Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 81.858337] ================================================================== [ 81.865600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x5ab0 [ 81.873046] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 81.879730] [ 81.881225] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 81.881256] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.881256] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.881286] Call trace: [ 81.881286] unwind_backtrace from show_stack+0x18/0x1c [ 81.881317] show_stack from dump_stack_lvl+0x70/0x90 [ 81.881317] dump_stack_lvl from print_report+0x158/0x528 [ 81.881347] print_report from kasan_report+0xdc/0x118 [ 81.881378] kasan_report from kasan_check_range+0x14c/0x198 [ 81.881408] kasan_check_range from kasan_atomics_helper+0x154c/0x5ab0 [ 81.881439] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.881439] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.881469] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.881500] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.881530] kthread from ret_from_fork+0x14/0x20 [ 81.881561] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 81.881561] 3fa0: 00000000 00000000 00000000 00000000 [ 81.881591] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.881591] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.881622] [ 81.998718] Allocated by task 321: [ 82.002136] kasan_save_track+0x30/0x5c [ 82.006011] __kasan_kmalloc+0x8c/0x94 [ 82.009796] kasan_atomics+0xc0/0x33c [ 82.013488] kunit_try_run_case+0x22c/0x5a8 [ 82.017700] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.023223] kthread+0x464/0x810 [ 82.026489] ret_from_fork+0x14/0x20 [ 82.030090] [ 82.031616] The buggy address belongs to the object at cc23e880 [ 82.031616] which belongs to the cache kmalloc-64 of size 64 [ 82.043334] The buggy address is located 0 bytes to the right of [ 82.043334] allocated 48-byte region [cc23e880, cc23e8b0) [ 82.054870] [ 82.056396] The buggy address belongs to the physical page: [ 82.061981] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 82.069274] flags: 0x0(zone=0) [ 82.072357] page_type: f5(slab) [ 82.075500] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.083648] raw: 00000000 [ 82.086303] page dumped because: kasan: bad access detected [ 82.091918] [ 82.093414] Memory state around the buggy address: [ 82.098236] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.104797] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.111389] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.117950] ^ [ 82.122070] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.128662] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.135223] ================================================================== [ 83.267395] ================================================================== [ 83.274658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1774/0x5ab0 [ 83.282104] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 83.288879] [ 83.290374] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 83.290405] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.290405] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.290435] Call trace: [ 83.290435] unwind_backtrace from show_stack+0x18/0x1c [ 83.290466] show_stack from dump_stack_lvl+0x70/0x90 [ 83.290466] dump_stack_lvl from print_report+0x158/0x528 [ 83.290496] print_report from kasan_report+0xdc/0x118 [ 83.290527] kasan_report from kasan_check_range+0x14c/0x198 [ 83.290557] kasan_check_range from kasan_atomics_helper+0x1774/0x5ab0 [ 83.290588] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.290588] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.290618] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.290649] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.290679] kthread from ret_from_fork+0x14/0x20 [ 83.290710] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 83.290710] 3fa0: 00000000 00000000 00000000 00000000 [ 83.290740] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.290740] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.290771] [ 83.407867] Allocated by task 321: [ 83.411285] kasan_save_track+0x30/0x5c [ 83.415161] __kasan_kmalloc+0x8c/0x94 [ 83.418945] kasan_atomics+0xc0/0x33c [ 83.422637] kunit_try_run_case+0x22c/0x5a8 [ 83.426849] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.432403] kthread+0x464/0x810 [ 83.435638] ret_from_fork+0x14/0x20 [ 83.439239] [ 83.440765] The buggy address belongs to the object at cc23e880 [ 83.440765] which belongs to the cache kmalloc-64 of size 64 [ 83.452484] The buggy address is located 0 bytes to the right of [ 83.452484] allocated 48-byte region [cc23e880, cc23e8b0) [ 83.464019] [ 83.465545] The buggy address belongs to the physical page: [ 83.471130] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 83.478424] flags: 0x0(zone=0) [ 83.481506] page_type: f5(slab) [ 83.484680] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 83.492797] raw: 00000000 [ 83.495452] page dumped because: kasan: bad access detected [ 83.501068] [ 83.502563] Memory state around the buggy address: [ 83.507385] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.513946] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.520538] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 83.527099] ^ [ 83.531219] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.537811] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.544372] ================================================================== [ 75.062286] ================================================================== [ 75.069549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x648/0x5ab0 [ 75.076904] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 75.083648] [ 75.085174] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 75.085205] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.085205] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.085205] Call trace: [ 75.085235] unwind_backtrace from show_stack+0x18/0x1c [ 75.085235] show_stack from dump_stack_lvl+0x70/0x90 [ 75.085266] dump_stack_lvl from print_report+0x158/0x528 [ 75.085296] print_report from kasan_report+0xdc/0x118 [ 75.085327] kasan_report from kasan_check_range+0x14c/0x198 [ 75.085357] kasan_check_range from kasan_atomics_helper+0x648/0x5ab0 [ 75.085357] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.085388] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.085418] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.085449] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.085479] kthread from ret_from_fork+0x14/0x20 [ 75.085510] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 75.085510] 3fa0: 00000000 00000000 00000000 00000000 [ 75.085540] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.085540] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.085571] [ 75.202575] Allocated by task 321: [ 75.205993] kasan_save_track+0x30/0x5c [ 75.209869] __kasan_kmalloc+0x8c/0x94 [ 75.213653] kasan_atomics+0xc0/0x33c [ 75.217346] kunit_try_run_case+0x22c/0x5a8 [ 75.221557] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.227111] kthread+0x464/0x810 [ 75.230346] ret_from_fork+0x14/0x20 [ 75.233947] [ 75.235473] The buggy address belongs to the object at cc23e880 [ 75.235473] which belongs to the cache kmalloc-64 of size 64 [ 75.247192] The buggy address is located 0 bytes to the right of [ 75.247192] allocated 48-byte region [cc23e880, cc23e8b0) [ 75.258728] [ 75.260253] The buggy address belongs to the physical page: [ 75.265838] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 75.273132] flags: 0x0(zone=0) [ 75.276214] page_type: f5(slab) [ 75.279388] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.287536] raw: 00000000 [ 75.290161] page dumped because: kasan: bad access detected [ 75.295776] [ 75.297271] Memory state around the buggy address: [ 75.302093] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.308685] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.315246] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.321807] ^ [ 75.325927] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.332519] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.339080] ================================================================== [ 79.886871] ================================================================== [ 79.894134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11a4/0x5ab0 [ 79.901611] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 79.908355] [ 79.909851] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 79.909881] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.909881] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.909912] Call trace: [ 79.909912] unwind_backtrace from show_stack+0x18/0x1c [ 79.909942] show_stack from dump_stack_lvl+0x70/0x90 [ 79.909973] dump_stack_lvl from print_report+0x158/0x528 [ 79.910003] print_report from kasan_report+0xdc/0x118 [ 79.910003] kasan_report from kasan_check_range+0x14c/0x198 [ 79.910034] kasan_check_range from kasan_atomics_helper+0x11a4/0x5ab0 [ 79.910064] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.910095] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.910125] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.910125] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.910156] kthread from ret_from_fork+0x14/0x20 [ 79.910186] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 79.910186] 3fa0: 00000000 00000000 00000000 00000000 [ 79.910217] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.910247] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.910247] [ 80.027343] Allocated by task 321: [ 80.030792] kasan_save_track+0x30/0x5c [ 80.034667] __kasan_kmalloc+0x8c/0x94 [ 80.038452] kasan_atomics+0xc0/0x33c [ 80.042144] kunit_try_run_case+0x22c/0x5a8 [ 80.046356] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.051879] kthread+0x464/0x810 [ 80.055145] ret_from_fork+0x14/0x20 [ 80.058746] [ 80.060241] The buggy address belongs to the object at cc23e880 [ 80.060241] which belongs to the cache kmalloc-64 of size 64 [ 80.071960] The buggy address is located 0 bytes to the right of [ 80.071960] allocated 48-byte region [cc23e880, cc23e8b0) [ 80.083526] [ 80.085021] The buggy address belongs to the physical page: [ 80.090637] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 80.097900] flags: 0x0(zone=0) [ 80.100982] page_type: f5(slab) [ 80.104156] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.112304] raw: 00000000 [ 80.114929] page dumped because: kasan: bad access detected [ 80.120544] [ 80.122039] Memory state around the buggy address: [ 80.126861] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.133453] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.140014] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.146575] ^ [ 80.150726] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.157287] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.163848] ================================================================== [ 73.937713] ================================================================== [ 73.945007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5200/0x5ab0 [ 73.952453] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 73.959106] [ 73.960632] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 73.960632] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.960662] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.960662] Call trace: [ 73.960662] unwind_backtrace from show_stack+0x18/0x1c [ 73.960693] show_stack from dump_stack_lvl+0x70/0x90 [ 73.960723] dump_stack_lvl from print_report+0x158/0x528 [ 73.960754] print_report from kasan_report+0xdc/0x118 [ 73.960784] kasan_report from kasan_atomics_helper+0x5200/0x5ab0 [ 73.960815] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.960815] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.960845] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.960876] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.960906] kthread from ret_from_fork+0x14/0x20 [ 73.960937] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 73.960937] 3fa0: 00000000 00000000 00000000 00000000 [ 73.960968] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.960968] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.960998] [ 74.071990] Allocated by task 321: [ 74.075408] kasan_save_track+0x30/0x5c [ 74.079284] __kasan_kmalloc+0x8c/0x94 [ 74.083068] kasan_atomics+0xc0/0x33c [ 74.086761] kunit_try_run_case+0x22c/0x5a8 [ 74.090972] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.096496] kthread+0x464/0x810 [ 74.099761] ret_from_fork+0x14/0x20 [ 74.103363] [ 74.104858] The buggy address belongs to the object at cc23e880 [ 74.104858] which belongs to the cache kmalloc-64 of size 64 [ 74.116607] The buggy address is located 0 bytes to the right of [ 74.116607] allocated 48-byte region [cc23e880, cc23e8b0) [ 74.128143] [ 74.129638] The buggy address belongs to the physical page: [ 74.135253] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 74.142517] flags: 0x0(zone=0) [ 74.145599] page_type: f5(slab) [ 74.148773] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.156921] raw: 00000000 [ 74.159545] page dumped because: kasan: bad access detected [ 74.165161] [ 74.166687] Memory state around the buggy address: [ 74.171508] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.178070] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.184631] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.191223] ^ [ 74.195343] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.201904] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.208496] ================================================================== [ 82.142547] ================================================================== [ 82.149810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52e4/0x5ab0 [ 82.157287] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 82.163940] [ 82.165435] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 82.165466] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 82.165466] Hardware name: Generic DRA74X (Flattened Device Tree) [ 82.165496] Call trace: [ 82.165496] unwind_backtrace from show_stack+0x18/0x1c [ 82.165527] show_stack from dump_stack_lvl+0x70/0x90 [ 82.165557] dump_stack_lvl from print_report+0x158/0x528 [ 82.165588] print_report from kasan_report+0xdc/0x118 [ 82.165588] kasan_report from kasan_atomics_helper+0x52e4/0x5ab0 [ 82.165618] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 82.165649] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 82.165679] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.165710] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 82.165710] kthread from ret_from_fork+0x14/0x20 [ 82.165740] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 82.165771] 3fa0: 00000000 00000000 00000000 00000000 [ 82.165771] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 82.165802] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 82.165802] [ 82.276794] Allocated by task 321: [ 82.280212] kasan_save_track+0x30/0x5c [ 82.284088] __kasan_kmalloc+0x8c/0x94 [ 82.287872] kasan_atomics+0xc0/0x33c [ 82.291564] kunit_try_run_case+0x22c/0x5a8 [ 82.295776] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.301330] kthread+0x464/0x810 [ 82.304565] ret_from_fork+0x14/0x20 [ 82.308197] [ 82.309692] The buggy address belongs to the object at cc23e880 [ 82.309692] which belongs to the cache kmalloc-64 of size 64 [ 82.321411] The buggy address is located 0 bytes to the right of [ 82.321411] allocated 48-byte region [cc23e880, cc23e8b0) [ 82.332946] [ 82.334472] The buggy address belongs to the physical page: [ 82.340057] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 82.347351] flags: 0x0(zone=0) [ 82.350433] page_type: f5(slab) [ 82.353576] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.361724] raw: 00000000 [ 82.364379] page dumped because: kasan: bad access detected [ 82.369995] [ 82.371490] Memory state around the buggy address: [ 82.376312] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.382873] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.389465] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.396026] ^ [ 82.400146] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.406738] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.413299] ================================================================== [ 77.051239] ================================================================== [ 77.058502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac4/0x5ab0 [ 77.065887] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 77.072631] [ 77.074127] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 77.074157] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.074157] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.074188] Call trace: [ 77.074188] unwind_backtrace from show_stack+0x18/0x1c [ 77.074218] show_stack from dump_stack_lvl+0x70/0x90 [ 77.074249] dump_stack_lvl from print_report+0x158/0x528 [ 77.074279] print_report from kasan_report+0xdc/0x118 [ 77.074279] kasan_report from kasan_check_range+0x14c/0x198 [ 77.074310] kasan_check_range from kasan_atomics_helper+0xac4/0x5ab0 [ 77.074340] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.074371] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.074401] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.074401] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.074432] kthread from ret_from_fork+0x14/0x20 [ 77.074462] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 77.074462] 3fa0: 00000000 00000000 00000000 00000000 [ 77.074493] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.074523] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.074523] [ 77.191528] Allocated by task 321: [ 77.194976] kasan_save_track+0x30/0x5c [ 77.198822] __kasan_kmalloc+0x8c/0x94 [ 77.202606] kasan_atomics+0xc0/0x33c [ 77.206298] kunit_try_run_case+0x22c/0x5a8 [ 77.210540] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.216064] kthread+0x464/0x810 [ 77.219329] ret_from_fork+0x14/0x20 [ 77.222930] [ 77.224426] The buggy address belongs to the object at cc23e880 [ 77.224426] which belongs to the cache kmalloc-64 of size 64 [ 77.236145] The buggy address is located 0 bytes to the right of [ 77.236145] allocated 48-byte region [cc23e880, cc23e8b0) [ 77.247711] [ 77.249206] The buggy address belongs to the physical page: [ 77.254821] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 77.262084] flags: 0x0(zone=0) [ 77.265167] page_type: f5(slab) [ 77.268341] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 77.276489] raw: 00000000 [ 77.279113] page dumped because: kasan: bad access detected [ 77.284729] [ 77.286224] Memory state around the buggy address: [ 77.291046] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.297637] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.304199] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.310760] ^ [ 77.314910] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.321472] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.328033] ================================================================== [ 85.257537] ================================================================== [ 85.264801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1bf0/0x5ab0 [ 85.272247] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 85.278991] [ 85.280517] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 85.280548] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.280548] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.280548] Call trace: [ 85.280578] unwind_backtrace from show_stack+0x18/0x1c [ 85.280578] show_stack from dump_stack_lvl+0x70/0x90 [ 85.280609] dump_stack_lvl from print_report+0x158/0x528 [ 85.280639] print_report from kasan_report+0xdc/0x118 [ 85.280670] kasan_report from kasan_check_range+0x14c/0x198 [ 85.280700] kasan_check_range from kasan_atomics_helper+0x1bf0/0x5ab0 [ 85.280700] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.280731] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.280761] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.280792] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.280822] kthread from ret_from_fork+0x14/0x20 [ 85.280822] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 85.280853] 3fa0: 00000000 00000000 00000000 00000000 [ 85.280883] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.280883] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.280914] [ 85.398010] Allocated by task 321: [ 85.401428] kasan_save_track+0x30/0x5c [ 85.405303] __kasan_kmalloc+0x8c/0x94 [ 85.409088] kasan_atomics+0xc0/0x33c [ 85.412780] kunit_try_run_case+0x22c/0x5a8 [ 85.416992] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.422515] kthread+0x464/0x810 [ 85.425781] ret_from_fork+0x14/0x20 [ 85.429382] [ 85.430877] The buggy address belongs to the object at cc23e880 [ 85.430877] which belongs to the cache kmalloc-64 of size 64 [ 85.442626] The buggy address is located 0 bytes to the right of [ 85.442626] allocated 48-byte region [cc23e880, cc23e8b0) [ 85.454162] [ 85.455657] The buggy address belongs to the physical page: [ 85.461273] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 85.468536] flags: 0x0(zone=0) [ 85.471618] page_type: f5(slab) [ 85.474792] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 85.482940] raw: 00000000 [ 85.485595] page dumped because: kasan: bad access detected [ 85.491180] [ 85.492706] Memory state around the buggy address: [ 85.497528] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.504089] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.510650] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 85.517242] ^ [ 85.521362] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.527923] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.534515] ================================================================== [ 77.903656] ================================================================== [ 77.910949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x5ab0 [ 77.918304] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 77.925048] [ 77.926544] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 77.926574] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.926605] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.926605] Call trace: [ 77.926605] unwind_backtrace from show_stack+0x18/0x1c [ 77.926635] show_stack from dump_stack_lvl+0x70/0x90 [ 77.926666] dump_stack_lvl from print_report+0x158/0x528 [ 77.926696] print_report from kasan_report+0xdc/0x118 [ 77.926727] kasan_report from kasan_check_range+0x14c/0x198 [ 77.926727] kasan_check_range from kasan_atomics_helper+0xd3c/0x5ab0 [ 77.926757] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.926788] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.926818] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.926849] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.926879] kthread from ret_from_fork+0x14/0x20 [ 77.926879] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 77.926910] 3fa0: 00000000 00000000 00000000 00000000 [ 77.926910] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.926940] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.926940] [ 78.043975] Allocated by task 321: [ 78.047393] kasan_save_track+0x30/0x5c [ 78.051269] __kasan_kmalloc+0x8c/0x94 [ 78.055053] kasan_atomics+0xc0/0x33c [ 78.058746] kunit_try_run_case+0x22c/0x5a8 [ 78.062957] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.068481] kthread+0x464/0x810 [ 78.071746] ret_from_fork+0x14/0x20 [ 78.075347] [ 78.076843] The buggy address belongs to the object at cc23e880 [ 78.076843] which belongs to the cache kmalloc-64 of size 64 [ 78.088592] The buggy address is located 0 bytes to the right of [ 78.088592] allocated 48-byte region [cc23e880, cc23e8b0) [ 78.100128] [ 78.101623] The buggy address belongs to the physical page: [ 78.107238] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 78.114532] flags: 0x0(zone=0) [ 78.117584] page_type: f5(slab) [ 78.120758] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.128906] raw: 00000000 [ 78.131561] page dumped because: kasan: bad access detected [ 78.137145] [ 78.138671] Memory state around the buggy address: [ 78.143493] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.150054] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.156616] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.163208] ^ [ 78.167327] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.173889] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.180480] ================================================================== [ 80.171173] ================================================================== [ 80.178466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1268/0x5ab0 [ 80.185913] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 80.192657] [ 80.194152] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 80.194183] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 80.194183] Hardware name: Generic DRA74X (Flattened Device Tree) [ 80.194213] Call trace: [ 80.194213] unwind_backtrace from show_stack+0x18/0x1c [ 80.194244] show_stack from dump_stack_lvl+0x70/0x90 [ 80.194274] dump_stack_lvl from print_report+0x158/0x528 [ 80.194305] print_report from kasan_report+0xdc/0x118 [ 80.194305] kasan_report from kasan_check_range+0x14c/0x198 [ 80.194335] kasan_check_range from kasan_atomics_helper+0x1268/0x5ab0 [ 80.194366] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 80.194396] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 80.194427] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.194427] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 80.194458] kthread from ret_from_fork+0x14/0x20 [ 80.194488] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 80.194488] 3fa0: 00000000 00000000 00000000 00000000 [ 80.194519] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 80.194549] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 80.194549] [ 80.311645] Allocated by task 321: [ 80.315093] kasan_save_track+0x30/0x5c [ 80.318939] __kasan_kmalloc+0x8c/0x94 [ 80.322723] kasan_atomics+0xc0/0x33c [ 80.326416] kunit_try_run_case+0x22c/0x5a8 [ 80.330657] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.336181] kthread+0x464/0x810 [ 80.339447] ret_from_fork+0x14/0x20 [ 80.343048] [ 80.344543] The buggy address belongs to the object at cc23e880 [ 80.344543] which belongs to the cache kmalloc-64 of size 64 [ 80.356262] The buggy address is located 0 bytes to the right of [ 80.356262] allocated 48-byte region [cc23e880, cc23e8b0) [ 80.367828] [ 80.369323] The buggy address belongs to the physical page: [ 80.374938] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 80.382202] flags: 0x0(zone=0) [ 80.385284] page_type: f5(slab) [ 80.388458] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.396606] raw: 00000000 [ 80.399230] page dumped because: kasan: bad access detected [ 80.404846] [ 80.406341] Memory state around the buggy address: [ 80.411163] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.417755] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.424316] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.430877] ^ [ 80.435028] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.441589] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.448150] ================================================================== [ 86.957092] ================================================================== [ 86.964355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ffc/0x5ab0 [ 86.971801] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 86.978546] [ 86.980072] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 86.980102] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.980102] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.980102] Call trace: [ 86.980133] unwind_backtrace from show_stack+0x18/0x1c [ 86.980163] show_stack from dump_stack_lvl+0x70/0x90 [ 86.980163] dump_stack_lvl from print_report+0x158/0x528 [ 86.980194] print_report from kasan_report+0xdc/0x118 [ 86.980224] kasan_report from kasan_check_range+0x14c/0x198 [ 86.980255] kasan_check_range from kasan_atomics_helper+0x1ffc/0x5ab0 [ 86.980285] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.980285] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.980316] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.980346] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.980377] kthread from ret_from_fork+0x14/0x20 [ 86.980407] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 86.980407] 3fa0: 00000000 00000000 00000000 00000000 [ 86.980438] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.980438] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.980468] [ 87.097564] Allocated by task 321: [ 87.100982] kasan_save_track+0x30/0x5c [ 87.104858] __kasan_kmalloc+0x8c/0x94 [ 87.108642] kasan_atomics+0xc0/0x33c [ 87.112335] kunit_try_run_case+0x22c/0x5a8 [ 87.116546] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.122070] kthread+0x464/0x810 [ 87.125335] ret_from_fork+0x14/0x20 [ 87.128936] [ 87.130432] The buggy address belongs to the object at cc23e880 [ 87.130432] which belongs to the cache kmalloc-64 of size 64 [ 87.142150] The buggy address is located 0 bytes to the right of [ 87.142150] allocated 48-byte region [cc23e880, cc23e8b0) [ 87.153717] [ 87.155212] The buggy address belongs to the physical page: [ 87.160827] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 87.168090] flags: 0x0(zone=0) [ 87.171173] page_type: f5(slab) [ 87.174346] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 87.182495] raw: 00000000 [ 87.185150] page dumped because: kasan: bad access detected [ 87.190734] [ 87.192230] Memory state around the buggy address: [ 87.197082] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.203643] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.210205] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 87.216766] ^ [ 87.220916] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.227478] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.234039] ================================================================== [ 85.826110] ================================================================== [ 85.833404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d50/0x5ab0 [ 85.840850] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 85.847595] [ 85.849090] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 85.849121] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.849121] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.849151] Call trace: [ 85.849151] unwind_backtrace from show_stack+0x18/0x1c [ 85.849182] show_stack from dump_stack_lvl+0x70/0x90 [ 85.849212] dump_stack_lvl from print_report+0x158/0x528 [ 85.849243] print_report from kasan_report+0xdc/0x118 [ 85.849243] kasan_report from kasan_check_range+0x14c/0x198 [ 85.849273] kasan_check_range from kasan_atomics_helper+0x1d50/0x5ab0 [ 85.849304] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.849334] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.849365] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.849365] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.849395] kthread from ret_from_fork+0x14/0x20 [ 85.849426] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 85.849426] 3fa0: 00000000 00000000 00000000 00000000 [ 85.849456] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.849487] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.849487] [ 85.966583] Allocated by task 321: [ 85.970031] kasan_save_track+0x30/0x5c [ 85.973876] __kasan_kmalloc+0x8c/0x94 [ 85.977661] kasan_atomics+0xc0/0x33c [ 85.981353] kunit_try_run_case+0x22c/0x5a8 [ 85.985595] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.991119] kthread+0x464/0x810 [ 85.994354] ret_from_fork+0x14/0x20 [ 85.997985] [ 85.999481] The buggy address belongs to the object at cc23e880 [ 85.999481] which belongs to the cache kmalloc-64 of size 64 [ 86.011199] The buggy address is located 0 bytes to the right of [ 86.011199] allocated 48-byte region [cc23e880, cc23e8b0) [ 86.022766] [ 86.024261] The buggy address belongs to the physical page: [ 86.029876] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 86.037139] flags: 0x0(zone=0) [ 86.040222] page_type: f5(slab) [ 86.043395] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.051513] raw: 00000000 [ 86.054168] page dumped because: kasan: bad access detected [ 86.059783] [ 86.061279] Memory state around the buggy address: [ 86.066101] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.072662] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.079254] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.085815] ^ [ 86.089935] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.096527] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.103088] ================================================================== [ 79.602569] ================================================================== [ 79.609832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10e0/0x5ab0 [ 79.617279] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 79.624023] [ 79.625549] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 79.625579] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.625579] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.625579] Call trace: [ 79.625610] unwind_backtrace from show_stack+0x18/0x1c [ 79.625640] show_stack from dump_stack_lvl+0x70/0x90 [ 79.625640] dump_stack_lvl from print_report+0x158/0x528 [ 79.625671] print_report from kasan_report+0xdc/0x118 [ 79.625701] kasan_report from kasan_check_range+0x14c/0x198 [ 79.625732] kasan_check_range from kasan_atomics_helper+0x10e0/0x5ab0 [ 79.625762] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.625762] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.625793] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.625823] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.625854] kthread from ret_from_fork+0x14/0x20 [ 79.625885] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 79.625885] 3fa0: 00000000 00000000 00000000 00000000 [ 79.625915] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.625915] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.625946] [ 79.743041] Allocated by task 321: [ 79.746459] kasan_save_track+0x30/0x5c [ 79.750335] __kasan_kmalloc+0x8c/0x94 [ 79.754119] kasan_atomics+0xc0/0x33c [ 79.757812] kunit_try_run_case+0x22c/0x5a8 [ 79.762023] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.767578] kthread+0x464/0x810 [ 79.770812] ret_from_fork+0x14/0x20 [ 79.774414] [ 79.775939] The buggy address belongs to the object at cc23e880 [ 79.775939] which belongs to the cache kmalloc-64 of size 64 [ 79.787658] The buggy address is located 0 bytes to the right of [ 79.787658] allocated 48-byte region [cc23e880, cc23e8b0) [ 79.799194] [ 79.800720] The buggy address belongs to the physical page: [ 79.806304] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 79.813598] flags: 0x0(zone=0) [ 79.816680] page_type: f5(slab) [ 79.819824] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 79.827972] raw: 00000000 [ 79.830627] page dumped because: kasan: bad access detected [ 79.836242] [ 79.837738] Memory state around the buggy address: [ 79.842559] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.849121] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.855712] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.862274] ^ [ 79.866394] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.872985] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.879547] ================================================================== [ 87.809936] ================================================================== [ 87.817230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2200/0x5ab0 [ 87.824676] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 87.831420] [ 87.832916] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 87.832946] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.832946] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.832977] Call trace: [ 87.832977] unwind_backtrace from show_stack+0x18/0x1c [ 87.833007] show_stack from dump_stack_lvl+0x70/0x90 [ 87.833038] dump_stack_lvl from print_report+0x158/0x528 [ 87.833068] print_report from kasan_report+0xdc/0x118 [ 87.833068] kasan_report from kasan_check_range+0x14c/0x198 [ 87.833099] kasan_check_range from kasan_atomics_helper+0x2200/0x5ab0 [ 87.833129] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.833160] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.833190] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.833190] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.833221] kthread from ret_from_fork+0x14/0x20 [ 87.833251] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 87.833251] 3fa0: 00000000 00000000 00000000 00000000 [ 87.833282] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.833312] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.833312] [ 87.950408] Allocated by task 321: [ 87.953857] kasan_save_track+0x30/0x5c [ 87.957702] __kasan_kmalloc+0x8c/0x94 [ 87.961486] kasan_atomics+0xc0/0x33c [ 87.965179] kunit_try_run_case+0x22c/0x5a8 [ 87.969421] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.974945] kthread+0x464/0x810 [ 87.978210] ret_from_fork+0x14/0x20 [ 87.981811] [ 87.983306] The buggy address belongs to the object at cc23e880 [ 87.983306] which belongs to the cache kmalloc-64 of size 64 [ 87.995025] The buggy address is located 0 bytes to the right of [ 87.995025] allocated 48-byte region [cc23e880, cc23e8b0) [ 88.006591] [ 88.008087] The buggy address belongs to the physical page: [ 88.013702] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 88.020965] flags: 0x0(zone=0) [ 88.024047] page_type: f5(slab) [ 88.027221] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.035369] raw: 00000000 [ 88.037994] page dumped because: kasan: bad access detected [ 88.043609] [ 88.045104] Memory state around the buggy address: [ 88.049926] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.056488] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.063079] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.069641] ^ [ 88.073760] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.080352] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.086914] ================================================================== [ 86.110412] ================================================================== [ 86.117706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e5c/0x5ab0 [ 86.125152] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 86.131896] [ 86.133392] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 86.133422] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.133453] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.133453] Call trace: [ 86.133453] unwind_backtrace from show_stack+0x18/0x1c [ 86.133483] show_stack from dump_stack_lvl+0x70/0x90 [ 86.133514] dump_stack_lvl from print_report+0x158/0x528 [ 86.133544] print_report from kasan_report+0xdc/0x118 [ 86.133575] kasan_report from kasan_check_range+0x14c/0x198 [ 86.133575] kasan_check_range from kasan_atomics_helper+0x1e5c/0x5ab0 [ 86.133605] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.133636] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.133666] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.133697] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.133697] kthread from ret_from_fork+0x14/0x20 [ 86.133728] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 86.133758] 3fa0: 00000000 00000000 00000000 00000000 [ 86.133758] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.133789] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.133789] [ 86.250915] Allocated by task 321: [ 86.254333] kasan_save_track+0x30/0x5c [ 86.258209] __kasan_kmalloc+0x8c/0x94 [ 86.261993] kasan_atomics+0xc0/0x33c [ 86.265686] kunit_try_run_case+0x22c/0x5a8 [ 86.269897] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.275421] kthread+0x464/0x810 [ 86.278686] ret_from_fork+0x14/0x20 [ 86.282287] [ 86.283782] The buggy address belongs to the object at cc23e880 [ 86.283782] which belongs to the cache kmalloc-64 of size 64 [ 86.295501] The buggy address is located 0 bytes to the right of [ 86.295501] allocated 48-byte region [cc23e880, cc23e8b0) [ 86.307067] [ 86.308563] The buggy address belongs to the physical page: [ 86.314178] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 86.321441] flags: 0x0(zone=0) [ 86.324523] page_type: f5(slab) [ 86.327697] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.335845] raw: 00000000 [ 86.338470] page dumped because: kasan: bad access detected [ 86.344085] [ 86.345581] Memory state around the buggy address: [ 86.350402] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.356994] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.363555] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.370117] ^ [ 86.374237] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.380828] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.387390] ================================================================== [ 89.225158] ================================================================== [ 89.232421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54f4/0x5ab0 [ 89.239898] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 89.246551] [ 89.248046] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 89.248077] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 89.248107] Hardware name: Generic DRA74X (Flattened Device Tree) [ 89.248107] Call trace: [ 89.248107] unwind_backtrace from show_stack+0x18/0x1c [ 89.248138] show_stack from dump_stack_lvl+0x70/0x90 [ 89.248168] dump_stack_lvl from print_report+0x158/0x528 [ 89.248199] print_report from kasan_report+0xdc/0x118 [ 89.248199] kasan_report from kasan_atomics_helper+0x54f4/0x5ab0 [ 89.248229] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 89.248260] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 89.248291] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.248321] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 89.248352] kthread from ret_from_fork+0x14/0x20 [ 89.248352] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 89.248382] 3fa0: 00000000 00000000 00000000 00000000 [ 89.248382] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 89.248413] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 89.248413] [ 89.359405] Allocated by task 321: [ 89.362823] kasan_save_track+0x30/0x5c [ 89.366699] __kasan_kmalloc+0x8c/0x94 [ 89.370483] kasan_atomics+0xc0/0x33c [ 89.374176] kunit_try_run_case+0x22c/0x5a8 [ 89.378387] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.383941] kthread+0x464/0x810 [ 89.387176] ret_from_fork+0x14/0x20 [ 89.390777] [ 89.392303] The buggy address belongs to the object at cc23e880 [ 89.392303] which belongs to the cache kmalloc-64 of size 64 [ 89.404022] The buggy address is located 0 bytes to the right of [ 89.404022] allocated 48-byte region [cc23e880, cc23e8b0) [ 89.415557] [ 89.417083] The buggy address belongs to the physical page: [ 89.422668] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 89.429962] flags: 0x0(zone=0) [ 89.433044] page_type: f5(slab) [ 89.436187] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 89.444335] raw: 00000000 [ 89.446990] page dumped because: kasan: bad access detected [ 89.452606] [ 89.454101] Memory state around the buggy address: [ 89.458923] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.465484] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.472076] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 89.478637] ^ [ 89.482757] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.489318] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.495910] ================================================================== [ 88.094238] ================================================================== [ 88.101501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x22c4/0x5ab0 [ 88.108947] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 88.115692] [ 88.117218] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 88.117248] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.117248] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.117279] Call trace: [ 88.117279] unwind_backtrace from show_stack+0x18/0x1c [ 88.117309] show_stack from dump_stack_lvl+0x70/0x90 [ 88.117309] dump_stack_lvl from print_report+0x158/0x528 [ 88.117340] print_report from kasan_report+0xdc/0x118 [ 88.117370] kasan_report from kasan_check_range+0x14c/0x198 [ 88.117401] kasan_check_range from kasan_atomics_helper+0x22c4/0x5ab0 [ 88.117431] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.117431] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.117462] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.117492] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.117523] kthread from ret_from_fork+0x14/0x20 [ 88.117553] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 88.117553] 3fa0: 00000000 00000000 00000000 00000000 [ 88.117584] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.117584] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.117614] [ 88.234710] Allocated by task 321: [ 88.238128] kasan_save_track+0x30/0x5c [ 88.242004] __kasan_kmalloc+0x8c/0x94 [ 88.245788] kasan_atomics+0xc0/0x33c [ 88.249481] kunit_try_run_case+0x22c/0x5a8 [ 88.253692] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.259216] kthread+0x464/0x810 [ 88.262481] ret_from_fork+0x14/0x20 [ 88.266082] [ 88.267578] The buggy address belongs to the object at cc23e880 [ 88.267578] which belongs to the cache kmalloc-64 of size 64 [ 88.279296] The buggy address is located 0 bytes to the right of [ 88.279296] allocated 48-byte region [cc23e880, cc23e8b0) [ 88.290863] [ 88.292358] The buggy address belongs to the physical page: [ 88.297973] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 88.305236] flags: 0x0(zone=0) [ 88.308319] page_type: f5(slab) [ 88.311492] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.319641] raw: 00000000 [ 88.322265] page dumped because: kasan: bad access detected [ 88.327880] [ 88.329376] Memory state around the buggy address: [ 88.334197] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.340789] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.347351] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.353912] ^ [ 88.358062] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.364624] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.371185] ================================================================== [ 81.295959] ================================================================== [ 81.303222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1458/0x5ab0 [ 81.310668] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 81.317413] [ 81.318939] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 81.318969] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.318969] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.318969] Call trace: [ 81.318969] unwind_backtrace from show_stack+0x18/0x1c [ 81.319000] show_stack from dump_stack_lvl+0x70/0x90 [ 81.319030] dump_stack_lvl from print_report+0x158/0x528 [ 81.319061] print_report from kasan_report+0xdc/0x118 [ 81.319091] kasan_report from kasan_check_range+0x14c/0x198 [ 81.319091] kasan_check_range from kasan_atomics_helper+0x1458/0x5ab0 [ 81.319122] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.319152] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.319183] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.319213] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.319244] kthread from ret_from_fork+0x14/0x20 [ 81.319244] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 81.319274] 3fa0: 00000000 00000000 00000000 00000000 [ 81.319305] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.319305] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.319335] [ 81.436431] Allocated by task 321: [ 81.439849] kasan_save_track+0x30/0x5c [ 81.443725] __kasan_kmalloc+0x8c/0x94 [ 81.447509] kasan_atomics+0xc0/0x33c [ 81.451202] kunit_try_run_case+0x22c/0x5a8 [ 81.455413] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.460937] kthread+0x464/0x810 [ 81.464202] ret_from_fork+0x14/0x20 [ 81.467803] [ 81.469299] The buggy address belongs to the object at cc23e880 [ 81.469299] which belongs to the cache kmalloc-64 of size 64 [ 81.481048] The buggy address is located 0 bytes to the right of [ 81.481048] allocated 48-byte region [cc23e880, cc23e8b0) [ 81.492584] [ 81.494079] The buggy address belongs to the physical page: [ 81.499694] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 81.506958] flags: 0x0(zone=0) [ 81.510040] page_type: f5(slab) [ 81.513214] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 81.521362] raw: 00000000 [ 81.523986] page dumped because: kasan: bad access detected [ 81.529602] [ 81.531127] Memory state around the buggy address: [ 81.535949] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.542510] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.549072] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 81.555664] ^ [ 81.559783] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.566345] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.572937] ================================================================== [ 76.482971] ================================================================== [ 76.490234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x97c/0x5ab0 [ 76.497589] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 76.504333] [ 76.505859] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 76.505889] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 76.505889] Hardware name: Generic DRA74X (Flattened Device Tree) [ 76.505889] Call trace: [ 76.505920] unwind_backtrace from show_stack+0x18/0x1c [ 76.505950] show_stack from dump_stack_lvl+0x70/0x90 [ 76.505950] dump_stack_lvl from print_report+0x158/0x528 [ 76.505981] print_report from kasan_report+0xdc/0x118 [ 76.506011] kasan_report from kasan_check_range+0x14c/0x198 [ 76.506042] kasan_check_range from kasan_atomics_helper+0x97c/0x5ab0 [ 76.506072] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 76.506072] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 76.506103] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.506134] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 76.506164] kthread from ret_from_fork+0x14/0x20 [ 76.506195] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 76.506195] 3fa0: 00000000 00000000 00000000 00000000 [ 76.506225] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 76.506225] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 76.506256] [ 76.623260] Allocated by task 321: [ 76.626678] kasan_save_track+0x30/0x5c [ 76.630554] __kasan_kmalloc+0x8c/0x94 [ 76.634338] kasan_atomics+0xc0/0x33c [ 76.638031] kunit_try_run_case+0x22c/0x5a8 [ 76.642242] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.647796] kthread+0x464/0x810 [ 76.651031] ret_from_fork+0x14/0x20 [ 76.654632] [ 76.656158] The buggy address belongs to the object at cc23e880 [ 76.656158] which belongs to the cache kmalloc-64 of size 64 [ 76.667877] The buggy address is located 0 bytes to the right of [ 76.667877] allocated 48-byte region [cc23e880, cc23e8b0) [ 76.679412] [ 76.680938] The buggy address belongs to the physical page: [ 76.686523] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 76.693817] flags: 0x0(zone=0) [ 76.696899] page_type: f5(slab) [ 76.700073] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.708190] raw: 00000000 [ 76.710845] page dumped because: kasan: bad access detected [ 76.716461] [ 76.717956] Memory state around the buggy address: [ 76.722778] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.729339] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.735931] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.742492] ^ [ 76.746612] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.753204] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.759765] ================================================================== [ 88.378540] ================================================================== [ 88.385803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2388/0x5ab0 [ 88.393249] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 88.399993] [ 88.401489] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 88.401519] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.401550] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.401550] Call trace: [ 88.401550] unwind_backtrace from show_stack+0x18/0x1c [ 88.401580] show_stack from dump_stack_lvl+0x70/0x90 [ 88.401611] dump_stack_lvl from print_report+0x158/0x528 [ 88.401641] print_report from kasan_report+0xdc/0x118 [ 88.401672] kasan_report from kasan_check_range+0x14c/0x198 [ 88.401672] kasan_check_range from kasan_atomics_helper+0x2388/0x5ab0 [ 88.401702] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.401733] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.401763] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.401794] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.401794] kthread from ret_from_fork+0x14/0x20 [ 88.401824] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 88.401855] 3fa0: 00000000 00000000 00000000 00000000 [ 88.401855] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.401885] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.401885] [ 88.518981] Allocated by task 321: [ 88.522430] kasan_save_track+0x30/0x5c [ 88.526275] __kasan_kmalloc+0x8c/0x94 [ 88.530059] kasan_atomics+0xc0/0x33c [ 88.533782] kunit_try_run_case+0x22c/0x5a8 [ 88.537994] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.543518] kthread+0x464/0x810 [ 88.546783] ret_from_fork+0x14/0x20 [ 88.550384] [ 88.551879] The buggy address belongs to the object at cc23e880 [ 88.551879] which belongs to the cache kmalloc-64 of size 64 [ 88.563598] The buggy address is located 0 bytes to the right of [ 88.563598] allocated 48-byte region [cc23e880, cc23e8b0) [ 88.575164] [ 88.576660] The buggy address belongs to the physical page: [ 88.582275] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 88.589538] flags: 0x0(zone=0) [ 88.592620] page_type: f5(slab) [ 88.595794] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.603942] raw: 00000000 [ 88.606567] page dumped because: kasan: bad access detected [ 88.612182] [ 88.613677] Memory state around the buggy address: [ 88.618499] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.625061] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.631652] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.638214] ^ [ 88.642333] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.648925] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.655487] ================================================================== [ 85.541839] ================================================================== [ 85.549102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c9c/0x5ab0 [ 85.556549] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 85.563293] [ 85.564819] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 85.564849] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.564849] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.564849] Call trace: [ 85.564849] unwind_backtrace from show_stack+0x18/0x1c [ 85.564880] show_stack from dump_stack_lvl+0x70/0x90 [ 85.564910] dump_stack_lvl from print_report+0x158/0x528 [ 85.564941] print_report from kasan_report+0xdc/0x118 [ 85.564971] kasan_report from kasan_check_range+0x14c/0x198 [ 85.564971] kasan_check_range from kasan_atomics_helper+0x1c9c/0x5ab0 [ 85.565002] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.565032] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.565063] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.565093] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.565124] kthread from ret_from_fork+0x14/0x20 [ 85.565124] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 85.565155] 3fa0: 00000000 00000000 00000000 00000000 [ 85.565155] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.565185] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.565185] [ 85.682312] Allocated by task 321: [ 85.685729] kasan_save_track+0x30/0x5c [ 85.689605] __kasan_kmalloc+0x8c/0x94 [ 85.693389] kasan_atomics+0xc0/0x33c [ 85.697082] kunit_try_run_case+0x22c/0x5a8 [ 85.701293] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.706817] kthread+0x464/0x810 [ 85.710083] ret_from_fork+0x14/0x20 [ 85.713684] [ 85.715179] The buggy address belongs to the object at cc23e880 [ 85.715179] which belongs to the cache kmalloc-64 of size 64 [ 85.726928] The buggy address is located 0 bytes to the right of [ 85.726928] allocated 48-byte region [cc23e880, cc23e8b0) [ 85.738464] [ 85.739959] The buggy address belongs to the physical page: [ 85.745574] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 85.752838] flags: 0x0(zone=0) [ 85.755920] page_type: f5(slab) [ 85.759094] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 85.767242] raw: 00000000 [ 85.769897] page dumped because: kasan: bad access detected [ 85.775482] [ 85.776977] Memory state around the buggy address: [ 85.781799] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.788391] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.794952] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 85.801544] ^ [ 85.805664] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.812225] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.818786] ================================================================== [ 78.749999] ================================================================== [ 78.757263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xedc/0x5ab0 [ 78.764648] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 78.771392] [ 78.772888] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 78.772918] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 78.772918] Hardware name: Generic DRA74X (Flattened Device Tree) [ 78.772949] Call trace: [ 78.772949] unwind_backtrace from show_stack+0x18/0x1c [ 78.772979] show_stack from dump_stack_lvl+0x70/0x90 [ 78.773010] dump_stack_lvl from print_report+0x158/0x528 [ 78.773040] print_report from kasan_report+0xdc/0x118 [ 78.773040] kasan_report from kasan_check_range+0x14c/0x198 [ 78.773071] kasan_check_range from kasan_atomics_helper+0xedc/0x5ab0 [ 78.773101] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 78.773132] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 78.773162] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.773162] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 78.773193] kthread from ret_from_fork+0x14/0x20 [ 78.773223] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 78.773223] 3fa0: 00000000 00000000 00000000 00000000 [ 78.773254] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 78.773284] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 78.773284] [ 78.890289] Allocated by task 321: [ 78.893737] kasan_save_track+0x30/0x5c [ 78.897613] __kasan_kmalloc+0x8c/0x94 [ 78.901367] kasan_atomics+0xc0/0x33c [ 78.905090] kunit_try_run_case+0x22c/0x5a8 [ 78.909301] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.914825] kthread+0x464/0x810 [ 78.918090] ret_from_fork+0x14/0x20 [ 78.921691] [ 78.923187] The buggy address belongs to the object at cc23e880 [ 78.923187] which belongs to the cache kmalloc-64 of size 64 [ 78.934906] The buggy address is located 0 bytes to the right of [ 78.934906] allocated 48-byte region [cc23e880, cc23e8b0) [ 78.946472] [ 78.947967] The buggy address belongs to the physical page: [ 78.953582] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 78.960845] flags: 0x0(zone=0) [ 78.963928] page_type: f5(slab) [ 78.967102] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.975250] raw: 00000000 [ 78.977874] page dumped because: kasan: bad access detected [ 78.983489] [ 78.984985] Memory state around the buggy address: [ 78.989807] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.996398] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.002960] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.009521] ^ [ 79.013671] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.020233] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.026794] ================================================================== [ 74.499969] ================================================================== [ 74.507232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50bc/0x5ab0 [ 74.514678] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 74.521423] [ 74.522949] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 74.522979] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 74.522979] Hardware name: Generic DRA74X (Flattened Device Tree) [ 74.522979] Call trace: [ 74.523010] unwind_backtrace from show_stack+0x18/0x1c [ 74.523040] show_stack from dump_stack_lvl+0x70/0x90 [ 74.523040] dump_stack_lvl from print_report+0x158/0x528 [ 74.523071] print_report from kasan_report+0xdc/0x118 [ 74.523101] kasan_report from kasan_atomics_helper+0x50bc/0x5ab0 [ 74.523132] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 74.523162] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 74.523162] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.523193] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 74.523223] kthread from ret_from_fork+0x14/0x20 [ 74.523254] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 74.523254] 3fa0: 00000000 00000000 00000000 00000000 [ 74.523284] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 74.523315] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 74.523315] [ 74.634307] Allocated by task 321: [ 74.637725] kasan_save_track+0x30/0x5c [ 74.641601] __kasan_kmalloc+0x8c/0x94 [ 74.645385] kasan_atomics+0xc0/0x33c [ 74.649078] kunit_try_run_case+0x22c/0x5a8 [ 74.653289] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.658813] kthread+0x464/0x810 [ 74.662078] ret_from_fork+0x14/0x20 [ 74.665679] [ 74.667175] The buggy address belongs to the object at cc23e880 [ 74.667175] which belongs to the cache kmalloc-64 of size 64 [ 74.678924] The buggy address is located 0 bytes to the right of [ 74.678924] allocated 48-byte region [cc23e880, cc23e8b0) [ 74.690460] [ 74.691955] The buggy address belongs to the physical page: [ 74.697570] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 74.704833] flags: 0x0(zone=0) [ 74.707916] page_type: f5(slab) [ 74.711090] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.719238] raw: 00000000 [ 74.721893] page dumped because: kasan: bad access detected [ 74.727478] [ 74.729003] Memory state around the buggy address: [ 74.733825] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.740386] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.746948] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.753540] ^ [ 74.757659] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.764221] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.770812] ================================================================== [ 82.704925] ================================================================== [ 82.712188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52cc/0x5ab0 [ 82.719635] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 82.726409] [ 82.727905] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 82.727935] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 82.727935] Hardware name: Generic DRA74X (Flattened Device Tree) [ 82.727966] Call trace: [ 82.727966] unwind_backtrace from show_stack+0x18/0x1c [ 82.727996] show_stack from dump_stack_lvl+0x70/0x90 [ 82.727996] dump_stack_lvl from print_report+0x158/0x528 [ 82.728027] print_report from kasan_report+0xdc/0x118 [ 82.728057] kasan_report from kasan_atomics_helper+0x52cc/0x5ab0 [ 82.728088] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 82.728118] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 82.728149] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.728149] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 82.728179] kthread from ret_from_fork+0x14/0x20 [ 82.728210] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 82.728210] 3fa0: 00000000 00000000 00000000 00000000 [ 82.728240] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 82.728271] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 82.728271] [ 82.839263] Allocated by task 321: [ 82.842681] kasan_save_track+0x30/0x5c [ 82.846557] __kasan_kmalloc+0x8c/0x94 [ 82.850341] kasan_atomics+0xc0/0x33c [ 82.854034] kunit_try_run_case+0x22c/0x5a8 [ 82.858245] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.863769] kthread+0x464/0x810 [ 82.867034] ret_from_fork+0x14/0x20 [ 82.870635] [ 82.872131] The buggy address belongs to the object at cc23e880 [ 82.872131] which belongs to the cache kmalloc-64 of size 64 [ 82.883880] The buggy address is located 0 bytes to the right of [ 82.883880] allocated 48-byte region [cc23e880, cc23e8b0) [ 82.895416] [ 82.896911] The buggy address belongs to the physical page: [ 82.902526] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 82.909790] flags: 0x0(zone=0) [ 82.912872] page_type: f5(slab) [ 82.916046] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.924194] raw: 00000000 [ 82.926849] page dumped because: kasan: bad access detected [ 82.932434] [ 82.933959] Memory state around the buggy address: [ 82.938781] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.945343] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.951934] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.958496] ^ [ 82.962615] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.969177] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.975769] ================================================================== [ 86.672790] ================================================================== [ 86.680053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f50/0x5ab0 [ 86.687530] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 86.694274] [ 86.695770] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 86.695800] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.695800] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.695831] Call trace: [ 86.695831] unwind_backtrace from show_stack+0x18/0x1c [ 86.695861] show_stack from dump_stack_lvl+0x70/0x90 [ 86.695892] dump_stack_lvl from print_report+0x158/0x528 [ 86.695892] print_report from kasan_report+0xdc/0x118 [ 86.695922] kasan_report from kasan_check_range+0x14c/0x198 [ 86.695953] kasan_check_range from kasan_atomics_helper+0x1f50/0x5ab0 [ 86.695983] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.696014] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.696014] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.696044] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.696075] kthread from ret_from_fork+0x14/0x20 [ 86.696105] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 86.696105] 3fa0: 00000000 00000000 00000000 00000000 [ 86.696136] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.696136] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.696166] [ 86.813262] Allocated by task 321: [ 86.816680] kasan_save_track+0x30/0x5c [ 86.820556] __kasan_kmalloc+0x8c/0x94 [ 86.824340] kasan_atomics+0xc0/0x33c [ 86.828033] kunit_try_run_case+0x22c/0x5a8 [ 86.832244] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.837799] kthread+0x464/0x810 [ 86.841033] ret_from_fork+0x14/0x20 [ 86.844635] [ 86.846160] The buggy address belongs to the object at cc23e880 [ 86.846160] which belongs to the cache kmalloc-64 of size 64 [ 86.857879] The buggy address is located 0 bytes to the right of [ 86.857879] allocated 48-byte region [cc23e880, cc23e8b0) [ 86.869415] [ 86.870941] The buggy address belongs to the physical page: [ 86.876525] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 86.883819] flags: 0x0(zone=0) [ 86.886901] page_type: f5(slab) [ 86.890075] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.898193] raw: 00000000 [ 86.900848] page dumped because: kasan: bad access detected [ 86.906463] [ 86.907958] Memory state around the buggy address: [ 86.912780] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.919342] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.925933] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.932495] ^ [ 86.936614] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.943206] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.949768] ================================================================== [ 79.034149] ================================================================== [ 79.041412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x5ab0 [ 79.048767] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 79.055511] [ 79.057037] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 79.057037] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.057067] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.057067] Call trace: [ 79.057067] unwind_backtrace from show_stack+0x18/0x1c [ 79.057098] show_stack from dump_stack_lvl+0x70/0x90 [ 79.057128] dump_stack_lvl from print_report+0x158/0x528 [ 79.057159] print_report from kasan_report+0xdc/0x118 [ 79.057189] kasan_report from kasan_check_range+0x14c/0x198 [ 79.057189] kasan_check_range from kasan_atomics_helper+0xf88/0x5ab0 [ 79.057220] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.057250] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.057281] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.057312] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.057342] kthread from ret_from_fork+0x14/0x20 [ 79.057342] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 79.057373] 3fa0: 00000000 00000000 00000000 00000000 [ 79.057373] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.057403] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.057403] [ 79.174438] Allocated by task 321: [ 79.177856] kasan_save_track+0x30/0x5c [ 79.181732] __kasan_kmalloc+0x8c/0x94 [ 79.185516] kasan_atomics+0xc0/0x33c [ 79.189208] kunit_try_run_case+0x22c/0x5a8 [ 79.193420] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.198944] kthread+0x464/0x810 [ 79.202209] ret_from_fork+0x14/0x20 [ 79.205810] [ 79.207305] The buggy address belongs to the object at cc23e880 [ 79.207305] which belongs to the cache kmalloc-64 of size 64 [ 79.219055] The buggy address is located 0 bytes to the right of [ 79.219055] allocated 48-byte region [cc23e880, cc23e8b0) [ 79.230590] [ 79.232086] The buggy address belongs to the physical page: [ 79.237701] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 79.244964] flags: 0x0(zone=0) [ 79.248046] page_type: f5(slab) [ 79.251220] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 79.259368] raw: 00000000 [ 79.262023] page dumped because: kasan: bad access detected [ 79.267608] [ 79.269134] Memory state around the buggy address: [ 79.273956] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.280517] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.287078] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.293670] ^ [ 79.297790] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.304351] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.310943] ================================================================== [ 79.318267] ================================================================== [ 79.325531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1034/0x5ab0 [ 79.332977] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 79.339721] [ 79.341247] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 79.341278] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.341278] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.341278] Call trace: [ 79.341308] unwind_backtrace from show_stack+0x18/0x1c [ 79.341308] show_stack from dump_stack_lvl+0x70/0x90 [ 79.341339] dump_stack_lvl from print_report+0x158/0x528 [ 79.341369] print_report from kasan_report+0xdc/0x118 [ 79.341400] kasan_report from kasan_check_range+0x14c/0x198 [ 79.341430] kasan_check_range from kasan_atomics_helper+0x1034/0x5ab0 [ 79.341430] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.341461] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.341491] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.341522] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.341552] kthread from ret_from_fork+0x14/0x20 [ 79.341552] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 79.341583] 3fa0: 00000000 00000000 00000000 00000000 [ 79.341613] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.341613] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.341644] [ 79.458740] Allocated by task 321: [ 79.462158] kasan_save_track+0x30/0x5c [ 79.466033] __kasan_kmalloc+0x8c/0x94 [ 79.469818] kasan_atomics+0xc0/0x33c [ 79.473510] kunit_try_run_case+0x22c/0x5a8 [ 79.477722] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.483245] kthread+0x464/0x810 [ 79.486511] ret_from_fork+0x14/0x20 [ 79.490112] [ 79.491638] The buggy address belongs to the object at cc23e880 [ 79.491638] which belongs to the cache kmalloc-64 of size 64 [ 79.503356] The buggy address is located 0 bytes to the right of [ 79.503356] allocated 48-byte region [cc23e880, cc23e8b0) [ 79.514892] [ 79.516418] The buggy address belongs to the physical page: [ 79.522003] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 79.529296] flags: 0x0(zone=0) [ 79.532379] page_type: f5(slab) [ 79.535522] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 79.543670] raw: 00000000 [ 79.546325] page dumped because: kasan: bad access detected [ 79.551940] [ 79.553436] Memory state around the buggy address: [ 79.558258] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.564819] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.571380] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.577972] ^ [ 79.582092] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.588653] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.595245] ================================================================== [ 80.733581] ================================================================== [ 80.740844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1360/0x5ab0 [ 80.748291] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 80.755035] [ 80.756561] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 80.756561] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 80.756591] Hardware name: Generic DRA74X (Flattened Device Tree) [ 80.756591] Call trace: [ 80.756591] unwind_backtrace from show_stack+0x18/0x1c [ 80.756622] show_stack from dump_stack_lvl+0x70/0x90 [ 80.756652] dump_stack_lvl from print_report+0x158/0x528 [ 80.756683] print_report from kasan_report+0xdc/0x118 [ 80.756713] kasan_report from kasan_check_range+0x14c/0x198 [ 80.756713] kasan_check_range from kasan_atomics_helper+0x1360/0x5ab0 [ 80.756744] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 80.756774] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 80.756805] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.756835] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 80.756866] kthread from ret_from_fork+0x14/0x20 [ 80.756866] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 80.756896] 3fa0: 00000000 00000000 00000000 00000000 [ 80.756896] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 80.756927] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 80.756927] [ 80.874053] Allocated by task 321: [ 80.877471] kasan_save_track+0x30/0x5c [ 80.881347] __kasan_kmalloc+0x8c/0x94 [ 80.885131] kasan_atomics+0xc0/0x33c [ 80.888824] kunit_try_run_case+0x22c/0x5a8 [ 80.893035] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.898559] kthread+0x464/0x810 [ 80.901824] ret_from_fork+0x14/0x20 [ 80.905426] [ 80.906921] The buggy address belongs to the object at cc23e880 [ 80.906921] which belongs to the cache kmalloc-64 of size 64 [ 80.918640] The buggy address is located 0 bytes to the right of [ 80.918640] allocated 48-byte region [cc23e880, cc23e8b0) [ 80.930206] [ 80.931701] The buggy address belongs to the physical page: [ 80.937316] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 80.944580] flags: 0x0(zone=0) [ 80.947662] page_type: f5(slab) [ 80.950836] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.958984] raw: 00000000 [ 80.961608] page dumped because: kasan: bad access detected [ 80.967224] [ 80.968719] Memory state around the buggy address: [ 80.973541] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.980133] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.986694] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.993286] ^ [ 80.997406] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.003967] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.010528] ================================================================== [ 75.630554] ================================================================== [ 75.637817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x790/0x5ab0 [ 75.645202] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 75.651947] [ 75.653442] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 75.653472] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.653472] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.653503] Call trace: [ 75.653503] unwind_backtrace from show_stack+0x18/0x1c [ 75.653533] show_stack from dump_stack_lvl+0x70/0x90 [ 75.653564] dump_stack_lvl from print_report+0x158/0x528 [ 75.653564] print_report from kasan_report+0xdc/0x118 [ 75.653594] kasan_report from kasan_check_range+0x14c/0x198 [ 75.653625] kasan_check_range from kasan_atomics_helper+0x790/0x5ab0 [ 75.653656] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.653686] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.653686] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.653717] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.653747] kthread from ret_from_fork+0x14/0x20 [ 75.653778] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 75.653778] 3fa0: 00000000 00000000 00000000 00000000 [ 75.653808] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.653839] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.653839] [ 75.770843] Allocated by task 321: [ 75.774291] kasan_save_track+0x30/0x5c [ 75.778137] __kasan_kmalloc+0x8c/0x94 [ 75.781951] kasan_atomics+0xc0/0x33c [ 75.785644] kunit_try_run_case+0x22c/0x5a8 [ 75.789855] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.795379] kthread+0x464/0x810 [ 75.798645] ret_from_fork+0x14/0x20 [ 75.802246] [ 75.803741] The buggy address belongs to the object at cc23e880 [ 75.803741] which belongs to the cache kmalloc-64 of size 64 [ 75.815490] The buggy address is located 0 bytes to the right of [ 75.815490] allocated 48-byte region [cc23e880, cc23e8b0) [ 75.827026] [ 75.828521] The buggy address belongs to the physical page: [ 75.834136] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 75.841400] flags: 0x0(zone=0) [ 75.844482] page_type: f5(slab) [ 75.847656] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.855804] raw: 00000000 [ 75.858459] page dumped because: kasan: bad access detected [ 75.864044] [ 75.865570] Memory state around the buggy address: [ 75.870391] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.876953] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.883514] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.890106] ^ [ 75.894226] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.900787] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.907379] ================================================================== [ 86.394714] ================================================================== [ 86.401977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x544c/0x5ab0 [ 86.409454] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 86.416107] [ 86.417602] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 86.417633] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.417633] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.417663] Call trace: [ 86.417663] unwind_backtrace from show_stack+0x18/0x1c [ 86.417694] show_stack from dump_stack_lvl+0x70/0x90 [ 86.417724] dump_stack_lvl from print_report+0x158/0x528 [ 86.417755] print_report from kasan_report+0xdc/0x118 [ 86.417755] kasan_report from kasan_atomics_helper+0x544c/0x5ab0 [ 86.417785] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.417816] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.417846] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.417877] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.417907] kthread from ret_from_fork+0x14/0x20 [ 86.417907] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 86.417938] 3fa0: 00000000 00000000 00000000 00000000 [ 86.417938] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.417968] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.417968] [ 86.528961] Allocated by task 321: [ 86.532379] kasan_save_track+0x30/0x5c [ 86.536254] __kasan_kmalloc+0x8c/0x94 [ 86.540039] kasan_atomics+0xc0/0x33c [ 86.543731] kunit_try_run_case+0x22c/0x5a8 [ 86.547943] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.553497] kthread+0x464/0x810 [ 86.556732] ret_from_fork+0x14/0x20 [ 86.560333] [ 86.561859] The buggy address belongs to the object at cc23e880 [ 86.561859] which belongs to the cache kmalloc-64 of size 64 [ 86.573577] The buggy address is located 0 bytes to the right of [ 86.573577] allocated 48-byte region [cc23e880, cc23e8b0) [ 86.585113] [ 86.586639] The buggy address belongs to the physical page: [ 86.592224] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 86.599517] flags: 0x0(zone=0) [ 86.602600] page_type: f5(slab) [ 86.605773] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.613891] raw: 00000000 [ 86.616546] page dumped because: kasan: bad access detected [ 86.622161] [ 86.623657] Memory state around the buggy address: [ 86.628479] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.635040] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.641632] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.648193] ^ [ 86.652313] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.658905] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.665466] ================================================================== [ 74.778137] ================================================================== [ 74.785400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5a4/0x5ab0 [ 74.792785] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 74.799530] [ 74.801025] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 74.801055] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 74.801055] Hardware name: Generic DRA74X (Flattened Device Tree) [ 74.801086] Call trace: [ 74.801086] unwind_backtrace from show_stack+0x18/0x1c [ 74.801116] show_stack from dump_stack_lvl+0x70/0x90 [ 74.801147] dump_stack_lvl from print_report+0x158/0x528 [ 74.801177] print_report from kasan_report+0xdc/0x118 [ 74.801177] kasan_report from kasan_check_range+0x14c/0x198 [ 74.801208] kasan_check_range from kasan_atomics_helper+0x5a4/0x5ab0 [ 74.801239] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 74.801269] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 74.801269] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.801300] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 74.801330] kthread from ret_from_fork+0x14/0x20 [ 74.801361] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 74.801361] 3fa0: 00000000 00000000 00000000 00000000 [ 74.801391] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 74.801422] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 74.801422] [ 74.918426] Allocated by task 321: [ 74.921874] kasan_save_track+0x30/0x5c [ 74.925720] __kasan_kmalloc+0x8c/0x94 [ 74.929504] kasan_atomics+0xc0/0x33c [ 74.933227] kunit_try_run_case+0x22c/0x5a8 [ 74.937438] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.942962] kthread+0x464/0x810 [ 74.946228] ret_from_fork+0x14/0x20 [ 74.949829] [ 74.951324] The buggy address belongs to the object at cc23e880 [ 74.951324] which belongs to the cache kmalloc-64 of size 64 [ 74.963043] The buggy address is located 0 bytes to the right of [ 74.963043] allocated 48-byte region [cc23e880, cc23e8b0) [ 74.974609] [ 74.976104] The buggy address belongs to the physical page: [ 74.981719] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 74.988983] flags: 0x0(zone=0) [ 74.992065] page_type: f5(slab) [ 74.995239] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.003387] raw: 00000000 [ 75.006011] page dumped because: kasan: bad access detected [ 75.011627] [ 75.013153] Memory state around the buggy address: [ 75.017974] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.024536] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.031097] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.037689] ^ [ 75.041809] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.048370] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.054962] ================================================================== [ 84.404602] ================================================================== [ 84.411865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a04/0x5ab0 [ 84.419342] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 84.426086] [ 84.427581] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 84.427612] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.427612] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.427642] Call trace: [ 84.427642] unwind_backtrace from show_stack+0x18/0x1c [ 84.427673] show_stack from dump_stack_lvl+0x70/0x90 [ 84.427703] dump_stack_lvl from print_report+0x158/0x528 [ 84.427734] print_report from kasan_report+0xdc/0x118 [ 84.427734] kasan_report from kasan_check_range+0x14c/0x198 [ 84.427764] kasan_check_range from kasan_atomics_helper+0x1a04/0x5ab0 [ 84.427795] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.427825] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.427856] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.427856] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.427886] kthread from ret_from_fork+0x14/0x20 [ 84.427917] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 84.427917] 3fa0: 00000000 00000000 00000000 00000000 [ 84.427947] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.427978] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.427978] [ 84.545074] Allocated by task 321: [ 84.548522] kasan_save_track+0x30/0x5c [ 84.552368] __kasan_kmalloc+0x8c/0x94 [ 84.556152] kasan_atomics+0xc0/0x33c [ 84.559875] kunit_try_run_case+0x22c/0x5a8 [ 84.564086] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.569610] kthread+0x464/0x810 [ 84.572875] ret_from_fork+0x14/0x20 [ 84.576477] [ 84.577972] The buggy address belongs to the object at cc23e880 [ 84.577972] which belongs to the cache kmalloc-64 of size 64 [ 84.589691] The buggy address is located 0 bytes to the right of [ 84.589691] allocated 48-byte region [cc23e880, cc23e8b0) [ 84.601257] [ 84.602752] The buggy address belongs to the physical page: [ 84.608367] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 84.615631] flags: 0x0(zone=0) [ 84.618713] page_type: f5(slab) [ 84.621887] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.630035] raw: 00000000 [ 84.632659] page dumped because: kasan: bad access detected [ 84.638275] [ 84.639770] Memory state around the buggy address: [ 84.644592] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.651184] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.657745] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.664306] ^ [ 84.668457] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.675018] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.681579] ================================================================== [ 88.662811] ================================================================== [ 88.670074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9c/0x5ab0 [ 88.677520] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 88.684204] [ 88.685699] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 88.685729] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.685729] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.685760] Call trace: [ 88.685760] unwind_backtrace from show_stack+0x18/0x1c [ 88.685791] show_stack from dump_stack_lvl+0x70/0x90 [ 88.685791] dump_stack_lvl from print_report+0x158/0x528 [ 88.685821] print_report from kasan_report+0xdc/0x118 [ 88.685852] kasan_report from kasan_atomics_helper+0x4f9c/0x5ab0 [ 88.685882] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.685913] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.685943] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.685943] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.685974] kthread from ret_from_fork+0x14/0x20 [ 88.686004] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 88.686004] 3fa0: 00000000 00000000 00000000 00000000 [ 88.686035] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.686065] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.686065] [ 88.797058] Allocated by task 321: [ 88.800476] kasan_save_track+0x30/0x5c [ 88.804351] __kasan_kmalloc+0x8c/0x94 [ 88.808135] kasan_atomics+0xc0/0x33c [ 88.811828] kunit_try_run_case+0x22c/0x5a8 [ 88.816040] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.821563] kthread+0x464/0x810 [ 88.824829] ret_from_fork+0x14/0x20 [ 88.828430] [ 88.829925] The buggy address belongs to the object at cc23e880 [ 88.829925] which belongs to the cache kmalloc-64 of size 64 [ 88.841644] The buggy address is located 0 bytes to the right of [ 88.841644] allocated 48-byte region [cc23e880, cc23e8b0) [ 88.853210] [ 88.854705] The buggy address belongs to the physical page: [ 88.860321] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 88.867584] flags: 0x0(zone=0) [ 88.870666] page_type: f5(slab) [ 88.873840] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.881988] raw: 00000000 [ 88.884613] page dumped because: kasan: bad access detected [ 88.890228] [ 88.891723] Memory state around the buggy address: [ 88.896545] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.903137] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.909698] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.916259] ^ [ 88.920379] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.926971] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.933532] ================================================================== [ 82.983093] ================================================================== [ 82.990356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x5ab0 [ 82.997802] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 83.004547] [ 83.006072] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 83.006103] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.006103] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.006103] Call trace: [ 83.006134] unwind_backtrace from show_stack+0x18/0x1c [ 83.006134] show_stack from dump_stack_lvl+0x70/0x90 [ 83.006164] dump_stack_lvl from print_report+0x158/0x528 [ 83.006195] print_report from kasan_report+0xdc/0x118 [ 83.006225] kasan_report from kasan_check_range+0x14c/0x198 [ 83.006256] kasan_check_range from kasan_atomics_helper+0x16d0/0x5ab0 [ 83.006256] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.006286] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.006317] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.006347] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.006378] kthread from ret_from_fork+0x14/0x20 [ 83.006378] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 83.006408] 3fa0: 00000000 00000000 00000000 00000000 [ 83.006439] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.006439] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.006469] [ 83.123565] Allocated by task 321: [ 83.126983] kasan_save_track+0x30/0x5c [ 83.130859] __kasan_kmalloc+0x8c/0x94 [ 83.134643] kasan_atomics+0xc0/0x33c [ 83.138336] kunit_try_run_case+0x22c/0x5a8 [ 83.142547] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.148071] kthread+0x464/0x810 [ 83.151336] ret_from_fork+0x14/0x20 [ 83.154937] [ 83.156433] The buggy address belongs to the object at cc23e880 [ 83.156433] which belongs to the cache kmalloc-64 of size 64 [ 83.168182] The buggy address is located 0 bytes to the right of [ 83.168182] allocated 48-byte region [cc23e880, cc23e8b0) [ 83.179718] [ 83.181213] The buggy address belongs to the physical page: [ 83.186828] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 83.194091] flags: 0x0(zone=0) [ 83.197174] page_type: f5(slab) [ 83.200347] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 83.208496] raw: 00000000 [ 83.211151] page dumped because: kasan: bad access detected [ 83.216735] [ 83.218261] Memory state around the buggy address: [ 83.223083] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.229644] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.236206] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 83.242797] ^ [ 83.246917] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.253479] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.260070] ================================================================== [ 74.215820] ================================================================== [ 74.223083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e0/0x5ab0 [ 74.230468] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 74.237213] [ 74.238708] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 74.238739] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 74.238769] Hardware name: Generic DRA74X (Flattened Device Tree) [ 74.238769] Call trace: [ 74.238769] unwind_backtrace from show_stack+0x18/0x1c [ 74.238800] show_stack from dump_stack_lvl+0x70/0x90 [ 74.238830] dump_stack_lvl from print_report+0x158/0x528 [ 74.238861] print_report from kasan_report+0xdc/0x118 [ 74.238891] kasan_report from kasan_check_range+0x14c/0x198 [ 74.238891] kasan_check_range from kasan_atomics_helper+0x4e0/0x5ab0 [ 74.238922] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 74.238952] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 74.238983] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.239013] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 74.239044] kthread from ret_from_fork+0x14/0x20 [ 74.239044] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 74.239074] 3fa0: 00000000 00000000 00000000 00000000 [ 74.239074] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 74.239105] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 74.239105] [ 74.356140] Allocated by task 321: [ 74.359558] kasan_save_track+0x30/0x5c [ 74.363433] __kasan_kmalloc+0x8c/0x94 [ 74.367218] kasan_atomics+0xc0/0x33c [ 74.370910] kunit_try_run_case+0x22c/0x5a8 [ 74.375122] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.380645] kthread+0x464/0x810 [ 74.383911] ret_from_fork+0x14/0x20 [ 74.387512] [ 74.389007] The buggy address belongs to the object at cc23e880 [ 74.389007] which belongs to the cache kmalloc-64 of size 64 [ 74.400756] The buggy address is located 0 bytes to the right of [ 74.400756] allocated 48-byte region [cc23e880, cc23e8b0) [ 74.412292] [ 74.413818] The buggy address belongs to the physical page: [ 74.419403] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 74.426696] flags: 0x0(zone=0) [ 74.429779] page_type: f5(slab) [ 74.432922] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.441070] raw: 00000000 [ 74.443725] page dumped because: kasan: bad access detected [ 74.449340] [ 74.450836] Memory state around the buggy address: [ 74.455657] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.462219] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.468811] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.475372] ^ [ 74.479492] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.486083] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.492645] ================================================================== [ 75.914703] ================================================================== [ 75.921966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x834/0x5ab0 [ 75.929321] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 75.936065] [ 75.937591] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 75.937622] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.937622] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.937652] Call trace: [ 75.937652] unwind_backtrace from show_stack+0x18/0x1c [ 75.937683] show_stack from dump_stack_lvl+0x70/0x90 [ 75.937683] dump_stack_lvl from print_report+0x158/0x528 [ 75.937713] print_report from kasan_report+0xdc/0x118 [ 75.937744] kasan_report from kasan_check_range+0x14c/0x198 [ 75.937774] kasan_check_range from kasan_atomics_helper+0x834/0x5ab0 [ 75.937805] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.937805] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.937835] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.937866] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.937896] kthread from ret_from_fork+0x14/0x20 [ 75.937927] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 75.937927] 3fa0: 00000000 00000000 00000000 00000000 [ 75.937957] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.937957] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.937988] [ 76.054992] Allocated by task 321: [ 76.058410] kasan_save_track+0x30/0x5c [ 76.062286] __kasan_kmalloc+0x8c/0x94 [ 76.066070] kasan_atomics+0xc0/0x33c [ 76.069763] kunit_try_run_case+0x22c/0x5a8 [ 76.073974] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.079528] kthread+0x464/0x810 [ 76.082763] ret_from_fork+0x14/0x20 [ 76.086364] [ 76.087890] The buggy address belongs to the object at cc23e880 [ 76.087890] which belongs to the cache kmalloc-64 of size 64 [ 76.099609] The buggy address is located 0 bytes to the right of [ 76.099609] allocated 48-byte region [cc23e880, cc23e8b0) [ 76.111145] [ 76.112670] The buggy address belongs to the physical page: [ 76.118255] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 76.125549] flags: 0x0(zone=0) [ 76.128631] page_type: f5(slab) [ 76.131805] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.139953] raw: 00000000 [ 76.142578] page dumped because: kasan: bad access detected [ 76.148193] [ 76.149688] Memory state around the buggy address: [ 76.154510] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.161071] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.167663] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.174224] ^ [ 76.178344] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.184936] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.191497] ================================================================== [ 73.653686] ================================================================== [ 73.660949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x420/0x5ab0 [ 73.668304] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 73.674957] [ 73.676483] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 73.676513] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.676513] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.676513] Call trace: [ 73.676544] unwind_backtrace from show_stack+0x18/0x1c [ 73.676574] show_stack from dump_stack_lvl+0x70/0x90 [ 73.676574] dump_stack_lvl from print_report+0x158/0x528 [ 73.676605] print_report from kasan_report+0xdc/0x118 [ 73.676635] kasan_report from kasan_check_range+0x14c/0x198 [ 73.676666] kasan_check_range from kasan_atomics_helper+0x420/0x5ab0 [ 73.676696] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.676696] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.676727] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.676757] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.676788] kthread from ret_from_fork+0x14/0x20 [ 73.676818] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 73.676818] 3fa0: 00000000 00000000 00000000 00000000 [ 73.676849] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.676849] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.676879] [ 73.793884] Allocated by task 321: [ 73.797302] kasan_save_track+0x30/0x5c [ 73.801177] __kasan_kmalloc+0x8c/0x94 [ 73.804962] kasan_atomics+0xc0/0x33c [ 73.808654] kunit_try_run_case+0x22c/0x5a8 [ 73.812866] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.818420] kthread+0x464/0x810 [ 73.821655] ret_from_fork+0x14/0x20 [ 73.825286] [ 73.826782] The buggy address belongs to the object at cc23e880 [ 73.826782] which belongs to the cache kmalloc-64 of size 64 [ 73.838500] The buggy address is located 0 bytes to the right of [ 73.838500] allocated 48-byte region [cc23e880, cc23e8b0) [ 73.850067] [ 73.851562] The buggy address belongs to the physical page: [ 73.857177] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 73.864440] flags: 0x0(zone=0) [ 73.867523] page_type: f5(slab) [ 73.870697] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.878845] raw: 00000000 [ 73.881469] page dumped because: kasan: bad access detected [ 73.887084] [ 73.888580] Memory state around the buggy address: [ 73.893402] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.899993] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.906555] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.913116] ^ [ 73.917266] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.923828] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.930389] ================================================================== [ 81.580261] ================================================================== [ 81.587524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52d8/0x5ab0 [ 81.594970] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 81.601623] [ 81.603149] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 81.603179] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.603179] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.603179] Call trace: [ 81.603210] unwind_backtrace from show_stack+0x18/0x1c [ 81.603210] show_stack from dump_stack_lvl+0x70/0x90 [ 81.603240] dump_stack_lvl from print_report+0x158/0x528 [ 81.603271] print_report from kasan_report+0xdc/0x118 [ 81.603302] kasan_report from kasan_atomics_helper+0x52d8/0x5ab0 [ 81.603332] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.603332] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.603363] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.603393] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.603424] kthread from ret_from_fork+0x14/0x20 [ 81.603454] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 81.603454] 3fa0: 00000000 00000000 00000000 00000000 [ 81.603485] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.603485] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.603515] [ 81.714508] Allocated by task 321: [ 81.717926] kasan_save_track+0x30/0x5c [ 81.721801] __kasan_kmalloc+0x8c/0x94 [ 81.725585] kasan_atomics+0xc0/0x33c [ 81.729278] kunit_try_run_case+0x22c/0x5a8 [ 81.733489] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.739013] kthread+0x464/0x810 [ 81.742279] ret_from_fork+0x14/0x20 [ 81.745880] [ 81.747375] The buggy address belongs to the object at cc23e880 [ 81.747375] which belongs to the cache kmalloc-64 of size 64 [ 81.759094] The buggy address is located 0 bytes to the right of [ 81.759094] allocated 48-byte region [cc23e880, cc23e8b0) [ 81.770660] [ 81.772155] The buggy address belongs to the physical page: [ 81.777770] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 81.785034] flags: 0x0(zone=0) [ 81.788116] page_type: f5(slab) [ 81.791290] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 81.799438] raw: 00000000 [ 81.802093] page dumped because: kasan: bad access detected [ 81.807678] [ 81.809204] Memory state around the buggy address: [ 81.814025] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.820587] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.827148] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 81.833740] ^ [ 81.837860] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.844421] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.850982] ================================================================== [ 83.551696] ================================================================== [ 83.558959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5ab0 [ 83.566436] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 83.573181] [ 83.574676] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 83.574707] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.574707] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.574737] Call trace: [ 83.574737] unwind_backtrace from show_stack+0x18/0x1c [ 83.574768] show_stack from dump_stack_lvl+0x70/0x90 [ 83.574798] dump_stack_lvl from print_report+0x158/0x528 [ 83.574829] print_report from kasan_report+0xdc/0x118 [ 83.574829] kasan_report from kasan_check_range+0x14c/0x198 [ 83.574859] kasan_check_range from kasan_atomics_helper+0x1818/0x5ab0 [ 83.574890] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.574920] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.574920] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.574951] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.574981] kthread from ret_from_fork+0x14/0x20 [ 83.575012] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 83.575012] 3fa0: 00000000 00000000 00000000 00000000 [ 83.575042] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.575073] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.575073] [ 83.692169] Allocated by task 321: [ 83.695617] kasan_save_track+0x30/0x5c [ 83.699462] __kasan_kmalloc+0x8c/0x94 [ 83.703247] kasan_atomics+0xc0/0x33c [ 83.706939] kunit_try_run_case+0x22c/0x5a8 [ 83.711181] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.716705] kthread+0x464/0x810 [ 83.719940] ret_from_fork+0x14/0x20 [ 83.723571] [ 83.725067] The buggy address belongs to the object at cc23e880 [ 83.725067] which belongs to the cache kmalloc-64 of size 64 [ 83.736785] The buggy address is located 0 bytes to the right of [ 83.736785] allocated 48-byte region [cc23e880, cc23e8b0) [ 83.748321] [ 83.749847] The buggy address belongs to the physical page: [ 83.755432] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 83.762725] flags: 0x0(zone=0) [ 83.765808] page_type: f5(slab) [ 83.768981] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 83.777099] raw: 00000000 [ 83.779754] page dumped because: kasan: bad access detected [ 83.785369] [ 83.786865] Memory state around the buggy address: [ 83.791687] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.798248] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.804840] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 83.811401] ^ [ 83.815521] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.822113] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.828674] ================================================================== [ 72.819213] ================================================================== [ 72.826477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x514c/0x5ab0 [ 72.833923] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 72.840667] [ 72.842193] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 72.842224] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 72.842224] Hardware name: Generic DRA74X (Flattened Device Tree) [ 72.842254] Call trace: [ 72.842254] unwind_backtrace from show_stack+0x18/0x1c [ 72.842285] show_stack from dump_stack_lvl+0x70/0x90 [ 72.842285] dump_stack_lvl from print_report+0x158/0x528 [ 72.842315] print_report from kasan_report+0xdc/0x118 [ 72.842346] kasan_report from kasan_atomics_helper+0x514c/0x5ab0 [ 72.842376] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 72.842407] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 72.842437] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.842437] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 72.842468] kthread from ret_from_fork+0x14/0x20 [ 72.842498] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 72.842498] 3fa0: 00000000 00000000 00000000 00000000 [ 72.842529] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 72.842559] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 72.842559] [ 72.953552] Allocated by task 321: [ 72.956970] kasan_save_track+0x30/0x5c [ 72.960845] __kasan_kmalloc+0x8c/0x94 [ 72.964630] kasan_atomics+0xc0/0x33c [ 72.968322] kunit_try_run_case+0x22c/0x5a8 [ 72.972534] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.978088] kthread+0x464/0x810 [ 72.981323] ret_from_fork+0x14/0x20 [ 72.984924] [ 72.986450] The buggy address belongs to the object at cc23e880 [ 72.986450] which belongs to the cache kmalloc-64 of size 64 [ 72.998168] The buggy address is located 0 bytes to the right of [ 72.998168] allocated 48-byte region [cc23e880, cc23e8b0) [ 73.009735] [ 73.011230] The buggy address belongs to the physical page: [ 73.016845] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 73.024108] flags: 0x0(zone=0) [ 73.027191] page_type: f5(slab) [ 73.030364] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.038513] raw: 00000000 [ 73.041137] page dumped because: kasan: bad access detected [ 73.046752] [ 73.048248] Memory state around the buggy address: [ 73.053070] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.059661] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.066223] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.072784] ^ [ 73.076904] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.083496] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.090057] ================================================================== [ 77.335388] ================================================================== [ 77.342651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x5ab0 [ 77.350036] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 77.356781] [ 77.358276] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 77.358306] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.358306] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.358337] Call trace: [ 77.358337] unwind_backtrace from show_stack+0x18/0x1c [ 77.358367] show_stack from dump_stack_lvl+0x70/0x90 [ 77.358398] dump_stack_lvl from print_report+0x158/0x528 [ 77.358428] print_report from kasan_report+0xdc/0x118 [ 77.358428] kasan_report from kasan_check_range+0x14c/0x198 [ 77.358459] kasan_check_range from kasan_atomics_helper+0xb70/0x5ab0 [ 77.358489] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.358520] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.358551] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.358551] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.358581] kthread from ret_from_fork+0x14/0x20 [ 77.358612] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 77.358642] 3fa0: 00000000 00000000 00000000 00000000 [ 77.358642] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.358673] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.358673] [ 77.475708] Allocated by task 321: [ 77.479125] kasan_save_track+0x30/0x5c [ 77.483001] __kasan_kmalloc+0x8c/0x94 [ 77.486755] kasan_atomics+0xc0/0x33c [ 77.490478] kunit_try_run_case+0x22c/0x5a8 [ 77.494689] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.500213] kthread+0x464/0x810 [ 77.503479] ret_from_fork+0x14/0x20 [ 77.507080] [ 77.508575] The buggy address belongs to the object at cc23e880 [ 77.508575] which belongs to the cache kmalloc-64 of size 64 [ 77.520294] The buggy address is located 0 bytes to the right of [ 77.520294] allocated 48-byte region [cc23e880, cc23e8b0) [ 77.531860] [ 77.533355] The buggy address belongs to the physical page: [ 77.538970] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 77.546234] flags: 0x0(zone=0) [ 77.549316] page_type: f5(slab) [ 77.552490] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 77.560638] raw: 00000000 [ 77.563262] page dumped because: kasan: bad access detected [ 77.568878] [ 77.570373] Memory state around the buggy address: [ 77.575195] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.581787] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.588348] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.594940] ^ [ 77.599060] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.605621] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.612182] ================================================================== [ 84.688934] ================================================================== [ 84.696197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1aa8/0x5ab0 [ 84.703643] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 84.710388] [ 84.711914] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 84.711944] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.711944] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.711944] Call trace: [ 84.711944] unwind_backtrace from show_stack+0x18/0x1c [ 84.711975] show_stack from dump_stack_lvl+0x70/0x90 [ 84.712005] dump_stack_lvl from print_report+0x158/0x528 [ 84.712036] print_report from kasan_report+0xdc/0x118 [ 84.712066] kasan_report from kasan_check_range+0x14c/0x198 [ 84.712066] kasan_check_range from kasan_atomics_helper+0x1aa8/0x5ab0 [ 84.712097] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.712127] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.712158] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.712188] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.712219] kthread from ret_from_fork+0x14/0x20 [ 84.712219] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 84.712249] 3fa0: 00000000 00000000 00000000 00000000 [ 84.712249] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.712280] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.712280] [ 84.829406] Allocated by task 321: [ 84.832824] kasan_save_track+0x30/0x5c [ 84.836700] __kasan_kmalloc+0x8c/0x94 [ 84.840484] kasan_atomics+0xc0/0x33c [ 84.844177] kunit_try_run_case+0x22c/0x5a8 [ 84.848388] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.853912] kthread+0x464/0x810 [ 84.857177] ret_from_fork+0x14/0x20 [ 84.860778] [ 84.862274] The buggy address belongs to the object at cc23e880 [ 84.862274] which belongs to the cache kmalloc-64 of size 64 [ 84.873992] The buggy address is located 0 bytes to the right of [ 84.873992] allocated 48-byte region [cc23e880, cc23e8b0) [ 84.885559] [ 84.887054] The buggy address belongs to the physical page: [ 84.892669] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 84.899932] flags: 0x0(zone=0) [ 84.903015] page_type: f5(slab) [ 84.906188] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.914337] raw: 00000000 [ 84.916961] page dumped because: kasan: bad access detected [ 84.922576] [ 84.924072] Memory state around the buggy address: [ 84.928924] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.935485] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.942047] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.948638] ^ [ 84.952758] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.959320] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.965881] ================================================================== [ 88.940856] ================================================================== [ 88.948150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2480/0x5ab0 [ 88.955596] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 88.962341] [ 88.963836] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 88.963867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.963897] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.963897] Call trace: [ 88.963897] unwind_backtrace from show_stack+0x18/0x1c [ 88.963928] show_stack from dump_stack_lvl+0x70/0x90 [ 88.963958] dump_stack_lvl from print_report+0x158/0x528 [ 88.963989] print_report from kasan_report+0xdc/0x118 [ 88.964019] kasan_report from kasan_check_range+0x14c/0x198 [ 88.964019] kasan_check_range from kasan_atomics_helper+0x2480/0x5ab0 [ 88.964050] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.964080] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.964111] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.964141] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.964141] kthread from ret_from_fork+0x14/0x20 [ 88.964172] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 88.964202] 3fa0: 00000000 00000000 00000000 00000000 [ 88.964202] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.964233] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.964233] [ 89.081359] Allocated by task 321: [ 89.084777] kasan_save_track+0x30/0x5c [ 89.088653] __kasan_kmalloc+0x8c/0x94 [ 89.092437] kasan_atomics+0xc0/0x33c [ 89.096130] kunit_try_run_case+0x22c/0x5a8 [ 89.100341] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.105865] kthread+0x464/0x810 [ 89.109130] ret_from_fork+0x14/0x20 [ 89.112731] [ 89.114227] The buggy address belongs to the object at cc23e880 [ 89.114227] which belongs to the cache kmalloc-64 of size 64 [ 89.125946] The buggy address is located 0 bytes to the right of [ 89.125946] allocated 48-byte region [cc23e880, cc23e8b0) [ 89.137512] [ 89.139007] The buggy address belongs to the physical page: [ 89.144622] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 89.151885] flags: 0x0(zone=0) [ 89.154968] page_type: f5(slab) [ 89.158142] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 89.166290] raw: 00000000 [ 89.168914] page dumped because: kasan: bad access detected [ 89.174530] [ 89.176025] Memory state around the buggy address: [ 89.180847] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.187438] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.194000] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 89.200561] ^ [ 89.204681] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.211273] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.217834] ================================================================== [ 76.767089] ================================================================== [ 76.774353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa20/0x5ab0 [ 76.781738] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 76.788482] [ 76.789978] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 76.790008] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 76.790039] Hardware name: Generic DRA74X (Flattened Device Tree) [ 76.790039] Call trace: [ 76.790039] unwind_backtrace from show_stack+0x18/0x1c [ 76.790069] show_stack from dump_stack_lvl+0x70/0x90 [ 76.790100] dump_stack_lvl from print_report+0x158/0x528 [ 76.790130] print_report from kasan_report+0xdc/0x118 [ 76.790130] kasan_report from kasan_check_range+0x14c/0x198 [ 76.790161] kasan_check_range from kasan_atomics_helper+0xa20/0x5ab0 [ 76.790191] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 76.790222] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 76.790252] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.790283] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 76.790283] kthread from ret_from_fork+0x14/0x20 [ 76.790313] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 76.790344] 3fa0: 00000000 00000000 00000000 00000000 [ 76.790344] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 76.790374] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 76.790374] [ 76.907409] Allocated by task 321: [ 76.910827] kasan_save_track+0x30/0x5c [ 76.914703] __kasan_kmalloc+0x8c/0x94 [ 76.918487] kasan_atomics+0xc0/0x33c [ 76.922180] kunit_try_run_case+0x22c/0x5a8 [ 76.926391] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.931915] kthread+0x464/0x810 [ 76.935180] ret_from_fork+0x14/0x20 [ 76.938781] [ 76.940277] The buggy address belongs to the object at cc23e880 [ 76.940277] which belongs to the cache kmalloc-64 of size 64 [ 76.951995] The buggy address is located 0 bytes to the right of [ 76.951995] allocated 48-byte region [cc23e880, cc23e8b0) [ 76.963562] [ 76.965057] The buggy address belongs to the physical page: [ 76.970672] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 76.977935] flags: 0x0(zone=0) [ 76.981018] page_type: f5(slab) [ 76.984191] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.992340] raw: 00000000 [ 76.994995] page dumped because: kasan: bad access detected [ 77.000579] [ 77.002105] Memory state around the buggy address: [ 77.006927] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.013488] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.020050] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.026641] ^ [ 77.030761] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.037322] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.043914] ================================================================== [ 73.375488] ================================================================== [ 73.382751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x550c/0x5ab0 [ 73.390197] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 73.396972] [ 73.398468] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 73.398498] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.398498] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.398529] Call trace: [ 73.398529] unwind_backtrace from show_stack+0x18/0x1c [ 73.398559] show_stack from dump_stack_lvl+0x70/0x90 [ 73.398590] dump_stack_lvl from print_report+0x158/0x528 [ 73.398590] print_report from kasan_report+0xdc/0x118 [ 73.398620] kasan_report from kasan_atomics_helper+0x550c/0x5ab0 [ 73.398651] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.398681] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.398712] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.398712] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.398742] kthread from ret_from_fork+0x14/0x20 [ 73.398773] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 73.398803] 3fa0: 00000000 00000000 00000000 00000000 [ 73.398803] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.398834] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.398834] [ 73.509826] Allocated by task 321: [ 73.513244] kasan_save_track+0x30/0x5c [ 73.517120] __kasan_kmalloc+0x8c/0x94 [ 73.520904] kasan_atomics+0xc0/0x33c [ 73.524597] kunit_try_run_case+0x22c/0x5a8 [ 73.528808] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.534332] kthread+0x464/0x810 [ 73.537597] ret_from_fork+0x14/0x20 [ 73.541198] [ 73.542724] The buggy address belongs to the object at cc23e880 [ 73.542724] which belongs to the cache kmalloc-64 of size 64 [ 73.554443] The buggy address is located 0 bytes to the right of [ 73.554443] allocated 48-byte region [cc23e880, cc23e8b0) [ 73.565979] [ 73.567504] The buggy address belongs to the physical page: [ 73.573089] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 73.580383] flags: 0x0(zone=0) [ 73.583465] page_type: f5(slab) [ 73.586639] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.594787] raw: 00000000 [ 73.597412] page dumped because: kasan: bad access detected [ 73.603027] [ 73.604522] Memory state around the buggy address: [ 73.609344] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.615905] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.622497] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.629058] ^ [ 73.633178] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.639770] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.646331] ================================================================== [ 75.346405] ================================================================== [ 75.353698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x5ab0 [ 75.361053] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 75.367797] [ 75.369323] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 75.369323] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.369354] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.369354] Call trace: [ 75.369354] unwind_backtrace from show_stack+0x18/0x1c [ 75.369384] show_stack from dump_stack_lvl+0x70/0x90 [ 75.369415] dump_stack_lvl from print_report+0x158/0x528 [ 75.369445] print_report from kasan_report+0xdc/0x118 [ 75.369476] kasan_report from kasan_check_range+0x14c/0x198 [ 75.369476] kasan_check_range from kasan_atomics_helper+0x6ec/0x5ab0 [ 75.369506] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.369537] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.369567] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.369598] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.369628] kthread from ret_from_fork+0x14/0x20 [ 75.369628] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 75.369659] 3fa0: 00000000 00000000 00000000 00000000 [ 75.369659] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.369689] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.369689] [ 75.486724] Allocated by task 321: [ 75.490142] kasan_save_track+0x30/0x5c [ 75.494018] __kasan_kmalloc+0x8c/0x94 [ 75.497802] kasan_atomics+0xc0/0x33c [ 75.501495] kunit_try_run_case+0x22c/0x5a8 [ 75.505706] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.511230] kthread+0x464/0x810 [ 75.514495] ret_from_fork+0x14/0x20 [ 75.518096] [ 75.519592] The buggy address belongs to the object at cc23e880 [ 75.519592] which belongs to the cache kmalloc-64 of size 64 [ 75.531311] The buggy address is located 0 bytes to the right of [ 75.531311] allocated 48-byte region [cc23e880, cc23e8b0) [ 75.542877] [ 75.544372] The buggy address belongs to the physical page: [ 75.549987] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 75.557250] flags: 0x0(zone=0) [ 75.560333] page_type: f5(slab) [ 75.563507] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.571655] raw: 00000000 [ 75.574310] page dumped because: kasan: bad access detected [ 75.579895] [ 75.581420] Memory state around the buggy address: [ 75.586242] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.592803] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.599365] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.605957] ^ [ 75.610076] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.616638] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.623229] ================================================================== [ 78.465881] ================================================================== [ 78.473144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe30/0x5ab0 [ 78.480499] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 78.487243] [ 78.488769] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 78.488800] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 78.488800] Hardware name: Generic DRA74X (Flattened Device Tree) [ 78.488800] Call trace: [ 78.488830] unwind_backtrace from show_stack+0x18/0x1c [ 78.488861] show_stack from dump_stack_lvl+0x70/0x90 [ 78.488861] dump_stack_lvl from print_report+0x158/0x528 [ 78.488891] print_report from kasan_report+0xdc/0x118 [ 78.488922] kasan_report from kasan_check_range+0x14c/0x198 [ 78.488952] kasan_check_range from kasan_atomics_helper+0xe30/0x5ab0 [ 78.488952] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 78.488983] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 78.489013] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.489044] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 78.489074] kthread from ret_from_fork+0x14/0x20 [ 78.489105] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 78.489105] 3fa0: 00000000 00000000 00000000 00000000 [ 78.489135] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 78.489135] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 78.489166] [ 78.606170] Allocated by task 321: [ 78.609588] kasan_save_track+0x30/0x5c [ 78.613464] __kasan_kmalloc+0x8c/0x94 [ 78.617248] kasan_atomics+0xc0/0x33c [ 78.620941] kunit_try_run_case+0x22c/0x5a8 [ 78.625152] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.630706] kthread+0x464/0x810 [ 78.633941] ret_from_fork+0x14/0x20 [ 78.637542] [ 78.639068] The buggy address belongs to the object at cc23e880 [ 78.639068] which belongs to the cache kmalloc-64 of size 64 [ 78.650787] The buggy address is located 0 bytes to the right of [ 78.650787] allocated 48-byte region [cc23e880, cc23e8b0) [ 78.662322] [ 78.663848] The buggy address belongs to the physical page: [ 78.669433] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 78.676727] flags: 0x0(zone=0) [ 78.679809] page_type: f5(slab) [ 78.682983] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.691101] raw: 00000000 [ 78.693756] page dumped because: kasan: bad access detected [ 78.699371] [ 78.700866] Memory state around the buggy address: [ 78.705688] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.712249] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.718841] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.725402] ^ [ 78.729522] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.736114] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.742675] ================================================================== [ 89.503234] ================================================================== [ 89.510498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2578/0x5ab0 [ 89.517944] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 89.524688] [ 89.526214] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 89.526245] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 89.526245] Hardware name: Generic DRA74X (Flattened Device Tree) [ 89.526245] Call trace: [ 89.526275] unwind_backtrace from show_stack+0x18/0x1c [ 89.526275] show_stack from dump_stack_lvl+0x70/0x90 [ 89.526306] dump_stack_lvl from print_report+0x158/0x528 [ 89.526336] print_report from kasan_report+0xdc/0x118 [ 89.526367] kasan_report from kasan_check_range+0x14c/0x198 [ 89.526397] kasan_check_range from kasan_atomics_helper+0x2578/0x5ab0 [ 89.526397] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 89.526428] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 89.526458] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.526489] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 89.526519] kthread from ret_from_fork+0x14/0x20 [ 89.526519] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 89.526550] 3fa0: 00000000 00000000 00000000 00000000 [ 89.526580] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 89.526580] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 89.526611] [ 89.643707] Allocated by task 321: [ 89.647125] kasan_save_track+0x30/0x5c [ 89.651000] __kasan_kmalloc+0x8c/0x94 [ 89.654785] kasan_atomics+0xc0/0x33c [ 89.658477] kunit_try_run_case+0x22c/0x5a8 [ 89.662689] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.668212] kthread+0x464/0x810 [ 89.671478] ret_from_fork+0x14/0x20 [ 89.675079] [ 89.676574] The buggy address belongs to the object at cc23e880 [ 89.676574] which belongs to the cache kmalloc-64 of size 64 [ 89.688293] The buggy address is located 0 bytes to the right of [ 89.688293] allocated 48-byte region [cc23e880, cc23e8b0) [ 89.699859] [ 89.701354] The buggy address belongs to the physical page: [ 89.706970] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 89.714233] flags: 0x0(zone=0) [ 89.717315] page_type: f5(slab) [ 89.720489] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 89.728637] raw: 00000000 [ 89.731262] page dumped because: kasan: bad access detected [ 89.736877] [ 89.738372] Memory state around the buggy address: [ 89.743194] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.749786] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.756347] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 89.762908] ^ [ 89.767028] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.773620] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.780181] ================================================================== [ 82.420623] ================================================================== [ 82.427886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x160c/0x5ab0 [ 82.435333] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 82.442108] [ 82.443603] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 82.443634] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 82.443634] Hardware name: Generic DRA74X (Flattened Device Tree) [ 82.443664] Call trace: [ 82.443664] unwind_backtrace from show_stack+0x18/0x1c [ 82.443695] show_stack from dump_stack_lvl+0x70/0x90 [ 82.443725] dump_stack_lvl from print_report+0x158/0x528 [ 82.443725] print_report from kasan_report+0xdc/0x118 [ 82.443756] kasan_report from kasan_check_range+0x14c/0x198 [ 82.443786] kasan_check_range from kasan_atomics_helper+0x160c/0x5ab0 [ 82.443817] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 82.443847] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 82.443847] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.443878] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 82.443908] kthread from ret_from_fork+0x14/0x20 [ 82.443939] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 82.443939] 3fa0: 00000000 00000000 00000000 00000000 [ 82.443969] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 82.443969] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 82.444000] [ 82.561096] Allocated by task 321: [ 82.564514] kasan_save_track+0x30/0x5c [ 82.568389] __kasan_kmalloc+0x8c/0x94 [ 82.572174] kasan_atomics+0xc0/0x33c [ 82.575866] kunit_try_run_case+0x22c/0x5a8 [ 82.580078] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.585632] kthread+0x464/0x810 [ 82.588867] ret_from_fork+0x14/0x20 [ 82.592468] [ 82.593994] The buggy address belongs to the object at cc23e880 [ 82.593994] which belongs to the cache kmalloc-64 of size 64 [ 82.605712] The buggy address is located 0 bytes to the right of [ 82.605712] allocated 48-byte region [cc23e880, cc23e8b0) [ 82.617248] [ 82.618774] The buggy address belongs to the physical page: [ 82.624359] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 82.631652] flags: 0x0(zone=0) [ 82.634735] page_type: f5(slab) [ 82.637878] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.646026] raw: 00000000 [ 82.648681] page dumped because: kasan: bad access detected [ 82.654296] [ 82.655792] Memory state around the buggy address: [ 82.660614] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.667175] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.673767] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.680328] ^ [ 82.684448] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.691009] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.697601] ================================================================== [ 87.241363] ================================================================== [ 87.248657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20a8/0x5ab0 [ 87.256103] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 87.262847] [ 87.264343] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 87.264373] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.264404] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.264404] Call trace: [ 87.264404] unwind_backtrace from show_stack+0x18/0x1c [ 87.264434] show_stack from dump_stack_lvl+0x70/0x90 [ 87.264465] dump_stack_lvl from print_report+0x158/0x528 [ 87.264495] print_report from kasan_report+0xdc/0x118 [ 87.264495] kasan_report from kasan_check_range+0x14c/0x198 [ 87.264526] kasan_check_range from kasan_atomics_helper+0x20a8/0x5ab0 [ 87.264556] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.264587] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.264617] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.264648] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.264648] kthread from ret_from_fork+0x14/0x20 [ 87.264678] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 87.264709] 3fa0: 00000000 00000000 00000000 00000000 [ 87.264709] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.264739] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.264739] [ 87.381835] Allocated by task 321: [ 87.385284] kasan_save_track+0x30/0x5c [ 87.389129] __kasan_kmalloc+0x8c/0x94 [ 87.392913] kasan_atomics+0xc0/0x33c [ 87.396606] kunit_try_run_case+0x22c/0x5a8 [ 87.400848] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.406372] kthread+0x464/0x810 [ 87.409606] ret_from_fork+0x14/0x20 [ 87.413238] [ 87.414733] The buggy address belongs to the object at cc23e880 [ 87.414733] which belongs to the cache kmalloc-64 of size 64 [ 87.426452] The buggy address is located 0 bytes to the right of [ 87.426452] allocated 48-byte region [cc23e880, cc23e8b0) [ 87.437988] [ 87.439514] The buggy address belongs to the physical page: [ 87.445098] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 87.452392] flags: 0x0(zone=0) [ 87.455474] page_type: f5(slab) [ 87.458648] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 87.466766] raw: 00000000 [ 87.469421] page dumped because: kasan: bad access detected [ 87.475036] [ 87.476531] Memory state around the buggy address: [ 87.481353] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.487915] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.494506] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 87.501068] ^ [ 87.505187] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.511749] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.518341] ================================================================== [ 83.835998] ================================================================== [ 83.843261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18bc/0x5ab0 [ 83.850738] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 83.857482] [ 83.858978] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 83.859008] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.859008] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.859039] Call trace: [ 83.859039] unwind_backtrace from show_stack+0x18/0x1c [ 83.859069] show_stack from dump_stack_lvl+0x70/0x90 [ 83.859100] dump_stack_lvl from print_report+0x158/0x528 [ 83.859130] print_report from kasan_report+0xdc/0x118 [ 83.859130] kasan_report from kasan_check_range+0x14c/0x198 [ 83.859161] kasan_check_range from kasan_atomics_helper+0x18bc/0x5ab0 [ 83.859191] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.859222] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.859252] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.859252] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.859283] kthread from ret_from_fork+0x14/0x20 [ 83.859313] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 83.859313] 3fa0: 00000000 00000000 00000000 00000000 [ 83.859344] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.859374] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.859374] [ 83.976470] Allocated by task 321: [ 83.979919] kasan_save_track+0x30/0x5c [ 83.983764] __kasan_kmalloc+0x8c/0x94 [ 83.987548] kasan_atomics+0xc0/0x33c [ 83.991241] kunit_try_run_case+0x22c/0x5a8 [ 83.995483] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.001007] kthread+0x464/0x810 [ 84.004272] ret_from_fork+0x14/0x20 [ 84.007873] [ 84.009368] The buggy address belongs to the object at cc23e880 [ 84.009368] which belongs to the cache kmalloc-64 of size 64 [ 84.021087] The buggy address is located 0 bytes to the right of [ 84.021087] allocated 48-byte region [cc23e880, cc23e8b0) [ 84.032653] [ 84.034149] The buggy address belongs to the physical page: [ 84.039764] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 84.047027] flags: 0x0(zone=0) [ 84.050109] page_type: f5(slab) [ 84.053283] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.061431] raw: 00000000 [ 84.064056] page dumped because: kasan: bad access detected [ 84.069671] [ 84.071166] Memory state around the buggy address: [ 84.075988] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.082580] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.089141] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.095703] ^ [ 84.099822] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.106414] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.112976] ================================================================== [ 81.017883] ================================================================== [ 81.025146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x520c/0x5ab0 [ 81.032592] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 81.039245] [ 81.040771] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 81.040802] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.040802] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.040802] Call trace: [ 81.040832] unwind_backtrace from show_stack+0x18/0x1c [ 81.040832] show_stack from dump_stack_lvl+0x70/0x90 [ 81.040863] dump_stack_lvl from print_report+0x158/0x528 [ 81.040893] print_report from kasan_report+0xdc/0x118 [ 81.040924] kasan_report from kasan_atomics_helper+0x520c/0x5ab0 [ 81.040954] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.040954] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.040985] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.041015] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.041046] kthread from ret_from_fork+0x14/0x20 [ 81.041076] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 81.041076] 3fa0: 00000000 00000000 00000000 00000000 [ 81.041107] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.041107] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.041137] [ 81.152130] Allocated by task 321: [ 81.155548] kasan_save_track+0x30/0x5c [ 81.159423] __kasan_kmalloc+0x8c/0x94 [ 81.163208] kasan_atomics+0xc0/0x33c [ 81.166900] kunit_try_run_case+0x22c/0x5a8 [ 81.171112] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.176635] kthread+0x464/0x810 [ 81.179901] ret_from_fork+0x14/0x20 [ 81.183502] [ 81.184997] The buggy address belongs to the object at cc23e880 [ 81.184997] which belongs to the cache kmalloc-64 of size 64 [ 81.196716] The buggy address is located 0 bytes to the right of [ 81.196716] allocated 48-byte region [cc23e880, cc23e8b0) [ 81.208282] [ 81.209777] The buggy address belongs to the physical page: [ 81.215393] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 81.222656] flags: 0x0(zone=0) [ 81.225738] page_type: f5(slab) [ 81.228912] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 81.237060] raw: 00000000 [ 81.239715] page dumped because: kasan: bad access detected [ 81.245300] [ 81.246826] Memory state around the buggy address: [ 81.251647] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.258209] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.264770] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 81.271362] ^ [ 81.275482] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.282043] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.288635] ================================================================== [ 84.973236] ================================================================== [ 84.980499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b4c/0x5ab0 [ 84.987945] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 84.994689] [ 84.996215] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 84.996215] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.996246] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.996246] Call trace: [ 84.996246] unwind_backtrace from show_stack+0x18/0x1c [ 84.996276] show_stack from dump_stack_lvl+0x70/0x90 [ 84.996307] dump_stack_lvl from print_report+0x158/0x528 [ 84.996337] print_report from kasan_report+0xdc/0x118 [ 84.996368] kasan_report from kasan_check_range+0x14c/0x198 [ 84.996368] kasan_check_range from kasan_atomics_helper+0x1b4c/0x5ab0 [ 84.996398] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.996429] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.996459] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.996490] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.996520] kthread from ret_from_fork+0x14/0x20 [ 84.996520] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 84.996551] 3fa0: 00000000 00000000 00000000 00000000 [ 84.996551] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.996582] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.996582] [ 85.113708] Allocated by task 321: [ 85.117126] kasan_save_track+0x30/0x5c [ 85.121002] __kasan_kmalloc+0x8c/0x94 [ 85.124786] kasan_atomics+0xc0/0x33c [ 85.128479] kunit_try_run_case+0x22c/0x5a8 [ 85.132690] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.138214] kthread+0x464/0x810 [ 85.141479] ret_from_fork+0x14/0x20 [ 85.145080] [ 85.146575] The buggy address belongs to the object at cc23e880 [ 85.146575] which belongs to the cache kmalloc-64 of size 64 [ 85.158294] The buggy address is located 0 bytes to the right of [ 85.158294] allocated 48-byte region [cc23e880, cc23e8b0) [ 85.169860] [ 85.171356] The buggy address belongs to the physical page: [ 85.176971] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 85.184234] flags: 0x0(zone=0) [ 85.187316] page_type: f5(slab) [ 85.190490] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 85.198638] raw: 00000000 [ 85.201263] page dumped because: kasan: bad access detected [ 85.206878] [ 85.208374] Memory state around the buggy address: [ 85.213226] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.219787] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.226348] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 85.232940] ^ [ 85.237060] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.243621] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.250213] ================================================================== [ 73.097381] ================================================================== [ 73.104644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5170/0x5ab0 [ 73.112091] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 73.118743] [ 73.120269] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 73.120300] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.120300] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.120330] Call trace: [ 73.120330] unwind_backtrace from show_stack+0x18/0x1c [ 73.120361] show_stack from dump_stack_lvl+0x70/0x90 [ 73.120361] dump_stack_lvl from print_report+0x158/0x528 [ 73.120391] print_report from kasan_report+0xdc/0x118 [ 73.120422] kasan_report from kasan_atomics_helper+0x5170/0x5ab0 [ 73.120452] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.120483] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.120483] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.120513] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.120544] kthread from ret_from_fork+0x14/0x20 [ 73.120574] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 73.120574] 3fa0: 00000000 00000000 00000000 00000000 [ 73.120605] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.120635] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.120635] [ 73.231628] Allocated by task 321: [ 73.235046] kasan_save_track+0x30/0x5c [ 73.238922] __kasan_kmalloc+0x8c/0x94 [ 73.242706] kasan_atomics+0xc0/0x33c [ 73.246398] kunit_try_run_case+0x22c/0x5a8 [ 73.250610] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.256134] kthread+0x464/0x810 [ 73.259399] ret_from_fork+0x14/0x20 [ 73.263000] [ 73.264495] The buggy address belongs to the object at cc23e880 [ 73.264495] which belongs to the cache kmalloc-64 of size 64 [ 73.276245] The buggy address is located 0 bytes to the right of [ 73.276245] allocated 48-byte region [cc23e880, cc23e8b0) [ 73.287780] [ 73.289276] The buggy address belongs to the physical page: [ 73.294891] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 73.302154] flags: 0x0(zone=0) [ 73.305236] page_type: f5(slab) [ 73.308410] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.316558] raw: 00000000 [ 73.319213] page dumped because: kasan: bad access detected [ 73.324798] [ 73.326324] Memory state around the buggy address: [ 73.331146] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.337707] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.344299] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.350860] ^ [ 73.354980] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.361541] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.368133] ================================================================== [ 78.187805] ================================================================== [ 78.195068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5404/0x5ab0 [ 78.202514] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 78.209197] [ 78.210693] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 78.210723] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 78.210723] Hardware name: Generic DRA74X (Flattened Device Tree) [ 78.210754] Call trace: [ 78.210754] unwind_backtrace from show_stack+0x18/0x1c [ 78.210784] show_stack from dump_stack_lvl+0x70/0x90 [ 78.210784] dump_stack_lvl from print_report+0x158/0x528 [ 78.210815] print_report from kasan_report+0xdc/0x118 [ 78.210845] kasan_report from kasan_atomics_helper+0x5404/0x5ab0 [ 78.210876] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 78.210906] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 78.210937] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.210937] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 78.210968] kthread from ret_from_fork+0x14/0x20 [ 78.210998] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 78.210998] 3fa0: 00000000 00000000 00000000 00000000 [ 78.211029] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 78.211059] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 78.211059] [ 78.322052] Allocated by task 321: [ 78.325469] kasan_save_track+0x30/0x5c [ 78.329345] __kasan_kmalloc+0x8c/0x94 [ 78.333129] kasan_atomics+0xc0/0x33c [ 78.336822] kunit_try_run_case+0x22c/0x5a8 [ 78.341033] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.346557] kthread+0x464/0x810 [ 78.349822] ret_from_fork+0x14/0x20 [ 78.353424] [ 78.354919] The buggy address belongs to the object at cc23e880 [ 78.354919] which belongs to the cache kmalloc-64 of size 64 [ 78.366668] The buggy address is located 0 bytes to the right of [ 78.366668] allocated 48-byte region [cc23e880, cc23e8b0) [ 78.378204] [ 78.379699] The buggy address belongs to the physical page: [ 78.385314] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 78.392578] flags: 0x0(zone=0) [ 78.395660] page_type: f5(slab) [ 78.398834] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.406982] raw: 00000000 [ 78.409637] page dumped because: kasan: bad access detected [ 78.415222] [ 78.416748] Memory state around the buggy address: [ 78.421569] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.428131] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.434692] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.441284] ^ [ 78.445404] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.451965] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.458557] ================================================================== [ 84.120300] ================================================================== [ 84.127563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1960/0x5ab0 [ 84.135009] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 84.141784] [ 84.143280] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 84.143310] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.143310] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.143341] Call trace: [ 84.143341] unwind_backtrace from show_stack+0x18/0x1c [ 84.143371] show_stack from dump_stack_lvl+0x70/0x90 [ 84.143402] dump_stack_lvl from print_report+0x158/0x528 [ 84.143402] print_report from kasan_report+0xdc/0x118 [ 84.143432] kasan_report from kasan_check_range+0x14c/0x198 [ 84.143463] kasan_check_range from kasan_atomics_helper+0x1960/0x5ab0 [ 84.143493] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.143524] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.143524] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.143554] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.143585] kthread from ret_from_fork+0x14/0x20 [ 84.143615] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 84.143615] 3fa0: 00000000 00000000 00000000 00000000 [ 84.143646] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.143646] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.143676] [ 84.260772] Allocated by task 321: [ 84.264190] kasan_save_track+0x30/0x5c [ 84.268066] __kasan_kmalloc+0x8c/0x94 [ 84.271850] kasan_atomics+0xc0/0x33c [ 84.275543] kunit_try_run_case+0x22c/0x5a8 [ 84.279754] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.285308] kthread+0x464/0x810 [ 84.288543] ret_from_fork+0x14/0x20 [ 84.292144] [ 84.293670] The buggy address belongs to the object at cc23e880 [ 84.293670] which belongs to the cache kmalloc-64 of size 64 [ 84.305389] The buggy address is located 0 bytes to the right of [ 84.305389] allocated 48-byte region [cc23e880, cc23e8b0) [ 84.316925] [ 84.318450] The buggy address belongs to the physical page: [ 84.324035] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 84.331329] flags: 0x0(zone=0) [ 84.334411] page_type: f5(slab) [ 84.337585] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.345733] raw: 00000000 [ 84.348358] page dumped because: kasan: bad access detected [ 84.353973] [ 84.355468] Memory state around the buggy address: [ 84.360290] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.366882] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.373443] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.380004] ^ [ 84.384124] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.390716] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.397277] ================================================================== [ 87.525665] ================================================================== [ 87.532928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2154/0x5ab0 [ 87.540405] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 87.547149] [ 87.548645] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 87.548675] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.548675] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.548706] Call trace: [ 87.548706] unwind_backtrace from show_stack+0x18/0x1c [ 87.548736] show_stack from dump_stack_lvl+0x70/0x90 [ 87.548736] dump_stack_lvl from print_report+0x158/0x528 [ 87.548767] print_report from kasan_report+0xdc/0x118 [ 87.548797] kasan_report from kasan_check_range+0x14c/0x198 [ 87.548828] kasan_check_range from kasan_atomics_helper+0x2154/0x5ab0 [ 87.548858] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.548858] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.548889] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.548919] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.548950] kthread from ret_from_fork+0x14/0x20 [ 87.548980] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 87.548980] 3fa0: 00000000 00000000 00000000 00000000 [ 87.549011] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.549011] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.549041] [ 87.666137] Allocated by task 321: [ 87.669555] kasan_save_track+0x30/0x5c [ 87.673431] __kasan_kmalloc+0x8c/0x94 [ 87.677215] kasan_atomics+0xc0/0x33c [ 87.680908] kunit_try_run_case+0x22c/0x5a8 [ 87.685119] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.690643] kthread+0x464/0x810 [ 87.693908] ret_from_fork+0x14/0x20 [ 87.697509] [ 87.699005] The buggy address belongs to the object at cc23e880 [ 87.699005] which belongs to the cache kmalloc-64 of size 64 [ 87.710723] The buggy address is located 0 bytes to the right of [ 87.710723] allocated 48-byte region [cc23e880, cc23e8b0) [ 87.722290] [ 87.723785] The buggy address belongs to the physical page: [ 87.729400] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 87.736663] flags: 0x0(zone=0) [ 87.739746] page_type: f5(slab) [ 87.742919] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 87.751068] raw: 00000000 [ 87.753692] page dumped because: kasan: bad access detected [ 87.759307] [ 87.760803] Memory state around the buggy address: [ 87.765624] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.772216] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.778778] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 87.785339] ^ [ 87.789489] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.796051] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.802612] ================================================================== [ 76.198822] ================================================================== [ 76.206115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x5ab0 [ 76.213470] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 76.220214] [ 76.221710] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 76.221740] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 76.221771] Hardware name: Generic DRA74X (Flattened Device Tree) [ 76.221771] Call trace: [ 76.221771] unwind_backtrace from show_stack+0x18/0x1c [ 76.221801] show_stack from dump_stack_lvl+0x70/0x90 [ 76.221832] dump_stack_lvl from print_report+0x158/0x528 [ 76.221862] print_report from kasan_report+0xdc/0x118 [ 76.221893] kasan_report from kasan_check_range+0x14c/0x198 [ 76.221893] kasan_check_range from kasan_atomics_helper+0x8d8/0x5ab0 [ 76.221923] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 76.221954] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 76.221984] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.222015] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 76.222045] kthread from ret_from_fork+0x14/0x20 [ 76.222045] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 76.222076] 3fa0: 00000000 00000000 00000000 00000000 [ 76.222076] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 76.222106] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 76.222106] [ 76.339141] Allocated by task 321: [ 76.342559] kasan_save_track+0x30/0x5c [ 76.346435] __kasan_kmalloc+0x8c/0x94 [ 76.350219] kasan_atomics+0xc0/0x33c [ 76.353912] kunit_try_run_case+0x22c/0x5a8 [ 76.358123] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.363647] kthread+0x464/0x810 [ 76.366912] ret_from_fork+0x14/0x20 [ 76.370513] [ 76.372009] The buggy address belongs to the object at cc23e880 [ 76.372009] which belongs to the cache kmalloc-64 of size 64 [ 76.383728] The buggy address is located 0 bytes to the right of [ 76.383728] allocated 48-byte region [cc23e880, cc23e8b0) [ 76.395294] [ 76.396789] The buggy address belongs to the physical page: [ 76.402404] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 76.409667] flags: 0x0(zone=0) [ 76.412750] page_type: f5(slab) [ 76.415924] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.424072] raw: 00000000 [ 76.426696] page dumped because: kasan: bad access detected [ 76.432312] [ 76.433837] Memory state around the buggy address: [ 76.438659] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.445220] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.451782] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.458374] ^ [ 76.462493] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.469055] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.475646] ================================================================== [ 80.455474] ================================================================== [ 80.462768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5218/0x5ab0 [ 80.470214] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 80.476867] [ 80.478393] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 80.478393] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 80.478424] Hardware name: Generic DRA74X (Flattened Device Tree) [ 80.478424] Call trace: [ 80.478424] unwind_backtrace from show_stack+0x18/0x1c [ 80.478454] show_stack from dump_stack_lvl+0x70/0x90 [ 80.478485] dump_stack_lvl from print_report+0x158/0x528 [ 80.478515] print_report from kasan_report+0xdc/0x118 [ 80.478546] kasan_report from kasan_atomics_helper+0x5218/0x5ab0 [ 80.478576] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 80.478576] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 80.478607] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.478637] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 80.478668] kthread from ret_from_fork+0x14/0x20 [ 80.478698] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 80.478698] 3fa0: 00000000 00000000 00000000 00000000 [ 80.478729] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 80.478729] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 80.478759] [ 80.589721] Allocated by task 321: [ 80.593170] kasan_save_track+0x30/0x5c [ 80.597015] __kasan_kmalloc+0x8c/0x94 [ 80.600799] kasan_atomics+0xc0/0x33c [ 80.604492] kunit_try_run_case+0x22c/0x5a8 [ 80.608734] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.614257] kthread+0x464/0x810 [ 80.617523] ret_from_fork+0x14/0x20 [ 80.621124] [ 80.622619] The buggy address belongs to the object at cc23e880 [ 80.622619] which belongs to the cache kmalloc-64 of size 64 [ 80.634338] The buggy address is located 0 bytes to the right of [ 80.634338] allocated 48-byte region [cc23e880, cc23e8b0) [ 80.645904] [ 80.647399] The buggy address belongs to the physical page: [ 80.653015] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 80.660278] flags: 0x0(zone=0) [ 80.663360] page_type: f5(slab) [ 80.666534] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.674682] raw: 00000000 [ 80.677307] page dumped because: kasan: bad access detected [ 80.682922] [ 80.684417] Memory state around the buggy address: [ 80.689239] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.695831] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.702392] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.708953] ^ [ 80.713104] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.719665] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.726226] ================================================================== [ 72.533111] ================================================================== [ 72.548065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5044/0x5ab0 [ 72.555541] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 72.562194] [ 72.563690] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 72.563720] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 72.563751] Hardware name: Generic DRA74X (Flattened Device Tree) [ 72.563751] Call trace: [ 72.563751] unwind_backtrace from show_stack+0x18/0x1c [ 72.563781] show_stack from dump_stack_lvl+0x70/0x90 [ 72.563812] dump_stack_lvl from print_report+0x158/0x528 [ 72.563842] print_report from kasan_report+0xdc/0x118 [ 72.563873] kasan_report from kasan_atomics_helper+0x5044/0x5ab0 [ 72.563873] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 72.563903] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 72.563934] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.563964] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 72.563995] kthread from ret_from_fork+0x14/0x20 [ 72.564025] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 72.564025] 3fa0: 00000000 00000000 00000000 00000000 [ 72.564056] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 72.564056] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 72.564086] [ 72.675079] Allocated by task 321: [ 72.678497] kasan_save_track+0x30/0x5c [ 72.682373] __kasan_kmalloc+0x8c/0x94 [ 72.686157] kasan_atomics+0xc0/0x33c [ 72.689849] kunit_try_run_case+0x22c/0x5a8 [ 72.694061] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.699584] kthread+0x464/0x810 [ 72.702850] ret_from_fork+0x14/0x20 [ 72.706451] [ 72.707977] The buggy address belongs to the object at cc23e880 [ 72.707977] which belongs to the cache kmalloc-64 of size 64 [ 72.719696] The buggy address is located 0 bytes to the right of [ 72.719696] allocated 48-byte region [cc23e880, cc23e8b0) [ 72.731231] [ 72.732757] The buggy address belongs to the physical page: [ 72.738342] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 72.745635] flags: 0x0(zone=0) [ 72.748718] page_type: f5(slab) [ 72.751892] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 72.760009] raw: 00000000 [ 72.762664] page dumped because: kasan: bad access detected [ 72.768280] [ 72.769775] Memory state around the buggy address: [ 72.774597] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.781158] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.787750] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.794311] ^ [ 72.798431] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.805023] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.811584] ================================================================== [ 77.619537] ================================================================== [ 77.626800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc24/0x5ab0 [ 77.634185] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 77.640930] [ 77.642425] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 77.642456] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.642456] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.642486] Call trace: [ 77.642486] unwind_backtrace from show_stack+0x18/0x1c [ 77.642517] show_stack from dump_stack_lvl+0x70/0x90 [ 77.642547] dump_stack_lvl from print_report+0x158/0x528 [ 77.642547] print_report from kasan_report+0xdc/0x118 [ 77.642578] kasan_report from kasan_check_range+0x14c/0x198 [ 77.642608] kasan_check_range from kasan_atomics_helper+0xc24/0x5ab0 [ 77.642639] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.642669] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.642669] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.642700] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.642730] kthread from ret_from_fork+0x14/0x20 [ 77.642761] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 77.642761] 3fa0: 00000000 00000000 00000000 00000000 [ 77.642791] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.642822] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.642822] [ 77.759826] Allocated by task 321: [ 77.763275] kasan_save_track+0x30/0x5c [ 77.767120] __kasan_kmalloc+0x8c/0x94 [ 77.770904] kasan_atomics+0xc0/0x33c [ 77.774597] kunit_try_run_case+0x22c/0x5a8 [ 77.778839] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.784362] kthread+0x464/0x810 [ 77.787597] ret_from_fork+0x14/0x20 [ 77.791229] [ 77.792724] The buggy address belongs to the object at cc23e880 [ 77.792724] which belongs to the cache kmalloc-64 of size 64 [ 77.804443] The buggy address is located 0 bytes to the right of [ 77.804443] allocated 48-byte region [cc23e880, cc23e8b0) [ 77.816009] [ 77.817504] The buggy address belongs to the physical page: [ 77.823120] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 77.830383] flags: 0x0(zone=0) [ 77.833465] page_type: f5(slab) [ 77.836639] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 77.844787] raw: 00000000 [ 77.847412] page dumped because: kasan: bad access detected [ 77.853027] [ 77.854522] Memory state around the buggy address: [ 77.859344] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.865936] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.872497] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.879058] ^ [ 77.883209] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.889770] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.896331] ================================================================== [ 89.787506] ================================================================== [ 89.794769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5500/0x5ab0 [ 89.802215] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321 [ 89.808898] [ 89.810394] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 89.810424] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 89.810424] Hardware name: Generic DRA74X (Flattened Device Tree) [ 89.810455] Call trace: [ 89.810455] unwind_backtrace from show_stack+0x18/0x1c [ 89.810485] show_stack from dump_stack_lvl+0x70/0x90 [ 89.810516] dump_stack_lvl from print_report+0x158/0x528 [ 89.810516] print_report from kasan_report+0xdc/0x118 [ 89.810546] kasan_report from kasan_atomics_helper+0x5500/0x5ab0 [ 89.810577] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 89.810607] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 89.810638] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.810638] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 89.810668] kthread from ret_from_fork+0x14/0x20 [ 89.810699] Exception stack(0xf26f3fb0 to 0xf26f3ff8) [ 89.810729] 3fa0: 00000000 00000000 00000000 00000000 [ 89.810729] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 89.810760] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 89.810760] [ 89.921752] Allocated by task 321: [ 89.925170] kasan_save_track+0x30/0x5c [ 89.929046] __kasan_kmalloc+0x8c/0x94 [ 89.932830] kasan_atomics+0xc0/0x33c [ 89.936523] kunit_try_run_case+0x22c/0x5a8 [ 89.940734] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.946258] kthread+0x464/0x810 [ 89.949523] ret_from_fork+0x14/0x20 [ 89.953124] [ 89.954620] The buggy address belongs to the object at cc23e880 [ 89.954620] which belongs to the cache kmalloc-64 of size 64 [ 89.966369] The buggy address is located 0 bytes to the right of [ 89.966369] allocated 48-byte region [cc23e880, cc23e8b0) [ 89.977905] [ 89.979400] The buggy address belongs to the physical page: [ 89.985015] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e [ 89.992279] flags: 0x0(zone=0) [ 89.995361] page_type: f5(slab) [ 89.998535] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 90.006683] raw: 00000000 [ 90.009338] page dumped because: kasan: bad access detected [ 90.014923] [ 90.016448] Memory state around the buggy address: [ 90.021270] cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.027832] cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.034393] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 90.040985] ^ [ 90.045104] cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.051666] cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.058227] ==================================================================
[ 64.520218] ================================================================== [ 64.527446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 64.534840] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 64.542239] [ 64.543740] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 64.543747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.543749] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 64.543753] Call Trace: [ 64.543754] <TASK> [ 64.543756] dump_stack_lvl+0x73/0xb0 [ 64.543760] print_report+0xd1/0x650 [ 64.543764] ? __virt_addr_valid+0x1db/0x2d0 [ 64.543768] ? kasan_atomics_helper+0x50d4/0x5450 [ 64.543772] ? kasan_complete_mode_report_info+0x2a/0x200 [ 64.543777] ? kasan_atomics_helper+0x50d4/0x5450 [ 64.543781] kasan_report+0x141/0x180 [ 64.543785] ? kasan_atomics_helper+0x50d4/0x5450 [ 64.543790] __asan_report_store8_noabort+0x1b/0x30 [ 64.543794] kasan_atomics_helper+0x50d4/0x5450 [ 64.543798] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 64.543803] ? __kmalloc_cache_noprof+0x189/0x420 [ 64.543807] ? kasan_atomics+0x152/0x310 [ 64.543811] kasan_atomics+0x1dc/0x310 [ 64.543814] ? __pfx_kasan_atomics+0x10/0x10 [ 64.543818] ? ktime_get_ts64+0x83/0x230 [ 64.543823] kunit_try_run_case+0x1a2/0x480 [ 64.543827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.543832] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 64.543837] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 64.543841] ? __kthread_parkme+0x82/0x180 [ 64.543845] ? preempt_count_sub+0x50/0x80 [ 64.543850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.543855] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.543859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 64.543863] kthread+0x334/0x6f0 [ 64.543867] ? trace_preempt_on+0x20/0xc0 [ 64.543872] ? __pfx_kthread+0x10/0x10 [ 64.543876] ? _raw_spin_unlock_irq+0x47/0x80 [ 64.543881] ? calculate_sigpending+0x7b/0xa0 [ 64.543885] ? __pfx_kthread+0x10/0x10 [ 64.543889] ret_from_fork+0x3e/0x80 [ 64.543894] ? __pfx_kthread+0x10/0x10 [ 64.543898] ret_from_fork_asm+0x1a/0x30 [ 64.543904] </TASK> [ 64.543906] [ 64.721510] Allocated by task 308: [ 64.724916] kasan_save_stack+0x45/0x70 [ 64.728755] kasan_save_track+0x18/0x40 [ 64.732594] kasan_save_alloc_info+0x3b/0x50 [ 64.736866] __kasan_kmalloc+0xb7/0xc0 [ 64.740618] __kmalloc_cache_noprof+0x189/0x420 [ 64.745151] kasan_atomics+0x95/0x310 [ 64.748819] kunit_try_run_case+0x1a2/0x480 [ 64.753013] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.758412] kthread+0x334/0x6f0 [ 64.761652] ret_from_fork+0x3e/0x80 [ 64.765232] ret_from_fork_asm+0x1a/0x30 [ 64.769164] [ 64.770664] The buggy address belongs to the object at ffff8881061f7500 [ 64.770664] which belongs to the cache kmalloc-64 of size 64 [ 64.783023] The buggy address is located 0 bytes to the right of [ 64.783023] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 64.795884] [ 64.797384] The buggy address belongs to the physical page: [ 64.802954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 64.810954] flags: 0x200000000000000(node=0|zone=2) [ 64.815833] page_type: f5(slab) [ 64.818982] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 64.826737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.834484] page dumped because: kasan: bad access detected [ 64.840057] [ 64.841556] Memory state around the buggy address: [ 64.846347] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.853568] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.860795] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.868021] ^ [ 64.872815] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.880035] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.887262] ================================================================== [ 55.483797] ================================================================== [ 55.491027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 55.498333] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 55.505741] [ 55.507243] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 55.507251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.507253] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 55.507257] Call Trace: [ 55.507258] <TASK> [ 55.507260] dump_stack_lvl+0x73/0xb0 [ 55.507264] print_report+0xd1/0x650 [ 55.507268] ? __virt_addr_valid+0x1db/0x2d0 [ 55.507272] ? kasan_atomics_helper+0x8f9/0x5450 [ 55.507276] ? kasan_complete_mode_report_info+0x2a/0x200 [ 55.507280] ? kasan_atomics_helper+0x8f9/0x5450 [ 55.507285] kasan_report+0x141/0x180 [ 55.507289] ? kasan_atomics_helper+0x8f9/0x5450 [ 55.507294] kasan_check_range+0x10c/0x1c0 [ 55.507299] __kasan_check_write+0x18/0x20 [ 55.507303] kasan_atomics_helper+0x8f9/0x5450 [ 55.507307] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 55.507312] ? __kmalloc_cache_noprof+0x189/0x420 [ 55.507316] ? kasan_atomics+0x152/0x310 [ 55.507320] kasan_atomics+0x1dc/0x310 [ 55.507323] ? __pfx_kasan_atomics+0x10/0x10 [ 55.507327] ? ktime_get_ts64+0x83/0x230 [ 55.507332] kunit_try_run_case+0x1a2/0x480 [ 55.507336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.507341] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 55.507345] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 55.507350] ? __kthread_parkme+0x82/0x180 [ 55.507355] ? preempt_count_sub+0x50/0x80 [ 55.507359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.507364] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.507368] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 55.507373] kthread+0x334/0x6f0 [ 55.507377] ? trace_preempt_on+0x20/0xc0 [ 55.507381] ? __pfx_kthread+0x10/0x10 [ 55.507386] ? _raw_spin_unlock_irq+0x47/0x80 [ 55.507390] ? calculate_sigpending+0x7b/0xa0 [ 55.507394] ? __pfx_kthread+0x10/0x10 [ 55.507399] ret_from_fork+0x3e/0x80 [ 55.507403] ? __pfx_kthread+0x10/0x10 [ 55.507407] ret_from_fork_asm+0x1a/0x30 [ 55.507413] </TASK> [ 55.507415] [ 55.687994] Allocated by task 308: [ 55.691400] kasan_save_stack+0x45/0x70 [ 55.695249] kasan_save_track+0x18/0x40 [ 55.699088] kasan_save_alloc_info+0x3b/0x50 [ 55.703358] __kasan_kmalloc+0xb7/0xc0 [ 55.707113] __kmalloc_cache_noprof+0x189/0x420 [ 55.711645] kasan_atomics+0x95/0x310 [ 55.715311] kunit_try_run_case+0x1a2/0x480 [ 55.719505] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.724903] kthread+0x334/0x6f0 [ 55.728136] ret_from_fork+0x3e/0x80 [ 55.731735] ret_from_fork_asm+0x1a/0x30 [ 55.735666] [ 55.737191] The buggy address belongs to the object at ffff8881061f7500 [ 55.737191] which belongs to the cache kmalloc-64 of size 64 [ 55.749525] The buggy address is located 0 bytes to the right of [ 55.749525] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 55.762386] [ 55.763885] The buggy address belongs to the physical page: [ 55.769457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 55.777456] flags: 0x200000000000000(node=0|zone=2) [ 55.782333] page_type: f5(slab) [ 55.785481] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 55.793219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.800958] page dumped because: kasan: bad access detected [ 55.806532] [ 55.808031] Memory state around the buggy address: [ 55.812822] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.820043] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.827269] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.834488] ^ [ 55.839283] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.846508] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.853735] ================================================================== [ 64.142438] ================================================================== [ 64.149668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 64.157111] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 64.164511] [ 64.166013] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 64.166020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.166022] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 64.166026] Call Trace: [ 64.166028] <TASK> [ 64.166029] dump_stack_lvl+0x73/0xb0 [ 64.166033] print_report+0xd1/0x650 [ 64.166037] ? __virt_addr_valid+0x1db/0x2d0 [ 64.166041] ? kasan_atomics_helper+0x1467/0x5450 [ 64.166045] ? kasan_complete_mode_report_info+0x2a/0x200 [ 64.166050] ? kasan_atomics_helper+0x1467/0x5450 [ 64.166054] kasan_report+0x141/0x180 [ 64.166058] ? kasan_atomics_helper+0x1467/0x5450 [ 64.166063] kasan_check_range+0x10c/0x1c0 [ 64.166068] __kasan_check_write+0x18/0x20 [ 64.166072] kasan_atomics_helper+0x1467/0x5450 [ 64.166076] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 64.166081] ? __kmalloc_cache_noprof+0x189/0x420 [ 64.166085] ? kasan_atomics+0x152/0x310 [ 64.166089] kasan_atomics+0x1dc/0x310 [ 64.166092] ? __pfx_kasan_atomics+0x10/0x10 [ 64.166096] ? ktime_get_ts64+0x83/0x230 [ 64.166101] kunit_try_run_case+0x1a2/0x480 [ 64.166106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.166110] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 64.166115] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 64.166119] ? __kthread_parkme+0x82/0x180 [ 64.166124] ? preempt_count_sub+0x50/0x80 [ 64.166129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.166133] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.166137] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 64.166142] kthread+0x334/0x6f0 [ 64.166146] ? trace_preempt_on+0x20/0xc0 [ 64.166150] ? __pfx_kthread+0x10/0x10 [ 64.166155] ? _raw_spin_unlock_irq+0x47/0x80 [ 64.166159] ? calculate_sigpending+0x7b/0xa0 [ 64.166163] ? __pfx_kthread+0x10/0x10 [ 64.166168] ret_from_fork+0x3e/0x80 [ 64.166172] ? __pfx_kthread+0x10/0x10 [ 64.166176] ret_from_fork_asm+0x1a/0x30 [ 64.166182] </TASK> [ 64.166184] [ 64.347154] Allocated by task 308: [ 64.350560] kasan_save_stack+0x45/0x70 [ 64.354407] kasan_save_track+0x18/0x40 [ 64.358247] kasan_save_alloc_info+0x3b/0x50 [ 64.362527] __kasan_kmalloc+0xb7/0xc0 [ 64.366280] __kmalloc_cache_noprof+0x189/0x420 [ 64.370813] kasan_atomics+0x95/0x310 [ 64.374477] kunit_try_run_case+0x1a2/0x480 [ 64.378664] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.384096] kthread+0x334/0x6f0 [ 64.387330] ret_from_fork+0x3e/0x80 [ 64.390909] ret_from_fork_asm+0x1a/0x30 [ 64.394836] [ 64.396334] The buggy address belongs to the object at ffff8881061f7500 [ 64.396334] which belongs to the cache kmalloc-64 of size 64 [ 64.408691] The buggy address is located 0 bytes to the right of [ 64.408691] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 64.421578] [ 64.423078] The buggy address belongs to the physical page: [ 64.428650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 64.436649] flags: 0x200000000000000(node=0|zone=2) [ 64.441527] page_type: f5(slab) [ 64.444691] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 64.452441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.460188] page dumped because: kasan: bad access detected [ 64.465760] [ 64.467257] Memory state around the buggy address: [ 64.472051] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.479272] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.486500] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.493742] ^ [ 64.498535] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.505755] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.512974] ================================================================== [ 54.729077] ================================================================== [ 54.736310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 54.743623] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 54.751023] [ 54.752525] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 54.752533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.752535] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 54.752538] Call Trace: [ 54.752540] <TASK> [ 54.752542] dump_stack_lvl+0x73/0xb0 [ 54.752546] print_report+0xd1/0x650 [ 54.752550] ? __virt_addr_valid+0x1db/0x2d0 [ 54.752554] ? kasan_atomics_helper+0x7c7/0x5450 [ 54.752558] ? kasan_complete_mode_report_info+0x2a/0x200 [ 54.752562] ? kasan_atomics_helper+0x7c7/0x5450 [ 54.752567] kasan_report+0x141/0x180 [ 54.752571] ? kasan_atomics_helper+0x7c7/0x5450 [ 54.752576] kasan_check_range+0x10c/0x1c0 [ 54.752581] __kasan_check_write+0x18/0x20 [ 54.752584] kasan_atomics_helper+0x7c7/0x5450 [ 54.752589] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 54.752593] ? __kmalloc_cache_noprof+0x189/0x420 [ 54.752597] ? kasan_atomics+0x152/0x310 [ 54.752601] kasan_atomics+0x1dc/0x310 [ 54.752605] ? __pfx_kasan_atomics+0x10/0x10 [ 54.752609] ? ktime_get_ts64+0x83/0x230 [ 54.752614] kunit_try_run_case+0x1a2/0x480 [ 54.752618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.752623] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 54.752627] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 54.752632] ? __kthread_parkme+0x82/0x180 [ 54.752636] ? preempt_count_sub+0x50/0x80 [ 54.752641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.752646] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.752650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 54.752654] kthread+0x334/0x6f0 [ 54.752658] ? trace_preempt_on+0x20/0xc0 [ 54.752663] ? __pfx_kthread+0x10/0x10 [ 54.752667] ? _raw_spin_unlock_irq+0x47/0x80 [ 54.752689] ? calculate_sigpending+0x7b/0xa0 [ 54.752693] ? __pfx_kthread+0x10/0x10 [ 54.752698] ret_from_fork+0x3e/0x80 [ 54.752702] ? __pfx_kthread+0x10/0x10 [ 54.752707] ret_from_fork_asm+0x1a/0x30 [ 54.752725] </TASK> [ 54.752727] [ 54.933413] Allocated by task 308: [ 54.936819] kasan_save_stack+0x45/0x70 [ 54.940659] kasan_save_track+0x18/0x40 [ 54.944533] kasan_save_alloc_info+0x3b/0x50 [ 54.948804] __kasan_kmalloc+0xb7/0xc0 [ 54.952558] __kmalloc_cache_noprof+0x189/0x420 [ 54.957091] kasan_atomics+0x95/0x310 [ 54.960757] kunit_try_run_case+0x1a2/0x480 [ 54.964948] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.970348] kthread+0x334/0x6f0 [ 54.973582] ret_from_fork+0x3e/0x80 [ 54.977171] ret_from_fork_asm+0x1a/0x30 [ 54.981104] [ 54.982604] The buggy address belongs to the object at ffff8881061f7500 [ 54.982604] which belongs to the cache kmalloc-64 of size 64 [ 54.994945] The buggy address is located 0 bytes to the right of [ 54.994945] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 55.007812] [ 55.009312] The buggy address belongs to the physical page: [ 55.014884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 55.022885] flags: 0x200000000000000(node=0|zone=2) [ 55.027763] page_type: f5(slab) [ 55.030909] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 55.038648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.046386] page dumped because: kasan: bad access detected [ 55.051959] [ 55.053457] Memory state around the buggy address: [ 55.058251] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.065469] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.072718] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.079941] ^ [ 55.084739] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.091962] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.099183] ================================================================== [ 69.049053] ================================================================== [ 69.056272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 69.063663] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 69.071084] [ 69.072582] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 69.072589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.072592] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 69.072595] Call Trace: [ 69.072597] <TASK> [ 69.072598] dump_stack_lvl+0x73/0xb0 [ 69.072602] print_report+0xd1/0x650 [ 69.072606] ? __virt_addr_valid+0x1db/0x2d0 [ 69.072610] ? kasan_atomics_helper+0x1c18/0x5450 [ 69.072614] ? kasan_complete_mode_report_info+0x2a/0x200 [ 69.072618] ? kasan_atomics_helper+0x1c18/0x5450 [ 69.072622] kasan_report+0x141/0x180 [ 69.072627] ? kasan_atomics_helper+0x1c18/0x5450 [ 69.072632] kasan_check_range+0x10c/0x1c0 [ 69.072637] __kasan_check_write+0x18/0x20 [ 69.072640] kasan_atomics_helper+0x1c18/0x5450 [ 69.072645] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 69.072649] ? __kmalloc_cache_noprof+0x189/0x420 [ 69.072653] ? kasan_atomics+0x152/0x310 [ 69.072657] kasan_atomics+0x1dc/0x310 [ 69.072660] ? __pfx_kasan_atomics+0x10/0x10 [ 69.072664] ? ktime_get_ts64+0x83/0x230 [ 69.072669] kunit_try_run_case+0x1a2/0x480 [ 69.072691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.072695] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 69.072700] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 69.072717] ? __kthread_parkme+0x82/0x180 [ 69.072722] ? preempt_count_sub+0x50/0x80 [ 69.072726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.072731] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.072735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 69.072739] kthread+0x334/0x6f0 [ 69.072743] ? trace_preempt_on+0x20/0xc0 [ 69.072748] ? __pfx_kthread+0x10/0x10 [ 69.072752] ? _raw_spin_unlock_irq+0x47/0x80 [ 69.072757] ? calculate_sigpending+0x7b/0xa0 [ 69.072761] ? __pfx_kthread+0x10/0x10 [ 69.072765] ret_from_fork+0x3e/0x80 [ 69.072769] ? __pfx_kthread+0x10/0x10 [ 69.072773] ret_from_fork_asm+0x1a/0x30 [ 69.072779] </TASK> [ 69.072781] [ 69.253863] Allocated by task 308: [ 69.257269] kasan_save_stack+0x45/0x70 [ 69.261109] kasan_save_track+0x18/0x40 [ 69.264946] kasan_save_alloc_info+0x3b/0x50 [ 69.269219] __kasan_kmalloc+0xb7/0xc0 [ 69.272971] __kmalloc_cache_noprof+0x189/0x420 [ 69.277503] kasan_atomics+0x95/0x310 [ 69.281170] kunit_try_run_case+0x1a2/0x480 [ 69.285357] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.290754] kthread+0x334/0x6f0 [ 69.293988] ret_from_fork+0x3e/0x80 [ 69.297568] ret_from_fork_asm+0x1a/0x30 [ 69.301502] [ 69.303001] The buggy address belongs to the object at ffff8881061f7500 [ 69.303001] which belongs to the cache kmalloc-64 of size 64 [ 69.315341] The buggy address is located 0 bytes to the right of [ 69.315341] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 69.328202] [ 69.329707] The buggy address belongs to the physical page: [ 69.335308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 69.343308] flags: 0x200000000000000(node=0|zone=2) [ 69.348186] page_type: f5(slab) [ 69.351334] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 69.359080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.366819] page dumped because: kasan: bad access detected [ 69.372393] [ 69.373890] Memory state around the buggy address: [ 69.378705] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.385946] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.393164] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.400383] ^ [ 69.405176] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.412396] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.419624] ================================================================== [ 64.894503] ================================================================== [ 64.901742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 64.909134] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 64.916528] [ 64.918026] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 64.918034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.918036] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 64.918039] Call Trace: [ 64.918041] <TASK> [ 64.918043] dump_stack_lvl+0x73/0xb0 [ 64.918046] print_report+0xd1/0x650 [ 64.918051] ? __virt_addr_valid+0x1db/0x2d0 [ 64.918054] ? kasan_atomics_helper+0x151d/0x5450 [ 64.918059] ? kasan_complete_mode_report_info+0x2a/0x200 [ 64.918063] ? kasan_atomics_helper+0x151d/0x5450 [ 64.918067] kasan_report+0x141/0x180 [ 64.918072] ? kasan_atomics_helper+0x151d/0x5450 [ 64.918077] kasan_check_range+0x10c/0x1c0 [ 64.918082] __kasan_check_write+0x18/0x20 [ 64.918085] kasan_atomics_helper+0x151d/0x5450 [ 64.918090] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 64.918094] ? __kmalloc_cache_noprof+0x189/0x420 [ 64.918098] ? kasan_atomics+0x152/0x310 [ 64.918102] kasan_atomics+0x1dc/0x310 [ 64.918105] ? __pfx_kasan_atomics+0x10/0x10 [ 64.918109] ? ktime_get_ts64+0x83/0x230 [ 64.918114] kunit_try_run_case+0x1a2/0x480 [ 64.918119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.918123] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 64.918128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 64.918132] ? __kthread_parkme+0x82/0x180 [ 64.918137] ? preempt_count_sub+0x50/0x80 [ 64.918141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.918146] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.918150] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 64.918154] kthread+0x334/0x6f0 [ 64.918158] ? trace_preempt_on+0x20/0xc0 [ 64.918163] ? __pfx_kthread+0x10/0x10 [ 64.918167] ? _raw_spin_unlock_irq+0x47/0x80 [ 64.918171] ? calculate_sigpending+0x7b/0xa0 [ 64.918175] ? __pfx_kthread+0x10/0x10 [ 64.918180] ret_from_fork+0x3e/0x80 [ 64.918184] ? __pfx_kthread+0x10/0x10 [ 64.918189] ret_from_fork_asm+0x1a/0x30 [ 64.918194] </TASK> [ 64.918196] [ 65.099135] Allocated by task 308: [ 65.102540] kasan_save_stack+0x45/0x70 [ 65.106387] kasan_save_track+0x18/0x40 [ 65.110227] kasan_save_alloc_info+0x3b/0x50 [ 65.114500] __kasan_kmalloc+0xb7/0xc0 [ 65.118253] __kmalloc_cache_noprof+0x189/0x420 [ 65.122784] kasan_atomics+0x95/0x310 [ 65.126449] kunit_try_run_case+0x1a2/0x480 [ 65.130635] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.136033] kthread+0x334/0x6f0 [ 65.139267] ret_from_fork+0x3e/0x80 [ 65.142846] ret_from_fork_asm+0x1a/0x30 [ 65.146771] [ 65.148271] The buggy address belongs to the object at ffff8881061f7500 [ 65.148271] which belongs to the cache kmalloc-64 of size 64 [ 65.160614] The buggy address is located 0 bytes to the right of [ 65.160614] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 65.173482] [ 65.174981] The buggy address belongs to the physical page: [ 65.180554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 65.188560] flags: 0x200000000000000(node=0|zone=2) [ 65.193440] page_type: f5(slab) [ 65.196588] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 65.204333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.212072] page dumped because: kasan: bad access detected [ 65.217644] [ 65.219144] Memory state around the buggy address: [ 65.223936] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.231156] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.238374] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.245593] ^ [ 65.250385] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.257607] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.264834] ================================================================== [ 54.351904] ================================================================== [ 54.359125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 54.366432] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 54.373825] [ 54.375326] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 54.375334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.375336] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 54.375339] Call Trace: [ 54.375341] <TASK> [ 54.375343] dump_stack_lvl+0x73/0xb0 [ 54.375346] print_report+0xd1/0x650 [ 54.375351] ? __virt_addr_valid+0x1db/0x2d0 [ 54.375355] ? kasan_atomics_helper+0x72f/0x5450 [ 54.375359] ? kasan_complete_mode_report_info+0x2a/0x200 [ 54.375363] ? kasan_atomics_helper+0x72f/0x5450 [ 54.375368] kasan_report+0x141/0x180 [ 54.375372] ? kasan_atomics_helper+0x72f/0x5450 [ 54.375377] kasan_check_range+0x10c/0x1c0 [ 54.375382] __kasan_check_write+0x18/0x20 [ 54.375386] kasan_atomics_helper+0x72f/0x5450 [ 54.375390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 54.375394] ? __kmalloc_cache_noprof+0x189/0x420 [ 54.375398] ? kasan_atomics+0x152/0x310 [ 54.375402] kasan_atomics+0x1dc/0x310 [ 54.375406] ? __pfx_kasan_atomics+0x10/0x10 [ 54.375410] ? ktime_get_ts64+0x83/0x230 [ 54.375415] kunit_try_run_case+0x1a2/0x480 [ 54.375419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.375424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 54.375428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 54.375433] ? __kthread_parkme+0x82/0x180 [ 54.375437] ? preempt_count_sub+0x50/0x80 [ 54.375442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.375446] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.375451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 54.375455] kthread+0x334/0x6f0 [ 54.375459] ? trace_preempt_on+0x20/0xc0 [ 54.375463] ? __pfx_kthread+0x10/0x10 [ 54.375468] ? _raw_spin_unlock_irq+0x47/0x80 [ 54.375472] ? calculate_sigpending+0x7b/0xa0 [ 54.375476] ? __pfx_kthread+0x10/0x10 [ 54.375481] ret_from_fork+0x3e/0x80 [ 54.375485] ? __pfx_kthread+0x10/0x10 [ 54.375489] ret_from_fork_asm+0x1a/0x30 [ 54.375495] </TASK> [ 54.375496] [ 54.556126] Allocated by task 308: [ 54.559532] kasan_save_stack+0x45/0x70 [ 54.563373] kasan_save_track+0x18/0x40 [ 54.567211] kasan_save_alloc_info+0x3b/0x50 [ 54.571486] __kasan_kmalloc+0xb7/0xc0 [ 54.575246] __kmalloc_cache_noprof+0x189/0x420 [ 54.579777] kasan_atomics+0x95/0x310 [ 54.583443] kunit_try_run_case+0x1a2/0x480 [ 54.587628] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.593028] kthread+0x334/0x6f0 [ 54.596262] ret_from_fork+0x3e/0x80 [ 54.599849] ret_from_fork_asm+0x1a/0x30 [ 54.603775] [ 54.605275] The buggy address belongs to the object at ffff8881061f7500 [ 54.605275] which belongs to the cache kmalloc-64 of size 64 [ 54.617615] The buggy address is located 0 bytes to the right of [ 54.617615] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 54.630474] [ 54.631973] The buggy address belongs to the physical page: [ 54.637549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 54.645554] flags: 0x200000000000000(node=0|zone=2) [ 54.650433] page_type: f5(slab) [ 54.653581] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 54.661327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.669065] page dumped because: kasan: bad access detected [ 54.674640] [ 54.676138] Memory state around the buggy address: [ 54.680932] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.688158] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.695378] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.702596] ^ [ 54.707387] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.714609] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.721836] ================================================================== [ 52.468093] ================================================================== [ 52.475323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 52.482637] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 52.490030] [ 52.491528] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 52.491536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.491538] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 52.491541] Call Trace: [ 52.491543] <TASK> [ 52.491545] dump_stack_lvl+0x73/0xb0 [ 52.491549] print_report+0xd1/0x650 [ 52.491553] ? __virt_addr_valid+0x1db/0x2d0 [ 52.491557] ? kasan_atomics_helper+0x4a0/0x5450 [ 52.491561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 52.491565] ? kasan_atomics_helper+0x4a0/0x5450 [ 52.491570] kasan_report+0x141/0x180 [ 52.491574] ? kasan_atomics_helper+0x4a0/0x5450 [ 52.491579] kasan_check_range+0x10c/0x1c0 [ 52.491584] __kasan_check_write+0x18/0x20 [ 52.491588] kasan_atomics_helper+0x4a0/0x5450 [ 52.491592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 52.491597] ? __kmalloc_cache_noprof+0x189/0x420 [ 52.491601] ? kasan_atomics+0x152/0x310 [ 52.491605] kasan_atomics+0x1dc/0x310 [ 52.491608] ? __pfx_kasan_atomics+0x10/0x10 [ 52.491612] ? ktime_get_ts64+0x83/0x230 [ 52.491617] kunit_try_run_case+0x1a2/0x480 [ 52.491621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.491626] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 52.491630] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 52.491635] ? __kthread_parkme+0x82/0x180 [ 52.491639] ? preempt_count_sub+0x50/0x80 [ 52.491644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.491649] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.491653] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 52.491657] kthread+0x334/0x6f0 [ 52.491661] ? trace_preempt_on+0x20/0xc0 [ 52.491666] ? __pfx_kthread+0x10/0x10 [ 52.491687] ? _raw_spin_unlock_irq+0x47/0x80 [ 52.491692] ? calculate_sigpending+0x7b/0xa0 [ 52.491696] ? __pfx_kthread+0x10/0x10 [ 52.491701] ret_from_fork+0x3e/0x80 [ 52.491705] ? __pfx_kthread+0x10/0x10 [ 52.491722] ret_from_fork_asm+0x1a/0x30 [ 52.491728] </TASK> [ 52.491729] [ 52.672418] Allocated by task 308: [ 52.675824] kasan_save_stack+0x45/0x70 [ 52.679666] kasan_save_track+0x18/0x40 [ 52.683528] kasan_save_alloc_info+0x3b/0x50 [ 52.687802] __kasan_kmalloc+0xb7/0xc0 [ 52.691555] __kmalloc_cache_noprof+0x189/0x420 [ 52.696088] kasan_atomics+0x95/0x310 [ 52.699753] kunit_try_run_case+0x1a2/0x480 [ 52.703939] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.709345] kthread+0x334/0x6f0 [ 52.712579] ret_from_fork+0x3e/0x80 [ 52.716166] ret_from_fork_asm+0x1a/0x30 [ 52.720091] [ 52.721591] The buggy address belongs to the object at ffff8881061f7500 [ 52.721591] which belongs to the cache kmalloc-64 of size 64 [ 52.733933] The buggy address is located 0 bytes to the right of [ 52.733933] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 52.746801] [ 52.748300] The buggy address belongs to the physical page: [ 52.753875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 52.761881] flags: 0x200000000000000(node=0|zone=2) [ 52.766760] page_type: f5(slab) [ 52.769906] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 52.777646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.785383] page dumped because: kasan: bad access detected [ 52.790958] [ 52.792457] Memory state around the buggy address: [ 52.797250] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.804478] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.811703] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.818948] ^ [ 52.823752] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.830977] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.838198] ================================================================== [ 55.860990] ================================================================== [ 55.868208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 55.875516] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 55.882915] [ 55.884416] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 55.884423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.884426] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 55.884429] Call Trace: [ 55.884431] <TASK> [ 55.884432] dump_stack_lvl+0x73/0xb0 [ 55.884436] print_report+0xd1/0x650 [ 55.884440] ? __virt_addr_valid+0x1db/0x2d0 [ 55.884444] ? kasan_atomics_helper+0x992/0x5450 [ 55.884448] ? kasan_complete_mode_report_info+0x2a/0x200 [ 55.884453] ? kasan_atomics_helper+0x992/0x5450 [ 55.884457] kasan_report+0x141/0x180 [ 55.884461] ? kasan_atomics_helper+0x992/0x5450 [ 55.884466] kasan_check_range+0x10c/0x1c0 [ 55.884471] __kasan_check_write+0x18/0x20 [ 55.884475] kasan_atomics_helper+0x992/0x5450 [ 55.884480] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 55.884484] ? __kmalloc_cache_noprof+0x189/0x420 [ 55.884488] ? kasan_atomics+0x152/0x310 [ 55.884492] kasan_atomics+0x1dc/0x310 [ 55.884496] ? __pfx_kasan_atomics+0x10/0x10 [ 55.884500] ? ktime_get_ts64+0x83/0x230 [ 55.884504] kunit_try_run_case+0x1a2/0x480 [ 55.884509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.884513] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 55.884518] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 55.884523] ? __kthread_parkme+0x82/0x180 [ 55.884527] ? preempt_count_sub+0x50/0x80 [ 55.884532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.884537] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.884541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 55.884545] kthread+0x334/0x6f0 [ 55.884550] ? trace_preempt_on+0x20/0xc0 [ 55.884554] ? __pfx_kthread+0x10/0x10 [ 55.884558] ? _raw_spin_unlock_irq+0x47/0x80 [ 55.884563] ? calculate_sigpending+0x7b/0xa0 [ 55.884567] ? __pfx_kthread+0x10/0x10 [ 55.884571] ret_from_fork+0x3e/0x80 [ 55.884575] ? __pfx_kthread+0x10/0x10 [ 55.884580] ret_from_fork_asm+0x1a/0x30 [ 55.884586] </TASK> [ 55.884587] [ 56.065246] Allocated by task 308: [ 56.068650] kasan_save_stack+0x45/0x70 [ 56.072489] kasan_save_track+0x18/0x40 [ 56.076329] kasan_save_alloc_info+0x3b/0x50 [ 56.080602] __kasan_kmalloc+0xb7/0xc0 [ 56.084355] __kmalloc_cache_noprof+0x189/0x420 [ 56.088887] kasan_atomics+0x95/0x310 [ 56.092553] kunit_try_run_case+0x1a2/0x480 [ 56.096748] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.102155] kthread+0x334/0x6f0 [ 56.105388] ret_from_fork+0x3e/0x80 [ 56.108967] ret_from_fork_asm+0x1a/0x30 [ 56.112899] [ 56.114399] The buggy address belongs to the object at ffff8881061f7500 [ 56.114399] which belongs to the cache kmalloc-64 of size 64 [ 56.126741] The buggy address is located 0 bytes to the right of [ 56.126741] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 56.139603] [ 56.141099] The buggy address belongs to the physical page: [ 56.146691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 56.154719] flags: 0x200000000000000(node=0|zone=2) [ 56.159605] page_type: f5(slab) [ 56.162752] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 56.170497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.178237] page dumped because: kasan: bad access detected [ 56.183810] [ 56.185307] Memory state around the buggy address: [ 56.190099] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.197320] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.204538] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.211757] ^ [ 56.216549] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.223769] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.230988] ================================================================== [ 57.747478] ================================================================== [ 57.754719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 57.762126] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 57.769433] [ 57.770932] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 57.770939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.770942] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 57.770945] Call Trace: [ 57.770947] <TASK> [ 57.770948] dump_stack_lvl+0x73/0xb0 [ 57.770952] print_report+0xd1/0x650 [ 57.770956] ? __virt_addr_valid+0x1db/0x2d0 [ 57.770960] ? kasan_atomics_helper+0x4a84/0x5450 [ 57.770965] ? kasan_complete_mode_report_info+0x2a/0x200 [ 57.770969] ? kasan_atomics_helper+0x4a84/0x5450 [ 57.770973] kasan_report+0x141/0x180 [ 57.770978] ? kasan_atomics_helper+0x4a84/0x5450 [ 57.770983] __asan_report_load4_noabort+0x18/0x20 [ 57.770987] kasan_atomics_helper+0x4a84/0x5450 [ 57.770991] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 57.770995] ? __kmalloc_cache_noprof+0x189/0x420 [ 57.770999] ? kasan_atomics+0x152/0x310 [ 57.771004] kasan_atomics+0x1dc/0x310 [ 57.771007] ? __pfx_kasan_atomics+0x10/0x10 [ 57.771011] ? ktime_get_ts64+0x83/0x230 [ 57.771016] kunit_try_run_case+0x1a2/0x480 [ 57.771020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.771025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 57.771029] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 57.771034] ? __kthread_parkme+0x82/0x180 [ 57.771038] ? preempt_count_sub+0x50/0x80 [ 57.771043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.771048] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.771052] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 57.771056] kthread+0x334/0x6f0 [ 57.771061] ? trace_preempt_on+0x20/0xc0 [ 57.771065] ? __pfx_kthread+0x10/0x10 [ 57.771070] ? _raw_spin_unlock_irq+0x47/0x80 [ 57.771074] ? calculate_sigpending+0x7b/0xa0 [ 57.771078] ? __pfx_kthread+0x10/0x10 [ 57.771083] ret_from_fork+0x3e/0x80 [ 57.771087] ? __pfx_kthread+0x10/0x10 [ 57.771091] ret_from_fork_asm+0x1a/0x30 [ 57.771097] </TASK> [ 57.771099] [ 57.948734] Allocated by task 308: [ 57.952142] kasan_save_stack+0x45/0x70 [ 57.955981] kasan_save_track+0x18/0x40 [ 57.959821] kasan_save_alloc_info+0x3b/0x50 [ 57.964095] __kasan_kmalloc+0xb7/0xc0 [ 57.967854] __kmalloc_cache_noprof+0x189/0x420 [ 57.972387] kasan_atomics+0x95/0x310 [ 57.976051] kunit_try_run_case+0x1a2/0x480 [ 57.980237] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.985637] kthread+0x334/0x6f0 [ 57.988870] ret_from_fork+0x3e/0x80 [ 57.992448] ret_from_fork_asm+0x1a/0x30 [ 57.996375] [ 57.997874] The buggy address belongs to the object at ffff8881061f7500 [ 57.997874] which belongs to the cache kmalloc-64 of size 64 [ 58.010215] The buggy address is located 0 bytes to the right of [ 58.010215] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 58.023077] [ 58.024574] The buggy address belongs to the physical page: [ 58.030149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 58.038155] flags: 0x200000000000000(node=0|zone=2) [ 58.043035] page_type: f5(slab) [ 58.046181] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 58.053930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.061703] page dumped because: kasan: bad access detected [ 58.067300] [ 58.068798] Memory state around the buggy address: [ 58.073591] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.080811] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.088029] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.095250] ^ [ 58.100041] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.107259] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.114478] ================================================================== [ 52.845466] ================================================================== [ 52.852719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 52.860122] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 52.867522] [ 52.869022] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 52.869030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.869032] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 52.869036] Call Trace: [ 52.869038] <TASK> [ 52.869040] dump_stack_lvl+0x73/0xb0 [ 52.869043] print_report+0xd1/0x650 [ 52.869048] ? __virt_addr_valid+0x1db/0x2d0 [ 52.869052] ? kasan_atomics_helper+0x4b3a/0x5450 [ 52.869056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 52.869061] ? kasan_atomics_helper+0x4b3a/0x5450 [ 52.869065] kasan_report+0x141/0x180 [ 52.869069] ? kasan_atomics_helper+0x4b3a/0x5450 [ 52.869075] __asan_report_store4_noabort+0x1b/0x30 [ 52.869079] kasan_atomics_helper+0x4b3a/0x5450 [ 52.869083] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 52.869088] ? __kmalloc_cache_noprof+0x189/0x420 [ 52.869092] ? kasan_atomics+0x152/0x310 [ 52.869096] kasan_atomics+0x1dc/0x310 [ 52.869100] ? __pfx_kasan_atomics+0x10/0x10 [ 52.869104] ? ktime_get_ts64+0x83/0x230 [ 52.869108] kunit_try_run_case+0x1a2/0x480 [ 52.869113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.869118] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 52.869122] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 52.869127] ? __kthread_parkme+0x82/0x180 [ 52.869131] ? preempt_count_sub+0x50/0x80 [ 52.869136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.869141] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.869145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 52.869149] kthread+0x334/0x6f0 [ 52.869154] ? trace_preempt_on+0x20/0xc0 [ 52.869158] ? __pfx_kthread+0x10/0x10 [ 52.869163] ? _raw_spin_unlock_irq+0x47/0x80 [ 52.869167] ? calculate_sigpending+0x7b/0xa0 [ 52.869171] ? __pfx_kthread+0x10/0x10 [ 52.869176] ret_from_fork+0x3e/0x80 [ 52.869180] ? __pfx_kthread+0x10/0x10 [ 52.869184] ret_from_fork_asm+0x1a/0x30 [ 52.869190] </TASK> [ 52.869192] [ 53.046862] Allocated by task 308: [ 53.050267] kasan_save_stack+0x45/0x70 [ 53.054108] kasan_save_track+0x18/0x40 [ 53.057946] kasan_save_alloc_info+0x3b/0x50 [ 53.062219] __kasan_kmalloc+0xb7/0xc0 [ 53.065973] __kmalloc_cache_noprof+0x189/0x420 [ 53.070512] kasan_atomics+0x95/0x310 [ 53.074179] kunit_try_run_case+0x1a2/0x480 [ 53.078375] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.083781] kthread+0x334/0x6f0 [ 53.087015] ret_from_fork+0x3e/0x80 [ 53.090602] ret_from_fork_asm+0x1a/0x30 [ 53.094536] [ 53.096034] The buggy address belongs to the object at ffff8881061f7500 [ 53.096034] which belongs to the cache kmalloc-64 of size 64 [ 53.108366] The buggy address is located 0 bytes to the right of [ 53.108366] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 53.121227] [ 53.122740] The buggy address belongs to the physical page: [ 53.128318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 53.136324] flags: 0x200000000000000(node=0|zone=2) [ 53.141204] page_type: f5(slab) [ 53.144349] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 53.152088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.159828] page dumped because: kasan: bad access detected [ 53.165400] [ 53.166900] Memory state around the buggy address: [ 53.171719] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.178945] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.186164] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.193384] ^ [ 53.198175] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.205394] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.212615] ================================================================== [ 73.244500] ================================================================== [ 73.251744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 73.259141] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 73.266534] [ 73.268036] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 73.268044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.268046] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 73.268049] Call Trace: [ 73.268051] <TASK> [ 73.268053] dump_stack_lvl+0x73/0xb0 [ 73.268057] print_report+0xd1/0x650 [ 73.268061] ? __virt_addr_valid+0x1db/0x2d0 [ 73.268065] ? kasan_atomics_helper+0x20c8/0x5450 [ 73.268069] ? kasan_complete_mode_report_info+0x2a/0x200 [ 73.268073] ? kasan_atomics_helper+0x20c8/0x5450 [ 73.268078] kasan_report+0x141/0x180 [ 73.268082] ? kasan_atomics_helper+0x20c8/0x5450 [ 73.268087] kasan_check_range+0x10c/0x1c0 [ 73.268092] __kasan_check_write+0x18/0x20 [ 73.268096] kasan_atomics_helper+0x20c8/0x5450 [ 73.268100] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 73.268105] ? __kmalloc_cache_noprof+0x189/0x420 [ 73.268109] ? kasan_atomics+0x152/0x310 [ 73.268113] kasan_atomics+0x1dc/0x310 [ 73.268116] ? __pfx_kasan_atomics+0x10/0x10 [ 73.268120] ? ktime_get_ts64+0x83/0x230 [ 73.268125] kunit_try_run_case+0x1a2/0x480 [ 73.268130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.268134] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 73.268139] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 73.268144] ? __kthread_parkme+0x82/0x180 [ 73.268148] ? preempt_count_sub+0x50/0x80 [ 73.268153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.268157] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.268162] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 73.268166] kthread+0x334/0x6f0 [ 73.268170] ? trace_preempt_on+0x20/0xc0 [ 73.268175] ? __pfx_kthread+0x10/0x10 [ 73.268179] ? _raw_spin_unlock_irq+0x47/0x80 [ 73.268183] ? calculate_sigpending+0x7b/0xa0 [ 73.268187] ? __pfx_kthread+0x10/0x10 [ 73.268192] ret_from_fork+0x3e/0x80 [ 73.268196] ? __pfx_kthread+0x10/0x10 [ 73.268201] ret_from_fork_asm+0x1a/0x30 [ 73.268207] </TASK> [ 73.268208] [ 73.449203] Allocated by task 308: [ 73.452608] kasan_save_stack+0x45/0x70 [ 73.456454] kasan_save_track+0x18/0x40 [ 73.460295] kasan_save_alloc_info+0x3b/0x50 [ 73.464568] __kasan_kmalloc+0xb7/0xc0 [ 73.468319] __kmalloc_cache_noprof+0x189/0x420 [ 73.472851] kasan_atomics+0x95/0x310 [ 73.476519] kunit_try_run_case+0x1a2/0x480 [ 73.480734] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.486138] kthread+0x334/0x6f0 [ 73.489378] ret_from_fork+0x3e/0x80 [ 73.492958] ret_from_fork_asm+0x1a/0x30 [ 73.496883] [ 73.498384] The buggy address belongs to the object at ffff8881061f7500 [ 73.498384] which belongs to the cache kmalloc-64 of size 64 [ 73.510746] The buggy address is located 0 bytes to the right of [ 73.510746] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 73.523612] [ 73.525109] The buggy address belongs to the physical page: [ 73.530718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 73.538739] flags: 0x200000000000000(node=0|zone=2) [ 73.543621] page_type: f5(slab) [ 73.546769] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 73.554516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.562263] page dumped because: kasan: bad access detected [ 73.567834] [ 73.569332] Memory state around the buggy address: [ 73.574125] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.581344] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.588565] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.595785] ^ [ 73.600574] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.607795] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.615015] ================================================================== [ 51.342423] ================================================================== [ 51.349653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 51.357052] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 51.364445] [ 51.365946] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 51.365954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.365956] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 51.365960] Call Trace: [ 51.365962] <TASK> [ 51.365963] dump_stack_lvl+0x73/0xb0 [ 51.365967] print_report+0xd1/0x650 [ 51.365971] ? __virt_addr_valid+0x1db/0x2d0 [ 51.365975] ? kasan_atomics_helper+0x4b6e/0x5450 [ 51.365980] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.365984] ? kasan_atomics_helper+0x4b6e/0x5450 [ 51.365988] kasan_report+0x141/0x180 [ 51.365993] ? kasan_atomics_helper+0x4b6e/0x5450 [ 51.365998] __asan_report_store4_noabort+0x1b/0x30 [ 51.366002] kasan_atomics_helper+0x4b6e/0x5450 [ 51.366006] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 51.366011] ? __kmalloc_cache_noprof+0x189/0x420 [ 51.366015] ? kasan_atomics+0x152/0x310 [ 51.366019] kasan_atomics+0x1dc/0x310 [ 51.366022] ? __pfx_kasan_atomics+0x10/0x10 [ 51.366026] ? ktime_get_ts64+0x83/0x230 [ 51.366031] kunit_try_run_case+0x1a2/0x480 [ 51.366036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.366040] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 51.366045] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 51.366050] ? __kthread_parkme+0x82/0x180 [ 51.366054] ? preempt_count_sub+0x50/0x80 [ 51.366059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.366063] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.366068] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.366072] kthread+0x334/0x6f0 [ 51.366076] ? trace_preempt_on+0x20/0xc0 [ 51.366081] ? __pfx_kthread+0x10/0x10 [ 51.366085] ? _raw_spin_unlock_irq+0x47/0x80 [ 51.366089] ? calculate_sigpending+0x7b/0xa0 [ 51.366094] ? __pfx_kthread+0x10/0x10 [ 51.366098] ret_from_fork+0x3e/0x80 [ 51.366102] ? __pfx_kthread+0x10/0x10 [ 51.366107] ret_from_fork_asm+0x1a/0x30 [ 51.366113] </TASK> [ 51.366115] [ 51.543882] Allocated by task 308: [ 51.547288] kasan_save_stack+0x45/0x70 [ 51.551134] kasan_save_track+0x18/0x40 [ 51.554975] kasan_save_alloc_info+0x3b/0x50 [ 51.559245] __kasan_kmalloc+0xb7/0xc0 [ 51.563000] __kmalloc_cache_noprof+0x189/0x420 [ 51.567531] kasan_atomics+0x95/0x310 [ 51.571196] kunit_try_run_case+0x1a2/0x480 [ 51.575384] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.580790] kthread+0x334/0x6f0 [ 51.584024] ret_from_fork+0x3e/0x80 [ 51.587611] ret_from_fork_asm+0x1a/0x30 [ 51.591536] [ 51.593035] The buggy address belongs to the object at ffff8881061f7500 [ 51.593035] which belongs to the cache kmalloc-64 of size 64 [ 51.605367] The buggy address is located 0 bytes to the right of [ 51.605367] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 51.618230] [ 51.619733] The buggy address belongs to the physical page: [ 51.625310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 51.633316] flags: 0x200000000000000(node=0|zone=2) [ 51.638195] page_type: f5(slab) [ 51.641342] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 51.649089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.656828] page dumped because: kasan: bad access detected [ 51.662400] [ 51.663901] Memory state around the buggy address: [ 51.668718] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.675948] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.683173] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.690394] ^ [ 51.695186] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.702412] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.709633] ================================================================== [ 73.622258] ================================================================== [ 73.629485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 73.636879] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 73.644183] [ 73.645718] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 73.645725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.645728] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 73.645731] Call Trace: [ 73.645733] <TASK> [ 73.645735] dump_stack_lvl+0x73/0xb0 [ 73.645738] print_report+0xd1/0x650 [ 73.645743] ? __virt_addr_valid+0x1db/0x2d0 [ 73.645746] ? kasan_atomics_helper+0x4fb2/0x5450 [ 73.645751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 73.645755] ? kasan_atomics_helper+0x4fb2/0x5450 [ 73.645759] kasan_report+0x141/0x180 [ 73.645764] ? kasan_atomics_helper+0x4fb2/0x5450 [ 73.645769] __asan_report_load8_noabort+0x18/0x20 [ 73.645773] kasan_atomics_helper+0x4fb2/0x5450 [ 73.645777] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 73.645782] ? __kmalloc_cache_noprof+0x189/0x420 [ 73.645786] ? kasan_atomics+0x152/0x310 [ 73.645790] kasan_atomics+0x1dc/0x310 [ 73.645793] ? __pfx_kasan_atomics+0x10/0x10 [ 73.645797] ? ktime_get_ts64+0x83/0x230 [ 73.645802] kunit_try_run_case+0x1a2/0x480 [ 73.645807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.645811] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 73.645816] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 73.645821] ? __kthread_parkme+0x82/0x180 [ 73.645825] ? preempt_count_sub+0x50/0x80 [ 73.645830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.645834] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.645839] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 73.645843] kthread+0x334/0x6f0 [ 73.645847] ? trace_preempt_on+0x20/0xc0 [ 73.645852] ? __pfx_kthread+0x10/0x10 [ 73.645856] ? _raw_spin_unlock_irq+0x47/0x80 [ 73.645861] ? calculate_sigpending+0x7b/0xa0 [ 73.645865] ? __pfx_kthread+0x10/0x10 [ 73.645869] ret_from_fork+0x3e/0x80 [ 73.645873] ? __pfx_kthread+0x10/0x10 [ 73.645878] ret_from_fork_asm+0x1a/0x30 [ 73.645884] </TASK> [ 73.645886] [ 73.823462] Allocated by task 308: [ 73.826869] kasan_save_stack+0x45/0x70 [ 73.830709] kasan_save_track+0x18/0x40 [ 73.834573] kasan_save_alloc_info+0x3b/0x50 [ 73.838846] __kasan_kmalloc+0xb7/0xc0 [ 73.842597] __kmalloc_cache_noprof+0x189/0x420 [ 73.847132] kasan_atomics+0x95/0x310 [ 73.850797] kunit_try_run_case+0x1a2/0x480 [ 73.854984] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.860391] kthread+0x334/0x6f0 [ 73.863622] ret_from_fork+0x3e/0x80 [ 73.867203] ret_from_fork_asm+0x1a/0x30 [ 73.871136] [ 73.872636] The buggy address belongs to the object at ffff8881061f7500 [ 73.872636] which belongs to the cache kmalloc-64 of size 64 [ 73.884978] The buggy address is located 0 bytes to the right of [ 73.884978] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 73.897847] [ 73.899345] The buggy address belongs to the physical page: [ 73.904917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 73.912917] flags: 0x200000000000000(node=0|zone=2) [ 73.917794] page_type: f5(slab) [ 73.920944] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 73.928707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.936472] page dumped because: kasan: bad access detected [ 73.942044] [ 73.943544] Memory state around the buggy address: [ 73.948336] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.955565] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.962792] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.970018] ^ [ 73.974810] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.982031] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.989257] ================================================================== [ 56.615566] ================================================================== [ 56.622799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 56.630112] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 56.637504] [ 56.639005] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 56.639012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.639015] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 56.639018] Call Trace: [ 56.639020] <TASK> [ 56.639022] dump_stack_lvl+0x73/0xb0 [ 56.639025] print_report+0xd1/0x650 [ 56.639030] ? __virt_addr_valid+0x1db/0x2d0 [ 56.639033] ? kasan_atomics_helper+0xac7/0x5450 [ 56.639037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 56.639042] ? kasan_atomics_helper+0xac7/0x5450 [ 56.639046] kasan_report+0x141/0x180 [ 56.639051] ? kasan_atomics_helper+0xac7/0x5450 [ 56.639056] kasan_check_range+0x10c/0x1c0 [ 56.639061] __kasan_check_write+0x18/0x20 [ 56.639064] kasan_atomics_helper+0xac7/0x5450 [ 56.639069] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 56.639073] ? __kmalloc_cache_noprof+0x189/0x420 [ 56.639077] ? kasan_atomics+0x152/0x310 [ 56.639081] kasan_atomics+0x1dc/0x310 [ 56.639084] ? __pfx_kasan_atomics+0x10/0x10 [ 56.639088] ? ktime_get_ts64+0x83/0x230 [ 56.639093] kunit_try_run_case+0x1a2/0x480 [ 56.639098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.639102] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 56.639106] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 56.639111] ? __kthread_parkme+0x82/0x180 [ 56.639115] ? preempt_count_sub+0x50/0x80 [ 56.639120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.639125] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.639129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 56.639133] kthread+0x334/0x6f0 [ 56.639137] ? trace_preempt_on+0x20/0xc0 [ 56.639142] ? __pfx_kthread+0x10/0x10 [ 56.639146] ? _raw_spin_unlock_irq+0x47/0x80 [ 56.639150] ? calculate_sigpending+0x7b/0xa0 [ 56.639154] ? __pfx_kthread+0x10/0x10 [ 56.639159] ret_from_fork+0x3e/0x80 [ 56.639163] ? __pfx_kthread+0x10/0x10 [ 56.639167] ret_from_fork_asm+0x1a/0x30 [ 56.639173] </TASK> [ 56.639175] [ 56.819912] Allocated by task 308: [ 56.823317] kasan_save_stack+0x45/0x70 [ 56.827157] kasan_save_track+0x18/0x40 [ 56.830996] kasan_save_alloc_info+0x3b/0x50 [ 56.835268] __kasan_kmalloc+0xb7/0xc0 [ 56.839021] __kmalloc_cache_noprof+0x189/0x420 [ 56.843552] kasan_atomics+0x95/0x310 [ 56.847220] kunit_try_run_case+0x1a2/0x480 [ 56.851406] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.856804] kthread+0x334/0x6f0 [ 56.860036] ret_from_fork+0x3e/0x80 [ 56.863615] ret_from_fork_asm+0x1a/0x30 [ 56.867542] [ 56.869042] The buggy address belongs to the object at ffff8881061f7500 [ 56.869042] which belongs to the cache kmalloc-64 of size 64 [ 56.881381] The buggy address is located 0 bytes to the right of [ 56.881381] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 56.894244] [ 56.895741] The buggy address belongs to the physical page: [ 56.901315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 56.909322] flags: 0x200000000000000(node=0|zone=2) [ 56.914202] page_type: f5(slab) [ 56.917347] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 56.925086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.932824] page dumped because: kasan: bad access detected [ 56.938399] [ 56.939898] Memory state around the buggy address: [ 56.944706] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.951943] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.959162] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.966381] ^ [ 56.971174] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.978391] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.985611] ================================================================== [ 60.382472] ================================================================== [ 60.389716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 60.397122] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 60.404521] [ 60.406024] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 60.406031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.406033] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 60.406037] Call Trace: [ 60.406039] <TASK> [ 60.406040] dump_stack_lvl+0x73/0xb0 [ 60.406044] print_report+0xd1/0x650 [ 60.406048] ? __virt_addr_valid+0x1db/0x2d0 [ 60.406052] ? kasan_atomics_helper+0x1079/0x5450 [ 60.406056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 60.406061] ? kasan_atomics_helper+0x1079/0x5450 [ 60.406065] kasan_report+0x141/0x180 [ 60.406069] ? kasan_atomics_helper+0x1079/0x5450 [ 60.406075] kasan_check_range+0x10c/0x1c0 [ 60.406079] __kasan_check_write+0x18/0x20 [ 60.406083] kasan_atomics_helper+0x1079/0x5450 [ 60.406087] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 60.406092] ? __kmalloc_cache_noprof+0x189/0x420 [ 60.406096] ? kasan_atomics+0x152/0x310 [ 60.406100] kasan_atomics+0x1dc/0x310 [ 60.406104] ? __pfx_kasan_atomics+0x10/0x10 [ 60.406107] ? ktime_get_ts64+0x83/0x230 [ 60.406112] kunit_try_run_case+0x1a2/0x480 [ 60.406117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.406121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 60.406126] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 60.406131] ? __kthread_parkme+0x82/0x180 [ 60.406135] ? preempt_count_sub+0x50/0x80 [ 60.406139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.406144] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.406148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 60.406153] kthread+0x334/0x6f0 [ 60.406157] ? trace_preempt_on+0x20/0xc0 [ 60.406161] ? __pfx_kthread+0x10/0x10 [ 60.406166] ? _raw_spin_unlock_irq+0x47/0x80 [ 60.406170] ? calculate_sigpending+0x7b/0xa0 [ 60.406174] ? __pfx_kthread+0x10/0x10 [ 60.406179] ret_from_fork+0x3e/0x80 [ 60.406183] ? __pfx_kthread+0x10/0x10 [ 60.406187] ret_from_fork_asm+0x1a/0x30 [ 60.406193] </TASK> [ 60.406195] [ 60.587223] Allocated by task 308: [ 60.590632] kasan_save_stack+0x45/0x70 [ 60.594478] kasan_save_track+0x18/0x40 [ 60.598316] kasan_save_alloc_info+0x3b/0x50 [ 60.602589] __kasan_kmalloc+0xb7/0xc0 [ 60.606343] __kmalloc_cache_noprof+0x189/0x420 [ 60.610875] kasan_atomics+0x95/0x310 [ 60.614541] kunit_try_run_case+0x1a2/0x480 [ 60.618734] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.624133] kthread+0x334/0x6f0 [ 60.627368] ret_from_fork+0x3e/0x80 [ 60.630955] ret_from_fork_asm+0x1a/0x30 [ 60.634887] [ 60.636388] The buggy address belongs to the object at ffff8881061f7500 [ 60.636388] which belongs to the cache kmalloc-64 of size 64 [ 60.648740] The buggy address is located 0 bytes to the right of [ 60.648740] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 60.661608] [ 60.663105] The buggy address belongs to the physical page: [ 60.668707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 60.676741] flags: 0x200000000000000(node=0|zone=2) [ 60.681618] page_type: f5(slab) [ 60.684763] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 60.692502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.700241] page dumped because: kasan: bad access detected [ 60.705813] [ 60.707314] Memory state around the buggy address: [ 60.712104] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.719324] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.726543] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.733762] ^ [ 60.738556] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.745782] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.753003] ================================================================== [ 50.968124] ================================================================== [ 50.975375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 50.982776] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 50.990088] [ 50.991590] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 50.991598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.991600] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 50.991603] Call Trace: [ 50.991605] <TASK> [ 50.991607] dump_stack_lvl+0x73/0xb0 [ 50.991610] print_report+0xd1/0x650 [ 50.991615] ? __virt_addr_valid+0x1db/0x2d0 [ 50.991619] ? kasan_atomics_helper+0x4b88/0x5450 [ 50.991623] ? kasan_complete_mode_report_info+0x2a/0x200 [ 50.991627] ? kasan_atomics_helper+0x4b88/0x5450 [ 50.991631] kasan_report+0x141/0x180 [ 50.991636] ? kasan_atomics_helper+0x4b88/0x5450 [ 50.991641] __asan_report_load4_noabort+0x18/0x20 [ 50.991645] kasan_atomics_helper+0x4b88/0x5450 [ 50.991649] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 50.991654] ? __kmalloc_cache_noprof+0x189/0x420 [ 50.991657] ? kasan_atomics+0x152/0x310 [ 50.991662] kasan_atomics+0x1dc/0x310 [ 50.991665] ? __pfx_kasan_atomics+0x10/0x10 [ 50.991669] ? ktime_get_ts64+0x83/0x230 [ 50.991691] kunit_try_run_case+0x1a2/0x480 [ 50.991695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.991700] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 50.991705] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 50.991722] ? __kthread_parkme+0x82/0x180 [ 50.991726] ? preempt_count_sub+0x50/0x80 [ 50.991731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.991736] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.991740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 50.991745] kthread+0x334/0x6f0 [ 50.991749] ? trace_preempt_on+0x20/0xc0 [ 50.991753] ? __pfx_kthread+0x10/0x10 [ 50.991758] ? _raw_spin_unlock_irq+0x47/0x80 [ 50.991762] ? calculate_sigpending+0x7b/0xa0 [ 50.991766] ? __pfx_kthread+0x10/0x10 [ 50.991771] ret_from_fork+0x3e/0x80 [ 50.991775] ? __pfx_kthread+0x10/0x10 [ 50.991779] ret_from_fork_asm+0x1a/0x30 [ 50.991785] </TASK> [ 50.991787] [ 51.169412] Allocated by task 308: [ 51.172819] kasan_save_stack+0x45/0x70 [ 51.176666] kasan_save_track+0x18/0x40 [ 51.180531] kasan_save_alloc_info+0x3b/0x50 [ 51.184803] __kasan_kmalloc+0xb7/0xc0 [ 51.188554] __kmalloc_cache_noprof+0x189/0x420 [ 51.193086] kasan_atomics+0x95/0x310 [ 51.196753] kunit_try_run_case+0x1a2/0x480 [ 51.200939] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.206339] kthread+0x334/0x6f0 [ 51.209570] ret_from_fork+0x3e/0x80 [ 51.213149] ret_from_fork_asm+0x1a/0x30 [ 51.217077] [ 51.218574] The buggy address belongs to the object at ffff8881061f7500 [ 51.218574] which belongs to the cache kmalloc-64 of size 64 [ 51.230916] The buggy address is located 0 bytes to the right of [ 51.230916] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 51.243779] [ 51.245277] The buggy address belongs to the physical page: [ 51.250847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 51.258848] flags: 0x200000000000000(node=0|zone=2) [ 51.263741] page_type: f5(slab) [ 51.266892] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 51.274638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.282386] page dumped because: kasan: bad access detected [ 51.287956] [ 51.289456] Memory state around the buggy address: [ 51.294250] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.301470] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.308704] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.315949] ^ [ 51.320743] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.327961] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.335181] ================================================================== [ 50.593723] ================================================================== [ 50.600999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 50.608391] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 50.615786] [ 50.617285] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 50.617293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.617295] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 50.617299] Call Trace: [ 50.617300] <TASK> [ 50.617302] dump_stack_lvl+0x73/0xb0 [ 50.617306] print_report+0xd1/0x650 [ 50.617311] ? __virt_addr_valid+0x1db/0x2d0 [ 50.617315] ? kasan_atomics_helper+0x4ba2/0x5450 [ 50.617319] ? kasan_complete_mode_report_info+0x2a/0x200 [ 50.617323] ? kasan_atomics_helper+0x4ba2/0x5450 [ 50.617327] kasan_report+0x141/0x180 [ 50.617332] ? kasan_atomics_helper+0x4ba2/0x5450 [ 50.617337] __asan_report_store4_noabort+0x1b/0x30 [ 50.617341] kasan_atomics_helper+0x4ba2/0x5450 [ 50.617345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 50.617349] ? __kmalloc_cache_noprof+0x189/0x420 [ 50.617353] ? kasan_atomics+0x152/0x310 [ 50.617358] kasan_atomics+0x1dc/0x310 [ 50.617361] ? __pfx_kasan_atomics+0x10/0x10 [ 50.617365] ? ktime_get_ts64+0x83/0x230 [ 50.617370] kunit_try_run_case+0x1a2/0x480 [ 50.617374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.617378] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 50.617383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 50.617388] ? __kthread_parkme+0x82/0x180 [ 50.617392] ? preempt_count_sub+0x50/0x80 [ 50.617397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.617401] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.617406] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 50.617410] kthread+0x334/0x6f0 [ 50.617414] ? trace_preempt_on+0x20/0xc0 [ 50.617419] ? __pfx_kthread+0x10/0x10 [ 50.617423] ? _raw_spin_unlock_irq+0x47/0x80 [ 50.617427] ? calculate_sigpending+0x7b/0xa0 [ 50.617432] ? __pfx_kthread+0x10/0x10 [ 50.617436] ret_from_fork+0x3e/0x80 [ 50.617440] ? __pfx_kthread+0x10/0x10 [ 50.617445] ret_from_fork_asm+0x1a/0x30 [ 50.617451] </TASK> [ 50.617452] [ 50.795117] Allocated by task 308: [ 50.798522] kasan_save_stack+0x45/0x70 [ 50.802361] kasan_save_track+0x18/0x40 [ 50.806199] kasan_save_alloc_info+0x3b/0x50 [ 50.810474] __kasan_kmalloc+0xb7/0xc0 [ 50.814232] __kmalloc_cache_noprof+0x189/0x420 [ 50.818766] kasan_atomics+0x95/0x310 [ 50.822432] kunit_try_run_case+0x1a2/0x480 [ 50.826625] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.832025] kthread+0x334/0x6f0 [ 50.835258] ret_from_fork+0x3e/0x80 [ 50.838835] ret_from_fork_asm+0x1a/0x30 [ 50.842761] [ 50.844261] The buggy address belongs to the object at ffff8881061f7500 [ 50.844261] which belongs to the cache kmalloc-64 of size 64 [ 50.856604] The buggy address is located 0 bytes to the right of [ 50.856604] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 50.869473] [ 50.870973] The buggy address belongs to the physical page: [ 50.876545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 50.884553] flags: 0x200000000000000(node=0|zone=2) [ 50.889440] page_type: f5(slab) [ 50.892587] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 50.900332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.908072] page dumped because: kasan: bad access detected [ 50.913644] [ 50.915143] Memory state around the buggy address: [ 50.919937] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.927165] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.934392] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.941617] ^ [ 50.946410] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.953631] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.960848] ================================================================== [ 53.219864] ================================================================== [ 53.227095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 53.234399] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 53.241792] [ 53.243293] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 53.243300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.243302] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 53.243306] Call Trace: [ 53.243308] <TASK> [ 53.243309] dump_stack_lvl+0x73/0xb0 [ 53.243313] print_report+0xd1/0x650 [ 53.243318] ? __virt_addr_valid+0x1db/0x2d0 [ 53.243321] ? kasan_atomics_helper+0x565/0x5450 [ 53.243325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 53.243330] ? kasan_atomics_helper+0x565/0x5450 [ 53.243334] kasan_report+0x141/0x180 [ 53.243338] ? kasan_atomics_helper+0x565/0x5450 [ 53.243344] kasan_check_range+0x10c/0x1c0 [ 53.243348] __kasan_check_write+0x18/0x20 [ 53.243352] kasan_atomics_helper+0x565/0x5450 [ 53.243357] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 53.243361] ? __kmalloc_cache_noprof+0x189/0x420 [ 53.243365] ? kasan_atomics+0x152/0x310 [ 53.243369] kasan_atomics+0x1dc/0x310 [ 53.243372] ? __pfx_kasan_atomics+0x10/0x10 [ 53.243376] ? ktime_get_ts64+0x83/0x230 [ 53.243381] kunit_try_run_case+0x1a2/0x480 [ 53.243386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.243390] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 53.243395] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 53.243400] ? __kthread_parkme+0x82/0x180 [ 53.243404] ? preempt_count_sub+0x50/0x80 [ 53.243409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.243413] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.243417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 53.243421] kthread+0x334/0x6f0 [ 53.243426] ? trace_preempt_on+0x20/0xc0 [ 53.243430] ? __pfx_kthread+0x10/0x10 [ 53.243435] ? _raw_spin_unlock_irq+0x47/0x80 [ 53.243439] ? calculate_sigpending+0x7b/0xa0 [ 53.243443] ? __pfx_kthread+0x10/0x10 [ 53.243447] ret_from_fork+0x3e/0x80 [ 53.243452] ? __pfx_kthread+0x10/0x10 [ 53.243456] ret_from_fork_asm+0x1a/0x30 [ 53.243462] </TASK> [ 53.243463] [ 53.424217] Allocated by task 308: [ 53.427623] kasan_save_stack+0x45/0x70 [ 53.431464] kasan_save_track+0x18/0x40 [ 53.435311] kasan_save_alloc_info+0x3b/0x50 [ 53.439583] __kasan_kmalloc+0xb7/0xc0 [ 53.443336] __kmalloc_cache_noprof+0x189/0x420 [ 53.447868] kasan_atomics+0x95/0x310 [ 53.451534] kunit_try_run_case+0x1a2/0x480 [ 53.455738] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.461146] kthread+0x334/0x6f0 [ 53.464378] ret_from_fork+0x3e/0x80 [ 53.467955] ret_from_fork_asm+0x1a/0x30 [ 53.471881] [ 53.473381] The buggy address belongs to the object at ffff8881061f7500 [ 53.473381] which belongs to the cache kmalloc-64 of size 64 [ 53.485742] The buggy address is located 0 bytes to the right of [ 53.485742] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 53.498610] [ 53.500108] The buggy address belongs to the physical page: [ 53.505705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 53.513745] flags: 0x200000000000000(node=0|zone=2) [ 53.518630] page_type: f5(slab) [ 53.521774] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 53.529513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.537252] page dumped because: kasan: bad access detected [ 53.542824] [ 53.544323] Memory state around the buggy address: [ 53.549115] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.556335] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.563553] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.570772] ^ [ 53.575568] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.582794] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.590012] ================================================================== [ 61.886452] ================================================================== [ 61.893707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 61.901126] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 61.908519] [ 61.910017] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 61.910024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.910026] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 61.910030] Call Trace: [ 61.910032] <TASK> [ 61.910033] dump_stack_lvl+0x73/0xb0 [ 61.910037] print_report+0xd1/0x650 [ 61.910041] ? __virt_addr_valid+0x1db/0x2d0 [ 61.910045] ? kasan_atomics_helper+0x1217/0x5450 [ 61.910049] ? kasan_complete_mode_report_info+0x2a/0x200 [ 61.910053] ? kasan_atomics_helper+0x1217/0x5450 [ 61.910058] kasan_report+0x141/0x180 [ 61.910062] ? kasan_atomics_helper+0x1217/0x5450 [ 61.910067] kasan_check_range+0x10c/0x1c0 [ 61.910072] __kasan_check_write+0x18/0x20 [ 61.910076] kasan_atomics_helper+0x1217/0x5450 [ 61.910080] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 61.910085] ? __kmalloc_cache_noprof+0x189/0x420 [ 61.910089] ? kasan_atomics+0x152/0x310 [ 61.910093] kasan_atomics+0x1dc/0x310 [ 61.910096] ? __pfx_kasan_atomics+0x10/0x10 [ 61.910100] ? ktime_get_ts64+0x83/0x230 [ 61.910105] kunit_try_run_case+0x1a2/0x480 [ 61.910109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.910114] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 61.910118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 61.910123] ? __kthread_parkme+0x82/0x180 [ 61.910127] ? preempt_count_sub+0x50/0x80 [ 61.910132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.910137] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.910141] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 61.910145] kthread+0x334/0x6f0 [ 61.910149] ? trace_preempt_on+0x20/0xc0 [ 61.910154] ? __pfx_kthread+0x10/0x10 [ 61.910158] ? _raw_spin_unlock_irq+0x47/0x80 [ 61.910163] ? calculate_sigpending+0x7b/0xa0 [ 61.910167] ? __pfx_kthread+0x10/0x10 [ 61.910171] ret_from_fork+0x3e/0x80 [ 61.910176] ? __pfx_kthread+0x10/0x10 [ 61.910180] ret_from_fork_asm+0x1a/0x30 [ 61.910186] </TASK> [ 61.910188] [ 62.091193] Allocated by task 308: [ 62.094600] kasan_save_stack+0x45/0x70 [ 62.098439] kasan_save_track+0x18/0x40 [ 62.102277] kasan_save_alloc_info+0x3b/0x50 [ 62.106550] __kasan_kmalloc+0xb7/0xc0 [ 62.110304] __kmalloc_cache_noprof+0x189/0x420 [ 62.114836] kasan_atomics+0x95/0x310 [ 62.118500] kunit_try_run_case+0x1a2/0x480 [ 62.122708] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.128131] kthread+0x334/0x6f0 [ 62.131371] ret_from_fork+0x3e/0x80 [ 62.134951] ret_from_fork_asm+0x1a/0x30 [ 62.138875] [ 62.140376] The buggy address belongs to the object at ffff8881061f7500 [ 62.140376] which belongs to the cache kmalloc-64 of size 64 [ 62.152735] The buggy address is located 0 bytes to the right of [ 62.152735] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 62.165595] [ 62.167093] The buggy address belongs to the physical page: [ 62.172666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 62.180708] flags: 0x200000000000000(node=0|zone=2) [ 62.185612] page_type: f5(slab) [ 62.188760] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 62.196507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.204246] page dumped because: kasan: bad access detected [ 62.209817] [ 62.211317] Memory state around the buggy address: [ 62.216110] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.223331] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.230555] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.237775] ^ [ 62.242568] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.249786] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.257007] ================================================================== [ 61.134462] ================================================================== [ 61.141706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 61.149120] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 61.156520] [ 61.158021] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 61.158029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.158031] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 61.158034] Call Trace: [ 61.158036] <TASK> [ 61.158038] dump_stack_lvl+0x73/0xb0 [ 61.158042] print_report+0xd1/0x650 [ 61.158046] ? __virt_addr_valid+0x1db/0x2d0 [ 61.158050] ? kasan_atomics_helper+0x1148/0x5450 [ 61.158054] ? kasan_complete_mode_report_info+0x2a/0x200 [ 61.158058] ? kasan_atomics_helper+0x1148/0x5450 [ 61.158063] kasan_report+0x141/0x180 [ 61.158067] ? kasan_atomics_helper+0x1148/0x5450 [ 61.158072] kasan_check_range+0x10c/0x1c0 [ 61.158077] __kasan_check_write+0x18/0x20 [ 61.158081] kasan_atomics_helper+0x1148/0x5450 [ 61.158086] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 61.158090] ? __kmalloc_cache_noprof+0x189/0x420 [ 61.158094] ? kasan_atomics+0x152/0x310 [ 61.158098] kasan_atomics+0x1dc/0x310 [ 61.158102] ? __pfx_kasan_atomics+0x10/0x10 [ 61.158105] ? ktime_get_ts64+0x83/0x230 [ 61.158110] kunit_try_run_case+0x1a2/0x480 [ 61.158115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.158119] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 61.158124] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 61.158129] ? __kthread_parkme+0x82/0x180 [ 61.158133] ? preempt_count_sub+0x50/0x80 [ 61.158138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.158142] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.158147] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 61.158151] kthread+0x334/0x6f0 [ 61.158155] ? trace_preempt_on+0x20/0xc0 [ 61.158160] ? __pfx_kthread+0x10/0x10 [ 61.158164] ? _raw_spin_unlock_irq+0x47/0x80 [ 61.158168] ? calculate_sigpending+0x7b/0xa0 [ 61.158172] ? __pfx_kthread+0x10/0x10 [ 61.158177] ret_from_fork+0x3e/0x80 [ 61.158181] ? __pfx_kthread+0x10/0x10 [ 61.158186] ret_from_fork_asm+0x1a/0x30 [ 61.158191] </TASK> [ 61.158193] [ 61.339223] Allocated by task 308: [ 61.342628] kasan_save_stack+0x45/0x70 [ 61.346467] kasan_save_track+0x18/0x40 [ 61.350308] kasan_save_alloc_info+0x3b/0x50 [ 61.354586] __kasan_kmalloc+0xb7/0xc0 [ 61.358341] __kmalloc_cache_noprof+0x189/0x420 [ 61.362882] kasan_atomics+0x95/0x310 [ 61.366548] kunit_try_run_case+0x1a2/0x480 [ 61.370742] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.376139] kthread+0x334/0x6f0 [ 61.379373] ret_from_fork+0x3e/0x80 [ 61.382952] ret_from_fork_asm+0x1a/0x30 [ 61.386878] [ 61.388377] The buggy address belongs to the object at ffff8881061f7500 [ 61.388377] which belongs to the cache kmalloc-64 of size 64 [ 61.400742] The buggy address is located 0 bytes to the right of [ 61.400742] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 61.413607] [ 61.415103] The buggy address belongs to the physical page: [ 61.420703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 61.428735] flags: 0x200000000000000(node=0|zone=2) [ 61.433614] page_type: f5(slab) [ 61.436762] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 61.444511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.452256] page dumped because: kasan: bad access detected [ 61.457829] [ 61.459329] Memory state around the buggy address: [ 61.464122] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.471348] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.478569] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.485796] ^ [ 61.490587] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.497806] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.505024] ================================================================== [ 67.915853] ================================================================== [ 67.923096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 67.930491] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 67.937890] [ 67.939392] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 67.939399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.939401] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 67.939405] Call Trace: [ 67.939407] <TASK> [ 67.939408] dump_stack_lvl+0x73/0xb0 [ 67.939412] print_report+0xd1/0x650 [ 67.939416] ? __virt_addr_valid+0x1db/0x2d0 [ 67.939420] ? kasan_atomics_helper+0x19e3/0x5450 [ 67.939424] ? kasan_complete_mode_report_info+0x2a/0x200 [ 67.939428] ? kasan_atomics_helper+0x19e3/0x5450 [ 67.939433] kasan_report+0x141/0x180 [ 67.939437] ? kasan_atomics_helper+0x19e3/0x5450 [ 67.939442] kasan_check_range+0x10c/0x1c0 [ 67.939447] __kasan_check_write+0x18/0x20 [ 67.939451] kasan_atomics_helper+0x19e3/0x5450 [ 67.939455] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 67.939459] ? __kmalloc_cache_noprof+0x189/0x420 [ 67.939463] ? kasan_atomics+0x152/0x310 [ 67.939467] kasan_atomics+0x1dc/0x310 [ 67.939471] ? __pfx_kasan_atomics+0x10/0x10 [ 67.939475] ? ktime_get_ts64+0x83/0x230 [ 67.939479] kunit_try_run_case+0x1a2/0x480 [ 67.939484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.939488] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 67.939493] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 67.939498] ? __kthread_parkme+0x82/0x180 [ 67.939502] ? preempt_count_sub+0x50/0x80 [ 67.939507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.939511] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.939515] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 67.939520] kthread+0x334/0x6f0 [ 67.939524] ? trace_preempt_on+0x20/0xc0 [ 67.939529] ? __pfx_kthread+0x10/0x10 [ 67.939533] ? _raw_spin_unlock_irq+0x47/0x80 [ 67.939537] ? calculate_sigpending+0x7b/0xa0 [ 67.939541] ? __pfx_kthread+0x10/0x10 [ 67.939546] ret_from_fork+0x3e/0x80 [ 67.939550] ? __pfx_kthread+0x10/0x10 [ 67.939554] ret_from_fork_asm+0x1a/0x30 [ 67.939560] </TASK> [ 67.939562] [ 68.120557] Allocated by task 308: [ 68.123964] kasan_save_stack+0x45/0x70 [ 68.127810] kasan_save_track+0x18/0x40 [ 68.131650] kasan_save_alloc_info+0x3b/0x50 [ 68.135924] __kasan_kmalloc+0xb7/0xc0 [ 68.139703] __kmalloc_cache_noprof+0x189/0x420 [ 68.144259] kasan_atomics+0x95/0x310 [ 68.147927] kunit_try_run_case+0x1a2/0x480 [ 68.152122] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.157529] kthread+0x334/0x6f0 [ 68.160760] ret_from_fork+0x3e/0x80 [ 68.164339] ret_from_fork_asm+0x1a/0x30 [ 68.168265] [ 68.169764] The buggy address belongs to the object at ffff8881061f7500 [ 68.169764] which belongs to the cache kmalloc-64 of size 64 [ 68.182096] The buggy address is located 0 bytes to the right of [ 68.182096] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 68.194957] [ 68.196456] The buggy address belongs to the physical page: [ 68.202030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 68.210038] flags: 0x200000000000000(node=0|zone=2) [ 68.214916] page_type: f5(slab) [ 68.218064] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 68.225811] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.233558] page dumped because: kasan: bad access detected [ 68.239130] [ 68.240629] Memory state around the buggy address: [ 68.245422] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.252641] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.259859] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.267079] ^ [ 68.271873] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.279099] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.286317] ================================================================== [ 57.370133] ================================================================== [ 57.377354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 57.384666] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 57.392086] [ 57.393584] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 57.393592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.393594] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 57.393597] Call Trace: [ 57.393599] <TASK> [ 57.393601] dump_stack_lvl+0x73/0xb0 [ 57.393605] print_report+0xd1/0x650 [ 57.393609] ? __virt_addr_valid+0x1db/0x2d0 [ 57.393613] ? kasan_atomics_helper+0xc70/0x5450 [ 57.393617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 57.393621] ? kasan_atomics_helper+0xc70/0x5450 [ 57.393626] kasan_report+0x141/0x180 [ 57.393630] ? kasan_atomics_helper+0xc70/0x5450 [ 57.393635] kasan_check_range+0x10c/0x1c0 [ 57.393640] __kasan_check_write+0x18/0x20 [ 57.393644] kasan_atomics_helper+0xc70/0x5450 [ 57.393648] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 57.393653] ? __kmalloc_cache_noprof+0x189/0x420 [ 57.393657] ? kasan_atomics+0x152/0x310 [ 57.393661] kasan_atomics+0x1dc/0x310 [ 57.393665] ? __pfx_kasan_atomics+0x10/0x10 [ 57.393669] ? ktime_get_ts64+0x83/0x230 [ 57.393691] kunit_try_run_case+0x1a2/0x480 [ 57.393695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.393700] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 57.393717] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 57.393722] ? __kthread_parkme+0x82/0x180 [ 57.393726] ? preempt_count_sub+0x50/0x80 [ 57.393732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.393736] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.393740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 57.393745] kthread+0x334/0x6f0 [ 57.393749] ? trace_preempt_on+0x20/0xc0 [ 57.393754] ? __pfx_kthread+0x10/0x10 [ 57.393758] ? _raw_spin_unlock_irq+0x47/0x80 [ 57.393763] ? calculate_sigpending+0x7b/0xa0 [ 57.393767] ? __pfx_kthread+0x10/0x10 [ 57.393771] ret_from_fork+0x3e/0x80 [ 57.393775] ? __pfx_kthread+0x10/0x10 [ 57.393780] ret_from_fork_asm+0x1a/0x30 [ 57.393786] </TASK> [ 57.393788] [ 57.574440] Allocated by task 308: [ 57.577846] kasan_save_stack+0x45/0x70 [ 57.581706] kasan_save_track+0x18/0x40 [ 57.585568] kasan_save_alloc_info+0x3b/0x50 [ 57.589839] __kasan_kmalloc+0xb7/0xc0 [ 57.593592] __kmalloc_cache_noprof+0x189/0x420 [ 57.598124] kasan_atomics+0x95/0x310 [ 57.601792] kunit_try_run_case+0x1a2/0x480 [ 57.605986] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.611386] kthread+0x334/0x6f0 [ 57.614626] ret_from_fork+0x3e/0x80 [ 57.618206] ret_from_fork_asm+0x1a/0x30 [ 57.622130] [ 57.623631] The buggy address belongs to the object at ffff8881061f7500 [ 57.623631] which belongs to the cache kmalloc-64 of size 64 [ 57.635971] The buggy address is located 0 bytes to the right of [ 57.635971] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 57.648831] [ 57.650330] The buggy address belongs to the physical page: [ 57.655902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 57.663903] flags: 0x200000000000000(node=0|zone=2) [ 57.668792] page_type: f5(slab) [ 57.671938] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 57.679719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.687466] page dumped because: kasan: bad access detected [ 57.693038] [ 57.694539] Memory state around the buggy address: [ 57.699331] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.706548] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.713768] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.720986] ^ [ 57.725781] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.733009] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.740234] ================================================================== [ 70.178881] ================================================================== [ 70.186109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 70.193502] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 70.200896] [ 70.202397] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 70.202404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.202407] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 70.202410] Call Trace: [ 70.202412] <TASK> [ 70.202414] dump_stack_lvl+0x73/0xb0 [ 70.202417] print_report+0xd1/0x650 [ 70.202422] ? __virt_addr_valid+0x1db/0x2d0 [ 70.202425] ? kasan_atomics_helper+0x1d7a/0x5450 [ 70.202429] ? kasan_complete_mode_report_info+0x2a/0x200 [ 70.202434] ? kasan_atomics_helper+0x1d7a/0x5450 [ 70.202438] kasan_report+0x141/0x180 [ 70.202443] ? kasan_atomics_helper+0x1d7a/0x5450 [ 70.202448] kasan_check_range+0x10c/0x1c0 [ 70.202452] __kasan_check_write+0x18/0x20 [ 70.202456] kasan_atomics_helper+0x1d7a/0x5450 [ 70.202461] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 70.202465] ? __kmalloc_cache_noprof+0x189/0x420 [ 70.202469] ? kasan_atomics+0x152/0x310 [ 70.202473] kasan_atomics+0x1dc/0x310 [ 70.202476] ? __pfx_kasan_atomics+0x10/0x10 [ 70.202480] ? ktime_get_ts64+0x83/0x230 [ 70.202485] kunit_try_run_case+0x1a2/0x480 [ 70.202489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.202494] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 70.202498] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 70.202503] ? __kthread_parkme+0x82/0x180 [ 70.202507] ? preempt_count_sub+0x50/0x80 [ 70.202512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.202516] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.202521] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 70.202525] kthread+0x334/0x6f0 [ 70.202529] ? trace_preempt_on+0x20/0xc0 [ 70.202533] ? __pfx_kthread+0x10/0x10 [ 70.202538] ? _raw_spin_unlock_irq+0x47/0x80 [ 70.202542] ? calculate_sigpending+0x7b/0xa0 [ 70.202546] ? __pfx_kthread+0x10/0x10 [ 70.202550] ret_from_fork+0x3e/0x80 [ 70.202555] ? __pfx_kthread+0x10/0x10 [ 70.202559] ret_from_fork_asm+0x1a/0x30 [ 70.202565] </TASK> [ 70.202566] [ 70.383535] Allocated by task 308: [ 70.386943] kasan_save_stack+0x45/0x70 [ 70.390781] kasan_save_track+0x18/0x40 [ 70.394619] kasan_save_alloc_info+0x3b/0x50 [ 70.398892] __kasan_kmalloc+0xb7/0xc0 [ 70.402645] __kmalloc_cache_noprof+0x189/0x420 [ 70.407179] kasan_atomics+0x95/0x310 [ 70.410844] kunit_try_run_case+0x1a2/0x480 [ 70.415028] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.420427] kthread+0x334/0x6f0 [ 70.423660] ret_from_fork+0x3e/0x80 [ 70.427266] ret_from_fork_asm+0x1a/0x30 [ 70.431192] [ 70.432707] The buggy address belongs to the object at ffff8881061f7500 [ 70.432707] which belongs to the cache kmalloc-64 of size 64 [ 70.445066] The buggy address is located 0 bytes to the right of [ 70.445066] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 70.457929] [ 70.459425] The buggy address belongs to the physical page: [ 70.465001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 70.473006] flags: 0x200000000000000(node=0|zone=2) [ 70.477885] page_type: f5(slab) [ 70.481034] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 70.488781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.496527] page dumped because: kasan: bad access detected [ 70.502100] [ 70.503599] Memory state around the buggy address: [ 70.508392] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.515618] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.522837] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.530057] ^ [ 70.534849] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.542069] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.549287] ================================================================== [ 60.760266] ================================================================== [ 60.767501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 60.774901] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 60.782214] [ 60.783737] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 60.783745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.783747] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 60.783750] Call Trace: [ 60.783752] <TASK> [ 60.783754] dump_stack_lvl+0x73/0xb0 [ 60.783757] print_report+0xd1/0x650 [ 60.783762] ? __virt_addr_valid+0x1db/0x2d0 [ 60.783766] ? kasan_atomics_helper+0x4a1c/0x5450 [ 60.783770] ? kasan_complete_mode_report_info+0x2a/0x200 [ 60.783774] ? kasan_atomics_helper+0x4a1c/0x5450 [ 60.783778] kasan_report+0x141/0x180 [ 60.783782] ? kasan_atomics_helper+0x4a1c/0x5450 [ 60.783788] __asan_report_load4_noabort+0x18/0x20 [ 60.783791] kasan_atomics_helper+0x4a1c/0x5450 [ 60.783796] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 60.783800] ? __kmalloc_cache_noprof+0x189/0x420 [ 60.783804] ? kasan_atomics+0x152/0x310 [ 60.783808] kasan_atomics+0x1dc/0x310 [ 60.783812] ? __pfx_kasan_atomics+0x10/0x10 [ 60.783816] ? ktime_get_ts64+0x83/0x230 [ 60.783821] kunit_try_run_case+0x1a2/0x480 [ 60.783825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.783830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 60.783834] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 60.783839] ? __kthread_parkme+0x82/0x180 [ 60.783843] ? preempt_count_sub+0x50/0x80 [ 60.783848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.783853] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.783857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 60.783861] kthread+0x334/0x6f0 [ 60.783865] ? trace_preempt_on+0x20/0xc0 [ 60.783870] ? __pfx_kthread+0x10/0x10 [ 60.783874] ? _raw_spin_unlock_irq+0x47/0x80 [ 60.783879] ? calculate_sigpending+0x7b/0xa0 [ 60.783883] ? __pfx_kthread+0x10/0x10 [ 60.783887] ret_from_fork+0x3e/0x80 [ 60.783891] ? __pfx_kthread+0x10/0x10 [ 60.783896] ret_from_fork_asm+0x1a/0x30 [ 60.783901] </TASK> [ 60.783903] [ 60.961460] Allocated by task 308: [ 60.964867] kasan_save_stack+0x45/0x70 [ 60.968737] kasan_save_track+0x18/0x40 [ 60.972579] kasan_save_alloc_info+0x3b/0x50 [ 60.976853] __kasan_kmalloc+0xb7/0xc0 [ 60.980613] __kmalloc_cache_noprof+0x189/0x420 [ 60.985145] kasan_atomics+0x95/0x310 [ 60.988810] kunit_try_run_case+0x1a2/0x480 [ 60.992995] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.998397] kthread+0x334/0x6f0 [ 61.001636] ret_from_fork+0x3e/0x80 [ 61.005214] ret_from_fork_asm+0x1a/0x30 [ 61.009141] [ 61.010641] The buggy address belongs to the object at ffff8881061f7500 [ 61.010641] which belongs to the cache kmalloc-64 of size 64 [ 61.022981] The buggy address is located 0 bytes to the right of [ 61.022981] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 61.035842] [ 61.037343] The buggy address belongs to the physical page: [ 61.042914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 61.050912] flags: 0x200000000000000(node=0|zone=2) [ 61.055792] page_type: f5(slab) [ 61.058938] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 61.066716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.074467] page dumped because: kasan: bad access detected [ 61.080042] [ 61.081539] Memory state around the buggy address: [ 61.086333] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.093551] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.100771] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.107989] ^ [ 61.112782] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.119999] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.127218] ================================================================== [ 55.106458] ================================================================== [ 55.113707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 55.121037] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 55.128431] [ 55.129931] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 55.129939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.129941] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 55.129945] Call Trace: [ 55.129946] <TASK> [ 55.129948] dump_stack_lvl+0x73/0xb0 [ 55.129952] print_report+0xd1/0x650 [ 55.129956] ? __virt_addr_valid+0x1db/0x2d0 [ 55.129960] ? kasan_atomics_helper+0x860/0x5450 [ 55.129964] ? kasan_complete_mode_report_info+0x2a/0x200 [ 55.129969] ? kasan_atomics_helper+0x860/0x5450 [ 55.129973] kasan_report+0x141/0x180 [ 55.129978] ? kasan_atomics_helper+0x860/0x5450 [ 55.129983] kasan_check_range+0x10c/0x1c0 [ 55.129988] __kasan_check_write+0x18/0x20 [ 55.129992] kasan_atomics_helper+0x860/0x5450 [ 55.129996] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 55.130000] ? __kmalloc_cache_noprof+0x189/0x420 [ 55.130004] ? kasan_atomics+0x152/0x310 [ 55.130009] kasan_atomics+0x1dc/0x310 [ 55.130012] ? __pfx_kasan_atomics+0x10/0x10 [ 55.130016] ? ktime_get_ts64+0x83/0x230 [ 55.130021] kunit_try_run_case+0x1a2/0x480 [ 55.130026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.130030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 55.130035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 55.130040] ? __kthread_parkme+0x82/0x180 [ 55.130044] ? preempt_count_sub+0x50/0x80 [ 55.130049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.130054] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.130058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 55.130062] kthread+0x334/0x6f0 [ 55.130067] ? trace_preempt_on+0x20/0xc0 [ 55.130071] ? __pfx_kthread+0x10/0x10 [ 55.130076] ? _raw_spin_unlock_irq+0x47/0x80 [ 55.130080] ? calculate_sigpending+0x7b/0xa0 [ 55.130084] ? __pfx_kthread+0x10/0x10 [ 55.130089] ret_from_fork+0x3e/0x80 [ 55.130093] ? __pfx_kthread+0x10/0x10 [ 55.130098] ret_from_fork_asm+0x1a/0x30 [ 55.130104] </TASK> [ 55.130105] [ 55.310856] Allocated by task 308: [ 55.314262] kasan_save_stack+0x45/0x70 [ 55.318109] kasan_save_track+0x18/0x40 [ 55.321949] kasan_save_alloc_info+0x3b/0x50 [ 55.326230] __kasan_kmalloc+0xb7/0xc0 [ 55.329990] __kmalloc_cache_noprof+0x189/0x420 [ 55.334523] kasan_atomics+0x95/0x310 [ 55.338189] kunit_try_run_case+0x1a2/0x480 [ 55.342375] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.347774] kthread+0x334/0x6f0 [ 55.351005] ret_from_fork+0x3e/0x80 [ 55.354585] ret_from_fork_asm+0x1a/0x30 [ 55.358511] [ 55.360009] The buggy address belongs to the object at ffff8881061f7500 [ 55.360009] which belongs to the cache kmalloc-64 of size 64 [ 55.372342] The buggy address is located 0 bytes to the right of [ 55.372342] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 55.385205] [ 55.386706] The buggy address belongs to the physical page: [ 55.392275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 55.400281] flags: 0x200000000000000(node=0|zone=2) [ 55.405162] page_type: f5(slab) [ 55.408308] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 55.416047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.423794] page dumped because: kasan: bad access detected [ 55.429368] [ 55.430866] Memory state around the buggy address: [ 55.435658] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.442877] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.450097] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.457316] ^ [ 55.462109] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.469335] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.476554] ================================================================== [ 50.211763] ================================================================== [ 50.226645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 50.234051] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 50.241360] [ 50.242861] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 50.242869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.242872] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 50.242875] Call Trace: [ 50.242877] <TASK> [ 50.242879] dump_stack_lvl+0x73/0xb0 [ 50.242884] print_report+0xd1/0x650 [ 50.242888] ? __virt_addr_valid+0x1db/0x2d0 [ 50.242892] ? kasan_atomics_helper+0x4bbc/0x5450 [ 50.242896] ? kasan_complete_mode_report_info+0x2a/0x200 [ 50.242901] ? kasan_atomics_helper+0x4bbc/0x5450 [ 50.242905] kasan_report+0x141/0x180 [ 50.242910] ? kasan_atomics_helper+0x4bbc/0x5450 [ 50.242915] __asan_report_load4_noabort+0x18/0x20 [ 50.242919] kasan_atomics_helper+0x4bbc/0x5450 [ 50.242923] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 50.242927] ? __kmalloc_cache_noprof+0x189/0x420 [ 50.242931] ? kasan_atomics+0x152/0x310 [ 50.242935] kasan_atomics+0x1dc/0x310 [ 50.242939] ? __pfx_kasan_atomics+0x10/0x10 [ 50.242943] ? ktime_get_ts64+0x83/0x230 [ 50.242948] kunit_try_run_case+0x1a2/0x480 [ 50.242952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.242957] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 50.242961] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 50.242966] ? __kthread_parkme+0x82/0x180 [ 50.242970] ? preempt_count_sub+0x50/0x80 [ 50.242975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.242980] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.242984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 50.242988] kthread+0x334/0x6f0 [ 50.242993] ? trace_preempt_on+0x20/0xc0 [ 50.242997] ? __pfx_kthread+0x10/0x10 [ 50.243002] ? _raw_spin_unlock_irq+0x47/0x80 [ 50.243006] ? calculate_sigpending+0x7b/0xa0 [ 50.243010] ? __pfx_kthread+0x10/0x10 [ 50.243015] ret_from_fork+0x3e/0x80 [ 50.243019] ? __pfx_kthread+0x10/0x10 [ 50.243023] ret_from_fork_asm+0x1a/0x30 [ 50.243029] </TASK> [ 50.243031] [ 50.420629] Allocated by task 308: [ 50.424036] kasan_save_stack+0x45/0x70 [ 50.427882] kasan_save_track+0x18/0x40 [ 50.431722] kasan_save_alloc_info+0x3b/0x50 [ 50.436020] __kasan_kmalloc+0xb7/0xc0 [ 50.439774] __kmalloc_cache_noprof+0x189/0x420 [ 50.444313] kasan_atomics+0x95/0x310 [ 50.447978] kunit_try_run_case+0x1a2/0x480 [ 50.452165] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.457564] kthread+0x334/0x6f0 [ 50.460796] ret_from_fork+0x3e/0x80 [ 50.464377] ret_from_fork_asm+0x1a/0x30 [ 50.468309] [ 50.469809] The buggy address belongs to the object at ffff8881061f7500 [ 50.469809] which belongs to the cache kmalloc-64 of size 64 [ 50.482151] The buggy address is located 0 bytes to the right of [ 50.482151] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 50.495011] [ 50.496512] The buggy address belongs to the physical page: [ 50.502085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 50.510089] flags: 0x200000000000000(node=0|zone=2) [ 50.514969] page_type: f5(slab) [ 50.518118] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 50.525864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.533610] page dumped because: kasan: bad access detected [ 50.539183] [ 50.540703] Memory state around the buggy address: [ 50.545502] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.552740] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.559966] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.567185] ^ [ 50.571977] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.579197] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.586422] ================================================================== [ 62.638486] ================================================================== [ 62.645737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 62.653131] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 62.660525] [ 62.662025] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 62.662033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.662035] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 62.662038] Call Trace: [ 62.662040] <TASK> [ 62.662041] dump_stack_lvl+0x73/0xb0 [ 62.662045] print_report+0xd1/0x650 [ 62.662049] ? __virt_addr_valid+0x1db/0x2d0 [ 62.662053] ? kasan_atomics_helper+0x12e6/0x5450 [ 62.662057] ? kasan_complete_mode_report_info+0x2a/0x200 [ 62.662062] ? kasan_atomics_helper+0x12e6/0x5450 [ 62.662066] kasan_report+0x141/0x180 [ 62.662070] ? kasan_atomics_helper+0x12e6/0x5450 [ 62.662075] kasan_check_range+0x10c/0x1c0 [ 62.662080] __kasan_check_write+0x18/0x20 [ 62.662084] kasan_atomics_helper+0x12e6/0x5450 [ 62.662088] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 62.662093] ? __kmalloc_cache_noprof+0x189/0x420 [ 62.662097] ? kasan_atomics+0x152/0x310 [ 62.662101] kasan_atomics+0x1dc/0x310 [ 62.662104] ? __pfx_kasan_atomics+0x10/0x10 [ 62.662108] ? ktime_get_ts64+0x83/0x230 [ 62.662113] kunit_try_run_case+0x1a2/0x480 [ 62.662117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.662122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 62.662126] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 62.662131] ? __kthread_parkme+0x82/0x180 [ 62.662136] ? preempt_count_sub+0x50/0x80 [ 62.662140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.662145] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.662149] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 62.662153] kthread+0x334/0x6f0 [ 62.662158] ? trace_preempt_on+0x20/0xc0 [ 62.662162] ? __pfx_kthread+0x10/0x10 [ 62.662167] ? _raw_spin_unlock_irq+0x47/0x80 [ 62.662171] ? calculate_sigpending+0x7b/0xa0 [ 62.662175] ? __pfx_kthread+0x10/0x10 [ 62.662180] ret_from_fork+0x3e/0x80 [ 62.662184] ? __pfx_kthread+0x10/0x10 [ 62.662188] ret_from_fork_asm+0x1a/0x30 [ 62.662194] </TASK> [ 62.662196] [ 62.843226] Allocated by task 308: [ 62.846634] kasan_save_stack+0x45/0x70 [ 62.850481] kasan_save_track+0x18/0x40 [ 62.854318] kasan_save_alloc_info+0x3b/0x50 [ 62.858592] __kasan_kmalloc+0xb7/0xc0 [ 62.862345] __kmalloc_cache_noprof+0x189/0x420 [ 62.866876] kasan_atomics+0x95/0x310 [ 62.870542] kunit_try_run_case+0x1a2/0x480 [ 62.874749] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.880155] kthread+0x334/0x6f0 [ 62.883396] ret_from_fork+0x3e/0x80 [ 62.886984] ret_from_fork_asm+0x1a/0x30 [ 62.890917] [ 62.892416] The buggy address belongs to the object at ffff8881061f7500 [ 62.892416] which belongs to the cache kmalloc-64 of size 64 [ 62.904756] The buggy address is located 0 bytes to the right of [ 62.904756] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 62.917618] [ 62.919118] The buggy address belongs to the physical page: [ 62.924717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 62.932735] flags: 0x200000000000000(node=0|zone=2) [ 62.937619] page_type: f5(slab) [ 62.940768] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 62.948514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.956261] page dumped because: kasan: bad access detected [ 62.961833] [ 62.963333] Memory state around the buggy address: [ 62.968127] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.975353] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.982571] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.989790] ^ [ 62.994584] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.001812] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.009031] ================================================================== [ 70.934251] ================================================================== [ 70.941480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 70.948880] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 70.956273] [ 70.957774] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 70.957782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.957784] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 70.957787] Call Trace: [ 70.957789] <TASK> [ 70.957791] dump_stack_lvl+0x73/0xb0 [ 70.957795] print_report+0xd1/0x650 [ 70.957799] ? __virt_addr_valid+0x1db/0x2d0 [ 70.957803] ? kasan_atomics_helper+0x1eaa/0x5450 [ 70.957807] ? kasan_complete_mode_report_info+0x2a/0x200 [ 70.957811] ? kasan_atomics_helper+0x1eaa/0x5450 [ 70.957816] kasan_report+0x141/0x180 [ 70.957820] ? kasan_atomics_helper+0x1eaa/0x5450 [ 70.957825] kasan_check_range+0x10c/0x1c0 [ 70.957830] __kasan_check_write+0x18/0x20 [ 70.957834] kasan_atomics_helper+0x1eaa/0x5450 [ 70.957838] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 70.957843] ? __kmalloc_cache_noprof+0x189/0x420 [ 70.957847] ? kasan_atomics+0x152/0x310 [ 70.957851] kasan_atomics+0x1dc/0x310 [ 70.957854] ? __pfx_kasan_atomics+0x10/0x10 [ 70.957858] ? ktime_get_ts64+0x83/0x230 [ 70.957863] kunit_try_run_case+0x1a2/0x480 [ 70.957867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.957872] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 70.957876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 70.957881] ? __kthread_parkme+0x82/0x180 [ 70.957885] ? preempt_count_sub+0x50/0x80 [ 70.957890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.957895] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.957899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 70.957903] kthread+0x334/0x6f0 [ 70.957907] ? trace_preempt_on+0x20/0xc0 [ 70.957912] ? __pfx_kthread+0x10/0x10 [ 70.957916] ? _raw_spin_unlock_irq+0x47/0x80 [ 70.957921] ? calculate_sigpending+0x7b/0xa0 [ 70.957925] ? __pfx_kthread+0x10/0x10 [ 70.957929] ret_from_fork+0x3e/0x80 [ 70.957933] ? __pfx_kthread+0x10/0x10 [ 70.957938] ret_from_fork_asm+0x1a/0x30 [ 70.957944] </TASK> [ 70.957945] [ 71.138912] Allocated by task 308: [ 71.142321] kasan_save_stack+0x45/0x70 [ 71.146167] kasan_save_track+0x18/0x40 [ 71.150006] kasan_save_alloc_info+0x3b/0x50 [ 71.154279] __kasan_kmalloc+0xb7/0xc0 [ 71.158032] __kmalloc_cache_noprof+0x189/0x420 [ 71.162563] kasan_atomics+0x95/0x310 [ 71.166231] kunit_try_run_case+0x1a2/0x480 [ 71.170424] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.175823] kthread+0x334/0x6f0 [ 71.179056] ret_from_fork+0x3e/0x80 [ 71.182635] ret_from_fork_asm+0x1a/0x30 [ 71.186561] [ 71.188060] The buggy address belongs to the object at ffff8881061f7500 [ 71.188060] which belongs to the cache kmalloc-64 of size 64 [ 71.200402] The buggy address is located 0 bytes to the right of [ 71.200402] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 71.213263] [ 71.214693] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 71.214760] The buggy address belongs to the physical page: [ 71.220854] rcu: 2-....: (54 ticks this GP) idle=3e8c/1/0x4000000000000000 softirq=317/318 fqs=230 [ 71.226423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 71.235455] rcu: (detected by 1, t=21023 jiffies, g=-359, q=45 ncpus=4) [ 71.243444] flags: 0x200000000000000(node=0|zone=2) [ 71.250136] Sending NMI from CPU 1 to CPUs 2: [ 71.250143] NMI backtrace for cpu 2 [ 71.250146] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 71.250154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.250156] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 71.250160] RIP: 0010:io_serial_out+0x6c/0xa0 [ 71.250166] Code: b6 8b c1 00 00 00 48 8d 7b 08 48 ba 00 00 00 00 00 fc ff df d3 e6 48 89 f9 48 c1 e9 03 80 3c 11 00 75 24 66 03 73 08 89 f2 ee <48> 8b 5d f8 c9 c3 cc cc cc cc 89 45 f0 89 75 f4 e8 af 5b 07 ff 8b [ 71.250174] RSP: 0000:ffff8881080272e0 EFLAGS: 00000006 [ 71.250179] RAX: 0000000000000000 RBX: ffffffffbb4d8b80 RCX: 1ffffffff769b171 [ 71.250183] RDX: 00000000000003f9 RSI: 00000000000003f9 RDI: ffffffffbb4d8b88 [ 71.250187] RBP: ffff8881080272f0 R08: 0000000000000001 R09: ffffffffbb434940 [ 71.250190] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000000000000 [ 71.250194] R13: ffffffffbb4d8de0 R14: ffffffffba5ce9c0 R15: ffffffffbb4d8b80 [ 71.250198] FS: 0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000 [ 71.250202] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 71.250206] CR2: 0000000000000000 CR3: 000000023f4ba001 CR4: 00000000003726f0 [ 71.250210] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882 [ 71.250213] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 71.250217] Call Trace: [ 71.250218] <TASK> [ 71.250221] serial8250_clear_IER+0x8c/0xb0 [ 71.250226] serial8250_console_write+0x1bd/0x1810 [ 71.250231] ? __pfx_serial8250_console_write+0x10/0x10 [ 71.250236] ? __kasan_check_write+0x18/0x20 [ 71.250240] ? _raw_spin_lock+0x8b/0xe0 [ 71.250245] ? __pfx__raw_spin_lock+0x10/0x10 [ 71.250250] univ8250_console_write+0x57/0x80 [ 71.250254] ? _raw_spin_unlock+0x41/0x70 [ 71.250258] console_flush_all+0x57b/0xc00 [ 71.250263] ? __pfx_console_flush_all+0x10/0x10 [ 71.250268] ? __pfx_vprintk_store+0x10/0x10 [ 71.250273] ? __kasan_check_read+0x15/0x20 [ 71.250277] console_unlock+0xf2/0x1f0 [ 71.250281] ? __pfx_console_unlock+0x10/0x10 [ 71.250285] ? __kasan_check_write+0x18/0x20 [ 71.250289] ? _raw_spin_lock+0x8b/0xe0 [ 71.250294] vprintk_emit+0x1e9/0x480 [ 71.250299] ? __pfx_vprintk_emit+0x10/0x10 [ 71.250303] ? _raw_spin_unlock+0x41/0x70 [ 71.250308] vprintk_default+0x21/0x30 [ 71.250312] vprintk+0x12/0x20 [ 71.250316] _printk+0xc3/0xf0 [ 71.250319] ? __pfx__printk+0x10/0x10 [ 71.250323] ? __pfx_vprintk_store+0x10/0x10 [ 71.250328] __dump_page+0x33a/0x8d0 [ 71.250333] ? __pfx___dump_page+0x10/0x10 [ 71.250337] ? __kasan_check_write+0x18/0x20 [ 71.250344] ? _printk+0xc3/0xf0 [ 71.250347] ? __pfx__printk+0x10/0x10 [ 71.250351] ? ret_from_fork_asm+0x1a/0x30 [ 71.250356] dump_page+0x3a/0x80 [ 71.250360] ? dump_page+0x3a/0x80 [ 71.250364] print_report+0x26e/0x650 [ 71.250368] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.250373] ? kasan_complete_mode_report_info+0x2a/0x200 [ 71.250377] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.250381] kasan_report+0x141/0x180 [ 71.250386] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.250391] kasan_check_range+0x10c/0x1c0 [ 71.250396] __kasan_check_write+0x18/0x20 [ 71.250399] kasan_atomics_helper+0x1eaa/0x5450 [ 71.250404] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 71.250408] ? __kmalloc_cache_noprof+0x189/0x420 [ 71.250412] ? kasan_atomics+0x152/0x310 [ 71.250416] kasan_atomics+0x1dc/0x310 [ 71.250420] ? __pfx_kasan_atomics+0x10/0x10 [ 71.250424] ? ktime_get_ts64+0x83/0x230 [ 71.250429] kunit_try_run_case+0x1a2/0x480 [ 71.250433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.250438] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 71.250442] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 71.250447] ? __kthread_parkme+0x82/0x180 [ 71.250452] ? preempt_count_sub+0x50/0x80 [ 71.250456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.250461] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.250465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 71.250470] kthread+0x334/0x6f0 [ 71.250474] ? trace_preempt_on+0x20/0xc0 [ 71.250478] ? __pfx_kthread+0x10/0x10 [ 71.250483] ? _raw_spin_unlock_irq+0x47/0x80 [ 71.250487] ? calculate_sigpending+0x7b/0xa0 [ 71.250492] ? __pfx_kthread+0x10/0x10 [ 71.250496] ret_from_fork+0x3e/0x80 [ 71.250501] ? __pfx_kthread+0x10/0x10 [ 71.250505] ret_from_fork_asm+0x1a/0x30 [ 71.250511] </TASK> [ 71.661921] page_type: f5(slab) [ 71.665079] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 71.672826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.680564] page dumped because: kasan: bad access detected [ 71.686138] [ 71.687636] Memory state around the buggy address: [ 71.692428] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.699648] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.706865] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.714084] ^ [ 71.718878] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.726096] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.733317] ================================================================== [ 72.118425] ================================================================== [ 72.125656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 72.133056] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 72.140363] [ 72.141861] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 72.141869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.141871] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 72.141874] Call Trace: [ 72.141876] <TASK> [ 72.141878] dump_stack_lvl+0x73/0xb0 [ 72.141881] print_report+0xd1/0x650 [ 72.141886] ? __virt_addr_valid+0x1db/0x2d0 [ 72.141890] ? kasan_atomics_helper+0x4f71/0x5450 [ 72.141894] ? kasan_complete_mode_report_info+0x2a/0x200 [ 72.141898] ? kasan_atomics_helper+0x4f71/0x5450 [ 72.141903] kasan_report+0x141/0x180 [ 72.141907] ? kasan_atomics_helper+0x4f71/0x5450 [ 72.141912] __asan_report_load8_noabort+0x18/0x20 [ 72.141916] kasan_atomics_helper+0x4f71/0x5450 [ 72.141921] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 72.141925] ? __kmalloc_cache_noprof+0x189/0x420 [ 72.141929] ? kasan_atomics+0x152/0x310 [ 72.141933] kasan_atomics+0x1dc/0x310 [ 72.141937] ? __pfx_kasan_atomics+0x10/0x10 [ 72.141940] ? ktime_get_ts64+0x83/0x230 [ 72.141945] kunit_try_run_case+0x1a2/0x480 [ 72.141950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.141954] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 72.141959] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 72.141963] ? __kthread_parkme+0x82/0x180 [ 72.141968] ? preempt_count_sub+0x50/0x80 [ 72.141972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.141977] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.141981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 72.141985] kthread+0x334/0x6f0 [ 72.141990] ? trace_preempt_on+0x20/0xc0 [ 72.141994] ? __pfx_kthread+0x10/0x10 [ 72.141999] ? _raw_spin_unlock_irq+0x47/0x80 [ 72.142003] ? calculate_sigpending+0x7b/0xa0 [ 72.142007] ? __pfx_kthread+0x10/0x10 [ 72.142011] ret_from_fork+0x3e/0x80 [ 72.142015] ? __pfx_kthread+0x10/0x10 [ 72.142020] ret_from_fork_asm+0x1a/0x30 [ 72.142026] </TASK> [ 72.142027] [ 72.319555] Allocated by task 308: [ 72.322959] kasan_save_stack+0x45/0x70 [ 72.326799] kasan_save_track+0x18/0x40 [ 72.330640] kasan_save_alloc_info+0x3b/0x50 [ 72.334920] __kasan_kmalloc+0xb7/0xc0 [ 72.338688] __kmalloc_cache_noprof+0x189/0x420 [ 72.343231] kasan_atomics+0x95/0x310 [ 72.346896] kunit_try_run_case+0x1a2/0x480 [ 72.351083] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.356489] kthread+0x334/0x6f0 [ 72.359738] ret_from_fork+0x3e/0x80 [ 72.363318] ret_from_fork_asm+0x1a/0x30 [ 72.367245] [ 72.368747] The buggy address belongs to the object at ffff8881061f7500 [ 72.368747] which belongs to the cache kmalloc-64 of size 64 [ 72.381086] The buggy address is located 0 bytes to the right of [ 72.381086] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 72.393946] [ 72.395446] The buggy address belongs to the physical page: [ 72.401016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 72.409016] flags: 0x200000000000000(node=0|zone=2) [ 72.413894] page_type: f5(slab) [ 72.417043] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 72.424789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.432528] page dumped because: kasan: bad access detected [ 72.438099] [ 72.439599] Memory state around the buggy address: [ 72.444391] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.451613] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.458838] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.466059] ^ [ 72.470852] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.478069] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.485286] ================================================================== [ 56.238232] ================================================================== [ 56.245459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 56.252767] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 56.260168] [ 56.261667] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 56.261692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.261694] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 56.261697] Call Trace: [ 56.261699] <TASK> [ 56.261701] dump_stack_lvl+0x73/0xb0 [ 56.261717] print_report+0xd1/0x650 [ 56.261721] ? __virt_addr_valid+0x1db/0x2d0 [ 56.261725] ? kasan_atomics_helper+0xa2b/0x5450 [ 56.261729] ? kasan_complete_mode_report_info+0x2a/0x200 [ 56.261734] ? kasan_atomics_helper+0xa2b/0x5450 [ 56.261738] kasan_report+0x141/0x180 [ 56.261742] ? kasan_atomics_helper+0xa2b/0x5450 [ 56.261747] kasan_check_range+0x10c/0x1c0 [ 56.261752] __kasan_check_write+0x18/0x20 [ 56.261756] kasan_atomics_helper+0xa2b/0x5450 [ 56.261760] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 56.261765] ? __kmalloc_cache_noprof+0x189/0x420 [ 56.261769] ? kasan_atomics+0x152/0x310 [ 56.261773] kasan_atomics+0x1dc/0x310 [ 56.261776] ? __pfx_kasan_atomics+0x10/0x10 [ 56.261780] ? ktime_get_ts64+0x83/0x230 [ 56.261785] kunit_try_run_case+0x1a2/0x480 [ 56.261789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.261793] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 56.261798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 56.261803] ? __kthread_parkme+0x82/0x180 [ 56.261807] ? preempt_count_sub+0x50/0x80 [ 56.261812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.261816] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.261821] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 56.261825] kthread+0x334/0x6f0 [ 56.261829] ? trace_preempt_on+0x20/0xc0 [ 56.261833] ? __pfx_kthread+0x10/0x10 [ 56.261838] ? _raw_spin_unlock_irq+0x47/0x80 [ 56.261842] ? calculate_sigpending+0x7b/0xa0 [ 56.261846] ? __pfx_kthread+0x10/0x10 [ 56.261851] ret_from_fork+0x3e/0x80 [ 56.261855] ? __pfx_kthread+0x10/0x10 [ 56.261859] ret_from_fork_asm+0x1a/0x30 [ 56.261865] </TASK> [ 56.261867] [ 56.442616] Allocated by task 308: [ 56.446022] kasan_save_stack+0x45/0x70 [ 56.449863] kasan_save_track+0x18/0x40 [ 56.453711] kasan_save_alloc_info+0x3b/0x50 [ 56.457982] __kasan_kmalloc+0xb7/0xc0 [ 56.461743] __kmalloc_cache_noprof+0x189/0x420 [ 56.466278] kasan_atomics+0x95/0x310 [ 56.469941] kunit_try_run_case+0x1a2/0x480 [ 56.474128] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.479527] kthread+0x334/0x6f0 [ 56.482761] ret_from_fork+0x3e/0x80 [ 56.486347] ret_from_fork_asm+0x1a/0x30 [ 56.490272] [ 56.491773] The buggy address belongs to the object at ffff8881061f7500 [ 56.491773] which belongs to the cache kmalloc-64 of size 64 [ 56.504114] The buggy address is located 0 bytes to the right of [ 56.504114] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 56.516975] [ 56.518475] The buggy address belongs to the physical page: [ 56.524047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 56.532052] flags: 0x200000000000000(node=0|zone=2) [ 56.536932] page_type: f5(slab) [ 56.540081] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 56.547826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.555565] page dumped because: kasan: bad access detected [ 56.561136] [ 56.562637] Memory state around the buggy address: [ 56.567428] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.574647] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.581867] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.589085] ^ [ 56.593880] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.601106] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.608326] ================================================================== [ 66.782868] ================================================================== [ 66.790105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 66.797497] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 66.804898] [ 66.806397] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 66.806404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.806406] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 66.806410] Call Trace: [ 66.806412] <TASK> [ 66.806413] dump_stack_lvl+0x73/0xb0 [ 66.806417] print_report+0xd1/0x650 [ 66.806421] ? __virt_addr_valid+0x1db/0x2d0 [ 66.806425] ? kasan_atomics_helper+0x1818/0x5450 [ 66.806429] ? kasan_complete_mode_report_info+0x2a/0x200 [ 66.806434] ? kasan_atomics_helper+0x1818/0x5450 [ 66.806438] kasan_report+0x141/0x180 [ 66.806443] ? kasan_atomics_helper+0x1818/0x5450 [ 66.806448] kasan_check_range+0x10c/0x1c0 [ 66.806453] __kasan_check_write+0x18/0x20 [ 66.806456] kasan_atomics_helper+0x1818/0x5450 [ 66.806461] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 66.806465] ? __kmalloc_cache_noprof+0x189/0x420 [ 66.806469] ? kasan_atomics+0x152/0x310 [ 66.806474] kasan_atomics+0x1dc/0x310 [ 66.806477] ? __pfx_kasan_atomics+0x10/0x10 [ 66.806481] ? ktime_get_ts64+0x83/0x230 [ 66.806486] kunit_try_run_case+0x1a2/0x480 [ 66.806491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.806495] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 66.806500] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 66.806505] ? __kthread_parkme+0x82/0x180 [ 66.806509] ? preempt_count_sub+0x50/0x80 [ 66.806514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.806518] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.806522] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 66.806527] kthread+0x334/0x6f0 [ 66.806531] ? trace_preempt_on+0x20/0xc0 [ 66.806535] ? __pfx_kthread+0x10/0x10 [ 66.806540] ? _raw_spin_unlock_irq+0x47/0x80 [ 66.806544] ? calculate_sigpending+0x7b/0xa0 [ 66.806548] ? __pfx_kthread+0x10/0x10 [ 66.806553] ret_from_fork+0x3e/0x80 [ 66.806557] ? __pfx_kthread+0x10/0x10 [ 66.806561] ret_from_fork_asm+0x1a/0x30 [ 66.806567] </TASK> [ 66.806569] [ 66.987479] Allocated by task 308: [ 66.990885] kasan_save_stack+0x45/0x70 [ 66.994736] kasan_save_track+0x18/0x40 [ 66.998579] kasan_save_alloc_info+0x3b/0x50 [ 67.002853] __kasan_kmalloc+0xb7/0xc0 [ 67.006604] __kmalloc_cache_noprof+0x189/0x420 [ 67.011136] kasan_atomics+0x95/0x310 [ 67.014802] kunit_try_run_case+0x1a2/0x480 [ 67.018987] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.024388] kthread+0x334/0x6f0 [ 67.027620] ret_from_fork+0x3e/0x80 [ 67.031199] ret_from_fork_asm+0x1a/0x30 [ 67.035124] [ 67.036624] The buggy address belongs to the object at ffff8881061f7500 [ 67.036624] which belongs to the cache kmalloc-64 of size 64 [ 67.048966] The buggy address is located 0 bytes to the right of [ 67.048966] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 67.061825] [ 67.063325] The buggy address belongs to the physical page: [ 67.068899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 67.076905] flags: 0x200000000000000(node=0|zone=2) [ 67.081784] page_type: f5(slab) [ 67.084932] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 67.092689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.100461] page dumped because: kasan: bad access detected [ 67.106032] [ 67.107532] Memory state around the buggy address: [ 67.112325] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.119543] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.126764] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.133982] ^ [ 67.138774] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.145992] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.153213] ================================================================== [ 71.740559] ================================================================== [ 71.747790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 71.755189] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 71.762581] [ 71.764084] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 71.764092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.764094] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 71.764097] Call Trace: [ 71.764099] <TASK> [ 71.764101] dump_stack_lvl+0x73/0xb0 [ 71.764105] print_report+0xd1/0x650 [ 71.764109] ? __virt_addr_valid+0x1db/0x2d0 [ 71.764113] ? kasan_atomics_helper+0x1f43/0x5450 [ 71.764117] ? kasan_complete_mode_report_info+0x2a/0x200 [ 71.764121] ? kasan_atomics_helper+0x1f43/0x5450 [ 71.764126] kasan_report+0x141/0x180 [ 71.764130] ? kasan_atomics_helper+0x1f43/0x5450 [ 71.764135] kasan_check_range+0x10c/0x1c0 [ 71.764140] __kasan_check_write+0x18/0x20 [ 71.764144] kasan_atomics_helper+0x1f43/0x5450 [ 71.764148] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 71.764152] ? __kmalloc_cache_noprof+0x189/0x420 [ 71.764156] ? kasan_atomics+0x152/0x310 [ 71.764161] kasan_atomics+0x1dc/0x310 [ 71.764164] ? __pfx_kasan_atomics+0x10/0x10 [ 71.764168] ? ktime_get_ts64+0x83/0x230 [ 71.764173] kunit_try_run_case+0x1a2/0x480 [ 71.764177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.764182] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 71.764186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 71.764191] ? __kthread_parkme+0x82/0x180 [ 71.764195] ? preempt_count_sub+0x50/0x80 [ 71.764200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.764205] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.764209] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 71.764213] kthread+0x334/0x6f0 [ 71.764218] ? trace_preempt_on+0x20/0xc0 [ 71.764222] ? __pfx_kthread+0x10/0x10 [ 71.764227] ? _raw_spin_unlock_irq+0x47/0x80 [ 71.764231] ? calculate_sigpending+0x7b/0xa0 [ 71.764235] ? __pfx_kthread+0x10/0x10 [ 71.764239] ret_from_fork+0x3e/0x80 [ 71.764243] ? __pfx_kthread+0x10/0x10 [ 71.764248] ret_from_fork_asm+0x1a/0x30 [ 71.764254] </TASK> [ 71.764255] [ 71.945414] Allocated by task 308: [ 71.948820] kasan_save_stack+0x45/0x70 [ 71.952660] kasan_save_track+0x18/0x40 [ 71.956533] kasan_save_alloc_info+0x3b/0x50 [ 71.960805] __kasan_kmalloc+0xb7/0xc0 [ 71.964557] __kmalloc_cache_noprof+0x189/0x420 [ 71.969089] kasan_atomics+0x95/0x310 [ 71.972757] kunit_try_run_case+0x1a2/0x480 [ 71.976951] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.982359] kthread+0x334/0x6f0 [ 71.985592] ret_from_fork+0x3e/0x80 [ 71.989171] ret_from_fork_asm+0x1a/0x30 [ 71.993105] [ 71.994605] The buggy address belongs to the object at ffff8881061f7500 [ 71.994605] which belongs to the cache kmalloc-64 of size 64 [ 72.006943] The buggy address is located 0 bytes to the right of [ 72.006943] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 72.019806] [ 72.021306] The buggy address belongs to the physical page: [ 72.026878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 72.034886] flags: 0x200000000000000(node=0|zone=2) [ 72.039763] page_type: f5(slab) [ 72.042910] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 72.050651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.058397] page dumped because: kasan: bad access detected [ 72.063969] [ 72.065466] Memory state around the buggy address: [ 72.070262] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.077487] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.084722] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.091953] ^ [ 72.096746] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.103964] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.111183] ================================================================== [ 72.870251] ================================================================== [ 72.877478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 72.884872] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 72.892177] [ 72.893718] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 72.893725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.893728] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 72.893731] Call Trace: [ 72.893733] <TASK> [ 72.893734] dump_stack_lvl+0x73/0xb0 [ 72.893738] print_report+0xd1/0x650 [ 72.893742] ? __virt_addr_valid+0x1db/0x2d0 [ 72.893746] ? kasan_atomics_helper+0x4f98/0x5450 [ 72.893750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 72.893755] ? kasan_atomics_helper+0x4f98/0x5450 [ 72.893759] kasan_report+0x141/0x180 [ 72.893763] ? kasan_atomics_helper+0x4f98/0x5450 [ 72.893768] __asan_report_load8_noabort+0x18/0x20 [ 72.893772] kasan_atomics_helper+0x4f98/0x5450 [ 72.893777] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 72.893781] ? __kmalloc_cache_noprof+0x189/0x420 [ 72.893785] ? kasan_atomics+0x152/0x310 [ 72.893789] kasan_atomics+0x1dc/0x310 [ 72.893793] ? __pfx_kasan_atomics+0x10/0x10 [ 72.893797] ? ktime_get_ts64+0x83/0x230 [ 72.893802] kunit_try_run_case+0x1a2/0x480 [ 72.893806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.893810] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 72.893815] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 72.893820] ? __kthread_parkme+0x82/0x180 [ 72.893824] ? preempt_count_sub+0x50/0x80 [ 72.893829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.893834] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.893838] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 72.893842] kthread+0x334/0x6f0 [ 72.893846] ? trace_preempt_on+0x20/0xc0 [ 72.893851] ? __pfx_kthread+0x10/0x10 [ 72.893855] ? _raw_spin_unlock_irq+0x47/0x80 [ 72.893859] ? calculate_sigpending+0x7b/0xa0 [ 72.893863] ? __pfx_kthread+0x10/0x10 [ 72.893868] ret_from_fork+0x3e/0x80 [ 72.893872] ? __pfx_kthread+0x10/0x10 [ 72.893877] ret_from_fork_asm+0x1a/0x30 [ 72.893883] </TASK> [ 72.893884] [ 73.071458] Allocated by task 308: [ 73.074862] kasan_save_stack+0x45/0x70 [ 73.078708] kasan_save_track+0x18/0x40 [ 73.082567] kasan_save_alloc_info+0x3b/0x50 [ 73.086840] __kasan_kmalloc+0xb7/0xc0 [ 73.090593] __kmalloc_cache_noprof+0x189/0x420 [ 73.095133] kasan_atomics+0x95/0x310 [ 73.098798] kunit_try_run_case+0x1a2/0x480 [ 73.102983] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.108383] kthread+0x334/0x6f0 [ 73.111615] ret_from_fork+0x3e/0x80 [ 73.115196] ret_from_fork_asm+0x1a/0x30 [ 73.119122] [ 73.120619] The buggy address belongs to the object at ffff8881061f7500 [ 73.120619] which belongs to the cache kmalloc-64 of size 64 [ 73.132952] The buggy address is located 0 bytes to the right of [ 73.132952] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 73.145814] [ 73.147312] The buggy address belongs to the physical page: [ 73.152885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 73.160882] flags: 0x200000000000000(node=0|zone=2) [ 73.165763] page_type: f5(slab) [ 73.168910] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 73.176650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.184394] page dumped because: kasan: bad access detected [ 73.189968] [ 73.191468] Memory state around the buggy address: [ 73.196260] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.203479] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.210708] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.217953] ^ [ 73.222745] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.229972] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.237190] ================================================================== [ 70.556540] ================================================================== [ 70.563759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 70.571154] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 70.578552] [ 70.580053] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 70.580061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.580063] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 70.580066] Call Trace: [ 70.580068] <TASK> [ 70.580070] dump_stack_lvl+0x73/0xb0 [ 70.580074] print_report+0xd1/0x650 [ 70.580078] ? __virt_addr_valid+0x1db/0x2d0 [ 70.580082] ? kasan_atomics_helper+0x1e12/0x5450 [ 70.580086] ? kasan_complete_mode_report_info+0x2a/0x200 [ 70.580090] ? kasan_atomics_helper+0x1e12/0x5450 [ 70.580094] kasan_report+0x141/0x180 [ 70.580099] ? kasan_atomics_helper+0x1e12/0x5450 [ 70.580104] kasan_check_range+0x10c/0x1c0 [ 70.580109] __kasan_check_write+0x18/0x20 [ 70.580113] kasan_atomics_helper+0x1e12/0x5450 [ 70.580117] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 70.580121] ? __kmalloc_cache_noprof+0x189/0x420 [ 70.580125] ? kasan_atomics+0x152/0x310 [ 70.580129] kasan_atomics+0x1dc/0x310 [ 70.580133] ? __pfx_kasan_atomics+0x10/0x10 [ 70.580137] ? ktime_get_ts64+0x83/0x230 [ 70.580142] kunit_try_run_case+0x1a2/0x480 [ 70.580146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.580150] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 70.580155] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 70.580160] ? __kthread_parkme+0x82/0x180 [ 70.580164] ? preempt_count_sub+0x50/0x80 [ 70.580169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.580173] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.580178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 70.580182] kthread+0x334/0x6f0 [ 70.580186] ? trace_preempt_on+0x20/0xc0 [ 70.580191] ? __pfx_kthread+0x10/0x10 [ 70.580195] ? _raw_spin_unlock_irq+0x47/0x80 [ 70.580199] ? calculate_sigpending+0x7b/0xa0 [ 70.580203] ? __pfx_kthread+0x10/0x10 [ 70.580208] ret_from_fork+0x3e/0x80 [ 70.580212] ? __pfx_kthread+0x10/0x10 [ 70.580216] ret_from_fork_asm+0x1a/0x30 [ 70.580222] </TASK> [ 70.580224] [ 70.761246] Allocated by task 308: [ 70.764652] kasan_save_stack+0x45/0x70 [ 70.768491] kasan_save_track+0x18/0x40 [ 70.772330] kasan_save_alloc_info+0x3b/0x50 [ 70.776603] __kasan_kmalloc+0xb7/0xc0 [ 70.780357] __kmalloc_cache_noprof+0x189/0x420 [ 70.784889] kasan_atomics+0x95/0x310 [ 70.788556] kunit_try_run_case+0x1a2/0x480 [ 70.792749] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.798147] kthread+0x334/0x6f0 [ 70.801380] ret_from_fork+0x3e/0x80 [ 70.804960] ret_from_fork_asm+0x1a/0x30 [ 70.808887] [ 70.810384] The buggy address belongs to the object at ffff8881061f7500 [ 70.810384] which belongs to the cache kmalloc-64 of size 64 [ 70.822735] The buggy address is located 0 bytes to the right of [ 70.822735] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 70.835604] [ 70.837104] The buggy address belongs to the physical page: [ 70.842702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 70.850734] flags: 0x200000000000000(node=0|zone=2) [ 70.855613] page_type: f5(slab) [ 70.858760] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 70.866501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.874246] page dumped because: kasan: bad access detected [ 70.879819] [ 70.881318] Memory state around the buggy address: [ 70.886112] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.893339] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.900556] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.907775] ^ [ 70.912568] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.919788] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.927008] ================================================================== [ 63.768063] ================================================================== [ 63.775285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 63.782718] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 63.790034] [ 63.791533] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 63.791541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.791543] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 63.791546] Call Trace: [ 63.791548] <TASK> [ 63.791550] dump_stack_lvl+0x73/0xb0 [ 63.791553] print_report+0xd1/0x650 [ 63.791558] ? __virt_addr_valid+0x1db/0x2d0 [ 63.791562] ? kasan_atomics_helper+0x4eae/0x5450 [ 63.791566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 63.791570] ? kasan_atomics_helper+0x4eae/0x5450 [ 63.791574] kasan_report+0x141/0x180 [ 63.791579] ? kasan_atomics_helper+0x4eae/0x5450 [ 63.791584] __asan_report_load8_noabort+0x18/0x20 [ 63.791588] kasan_atomics_helper+0x4eae/0x5450 [ 63.791592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 63.791597] ? __kmalloc_cache_noprof+0x189/0x420 [ 63.791601] ? kasan_atomics+0x152/0x310 [ 63.791605] kasan_atomics+0x1dc/0x310 [ 63.791609] ? __pfx_kasan_atomics+0x10/0x10 [ 63.791612] ? ktime_get_ts64+0x83/0x230 [ 63.791617] kunit_try_run_case+0x1a2/0x480 [ 63.791622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.791626] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 63.791631] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 63.791636] ? __kthread_parkme+0x82/0x180 [ 63.791640] ? preempt_count_sub+0x50/0x80 [ 63.791645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.791650] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.791654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 63.791658] kthread+0x334/0x6f0 [ 63.791662] ? trace_preempt_on+0x20/0xc0 [ 63.791667] ? __pfx_kthread+0x10/0x10 [ 63.791689] ? _raw_spin_unlock_irq+0x47/0x80 [ 63.791693] ? calculate_sigpending+0x7b/0xa0 [ 63.791697] ? __pfx_kthread+0x10/0x10 [ 63.791702] ret_from_fork+0x3e/0x80 [ 63.791719] ? __pfx_kthread+0x10/0x10 [ 63.791723] ret_from_fork_asm+0x1a/0x30 [ 63.791729] </TASK> [ 63.791731] [ 63.969417] Allocated by task 308: [ 63.972822] kasan_save_stack+0x45/0x70 [ 63.976662] kasan_save_track+0x18/0x40 [ 63.980534] kasan_save_alloc_info+0x3b/0x50 [ 63.984809] __kasan_kmalloc+0xb7/0xc0 [ 63.988569] __kmalloc_cache_noprof+0x189/0x420 [ 63.993102] kasan_atomics+0x95/0x310 [ 63.996766] kunit_try_run_case+0x1a2/0x480 [ 64.000954] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.006362] kthread+0x334/0x6f0 [ 64.009601] ret_from_fork+0x3e/0x80 [ 64.013180] ret_from_fork_asm+0x1a/0x30 [ 64.017108] [ 64.018607] The buggy address belongs to the object at ffff8881061f7500 [ 64.018607] which belongs to the cache kmalloc-64 of size 64 [ 64.030948] The buggy address is located 0 bytes to the right of [ 64.030948] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 64.043817] [ 64.045317] The buggy address belongs to the physical page: [ 64.050888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 64.058888] flags: 0x200000000000000(node=0|zone=2) [ 64.063768] page_type: f5(slab) [ 64.066913] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 64.074653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.082398] page dumped because: kasan: bad access detected [ 64.087971] [ 64.089469] Memory state around the buggy address: [ 64.094262] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.101484] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.108710] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.115954] ^ [ 64.120748] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.127974] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.135193] ================================================================== [ 52.093859] ================================================================== [ 52.101106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 52.108505] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 52.115813] [ 52.117311] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 52.117318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.117321] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 52.117324] Call Trace: [ 52.117326] <TASK> [ 52.117328] dump_stack_lvl+0x73/0xb0 [ 52.117331] print_report+0xd1/0x650 [ 52.117336] ? __virt_addr_valid+0x1db/0x2d0 [ 52.117339] ? kasan_atomics_helper+0x4b54/0x5450 [ 52.117343] ? kasan_complete_mode_report_info+0x2a/0x200 [ 52.117348] ? kasan_atomics_helper+0x4b54/0x5450 [ 52.117352] kasan_report+0x141/0x180 [ 52.117357] ? kasan_atomics_helper+0x4b54/0x5450 [ 52.117362] __asan_report_load4_noabort+0x18/0x20 [ 52.117366] kasan_atomics_helper+0x4b54/0x5450 [ 52.117370] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 52.117375] ? __kmalloc_cache_noprof+0x189/0x420 [ 52.117379] ? kasan_atomics+0x152/0x310 [ 52.117383] kasan_atomics+0x1dc/0x310 [ 52.117386] ? __pfx_kasan_atomics+0x10/0x10 [ 52.117390] ? ktime_get_ts64+0x83/0x230 [ 52.117395] kunit_try_run_case+0x1a2/0x480 [ 52.117399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.117404] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 52.117409] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 52.117413] ? __kthread_parkme+0x82/0x180 [ 52.117418] ? preempt_count_sub+0x50/0x80 [ 52.117422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.117427] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.117431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 52.117436] kthread+0x334/0x6f0 [ 52.117440] ? trace_preempt_on+0x20/0xc0 [ 52.117444] ? __pfx_kthread+0x10/0x10 [ 52.117449] ? _raw_spin_unlock_irq+0x47/0x80 [ 52.117453] ? calculate_sigpending+0x7b/0xa0 [ 52.117457] ? __pfx_kthread+0x10/0x10 [ 52.117462] ret_from_fork+0x3e/0x80 [ 52.117466] ? __pfx_kthread+0x10/0x10 [ 52.117470] ret_from_fork_asm+0x1a/0x30 [ 52.117476] </TASK> [ 52.117478] [ 52.295134] Allocated by task 308: [ 52.298541] kasan_save_stack+0x45/0x70 [ 52.302387] kasan_save_track+0x18/0x40 [ 52.306226] kasan_save_alloc_info+0x3b/0x50 [ 52.310497] __kasan_kmalloc+0xb7/0xc0 [ 52.314251] __kmalloc_cache_noprof+0x189/0x420 [ 52.318784] kasan_atomics+0x95/0x310 [ 52.322448] kunit_try_run_case+0x1a2/0x480 [ 52.326637] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.332044] kthread+0x334/0x6f0 [ 52.335277] ret_from_fork+0x3e/0x80 [ 52.338864] ret_from_fork_asm+0x1a/0x30 [ 52.342799] [ 52.344298] The buggy address belongs to the object at ffff8881061f7500 [ 52.344298] which belongs to the cache kmalloc-64 of size 64 [ 52.356638] The buggy address is located 0 bytes to the right of [ 52.356638] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 52.369499] [ 52.370998] The buggy address belongs to the physical page: [ 52.376570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 52.384570] flags: 0x200000000000000(node=0|zone=2) [ 52.389447] page_type: f5(slab) [ 52.392596] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 52.400342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.408081] page dumped because: kasan: bad access detected [ 52.413653] [ 52.415152] Memory state around the buggy address: [ 52.419947] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.427172] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.434394] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.441620] ^ [ 52.446413] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.453632] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.460851] ================================================================== [ 59.253469] ================================================================== [ 59.260735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 59.268044] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 59.275436] [ 59.276930] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 59.276938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.276940] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 59.276943] Call Trace: [ 59.276945] <TASK> [ 59.276947] dump_stack_lvl+0x73/0xb0 [ 59.276950] print_report+0xd1/0x650 [ 59.276955] ? __virt_addr_valid+0x1db/0x2d0 [ 59.276958] ? kasan_atomics_helper+0xf10/0x5450 [ 59.276962] ? kasan_complete_mode_report_info+0x2a/0x200 [ 59.276967] ? kasan_atomics_helper+0xf10/0x5450 [ 59.276971] kasan_report+0x141/0x180 [ 59.276975] ? kasan_atomics_helper+0xf10/0x5450 [ 59.276980] kasan_check_range+0x10c/0x1c0 [ 59.276985] __kasan_check_write+0x18/0x20 [ 59.276989] kasan_atomics_helper+0xf10/0x5450 [ 59.276993] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 59.276998] ? __kmalloc_cache_noprof+0x189/0x420 [ 59.277002] ? kasan_atomics+0x152/0x310 [ 59.277006] kasan_atomics+0x1dc/0x310 [ 59.277009] ? __pfx_kasan_atomics+0x10/0x10 [ 59.277013] ? ktime_get_ts64+0x83/0x230 [ 59.277018] kunit_try_run_case+0x1a2/0x480 [ 59.277022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.277027] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 59.277031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 59.277036] ? __kthread_parkme+0x82/0x180 [ 59.277040] ? preempt_count_sub+0x50/0x80 [ 59.277045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.277050] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.277054] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 59.277058] kthread+0x334/0x6f0 [ 59.277063] ? trace_preempt_on+0x20/0xc0 [ 59.277067] ? __pfx_kthread+0x10/0x10 [ 59.277072] ? _raw_spin_unlock_irq+0x47/0x80 [ 59.277076] ? calculate_sigpending+0x7b/0xa0 [ 59.277080] ? __pfx_kthread+0x10/0x10 [ 59.277084] ret_from_fork+0x3e/0x80 [ 59.277089] ? __pfx_kthread+0x10/0x10 [ 59.277093] ret_from_fork_asm+0x1a/0x30 [ 59.277099] </TASK> [ 59.277101] [ 59.457837] Allocated by task 308: [ 59.461242] kasan_save_stack+0x45/0x70 [ 59.465081] kasan_save_track+0x18/0x40 [ 59.468922] kasan_save_alloc_info+0x3b/0x50 [ 59.473194] __kasan_kmalloc+0xb7/0xc0 [ 59.476947] __kmalloc_cache_noprof+0x189/0x420 [ 59.481477] kasan_atomics+0x95/0x310 [ 59.485144] kunit_try_run_case+0x1a2/0x480 [ 59.489329] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.494735] kthread+0x334/0x6f0 [ 59.497969] ret_from_fork+0x3e/0x80 [ 59.501548] ret_from_fork_asm+0x1a/0x30 [ 59.505475] [ 59.506974] The buggy address belongs to the object at ffff8881061f7500 [ 59.506974] which belongs to the cache kmalloc-64 of size 64 [ 59.519317] The buggy address is located 0 bytes to the right of [ 59.519317] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 59.532186] [ 59.533703] The buggy address belongs to the physical page: [ 59.539299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 59.547297] flags: 0x200000000000000(node=0|zone=2) [ 59.552179] page_type: f5(slab) [ 59.555324] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 59.563064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.570810] page dumped because: kasan: bad access detected [ 59.576382] [ 59.577882] Memory state around the buggy address: [ 59.582692] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.589945] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.597165] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.604393] ^ [ 59.609186] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.616413] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.623630] ================================================================== [ 69.426875] ================================================================== [ 69.434105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 69.441503] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 69.448811] [ 69.450309] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 69.450317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.450319] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 69.450322] Call Trace: [ 69.450324] <TASK> [ 69.450326] dump_stack_lvl+0x73/0xb0 [ 69.450330] print_report+0xd1/0x650 [ 69.450334] ? __virt_addr_valid+0x1db/0x2d0 [ 69.450338] ? kasan_atomics_helper+0x4f30/0x5450 [ 69.450342] ? kasan_complete_mode_report_info+0x2a/0x200 [ 69.450346] ? kasan_atomics_helper+0x4f30/0x5450 [ 69.450350] kasan_report+0x141/0x180 [ 69.450355] ? kasan_atomics_helper+0x4f30/0x5450 [ 69.450360] __asan_report_load8_noabort+0x18/0x20 [ 69.450364] kasan_atomics_helper+0x4f30/0x5450 [ 69.450368] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 69.450373] ? __kmalloc_cache_noprof+0x189/0x420 [ 69.450377] ? kasan_atomics+0x152/0x310 [ 69.450381] kasan_atomics+0x1dc/0x310 [ 69.450384] ? __pfx_kasan_atomics+0x10/0x10 [ 69.450388] ? ktime_get_ts64+0x83/0x230 [ 69.450393] kunit_try_run_case+0x1a2/0x480 [ 69.450397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.450401] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 69.450406] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 69.450411] ? __kthread_parkme+0x82/0x180 [ 69.450415] ? preempt_count_sub+0x50/0x80 [ 69.450420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.450424] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.450429] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 69.450433] kthread+0x334/0x6f0 [ 69.450437] ? trace_preempt_on+0x20/0xc0 [ 69.450441] ? __pfx_kthread+0x10/0x10 [ 69.450446] ? _raw_spin_unlock_irq+0x47/0x80 [ 69.450450] ? calculate_sigpending+0x7b/0xa0 [ 69.450454] ? __pfx_kthread+0x10/0x10 [ 69.450459] ret_from_fork+0x3e/0x80 [ 69.450463] ? __pfx_kthread+0x10/0x10 [ 69.450467] ret_from_fork_asm+0x1a/0x30 [ 69.450473] </TASK> [ 69.450475] [ 69.628106] Allocated by task 308: [ 69.631513] kasan_save_stack+0x45/0x70 [ 69.635360] kasan_save_track+0x18/0x40 [ 69.639199] kasan_save_alloc_info+0x3b/0x50 [ 69.643471] __kasan_kmalloc+0xb7/0xc0 [ 69.647224] __kmalloc_cache_noprof+0x189/0x420 [ 69.651757] kasan_atomics+0x95/0x310 [ 69.655423] kunit_try_run_case+0x1a2/0x480 [ 69.659608] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.665009] kthread+0x334/0x6f0 [ 69.668250] ret_from_fork+0x3e/0x80 [ 69.671835] ret_from_fork_asm+0x1a/0x30 [ 69.675761] [ 69.677261] The buggy address belongs to the object at ffff8881061f7500 [ 69.677261] which belongs to the cache kmalloc-64 of size 64 [ 69.689603] The buggy address is located 0 bytes to the right of [ 69.689603] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 69.702471] [ 69.703971] The buggy address belongs to the physical page: [ 69.709542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 69.717543] flags: 0x200000000000000(node=0|zone=2) [ 69.722420] page_type: f5(slab) [ 69.725569] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 69.733315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.741055] page dumped because: kasan: bad access detected [ 69.746626] [ 69.748125] Memory state around the buggy address: [ 69.752919] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.760145] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.767364] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.774583] ^ [ 69.779377] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.786596] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.793814] ================================================================== [ 73.996520] ================================================================== [ 74.003744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 74.011139] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 74.018533] [ 74.020031] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 74.020039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.020041] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 74.020045] Call Trace: [ 74.020046] <TASK> [ 74.020048] dump_stack_lvl+0x73/0xb0 [ 74.020052] print_report+0xd1/0x650 [ 74.020056] ? __virt_addr_valid+0x1db/0x2d0 [ 74.020060] ? kasan_atomics_helper+0x218a/0x5450 [ 74.020064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 74.020069] ? kasan_atomics_helper+0x218a/0x5450 [ 74.020073] kasan_report+0x141/0x180 [ 74.020077] ? kasan_atomics_helper+0x218a/0x5450 [ 74.020082] kasan_check_range+0x10c/0x1c0 [ 74.020087] __kasan_check_write+0x18/0x20 [ 74.020091] kasan_atomics_helper+0x218a/0x5450 [ 74.020096] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 74.020100] ? __kmalloc_cache_noprof+0x189/0x420 [ 74.020104] ? kasan_atomics+0x152/0x310 [ 74.020108] kasan_atomics+0x1dc/0x310 [ 74.020112] ? __pfx_kasan_atomics+0x10/0x10 [ 74.020116] ? ktime_get_ts64+0x83/0x230 [ 74.020120] kunit_try_run_case+0x1a2/0x480 [ 74.020125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.020129] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 74.020134] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 74.020139] ? __kthread_parkme+0x82/0x180 [ 74.020143] ? preempt_count_sub+0x50/0x80 [ 74.020148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.020153] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.020157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 74.020161] kthread+0x334/0x6f0 [ 74.020165] ? trace_preempt_on+0x20/0xc0 [ 74.020170] ? __pfx_kthread+0x10/0x10 [ 74.020174] ? _raw_spin_unlock_irq+0x47/0x80 [ 74.020179] ? calculate_sigpending+0x7b/0xa0 [ 74.020183] ? __pfx_kthread+0x10/0x10 [ 74.020187] ret_from_fork+0x3e/0x80 [ 74.020192] ? __pfx_kthread+0x10/0x10 [ 74.020196] ret_from_fork_asm+0x1a/0x30 [ 74.020202] </TASK> [ 74.020204] [ 74.201217] Allocated by task 308: [ 74.204622] kasan_save_stack+0x45/0x70 [ 74.208461] kasan_save_track+0x18/0x40 [ 74.212301] kasan_save_alloc_info+0x3b/0x50 [ 74.216572] __kasan_kmalloc+0xb7/0xc0 [ 74.220325] __kmalloc_cache_noprof+0x189/0x420 [ 74.224860] kasan_atomics+0x95/0x310 [ 74.228533] kunit_try_run_case+0x1a2/0x480 [ 74.232734] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.238136] kthread+0x334/0x6f0 [ 74.241367] ret_from_fork+0x3e/0x80 [ 74.244948] ret_from_fork_asm+0x1a/0x30 [ 74.248880] [ 74.250380] The buggy address belongs to the object at ffff8881061f7500 [ 74.250380] which belongs to the cache kmalloc-64 of size 64 [ 74.262741] The buggy address is located 0 bytes to the right of [ 74.262741] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 74.275607] [ 74.277107] The buggy address belongs to the physical page: [ 74.282706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 74.290733] flags: 0x200000000000000(node=0|zone=2) [ 74.295618] page_type: f5(slab) [ 74.298765] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 74.306505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.314244] page dumped because: kasan: bad access detected [ 74.319814] [ 74.321315] Memory state around the buggy address: [ 74.326107] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.333325] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.340545] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.347762] ^ [ 74.352555] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.359774] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.366996] ================================================================== [ 68.293583] ================================================================== [ 68.300800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 68.308198] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 68.315593] [ 68.317094] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 68.317101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.317104] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 68.317107] Call Trace: [ 68.317109] <TASK> [ 68.317111] dump_stack_lvl+0x73/0xb0 [ 68.317114] print_report+0xd1/0x650 [ 68.317119] ? __virt_addr_valid+0x1db/0x2d0 [ 68.317123] ? kasan_atomics_helper+0x1a7f/0x5450 [ 68.317127] ? kasan_complete_mode_report_info+0x2a/0x200 [ 68.317131] ? kasan_atomics_helper+0x1a7f/0x5450 [ 68.317135] kasan_report+0x141/0x180 [ 68.317140] ? kasan_atomics_helper+0x1a7f/0x5450 [ 68.317145] kasan_check_range+0x10c/0x1c0 [ 68.317150] __kasan_check_write+0x18/0x20 [ 68.317154] kasan_atomics_helper+0x1a7f/0x5450 [ 68.317158] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 68.317163] ? __kmalloc_cache_noprof+0x189/0x420 [ 68.317167] ? kasan_atomics+0x152/0x310 [ 68.317171] kasan_atomics+0x1dc/0x310 [ 68.317174] ? __pfx_kasan_atomics+0x10/0x10 [ 68.317178] ? ktime_get_ts64+0x83/0x230 [ 68.317183] kunit_try_run_case+0x1a2/0x480 [ 68.317188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.317192] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 68.317197] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 68.317202] ? __kthread_parkme+0x82/0x180 [ 68.317206] ? preempt_count_sub+0x50/0x80 [ 68.317211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.317215] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.317219] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 68.317224] kthread+0x334/0x6f0 [ 68.317228] ? trace_preempt_on+0x20/0xc0 [ 68.317233] ? __pfx_kthread+0x10/0x10 [ 68.317237] ? _raw_spin_unlock_irq+0x47/0x80 [ 68.317241] ? calculate_sigpending+0x7b/0xa0 [ 68.317246] ? __pfx_kthread+0x10/0x10 [ 68.317250] ret_from_fork+0x3e/0x80 [ 68.317254] ? __pfx_kthread+0x10/0x10 [ 68.317259] ret_from_fork_asm+0x1a/0x30 [ 68.317265] </TASK> [ 68.317267] [ 68.498302] Allocated by task 308: [ 68.501721] kasan_save_stack+0x45/0x70 [ 68.505574] kasan_save_track+0x18/0x40 [ 68.509412] kasan_save_alloc_info+0x3b/0x50 [ 68.513707] __kasan_kmalloc+0xb7/0xc0 [ 68.517481] __kmalloc_cache_noprof+0x189/0x420 [ 68.522013] kasan_atomics+0x95/0x310 [ 68.525720] kunit_try_run_case+0x1a2/0x480 [ 68.529916] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.535315] kthread+0x334/0x6f0 [ 68.538549] ret_from_fork+0x3e/0x80 [ 68.542128] ret_from_fork_asm+0x1a/0x30 [ 68.546054] [ 68.547553] The buggy address belongs to the object at ffff8881061f7500 [ 68.547553] which belongs to the cache kmalloc-64 of size 64 [ 68.559895] The buggy address is located 0 bytes to the right of [ 68.559895] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 68.572755] [ 68.574253] The buggy address belongs to the physical page: [ 68.579827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 68.587835] flags: 0x200000000000000(node=0|zone=2) [ 68.592745] page_type: f5(slab) [ 68.595896] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 68.603643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.611389] page dumped because: kasan: bad access detected [ 68.616961] [ 68.618462] Memory state around the buggy address: [ 68.623254] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.630472] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.637719] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.644944] ^ [ 68.649746] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.656967] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.664193] ================================================================== [ 75.126181] ================================================================== [ 75.133411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 75.140804] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 75.148112] [ 75.149610] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 75.149617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.149619] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 75.149623] Call Trace: [ 75.149624] <TASK> [ 75.149626] dump_stack_lvl+0x73/0xb0 [ 75.149630] print_report+0xd1/0x650 [ 75.149634] ? __virt_addr_valid+0x1db/0x2d0 [ 75.149638] ? kasan_atomics_helper+0x5115/0x5450 [ 75.149642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 75.149646] ? kasan_atomics_helper+0x5115/0x5450 [ 75.149651] kasan_report+0x141/0x180 [ 75.149655] ? kasan_atomics_helper+0x5115/0x5450 [ 75.149660] __asan_report_load8_noabort+0x18/0x20 [ 75.149664] kasan_atomics_helper+0x5115/0x5450 [ 75.149668] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 75.149673] ? __kmalloc_cache_noprof+0x189/0x420 [ 75.149694] ? kasan_atomics+0x152/0x310 [ 75.149698] kasan_atomics+0x1dc/0x310 [ 75.149702] ? __pfx_kasan_atomics+0x10/0x10 [ 75.149706] ? ktime_get_ts64+0x83/0x230 [ 75.149723] kunit_try_run_case+0x1a2/0x480 [ 75.149728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.149732] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 75.149737] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 75.149742] ? __kthread_parkme+0x82/0x180 [ 75.149746] ? preempt_count_sub+0x50/0x80 [ 75.149751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.149755] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.149759] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 75.149764] kthread+0x334/0x6f0 [ 75.149768] ? trace_preempt_on+0x20/0xc0 [ 75.149772] ? __pfx_kthread+0x10/0x10 [ 75.149777] ? _raw_spin_unlock_irq+0x47/0x80 [ 75.149781] ? calculate_sigpending+0x7b/0xa0 [ 75.149785] ? __pfx_kthread+0x10/0x10 [ 75.149790] ret_from_fork+0x3e/0x80 [ 75.149794] ? __pfx_kthread+0x10/0x10 [ 75.149798] ret_from_fork_asm+0x1a/0x30 [ 75.149804] </TASK> [ 75.149806] [ 75.327475] Allocated by task 308: [ 75.330883] kasan_save_stack+0x45/0x70 [ 75.334750] kasan_save_track+0x18/0x40 [ 75.338596] kasan_save_alloc_info+0x3b/0x50 [ 75.342868] __kasan_kmalloc+0xb7/0xc0 [ 75.346618] __kmalloc_cache_noprof+0x189/0x420 [ 75.351154] kasan_atomics+0x95/0x310 [ 75.354817] kunit_try_run_case+0x1a2/0x480 [ 75.359003] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.364405] kthread+0x334/0x6f0 [ 75.367644] ret_from_fork+0x3e/0x80 [ 75.371223] ret_from_fork_asm+0x1a/0x30 [ 75.375151] [ 75.376650] The buggy address belongs to the object at ffff8881061f7500 [ 75.376650] which belongs to the cache kmalloc-64 of size 64 [ 75.388991] The buggy address is located 0 bytes to the right of [ 75.388991] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 75.401859] [ 75.403359] The buggy address belongs to the physical page: [ 75.408931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 75.416939] flags: 0x200000000000000(node=0|zone=2) [ 75.421818] page_type: f5(slab) [ 75.424965] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 75.432724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.440475] page dumped because: kasan: bad access detected [ 75.446049] [ 75.447547] Memory state around the buggy address: [ 75.452340] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.459560] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.466777] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.473996] ^ [ 75.478788] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.486010] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.493235] ================================================================== [ 63.016352] ================================================================== [ 63.023571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 63.030965] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 63.038279] [ 63.039779] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 63.039786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.039789] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 63.039792] Call Trace: [ 63.039794] <TASK> [ 63.039796] dump_stack_lvl+0x73/0xb0 [ 63.039799] print_report+0xd1/0x650 [ 63.039803] ? __virt_addr_valid+0x1db/0x2d0 [ 63.039807] ? kasan_atomics_helper+0x49ce/0x5450 [ 63.039811] ? kasan_complete_mode_report_info+0x2a/0x200 [ 63.039816] ? kasan_atomics_helper+0x49ce/0x5450 [ 63.039820] kasan_report+0x141/0x180 [ 63.039824] ? kasan_atomics_helper+0x49ce/0x5450 [ 63.039829] __asan_report_load4_noabort+0x18/0x20 [ 63.039833] kasan_atomics_helper+0x49ce/0x5450 [ 63.039838] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 63.039842] ? __kmalloc_cache_noprof+0x189/0x420 [ 63.039846] ? kasan_atomics+0x152/0x310 [ 63.039850] kasan_atomics+0x1dc/0x310 [ 63.039854] ? __pfx_kasan_atomics+0x10/0x10 [ 63.039857] ? ktime_get_ts64+0x83/0x230 [ 63.039862] kunit_try_run_case+0x1a2/0x480 [ 63.039867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.039871] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 63.039876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 63.039881] ? __kthread_parkme+0x82/0x180 [ 63.039885] ? preempt_count_sub+0x50/0x80 [ 63.039890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.039894] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.039899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 63.039903] kthread+0x334/0x6f0 [ 63.039907] ? trace_preempt_on+0x20/0xc0 [ 63.039912] ? __pfx_kthread+0x10/0x10 [ 63.039916] ? _raw_spin_unlock_irq+0x47/0x80 [ 63.039920] ? calculate_sigpending+0x7b/0xa0 [ 63.039924] ? __pfx_kthread+0x10/0x10 [ 63.039929] ret_from_fork+0x3e/0x80 [ 63.039933] ? __pfx_kthread+0x10/0x10 [ 63.039937] ret_from_fork_asm+0x1a/0x30 [ 63.039943] </TASK> [ 63.039945] [ 63.217461] Allocated by task 308: [ 63.220868] kasan_save_stack+0x45/0x70 [ 63.224706] kasan_save_track+0x18/0x40 [ 63.228571] kasan_save_alloc_info+0x3b/0x50 [ 63.232844] __kasan_kmalloc+0xb7/0xc0 [ 63.236598] __kmalloc_cache_noprof+0x189/0x420 [ 63.241130] kasan_atomics+0x95/0x310 [ 63.244796] kunit_try_run_case+0x1a2/0x480 [ 63.248991] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.254398] kthread+0x334/0x6f0 [ 63.257631] ret_from_fork+0x3e/0x80 [ 63.261219] ret_from_fork_asm+0x1a/0x30 [ 63.265151] [ 63.266651] The buggy address belongs to the object at ffff8881061f7500 [ 63.266651] which belongs to the cache kmalloc-64 of size 64 [ 63.278993] The buggy address is located 0 bytes to the right of [ 63.278993] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 63.291861] [ 63.293362] The buggy address belongs to the physical page: [ 63.298935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 63.306940] flags: 0x200000000000000(node=0|zone=2) [ 63.311819] page_type: f5(slab) [ 63.314968] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 63.322726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.330480] page dumped because: kasan: bad access detected [ 63.336050] [ 63.337551] Memory state around the buggy address: [ 63.342343] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.349562] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.356781] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.363998] ^ [ 63.368794] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.376020] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.383239] ================================================================== [ 58.876248] ================================================================== [ 58.883480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 58.890786] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 58.898176] [ 58.899718] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 58.899726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.899728] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 58.899732] Call Trace: [ 58.899733] <TASK> [ 58.899735] dump_stack_lvl+0x73/0xb0 [ 58.899739] print_report+0xd1/0x650 [ 58.899743] ? __virt_addr_valid+0x1db/0x2d0 [ 58.899747] ? kasan_atomics_helper+0xe78/0x5450 [ 58.899751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 58.899755] ? kasan_atomics_helper+0xe78/0x5450 [ 58.899760] kasan_report+0x141/0x180 [ 58.899764] ? kasan_atomics_helper+0xe78/0x5450 [ 58.899769] kasan_check_range+0x10c/0x1c0 [ 58.899774] __kasan_check_write+0x18/0x20 [ 58.899778] kasan_atomics_helper+0xe78/0x5450 [ 58.899782] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 58.899786] ? __kmalloc_cache_noprof+0x189/0x420 [ 58.899790] ? kasan_atomics+0x152/0x310 [ 58.899794] kasan_atomics+0x1dc/0x310 [ 58.899798] ? __pfx_kasan_atomics+0x10/0x10 [ 58.899802] ? ktime_get_ts64+0x83/0x230 [ 58.899806] kunit_try_run_case+0x1a2/0x480 [ 58.899811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.899815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 58.899820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 58.899825] ? __kthread_parkme+0x82/0x180 [ 58.899829] ? preempt_count_sub+0x50/0x80 [ 58.899834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.899838] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.899842] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 58.899846] kthread+0x334/0x6f0 [ 58.899850] ? trace_preempt_on+0x20/0xc0 [ 58.899855] ? __pfx_kthread+0x10/0x10 [ 58.899859] ? _raw_spin_unlock_irq+0x47/0x80 [ 58.899863] ? calculate_sigpending+0x7b/0xa0 [ 58.899867] ? __pfx_kthread+0x10/0x10 [ 58.899872] ret_from_fork+0x3e/0x80 [ 58.899876] ? __pfx_kthread+0x10/0x10 [ 58.899880] ret_from_fork_asm+0x1a/0x30 [ 58.899886] </TASK> [ 58.899888] [ 59.080508] Allocated by task 308: [ 59.083915] kasan_save_stack+0x45/0x70 [ 59.087763] kasan_save_track+0x18/0x40 [ 59.091609] kasan_save_alloc_info+0x3b/0x50 [ 59.095880] __kasan_kmalloc+0xb7/0xc0 [ 59.099635] __kmalloc_cache_noprof+0x189/0x420 [ 59.104175] kasan_atomics+0x95/0x310 [ 59.107840] kunit_try_run_case+0x1a2/0x480 [ 59.112027] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.117426] kthread+0x334/0x6f0 [ 59.120657] ret_from_fork+0x3e/0x80 [ 59.124236] ret_from_fork_asm+0x1a/0x30 [ 59.128164] [ 59.129664] The buggy address belongs to the object at ffff8881061f7500 [ 59.129664] which belongs to the cache kmalloc-64 of size 64 [ 59.142021] The buggy address is located 0 bytes to the right of [ 59.142021] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 59.154880] [ 59.156382] The buggy address belongs to the physical page: [ 59.161955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 59.169961] flags: 0x200000000000000(node=0|zone=2) [ 59.174841] page_type: f5(slab) [ 59.177988] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 59.185742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.193480] page dumped because: kasan: bad access detected [ 59.199052] [ 59.200552] Memory state around the buggy address: [ 59.205346] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.212564] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.219782] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.227002] ^ [ 59.231795] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.239015] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.246241] ================================================================== [ 62.264278] ================================================================== [ 62.271513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 62.278907] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 62.286219] [ 62.287738] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 62.287745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.287747] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 62.287751] Call Trace: [ 62.287752] <TASK> [ 62.287754] dump_stack_lvl+0x73/0xb0 [ 62.287758] print_report+0xd1/0x650 [ 62.287762] ? __virt_addr_valid+0x1db/0x2d0 [ 62.287766] ? kasan_atomics_helper+0x49e8/0x5450 [ 62.287770] ? kasan_complete_mode_report_info+0x2a/0x200 [ 62.287774] ? kasan_atomics_helper+0x49e8/0x5450 [ 62.287778] kasan_report+0x141/0x180 [ 62.287783] ? kasan_atomics_helper+0x49e8/0x5450 [ 62.287788] __asan_report_load4_noabort+0x18/0x20 [ 62.287792] kasan_atomics_helper+0x49e8/0x5450 [ 62.287796] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 62.287801] ? __kmalloc_cache_noprof+0x189/0x420 [ 62.287805] ? kasan_atomics+0x152/0x310 [ 62.287809] kasan_atomics+0x1dc/0x310 [ 62.287812] ? __pfx_kasan_atomics+0x10/0x10 [ 62.287816] ? ktime_get_ts64+0x83/0x230 [ 62.287821] kunit_try_run_case+0x1a2/0x480 [ 62.287825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.287830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 62.287834] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 62.287839] ? __kthread_parkme+0x82/0x180 [ 62.287843] ? preempt_count_sub+0x50/0x80 [ 62.287848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.287852] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.287857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 62.287861] kthread+0x334/0x6f0 [ 62.287865] ? trace_preempt_on+0x20/0xc0 [ 62.287869] ? __pfx_kthread+0x10/0x10 [ 62.287874] ? _raw_spin_unlock_irq+0x47/0x80 [ 62.287878] ? calculate_sigpending+0x7b/0xa0 [ 62.287882] ? __pfx_kthread+0x10/0x10 [ 62.287887] ret_from_fork+0x3e/0x80 [ 62.287891] ? __pfx_kthread+0x10/0x10 [ 62.287895] ret_from_fork_asm+0x1a/0x30 [ 62.287901] </TASK> [ 62.287903] [ 62.465473] Allocated by task 308: [ 62.468878] kasan_save_stack+0x45/0x70 [ 62.472734] kasan_save_track+0x18/0x40 [ 62.476573] kasan_save_alloc_info+0x3b/0x50 [ 62.480848] __kasan_kmalloc+0xb7/0xc0 [ 62.484608] __kmalloc_cache_noprof+0x189/0x420 [ 62.489140] kasan_atomics+0x95/0x310 [ 62.492805] kunit_try_run_case+0x1a2/0x480 [ 62.496991] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.502393] kthread+0x334/0x6f0 [ 62.505632] ret_from_fork+0x3e/0x80 [ 62.509212] ret_from_fork_asm+0x1a/0x30 [ 62.513137] [ 62.514638] The buggy address belongs to the object at ffff8881061f7500 [ 62.514638] which belongs to the cache kmalloc-64 of size 64 [ 62.526977] The buggy address is located 0 bytes to the right of [ 62.526977] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 62.539840] [ 62.541337] The buggy address belongs to the physical page: [ 62.546910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 62.554918] flags: 0x200000000000000(node=0|zone=2) [ 62.559798] page_type: f5(slab) [ 62.562942] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 62.570705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.578465] page dumped because: kasan: bad access detected [ 62.584045] [ 62.585545] Memory state around the buggy address: [ 62.590338] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.597563] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.604782] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.612003] ^ [ 62.616793] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.624015] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.631240] ================================================================== [ 65.272073] ================================================================== [ 65.279305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 65.286707] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 65.294124] [ 65.295626] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 65.295634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.295636] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 65.295639] Call Trace: [ 65.295641] <TASK> [ 65.295643] dump_stack_lvl+0x73/0xb0 [ 65.295646] print_report+0xd1/0x650 [ 65.295651] ? __virt_addr_valid+0x1db/0x2d0 [ 65.295655] ? kasan_atomics_helper+0x15b6/0x5450 [ 65.295659] ? kasan_complete_mode_report_info+0x2a/0x200 [ 65.295663] ? kasan_atomics_helper+0x15b6/0x5450 [ 65.295668] kasan_report+0x141/0x180 [ 65.295689] ? kasan_atomics_helper+0x15b6/0x5450 [ 65.295694] kasan_check_range+0x10c/0x1c0 [ 65.295700] __kasan_check_write+0x18/0x20 [ 65.295703] kasan_atomics_helper+0x15b6/0x5450 [ 65.295720] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 65.295725] ? __kmalloc_cache_noprof+0x189/0x420 [ 65.295729] ? kasan_atomics+0x152/0x310 [ 65.295733] kasan_atomics+0x1dc/0x310 [ 65.295736] ? __pfx_kasan_atomics+0x10/0x10 [ 65.295740] ? ktime_get_ts64+0x83/0x230 [ 65.295745] kunit_try_run_case+0x1a2/0x480 [ 65.295750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.295754] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 65.295759] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 65.295764] ? __kthread_parkme+0x82/0x180 [ 65.295768] ? preempt_count_sub+0x50/0x80 [ 65.295773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.295777] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.295781] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 65.295786] kthread+0x334/0x6f0 [ 65.295790] ? trace_preempt_on+0x20/0xc0 [ 65.295794] ? __pfx_kthread+0x10/0x10 [ 65.295799] ? _raw_spin_unlock_irq+0x47/0x80 [ 65.295803] ? calculate_sigpending+0x7b/0xa0 [ 65.295807] ? __pfx_kthread+0x10/0x10 [ 65.295812] ret_from_fork+0x3e/0x80 [ 65.295816] ? __pfx_kthread+0x10/0x10 [ 65.295820] ret_from_fork_asm+0x1a/0x30 [ 65.295826] </TASK> [ 65.295828] [ 65.476862] Allocated by task 308: [ 65.480266] kasan_save_stack+0x45/0x70 [ 65.484107] kasan_save_track+0x18/0x40 [ 65.487946] kasan_save_alloc_info+0x3b/0x50 [ 65.492217] __kasan_kmalloc+0xb7/0xc0 [ 65.495972] __kmalloc_cache_noprof+0x189/0x420 [ 65.500504] kasan_atomics+0x95/0x310 [ 65.504170] kunit_try_run_case+0x1a2/0x480 [ 65.508365] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.513770] kthread+0x334/0x6f0 [ 65.517002] ret_from_fork+0x3e/0x80 [ 65.520583] ret_from_fork_asm+0x1a/0x30 [ 65.524509] [ 65.526008] The buggy address belongs to the object at ffff8881061f7500 [ 65.526008] which belongs to the cache kmalloc-64 of size 64 [ 65.538348] The buggy address is located 0 bytes to the right of [ 65.538348] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 65.551209] [ 65.552707] The buggy address belongs to the physical page: [ 65.558308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 65.566316] flags: 0x200000000000000(node=0|zone=2) [ 65.571194] page_type: f5(slab) [ 65.574342] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 65.582089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.589834] page dumped because: kasan: bad access detected [ 65.595406] [ 65.596907] Memory state around the buggy address: [ 65.601706] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.608926] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.616147] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.623374] ^ [ 65.628166] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.635385] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.642605] ================================================================== [ 66.027453] ================================================================== [ 66.034720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 66.042117] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 66.049512] [ 66.051011] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 66.051018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.051020] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 66.051024] Call Trace: [ 66.051025] <TASK> [ 66.051027] dump_stack_lvl+0x73/0xb0 [ 66.051031] print_report+0xd1/0x650 [ 66.051035] ? __virt_addr_valid+0x1db/0x2d0 [ 66.051039] ? kasan_atomics_helper+0x16e7/0x5450 [ 66.051043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 66.051047] ? kasan_atomics_helper+0x16e7/0x5450 [ 66.051052] kasan_report+0x141/0x180 [ 66.051056] ? kasan_atomics_helper+0x16e7/0x5450 [ 66.051061] kasan_check_range+0x10c/0x1c0 [ 66.051066] __kasan_check_write+0x18/0x20 [ 66.051070] kasan_atomics_helper+0x16e7/0x5450 [ 66.051074] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 66.051079] ? __kmalloc_cache_noprof+0x189/0x420 [ 66.051083] ? kasan_atomics+0x152/0x310 [ 66.051087] kasan_atomics+0x1dc/0x310 [ 66.051090] ? __pfx_kasan_atomics+0x10/0x10 [ 66.051094] ? ktime_get_ts64+0x83/0x230 [ 66.051099] kunit_try_run_case+0x1a2/0x480 [ 66.051104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.051108] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 66.051113] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 66.051118] ? __kthread_parkme+0x82/0x180 [ 66.051122] ? preempt_count_sub+0x50/0x80 [ 66.051127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.051131] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.051135] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 66.051140] kthread+0x334/0x6f0 [ 66.051144] ? trace_preempt_on+0x20/0xc0 [ 66.051148] ? __pfx_kthread+0x10/0x10 [ 66.051153] ? _raw_spin_unlock_irq+0x47/0x80 [ 66.051157] ? calculate_sigpending+0x7b/0xa0 [ 66.051161] ? __pfx_kthread+0x10/0x10 [ 66.051166] ret_from_fork+0x3e/0x80 [ 66.051170] ? __pfx_kthread+0x10/0x10 [ 66.051175] ret_from_fork_asm+0x1a/0x30 [ 66.051180] </TASK> [ 66.051182] [ 66.232154] Allocated by task 308: [ 66.235560] kasan_save_stack+0x45/0x70 [ 66.239405] kasan_save_track+0x18/0x40 [ 66.243247] kasan_save_alloc_info+0x3b/0x50 [ 66.247518] __kasan_kmalloc+0xb7/0xc0 [ 66.251270] __kmalloc_cache_noprof+0x189/0x420 [ 66.255803] kasan_atomics+0x95/0x310 [ 66.259468] kunit_try_run_case+0x1a2/0x480 [ 66.263655] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.269054] kthread+0x334/0x6f0 [ 66.272285] ret_from_fork+0x3e/0x80 [ 66.275866] ret_from_fork_asm+0x1a/0x30 [ 66.279800] [ 66.281299] The buggy address belongs to the object at ffff8881061f7500 [ 66.281299] which belongs to the cache kmalloc-64 of size 64 [ 66.293639] The buggy address is located 0 bytes to the right of [ 66.293639] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 66.306501] [ 66.307999] The buggy address belongs to the physical page: [ 66.313572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 66.321571] flags: 0x200000000000000(node=0|zone=2) [ 66.326451] page_type: f5(slab) [ 66.329598] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 66.337343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.345083] page dumped because: kasan: bad access detected [ 66.350655] [ 66.352155] Memory state around the buggy address: [ 66.356949] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.364176] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.371401] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.378622] ^ [ 66.383412] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.390633] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.397853] ================================================================== [ 65.649830] ================================================================== [ 65.657077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 65.664470] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 65.671871] [ 65.673369] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 65.673376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.673378] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 65.673382] Call Trace: [ 65.673383] <TASK> [ 65.673385] dump_stack_lvl+0x73/0xb0 [ 65.673389] print_report+0xd1/0x650 [ 65.673393] ? __virt_addr_valid+0x1db/0x2d0 [ 65.673397] ? kasan_atomics_helper+0x164f/0x5450 [ 65.673401] ? kasan_complete_mode_report_info+0x2a/0x200 [ 65.673405] ? kasan_atomics_helper+0x164f/0x5450 [ 65.673409] kasan_report+0x141/0x180 [ 65.673414] ? kasan_atomics_helper+0x164f/0x5450 [ 65.673419] kasan_check_range+0x10c/0x1c0 [ 65.673424] __kasan_check_write+0x18/0x20 [ 65.673428] kasan_atomics_helper+0x164f/0x5450 [ 65.673432] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 65.673436] ? __kmalloc_cache_noprof+0x189/0x420 [ 65.673440] ? kasan_atomics+0x152/0x310 [ 65.673445] kasan_atomics+0x1dc/0x310 [ 65.673448] ? __pfx_kasan_atomics+0x10/0x10 [ 65.673452] ? ktime_get_ts64+0x83/0x230 [ 65.673457] kunit_try_run_case+0x1a2/0x480 [ 65.673461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.673466] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 65.673470] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 65.673475] ? __kthread_parkme+0x82/0x180 [ 65.673479] ? preempt_count_sub+0x50/0x80 [ 65.673484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.673489] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.673493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 65.673497] kthread+0x334/0x6f0 [ 65.673501] ? trace_preempt_on+0x20/0xc0 [ 65.673506] ? __pfx_kthread+0x10/0x10 [ 65.673510] ? _raw_spin_unlock_irq+0x47/0x80 [ 65.673515] ? calculate_sigpending+0x7b/0xa0 [ 65.673519] ? __pfx_kthread+0x10/0x10 [ 65.673523] ret_from_fork+0x3e/0x80 [ 65.673528] ? __pfx_kthread+0x10/0x10 [ 65.673532] ret_from_fork_asm+0x1a/0x30 [ 65.673538] </TASK> [ 65.673540] [ 65.854485] Allocated by task 308: [ 65.857890] kasan_save_stack+0x45/0x70 [ 65.861734] kasan_save_track+0x18/0x40 [ 65.865579] kasan_save_alloc_info+0x3b/0x50 [ 65.869859] __kasan_kmalloc+0xb7/0xc0 [ 65.873611] __kmalloc_cache_noprof+0x189/0x420 [ 65.878144] kasan_atomics+0x95/0x310 [ 65.881809] kunit_try_run_case+0x1a2/0x480 [ 65.885995] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.891396] kthread+0x334/0x6f0 [ 65.894626] ret_from_fork+0x3e/0x80 [ 65.898206] ret_from_fork_asm+0x1a/0x30 [ 65.902132] [ 65.903632] The buggy address belongs to the object at ffff8881061f7500 [ 65.903632] which belongs to the cache kmalloc-64 of size 64 [ 65.915974] The buggy address is located 0 bytes to the right of [ 65.915974] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 65.928833] [ 65.930332] The buggy address belongs to the physical page: [ 65.935903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 65.943903] flags: 0x200000000000000(node=0|zone=2) [ 65.948784] page_type: f5(slab) [ 65.951930] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 65.959718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.967466] page dumped because: kasan: bad access detected [ 65.973039] [ 65.974539] Memory state around the buggy address: [ 65.979332] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.986550] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.993772] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.000999] ^ [ 66.005789] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.013010] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.020228] ================================================================== [ 68.671437] ================================================================== [ 68.678667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 68.686082] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 68.693476] [ 68.694976] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 68.694983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.694985] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 68.694989] Call Trace: [ 68.694990] <TASK> [ 68.694992] dump_stack_lvl+0x73/0xb0 [ 68.694996] print_report+0xd1/0x650 [ 68.695000] ? __virt_addr_valid+0x1db/0x2d0 [ 68.695004] ? kasan_atomics_helper+0x1b22/0x5450 [ 68.695008] ? kasan_complete_mode_report_info+0x2a/0x200 [ 68.695012] ? kasan_atomics_helper+0x1b22/0x5450 [ 68.695017] kasan_report+0x141/0x180 [ 68.695021] ? kasan_atomics_helper+0x1b22/0x5450 [ 68.695026] kasan_check_range+0x10c/0x1c0 [ 68.695031] __kasan_check_write+0x18/0x20 [ 68.695035] kasan_atomics_helper+0x1b22/0x5450 [ 68.695040] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 68.695044] ? __kmalloc_cache_noprof+0x189/0x420 [ 68.695048] ? kasan_atomics+0x152/0x310 [ 68.695052] kasan_atomics+0x1dc/0x310 [ 68.695055] ? __pfx_kasan_atomics+0x10/0x10 [ 68.695059] ? ktime_get_ts64+0x83/0x230 [ 68.695064] kunit_try_run_case+0x1a2/0x480 [ 68.695069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.695073] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 68.695078] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 68.695082] ? __kthread_parkme+0x82/0x180 [ 68.695087] ? preempt_count_sub+0x50/0x80 [ 68.695091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.695096] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.695100] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 68.695105] kthread+0x334/0x6f0 [ 68.695109] ? trace_preempt_on+0x20/0xc0 [ 68.695113] ? __pfx_kthread+0x10/0x10 [ 68.695118] ? _raw_spin_unlock_irq+0x47/0x80 [ 68.695122] ? calculate_sigpending+0x7b/0xa0 [ 68.695126] ? __pfx_kthread+0x10/0x10 [ 68.695131] ret_from_fork+0x3e/0x80 [ 68.695135] ? __pfx_kthread+0x10/0x10 [ 68.695139] ret_from_fork_asm+0x1a/0x30 [ 68.695145] </TASK> [ 68.695147] [ 68.876109] Allocated by task 308: [ 68.879513] kasan_save_stack+0x45/0x70 [ 68.883355] kasan_save_track+0x18/0x40 [ 68.887202] kasan_save_alloc_info+0x3b/0x50 [ 68.891475] __kasan_kmalloc+0xb7/0xc0 [ 68.895228] __kmalloc_cache_noprof+0x189/0x420 [ 68.899759] kasan_atomics+0x95/0x310 [ 68.903426] kunit_try_run_case+0x1a2/0x480 [ 68.907611] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.913009] kthread+0x334/0x6f0 [ 68.916243] ret_from_fork+0x3e/0x80 [ 68.919821] ret_from_fork_asm+0x1a/0x30 [ 68.923748] [ 68.925245] The buggy address belongs to the object at ffff8881061f7500 [ 68.925245] which belongs to the cache kmalloc-64 of size 64 [ 68.937580] The buggy address is located 0 bytes to the right of [ 68.937580] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 68.950440] [ 68.951940] The buggy address belongs to the physical page: [ 68.957512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 68.965520] flags: 0x200000000000000(node=0|zone=2) [ 68.970398] page_type: f5(slab) [ 68.973545] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 68.981294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.989040] page dumped because: kasan: bad access detected [ 68.994610] [ 68.996109] Memory state around the buggy address: [ 69.000904] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.008130] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.015350] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.022567] ^ [ 69.027362] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.034580] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.041800] ================================================================== [ 56.992852] ================================================================== [ 57.000085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 57.007398] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 57.014791] [ 57.016290] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 57.016297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.016299] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 57.016303] Call Trace: [ 57.016305] <TASK> [ 57.016306] dump_stack_lvl+0x73/0xb0 [ 57.016310] print_report+0xd1/0x650 [ 57.016314] ? __virt_addr_valid+0x1db/0x2d0 [ 57.016318] ? kasan_atomics_helper+0xb6a/0x5450 [ 57.016322] ? kasan_complete_mode_report_info+0x2a/0x200 [ 57.016327] ? kasan_atomics_helper+0xb6a/0x5450 [ 57.016331] kasan_report+0x141/0x180 [ 57.016336] ? kasan_atomics_helper+0xb6a/0x5450 [ 57.016341] kasan_check_range+0x10c/0x1c0 [ 57.016346] __kasan_check_write+0x18/0x20 [ 57.016349] kasan_atomics_helper+0xb6a/0x5450 [ 57.016354] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 57.016358] ? __kmalloc_cache_noprof+0x189/0x420 [ 57.016362] ? kasan_atomics+0x152/0x310 [ 57.016366] kasan_atomics+0x1dc/0x310 [ 57.016370] ? __pfx_kasan_atomics+0x10/0x10 [ 57.016374] ? ktime_get_ts64+0x83/0x230 [ 57.016378] kunit_try_run_case+0x1a2/0x480 [ 57.016383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.016387] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 57.016392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 57.016397] ? __kthread_parkme+0x82/0x180 [ 57.016401] ? preempt_count_sub+0x50/0x80 [ 57.016406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.016410] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.016415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 57.016419] kthread+0x334/0x6f0 [ 57.016423] ? trace_preempt_on+0x20/0xc0 [ 57.016427] ? __pfx_kthread+0x10/0x10 [ 57.016432] ? _raw_spin_unlock_irq+0x47/0x80 [ 57.016436] ? calculate_sigpending+0x7b/0xa0 [ 57.016440] ? __pfx_kthread+0x10/0x10 [ 57.016445] ret_from_fork+0x3e/0x80 [ 57.016449] ? __pfx_kthread+0x10/0x10 [ 57.016453] ret_from_fork_asm+0x1a/0x30 [ 57.016459] </TASK> [ 57.016461] [ 57.197145] Allocated by task 308: [ 57.200552] kasan_save_stack+0x45/0x70 [ 57.204390] kasan_save_track+0x18/0x40 [ 57.208231] kasan_save_alloc_info+0x3b/0x50 [ 57.212503] __kasan_kmalloc+0xb7/0xc0 [ 57.216254] __kmalloc_cache_noprof+0x189/0x420 [ 57.220786] kasan_atomics+0x95/0x310 [ 57.224454] kunit_try_run_case+0x1a2/0x480 [ 57.228641] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.234047] kthread+0x334/0x6f0 [ 57.237279] ret_from_fork+0x3e/0x80 [ 57.240858] ret_from_fork_asm+0x1a/0x30 [ 57.244784] [ 57.246283] The buggy address belongs to the object at ffff8881061f7500 [ 57.246283] which belongs to the cache kmalloc-64 of size 64 [ 57.258615] The buggy address is located 0 bytes to the right of [ 57.258615] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 57.271478] [ 57.272976] The buggy address belongs to the physical page: [ 57.278547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 57.286548] flags: 0x200000000000000(node=0|zone=2) [ 57.291436] page_type: f5(slab) [ 57.294583] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 57.302330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.310077] page dumped because: kasan: bad access detected [ 57.315647] [ 57.317149] Memory state around the buggy address: [ 57.321942] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.329169] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.336389] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.343614] ^ [ 57.348407] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.355627] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.362845] ================================================================== [ 74.374244] ================================================================== [ 74.381474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 74.388868] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 74.396174] [ 74.397691] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 74.397699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.397701] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 74.397705] Call Trace: [ 74.397706] <TASK> [ 74.397708] dump_stack_lvl+0x73/0xb0 [ 74.397712] print_report+0xd1/0x650 [ 74.397717] ? __virt_addr_valid+0x1db/0x2d0 [ 74.397733] ? kasan_atomics_helper+0x4fa5/0x5450 [ 74.397737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 74.397742] ? kasan_atomics_helper+0x4fa5/0x5450 [ 74.397746] kasan_report+0x141/0x180 [ 74.397750] ? kasan_atomics_helper+0x4fa5/0x5450 [ 74.397755] __asan_report_load8_noabort+0x18/0x20 [ 74.397759] kasan_atomics_helper+0x4fa5/0x5450 [ 74.397764] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 74.397768] ? __kmalloc_cache_noprof+0x189/0x420 [ 74.397772] ? kasan_atomics+0x152/0x310 [ 74.397776] kasan_atomics+0x1dc/0x310 [ 74.397780] ? __pfx_kasan_atomics+0x10/0x10 [ 74.397784] ? ktime_get_ts64+0x83/0x230 [ 74.397789] kunit_try_run_case+0x1a2/0x480 [ 74.397793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.397797] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 74.397802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 74.397807] ? __kthread_parkme+0x82/0x180 [ 74.397811] ? preempt_count_sub+0x50/0x80 [ 74.397816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.397821] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.397825] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 74.397829] kthread+0x334/0x6f0 [ 74.397833] ? trace_preempt_on+0x20/0xc0 [ 74.397838] ? __pfx_kthread+0x10/0x10 [ 74.397842] ? _raw_spin_unlock_irq+0x47/0x80 [ 74.397847] ? calculate_sigpending+0x7b/0xa0 [ 74.397851] ? __pfx_kthread+0x10/0x10 [ 74.397855] ret_from_fork+0x3e/0x80 [ 74.397859] ? __pfx_kthread+0x10/0x10 [ 74.397864] ret_from_fork_asm+0x1a/0x30 [ 74.397870] </TASK> [ 74.397871] [ 74.575470] Allocated by task 308: [ 74.578876] kasan_save_stack+0x45/0x70 [ 74.582739] kasan_save_track+0x18/0x40 [ 74.586581] kasan_save_alloc_info+0x3b/0x50 [ 74.590852] __kasan_kmalloc+0xb7/0xc0 [ 74.594606] __kmalloc_cache_noprof+0x189/0x420 [ 74.599147] kasan_atomics+0x95/0x310 [ 74.602812] kunit_try_run_case+0x1a2/0x480 [ 74.606996] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.612398] kthread+0x334/0x6f0 [ 74.615637] ret_from_fork+0x3e/0x80 [ 74.619216] ret_from_fork_asm+0x1a/0x30 [ 74.623142] [ 74.624642] The buggy address belongs to the object at ffff8881061f7500 [ 74.624642] which belongs to the cache kmalloc-64 of size 64 [ 74.636975] The buggy address is located 0 bytes to the right of [ 74.636975] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 74.649836] [ 74.651333] The buggy address belongs to the physical page: [ 74.656907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 74.664914] flags: 0x200000000000000(node=0|zone=2) [ 74.669793] page_type: f5(slab) [ 74.672939] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 74.680717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.688469] page dumped because: kasan: bad access detected [ 74.694043] [ 74.695541] Memory state around the buggy address: [ 74.700333] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.707552] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.714772] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.721991] ^ [ 74.726782] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.734001] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.741221] ================================================================== [ 58.121723] ================================================================== [ 58.128968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 58.136274] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 58.143666] [ 58.145192] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 58.145200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.145202] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 58.145205] Call Trace: [ 58.145207] <TASK> [ 58.145209] dump_stack_lvl+0x73/0xb0 [ 58.145213] print_report+0xd1/0x650 [ 58.145217] ? __virt_addr_valid+0x1db/0x2d0 [ 58.145221] ? kasan_atomics_helper+0xd47/0x5450 [ 58.145225] ? kasan_complete_mode_report_info+0x2a/0x200 [ 58.145229] ? kasan_atomics_helper+0xd47/0x5450 [ 58.145233] kasan_report+0x141/0x180 [ 58.145238] ? kasan_atomics_helper+0xd47/0x5450 [ 58.145243] kasan_check_range+0x10c/0x1c0 [ 58.145248] __kasan_check_write+0x18/0x20 [ 58.145251] kasan_atomics_helper+0xd47/0x5450 [ 58.145255] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 58.145260] ? __kmalloc_cache_noprof+0x189/0x420 [ 58.145264] ? kasan_atomics+0x152/0x310 [ 58.145268] kasan_atomics+0x1dc/0x310 [ 58.145271] ? __pfx_kasan_atomics+0x10/0x10 [ 58.145275] ? ktime_get_ts64+0x83/0x230 [ 58.145280] kunit_try_run_case+0x1a2/0x480 [ 58.145285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.145289] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 58.145294] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 58.145298] ? __kthread_parkme+0x82/0x180 [ 58.145302] ? preempt_count_sub+0x50/0x80 [ 58.145307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.145312] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.145316] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 58.145320] kthread+0x334/0x6f0 [ 58.145324] ? trace_preempt_on+0x20/0xc0 [ 58.145329] ? __pfx_kthread+0x10/0x10 [ 58.145333] ? _raw_spin_unlock_irq+0x47/0x80 [ 58.145337] ? calculate_sigpending+0x7b/0xa0 [ 58.145341] ? __pfx_kthread+0x10/0x10 [ 58.145346] ret_from_fork+0x3e/0x80 [ 58.145350] ? __pfx_kthread+0x10/0x10 [ 58.145354] ret_from_fork_asm+0x1a/0x30 [ 58.145360] </TASK> [ 58.145362] [ 58.325995] Allocated by task 308: [ 58.329403] kasan_save_stack+0x45/0x70 [ 58.333242] kasan_save_track+0x18/0x40 [ 58.337082] kasan_save_alloc_info+0x3b/0x50 [ 58.341352] __kasan_kmalloc+0xb7/0xc0 [ 58.345105] __kmalloc_cache_noprof+0x189/0x420 [ 58.349639] kasan_atomics+0x95/0x310 [ 58.353304] kunit_try_run_case+0x1a2/0x480 [ 58.357489] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.362890] kthread+0x334/0x6f0 [ 58.366120] ret_from_fork+0x3e/0x80 [ 58.369705] ret_from_fork_asm+0x1a/0x30 [ 58.373660] [ 58.375187] The buggy address belongs to the object at ffff8881061f7500 [ 58.375187] which belongs to the cache kmalloc-64 of size 64 [ 58.387528] The buggy address is located 0 bytes to the right of [ 58.387528] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 58.400396] [ 58.401895] The buggy address belongs to the physical page: [ 58.407467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 58.415465] flags: 0x200000000000000(node=0|zone=2) [ 58.420346] page_type: f5(slab) [ 58.423494] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 58.431242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.438987] page dumped because: kasan: bad access detected [ 58.444561] [ 58.446059] Memory state around the buggy address: [ 58.450852] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.458072] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.465299] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.472516] ^ [ 58.477311] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.484538] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.491755] ================================================================== [ 53.597277] ================================================================== [ 53.604495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 53.611808] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 53.619200] [ 53.620719] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 53.620727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.620729] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 53.620733] Call Trace: [ 53.620735] <TASK> [ 53.620737] dump_stack_lvl+0x73/0xb0 [ 53.620740] print_report+0xd1/0x650 [ 53.620744] ? __virt_addr_valid+0x1db/0x2d0 [ 53.620748] ? kasan_atomics_helper+0x5fe/0x5450 [ 53.620753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 53.620757] ? kasan_atomics_helper+0x5fe/0x5450 [ 53.620761] kasan_report+0x141/0x180 [ 53.620766] ? kasan_atomics_helper+0x5fe/0x5450 [ 53.620771] kasan_check_range+0x10c/0x1c0 [ 53.620775] __kasan_check_write+0x18/0x20 [ 53.620779] kasan_atomics_helper+0x5fe/0x5450 [ 53.620783] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 53.620788] ? __kmalloc_cache_noprof+0x189/0x420 [ 53.620792] ? kasan_atomics+0x152/0x310 [ 53.620796] kasan_atomics+0x1dc/0x310 [ 53.620799] ? __pfx_kasan_atomics+0x10/0x10 [ 53.620803] ? ktime_get_ts64+0x83/0x230 [ 53.620808] kunit_try_run_case+0x1a2/0x480 [ 53.620812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.620817] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 53.620822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 53.620826] ? __kthread_parkme+0x82/0x180 [ 53.620830] ? preempt_count_sub+0x50/0x80 [ 53.620835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.620840] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.620844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 53.620848] kthread+0x334/0x6f0 [ 53.620852] ? trace_preempt_on+0x20/0xc0 [ 53.620857] ? __pfx_kthread+0x10/0x10 [ 53.620861] ? _raw_spin_unlock_irq+0x47/0x80 [ 53.620866] ? calculate_sigpending+0x7b/0xa0 [ 53.620870] ? __pfx_kthread+0x10/0x10 [ 53.620874] ret_from_fork+0x3e/0x80 [ 53.620878] ? __pfx_kthread+0x10/0x10 [ 53.620882] ret_from_fork_asm+0x1a/0x30 [ 53.620888] </TASK> [ 53.620890] [ 53.801512] Allocated by task 308: [ 53.804917] kasan_save_stack+0x45/0x70 [ 53.808758] kasan_save_track+0x18/0x40 [ 53.812595] kasan_save_alloc_info+0x3b/0x50 [ 53.816870] __kasan_kmalloc+0xb7/0xc0 [ 53.820629] __kmalloc_cache_noprof+0x189/0x420 [ 53.825162] kasan_atomics+0x95/0x310 [ 53.828828] kunit_try_run_case+0x1a2/0x480 [ 53.833014] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.838414] kthread+0x334/0x6f0 [ 53.841647] ret_from_fork+0x3e/0x80 [ 53.845234] ret_from_fork_asm+0x1a/0x30 [ 53.849159] [ 53.850659] The buggy address belongs to the object at ffff8881061f7500 [ 53.850659] which belongs to the cache kmalloc-64 of size 64 [ 53.863025] The buggy address is located 0 bytes to the right of [ 53.863025] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 53.875888] [ 53.877385] The buggy address belongs to the physical page: [ 53.882960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 53.890966] flags: 0x200000000000000(node=0|zone=2) [ 53.895845] page_type: f5(slab) [ 53.898991] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 53.906739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.914486] page dumped because: kasan: bad access detected [ 53.920058] [ 53.921558] Memory state around the buggy address: [ 53.926349] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.933569] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.940789] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.948007] ^ [ 53.952801] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.960027] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.967246] ================================================================== [ 51.716860] ================================================================== [ 51.724104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 51.731409] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 51.738735] [ 51.740235] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 51.740243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.740245] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 51.740248] Call Trace: [ 51.740250] <TASK> [ 51.740252] dump_stack_lvl+0x73/0xb0 [ 51.740255] print_report+0xd1/0x650 [ 51.740260] ? __virt_addr_valid+0x1db/0x2d0 [ 51.740263] ? kasan_atomics_helper+0x3df/0x5450 [ 51.740267] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.740272] ? kasan_atomics_helper+0x3df/0x5450 [ 51.740276] kasan_report+0x141/0x180 [ 51.740280] ? kasan_atomics_helper+0x3df/0x5450 [ 51.740286] kasan_check_range+0x10c/0x1c0 [ 51.740290] __kasan_check_read+0x15/0x20 [ 51.740294] kasan_atomics_helper+0x3df/0x5450 [ 51.740299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 51.740303] ? __kmalloc_cache_noprof+0x189/0x420 [ 51.740307] ? kasan_atomics+0x152/0x310 [ 51.740311] kasan_atomics+0x1dc/0x310 [ 51.740315] ? __pfx_kasan_atomics+0x10/0x10 [ 51.740318] ? ktime_get_ts64+0x83/0x230 [ 51.740323] kunit_try_run_case+0x1a2/0x480 [ 51.740328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.740332] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 51.740337] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 51.740342] ? __kthread_parkme+0x82/0x180 [ 51.740346] ? preempt_count_sub+0x50/0x80 [ 51.740351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.740355] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.740359] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.740364] kthread+0x334/0x6f0 [ 51.740368] ? trace_preempt_on+0x20/0xc0 [ 51.740372] ? __pfx_kthread+0x10/0x10 [ 51.740377] ? _raw_spin_unlock_irq+0x47/0x80 [ 51.740381] ? calculate_sigpending+0x7b/0xa0 [ 51.740385] ? __pfx_kthread+0x10/0x10 [ 51.740390] ret_from_fork+0x3e/0x80 [ 51.740394] ? __pfx_kthread+0x10/0x10 [ 51.740399] ret_from_fork_asm+0x1a/0x30 [ 51.740405] </TASK> [ 51.740406] [ 51.920906] Allocated by task 308: [ 51.924313] kasan_save_stack+0x45/0x70 [ 51.928151] kasan_save_track+0x18/0x40 [ 51.931990] kasan_save_alloc_info+0x3b/0x50 [ 51.936264] __kasan_kmalloc+0xb7/0xc0 [ 51.940016] __kmalloc_cache_noprof+0x189/0x420 [ 51.944548] kasan_atomics+0x95/0x310 [ 51.948214] kunit_try_run_case+0x1a2/0x480 [ 51.952399] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.957800] kthread+0x334/0x6f0 [ 51.961041] ret_from_fork+0x3e/0x80 [ 51.964628] ret_from_fork_asm+0x1a/0x30 [ 51.968555] [ 51.970052] The buggy address belongs to the object at ffff8881061f7500 [ 51.970052] which belongs to the cache kmalloc-64 of size 64 [ 51.982386] The buggy address is located 0 bytes to the right of [ 51.982386] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 51.995248] [ 51.996746] The buggy address belongs to the physical page: [ 52.002318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 52.010324] flags: 0x200000000000000(node=0|zone=2) [ 52.015205] page_type: f5(slab) [ 52.018351] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 52.026090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.033829] page dumped because: kasan: bad access detected [ 52.039400] [ 52.040899] Memory state around the buggy address: [ 52.045707] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.052955] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.060175] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.067394] ^ [ 52.072184] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.079406] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.086633] ================================================================== [ 60.008096] ================================================================== [ 60.015311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 60.022706] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 60.030036] [ 60.031537] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 60.031544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.031546] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 60.031550] Call Trace: [ 60.031552] <TASK> [ 60.031553] dump_stack_lvl+0x73/0xb0 [ 60.031557] print_report+0xd1/0x650 [ 60.031561] ? __virt_addr_valid+0x1db/0x2d0 [ 60.031565] ? kasan_atomics_helper+0x4a36/0x5450 [ 60.031569] ? kasan_complete_mode_report_info+0x2a/0x200 [ 60.031573] ? kasan_atomics_helper+0x4a36/0x5450 [ 60.031578] kasan_report+0x141/0x180 [ 60.031582] ? kasan_atomics_helper+0x4a36/0x5450 [ 60.031587] __asan_report_load4_noabort+0x18/0x20 [ 60.031591] kasan_atomics_helper+0x4a36/0x5450 [ 60.031595] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 60.031600] ? __kmalloc_cache_noprof+0x189/0x420 [ 60.031604] ? kasan_atomics+0x152/0x310 [ 60.031608] kasan_atomics+0x1dc/0x310 [ 60.031611] ? __pfx_kasan_atomics+0x10/0x10 [ 60.031615] ? ktime_get_ts64+0x83/0x230 [ 60.031620] kunit_try_run_case+0x1a2/0x480 [ 60.031625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.031629] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 60.031634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 60.031638] ? __kthread_parkme+0x82/0x180 [ 60.031643] ? preempt_count_sub+0x50/0x80 [ 60.031647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.031652] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.031656] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 60.031661] kthread+0x334/0x6f0 [ 60.031665] ? trace_preempt_on+0x20/0xc0 [ 60.031669] ? __pfx_kthread+0x10/0x10 [ 60.031691] ? _raw_spin_unlock_irq+0x47/0x80 [ 60.031696] ? calculate_sigpending+0x7b/0xa0 [ 60.031700] ? __pfx_kthread+0x10/0x10 [ 60.031704] ret_from_fork+0x3e/0x80 [ 60.031721] ? __pfx_kthread+0x10/0x10 [ 60.031726] ret_from_fork_asm+0x1a/0x30 [ 60.031732] </TASK> [ 60.031733] [ 60.209445] Allocated by task 308: [ 60.212849] kasan_save_stack+0x45/0x70 [ 60.216707] kasan_save_track+0x18/0x40 [ 60.220571] kasan_save_alloc_info+0x3b/0x50 [ 60.224844] __kasan_kmalloc+0xb7/0xc0 [ 60.228596] __kmalloc_cache_noprof+0x189/0x420 [ 60.233130] kasan_atomics+0x95/0x310 [ 60.236797] kunit_try_run_case+0x1a2/0x480 [ 60.240989] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.246388] kthread+0x334/0x6f0 [ 60.249621] ret_from_fork+0x3e/0x80 [ 60.253201] ret_from_fork_asm+0x1a/0x30 [ 60.257136] [ 60.258635] The buggy address belongs to the object at ffff8881061f7500 [ 60.258635] which belongs to the cache kmalloc-64 of size 64 [ 60.270977] The buggy address is located 0 bytes to the right of [ 60.270977] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 60.283844] [ 60.285344] The buggy address belongs to the physical page: [ 60.290915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 60.298916] flags: 0x200000000000000(node=0|zone=2) [ 60.303794] page_type: f5(slab) [ 60.306940] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 60.314717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.322460] page dumped because: kasan: bad access detected [ 60.328034] [ 60.329534] Memory state around the buggy address: [ 60.334326] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.341546] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.348773] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.355993] ^ [ 60.360784] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.368004] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.375231] ================================================================== [ 61.512267] ================================================================== [ 61.519499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 61.526900] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 61.534212] [ 61.535735] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 61.535742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.535744] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 61.535748] Call Trace: [ 61.535750] <TASK> [ 61.535751] dump_stack_lvl+0x73/0xb0 [ 61.535755] print_report+0xd1/0x650 [ 61.535759] ? __virt_addr_valid+0x1db/0x2d0 [ 61.535763] ? kasan_atomics_helper+0x4a02/0x5450 [ 61.535767] ? kasan_complete_mode_report_info+0x2a/0x200 [ 61.535772] ? kasan_atomics_helper+0x4a02/0x5450 [ 61.535776] kasan_report+0x141/0x180 [ 61.535780] ? kasan_atomics_helper+0x4a02/0x5450 [ 61.535785] __asan_report_load4_noabort+0x18/0x20 [ 61.535789] kasan_atomics_helper+0x4a02/0x5450 [ 61.535794] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 61.535798] ? __kmalloc_cache_noprof+0x189/0x420 [ 61.535802] ? kasan_atomics+0x152/0x310 [ 61.535806] kasan_atomics+0x1dc/0x310 [ 61.535809] ? __pfx_kasan_atomics+0x10/0x10 [ 61.535813] ? ktime_get_ts64+0x83/0x230 [ 61.535818] kunit_try_run_case+0x1a2/0x480 [ 61.535823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.535827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 61.535832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 61.535837] ? __kthread_parkme+0x82/0x180 [ 61.535841] ? preempt_count_sub+0x50/0x80 [ 61.535846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.535850] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.535855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 61.535859] kthread+0x334/0x6f0 [ 61.535863] ? trace_preempt_on+0x20/0xc0 [ 61.535868] ? __pfx_kthread+0x10/0x10 [ 61.535872] ? _raw_spin_unlock_irq+0x47/0x80 [ 61.535876] ? calculate_sigpending+0x7b/0xa0 [ 61.535880] ? __pfx_kthread+0x10/0x10 [ 61.535885] ret_from_fork+0x3e/0x80 [ 61.535889] ? __pfx_kthread+0x10/0x10 [ 61.535894] ret_from_fork_asm+0x1a/0x30 [ 61.535899] </TASK> [ 61.535901] [ 61.713440] Allocated by task 308: [ 61.716846] kasan_save_stack+0x45/0x70 [ 61.720703] kasan_save_track+0x18/0x40 [ 61.724568] kasan_save_alloc_info+0x3b/0x50 [ 61.728841] __kasan_kmalloc+0xb7/0xc0 [ 61.732594] __kmalloc_cache_noprof+0x189/0x420 [ 61.737126] kasan_atomics+0x95/0x310 [ 61.740790] kunit_try_run_case+0x1a2/0x480 [ 61.744977] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.750375] kthread+0x334/0x6f0 [ 61.753608] ret_from_fork+0x3e/0x80 [ 61.757188] ret_from_fork_asm+0x1a/0x30 [ 61.761115] [ 61.762612] The buggy address belongs to the object at ffff8881061f7500 [ 61.762612] which belongs to the cache kmalloc-64 of size 64 [ 61.774955] The buggy address is located 0 bytes to the right of [ 61.774955] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 61.787824] [ 61.789322] The buggy address belongs to the physical page: [ 61.794894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 61.802894] flags: 0x200000000000000(node=0|zone=2) [ 61.807772] page_type: f5(slab) [ 61.810918] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 61.818658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.826432] page dumped because: kasan: bad access detected [ 61.832002] [ 61.833503] Memory state around the buggy address: [ 61.838296] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.845524] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.852755] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.859977] ^ [ 61.864770] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.871989] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.879208] ================================================================== [ 53.974488] ================================================================== [ 53.981742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 53.989051] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 53.996450] [ 53.997950] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 53.997958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.997960] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 53.997964] Call Trace: [ 53.997965] <TASK> [ 53.997967] dump_stack_lvl+0x73/0xb0 [ 53.997971] print_report+0xd1/0x650 [ 53.997975] ? __virt_addr_valid+0x1db/0x2d0 [ 53.997979] ? kasan_atomics_helper+0x697/0x5450 [ 53.997983] ? kasan_complete_mode_report_info+0x2a/0x200 [ 53.997988] ? kasan_atomics_helper+0x697/0x5450 [ 53.997992] kasan_report+0x141/0x180 [ 53.997996] ? kasan_atomics_helper+0x697/0x5450 [ 53.998001] kasan_check_range+0x10c/0x1c0 [ 53.998006] __kasan_check_write+0x18/0x20 [ 53.998010] kasan_atomics_helper+0x697/0x5450 [ 53.998014] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 53.998019] ? __kmalloc_cache_noprof+0x189/0x420 [ 53.998023] ? kasan_atomics+0x152/0x310 [ 53.998027] kasan_atomics+0x1dc/0x310 [ 53.998030] ? __pfx_kasan_atomics+0x10/0x10 [ 53.998034] ? ktime_get_ts64+0x83/0x230 [ 53.998039] kunit_try_run_case+0x1a2/0x480 [ 53.998044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.998048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 53.998053] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 53.998057] ? __kthread_parkme+0x82/0x180 [ 53.998062] ? preempt_count_sub+0x50/0x80 [ 53.998067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.998071] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.998075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 53.998080] kthread+0x334/0x6f0 [ 53.998084] ? trace_preempt_on+0x20/0xc0 [ 53.998088] ? __pfx_kthread+0x10/0x10 [ 53.998093] ? _raw_spin_unlock_irq+0x47/0x80 [ 53.998097] ? calculate_sigpending+0x7b/0xa0 [ 53.998101] ? __pfx_kthread+0x10/0x10 [ 53.998106] ret_from_fork+0x3e/0x80 [ 53.998110] ? __pfx_kthread+0x10/0x10 [ 53.998114] ret_from_fork_asm+0x1a/0x30 [ 53.998120] </TASK> [ 53.998122] [ 54.178858] Allocated by task 308: [ 54.182264] kasan_save_stack+0x45/0x70 [ 54.186104] kasan_save_track+0x18/0x40 [ 54.189943] kasan_save_alloc_info+0x3b/0x50 [ 54.194217] __kasan_kmalloc+0xb7/0xc0 [ 54.197969] __kmalloc_cache_noprof+0x189/0x420 [ 54.202502] kasan_atomics+0x95/0x310 [ 54.206167] kunit_try_run_case+0x1a2/0x480 [ 54.210352] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.215752] kthread+0x334/0x6f0 [ 54.218984] ret_from_fork+0x3e/0x80 [ 54.222573] ret_from_fork_asm+0x1a/0x30 [ 54.226506] [ 54.228005] The buggy address belongs to the object at ffff8881061f7500 [ 54.228005] which belongs to the cache kmalloc-64 of size 64 [ 54.240337] The buggy address is located 0 bytes to the right of [ 54.240337] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 54.253197] [ 54.254705] The buggy address belongs to the physical page: [ 54.260278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 54.268278] flags: 0x200000000000000(node=0|zone=2) [ 54.273156] page_type: f5(slab) [ 54.276304] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 54.284052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.291797] page dumped because: kasan: bad access detected [ 54.297369] [ 54.298869] Memory state around the buggy address: [ 54.303662] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.310915] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.318134] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.325352] ^ [ 54.330147] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.337367] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.344592] ================================================================== [ 69.801069] ================================================================== [ 69.808295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 69.815707] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 69.823124] [ 69.824623] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 69.824631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.824633] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 69.824637] Call Trace: [ 69.824638] <TASK> [ 69.824640] dump_stack_lvl+0x73/0xb0 [ 69.824644] print_report+0xd1/0x650 [ 69.824648] ? __virt_addr_valid+0x1db/0x2d0 [ 69.824652] ? kasan_atomics_helper+0x1ce1/0x5450 [ 69.824657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 69.824661] ? kasan_atomics_helper+0x1ce1/0x5450 [ 69.824665] kasan_report+0x141/0x180 [ 69.824669] ? kasan_atomics_helper+0x1ce1/0x5450 [ 69.824691] kasan_check_range+0x10c/0x1c0 [ 69.824697] __kasan_check_write+0x18/0x20 [ 69.824700] kasan_atomics_helper+0x1ce1/0x5450 [ 69.824717] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 69.824722] ? __kmalloc_cache_noprof+0x189/0x420 [ 69.824726] ? kasan_atomics+0x152/0x310 [ 69.824730] kasan_atomics+0x1dc/0x310 [ 69.824733] ? __pfx_kasan_atomics+0x10/0x10 [ 69.824737] ? ktime_get_ts64+0x83/0x230 [ 69.824742] kunit_try_run_case+0x1a2/0x480 [ 69.824746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.824750] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 69.824755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 69.824760] ? __kthread_parkme+0x82/0x180 [ 69.824764] ? preempt_count_sub+0x50/0x80 [ 69.824769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.824773] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.824777] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 69.824782] kthread+0x334/0x6f0 [ 69.824786] ? trace_preempt_on+0x20/0xc0 [ 69.824790] ? __pfx_kthread+0x10/0x10 [ 69.824795] ? _raw_spin_unlock_irq+0x47/0x80 [ 69.824799] ? calculate_sigpending+0x7b/0xa0 [ 69.824803] ? __pfx_kthread+0x10/0x10 [ 69.824807] ret_from_fork+0x3e/0x80 [ 69.824811] ? __pfx_kthread+0x10/0x10 [ 69.824816] ret_from_fork_asm+0x1a/0x30 [ 69.824822] </TASK> [ 69.824823] [ 70.005868] Allocated by task 308: [ 70.009275] kasan_save_stack+0x45/0x70 [ 70.013116] kasan_save_track+0x18/0x40 [ 70.016962] kasan_save_alloc_info+0x3b/0x50 [ 70.021236] __kasan_kmalloc+0xb7/0xc0 [ 70.024988] __kmalloc_cache_noprof+0x189/0x420 [ 70.029520] kasan_atomics+0x95/0x310 [ 70.033187] kunit_try_run_case+0x1a2/0x480 [ 70.037378] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.042777] kthread+0x334/0x6f0 [ 70.046012] ret_from_fork+0x3e/0x80 [ 70.049601] ret_from_fork_asm+0x1a/0x30 [ 70.053532] [ 70.055034] The buggy address belongs to the object at ffff8881061f7500 [ 70.055034] which belongs to the cache kmalloc-64 of size 64 [ 70.067375] The buggy address is located 0 bytes to the right of [ 70.067375] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 70.080234] [ 70.081743] The buggy address belongs to the physical page: [ 70.087315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 70.095314] flags: 0x200000000000000(node=0|zone=2) [ 70.100194] page_type: f5(slab) [ 70.103339] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 70.111078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.118816] page dumped because: kasan: bad access detected [ 70.124388] [ 70.125888] Memory state around the buggy address: [ 70.130707] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.137954] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.145181] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.152407] ^ [ 70.157199] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.164418] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.171637] ================================================================== [ 58.498998] ================================================================== [ 58.506229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 58.513543] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 58.520935] [ 58.522436] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 58.522444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.522446] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 58.522449] Call Trace: [ 58.522451] <TASK> [ 58.522453] dump_stack_lvl+0x73/0xb0 [ 58.522456] print_report+0xd1/0x650 [ 58.522461] ? __virt_addr_valid+0x1db/0x2d0 [ 58.522464] ? kasan_atomics_helper+0xde0/0x5450 [ 58.522468] ? kasan_complete_mode_report_info+0x2a/0x200 [ 58.522473] ? kasan_atomics_helper+0xde0/0x5450 [ 58.522477] kasan_report+0x141/0x180 [ 58.522481] ? kasan_atomics_helper+0xde0/0x5450 [ 58.522486] kasan_check_range+0x10c/0x1c0 [ 58.522491] __kasan_check_write+0x18/0x20 [ 58.522495] kasan_atomics_helper+0xde0/0x5450 [ 58.522499] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 58.522504] ? __kmalloc_cache_noprof+0x189/0x420 [ 58.522508] ? kasan_atomics+0x152/0x310 [ 58.522512] kasan_atomics+0x1dc/0x310 [ 58.522515] ? __pfx_kasan_atomics+0x10/0x10 [ 58.522519] ? ktime_get_ts64+0x83/0x230 [ 58.522524] kunit_try_run_case+0x1a2/0x480 [ 58.522529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.522533] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 58.522538] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 58.522542] ? __kthread_parkme+0x82/0x180 [ 58.522547] ? preempt_count_sub+0x50/0x80 [ 58.522552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.522556] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.522560] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 58.522565] kthread+0x334/0x6f0 [ 58.522569] ? trace_preempt_on+0x20/0xc0 [ 58.522573] ? __pfx_kthread+0x10/0x10 [ 58.522578] ? _raw_spin_unlock_irq+0x47/0x80 [ 58.522582] ? calculate_sigpending+0x7b/0xa0 [ 58.522586] ? __pfx_kthread+0x10/0x10 [ 58.522590] ret_from_fork+0x3e/0x80 [ 58.522595] ? __pfx_kthread+0x10/0x10 [ 58.522599] ret_from_fork_asm+0x1a/0x30 [ 58.522605] </TASK> [ 58.522607] [ 58.703230] Allocated by task 308: [ 58.706636] kasan_save_stack+0x45/0x70 [ 58.710474] kasan_save_track+0x18/0x40 [ 58.714313] kasan_save_alloc_info+0x3b/0x50 [ 58.718586] __kasan_kmalloc+0xb7/0xc0 [ 58.722338] __kmalloc_cache_noprof+0x189/0x420 [ 58.726872] kasan_atomics+0x95/0x310 [ 58.730538] kunit_try_run_case+0x1a2/0x480 [ 58.734750] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.740156] kthread+0x334/0x6f0 [ 58.743389] ret_from_fork+0x3e/0x80 [ 58.746969] ret_from_fork_asm+0x1a/0x30 [ 58.750895] [ 58.752394] The buggy address belongs to the object at ffff8881061f7500 [ 58.752394] which belongs to the cache kmalloc-64 of size 64 [ 58.764738] The buggy address is located 0 bytes to the right of [ 58.764738] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 58.777605] [ 58.779104] The buggy address belongs to the physical page: [ 58.784704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 58.792735] flags: 0x200000000000000(node=0|zone=2) [ 58.797614] page_type: f5(slab) [ 58.800763] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 58.808508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.816247] page dumped because: kasan: bad access detected [ 58.821821] [ 58.823320] Memory state around the buggy address: [ 58.828113] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.835332] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.842557] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.849776] ^ [ 58.854568] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.861788] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.869007] ================================================================== [ 74.748464] ================================================================== [ 74.755706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 74.763121] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 74.770521] [ 74.772021] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 74.772028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.772030] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 74.772034] Call Trace: [ 74.772036] <TASK> [ 74.772037] dump_stack_lvl+0x73/0xb0 [ 74.772041] print_report+0xd1/0x650 [ 74.772045] ? __virt_addr_valid+0x1db/0x2d0 [ 74.772049] ? kasan_atomics_helper+0x224c/0x5450 [ 74.772053] ? kasan_complete_mode_report_info+0x2a/0x200 [ 74.772057] ? kasan_atomics_helper+0x224c/0x5450 [ 74.772062] kasan_report+0x141/0x180 [ 74.772066] ? kasan_atomics_helper+0x224c/0x5450 [ 74.772071] kasan_check_range+0x10c/0x1c0 [ 74.772076] __kasan_check_write+0x18/0x20 [ 74.772080] kasan_atomics_helper+0x224c/0x5450 [ 74.772084] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 74.772089] ? __kmalloc_cache_noprof+0x189/0x420 [ 74.772092] ? kasan_atomics+0x152/0x310 [ 74.772097] kasan_atomics+0x1dc/0x310 [ 74.772100] ? __pfx_kasan_atomics+0x10/0x10 [ 74.772104] ? ktime_get_ts64+0x83/0x230 [ 74.772109] kunit_try_run_case+0x1a2/0x480 [ 74.772113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.772118] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 74.772122] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 74.772127] ? __kthread_parkme+0x82/0x180 [ 74.772131] ? preempt_count_sub+0x50/0x80 [ 74.772136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.772140] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.772144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 74.772149] kthread+0x334/0x6f0 [ 74.772153] ? trace_preempt_on+0x20/0xc0 [ 74.772157] ? __pfx_kthread+0x10/0x10 [ 74.772162] ? _raw_spin_unlock_irq+0x47/0x80 [ 74.772166] ? calculate_sigpending+0x7b/0xa0 [ 74.772170] ? __pfx_kthread+0x10/0x10 [ 74.772175] ret_from_fork+0x3e/0x80 [ 74.772179] ? __pfx_kthread+0x10/0x10 [ 74.772183] ret_from_fork_asm+0x1a/0x30 [ 74.772189] </TASK> [ 74.772191] [ 74.953154] Allocated by task 308: [ 74.956561] kasan_save_stack+0x45/0x70 [ 74.960408] kasan_save_track+0x18/0x40 [ 74.964247] kasan_save_alloc_info+0x3b/0x50 [ 74.968520] __kasan_kmalloc+0xb7/0xc0 [ 74.972272] __kmalloc_cache_noprof+0x189/0x420 [ 74.976804] kasan_atomics+0x95/0x310 [ 74.980469] kunit_try_run_case+0x1a2/0x480 [ 74.984655] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.990057] kthread+0x334/0x6f0 [ 74.993295] ret_from_fork+0x3e/0x80 [ 74.996876] ret_from_fork_asm+0x1a/0x30 [ 75.000801] [ 75.002301] The buggy address belongs to the object at ffff8881061f7500 [ 75.002301] which belongs to the cache kmalloc-64 of size 64 [ 75.014641] The buggy address is located 0 bytes to the right of [ 75.014641] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 75.027501] [ 75.029000] The buggy address belongs to the physical page: [ 75.034574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 75.042581] flags: 0x200000000000000(node=0|zone=2) [ 75.047460] page_type: f5(slab) [ 75.050609] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 75.058354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.066093] page dumped because: kasan: bad access detected [ 75.071665] [ 75.073189] Memory state around the buggy address: [ 75.077982] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.085202] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.092423] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.099648] ^ [ 75.104442] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.111688] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.118940] ================================================================== [ 66.405096] ================================================================== [ 66.412323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 66.419735] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 66.427134] [ 66.428634] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 66.428642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.428644] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 66.428648] Call Trace: [ 66.428649] <TASK> [ 66.428651] dump_stack_lvl+0x73/0xb0 [ 66.428655] print_report+0xd1/0x650 [ 66.428659] ? __virt_addr_valid+0x1db/0x2d0 [ 66.428663] ? kasan_atomics_helper+0x177f/0x5450 [ 66.428667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 66.428688] ? kasan_atomics_helper+0x177f/0x5450 [ 66.428693] kasan_report+0x141/0x180 [ 66.428697] ? kasan_atomics_helper+0x177f/0x5450 [ 66.428702] kasan_check_range+0x10c/0x1c0 [ 66.428720] __kasan_check_write+0x18/0x20 [ 66.428724] kasan_atomics_helper+0x177f/0x5450 [ 66.428728] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 66.428732] ? __kmalloc_cache_noprof+0x189/0x420 [ 66.428736] ? kasan_atomics+0x152/0x310 [ 66.428741] kasan_atomics+0x1dc/0x310 [ 66.428744] ? __pfx_kasan_atomics+0x10/0x10 [ 66.428748] ? ktime_get_ts64+0x83/0x230 [ 66.428753] kunit_try_run_case+0x1a2/0x480 [ 66.428757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.428762] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 66.428767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 66.428771] ? __kthread_parkme+0x82/0x180 [ 66.428775] ? preempt_count_sub+0x50/0x80 [ 66.428780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.428785] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.428789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 66.428793] kthread+0x334/0x6f0 [ 66.428797] ? trace_preempt_on+0x20/0xc0 [ 66.428802] ? __pfx_kthread+0x10/0x10 [ 66.428806] ? _raw_spin_unlock_irq+0x47/0x80 [ 66.428811] ? calculate_sigpending+0x7b/0xa0 [ 66.428815] ? __pfx_kthread+0x10/0x10 [ 66.428819] ret_from_fork+0x3e/0x80 [ 66.428823] ? __pfx_kthread+0x10/0x10 [ 66.428828] ret_from_fork_asm+0x1a/0x30 [ 66.428834] </TASK> [ 66.428835] [ 66.609882] Allocated by task 308: [ 66.613286] kasan_save_stack+0x45/0x70 [ 66.617126] kasan_save_track+0x18/0x40 [ 66.620965] kasan_save_alloc_info+0x3b/0x50 [ 66.625238] __kasan_kmalloc+0xb7/0xc0 [ 66.628990] __kmalloc_cache_noprof+0x189/0x420 [ 66.633522] kasan_atomics+0x95/0x310 [ 66.637187] kunit_try_run_case+0x1a2/0x480 [ 66.641373] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.646772] kthread+0x334/0x6f0 [ 66.650006] ret_from_fork+0x3e/0x80 [ 66.653584] ret_from_fork_asm+0x1a/0x30 [ 66.657509] [ 66.659009] The buggy address belongs to the object at ffff8881061f7500 [ 66.659009] which belongs to the cache kmalloc-64 of size 64 [ 66.671349] The buggy address is located 0 bytes to the right of [ 66.671349] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 66.684212] [ 66.685710] The buggy address belongs to the physical page: [ 66.691281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 66.699282] flags: 0x200000000000000(node=0|zone=2) [ 66.704162] page_type: f5(slab) [ 66.707307] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 66.715047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.722793] page dumped because: kasan: bad access detected [ 66.728366] [ 66.729865] Memory state around the buggy address: [ 66.734659] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.741911] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.749131] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.756351] ^ [ 66.761143] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.768369] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.775589] ================================================================== [ 59.630875] ================================================================== [ 59.638105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 59.645419] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 59.652820] [ 59.654321] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 59.654328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.654330] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 59.654334] Call Trace: [ 59.654335] <TASK> [ 59.654337] dump_stack_lvl+0x73/0xb0 [ 59.654341] print_report+0xd1/0x650 [ 59.654345] ? __virt_addr_valid+0x1db/0x2d0 [ 59.654349] ? kasan_atomics_helper+0xfa9/0x5450 [ 59.654353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 59.654357] ? kasan_atomics_helper+0xfa9/0x5450 [ 59.654362] kasan_report+0x141/0x180 [ 59.654366] ? kasan_atomics_helper+0xfa9/0x5450 [ 59.654371] kasan_check_range+0x10c/0x1c0 [ 59.654376] __kasan_check_write+0x18/0x20 [ 59.654380] kasan_atomics_helper+0xfa9/0x5450 [ 59.654384] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 59.654388] ? __kmalloc_cache_noprof+0x189/0x420 [ 59.654392] ? kasan_atomics+0x152/0x310 [ 59.654396] kasan_atomics+0x1dc/0x310 [ 59.654400] ? __pfx_kasan_atomics+0x10/0x10 [ 59.654404] ? ktime_get_ts64+0x83/0x230 [ 59.654408] kunit_try_run_case+0x1a2/0x480 [ 59.654413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.654417] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 59.654422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 59.654427] ? __kthread_parkme+0x82/0x180 [ 59.654431] ? preempt_count_sub+0x50/0x80 [ 59.654436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.654440] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.654445] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 59.654449] kthread+0x334/0x6f0 [ 59.654453] ? trace_preempt_on+0x20/0xc0 [ 59.654458] ? __pfx_kthread+0x10/0x10 [ 59.654462] ? _raw_spin_unlock_irq+0x47/0x80 [ 59.654467] ? calculate_sigpending+0x7b/0xa0 [ 59.654471] ? __pfx_kthread+0x10/0x10 [ 59.654475] ret_from_fork+0x3e/0x80 [ 59.654479] ? __pfx_kthread+0x10/0x10 [ 59.654484] ret_from_fork_asm+0x1a/0x30 [ 59.654490] </TASK> [ 59.654491] [ 59.835113] Allocated by task 308: [ 59.838521] kasan_save_stack+0x45/0x70 [ 59.842369] kasan_save_track+0x18/0x40 [ 59.846217] kasan_save_alloc_info+0x3b/0x50 [ 59.850497] __kasan_kmalloc+0xb7/0xc0 [ 59.854250] __kmalloc_cache_noprof+0x189/0x420 [ 59.858781] kasan_atomics+0x95/0x310 [ 59.862447] kunit_try_run_case+0x1a2/0x480 [ 59.866632] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.872032] kthread+0x334/0x6f0 [ 59.875266] ret_from_fork+0x3e/0x80 [ 59.878851] ret_from_fork_asm+0x1a/0x30 [ 59.882779] [ 59.884277] The buggy address belongs to the object at ffff8881061f7500 [ 59.884277] which belongs to the cache kmalloc-64 of size 64 [ 59.896610] The buggy address is located 0 bytes to the right of [ 59.896610] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 59.909471] [ 59.910970] The buggy address belongs to the physical page: [ 59.916543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 59.924549] flags: 0x200000000000000(node=0|zone=2) [ 59.929429] page_type: f5(slab) [ 59.932575] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 59.940324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.948071] page dumped because: kasan: bad access detected [ 59.953641] [ 59.955142] Memory state around the buggy address: [ 59.959936] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.967163] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.974381] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.981598] ^ [ 59.986392] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.993611] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.000830] ================================================================== [ 67.160462] ================================================================== [ 67.167705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 67.175120] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 67.182513] [ 67.184014] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 67.184022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.184024] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 67.184027] Call Trace: [ 67.184029] <TASK> [ 67.184031] dump_stack_lvl+0x73/0xb0 [ 67.184034] print_report+0xd1/0x650 [ 67.184038] ? __virt_addr_valid+0x1db/0x2d0 [ 67.184042] ? kasan_atomics_helper+0x18b1/0x5450 [ 67.184046] ? kasan_complete_mode_report_info+0x2a/0x200 [ 67.184051] ? kasan_atomics_helper+0x18b1/0x5450 [ 67.184055] kasan_report+0x141/0x180 [ 67.184059] ? kasan_atomics_helper+0x18b1/0x5450 [ 67.184064] kasan_check_range+0x10c/0x1c0 [ 67.184069] __kasan_check_write+0x18/0x20 [ 67.184073] kasan_atomics_helper+0x18b1/0x5450 [ 67.184077] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 67.184082] ? __kmalloc_cache_noprof+0x189/0x420 [ 67.184086] ? kasan_atomics+0x152/0x310 [ 67.184090] kasan_atomics+0x1dc/0x310 [ 67.184093] ? __pfx_kasan_atomics+0x10/0x10 [ 67.184097] ? ktime_get_ts64+0x83/0x230 [ 67.184102] kunit_try_run_case+0x1a2/0x480 [ 67.184106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.184110] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 67.184115] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 67.184120] ? __kthread_parkme+0x82/0x180 [ 67.184124] ? preempt_count_sub+0x50/0x80 [ 67.184129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.184134] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.184138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 67.184142] kthread+0x334/0x6f0 [ 67.184146] ? trace_preempt_on+0x20/0xc0 [ 67.184151] ? __pfx_kthread+0x10/0x10 [ 67.184155] ? _raw_spin_unlock_irq+0x47/0x80 [ 67.184159] ? calculate_sigpending+0x7b/0xa0 [ 67.184163] ? __pfx_kthread+0x10/0x10 [ 67.184168] ret_from_fork+0x3e/0x80 [ 67.184172] ? __pfx_kthread+0x10/0x10 [ 67.184176] ret_from_fork_asm+0x1a/0x30 [ 67.184182] </TASK> [ 67.184184] [ 67.365129] Allocated by task 308: [ 67.368534] kasan_save_stack+0x45/0x70 [ 67.372372] kasan_save_track+0x18/0x40 [ 67.376212] kasan_save_alloc_info+0x3b/0x50 [ 67.380485] __kasan_kmalloc+0xb7/0xc0 [ 67.384236] __kmalloc_cache_noprof+0x189/0x420 [ 67.388771] kasan_atomics+0x95/0x310 [ 67.392435] kunit_try_run_case+0x1a2/0x480 [ 67.396621] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.402019] kthread+0x334/0x6f0 [ 67.405253] ret_from_fork+0x3e/0x80 [ 67.408831] ret_from_fork_asm+0x1a/0x30 [ 67.412759] [ 67.414258] The buggy address belongs to the object at ffff8881061f7500 [ 67.414258] which belongs to the cache kmalloc-64 of size 64 [ 67.426599] The buggy address is located 0 bytes to the right of [ 67.426599] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 67.439468] [ 67.440967] The buggy address belongs to the physical page: [ 67.446541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 67.454545] flags: 0x200000000000000(node=0|zone=2) [ 67.459426] page_type: f5(slab) [ 67.462573] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 67.470320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.478059] page dumped because: kasan: bad access detected [ 67.483630] [ 67.485129] Memory state around the buggy address: [ 67.489923] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.497141] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.504359] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.511578] ^ [ 67.516372] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.523592] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.530810] ================================================================== [ 72.492514] ================================================================== [ 72.499761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 72.507161] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 72.514554] [ 72.516055] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 72.516063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.516065] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 72.516069] Call Trace: [ 72.516070] <TASK> [ 72.516072] dump_stack_lvl+0x73/0xb0 [ 72.516076] print_report+0xd1/0x650 [ 72.516080] ? __virt_addr_valid+0x1db/0x2d0 [ 72.516084] ? kasan_atomics_helper+0x2006/0x5450 [ 72.516088] ? kasan_complete_mode_report_info+0x2a/0x200 [ 72.516093] ? kasan_atomics_helper+0x2006/0x5450 [ 72.516097] kasan_report+0x141/0x180 [ 72.516101] ? kasan_atomics_helper+0x2006/0x5450 [ 72.516106] kasan_check_range+0x10c/0x1c0 [ 72.516111] __kasan_check_write+0x18/0x20 [ 72.516115] kasan_atomics_helper+0x2006/0x5450 [ 72.516119] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 72.516124] ? __kmalloc_cache_noprof+0x189/0x420 [ 72.516128] ? kasan_atomics+0x152/0x310 [ 72.516132] kasan_atomics+0x1dc/0x310 [ 72.516135] ? __pfx_kasan_atomics+0x10/0x10 [ 72.516139] ? ktime_get_ts64+0x83/0x230 [ 72.516144] kunit_try_run_case+0x1a2/0x480 [ 72.516149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.516153] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 72.516158] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 72.516162] ? __kthread_parkme+0x82/0x180 [ 72.516167] ? preempt_count_sub+0x50/0x80 [ 72.516171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.516176] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.516180] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 72.516184] kthread+0x334/0x6f0 [ 72.516188] ? trace_preempt_on+0x20/0xc0 [ 72.516193] ? __pfx_kthread+0x10/0x10 [ 72.516197] ? _raw_spin_unlock_irq+0x47/0x80 [ 72.516201] ? calculate_sigpending+0x7b/0xa0 [ 72.516205] ? __pfx_kthread+0x10/0x10 [ 72.516210] ret_from_fork+0x3e/0x80 [ 72.516214] ? __pfx_kthread+0x10/0x10 [ 72.516219] ret_from_fork_asm+0x1a/0x30 [ 72.516224] </TASK> [ 72.516226] [ 72.697240] Allocated by task 308: [ 72.700645] kasan_save_stack+0x45/0x70 [ 72.704485] kasan_save_track+0x18/0x40 [ 72.708324] kasan_save_alloc_info+0x3b/0x50 [ 72.712597] __kasan_kmalloc+0xb7/0xc0 [ 72.716356] __kmalloc_cache_noprof+0x189/0x420 [ 72.720890] kasan_atomics+0x95/0x310 [ 72.724556] kunit_try_run_case+0x1a2/0x480 [ 72.728749] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.734147] kthread+0x334/0x6f0 [ 72.737380] ret_from_fork+0x3e/0x80 [ 72.740959] ret_from_fork_asm+0x1a/0x30 [ 72.744886] [ 72.746384] The buggy address belongs to the object at ffff8881061f7500 [ 72.746384] which belongs to the cache kmalloc-64 of size 64 [ 72.758736] The buggy address is located 0 bytes to the right of [ 72.758736] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 72.771603] [ 72.773103] The buggy address belongs to the physical page: [ 72.778694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 72.786718] flags: 0x200000000000000(node=0|zone=2) [ 72.791605] page_type: f5(slab) [ 72.794753] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 72.802501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.810248] page dumped because: kasan: bad access detected [ 72.815820] [ 72.817319] Memory state around the buggy address: [ 72.822112] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.829330] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.836549] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.843769] ^ [ 72.848561] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.855788] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.863005] ================================================================== [ 63.390483] ================================================================== [ 63.397735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 63.405131] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 63.412435] [ 63.413938] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 63.413945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.413947] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 63.413951] Call Trace: [ 63.413952] <TASK> [ 63.413954] dump_stack_lvl+0x73/0xb0 [ 63.413958] print_report+0xd1/0x650 [ 63.413962] ? __virt_addr_valid+0x1db/0x2d0 [ 63.413966] ? kasan_atomics_helper+0x13b5/0x5450 [ 63.413970] ? kasan_complete_mode_report_info+0x2a/0x200 [ 63.413974] ? kasan_atomics_helper+0x13b5/0x5450 [ 63.413978] kasan_report+0x141/0x180 [ 63.413983] ? kasan_atomics_helper+0x13b5/0x5450 [ 63.413988] kasan_check_range+0x10c/0x1c0 [ 63.413993] __kasan_check_read+0x15/0x20 [ 63.413996] kasan_atomics_helper+0x13b5/0x5450 [ 63.414001] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 63.414005] ? __kmalloc_cache_noprof+0x189/0x420 [ 63.414009] ? kasan_atomics+0x152/0x310 [ 63.414013] kasan_atomics+0x1dc/0x310 [ 63.414016] ? __pfx_kasan_atomics+0x10/0x10 [ 63.414020] ? ktime_get_ts64+0x83/0x230 [ 63.414025] kunit_try_run_case+0x1a2/0x480 [ 63.414029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.414034] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 63.414038] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 63.414043] ? __kthread_parkme+0x82/0x180 [ 63.414047] ? preempt_count_sub+0x50/0x80 [ 63.414052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.414057] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.414061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 63.414065] kthread+0x334/0x6f0 [ 63.414069] ? trace_preempt_on+0x20/0xc0 [ 63.414074] ? __pfx_kthread+0x10/0x10 [ 63.414078] ? _raw_spin_unlock_irq+0x47/0x80 [ 63.414082] ? calculate_sigpending+0x7b/0xa0 [ 63.414086] ? __pfx_kthread+0x10/0x10 [ 63.414091] ret_from_fork+0x3e/0x80 [ 63.414095] ? __pfx_kthread+0x10/0x10 [ 63.414100] ret_from_fork_asm+0x1a/0x30 [ 63.414105] </TASK> [ 63.414107] [ 63.595093] Allocated by task 308: [ 63.598502] kasan_save_stack+0x45/0x70 [ 63.602350] kasan_save_track+0x18/0x40 [ 63.606195] kasan_save_alloc_info+0x3b/0x50 [ 63.610470] __kasan_kmalloc+0xb7/0xc0 [ 63.614229] __kmalloc_cache_noprof+0x189/0x420 [ 63.618764] kasan_atomics+0x95/0x310 [ 63.622427] kunit_try_run_case+0x1a2/0x480 [ 63.626614] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.632014] kthread+0x334/0x6f0 [ 63.635253] ret_from_fork+0x3e/0x80 [ 63.638834] ret_from_fork_asm+0x1a/0x30 [ 63.642759] [ 63.644259] The buggy address belongs to the object at ffff8881061f7500 [ 63.644259] which belongs to the cache kmalloc-64 of size 64 [ 63.656599] The buggy address is located 0 bytes to the right of [ 63.656599] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 63.669459] [ 63.670959] The buggy address belongs to the physical page: [ 63.676532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 63.684530] flags: 0x200000000000000(node=0|zone=2) [ 63.689411] page_type: f5(slab) [ 63.692558] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 63.700303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.708041] page dumped because: kasan: bad access detected [ 63.713613] [ 63.715115] Memory state around the buggy address: [ 63.719907] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.727134] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.734353] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.741573] ^ [ 63.746365] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.753584] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.760811] ================================================================== [ 67.538082] ================================================================== [ 67.545325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 67.552740] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308 [ 67.560136] [ 67.561637] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 67.561644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.561647] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 67.561650] Call Trace: [ 67.561652] <TASK> [ 67.561653] dump_stack_lvl+0x73/0xb0 [ 67.561657] print_report+0xd1/0x650 [ 67.561661] ? __virt_addr_valid+0x1db/0x2d0 [ 67.561665] ? kasan_atomics_helper+0x194a/0x5450 [ 67.561670] ? kasan_complete_mode_report_info+0x2a/0x200 [ 67.561691] ? kasan_atomics_helper+0x194a/0x5450 [ 67.561695] kasan_report+0x141/0x180 [ 67.561700] ? kasan_atomics_helper+0x194a/0x5450 [ 67.561705] kasan_check_range+0x10c/0x1c0 [ 67.561710] __kasan_check_write+0x18/0x20 [ 67.561714] kasan_atomics_helper+0x194a/0x5450 [ 67.561731] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 67.561736] ? __kmalloc_cache_noprof+0x189/0x420 [ 67.561740] ? kasan_atomics+0x152/0x310 [ 67.561744] kasan_atomics+0x1dc/0x310 [ 67.561747] ? __pfx_kasan_atomics+0x10/0x10 [ 67.561751] ? ktime_get_ts64+0x83/0x230 [ 67.561756] kunit_try_run_case+0x1a2/0x480 [ 67.561761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.561765] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 67.561770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 67.561774] ? __kthread_parkme+0x82/0x180 [ 67.561779] ? preempt_count_sub+0x50/0x80 [ 67.561784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.561788] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.561793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 67.561797] kthread+0x334/0x6f0 [ 67.561801] ? trace_preempt_on+0x20/0xc0 [ 67.561805] ? __pfx_kthread+0x10/0x10 [ 67.561810] ? _raw_spin_unlock_irq+0x47/0x80 [ 67.561814] ? calculate_sigpending+0x7b/0xa0 [ 67.561818] ? __pfx_kthread+0x10/0x10 [ 67.561823] ret_from_fork+0x3e/0x80 [ 67.561827] ? __pfx_kthread+0x10/0x10 [ 67.561831] ret_from_fork_asm+0x1a/0x30 [ 67.561837] </TASK> [ 67.561839] [ 67.742872] Allocated by task 308: [ 67.746281] kasan_save_stack+0x45/0x70 [ 67.750126] kasan_save_track+0x18/0x40 [ 67.753966] kasan_save_alloc_info+0x3b/0x50 [ 67.758237] __kasan_kmalloc+0xb7/0xc0 [ 67.761990] __kmalloc_cache_noprof+0x189/0x420 [ 67.766523] kasan_atomics+0x95/0x310 [ 67.770188] kunit_try_run_case+0x1a2/0x480 [ 67.774375] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.779774] kthread+0x334/0x6f0 [ 67.783007] ret_from_fork+0x3e/0x80 [ 67.786587] ret_from_fork_asm+0x1a/0x30 [ 67.790520] [ 67.792020] The buggy address belongs to the object at ffff8881061f7500 [ 67.792020] which belongs to the cache kmalloc-64 of size 64 [ 67.804362] The buggy address is located 0 bytes to the right of [ 67.804362] allocated 48-byte region [ffff8881061f7500, ffff8881061f7530) [ 67.817230] [ 67.818745] The buggy address belongs to the physical page: [ 67.824319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7 [ 67.832326] flags: 0x200000000000000(node=0|zone=2) [ 67.837207] page_type: f5(slab) [ 67.840352] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 67.848090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.855830] page dumped because: kasan: bad access detected [ 67.861402] [ 67.862902] Memory state around the buggy address: [ 67.867706] ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.874949] ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.882166] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.889384] ^ [ 67.894178] ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.901398] ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.908625] ==================================================================