __kasan_check_write+0x20/0x30 [ 24.647300] kasan_atomics_helper+0xa6c/0x4858 [ 24.647309] kasan_atomics+0x198/0x2e0 [ 24.647317] kunit_try_run_case+0x170/0x3f0 [ 24.647327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.647339] kthread+0x328/0x630 [ 24.647349] ret_from_fork+0x10/0x20 [ 24.647358] [ 24.653482] Allocated by task 319: [ 24.653787] kasan_save_stack+0x3c/0x68 [ 24.654132] kasan_save_track+0x20/0x40 [ 24.654477] kasan_save_alloc_info+0x40/0x58 [ 24.654861] __kasan_kmalloc+0xd4/0xd8 [ 24.655198] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.655604] kasan_atomics+0xb8/0x2e0 [ 24.655933] kunit_try_run_case+0x170/0x3f0 [ 24.656309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.656800] kthread+0x328/0x630 [ 24.657093] ret_from_fork+0x10/0x20 [ 24.657415] [ 24.657553] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.657553] which belongs to the cache kmalloc-64 of size 64 [ 24.658636] The buggy address is located 0 bytes to the right of [ 24.658636] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.659766] [ 24.659902] The buggy address belongs to the physical page: [ 24.660394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.661086] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.661663] page_type: f5(slab) [ 24.661948] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.662632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.663313] page dumped because: kasan: bad access detected [ 24.663805] [ 24.663942] Memory state around the buggy address: [ 24.664368] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.665004] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.665642] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.666279] ^ [ 24.666705] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.667343] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.667979] ================================================================== [ 24.117772] ================================================================== [ 24.118433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 24.119104] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.119768] [ 24.119923] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.119959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.119969] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.119983] Call trace: [ 24.119992] show_stack+0x20/0x38 (C) [ 24.120014] dump_stack_lvl+0x8c/0xd0 [ 24.120038] print_report+0x118/0x608 [ 24.120059] kasan_report+0xdc/0x128 [ 24.120080] kasan_check_range+0x100/0x1a8 [ 24.120102] __kasan_check_read+0x20/0x30 [ 24.120126] kasan_atomics_helper+0x1ec/0x4858 [ 24.120148] kasan_atomics+0x198/0x2e0 [ 24.120168] kunit_try_run_case+0x170/0x3f0 [ 24.120193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.120221] kthread+0x328/0x630 [ 24.120245] ret_from_fork+0x10/0x20 [ 24.120269] [ 24.126456] Allocated by task 319: [ 24.126774] kasan_save_stack+0x3c/0x68 [ 24.127136] kasan_save_track+0x20/0x40 [ 24.127497] kasan_save_alloc_info+0x40/0x58 [ 24.127899] __kasan_kmalloc+0xd4/0xd8 [ 24.128252] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.128681] kasan_atomics+0xb8/0x2e0 [ 24.129025] kunit_try_run_case+0x170/0x3f0 [ 24.129420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.129931] kthread+0x328/0x630 [ 24.130242] ret_from_fork+0x10/0x20 [ 24.130582] [ 24.130730] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.130730] which belongs to the cache kmalloc-64 of size 64 [ 24.131836] The buggy address is located 0 bytes to the right of [ 24.131836] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.132987] [ 24.133135] The buggy address belongs to the physical page: [ 24.133643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.134354] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.134953] page_type: f5(slab) [ 24.135253] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.135956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.136654] page dumped because: kasan: bad access detected [ 24.137160] [ 24.137308] Memory state around the buggy address: [ 24.137747] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.138402] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.139059] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.139712] ^ [ 24.140151] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.140806] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.141458] ================================================================== [ 24.384789] ================================================================== [ 24.385434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 24.386087] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.386746] [ 24.386889] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.386911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.386917] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.386924] Call trace: [ 24.386929] show_stack+0x20/0x38 (C) [ 24.386943] dump_stack_lvl+0x8c/0xd0 [ 24.386956] print_report+0x118/0x608 [ 24.386969] kasan_report+0xdc/0x128 [ 24.386982] kasan_check_range+0x100/0x1a8 [ 24.386996] __kasan_check_write+0x20/0x30 [ 24.387011] kasan_atomics_helper+0x5b4/0x4858 [ 24.387023] kasan_atomics+0x198/0x2e0 [ 24.387035] kunit_try_run_case+0x170/0x3f0 [ 24.387051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.387068] kthread+0x328/0x630 [ 24.387083] ret_from_fork+0x10/0x20 [ 24.387097] [ 24.393242] Allocated by task 319: [ 24.393551] kasan_save_stack+0x3c/0x68 [ 24.393902] kasan_save_track+0x20/0x40 [ 24.394252] kasan_save_alloc_info+0x40/0x58 [ 24.394642] __kasan_kmalloc+0xd4/0xd8 [ 24.394984] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.395398] kasan_atomics+0xb8/0x2e0 [ 24.395733] kunit_try_run_case+0x170/0x3f0 [ 24.396115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.396613] kthread+0x328/0x630 [ 24.396912] ret_from_fork+0x10/0x20 [ 24.397240] [ 24.397381] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.397381] which belongs to the cache kmalloc-64 of size 64 [ 24.398470] The buggy address is located 0 bytes to the right of [ 24.398470] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.399609] [ 24.399749] The buggy address belongs to the physical page: [ 24.400246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.400944] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.401530] page_type: f5(slab) [ 24.401819] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.402510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.403196] page dumped because: kasan: bad access detected [ 24.403694] [ 24.403834] Memory state around the buggy address: [ 24.404264] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.404907] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.405551] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.406193] ^ [ 24.406623] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.407267] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.407908] ================================================================== [ 25.511524] ================================================================== [ 25.512163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 25.512817] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.513463] [ 25.513601] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.513615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.513620] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.513624] Call trace: [ 25.513628] show_stack+0x20/0x38 (C) [ 25.513637] dump_stack_lvl+0x8c/0xd0 [ 25.513646] print_report+0x118/0x608 [ 25.513655] kasan_report+0xdc/0x128 [ 25.513664] __asan_report_load8_noabort+0x20/0x30 [ 25.513674] kasan_atomics_helper+0x3e10/0x4858 [ 25.513682] kasan_atomics+0x198/0x2e0 [ 25.513690] kunit_try_run_case+0x170/0x3f0 [ 25.513701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.513713] kthread+0x328/0x630 [ 25.513723] ret_from_fork+0x10/0x20 [ 25.513732] [ 25.519563] Allocated by task 319: [ 25.519868] kasan_save_stack+0x3c/0x68 [ 25.520213] kasan_save_track+0x20/0x40 [ 25.520557] kasan_save_alloc_info+0x40/0x58 [ 25.520940] __kasan_kmalloc+0xd4/0xd8 [ 25.521277] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.521684] kasan_atomics+0xb8/0x2e0 [ 25.522013] kunit_try_run_case+0x170/0x3f0 [ 25.522389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.522880] kthread+0x328/0x630 [ 25.523173] ret_from_fork+0x10/0x20 [ 25.523495] [ 25.523632] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.523632] which belongs to the cache kmalloc-64 of size 64 [ 25.524714] The buggy address is located 0 bytes to the right of [ 25.524714] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.525844] [ 25.525981] The buggy address belongs to the physical page: [ 25.526473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.527165] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.527742] page_type: f5(slab) [ 25.528027] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.528710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.529392] page dumped because: kasan: bad access detected [ 25.529884] [ 25.530021] Memory state around the buggy address: [ 25.530445] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.531082] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.531719] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.532355] ^ [ 25.532781] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.533418] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.534055] ================================================================== [ 24.191649] ================================================================== [ 24.192306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 24.192977] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.193639] [ 24.193788] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.193821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.193831] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.193842] Call trace: [ 24.193849] show_stack+0x20/0x38 (C) [ 24.193869] dump_stack_lvl+0x8c/0xd0 [ 24.193889] print_report+0x118/0x608 [ 24.193909] kasan_report+0xdc/0x128 [ 24.193927] __asan_report_load4_noabort+0x20/0x30 [ 24.193951] kasan_atomics_helper+0x40fc/0x4858 [ 24.193970] kasan_atomics+0x198/0x2e0 [ 24.193987] kunit_try_run_case+0x170/0x3f0 [ 24.194011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.194036] kthread+0x328/0x630 [ 24.194058] ret_from_fork+0x10/0x20 [ 24.194079] [ 24.199969] Allocated by task 319: [ 24.200285] kasan_save_stack+0x3c/0x68 [ 24.200645] kasan_save_track+0x20/0x40 [ 24.201003] kasan_save_alloc_info+0x40/0x58 [ 24.201403] __kasan_kmalloc+0xd4/0xd8 [ 24.201753] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.202179] kasan_atomics+0xb8/0x2e0 [ 24.202523] kunit_try_run_case+0x170/0x3f0 [ 24.202916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.203425] kthread+0x328/0x630 [ 24.203735] ret_from_fork+0x10/0x20 [ 24.204073] [ 24.204220] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.204220] which belongs to the cache kmalloc-64 of size 64 [ 24.205320] The buggy address is located 0 bytes to the right of [ 24.205320] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.206469] [ 24.206616] The buggy address belongs to the physical page: [ 24.207120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.207828] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.208421] page_type: f5(slab) [ 24.208719] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.209418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.210113] page dumped because: kasan: bad access detected [ 24.210617] [ 24.210763] Memory state around the buggy address: [ 24.211201] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.211853] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.212506] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.213156] ^ [ 24.213594] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.214246] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.214896] ================================================================== [ 24.574677] ================================================================== [ 24.575314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 24.575960] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.576614] [ 24.576753] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.576768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.576772] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.576777] Call trace: [ 24.576780] show_stack+0x20/0x38 (C) [ 24.576789] dump_stack_lvl+0x8c/0xd0 [ 24.576798] print_report+0x118/0x608 [ 24.576806] kasan_report+0xdc/0x128 [ 24.576815] kasan_check_range+0x100/0x1a8 [ 24.576824] __kasan_check_write+0x20/0x30 [ 24.576835] kasan_atomics_helper+0x934/0x4858 [ 24.576843] kasan_atomics+0x198/0x2e0 [ 24.576851] kunit_try_run_case+0x170/0x3f0 [ 24.576861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.576873] kthread+0x328/0x630 [ 24.576883] ret_from_fork+0x10/0x20 [ 24.576892] [ 24.583018] Allocated by task 319: [ 24.583322] kasan_save_stack+0x3c/0x68 [ 24.583667] kasan_save_track+0x20/0x40 [ 24.584010] kasan_save_alloc_info+0x40/0x58 [ 24.584393] __kasan_kmalloc+0xd4/0xd8 [ 24.584730] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.585138] kasan_atomics+0xb8/0x2e0 [ 24.585467] kunit_try_run_case+0x170/0x3f0 [ 24.585842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.586334] kthread+0x328/0x630 [ 24.586626] ret_from_fork+0x10/0x20 [ 24.586948] [ 24.587085] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.587085] which belongs to the cache kmalloc-64 of size 64 [ 24.588167] The buggy address is located 0 bytes to the right of [ 24.588167] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.589297] [ 24.589433] The buggy address belongs to the physical page: [ 24.589925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.590617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.591194] page_type: f5(slab) [ 24.591477] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.592160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.592842] page dumped because: kasan: bad access detected [ 24.593334] [ 24.593470] Memory state around the buggy address: [ 24.593896] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.594533] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.595170] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.595806] ^ [ 24.596231] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.596868] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.597504] ================================================================== [ 25.581398] ================================================================== [ 25.582034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 25.582687] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.583341] [ 25.583479] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.583494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.583498] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.583503] Call trace: [ 25.583506] show_stack+0x20/0x38 (C) [ 25.583515] dump_stack_lvl+0x8c/0xd0 [ 25.583524] print_report+0x118/0x608 [ 25.583532] kasan_report+0xdc/0x128 [ 25.583541] kasan_check_range+0x100/0x1a8 [ 25.583550] __kasan_check_write+0x20/0x30 [ 25.583561] kasan_atomics_helper+0x17ec/0x4858 [ 25.583569] kasan_atomics+0x198/0x2e0 [ 25.583577] kunit_try_run_case+0x170/0x3f0 [ 25.583587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.583599] kthread+0x328/0x630 [ 25.583609] ret_from_fork+0x10/0x20 [ 25.583618] [ 25.589748] Allocated by task 319: [ 25.590053] kasan_save_stack+0x3c/0x68 [ 25.590398] kasan_save_track+0x20/0x40 [ 25.590743] kasan_save_alloc_info+0x40/0x58 [ 25.591126] __kasan_kmalloc+0xd4/0xd8 [ 25.591463] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.591870] kasan_atomics+0xb8/0x2e0 [ 25.592198] kunit_try_run_case+0x170/0x3f0 [ 25.592574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.593065] kthread+0x328/0x630 [ 25.593357] ret_from_fork+0x10/0x20 [ 25.593680] [ 25.593816] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.593816] which belongs to the cache kmalloc-64 of size 64 [ 25.594899] The buggy address is located 0 bytes to the right of [ 25.594899] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.596028] [ 25.596165] The buggy address belongs to the physical page: [ 25.596657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.597349] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.597926] page_type: f5(slab) [ 25.598209] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.598893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.599575] page dumped because: kasan: bad access detected [ 25.600067] [ 25.600203] Memory state around the buggy address: [ 25.600627] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.601266] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.601904] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.602540] ^ [ 25.602966] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.603602] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.604239] ================================================================== [ 25.065933] ================================================================== [ 25.066570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 25.067216] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.067869] [ 25.068009] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.068023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.068027] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.068032] Call trace: [ 25.068035] show_stack+0x20/0x38 (C) [ 25.068045] dump_stack_lvl+0x8c/0xd0 [ 25.068053] print_report+0x118/0x608 [ 25.068062] kasan_report+0xdc/0x128 [ 25.068070] kasan_check_range+0x100/0x1a8 [ 25.068079] __kasan_check_write+0x20/0x30 [ 25.068089] kasan_atomics_helper+0xff0/0x4858 [ 25.068098] kasan_atomics+0x198/0x2e0 [ 25.068106] kunit_try_run_case+0x170/0x3f0 [ 25.068116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.068127] kthread+0x328/0x630 [ 25.068137] ret_from_fork+0x10/0x20 [ 25.068146] [ 25.074265] Allocated by task 319: [ 25.074570] kasan_save_stack+0x3c/0x68 [ 25.074914] kasan_save_track+0x20/0x40 [ 25.075258] kasan_save_alloc_info+0x40/0x58 [ 25.075641] __kasan_kmalloc+0xd4/0xd8 [ 25.075978] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.076384] kasan_atomics+0xb8/0x2e0 [ 25.076714] kunit_try_run_case+0x170/0x3f0 [ 25.077089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.077579] kthread+0x328/0x630 [ 25.077872] ret_from_fork+0x10/0x20 [ 25.078194] [ 25.078331] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.078331] which belongs to the cache kmalloc-64 of size 64 [ 25.079414] The buggy address is located 0 bytes to the right of [ 25.079414] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.080543] [ 25.080679] The buggy address belongs to the physical page: [ 25.081171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.081862] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.082441] page_type: f5(slab) [ 25.082724] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.083408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.084090] page dumped because: kasan: bad access detected [ 25.084582] [ 25.084718] Memory state around the buggy address: [ 25.085142] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.085779] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.086416] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.087052] ^ [ 25.087477] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.088115] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.088750] ================================================================== [ 24.068083] ================================================================== [ 24.069475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 24.070176] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.070857] [ 24.071023] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.071075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.071091] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.071109] Call trace: [ 24.071122] show_stack+0x20/0x38 (C) [ 24.071157] dump_stack_lvl+0x8c/0xd0 [ 24.071190] print_report+0x118/0x608 [ 24.071222] kasan_report+0xdc/0x128 [ 24.071252] __asan_report_load4_noabort+0x20/0x30 [ 24.071288] kasan_atomics_helper+0x40a8/0x4858 [ 24.071318] kasan_atomics+0x198/0x2e0 [ 24.071346] kunit_try_run_case+0x170/0x3f0 [ 24.071383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.071423] kthread+0x328/0x630 [ 24.071459] ret_from_fork+0x10/0x20 [ 24.071493] [ 24.077442] Allocated by task 319: [ 24.077770] kasan_save_stack+0x3c/0x68 [ 24.078145] kasan_save_track+0x20/0x40 [ 24.078517] kasan_save_alloc_info+0x40/0x58 [ 24.078932] __kasan_kmalloc+0xd4/0xd8 [ 24.079295] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.079738] kasan_atomics+0xb8/0x2e0 [ 24.080095] kunit_try_run_case+0x170/0x3f0 [ 24.080502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.081028] kthread+0x328/0x630 [ 24.081352] ret_from_fork+0x10/0x20 [ 24.081702] [ 24.081856] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.081856] which belongs to the cache kmalloc-64 of size 64 [ 24.082975] The buggy address is located 0 bytes to the right of [ 24.082975] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.084142] [ 24.084297] The buggy address belongs to the physical page: [ 24.084814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.085539] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.086150] page_type: f5(slab) [ 24.086465] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.087183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.087891] page dumped because: kasan: bad access detected [ 24.088408] [ 24.088561] Memory state around the buggy address: [ 24.089012] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.089679] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.090346] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.091009] ^ [ 24.091460] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.092127] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.092790] ================================================================== [ 25.371123] ================================================================== [ 25.371761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 25.372414] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.373068] [ 25.373207] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.373221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.373225] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.373230] Call trace: [ 25.373233] show_stack+0x20/0x38 (C) [ 25.373243] dump_stack_lvl+0x8c/0xd0 [ 25.373251] print_report+0x118/0x608 [ 25.373260] kasan_report+0xdc/0x128 [ 25.373269] kasan_check_range+0x100/0x1a8 [ 25.373278] __kasan_check_write+0x20/0x30 [ 25.373288] kasan_atomics_helper+0x154c/0x4858 [ 25.373297] kasan_atomics+0x198/0x2e0 [ 25.373304] kunit_try_run_case+0x170/0x3f0 [ 25.373315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.373326] kthread+0x328/0x630 [ 25.373336] ret_from_fork+0x10/0x20 [ 25.373346] [ 25.379473] Allocated by task 319: [ 25.379778] kasan_save_stack+0x3c/0x68 [ 25.380122] kasan_save_track+0x20/0x40 [ 25.380467] kasan_save_alloc_info+0x40/0x58 [ 25.380850] __kasan_kmalloc+0xd4/0xd8 [ 25.381187] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.381594] kasan_atomics+0xb8/0x2e0 [ 25.381923] kunit_try_run_case+0x170/0x3f0 [ 25.382298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.382789] kthread+0x328/0x630 [ 25.383082] ret_from_fork+0x10/0x20 [ 25.383404] [ 25.383543] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.383543] which belongs to the cache kmalloc-64 of size 64 [ 25.384625] The buggy address is located 0 bytes to the right of [ 25.384625] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.385755] [ 25.385891] The buggy address belongs to the physical page: [ 25.386383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.387075] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.387654] page_type: f5(slab) [ 25.387938] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.388623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.389304] page dumped because: kasan: bad access detected [ 25.389796] [ 25.389932] Memory state around the buggy address: [ 25.390358] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.390994] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.391633] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.392268] ^ [ 25.392693] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.393329] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.393966] ================================================================== [ 24.432493] ================================================================== [ 24.433137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 24.433791] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.434451] [ 24.434594] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.434616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.434622] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.434630] Call trace: [ 24.434635] show_stack+0x20/0x38 (C) [ 24.434649] dump_stack_lvl+0x8c/0xd0 [ 24.434661] print_report+0x118/0x608 [ 24.434675] kasan_report+0xdc/0x128 [ 24.434688] kasan_check_range+0x100/0x1a8 [ 24.434702] __kasan_check_write+0x20/0x30 [ 24.434718] kasan_atomics_helper+0x684/0x4858 [ 24.434730] kasan_atomics+0x198/0x2e0 [ 24.434742] kunit_try_run_case+0x170/0x3f0 [ 24.434758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.434776] kthread+0x328/0x630 [ 24.434791] ret_from_fork+0x10/0x20 [ 24.434805] [ 24.440950] Allocated by task 319: [ 24.441258] kasan_save_stack+0x3c/0x68 [ 24.441609] kasan_save_track+0x20/0x40 [ 24.441960] kasan_save_alloc_info+0x40/0x58 [ 24.442350] __kasan_kmalloc+0xd4/0xd8 [ 24.442692] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.443107] kasan_atomics+0xb8/0x2e0 [ 24.443443] kunit_try_run_case+0x170/0x3f0 [ 24.443826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.444323] kthread+0x328/0x630 [ 24.444623] ret_from_fork+0x10/0x20 [ 24.444951] [ 24.445091] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.445091] which belongs to the cache kmalloc-64 of size 64 [ 24.446182] The buggy address is located 0 bytes to the right of [ 24.446182] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.447318] [ 24.447459] The buggy address belongs to the physical page: [ 24.447955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.448653] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.449238] page_type: f5(slab) [ 24.449528] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.450218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.450906] page dumped because: kasan: bad access detected [ 24.451404] [ 24.451544] Memory state around the buggy address: [ 24.451974] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.452617] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.453261] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.453902] ^ [ 24.454333] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.454977] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.455618] ================================================================== [ 25.418128] ================================================================== [ 25.418765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 25.419418] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.420064] [ 25.420203] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.420217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.420222] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.420227] Call trace: [ 25.420230] show_stack+0x20/0x38 (C) [ 25.420239] dump_stack_lvl+0x8c/0xd0 [ 25.420247] print_report+0x118/0x608 [ 25.420256] kasan_report+0xdc/0x128 [ 25.420264] __asan_report_load8_noabort+0x20/0x30 [ 25.420275] kasan_atomics_helper+0x3db0/0x4858 [ 25.420284] kasan_atomics+0x198/0x2e0 [ 25.420291] kunit_try_run_case+0x170/0x3f0 [ 25.420302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.420313] kthread+0x328/0x630 [ 25.420323] ret_from_fork+0x10/0x20 [ 25.420333] [ 25.426163] Allocated by task 319: [ 25.426468] kasan_save_stack+0x3c/0x68 [ 25.426813] kasan_save_track+0x20/0x40 [ 25.427158] kasan_save_alloc_info+0x40/0x58 [ 25.427541] __kasan_kmalloc+0xd4/0xd8 [ 25.427876] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.428283] kasan_atomics+0xb8/0x2e0 [ 25.428612] kunit_try_run_case+0x170/0x3f0 [ 25.428987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.429478] kthread+0x328/0x630 [ 25.429771] ret_from_fork+0x10/0x20 [ 25.430093] [ 25.430230] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.430230] which belongs to the cache kmalloc-64 of size 64 [ 25.431312] The buggy address is located 0 bytes to the right of [ 25.431312] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.432442] [ 25.432579] The buggy address belongs to the physical page: [ 25.433071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.433763] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.434340] page_type: f5(slab) [ 25.434624] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.435308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.435990] page dumped because: kasan: bad access detected [ 25.436482] [ 25.436618] Memory state around the buggy address: [ 25.437044] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.437680] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.438317] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.438954] ^ [ 25.439380] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.440017] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.440652] ================================================================== [ 24.142591] ================================================================== [ 24.143265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 24.143939] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.144613] [ 24.144768] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.144805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.144815] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.144827] Call trace: [ 24.144836] show_stack+0x20/0x38 (C) [ 24.144860] dump_stack_lvl+0x8c/0xd0 [ 24.144881] print_report+0x118/0x608 [ 24.144902] kasan_report+0xdc/0x128 [ 24.144921] kasan_check_range+0x100/0x1a8 [ 24.144941] __kasan_check_write+0x20/0x30 [ 24.144964] kasan_atomics_helper+0x24c/0x4858 [ 24.144982] kasan_atomics+0x198/0x2e0 [ 24.145000] kunit_try_run_case+0x170/0x3f0 [ 24.145024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.145050] kthread+0x328/0x630 [ 24.145073] ret_from_fork+0x10/0x20 [ 24.145094] [ 24.151282] Allocated by task 319: [ 24.151600] kasan_save_stack+0x3c/0x68 [ 24.151962] kasan_save_track+0x20/0x40 [ 24.152321] kasan_save_alloc_info+0x40/0x58 [ 24.152721] __kasan_kmalloc+0xd4/0xd8 [ 24.153072] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.153498] kasan_atomics+0xb8/0x2e0 [ 24.153841] kunit_try_run_case+0x170/0x3f0 [ 24.154232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.154742] kthread+0x328/0x630 [ 24.155050] ret_from_fork+0x10/0x20 [ 24.155388] [ 24.155535] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.155535] which belongs to the cache kmalloc-64 of size 64 [ 24.156637] The buggy address is located 0 bytes to the right of [ 24.156637] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.157787] [ 24.157935] The buggy address belongs to the physical page: [ 24.158440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.159151] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.159748] page_type: f5(slab) [ 24.160050] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.160751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.161448] page dumped because: kasan: bad access detected [ 24.161952] [ 24.162098] Memory state around the buggy address: [ 24.162536] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.163189] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.163843] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.164493] ^ [ 24.164932] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.165585] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.166236] ================================================================== [ 24.360958] ================================================================== [ 24.361603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 24.362256] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.362915] [ 24.363058] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.363079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.363086] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.363093] Call trace: [ 24.363098] show_stack+0x20/0x38 (C) [ 24.363112] dump_stack_lvl+0x8c/0xd0 [ 24.363124] print_report+0x118/0x608 [ 24.363138] kasan_report+0xdc/0x128 [ 24.363150] kasan_check_range+0x100/0x1a8 [ 24.363165] __kasan_check_write+0x20/0x30 [ 24.363179] kasan_atomics_helper+0x54c/0x4858 [ 24.363192] kasan_atomics+0x198/0x2e0 [ 24.363204] kunit_try_run_case+0x170/0x3f0 [ 24.363219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.363237] kthread+0x328/0x630 [ 24.363252] ret_from_fork+0x10/0x20 [ 24.363266] [ 24.369412] Allocated by task 319: [ 24.369720] kasan_save_stack+0x3c/0x68 [ 24.370071] kasan_save_track+0x20/0x40 [ 24.370422] kasan_save_alloc_info+0x40/0x58 [ 24.370812] __kasan_kmalloc+0xd4/0xd8 [ 24.371155] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.371570] kasan_atomics+0xb8/0x2e0 [ 24.371903] kunit_try_run_case+0x170/0x3f0 [ 24.372286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.372783] kthread+0x328/0x630 [ 24.373083] ret_from_fork+0x10/0x20 [ 24.373411] [ 24.373552] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.373552] which belongs to the cache kmalloc-64 of size 64 [ 24.374642] The buggy address is located 0 bytes to the right of [ 24.374642] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.375778] [ 24.375919] The buggy address belongs to the physical page: [ 24.376415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.377111] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.377697] page_type: f5(slab) [ 24.377985] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.378676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.379363] page dumped because: kasan: bad access detected [ 24.379860] [ 24.380001] Memory state around the buggy address: [ 24.380430] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.381074] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.381718] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.382359] ^ [ 24.382791] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.383434] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.384075] ================================================================== [ 25.112904] ================================================================== [ 25.113542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 25.114195] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.114849] [ 25.114987] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.115001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.115006] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.115010] Call trace: [ 25.115014] show_stack+0x20/0x38 (C) [ 25.115023] dump_stack_lvl+0x8c/0xd0 [ 25.115032] print_report+0x118/0x608 [ 25.115040] kasan_report+0xdc/0x128 [ 25.115049] kasan_check_range+0x100/0x1a8 [ 25.115058] __kasan_check_write+0x20/0x30 [ 25.115068] kasan_atomics_helper+0x10c0/0x4858 [ 25.115077] kasan_atomics+0x198/0x2e0 [ 25.115085] kunit_try_run_case+0x170/0x3f0 [ 25.115095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.115107] kthread+0x328/0x630 [ 25.115116] ret_from_fork+0x10/0x20 [ 25.115126] [ 25.121257] Allocated by task 319: [ 25.121562] kasan_save_stack+0x3c/0x68 [ 25.121907] kasan_save_track+0x20/0x40 [ 25.122252] kasan_save_alloc_info+0x40/0x58 [ 25.122635] __kasan_kmalloc+0xd4/0xd8 [ 25.122972] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.123380] kasan_atomics+0xb8/0x2e0 [ 25.123709] kunit_try_run_case+0x170/0x3f0 [ 25.124085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.124575] kthread+0x328/0x630 [ 25.124868] ret_from_fork+0x10/0x20 [ 25.125190] [ 25.125327] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.125327] which belongs to the cache kmalloc-64 of size 64 [ 25.126410] The buggy address is located 0 bytes to the right of [ 25.126410] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.127539] [ 25.127676] The buggy address belongs to the physical page: [ 25.128167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.128860] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.129438] page_type: f5(slab) [ 25.129723] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.130407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.131088] page dumped because: kasan: bad access detected [ 25.131580] [ 25.131716] Memory state around the buggy address: [ 25.132142] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.132780] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.133417] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.134053] ^ [ 25.134479] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.135116] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.135751] ================================================================== [ 24.972242] ================================================================== [ 24.972880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 24.973533] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.974186] [ 24.974325] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.974339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.974343] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.974348] Call trace: [ 24.974352] show_stack+0x20/0x38 (C) [ 24.974361] dump_stack_lvl+0x8c/0xd0 [ 24.974369] print_report+0x118/0x608 [ 24.974378] kasan_report+0xdc/0x128 [ 24.974387] __asan_report_store8_noabort+0x20/0x30 [ 24.974397] kasan_atomics_helper+0x3e5c/0x4858 [ 24.974406] kasan_atomics+0x198/0x2e0 [ 24.974414] kunit_try_run_case+0x170/0x3f0 [ 24.974424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.974435] kthread+0x328/0x630 [ 24.974445] ret_from_fork+0x10/0x20 [ 24.974454] [ 24.980290] Allocated by task 319: [ 24.980594] kasan_save_stack+0x3c/0x68 [ 24.980939] kasan_save_track+0x20/0x40 [ 24.981285] kasan_save_alloc_info+0x40/0x58 [ 24.981668] __kasan_kmalloc+0xd4/0xd8 [ 24.982005] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.982411] kasan_atomics+0xb8/0x2e0 [ 24.982740] kunit_try_run_case+0x170/0x3f0 [ 24.983115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.983606] kthread+0x328/0x630 [ 24.983899] ret_from_fork+0x10/0x20 [ 24.984221] [ 24.984358] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.984358] which belongs to the cache kmalloc-64 of size 64 [ 24.985440] The buggy address is located 0 bytes to the right of [ 24.985440] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.986569] [ 24.986706] The buggy address belongs to the physical page: [ 24.987197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.987887] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.988465] page_type: f5(slab) [ 24.988749] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.989433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.990115] page dumped because: kasan: bad access detected [ 24.990607] [ 24.990743] Memory state around the buggy address: [ 24.991168] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.991805] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.992442] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.993079] ^ [ 24.993505] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.994142] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.994778] ================================================================== [ 25.324119] ================================================================== [ 25.324757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 25.325410] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.326064] [ 25.326202] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.326216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.326220] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.326225] Call trace: [ 25.326228] show_stack+0x20/0x38 (C) [ 25.326237] dump_stack_lvl+0x8c/0xd0 [ 25.326246] print_report+0x118/0x608 [ 25.326255] kasan_report+0xdc/0x128 [ 25.326263] kasan_check_range+0x100/0x1a8 [ 25.326272] __kasan_check_write+0x20/0x30 [ 25.326283] kasan_atomics_helper+0x147c/0x4858 [ 25.326291] kasan_atomics+0x198/0x2e0 [ 25.326299] kunit_try_run_case+0x170/0x3f0 [ 25.326309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.326321] kthread+0x328/0x630 [ 25.326331] ret_from_fork+0x10/0x20 [ 25.326340] [ 25.332464] Allocated by task 319: [ 25.332768] kasan_save_stack+0x3c/0x68 [ 25.333112] kasan_save_track+0x20/0x40 [ 25.333456] kasan_save_alloc_info+0x40/0x58 [ 25.333839] __kasan_kmalloc+0xd4/0xd8 [ 25.334176] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.334583] kasan_atomics+0xb8/0x2e0 [ 25.334911] kunit_try_run_case+0x170/0x3f0 [ 25.335287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.335776] kthread+0x328/0x630 [ 25.336069] ret_from_fork+0x10/0x20 [ 25.336391] [ 25.336528] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.336528] which belongs to the cache kmalloc-64 of size 64 [ 25.337611] The buggy address is located 0 bytes to the right of [ 25.337611] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.338741] [ 25.338878] The buggy address belongs to the physical page: [ 25.339369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.340062] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.340640] page_type: f5(slab) [ 25.340924] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.341609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.342290] page dumped because: kasan: bad access detected [ 25.342782] [ 25.342919] Memory state around the buggy address: [ 25.343344] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.343981] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.344618] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.345254] ^ [ 25.345679] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.346317] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.346952] ================================================================== [ 24.995458] ================================================================== [ 24.996095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 24.996741] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.997394] [ 24.997533] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.997547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.997552] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.997556] Call trace: [ 24.997560] show_stack+0x20/0x38 (C) [ 24.997569] dump_stack_lvl+0x8c/0xd0 [ 24.997577] print_report+0x118/0x608 [ 24.997586] kasan_report+0xdc/0x128 [ 24.997595] kasan_check_range+0x100/0x1a8 [ 24.997604] __kasan_check_write+0x20/0x30 [ 24.997614] kasan_atomics_helper+0xeb8/0x4858 [ 24.997622] kasan_atomics+0x198/0x2e0 [ 24.997631] kunit_try_run_case+0x170/0x3f0 [ 24.997640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.997652] kthread+0x328/0x630 [ 24.997662] ret_from_fork+0x10/0x20 [ 24.997672] [ 25.003794] Allocated by task 319: [ 25.004099] kasan_save_stack+0x3c/0x68 [ 25.004444] kasan_save_track+0x20/0x40 [ 25.004788] kasan_save_alloc_info+0x40/0x58 [ 25.005171] __kasan_kmalloc+0xd4/0xd8 [ 25.005508] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.005915] kasan_atomics+0xb8/0x2e0 [ 25.006243] kunit_try_run_case+0x170/0x3f0 [ 25.006619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.007110] kthread+0x328/0x630 [ 25.007403] ret_from_fork+0x10/0x20 [ 25.007725] [ 25.007862] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.007862] which belongs to the cache kmalloc-64 of size 64 [ 25.008944] The buggy address is located 0 bytes to the right of [ 25.008944] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.010074] [ 25.010211] The buggy address belongs to the physical page: [ 25.010703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.011393] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.011972] page_type: f5(slab) [ 25.012255] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.012939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.013621] page dumped because: kasan: bad access detected [ 25.014113] [ 25.014250] Memory state around the buggy address: [ 25.014675] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.015313] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.015952] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.016587] ^ [ 25.017013] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.017649] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.018285] ================================================================== [ 25.558212] ================================================================== [ 25.558849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 25.559502] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.560148] [ 25.560288] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.560302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.560306] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.560311] Call trace: [ 25.560314] show_stack+0x20/0x38 (C) [ 25.560324] dump_stack_lvl+0x8c/0xd0 [ 25.560332] print_report+0x118/0x608 [ 25.560341] kasan_report+0xdc/0x128 [ 25.560349] __asan_report_load8_noabort+0x20/0x30 [ 25.560360] kasan_atomics_helper+0x3e20/0x4858 [ 25.560369] kasan_atomics+0x198/0x2e0 [ 25.560376] kunit_try_run_case+0x170/0x3f0 [ 25.560387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.560398] kthread+0x328/0x630 [ 25.560408] ret_from_fork+0x10/0x20 [ 25.560417] [ 25.566248] Allocated by task 319: [ 25.566552] kasan_save_stack+0x3c/0x68 [ 25.566897] kasan_save_track+0x20/0x40 [ 25.567241] kasan_save_alloc_info+0x40/0x58 [ 25.567625] __kasan_kmalloc+0xd4/0xd8 [ 25.567961] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.568368] kasan_atomics+0xb8/0x2e0 [ 25.568697] kunit_try_run_case+0x170/0x3f0 [ 25.569074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.569564] kthread+0x328/0x630 [ 25.569857] ret_from_fork+0x10/0x20 [ 25.570180] [ 25.570316] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.570316] which belongs to the cache kmalloc-64 of size 64 [ 25.571399] The buggy address is located 0 bytes to the right of [ 25.571399] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.572529] [ 25.572665] The buggy address belongs to the physical page: [ 25.573157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.573849] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.574426] page_type: f5(slab) [ 25.574709] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.575393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.576075] page dumped because: kasan: bad access detected [ 25.576567] [ 25.576704] Memory state around the buggy address: [ 25.577130] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.577767] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.578404] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.579040] ^ [ 25.579465] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.580102] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.580738] ================================================================== [ 24.337094] ================================================================== [ 24.337741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 24.338395] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.339054] [ 24.339197] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.339219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.339225] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.339233] Call trace: [ 24.339238] show_stack+0x20/0x38 (C) [ 24.339252] dump_stack_lvl+0x8c/0xd0 [ 24.339265] print_report+0x118/0x608 [ 24.339279] kasan_report+0xdc/0x128 [ 24.339291] kasan_check_range+0x100/0x1a8 [ 24.339305] __kasan_check_write+0x20/0x30 [ 24.339321] kasan_atomics_helper+0x4e4/0x4858 [ 24.339333] kasan_atomics+0x198/0x2e0 [ 24.339345] kunit_try_run_case+0x170/0x3f0 [ 24.339360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.339378] kthread+0x328/0x630 [ 24.339393] ret_from_fork+0x10/0x20 [ 24.339407] [ 24.345552] Allocated by task 319: [ 24.345860] kasan_save_stack+0x3c/0x68 [ 24.346211] kasan_save_track+0x20/0x40 [ 24.346562] kasan_save_alloc_info+0x40/0x58 [ 24.346952] __kasan_kmalloc+0xd4/0xd8 [ 24.347294] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.347708] kasan_atomics+0xb8/0x2e0 [ 24.348043] kunit_try_run_case+0x170/0x3f0 [ 24.348426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.348923] kthread+0x328/0x630 [ 24.349223] ret_from_fork+0x10/0x20 [ 24.349551] [ 24.349691] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.349691] which belongs to the cache kmalloc-64 of size 64 [ 24.350782] The buggy address is located 0 bytes to the right of [ 24.350782] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.351920] [ 24.352061] The buggy address belongs to the physical page: [ 24.352558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.353256] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.353841] page_type: f5(slab) [ 24.354132] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.354822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.355509] page dumped because: kasan: bad access detected [ 24.356007] [ 24.356147] Memory state around the buggy address: [ 24.356577] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.357221] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.357864] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.358505] ^ [ 24.358936] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.359580] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.360221] ================================================================== [ 24.902099] ================================================================== [ 24.902737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 24.903383] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.904029] [ 24.904167] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.904182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.904186] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.904191] Call trace: [ 24.904194] show_stack+0x20/0x38 (C) [ 24.904203] dump_stack_lvl+0x8c/0xd0 [ 24.904213] print_report+0x118/0x608 [ 24.904222] kasan_report+0xdc/0x128 [ 24.904230] kasan_check_range+0x100/0x1a8 [ 24.904239] __kasan_check_read+0x20/0x30 [ 24.904250] kasan_atomics_helper+0xdd4/0x4858 [ 24.904259] kasan_atomics+0x198/0x2e0 [ 24.904266] kunit_try_run_case+0x170/0x3f0 [ 24.904277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.904290] kthread+0x328/0x630 [ 24.904300] ret_from_fork+0x10/0x20 [ 24.904309] [ 24.910423] Allocated by task 319: [ 24.910728] kasan_save_stack+0x3c/0x68 [ 24.911072] kasan_save_track+0x20/0x40 [ 24.911416] kasan_save_alloc_info+0x40/0x58 [ 24.911799] __kasan_kmalloc+0xd4/0xd8 [ 24.912136] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.912543] kasan_atomics+0xb8/0x2e0 [ 24.912870] kunit_try_run_case+0x170/0x3f0 [ 24.913247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.913739] kthread+0x328/0x630 [ 24.914032] ret_from_fork+0x10/0x20 [ 24.914354] [ 24.914492] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.914492] which belongs to the cache kmalloc-64 of size 64 [ 24.915575] The buggy address is located 0 bytes to the right of [ 24.915575] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.916705] [ 24.916843] The buggy address belongs to the physical page: [ 24.917335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.918027] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.918605] page_type: f5(slab) [ 24.918888] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.919572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.920253] page dumped because: kasan: bad access detected [ 24.920745] [ 24.920883] Memory state around the buggy address: [ 24.921309] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.921947] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.922584] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.923221] ^ [ 24.923647] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.924284] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.924921] ================================================================== [ 25.183431] ================================================================== [ 25.184070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 25.184723] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.185376] [ 25.185515] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.185529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.185533] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.185538] Call trace: [ 25.185541] show_stack+0x20/0x38 (C) [ 25.185551] dump_stack_lvl+0x8c/0xd0 [ 25.185559] print_report+0x118/0x608 [ 25.185568] kasan_report+0xdc/0x128 [ 25.185576] kasan_check_range+0x100/0x1a8 [ 25.185586] __kasan_check_write+0x20/0x30 [ 25.185595] kasan_atomics_helper+0x11f8/0x4858 [ 25.185604] kasan_atomics+0x198/0x2e0 [ 25.185612] kunit_try_run_case+0x170/0x3f0 [ 25.185622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.185634] kthread+0x328/0x630 [ 25.185644] ret_from_fork+0x10/0x20 [ 25.185653] [ 25.191780] Allocated by task 319: [ 25.192085] kasan_save_stack+0x3c/0x68 [ 25.192429] kasan_save_track+0x20/0x40 [ 25.192772] kasan_save_alloc_info+0x40/0x58 [ 25.193155] __kasan_kmalloc+0xd4/0xd8 [ 25.193492] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.193899] kasan_atomics+0xb8/0x2e0 [ 25.194228] kunit_try_run_case+0x170/0x3f0 [ 25.194604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.195093] kthread+0x328/0x630 [ 25.195386] ret_from_fork+0x10/0x20 [ 25.195708] [ 25.195845] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.195845] which belongs to the cache kmalloc-64 of size 64 [ 25.196928] The buggy address is located 0 bytes to the right of [ 25.196928] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.198058] [ 25.198195] The buggy address belongs to the physical page: [ 25.198687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.199378] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.199956] page_type: f5(slab) [ 25.200240] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.200924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.201606] page dumped because: kasan: bad access detected [ 25.202100] [ 25.202238] Memory state around the buggy address: [ 25.202663] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.203301] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.203937] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.204573] ^ [ 25.204999] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.205636] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.206272] ================================================================== [ 25.230434] ================================================================== [ 25.231071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 25.231724] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.232377] [ 25.232515] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.232530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.232534] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.232538] Call trace: [ 25.232542] show_stack+0x20/0x38 (C) [ 25.232551] dump_stack_lvl+0x8c/0xd0 [ 25.232559] print_report+0x118/0x608 [ 25.232567] kasan_report+0xdc/0x128 [ 25.232576] kasan_check_range+0x100/0x1a8 [ 25.232586] __kasan_check_write+0x20/0x30 [ 25.232595] kasan_atomics_helper+0x12d8/0x4858 [ 25.232604] kasan_atomics+0x198/0x2e0 [ 25.232612] kunit_try_run_case+0x170/0x3f0 [ 25.232622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.232633] kthread+0x328/0x630 [ 25.232643] ret_from_fork+0x10/0x20 [ 25.232652] [ 25.238779] Allocated by task 319: [ 25.239084] kasan_save_stack+0x3c/0x68 [ 25.239429] kasan_save_track+0x20/0x40 [ 25.239774] kasan_save_alloc_info+0x40/0x58 [ 25.240157] __kasan_kmalloc+0xd4/0xd8 [ 25.240494] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.240902] kasan_atomics+0xb8/0x2e0 [ 25.241231] kunit_try_run_case+0x170/0x3f0 [ 25.241607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.242097] kthread+0x328/0x630 [ 25.242390] ret_from_fork+0x10/0x20 [ 25.242712] [ 25.242850] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.242850] which belongs to the cache kmalloc-64 of size 64 [ 25.243932] The buggy address is located 0 bytes to the right of [ 25.243932] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.245062] [ 25.245198] The buggy address belongs to the physical page: [ 25.245690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.246381] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.246960] page_type: f5(slab) [ 25.247244] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.247927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.248609] page dumped because: kasan: bad access detected [ 25.249101] [ 25.249238] Memory state around the buggy address: [ 25.249663] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.250300] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.250937] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.251573] ^ [ 25.251999] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.252635] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.253272] ================================================================== [ 25.089403] ================================================================== [ 25.090040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 25.090693] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.091347] [ 25.091485] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.091499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.091503] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.091508] Call trace: [ 25.091511] show_stack+0x20/0x38 (C) [ 25.091520] dump_stack_lvl+0x8c/0xd0 [ 25.091529] print_report+0x118/0x608 [ 25.091537] kasan_report+0xdc/0x128 [ 25.091546] kasan_check_range+0x100/0x1a8 [ 25.091555] __kasan_check_write+0x20/0x30 [ 25.091565] kasan_atomics_helper+0x1058/0x4858 [ 25.091574] kasan_atomics+0x198/0x2e0 [ 25.091582] kunit_try_run_case+0x170/0x3f0 [ 25.091592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.091604] kthread+0x328/0x630 [ 25.091613] ret_from_fork+0x10/0x20 [ 25.091622] [ 25.097752] Allocated by task 319: [ 25.098057] kasan_save_stack+0x3c/0x68 [ 25.098402] kasan_save_track+0x20/0x40 [ 25.098746] kasan_save_alloc_info+0x40/0x58 [ 25.099128] __kasan_kmalloc+0xd4/0xd8 [ 25.099465] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.099872] kasan_atomics+0xb8/0x2e0 [ 25.100201] kunit_try_run_case+0x170/0x3f0 [ 25.100578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.101067] kthread+0x328/0x630 [ 25.101360] ret_from_fork+0x10/0x20 [ 25.101682] [ 25.101819] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.101819] which belongs to the cache kmalloc-64 of size 64 [ 25.102901] The buggy address is located 0 bytes to the right of [ 25.102901] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.104031] [ 25.104168] The buggy address belongs to the physical page: [ 25.104659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.105351] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.105929] page_type: f5(slab) [ 25.106213] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.106896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.107578] page dumped because: kasan: bad access detected [ 25.108070] [ 25.108207] Memory state around the buggy address: [ 25.108632] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.109271] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.109907] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.110545] ^ [ 25.110971] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.111608] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.112243] ================================================================== [ 24.456376] ================================================================== [ 24.457023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 24.457677] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.458338] [ 24.458481] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.458503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.458510] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.458517] Call trace: [ 24.458523] show_stack+0x20/0x38 (C) [ 24.458537] dump_stack_lvl+0x8c/0xd0 [ 24.458550] print_report+0x118/0x608 [ 24.458563] kasan_report+0xdc/0x128 [ 24.458575] kasan_check_range+0x100/0x1a8 [ 24.458590] __kasan_check_write+0x20/0x30 [ 24.458605] kasan_atomics_helper+0x6ec/0x4858 [ 24.458617] kasan_atomics+0x198/0x2e0 [ 24.458629] kunit_try_run_case+0x170/0x3f0 [ 24.458645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.458663] kthread+0x328/0x630 [ 24.458678] ret_from_fork+0x10/0x20 [ 24.458692] [ 24.464839] Allocated by task 319: [ 24.465148] kasan_save_stack+0x3c/0x68 [ 24.465499] kasan_save_track+0x20/0x40 [ 24.465849] kasan_save_alloc_info+0x40/0x58 [ 24.466239] __kasan_kmalloc+0xd4/0xd8 [ 24.466581] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.466995] kasan_atomics+0xb8/0x2e0 [ 24.467330] kunit_try_run_case+0x170/0x3f0 [ 24.467712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.468210] kthread+0x328/0x630 [ 24.468509] ret_from_fork+0x10/0x20 [ 24.468838] [ 24.468979] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.468979] which belongs to the cache kmalloc-64 of size 64 [ 24.470069] The buggy address is located 0 bytes to the right of [ 24.470069] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.471205] [ 24.471346] The buggy address belongs to the physical page: [ 24.471844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.472542] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.473126] page_type: f5(slab) [ 24.473415] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.474106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.474792] page dumped because: kasan: bad access detected [ 24.475289] [ 24.475430] Memory state around the buggy address: [ 24.475859] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.476503] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.477147] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.477788] ^ [ 24.478219] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.478862] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.479504] ================================================================== [ 24.715325] ================================================================== [ 24.715962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 24.716608] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.717261] [ 24.717400] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.717414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.717418] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.717423] Call trace: [ 24.717426] show_stack+0x20/0x38 (C) [ 24.717435] dump_stack_lvl+0x8c/0xd0 [ 24.717444] print_report+0x118/0x608 [ 24.717452] kasan_report+0xdc/0x128 [ 24.717461] kasan_check_range+0x100/0x1a8 [ 24.717470] __kasan_check_write+0x20/0x30 [ 24.717480] kasan_atomics_helper+0xb70/0x4858 [ 24.717489] kasan_atomics+0x198/0x2e0 [ 24.717496] kunit_try_run_case+0x170/0x3f0 [ 24.717507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.717518] kthread+0x328/0x630 [ 24.717528] ret_from_fork+0x10/0x20 [ 24.717538] [ 24.723661] Allocated by task 319: [ 24.723966] kasan_save_stack+0x3c/0x68 [ 24.724311] kasan_save_track+0x20/0x40 [ 24.724655] kasan_save_alloc_info+0x40/0x58 [ 24.725038] __kasan_kmalloc+0xd4/0xd8 [ 24.725375] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.725782] kasan_atomics+0xb8/0x2e0 [ 24.726111] kunit_try_run_case+0x170/0x3f0 [ 24.726488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.726979] kthread+0x328/0x630 [ 24.727272] ret_from_fork+0x10/0x20 [ 24.727594] [ 24.727730] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.727730] which belongs to the cache kmalloc-64 of size 64 [ 24.728813] The buggy address is located 0 bytes to the right of [ 24.728813] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.729943] [ 24.730080] The buggy address belongs to the physical page: [ 24.730572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.731264] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.731842] page_type: f5(slab) [ 24.732126] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.732809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.733492] page dumped because: kasan: bad access detected [ 24.733983] [ 24.734120] Memory state around the buggy address: [ 24.734544] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.735180] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.735817] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.736453] ^ [ 24.736877] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.737514] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.738150] ================================================================== [ 25.253938] ================================================================== [ 25.254575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 25.255229] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.255883] [ 25.256021] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.256036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.256040] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.256045] Call trace: [ 25.256048] show_stack+0x20/0x38 (C) [ 25.256057] dump_stack_lvl+0x8c/0xd0 [ 25.256066] print_report+0x118/0x608 [ 25.256075] kasan_report+0xdc/0x128 [ 25.256083] kasan_check_range+0x100/0x1a8 [ 25.256092] __kasan_check_write+0x20/0x30 [ 25.256103] kasan_atomics_helper+0x1384/0x4858 [ 25.256111] kasan_atomics+0x198/0x2e0 [ 25.256119] kunit_try_run_case+0x170/0x3f0 [ 25.256129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.256141] kthread+0x328/0x630 [ 25.256151] ret_from_fork+0x10/0x20 [ 25.256160] [ 25.262293] Allocated by task 319: [ 25.262598] kasan_save_stack+0x3c/0x68 [ 25.262942] kasan_save_track+0x20/0x40 [ 25.263286] kasan_save_alloc_info+0x40/0x58 [ 25.263669] __kasan_kmalloc+0xd4/0xd8 [ 25.264006] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.264413] kasan_atomics+0xb8/0x2e0 [ 25.264742] kunit_try_run_case+0x170/0x3f0 [ 25.265117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.265608] kthread+0x328/0x630 [ 25.265901] ret_from_fork+0x10/0x20 [ 25.266223] [ 25.266361] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.266361] which belongs to the cache kmalloc-64 of size 64 [ 25.267445] The buggy address is located 0 bytes to the right of [ 25.267445] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.268575] [ 25.268713] The buggy address belongs to the physical page: [ 25.269205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.269895] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.270472] page_type: f5(slab) [ 25.270755] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.271440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.272121] page dumped because: kasan: bad access detected [ 25.272614] [ 25.272751] Memory state around the buggy address: [ 25.273176] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.273813] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.274450] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.275086] ^ [ 25.275512] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.276151] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.276786] ================================================================== [ 25.159928] ================================================================== [ 25.160565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 25.161218] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.161872] [ 25.162010] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.162024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.162028] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.162033] Call trace: [ 25.162036] show_stack+0x20/0x38 (C) [ 25.162045] dump_stack_lvl+0x8c/0xd0 [ 25.162054] print_report+0x118/0x608 [ 25.162063] kasan_report+0xdc/0x128 [ 25.162071] kasan_check_range+0x100/0x1a8 [ 25.162080] __kasan_check_write+0x20/0x30 [ 25.162091] kasan_atomics_helper+0x1190/0x4858 [ 25.162099] kasan_atomics+0x198/0x2e0 [ 25.162107] kunit_try_run_case+0x170/0x3f0 [ 25.162117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.162129] kthread+0x328/0x630 [ 25.162139] ret_from_fork+0x10/0x20 [ 25.162148] [ 25.168276] Allocated by task 319: [ 25.168580] kasan_save_stack+0x3c/0x68 [ 25.168924] kasan_save_track+0x20/0x40 [ 25.169269] kasan_save_alloc_info+0x40/0x58 [ 25.169653] __kasan_kmalloc+0xd4/0xd8 [ 25.169990] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.170396] kasan_atomics+0xb8/0x2e0 [ 25.170725] kunit_try_run_case+0x170/0x3f0 [ 25.171102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.171592] kthread+0x328/0x630 [ 25.171884] ret_from_fork+0x10/0x20 [ 25.172206] [ 25.172344] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.172344] which belongs to the cache kmalloc-64 of size 64 [ 25.173427] The buggy address is located 0 bytes to the right of [ 25.173427] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.174557] [ 25.174695] The buggy address belongs to the physical page: [ 25.175187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.175879] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.176456] page_type: f5(slab) [ 25.176739] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.177424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.178105] page dumped because: kasan: bad access detected [ 25.178599] [ 25.178737] Memory state around the buggy address: [ 25.179162] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.179799] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.180438] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.181074] ^ [ 25.181500] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.182136] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.182772] ================================================================== [ 24.551473] ================================================================== [ 24.552112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 24.552767] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.553412] [ 24.553550] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.553565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.553570] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.553574] Call trace: [ 24.553578] show_stack+0x20/0x38 (C) [ 24.553587] dump_stack_lvl+0x8c/0xd0 [ 24.553596] print_report+0x118/0x608 [ 24.553605] kasan_report+0xdc/0x128 [ 24.553614] __asan_report_load4_noabort+0x20/0x30 [ 24.553624] kasan_atomics_helper+0x42d8/0x4858 [ 24.553633] kasan_atomics+0x198/0x2e0 [ 24.553640] kunit_try_run_case+0x170/0x3f0 [ 24.553651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.553663] kthread+0x328/0x630 [ 24.553673] ret_from_fork+0x10/0x20 [ 24.553682] [ 24.559515] Allocated by task 319: [ 24.559819] kasan_save_stack+0x3c/0x68 [ 24.560163] kasan_save_track+0x20/0x40 [ 24.560508] kasan_save_alloc_info+0x40/0x58 [ 24.560891] __kasan_kmalloc+0xd4/0xd8 [ 24.561228] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.561636] kasan_atomics+0xb8/0x2e0 [ 24.561965] kunit_try_run_case+0x170/0x3f0 [ 24.562340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.562831] kthread+0x328/0x630 [ 24.563124] ret_from_fork+0x10/0x20 [ 24.563446] [ 24.563582] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.563582] which belongs to the cache kmalloc-64 of size 64 [ 24.564665] The buggy address is located 0 bytes to the right of [ 24.564665] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.565795] [ 24.565932] The buggy address belongs to the physical page: [ 24.566424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.567116] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.567695] page_type: f5(slab) [ 24.567979] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.568663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.569345] page dumped because: kasan: bad access detected [ 24.569837] [ 24.569975] Memory state around the buggy address: [ 24.570401] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.571038] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.571675] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.572311] ^ [ 24.572737] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.573375] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.574011] ================================================================== [ 25.441303] ================================================================== [ 25.441941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 25.442594] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.443247] [ 25.443385] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.443400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.443403] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.443408] Call trace: [ 25.443412] show_stack+0x20/0x38 (C) [ 25.443421] dump_stack_lvl+0x8c/0xd0 [ 25.443430] print_report+0x118/0x608 [ 25.443438] kasan_report+0xdc/0x128 [ 25.443447] kasan_check_range+0x100/0x1a8 [ 25.443456] __kasan_check_write+0x20/0x30 [ 25.443466] kasan_atomics_helper+0x1644/0x4858 [ 25.443475] kasan_atomics+0x198/0x2e0 [ 25.443482] kunit_try_run_case+0x170/0x3f0 [ 25.443492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.443504] kthread+0x328/0x630 [ 25.443514] ret_from_fork+0x10/0x20 [ 25.443523] [ 25.449654] Allocated by task 319: [ 25.449959] kasan_save_stack+0x3c/0x68 [ 25.450302] kasan_save_track+0x20/0x40 [ 25.450646] kasan_save_alloc_info+0x40/0x58 [ 25.451029] __kasan_kmalloc+0xd4/0xd8 [ 25.451364] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.451772] kasan_atomics+0xb8/0x2e0 [ 25.452101] kunit_try_run_case+0x170/0x3f0 [ 25.452477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.452967] kthread+0x328/0x630 [ 25.453260] ret_from_fork+0x10/0x20 [ 25.453582] [ 25.453720] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.453720] which belongs to the cache kmalloc-64 of size 64 [ 25.454803] The buggy address is located 0 bytes to the right of [ 25.454803] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.455932] [ 25.456069] The buggy address belongs to the physical page: [ 25.456561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.457251] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.457828] page_type: f5(slab) [ 25.458113] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.458797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.459477] page dumped because: kasan: bad access detected [ 25.459969] [ 25.460106] Memory state around the buggy address: [ 25.460531] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.461168] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.461805] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.462441] ^ [ 25.462867] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.463503] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.464139] ================================================================== [ 25.206929] ================================================================== [ 25.207568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 25.208220] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.208874] [ 25.209014] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.209028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.209032] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.209037] Call trace: [ 25.209040] show_stack+0x20/0x38 (C) [ 25.209050] dump_stack_lvl+0x8c/0xd0 [ 25.209058] print_report+0x118/0x608 [ 25.209067] kasan_report+0xdc/0x128 [ 25.209075] kasan_check_range+0x100/0x1a8 [ 25.209085] __kasan_check_write+0x20/0x30 [ 25.209094] kasan_atomics_helper+0x126c/0x4858 [ 25.209103] kasan_atomics+0x198/0x2e0 [ 25.209111] kunit_try_run_case+0x170/0x3f0 [ 25.209122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.209133] kthread+0x328/0x630 [ 25.209143] ret_from_fork+0x10/0x20 [ 25.209152] [ 25.215282] Allocated by task 319: [ 25.215586] kasan_save_stack+0x3c/0x68 [ 25.215931] kasan_save_track+0x20/0x40 [ 25.216275] kasan_save_alloc_info+0x40/0x58 [ 25.216658] __kasan_kmalloc+0xd4/0xd8 [ 25.216995] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.217402] kasan_atomics+0xb8/0x2e0 [ 25.217731] kunit_try_run_case+0x170/0x3f0 [ 25.218106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.218596] kthread+0x328/0x630 [ 25.218888] ret_from_fork+0x10/0x20 [ 25.219211] [ 25.219347] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.219347] which belongs to the cache kmalloc-64 of size 64 [ 25.220430] The buggy address is located 0 bytes to the right of [ 25.220430] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.221559] [ 25.221696] The buggy address belongs to the physical page: [ 25.222187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.222879] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.223457] page_type: f5(slab) [ 25.223741] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.224425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.225107] page dumped because: kasan: bad access detected [ 25.225599] [ 25.225735] Memory state around the buggy address: [ 25.226159] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.226796] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.227433] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.228069] ^ [ 25.228494] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.229132] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.229767] ================================================================== [ 25.534710] ================================================================== [ 25.535347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 25.536000] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 25.536653] [ 25.536792] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.536806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.536810] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.536815] Call trace: [ 25.536818] show_stack+0x20/0x38 (C) [ 25.536827] dump_stack_lvl+0x8c/0xd0 [ 25.536836] print_report+0x118/0x608 [ 25.536844] kasan_report+0xdc/0x128 [ 25.536853] kasan_check_range+0x100/0x1a8 [ 25.536862] __kasan_check_write+0x20/0x30 [ 25.536872] kasan_atomics_helper+0x175c/0x4858 [ 25.536881] kasan_atomics+0x198/0x2e0 [ 25.536889] kunit_try_run_case+0x170/0x3f0 [ 25.536899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.536911] kthread+0x328/0x630 [ 25.536920] ret_from_fork+0x10/0x20 [ 25.536930] [ 25.543059] Allocated by task 319: [ 25.543364] kasan_save_stack+0x3c/0x68 [ 25.543708] kasan_save_track+0x20/0x40 [ 25.544051] kasan_save_alloc_info+0x40/0x58 [ 25.544434] __kasan_kmalloc+0xd4/0xd8 [ 25.544771] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.545178] kasan_atomics+0xb8/0x2e0 [ 25.545507] kunit_try_run_case+0x170/0x3f0 [ 25.545883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.546373] kthread+0x328/0x630 [ 25.546667] ret_from_fork+0x10/0x20 [ 25.546989] [ 25.547126] The buggy address belongs to the object at ffff00000a4bdd00 [ 25.547126] which belongs to the cache kmalloc-64 of size 64 [ 25.548209] The buggy address is located 0 bytes to the right of [ 25.548209] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 25.549339] [ 25.549476] The buggy address belongs to the physical page: [ 25.549968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 25.550658] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.551237] page_type: f5(slab) [ 25.551522] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 25.552205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.552887] page dumped because: kasan: bad access detected [ 25.553379] [ 25.553515] Memory state around the buggy address: [ 25.553941] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.554578] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.555215] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.555851] ^ [ 25.556277] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.556915] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.557550] ================================================================== [ 24.264029] ================================================================== [ 24.264684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 24.265346] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319 [ 24.266017] [ 24.266166] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.266197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.266207] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.266218] Call trace: [ 24.266225] show_stack+0x20/0x38 (C) [ 24.266245] dump_stack_lvl+0x8c/0xd0 [ 24.266264] print_report+0x118/0x608 [ 24.266283] kasan_report+0xdc/0x128 [ 24.266301] kasan_check_range+0x100/0x1a8 [ 24.266322] __kasan_check_write+0x20/0x30 [ 24.266344] kasan_atomics_helper+0x3ac/0x4858 [ 24.266363] kasan_atomics+0x198/0x2e0 [ 24.266381] kunit_try_run_case+0x170/0x3f0 [ 24.266404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.266429] kthread+0x328/0x630 [ 24.266451] ret_from_fork+0x10/0x20 [ 24.266472] [ 24.272649] Allocated by task 319: [ 24.272966] kasan_save_stack+0x3c/0x68 [ 24.273325] kasan_save_track+0x20/0x40 [ 24.273683] kasan_save_alloc_info+0x40/0x58 [ 24.274082] __kasan_kmalloc+0xd4/0xd8 [ 24.274433] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.274858] kasan_atomics+0xb8/0x2e0 [ 24.275200] kunit_try_run_case+0x170/0x3f0 [ 24.275592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.276100] kthread+0x328/0x630 [ 24.276409] ret_from_fork+0x10/0x20 [ 24.276747] [ 24.276893] The buggy address belongs to the object at ffff00000a4bdd00 [ 24.276893] which belongs to the cache kmalloc-64 of size 64 [ 24.277994] The buggy address is located 0 bytes to the right of [ 24.277994] allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30) [ 24.279143] [ 24.279289] The buggy address belongs to the physical page: [ 24.279793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd [ 24.280500] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.281095] page_type: f5(slab) [ 24.281393] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 24.282093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.282788] page dumped because: kasan: bad access detected [ 24.283292] [ 24.283437] Memory state around the buggy address: [ 24.283874] ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.284528] ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.285180] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.285830] ^ [ 24.286268] ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.286921] ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.287570] ==================================================================