Date
April 22, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 21.204512] ================================================================== [ 21.204662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 21.204779] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.204907] [ 21.204981] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.205157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.205222] Hardware name: linux,dummy-virt (DT) [ 21.205298] Call trace: [ 21.205352] show_stack+0x20/0x38 (C) [ 21.205471] dump_stack_lvl+0x8c/0xd0 [ 21.205605] print_report+0x118/0x608 [ 21.205720] kasan_report+0xdc/0x128 [ 21.205824] kasan_check_range+0x100/0x1a8 [ 21.205937] __kasan_check_write+0x20/0x30 [ 21.206047] kasan_atomics_helper+0x1414/0x4858 [ 21.207086] kasan_atomics+0x198/0x2e0 [ 21.207392] kunit_try_run_case+0x170/0x3f0 [ 21.208028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.208437] kthread+0x328/0x630 [ 21.208915] ret_from_fork+0x10/0x20 [ 21.209038] [ 21.209085] Allocated by task 267: [ 21.209157] kasan_save_stack+0x3c/0x68 [ 21.209249] kasan_save_track+0x20/0x40 [ 21.209321] kasan_save_alloc_info+0x40/0x58 [ 21.209385] __kasan_kmalloc+0xd4/0xd8 [ 21.209446] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.209559] kasan_atomics+0xb8/0x2e0 [ 21.209630] kunit_try_run_case+0x170/0x3f0 [ 21.209707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.209792] kthread+0x328/0x630 [ 21.209861] ret_from_fork+0x10/0x20 [ 21.209933] [ 21.209975] The buggy address belongs to the object at fff00000c42b8d00 [ 21.209975] which belongs to the cache kmalloc-64 of size 64 [ 21.210093] The buggy address is located 0 bytes to the right of [ 21.210093] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.210225] [ 21.210269] The buggy address belongs to the physical page: [ 21.210334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.210436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.211591] page_type: f5(slab) [ 21.211843] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.211970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.212062] page dumped because: kasan: bad access detected [ 21.212133] [ 21.212175] Memory state around the buggy address: [ 21.212248] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.212346] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.212436] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.212862] ^ [ 21.212977] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.213075] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.213155] ================================================================== [ 21.325225] ================================================================== [ 21.325344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 21.325454] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.327330] [ 21.327436] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.327550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.327841] Hardware name: linux,dummy-virt (DT) [ 21.327928] Call trace: [ 21.327981] show_stack+0x20/0x38 (C) [ 21.328100] dump_stack_lvl+0x8c/0xd0 [ 21.328208] print_report+0x118/0x608 [ 21.328311] kasan_report+0xdc/0x128 [ 21.328413] kasan_check_range+0x100/0x1a8 [ 21.328520] __kasan_check_write+0x20/0x30 [ 21.328642] kasan_atomics_helper+0x175c/0x4858 [ 21.328750] kasan_atomics+0x198/0x2e0 [ 21.328852] kunit_try_run_case+0x170/0x3f0 [ 21.328962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.329136] kthread+0x328/0x630 [ 21.329450] ret_from_fork+0x10/0x20 [ 21.329789] [ 21.329838] Allocated by task 267: [ 21.330196] kasan_save_stack+0x3c/0x68 [ 21.330544] kasan_save_track+0x20/0x40 [ 21.330878] kasan_save_alloc_info+0x40/0x58 [ 21.331160] __kasan_kmalloc+0xd4/0xd8 [ 21.331251] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.331711] kasan_atomics+0xb8/0x2e0 [ 21.332690] kunit_try_run_case+0x170/0x3f0 [ 21.332807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.333459] kthread+0x328/0x630 [ 21.333583] ret_from_fork+0x10/0x20 [ 21.334264] [ 21.334661] The buggy address belongs to the object at fff00000c42b8d00 [ 21.334661] which belongs to the cache kmalloc-64 of size 64 [ 21.335567] The buggy address is located 0 bytes to the right of [ 21.335567] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.335741] [ 21.336149] The buggy address belongs to the physical page: [ 21.336272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.336400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.336521] page_type: f5(slab) [ 21.336620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.336736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.336842] page dumped because: kasan: bad access detected [ 21.338623] [ 21.338855] Memory state around the buggy address: [ 21.339461] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.339699] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.340811] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.341686] ^ [ 21.343660] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.343799] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.343894] ================================================================== [ 20.763944] ================================================================== [ 20.764096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 20.764339] [ 20.764451] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.764737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.765438] kasan_report+0xdc/0x128 [ 20.765685] __kasan_check_write+0x20/0x30 [ 20.766304] kunit_try_run_case+0x170/0x3f0 [ 20.767190] kasan_save_track+0x20/0x40 [ 20.767857] kthread+0x328/0x630 [ 20.768247] The buggy address is located 0 bytes to the right of [ 20.768247] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 20.768393] [ 20.768448] The buggy address belongs to the physical page: [ 20.768602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 20.768979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.769804] page dumped because: kasan: bad access detected [ 20.770503] ^ [ 20.770753] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.772973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 20.773249] [ 20.773903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.774217] Hardware name: linux,dummy-virt (DT) [ 20.774299] Call trace: [ 20.774991] kasan_report+0xdc/0x128 [ 20.776174] kthread+0x328/0x630 [ 20.777027] kasan_save_track+0x20/0x40 [ 20.777149] kasan_save_alloc_info+0x40/0x58 [ 20.777257] __kasan_kmalloc+0xd4/0xd8 [ 20.777364] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.777611] kunit_try_run_case+0x170/0x3f0 [ 20.777978] ret_from_fork+0x10/0x20 [ 20.778067] [ 20.778133] The buggy address belongs to the object at fff00000c42b8d00 [ 20.778133] which belongs to the cache kmalloc-64 of size 64 [ 20.778511] [ 20.778607] The buggy address belongs to the physical page: [ 20.778681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 20.780900] ================================================================== [ 21.060597] ================================================================== [ 21.060711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 21.061330] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.061627] [ 21.061750] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.061994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.062125] Hardware name: linux,dummy-virt (DT) [ 21.062277] Call trace: [ 21.062333] show_stack+0x20/0x38 (C) [ 21.062651] dump_stack_lvl+0x8c/0xd0 [ 21.062837] print_report+0x118/0x608 [ 21.062986] kasan_report+0xdc/0x128 [ 21.063136] kasan_check_range+0x100/0x1a8 [ 21.063282] __kasan_check_write+0x20/0x30 [ 21.063428] kasan_atomics_helper+0xeb8/0x4858 [ 21.063590] kasan_atomics+0x198/0x2e0 [ 21.063696] kunit_try_run_case+0x170/0x3f0 [ 21.063784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.064249] kthread+0x328/0x630 [ 21.064400] ret_from_fork+0x10/0x20 [ 21.064524] [ 21.064582] Allocated by task 267: [ 21.064657] kasan_save_stack+0x3c/0x68 [ 21.064749] kasan_save_track+0x20/0x40 [ 21.064841] kasan_save_alloc_info+0x40/0x58 [ 21.064976] __kasan_kmalloc+0xd4/0xd8 [ 21.065063] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.065166] kasan_atomics+0xb8/0x2e0 [ 21.065248] kunit_try_run_case+0x170/0x3f0 [ 21.065411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.065538] kthread+0x328/0x630 [ 21.066122] ret_from_fork+0x10/0x20 [ 21.066357] [ 21.066408] The buggy address belongs to the object at fff00000c42b8d00 [ 21.066408] which belongs to the cache kmalloc-64 of size 64 [ 21.067748] The buggy address is located 0 bytes to the right of [ 21.067748] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.068000] [ 21.068062] The buggy address belongs to the physical page: [ 21.068146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.068280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.068408] page_type: f5(slab) [ 21.068504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.068645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.070683] page dumped because: kasan: bad access detected [ 21.071240] [ 21.072088] Memory state around the buggy address: [ 21.072405] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.072612] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.073110] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.073365] ^ [ 21.073448] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.073588] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.073690] ================================================================== [ 21.053566] ================================================================== [ 21.053695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 21.053881] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.054228] [ 21.054364] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.054636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.054697] Hardware name: linux,dummy-virt (DT) [ 21.054757] Call trace: [ 21.054808] show_stack+0x20/0x38 (C) [ 21.054920] dump_stack_lvl+0x8c/0xd0 [ 21.055043] print_report+0x118/0x608 [ 21.055189] kasan_report+0xdc/0x128 [ 21.055330] __asan_report_store8_noabort+0x20/0x30 [ 21.055488] kasan_atomics_helper+0x3e5c/0x4858 [ 21.055605] kasan_atomics+0x198/0x2e0 [ 21.055699] kunit_try_run_case+0x170/0x3f0 [ 21.055813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.056356] kthread+0x328/0x630 [ 21.056490] ret_from_fork+0x10/0x20 [ 21.056637] [ 21.056715] Allocated by task 267: [ 21.056782] kasan_save_stack+0x3c/0x68 [ 21.056906] kasan_save_track+0x20/0x40 [ 21.057002] kasan_save_alloc_info+0x40/0x58 [ 21.057081] __kasan_kmalloc+0xd4/0xd8 [ 21.057154] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.057236] kasan_atomics+0xb8/0x2e0 [ 21.057309] kunit_try_run_case+0x170/0x3f0 [ 21.057601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.057703] kthread+0x328/0x630 [ 21.057805] ret_from_fork+0x10/0x20 [ 21.057915] [ 21.057963] The buggy address belongs to the object at fff00000c42b8d00 [ 21.057963] which belongs to the cache kmalloc-64 of size 64 [ 21.058109] The buggy address is located 0 bytes to the right of [ 21.058109] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.058289] [ 21.058369] The buggy address belongs to the physical page: [ 21.058447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.058591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.058734] page_type: f5(slab) [ 21.058830] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.058957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.059078] page dumped because: kasan: bad access detected [ 21.059162] [ 21.059211] Memory state around the buggy address: [ 21.059289] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.059438] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.059563] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.059680] ^ [ 21.059795] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.059947] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.060084] ================================================================== [ 21.181820] ================================================================== [ 21.181968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 21.182072] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.182229] [ 21.182338] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.182586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.182647] Hardware name: linux,dummy-virt (DT) [ 21.182719] Call trace: [ 21.182778] show_stack+0x20/0x38 (C) [ 21.182900] dump_stack_lvl+0x8c/0xd0 [ 21.183130] print_report+0x118/0x608 [ 21.183231] kasan_report+0xdc/0x128 [ 21.183618] kasan_check_range+0x100/0x1a8 [ 21.184471] __kasan_check_write+0x20/0x30 [ 21.184682] kasan_atomics_helper+0x12d8/0x4858 [ 21.184782] kasan_atomics+0x198/0x2e0 [ 21.184883] kunit_try_run_case+0x170/0x3f0 [ 21.185201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.185298] kthread+0x328/0x630 [ 21.185351] ret_from_fork+0x10/0x20 [ 21.185413] [ 21.185451] Allocated by task 267: [ 21.185526] kasan_save_stack+0x3c/0x68 [ 21.185665] kasan_save_track+0x20/0x40 [ 21.185765] kasan_save_alloc_info+0x40/0x58 [ 21.185879] __kasan_kmalloc+0xd4/0xd8 [ 21.185974] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.186080] kasan_atomics+0xb8/0x2e0 [ 21.186167] kunit_try_run_case+0x170/0x3f0 [ 21.186271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.186431] kthread+0x328/0x630 [ 21.186527] ret_from_fork+0x10/0x20 [ 21.186621] [ 21.186666] The buggy address belongs to the object at fff00000c42b8d00 [ 21.186666] which belongs to the cache kmalloc-64 of size 64 [ 21.186868] The buggy address is located 0 bytes to the right of [ 21.186868] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.187090] [ 21.187141] The buggy address belongs to the physical page: [ 21.187216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.187347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.187462] page_type: f5(slab) [ 21.187550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.187660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.187763] page dumped because: kasan: bad access detected [ 21.187844] [ 21.187890] Memory state around the buggy address: [ 21.187963] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.188053] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.188712] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.188856] ^ [ 21.189360] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.189491] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.189596] ================================================================== [ 21.105682] ================================================================== [ 21.105772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 21.105899] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.106064] [ 21.106145] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.106340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.106409] Hardware name: linux,dummy-virt (DT) [ 21.106488] Call trace: [ 21.106556] show_stack+0x20/0x38 (C) [ 21.106674] dump_stack_lvl+0x8c/0xd0 [ 21.106781] print_report+0x118/0x608 [ 21.106886] kasan_report+0xdc/0x128 [ 21.106984] kasan_check_range+0x100/0x1a8 [ 21.107092] __kasan_check_write+0x20/0x30 [ 21.107198] kasan_atomics_helper+0xff0/0x4858 [ 21.108049] kasan_atomics+0x198/0x2e0 [ 21.108258] kunit_try_run_case+0x170/0x3f0 [ 21.108468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.109132] kthread+0x328/0x630 [ 21.109475] ret_from_fork+0x10/0x20 [ 21.109864] [ 21.109920] Allocated by task 267: [ 21.110004] kasan_save_stack+0x3c/0x68 [ 21.110269] kasan_save_track+0x20/0x40 [ 21.110454] kasan_save_alloc_info+0x40/0x58 [ 21.110544] __kasan_kmalloc+0xd4/0xd8 [ 21.110929] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.111167] kasan_atomics+0xb8/0x2e0 [ 21.111497] kunit_try_run_case+0x170/0x3f0 [ 21.111624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.111804] kthread+0x328/0x630 [ 21.112042] ret_from_fork+0x10/0x20 [ 21.112380] [ 21.112438] The buggy address belongs to the object at fff00000c42b8d00 [ 21.112438] which belongs to the cache kmalloc-64 of size 64 [ 21.112583] The buggy address is located 0 bytes to the right of [ 21.112583] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.112854] [ 21.113043] The buggy address belongs to the physical page: [ 21.113131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.113541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.113983] page_type: f5(slab) [ 21.114128] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.114459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.114756] page dumped because: kasan: bad access detected [ 21.114834] [ 21.114880] Memory state around the buggy address: [ 21.114956] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.115066] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.115499] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.115691] ^ [ 21.115865] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.116036] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.116413] ================================================================== [ 20.997223] ================================================================== [ 20.997356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.997484] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 20.997628] [ 20.997714] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.997932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.998002] Hardware name: linux,dummy-virt (DT) [ 20.998086] Call trace: [ 20.998149] show_stack+0x20/0x38 (C) [ 20.998268] dump_stack_lvl+0x8c/0xd0 [ 20.999841] print_report+0x118/0x608 [ 21.000121] kasan_report+0xdc/0x128 [ 21.000819] kasan_check_range+0x100/0x1a8 [ 21.001065] __kasan_check_read+0x20/0x30 [ 21.001325] kasan_atomics_helper+0xdd4/0x4858 [ 21.001917] kasan_atomics+0x198/0x2e0 [ 21.002109] kunit_try_run_case+0x170/0x3f0 [ 21.002630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.003510] kthread+0x328/0x630 [ 21.003791] ret_from_fork+0x10/0x20 [ 21.004462] [ 21.004704] Allocated by task 267: [ 21.004878] kasan_save_stack+0x3c/0x68 [ 21.005161] kasan_save_track+0x20/0x40 [ 21.005593] kasan_save_alloc_info+0x40/0x58 [ 21.006071] __kasan_kmalloc+0xd4/0xd8 [ 21.006568] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.006922] kasan_atomics+0xb8/0x2e0 [ 21.007098] kunit_try_run_case+0x170/0x3f0 [ 21.007193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.008196] kthread+0x328/0x630 [ 21.008497] ret_from_fork+0x10/0x20 [ 21.008598] [ 21.009518] The buggy address belongs to the object at fff00000c42b8d00 [ 21.009518] which belongs to the cache kmalloc-64 of size 64 [ 21.009716] The buggy address is located 0 bytes to the right of [ 21.009716] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.011203] [ 21.011426] The buggy address belongs to the physical page: [ 21.011822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.012190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.012514] page_type: f5(slab) [ 21.013280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.013922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.014258] page dumped because: kasan: bad access detected [ 21.014347] [ 21.014398] Memory state around the buggy address: [ 21.014479] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.014601] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.014713] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.014807] ^ [ 21.014893] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.014995] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.017133] ================================================================== [ 20.965982] ================================================================== [ 20.966105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.966224] Write of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 20.966339] [ 20.966451] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.966961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.967066] Hardware name: linux,dummy-virt (DT) [ 20.967487] Call trace: [ 20.968011] show_stack+0x20/0x38 (C) [ 20.968474] dump_stack_lvl+0x8c/0xd0 [ 20.968998] print_report+0x118/0x608 [ 20.969241] kasan_report+0xdc/0x128 [ 20.969413] kasan_check_range+0x100/0x1a8 [ 20.969906] __kasan_check_write+0x20/0x30 [ 20.970150] kasan_atomics_helper+0xd3c/0x4858 [ 20.970725] kasan_atomics+0x198/0x2e0 [ 20.970859] kunit_try_run_case+0x170/0x3f0 [ 20.970967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.971090] kthread+0x328/0x630 [ 20.971745] ret_from_fork+0x10/0x20 [ 20.972166] [ 20.972220] Allocated by task 267: [ 20.972305] kasan_save_stack+0x3c/0x68 [ 20.972385] kasan_save_track+0x20/0x40 [ 20.972449] kasan_save_alloc_info+0x40/0x58 [ 20.972540] __kasan_kmalloc+0xd4/0xd8 [ 20.972624] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.973222] kasan_atomics+0xb8/0x2e0 [ 20.973661] kunit_try_run_case+0x170/0x3f0 [ 20.973765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.974168] kthread+0x328/0x630 [ 20.974527] ret_from_fork+0x10/0x20 [ 20.974648] [ 20.974697] The buggy address belongs to the object at fff00000c42b8d00 [ 20.974697] which belongs to the cache kmalloc-64 of size 64 [ 20.975322] The buggy address is located 0 bytes to the right of [ 20.975322] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 20.975497] [ 20.976002] The buggy address belongs to the physical page: [ 20.976099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 20.976237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.976358] page_type: f5(slab) [ 20.977028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.977643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.978026] page dumped because: kasan: bad access detected [ 20.978121] [ 20.978182] Memory state around the buggy address: [ 20.978276] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.978388] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.978502] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.979511] ^ [ 20.979949] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.980151] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.980368] ================================================================== [ 21.018662] ================================================================== [ 21.019270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 21.019468] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.019909] [ 21.020027] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.020463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.020675] Hardware name: linux,dummy-virt (DT) [ 21.021173] Call trace: [ 21.021355] show_stack+0x20/0x38 (C) [ 21.021520] dump_stack_lvl+0x8c/0xd0 [ 21.022329] print_report+0x118/0x608 [ 21.023092] kasan_report+0xdc/0x128 [ 21.023384] __asan_report_load8_noabort+0x20/0x30 [ 21.023942] kasan_atomics_helper+0x3f58/0x4858 [ 21.024312] kasan_atomics+0x198/0x2e0 [ 21.024817] kunit_try_run_case+0x170/0x3f0 [ 21.025408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.025561] kthread+0x328/0x630 [ 21.026070] ret_from_fork+0x10/0x20 [ 21.026192] [ 21.026241] Allocated by task 267: [ 21.027521] kasan_save_stack+0x3c/0x68 [ 21.027792] kasan_save_track+0x20/0x40 [ 21.028544] kasan_save_alloc_info+0x40/0x58 [ 21.028655] __kasan_kmalloc+0xd4/0xd8 [ 21.029196] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.029380] kasan_atomics+0xb8/0x2e0 [ 21.030180] kunit_try_run_case+0x170/0x3f0 [ 21.030558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.030684] kthread+0x328/0x630 [ 21.030772] ret_from_fork+0x10/0x20 [ 21.031893] [ 21.032276] The buggy address belongs to the object at fff00000c42b8d00 [ 21.032276] which belongs to the cache kmalloc-64 of size 64 [ 21.032411] The buggy address is located 0 bytes to the right of [ 21.032411] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.032572] [ 21.032622] The buggy address belongs to the physical page: [ 21.033923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.034074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.034200] page_type: f5(slab) [ 21.034297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.034427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.036605] page dumped because: kasan: bad access detected [ 21.036852] [ 21.036921] Memory state around the buggy address: [ 21.037017] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.037133] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.037240] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.037955] ^ [ 21.038522] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.039205] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.039307] ================================================================== [ 21.227163] ================================================================== [ 21.227290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 21.227398] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.227508] [ 21.227646] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.228159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.228195] Hardware name: linux,dummy-virt (DT) [ 21.228228] Call trace: [ 21.228277] show_stack+0x20/0x38 (C) [ 21.228373] dump_stack_lvl+0x8c/0xd0 [ 21.228482] print_report+0x118/0x608 [ 21.228589] kasan_report+0xdc/0x128 [ 21.228686] kasan_check_range+0x100/0x1a8 [ 21.228805] __kasan_check_write+0x20/0x30 [ 21.229033] kasan_atomics_helper+0x14e4/0x4858 [ 21.229146] kasan_atomics+0x198/0x2e0 [ 21.229256] kunit_try_run_case+0x170/0x3f0 [ 21.229355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.229503] kthread+0x328/0x630 [ 21.230009] ret_from_fork+0x10/0x20 [ 21.230289] [ 21.230418] Allocated by task 267: [ 21.230647] kasan_save_stack+0x3c/0x68 [ 21.231006] kasan_save_track+0x20/0x40 [ 21.231131] kasan_save_alloc_info+0x40/0x58 [ 21.231226] __kasan_kmalloc+0xd4/0xd8 [ 21.231594] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.231959] kasan_atomics+0xb8/0x2e0 [ 21.232282] kunit_try_run_case+0x170/0x3f0 [ 21.232449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.232569] kthread+0x328/0x630 [ 21.232733] ret_from_fork+0x10/0x20 [ 21.233052] [ 21.233132] The buggy address belongs to the object at fff00000c42b8d00 [ 21.233132] which belongs to the cache kmalloc-64 of size 64 [ 21.233281] The buggy address is located 0 bytes to the right of [ 21.233281] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.233585] [ 21.233762] The buggy address belongs to the physical page: [ 21.233843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.233962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.234070] page_type: f5(slab) [ 21.234497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.234808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.235105] page dumped because: kasan: bad access detected [ 21.235202] [ 21.235250] Memory state around the buggy address: [ 21.235353] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.235454] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.235557] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.235633] ^ [ 21.235731] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.235843] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.235916] ================================================================== [ 21.153637] ================================================================== [ 21.153815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 21.154130] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.154514] [ 21.154649] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.155202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.155386] Hardware name: linux,dummy-virt (DT) [ 21.155580] Call trace: [ 21.155641] show_stack+0x20/0x38 (C) [ 21.155870] dump_stack_lvl+0x8c/0xd0 [ 21.155963] print_report+0x118/0x608 [ 21.156408] kasan_report+0xdc/0x128 [ 21.156807] kasan_check_range+0x100/0x1a8 [ 21.157086] __kasan_check_write+0x20/0x30 [ 21.157444] kasan_atomics_helper+0x1190/0x4858 [ 21.157728] kasan_atomics+0x198/0x2e0 [ 21.158087] kunit_try_run_case+0x170/0x3f0 [ 21.158407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.158709] kthread+0x328/0x630 [ 21.159012] ret_from_fork+0x10/0x20 [ 21.159219] [ 21.159265] Allocated by task 267: [ 21.159577] kasan_save_stack+0x3c/0x68 [ 21.159713] kasan_save_track+0x20/0x40 [ 21.160017] kasan_save_alloc_info+0x40/0x58 [ 21.160404] __kasan_kmalloc+0xd4/0xd8 [ 21.160566] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.160836] kasan_atomics+0xb8/0x2e0 [ 21.160941] kunit_try_run_case+0x170/0x3f0 [ 21.161028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.161151] kthread+0x328/0x630 [ 21.161230] ret_from_fork+0x10/0x20 [ 21.161314] [ 21.161447] The buggy address belongs to the object at fff00000c42b8d00 [ 21.161447] which belongs to the cache kmalloc-64 of size 64 [ 21.161802] The buggy address is located 0 bytes to the right of [ 21.161802] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.162084] [ 21.162289] The buggy address belongs to the physical page: [ 21.162416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.162820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.163065] page_type: f5(slab) [ 21.163200] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.163349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.163464] page dumped because: kasan: bad access detected [ 21.163554] [ 21.163601] Memory state around the buggy address: [ 21.163757] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.163854] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.164004] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.164088] ^ [ 21.164166] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.164264] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.164346] ================================================================== [ 21.273799] ================================================================== [ 21.274045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 21.274169] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.274293] [ 21.274367] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.274571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.274641] Hardware name: linux,dummy-virt (DT) [ 21.274720] Call trace: [ 21.274773] show_stack+0x20/0x38 (C) [ 21.274884] dump_stack_lvl+0x8c/0xd0 [ 21.274984] print_report+0x118/0x608 [ 21.275087] kasan_report+0xdc/0x128 [ 21.275188] __asan_report_load8_noabort+0x20/0x30 [ 21.275307] kasan_atomics_helper+0x3df4/0x4858 [ 21.275408] kasan_atomics+0x198/0x2e0 [ 21.275509] kunit_try_run_case+0x170/0x3f0 [ 21.276072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.276465] kthread+0x328/0x630 [ 21.276718] ret_from_fork+0x10/0x20 [ 21.276837] [ 21.276879] Allocated by task 267: [ 21.276933] kasan_save_stack+0x3c/0x68 [ 21.277017] kasan_save_track+0x20/0x40 [ 21.277097] kasan_save_alloc_info+0x40/0x58 [ 21.277188] __kasan_kmalloc+0xd4/0xd8 [ 21.277272] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.277372] kasan_atomics+0xb8/0x2e0 [ 21.277459] kunit_try_run_case+0x170/0x3f0 [ 21.277587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.277700] kthread+0x328/0x630 [ 21.277782] ret_from_fork+0x10/0x20 [ 21.277874] [ 21.277917] The buggy address belongs to the object at fff00000c42b8d00 [ 21.277917] which belongs to the cache kmalloc-64 of size 64 [ 21.278392] The buggy address is located 0 bytes to the right of [ 21.278392] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.278961] [ 21.279043] The buggy address belongs to the physical page: [ 21.279252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.279859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.280264] page_type: f5(slab) [ 21.280366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.280487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.280602] page dumped because: kasan: bad access detected [ 21.280687] [ 21.280736] Memory state around the buggy address: [ 21.280819] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.280933] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.281049] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.281153] ^ [ 21.281239] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.281355] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.284027] ================================================================== [ 20.940781] ================================================================== [ 20.940906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.941015] Read of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 20.941124] [ 20.941201] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.941373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.941433] Hardware name: linux,dummy-virt (DT) [ 20.941512] Call trace: [ 20.941580] show_stack+0x20/0x38 (C) [ 20.941691] dump_stack_lvl+0x8c/0xd0 [ 20.941789] print_report+0x118/0x608 [ 20.941880] kasan_report+0xdc/0x128 [ 20.941974] __asan_report_load4_noabort+0x20/0x30 [ 20.942080] kasan_atomics_helper+0x3dd8/0x4858 [ 20.942175] kasan_atomics+0x198/0x2e0 [ 20.942266] kunit_try_run_case+0x170/0x3f0 [ 20.942363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.942474] kthread+0x328/0x630 [ 20.943523] ret_from_fork+0x10/0x20 [ 20.943672] [ 20.943719] Allocated by task 267: [ 20.943936] kasan_save_stack+0x3c/0x68 [ 20.944164] kasan_save_track+0x20/0x40 [ 20.944332] kasan_save_alloc_info+0x40/0x58 [ 20.944492] __kasan_kmalloc+0xd4/0xd8 [ 20.944616] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.944728] kasan_atomics+0xb8/0x2e0 [ 20.944844] kunit_try_run_case+0x170/0x3f0 [ 20.944966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.945116] kthread+0x328/0x630 [ 20.945230] ret_from_fork+0x10/0x20 [ 20.945323] [ 20.945369] The buggy address belongs to the object at fff00000c42b8d00 [ 20.945369] which belongs to the cache kmalloc-64 of size 64 [ 20.945523] The buggy address is located 0 bytes to the right of [ 20.945523] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 20.955876] [ 20.955940] The buggy address belongs to the physical page: [ 20.956022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 20.956157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.958350] page_type: f5(slab) [ 20.958485] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.958621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.958726] page dumped because: kasan: bad access detected [ 20.958807] [ 20.958852] Memory state around the buggy address: [ 20.958931] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.959022] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.960984] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.961156] ^ [ 20.962157] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.962974] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.963479] ================================================================== [ 21.255151] ================================================================== [ 21.255478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 21.255620] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.255731] [ 21.255793] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.256283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.256370] Hardware name: linux,dummy-virt (DT) [ 21.256472] Call trace: [ 21.256538] show_stack+0x20/0x38 (C) [ 21.256666] dump_stack_lvl+0x8c/0xd0 [ 21.256776] print_report+0x118/0x608 [ 21.256881] kasan_report+0xdc/0x128 [ 21.256994] __asan_report_load8_noabort+0x20/0x30 [ 21.257103] kasan_atomics_helper+0x3db0/0x4858 [ 21.257673] kasan_atomics+0x198/0x2e0 [ 21.257835] kunit_try_run_case+0x170/0x3f0 [ 21.257988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.258164] kthread+0x328/0x630 [ 21.258309] ret_from_fork+0x10/0x20 [ 21.258454] [ 21.258529] Allocated by task 267: [ 21.258607] kasan_save_stack+0x3c/0x68 [ 21.258693] kasan_save_track+0x20/0x40 [ 21.258781] kasan_save_alloc_info+0x40/0x58 [ 21.258866] __kasan_kmalloc+0xd4/0xd8 [ 21.258948] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.259041] kasan_atomics+0xb8/0x2e0 [ 21.259143] kunit_try_run_case+0x170/0x3f0 [ 21.259239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.259687] kthread+0x328/0x630 [ 21.260097] ret_from_fork+0x10/0x20 [ 21.260232] [ 21.260296] The buggy address belongs to the object at fff00000c42b8d00 [ 21.260296] which belongs to the cache kmalloc-64 of size 64 [ 21.260425] The buggy address is located 0 bytes to the right of [ 21.260425] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.260588] [ 21.260641] The buggy address belongs to the physical page: [ 21.260720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.260834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.260945] page_type: f5(slab) [ 21.261930] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.262103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.262198] page dumped because: kasan: bad access detected [ 21.262693] [ 21.262748] Memory state around the buggy address: [ 21.262833] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.262945] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.263047] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.263139] ^ [ 21.263229] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.263334] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.263420] ================================================================== [ 20.981310] ================================================================== [ 20.981433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.981572] Read of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 20.981705] [ 20.982660] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.983046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.983121] Hardware name: linux,dummy-virt (DT) [ 20.983204] Call trace: [ 20.983260] show_stack+0x20/0x38 (C) [ 20.983489] dump_stack_lvl+0x8c/0xd0 [ 20.984179] print_report+0x118/0x608 [ 20.984313] kasan_report+0xdc/0x128 [ 20.984818] __asan_report_load4_noabort+0x20/0x30 [ 20.984968] kasan_atomics_helper+0x3e04/0x4858 [ 20.985085] kasan_atomics+0x198/0x2e0 [ 20.985185] kunit_try_run_case+0x170/0x3f0 [ 20.985682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.986286] kthread+0x328/0x630 [ 20.986664] ret_from_fork+0x10/0x20 [ 20.986977] [ 20.987435] Allocated by task 267: [ 20.987527] kasan_save_stack+0x3c/0x68 [ 20.987743] kasan_save_track+0x20/0x40 [ 20.987854] kasan_save_alloc_info+0x40/0x58 [ 20.987964] __kasan_kmalloc+0xd4/0xd8 [ 20.988049] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.988133] kasan_atomics+0xb8/0x2e0 [ 20.988666] kunit_try_run_case+0x170/0x3f0 [ 20.988907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.989293] kthread+0x328/0x630 [ 20.989581] ret_from_fork+0x10/0x20 [ 20.989843] [ 20.990274] The buggy address belongs to the object at fff00000c42b8d00 [ 20.990274] which belongs to the cache kmalloc-64 of size 64 [ 20.990430] The buggy address is located 0 bytes to the right of [ 20.990430] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 20.990756] [ 20.991175] The buggy address belongs to the physical page: [ 20.991276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 20.991962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.992360] page_type: f5(slab) [ 20.992482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.992624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.992724] page dumped because: kasan: bad access detected [ 20.992806] [ 20.993523] Memory state around the buggy address: [ 20.993640] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.993748] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.993850] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.993969] ^ [ 20.994065] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.994176] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.994269] ================================================================== [ 21.354566] ================================================================== [ 21.354678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 21.354792] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.354912] [ 21.355583] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.356296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.356468] Hardware name: linux,dummy-virt (DT) [ 21.356602] Call trace: [ 21.356674] show_stack+0x20/0x38 (C) [ 21.356861] dump_stack_lvl+0x8c/0xd0 [ 21.356975] print_report+0x118/0x608 [ 21.357093] kasan_report+0xdc/0x128 [ 21.357209] kasan_check_range+0x100/0x1a8 [ 21.357708] __kasan_check_write+0x20/0x30 [ 21.357843] kasan_atomics_helper+0x17ec/0x4858 [ 21.357956] kasan_atomics+0x198/0x2e0 [ 21.358096] kunit_try_run_case+0x170/0x3f0 [ 21.358211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.358333] kthread+0x328/0x630 [ 21.358438] ret_from_fork+0x10/0x20 [ 21.358561] [ 21.358609] Allocated by task 267: [ 21.358675] kasan_save_stack+0x3c/0x68 [ 21.358775] kasan_save_track+0x20/0x40 [ 21.358852] kasan_save_alloc_info+0x40/0x58 [ 21.359334] __kasan_kmalloc+0xd4/0xd8 [ 21.359448] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.359541] kasan_atomics+0xb8/0x2e0 [ 21.359620] kunit_try_run_case+0x170/0x3f0 [ 21.359705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.360028] kthread+0x328/0x630 [ 21.360132] ret_from_fork+0x10/0x20 [ 21.360314] [ 21.360680] The buggy address belongs to the object at fff00000c42b8d00 [ 21.360680] which belongs to the cache kmalloc-64 of size 64 [ 21.360926] The buggy address is located 0 bytes to the right of [ 21.360926] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.361102] [ 21.361174] The buggy address belongs to the physical page: [ 21.361319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.361438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.362043] page_type: f5(slab) [ 21.362355] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.362562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.362880] page dumped because: kasan: bad access detected [ 21.362975] [ 21.363320] Memory state around the buggy address: [ 21.363626] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.363746] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.364261] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.364361] ^ [ 21.364609] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.364720] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.364974] ================================================================== [ 20.845950] ================================================================== [ 20.846077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.846220] Write of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 20.846327] [ 20.846393] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.846594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.846667] Hardware name: linux,dummy-virt (DT) [ 20.846758] Call trace: [ 20.846808] show_stack+0x20/0x38 (C) [ 20.846950] dump_stack_lvl+0x8c/0xd0 [ 20.847389] print_report+0x118/0x608 [ 20.847549] kasan_report+0xdc/0x128 [ 20.847860] kasan_check_range+0x100/0x1a8 [ 20.847957] __kasan_check_write+0x20/0x30 [ 20.848040] kasan_atomics_helper+0xa6c/0x4858 [ 20.848135] kasan_atomics+0x198/0x2e0 [ 20.848212] kunit_try_run_case+0x170/0x3f0 [ 20.848908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.849044] kthread+0x328/0x630 [ 20.852406] ret_from_fork+0x10/0x20 [ 20.852558] [ 20.852607] Allocated by task 267: [ 20.852668] kasan_save_stack+0x3c/0x68 [ 20.852833] kasan_save_track+0x20/0x40 [ 20.853032] kasan_save_alloc_info+0x40/0x58 [ 20.853136] __kasan_kmalloc+0xd4/0xd8 [ 20.853219] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.853306] kasan_atomics+0xb8/0x2e0 [ 20.853380] kunit_try_run_case+0x170/0x3f0 [ 20.853479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.853603] kthread+0x328/0x630 [ 20.853686] ret_from_fork+0x10/0x20 [ 20.853773] [ 20.853837] The buggy address belongs to the object at fff00000c42b8d00 [ 20.853837] which belongs to the cache kmalloc-64 of size 64 [ 20.854037] The buggy address is located 0 bytes to the right of [ 20.854037] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 20.854194] [ 20.854241] The buggy address belongs to the physical page: [ 20.854313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 20.854437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.854554] page_type: f5(slab) [ 20.854638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.854750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.854849] page dumped because: kasan: bad access detected [ 20.854924] [ 20.854972] Memory state around the buggy address: [ 20.855507] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.855784] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.855885] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.855962] ^ [ 20.856058] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.856506] ================================================================== [ 20.713349] ================================================================== [ 20.717183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 20.717503] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.719240] kasan_atomics+0x198/0x2e0 [ 20.723111] kasan_atomics+0xb8/0x2e0 [ 20.725812] page dumped because: kasan: bad access detected [ 20.726402] ^ [ 20.728243] ================================================================== [ 21.346323] ================================================================== [ 21.346451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 21.346606] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.346768] [ 21.346879] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.347135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.347226] Hardware name: linux,dummy-virt (DT) [ 21.347309] Call trace: [ 21.347356] show_stack+0x20/0x38 (C) [ 21.347455] dump_stack_lvl+0x8c/0xd0 [ 21.347600] print_report+0x118/0x608 [ 21.347721] kasan_report+0xdc/0x128 [ 21.347821] __asan_report_load8_noabort+0x20/0x30 [ 21.347964] kasan_atomics_helper+0x3e20/0x4858 [ 21.348091] kasan_atomics+0x198/0x2e0 [ 21.348228] kunit_try_run_case+0x170/0x3f0 [ 21.348332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.348481] kthread+0x328/0x630 [ 21.348614] ret_from_fork+0x10/0x20 [ 21.348716] [ 21.348755] Allocated by task 267: [ 21.348825] kasan_save_stack+0x3c/0x68 [ 21.348922] kasan_save_track+0x20/0x40 [ 21.348997] kasan_save_alloc_info+0x40/0x58 [ 21.349086] __kasan_kmalloc+0xd4/0xd8 [ 21.349170] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.349276] kasan_atomics+0xb8/0x2e0 [ 21.349418] kunit_try_run_case+0x170/0x3f0 [ 21.349511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.349625] kthread+0x328/0x630 [ 21.349746] ret_from_fork+0x10/0x20 [ 21.349836] [ 21.349884] The buggy address belongs to the object at fff00000c42b8d00 [ 21.349884] which belongs to the cache kmalloc-64 of size 64 [ 21.350022] The buggy address is located 0 bytes to the right of [ 21.350022] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.350177] [ 21.350225] The buggy address belongs to the physical page: [ 21.350299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.350419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.350539] page_type: f5(slab) [ 21.350627] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.350752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.350870] page dumped because: kasan: bad access detected [ 21.350952] [ 21.351042] Memory state around the buggy address: [ 21.351168] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.351549] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.351848] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.353132] ^ [ 21.353225] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.353327] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.353425] ================================================================== [ 21.173487] ================================================================== [ 21.173618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 21.174059] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.174166] [ 21.174241] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.174705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.174893] Hardware name: linux,dummy-virt (DT) [ 21.174966] Call trace: [ 21.175042] show_stack+0x20/0x38 (C) [ 21.175210] dump_stack_lvl+0x8c/0xd0 [ 21.175401] print_report+0x118/0x608 [ 21.175605] kasan_report+0xdc/0x128 [ 21.175702] kasan_check_range+0x100/0x1a8 [ 21.176098] __kasan_check_write+0x20/0x30 [ 21.176296] kasan_atomics_helper+0x126c/0x4858 [ 21.176398] kasan_atomics+0x198/0x2e0 [ 21.176477] kunit_try_run_case+0x170/0x3f0 [ 21.176573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.176689] kthread+0x328/0x630 [ 21.176792] ret_from_fork+0x10/0x20 [ 21.176903] [ 21.176951] Allocated by task 267: [ 21.177054] kasan_save_stack+0x3c/0x68 [ 21.177132] kasan_save_track+0x20/0x40 [ 21.177209] kasan_save_alloc_info+0x40/0x58 [ 21.177295] __kasan_kmalloc+0xd4/0xd8 [ 21.177387] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.177617] kasan_atomics+0xb8/0x2e0 [ 21.177984] kunit_try_run_case+0x170/0x3f0 [ 21.178144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.178294] kthread+0x328/0x630 [ 21.178407] ret_from_fork+0x10/0x20 [ 21.178520] [ 21.178575] The buggy address belongs to the object at fff00000c42b8d00 [ 21.178575] which belongs to the cache kmalloc-64 of size 64 [ 21.178721] The buggy address is located 0 bytes to the right of [ 21.178721] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.178950] [ 21.179023] The buggy address belongs to the physical page: [ 21.179141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.179268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.179410] page_type: f5(slab) [ 21.179492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.179624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.180087] page dumped because: kasan: bad access detected [ 21.180171] [ 21.180219] Memory state around the buggy address: [ 21.180308] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.180441] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.180572] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.180700] ^ [ 21.180931] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.181189] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.181293] ================================================================== [ 21.074307] ================================================================== [ 21.074486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.074662] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.074827] [ 21.074965] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.075162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.075234] Hardware name: linux,dummy-virt (DT) [ 21.075307] Call trace: [ 21.075369] show_stack+0x20/0x38 (C) [ 21.075474] dump_stack_lvl+0x8c/0xd0 [ 21.075591] print_report+0x118/0x608 [ 21.075697] kasan_report+0xdc/0x128 [ 21.075814] kasan_check_range+0x100/0x1a8 [ 21.075930] __kasan_check_write+0x20/0x30 [ 21.076049] kasan_atomics_helper+0xf20/0x4858 [ 21.076160] kasan_atomics+0x198/0x2e0 [ 21.076265] kunit_try_run_case+0x170/0x3f0 [ 21.076375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.076500] kthread+0x328/0x630 [ 21.077614] ret_from_fork+0x10/0x20 [ 21.077731] [ 21.077795] Allocated by task 267: [ 21.077886] kasan_save_stack+0x3c/0x68 [ 21.077979] kasan_save_track+0x20/0x40 [ 21.078063] kasan_save_alloc_info+0x40/0x58 [ 21.078160] __kasan_kmalloc+0xd4/0xd8 [ 21.078244] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.078356] kasan_atomics+0xb8/0x2e0 [ 21.078436] kunit_try_run_case+0x170/0x3f0 [ 21.079121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.079259] kthread+0x328/0x630 [ 21.079344] ret_from_fork+0x10/0x20 [ 21.079481] [ 21.079571] The buggy address belongs to the object at fff00000c42b8d00 [ 21.079571] which belongs to the cache kmalloc-64 of size 64 [ 21.079728] The buggy address is located 0 bytes to the right of [ 21.079728] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.079859] [ 21.079903] The buggy address belongs to the physical page: [ 21.079974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.080296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.080449] page_type: f5(slab) [ 21.080578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.080706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.080806] page dumped because: kasan: bad access detected [ 21.080890] [ 21.080937] Memory state around the buggy address: [ 21.081013] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.081120] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.081232] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.081329] ^ [ 21.081408] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.082341] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.082521] ================================================================== [ 21.147625] ================================================================== [ 21.147793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 21.147897] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.148035] [ 21.148106] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.148376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.148472] Hardware name: linux,dummy-virt (DT) [ 21.148547] Call trace: [ 21.148603] show_stack+0x20/0x38 (C) [ 21.148711] dump_stack_lvl+0x8c/0xd0 [ 21.148838] print_report+0x118/0x608 [ 21.148927] kasan_report+0xdc/0x128 [ 21.149029] kasan_check_range+0x100/0x1a8 [ 21.149123] __kasan_check_write+0x20/0x30 [ 21.149234] kasan_atomics_helper+0x1128/0x4858 [ 21.149366] kasan_atomics+0x198/0x2e0 [ 21.149538] kunit_try_run_case+0x170/0x3f0 [ 21.149675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.149805] kthread+0x328/0x630 [ 21.149910] ret_from_fork+0x10/0x20 [ 21.150021] [ 21.150069] Allocated by task 267: [ 21.150140] kasan_save_stack+0x3c/0x68 [ 21.150234] kasan_save_track+0x20/0x40 [ 21.150321] kasan_save_alloc_info+0x40/0x58 [ 21.150409] __kasan_kmalloc+0xd4/0xd8 [ 21.150493] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.150591] kasan_atomics+0xb8/0x2e0 [ 21.150673] kunit_try_run_case+0x170/0x3f0 [ 21.150765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.150865] kthread+0x328/0x630 [ 21.150955] ret_from_fork+0x10/0x20 [ 21.151039] [ 21.151086] The buggy address belongs to the object at fff00000c42b8d00 [ 21.151086] which belongs to the cache kmalloc-64 of size 64 [ 21.151224] The buggy address is located 0 bytes to the right of [ 21.151224] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.151418] [ 21.151469] The buggy address belongs to the physical page: [ 21.151562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.151691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.151825] page_type: f5(slab) [ 21.151905] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.152009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.152116] page dumped because: kasan: bad access detected [ 21.152203] [ 21.152254] Memory state around the buggy address: [ 21.152339] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.152614] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.152727] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.152843] ^ [ 21.152928] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.153034] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.153142] ================================================================== [ 21.085332] ================================================================== [ 21.085459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.085602] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.085731] [ 21.085814] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.086023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.086100] Hardware name: linux,dummy-virt (DT) [ 21.086186] Call trace: [ 21.086247] show_stack+0x20/0x38 (C) [ 21.086371] dump_stack_lvl+0x8c/0xd0 [ 21.086479] print_report+0x118/0x608 [ 21.088588] kasan_report+0xdc/0x128 [ 21.089434] kasan_check_range+0x100/0x1a8 [ 21.090104] __kasan_check_write+0x20/0x30 [ 21.090275] kasan_atomics_helper+0xf88/0x4858 [ 21.091240] kasan_atomics+0x198/0x2e0 [ 21.091341] kunit_try_run_case+0x170/0x3f0 [ 21.092114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.092401] kthread+0x328/0x630 [ 21.092652] ret_from_fork+0x10/0x20 [ 21.093256] [ 21.093348] Allocated by task 267: [ 21.093437] kasan_save_stack+0x3c/0x68 [ 21.093563] kasan_save_track+0x20/0x40 [ 21.093648] kasan_save_alloc_info+0x40/0x58 [ 21.093746] __kasan_kmalloc+0xd4/0xd8 [ 21.093843] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.094843] kasan_atomics+0xb8/0x2e0 [ 21.095456] kunit_try_run_case+0x170/0x3f0 [ 21.096097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.096203] kthread+0x328/0x630 [ 21.096277] ret_from_fork+0x10/0x20 [ 21.096357] [ 21.097661] The buggy address belongs to the object at fff00000c42b8d00 [ 21.097661] which belongs to the cache kmalloc-64 of size 64 [ 21.097852] The buggy address is located 0 bytes to the right of [ 21.097852] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.098857] [ 21.099319] The buggy address belongs to the physical page: [ 21.099722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.099839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.099956] page_type: f5(slab) [ 21.100042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.100169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.100269] page dumped because: kasan: bad access detected [ 21.100348] [ 21.100392] Memory state around the buggy address: [ 21.100468] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.100585] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.100687] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.102127] ^ [ 21.102328] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.102457] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.102563] ================================================================== [ 20.837966] ================================================================== [ 20.838090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 20.838199] Write of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 20.838316] [ 20.838391] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.838592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.838663] Hardware name: linux,dummy-virt (DT) [ 20.838768] Call trace: [ 20.838845] show_stack+0x20/0x38 (C) [ 20.838954] dump_stack_lvl+0x8c/0xd0 [ 20.839097] print_report+0x118/0x608 [ 20.839237] kasan_report+0xdc/0x128 [ 20.839384] kasan_check_range+0x100/0x1a8 [ 20.839482] __kasan_check_write+0x20/0x30 [ 20.839687] kasan_atomics_helper+0xa04/0x4858 [ 20.839984] kasan_atomics+0x198/0x2e0 [ 20.840224] kunit_try_run_case+0x170/0x3f0 [ 20.840409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.840573] kthread+0x328/0x630 [ 20.840694] ret_from_fork+0x10/0x20 [ 20.840795] [ 20.840993] Allocated by task 267: [ 20.841110] kasan_save_stack+0x3c/0x68 [ 20.841205] kasan_save_track+0x20/0x40 [ 20.841302] kasan_save_alloc_info+0x40/0x58 [ 20.841436] __kasan_kmalloc+0xd4/0xd8 [ 20.841599] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.841743] kasan_atomics+0xb8/0x2e0 [ 20.841861] kunit_try_run_case+0x170/0x3f0 [ 20.841993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.842141] kthread+0x328/0x630 [ 20.842254] ret_from_fork+0x10/0x20 [ 20.842333] [ 20.842378] The buggy address belongs to the object at fff00000c42b8d00 [ 20.842378] which belongs to the cache kmalloc-64 of size 64 [ 20.842519] The buggy address is located 0 bytes to the right of [ 20.842519] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 20.842745] [ 20.842811] The buggy address belongs to the physical page: [ 20.842913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 20.843085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.843201] page_type: f5(slab) [ 20.843328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.843435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.843543] page dumped because: kasan: bad access detected [ 20.843612] [ 20.843647] Memory state around the buggy address: [ 20.843713] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.843802] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.843906] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.843998] ^ [ 20.844076] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.844375] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.844722] ================================================================== [ 21.197572] ================================================================== [ 21.197683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 21.197818] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.197993] [ 21.198103] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.198365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.198446] Hardware name: linux,dummy-virt (DT) [ 21.198521] Call trace: [ 21.198595] show_stack+0x20/0x38 (C) [ 21.198758] dump_stack_lvl+0x8c/0xd0 [ 21.198918] print_report+0x118/0x608 [ 21.199020] kasan_report+0xdc/0x128 [ 21.199149] __asan_report_load8_noabort+0x20/0x30 [ 21.199335] kasan_atomics_helper+0x3f04/0x4858 [ 21.199445] kasan_atomics+0x198/0x2e0 [ 21.199651] kunit_try_run_case+0x170/0x3f0 [ 21.199823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.199947] kthread+0x328/0x630 [ 21.200057] ret_from_fork+0x10/0x20 [ 21.200156] [ 21.200202] Allocated by task 267: [ 21.200275] kasan_save_stack+0x3c/0x68 [ 21.200461] kasan_save_track+0x20/0x40 [ 21.200583] kasan_save_alloc_info+0x40/0x58 [ 21.200667] __kasan_kmalloc+0xd4/0xd8 [ 21.200768] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.200856] kasan_atomics+0xb8/0x2e0 [ 21.200967] kunit_try_run_case+0x170/0x3f0 [ 21.201055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.201176] kthread+0x328/0x630 [ 21.201275] ret_from_fork+0x10/0x20 [ 21.201395] [ 21.201470] The buggy address belongs to the object at fff00000c42b8d00 [ 21.201470] which belongs to the cache kmalloc-64 of size 64 [ 21.201700] The buggy address is located 0 bytes to the right of [ 21.201700] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.201909] [ 21.201953] The buggy address belongs to the physical page: [ 21.202016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.202155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.202272] page_type: f5(slab) [ 21.202432] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.202551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.202651] page dumped because: kasan: bad access detected [ 21.202731] [ 21.202771] Memory state around the buggy address: [ 21.202855] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.202968] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.203077] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.203175] ^ [ 21.203258] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.203393] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.203525] ================================================================== [ 21.190410] ================================================================== [ 21.190597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 21.190748] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.190868] [ 21.190955] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.191215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.191333] Hardware name: linux,dummy-virt (DT) [ 21.191399] Call trace: [ 21.191447] show_stack+0x20/0x38 (C) [ 21.191562] dump_stack_lvl+0x8c/0xd0 [ 21.191677] print_report+0x118/0x608 [ 21.192275] kasan_report+0xdc/0x128 [ 21.192406] kasan_check_range+0x100/0x1a8 [ 21.192506] __kasan_check_write+0x20/0x30 [ 21.192854] kasan_atomics_helper+0x1384/0x4858 [ 21.192980] kasan_atomics+0x198/0x2e0 [ 21.193115] kunit_try_run_case+0x170/0x3f0 [ 21.193274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.193415] kthread+0x328/0x630 [ 21.193613] ret_from_fork+0x10/0x20 [ 21.193745] [ 21.193809] Allocated by task 267: [ 21.193883] kasan_save_stack+0x3c/0x68 [ 21.193972] kasan_save_track+0x20/0x40 [ 21.194063] kasan_save_alloc_info+0x40/0x58 [ 21.194158] __kasan_kmalloc+0xd4/0xd8 [ 21.194249] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.194392] kasan_atomics+0xb8/0x2e0 [ 21.194476] kunit_try_run_case+0x170/0x3f0 [ 21.194890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.195035] kthread+0x328/0x630 [ 21.195145] ret_from_fork+0x10/0x20 [ 21.195234] [ 21.195310] The buggy address belongs to the object at fff00000c42b8d00 [ 21.195310] which belongs to the cache kmalloc-64 of size 64 [ 21.195457] The buggy address is located 0 bytes to the right of [ 21.195457] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.195624] [ 21.195704] The buggy address belongs to the physical page: [ 21.195789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.195905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.196023] page_type: f5(slab) [ 21.196104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.196280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.196369] page dumped because: kasan: bad access detected [ 21.196475] [ 21.196543] Memory state around the buggy address: [ 21.196612] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.196725] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.196811] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.196894] ^ [ 21.196971] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.197076] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.197192] ================================================================== [ 20.830005] ================================================================== [ 20.830130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.830245] Write of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 20.830359] [ 20.830429] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.830629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.830693] Hardware name: linux,dummy-virt (DT) [ 20.830766] Call trace: [ 20.830821] show_stack+0x20/0x38 (C) [ 20.830931] dump_stack_lvl+0x8c/0xd0 [ 20.831036] print_report+0x118/0x608 [ 20.831138] kasan_report+0xdc/0x128 [ 20.831236] kasan_check_range+0x100/0x1a8 [ 20.831377] __kasan_check_write+0x20/0x30 [ 20.831472] kasan_atomics_helper+0x99c/0x4858 [ 20.831847] kasan_atomics+0x198/0x2e0 [ 20.831932] kunit_try_run_case+0x170/0x3f0 [ 20.832043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.832153] kthread+0x328/0x630 [ 20.832255] ret_from_fork+0x10/0x20 [ 20.832659] [ 20.832707] Allocated by task 267: [ 20.832799] kasan_save_stack+0x3c/0x68 [ 20.832930] kasan_save_track+0x20/0x40 [ 20.833044] kasan_save_alloc_info+0x40/0x58 [ 20.833168] __kasan_kmalloc+0xd4/0xd8 [ 20.833282] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.833399] kasan_atomics+0xb8/0x2e0 [ 20.833490] kunit_try_run_case+0x170/0x3f0 [ 20.833624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.833731] kthread+0x328/0x630 [ 20.833812] ret_from_fork+0x10/0x20 [ 20.833897] [ 20.833943] The buggy address belongs to the object at fff00000c42b8d00 [ 20.833943] which belongs to the cache kmalloc-64 of size 64 [ 20.834080] The buggy address is located 0 bytes to the right of [ 20.834080] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 20.834230] [ 20.834276] The buggy address belongs to the physical page: [ 20.834353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 20.834473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.834583] page_type: f5(slab) [ 20.834660] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.835328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.835569] page dumped because: kasan: bad access detected [ 20.835653] [ 20.835693] Memory state around the buggy address: [ 20.835757] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.835839] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.835928] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.836020] ^ [ 20.836102] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.836203] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.836295] ================================================================== [ 21.043175] ================================================================== [ 21.043666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 21.043800] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.044454] [ 21.044562] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.044757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.044827] Hardware name: linux,dummy-virt (DT) [ 21.044906] Call trace: [ 21.044969] show_stack+0x20/0x38 (C) [ 21.045084] dump_stack_lvl+0x8c/0xd0 [ 21.045195] print_report+0x118/0x608 [ 21.046568] kasan_report+0xdc/0x128 [ 21.046709] kasan_check_range+0x100/0x1a8 [ 21.046824] __kasan_check_write+0x20/0x30 [ 21.046942] kasan_atomics_helper+0xe44/0x4858 [ 21.047061] kasan_atomics+0x198/0x2e0 [ 21.047117] kunit_try_run_case+0x170/0x3f0 [ 21.047169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.047226] kthread+0x328/0x630 [ 21.047272] ret_from_fork+0x10/0x20 [ 21.047630] [ 21.047701] Allocated by task 267: [ 21.047790] kasan_save_stack+0x3c/0x68 [ 21.047939] kasan_save_track+0x20/0x40 [ 21.048041] kasan_save_alloc_info+0x40/0x58 [ 21.048200] __kasan_kmalloc+0xd4/0xd8 [ 21.048276] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.048359] kasan_atomics+0xb8/0x2e0 [ 21.048437] kunit_try_run_case+0x170/0x3f0 [ 21.048968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.049159] kthread+0x328/0x630 [ 21.049250] ret_from_fork+0x10/0x20 [ 21.049328] [ 21.049374] The buggy address belongs to the object at fff00000c42b8d00 [ 21.049374] which belongs to the cache kmalloc-64 of size 64 [ 21.049542] The buggy address is located 0 bytes to the right of [ 21.049542] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.049710] [ 21.049765] The buggy address belongs to the physical page: [ 21.049846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.049993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.050121] page_type: f5(slab) [ 21.050216] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.050372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.050486] page dumped because: kasan: bad access detected [ 21.050968] [ 21.051040] Memory state around the buggy address: [ 21.051447] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.051833] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.052037] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.052132] ^ [ 21.052283] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.052476] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.052805] ================================================================== [ 21.165446] ================================================================== [ 21.165642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 21.165749] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.165914] [ 21.166022] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.166290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.166376] Hardware name: linux,dummy-virt (DT) [ 21.166456] Call trace: [ 21.166540] show_stack+0x20/0x38 (C) [ 21.166708] dump_stack_lvl+0x8c/0xd0 [ 21.166823] print_report+0x118/0x608 [ 21.166932] kasan_report+0xdc/0x128 [ 21.167033] kasan_check_range+0x100/0x1a8 [ 21.167145] __kasan_check_write+0x20/0x30 [ 21.167260] kasan_atomics_helper+0x11f8/0x4858 [ 21.167461] kasan_atomics+0x198/0x2e0 [ 21.167561] kunit_try_run_case+0x170/0x3f0 [ 21.167663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.167788] kthread+0x328/0x630 [ 21.167905] ret_from_fork+0x10/0x20 [ 21.168211] [ 21.168273] Allocated by task 267: [ 21.168625] kasan_save_stack+0x3c/0x68 [ 21.168754] kasan_save_track+0x20/0x40 [ 21.169095] kasan_save_alloc_info+0x40/0x58 [ 21.169202] __kasan_kmalloc+0xd4/0xd8 [ 21.169279] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.169416] kasan_atomics+0xb8/0x2e0 [ 21.169504] kunit_try_run_case+0x170/0x3f0 [ 21.169612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.169711] kthread+0x328/0x630 [ 21.169777] ret_from_fork+0x10/0x20 [ 21.169882] [ 21.169933] The buggy address belongs to the object at fff00000c42b8d00 [ 21.169933] which belongs to the cache kmalloc-64 of size 64 [ 21.170310] The buggy address is located 0 bytes to the right of [ 21.170310] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.170472] [ 21.170554] The buggy address belongs to the physical page: [ 21.170664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.170784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.170946] page_type: f5(slab) [ 21.171074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.171246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.171388] page dumped because: kasan: bad access detected [ 21.171465] [ 21.171511] Memory state around the buggy address: [ 21.171839] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.172116] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.172228] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.172540] ^ [ 21.172698] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.172850] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.172986] ================================================================== [ 21.137825] ================================================================== [ 21.138142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 21.138394] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.138784] [ 21.139311] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.139501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.139586] Hardware name: linux,dummy-virt (DT) [ 21.139675] Call trace: [ 21.139837] show_stack+0x20/0x38 (C) [ 21.139962] dump_stack_lvl+0x8c/0xd0 [ 21.140218] print_report+0x118/0x608 [ 21.140340] kasan_report+0xdc/0x128 [ 21.140744] kasan_check_range+0x100/0x1a8 [ 21.140926] __kasan_check_write+0x20/0x30 [ 21.141472] kasan_atomics_helper+0x10c0/0x4858 [ 21.141908] kasan_atomics+0x198/0x2e0 [ 21.142043] kunit_try_run_case+0x170/0x3f0 [ 21.142158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.142283] kthread+0x328/0x630 [ 21.142386] ret_from_fork+0x10/0x20 [ 21.142506] [ 21.142583] Allocated by task 267: [ 21.142691] kasan_save_stack+0x3c/0x68 [ 21.142822] kasan_save_track+0x20/0x40 [ 21.142943] kasan_save_alloc_info+0x40/0x58 [ 21.143062] __kasan_kmalloc+0xd4/0xd8 [ 21.143173] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.143495] kasan_atomics+0xb8/0x2e0 [ 21.143599] kunit_try_run_case+0x170/0x3f0 [ 21.143972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.144088] kthread+0x328/0x630 [ 21.144200] ret_from_fork+0x10/0x20 [ 21.144276] [ 21.144323] The buggy address belongs to the object at fff00000c42b8d00 [ 21.144323] which belongs to the cache kmalloc-64 of size 64 [ 21.144439] The buggy address is located 0 bytes to the right of [ 21.144439] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.144621] [ 21.144851] The buggy address belongs to the physical page: [ 21.144963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.145149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.145327] page_type: f5(slab) [ 21.145448] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.145601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.145718] page dumped because: kasan: bad access detected [ 21.145831] [ 21.145895] Memory state around the buggy address: [ 21.145986] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.146091] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.146217] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.146323] ^ [ 21.146440] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.146568] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.146655] ================================================================== [ 21.244445] ================================================================== [ 21.244624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 21.245063] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.245184] [ 21.245399] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.245875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.246081] Hardware name: linux,dummy-virt (DT) [ 21.246185] Call trace: [ 21.246359] show_stack+0x20/0x38 (C) [ 21.246479] dump_stack_lvl+0x8c/0xd0 [ 21.246597] print_report+0x118/0x608 [ 21.246701] kasan_report+0xdc/0x128 [ 21.246804] kasan_check_range+0x100/0x1a8 [ 21.246906] __kasan_check_write+0x20/0x30 [ 21.247014] kasan_atomics_helper+0x15b4/0x4858 [ 21.247124] kasan_atomics+0x198/0x2e0 [ 21.247648] kunit_try_run_case+0x170/0x3f0 [ 21.248103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.248241] kthread+0x328/0x630 [ 21.249005] ret_from_fork+0x10/0x20 [ 21.249144] [ 21.249193] Allocated by task 267: [ 21.249259] kasan_save_stack+0x3c/0x68 [ 21.249355] kasan_save_track+0x20/0x40 [ 21.249433] kasan_save_alloc_info+0x40/0x58 [ 21.249892] __kasan_kmalloc+0xd4/0xd8 [ 21.250302] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.250514] kasan_atomics+0xb8/0x2e0 [ 21.251189] kunit_try_run_case+0x170/0x3f0 [ 21.251468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.251793] kthread+0x328/0x630 [ 21.251919] ret_from_fork+0x10/0x20 [ 21.252039] [ 21.252095] The buggy address belongs to the object at fff00000c42b8d00 [ 21.252095] which belongs to the cache kmalloc-64 of size 64 [ 21.252286] The buggy address is located 0 bytes to the right of [ 21.252286] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.252498] [ 21.252573] The buggy address belongs to the physical page: [ 21.252644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.252774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.252906] page_type: f5(slab) [ 21.252997] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.253129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.253232] page dumped because: kasan: bad access detected [ 21.253327] [ 21.253373] Memory state around the buggy address: [ 21.253451] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.253570] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.253669] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.253756] ^ [ 21.253838] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.253946] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.254035] ================================================================== [ 21.304318] ================================================================== [ 21.304432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 21.305460] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.306136] [ 21.306489] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.307352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.307558] Hardware name: linux,dummy-virt (DT) [ 21.307625] Call trace: [ 21.307668] show_stack+0x20/0x38 (C) [ 21.307781] dump_stack_lvl+0x8c/0xd0 [ 21.307885] print_report+0x118/0x608 [ 21.307992] kasan_report+0xdc/0x128 [ 21.308096] __asan_report_load8_noabort+0x20/0x30 [ 21.308208] kasan_atomics_helper+0x3e10/0x4858 [ 21.308319] kasan_atomics+0x198/0x2e0 [ 21.308427] kunit_try_run_case+0x170/0x3f0 [ 21.308545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.310897] kthread+0x328/0x630 [ 21.311345] ret_from_fork+0x10/0x20 [ 21.311880] [ 21.311932] Allocated by task 267: [ 21.311992] kasan_save_stack+0x3c/0x68 [ 21.312071] kasan_save_track+0x20/0x40 [ 21.312151] kasan_save_alloc_info+0x40/0x58 [ 21.313369] __kasan_kmalloc+0xd4/0xd8 [ 21.313472] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.313801] kasan_atomics+0xb8/0x2e0 [ 21.314409] kunit_try_run_case+0x170/0x3f0 [ 21.314517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.315057] kthread+0x328/0x630 [ 21.315150] ret_from_fork+0x10/0x20 [ 21.315237] [ 21.316453] The buggy address belongs to the object at fff00000c42b8d00 [ 21.316453] which belongs to the cache kmalloc-64 of size 64 [ 21.316983] The buggy address is located 0 bytes to the right of [ 21.316983] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.317131] [ 21.317179] The buggy address belongs to the physical page: [ 21.318118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.318930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.319240] page_type: f5(slab) [ 21.319416] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.320032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.320144] page dumped because: kasan: bad access detected [ 21.320220] [ 21.320499] Memory state around the buggy address: [ 21.320629] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.320958] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.321065] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.321155] ^ [ 21.321241] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.322327] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.322637] ================================================================== [ 21.116963] ================================================================== [ 21.117074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 21.117180] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.117299] [ 21.117374] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.118030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.118210] Hardware name: linux,dummy-virt (DT) [ 21.118706] Call trace: [ 21.119051] show_stack+0x20/0x38 (C) [ 21.119759] dump_stack_lvl+0x8c/0xd0 [ 21.120314] print_report+0x118/0x608 [ 21.120411] kasan_report+0xdc/0x128 [ 21.120939] kasan_check_range+0x100/0x1a8 [ 21.121471] __kasan_check_write+0x20/0x30 [ 21.122195] kasan_atomics_helper+0x1058/0x4858 [ 21.122418] kasan_atomics+0x198/0x2e0 [ 21.122709] kunit_try_run_case+0x170/0x3f0 [ 21.123407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.124099] kthread+0x328/0x630 [ 21.124237] ret_from_fork+0x10/0x20 [ 21.124871] [ 21.124923] Allocated by task 267: [ 21.124995] kasan_save_stack+0x3c/0x68 [ 21.125087] kasan_save_track+0x20/0x40 [ 21.125171] kasan_save_alloc_info+0x40/0x58 [ 21.126279] __kasan_kmalloc+0xd4/0xd8 [ 21.126552] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.126970] kasan_atomics+0xb8/0x2e0 [ 21.127321] kunit_try_run_case+0x170/0x3f0 [ 21.127815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.127943] kthread+0x328/0x630 [ 21.128037] ret_from_fork+0x10/0x20 [ 21.128119] [ 21.128168] The buggy address belongs to the object at fff00000c42b8d00 [ 21.128168] which belongs to the cache kmalloc-64 of size 64 [ 21.129076] The buggy address is located 0 bytes to the right of [ 21.129076] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.129829] [ 21.130210] The buggy address belongs to the physical page: [ 21.130610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.131198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.131330] page_type: f5(slab) [ 21.131427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.132345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.132790] page dumped because: kasan: bad access detected [ 21.133115] [ 21.133413] Memory state around the buggy address: [ 21.133926] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.134040] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.134571] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.134679] ^ [ 21.134768] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.134867] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.136306] ================================================================== [ 21.218796] ================================================================== [ 21.218916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 21.219033] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.219132] [ 21.219189] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.219357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.219416] Hardware name: linux,dummy-virt (DT) [ 21.219479] Call trace: [ 21.219539] show_stack+0x20/0x38 (C) [ 21.220616] dump_stack_lvl+0x8c/0xd0 [ 21.220754] print_report+0x118/0x608 [ 21.220839] kasan_report+0xdc/0x128 [ 21.220928] kasan_check_range+0x100/0x1a8 [ 21.221308] __kasan_check_write+0x20/0x30 [ 21.221567] kasan_atomics_helper+0x147c/0x4858 [ 21.221684] kasan_atomics+0x198/0x2e0 [ 21.221894] kunit_try_run_case+0x170/0x3f0 [ 21.222026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.222148] kthread+0x328/0x630 [ 21.222245] ret_from_fork+0x10/0x20 [ 21.222360] [ 21.222408] Allocated by task 267: [ 21.222473] kasan_save_stack+0x3c/0x68 [ 21.222583] kasan_save_track+0x20/0x40 [ 21.222686] kasan_save_alloc_info+0x40/0x58 [ 21.222782] __kasan_kmalloc+0xd4/0xd8 [ 21.222865] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.222962] kasan_atomics+0xb8/0x2e0 [ 21.223044] kunit_try_run_case+0x170/0x3f0 [ 21.223152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.223266] kthread+0x328/0x630 [ 21.223376] ret_from_fork+0x10/0x20 [ 21.223451] [ 21.223497] The buggy address belongs to the object at fff00000c42b8d00 [ 21.223497] which belongs to the cache kmalloc-64 of size 64 [ 21.223654] The buggy address is located 0 bytes to the right of [ 21.223654] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.223802] [ 21.224015] The buggy address belongs to the physical page: [ 21.224121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.224482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.224675] page_type: f5(slab) [ 21.224770] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.224894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.225144] page dumped because: kasan: bad access detected [ 21.225230] [ 21.225272] Memory state around the buggy address: [ 21.225549] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.225724] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.225872] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.225979] ^ [ 21.226103] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.226252] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.226372] ================================================================== [ 20.812336] ================================================================== [ 20.812449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 20.812572] Read of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 20.812723] [ 20.812841] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.813103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.813170] Hardware name: linux,dummy-virt (DT) [ 20.813249] Call trace: [ 20.813334] show_stack+0x20/0x38 (C) [ 20.813504] dump_stack_lvl+0x8c/0xd0 [ 20.813668] print_report+0x118/0x608 [ 20.813823] kasan_report+0xdc/0x128 [ 20.813927] __asan_report_load4_noabort+0x20/0x30 [ 20.814059] kasan_atomics_helper+0x42d8/0x4858 [ 20.814221] kasan_atomics+0x198/0x2e0 [ 20.814372] kunit_try_run_case+0x170/0x3f0 [ 20.814485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.814611] kthread+0x328/0x630 [ 20.814755] ret_from_fork+0x10/0x20 [ 20.814901] [ 20.814943] Allocated by task 267: [ 20.815006] kasan_save_stack+0x3c/0x68 [ 20.815104] kasan_save_track+0x20/0x40 [ 20.815188] kasan_save_alloc_info+0x40/0x58 [ 20.815282] __kasan_kmalloc+0xd4/0xd8 [ 20.815375] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.815489] kasan_atomics+0xb8/0x2e0 [ 20.815624] kunit_try_run_case+0x170/0x3f0 [ 20.815728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.815812] kthread+0x328/0x630 [ 20.815911] ret_from_fork+0x10/0x20 [ 20.815997] [ 20.816043] The buggy address belongs to the object at fff00000c42b8d00 [ 20.816043] which belongs to the cache kmalloc-64 of size 64 [ 20.816364] The buggy address is located 0 bytes to the right of [ 20.816364] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 20.816513] [ 20.816645] The buggy address belongs to the physical page: [ 20.816727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 20.818990] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.823087] Call trace: [ 20.823254] show_stack+0x20/0x38 (C) [ 20.823449] dump_stack_lvl+0x8c/0xd0 [ 20.823565] print_report+0x118/0x608 [ 20.823657] kasan_report+0xdc/0x128 [ 20.823739] kasan_check_range+0x100/0x1a8 [ 20.823834] __kasan_check_write+0x20/0x30 [ 20.823943] kasan_atomics_helper+0x934/0x4858 [ 20.824050] kasan_atomics+0x198/0x2e0 [ 20.824153] kunit_try_run_case+0x170/0x3f0 [ 20.824272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.824395] kthread+0x328/0x630 [ 20.824519] ret_from_fork+0x10/0x20 [ 20.824958] [ 20.825015] Allocated by task 267: [ 20.825084] kasan_save_stack+0x3c/0x68 [ 20.825170] kasan_save_track+0x20/0x40 [ 20.825247] kasan_save_alloc_info+0x40/0x58 [ 20.825345] __kasan_kmalloc+0xd4/0xd8 [ 20.825426] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.825778] kasan_atomics+0xb8/0x2e0 [ 20.825872] kunit_try_run_case+0x170/0x3f0 [ 20.825970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.826077] kthread+0x328/0x630 [ 20.826160] ret_from_fork+0x10/0x20 [ 20.826281] [ 20.826339] The buggy address belongs to the object at fff00000c42b8d00 [ 20.826339] which belongs to the cache kmalloc-64 of size 64 [ 20.826463] The buggy address is located 0 bytes to the right of [ 20.826463] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 20.826690] [ 20.826760] The buggy address belongs to the physical page: [ 20.826864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 20.826987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.827097] page_type: f5(slab) [ 20.827186] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.827341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.827427] page dumped because: kasan: bad access detected [ 20.827501] [ 20.827558] Memory state around the buggy address: [ 20.827967] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.828166] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.828254] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.828356] ^ [ 20.828434] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.828744] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.828866] ================================================================== [ 21.264507] ================================================================== [ 21.264641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 21.264858] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.264976] [ 21.265234] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.265635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.265710] Hardware name: linux,dummy-virt (DT) [ 21.265782] Call trace: [ 21.265832] show_stack+0x20/0x38 (C) [ 21.265946] dump_stack_lvl+0x8c/0xd0 [ 21.266052] print_report+0x118/0x608 [ 21.266159] kasan_report+0xdc/0x128 [ 21.266257] kasan_check_range+0x100/0x1a8 [ 21.266366] __kasan_check_write+0x20/0x30 [ 21.266475] kasan_atomics_helper+0x1644/0x4858 [ 21.266598] kasan_atomics+0x198/0x2e0 [ 21.266704] kunit_try_run_case+0x170/0x3f0 [ 21.266812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.266934] kthread+0x328/0x630 [ 21.267038] ret_from_fork+0x10/0x20 [ 21.267144] [ 21.267190] Allocated by task 267: [ 21.267256] kasan_save_stack+0x3c/0x68 [ 21.267961] kasan_save_track+0x20/0x40 [ 21.268130] kasan_save_alloc_info+0x40/0x58 [ 21.268258] __kasan_kmalloc+0xd4/0xd8 [ 21.268441] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.269032] kasan_atomics+0xb8/0x2e0 [ 21.269320] kunit_try_run_case+0x170/0x3f0 [ 21.269526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.269848] kthread+0x328/0x630 [ 21.269951] ret_from_fork+0x10/0x20 [ 21.270037] [ 21.270084] The buggy address belongs to the object at fff00000c42b8d00 [ 21.270084] which belongs to the cache kmalloc-64 of size 64 [ 21.270397] The buggy address is located 0 bytes to the right of [ 21.270397] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.270744] [ 21.270832] The buggy address belongs to the physical page: [ 21.270910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.271035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.271145] page_type: f5(slab) [ 21.271234] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.271371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.271481] page dumped because: kasan: bad access detected [ 21.271577] [ 21.271621] Memory state around the buggy address: [ 21.271697] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.271811] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.272144] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.272606] ^ [ 21.272701] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.272792] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.273146] ================================================================== [ 21.287616] ================================================================== [ 21.287761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 21.288326] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.288464] [ 21.288548] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.289674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.289867] Hardware name: linux,dummy-virt (DT) [ 21.290043] Call trace: [ 21.290096] show_stack+0x20/0x38 (C) [ 21.290798] dump_stack_lvl+0x8c/0xd0 [ 21.290922] print_report+0x118/0x608 [ 21.291869] kasan_report+0xdc/0x128 [ 21.291977] kasan_check_range+0x100/0x1a8 [ 21.292075] __kasan_check_write+0x20/0x30 [ 21.292766] kasan_atomics_helper+0x16d0/0x4858 [ 21.293096] kasan_atomics+0x198/0x2e0 [ 21.293217] kunit_try_run_case+0x170/0x3f0 [ 21.293329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.293941] kthread+0x328/0x630 [ 21.294143] ret_from_fork+0x10/0x20 [ 21.294269] [ 21.294327] Allocated by task 267: [ 21.294421] kasan_save_stack+0x3c/0x68 [ 21.294544] kasan_save_track+0x20/0x40 [ 21.294638] kasan_save_alloc_info+0x40/0x58 [ 21.294739] __kasan_kmalloc+0xd4/0xd8 [ 21.294848] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.294939] kasan_atomics+0xb8/0x2e0 [ 21.295038] kunit_try_run_case+0x170/0x3f0 [ 21.295179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.295701] kthread+0x328/0x630 [ 21.295815] ret_from_fork+0x10/0x20 [ 21.296187] [ 21.296237] The buggy address belongs to the object at fff00000c42b8d00 [ 21.296237] which belongs to the cache kmalloc-64 of size 64 [ 21.296385] The buggy address is located 0 bytes to the right of [ 21.296385] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.296551] [ 21.296860] The buggy address belongs to the physical page: [ 21.297010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.297139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.297338] page_type: f5(slab) [ 21.297564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.297927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.298543] page dumped because: kasan: bad access detected [ 21.299034] [ 21.299254] Memory state around the buggy address: [ 21.299781] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.300368] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.300877] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.301676] ^ [ 21.301919] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.302447] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.302838] ================================================================== [ 21.236360] ================================================================== [ 21.236517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 21.236679] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267 [ 21.236803] [ 21.236870] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.237058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.237123] Hardware name: linux,dummy-virt (DT) [ 21.237193] Call trace: [ 21.237249] show_stack+0x20/0x38 (C) [ 21.237353] dump_stack_lvl+0x8c/0xd0 [ 21.237461] print_report+0x118/0x608 [ 21.237593] kasan_report+0xdc/0x128 [ 21.237699] kasan_check_range+0x100/0x1a8 [ 21.237802] __kasan_check_write+0x20/0x30 [ 21.237910] kasan_atomics_helper+0x154c/0x4858 [ 21.238019] kasan_atomics+0x198/0x2e0 [ 21.238116] kunit_try_run_case+0x170/0x3f0 [ 21.238223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.238343] kthread+0x328/0x630 [ 21.238442] ret_from_fork+0x10/0x20 [ 21.238560] [ 21.238600] Allocated by task 267: [ 21.238660] kasan_save_stack+0x3c/0x68 [ 21.238747] kasan_save_track+0x20/0x40 [ 21.238834] kasan_save_alloc_info+0x40/0x58 [ 21.238924] __kasan_kmalloc+0xd4/0xd8 [ 21.239005] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.239106] kasan_atomics+0xb8/0x2e0 [ 21.239174] kunit_try_run_case+0x170/0x3f0 [ 21.239262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.239350] kthread+0x328/0x630 [ 21.239438] ret_from_fork+0x10/0x20 [ 21.239528] [ 21.239661] The buggy address belongs to the object at fff00000c42b8d00 [ 21.239661] which belongs to the cache kmalloc-64 of size 64 [ 21.240250] The buggy address is located 0 bytes to the right of [ 21.240250] allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30) [ 21.240425] [ 21.240503] The buggy address belongs to the physical page: [ 21.241038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8 [ 21.241187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.241304] page_type: f5(slab) [ 21.241414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.241558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.242033] page dumped because: kasan: bad access detected [ 21.242143] [ 21.242191] Memory state around the buggy address: [ 21.242399] fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.242511] fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.242898] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.243094] ^ [ 21.243332] fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.243661] fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.243801] ==================================================================
[ 22.258937] ================================================================== [ 22.259618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 22.260559] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.261302] [ 22.261722] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.261852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.261888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.261943] Call Trace: [ 22.261999] <TASK> [ 22.262136] dump_stack_lvl+0x73/0xb0 [ 22.262271] print_report+0xd1/0x650 [ 22.262353] ? __virt_addr_valid+0x1db/0x2d0 [ 22.262436] ? kasan_atomics_helper+0x4b88/0x5450 [ 22.262527] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.262612] ? kasan_atomics_helper+0x4b88/0x5450 [ 22.262687] kasan_report+0x141/0x180 [ 22.262766] ? kasan_atomics_helper+0x4b88/0x5450 [ 22.262853] __asan_report_load4_noabort+0x18/0x20 [ 22.262931] kasan_atomics_helper+0x4b88/0x5450 [ 22.263017] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.263100] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.263174] ? kasan_atomics+0x152/0x310 [ 22.263258] kasan_atomics+0x1dc/0x310 [ 22.263324] ? __pfx_kasan_atomics+0x10/0x10 [ 22.263396] ? __pfx_read_tsc+0x10/0x10 [ 22.263467] ? ktime_get_ts64+0x86/0x230 [ 22.263624] kunit_try_run_case+0x1a5/0x480 [ 22.263707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.263776] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.263844] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.263882] ? __kthread_parkme+0x82/0x180 [ 22.263917] ? preempt_count_sub+0x50/0x80 [ 22.263953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.263988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.264020] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.264054] kthread+0x337/0x6f0 [ 22.264082] ? trace_preempt_on+0x20/0xc0 [ 22.264116] ? __pfx_kthread+0x10/0x10 [ 22.264146] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.264176] ? calculate_sigpending+0x7b/0xa0 [ 22.264206] ? __pfx_kthread+0x10/0x10 [ 22.264238] ret_from_fork+0x41/0x80 [ 22.264266] ? __pfx_kthread+0x10/0x10 [ 22.264297] ret_from_fork_asm+0x1a/0x30 [ 22.264339] </TASK> [ 22.264352] [ 22.281624] Allocated by task 285: [ 22.282279] kasan_save_stack+0x45/0x70 [ 22.282805] kasan_save_track+0x18/0x40 [ 22.283229] kasan_save_alloc_info+0x3b/0x50 [ 22.284175] __kasan_kmalloc+0xb7/0xc0 [ 22.286086] __kmalloc_cache_noprof+0x189/0x420 [ 22.286867] kasan_atomics+0x95/0x310 [ 22.287549] kunit_try_run_case+0x1a5/0x480 [ 22.287942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.288343] kthread+0x337/0x6f0 [ 22.288986] ret_from_fork+0x41/0x80 [ 22.289349] ret_from_fork_asm+0x1a/0x30 [ 22.290004] [ 22.290222] The buggy address belongs to the object at ffff888102983600 [ 22.290222] which belongs to the cache kmalloc-64 of size 64 [ 22.291601] The buggy address is located 0 bytes to the right of [ 22.291601] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.293108] [ 22.293615] The buggy address belongs to the physical page: [ 22.294192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.295321] flags: 0x200000000000000(node=0|zone=2) [ 22.296044] page_type: f5(slab) [ 22.296422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.297552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.298102] page dumped because: kasan: bad access detected [ 22.298941] [ 22.299168] Memory state around the buggy address: [ 22.299910] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.300606] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.301336] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.302122] ^ [ 22.302529] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.303238] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.304157] ================================================================== [ 22.405401] ================================================================== [ 22.405905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 22.407119] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.407783] [ 22.408097] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.408225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.408267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.408325] Call Trace: [ 22.408378] <TASK> [ 22.408429] dump_stack_lvl+0x73/0xb0 [ 22.408595] print_report+0xd1/0x650 [ 22.408683] ? __virt_addr_valid+0x1db/0x2d0 [ 22.408828] ? kasan_atomics_helper+0x4b54/0x5450 [ 22.408909] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.408985] ? kasan_atomics_helper+0x4b54/0x5450 [ 22.409058] kasan_report+0x141/0x180 [ 22.409137] ? kasan_atomics_helper+0x4b54/0x5450 [ 22.409228] __asan_report_load4_noabort+0x18/0x20 [ 22.409369] kasan_atomics_helper+0x4b54/0x5450 [ 22.409832] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.409923] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.410057] ? kasan_atomics+0x152/0x310 [ 22.410170] kasan_atomics+0x1dc/0x310 [ 22.410244] ? __pfx_kasan_atomics+0x10/0x10 [ 22.410293] ? __pfx_read_tsc+0x10/0x10 [ 22.410325] ? ktime_get_ts64+0x86/0x230 [ 22.410364] kunit_try_run_case+0x1a5/0x480 [ 22.410402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.410474] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.410539] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.410576] ? __kthread_parkme+0x82/0x180 [ 22.410610] ? preempt_count_sub+0x50/0x80 [ 22.410646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.410682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.410715] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.410751] kthread+0x337/0x6f0 [ 22.410783] ? trace_preempt_on+0x20/0xc0 [ 22.410884] ? __pfx_kthread+0x10/0x10 [ 22.410970] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.411050] ? calculate_sigpending+0x7b/0xa0 [ 22.411131] ? __pfx_kthread+0x10/0x10 [ 22.411203] ret_from_fork+0x41/0x80 [ 22.411246] ? __pfx_kthread+0x10/0x10 [ 22.411282] ret_from_fork_asm+0x1a/0x30 [ 22.411327] </TASK> [ 22.411342] [ 22.433521] Allocated by task 285: [ 22.434209] kasan_save_stack+0x45/0x70 [ 22.434748] kasan_save_track+0x18/0x40 [ 22.435333] kasan_save_alloc_info+0x3b/0x50 [ 22.435923] __kasan_kmalloc+0xb7/0xc0 [ 22.436348] __kmalloc_cache_noprof+0x189/0x420 [ 22.437110] kasan_atomics+0x95/0x310 [ 22.437818] kunit_try_run_case+0x1a5/0x480 [ 22.438275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.438895] kthread+0x337/0x6f0 [ 22.439315] ret_from_fork+0x41/0x80 [ 22.439819] ret_from_fork_asm+0x1a/0x30 [ 22.440328] [ 22.440612] The buggy address belongs to the object at ffff888102983600 [ 22.440612] which belongs to the cache kmalloc-64 of size 64 [ 22.441648] The buggy address is located 0 bytes to the right of [ 22.441648] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.442845] [ 22.443081] The buggy address belongs to the physical page: [ 22.443576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.444197] flags: 0x200000000000000(node=0|zone=2) [ 22.445136] page_type: f5(slab) [ 22.445462] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.446376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.447252] page dumped because: kasan: bad access detected [ 22.447895] [ 22.448175] Memory state around the buggy address: [ 22.448853] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.450026] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.450800] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.451427] ^ [ 22.452002] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.452741] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.453449] ================================================================== [ 22.864961] ================================================================== [ 22.866866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 22.868634] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.869133] [ 22.869352] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.870146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.870189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.870260] Call Trace: [ 22.870309] <TASK> [ 22.870353] dump_stack_lvl+0x73/0xb0 [ 22.870423] print_report+0xd1/0x650 [ 22.871064] ? __virt_addr_valid+0x1db/0x2d0 [ 22.871145] ? kasan_atomics_helper+0x8f9/0x5450 [ 22.871215] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.871283] ? kasan_atomics_helper+0x8f9/0x5450 [ 22.871352] kasan_report+0x141/0x180 [ 22.871420] ? kasan_atomics_helper+0x8f9/0x5450 [ 22.871523] kasan_check_range+0x10c/0x1c0 [ 22.871591] __kasan_check_write+0x18/0x20 [ 22.871643] kasan_atomics_helper+0x8f9/0x5450 [ 22.871702] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.871759] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.871817] ? kasan_atomics+0x152/0x310 [ 22.871875] kasan_atomics+0x1dc/0x310 [ 22.871928] ? __pfx_kasan_atomics+0x10/0x10 [ 22.871981] ? __pfx_read_tsc+0x10/0x10 [ 22.872030] ? ktime_get_ts64+0x86/0x230 [ 22.872092] kunit_try_run_case+0x1a5/0x480 [ 22.872151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.872203] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.872260] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.872319] ? __kthread_parkme+0x82/0x180 [ 22.872373] ? preempt_count_sub+0x50/0x80 [ 22.872433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.872504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.873516] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.873596] kthread+0x337/0x6f0 [ 22.873651] ? trace_preempt_on+0x20/0xc0 [ 22.873717] ? __pfx_kthread+0x10/0x10 [ 22.873777] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.873832] ? calculate_sigpending+0x7b/0xa0 [ 22.873888] ? __pfx_kthread+0x10/0x10 [ 22.873944] ret_from_fork+0x41/0x80 [ 22.873995] ? __pfx_kthread+0x10/0x10 [ 22.874049] ret_from_fork_asm+0x1a/0x30 [ 22.874127] </TASK> [ 22.874154] [ 22.898182] Allocated by task 285: [ 22.899347] kasan_save_stack+0x45/0x70 [ 22.899845] kasan_save_track+0x18/0x40 [ 22.900247] kasan_save_alloc_info+0x3b/0x50 [ 22.900926] __kasan_kmalloc+0xb7/0xc0 [ 22.901344] __kmalloc_cache_noprof+0x189/0x420 [ 22.902091] kasan_atomics+0x95/0x310 [ 22.902506] kunit_try_run_case+0x1a5/0x480 [ 22.903393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.903931] kthread+0x337/0x6f0 [ 22.904273] ret_from_fork+0x41/0x80 [ 22.904713] ret_from_fork_asm+0x1a/0x30 [ 22.905300] [ 22.905509] The buggy address belongs to the object at ffff888102983600 [ 22.905509] which belongs to the cache kmalloc-64 of size 64 [ 22.906653] The buggy address is located 0 bytes to the right of [ 22.906653] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.907683] [ 22.908020] The buggy address belongs to the physical page: [ 22.908403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.909230] flags: 0x200000000000000(node=0|zone=2) [ 22.909676] page_type: f5(slab) [ 22.910652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.911253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.911857] page dumped because: kasan: bad access detected [ 22.912303] [ 22.913248] Memory state around the buggy address: [ 22.913837] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.914315] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.914944] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.915711] ^ [ 22.916078] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.916799] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.917424] ================================================================== [ 22.500051] ================================================================== [ 22.500709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 22.501410] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.502178] [ 22.502619] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.502789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.502836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.502896] Call Trace: [ 22.502951] <TASK> [ 22.503038] dump_stack_lvl+0x73/0xb0 [ 22.503123] print_report+0xd1/0x650 [ 22.503235] ? __virt_addr_valid+0x1db/0x2d0 [ 22.503321] ? kasan_atomics_helper+0x4b3a/0x5450 [ 22.503397] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.503475] ? kasan_atomics_helper+0x4b3a/0x5450 [ 22.503674] kasan_report+0x141/0x180 [ 22.503712] ? kasan_atomics_helper+0x4b3a/0x5450 [ 22.503756] __asan_report_store4_noabort+0x1b/0x30 [ 22.503809] kasan_atomics_helper+0x4b3a/0x5450 [ 22.503894] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.504016] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.504105] ? kasan_atomics+0x152/0x310 [ 22.504232] kasan_atomics+0x1dc/0x310 [ 22.504308] ? __pfx_kasan_atomics+0x10/0x10 [ 22.504389] ? __pfx_read_tsc+0x10/0x10 [ 22.504459] ? ktime_get_ts64+0x86/0x230 [ 22.504633] kunit_try_run_case+0x1a5/0x480 [ 22.504679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.504714] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.504750] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.504785] ? __kthread_parkme+0x82/0x180 [ 22.504818] ? preempt_count_sub+0x50/0x80 [ 22.504853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.504888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.504921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.504954] kthread+0x337/0x6f0 [ 22.504985] ? trace_preempt_on+0x20/0xc0 [ 22.505020] ? __pfx_kthread+0x10/0x10 [ 22.505052] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.505084] ? calculate_sigpending+0x7b/0xa0 [ 22.505115] ? __pfx_kthread+0x10/0x10 [ 22.505147] ret_from_fork+0x41/0x80 [ 22.505176] ? __pfx_kthread+0x10/0x10 [ 22.505208] ret_from_fork_asm+0x1a/0x30 [ 22.505253] </TASK> [ 22.505267] [ 22.525006] Allocated by task 285: [ 22.525733] kasan_save_stack+0x45/0x70 [ 22.526232] kasan_save_track+0x18/0x40 [ 22.526817] kasan_save_alloc_info+0x3b/0x50 [ 22.527259] __kasan_kmalloc+0xb7/0xc0 [ 22.527776] __kmalloc_cache_noprof+0x189/0x420 [ 22.528679] kasan_atomics+0x95/0x310 [ 22.528989] kunit_try_run_case+0x1a5/0x480 [ 22.529796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.530306] kthread+0x337/0x6f0 [ 22.530868] ret_from_fork+0x41/0x80 [ 22.531326] ret_from_fork_asm+0x1a/0x30 [ 22.531925] [ 22.532201] The buggy address belongs to the object at ffff888102983600 [ 22.532201] which belongs to the cache kmalloc-64 of size 64 [ 22.533302] The buggy address is located 0 bytes to the right of [ 22.533302] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.534988] [ 22.535252] The buggy address belongs to the physical page: [ 22.535943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.536814] flags: 0x200000000000000(node=0|zone=2) [ 22.537274] page_type: f5(slab) [ 22.537787] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.538954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.539680] page dumped because: kasan: bad access detected [ 22.540103] [ 22.540354] Memory state around the buggy address: [ 22.541011] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.541801] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.542349] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.543144] ^ [ 22.543672] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.544370] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.545681] ================================================================== [ 22.598561] ================================================================== [ 22.598984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 22.601182] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.601881] [ 22.602116] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.602252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.602293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.602352] Call Trace: [ 22.604691] <TASK> [ 22.604745] dump_stack_lvl+0x73/0xb0 [ 22.604831] print_report+0xd1/0x650 [ 22.604901] ? __virt_addr_valid+0x1db/0x2d0 [ 22.604964] ? kasan_atomics_helper+0x5fe/0x5450 [ 22.605026] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.605092] ? kasan_atomics_helper+0x5fe/0x5450 [ 22.605156] kasan_report+0x141/0x180 [ 22.605221] ? kasan_atomics_helper+0x5fe/0x5450 [ 22.605289] kasan_check_range+0x10c/0x1c0 [ 22.605364] __kasan_check_write+0x18/0x20 [ 22.605426] kasan_atomics_helper+0x5fe/0x5450 [ 22.605518] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.605609] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.605683] ? kasan_atomics+0x152/0x310 [ 22.605755] kasan_atomics+0x1dc/0x310 [ 22.605823] ? __pfx_kasan_atomics+0x10/0x10 [ 22.605891] ? __pfx_read_tsc+0x10/0x10 [ 22.605952] ? ktime_get_ts64+0x86/0x230 [ 22.606028] kunit_try_run_case+0x1a5/0x480 [ 22.606097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.606150] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.606212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.606272] ? __kthread_parkme+0x82/0x180 [ 22.606325] ? preempt_count_sub+0x50/0x80 [ 22.606387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.606443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.606617] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.606683] kthread+0x337/0x6f0 [ 22.606737] ? trace_preempt_on+0x20/0xc0 [ 22.606794] ? __pfx_kthread+0x10/0x10 [ 22.606848] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.606902] ? calculate_sigpending+0x7b/0xa0 [ 22.606955] ? __pfx_kthread+0x10/0x10 [ 22.607011] ret_from_fork+0x41/0x80 [ 22.607060] ? __pfx_kthread+0x10/0x10 [ 22.607113] ret_from_fork_asm+0x1a/0x30 [ 22.607314] </TASK> [ 22.607347] [ 22.631692] Allocated by task 285: [ 22.633556] kasan_save_stack+0x45/0x70 [ 22.634058] kasan_save_track+0x18/0x40 [ 22.634444] kasan_save_alloc_info+0x3b/0x50 [ 22.634962] __kasan_kmalloc+0xb7/0xc0 [ 22.635313] __kmalloc_cache_noprof+0x189/0x420 [ 22.635804] kasan_atomics+0x95/0x310 [ 22.636232] kunit_try_run_case+0x1a5/0x480 [ 22.636753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.637321] kthread+0x337/0x6f0 [ 22.638138] ret_from_fork+0x41/0x80 [ 22.639075] ret_from_fork_asm+0x1a/0x30 [ 22.639526] [ 22.640149] The buggy address belongs to the object at ffff888102983600 [ 22.640149] which belongs to the cache kmalloc-64 of size 64 [ 22.641387] The buggy address is located 0 bytes to the right of [ 22.641387] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.642833] [ 22.643229] The buggy address belongs to the physical page: [ 22.643618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.644202] flags: 0x200000000000000(node=0|zone=2) [ 22.644754] page_type: f5(slab) [ 22.645243] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.646890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.647442] page dumped because: kasan: bad access detected [ 22.647879] [ 22.648136] Memory state around the buggy address: [ 22.649210] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.649936] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.650574] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.651881] ^ [ 22.652465] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.653250] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.653912] ================================================================== [ 22.918630] ================================================================== [ 22.919122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 22.920581] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.921234] [ 22.921701] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.921840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.921882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.921942] Call Trace: [ 22.922000] <TASK> [ 22.922055] dump_stack_lvl+0x73/0xb0 [ 22.922149] print_report+0xd1/0x650 [ 22.922229] ? __virt_addr_valid+0x1db/0x2d0 [ 22.922316] ? kasan_atomics_helper+0x992/0x5450 [ 22.922394] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.922635] ? kasan_atomics_helper+0x992/0x5450 [ 22.922716] kasan_report+0x141/0x180 [ 22.922802] ? kasan_atomics_helper+0x992/0x5450 [ 22.922897] kasan_check_range+0x10c/0x1c0 [ 22.922983] __kasan_check_write+0x18/0x20 [ 22.923049] kasan_atomics_helper+0x992/0x5450 [ 22.923088] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.923124] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.923159] ? kasan_atomics+0x152/0x310 [ 22.923193] kasan_atomics+0x1dc/0x310 [ 22.923222] ? __pfx_kasan_atomics+0x10/0x10 [ 22.923255] ? __pfx_read_tsc+0x10/0x10 [ 22.923286] ? ktime_get_ts64+0x86/0x230 [ 22.923325] kunit_try_run_case+0x1a5/0x480 [ 22.923360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.923393] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.923540] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.923603] ? __kthread_parkme+0x82/0x180 [ 22.923638] ? preempt_count_sub+0x50/0x80 [ 22.923675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.923710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.923743] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.923777] kthread+0x337/0x6f0 [ 22.923807] ? trace_preempt_on+0x20/0xc0 [ 22.923842] ? __pfx_kthread+0x10/0x10 [ 22.923875] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.923907] ? calculate_sigpending+0x7b/0xa0 [ 22.923938] ? __pfx_kthread+0x10/0x10 [ 22.923971] ret_from_fork+0x41/0x80 [ 22.924001] ? __pfx_kthread+0x10/0x10 [ 22.924033] ret_from_fork_asm+0x1a/0x30 [ 22.924077] </TASK> [ 22.924092] [ 22.947240] Allocated by task 285: [ 22.947713] kasan_save_stack+0x45/0x70 [ 22.948123] kasan_save_track+0x18/0x40 [ 22.949039] kasan_save_alloc_info+0x3b/0x50 [ 22.949388] __kasan_kmalloc+0xb7/0xc0 [ 22.950078] __kmalloc_cache_noprof+0x189/0x420 [ 22.950884] kasan_atomics+0x95/0x310 [ 22.951179] kunit_try_run_case+0x1a5/0x480 [ 22.951748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.952150] kthread+0x337/0x6f0 [ 22.952522] ret_from_fork+0x41/0x80 [ 22.952985] ret_from_fork_asm+0x1a/0x30 [ 22.953370] [ 22.953591] The buggy address belongs to the object at ffff888102983600 [ 22.953591] which belongs to the cache kmalloc-64 of size 64 [ 22.955031] The buggy address is located 0 bytes to the right of [ 22.955031] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.956511] [ 22.956951] The buggy address belongs to the physical page: [ 22.957601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.958171] flags: 0x200000000000000(node=0|zone=2) [ 22.958929] page_type: f5(slab) [ 22.959330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.959949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.960805] page dumped because: kasan: bad access detected [ 22.961318] [ 22.961647] Memory state around the buggy address: [ 22.962044] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.963051] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.963619] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.964234] ^ [ 22.964786] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.965729] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.966177] ================================================================== [ 24.813597] ================================================================== [ 24.814123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 24.815166] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.815816] [ 24.816092] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.816224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.816264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.816323] Call Trace: [ 24.816378] <TASK> [ 24.816493] dump_stack_lvl+0x73/0xb0 [ 24.816578] print_report+0xd1/0x650 [ 24.816661] ? __virt_addr_valid+0x1db/0x2d0 [ 24.816743] ? kasan_atomics_helper+0x4f71/0x5450 [ 24.816824] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.816907] ? kasan_atomics_helper+0x4f71/0x5450 [ 24.816987] kasan_report+0x141/0x180 [ 24.817069] ? kasan_atomics_helper+0x4f71/0x5450 [ 24.817164] __asan_report_load8_noabort+0x18/0x20 [ 24.817248] kasan_atomics_helper+0x4f71/0x5450 [ 24.817332] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.817454] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.817556] ? kasan_atomics+0x152/0x310 [ 24.817651] kasan_atomics+0x1dc/0x310 [ 24.817723] ? __pfx_kasan_atomics+0x10/0x10 [ 24.817803] ? __pfx_read_tsc+0x10/0x10 [ 24.817874] ? ktime_get_ts64+0x86/0x230 [ 24.817963] kunit_try_run_case+0x1a5/0x480 [ 24.818047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.818125] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.818207] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.818287] ? __kthread_parkme+0x82/0x180 [ 24.818358] ? preempt_count_sub+0x50/0x80 [ 24.818421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.818525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.818567] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.818602] kthread+0x337/0x6f0 [ 24.818633] ? trace_preempt_on+0x20/0xc0 [ 24.818668] ? __pfx_kthread+0x10/0x10 [ 24.818700] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.818732] ? calculate_sigpending+0x7b/0xa0 [ 24.818764] ? __pfx_kthread+0x10/0x10 [ 24.818796] ret_from_fork+0x41/0x80 [ 24.818827] ? __pfx_kthread+0x10/0x10 [ 24.818859] ret_from_fork_asm+0x1a/0x30 [ 24.818904] </TASK> [ 24.818920] [ 24.833735] Allocated by task 285: [ 24.834158] kasan_save_stack+0x45/0x70 [ 24.834780] kasan_save_track+0x18/0x40 [ 24.835192] kasan_save_alloc_info+0x3b/0x50 [ 24.835696] __kasan_kmalloc+0xb7/0xc0 [ 24.836008] __kmalloc_cache_noprof+0x189/0x420 [ 24.836352] kasan_atomics+0x95/0x310 [ 24.836769] kunit_try_run_case+0x1a5/0x480 [ 24.837218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.837953] kthread+0x337/0x6f0 [ 24.838290] ret_from_fork+0x41/0x80 [ 24.838885] ret_from_fork_asm+0x1a/0x30 [ 24.839371] [ 24.840747] The buggy address belongs to the object at ffff888102983600 [ 24.840747] which belongs to the cache kmalloc-64 of size 64 [ 24.841726] The buggy address is located 0 bytes to the right of [ 24.841726] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.842679] [ 24.842912] The buggy address belongs to the physical page: [ 24.843406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.845935] flags: 0x200000000000000(node=0|zone=2) [ 24.846130] page_type: f5(slab) [ 24.846275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.846790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.847446] page dumped because: kasan: bad access detected [ 24.847898] [ 24.848087] Memory state around the buggy address: [ 24.848636] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.849236] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.849873] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.850537] ^ [ 24.850920] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.851613] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.852102] ================================================================== [ 23.144890] ================================================================== [ 23.145372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 23.146512] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.146995] [ 23.147273] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.147423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.147897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.147931] Call Trace: [ 23.147958] <TASK> [ 23.147985] dump_stack_lvl+0x73/0xb0 [ 23.148027] print_report+0xd1/0x650 [ 23.148063] ? __virt_addr_valid+0x1db/0x2d0 [ 23.148097] ? kasan_atomics_helper+0x4a84/0x5450 [ 23.148129] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.148163] ? kasan_atomics_helper+0x4a84/0x5450 [ 23.148196] kasan_report+0x141/0x180 [ 23.148234] ? kasan_atomics_helper+0x4a84/0x5450 [ 23.148273] __asan_report_load4_noabort+0x18/0x20 [ 23.148305] kasan_atomics_helper+0x4a84/0x5450 [ 23.148341] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.148375] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.148412] ? kasan_atomics+0x152/0x310 [ 23.148498] kasan_atomics+0x1dc/0x310 [ 23.148544] ? __pfx_kasan_atomics+0x10/0x10 [ 23.148577] ? __pfx_read_tsc+0x10/0x10 [ 23.148607] ? ktime_get_ts64+0x86/0x230 [ 23.148649] kunit_try_run_case+0x1a5/0x480 [ 23.148686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.148720] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.148757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.148791] ? __kthread_parkme+0x82/0x180 [ 23.148825] ? preempt_count_sub+0x50/0x80 [ 23.148860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.148895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.148929] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.148963] kthread+0x337/0x6f0 [ 23.148996] ? trace_preempt_on+0x20/0xc0 [ 23.149031] ? __pfx_kthread+0x10/0x10 [ 23.149065] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.149099] ? calculate_sigpending+0x7b/0xa0 [ 23.149132] ? __pfx_kthread+0x10/0x10 [ 23.149166] ret_from_fork+0x41/0x80 [ 23.149198] ? __pfx_kthread+0x10/0x10 [ 23.149230] ret_from_fork_asm+0x1a/0x30 [ 23.149276] </TASK> [ 23.149291] [ 23.168301] Allocated by task 285: [ 23.169147] kasan_save_stack+0x45/0x70 [ 23.169989] kasan_save_track+0x18/0x40 [ 23.170340] kasan_save_alloc_info+0x3b/0x50 [ 23.171356] __kasan_kmalloc+0xb7/0xc0 [ 23.172083] __kmalloc_cache_noprof+0x189/0x420 [ 23.172735] kasan_atomics+0x95/0x310 [ 23.173255] kunit_try_run_case+0x1a5/0x480 [ 23.174163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.174725] kthread+0x337/0x6f0 [ 23.175067] ret_from_fork+0x41/0x80 [ 23.175688] ret_from_fork_asm+0x1a/0x30 [ 23.176029] [ 23.176245] The buggy address belongs to the object at ffff888102983600 [ 23.176245] which belongs to the cache kmalloc-64 of size 64 [ 23.177213] The buggy address is located 0 bytes to the right of [ 23.177213] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.179213] [ 23.179390] The buggy address belongs to the physical page: [ 23.179837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.180857] flags: 0x200000000000000(node=0|zone=2) [ 23.181232] page_type: f5(slab) [ 23.181644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.182135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.182703] page dumped because: kasan: bad access detected [ 23.183205] [ 23.183409] Memory state around the buggy address: [ 23.183915] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.184621] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.185227] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.185844] ^ [ 23.186342] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.186873] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.187552] ================================================================== [ 23.636104] ================================================================== [ 23.636696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 23.637326] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.637993] [ 23.638247] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.638451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.638511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.638572] Call Trace: [ 23.638631] <TASK> [ 23.638685] dump_stack_lvl+0x73/0xb0 [ 23.638767] print_report+0xd1/0x650 [ 23.638843] ? __virt_addr_valid+0x1db/0x2d0 [ 23.638918] ? kasan_atomics_helper+0x1217/0x5450 [ 23.638994] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.639072] ? kasan_atomics_helper+0x1217/0x5450 [ 23.639154] kasan_report+0x141/0x180 [ 23.639276] ? kasan_atomics_helper+0x1217/0x5450 [ 23.639373] kasan_check_range+0x10c/0x1c0 [ 23.639475] __kasan_check_write+0x18/0x20 [ 23.639568] kasan_atomics_helper+0x1217/0x5450 [ 23.639649] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.639687] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.639722] ? kasan_atomics+0x152/0x310 [ 23.639757] kasan_atomics+0x1dc/0x310 [ 23.639785] ? __pfx_kasan_atomics+0x10/0x10 [ 23.639817] ? __pfx_read_tsc+0x10/0x10 [ 23.639847] ? ktime_get_ts64+0x86/0x230 [ 23.639885] kunit_try_run_case+0x1a5/0x480 [ 23.639919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.639951] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.639987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.640022] ? __kthread_parkme+0x82/0x180 [ 23.640053] ? preempt_count_sub+0x50/0x80 [ 23.640088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.640123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.640157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.640190] kthread+0x337/0x6f0 [ 23.640223] ? trace_preempt_on+0x20/0xc0 [ 23.640258] ? __pfx_kthread+0x10/0x10 [ 23.640291] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.640323] ? calculate_sigpending+0x7b/0xa0 [ 23.640355] ? __pfx_kthread+0x10/0x10 [ 23.640389] ret_from_fork+0x41/0x80 [ 23.640437] ? __pfx_kthread+0x10/0x10 [ 23.640506] ret_from_fork_asm+0x1a/0x30 [ 23.640556] </TASK> [ 23.640572] [ 23.663164] Allocated by task 285: [ 23.664719] kasan_save_stack+0x45/0x70 [ 23.665559] kasan_save_track+0x18/0x40 [ 23.667546] kasan_save_alloc_info+0x3b/0x50 [ 23.667990] __kasan_kmalloc+0xb7/0xc0 [ 23.669967] __kmalloc_cache_noprof+0x189/0x420 [ 23.670284] kasan_atomics+0x95/0x310 [ 23.672741] kunit_try_run_case+0x1a5/0x480 [ 23.673202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.674215] kthread+0x337/0x6f0 [ 23.674539] ret_from_fork+0x41/0x80 [ 23.675323] ret_from_fork_asm+0x1a/0x30 [ 23.676513] [ 23.676677] The buggy address belongs to the object at ffff888102983600 [ 23.676677] which belongs to the cache kmalloc-64 of size 64 [ 23.677895] The buggy address is located 0 bytes to the right of [ 23.677895] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.679294] [ 23.679592] The buggy address belongs to the physical page: [ 23.680001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.680677] flags: 0x200000000000000(node=0|zone=2) [ 23.681562] page_type: f5(slab) [ 23.682358] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.682953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.683792] page dumped because: kasan: bad access detected [ 23.684311] [ 23.684462] Memory state around the buggy address: [ 23.685405] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.686209] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.687289] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.688309] ^ [ 23.688741] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.689345] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.690109] ================================================================== [ 23.876020] ================================================================== [ 23.876635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 23.877340] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.878369] [ 23.878781] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.878892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.878926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.878974] Call Trace: [ 23.879017] <TASK> [ 23.879060] dump_stack_lvl+0x73/0xb0 [ 23.879190] print_report+0xd1/0x650 [ 23.879271] ? __virt_addr_valid+0x1db/0x2d0 [ 23.879355] ? kasan_atomics_helper+0x4eae/0x5450 [ 23.879461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.879615] ? kasan_atomics_helper+0x4eae/0x5450 [ 23.879695] kasan_report+0x141/0x180 [ 23.879769] ? kasan_atomics_helper+0x4eae/0x5450 [ 23.879860] __asan_report_load8_noabort+0x18/0x20 [ 23.879934] kasan_atomics_helper+0x4eae/0x5450 [ 23.880015] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.880078] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.880151] ? kasan_atomics+0x152/0x310 [ 23.880230] kasan_atomics+0x1dc/0x310 [ 23.880292] ? __pfx_kasan_atomics+0x10/0x10 [ 23.880357] ? __pfx_read_tsc+0x10/0x10 [ 23.880474] ? ktime_get_ts64+0x86/0x230 [ 23.880603] kunit_try_run_case+0x1a5/0x480 [ 23.880717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.880795] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.880896] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.881014] ? __kthread_parkme+0x82/0x180 [ 23.881094] ? preempt_count_sub+0x50/0x80 [ 23.881147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.881184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.881221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.881257] kthread+0x337/0x6f0 [ 23.881289] ? trace_preempt_on+0x20/0xc0 [ 23.881325] ? __pfx_kthread+0x10/0x10 [ 23.881359] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.881394] ? calculate_sigpending+0x7b/0xa0 [ 23.881472] ? __pfx_kthread+0x10/0x10 [ 23.881537] ret_from_fork+0x41/0x80 [ 23.881587] ? __pfx_kthread+0x10/0x10 [ 23.881625] ret_from_fork_asm+0x1a/0x30 [ 23.881674] </TASK> [ 23.881690] [ 23.898267] Allocated by task 285: [ 23.898757] kasan_save_stack+0x45/0x70 [ 23.899278] kasan_save_track+0x18/0x40 [ 23.899760] kasan_save_alloc_info+0x3b/0x50 [ 23.900097] __kasan_kmalloc+0xb7/0xc0 [ 23.900455] __kmalloc_cache_noprof+0x189/0x420 [ 23.900991] kasan_atomics+0x95/0x310 [ 23.901464] kunit_try_run_case+0x1a5/0x480 [ 23.901962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.902539] kthread+0x337/0x6f0 [ 23.902928] ret_from_fork+0x41/0x80 [ 23.903367] ret_from_fork_asm+0x1a/0x30 [ 23.903863] [ 23.904136] The buggy address belongs to the object at ffff888102983600 [ 23.904136] which belongs to the cache kmalloc-64 of size 64 [ 23.904919] The buggy address is located 0 bytes to the right of [ 23.904919] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.906089] [ 23.906328] The buggy address belongs to the physical page: [ 23.906865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.907387] flags: 0x200000000000000(node=0|zone=2) [ 23.907958] page_type: f5(slab) [ 23.908400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.909105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.909846] page dumped because: kasan: bad access detected [ 23.910357] [ 23.910648] Memory state around the buggy address: [ 23.911099] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.911774] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.912321] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.913040] ^ [ 23.913598] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.914186] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.914902] ================================================================== [ 23.231170] ================================================================== [ 23.231911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 23.232657] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.233248] [ 23.233545] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.233685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.233725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.233784] Call Trace: [ 23.233840] <TASK> [ 23.233896] dump_stack_lvl+0x73/0xb0 [ 23.233983] print_report+0xd1/0x650 [ 23.234068] ? __virt_addr_valid+0x1db/0x2d0 [ 23.234149] ? kasan_atomics_helper+0xde0/0x5450 [ 23.234227] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.234311] ? kasan_atomics_helper+0xde0/0x5450 [ 23.234390] kasan_report+0x141/0x180 [ 23.234543] ? kasan_atomics_helper+0xde0/0x5450 [ 23.234637] kasan_check_range+0x10c/0x1c0 [ 23.234725] __kasan_check_write+0x18/0x20 [ 23.234804] kasan_atomics_helper+0xde0/0x5450 [ 23.234885] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.234962] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.235040] ? kasan_atomics+0x152/0x310 [ 23.235120] kasan_atomics+0x1dc/0x310 [ 23.235192] ? __pfx_kasan_atomics+0x10/0x10 [ 23.235267] ? __pfx_read_tsc+0x10/0x10 [ 23.235336] ? ktime_get_ts64+0x86/0x230 [ 23.235466] kunit_try_run_case+0x1a5/0x480 [ 23.235548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.235584] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.235619] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.235654] ? __kthread_parkme+0x82/0x180 [ 23.235688] ? preempt_count_sub+0x50/0x80 [ 23.235724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.235757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.235789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.235822] kthread+0x337/0x6f0 [ 23.235852] ? trace_preempt_on+0x20/0xc0 [ 23.235886] ? __pfx_kthread+0x10/0x10 [ 23.235917] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.235951] ? calculate_sigpending+0x7b/0xa0 [ 23.235983] ? __pfx_kthread+0x10/0x10 [ 23.236016] ret_from_fork+0x41/0x80 [ 23.236047] ? __pfx_kthread+0x10/0x10 [ 23.236079] ret_from_fork_asm+0x1a/0x30 [ 23.236125] </TASK> [ 23.236140] [ 23.251752] Allocated by task 285: [ 23.252276] kasan_save_stack+0x45/0x70 [ 23.252865] kasan_save_track+0x18/0x40 [ 23.253335] kasan_save_alloc_info+0x3b/0x50 [ 23.253846] __kasan_kmalloc+0xb7/0xc0 [ 23.254256] __kmalloc_cache_noprof+0x189/0x420 [ 23.254671] kasan_atomics+0x95/0x310 [ 23.255085] kunit_try_run_case+0x1a5/0x480 [ 23.255627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.256213] kthread+0x337/0x6f0 [ 23.256674] ret_from_fork+0x41/0x80 [ 23.257121] ret_from_fork_asm+0x1a/0x30 [ 23.257677] [ 23.257937] The buggy address belongs to the object at ffff888102983600 [ 23.257937] which belongs to the cache kmalloc-64 of size 64 [ 23.258989] The buggy address is located 0 bytes to the right of [ 23.258989] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.259845] [ 23.260034] The buggy address belongs to the physical page: [ 23.260618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.261358] flags: 0x200000000000000(node=0|zone=2) [ 23.261940] page_type: f5(slab) [ 23.262379] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.263068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.263735] page dumped because: kasan: bad access detected [ 23.264284] [ 23.264614] Memory state around the buggy address: [ 23.265075] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.265718] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.266397] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.267059] ^ [ 23.267639] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.268339] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.269052] ================================================================== [ 23.592036] ================================================================== [ 23.592558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 23.593641] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.594395] [ 23.594664] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.594793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.594834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.594896] Call Trace: [ 23.594953] <TASK> [ 23.595008] dump_stack_lvl+0x73/0xb0 [ 23.595094] print_report+0xd1/0x650 [ 23.595181] ? __virt_addr_valid+0x1db/0x2d0 [ 23.595263] ? kasan_atomics_helper+0x4a02/0x5450 [ 23.595338] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.595423] ? kasan_atomics_helper+0x4a02/0x5450 [ 23.595517] kasan_report+0x141/0x180 [ 23.595620] ? kasan_atomics_helper+0x4a02/0x5450 [ 23.595667] __asan_report_load4_noabort+0x18/0x20 [ 23.595701] kasan_atomics_helper+0x4a02/0x5450 [ 23.595740] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.595776] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.595809] ? kasan_atomics+0x152/0x310 [ 23.595840] kasan_atomics+0x1dc/0x310 [ 23.595867] ? __pfx_kasan_atomics+0x10/0x10 [ 23.595896] ? __pfx_read_tsc+0x10/0x10 [ 23.595924] ? ktime_get_ts64+0x86/0x230 [ 23.595963] kunit_try_run_case+0x1a5/0x480 [ 23.596002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.596034] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.596071] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.596107] ? __kthread_parkme+0x82/0x180 [ 23.596139] ? preempt_count_sub+0x50/0x80 [ 23.596176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.596210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.596243] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.596277] kthread+0x337/0x6f0 [ 23.596309] ? trace_preempt_on+0x20/0xc0 [ 23.596344] ? __pfx_kthread+0x10/0x10 [ 23.596378] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.596419] ? calculate_sigpending+0x7b/0xa0 [ 23.596505] ? __pfx_kthread+0x10/0x10 [ 23.596545] ret_from_fork+0x41/0x80 [ 23.596579] ? __pfx_kthread+0x10/0x10 [ 23.596613] ret_from_fork_asm+0x1a/0x30 [ 23.596659] </TASK> [ 23.596676] [ 23.616157] Allocated by task 285: [ 23.616799] kasan_save_stack+0x45/0x70 [ 23.617134] kasan_save_track+0x18/0x40 [ 23.617557] kasan_save_alloc_info+0x3b/0x50 [ 23.618236] __kasan_kmalloc+0xb7/0xc0 [ 23.618665] __kmalloc_cache_noprof+0x189/0x420 [ 23.619575] kasan_atomics+0x95/0x310 [ 23.620304] kunit_try_run_case+0x1a5/0x480 [ 23.620964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.621374] kthread+0x337/0x6f0 [ 23.621933] ret_from_fork+0x41/0x80 [ 23.622502] ret_from_fork_asm+0x1a/0x30 [ 23.623075] [ 23.623558] The buggy address belongs to the object at ffff888102983600 [ 23.623558] which belongs to the cache kmalloc-64 of size 64 [ 23.624509] The buggy address is located 0 bytes to the right of [ 23.624509] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.625351] [ 23.625697] The buggy address belongs to the physical page: [ 23.626165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.626856] flags: 0x200000000000000(node=0|zone=2) [ 23.627358] page_type: f5(slab) [ 23.627785] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.628401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.629288] page dumped because: kasan: bad access detected [ 23.629838] [ 23.630071] Memory state around the buggy address: [ 23.630589] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.631141] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.631831] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.632364] ^ [ 23.632876] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.633635] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.634211] ================================================================== [ 24.771861] ================================================================== [ 24.772445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 24.773153] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.774192] [ 24.774521] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.774650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.774691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.774751] Call Trace: [ 24.774802] <TASK> [ 24.774852] dump_stack_lvl+0x73/0xb0 [ 24.774933] print_report+0xd1/0x650 [ 24.775014] ? __virt_addr_valid+0x1db/0x2d0 [ 24.775092] ? kasan_atomics_helper+0x1f43/0x5450 [ 24.775169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.775255] ? kasan_atomics_helper+0x1f43/0x5450 [ 24.775336] kasan_report+0x141/0x180 [ 24.775463] ? kasan_atomics_helper+0x1f43/0x5450 [ 24.775618] kasan_check_range+0x10c/0x1c0 [ 24.775700] __kasan_check_write+0x18/0x20 [ 24.775773] kasan_atomics_helper+0x1f43/0x5450 [ 24.775878] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.775957] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.776033] ? kasan_atomics+0x152/0x310 [ 24.776115] kasan_atomics+0x1dc/0x310 [ 24.776187] ? __pfx_kasan_atomics+0x10/0x10 [ 24.776265] ? __pfx_read_tsc+0x10/0x10 [ 24.776338] ? ktime_get_ts64+0x86/0x230 [ 24.776433] kunit_try_run_case+0x1a5/0x480 [ 24.776541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.776619] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.776701] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.776792] ? __kthread_parkme+0x82/0x180 [ 24.776881] ? preempt_count_sub+0x50/0x80 [ 24.776970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.777049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.777129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.777210] kthread+0x337/0x6f0 [ 24.777287] ? trace_preempt_on+0x20/0xc0 [ 24.777372] ? __pfx_kthread+0x10/0x10 [ 24.777463] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.777531] ? calculate_sigpending+0x7b/0xa0 [ 24.777565] ? __pfx_kthread+0x10/0x10 [ 24.777611] ret_from_fork+0x41/0x80 [ 24.777643] ? __pfx_kthread+0x10/0x10 [ 24.777678] ret_from_fork_asm+0x1a/0x30 [ 24.777723] </TASK> [ 24.777738] [ 24.792228] Allocated by task 285: [ 24.792616] kasan_save_stack+0x45/0x70 [ 24.792974] kasan_save_track+0x18/0x40 [ 24.793443] kasan_save_alloc_info+0x3b/0x50 [ 24.793947] __kasan_kmalloc+0xb7/0xc0 [ 24.794376] __kmalloc_cache_noprof+0x189/0x420 [ 24.795008] kasan_atomics+0x95/0x310 [ 24.795647] kunit_try_run_case+0x1a5/0x480 [ 24.796777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.797208] kthread+0x337/0x6f0 [ 24.798204] ret_from_fork+0x41/0x80 [ 24.799597] ret_from_fork_asm+0x1a/0x30 [ 24.800089] [ 24.800326] The buggy address belongs to the object at ffff888102983600 [ 24.800326] which belongs to the cache kmalloc-64 of size 64 [ 24.802987] The buggy address is located 0 bytes to the right of [ 24.802987] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.803431] [ 24.803649] The buggy address belongs to the physical page: [ 24.804818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.805558] flags: 0x200000000000000(node=0|zone=2) [ 24.805964] page_type: f5(slab) [ 24.806292] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.806909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.807522] page dumped because: kasan: bad access detected [ 24.808311] [ 24.808554] Memory state around the buggy address: [ 24.808910] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.809376] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.810004] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.810666] ^ [ 24.811150] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.811813] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.812361] ================================================================== [ 24.939558] ================================================================== [ 24.939958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 24.940225] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.940463] [ 24.942237] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.942324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.942343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.942375] Call Trace: [ 24.942401] <TASK> [ 24.942495] dump_stack_lvl+0x73/0xb0 [ 24.942779] print_report+0xd1/0x650 [ 24.942953] ? __virt_addr_valid+0x1db/0x2d0 [ 24.943047] ? kasan_atomics_helper+0x20c8/0x5450 [ 24.943096] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.943132] ? kasan_atomics_helper+0x20c8/0x5450 [ 24.943166] kasan_report+0x141/0x180 [ 24.943200] ? kasan_atomics_helper+0x20c8/0x5450 [ 24.943239] kasan_check_range+0x10c/0x1c0 [ 24.943275] __kasan_check_write+0x18/0x20 [ 24.943305] kasan_atomics_helper+0x20c8/0x5450 [ 24.943338] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.943371] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.943408] ? kasan_atomics+0x152/0x310 [ 24.943500] kasan_atomics+0x1dc/0x310 [ 24.943536] ? __pfx_kasan_atomics+0x10/0x10 [ 24.943569] ? __pfx_read_tsc+0x10/0x10 [ 24.943598] ? ktime_get_ts64+0x86/0x230 [ 24.943637] kunit_try_run_case+0x1a5/0x480 [ 24.943671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.943703] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.943738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.943772] ? __kthread_parkme+0x82/0x180 [ 24.943804] ? preempt_count_sub+0x50/0x80 [ 24.943840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.943873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.943905] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.943938] kthread+0x337/0x6f0 [ 24.943967] ? trace_preempt_on+0x20/0xc0 [ 24.944001] ? __pfx_kthread+0x10/0x10 [ 24.944032] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.944064] ? calculate_sigpending+0x7b/0xa0 [ 24.944095] ? __pfx_kthread+0x10/0x10 [ 24.944127] ret_from_fork+0x41/0x80 [ 24.944157] ? __pfx_kthread+0x10/0x10 [ 24.944191] ret_from_fork_asm+0x1a/0x30 [ 24.944235] </TASK> [ 24.944249] [ 24.966729] Allocated by task 285: [ 24.967105] kasan_save_stack+0x45/0x70 [ 24.968031] kasan_save_track+0x18/0x40 [ 24.968379] kasan_save_alloc_info+0x3b/0x50 [ 24.969128] __kasan_kmalloc+0xb7/0xc0 [ 24.969517] __kmalloc_cache_noprof+0x189/0x420 [ 24.970165] kasan_atomics+0x95/0x310 [ 24.970904] kunit_try_run_case+0x1a5/0x480 [ 24.972013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.972687] kthread+0x337/0x6f0 [ 24.972978] ret_from_fork+0x41/0x80 [ 24.973283] ret_from_fork_asm+0x1a/0x30 [ 24.974196] [ 24.974727] The buggy address belongs to the object at ffff888102983600 [ 24.974727] which belongs to the cache kmalloc-64 of size 64 [ 24.976008] The buggy address is located 0 bytes to the right of [ 24.976008] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.977278] [ 24.977490] The buggy address belongs to the physical page: [ 24.978136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.979034] flags: 0x200000000000000(node=0|zone=2) [ 24.980035] page_type: f5(slab) [ 24.980370] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.981259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.981791] page dumped because: kasan: bad access detected [ 24.982548] [ 24.983031] Memory state around the buggy address: [ 24.983809] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.984345] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.985296] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.986086] ^ [ 24.986425] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.987051] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.988275] ================================================================== [ 24.147351] ================================================================== [ 24.148922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 24.149188] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.149458] [ 24.149764] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.150247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.150294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.150354] Call Trace: [ 24.150411] <TASK> [ 24.150465] dump_stack_lvl+0x73/0xb0 [ 24.150565] print_report+0xd1/0x650 [ 24.150649] ? __virt_addr_valid+0x1db/0x2d0 [ 24.150725] ? kasan_atomics_helper+0x16e7/0x5450 [ 24.150845] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.150928] ? kasan_atomics_helper+0x16e7/0x5450 [ 24.151048] kasan_report+0x141/0x180 [ 24.151138] ? kasan_atomics_helper+0x16e7/0x5450 [ 24.151230] kasan_check_range+0x10c/0x1c0 [ 24.151306] __kasan_check_write+0x18/0x20 [ 24.151343] kasan_atomics_helper+0x16e7/0x5450 [ 24.151379] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.151426] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.151512] ? kasan_atomics+0x152/0x310 [ 24.151581] kasan_atomics+0x1dc/0x310 [ 24.151613] ? __pfx_kasan_atomics+0x10/0x10 [ 24.151645] ? __pfx_read_tsc+0x10/0x10 [ 24.151675] ? ktime_get_ts64+0x86/0x230 [ 24.151714] kunit_try_run_case+0x1a5/0x480 [ 24.151750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.151784] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.151819] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.151857] ? __kthread_parkme+0x82/0x180 [ 24.151891] ? preempt_count_sub+0x50/0x80 [ 24.151928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.151964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.151998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.152033] kthread+0x337/0x6f0 [ 24.152064] ? trace_preempt_on+0x20/0xc0 [ 24.152099] ? __pfx_kthread+0x10/0x10 [ 24.152132] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.152165] ? calculate_sigpending+0x7b/0xa0 [ 24.152197] ? __pfx_kthread+0x10/0x10 [ 24.152231] ret_from_fork+0x41/0x80 [ 24.152263] ? __pfx_kthread+0x10/0x10 [ 24.152296] ret_from_fork_asm+0x1a/0x30 [ 24.152341] </TASK> [ 24.152356] [ 24.174004] Allocated by task 285: [ 24.174672] kasan_save_stack+0x45/0x70 [ 24.175007] kasan_save_track+0x18/0x40 [ 24.175398] kasan_save_alloc_info+0x3b/0x50 [ 24.175930] __kasan_kmalloc+0xb7/0xc0 [ 24.176286] __kmalloc_cache_noprof+0x189/0x420 [ 24.177327] kasan_atomics+0x95/0x310 [ 24.177833] kunit_try_run_case+0x1a5/0x480 [ 24.178396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.179453] kthread+0x337/0x6f0 [ 24.180055] ret_from_fork+0x41/0x80 [ 24.180328] ret_from_fork_asm+0x1a/0x30 [ 24.180882] [ 24.181223] The buggy address belongs to the object at ffff888102983600 [ 24.181223] which belongs to the cache kmalloc-64 of size 64 [ 24.182321] The buggy address is located 0 bytes to the right of [ 24.182321] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.184772] [ 24.185097] The buggy address belongs to the physical page: [ 24.185614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.186206] flags: 0x200000000000000(node=0|zone=2) [ 24.187005] page_type: f5(slab) [ 24.187806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.188552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.189060] page dumped because: kasan: bad access detected [ 24.189604] [ 24.190058] Memory state around the buggy address: [ 24.191292] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.192270] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.193230] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.193945] ^ [ 24.194902] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.196092] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.197268] ================================================================== [ 23.916182] ================================================================== [ 23.917197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 23.918023] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.918676] [ 23.918991] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.919125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.919169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.919250] Call Trace: [ 23.919333] <TASK> [ 23.919388] dump_stack_lvl+0x73/0xb0 [ 23.919514] print_report+0xd1/0x650 [ 23.919577] ? __virt_addr_valid+0x1db/0x2d0 [ 23.919642] ? kasan_atomics_helper+0x1467/0x5450 [ 23.919714] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.919818] ? kasan_atomics_helper+0x1467/0x5450 [ 23.919928] kasan_report+0x141/0x180 [ 23.920009] ? kasan_atomics_helper+0x1467/0x5450 [ 23.920120] kasan_check_range+0x10c/0x1c0 [ 23.920240] __kasan_check_write+0x18/0x20 [ 23.920318] kasan_atomics_helper+0x1467/0x5450 [ 23.920417] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.920663] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.920749] ? kasan_atomics+0x152/0x310 [ 23.920833] kasan_atomics+0x1dc/0x310 [ 23.920907] ? __pfx_kasan_atomics+0x10/0x10 [ 23.920979] ? __pfx_read_tsc+0x10/0x10 [ 23.921015] ? ktime_get_ts64+0x86/0x230 [ 23.921059] kunit_try_run_case+0x1a5/0x480 [ 23.921096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.921130] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.921168] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.921204] ? __kthread_parkme+0x82/0x180 [ 23.921237] ? preempt_count_sub+0x50/0x80 [ 23.921277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.921347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.921428] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.921521] kthread+0x337/0x6f0 [ 23.921601] ? trace_preempt_on+0x20/0xc0 [ 23.921677] ? __pfx_kthread+0x10/0x10 [ 23.921745] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.921811] ? calculate_sigpending+0x7b/0xa0 [ 23.921871] ? __pfx_kthread+0x10/0x10 [ 23.921934] ret_from_fork+0x41/0x80 [ 23.921995] ? __pfx_kthread+0x10/0x10 [ 23.922062] ret_from_fork_asm+0x1a/0x30 [ 23.922151] </TASK> [ 23.922181] [ 23.946166] Allocated by task 285: [ 23.946733] kasan_save_stack+0x45/0x70 [ 23.947320] kasan_save_track+0x18/0x40 [ 23.947805] kasan_save_alloc_info+0x3b/0x50 [ 23.948357] __kasan_kmalloc+0xb7/0xc0 [ 23.948872] __kmalloc_cache_noprof+0x189/0x420 [ 23.949471] kasan_atomics+0x95/0x310 [ 23.949964] kunit_try_run_case+0x1a5/0x480 [ 23.950541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.951078] kthread+0x337/0x6f0 [ 23.951553] ret_from_fork+0x41/0x80 [ 23.952024] ret_from_fork_asm+0x1a/0x30 [ 23.952553] [ 23.952872] The buggy address belongs to the object at ffff888102983600 [ 23.952872] which belongs to the cache kmalloc-64 of size 64 [ 23.954067] The buggy address is located 0 bytes to the right of [ 23.954067] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.955214] [ 23.955543] The buggy address belongs to the physical page: [ 23.956045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.956915] flags: 0x200000000000000(node=0|zone=2) [ 23.957458] page_type: f5(slab) [ 23.957891] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.958411] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.959138] page dumped because: kasan: bad access detected [ 23.959713] [ 23.960004] Memory state around the buggy address: [ 23.960510] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.961126] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.961731] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.962385] ^ [ 23.962944] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.963516] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.964195] ================================================================== [ 24.380867] ================================================================== [ 24.381552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 24.382090] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.383187] [ 24.383408] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.383565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.383589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.383620] Call Trace: [ 24.383646] <TASK> [ 24.383673] dump_stack_lvl+0x73/0xb0 [ 24.383716] print_report+0xd1/0x650 [ 24.383751] ? __virt_addr_valid+0x1db/0x2d0 [ 24.383782] ? kasan_atomics_helper+0x19e3/0x5450 [ 24.383813] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.383844] ? kasan_atomics_helper+0x19e3/0x5450 [ 24.383876] kasan_report+0x141/0x180 [ 24.383908] ? kasan_atomics_helper+0x19e3/0x5450 [ 24.383946] kasan_check_range+0x10c/0x1c0 [ 24.383980] __kasan_check_write+0x18/0x20 [ 24.384009] kasan_atomics_helper+0x19e3/0x5450 [ 24.384043] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.384078] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.384112] ? kasan_atomics+0x152/0x310 [ 24.384144] kasan_atomics+0x1dc/0x310 [ 24.384171] ? __pfx_kasan_atomics+0x10/0x10 [ 24.384201] ? __pfx_read_tsc+0x10/0x10 [ 24.384234] ? ktime_get_ts64+0x86/0x230 [ 24.384275] kunit_try_run_case+0x1a5/0x480 [ 24.384311] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.384345] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.384380] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.384432] ? __kthread_parkme+0x82/0x180 [ 24.384520] ? preempt_count_sub+0x50/0x80 [ 24.384606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.384689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.384773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.384851] kthread+0x337/0x6f0 [ 24.384924] ? trace_preempt_on+0x20/0xc0 [ 24.385006] ? __pfx_kthread+0x10/0x10 [ 24.385083] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.385218] ? calculate_sigpending+0x7b/0xa0 [ 24.385299] ? __pfx_kthread+0x10/0x10 [ 24.385379] ret_from_fork+0x41/0x80 [ 24.385453] ? __pfx_kthread+0x10/0x10 [ 24.385558] ret_from_fork_asm+0x1a/0x30 [ 24.385671] </TASK> [ 24.385709] [ 24.406987] Allocated by task 285: [ 24.407664] kasan_save_stack+0x45/0x70 [ 24.408099] kasan_save_track+0x18/0x40 [ 24.408313] kasan_save_alloc_info+0x3b/0x50 [ 24.408783] __kasan_kmalloc+0xb7/0xc0 [ 24.409444] __kmalloc_cache_noprof+0x189/0x420 [ 24.410258] kasan_atomics+0x95/0x310 [ 24.411027] kunit_try_run_case+0x1a5/0x480 [ 24.411371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.411845] kthread+0x337/0x6f0 [ 24.412166] ret_from_fork+0x41/0x80 [ 24.412522] ret_from_fork_asm+0x1a/0x30 [ 24.412948] [ 24.413187] The buggy address belongs to the object at ffff888102983600 [ 24.413187] which belongs to the cache kmalloc-64 of size 64 [ 24.414789] The buggy address is located 0 bytes to the right of [ 24.414789] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.416015] [ 24.416229] The buggy address belongs to the physical page: [ 24.417158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.417896] flags: 0x200000000000000(node=0|zone=2) [ 24.418594] page_type: f5(slab) [ 24.419119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.420032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.420742] page dumped because: kasan: bad access detected [ 24.421233] [ 24.421498] Memory state around the buggy address: [ 24.422289] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.423068] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.423926] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.424405] ^ [ 24.425130] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.426001] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.426360] ================================================================== [ 24.516188] ================================================================== [ 24.517077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 24.517837] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.518497] [ 24.518784] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.518914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.518991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.519057] Call Trace: [ 24.519114] <TASK> [ 24.519170] dump_stack_lvl+0x73/0xb0 [ 24.519251] print_report+0xd1/0x650 [ 24.519325] ? __virt_addr_valid+0x1db/0x2d0 [ 24.519444] ? kasan_atomics_helper+0x1c18/0x5450 [ 24.519553] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.519633] ? kasan_atomics_helper+0x1c18/0x5450 [ 24.519711] kasan_report+0x141/0x180 [ 24.519790] ? kasan_atomics_helper+0x1c18/0x5450 [ 24.519884] kasan_check_range+0x10c/0x1c0 [ 24.519965] __kasan_check_write+0x18/0x20 [ 24.520035] kasan_atomics_helper+0x1c18/0x5450 [ 24.520113] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.520192] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.520258] ? kasan_atomics+0x152/0x310 [ 24.520317] kasan_atomics+0x1dc/0x310 [ 24.520390] ? __pfx_kasan_atomics+0x10/0x10 [ 24.520531] ? __pfx_read_tsc+0x10/0x10 [ 24.520604] ? ktime_get_ts64+0x86/0x230 [ 24.520692] kunit_try_run_case+0x1a5/0x480 [ 24.520784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.520861] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.520935] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.521016] ? __kthread_parkme+0x82/0x180 [ 24.521091] ? preempt_count_sub+0x50/0x80 [ 24.521174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.521263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.521345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.521468] kthread+0x337/0x6f0 [ 24.521563] ? trace_preempt_on+0x20/0xc0 [ 24.521657] ? __pfx_kthread+0x10/0x10 [ 24.521734] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.521812] ? calculate_sigpending+0x7b/0xa0 [ 24.521886] ? __pfx_kthread+0x10/0x10 [ 24.521952] ret_from_fork+0x41/0x80 [ 24.521986] ? __pfx_kthread+0x10/0x10 [ 24.522020] ret_from_fork_asm+0x1a/0x30 [ 24.522065] </TASK> [ 24.522081] [ 24.536400] Allocated by task 285: [ 24.536816] kasan_save_stack+0x45/0x70 [ 24.537308] kasan_save_track+0x18/0x40 [ 24.537814] kasan_save_alloc_info+0x3b/0x50 [ 24.538228] __kasan_kmalloc+0xb7/0xc0 [ 24.538684] __kmalloc_cache_noprof+0x189/0x420 [ 24.539040] kasan_atomics+0x95/0x310 [ 24.539353] kunit_try_run_case+0x1a5/0x480 [ 24.539887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.540468] kthread+0x337/0x6f0 [ 24.540870] ret_from_fork+0x41/0x80 [ 24.541196] ret_from_fork_asm+0x1a/0x30 [ 24.541607] [ 24.541845] The buggy address belongs to the object at ffff888102983600 [ 24.541845] which belongs to the cache kmalloc-64 of size 64 [ 24.542856] The buggy address is located 0 bytes to the right of [ 24.542856] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.543749] [ 24.543987] The buggy address belongs to the physical page: [ 24.544546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.545194] flags: 0x200000000000000(node=0|zone=2) [ 24.545631] page_type: f5(slab) [ 24.546002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.546717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.547336] page dumped because: kasan: bad access detected [ 24.547763] [ 24.547995] Memory state around the buggy address: [ 24.550544] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.551204] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.551749] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.552189] ^ [ 24.553063] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.554135] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.554738] ================================================================== [ 24.199572] ================================================================== [ 24.200912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 24.201473] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.203366] [ 24.203929] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.204350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.204389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.204448] Call Trace: [ 24.204515] <TASK> [ 24.204641] dump_stack_lvl+0x73/0xb0 [ 24.204731] print_report+0xd1/0x650 [ 24.204799] ? __virt_addr_valid+0x1db/0x2d0 [ 24.204866] ? kasan_atomics_helper+0x177f/0x5450 [ 24.204922] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.204981] ? kasan_atomics_helper+0x177f/0x5450 [ 24.205042] kasan_report+0x141/0x180 [ 24.205751] ? kasan_atomics_helper+0x177f/0x5450 [ 24.205846] kasan_check_range+0x10c/0x1c0 [ 24.205933] __kasan_check_write+0x18/0x20 [ 24.206002] kasan_atomics_helper+0x177f/0x5450 [ 24.206079] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.206141] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.206200] ? kasan_atomics+0x152/0x310 [ 24.206261] kasan_atomics+0x1dc/0x310 [ 24.206310] ? __pfx_kasan_atomics+0x10/0x10 [ 24.206371] ? __pfx_read_tsc+0x10/0x10 [ 24.206506] ? ktime_get_ts64+0x86/0x230 [ 24.206590] kunit_try_run_case+0x1a5/0x480 [ 24.206654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.206706] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.206762] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.206820] ? __kthread_parkme+0x82/0x180 [ 24.206874] ? preempt_count_sub+0x50/0x80 [ 24.206934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.206991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.207046] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.207104] kthread+0x337/0x6f0 [ 24.207156] ? trace_preempt_on+0x20/0xc0 [ 24.207210] ? __pfx_kthread+0x10/0x10 [ 24.207263] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.207316] ? calculate_sigpending+0x7b/0xa0 [ 24.207368] ? __pfx_kthread+0x10/0x10 [ 24.207551] ret_from_fork+0x41/0x80 [ 24.207613] ? __pfx_kthread+0x10/0x10 [ 24.207650] ret_from_fork_asm+0x1a/0x30 [ 24.207696] </TASK> [ 24.207712] [ 24.226500] Allocated by task 285: [ 24.227252] kasan_save_stack+0x45/0x70 [ 24.228103] kasan_save_track+0x18/0x40 [ 24.228686] kasan_save_alloc_info+0x3b/0x50 [ 24.229098] __kasan_kmalloc+0xb7/0xc0 [ 24.229499] __kmalloc_cache_noprof+0x189/0x420 [ 24.230059] kasan_atomics+0x95/0x310 [ 24.230430] kunit_try_run_case+0x1a5/0x480 [ 24.230859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.231293] kthread+0x337/0x6f0 [ 24.231669] ret_from_fork+0x41/0x80 [ 24.231977] ret_from_fork_asm+0x1a/0x30 [ 24.232384] [ 24.232863] The buggy address belongs to the object at ffff888102983600 [ 24.232863] which belongs to the cache kmalloc-64 of size 64 [ 24.234180] The buggy address is located 0 bytes to the right of [ 24.234180] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.236254] [ 24.236520] The buggy address belongs to the physical page: [ 24.237111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.238303] flags: 0x200000000000000(node=0|zone=2) [ 24.238906] page_type: f5(slab) [ 24.239299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.240247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.240995] page dumped because: kasan: bad access detected [ 24.241446] [ 24.242057] Memory state around the buggy address: [ 24.242389] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.243151] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.244001] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.244882] ^ [ 24.245260] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.245798] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.246247] ================================================================== [ 23.014052] ================================================================== [ 23.014585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 23.015058] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.015333] [ 23.015439] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.015588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.015629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.015678] Call Trace: [ 23.015710] <TASK> [ 23.015747] dump_stack_lvl+0x73/0xb0 [ 23.015817] print_report+0xd1/0x650 [ 23.015884] ? __virt_addr_valid+0x1db/0x2d0 [ 23.015956] ? kasan_atomics_helper+0xac7/0x5450 [ 23.016028] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.016109] ? kasan_atomics_helper+0xac7/0x5450 [ 23.016188] kasan_report+0x141/0x180 [ 23.016267] ? kasan_atomics_helper+0xac7/0x5450 [ 23.016360] kasan_check_range+0x10c/0x1c0 [ 23.016406] __kasan_check_write+0x18/0x20 [ 23.016555] kasan_atomics_helper+0xac7/0x5450 [ 23.016650] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.016834] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.016927] ? kasan_atomics+0x152/0x310 [ 23.017011] kasan_atomics+0x1dc/0x310 [ 23.017083] ? __pfx_kasan_atomics+0x10/0x10 [ 23.017156] ? __pfx_read_tsc+0x10/0x10 [ 23.017224] ? ktime_get_ts64+0x86/0x230 [ 23.017308] kunit_try_run_case+0x1a5/0x480 [ 23.017390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.017464] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.017566] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.017650] ? __kthread_parkme+0x82/0x180 [ 23.017705] ? preempt_count_sub+0x50/0x80 [ 23.017747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.017787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.017821] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.017855] kthread+0x337/0x6f0 [ 23.017886] ? trace_preempt_on+0x20/0xc0 [ 23.017919] ? __pfx_kthread+0x10/0x10 [ 23.017951] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.017986] ? calculate_sigpending+0x7b/0xa0 [ 23.018018] ? __pfx_kthread+0x10/0x10 [ 23.018051] ret_from_fork+0x41/0x80 [ 23.018083] ? __pfx_kthread+0x10/0x10 [ 23.018116] ret_from_fork_asm+0x1a/0x30 [ 23.018163] </TASK> [ 23.018177] [ 23.036581] Allocated by task 285: [ 23.037052] kasan_save_stack+0x45/0x70 [ 23.037582] kasan_save_track+0x18/0x40 [ 23.038101] kasan_save_alloc_info+0x3b/0x50 [ 23.038565] __kasan_kmalloc+0xb7/0xc0 [ 23.038884] __kmalloc_cache_noprof+0x189/0x420 [ 23.039606] kasan_atomics+0x95/0x310 [ 23.040057] kunit_try_run_case+0x1a5/0x480 [ 23.040674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.041324] kthread+0x337/0x6f0 [ 23.041806] ret_from_fork+0x41/0x80 [ 23.042330] ret_from_fork_asm+0x1a/0x30 [ 23.042831] [ 23.043076] The buggy address belongs to the object at ffff888102983600 [ 23.043076] which belongs to the cache kmalloc-64 of size 64 [ 23.044120] The buggy address is located 0 bytes to the right of [ 23.044120] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.045356] [ 23.045657] The buggy address belongs to the physical page: [ 23.046203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.047088] flags: 0x200000000000000(node=0|zone=2) [ 23.047778] page_type: f5(slab) [ 23.048224] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.048987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.049782] page dumped because: kasan: bad access detected [ 23.050322] [ 23.050597] Memory state around the buggy address: [ 23.051214] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.051998] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.052825] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.053326] ^ [ 23.054272] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.054976] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.055827] ================================================================== [ 22.456788] ================================================================== [ 22.458132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 22.458938] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.459671] [ 22.459982] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.460158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.460203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.460262] Call Trace: [ 22.460317] <TASK> [ 22.460375] dump_stack_lvl+0x73/0xb0 [ 22.460662] print_report+0xd1/0x650 [ 22.460749] ? __virt_addr_valid+0x1db/0x2d0 [ 22.460795] ? kasan_atomics_helper+0x4a0/0x5450 [ 22.460828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.460864] ? kasan_atomics_helper+0x4a0/0x5450 [ 22.460897] kasan_report+0x141/0x180 [ 22.460931] ? kasan_atomics_helper+0x4a0/0x5450 [ 22.460971] kasan_check_range+0x10c/0x1c0 [ 22.461008] __kasan_check_write+0x18/0x20 [ 22.461036] kasan_atomics_helper+0x4a0/0x5450 [ 22.461071] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.461106] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.461140] ? kasan_atomics+0x152/0x310 [ 22.461171] kasan_atomics+0x1dc/0x310 [ 22.461198] ? __pfx_kasan_atomics+0x10/0x10 [ 22.461228] ? __pfx_read_tsc+0x10/0x10 [ 22.461257] ? ktime_get_ts64+0x86/0x230 [ 22.461309] kunit_try_run_case+0x1a5/0x480 [ 22.461375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.461412] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.461593] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.461671] ? __kthread_parkme+0x82/0x180 [ 22.461742] ? preempt_count_sub+0x50/0x80 [ 22.461814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.461879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.461959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.462006] kthread+0x337/0x6f0 [ 22.462038] ? trace_preempt_on+0x20/0xc0 [ 22.462073] ? __pfx_kthread+0x10/0x10 [ 22.462105] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.462136] ? calculate_sigpending+0x7b/0xa0 [ 22.462167] ? __pfx_kthread+0x10/0x10 [ 22.462199] ret_from_fork+0x41/0x80 [ 22.462230] ? __pfx_kthread+0x10/0x10 [ 22.462262] ret_from_fork_asm+0x1a/0x30 [ 22.462305] </TASK> [ 22.462319] [ 22.479936] Allocated by task 285: [ 22.480381] kasan_save_stack+0x45/0x70 [ 22.480870] kasan_save_track+0x18/0x40 [ 22.481279] kasan_save_alloc_info+0x3b/0x50 [ 22.482272] __kasan_kmalloc+0xb7/0xc0 [ 22.482863] __kmalloc_cache_noprof+0x189/0x420 [ 22.483363] kasan_atomics+0x95/0x310 [ 22.483889] kunit_try_run_case+0x1a5/0x480 [ 22.484323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.485011] kthread+0x337/0x6f0 [ 22.485305] ret_from_fork+0x41/0x80 [ 22.486169] ret_from_fork_asm+0x1a/0x30 [ 22.486812] [ 22.487055] The buggy address belongs to the object at ffff888102983600 [ 22.487055] which belongs to the cache kmalloc-64 of size 64 [ 22.488185] The buggy address is located 0 bytes to the right of [ 22.488185] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.489313] [ 22.489641] The buggy address belongs to the physical page: [ 22.490243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.491236] flags: 0x200000000000000(node=0|zone=2) [ 22.491965] page_type: f5(slab) [ 22.492385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.493197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.493861] page dumped because: kasan: bad access detected [ 22.494287] [ 22.494519] Memory state around the buggy address: [ 22.494927] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.495457] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.496149] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.496847] ^ [ 22.497348] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.498306] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.499000] ================================================================== [ 23.412213] ================================================================== [ 23.413142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 23.413891] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.414548] [ 23.414860] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.414993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.415034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.415113] Call Trace: [ 23.415196] <TASK> [ 23.415249] dump_stack_lvl+0x73/0xb0 [ 23.415315] print_report+0xd1/0x650 [ 23.415352] ? __virt_addr_valid+0x1db/0x2d0 [ 23.415387] ? kasan_atomics_helper+0x4a36/0x5450 [ 23.415515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.415619] ? kasan_atomics_helper+0x4a36/0x5450 [ 23.415730] kasan_report+0x141/0x180 [ 23.415814] ? kasan_atomics_helper+0x4a36/0x5450 [ 23.415908] __asan_report_load4_noabort+0x18/0x20 [ 23.416011] kasan_atomics_helper+0x4a36/0x5450 [ 23.416124] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.416171] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.416208] ? kasan_atomics+0x152/0x310 [ 23.416243] kasan_atomics+0x1dc/0x310 [ 23.416272] ? __pfx_kasan_atomics+0x10/0x10 [ 23.416305] ? __pfx_read_tsc+0x10/0x10 [ 23.416336] ? ktime_get_ts64+0x86/0x230 [ 23.416377] kunit_try_run_case+0x1a5/0x480 [ 23.416466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.416533] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.416573] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.416610] ? __kthread_parkme+0x82/0x180 [ 23.416644] ? preempt_count_sub+0x50/0x80 [ 23.416680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.416715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.416749] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.416786] kthread+0x337/0x6f0 [ 23.416818] ? trace_preempt_on+0x20/0xc0 [ 23.416854] ? __pfx_kthread+0x10/0x10 [ 23.416889] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.416923] ? calculate_sigpending+0x7b/0xa0 [ 23.416956] ? __pfx_kthread+0x10/0x10 [ 23.416988] ret_from_fork+0x41/0x80 [ 23.417019] ? __pfx_kthread+0x10/0x10 [ 23.417051] ret_from_fork_asm+0x1a/0x30 [ 23.417096] </TASK> [ 23.417111] [ 23.432006] Allocated by task 285: [ 23.432505] kasan_save_stack+0x45/0x70 [ 23.433055] kasan_save_track+0x18/0x40 [ 23.433676] kasan_save_alloc_info+0x3b/0x50 [ 23.434227] __kasan_kmalloc+0xb7/0xc0 [ 23.434706] __kmalloc_cache_noprof+0x189/0x420 [ 23.435070] kasan_atomics+0x95/0x310 [ 23.435375] kunit_try_run_case+0x1a5/0x480 [ 23.435974] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.436605] kthread+0x337/0x6f0 [ 23.437004] ret_from_fork+0x41/0x80 [ 23.437539] ret_from_fork_asm+0x1a/0x30 [ 23.438023] [ 23.438313] The buggy address belongs to the object at ffff888102983600 [ 23.438313] which belongs to the cache kmalloc-64 of size 64 [ 23.439289] The buggy address is located 0 bytes to the right of [ 23.439289] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.440128] [ 23.440445] The buggy address belongs to the physical page: [ 23.441036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.441758] flags: 0x200000000000000(node=0|zone=2) [ 23.442258] page_type: f5(slab) [ 23.443776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.444364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.445459] page dumped because: kasan: bad access detected [ 23.445858] [ 23.446097] Memory state around the buggy address: [ 23.446756] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.447297] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.448362] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.449217] ^ [ 23.449741] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.450663] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.451169] ================================================================== [ 23.452685] ================================================================== [ 23.453882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 23.455020] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.456351] [ 23.456889] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.457084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.457124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.457182] Call Trace: [ 23.457234] <TASK> [ 23.457282] dump_stack_lvl+0x73/0xb0 [ 23.457326] print_report+0xd1/0x650 [ 23.457360] ? __virt_addr_valid+0x1db/0x2d0 [ 23.457393] ? kasan_atomics_helper+0x1079/0x5450 [ 23.457495] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.457543] ? kasan_atomics_helper+0x1079/0x5450 [ 23.457590] kasan_report+0x141/0x180 [ 23.457624] ? kasan_atomics_helper+0x1079/0x5450 [ 23.457663] kasan_check_range+0x10c/0x1c0 [ 23.457698] __kasan_check_write+0x18/0x20 [ 23.457727] kasan_atomics_helper+0x1079/0x5450 [ 23.457760] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.457794] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.457828] ? kasan_atomics+0x152/0x310 [ 23.457861] kasan_atomics+0x1dc/0x310 [ 23.457890] ? __pfx_kasan_atomics+0x10/0x10 [ 23.457920] ? __pfx_read_tsc+0x10/0x10 [ 23.457949] ? ktime_get_ts64+0x86/0x230 [ 23.457986] kunit_try_run_case+0x1a5/0x480 [ 23.458019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.458052] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.458087] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.458121] ? __kthread_parkme+0x82/0x180 [ 23.458152] ? preempt_count_sub+0x50/0x80 [ 23.458187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.458221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.458253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.458285] kthread+0x337/0x6f0 [ 23.458316] ? trace_preempt_on+0x20/0xc0 [ 23.458349] ? __pfx_kthread+0x10/0x10 [ 23.458380] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.458421] ? calculate_sigpending+0x7b/0xa0 [ 23.458508] ? __pfx_kthread+0x10/0x10 [ 23.458548] ret_from_fork+0x41/0x80 [ 23.458580] ? __pfx_kthread+0x10/0x10 [ 23.458612] ret_from_fork_asm+0x1a/0x30 [ 23.458657] </TASK> [ 23.458672] [ 23.475135] Allocated by task 285: [ 23.475722] kasan_save_stack+0x45/0x70 [ 23.476137] kasan_save_track+0x18/0x40 [ 23.476625] kasan_save_alloc_info+0x3b/0x50 [ 23.477137] __kasan_kmalloc+0xb7/0xc0 [ 23.477727] __kmalloc_cache_noprof+0x189/0x420 [ 23.478072] kasan_atomics+0x95/0x310 [ 23.478406] kunit_try_run_case+0x1a5/0x480 [ 23.479092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.479472] kthread+0x337/0x6f0 [ 23.479774] ret_from_fork+0x41/0x80 [ 23.480297] ret_from_fork_asm+0x1a/0x30 [ 23.481041] [ 23.481338] The buggy address belongs to the object at ffff888102983600 [ 23.481338] which belongs to the cache kmalloc-64 of size 64 [ 23.482339] The buggy address is located 0 bytes to the right of [ 23.482339] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.485568] [ 23.485822] The buggy address belongs to the physical page: [ 23.486397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.487063] flags: 0x200000000000000(node=0|zone=2) [ 23.487648] page_type: f5(slab) [ 23.488008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.488682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.489280] page dumped because: kasan: bad access detected [ 23.489947] [ 23.490161] Memory state around the buggy address: [ 23.490726] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.491353] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.492155] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.492806] ^ [ 23.493234] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.493924] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.494386] ================================================================== [ 23.544350] ================================================================== [ 23.544990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 23.545865] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.546887] [ 23.547335] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.547728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.547753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.547784] Call Trace: [ 23.547808] <TASK> [ 23.547834] dump_stack_lvl+0x73/0xb0 [ 23.547875] print_report+0xd1/0x650 [ 23.547910] ? __virt_addr_valid+0x1db/0x2d0 [ 23.547942] ? kasan_atomics_helper+0x1148/0x5450 [ 23.547975] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.548009] ? kasan_atomics_helper+0x1148/0x5450 [ 23.548041] kasan_report+0x141/0x180 [ 23.548076] ? kasan_atomics_helper+0x1148/0x5450 [ 23.548115] kasan_check_range+0x10c/0x1c0 [ 23.548151] __kasan_check_write+0x18/0x20 [ 23.548181] kasan_atomics_helper+0x1148/0x5450 [ 23.548216] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.548250] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.548283] ? kasan_atomics+0x152/0x310 [ 23.548315] kasan_atomics+0x1dc/0x310 [ 23.548342] ? __pfx_kasan_atomics+0x10/0x10 [ 23.548372] ? __pfx_read_tsc+0x10/0x10 [ 23.548400] ? ktime_get_ts64+0x86/0x230 [ 23.548472] kunit_try_run_case+0x1a5/0x480 [ 23.548534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.548570] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.548606] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.548642] ? __kthread_parkme+0x82/0x180 [ 23.548675] ? preempt_count_sub+0x50/0x80 [ 23.548711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.548746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.548779] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.548812] kthread+0x337/0x6f0 [ 23.548844] ? trace_preempt_on+0x20/0xc0 [ 23.548878] ? __pfx_kthread+0x10/0x10 [ 23.548912] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.548946] ? calculate_sigpending+0x7b/0xa0 [ 23.548979] ? __pfx_kthread+0x10/0x10 [ 23.549013] ret_from_fork+0x41/0x80 [ 23.549045] ? __pfx_kthread+0x10/0x10 [ 23.549078] ret_from_fork_asm+0x1a/0x30 [ 23.549123] </TASK> [ 23.549138] [ 23.570058] Allocated by task 285: [ 23.570499] kasan_save_stack+0x45/0x70 [ 23.570909] kasan_save_track+0x18/0x40 [ 23.571290] kasan_save_alloc_info+0x3b/0x50 [ 23.572230] __kasan_kmalloc+0xb7/0xc0 [ 23.572735] __kmalloc_cache_noprof+0x189/0x420 [ 23.573416] kasan_atomics+0x95/0x310 [ 23.573915] kunit_try_run_case+0x1a5/0x480 [ 23.574306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.575116] kthread+0x337/0x6f0 [ 23.575788] ret_from_fork+0x41/0x80 [ 23.576151] ret_from_fork_asm+0x1a/0x30 [ 23.576810] [ 23.577066] The buggy address belongs to the object at ffff888102983600 [ 23.577066] which belongs to the cache kmalloc-64 of size 64 [ 23.578536] The buggy address is located 0 bytes to the right of [ 23.578536] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.579868] [ 23.580318] The buggy address belongs to the physical page: [ 23.580986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.581873] flags: 0x200000000000000(node=0|zone=2) [ 23.582311] page_type: f5(slab) [ 23.582965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.583787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.584376] page dumped because: kasan: bad access detected [ 23.585117] [ 23.585359] Memory state around the buggy address: [ 23.586096] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.586855] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.587105] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.587336] ^ [ 23.587674] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.588471] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.589643] ================================================================== [ 24.338908] ================================================================== [ 24.339750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 24.340446] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.341297] [ 24.341529] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.341675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.341723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.341787] Call Trace: [ 24.341843] <TASK> [ 24.341898] dump_stack_lvl+0x73/0xb0 [ 24.341985] print_report+0xd1/0x650 [ 24.342064] ? __virt_addr_valid+0x1db/0x2d0 [ 24.342142] ? kasan_atomics_helper+0x194a/0x5450 [ 24.342222] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.342303] ? kasan_atomics_helper+0x194a/0x5450 [ 24.342383] kasan_report+0x141/0x180 [ 24.342532] ? kasan_atomics_helper+0x194a/0x5450 [ 24.342635] kasan_check_range+0x10c/0x1c0 [ 24.342725] __kasan_check_write+0x18/0x20 [ 24.342796] kasan_atomics_helper+0x194a/0x5450 [ 24.342878] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.342957] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.343035] ? kasan_atomics+0x152/0x310 [ 24.343116] kasan_atomics+0x1dc/0x310 [ 24.343187] ? __pfx_kasan_atomics+0x10/0x10 [ 24.343259] ? __pfx_read_tsc+0x10/0x10 [ 24.343315] ? ktime_get_ts64+0x86/0x230 [ 24.343357] kunit_try_run_case+0x1a5/0x480 [ 24.343395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.343492] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.343542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.343581] ? __kthread_parkme+0x82/0x180 [ 24.343617] ? preempt_count_sub+0x50/0x80 [ 24.343654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.343690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.343725] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.343759] kthread+0x337/0x6f0 [ 24.343789] ? trace_preempt_on+0x20/0xc0 [ 24.343824] ? __pfx_kthread+0x10/0x10 [ 24.343858] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.343892] ? calculate_sigpending+0x7b/0xa0 [ 24.343924] ? __pfx_kthread+0x10/0x10 [ 24.343957] ret_from_fork+0x41/0x80 [ 24.343988] ? __pfx_kthread+0x10/0x10 [ 24.344021] ret_from_fork_asm+0x1a/0x30 [ 24.344067] </TASK> [ 24.344081] [ 24.359498] Allocated by task 285: [ 24.359926] kasan_save_stack+0x45/0x70 [ 24.360374] kasan_save_track+0x18/0x40 [ 24.360789] kasan_save_alloc_info+0x3b/0x50 [ 24.361122] __kasan_kmalloc+0xb7/0xc0 [ 24.361430] __kmalloc_cache_noprof+0x189/0x420 [ 24.361901] kasan_atomics+0x95/0x310 [ 24.362594] kunit_try_run_case+0x1a5/0x480 [ 24.363074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.363715] kthread+0x337/0x6f0 [ 24.364014] ret_from_fork+0x41/0x80 [ 24.364415] ret_from_fork_asm+0x1a/0x30 [ 24.364842] [ 24.365032] The buggy address belongs to the object at ffff888102983600 [ 24.365032] which belongs to the cache kmalloc-64 of size 64 [ 24.365913] The buggy address is located 0 bytes to the right of [ 24.365913] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.366785] [ 24.367047] The buggy address belongs to the physical page: [ 24.367623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.368121] flags: 0x200000000000000(node=0|zone=2) [ 24.369562] page_type: f5(slab) [ 24.370860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.371613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.372279] page dumped because: kasan: bad access detected [ 24.373693] [ 24.374304] Memory state around the buggy address: [ 24.375032] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.376054] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.376798] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.377415] ^ [ 24.377888] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.378712] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.379328] ================================================================== [ 22.758684] ================================================================== [ 22.760235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 22.761080] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.762056] [ 22.762248] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.762323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.762343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.762376] Call Trace: [ 22.762408] <TASK> [ 22.762447] dump_stack_lvl+0x73/0xb0 [ 22.762556] print_report+0xd1/0x650 [ 22.762637] ? __virt_addr_valid+0x1db/0x2d0 [ 22.762719] ? kasan_atomics_helper+0x7c7/0x5450 [ 22.762795] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.762877] ? kasan_atomics_helper+0x7c7/0x5450 [ 22.762956] kasan_report+0x141/0x180 [ 22.763039] ? kasan_atomics_helper+0x7c7/0x5450 [ 22.763110] kasan_check_range+0x10c/0x1c0 [ 22.763153] __kasan_check_write+0x18/0x20 [ 22.763184] kasan_atomics_helper+0x7c7/0x5450 [ 22.763247] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.763303] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.763341] ? kasan_atomics+0x152/0x310 [ 22.763374] kasan_atomics+0x1dc/0x310 [ 22.763403] ? __pfx_kasan_atomics+0x10/0x10 [ 22.763642] ? __pfx_read_tsc+0x10/0x10 [ 22.763731] ? ktime_get_ts64+0x86/0x230 [ 22.763817] kunit_try_run_case+0x1a5/0x480 [ 22.763894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.763964] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.764032] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.764112] ? __kthread_parkme+0x82/0x180 [ 22.764186] ? preempt_count_sub+0x50/0x80 [ 22.764244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.764282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.764314] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.764347] kthread+0x337/0x6f0 [ 22.764378] ? trace_preempt_on+0x20/0xc0 [ 22.764435] ? __pfx_kthread+0x10/0x10 [ 22.764555] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.764620] ? calculate_sigpending+0x7b/0xa0 [ 22.764655] ? __pfx_kthread+0x10/0x10 [ 22.764688] ret_from_fork+0x41/0x80 [ 22.764721] ? __pfx_kthread+0x10/0x10 [ 22.764754] ret_from_fork_asm+0x1a/0x30 [ 22.764798] </TASK> [ 22.764814] [ 22.788196] Allocated by task 285: [ 22.788595] kasan_save_stack+0x45/0x70 [ 22.788978] kasan_save_track+0x18/0x40 [ 22.789282] kasan_save_alloc_info+0x3b/0x50 [ 22.790747] __kasan_kmalloc+0xb7/0xc0 [ 22.791077] __kmalloc_cache_noprof+0x189/0x420 [ 22.791519] kasan_atomics+0x95/0x310 [ 22.792309] kunit_try_run_case+0x1a5/0x480 [ 22.792749] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.794240] kthread+0x337/0x6f0 [ 22.794514] ret_from_fork+0x41/0x80 [ 22.795291] ret_from_fork_asm+0x1a/0x30 [ 22.796128] [ 22.796372] The buggy address belongs to the object at ffff888102983600 [ 22.796372] which belongs to the cache kmalloc-64 of size 64 [ 22.797679] The buggy address is located 0 bytes to the right of [ 22.797679] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.799337] [ 22.799527] The buggy address belongs to the physical page: [ 22.800417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.800958] flags: 0x200000000000000(node=0|zone=2) [ 22.801680] page_type: f5(slab) [ 22.801959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.803296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.804086] page dumped because: kasan: bad access detected [ 22.804593] [ 22.804801] Memory state around the buggy address: [ 22.805243] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.806281] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.807159] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.808252] ^ [ 22.809047] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.809891] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.810687] ================================================================== [ 22.207281] ================================================================== [ 22.208278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 22.209237] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.210396] [ 22.210854] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.210921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.210940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.210967] Call Trace: [ 22.210986] <TASK> [ 22.211006] dump_stack_lvl+0x73/0xb0 [ 22.211045] print_report+0xd1/0x650 [ 22.211076] ? __virt_addr_valid+0x1db/0x2d0 [ 22.211106] ? kasan_atomics_helper+0x4ba2/0x5450 [ 22.211273] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.211400] ? kasan_atomics_helper+0x4ba2/0x5450 [ 22.211507] kasan_report+0x141/0x180 [ 22.211586] ? kasan_atomics_helper+0x4ba2/0x5450 [ 22.211731] __asan_report_store4_noabort+0x1b/0x30 [ 22.211807] kasan_atomics_helper+0x4ba2/0x5450 [ 22.211885] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.211963] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.212042] ? kasan_atomics+0x152/0x310 [ 22.212081] kasan_atomics+0x1dc/0x310 [ 22.212109] ? __pfx_kasan_atomics+0x10/0x10 [ 22.212137] ? __pfx_read_tsc+0x10/0x10 [ 22.212165] ? ktime_get_ts64+0x86/0x230 [ 22.212202] kunit_try_run_case+0x1a5/0x480 [ 22.212236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.212266] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.212301] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.212334] ? __kthread_parkme+0x82/0x180 [ 22.212364] ? preempt_count_sub+0x50/0x80 [ 22.212398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.212578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.212646] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.212716] kthread+0x337/0x6f0 [ 22.212779] ? trace_preempt_on+0x20/0xc0 [ 22.212848] ? __pfx_kthread+0x10/0x10 [ 22.212905] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.212938] ? calculate_sigpending+0x7b/0xa0 [ 22.212968] ? __pfx_kthread+0x10/0x10 [ 22.213000] ret_from_fork+0x41/0x80 [ 22.213029] ? __pfx_kthread+0x10/0x10 [ 22.213060] ret_from_fork_asm+0x1a/0x30 [ 22.213103] </TASK> [ 22.213116] [ 22.237254] Allocated by task 285: [ 22.237621] kasan_save_stack+0x45/0x70 [ 22.238046] kasan_save_track+0x18/0x40 [ 22.238956] kasan_save_alloc_info+0x3b/0x50 [ 22.239306] __kasan_kmalloc+0xb7/0xc0 [ 22.239794] __kmalloc_cache_noprof+0x189/0x420 [ 22.240156] kasan_atomics+0x95/0x310 [ 22.240473] kunit_try_run_case+0x1a5/0x480 [ 22.240846] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.241234] kthread+0x337/0x6f0 [ 22.242975] ret_from_fork+0x41/0x80 [ 22.243276] ret_from_fork_asm+0x1a/0x30 [ 22.244251] [ 22.245089] The buggy address belongs to the object at ffff888102983600 [ 22.245089] which belongs to the cache kmalloc-64 of size 64 [ 22.246032] The buggy address is located 0 bytes to the right of [ 22.246032] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.247993] [ 22.248172] The buggy address belongs to the physical page: [ 22.249148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.249762] flags: 0x200000000000000(node=0|zone=2) [ 22.250403] page_type: f5(slab) [ 22.250826] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.251368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.251954] page dumped because: kasan: bad access detected [ 22.252320] [ 22.252671] Memory state around the buggy address: [ 22.253302] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.254753] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.255003] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.255230] ^ [ 22.255398] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.256975] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.257558] ================================================================== [ 23.189299] ================================================================== [ 23.191347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 23.192349] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.193161] [ 23.193444] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.193587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.193609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.193641] Call Trace: [ 23.193668] <TASK> [ 23.193701] dump_stack_lvl+0x73/0xb0 [ 23.193775] print_report+0xd1/0x650 [ 23.193812] ? __virt_addr_valid+0x1db/0x2d0 [ 23.193846] ? kasan_atomics_helper+0xd47/0x5450 [ 23.193878] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.193913] ? kasan_atomics_helper+0xd47/0x5450 [ 23.193946] kasan_report+0x141/0x180 [ 23.193979] ? kasan_atomics_helper+0xd47/0x5450 [ 23.194018] kasan_check_range+0x10c/0x1c0 [ 23.194055] __kasan_check_write+0x18/0x20 [ 23.194086] kasan_atomics_helper+0xd47/0x5450 [ 23.194122] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.194158] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.194191] ? kasan_atomics+0x152/0x310 [ 23.194224] kasan_atomics+0x1dc/0x310 [ 23.194253] ? __pfx_kasan_atomics+0x10/0x10 [ 23.194283] ? __pfx_read_tsc+0x10/0x10 [ 23.194312] ? ktime_get_ts64+0x86/0x230 [ 23.194350] kunit_try_run_case+0x1a5/0x480 [ 23.194386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.194436] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.194644] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.194728] ? __kthread_parkme+0x82/0x180 [ 23.194803] ? preempt_count_sub+0x50/0x80 [ 23.194884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.194963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.195002] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.195039] kthread+0x337/0x6f0 [ 23.195072] ? trace_preempt_on+0x20/0xc0 [ 23.195106] ? __pfx_kthread+0x10/0x10 [ 23.195139] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.195171] ? calculate_sigpending+0x7b/0xa0 [ 23.195202] ? __pfx_kthread+0x10/0x10 [ 23.195233] ret_from_fork+0x41/0x80 [ 23.195263] ? __pfx_kthread+0x10/0x10 [ 23.195294] ret_from_fork_asm+0x1a/0x30 [ 23.195340] </TASK> [ 23.195355] [ 23.214035] Allocated by task 285: [ 23.214555] kasan_save_stack+0x45/0x70 [ 23.214925] kasan_save_track+0x18/0x40 [ 23.215240] kasan_save_alloc_info+0x3b/0x50 [ 23.215624] __kasan_kmalloc+0xb7/0xc0 [ 23.215977] __kmalloc_cache_noprof+0x189/0x420 [ 23.216469] kasan_atomics+0x95/0x310 [ 23.216894] kunit_try_run_case+0x1a5/0x480 [ 23.217340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.217929] kthread+0x337/0x6f0 [ 23.218309] ret_from_fork+0x41/0x80 [ 23.218783] ret_from_fork_asm+0x1a/0x30 [ 23.219201] [ 23.219471] The buggy address belongs to the object at ffff888102983600 [ 23.219471] which belongs to the cache kmalloc-64 of size 64 [ 23.220278] The buggy address is located 0 bytes to the right of [ 23.220278] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.221241] [ 23.221551] The buggy address belongs to the physical page: [ 23.222073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.222849] flags: 0x200000000000000(node=0|zone=2) [ 23.223293] page_type: f5(slab) [ 23.223725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.224344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.225014] page dumped because: kasan: bad access detected [ 23.225504] [ 23.225747] Memory state around the buggy address: [ 23.226135] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.226696] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.227322] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.228003] ^ [ 23.228543] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.229108] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.229667] ================================================================== [ 25.043079] ================================================================== [ 25.043819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 25.045097] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 25.045869] [ 25.045991] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 25.046055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.046074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.046105] Call Trace: [ 25.046129] <TASK> [ 25.046154] dump_stack_lvl+0x73/0xb0 [ 25.046193] print_report+0xd1/0x650 [ 25.046228] ? __virt_addr_valid+0x1db/0x2d0 [ 25.046262] ? kasan_atomics_helper+0x218a/0x5450 [ 25.046293] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.046327] ? kasan_atomics_helper+0x218a/0x5450 [ 25.046361] kasan_report+0x141/0x180 [ 25.046394] ? kasan_atomics_helper+0x218a/0x5450 [ 25.046517] kasan_check_range+0x10c/0x1c0 [ 25.046692] __kasan_check_write+0x18/0x20 [ 25.046826] kasan_atomics_helper+0x218a/0x5450 [ 25.046929] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.047016] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.047099] ? kasan_atomics+0x152/0x310 [ 25.047179] kasan_atomics+0x1dc/0x310 [ 25.047216] ? __pfx_kasan_atomics+0x10/0x10 [ 25.047249] ? __pfx_read_tsc+0x10/0x10 [ 25.047280] ? ktime_get_ts64+0x86/0x230 [ 25.047320] kunit_try_run_case+0x1a5/0x480 [ 25.047357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.047392] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.047463] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.047531] ? __kthread_parkme+0x82/0x180 [ 25.047566] ? preempt_count_sub+0x50/0x80 [ 25.047603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.047639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.047674] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.047708] kthread+0x337/0x6f0 [ 25.047741] ? trace_preempt_on+0x20/0xc0 [ 25.047776] ? __pfx_kthread+0x10/0x10 [ 25.047809] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.047842] ? calculate_sigpending+0x7b/0xa0 [ 25.047875] ? __pfx_kthread+0x10/0x10 [ 25.047909] ret_from_fork+0x41/0x80 [ 25.047940] ? __pfx_kthread+0x10/0x10 [ 25.047974] ret_from_fork_asm+0x1a/0x30 [ 25.048019] </TASK> [ 25.048035] [ 25.063897] Allocated by task 285: [ 25.064399] kasan_save_stack+0x45/0x70 [ 25.064917] kasan_save_track+0x18/0x40 [ 25.065272] kasan_save_alloc_info+0x3b/0x50 [ 25.066105] __kasan_kmalloc+0xb7/0xc0 [ 25.066584] __kmalloc_cache_noprof+0x189/0x420 [ 25.067045] kasan_atomics+0x95/0x310 [ 25.067447] kunit_try_run_case+0x1a5/0x480 [ 25.067971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.068449] kthread+0x337/0x6f0 [ 25.068927] ret_from_fork+0x41/0x80 [ 25.069383] ret_from_fork_asm+0x1a/0x30 [ 25.069796] [ 25.070069] The buggy address belongs to the object at ffff888102983600 [ 25.070069] which belongs to the cache kmalloc-64 of size 64 [ 25.071223] The buggy address is located 0 bytes to the right of [ 25.071223] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 25.072411] [ 25.072679] The buggy address belongs to the physical page: [ 25.073217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 25.073842] flags: 0x200000000000000(node=0|zone=2) [ 25.074203] page_type: f5(slab) [ 25.074671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.075388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.076116] page dumped because: kasan: bad access detected [ 25.076655] [ 25.076891] Memory state around the buggy address: [ 25.077311] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.078201] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.078839] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.079471] ^ [ 25.079981] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.080661] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.081322] ================================================================== [ 23.782458] ================================================================== [ 23.784146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 23.784786] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.786061] [ 23.786292] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.786729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.786772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.786806] Call Trace: [ 23.786832] <TASK> [ 23.786856] dump_stack_lvl+0x73/0xb0 [ 23.786896] print_report+0xd1/0x650 [ 23.786932] ? __virt_addr_valid+0x1db/0x2d0 [ 23.786963] ? kasan_atomics_helper+0x49ce/0x5450 [ 23.786996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.787031] ? kasan_atomics_helper+0x49ce/0x5450 [ 23.787065] kasan_report+0x141/0x180 [ 23.787100] ? kasan_atomics_helper+0x49ce/0x5450 [ 23.787140] __asan_report_load4_noabort+0x18/0x20 [ 23.787170] kasan_atomics_helper+0x49ce/0x5450 [ 23.787204] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.787238] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.787271] ? kasan_atomics+0x152/0x310 [ 23.787304] kasan_atomics+0x1dc/0x310 [ 23.787333] ? __pfx_kasan_atomics+0x10/0x10 [ 23.787364] ? __pfx_read_tsc+0x10/0x10 [ 23.787394] ? ktime_get_ts64+0x86/0x230 [ 23.787476] kunit_try_run_case+0x1a5/0x480 [ 23.787541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.787577] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.787614] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.787651] ? __kthread_parkme+0x82/0x180 [ 23.787684] ? preempt_count_sub+0x50/0x80 [ 23.787722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.787757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.787789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.787824] kthread+0x337/0x6f0 [ 23.787855] ? trace_preempt_on+0x20/0xc0 [ 23.787890] ? __pfx_kthread+0x10/0x10 [ 23.787924] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.787958] ? calculate_sigpending+0x7b/0xa0 [ 23.787989] ? __pfx_kthread+0x10/0x10 [ 23.788023] ret_from_fork+0x41/0x80 [ 23.788054] ? __pfx_kthread+0x10/0x10 [ 23.788086] ret_from_fork_asm+0x1a/0x30 [ 23.788132] </TASK> [ 23.788146] [ 23.808652] Allocated by task 285: [ 23.809203] kasan_save_stack+0x45/0x70 [ 23.809944] kasan_save_track+0x18/0x40 [ 23.810382] kasan_save_alloc_info+0x3b/0x50 [ 23.811263] __kasan_kmalloc+0xb7/0xc0 [ 23.811548] __kmalloc_cache_noprof+0x189/0x420 [ 23.812039] kasan_atomics+0x95/0x310 [ 23.812424] kunit_try_run_case+0x1a5/0x480 [ 23.812866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.813351] kthread+0x337/0x6f0 [ 23.814237] ret_from_fork+0x41/0x80 [ 23.814716] ret_from_fork_asm+0x1a/0x30 [ 23.815313] [ 23.815724] The buggy address belongs to the object at ffff888102983600 [ 23.815724] which belongs to the cache kmalloc-64 of size 64 [ 23.817007] The buggy address is located 0 bytes to the right of [ 23.817007] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.818078] [ 23.818633] The buggy address belongs to the physical page: [ 23.819120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.820018] flags: 0x200000000000000(node=0|zone=2) [ 23.820447] page_type: f5(slab) [ 23.820822] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.821915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.822422] page dumped because: kasan: bad access detected [ 23.823130] [ 23.823368] Memory state around the buggy address: [ 23.824228] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.825062] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.825608] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.826381] ^ [ 23.826869] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.827677] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.828391] ================================================================== [ 22.704156] ================================================================== [ 22.705813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 22.706787] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.707311] [ 22.708325] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.708398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.708428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.708530] Call Trace: [ 22.708588] <TASK> [ 22.708616] dump_stack_lvl+0x73/0xb0 [ 22.708657] print_report+0xd1/0x650 [ 22.708693] ? __virt_addr_valid+0x1db/0x2d0 [ 22.708727] ? kasan_atomics_helper+0x72f/0x5450 [ 22.708760] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.708796] ? kasan_atomics_helper+0x72f/0x5450 [ 22.708830] kasan_report+0x141/0x180 [ 22.708863] ? kasan_atomics_helper+0x72f/0x5450 [ 22.708903] kasan_check_range+0x10c/0x1c0 [ 22.708941] __kasan_check_write+0x18/0x20 [ 22.708970] kasan_atomics_helper+0x72f/0x5450 [ 22.709004] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.709040] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.709073] ? kasan_atomics+0x152/0x310 [ 22.709105] kasan_atomics+0x1dc/0x310 [ 22.709132] ? __pfx_kasan_atomics+0x10/0x10 [ 22.709163] ? __pfx_read_tsc+0x10/0x10 [ 22.709193] ? ktime_get_ts64+0x86/0x230 [ 22.709232] kunit_try_run_case+0x1a5/0x480 [ 22.709267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.709301] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.709338] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.709375] ? __kthread_parkme+0x82/0x180 [ 22.709408] ? preempt_count_sub+0x50/0x80 [ 22.709522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.709596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.709633] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.709667] kthread+0x337/0x6f0 [ 22.709699] ? trace_preempt_on+0x20/0xc0 [ 22.709733] ? __pfx_kthread+0x10/0x10 [ 22.709766] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.709799] ? calculate_sigpending+0x7b/0xa0 [ 22.709830] ? __pfx_kthread+0x10/0x10 [ 22.709863] ret_from_fork+0x41/0x80 [ 22.709896] ? __pfx_kthread+0x10/0x10 [ 22.709928] ret_from_fork_asm+0x1a/0x30 [ 22.709974] </TASK> [ 22.709990] [ 22.732794] Allocated by task 285: [ 22.733212] kasan_save_stack+0x45/0x70 [ 22.734237] kasan_save_track+0x18/0x40 [ 22.734614] kasan_save_alloc_info+0x3b/0x50 [ 22.735756] __kasan_kmalloc+0xb7/0xc0 [ 22.736344] __kmalloc_cache_noprof+0x189/0x420 [ 22.736774] kasan_atomics+0x95/0x310 [ 22.737536] kunit_try_run_case+0x1a5/0x480 [ 22.738107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.738607] kthread+0x337/0x6f0 [ 22.739138] ret_from_fork+0x41/0x80 [ 22.739757] ret_from_fork_asm+0x1a/0x30 [ 22.740180] [ 22.740405] The buggy address belongs to the object at ffff888102983600 [ 22.740405] which belongs to the cache kmalloc-64 of size 64 [ 22.742328] The buggy address is located 0 bytes to the right of [ 22.742328] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.743970] [ 22.744136] The buggy address belongs to the physical page: [ 22.745700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.746284] flags: 0x200000000000000(node=0|zone=2) [ 22.746864] page_type: f5(slab) [ 22.747147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.748211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.749339] page dumped because: kasan: bad access detected [ 22.750885] [ 22.751233] Memory state around the buggy address: [ 22.752089] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.752970] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.754014] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.754744] ^ [ 22.755059] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.756496] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.756999] ================================================================== [ 24.638047] ================================================================== [ 24.638690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 24.639223] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.640331] [ 24.640683] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.640859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.640901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.640960] Call Trace: [ 24.641034] <TASK> [ 24.641116] dump_stack_lvl+0x73/0xb0 [ 24.641204] print_report+0xd1/0x650 [ 24.641284] ? __virt_addr_valid+0x1db/0x2d0 [ 24.641365] ? kasan_atomics_helper+0x1d7a/0x5450 [ 24.641587] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.641703] ? kasan_atomics_helper+0x1d7a/0x5450 [ 24.641782] kasan_report+0x141/0x180 [ 24.641863] ? kasan_atomics_helper+0x1d7a/0x5450 [ 24.642038] kasan_check_range+0x10c/0x1c0 [ 24.642131] __kasan_check_write+0x18/0x20 [ 24.642241] kasan_atomics_helper+0x1d7a/0x5450 [ 24.642375] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.642565] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.642706] ? kasan_atomics+0x152/0x310 [ 24.642799] kasan_atomics+0x1dc/0x310 [ 24.642838] ? __pfx_kasan_atomics+0x10/0x10 [ 24.642871] ? __pfx_read_tsc+0x10/0x10 [ 24.642900] ? ktime_get_ts64+0x86/0x230 [ 24.642939] kunit_try_run_case+0x1a5/0x480 [ 24.642974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.643007] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.643040] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.643074] ? __kthread_parkme+0x82/0x180 [ 24.643105] ? preempt_count_sub+0x50/0x80 [ 24.643139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.643173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.643205] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.643237] kthread+0x337/0x6f0 [ 24.643267] ? trace_preempt_on+0x20/0xc0 [ 24.643301] ? __pfx_kthread+0x10/0x10 [ 24.643333] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.643363] ? calculate_sigpending+0x7b/0xa0 [ 24.643393] ? __pfx_kthread+0x10/0x10 [ 24.643465] ret_from_fork+0x41/0x80 [ 24.643528] ? __pfx_kthread+0x10/0x10 [ 24.643562] ret_from_fork_asm+0x1a/0x30 [ 24.643607] </TASK> [ 24.643622] [ 24.659705] Allocated by task 285: [ 24.660140] kasan_save_stack+0x45/0x70 [ 24.660683] kasan_save_track+0x18/0x40 [ 24.661113] kasan_save_alloc_info+0x3b/0x50 [ 24.661676] __kasan_kmalloc+0xb7/0xc0 [ 24.661986] __kmalloc_cache_noprof+0x189/0x420 [ 24.662507] kasan_atomics+0x95/0x310 [ 24.662983] kunit_try_run_case+0x1a5/0x480 [ 24.663493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.664245] kthread+0x337/0x6f0 [ 24.664682] ret_from_fork+0x41/0x80 [ 24.664992] ret_from_fork_asm+0x1a/0x30 [ 24.665493] [ 24.665775] The buggy address belongs to the object at ffff888102983600 [ 24.665775] which belongs to the cache kmalloc-64 of size 64 [ 24.666684] The buggy address is located 0 bytes to the right of [ 24.666684] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.667984] [ 24.668337] The buggy address belongs to the physical page: [ 24.668917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.669542] flags: 0x200000000000000(node=0|zone=2) [ 24.670124] page_type: f5(slab) [ 24.670566] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.671135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.672043] page dumped because: kasan: bad access detected [ 24.672429] [ 24.672731] Memory state around the buggy address: [ 24.673222] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.673933] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.674525] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.675129] ^ [ 24.675681] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.676241] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.676917] ================================================================== [ 23.317896] ================================================================== [ 23.318514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 23.318988] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.319980] [ 23.320384] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.320935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.320981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.321163] Call Trace: [ 23.321222] <TASK> [ 23.321278] dump_stack_lvl+0x73/0xb0 [ 23.321360] print_report+0xd1/0x650 [ 23.321531] ? __virt_addr_valid+0x1db/0x2d0 [ 23.321670] ? kasan_atomics_helper+0xf10/0x5450 [ 23.321787] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.321891] ? kasan_atomics_helper+0xf10/0x5450 [ 23.321969] kasan_report+0x141/0x180 [ 23.322050] ? kasan_atomics_helper+0xf10/0x5450 [ 23.322144] kasan_check_range+0x10c/0x1c0 [ 23.322225] __kasan_check_write+0x18/0x20 [ 23.322296] kasan_atomics_helper+0xf10/0x5450 [ 23.322374] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.322450] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.322569] ? kasan_atomics+0x152/0x310 [ 23.322662] kasan_atomics+0x1dc/0x310 [ 23.322741] ? __pfx_kasan_atomics+0x10/0x10 [ 23.322815] ? __pfx_read_tsc+0x10/0x10 [ 23.322878] ? ktime_get_ts64+0x86/0x230 [ 23.322923] kunit_try_run_case+0x1a5/0x480 [ 23.322961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.322994] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.323031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.323067] ? __kthread_parkme+0x82/0x180 [ 23.323101] ? preempt_count_sub+0x50/0x80 [ 23.323137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.323171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.323203] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.323236] kthread+0x337/0x6f0 [ 23.323266] ? trace_preempt_on+0x20/0xc0 [ 23.323299] ? __pfx_kthread+0x10/0x10 [ 23.323330] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.323364] ? calculate_sigpending+0x7b/0xa0 [ 23.323398] ? __pfx_kthread+0x10/0x10 [ 23.323476] ret_from_fork+0x41/0x80 [ 23.323538] ? __pfx_kthread+0x10/0x10 [ 23.323576] ret_from_fork_asm+0x1a/0x30 [ 23.323625] </TASK> [ 23.323640] [ 23.342227] Allocated by task 285: [ 23.342887] kasan_save_stack+0x45/0x70 [ 23.343834] kasan_save_track+0x18/0x40 [ 23.344312] kasan_save_alloc_info+0x3b/0x50 [ 23.344667] __kasan_kmalloc+0xb7/0xc0 [ 23.344917] __kmalloc_cache_noprof+0x189/0x420 [ 23.345615] kasan_atomics+0x95/0x310 [ 23.346247] kunit_try_run_case+0x1a5/0x480 [ 23.347072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.347466] kthread+0x337/0x6f0 [ 23.348045] ret_from_fork+0x41/0x80 [ 23.348351] ret_from_fork_asm+0x1a/0x30 [ 23.349018] [ 23.349230] The buggy address belongs to the object at ffff888102983600 [ 23.349230] which belongs to the cache kmalloc-64 of size 64 [ 23.350920] The buggy address is located 0 bytes to the right of [ 23.350920] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.351839] [ 23.352260] The buggy address belongs to the physical page: [ 23.353210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.354008] flags: 0x200000000000000(node=0|zone=2) [ 23.354697] page_type: f5(slab) [ 23.354863] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.355117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.355359] page dumped because: kasan: bad access detected [ 23.355780] [ 23.356071] Memory state around the buggy address: [ 23.356881] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.357560] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.358036] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.358810] ^ [ 23.359238] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.359989] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.360617] ================================================================== [ 22.357119] ================================================================== [ 22.357818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 22.358649] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.359264] [ 22.359756] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.359891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.359931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.359992] Call Trace: [ 22.360065] <TASK> [ 22.360144] dump_stack_lvl+0x73/0xb0 [ 22.360230] print_report+0xd1/0x650 [ 22.360309] ? __virt_addr_valid+0x1db/0x2d0 [ 22.360383] ? kasan_atomics_helper+0x3df/0x5450 [ 22.360648] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.360762] ? kasan_atomics_helper+0x3df/0x5450 [ 22.360844] kasan_report+0x141/0x180 [ 22.360927] ? kasan_atomics_helper+0x3df/0x5450 [ 22.361043] kasan_check_range+0x10c/0x1c0 [ 22.361159] __kasan_check_read+0x15/0x20 [ 22.361201] kasan_atomics_helper+0x3df/0x5450 [ 22.361238] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.361275] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.361308] ? kasan_atomics+0x152/0x310 [ 22.361341] kasan_atomics+0x1dc/0x310 [ 22.361370] ? __pfx_kasan_atomics+0x10/0x10 [ 22.361400] ? __pfx_read_tsc+0x10/0x10 [ 22.361429] ? ktime_get_ts64+0x86/0x230 [ 22.361468] kunit_try_run_case+0x1a5/0x480 [ 22.361615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.361667] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.361708] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.361744] ? __kthread_parkme+0x82/0x180 [ 22.361776] ? preempt_count_sub+0x50/0x80 [ 22.361812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.361845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.361878] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.361911] kthread+0x337/0x6f0 [ 22.361942] ? trace_preempt_on+0x20/0xc0 [ 22.361976] ? __pfx_kthread+0x10/0x10 [ 22.362007] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.362039] ? calculate_sigpending+0x7b/0xa0 [ 22.362069] ? __pfx_kthread+0x10/0x10 [ 22.362103] ret_from_fork+0x41/0x80 [ 22.362133] ? __pfx_kthread+0x10/0x10 [ 22.362165] ret_from_fork_asm+0x1a/0x30 [ 22.362208] </TASK> [ 22.362224] [ 22.381321] Allocated by task 285: [ 22.382224] kasan_save_stack+0x45/0x70 [ 22.382701] kasan_save_track+0x18/0x40 [ 22.383313] kasan_save_alloc_info+0x3b/0x50 [ 22.383926] __kasan_kmalloc+0xb7/0xc0 [ 22.384784] __kmalloc_cache_noprof+0x189/0x420 [ 22.386109] kasan_atomics+0x95/0x310 [ 22.386657] kunit_try_run_case+0x1a5/0x480 [ 22.387720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.388298] kthread+0x337/0x6f0 [ 22.388548] ret_from_fork+0x41/0x80 [ 22.389340] ret_from_fork_asm+0x1a/0x30 [ 22.389912] [ 22.390083] The buggy address belongs to the object at ffff888102983600 [ 22.390083] which belongs to the cache kmalloc-64 of size 64 [ 22.392008] The buggy address is located 0 bytes to the right of [ 22.392008] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.393421] [ 22.394138] The buggy address belongs to the physical page: [ 22.395191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.396062] flags: 0x200000000000000(node=0|zone=2) [ 22.397070] page_type: f5(slab) [ 22.397418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.398387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.399027] page dumped because: kasan: bad access detected [ 22.399443] [ 22.400367] Memory state around the buggy address: [ 22.400999] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.401324] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.402557] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.403238] ^ [ 22.403948] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.404714] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.404999] ================================================================== [ 24.295994] ================================================================== [ 24.296864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 24.298017] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.298639] [ 24.298887] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.299014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.299035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.299065] Call Trace: [ 24.299093] <TASK> [ 24.299118] dump_stack_lvl+0x73/0xb0 [ 24.299158] print_report+0xd1/0x650 [ 24.299190] ? __virt_addr_valid+0x1db/0x2d0 [ 24.299222] ? kasan_atomics_helper+0x18b1/0x5450 [ 24.299253] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.299287] ? kasan_atomics_helper+0x18b1/0x5450 [ 24.299319] kasan_report+0x141/0x180 [ 24.299351] ? kasan_atomics_helper+0x18b1/0x5450 [ 24.299389] kasan_check_range+0x10c/0x1c0 [ 24.299536] __kasan_check_write+0x18/0x20 [ 24.299617] kasan_atomics_helper+0x18b1/0x5450 [ 24.299703] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.299782] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.299863] ? kasan_atomics+0x152/0x310 [ 24.299988] kasan_atomics+0x1dc/0x310 [ 24.300068] ? __pfx_kasan_atomics+0x10/0x10 [ 24.300148] ? __pfx_read_tsc+0x10/0x10 [ 24.300258] ? ktime_get_ts64+0x86/0x230 [ 24.300351] kunit_try_run_case+0x1a5/0x480 [ 24.300454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.300550] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.300618] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.300658] ? __kthread_parkme+0x82/0x180 [ 24.300690] ? preempt_count_sub+0x50/0x80 [ 24.300726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.300760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.300792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.300824] kthread+0x337/0x6f0 [ 24.300856] ? trace_preempt_on+0x20/0xc0 [ 24.300890] ? __pfx_kthread+0x10/0x10 [ 24.300922] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.300953] ? calculate_sigpending+0x7b/0xa0 [ 24.300984] ? __pfx_kthread+0x10/0x10 [ 24.301016] ret_from_fork+0x41/0x80 [ 24.301045] ? __pfx_kthread+0x10/0x10 [ 24.301077] ret_from_fork_asm+0x1a/0x30 [ 24.301122] </TASK> [ 24.301136] [ 24.316846] Allocated by task 285: [ 24.317196] kasan_save_stack+0x45/0x70 [ 24.317564] kasan_save_track+0x18/0x40 [ 24.318057] kasan_save_alloc_info+0x3b/0x50 [ 24.318549] __kasan_kmalloc+0xb7/0xc0 [ 24.319042] __kmalloc_cache_noprof+0x189/0x420 [ 24.319560] kasan_atomics+0x95/0x310 [ 24.320095] kunit_try_run_case+0x1a5/0x480 [ 24.320654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.321188] kthread+0x337/0x6f0 [ 24.321670] ret_from_fork+0x41/0x80 [ 24.322056] ret_from_fork_asm+0x1a/0x30 [ 24.322547] [ 24.322804] The buggy address belongs to the object at ffff888102983600 [ 24.322804] which belongs to the cache kmalloc-64 of size 64 [ 24.323931] The buggy address is located 0 bytes to the right of [ 24.323931] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.325068] [ 24.325362] The buggy address belongs to the physical page: [ 24.326008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.326625] flags: 0x200000000000000(node=0|zone=2) [ 24.327151] page_type: f5(slab) [ 24.327460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.327959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.328775] page dumped because: kasan: bad access detected [ 24.329339] [ 24.329625] Memory state around the buggy address: [ 24.330127] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.331198] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.333511] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.334995] ^ [ 24.335362] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.336121] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.337064] ================================================================== [ 24.060441] ================================================================== [ 24.061275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 24.061935] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.063110] [ 24.063392] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.063601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.063645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.063738] Call Trace: [ 24.063801] <TASK> [ 24.063858] dump_stack_lvl+0x73/0xb0 [ 24.064032] print_report+0xd1/0x650 [ 24.064130] ? __virt_addr_valid+0x1db/0x2d0 [ 24.064207] ? kasan_atomics_helper+0x15b6/0x5450 [ 24.064268] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.064302] ? kasan_atomics_helper+0x15b6/0x5450 [ 24.064334] kasan_report+0x141/0x180 [ 24.064367] ? kasan_atomics_helper+0x15b6/0x5450 [ 24.064407] kasan_check_range+0x10c/0x1c0 [ 24.064505] __kasan_check_write+0x18/0x20 [ 24.064542] kasan_atomics_helper+0x15b6/0x5450 [ 24.064578] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.064612] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.064645] ? kasan_atomics+0x152/0x310 [ 24.064679] kasan_atomics+0x1dc/0x310 [ 24.064706] ? __pfx_kasan_atomics+0x10/0x10 [ 24.064735] ? __pfx_read_tsc+0x10/0x10 [ 24.064763] ? ktime_get_ts64+0x86/0x230 [ 24.064800] kunit_try_run_case+0x1a5/0x480 [ 24.064834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.064866] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.064901] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.064935] ? __kthread_parkme+0x82/0x180 [ 24.064966] ? preempt_count_sub+0x50/0x80 [ 24.065002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.065035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.065067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.065099] kthread+0x337/0x6f0 [ 24.065129] ? trace_preempt_on+0x20/0xc0 [ 24.065165] ? __pfx_kthread+0x10/0x10 [ 24.065199] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.065232] ? calculate_sigpending+0x7b/0xa0 [ 24.065263] ? __pfx_kthread+0x10/0x10 [ 24.065295] ret_from_fork+0x41/0x80 [ 24.065325] ? __pfx_kthread+0x10/0x10 [ 24.065357] ret_from_fork_asm+0x1a/0x30 [ 24.065400] </TASK> [ 24.065431] [ 24.083392] Allocated by task 285: [ 24.084058] kasan_save_stack+0x45/0x70 [ 24.084854] kasan_save_track+0x18/0x40 [ 24.085184] kasan_save_alloc_info+0x3b/0x50 [ 24.086054] __kasan_kmalloc+0xb7/0xc0 [ 24.086508] __kmalloc_cache_noprof+0x189/0x420 [ 24.087188] kasan_atomics+0x95/0x310 [ 24.087687] kunit_try_run_case+0x1a5/0x480 [ 24.088099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.088629] kthread+0x337/0x6f0 [ 24.088988] ret_from_fork+0x41/0x80 [ 24.089350] ret_from_fork_asm+0x1a/0x30 [ 24.090275] [ 24.090575] The buggy address belongs to the object at ffff888102983600 [ 24.090575] which belongs to the cache kmalloc-64 of size 64 [ 24.091870] The buggy address is located 0 bytes to the right of [ 24.091870] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.093132] [ 24.093317] The buggy address belongs to the physical page: [ 24.094508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.095310] flags: 0x200000000000000(node=0|zone=2) [ 24.096006] page_type: f5(slab) [ 24.096286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.097335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.098293] page dumped because: kasan: bad access detected [ 24.098946] [ 24.099111] Memory state around the buggy address: [ 24.099584] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.100087] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.101188] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.101875] ^ [ 24.102615] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.103257] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.103887] ================================================================== [ 23.057383] ================================================================== [ 23.058761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 23.059650] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.060057] [ 23.060291] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.060513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.060559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.060649] Call Trace: [ 23.060712] <TASK> [ 23.060796] dump_stack_lvl+0x73/0xb0 [ 23.060913] print_report+0xd1/0x650 [ 23.060992] ? __virt_addr_valid+0x1db/0x2d0 [ 23.061069] ? kasan_atomics_helper+0xb6a/0x5450 [ 23.061139] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.061215] ? kasan_atomics_helper+0xb6a/0x5450 [ 23.061291] kasan_report+0x141/0x180 [ 23.061367] ? kasan_atomics_helper+0xb6a/0x5450 [ 23.061555] kasan_check_range+0x10c/0x1c0 [ 23.061667] __kasan_check_write+0x18/0x20 [ 23.061779] kasan_atomics_helper+0xb6a/0x5450 [ 23.061899] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.061980] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.062066] ? kasan_atomics+0x152/0x310 [ 23.062151] kasan_atomics+0x1dc/0x310 [ 23.062225] ? __pfx_kasan_atomics+0x10/0x10 [ 23.062299] ? __pfx_read_tsc+0x10/0x10 [ 23.062366] ? ktime_get_ts64+0x86/0x230 [ 23.062507] kunit_try_run_case+0x1a5/0x480 [ 23.062595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.062665] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.062730] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.062768] ? __kthread_parkme+0x82/0x180 [ 23.062800] ? preempt_count_sub+0x50/0x80 [ 23.062837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.062874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.062907] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.062940] kthread+0x337/0x6f0 [ 23.062970] ? trace_preempt_on+0x20/0xc0 [ 23.063004] ? __pfx_kthread+0x10/0x10 [ 23.063035] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.063068] ? calculate_sigpending+0x7b/0xa0 [ 23.063099] ? __pfx_kthread+0x10/0x10 [ 23.063131] ret_from_fork+0x41/0x80 [ 23.063161] ? __pfx_kthread+0x10/0x10 [ 23.063193] ret_from_fork_asm+0x1a/0x30 [ 23.063236] </TASK> [ 23.063251] [ 23.077321] Allocated by task 285: [ 23.077764] kasan_save_stack+0x45/0x70 [ 23.078191] kasan_save_track+0x18/0x40 [ 23.078670] kasan_save_alloc_info+0x3b/0x50 [ 23.079024] __kasan_kmalloc+0xb7/0xc0 [ 23.079388] __kmalloc_cache_noprof+0x189/0x420 [ 23.079942] kasan_atomics+0x95/0x310 [ 23.080338] kunit_try_run_case+0x1a5/0x480 [ 23.080786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.081222] kthread+0x337/0x6f0 [ 23.081684] ret_from_fork+0x41/0x80 [ 23.082098] ret_from_fork_asm+0x1a/0x30 [ 23.082612] [ 23.082805] The buggy address belongs to the object at ffff888102983600 [ 23.082805] which belongs to the cache kmalloc-64 of size 64 [ 23.083770] The buggy address is located 0 bytes to the right of [ 23.083770] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.084547] [ 23.084792] The buggy address belongs to the physical page: [ 23.085325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.086123] flags: 0x200000000000000(node=0|zone=2) [ 23.086669] page_type: f5(slab) [ 23.086999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.087725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.088294] page dumped because: kasan: bad access detected [ 23.088726] [ 23.088911] Memory state around the buggy address: [ 23.089333] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.090026] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.090699] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.091324] ^ [ 23.091846] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.092406] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.093001] ================================================================== [ 23.270811] ================================================================== [ 23.271539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 23.272156] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.272905] [ 23.273217] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.273351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.273393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.273539] Call Trace: [ 23.273610] <TASK> [ 23.273662] dump_stack_lvl+0x73/0xb0 [ 23.273743] print_report+0xd1/0x650 [ 23.273820] ? __virt_addr_valid+0x1db/0x2d0 [ 23.273890] ? kasan_atomics_helper+0xe78/0x5450 [ 23.273944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.274013] ? kasan_atomics_helper+0xe78/0x5450 [ 23.274127] kasan_report+0x141/0x180 [ 23.274218] ? kasan_atomics_helper+0xe78/0x5450 [ 23.274375] kasan_check_range+0x10c/0x1c0 [ 23.274550] __kasan_check_write+0x18/0x20 [ 23.274656] kasan_atomics_helper+0xe78/0x5450 [ 23.274771] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.274859] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.275003] ? kasan_atomics+0x152/0x310 [ 23.275091] kasan_atomics+0x1dc/0x310 [ 23.275168] ? __pfx_kasan_atomics+0x10/0x10 [ 23.275244] ? __pfx_read_tsc+0x10/0x10 [ 23.275312] ? ktime_get_ts64+0x86/0x230 [ 23.275395] kunit_try_run_case+0x1a5/0x480 [ 23.275541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.275617] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.275692] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.275770] ? __kthread_parkme+0x82/0x180 [ 23.275846] ? preempt_count_sub+0x50/0x80 [ 23.275927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.276005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.276067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.276104] kthread+0x337/0x6f0 [ 23.276136] ? trace_preempt_on+0x20/0xc0 [ 23.276171] ? __pfx_kthread+0x10/0x10 [ 23.276204] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.276236] ? calculate_sigpending+0x7b/0xa0 [ 23.276268] ? __pfx_kthread+0x10/0x10 [ 23.276300] ret_from_fork+0x41/0x80 [ 23.276333] ? __pfx_kthread+0x10/0x10 [ 23.276365] ret_from_fork_asm+0x1a/0x30 [ 23.276430] </TASK> [ 23.276498] [ 23.298380] Allocated by task 285: [ 23.299016] kasan_save_stack+0x45/0x70 [ 23.299365] kasan_save_track+0x18/0x40 [ 23.299907] kasan_save_alloc_info+0x3b/0x50 [ 23.301052] __kasan_kmalloc+0xb7/0xc0 [ 23.301627] __kmalloc_cache_noprof+0x189/0x420 [ 23.302293] kasan_atomics+0x95/0x310 [ 23.302690] kunit_try_run_case+0x1a5/0x480 [ 23.303280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.304042] kthread+0x337/0x6f0 [ 23.304368] ret_from_fork+0x41/0x80 [ 23.304775] ret_from_fork_asm+0x1a/0x30 [ 23.305197] [ 23.305436] The buggy address belongs to the object at ffff888102983600 [ 23.305436] which belongs to the cache kmalloc-64 of size 64 [ 23.306355] The buggy address is located 0 bytes to the right of [ 23.306355] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.307398] [ 23.307694] The buggy address belongs to the physical page: [ 23.308171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.309027] flags: 0x200000000000000(node=0|zone=2) [ 23.309541] page_type: f5(slab) [ 23.310021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.310622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.311318] page dumped because: kasan: bad access detected [ 23.311751] [ 23.312014] Memory state around the buggy address: [ 23.312563] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.313142] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.313963] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.314522] ^ [ 23.315120] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.315793] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.316325] ================================================================== [ 23.362477] ================================================================== [ 23.363567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 23.364156] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.365019] [ 23.365599] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.365734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.365778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.365840] Call Trace: [ 23.365896] <TASK> [ 23.365946] dump_stack_lvl+0x73/0xb0 [ 23.366024] print_report+0xd1/0x650 [ 23.366063] ? __virt_addr_valid+0x1db/0x2d0 [ 23.366097] ? kasan_atomics_helper+0xfa9/0x5450 [ 23.366130] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.366164] ? kasan_atomics_helper+0xfa9/0x5450 [ 23.366197] kasan_report+0x141/0x180 [ 23.366233] ? kasan_atomics_helper+0xfa9/0x5450 [ 23.366273] kasan_check_range+0x10c/0x1c0 [ 23.366309] __kasan_check_write+0x18/0x20 [ 23.366339] kasan_atomics_helper+0xfa9/0x5450 [ 23.366373] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.366411] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.366511] ? kasan_atomics+0x152/0x310 [ 23.366551] kasan_atomics+0x1dc/0x310 [ 23.366580] ? __pfx_kasan_atomics+0x10/0x10 [ 23.366612] ? __pfx_read_tsc+0x10/0x10 [ 23.366641] ? ktime_get_ts64+0x86/0x230 [ 23.366680] kunit_try_run_case+0x1a5/0x480 [ 23.366715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.366747] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.366784] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.366820] ? __kthread_parkme+0x82/0x180 [ 23.366853] ? preempt_count_sub+0x50/0x80 [ 23.366889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.366924] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.366956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.366990] kthread+0x337/0x6f0 [ 23.367021] ? trace_preempt_on+0x20/0xc0 [ 23.367057] ? __pfx_kthread+0x10/0x10 [ 23.367090] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.367124] ? calculate_sigpending+0x7b/0xa0 [ 23.367158] ? __pfx_kthread+0x10/0x10 [ 23.367193] ret_from_fork+0x41/0x80 [ 23.367225] ? __pfx_kthread+0x10/0x10 [ 23.367258] ret_from_fork_asm+0x1a/0x30 [ 23.367304] </TASK> [ 23.367319] [ 23.383436] Allocated by task 285: [ 23.384097] kasan_save_stack+0x45/0x70 [ 23.384959] kasan_save_track+0x18/0x40 [ 23.385641] kasan_save_alloc_info+0x3b/0x50 [ 23.386389] __kasan_kmalloc+0xb7/0xc0 [ 23.387100] __kmalloc_cache_noprof+0x189/0x420 [ 23.388017] kasan_atomics+0x95/0x310 [ 23.388783] kunit_try_run_case+0x1a5/0x480 [ 23.389512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.390510] kthread+0x337/0x6f0 [ 23.391055] ret_from_fork+0x41/0x80 [ 23.392736] ret_from_fork_asm+0x1a/0x30 [ 23.394879] [ 23.395225] The buggy address belongs to the object at ffff888102983600 [ 23.395225] which belongs to the cache kmalloc-64 of size 64 [ 23.398176] The buggy address is located 0 bytes to the right of [ 23.398176] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.400033] [ 23.400366] The buggy address belongs to the physical page: [ 23.401178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.401702] flags: 0x200000000000000(node=0|zone=2) [ 23.402576] page_type: f5(slab) [ 23.403098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.404164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.405057] page dumped because: kasan: bad access detected [ 23.405353] [ 23.405729] Memory state around the buggy address: [ 23.406559] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.407646] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.408445] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.409187] ^ [ 23.409646] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.410256] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.411011] ================================================================== [ 23.496315] ================================================================== [ 23.497202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 23.497948] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.498724] [ 23.499007] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.499141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.499187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.499243] Call Trace: [ 23.499347] <TASK> [ 23.499403] dump_stack_lvl+0x73/0xb0 [ 23.499547] print_report+0xd1/0x650 [ 23.499624] ? __virt_addr_valid+0x1db/0x2d0 [ 23.499704] ? kasan_atomics_helper+0x4a1c/0x5450 [ 23.499786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.499867] ? kasan_atomics_helper+0x4a1c/0x5450 [ 23.499944] kasan_report+0x141/0x180 [ 23.500030] ? kasan_atomics_helper+0x4a1c/0x5450 [ 23.500125] __asan_report_load4_noabort+0x18/0x20 [ 23.500200] kasan_atomics_helper+0x4a1c/0x5450 [ 23.500273] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.500312] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.500347] ? kasan_atomics+0x152/0x310 [ 23.500379] kasan_atomics+0x1dc/0x310 [ 23.500430] ? __pfx_kasan_atomics+0x10/0x10 [ 23.500523] ? __pfx_read_tsc+0x10/0x10 [ 23.500557] ? ktime_get_ts64+0x86/0x230 [ 23.500595] kunit_try_run_case+0x1a5/0x480 [ 23.500631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.500663] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.500697] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.500732] ? __kthread_parkme+0x82/0x180 [ 23.500766] ? preempt_count_sub+0x50/0x80 [ 23.500803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.500837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.500870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.500903] kthread+0x337/0x6f0 [ 23.500934] ? trace_preempt_on+0x20/0xc0 [ 23.500969] ? __pfx_kthread+0x10/0x10 [ 23.501002] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.501034] ? calculate_sigpending+0x7b/0xa0 [ 23.501064] ? __pfx_kthread+0x10/0x10 [ 23.501096] ret_from_fork+0x41/0x80 [ 23.501126] ? __pfx_kthread+0x10/0x10 [ 23.501158] ret_from_fork_asm+0x1a/0x30 [ 23.501201] </TASK> [ 23.501216] [ 23.521831] Allocated by task 285: [ 23.522220] kasan_save_stack+0x45/0x70 [ 23.522976] kasan_save_track+0x18/0x40 [ 23.523412] kasan_save_alloc_info+0x3b/0x50 [ 23.524149] __kasan_kmalloc+0xb7/0xc0 [ 23.524609] __kmalloc_cache_noprof+0x189/0x420 [ 23.525031] kasan_atomics+0x95/0x310 [ 23.525755] kunit_try_run_case+0x1a5/0x480 [ 23.526211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.526968] kthread+0x337/0x6f0 [ 23.527374] ret_from_fork+0x41/0x80 [ 23.528059] ret_from_fork_asm+0x1a/0x30 [ 23.528738] [ 23.528984] The buggy address belongs to the object at ffff888102983600 [ 23.528984] which belongs to the cache kmalloc-64 of size 64 [ 23.530022] The buggy address is located 0 bytes to the right of [ 23.530022] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.531571] [ 23.531968] The buggy address belongs to the physical page: [ 23.532681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.533511] flags: 0x200000000000000(node=0|zone=2) [ 23.533970] page_type: f5(slab) [ 23.534617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.535494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.536080] page dumped because: kasan: bad access detected [ 23.536911] [ 23.537423] Memory state around the buggy address: [ 23.537919] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.538469] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.539258] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.540041] ^ [ 23.540676] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.541430] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.542076] ================================================================== [ 22.305110] ================================================================== [ 22.305916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 22.307381] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.308711] [ 22.308923] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.308991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.309010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.309039] Call Trace: [ 22.309063] <TASK> [ 22.309086] dump_stack_lvl+0x73/0xb0 [ 22.309124] print_report+0xd1/0x650 [ 22.309288] ? __virt_addr_valid+0x1db/0x2d0 [ 22.309325] ? kasan_atomics_helper+0x4b6e/0x5450 [ 22.309385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.309422] ? kasan_atomics_helper+0x4b6e/0x5450 [ 22.309459] kasan_report+0x141/0x180 [ 22.309532] ? kasan_atomics_helper+0x4b6e/0x5450 [ 22.309645] __asan_report_store4_noabort+0x1b/0x30 [ 22.309725] kasan_atomics_helper+0x4b6e/0x5450 [ 22.309767] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.309805] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.309841] ? kasan_atomics+0x152/0x310 [ 22.309900] kasan_atomics+0x1dc/0x310 [ 22.309956] ? __pfx_kasan_atomics+0x10/0x10 [ 22.309990] ? __pfx_read_tsc+0x10/0x10 [ 22.310019] ? ktime_get_ts64+0x86/0x230 [ 22.310060] kunit_try_run_case+0x1a5/0x480 [ 22.310097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.310130] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.310166] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.310202] ? __kthread_parkme+0x82/0x180 [ 22.310237] ? preempt_count_sub+0x50/0x80 [ 22.310272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.310307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.310341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.310385] kthread+0x337/0x6f0 [ 22.310623] ? trace_preempt_on+0x20/0xc0 [ 22.310703] ? __pfx_kthread+0x10/0x10 [ 22.310781] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.311017] ? calculate_sigpending+0x7b/0xa0 [ 22.311062] ? __pfx_kthread+0x10/0x10 [ 22.311100] ret_from_fork+0x41/0x80 [ 22.311134] ? __pfx_kthread+0x10/0x10 [ 22.311169] ret_from_fork_asm+0x1a/0x30 [ 22.311217] </TASK> [ 22.311232] [ 22.329663] Allocated by task 285: [ 22.330818] kasan_save_stack+0x45/0x70 [ 22.333627] kasan_save_track+0x18/0x40 [ 22.333911] kasan_save_alloc_info+0x3b/0x50 [ 22.334173] __kasan_kmalloc+0xb7/0xc0 [ 22.334447] __kmalloc_cache_noprof+0x189/0x420 [ 22.335883] kasan_atomics+0x95/0x310 [ 22.336291] kunit_try_run_case+0x1a5/0x480 [ 22.336959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.337701] kthread+0x337/0x6f0 [ 22.338137] ret_from_fork+0x41/0x80 [ 22.338806] ret_from_fork_asm+0x1a/0x30 [ 22.339138] [ 22.339323] The buggy address belongs to the object at ffff888102983600 [ 22.339323] which belongs to the cache kmalloc-64 of size 64 [ 22.342210] The buggy address is located 0 bytes to the right of [ 22.342210] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.344314] [ 22.344747] The buggy address belongs to the physical page: [ 22.345287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.346061] flags: 0x200000000000000(node=0|zone=2) [ 22.346885] page_type: f5(slab) [ 22.347919] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.348675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.349400] page dumped because: kasan: bad access detected [ 22.350119] [ 22.350349] Memory state around the buggy address: [ 22.351404] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.352161] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.352914] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.353651] ^ [ 22.353985] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.354822] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.355444] ================================================================== [ 24.247757] ================================================================== [ 24.248950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 24.250272] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.251072] [ 24.251355] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.251959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.251988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.252022] Call Trace: [ 24.252047] <TASK> [ 24.252070] dump_stack_lvl+0x73/0xb0 [ 24.252111] print_report+0xd1/0x650 [ 24.252145] ? __virt_addr_valid+0x1db/0x2d0 [ 24.252180] ? kasan_atomics_helper+0x1818/0x5450 [ 24.252211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.252245] ? kasan_atomics_helper+0x1818/0x5450 [ 24.252278] kasan_report+0x141/0x180 [ 24.252311] ? kasan_atomics_helper+0x1818/0x5450 [ 24.252350] kasan_check_range+0x10c/0x1c0 [ 24.252387] __kasan_check_write+0x18/0x20 [ 24.252457] kasan_atomics_helper+0x1818/0x5450 [ 24.252524] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.252561] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.252597] ? kasan_atomics+0x152/0x310 [ 24.252631] kasan_atomics+0x1dc/0x310 [ 24.252660] ? __pfx_kasan_atomics+0x10/0x10 [ 24.252690] ? __pfx_read_tsc+0x10/0x10 [ 24.252720] ? ktime_get_ts64+0x86/0x230 [ 24.252758] kunit_try_run_case+0x1a5/0x480 [ 24.252794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.252827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.252863] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.252898] ? __kthread_parkme+0x82/0x180 [ 24.252931] ? preempt_count_sub+0x50/0x80 [ 24.252967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.253002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.253036] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.253070] kthread+0x337/0x6f0 [ 24.253102] ? trace_preempt_on+0x20/0xc0 [ 24.253138] ? __pfx_kthread+0x10/0x10 [ 24.253171] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.253204] ? calculate_sigpending+0x7b/0xa0 [ 24.253240] ? __pfx_kthread+0x10/0x10 [ 24.253274] ret_from_fork+0x41/0x80 [ 24.253308] ? __pfx_kthread+0x10/0x10 [ 24.253347] ret_from_fork_asm+0x1a/0x30 [ 24.253395] </TASK> [ 24.253422] [ 24.274075] Allocated by task 285: [ 24.274266] kasan_save_stack+0x45/0x70 [ 24.274589] kasan_save_track+0x18/0x40 [ 24.275288] kasan_save_alloc_info+0x3b/0x50 [ 24.275863] __kasan_kmalloc+0xb7/0xc0 [ 24.276287] __kmalloc_cache_noprof+0x189/0x420 [ 24.277501] kasan_atomics+0x95/0x310 [ 24.277949] kunit_try_run_case+0x1a5/0x480 [ 24.278324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.279216] kthread+0x337/0x6f0 [ 24.279794] ret_from_fork+0x41/0x80 [ 24.280313] ret_from_fork_asm+0x1a/0x30 [ 24.280715] [ 24.281043] The buggy address belongs to the object at ffff888102983600 [ 24.281043] which belongs to the cache kmalloc-64 of size 64 [ 24.282819] The buggy address is located 0 bytes to the right of [ 24.282819] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.283724] [ 24.284041] The buggy address belongs to the physical page: [ 24.284895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.285794] flags: 0x200000000000000(node=0|zone=2) [ 24.286205] page_type: f5(slab) [ 24.286618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.287280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.288082] page dumped because: kasan: bad access detected [ 24.288526] [ 24.288678] Memory state around the buggy address: [ 24.289040] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.289793] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.291000] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.292331] ^ [ 24.292642] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.294044] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.294985] ================================================================== [ 24.104520] ================================================================== [ 24.105517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 24.106507] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.107683] [ 24.107910] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.108042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.108082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.108144] Call Trace: [ 24.108198] <TASK> [ 24.108252] dump_stack_lvl+0x73/0xb0 [ 24.108336] print_report+0xd1/0x650 [ 24.108397] ? __virt_addr_valid+0x1db/0x2d0 [ 24.108532] ? kasan_atomics_helper+0x164f/0x5450 [ 24.108616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.108697] ? kasan_atomics_helper+0x164f/0x5450 [ 24.108773] kasan_report+0x141/0x180 [ 24.108854] ? kasan_atomics_helper+0x164f/0x5450 [ 24.108943] kasan_check_range+0x10c/0x1c0 [ 24.109028] __kasan_check_write+0x18/0x20 [ 24.109076] kasan_atomics_helper+0x164f/0x5450 [ 24.109112] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.109148] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.109181] ? kasan_atomics+0x152/0x310 [ 24.109212] kasan_atomics+0x1dc/0x310 [ 24.109238] ? __pfx_kasan_atomics+0x10/0x10 [ 24.109267] ? __pfx_read_tsc+0x10/0x10 [ 24.109296] ? ktime_get_ts64+0x86/0x230 [ 24.109337] kunit_try_run_case+0x1a5/0x480 [ 24.109374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.109407] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.109510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.109552] ? __kthread_parkme+0x82/0x180 [ 24.109597] ? preempt_count_sub+0x50/0x80 [ 24.109635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.109669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.109703] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.109736] kthread+0x337/0x6f0 [ 24.109768] ? trace_preempt_on+0x20/0xc0 [ 24.109803] ? __pfx_kthread+0x10/0x10 [ 24.109836] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.109871] ? calculate_sigpending+0x7b/0xa0 [ 24.109904] ? __pfx_kthread+0x10/0x10 [ 24.109938] ret_from_fork+0x41/0x80 [ 24.109970] ? __pfx_kthread+0x10/0x10 [ 24.110004] ret_from_fork_asm+0x1a/0x30 [ 24.110049] </TASK> [ 24.110063] [ 24.127400] Allocated by task 285: [ 24.127900] kasan_save_stack+0x45/0x70 [ 24.128577] kasan_save_track+0x18/0x40 [ 24.129129] kasan_save_alloc_info+0x3b/0x50 [ 24.129709] __kasan_kmalloc+0xb7/0xc0 [ 24.130058] __kmalloc_cache_noprof+0x189/0x420 [ 24.130732] kasan_atomics+0x95/0x310 [ 24.131127] kunit_try_run_case+0x1a5/0x480 [ 24.131694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.132306] kthread+0x337/0x6f0 [ 24.132841] ret_from_fork+0x41/0x80 [ 24.133259] ret_from_fork_asm+0x1a/0x30 [ 24.133790] [ 24.134070] The buggy address belongs to the object at ffff888102983600 [ 24.134070] which belongs to the cache kmalloc-64 of size 64 [ 24.134872] The buggy address is located 0 bytes to the right of [ 24.134872] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.136020] [ 24.136266] The buggy address belongs to the physical page: [ 24.136869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.137364] flags: 0x200000000000000(node=0|zone=2) [ 24.137954] page_type: f5(slab) [ 24.138456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.139298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.139999] page dumped because: kasan: bad access detected [ 24.140640] [ 24.140878] Memory state around the buggy address: [ 24.141316] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.141858] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.142743] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.143352] ^ [ 24.143863] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.144741] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.145366] ================================================================== [ 23.732113] ================================================================== [ 23.733976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 23.734602] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.735260] [ 23.735791] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.736020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.736064] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.736122] Call Trace: [ 23.736176] <TASK> [ 23.736227] dump_stack_lvl+0x73/0xb0 [ 23.736306] print_report+0xd1/0x650 [ 23.736382] ? __virt_addr_valid+0x1db/0x2d0 [ 23.736462] ? kasan_atomics_helper+0x12e6/0x5450 [ 23.736561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.736637] ? kasan_atomics_helper+0x12e6/0x5450 [ 23.736719] kasan_report+0x141/0x180 [ 23.736805] ? kasan_atomics_helper+0x12e6/0x5450 [ 23.736901] kasan_check_range+0x10c/0x1c0 [ 23.736994] __kasan_check_write+0x18/0x20 [ 23.737070] kasan_atomics_helper+0x12e6/0x5450 [ 23.737153] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.737233] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.737315] ? kasan_atomics+0x152/0x310 [ 23.737395] kasan_atomics+0x1dc/0x310 [ 23.737499] ? __pfx_kasan_atomics+0x10/0x10 [ 23.737594] ? __pfx_read_tsc+0x10/0x10 [ 23.737663] ? ktime_get_ts64+0x86/0x230 [ 23.737750] kunit_try_run_case+0x1a5/0x480 [ 23.737829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.737904] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.737982] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.738059] ? __kthread_parkme+0x82/0x180 [ 23.738096] ? preempt_count_sub+0x50/0x80 [ 23.738133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.738168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.738202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.738236] kthread+0x337/0x6f0 [ 23.738267] ? trace_preempt_on+0x20/0xc0 [ 23.738303] ? __pfx_kthread+0x10/0x10 [ 23.738336] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.738368] ? calculate_sigpending+0x7b/0xa0 [ 23.738398] ? __pfx_kthread+0x10/0x10 [ 23.738470] ret_from_fork+0x41/0x80 [ 23.738533] ? __pfx_kthread+0x10/0x10 [ 23.738567] ret_from_fork_asm+0x1a/0x30 [ 23.738615] </TASK> [ 23.738630] [ 23.759947] Allocated by task 285: [ 23.760854] kasan_save_stack+0x45/0x70 [ 23.761265] kasan_save_track+0x18/0x40 [ 23.761936] kasan_save_alloc_info+0x3b/0x50 [ 23.762355] __kasan_kmalloc+0xb7/0xc0 [ 23.763107] __kmalloc_cache_noprof+0x189/0x420 [ 23.763699] kasan_atomics+0x95/0x310 [ 23.764069] kunit_try_run_case+0x1a5/0x480 [ 23.764718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.765187] kthread+0x337/0x6f0 [ 23.765991] ret_from_fork+0x41/0x80 [ 23.766344] ret_from_fork_asm+0x1a/0x30 [ 23.766775] [ 23.767248] The buggy address belongs to the object at ffff888102983600 [ 23.767248] which belongs to the cache kmalloc-64 of size 64 [ 23.768268] The buggy address is located 0 bytes to the right of [ 23.768268] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.769805] [ 23.770032] The buggy address belongs to the physical page: [ 23.771012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.771660] flags: 0x200000000000000(node=0|zone=2) [ 23.772063] page_type: f5(slab) [ 23.772346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.773805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.774639] page dumped because: kasan: bad access detected [ 23.775362] [ 23.775644] Memory state around the buggy address: [ 23.775967] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.777397] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.777938] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.778693] ^ [ 23.779273] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.780070] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.781214] ================================================================== [ 22.655559] ================================================================== [ 22.656627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 22.658307] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.659226] [ 22.659759] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.659995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.660030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.660063] Call Trace: [ 22.660091] <TASK> [ 22.660117] dump_stack_lvl+0x73/0xb0 [ 22.660163] print_report+0xd1/0x650 [ 22.660197] ? __virt_addr_valid+0x1db/0x2d0 [ 22.660230] ? kasan_atomics_helper+0x697/0x5450 [ 22.660261] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.660294] ? kasan_atomics_helper+0x697/0x5450 [ 22.660329] kasan_report+0x141/0x180 [ 22.660361] ? kasan_atomics_helper+0x697/0x5450 [ 22.660398] kasan_check_range+0x10c/0x1c0 [ 22.660533] __kasan_check_write+0x18/0x20 [ 22.660612] kasan_atomics_helper+0x697/0x5450 [ 22.660688] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.660802] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.660880] ? kasan_atomics+0x152/0x310 [ 22.660952] kasan_atomics+0x1dc/0x310 [ 22.661017] ? __pfx_kasan_atomics+0x10/0x10 [ 22.661085] ? __pfx_read_tsc+0x10/0x10 [ 22.661147] ? ktime_get_ts64+0x86/0x230 [ 22.661227] kunit_try_run_case+0x1a5/0x480 [ 22.661306] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.661340] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.661376] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.661411] ? __kthread_parkme+0x82/0x180 [ 22.661519] ? preempt_count_sub+0x50/0x80 [ 22.661616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.661658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.661692] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.661725] kthread+0x337/0x6f0 [ 22.661756] ? trace_preempt_on+0x20/0xc0 [ 22.661789] ? __pfx_kthread+0x10/0x10 [ 22.661821] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.661854] ? calculate_sigpending+0x7b/0xa0 [ 22.661885] ? __pfx_kthread+0x10/0x10 [ 22.661918] ret_from_fork+0x41/0x80 [ 22.661947] ? __pfx_kthread+0x10/0x10 [ 22.661980] ret_from_fork_asm+0x1a/0x30 [ 22.662025] </TASK> [ 22.662039] [ 22.683200] Allocated by task 285: [ 22.683846] kasan_save_stack+0x45/0x70 [ 22.684134] kasan_save_track+0x18/0x40 [ 22.684297] kasan_save_alloc_info+0x3b/0x50 [ 22.684702] __kasan_kmalloc+0xb7/0xc0 [ 22.685289] __kmalloc_cache_noprof+0x189/0x420 [ 22.685718] kasan_atomics+0x95/0x310 [ 22.686876] kunit_try_run_case+0x1a5/0x480 [ 22.687290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.687760] kthread+0x337/0x6f0 [ 22.688166] ret_from_fork+0x41/0x80 [ 22.688541] ret_from_fork_asm+0x1a/0x30 [ 22.688915] [ 22.689163] The buggy address belongs to the object at ffff888102983600 [ 22.689163] which belongs to the cache kmalloc-64 of size 64 [ 22.691159] The buggy address is located 0 bytes to the right of [ 22.691159] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.692273] [ 22.692879] The buggy address belongs to the physical page: [ 22.693801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.694595] flags: 0x200000000000000(node=0|zone=2) [ 22.695082] page_type: f5(slab) [ 22.695420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.696063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.696739] page dumped because: kasan: bad access detected [ 22.697204] [ 22.697545] Memory state around the buggy address: [ 22.698107] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.698868] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.699774] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.700362] ^ [ 22.701347] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.702150] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.703007] ================================================================== [ 24.013881] ================================================================== [ 24.014701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 24.015368] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.016563] [ 24.016813] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.017162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.017206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.017267] Call Trace: [ 24.017304] <TASK> [ 24.017332] dump_stack_lvl+0x73/0xb0 [ 24.017379] print_report+0xd1/0x650 [ 24.017427] ? __virt_addr_valid+0x1db/0x2d0 [ 24.017506] ? kasan_atomics_helper+0x151d/0x5450 [ 24.017544] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.017591] ? kasan_atomics_helper+0x151d/0x5450 [ 24.017625] kasan_report+0x141/0x180 [ 24.017661] ? kasan_atomics_helper+0x151d/0x5450 [ 24.017701] kasan_check_range+0x10c/0x1c0 [ 24.017738] __kasan_check_write+0x18/0x20 [ 24.017767] kasan_atomics_helper+0x151d/0x5450 [ 24.017801] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.017836] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.017870] ? kasan_atomics+0x152/0x310 [ 24.017903] kasan_atomics+0x1dc/0x310 [ 24.017931] ? __pfx_kasan_atomics+0x10/0x10 [ 24.017961] ? __pfx_read_tsc+0x10/0x10 [ 24.017990] ? ktime_get_ts64+0x86/0x230 [ 24.018031] kunit_try_run_case+0x1a5/0x480 [ 24.018068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.018102] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.018139] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.018175] ? __kthread_parkme+0x82/0x180 [ 24.018207] ? preempt_count_sub+0x50/0x80 [ 24.018244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.018277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.018312] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.018345] kthread+0x337/0x6f0 [ 24.018377] ? trace_preempt_on+0x20/0xc0 [ 24.018422] ? __pfx_kthread+0x10/0x10 [ 24.018491] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.018534] ? calculate_sigpending+0x7b/0xa0 [ 24.018567] ? __pfx_kthread+0x10/0x10 [ 24.018600] ret_from_fork+0x41/0x80 [ 24.018633] ? __pfx_kthread+0x10/0x10 [ 24.018666] ret_from_fork_asm+0x1a/0x30 [ 24.018712] </TASK> [ 24.018727] [ 24.039644] Allocated by task 285: [ 24.040171] kasan_save_stack+0x45/0x70 [ 24.040712] kasan_save_track+0x18/0x40 [ 24.041290] kasan_save_alloc_info+0x3b/0x50 [ 24.041760] __kasan_kmalloc+0xb7/0xc0 [ 24.042336] __kmalloc_cache_noprof+0x189/0x420 [ 24.042937] kasan_atomics+0x95/0x310 [ 24.043543] kunit_try_run_case+0x1a5/0x480 [ 24.044201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.044652] kthread+0x337/0x6f0 [ 24.044808] ret_from_fork+0x41/0x80 [ 24.044964] ret_from_fork_asm+0x1a/0x30 [ 24.045133] [ 24.045223] The buggy address belongs to the object at ffff888102983600 [ 24.045223] which belongs to the cache kmalloc-64 of size 64 [ 24.046596] The buggy address is located 0 bytes to the right of [ 24.046596] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.047910] [ 24.048166] The buggy address belongs to the physical page: [ 24.048813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.049904] flags: 0x200000000000000(node=0|zone=2) [ 24.050461] page_type: f5(slab) [ 24.051028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.051987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.052747] page dumped because: kasan: bad access detected [ 24.053327] [ 24.053662] Memory state around the buggy address: [ 24.054495] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.055173] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.056049] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.056702] ^ [ 24.057142] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.057836] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.058780] ================================================================== [ 25.082855] ================================================================== [ 25.083514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 25.084168] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 25.084961] [ 25.085188] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 25.085317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.085359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.085420] Call Trace: [ 25.085516] <TASK> [ 25.085615] dump_stack_lvl+0x73/0xb0 [ 25.085732] print_report+0xd1/0x650 [ 25.085851] ? __virt_addr_valid+0x1db/0x2d0 [ 25.085963] ? kasan_atomics_helper+0x4fa5/0x5450 [ 25.086073] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.086189] ? kasan_atomics_helper+0x4fa5/0x5450 [ 25.086301] kasan_report+0x141/0x180 [ 25.086445] ? kasan_atomics_helper+0x4fa5/0x5450 [ 25.086560] __asan_report_load8_noabort+0x18/0x20 [ 25.086639] kasan_atomics_helper+0x4fa5/0x5450 [ 25.086722] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.086801] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.086878] ? kasan_atomics+0x152/0x310 [ 25.086958] kasan_atomics+0x1dc/0x310 [ 25.087028] ? __pfx_kasan_atomics+0x10/0x10 [ 25.087103] ? __pfx_read_tsc+0x10/0x10 [ 25.087165] ? ktime_get_ts64+0x86/0x230 [ 25.087249] kunit_try_run_case+0x1a5/0x480 [ 25.087327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.087399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.087497] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.087583] ? __kthread_parkme+0x82/0x180 [ 25.087657] ? preempt_count_sub+0x50/0x80 [ 25.087757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.087819] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.087855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.087891] kthread+0x337/0x6f0 [ 25.087929] ? trace_preempt_on+0x20/0xc0 [ 25.088000] ? __pfx_kthread+0x10/0x10 [ 25.088054] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.088127] ? calculate_sigpending+0x7b/0xa0 [ 25.088240] ? __pfx_kthread+0x10/0x10 [ 25.088330] ret_from_fork+0x41/0x80 [ 25.088461] ? __pfx_kthread+0x10/0x10 [ 25.088598] ret_from_fork_asm+0x1a/0x30 [ 25.088742] </TASK> [ 25.088786] [ 25.103871] Allocated by task 285: [ 25.104335] kasan_save_stack+0x45/0x70 [ 25.104847] kasan_save_track+0x18/0x40 [ 25.105292] kasan_save_alloc_info+0x3b/0x50 [ 25.105841] __kasan_kmalloc+0xb7/0xc0 [ 25.106258] __kmalloc_cache_noprof+0x189/0x420 [ 25.106828] kasan_atomics+0x95/0x310 [ 25.107279] kunit_try_run_case+0x1a5/0x480 [ 25.107635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.108065] kthread+0x337/0x6f0 [ 25.108540] ret_from_fork+0x41/0x80 [ 25.108989] ret_from_fork_asm+0x1a/0x30 [ 25.109492] [ 25.109747] The buggy address belongs to the object at ffff888102983600 [ 25.109747] which belongs to the cache kmalloc-64 of size 64 [ 25.110582] The buggy address is located 0 bytes to the right of [ 25.110582] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 25.112121] [ 25.112542] The buggy address belongs to the physical page: [ 25.113098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 25.113809] flags: 0x200000000000000(node=0|zone=2) [ 25.114171] page_type: f5(slab) [ 25.114635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.115788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.116424] page dumped because: kasan: bad access detected [ 25.116800] [ 25.117053] Memory state around the buggy address: [ 25.117558] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.118229] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.118695] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.119139] ^ [ 25.119553] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.120216] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.120870] ================================================================== [ 24.428192] ================================================================== [ 24.428734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 24.429408] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.430558] [ 24.431177] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.431297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.431330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.431363] Call Trace: [ 24.431389] <TASK> [ 24.431425] dump_stack_lvl+0x73/0xb0 [ 24.431504] print_report+0xd1/0x650 [ 24.431550] ? __virt_addr_valid+0x1db/0x2d0 [ 24.431587] ? kasan_atomics_helper+0x1a7f/0x5450 [ 24.431622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.431656] ? kasan_atomics_helper+0x1a7f/0x5450 [ 24.431690] kasan_report+0x141/0x180 [ 24.431726] ? kasan_atomics_helper+0x1a7f/0x5450 [ 24.431765] kasan_check_range+0x10c/0x1c0 [ 24.431803] __kasan_check_write+0x18/0x20 [ 24.431832] kasan_atomics_helper+0x1a7f/0x5450 [ 24.431866] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.431900] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.431933] ? kasan_atomics+0x152/0x310 [ 24.431966] kasan_atomics+0x1dc/0x310 [ 24.431993] ? __pfx_kasan_atomics+0x10/0x10 [ 24.432023] ? __pfx_read_tsc+0x10/0x10 [ 24.432051] ? ktime_get_ts64+0x86/0x230 [ 24.432089] kunit_try_run_case+0x1a5/0x480 [ 24.432124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.432158] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.432194] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.432229] ? __kthread_parkme+0x82/0x180 [ 24.432262] ? preempt_count_sub+0x50/0x80 [ 24.432298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.432332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.432366] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.432400] kthread+0x337/0x6f0 [ 24.432487] ? trace_preempt_on+0x20/0xc0 [ 24.432569] ? __pfx_kthread+0x10/0x10 [ 24.432651] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.432728] ? calculate_sigpending+0x7b/0xa0 [ 24.432807] ? __pfx_kthread+0x10/0x10 [ 24.432886] ret_from_fork+0x41/0x80 [ 24.432963] ? __pfx_kthread+0x10/0x10 [ 24.433043] ret_from_fork_asm+0x1a/0x30 [ 24.433150] </TASK> [ 24.433191] [ 24.451716] Allocated by task 285: [ 24.452190] kasan_save_stack+0x45/0x70 [ 24.452805] kasan_save_track+0x18/0x40 [ 24.453255] kasan_save_alloc_info+0x3b/0x50 [ 24.453871] __kasan_kmalloc+0xb7/0xc0 [ 24.454186] __kmalloc_cache_noprof+0x189/0x420 [ 24.454628] kasan_atomics+0x95/0x310 [ 24.455105] kunit_try_run_case+0x1a5/0x480 [ 24.455725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.456320] kthread+0x337/0x6f0 [ 24.456835] ret_from_fork+0x41/0x80 [ 24.457341] ret_from_fork_asm+0x1a/0x30 [ 24.457829] [ 24.458058] The buggy address belongs to the object at ffff888102983600 [ 24.458058] which belongs to the cache kmalloc-64 of size 64 [ 24.458793] The buggy address is located 0 bytes to the right of [ 24.458793] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.459693] [ 24.459936] The buggy address belongs to the physical page: [ 24.460444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.462879] flags: 0x200000000000000(node=0|zone=2) [ 24.463205] page_type: f5(slab) [ 24.464460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.466869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.468788] page dumped because: kasan: bad access detected [ 24.470553] [ 24.471578] Memory state around the buggy address: [ 24.472570] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.473085] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.473832] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.474647] ^ [ 24.475153] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.475700] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.476206] ================================================================== [ 24.478900] ================================================================== [ 24.479682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 24.480384] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.481011] [ 24.481279] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.481416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.481461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.481543] Call Trace: [ 24.481609] <TASK> [ 24.481639] dump_stack_lvl+0x73/0xb0 [ 24.481682] print_report+0xd1/0x650 [ 24.481724] ? __virt_addr_valid+0x1db/0x2d0 [ 24.481795] ? kasan_atomics_helper+0x1b22/0x5450 [ 24.481830] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.481867] ? kasan_atomics_helper+0x1b22/0x5450 [ 24.481902] kasan_report+0x141/0x180 [ 24.481936] ? kasan_atomics_helper+0x1b22/0x5450 [ 24.481976] kasan_check_range+0x10c/0x1c0 [ 24.482013] __kasan_check_write+0x18/0x20 [ 24.482043] kasan_atomics_helper+0x1b22/0x5450 [ 24.482078] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.482112] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.482144] ? kasan_atomics+0x152/0x310 [ 24.482177] kasan_atomics+0x1dc/0x310 [ 24.482204] ? __pfx_kasan_atomics+0x10/0x10 [ 24.482233] ? __pfx_read_tsc+0x10/0x10 [ 24.482263] ? ktime_get_ts64+0x86/0x230 [ 24.482301] kunit_try_run_case+0x1a5/0x480 [ 24.482336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.482368] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.482412] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.482550] ? __kthread_parkme+0x82/0x180 [ 24.482632] ? preempt_count_sub+0x50/0x80 [ 24.482715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.482793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.482868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.482946] kthread+0x337/0x6f0 [ 24.483023] ? trace_preempt_on+0x20/0xc0 [ 24.483066] ? __pfx_kthread+0x10/0x10 [ 24.483101] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.483136] ? calculate_sigpending+0x7b/0xa0 [ 24.483169] ? __pfx_kthread+0x10/0x10 [ 24.483205] ret_from_fork+0x41/0x80 [ 24.483236] ? __pfx_kthread+0x10/0x10 [ 24.483271] ret_from_fork_asm+0x1a/0x30 [ 24.483316] </TASK> [ 24.483332] [ 24.499045] Allocated by task 285: [ 24.499386] kasan_save_stack+0x45/0x70 [ 24.499897] kasan_save_track+0x18/0x40 [ 24.500310] kasan_save_alloc_info+0x3b/0x50 [ 24.500819] __kasan_kmalloc+0xb7/0xc0 [ 24.501241] __kmalloc_cache_noprof+0x189/0x420 [ 24.501692] kasan_atomics+0x95/0x310 [ 24.502005] kunit_try_run_case+0x1a5/0x480 [ 24.502372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.502950] kthread+0x337/0x6f0 [ 24.503328] ret_from_fork+0x41/0x80 [ 24.503789] ret_from_fork_asm+0x1a/0x30 [ 24.504237] [ 24.504551] The buggy address belongs to the object at ffff888102983600 [ 24.504551] which belongs to the cache kmalloc-64 of size 64 [ 24.505595] The buggy address is located 0 bytes to the right of [ 24.505595] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.506398] [ 24.506659] The buggy address belongs to the physical page: [ 24.507075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.507872] flags: 0x200000000000000(node=0|zone=2) [ 24.508382] page_type: f5(slab) [ 24.508804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.509505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.509987] page dumped because: kasan: bad access detected [ 24.510546] [ 24.510785] Memory state around the buggy address: [ 24.511242] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.511939] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.512643] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.513168] ^ [ 24.513608] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.514221] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.514888] ================================================================== [ 24.556153] ================================================================== [ 24.556833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 24.557416] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.559086] [ 24.559382] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.559709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.559754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.559818] Call Trace: [ 24.559875] <TASK> [ 24.559929] dump_stack_lvl+0x73/0xb0 [ 24.560031] print_report+0xd1/0x650 [ 24.560111] ? __virt_addr_valid+0x1db/0x2d0 [ 24.560190] ? kasan_atomics_helper+0x4f30/0x5450 [ 24.560263] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.560311] ? kasan_atomics_helper+0x4f30/0x5450 [ 24.560344] kasan_report+0x141/0x180 [ 24.560378] ? kasan_atomics_helper+0x4f30/0x5450 [ 24.560449] __asan_report_load8_noabort+0x18/0x20 [ 24.560521] kasan_atomics_helper+0x4f30/0x5450 [ 24.560560] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.560593] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.560627] ? kasan_atomics+0x152/0x310 [ 24.560658] kasan_atomics+0x1dc/0x310 [ 24.560684] ? __pfx_kasan_atomics+0x10/0x10 [ 24.560714] ? __pfx_read_tsc+0x10/0x10 [ 24.560743] ? ktime_get_ts64+0x86/0x230 [ 24.560780] kunit_try_run_case+0x1a5/0x480 [ 24.560816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.560847] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.560881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.560916] ? __kthread_parkme+0x82/0x180 [ 24.560947] ? preempt_count_sub+0x50/0x80 [ 24.560982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.561015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.561047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.561080] kthread+0x337/0x6f0 [ 24.561111] ? trace_preempt_on+0x20/0xc0 [ 24.561144] ? __pfx_kthread+0x10/0x10 [ 24.561175] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.561207] ? calculate_sigpending+0x7b/0xa0 [ 24.561237] ? __pfx_kthread+0x10/0x10 [ 24.561269] ret_from_fork+0x41/0x80 [ 24.561300] ? __pfx_kthread+0x10/0x10 [ 24.561332] ret_from_fork_asm+0x1a/0x30 [ 24.561377] </TASK> [ 24.561392] [ 24.575062] Allocated by task 285: [ 24.575527] kasan_save_stack+0x45/0x70 [ 24.575987] kasan_save_track+0x18/0x40 [ 24.576412] kasan_save_alloc_info+0x3b/0x50 [ 24.576879] __kasan_kmalloc+0xb7/0xc0 [ 24.577309] __kmalloc_cache_noprof+0x189/0x420 [ 24.578136] kasan_atomics+0x95/0x310 [ 24.578596] kunit_try_run_case+0x1a5/0x480 [ 24.579038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.579622] kthread+0x337/0x6f0 [ 24.579999] ret_from_fork+0x41/0x80 [ 24.580378] ret_from_fork_asm+0x1a/0x30 [ 24.580729] [ 24.580921] The buggy address belongs to the object at ffff888102983600 [ 24.580921] which belongs to the cache kmalloc-64 of size 64 [ 24.583141] The buggy address is located 0 bytes to the right of [ 24.583141] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.585029] [ 24.585132] The buggy address belongs to the physical page: [ 24.585325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.586697] flags: 0x200000000000000(node=0|zone=2) [ 24.587751] page_type: f5(slab) [ 24.588327] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.588981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.589674] page dumped because: kasan: bad access detected [ 24.590061] [ 24.590359] Memory state around the buggy address: [ 24.590873] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.591592] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.592323] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.592991] ^ [ 24.593450] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.594083] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.594866] ================================================================== [ 24.596160] ================================================================== [ 24.596772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 24.597370] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.597963] [ 24.598187] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.598315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.598359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.598459] Call Trace: [ 24.598581] <TASK> [ 24.598647] dump_stack_lvl+0x73/0xb0 [ 24.598785] print_report+0xd1/0x650 [ 24.598914] ? __virt_addr_valid+0x1db/0x2d0 [ 24.599028] ? kasan_atomics_helper+0x1ce1/0x5450 [ 24.599105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.599186] ? kasan_atomics_helper+0x1ce1/0x5450 [ 24.599321] kasan_report+0x141/0x180 [ 24.599461] ? kasan_atomics_helper+0x1ce1/0x5450 [ 24.599577] kasan_check_range+0x10c/0x1c0 [ 24.599661] __kasan_check_write+0x18/0x20 [ 24.599734] kasan_atomics_helper+0x1ce1/0x5450 [ 24.599818] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.599895] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.599976] ? kasan_atomics+0x152/0x310 [ 24.600104] kasan_atomics+0x1dc/0x310 [ 24.600186] ? __pfx_kasan_atomics+0x10/0x10 [ 24.600265] ? __pfx_read_tsc+0x10/0x10 [ 24.600314] ? ktime_get_ts64+0x86/0x230 [ 24.600359] kunit_try_run_case+0x1a5/0x480 [ 24.600397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.600504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.600549] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.600588] ? __kthread_parkme+0x82/0x180 [ 24.600622] ? preempt_count_sub+0x50/0x80 [ 24.600659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.600694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.600728] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.600762] kthread+0x337/0x6f0 [ 24.600793] ? trace_preempt_on+0x20/0xc0 [ 24.600827] ? __pfx_kthread+0x10/0x10 [ 24.600861] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.600896] ? calculate_sigpending+0x7b/0xa0 [ 24.600927] ? __pfx_kthread+0x10/0x10 [ 24.600961] ret_from_fork+0x41/0x80 [ 24.600991] ? __pfx_kthread+0x10/0x10 [ 24.601025] ret_from_fork_asm+0x1a/0x30 [ 24.601070] </TASK> [ 24.601085] [ 24.619755] Allocated by task 285: [ 24.620105] kasan_save_stack+0x45/0x70 [ 24.620649] kasan_save_track+0x18/0x40 [ 24.621134] kasan_save_alloc_info+0x3b/0x50 [ 24.621658] __kasan_kmalloc+0xb7/0xc0 [ 24.622066] __kmalloc_cache_noprof+0x189/0x420 [ 24.622571] kasan_atomics+0x95/0x310 [ 24.622976] kunit_try_run_case+0x1a5/0x480 [ 24.623532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.624059] kthread+0x337/0x6f0 [ 24.624554] ret_from_fork+0x41/0x80 [ 24.625012] ret_from_fork_asm+0x1a/0x30 [ 24.625586] [ 24.625805] The buggy address belongs to the object at ffff888102983600 [ 24.625805] which belongs to the cache kmalloc-64 of size 64 [ 24.626864] The buggy address is located 0 bytes to the right of [ 24.626864] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.627848] [ 24.628139] The buggy address belongs to the physical page: [ 24.628709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.629378] flags: 0x200000000000000(node=0|zone=2) [ 24.629809] page_type: f5(slab) [ 24.630108] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.630906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.631638] page dumped because: kasan: bad access detected [ 24.632176] [ 24.632468] Memory state around the buggy address: [ 24.632914] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.633686] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.634340] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.634997] ^ [ 24.635519] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.636127] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.636802] ================================================================== [ 22.156529] ================================================================== [ 22.157603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 22.158205] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.159644] [ 22.160228] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.160333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.160350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.160384] Call Trace: [ 22.160401] <TASK> [ 22.160456] dump_stack_lvl+0x73/0xb0 [ 22.160582] print_report+0xd1/0x650 [ 22.160667] ? __virt_addr_valid+0x1db/0x2d0 [ 22.160704] ? kasan_atomics_helper+0x4bbc/0x5450 [ 22.160736] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.160772] ? kasan_atomics_helper+0x4bbc/0x5450 [ 22.160803] kasan_report+0x141/0x180 [ 22.160835] ? kasan_atomics_helper+0x4bbc/0x5450 [ 22.160872] __asan_report_load4_noabort+0x18/0x20 [ 22.160900] kasan_atomics_helper+0x4bbc/0x5450 [ 22.160932] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.160963] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.160995] ? kasan_atomics+0x152/0x310 [ 22.161028] kasan_atomics+0x1dc/0x310 [ 22.161053] ? __pfx_kasan_atomics+0x10/0x10 [ 22.161081] ? __pfx_read_tsc+0x10/0x10 [ 22.161109] ? ktime_get_ts64+0x86/0x230 [ 22.161146] kunit_try_run_case+0x1a5/0x480 [ 22.161180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.161211] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.161244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.161278] ? __kthread_parkme+0x82/0x180 [ 22.161308] ? preempt_count_sub+0x50/0x80 [ 22.161343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.161375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.161406] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.161465] kthread+0x337/0x6f0 [ 22.161560] ? trace_preempt_on+0x20/0xc0 [ 22.161624] ? __pfx_kthread+0x10/0x10 [ 22.161657] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.161688] ? calculate_sigpending+0x7b/0xa0 [ 22.161718] ? __pfx_kthread+0x10/0x10 [ 22.161750] ret_from_fork+0x41/0x80 [ 22.161778] ? __pfx_kthread+0x10/0x10 [ 22.161809] ret_from_fork_asm+0x1a/0x30 [ 22.161853] </TASK> [ 22.161867] [ 22.181480] Allocated by task 285: [ 22.182306] kasan_save_stack+0x45/0x70 [ 22.182941] kasan_save_track+0x18/0x40 [ 22.183430] kasan_save_alloc_info+0x3b/0x50 [ 22.183965] __kasan_kmalloc+0xb7/0xc0 [ 22.184272] __kmalloc_cache_noprof+0x189/0x420 [ 22.184876] kasan_atomics+0x95/0x310 [ 22.185816] kunit_try_run_case+0x1a5/0x480 [ 22.186249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.187036] kthread+0x337/0x6f0 [ 22.187841] ret_from_fork+0x41/0x80 [ 22.188172] ret_from_fork_asm+0x1a/0x30 [ 22.188854] [ 22.189332] The buggy address belongs to the object at ffff888102983600 [ 22.189332] which belongs to the cache kmalloc-64 of size 64 [ 22.191101] The buggy address is located 0 bytes to the right of [ 22.191101] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.192903] [ 22.193146] The buggy address belongs to the physical page: [ 22.194133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.195218] flags: 0x200000000000000(node=0|zone=2) [ 22.195600] page_type: f5(slab) [ 22.196262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.197066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.197931] page dumped because: kasan: bad access detected [ 22.198956] [ 22.199342] Memory state around the buggy address: [ 22.199918] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.201042] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.201945] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.202766] ^ [ 22.203850] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.204373] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.205366] ================================================================== [ 23.691496] ================================================================== [ 23.692860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 23.693708] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.694234] [ 23.694431] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.694640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.694683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.694743] Call Trace: [ 23.694797] <TASK> [ 23.694853] dump_stack_lvl+0x73/0xb0 [ 23.694940] print_report+0xd1/0x650 [ 23.695019] ? __virt_addr_valid+0x1db/0x2d0 [ 23.695100] ? kasan_atomics_helper+0x49e8/0x5450 [ 23.695172] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.695248] ? kasan_atomics_helper+0x49e8/0x5450 [ 23.695325] kasan_report+0x141/0x180 [ 23.695404] ? kasan_atomics_helper+0x49e8/0x5450 [ 23.695535] __asan_report_load4_noabort+0x18/0x20 [ 23.695612] kasan_atomics_helper+0x49e8/0x5450 [ 23.695700] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.695779] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.695856] ? kasan_atomics+0x152/0x310 [ 23.695967] kasan_atomics+0x1dc/0x310 [ 23.696026] ? __pfx_kasan_atomics+0x10/0x10 [ 23.696061] ? __pfx_read_tsc+0x10/0x10 [ 23.696092] ? ktime_get_ts64+0x86/0x230 [ 23.696131] kunit_try_run_case+0x1a5/0x480 [ 23.696167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.696198] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.696234] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.696268] ? __kthread_parkme+0x82/0x180 [ 23.696300] ? preempt_count_sub+0x50/0x80 [ 23.696336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.696369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.696402] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.696464] kthread+0x337/0x6f0 [ 23.696528] ? trace_preempt_on+0x20/0xc0 [ 23.696565] ? __pfx_kthread+0x10/0x10 [ 23.696597] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.696629] ? calculate_sigpending+0x7b/0xa0 [ 23.696660] ? __pfx_kthread+0x10/0x10 [ 23.696692] ret_from_fork+0x41/0x80 [ 23.696723] ? __pfx_kthread+0x10/0x10 [ 23.696756] ret_from_fork_asm+0x1a/0x30 [ 23.696803] </TASK> [ 23.696818] [ 23.711134] Allocated by task 285: [ 23.711554] kasan_save_stack+0x45/0x70 [ 23.712040] kasan_save_track+0x18/0x40 [ 23.712452] kasan_save_alloc_info+0x3b/0x50 [ 23.712812] __kasan_kmalloc+0xb7/0xc0 [ 23.713125] __kmalloc_cache_noprof+0x189/0x420 [ 23.713702] kasan_atomics+0x95/0x310 [ 23.714296] kunit_try_run_case+0x1a5/0x480 [ 23.714847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.715246] kthread+0x337/0x6f0 [ 23.715667] ret_from_fork+0x41/0x80 [ 23.716046] ret_from_fork_asm+0x1a/0x30 [ 23.716514] [ 23.716742] The buggy address belongs to the object at ffff888102983600 [ 23.716742] which belongs to the cache kmalloc-64 of size 64 [ 23.720351] The buggy address is located 0 bytes to the right of [ 23.720351] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.721332] [ 23.721659] The buggy address belongs to the physical page: [ 23.722153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.722854] flags: 0x200000000000000(node=0|zone=2) [ 23.723311] page_type: f5(slab) [ 23.723865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.724386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.725116] page dumped because: kasan: bad access detected [ 23.725634] [ 23.725845] Memory state around the buggy address: [ 23.726287] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.727910] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.728431] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.729107] ^ [ 23.729584] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.730142] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.730795] ================================================================== [ 23.966797] ================================================================== [ 23.967385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 23.968199] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.969335] [ 23.969683] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.969907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.969965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.970004] Call Trace: [ 23.970037] <TASK> [ 23.970066] dump_stack_lvl+0x73/0xb0 [ 23.970140] print_report+0xd1/0x650 [ 23.970193] ? __virt_addr_valid+0x1db/0x2d0 [ 23.970228] ? kasan_atomics_helper+0x50d4/0x5450 [ 23.970262] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.970296] ? kasan_atomics_helper+0x50d4/0x5450 [ 23.970328] kasan_report+0x141/0x180 [ 23.970363] ? kasan_atomics_helper+0x50d4/0x5450 [ 23.970403] __asan_report_store8_noabort+0x1b/0x30 [ 23.970767] kasan_atomics_helper+0x50d4/0x5450 [ 23.970810] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.970846] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.970882] ? kasan_atomics+0x152/0x310 [ 23.970915] kasan_atomics+0x1dc/0x310 [ 23.970942] ? __pfx_kasan_atomics+0x10/0x10 [ 23.970971] ? __pfx_read_tsc+0x10/0x10 [ 23.970998] ? ktime_get_ts64+0x86/0x230 [ 23.971035] kunit_try_run_case+0x1a5/0x480 [ 23.971069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.971100] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.971136] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.971171] ? __kthread_parkme+0x82/0x180 [ 23.971202] ? preempt_count_sub+0x50/0x80 [ 23.971239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.971273] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.971307] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.971341] kthread+0x337/0x6f0 [ 23.971370] ? trace_preempt_on+0x20/0xc0 [ 23.971420] ? __pfx_kthread+0x10/0x10 [ 23.971517] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.971555] ? calculate_sigpending+0x7b/0xa0 [ 23.971588] ? __pfx_kthread+0x10/0x10 [ 23.971621] ret_from_fork+0x41/0x80 [ 23.971652] ? __pfx_kthread+0x10/0x10 [ 23.971685] ret_from_fork_asm+0x1a/0x30 [ 23.971732] </TASK> [ 23.971748] [ 23.992597] Allocated by task 285: [ 23.992977] kasan_save_stack+0x45/0x70 [ 23.994021] kasan_save_track+0x18/0x40 [ 23.994576] kasan_save_alloc_info+0x3b/0x50 [ 23.994761] __kasan_kmalloc+0xb7/0xc0 [ 23.994917] __kmalloc_cache_noprof+0x189/0x420 [ 23.995091] kasan_atomics+0x95/0x310 [ 23.995240] kunit_try_run_case+0x1a5/0x480 [ 23.995407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.996287] kthread+0x337/0x6f0 [ 23.996935] ret_from_fork+0x41/0x80 [ 23.997648] ret_from_fork_asm+0x1a/0x30 [ 23.998151] [ 23.998375] The buggy address belongs to the object at ffff888102983600 [ 23.998375] which belongs to the cache kmalloc-64 of size 64 [ 23.999713] The buggy address is located 0 bytes to the right of [ 23.999713] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.001067] [ 24.001237] The buggy address belongs to the physical page: [ 24.001843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.003084] flags: 0x200000000000000(node=0|zone=2) [ 24.003422] page_type: f5(slab) [ 24.003832] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.004443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.005402] page dumped because: kasan: bad access detected [ 24.006086] [ 24.006316] Memory state around the buggy address: [ 24.007097] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.007857] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.009087] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.009927] ^ [ 24.010355] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.011119] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.011842] ================================================================== [ 23.094292] ================================================================== [ 23.095059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 23.095734] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.096365] [ 23.097711] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.097843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.097883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.097943] Call Trace: [ 23.097996] <TASK> [ 23.098045] dump_stack_lvl+0x73/0xb0 [ 23.098124] print_report+0xd1/0x650 [ 23.098202] ? __virt_addr_valid+0x1db/0x2d0 [ 23.098276] ? kasan_atomics_helper+0xc70/0x5450 [ 23.098349] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.098424] ? kasan_atomics_helper+0xc70/0x5450 [ 23.099010] kasan_report+0x141/0x180 [ 23.099101] ? kasan_atomics_helper+0xc70/0x5450 [ 23.099210] kasan_check_range+0x10c/0x1c0 [ 23.099294] __kasan_check_write+0x18/0x20 [ 23.099365] kasan_atomics_helper+0xc70/0x5450 [ 23.099423] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.099558] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.099596] ? kasan_atomics+0x152/0x310 [ 23.099630] kasan_atomics+0x1dc/0x310 [ 23.099658] ? __pfx_kasan_atomics+0x10/0x10 [ 23.099687] ? __pfx_read_tsc+0x10/0x10 [ 23.099715] ? ktime_get_ts64+0x86/0x230 [ 23.099751] kunit_try_run_case+0x1a5/0x480 [ 23.099787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.099820] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.099855] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.099889] ? __kthread_parkme+0x82/0x180 [ 23.099920] ? preempt_count_sub+0x50/0x80 [ 23.099954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.099987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.100019] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.100051] kthread+0x337/0x6f0 [ 23.100080] ? trace_preempt_on+0x20/0xc0 [ 23.100114] ? __pfx_kthread+0x10/0x10 [ 23.100145] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.100176] ? calculate_sigpending+0x7b/0xa0 [ 23.100207] ? __pfx_kthread+0x10/0x10 [ 23.100239] ret_from_fork+0x41/0x80 [ 23.100268] ? __pfx_kthread+0x10/0x10 [ 23.100300] ret_from_fork_asm+0x1a/0x30 [ 23.100343] </TASK> [ 23.100358] [ 23.118817] Allocated by task 285: [ 23.119239] kasan_save_stack+0x45/0x70 [ 23.119801] kasan_save_track+0x18/0x40 [ 23.120210] kasan_save_alloc_info+0x3b/0x50 [ 23.120717] __kasan_kmalloc+0xb7/0xc0 [ 23.121178] __kmalloc_cache_noprof+0x189/0x420 [ 23.121639] kasan_atomics+0x95/0x310 [ 23.122095] kunit_try_run_case+0x1a5/0x480 [ 23.122599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.122983] kthread+0x337/0x6f0 [ 23.123276] ret_from_fork+0x41/0x80 [ 23.123772] ret_from_fork_asm+0x1a/0x30 [ 23.124199] [ 23.124510] The buggy address belongs to the object at ffff888102983600 [ 23.124510] which belongs to the cache kmalloc-64 of size 64 [ 23.125594] The buggy address is located 0 bytes to the right of [ 23.125594] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.126289] [ 23.127173] The buggy address belongs to the physical page: [ 23.127737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.129831] flags: 0x200000000000000(node=0|zone=2) [ 23.130935] page_type: f5(slab) [ 23.132366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.133973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.134923] page dumped because: kasan: bad access detected [ 23.135263] [ 23.136504] Memory state around the buggy address: [ 23.137583] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.139256] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.140691] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.141270] ^ [ 23.142036] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.142723] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.143532] ================================================================== [ 22.546984] ================================================================== [ 22.547772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 22.548287] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.549073] [ 22.549397] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.549561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.549622] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.549823] Call Trace: [ 22.549880] <TASK> [ 22.549930] dump_stack_lvl+0x73/0xb0 [ 22.550012] print_report+0xd1/0x650 [ 22.550090] ? __virt_addr_valid+0x1db/0x2d0 [ 22.550165] ? kasan_atomics_helper+0x565/0x5450 [ 22.550240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.550361] ? kasan_atomics_helper+0x565/0x5450 [ 22.550449] kasan_report+0x141/0x180 [ 22.550551] ? kasan_atomics_helper+0x565/0x5450 [ 22.550732] kasan_check_range+0x10c/0x1c0 [ 22.550819] __kasan_check_write+0x18/0x20 [ 22.550890] kasan_atomics_helper+0x565/0x5450 [ 22.550980] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.551040] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.551076] ? kasan_atomics+0x152/0x310 [ 22.551108] kasan_atomics+0x1dc/0x310 [ 22.551136] ? __pfx_kasan_atomics+0x10/0x10 [ 22.551165] ? __pfx_read_tsc+0x10/0x10 [ 22.551194] ? ktime_get_ts64+0x86/0x230 [ 22.551229] kunit_try_run_case+0x1a5/0x480 [ 22.551264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.551294] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.551328] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.551367] ? __kthread_parkme+0x82/0x180 [ 22.551399] ? preempt_count_sub+0x50/0x80 [ 22.551477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.551583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.551624] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.551658] kthread+0x337/0x6f0 [ 22.551689] ? trace_preempt_on+0x20/0xc0 [ 22.551723] ? __pfx_kthread+0x10/0x10 [ 22.551755] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.551787] ? calculate_sigpending+0x7b/0xa0 [ 22.551818] ? __pfx_kthread+0x10/0x10 [ 22.551849] ret_from_fork+0x41/0x80 [ 22.551880] ? __pfx_kthread+0x10/0x10 [ 22.551912] ret_from_fork_asm+0x1a/0x30 [ 22.551954] </TASK> [ 22.551968] [ 22.574154] Allocated by task 285: [ 22.574520] kasan_save_stack+0x45/0x70 [ 22.575622] kasan_save_track+0x18/0x40 [ 22.576005] kasan_save_alloc_info+0x3b/0x50 [ 22.576753] __kasan_kmalloc+0xb7/0xc0 [ 22.577130] __kmalloc_cache_noprof+0x189/0x420 [ 22.577923] kasan_atomics+0x95/0x310 [ 22.578601] kunit_try_run_case+0x1a5/0x480 [ 22.579003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.580088] kthread+0x337/0x6f0 [ 22.580735] ret_from_fork+0x41/0x80 [ 22.581386] ret_from_fork_asm+0x1a/0x30 [ 22.582053] [ 22.582302] The buggy address belongs to the object at ffff888102983600 [ 22.582302] which belongs to the cache kmalloc-64 of size 64 [ 22.583922] The buggy address is located 0 bytes to the right of [ 22.583922] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.585594] [ 22.586247] The buggy address belongs to the physical page: [ 22.586909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.587472] flags: 0x200000000000000(node=0|zone=2) [ 22.588403] page_type: f5(slab) [ 22.588913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.589477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.591017] page dumped because: kasan: bad access detected [ 22.591674] [ 22.591840] Memory state around the buggy address: [ 22.592284] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.592946] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.593551] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.595365] ^ [ 22.595763] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.596297] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.597797] ================================================================== [ 22.812113] ================================================================== [ 22.813876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 22.814418] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.815230] [ 22.815821] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.816222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.816243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.816277] Call Trace: [ 22.816301] <TASK> [ 22.816327] dump_stack_lvl+0x73/0xb0 [ 22.816367] print_report+0xd1/0x650 [ 22.816401] ? __virt_addr_valid+0x1db/0x2d0 [ 22.816544] ? kasan_atomics_helper+0x860/0x5450 [ 22.816612] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.816649] ? kasan_atomics_helper+0x860/0x5450 [ 22.816681] kasan_report+0x141/0x180 [ 22.816715] ? kasan_atomics_helper+0x860/0x5450 [ 22.816753] kasan_check_range+0x10c/0x1c0 [ 22.816789] __kasan_check_write+0x18/0x20 [ 22.816818] kasan_atomics_helper+0x860/0x5450 [ 22.816851] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.816883] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.816917] ? kasan_atomics+0x152/0x310 [ 22.816948] kasan_atomics+0x1dc/0x310 [ 22.816975] ? __pfx_kasan_atomics+0x10/0x10 [ 22.817003] ? __pfx_read_tsc+0x10/0x10 [ 22.817032] ? ktime_get_ts64+0x86/0x230 [ 22.817068] kunit_try_run_case+0x1a5/0x480 [ 22.817103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.817133] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.817167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.817201] ? __kthread_parkme+0x82/0x180 [ 22.817231] ? preempt_count_sub+0x50/0x80 [ 22.817266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.817299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.817332] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.817366] kthread+0x337/0x6f0 [ 22.817396] ? trace_preempt_on+0x20/0xc0 [ 22.817777] ? __pfx_kthread+0x10/0x10 [ 22.817827] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.817862] ? calculate_sigpending+0x7b/0xa0 [ 22.817894] ? __pfx_kthread+0x10/0x10 [ 22.817927] ret_from_fork+0x41/0x80 [ 22.817957] ? __pfx_kthread+0x10/0x10 [ 22.817991] ret_from_fork_asm+0x1a/0x30 [ 22.818037] </TASK> [ 22.818052] [ 22.841534] Allocated by task 285: [ 22.842253] kasan_save_stack+0x45/0x70 [ 22.842914] kasan_save_track+0x18/0x40 [ 22.843464] kasan_save_alloc_info+0x3b/0x50 [ 22.844358] __kasan_kmalloc+0xb7/0xc0 [ 22.845184] __kmalloc_cache_noprof+0x189/0x420 [ 22.845993] kasan_atomics+0x95/0x310 [ 22.846310] kunit_try_run_case+0x1a5/0x480 [ 22.846802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.847765] kthread+0x337/0x6f0 [ 22.848054] ret_from_fork+0x41/0x80 [ 22.848353] ret_from_fork_asm+0x1a/0x30 [ 22.848768] [ 22.849018] The buggy address belongs to the object at ffff888102983600 [ 22.849018] which belongs to the cache kmalloc-64 of size 64 [ 22.851266] The buggy address is located 0 bytes to the right of [ 22.851266] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 22.852329] [ 22.853411] The buggy address belongs to the physical page: [ 22.853961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 22.854937] flags: 0x200000000000000(node=0|zone=2) [ 22.855336] page_type: f5(slab) [ 22.855801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.857208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.858128] page dumped because: kasan: bad access detected [ 22.858871] [ 22.859052] Memory state around the buggy address: [ 22.859407] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.860038] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.861088] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.862244] ^ [ 22.863405] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.863809] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.864188] ================================================================== [ 25.170849] ================================================================== [ 25.171493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 25.172083] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 25.172612] [ 25.172847] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 25.172960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.172994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.173042] Call Trace: [ 25.173093] <TASK> [ 25.173139] dump_stack_lvl+0x73/0xb0 [ 25.173204] print_report+0xd1/0x650 [ 25.173264] ? __virt_addr_valid+0x1db/0x2d0 [ 25.173325] ? kasan_atomics_helper+0x5115/0x5450 [ 25.173407] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.173500] ? kasan_atomics_helper+0x5115/0x5450 [ 25.173600] kasan_report+0x141/0x180 [ 25.173681] ? kasan_atomics_helper+0x5115/0x5450 [ 25.173773] __asan_report_load8_noabort+0x18/0x20 [ 25.173848] kasan_atomics_helper+0x5115/0x5450 [ 25.173927] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.174004] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.174085] ? kasan_atomics+0x152/0x310 [ 25.174172] kasan_atomics+0x1dc/0x310 [ 25.174247] ? __pfx_kasan_atomics+0x10/0x10 [ 25.174326] ? __pfx_read_tsc+0x10/0x10 [ 25.174396] ? ktime_get_ts64+0x86/0x230 [ 25.174531] kunit_try_run_case+0x1a5/0x480 [ 25.174616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.174693] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.174775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.174862] ? __kthread_parkme+0x82/0x180 [ 25.174943] ? preempt_count_sub+0x50/0x80 [ 25.175011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.175049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.175083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.175117] kthread+0x337/0x6f0 [ 25.175184] ? trace_preempt_on+0x20/0xc0 [ 25.175266] ? __pfx_kthread+0x10/0x10 [ 25.175347] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.175441] ? calculate_sigpending+0x7b/0xa0 [ 25.175543] ? __pfx_kthread+0x10/0x10 [ 25.175626] ret_from_fork+0x41/0x80 [ 25.175699] ? __pfx_kthread+0x10/0x10 [ 25.175774] ret_from_fork_asm+0x1a/0x30 [ 25.175878] </TASK> [ 25.175919] [ 25.190381] Allocated by task 285: [ 25.190852] kasan_save_stack+0x45/0x70 [ 25.191316] kasan_save_track+0x18/0x40 [ 25.191995] kasan_save_alloc_info+0x3b/0x50 [ 25.192386] __kasan_kmalloc+0xb7/0xc0 [ 25.192802] __kmalloc_cache_noprof+0x189/0x420 [ 25.193240] kasan_atomics+0x95/0x310 [ 25.193631] kunit_try_run_case+0x1a5/0x480 [ 25.194256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.194726] kthread+0x337/0x6f0 [ 25.195125] ret_from_fork+0x41/0x80 [ 25.195432] ret_from_fork_asm+0x1a/0x30 [ 25.195885] [ 25.196125] The buggy address belongs to the object at ffff888102983600 [ 25.196125] which belongs to the cache kmalloc-64 of size 64 [ 25.196845] The buggy address is located 0 bytes to the right of [ 25.196845] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 25.197938] [ 25.198139] The buggy address belongs to the physical page: [ 25.198559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 25.199272] flags: 0x200000000000000(node=0|zone=2) [ 25.199866] page_type: f5(slab) [ 25.200287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.201327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.201966] page dumped because: kasan: bad access detected [ 25.202471] [ 25.202722] Memory state around the buggy address: [ 25.203091] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.203714] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.204162] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.204711] ^ [ 25.205309] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.205997] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.206438] ================================================================== [ 24.989747] ================================================================== [ 24.990868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 24.991308] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.991748] [ 24.991952] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.992075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.992112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.992167] Call Trace: [ 24.992218] <TASK> [ 24.992270] dump_stack_lvl+0x73/0xb0 [ 24.992348] print_report+0xd1/0x650 [ 24.992422] ? __virt_addr_valid+0x1db/0x2d0 [ 24.993035] ? kasan_atomics_helper+0x4fb2/0x5450 [ 24.993541] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.993632] ? kasan_atomics_helper+0x4fb2/0x5450 [ 24.993704] kasan_report+0x141/0x180 [ 24.993777] ? kasan_atomics_helper+0x4fb2/0x5450 [ 24.993853] __asan_report_load8_noabort+0x18/0x20 [ 24.993920] kasan_atomics_helper+0x4fb2/0x5450 [ 24.994000] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.994072] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.994139] ? kasan_atomics+0x152/0x310 [ 24.994207] kasan_atomics+0x1dc/0x310 [ 24.994260] ? __pfx_kasan_atomics+0x10/0x10 [ 24.994311] ? __pfx_read_tsc+0x10/0x10 [ 24.994360] ? ktime_get_ts64+0x86/0x230 [ 24.994466] kunit_try_run_case+0x1a5/0x480 [ 24.994549] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.994602] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.994660] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.994718] ? __kthread_parkme+0x82/0x180 [ 24.994771] ? preempt_count_sub+0x50/0x80 [ 24.994832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.994887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.994943] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.994999] kthread+0x337/0x6f0 [ 24.995051] ? trace_preempt_on+0x20/0xc0 [ 24.995108] ? __pfx_kthread+0x10/0x10 [ 24.995160] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.995213] ? calculate_sigpending+0x7b/0xa0 [ 24.995272] ? __pfx_kthread+0x10/0x10 [ 24.995341] ret_from_fork+0x41/0x80 [ 24.995448] ? __pfx_kthread+0x10/0x10 [ 24.995551] ret_from_fork_asm+0x1a/0x30 [ 24.995654] </TASK> [ 24.995693] [ 25.020508] Allocated by task 285: [ 25.021288] kasan_save_stack+0x45/0x70 [ 25.021785] kasan_save_track+0x18/0x40 [ 25.022129] kasan_save_alloc_info+0x3b/0x50 [ 25.022556] __kasan_kmalloc+0xb7/0xc0 [ 25.022942] __kmalloc_cache_noprof+0x189/0x420 [ 25.023337] kasan_atomics+0x95/0x310 [ 25.024180] kunit_try_run_case+0x1a5/0x480 [ 25.025370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.025978] kthread+0x337/0x6f0 [ 25.026268] ret_from_fork+0x41/0x80 [ 25.026643] ret_from_fork_asm+0x1a/0x30 [ 25.027679] [ 25.027970] The buggy address belongs to the object at ffff888102983600 [ 25.027970] which belongs to the cache kmalloc-64 of size 64 [ 25.029223] The buggy address is located 0 bytes to the right of [ 25.029223] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 25.030218] [ 25.030788] The buggy address belongs to the physical page: [ 25.031252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 25.032035] flags: 0x200000000000000(node=0|zone=2) [ 25.033017] page_type: f5(slab) [ 25.033329] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.034085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.034337] page dumped because: kasan: bad access detected [ 25.035144] [ 25.035307] Memory state around the buggy address: [ 25.036145] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.037120] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.037668] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.038249] ^ [ 25.038749] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.039748] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.040298] ================================================================== [ 22.967994] ================================================================== [ 22.969465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 22.969811] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285 [ 22.970057] [ 22.970166] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.970232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.970252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.970283] Call Trace: [ 22.970308] <TASK> [ 22.970332] dump_stack_lvl+0x73/0xb0 [ 22.970371] print_report+0xd1/0x650 [ 22.970404] ? __virt_addr_valid+0x1db/0x2d0 [ 22.970474] ? kasan_atomics_helper+0xa2b/0x5450 [ 22.970664] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.970749] ? kasan_atomics_helper+0xa2b/0x5450 [ 22.970830] kasan_report+0x141/0x180 [ 22.970913] ? kasan_atomics_helper+0xa2b/0x5450 [ 22.971028] kasan_check_range+0x10c/0x1c0 [ 22.971133] __kasan_check_write+0x18/0x20 [ 22.971209] kasan_atomics_helper+0xa2b/0x5450 [ 22.971288] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.971364] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.971444] ? kasan_atomics+0x152/0x310 [ 22.971550] kasan_atomics+0x1dc/0x310 [ 22.971738] ? __pfx_kasan_atomics+0x10/0x10 [ 22.971823] ? __pfx_read_tsc+0x10/0x10 [ 22.971898] ? ktime_get_ts64+0x86/0x230 [ 22.972013] kunit_try_run_case+0x1a5/0x480 [ 22.972125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.972198] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.972255] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.972292] ? __kthread_parkme+0x82/0x180 [ 22.972325] ? preempt_count_sub+0x50/0x80 [ 22.972361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.972395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.972467] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.972579] kthread+0x337/0x6f0 [ 22.972658] ? trace_preempt_on+0x20/0xc0 [ 22.972741] ? __pfx_kthread+0x10/0x10 [ 22.972817] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.972901] ? calculate_sigpending+0x7b/0xa0 [ 22.972936] ? __pfx_kthread+0x10/0x10 [ 22.972970] ret_from_fork+0x41/0x80 [ 22.973002] ? __pfx_kthread+0x10/0x10 [ 22.973034] ret_from_fork_asm+0x1a/0x30 [ 22.973078] </TASK> [ 22.973093] [ 22.992782] Allocated by task 285: [ 22.993215] kasan_save_stack+0x45/0x70 [ 22.993808] kasan_save_track+0x18/0x40 [ 22.994181] kasan_save_alloc_info+0x3b/0x50 [ 22.994757] __kasan_kmalloc+0xb7/0xc0 [ 22.995168] __kmalloc_cache_noprof+0x189/0x420 [ 22.995784] kasan_atomics+0x95/0x310 [ 22.996101] kunit_try_run_case+0x1a5/0x480 [ 22.996435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.996964] kthread+0x337/0x6f0 [ 22.997506] ret_from_fork+0x41/0x80 [ 22.997929] ret_from_fork_asm+0x1a/0x30 [ 22.998364] [ 22.999083] The buggy address belongs to the object at ffff888102983600 [ 22.999083] which belongs to the cache kmalloc-64 of size 64 [ 22.999802] The buggy address is located 0 bytes to the right of [ 22.999802] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.001118] [ 23.001322] The buggy address belongs to the physical page: [ 23.001724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.002466] flags: 0x200000000000000(node=0|zone=2) [ 23.003132] page_type: f5(slab) [ 23.003530] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.004329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.005354] page dumped because: kasan: bad access detected [ 23.005755] [ 23.005944] Memory state around the buggy address: [ 23.006404] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.007122] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.007903] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.008336] ^ [ 23.008855] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.009566] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.010188] ================================================================== [ 24.680150] ================================================================== [ 24.680830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 24.681323] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.682032] [ 24.682319] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.682452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.682722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.682793] Call Trace: [ 24.682886] <TASK> [ 24.682945] dump_stack_lvl+0x73/0xb0 [ 24.683034] print_report+0xd1/0x650 [ 24.683116] ? __virt_addr_valid+0x1db/0x2d0 [ 24.683194] ? kasan_atomics_helper+0x1e12/0x5450 [ 24.683265] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.683344] ? kasan_atomics_helper+0x1e12/0x5450 [ 24.683419] kasan_report+0x141/0x180 [ 24.683517] ? kasan_atomics_helper+0x1e12/0x5450 [ 24.683611] kasan_check_range+0x10c/0x1c0 [ 24.683692] __kasan_check_write+0x18/0x20 [ 24.683765] kasan_atomics_helper+0x1e12/0x5450 [ 24.683845] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.683924] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.684045] ? kasan_atomics+0x152/0x310 [ 24.684137] kasan_atomics+0x1dc/0x310 [ 24.684251] ? __pfx_kasan_atomics+0x10/0x10 [ 24.684331] ? __pfx_read_tsc+0x10/0x10 [ 24.684400] ? ktime_get_ts64+0x86/0x230 [ 24.684467] kunit_try_run_case+0x1a5/0x480 [ 24.684561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.684672] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.684761] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.684846] ? __kthread_parkme+0x82/0x180 [ 24.684922] ? preempt_count_sub+0x50/0x80 [ 24.685025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.685112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.685338] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.685489] kthread+0x337/0x6f0 [ 24.685581] ? trace_preempt_on+0x20/0xc0 [ 24.685670] ? __pfx_kthread+0x10/0x10 [ 24.685748] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.685824] ? calculate_sigpending+0x7b/0xa0 [ 24.685944] ? __pfx_kthread+0x10/0x10 [ 24.686024] ret_from_fork+0x41/0x80 [ 24.686099] ? __pfx_kthread+0x10/0x10 [ 24.686177] ret_from_fork_asm+0x1a/0x30 [ 24.686317] </TASK> [ 24.686361] [ 24.702335] Allocated by task 285: [ 24.702850] kasan_save_stack+0x45/0x70 [ 24.703347] kasan_save_track+0x18/0x40 [ 24.703827] kasan_save_alloc_info+0x3b/0x50 [ 24.704230] __kasan_kmalloc+0xb7/0xc0 [ 24.704640] __kmalloc_cache_noprof+0x189/0x420 [ 24.704991] kasan_atomics+0x95/0x310 [ 24.705304] kunit_try_run_case+0x1a5/0x480 [ 24.707079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.708880] kthread+0x337/0x6f0 [ 24.710164] ret_from_fork+0x41/0x80 [ 24.710819] ret_from_fork_asm+0x1a/0x30 [ 24.711848] [ 24.712329] The buggy address belongs to the object at ffff888102983600 [ 24.712329] which belongs to the cache kmalloc-64 of size 64 [ 24.713832] The buggy address is located 0 bytes to the right of [ 24.713832] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.714862] [ 24.715069] The buggy address belongs to the physical page: [ 24.715812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.716981] flags: 0x200000000000000(node=0|zone=2) [ 24.717371] page_type: f5(slab) [ 24.717747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.718383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.719126] page dumped because: kasan: bad access detected [ 24.719676] [ 24.719883] Memory state around the buggy address: [ 24.720345] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.720988] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.722003] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.722669] ^ [ 24.723014] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.724132] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.725786] ================================================================== [ 24.897214] ================================================================== [ 24.899153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 24.900035] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.900895] [ 24.901437] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.901662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.901705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.901763] Call Trace: [ 24.901815] <TASK> [ 24.901868] dump_stack_lvl+0x73/0xb0 [ 24.901951] print_report+0xd1/0x650 [ 24.902055] ? __virt_addr_valid+0x1db/0x2d0 [ 24.902166] ? kasan_atomics_helper+0x4f98/0x5450 [ 24.902243] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.902319] ? kasan_atomics_helper+0x4f98/0x5450 [ 24.902393] kasan_report+0x141/0x180 [ 24.902507] ? kasan_atomics_helper+0x4f98/0x5450 [ 24.902603] __asan_report_load8_noabort+0x18/0x20 [ 24.902680] kasan_atomics_helper+0x4f98/0x5450 [ 24.902774] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.902814] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.902849] ? kasan_atomics+0x152/0x310 [ 24.902882] kasan_atomics+0x1dc/0x310 [ 24.902910] ? __pfx_kasan_atomics+0x10/0x10 [ 24.902939] ? __pfx_read_tsc+0x10/0x10 [ 24.902967] ? ktime_get_ts64+0x86/0x230 [ 24.903004] kunit_try_run_case+0x1a5/0x480 [ 24.903038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.903069] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.903104] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.903138] ? __kthread_parkme+0x82/0x180 [ 24.903169] ? preempt_count_sub+0x50/0x80 [ 24.903205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.903237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.903269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.903302] kthread+0x337/0x6f0 [ 24.903331] ? trace_preempt_on+0x20/0xc0 [ 24.903365] ? __pfx_kthread+0x10/0x10 [ 24.903397] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.903468] ? calculate_sigpending+0x7b/0xa0 [ 24.903531] ? __pfx_kthread+0x10/0x10 [ 24.903566] ret_from_fork+0x41/0x80 [ 24.903598] ? __pfx_kthread+0x10/0x10 [ 24.903630] ret_from_fork_asm+0x1a/0x30 [ 24.903674] </TASK> [ 24.903689] [ 24.919174] Allocated by task 285: [ 24.919692] kasan_save_stack+0x45/0x70 [ 24.920105] kasan_save_track+0x18/0x40 [ 24.920427] kasan_save_alloc_info+0x3b/0x50 [ 24.920963] __kasan_kmalloc+0xb7/0xc0 [ 24.921389] __kmalloc_cache_noprof+0x189/0x420 [ 24.921913] kasan_atomics+0x95/0x310 [ 24.922303] kunit_try_run_case+0x1a5/0x480 [ 24.922661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.923066] kthread+0x337/0x6f0 [ 24.923443] ret_from_fork+0x41/0x80 [ 24.923948] ret_from_fork_asm+0x1a/0x30 [ 24.924699] [ 24.924962] The buggy address belongs to the object at ffff888102983600 [ 24.924962] which belongs to the cache kmalloc-64 of size 64 [ 24.926090] The buggy address is located 0 bytes to the right of [ 24.926090] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.927149] [ 24.927342] The buggy address belongs to the physical page: [ 24.927728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.928523] flags: 0x200000000000000(node=0|zone=2) [ 24.929098] page_type: f5(slab) [ 24.929579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.930452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.931244] page dumped because: kasan: bad access detected [ 24.931752] [ 24.932022] Memory state around the buggy address: [ 24.932369] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.933938] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.936019] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.936674] ^ [ 24.937058] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.937687] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.938190] ================================================================== [ 24.727620] ================================================================== [ 24.728279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 24.728704] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.729193] [ 24.729415] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.729555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.729604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.729654] Call Trace: [ 24.729695] <TASK> [ 24.729733] dump_stack_lvl+0x73/0xb0 [ 24.729791] print_report+0xd1/0x650 [ 24.729847] ? __virt_addr_valid+0x1db/0x2d0 [ 24.729901] ? kasan_atomics_helper+0x1eaa/0x5450 [ 24.729971] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.730035] ? kasan_atomics_helper+0x1eaa/0x5450 [ 24.730091] kasan_report+0x141/0x180 [ 24.730147] ? kasan_atomics_helper+0x1eaa/0x5450 [ 24.730214] kasan_check_range+0x10c/0x1c0 [ 24.730273] __kasan_check_write+0x18/0x20 [ 24.730325] kasan_atomics_helper+0x1eaa/0x5450 [ 24.730383] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.730444] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.731258] ? kasan_atomics+0x152/0x310 [ 24.731787] kasan_atomics+0x1dc/0x310 [ 24.731855] ? __pfx_kasan_atomics+0x10/0x10 [ 24.731915] ? __pfx_read_tsc+0x10/0x10 [ 24.731977] ? ktime_get_ts64+0x86/0x230 [ 24.732058] kunit_try_run_case+0x1a5/0x480 [ 24.732137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.732208] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.732285] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.732363] ? __kthread_parkme+0x82/0x180 [ 24.732437] ? preempt_count_sub+0x50/0x80 [ 24.732572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.732655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.732734] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.732812] kthread+0x337/0x6f0 [ 24.732885] ? trace_preempt_on+0x20/0xc0 [ 24.732962] ? __pfx_kthread+0x10/0x10 [ 24.733040] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.733115] ? calculate_sigpending+0x7b/0xa0 [ 24.733186] ? __pfx_kthread+0x10/0x10 [ 24.733263] ret_from_fork+0x41/0x80 [ 24.733331] ? __pfx_kthread+0x10/0x10 [ 24.733408] ret_from_fork_asm+0x1a/0x30 [ 24.733533] </TASK> [ 24.733588] [ 24.752461] Allocated by task 285: [ 24.752945] kasan_save_stack+0x45/0x70 [ 24.753464] kasan_save_track+0x18/0x40 [ 24.753930] kasan_save_alloc_info+0x3b/0x50 [ 24.754394] __kasan_kmalloc+0xb7/0xc0 [ 24.754857] __kmalloc_cache_noprof+0x189/0x420 [ 24.755347] kasan_atomics+0x95/0x310 [ 24.755803] kunit_try_run_case+0x1a5/0x480 [ 24.756166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.756669] kthread+0x337/0x6f0 [ 24.757062] ret_from_fork+0x41/0x80 [ 24.757533] ret_from_fork_asm+0x1a/0x30 [ 24.757976] [ 24.758205] The buggy address belongs to the object at ffff888102983600 [ 24.758205] which belongs to the cache kmalloc-64 of size 64 [ 24.759176] The buggy address is located 0 bytes to the right of [ 24.759176] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.759962] [ 24.760162] The buggy address belongs to the physical page: [ 24.760619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.761338] flags: 0x200000000000000(node=0|zone=2) [ 24.761902] page_type: f5(slab) [ 24.762288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.763038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.763730] page dumped because: kasan: bad access detected [ 24.764244] [ 24.764492] Memory state around the buggy address: [ 24.764838] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.765279] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.765952] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.766621] ^ [ 24.767082] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.769741] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.770338] ================================================================== [ 23.829503] ================================================================== [ 23.830948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 23.831639] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 23.832270] [ 23.832911] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.833028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.833066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.833099] Call Trace: [ 23.833126] <TASK> [ 23.833163] dump_stack_lvl+0x73/0xb0 [ 23.833227] print_report+0xd1/0x650 [ 23.833265] ? __virt_addr_valid+0x1db/0x2d0 [ 23.833299] ? kasan_atomics_helper+0x13b5/0x5450 [ 23.833333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.833367] ? kasan_atomics_helper+0x13b5/0x5450 [ 23.833400] kasan_report+0x141/0x180 [ 23.833556] ? kasan_atomics_helper+0x13b5/0x5450 [ 23.833650] kasan_check_range+0x10c/0x1c0 [ 23.833691] __kasan_check_read+0x15/0x20 [ 23.833720] kasan_atomics_helper+0x13b5/0x5450 [ 23.833754] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.833786] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.833820] ? kasan_atomics+0x152/0x310 [ 23.833853] kasan_atomics+0x1dc/0x310 [ 23.833881] ? __pfx_kasan_atomics+0x10/0x10 [ 23.833909] ? __pfx_read_tsc+0x10/0x10 [ 23.833939] ? ktime_get_ts64+0x86/0x230 [ 23.833977] kunit_try_run_case+0x1a5/0x480 [ 23.834012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.834044] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.834081] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.834115] ? __kthread_parkme+0x82/0x180 [ 23.834146] ? preempt_count_sub+0x50/0x80 [ 23.834181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.834213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.834246] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.834280] kthread+0x337/0x6f0 [ 23.834311] ? trace_preempt_on+0x20/0xc0 [ 23.834345] ? __pfx_kthread+0x10/0x10 [ 23.834377] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.834408] ? calculate_sigpending+0x7b/0xa0 [ 23.834510] ? __pfx_kthread+0x10/0x10 [ 23.834547] ret_from_fork+0x41/0x80 [ 23.834580] ? __pfx_kthread+0x10/0x10 [ 23.834612] ret_from_fork_asm+0x1a/0x30 [ 23.834656] </TASK> [ 23.834670] [ 23.854977] Allocated by task 285: [ 23.855374] kasan_save_stack+0x45/0x70 [ 23.856160] kasan_save_track+0x18/0x40 [ 23.856625] kasan_save_alloc_info+0x3b/0x50 [ 23.857041] __kasan_kmalloc+0xb7/0xc0 [ 23.857390] __kmalloc_cache_noprof+0x189/0x420 [ 23.858263] kasan_atomics+0x95/0x310 [ 23.858765] kunit_try_run_case+0x1a5/0x480 [ 23.859350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.860005] kthread+0x337/0x6f0 [ 23.860554] ret_from_fork+0x41/0x80 [ 23.860988] ret_from_fork_asm+0x1a/0x30 [ 23.861314] [ 23.861845] The buggy address belongs to the object at ffff888102983600 [ 23.861845] which belongs to the cache kmalloc-64 of size 64 [ 23.863202] The buggy address is located 0 bytes to the right of [ 23.863202] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 23.865036] [ 23.865228] The buggy address belongs to the physical page: [ 23.865746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 23.867032] flags: 0x200000000000000(node=0|zone=2) [ 23.867523] page_type: f5(slab) [ 23.867835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.868463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.869224] page dumped because: kasan: bad access detected [ 23.870162] [ 23.870333] Memory state around the buggy address: [ 23.870884] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.871927] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.872400] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.872991] ^ [ 23.873178] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.873424] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.874532] ================================================================== [ 24.853837] ================================================================== [ 24.854556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 24.855165] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 24.855740] [ 24.856013] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 24.856148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.856192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.856251] Call Trace: [ 24.856306] <TASK> [ 24.856357] dump_stack_lvl+0x73/0xb0 [ 24.856509] print_report+0xd1/0x650 [ 24.856593] ? __virt_addr_valid+0x1db/0x2d0 [ 24.856678] ? kasan_atomics_helper+0x2006/0x5450 [ 24.856755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.856837] ? kasan_atomics_helper+0x2006/0x5450 [ 24.856921] kasan_report+0x141/0x180 [ 24.857009] ? kasan_atomics_helper+0x2006/0x5450 [ 24.857099] kasan_check_range+0x10c/0x1c0 [ 24.857180] __kasan_check_write+0x18/0x20 [ 24.857251] kasan_atomics_helper+0x2006/0x5450 [ 24.857335] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.857456] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.857562] ? kasan_atomics+0x152/0x310 [ 24.857656] kasan_atomics+0x1dc/0x310 [ 24.857729] ? __pfx_kasan_atomics+0x10/0x10 [ 24.857804] ? __pfx_read_tsc+0x10/0x10 [ 24.857874] ? ktime_get_ts64+0x86/0x230 [ 24.857953] kunit_try_run_case+0x1a5/0x480 [ 24.858001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.858035] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.858071] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.858106] ? __kthread_parkme+0x82/0x180 [ 24.858138] ? preempt_count_sub+0x50/0x80 [ 24.858174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.858208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.858240] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.858273] kthread+0x337/0x6f0 [ 24.858304] ? trace_preempt_on+0x20/0xc0 [ 24.858338] ? __pfx_kthread+0x10/0x10 [ 24.858370] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.858424] ? calculate_sigpending+0x7b/0xa0 [ 24.858505] ? __pfx_kthread+0x10/0x10 [ 24.858544] ret_from_fork+0x41/0x80 [ 24.858576] ? __pfx_kthread+0x10/0x10 [ 24.858610] ret_from_fork_asm+0x1a/0x30 [ 24.858654] </TASK> [ 24.858669] [ 24.877381] Allocated by task 285: [ 24.877758] kasan_save_stack+0x45/0x70 [ 24.878190] kasan_save_track+0x18/0x40 [ 24.878673] kasan_save_alloc_info+0x3b/0x50 [ 24.879331] __kasan_kmalloc+0xb7/0xc0 [ 24.879856] __kmalloc_cache_noprof+0x189/0x420 [ 24.880489] kasan_atomics+0x95/0x310 [ 24.881066] kunit_try_run_case+0x1a5/0x480 [ 24.881770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.882495] kthread+0x337/0x6f0 [ 24.883048] ret_from_fork+0x41/0x80 [ 24.883679] ret_from_fork_asm+0x1a/0x30 [ 24.884269] [ 24.884617] The buggy address belongs to the object at ffff888102983600 [ 24.884617] which belongs to the cache kmalloc-64 of size 64 [ 24.884992] The buggy address is located 0 bytes to the right of [ 24.884992] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 24.885367] [ 24.885455] The buggy address belongs to the physical page: [ 24.886677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 24.887371] flags: 0x200000000000000(node=0|zone=2) [ 24.888126] page_type: f5(slab) [ 24.888817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.889461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.890112] page dumped because: kasan: bad access detected [ 24.890308] [ 24.890397] Memory state around the buggy address: [ 24.891335] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.891947] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.892857] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.893890] ^ [ 24.894281] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.895205] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.896125] ================================================================== [ 25.122458] ================================================================== [ 25.123489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 25.124201] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285 [ 25.125089] [ 25.125431] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 25.125594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.125634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.125692] Call Trace: [ 25.125747] <TASK> [ 25.125791] dump_stack_lvl+0x73/0xb0 [ 25.125865] print_report+0xd1/0x650 [ 25.125945] ? __virt_addr_valid+0x1db/0x2d0 [ 25.126090] ? kasan_atomics_helper+0x224c/0x5450 [ 25.126199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.126313] ? kasan_atomics_helper+0x224c/0x5450 [ 25.126425] kasan_report+0x141/0x180 [ 25.126561] ? kasan_atomics_helper+0x224c/0x5450 [ 25.126690] kasan_check_range+0x10c/0x1c0 [ 25.126869] __kasan_check_write+0x18/0x20 [ 25.126966] kasan_atomics_helper+0x224c/0x5450 [ 25.127059] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.127140] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.127218] ? kasan_atomics+0x152/0x310 [ 25.127300] kasan_atomics+0x1dc/0x310 [ 25.127374] ? __pfx_kasan_atomics+0x10/0x10 [ 25.127456] ? __pfx_read_tsc+0x10/0x10 [ 25.127553] ? ktime_get_ts64+0x86/0x230 [ 25.127639] kunit_try_run_case+0x1a5/0x480 [ 25.127738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.127817] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.127896] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.127978] ? __kthread_parkme+0x82/0x180 [ 25.128053] ? preempt_count_sub+0x50/0x80 [ 25.128135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.128213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.128292] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.128370] kthread+0x337/0x6f0 [ 25.128444] ? trace_preempt_on+0x20/0xc0 [ 25.128548] ? __pfx_kthread+0x10/0x10 [ 25.128621] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.128696] ? calculate_sigpending+0x7b/0xa0 [ 25.128772] ? __pfx_kthread+0x10/0x10 [ 25.128854] ret_from_fork+0x41/0x80 [ 25.128905] ? __pfx_kthread+0x10/0x10 [ 25.128980] ret_from_fork_asm+0x1a/0x30 [ 25.129120] </TASK> [ 25.129163] [ 25.150469] Allocated by task 285: [ 25.150976] kasan_save_stack+0x45/0x70 [ 25.151490] kasan_save_track+0x18/0x40 [ 25.152147] kasan_save_alloc_info+0x3b/0x50 [ 25.152600] __kasan_kmalloc+0xb7/0xc0 [ 25.153019] __kmalloc_cache_noprof+0x189/0x420 [ 25.153646] kasan_atomics+0x95/0x310 [ 25.153953] kunit_try_run_case+0x1a5/0x480 [ 25.154905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.155749] kthread+0x337/0x6f0 [ 25.156306] ret_from_fork+0x41/0x80 [ 25.156966] ret_from_fork_asm+0x1a/0x30 [ 25.157297] [ 25.157824] The buggy address belongs to the object at ffff888102983600 [ 25.157824] which belongs to the cache kmalloc-64 of size 64 [ 25.159088] The buggy address is located 0 bytes to the right of [ 25.159088] allocated 48-byte region [ffff888102983600, ffff888102983630) [ 25.160361] [ 25.160587] The buggy address belongs to the physical page: [ 25.160983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983 [ 25.161636] flags: 0x200000000000000(node=0|zone=2) [ 25.162017] page_type: f5(slab) [ 25.162320] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.162961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.163498] page dumped because: kasan: bad access detected [ 25.164329] [ 25.164662] Memory state around the buggy address: [ 25.165066] ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.165655] ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.166316] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.167520] ^ [ 25.168255] ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.169033] ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.169625] ==================================================================
[ 22.477909] ================================================================== [ 22.478584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 22.479258] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.479932] [ 22.480087] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.480124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.480134] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.480146] Call trace: [ 22.480155] show_stack+0x20/0x38 (C) [ 22.480178] dump_stack_lvl+0x8c/0xd0 [ 22.480200] print_report+0x118/0x608 [ 22.480219] kasan_report+0xdc/0x128 [ 22.480238] kasan_check_range+0x100/0x1a8 [ 22.480259] __kasan_check_write+0x20/0x30 [ 22.480281] kasan_atomics_helper+0x24c/0x4858 [ 22.480299] kasan_atomics+0x198/0x2e0 [ 22.480317] kunit_try_run_case+0x170/0x3f0 [ 22.480342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.480368] kthread+0x328/0x630 [ 22.480391] ret_from_fork+0x10/0x20 [ 22.480413] [ 22.486599] Allocated by task 323: [ 22.486917] kasan_save_stack+0x3c/0x68 [ 22.487278] kasan_save_track+0x20/0x40 [ 22.487637] kasan_save_alloc_info+0x40/0x58 [ 22.488037] __kasan_kmalloc+0xd4/0xd8 [ 22.488388] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.488815] kasan_atomics+0xb8/0x2e0 [ 22.489157] kunit_try_run_case+0x170/0x3f0 [ 22.489550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.490058] kthread+0x328/0x630 [ 22.490368] ret_from_fork+0x10/0x20 [ 22.490705] [ 22.490852] The buggy address belongs to the object at ffff00000ea09200 [ 22.490852] which belongs to the cache kmalloc-64 of size 64 [ 22.491953] The buggy address is located 0 bytes to the right of [ 22.491953] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.493104] [ 22.493251] The buggy address belongs to the physical page: [ 22.493757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.494468] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.495066] page_type: f5(slab) [ 22.495367] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.496068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.496764] page dumped because: kasan: bad access detected [ 22.497269] [ 22.497414] Memory state around the buggy address: [ 22.497853] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.498505] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.499158] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.499809] ^ [ 22.500247] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.500901] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.501551] ================================================================== [ 22.862340] ================================================================== [ 22.862980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 22.863626] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.864280] [ 22.864420] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.864434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.864438] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.864444] Call trace: [ 22.864447] show_stack+0x20/0x38 (C) [ 22.864457] dump_stack_lvl+0x8c/0xd0 [ 22.864466] print_report+0x118/0x608 [ 22.864475] kasan_report+0xdc/0x128 [ 22.864483] kasan_check_range+0x100/0x1a8 [ 22.864492] __kasan_check_write+0x20/0x30 [ 22.864502] kasan_atomics_helper+0x894/0x4858 [ 22.864510] kasan_atomics+0x198/0x2e0 [ 22.864518] kunit_try_run_case+0x170/0x3f0 [ 22.864529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.864541] kthread+0x328/0x630 [ 22.864551] ret_from_fork+0x10/0x20 [ 22.864561] [ 22.870686] Allocated by task 323: [ 22.870990] kasan_save_stack+0x3c/0x68 [ 22.871334] kasan_save_track+0x20/0x40 [ 22.871678] kasan_save_alloc_info+0x40/0x58 [ 22.872060] __kasan_kmalloc+0xd4/0xd8 [ 22.872397] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.872805] kasan_atomics+0xb8/0x2e0 [ 22.873134] kunit_try_run_case+0x170/0x3f0 [ 22.873509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.874000] kthread+0x328/0x630 [ 22.874293] ret_from_fork+0x10/0x20 [ 22.874615] [ 22.874752] The buggy address belongs to the object at ffff00000ea09200 [ 22.874752] which belongs to the cache kmalloc-64 of size 64 [ 22.875834] The buggy address is located 0 bytes to the right of [ 22.875834] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.876963] [ 22.877102] The buggy address belongs to the physical page: [ 22.877593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.878285] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.878862] page_type: f5(slab) [ 22.879147] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.879831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.880513] page dumped because: kasan: bad access detected [ 22.881005] [ 22.881143] Memory state around the buggy address: [ 22.881568] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.882206] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.882843] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.883481] ^ [ 22.883907] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.884543] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.885180] ================================================================== [ 23.096545] ================================================================== [ 23.097183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 23.097829] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.098483] [ 23.098621] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.098636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.098641] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.098646] Call trace: [ 23.098649] show_stack+0x20/0x38 (C) [ 23.098658] dump_stack_lvl+0x8c/0xd0 [ 23.098667] print_report+0x118/0x608 [ 23.098676] kasan_report+0xdc/0x128 [ 23.098684] kasan_check_range+0x100/0x1a8 [ 23.098694] __kasan_check_write+0x20/0x30 [ 23.098704] kasan_atomics_helper+0xc08/0x4858 [ 23.098712] kasan_atomics+0x198/0x2e0 [ 23.098720] kunit_try_run_case+0x170/0x3f0 [ 23.098732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.098744] kthread+0x328/0x630 [ 23.098754] ret_from_fork+0x10/0x20 [ 23.098764] [ 23.104885] Allocated by task 323: [ 23.105189] kasan_save_stack+0x3c/0x68 [ 23.105535] kasan_save_track+0x20/0x40 [ 23.105878] kasan_save_alloc_info+0x40/0x58 [ 23.106261] __kasan_kmalloc+0xd4/0xd8 [ 23.106598] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.107005] kasan_atomics+0xb8/0x2e0 [ 23.107334] kunit_try_run_case+0x170/0x3f0 [ 23.107710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.108199] kthread+0x328/0x630 [ 23.108492] ret_from_fork+0x10/0x20 [ 23.108814] [ 23.108952] The buggy address belongs to the object at ffff00000ea09200 [ 23.108952] which belongs to the cache kmalloc-64 of size 64 [ 23.110034] The buggy address is located 0 bytes to the right of [ 23.110034] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.111164] [ 23.111301] The buggy address belongs to the physical page: [ 23.111794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.112485] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.113063] page_type: f5(slab) [ 23.113346] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.114030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.114712] page dumped because: kasan: bad access detected [ 23.115204] [ 23.115341] Memory state around the buggy address: [ 23.115765] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.116401] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.117038] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.117674] ^ [ 23.118098] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.118735] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.119370] ================================================================== [ 22.401964] ================================================================== [ 22.403347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 22.404047] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.404727] [ 22.404894] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.404944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.404959] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.404978] Call trace: [ 22.404991] show_stack+0x20/0x38 (C) [ 22.405024] dump_stack_lvl+0x8c/0xd0 [ 22.405058] print_report+0x118/0x608 [ 22.405090] kasan_report+0xdc/0x128 [ 22.405119] __asan_report_load4_noabort+0x20/0x30 [ 22.405154] kasan_atomics_helper+0x40a8/0x4858 [ 22.405184] kasan_atomics+0x198/0x2e0 [ 22.405211] kunit_try_run_case+0x170/0x3f0 [ 22.405247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.405288] kthread+0x328/0x630 [ 22.405323] ret_from_fork+0x10/0x20 [ 22.405358] [ 22.411305] Allocated by task 323: [ 22.411632] kasan_save_stack+0x3c/0x68 [ 22.412008] kasan_save_track+0x20/0x40 [ 22.412380] kasan_save_alloc_info+0x40/0x58 [ 22.412794] __kasan_kmalloc+0xd4/0xd8 [ 22.413159] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.413602] kasan_atomics+0xb8/0x2e0 [ 22.413959] kunit_try_run_case+0x170/0x3f0 [ 22.414367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.414893] kthread+0x328/0x630 [ 22.415219] ret_from_fork+0x10/0x20 [ 22.415570] [ 22.415725] The buggy address belongs to the object at ffff00000ea09200 [ 22.415725] which belongs to the cache kmalloc-64 of size 64 [ 22.416845] The buggy address is located 0 bytes to the right of [ 22.416845] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.418012] [ 22.418168] The buggy address belongs to the physical page: [ 22.418685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.419412] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.420025] page_type: f5(slab) [ 22.420340] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.421057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.421766] page dumped because: kasan: bad access detected [ 22.422283] [ 22.422436] Memory state around the buggy address: [ 22.422886] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.423554] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.424222] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.424886] ^ [ 22.425336] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.426004] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.426667] ================================================================== [ 22.909039] ================================================================== [ 22.909676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 22.910322] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.910975] [ 22.911114] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.911128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.911132] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.911137] Call trace: [ 22.911140] show_stack+0x20/0x38 (C) [ 22.911149] dump_stack_lvl+0x8c/0xd0 [ 22.911158] print_report+0x118/0x608 [ 22.911167] kasan_report+0xdc/0x128 [ 22.911175] kasan_check_range+0x100/0x1a8 [ 22.911184] __kasan_check_write+0x20/0x30 [ 22.911194] kasan_atomics_helper+0x934/0x4858 [ 22.911203] kasan_atomics+0x198/0x2e0 [ 22.911211] kunit_try_run_case+0x170/0x3f0 [ 22.911221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.911233] kthread+0x328/0x630 [ 22.911242] ret_from_fork+0x10/0x20 [ 22.911252] [ 22.917372] Allocated by task 323: [ 22.917676] kasan_save_stack+0x3c/0x68 [ 22.918021] kasan_save_track+0x20/0x40 [ 22.918365] kasan_save_alloc_info+0x40/0x58 [ 22.918747] __kasan_kmalloc+0xd4/0xd8 [ 22.919084] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.919491] kasan_atomics+0xb8/0x2e0 [ 22.919820] kunit_try_run_case+0x170/0x3f0 [ 22.920195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.920685] kthread+0x328/0x630 [ 22.920978] ret_from_fork+0x10/0x20 [ 22.921300] [ 22.921436] The buggy address belongs to the object at ffff00000ea09200 [ 22.921436] which belongs to the cache kmalloc-64 of size 64 [ 22.922519] The buggy address is located 0 bytes to the right of [ 22.922519] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.923648] [ 22.923785] The buggy address belongs to the physical page: [ 22.924276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.924968] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.925547] page_type: f5(slab) [ 22.925831] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.926515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.927197] page dumped because: kasan: bad access detected [ 22.927689] [ 22.927825] Memory state around the buggy address: [ 22.928251] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.928888] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.929525] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.930161] ^ [ 22.930586] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.931225] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.931862] ================================================================== [ 23.588495] ================================================================== [ 23.589132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 23.589785] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.590439] [ 23.590577] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.590591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.590595] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.590601] Call trace: [ 23.590604] show_stack+0x20/0x38 (C) [ 23.590613] dump_stack_lvl+0x8c/0xd0 [ 23.590621] print_report+0x118/0x608 [ 23.590630] kasan_report+0xdc/0x128 [ 23.590638] kasan_check_range+0x100/0x1a8 [ 23.590648] __kasan_check_write+0x20/0x30 [ 23.590657] kasan_atomics_helper+0x1384/0x4858 [ 23.590666] kasan_atomics+0x198/0x2e0 [ 23.590674] kunit_try_run_case+0x170/0x3f0 [ 23.590684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.590695] kthread+0x328/0x630 [ 23.590705] ret_from_fork+0x10/0x20 [ 23.590715] [ 23.596845] Allocated by task 323: [ 23.597149] kasan_save_stack+0x3c/0x68 [ 23.597495] kasan_save_track+0x20/0x40 [ 23.597838] kasan_save_alloc_info+0x40/0x58 [ 23.598221] __kasan_kmalloc+0xd4/0xd8 [ 23.598558] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.598965] kasan_atomics+0xb8/0x2e0 [ 23.599293] kunit_try_run_case+0x170/0x3f0 [ 23.599671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.600161] kthread+0x328/0x630 [ 23.600454] ret_from_fork+0x10/0x20 [ 23.600777] [ 23.600913] The buggy address belongs to the object at ffff00000ea09200 [ 23.600913] which belongs to the cache kmalloc-64 of size 64 [ 23.601996] The buggy address is located 0 bytes to the right of [ 23.601996] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.603125] [ 23.603262] The buggy address belongs to the physical page: [ 23.603754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.604445] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.605024] page_type: f5(slab) [ 23.605307] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.605991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.606673] page dumped because: kasan: bad access detected [ 23.607166] [ 23.607302] Memory state around the buggy address: [ 23.607727] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.608364] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.609001] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.609637] ^ [ 23.610063] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.610700] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.611336] ================================================================== [ 22.599189] ================================================================== [ 22.599843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 22.600505] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.601174] [ 22.601323] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.601355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.601365] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.601376] Call trace: [ 22.601383] show_stack+0x20/0x38 (C) [ 22.601403] dump_stack_lvl+0x8c/0xd0 [ 22.601422] print_report+0x118/0x608 [ 22.601442] kasan_report+0xdc/0x128 [ 22.601461] kasan_check_range+0x100/0x1a8 [ 22.601481] __kasan_check_write+0x20/0x30 [ 22.601502] kasan_atomics_helper+0x3ac/0x4858 [ 22.601522] kasan_atomics+0x198/0x2e0 [ 22.601539] kunit_try_run_case+0x170/0x3f0 [ 22.601561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.601588] kthread+0x328/0x630 [ 22.601610] ret_from_fork+0x10/0x20 [ 22.601631] [ 22.607813] Allocated by task 323: [ 22.608129] kasan_save_stack+0x3c/0x68 [ 22.608489] kasan_save_track+0x20/0x40 [ 22.608847] kasan_save_alloc_info+0x40/0x58 [ 22.609246] __kasan_kmalloc+0xd4/0xd8 [ 22.609597] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.610023] kasan_atomics+0xb8/0x2e0 [ 22.610365] kunit_try_run_case+0x170/0x3f0 [ 22.610757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.611266] kthread+0x328/0x630 [ 22.611575] ret_from_fork+0x10/0x20 [ 22.611913] [ 22.612059] The buggy address belongs to the object at ffff00000ea09200 [ 22.612059] which belongs to the cache kmalloc-64 of size 64 [ 22.613160] The buggy address is located 0 bytes to the right of [ 22.613160] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.614309] [ 22.614455] The buggy address belongs to the physical page: [ 22.614958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.615665] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.616258] page_type: f5(slab) [ 22.616555] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.617254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.617949] page dumped because: kasan: bad access detected [ 22.618453] [ 22.618598] Memory state around the buggy address: [ 22.619035] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.619688] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.620340] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.620990] ^ [ 22.621427] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.622080] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.622729] ================================================================== [ 22.695668] ================================================================== [ 22.696312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 22.696965] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.697625] [ 22.697768] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.697790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.697796] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.697804] Call trace: [ 22.697809] show_stack+0x20/0x38 (C) [ 22.697823] dump_stack_lvl+0x8c/0xd0 [ 22.697836] print_report+0x118/0x608 [ 22.697849] kasan_report+0xdc/0x128 [ 22.697861] kasan_check_range+0x100/0x1a8 [ 22.697875] __kasan_check_write+0x20/0x30 [ 22.697890] kasan_atomics_helper+0x54c/0x4858 [ 22.697903] kasan_atomics+0x198/0x2e0 [ 22.697915] kunit_try_run_case+0x170/0x3f0 [ 22.697930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.697948] kthread+0x328/0x630 [ 22.697963] ret_from_fork+0x10/0x20 [ 22.697978] [ 22.704121] Allocated by task 323: [ 22.704430] kasan_save_stack+0x3c/0x68 [ 22.704781] kasan_save_track+0x20/0x40 [ 22.705131] kasan_save_alloc_info+0x40/0x58 [ 22.705520] __kasan_kmalloc+0xd4/0xd8 [ 22.705862] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.706277] kasan_atomics+0xb8/0x2e0 [ 22.706612] kunit_try_run_case+0x170/0x3f0 [ 22.706994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.707492] kthread+0x328/0x630 [ 22.707792] ret_from_fork+0x10/0x20 [ 22.708120] [ 22.708260] The buggy address belongs to the object at ffff00000ea09200 [ 22.708260] which belongs to the cache kmalloc-64 of size 64 [ 22.709350] The buggy address is located 0 bytes to the right of [ 22.709350] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.710487] [ 22.710627] The buggy address belongs to the physical page: [ 22.711124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.711822] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.712407] page_type: f5(slab) [ 22.712697] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.713387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.714073] page dumped because: kasan: bad access detected [ 22.714571] [ 22.714711] Memory state around the buggy address: [ 22.715141] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.715784] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.716428] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.717069] ^ [ 22.717500] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.718144] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.718785] ================================================================== [ 23.120032] ================================================================== [ 23.120670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 23.121323] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.121968] [ 23.122108] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.122122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.122126] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.122131] Call trace: [ 23.122135] show_stack+0x20/0x38 (C) [ 23.122144] dump_stack_lvl+0x8c/0xd0 [ 23.122153] print_report+0x118/0x608 [ 23.122161] kasan_report+0xdc/0x128 [ 23.122170] __asan_report_load4_noabort+0x20/0x30 [ 23.122180] kasan_atomics_helper+0x3de4/0x4858 [ 23.122189] kasan_atomics+0x198/0x2e0 [ 23.122197] kunit_try_run_case+0x170/0x3f0 [ 23.122207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.122219] kthread+0x328/0x630 [ 23.122229] ret_from_fork+0x10/0x20 [ 23.122239] [ 23.128068] Allocated by task 323: [ 23.128373] kasan_save_stack+0x3c/0x68 [ 23.128717] kasan_save_track+0x20/0x40 [ 23.129061] kasan_save_alloc_info+0x40/0x58 [ 23.129444] __kasan_kmalloc+0xd4/0xd8 [ 23.129781] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.130188] kasan_atomics+0xb8/0x2e0 [ 23.130517] kunit_try_run_case+0x170/0x3f0 [ 23.130893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.131383] kthread+0x328/0x630 [ 23.131677] ret_from_fork+0x10/0x20 [ 23.131999] [ 23.132136] The buggy address belongs to the object at ffff00000ea09200 [ 23.132136] which belongs to the cache kmalloc-64 of size 64 [ 23.133219] The buggy address is located 0 bytes to the right of [ 23.133219] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.134348] [ 23.134485] The buggy address belongs to the physical page: [ 23.134977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.135669] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.136247] page_type: f5(slab) [ 23.136532] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.137216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.137897] page dumped because: kasan: bad access detected [ 23.138389] [ 23.138526] Memory state around the buggy address: [ 23.138951] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.139590] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.140226] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.140862] ^ [ 23.141288] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.141925] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.142560] ================================================================== [ 22.452586] ================================================================== [ 22.453260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 22.453941] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.454620] [ 22.454785] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.454836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.454851] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.454869] Call trace: [ 22.454882] show_stack+0x20/0x38 (C) [ 22.454914] dump_stack_lvl+0x8c/0xd0 [ 22.454947] print_report+0x118/0x608 [ 22.454978] kasan_report+0xdc/0x128 [ 22.455007] kasan_check_range+0x100/0x1a8 [ 22.455040] __kasan_check_read+0x20/0x30 [ 22.455073] kasan_atomics_helper+0x1ec/0x4858 [ 22.455103] kasan_atomics+0x198/0x2e0 [ 22.455131] kunit_try_run_case+0x170/0x3f0 [ 22.455167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.455207] kthread+0x328/0x630 [ 22.455242] ret_from_fork+0x10/0x20 [ 22.455275] [ 22.461516] Allocated by task 323: [ 22.461844] kasan_save_stack+0x3c/0x68 [ 22.462219] kasan_save_track+0x20/0x40 [ 22.462592] kasan_save_alloc_info+0x40/0x58 [ 22.463007] __kasan_kmalloc+0xd4/0xd8 [ 22.463371] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.463815] kasan_atomics+0xb8/0x2e0 [ 22.464171] kunit_try_run_case+0x170/0x3f0 [ 22.464580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.465105] kthread+0x328/0x630 [ 22.465430] ret_from_fork+0x10/0x20 [ 22.465782] [ 22.465937] The buggy address belongs to the object at ffff00000ea09200 [ 22.465937] which belongs to the cache kmalloc-64 of size 64 [ 22.467057] The buggy address is located 0 bytes to the right of [ 22.467057] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.468224] [ 22.468380] The buggy address belongs to the physical page: [ 22.468897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.469624] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.470238] page_type: f5(slab) [ 22.470551] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.471268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.471977] page dumped because: kasan: bad access detected [ 22.472494] [ 22.472648] Memory state around the buggy address: [ 22.473096] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.473764] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.474432] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.475094] ^ [ 22.475543] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.476211] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.476874] ================================================================== [ 23.705677] ================================================================== [ 23.706315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 23.706967] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.707621] [ 23.707759] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.707773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.707778] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.707783] Call trace: [ 23.707786] show_stack+0x20/0x38 (C) [ 23.707795] dump_stack_lvl+0x8c/0xd0 [ 23.707803] print_report+0x118/0x608 [ 23.707812] kasan_report+0xdc/0x128 [ 23.707821] kasan_check_range+0x100/0x1a8 [ 23.707830] __kasan_check_write+0x20/0x30 [ 23.707840] kasan_atomics_helper+0x154c/0x4858 [ 23.707848] kasan_atomics+0x198/0x2e0 [ 23.707856] kunit_try_run_case+0x170/0x3f0 [ 23.707867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.707878] kthread+0x328/0x630 [ 23.707888] ret_from_fork+0x10/0x20 [ 23.707898] [ 23.714025] Allocated by task 323: [ 23.714330] kasan_save_stack+0x3c/0x68 [ 23.714674] kasan_save_track+0x20/0x40 [ 23.715018] kasan_save_alloc_info+0x40/0x58 [ 23.715401] __kasan_kmalloc+0xd4/0xd8 [ 23.715738] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.716145] kasan_atomics+0xb8/0x2e0 [ 23.716474] kunit_try_run_case+0x170/0x3f0 [ 23.716849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.717339] kthread+0x328/0x630 [ 23.717632] ret_from_fork+0x10/0x20 [ 23.717954] [ 23.718090] The buggy address belongs to the object at ffff00000ea09200 [ 23.718090] which belongs to the cache kmalloc-64 of size 64 [ 23.719173] The buggy address is located 0 bytes to the right of [ 23.719173] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.720303] [ 23.720440] The buggy address belongs to the physical page: [ 23.720931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.721623] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.722200] page_type: f5(slab) [ 23.722485] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.723169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.723851] page dumped because: kasan: bad access detected [ 23.724343] [ 23.724481] Memory state around the buggy address: [ 23.724906] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.725544] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.726182] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.726818] ^ [ 23.727243] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.727880] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.728515] ================================================================== [ 23.143222] ================================================================== [ 23.143859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 23.144504] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.145158] [ 23.145296] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.145311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.145315] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.145320] Call trace: [ 23.145323] show_stack+0x20/0x38 (C) [ 23.145332] dump_stack_lvl+0x8c/0xd0 [ 23.145341] print_report+0x118/0x608 [ 23.145350] kasan_report+0xdc/0x128 [ 23.145358] kasan_check_range+0x100/0x1a8 [ 23.145367] __kasan_check_write+0x20/0x30 [ 23.145377] kasan_atomics_helper+0xca0/0x4858 [ 23.145385] kasan_atomics+0x198/0x2e0 [ 23.145393] kunit_try_run_case+0x170/0x3f0 [ 23.145404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.145416] kthread+0x328/0x630 [ 23.145426] ret_from_fork+0x10/0x20 [ 23.145436] [ 23.151559] Allocated by task 323: [ 23.151863] kasan_save_stack+0x3c/0x68 [ 23.152207] kasan_save_track+0x20/0x40 [ 23.152552] kasan_save_alloc_info+0x40/0x58 [ 23.152935] __kasan_kmalloc+0xd4/0xd8 [ 23.153272] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.153679] kasan_atomics+0xb8/0x2e0 [ 23.154008] kunit_try_run_case+0x170/0x3f0 [ 23.154384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.154875] kthread+0x328/0x630 [ 23.155168] ret_from_fork+0x10/0x20 [ 23.155490] [ 23.155627] The buggy address belongs to the object at ffff00000ea09200 [ 23.155627] which belongs to the cache kmalloc-64 of size 64 [ 23.156709] The buggy address is located 0 bytes to the right of [ 23.156709] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.157838] [ 23.157976] The buggy address belongs to the physical page: [ 23.158467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.159159] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.159738] page_type: f5(slab) [ 23.160022] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.160706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.161388] page dumped because: kasan: bad access detected [ 23.161879] [ 23.162016] Memory state around the buggy address: [ 23.162441] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.163078] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.163715] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.164350] ^ [ 23.164775] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.165413] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.166049] ================================================================== [ 23.541475] ================================================================== [ 23.542112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 23.542765] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.543419] [ 23.543557] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.543571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.543575] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.543581] Call trace: [ 23.543584] show_stack+0x20/0x38 (C) [ 23.543593] dump_stack_lvl+0x8c/0xd0 [ 23.543601] print_report+0x118/0x608 [ 23.543610] kasan_report+0xdc/0x128 [ 23.543618] kasan_check_range+0x100/0x1a8 [ 23.543627] __kasan_check_write+0x20/0x30 [ 23.543637] kasan_atomics_helper+0x126c/0x4858 [ 23.543646] kasan_atomics+0x198/0x2e0 [ 23.543654] kunit_try_run_case+0x170/0x3f0 [ 23.543664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.543675] kthread+0x328/0x630 [ 23.543685] ret_from_fork+0x10/0x20 [ 23.543695] [ 23.549823] Allocated by task 323: [ 23.550127] kasan_save_stack+0x3c/0x68 [ 23.550471] kasan_save_track+0x20/0x40 [ 23.550815] kasan_save_alloc_info+0x40/0x58 [ 23.551198] __kasan_kmalloc+0xd4/0xd8 [ 23.551534] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.551942] kasan_atomics+0xb8/0x2e0 [ 23.552270] kunit_try_run_case+0x170/0x3f0 [ 23.552646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.553137] kthread+0x328/0x630 [ 23.553429] ret_from_fork+0x10/0x20 [ 23.553752] [ 23.553888] The buggy address belongs to the object at ffff00000ea09200 [ 23.553888] which belongs to the cache kmalloc-64 of size 64 [ 23.554971] The buggy address is located 0 bytes to the right of [ 23.554971] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.556100] [ 23.556238] The buggy address belongs to the physical page: [ 23.556729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.557421] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.558000] page_type: f5(slab) [ 23.558284] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.558968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.559650] page dumped because: kasan: bad access detected [ 23.560142] [ 23.560280] Memory state around the buggy address: [ 23.560705] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.561344] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.561981] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.562618] ^ [ 23.563044] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.563681] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.564316] ================================================================== [ 23.729167] ================================================================== [ 23.729804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 23.730457] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.731111] [ 23.731249] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.731263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.731268] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.731273] Call trace: [ 23.731276] show_stack+0x20/0x38 (C) [ 23.731285] dump_stack_lvl+0x8c/0xd0 [ 23.731294] print_report+0x118/0x608 [ 23.731302] kasan_report+0xdc/0x128 [ 23.731311] kasan_check_range+0x100/0x1a8 [ 23.731320] __kasan_check_write+0x20/0x30 [ 23.731329] kasan_atomics_helper+0x15b4/0x4858 [ 23.731338] kasan_atomics+0x198/0x2e0 [ 23.731346] kunit_try_run_case+0x170/0x3f0 [ 23.731356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.731368] kthread+0x328/0x630 [ 23.731378] ret_from_fork+0x10/0x20 [ 23.731388] [ 23.737512] Allocated by task 323: [ 23.737816] kasan_save_stack+0x3c/0x68 [ 23.738161] kasan_save_track+0x20/0x40 [ 23.738505] kasan_save_alloc_info+0x40/0x58 [ 23.738888] __kasan_kmalloc+0xd4/0xd8 [ 23.739225] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.739632] kasan_atomics+0xb8/0x2e0 [ 23.739961] kunit_try_run_case+0x170/0x3f0 [ 23.740337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.740827] kthread+0x328/0x630 [ 23.741120] ret_from_fork+0x10/0x20 [ 23.741443] [ 23.741579] The buggy address belongs to the object at ffff00000ea09200 [ 23.741579] which belongs to the cache kmalloc-64 of size 64 [ 23.742662] The buggy address is located 0 bytes to the right of [ 23.742662] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.743791] [ 23.743928] The buggy address belongs to the physical page: [ 23.744419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.745111] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.745688] page_type: f5(slab) [ 23.745972] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.746656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.747338] page dumped because: kasan: bad access detected [ 23.747830] [ 23.747966] Memory state around the buggy address: [ 23.748392] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.749029] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.749666] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.750302] ^ [ 23.750726] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.751363] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.752000] ================================================================== [ 22.502445] ================================================================== [ 22.503102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 22.503765] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.504428] [ 22.504577] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.504611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.504621] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.504631] Call trace: [ 22.504640] show_stack+0x20/0x38 (C) [ 22.504660] dump_stack_lvl+0x8c/0xd0 [ 22.504678] print_report+0x118/0x608 [ 22.504697] kasan_report+0xdc/0x128 [ 22.504716] kasan_check_range+0x100/0x1a8 [ 22.504737] __kasan_check_read+0x20/0x30 [ 22.504757] kasan_atomics_helper+0x2b0/0x4858 [ 22.504776] kasan_atomics+0x198/0x2e0 [ 22.504793] kunit_try_run_case+0x170/0x3f0 [ 22.504816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.504843] kthread+0x328/0x630 [ 22.504864] ret_from_fork+0x10/0x20 [ 22.504885] [ 22.511057] Allocated by task 323: [ 22.511373] kasan_save_stack+0x3c/0x68 [ 22.511733] kasan_save_track+0x20/0x40 [ 22.512091] kasan_save_alloc_info+0x40/0x58 [ 22.512490] __kasan_kmalloc+0xd4/0xd8 [ 22.512841] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.513268] kasan_atomics+0xb8/0x2e0 [ 22.513609] kunit_try_run_case+0x170/0x3f0 [ 22.514002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.514509] kthread+0x328/0x630 [ 22.514818] ret_from_fork+0x10/0x20 [ 22.515156] [ 22.515302] The buggy address belongs to the object at ffff00000ea09200 [ 22.515302] which belongs to the cache kmalloc-64 of size 64 [ 22.516403] The buggy address is located 0 bytes to the right of [ 22.516403] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.517551] [ 22.517697] The buggy address belongs to the physical page: [ 22.518201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.518909] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.519503] page_type: f5(slab) [ 22.519802] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.520502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.521196] page dumped because: kasan: bad access detected [ 22.521700] [ 22.521845] Memory state around the buggy address: [ 22.522282] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.522934] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.523587] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.524237] ^ [ 22.524675] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.525327] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.525976] ================================================================== [ 23.049795] ================================================================== [ 23.050434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 23.051079] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.051733] [ 23.051871] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.051886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.051890] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.051895] Call trace: [ 23.051898] show_stack+0x20/0x38 (C) [ 23.051909] dump_stack_lvl+0x8c/0xd0 [ 23.051917] print_report+0x118/0x608 [ 23.051926] kasan_report+0xdc/0x128 [ 23.051934] kasan_check_range+0x100/0x1a8 [ 23.051943] __kasan_check_write+0x20/0x30 [ 23.051953] kasan_atomics_helper+0xb70/0x4858 [ 23.051962] kasan_atomics+0x198/0x2e0 [ 23.051970] kunit_try_run_case+0x170/0x3f0 [ 23.051980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.051993] kthread+0x328/0x630 [ 23.052003] ret_from_fork+0x10/0x20 [ 23.052012] [ 23.058133] Allocated by task 323: [ 23.058437] kasan_save_stack+0x3c/0x68 [ 23.058783] kasan_save_track+0x20/0x40 [ 23.059127] kasan_save_alloc_info+0x40/0x58 [ 23.059510] __kasan_kmalloc+0xd4/0xd8 [ 23.059847] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.060255] kasan_atomics+0xb8/0x2e0 [ 23.060584] kunit_try_run_case+0x170/0x3f0 [ 23.060960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.061449] kthread+0x328/0x630 [ 23.061742] ret_from_fork+0x10/0x20 [ 23.062064] [ 23.062202] The buggy address belongs to the object at ffff00000ea09200 [ 23.062202] which belongs to the cache kmalloc-64 of size 64 [ 23.063285] The buggy address is located 0 bytes to the right of [ 23.063285] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.064414] [ 23.064553] The buggy address belongs to the physical page: [ 23.065044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.065735] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.066312] page_type: f5(slab) [ 23.066597] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.067281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.067963] page dumped because: kasan: bad access detected [ 23.068454] [ 23.068591] Memory state around the buggy address: [ 23.069017] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.069653] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.070290] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.070927] ^ [ 23.071353] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.071990] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.072627] ================================================================== [ 23.775847] ================================================================== [ 23.776484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 23.777137] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.777791] [ 23.777929] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.777943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.777947] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.777952] Call trace: [ 23.777955] show_stack+0x20/0x38 (C) [ 23.777965] dump_stack_lvl+0x8c/0xd0 [ 23.777973] print_report+0x118/0x608 [ 23.777982] kasan_report+0xdc/0x128 [ 23.777990] kasan_check_range+0x100/0x1a8 [ 23.777999] __kasan_check_write+0x20/0x30 [ 23.778010] kasan_atomics_helper+0x1644/0x4858 [ 23.778018] kasan_atomics+0x198/0x2e0 [ 23.778026] kunit_try_run_case+0x170/0x3f0 [ 23.778037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.778048] kthread+0x328/0x630 [ 23.778058] ret_from_fork+0x10/0x20 [ 23.778067] [ 23.784197] Allocated by task 323: [ 23.784502] kasan_save_stack+0x3c/0x68 [ 23.784847] kasan_save_track+0x20/0x40 [ 23.785191] kasan_save_alloc_info+0x40/0x58 [ 23.785574] __kasan_kmalloc+0xd4/0xd8 [ 23.785911] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.786318] kasan_atomics+0xb8/0x2e0 [ 23.786646] kunit_try_run_case+0x170/0x3f0 [ 23.787022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.787513] kthread+0x328/0x630 [ 23.787805] ret_from_fork+0x10/0x20 [ 23.788128] [ 23.788265] The buggy address belongs to the object at ffff00000ea09200 [ 23.788265] which belongs to the cache kmalloc-64 of size 64 [ 23.789347] The buggy address is located 0 bytes to the right of [ 23.789347] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.790477] [ 23.790613] The buggy address belongs to the physical page: [ 23.791105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.791796] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.792375] page_type: f5(slab) [ 23.792660] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.793344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.794026] page dumped because: kasan: bad access detected [ 23.794518] [ 23.794656] Memory state around the buggy address: [ 23.795081] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.795720] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.796357] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.796993] ^ [ 23.797419] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.798055] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.798690] ================================================================== [ 22.932516] ================================================================== [ 22.933154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 22.933800] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.934454] [ 22.934592] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.934607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.934611] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.934617] Call trace: [ 22.934620] show_stack+0x20/0x38 (C) [ 22.934629] dump_stack_lvl+0x8c/0xd0 [ 22.934638] print_report+0x118/0x608 [ 22.934647] kasan_report+0xdc/0x128 [ 22.934655] kasan_check_range+0x100/0x1a8 [ 22.934664] __kasan_check_write+0x20/0x30 [ 22.934674] kasan_atomics_helper+0x99c/0x4858 [ 22.934683] kasan_atomics+0x198/0x2e0 [ 22.934690] kunit_try_run_case+0x170/0x3f0 [ 22.934701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.934712] kthread+0x328/0x630 [ 22.934722] ret_from_fork+0x10/0x20 [ 22.934732] [ 22.940855] Allocated by task 323: [ 22.941159] kasan_save_stack+0x3c/0x68 [ 22.941503] kasan_save_track+0x20/0x40 [ 22.941847] kasan_save_alloc_info+0x40/0x58 [ 22.942229] __kasan_kmalloc+0xd4/0xd8 [ 22.942567] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.942973] kasan_atomics+0xb8/0x2e0 [ 22.943302] kunit_try_run_case+0x170/0x3f0 [ 22.943677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.944167] kthread+0x328/0x630 [ 22.944459] ret_from_fork+0x10/0x20 [ 22.944781] [ 22.944918] The buggy address belongs to the object at ffff00000ea09200 [ 22.944918] which belongs to the cache kmalloc-64 of size 64 [ 22.946000] The buggy address is located 0 bytes to the right of [ 22.946000] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.947130] [ 22.947266] The buggy address belongs to the physical page: [ 22.947758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.948449] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.949027] page_type: f5(slab) [ 22.949311] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.949995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.950677] page dumped because: kasan: bad access detected [ 22.951168] [ 22.951305] Memory state around the buggy address: [ 22.951730] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.952367] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.953004] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.953641] ^ [ 22.954065] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.954702] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.955337] ================================================================== [ 23.494474] ================================================================== [ 23.495112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 23.495765] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.496419] [ 23.496557] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.496572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.496577] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.496581] Call trace: [ 23.496585] show_stack+0x20/0x38 (C) [ 23.496594] dump_stack_lvl+0x8c/0xd0 [ 23.496603] print_report+0x118/0x608 [ 23.496611] kasan_report+0xdc/0x128 [ 23.496619] kasan_check_range+0x100/0x1a8 [ 23.496629] __kasan_check_write+0x20/0x30 [ 23.496638] kasan_atomics_helper+0x1190/0x4858 [ 23.496647] kasan_atomics+0x198/0x2e0 [ 23.496655] kunit_try_run_case+0x170/0x3f0 [ 23.496666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.496678] kthread+0x328/0x630 [ 23.496687] ret_from_fork+0x10/0x20 [ 23.496697] [ 23.502825] Allocated by task 323: [ 23.503129] kasan_save_stack+0x3c/0x68 [ 23.503475] kasan_save_track+0x20/0x40 [ 23.503820] kasan_save_alloc_info+0x40/0x58 [ 23.504203] __kasan_kmalloc+0xd4/0xd8 [ 23.504540] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.504947] kasan_atomics+0xb8/0x2e0 [ 23.505276] kunit_try_run_case+0x170/0x3f0 [ 23.505652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.506144] kthread+0x328/0x630 [ 23.506436] ret_from_fork+0x10/0x20 [ 23.506758] [ 23.506895] The buggy address belongs to the object at ffff00000ea09200 [ 23.506895] which belongs to the cache kmalloc-64 of size 64 [ 23.507978] The buggy address is located 0 bytes to the right of [ 23.507978] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.509107] [ 23.509245] The buggy address belongs to the physical page: [ 23.509737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.510428] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.511006] page_type: f5(slab) [ 23.511290] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.511974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.512656] page dumped because: kasan: bad access detected [ 23.513147] [ 23.513284] Memory state around the buggy address: [ 23.513709] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.514346] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.514983] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.515619] ^ [ 23.516044] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.516681] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.517318] ================================================================== [ 22.955995] ================================================================== [ 22.956632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 22.957277] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.957932] [ 22.958070] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.958084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.958088] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.958093] Call trace: [ 22.958097] show_stack+0x20/0x38 (C) [ 22.958106] dump_stack_lvl+0x8c/0xd0 [ 22.958114] print_report+0x118/0x608 [ 22.958123] kasan_report+0xdc/0x128 [ 22.958131] kasan_check_range+0x100/0x1a8 [ 22.958140] __kasan_check_write+0x20/0x30 [ 22.958150] kasan_atomics_helper+0xa04/0x4858 [ 22.958159] kasan_atomics+0x198/0x2e0 [ 22.958167] kunit_try_run_case+0x170/0x3f0 [ 22.958177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.958189] kthread+0x328/0x630 [ 22.958199] ret_from_fork+0x10/0x20 [ 22.958209] [ 22.964332] Allocated by task 323: [ 22.964636] kasan_save_stack+0x3c/0x68 [ 22.964980] kasan_save_track+0x20/0x40 [ 22.965324] kasan_save_alloc_info+0x40/0x58 [ 22.965707] __kasan_kmalloc+0xd4/0xd8 [ 22.966044] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.966451] kasan_atomics+0xb8/0x2e0 [ 22.966780] kunit_try_run_case+0x170/0x3f0 [ 22.967155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.967646] kthread+0x328/0x630 [ 22.967939] ret_from_fork+0x10/0x20 [ 22.968261] [ 22.968398] The buggy address belongs to the object at ffff00000ea09200 [ 22.968398] which belongs to the cache kmalloc-64 of size 64 [ 22.969480] The buggy address is located 0 bytes to the right of [ 22.969480] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.970609] [ 22.970746] The buggy address belongs to the physical page: [ 22.971237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.971927] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.972506] page_type: f5(slab) [ 22.972789] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.973472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.974154] page dumped because: kasan: bad access detected [ 22.974646] [ 22.974782] Memory state around the buggy address: [ 22.975208] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.975844] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.976483] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.977118] ^ [ 22.977544] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.978181] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.978817] ================================================================== [ 23.447434] ================================================================== [ 23.448071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 23.448724] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.449377] [ 23.449517] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.449531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.449536] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.449541] Call trace: [ 23.449544] show_stack+0x20/0x38 (C) [ 23.449554] dump_stack_lvl+0x8c/0xd0 [ 23.449562] print_report+0x118/0x608 [ 23.449571] kasan_report+0xdc/0x128 [ 23.449579] kasan_check_range+0x100/0x1a8 [ 23.449589] __kasan_check_write+0x20/0x30 [ 23.449599] kasan_atomics_helper+0x10c0/0x4858 [ 23.449607] kasan_atomics+0x198/0x2e0 [ 23.449615] kunit_try_run_case+0x170/0x3f0 [ 23.449626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.449638] kthread+0x328/0x630 [ 23.449648] ret_from_fork+0x10/0x20 [ 23.449657] [ 23.455784] Allocated by task 323: [ 23.456089] kasan_save_stack+0x3c/0x68 [ 23.456432] kasan_save_track+0x20/0x40 [ 23.456777] kasan_save_alloc_info+0x40/0x58 [ 23.457160] __kasan_kmalloc+0xd4/0xd8 [ 23.457497] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.457904] kasan_atomics+0xb8/0x2e0 [ 23.458233] kunit_try_run_case+0x170/0x3f0 [ 23.458608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.459099] kthread+0x328/0x630 [ 23.459392] ret_from_fork+0x10/0x20 [ 23.459714] [ 23.459851] The buggy address belongs to the object at ffff00000ea09200 [ 23.459851] which belongs to the cache kmalloc-64 of size 64 [ 23.460933] The buggy address is located 0 bytes to the right of [ 23.460933] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.462062] [ 23.462199] The buggy address belongs to the physical page: [ 23.462691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.463383] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.463960] page_type: f5(slab) [ 23.464245] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.464929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.465611] page dumped because: kasan: bad access detected [ 23.466103] [ 23.466239] Memory state around the buggy address: [ 23.466665] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.467302] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.467940] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.468578] ^ [ 23.469002] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.469639] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.470274] ================================================================== [ 23.236622] ================================================================== [ 23.237259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 23.237905] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.238550] [ 23.238688] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.238702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.238707] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.238712] Call trace: [ 23.238715] show_stack+0x20/0x38 (C) [ 23.238724] dump_stack_lvl+0x8c/0xd0 [ 23.238733] print_report+0x118/0x608 [ 23.238741] kasan_report+0xdc/0x128 [ 23.238750] kasan_check_range+0x100/0x1a8 [ 23.238759] __kasan_check_read+0x20/0x30 [ 23.238769] kasan_atomics_helper+0xdd4/0x4858 [ 23.238778] kasan_atomics+0x198/0x2e0 [ 23.238786] kunit_try_run_case+0x170/0x3f0 [ 23.238796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.238808] kthread+0x328/0x630 [ 23.238818] ret_from_fork+0x10/0x20 [ 23.238827] [ 23.244941] Allocated by task 323: [ 23.245245] kasan_save_stack+0x3c/0x68 [ 23.245589] kasan_save_track+0x20/0x40 [ 23.245933] kasan_save_alloc_info+0x40/0x58 [ 23.246316] __kasan_kmalloc+0xd4/0xd8 [ 23.246652] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.247059] kasan_atomics+0xb8/0x2e0 [ 23.247387] kunit_try_run_case+0x170/0x3f0 [ 23.247763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.248253] kthread+0x328/0x630 [ 23.248546] ret_from_fork+0x10/0x20 [ 23.248868] [ 23.249005] The buggy address belongs to the object at ffff00000ea09200 [ 23.249005] which belongs to the cache kmalloc-64 of size 64 [ 23.250087] The buggy address is located 0 bytes to the right of [ 23.250087] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.251217] [ 23.251353] The buggy address belongs to the physical page: [ 23.251845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.252537] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.253114] page_type: f5(slab) [ 23.253399] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.254082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.254764] page dumped because: kasan: bad access detected [ 23.255255] [ 23.255393] Memory state around the buggy address: [ 23.255819] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.256457] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.257096] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.257731] ^ [ 23.258157] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.258795] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.259431] ================================================================== [ 22.814929] ================================================================== [ 22.815574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 22.816228] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.816888] [ 22.817030] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.817052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.817059] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.817067] Call trace: [ 22.817072] show_stack+0x20/0x38 (C) [ 22.817085] dump_stack_lvl+0x8c/0xd0 [ 22.817098] print_report+0x118/0x608 [ 22.817111] kasan_report+0xdc/0x128 [ 22.817124] kasan_check_range+0x100/0x1a8 [ 22.817138] __kasan_check_write+0x20/0x30 [ 22.817153] kasan_atomics_helper+0x760/0x4858 [ 22.817166] kasan_atomics+0x198/0x2e0 [ 22.817178] kunit_try_run_case+0x170/0x3f0 [ 22.817193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.817210] kthread+0x328/0x630 [ 22.817225] ret_from_fork+0x10/0x20 [ 22.817240] [ 22.823384] Allocated by task 323: [ 22.823692] kasan_save_stack+0x3c/0x68 [ 22.824043] kasan_save_track+0x20/0x40 [ 22.824393] kasan_save_alloc_info+0x40/0x58 [ 22.824783] __kasan_kmalloc+0xd4/0xd8 [ 22.825125] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.825540] kasan_atomics+0xb8/0x2e0 [ 22.825874] kunit_try_run_case+0x170/0x3f0 [ 22.826257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.826754] kthread+0x328/0x630 [ 22.827054] ret_from_fork+0x10/0x20 [ 22.827383] [ 22.827523] The buggy address belongs to the object at ffff00000ea09200 [ 22.827523] which belongs to the cache kmalloc-64 of size 64 [ 22.828613] The buggy address is located 0 bytes to the right of [ 22.828613] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.829749] [ 22.829891] The buggy address belongs to the physical page: [ 22.830389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.831087] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.831672] page_type: f5(slab) [ 22.831960] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.832651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.833339] page dumped because: kasan: bad access detected [ 22.833836] [ 22.833976] Memory state around the buggy address: [ 22.834405] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.835049] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.835692] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.836334] ^ [ 22.836764] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.837408] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.838050] ================================================================== [ 23.213418] ================================================================== [ 23.214057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 23.214711] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.215356] [ 23.215495] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.215509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.215513] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.215518] Call trace: [ 23.215521] show_stack+0x20/0x38 (C) [ 23.215530] dump_stack_lvl+0x8c/0xd0 [ 23.215539] print_report+0x118/0x608 [ 23.215548] kasan_report+0xdc/0x128 [ 23.215556] __asan_report_load4_noabort+0x20/0x30 [ 23.215566] kasan_atomics_helper+0x3e04/0x4858 [ 23.215575] kasan_atomics+0x198/0x2e0 [ 23.215583] kunit_try_run_case+0x170/0x3f0 [ 23.215593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.215605] kthread+0x328/0x630 [ 23.215615] ret_from_fork+0x10/0x20 [ 23.215625] [ 23.221456] Allocated by task 323: [ 23.221760] kasan_save_stack+0x3c/0x68 [ 23.222104] kasan_save_track+0x20/0x40 [ 23.222449] kasan_save_alloc_info+0x40/0x58 [ 23.222832] __kasan_kmalloc+0xd4/0xd8 [ 23.223169] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.223577] kasan_atomics+0xb8/0x2e0 [ 23.223906] kunit_try_run_case+0x170/0x3f0 [ 23.224282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.224772] kthread+0x328/0x630 [ 23.225064] ret_from_fork+0x10/0x20 [ 23.225387] [ 23.225523] The buggy address belongs to the object at ffff00000ea09200 [ 23.225523] which belongs to the cache kmalloc-64 of size 64 [ 23.226606] The buggy address is located 0 bytes to the right of [ 23.226606] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.227735] [ 23.227873] The buggy address belongs to the physical page: [ 23.228364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.229056] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.229635] page_type: f5(slab) [ 23.229918] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.230602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.231283] page dumped because: kasan: bad access detected [ 23.231775] [ 23.231911] Memory state around the buggy address: [ 23.232336] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.232973] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.233610] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.234246] ^ [ 23.234671] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.235307] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.235943] ================================================================== [ 23.752658] ================================================================== [ 23.753295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 23.753948] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.754594] [ 23.754732] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.754746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.754751] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.754755] Call trace: [ 23.754759] show_stack+0x20/0x38 (C) [ 23.754768] dump_stack_lvl+0x8c/0xd0 [ 23.754776] print_report+0x118/0x608 [ 23.754784] kasan_report+0xdc/0x128 [ 23.754793] __asan_report_load8_noabort+0x20/0x30 [ 23.754803] kasan_atomics_helper+0x3db0/0x4858 [ 23.754812] kasan_atomics+0x198/0x2e0 [ 23.754820] kunit_try_run_case+0x170/0x3f0 [ 23.754830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.754842] kthread+0x328/0x630 [ 23.754852] ret_from_fork+0x10/0x20 [ 23.754861] [ 23.760691] Allocated by task 323: [ 23.760995] kasan_save_stack+0x3c/0x68 [ 23.761341] kasan_save_track+0x20/0x40 [ 23.761685] kasan_save_alloc_info+0x40/0x58 [ 23.762067] __kasan_kmalloc+0xd4/0xd8 [ 23.762405] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.762812] kasan_atomics+0xb8/0x2e0 [ 23.763140] kunit_try_run_case+0x170/0x3f0 [ 23.763516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.764007] kthread+0x328/0x630 [ 23.764299] ret_from_fork+0x10/0x20 [ 23.764622] [ 23.764760] The buggy address belongs to the object at ffff00000ea09200 [ 23.764760] which belongs to the cache kmalloc-64 of size 64 [ 23.765842] The buggy address is located 0 bytes to the right of [ 23.765842] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.766972] [ 23.767109] The buggy address belongs to the physical page: [ 23.767600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.768291] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.768869] page_type: f5(slab) [ 23.769154] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.769838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.770519] page dumped because: kasan: bad access detected [ 23.771011] [ 23.771148] Memory state around the buggy address: [ 23.771574] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.772210] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.772847] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.773483] ^ [ 23.773908] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.774546] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.775182] ================================================================== [ 23.353479] ================================================================== [ 23.354115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 23.354760] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.355414] [ 23.355552] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.355567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.355571] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.355576] Call trace: [ 23.355579] show_stack+0x20/0x38 (C) [ 23.355588] dump_stack_lvl+0x8c/0xd0 [ 23.355597] print_report+0x118/0x608 [ 23.355605] kasan_report+0xdc/0x128 [ 23.355614] kasan_check_range+0x100/0x1a8 [ 23.355622] __kasan_check_write+0x20/0x30 [ 23.355632] kasan_atomics_helper+0xf20/0x4858 [ 23.355641] kasan_atomics+0x198/0x2e0 [ 23.355648] kunit_try_run_case+0x170/0x3f0 [ 23.355659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.355671] kthread+0x328/0x630 [ 23.355681] ret_from_fork+0x10/0x20 [ 23.355690] [ 23.361813] Allocated by task 323: [ 23.362118] kasan_save_stack+0x3c/0x68 [ 23.362463] kasan_save_track+0x20/0x40 [ 23.362806] kasan_save_alloc_info+0x40/0x58 [ 23.363189] __kasan_kmalloc+0xd4/0xd8 [ 23.363526] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.363933] kasan_atomics+0xb8/0x2e0 [ 23.364262] kunit_try_run_case+0x170/0x3f0 [ 23.364637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.365128] kthread+0x328/0x630 [ 23.365421] ret_from_fork+0x10/0x20 [ 23.365743] [ 23.365881] The buggy address belongs to the object at ffff00000ea09200 [ 23.365881] which belongs to the cache kmalloc-64 of size 64 [ 23.366964] The buggy address is located 0 bytes to the right of [ 23.366964] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.368093] [ 23.368230] The buggy address belongs to the physical page: [ 23.368722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.369412] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.369990] page_type: f5(slab) [ 23.370274] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.370958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.371640] page dumped because: kasan: bad access detected [ 23.372132] [ 23.372269] Memory state around the buggy address: [ 23.372693] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.373330] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.373966] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.374603] ^ [ 23.375029] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.375666] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.376303] ================================================================== [ 22.427702] ================================================================== [ 22.428388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 22.429083] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.429768] [ 22.429936] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.429988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.430003] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.430021] Call trace: [ 22.430035] show_stack+0x20/0x38 (C) [ 22.430068] dump_stack_lvl+0x8c/0xd0 [ 22.430100] print_report+0x118/0x608 [ 22.430133] kasan_report+0xdc/0x128 [ 22.430163] __asan_report_store4_noabort+0x20/0x30 [ 22.430199] kasan_atomics_helper+0x3f7c/0x4858 [ 22.430230] kasan_atomics+0x198/0x2e0 [ 22.430257] kunit_try_run_case+0x170/0x3f0 [ 22.430294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.430335] kthread+0x328/0x630 [ 22.430370] ret_from_fork+0x10/0x20 [ 22.430404] [ 22.436361] Allocated by task 323: [ 22.436690] kasan_save_stack+0x3c/0x68 [ 22.437065] kasan_save_track+0x20/0x40 [ 22.437439] kasan_save_alloc_info+0x40/0x58 [ 22.437854] __kasan_kmalloc+0xd4/0xd8 [ 22.438218] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.438659] kasan_atomics+0xb8/0x2e0 [ 22.439016] kunit_try_run_case+0x170/0x3f0 [ 22.439424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.439951] kthread+0x328/0x630 [ 22.440275] ret_from_fork+0x10/0x20 [ 22.440626] [ 22.440781] The buggy address belongs to the object at ffff00000ea09200 [ 22.440781] which belongs to the cache kmalloc-64 of size 64 [ 22.441900] The buggy address is located 0 bytes to the right of [ 22.441900] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.443067] [ 22.443223] The buggy address belongs to the physical page: [ 22.443740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.444465] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.445078] page_type: f5(slab) [ 22.445393] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.446111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.446820] page dumped because: kasan: bad access detected [ 22.447336] [ 22.447490] Memory state around the buggy address: [ 22.447939] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.448608] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.449276] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.449939] ^ [ 22.450388] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.451056] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.451719] ================================================================== [ 22.719496] ================================================================== [ 22.720140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 22.720793] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.721452] [ 22.721595] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.721616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.721623] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.721630] Call trace: [ 22.721635] show_stack+0x20/0x38 (C) [ 22.721649] dump_stack_lvl+0x8c/0xd0 [ 22.721662] print_report+0x118/0x608 [ 22.721675] kasan_report+0xdc/0x128 [ 22.721687] kasan_check_range+0x100/0x1a8 [ 22.721701] __kasan_check_write+0x20/0x30 [ 22.721716] kasan_atomics_helper+0x5b4/0x4858 [ 22.721728] kasan_atomics+0x198/0x2e0 [ 22.721741] kunit_try_run_case+0x170/0x3f0 [ 22.721756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.721773] kthread+0x328/0x630 [ 22.721788] ret_from_fork+0x10/0x20 [ 22.721803] [ 22.727949] Allocated by task 323: [ 22.728258] kasan_save_stack+0x3c/0x68 [ 22.728609] kasan_save_track+0x20/0x40 [ 22.728959] kasan_save_alloc_info+0x40/0x58 [ 22.729349] __kasan_kmalloc+0xd4/0xd8 [ 22.729691] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.730106] kasan_atomics+0xb8/0x2e0 [ 22.730441] kunit_try_run_case+0x170/0x3f0 [ 22.730824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.731321] kthread+0x328/0x630 [ 22.731621] ret_from_fork+0x10/0x20 [ 22.731950] [ 22.732090] The buggy address belongs to the object at ffff00000ea09200 [ 22.732090] which belongs to the cache kmalloc-64 of size 64 [ 22.733180] The buggy address is located 0 bytes to the right of [ 22.733180] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.734317] [ 22.734457] The buggy address belongs to the physical page: [ 22.734954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.735652] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.736237] page_type: f5(slab) [ 22.736528] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.737218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.737904] page dumped because: kasan: bad access detected [ 22.738402] [ 22.738542] Memory state around the buggy address: [ 22.738972] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.739615] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.740259] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.740901] ^ [ 22.741331] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.741974] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.742616] ================================================================== [ 23.846081] ================================================================== [ 23.846719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 23.847372] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.848018] [ 23.848156] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.848170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.848175] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.848179] Call trace: [ 23.848183] show_stack+0x20/0x38 (C) [ 23.848192] dump_stack_lvl+0x8c/0xd0 [ 23.848201] print_report+0x118/0x608 [ 23.848210] kasan_report+0xdc/0x128 [ 23.848218] __asan_report_load8_noabort+0x20/0x30 [ 23.848229] kasan_atomics_helper+0x3e10/0x4858 [ 23.848237] kasan_atomics+0x198/0x2e0 [ 23.848245] kunit_try_run_case+0x170/0x3f0 [ 23.848255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.848267] kthread+0x328/0x630 [ 23.848277] ret_from_fork+0x10/0x20 [ 23.848287] [ 23.854112] Allocated by task 323: [ 23.854415] kasan_save_stack+0x3c/0x68 [ 23.854760] kasan_save_track+0x20/0x40 [ 23.855104] kasan_save_alloc_info+0x40/0x58 [ 23.855487] __kasan_kmalloc+0xd4/0xd8 [ 23.855824] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.856231] kasan_atomics+0xb8/0x2e0 [ 23.856560] kunit_try_run_case+0x170/0x3f0 [ 23.856937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.857427] kthread+0x328/0x630 [ 23.857721] ret_from_fork+0x10/0x20 [ 23.858043] [ 23.858181] The buggy address belongs to the object at ffff00000ea09200 [ 23.858181] which belongs to the cache kmalloc-64 of size 64 [ 23.859265] The buggy address is located 0 bytes to the right of [ 23.859265] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.860395] [ 23.860531] The buggy address belongs to the physical page: [ 23.861023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.861715] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.862294] page_type: f5(slab) [ 23.862578] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.863262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.863944] page dumped because: kasan: bad access detected [ 23.864436] [ 23.864573] Memory state around the buggy address: [ 23.864998] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.865635] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.866272] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.866909] ^ [ 23.867335] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.867972] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.868609] ================================================================== [ 23.799355] ================================================================== [ 23.799993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 23.800647] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.801293] [ 23.801432] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.801446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.801450] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.801455] Call trace: [ 23.801458] show_stack+0x20/0x38 (C) [ 23.801468] dump_stack_lvl+0x8c/0xd0 [ 23.801476] print_report+0x118/0x608 [ 23.801485] kasan_report+0xdc/0x128 [ 23.801493] __asan_report_load8_noabort+0x20/0x30 [ 23.801504] kasan_atomics_helper+0x3df4/0x4858 [ 23.801512] kasan_atomics+0x198/0x2e0 [ 23.801520] kunit_try_run_case+0x170/0x3f0 [ 23.801531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.801543] kthread+0x328/0x630 [ 23.801553] ret_from_fork+0x10/0x20 [ 23.801563] [ 23.807390] Allocated by task 323: [ 23.807694] kasan_save_stack+0x3c/0x68 [ 23.808039] kasan_save_track+0x20/0x40 [ 23.808382] kasan_save_alloc_info+0x40/0x58 [ 23.808765] __kasan_kmalloc+0xd4/0xd8 [ 23.809102] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.809509] kasan_atomics+0xb8/0x2e0 [ 23.809838] kunit_try_run_case+0x170/0x3f0 [ 23.810213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.810703] kthread+0x328/0x630 [ 23.810996] ret_from_fork+0x10/0x20 [ 23.811318] [ 23.811455] The buggy address belongs to the object at ffff00000ea09200 [ 23.811455] which belongs to the cache kmalloc-64 of size 64 [ 23.812538] The buggy address is located 0 bytes to the right of [ 23.812538] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.813667] [ 23.813804] The buggy address belongs to the physical page: [ 23.814296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.814988] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.815565] page_type: f5(slab) [ 23.815850] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.816532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.817214] page dumped because: kasan: bad access detected [ 23.817706] [ 23.817843] Memory state around the buggy address: [ 23.818268] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.818907] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.819546] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.820181] ^ [ 23.820607] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.821244] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.821880] ================================================================== [ 23.915986] ================================================================== [ 23.916623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 23.917277] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.917931] [ 23.918069] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.918084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.918088] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.918093] Call trace: [ 23.918096] show_stack+0x20/0x38 (C) [ 23.918105] dump_stack_lvl+0x8c/0xd0 [ 23.918114] print_report+0x118/0x608 [ 23.918123] kasan_report+0xdc/0x128 [ 23.918132] kasan_check_range+0x100/0x1a8 [ 23.918141] __kasan_check_write+0x20/0x30 [ 23.918150] kasan_atomics_helper+0x17ec/0x4858 [ 23.918159] kasan_atomics+0x198/0x2e0 [ 23.918166] kunit_try_run_case+0x170/0x3f0 [ 23.918178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.918190] kthread+0x328/0x630 [ 23.918200] ret_from_fork+0x10/0x20 [ 23.918209] [ 23.924336] Allocated by task 323: [ 23.924641] kasan_save_stack+0x3c/0x68 [ 23.924985] kasan_save_track+0x20/0x40 [ 23.925329] kasan_save_alloc_info+0x40/0x58 [ 23.925711] __kasan_kmalloc+0xd4/0xd8 [ 23.926048] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.926456] kasan_atomics+0xb8/0x2e0 [ 23.926785] kunit_try_run_case+0x170/0x3f0 [ 23.927160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.927651] kthread+0x328/0x630 [ 23.927944] ret_from_fork+0x10/0x20 [ 23.928266] [ 23.928403] The buggy address belongs to the object at ffff00000ea09200 [ 23.928403] which belongs to the cache kmalloc-64 of size 64 [ 23.929485] The buggy address is located 0 bytes to the right of [ 23.929485] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.930615] [ 23.930751] The buggy address belongs to the physical page: [ 23.931243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.931935] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.932514] page_type: f5(slab) [ 23.932799] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.933482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.934164] page dumped because: kasan: bad access detected [ 23.934657] [ 23.934793] Memory state around the buggy address: [ 23.935219] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.935856] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.936493] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.937129] ^ [ 23.937553] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.938190] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.938826] ================================================================== [ 22.623537] ================================================================== [ 22.624194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 22.624857] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.625526] [ 22.625675] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.625707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.625717] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.625727] Call trace: [ 22.625735] show_stack+0x20/0x38 (C) [ 22.625755] dump_stack_lvl+0x8c/0xd0 [ 22.625775] print_report+0x118/0x608 [ 22.625794] kasan_report+0xdc/0x128 [ 22.625812] kasan_check_range+0x100/0x1a8 [ 22.625832] __kasan_check_write+0x20/0x30 [ 22.625854] kasan_atomics_helper+0x414/0x4858 [ 22.625873] kasan_atomics+0x198/0x2e0 [ 22.625890] kunit_try_run_case+0x170/0x3f0 [ 22.625913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.625940] kthread+0x328/0x630 [ 22.625962] ret_from_fork+0x10/0x20 [ 22.625984] [ 22.632166] Allocated by task 323: [ 22.632482] kasan_save_stack+0x3c/0x68 [ 22.632842] kasan_save_track+0x20/0x40 [ 22.633200] kasan_save_alloc_info+0x40/0x58 [ 22.633598] __kasan_kmalloc+0xd4/0xd8 [ 22.633949] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.634376] kasan_atomics+0xb8/0x2e0 [ 22.634718] kunit_try_run_case+0x170/0x3f0 [ 22.635109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.635618] kthread+0x328/0x630 [ 22.635927] ret_from_fork+0x10/0x20 [ 22.636266] [ 22.636411] The buggy address belongs to the object at ffff00000ea09200 [ 22.636411] which belongs to the cache kmalloc-64 of size 64 [ 22.637512] The buggy address is located 0 bytes to the right of [ 22.637512] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.638660] [ 22.638806] The buggy address belongs to the physical page: [ 22.639311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.640019] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.640612] page_type: f5(slab) [ 22.640910] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.641610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.642305] page dumped because: kasan: bad access detected [ 22.642809] [ 22.642955] Memory state around the buggy address: [ 22.643393] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.644046] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.644698] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.645348] ^ [ 22.645786] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.646438] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.647088] ================================================================== [ 22.526768] ================================================================== [ 22.527421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 22.528092] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.528754] [ 22.528904] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.528937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.528946] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.528958] Call trace: [ 22.528965] show_stack+0x20/0x38 (C) [ 22.528986] dump_stack_lvl+0x8c/0xd0 [ 22.529005] print_report+0x118/0x608 [ 22.529024] kasan_report+0xdc/0x128 [ 22.529042] __asan_report_load4_noabort+0x20/0x30 [ 22.529065] kasan_atomics_helper+0x40fc/0x4858 [ 22.529084] kasan_atomics+0x198/0x2e0 [ 22.529102] kunit_try_run_case+0x170/0x3f0 [ 22.529125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.529151] kthread+0x328/0x630 [ 22.529173] ret_from_fork+0x10/0x20 [ 22.529193] [ 22.535082] Allocated by task 323: [ 22.535398] kasan_save_stack+0x3c/0x68 [ 22.535757] kasan_save_track+0x20/0x40 [ 22.536116] kasan_save_alloc_info+0x40/0x58 [ 22.536514] __kasan_kmalloc+0xd4/0xd8 [ 22.536864] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.537290] kasan_atomics+0xb8/0x2e0 [ 22.537631] kunit_try_run_case+0x170/0x3f0 [ 22.538024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.538532] kthread+0x328/0x630 [ 22.538841] ret_from_fork+0x10/0x20 [ 22.539178] [ 22.539325] The buggy address belongs to the object at ffff00000ea09200 [ 22.539325] which belongs to the cache kmalloc-64 of size 64 [ 22.540426] The buggy address is located 0 bytes to the right of [ 22.540426] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.541575] [ 22.541721] The buggy address belongs to the physical page: [ 22.542224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.542931] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.543526] page_type: f5(slab) [ 22.543824] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.544524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.545220] page dumped because: kasan: bad access detected [ 22.545723] [ 22.545868] Memory state around the buggy address: [ 22.546305] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.546958] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.547611] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.548260] ^ [ 22.548698] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.549350] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.550000] ================================================================== [ 23.283297] ================================================================== [ 23.283934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 23.284579] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.285232] [ 23.285371] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.285385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.285389] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.285394] Call trace: [ 23.285397] show_stack+0x20/0x38 (C) [ 23.285406] dump_stack_lvl+0x8c/0xd0 [ 23.285415] print_report+0x118/0x608 [ 23.285424] kasan_report+0xdc/0x128 [ 23.285432] kasan_check_range+0x100/0x1a8 [ 23.285441] __kasan_check_write+0x20/0x30 [ 23.285451] kasan_atomics_helper+0xe44/0x4858 [ 23.285460] kasan_atomics+0x198/0x2e0 [ 23.285467] kunit_try_run_case+0x170/0x3f0 [ 23.285478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.285489] kthread+0x328/0x630 [ 23.285499] ret_from_fork+0x10/0x20 [ 23.285509] [ 23.291630] Allocated by task 323: [ 23.291934] kasan_save_stack+0x3c/0x68 [ 23.292278] kasan_save_track+0x20/0x40 [ 23.292622] kasan_save_alloc_info+0x40/0x58 [ 23.293004] __kasan_kmalloc+0xd4/0xd8 [ 23.293342] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.293748] kasan_atomics+0xb8/0x2e0 [ 23.294077] kunit_try_run_case+0x170/0x3f0 [ 23.294454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.294943] kthread+0x328/0x630 [ 23.295236] ret_from_fork+0x10/0x20 [ 23.295558] [ 23.295695] The buggy address belongs to the object at ffff00000ea09200 [ 23.295695] which belongs to the cache kmalloc-64 of size 64 [ 23.296778] The buggy address is located 0 bytes to the right of [ 23.296778] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.297907] [ 23.298044] The buggy address belongs to the physical page: [ 23.298537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.299228] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.299806] page_type: f5(slab) [ 23.300089] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.300773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.301455] page dumped because: kasan: bad access detected [ 23.301947] [ 23.302084] Memory state around the buggy address: [ 23.302509] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.303146] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.303783] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.304419] ^ [ 23.304845] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.305483] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.306119] ================================================================== [ 23.306770] ================================================================== [ 23.307407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 23.308060] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.308714] [ 23.308851] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.308866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.308870] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.308875] Call trace: [ 23.308878] show_stack+0x20/0x38 (C) [ 23.308887] dump_stack_lvl+0x8c/0xd0 [ 23.308896] print_report+0x118/0x608 [ 23.308905] kasan_report+0xdc/0x128 [ 23.308913] __asan_report_store8_noabort+0x20/0x30 [ 23.308923] kasan_atomics_helper+0x3e5c/0x4858 [ 23.308932] kasan_atomics+0x198/0x2e0 [ 23.308940] kunit_try_run_case+0x170/0x3f0 [ 23.308950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.308961] kthread+0x328/0x630 [ 23.308971] ret_from_fork+0x10/0x20 [ 23.308981] [ 23.314818] Allocated by task 323: [ 23.315123] kasan_save_stack+0x3c/0x68 [ 23.315467] kasan_save_track+0x20/0x40 [ 23.315811] kasan_save_alloc_info+0x40/0x58 [ 23.316194] __kasan_kmalloc+0xd4/0xd8 [ 23.316531] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.316939] kasan_atomics+0xb8/0x2e0 [ 23.317268] kunit_try_run_case+0x170/0x3f0 [ 23.317643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.318133] kthread+0x328/0x630 [ 23.318426] ret_from_fork+0x10/0x20 [ 23.318748] [ 23.318886] The buggy address belongs to the object at ffff00000ea09200 [ 23.318886] which belongs to the cache kmalloc-64 of size 64 [ 23.319969] The buggy address is located 0 bytes to the right of [ 23.319969] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.321098] [ 23.321235] The buggy address belongs to the physical page: [ 23.321727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.322419] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.322997] page_type: f5(slab) [ 23.323282] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.323966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.324648] page dumped because: kasan: bad access detected [ 23.325139] [ 23.325276] Memory state around the buggy address: [ 23.325701] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.326340] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.326978] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.327614] ^ [ 23.328039] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.328678] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.329313] ================================================================== [ 23.376955] ================================================================== [ 23.377591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 23.378237] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.378890] [ 23.379028] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.379042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.379046] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.379051] Call trace: [ 23.379054] show_stack+0x20/0x38 (C) [ 23.379063] dump_stack_lvl+0x8c/0xd0 [ 23.379072] print_report+0x118/0x608 [ 23.379081] kasan_report+0xdc/0x128 [ 23.379089] kasan_check_range+0x100/0x1a8 [ 23.379099] __kasan_check_write+0x20/0x30 [ 23.379108] kasan_atomics_helper+0xf88/0x4858 [ 23.379117] kasan_atomics+0x198/0x2e0 [ 23.379124] kunit_try_run_case+0x170/0x3f0 [ 23.379135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.379146] kthread+0x328/0x630 [ 23.379156] ret_from_fork+0x10/0x20 [ 23.379166] [ 23.385289] Allocated by task 323: [ 23.385594] kasan_save_stack+0x3c/0x68 [ 23.385938] kasan_save_track+0x20/0x40 [ 23.386282] kasan_save_alloc_info+0x40/0x58 [ 23.386665] __kasan_kmalloc+0xd4/0xd8 [ 23.387002] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.387409] kasan_atomics+0xb8/0x2e0 [ 23.387738] kunit_try_run_case+0x170/0x3f0 [ 23.388113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.388602] kthread+0x328/0x630 [ 23.388896] ret_from_fork+0x10/0x20 [ 23.389218] [ 23.389356] The buggy address belongs to the object at ffff00000ea09200 [ 23.389356] which belongs to the cache kmalloc-64 of size 64 [ 23.390438] The buggy address is located 0 bytes to the right of [ 23.390438] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.391568] [ 23.391705] The buggy address belongs to the physical page: [ 23.392196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.392887] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.393465] page_type: f5(slab) [ 23.393749] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.394433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.395115] page dumped because: kasan: bad access detected [ 23.395607] [ 23.395745] Memory state around the buggy address: [ 23.396170] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.396807] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.397446] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.398083] ^ [ 23.398508] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.399145] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.399781] ================================================================== [ 23.822556] ================================================================== [ 23.823194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 23.823847] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.824501] [ 23.824640] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.824655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.824659] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.824664] Call trace: [ 23.824667] show_stack+0x20/0x38 (C) [ 23.824676] dump_stack_lvl+0x8c/0xd0 [ 23.824685] print_report+0x118/0x608 [ 23.824694] kasan_report+0xdc/0x128 [ 23.824702] kasan_check_range+0x100/0x1a8 [ 23.824712] __kasan_check_write+0x20/0x30 [ 23.824721] kasan_atomics_helper+0x16d0/0x4858 [ 23.824730] kasan_atomics+0x198/0x2e0 [ 23.824738] kunit_try_run_case+0x170/0x3f0 [ 23.824748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.824760] kthread+0x328/0x630 [ 23.824770] ret_from_fork+0x10/0x20 [ 23.824779] [ 23.830906] Allocated by task 323: [ 23.831210] kasan_save_stack+0x3c/0x68 [ 23.831554] kasan_save_track+0x20/0x40 [ 23.831897] kasan_save_alloc_info+0x40/0x58 [ 23.832280] __kasan_kmalloc+0xd4/0xd8 [ 23.832617] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.833024] kasan_atomics+0xb8/0x2e0 [ 23.833353] kunit_try_run_case+0x170/0x3f0 [ 23.833729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.834220] kthread+0x328/0x630 [ 23.834513] ret_from_fork+0x10/0x20 [ 23.834835] [ 23.834971] The buggy address belongs to the object at ffff00000ea09200 [ 23.834971] which belongs to the cache kmalloc-64 of size 64 [ 23.836054] The buggy address is located 0 bytes to the right of [ 23.836054] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.837183] [ 23.837320] The buggy address belongs to the physical page: [ 23.837813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.838505] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.839084] page_type: f5(slab) [ 23.839368] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.840052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.840734] page dumped because: kasan: bad access detected [ 23.841226] [ 23.841362] Memory state around the buggy address: [ 23.841788] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.842424] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.843062] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.843699] ^ [ 23.844125] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.844763] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.845399] ================================================================== [ 22.767203] ================================================================== [ 22.767847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 22.768498] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.769158] [ 22.769301] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.769323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.769329] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.769336] Call trace: [ 22.769341] show_stack+0x20/0x38 (C) [ 22.769355] dump_stack_lvl+0x8c/0xd0 [ 22.769368] print_report+0x118/0x608 [ 22.769381] kasan_report+0xdc/0x128 [ 22.769394] kasan_check_range+0x100/0x1a8 [ 22.769408] __kasan_check_write+0x20/0x30 [ 22.769422] kasan_atomics_helper+0x684/0x4858 [ 22.769435] kasan_atomics+0x198/0x2e0 [ 22.769447] kunit_try_run_case+0x170/0x3f0 [ 22.769463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.769480] kthread+0x328/0x630 [ 22.769495] ret_from_fork+0x10/0x20 [ 22.769510] [ 22.775656] Allocated by task 323: [ 22.775965] kasan_save_stack+0x3c/0x68 [ 22.776316] kasan_save_track+0x20/0x40 [ 22.776667] kasan_save_alloc_info+0x40/0x58 [ 22.777057] __kasan_kmalloc+0xd4/0xd8 [ 22.777398] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.777815] kasan_atomics+0xb8/0x2e0 [ 22.778149] kunit_try_run_case+0x170/0x3f0 [ 22.778532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.779029] kthread+0x328/0x630 [ 22.779329] ret_from_fork+0x10/0x20 [ 22.779658] [ 22.779798] The buggy address belongs to the object at ffff00000ea09200 [ 22.779798] which belongs to the cache kmalloc-64 of size 64 [ 22.780888] The buggy address is located 0 bytes to the right of [ 22.780888] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.782024] [ 22.782165] The buggy address belongs to the physical page: [ 22.782661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.783359] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.783945] page_type: f5(slab) [ 22.784235] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.784925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.785611] page dumped because: kasan: bad access detected [ 22.786109] [ 22.786249] Memory state around the buggy address: [ 22.786679] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.787322] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.787966] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.788608] ^ [ 22.789038] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.789681] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.790323] ================================================================== [ 23.517978] ================================================================== [ 23.518616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 23.519269] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.519923] [ 23.520061] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.520075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.520079] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.520084] Call trace: [ 23.520088] show_stack+0x20/0x38 (C) [ 23.520097] dump_stack_lvl+0x8c/0xd0 [ 23.520105] print_report+0x118/0x608 [ 23.520114] kasan_report+0xdc/0x128 [ 23.520122] kasan_check_range+0x100/0x1a8 [ 23.520131] __kasan_check_write+0x20/0x30 [ 23.520141] kasan_atomics_helper+0x11f8/0x4858 [ 23.520150] kasan_atomics+0x198/0x2e0 [ 23.520158] kunit_try_run_case+0x170/0x3f0 [ 23.520168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.520179] kthread+0x328/0x630 [ 23.520189] ret_from_fork+0x10/0x20 [ 23.520198] [ 23.526326] Allocated by task 323: [ 23.526631] kasan_save_stack+0x3c/0x68 [ 23.526975] kasan_save_track+0x20/0x40 [ 23.527320] kasan_save_alloc_info+0x40/0x58 [ 23.527702] __kasan_kmalloc+0xd4/0xd8 [ 23.528039] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.528446] kasan_atomics+0xb8/0x2e0 [ 23.528775] kunit_try_run_case+0x170/0x3f0 [ 23.529151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.529641] kthread+0x328/0x630 [ 23.529934] ret_from_fork+0x10/0x20 [ 23.530257] [ 23.530393] The buggy address belongs to the object at ffff00000ea09200 [ 23.530393] which belongs to the cache kmalloc-64 of size 64 [ 23.531475] The buggy address is located 0 bytes to the right of [ 23.531475] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.532605] [ 23.532742] The buggy address belongs to the physical page: [ 23.533233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.533925] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.534503] page_type: f5(slab) [ 23.534788] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.535472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.536154] page dumped because: kasan: bad access detected [ 23.536646] [ 23.536782] Memory state around the buggy address: [ 23.537208] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.537844] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.538481] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.539117] ^ [ 23.539543] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.540181] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.540817] ================================================================== [ 22.885851] ================================================================== [ 22.886488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 22.887141] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.887787] [ 22.887925] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.887939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.887944] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.887948] Call trace: [ 22.887952] show_stack+0x20/0x38 (C) [ 22.887961] dump_stack_lvl+0x8c/0xd0 [ 22.887970] print_report+0x118/0x608 [ 22.887978] kasan_report+0xdc/0x128 [ 22.887987] __asan_report_load4_noabort+0x20/0x30 [ 22.887997] kasan_atomics_helper+0x42d8/0x4858 [ 22.888005] kasan_atomics+0x198/0x2e0 [ 22.888013] kunit_try_run_case+0x170/0x3f0 [ 22.888024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.888035] kthread+0x328/0x630 [ 22.888045] ret_from_fork+0x10/0x20 [ 22.888055] [ 22.893887] Allocated by task 323: [ 22.894192] kasan_save_stack+0x3c/0x68 [ 22.894536] kasan_save_track+0x20/0x40 [ 22.894880] kasan_save_alloc_info+0x40/0x58 [ 22.895262] __kasan_kmalloc+0xd4/0xd8 [ 22.895598] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.896005] kasan_atomics+0xb8/0x2e0 [ 22.896334] kunit_try_run_case+0x170/0x3f0 [ 22.896710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.897200] kthread+0x328/0x630 [ 22.897493] ret_from_fork+0x10/0x20 [ 22.897816] [ 22.897952] The buggy address belongs to the object at ffff00000ea09200 [ 22.897952] which belongs to the cache kmalloc-64 of size 64 [ 22.899035] The buggy address is located 0 bytes to the right of [ 22.899035] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.900163] [ 22.900300] The buggy address belongs to the physical page: [ 22.900792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.901484] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.902061] page_type: f5(slab) [ 22.902346] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.903030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.903711] page dumped because: kasan: bad access detected [ 22.904203] [ 22.904340] Memory state around the buggy address: [ 22.904764] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.905400] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.906038] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.906673] ^ [ 22.907099] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.907736] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.908372] ================================================================== [ 23.611997] ================================================================== [ 23.612635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 23.613289] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.613935] [ 23.614073] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.614087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.614091] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.614096] Call trace: [ 23.614100] show_stack+0x20/0x38 (C) [ 23.614108] dump_stack_lvl+0x8c/0xd0 [ 23.614117] print_report+0x118/0x608 [ 23.614126] kasan_report+0xdc/0x128 [ 23.614134] __asan_report_load8_noabort+0x20/0x30 [ 23.614145] kasan_atomics_helper+0x3f04/0x4858 [ 23.614153] kasan_atomics+0x198/0x2e0 [ 23.614161] kunit_try_run_case+0x170/0x3f0 [ 23.614172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.614183] kthread+0x328/0x630 [ 23.614193] ret_from_fork+0x10/0x20 [ 23.614202] [ 23.620032] Allocated by task 323: [ 23.620336] kasan_save_stack+0x3c/0x68 [ 23.620680] kasan_save_track+0x20/0x40 [ 23.621024] kasan_save_alloc_info+0x40/0x58 [ 23.621407] __kasan_kmalloc+0xd4/0xd8 [ 23.621744] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.622151] kasan_atomics+0xb8/0x2e0 [ 23.622480] kunit_try_run_case+0x170/0x3f0 [ 23.622857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.623346] kthread+0x328/0x630 [ 23.623639] ret_from_fork+0x10/0x20 [ 23.623961] [ 23.624098] The buggy address belongs to the object at ffff00000ea09200 [ 23.624098] which belongs to the cache kmalloc-64 of size 64 [ 23.625180] The buggy address is located 0 bytes to the right of [ 23.625180] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.626310] [ 23.626446] The buggy address belongs to the physical page: [ 23.626938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.627629] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.628208] page_type: f5(slab) [ 23.628491] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.629175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.629857] page dumped because: kasan: bad access detected [ 23.630349] [ 23.630487] Memory state around the buggy address: [ 23.630913] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.631549] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.632186] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.632822] ^ [ 23.633248] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.633886] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.634522] ================================================================== [ 23.260109] ================================================================== [ 23.260748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 23.261400] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.262045] [ 23.262184] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.262198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.262202] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.262207] Call trace: [ 23.262210] show_stack+0x20/0x38 (C) [ 23.262219] dump_stack_lvl+0x8c/0xd0 [ 23.262228] print_report+0x118/0x608 [ 23.262236] kasan_report+0xdc/0x128 [ 23.262245] __asan_report_load8_noabort+0x20/0x30 [ 23.262256] kasan_atomics_helper+0x3f58/0x4858 [ 23.262264] kasan_atomics+0x198/0x2e0 [ 23.262272] kunit_try_run_case+0x170/0x3f0 [ 23.262282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.262294] kthread+0x328/0x630 [ 23.262304] ret_from_fork+0x10/0x20 [ 23.262313] [ 23.268147] Allocated by task 323: [ 23.268452] kasan_save_stack+0x3c/0x68 [ 23.268796] kasan_save_track+0x20/0x40 [ 23.269140] kasan_save_alloc_info+0x40/0x58 [ 23.269523] __kasan_kmalloc+0xd4/0xd8 [ 23.269860] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.270268] kasan_atomics+0xb8/0x2e0 [ 23.270597] kunit_try_run_case+0x170/0x3f0 [ 23.270973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.271464] kthread+0x328/0x630 [ 23.271757] ret_from_fork+0x10/0x20 [ 23.272080] [ 23.272216] The buggy address belongs to the object at ffff00000ea09200 [ 23.272216] which belongs to the cache kmalloc-64 of size 64 [ 23.273299] The buggy address is located 0 bytes to the right of [ 23.273299] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.274428] [ 23.274565] The buggy address belongs to the physical page: [ 23.275058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.275749] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.276327] page_type: f5(slab) [ 23.276612] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.277295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.277978] page dumped because: kasan: bad access detected [ 23.278470] [ 23.278606] Memory state around the buggy address: [ 23.279032] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.279670] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.280307] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.280942] ^ [ 23.281367] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.282004] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.282641] ================================================================== [ 23.400442] ================================================================== [ 23.401079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 23.401724] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.402377] [ 23.402515] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.402530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.402534] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.402539] Call trace: [ 23.402542] show_stack+0x20/0x38 (C) [ 23.402551] dump_stack_lvl+0x8c/0xd0 [ 23.402560] print_report+0x118/0x608 [ 23.402568] kasan_report+0xdc/0x128 [ 23.402577] kasan_check_range+0x100/0x1a8 [ 23.402586] __kasan_check_write+0x20/0x30 [ 23.402596] kasan_atomics_helper+0xff0/0x4858 [ 23.402605] kasan_atomics+0x198/0x2e0 [ 23.402612] kunit_try_run_case+0x170/0x3f0 [ 23.402622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.402634] kthread+0x328/0x630 [ 23.402644] ret_from_fork+0x10/0x20 [ 23.402653] [ 23.408776] Allocated by task 323: [ 23.409079] kasan_save_stack+0x3c/0x68 [ 23.409423] kasan_save_track+0x20/0x40 [ 23.409768] kasan_save_alloc_info+0x40/0x58 [ 23.410151] __kasan_kmalloc+0xd4/0xd8 [ 23.410489] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.410895] kasan_atomics+0xb8/0x2e0 [ 23.411224] kunit_try_run_case+0x170/0x3f0 [ 23.411600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.412090] kthread+0x328/0x630 [ 23.412384] ret_from_fork+0x10/0x20 [ 23.412706] [ 23.412843] The buggy address belongs to the object at ffff00000ea09200 [ 23.412843] which belongs to the cache kmalloc-64 of size 64 [ 23.413926] The buggy address is located 0 bytes to the right of [ 23.413926] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.415055] [ 23.415192] The buggy address belongs to the physical page: [ 23.415683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.416375] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.416952] page_type: f5(slab) [ 23.417237] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.417920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.418602] page dumped because: kasan: bad access detected [ 23.419095] [ 23.419232] Memory state around the buggy address: [ 23.419657] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.420294] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.420931] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.421568] ^ [ 23.421994] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.422631] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.423267] ================================================================== [ 23.026463] ================================================================== [ 23.027099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 23.027752] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.028398] [ 23.028537] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.028552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.028556] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.028561] Call trace: [ 23.028564] show_stack+0x20/0x38 (C) [ 23.028573] dump_stack_lvl+0x8c/0xd0 [ 23.028582] print_report+0x118/0x608 [ 23.028591] kasan_report+0xdc/0x128 [ 23.028599] __asan_report_load4_noabort+0x20/0x30 [ 23.028610] kasan_atomics_helper+0x3dcc/0x4858 [ 23.028618] kasan_atomics+0x198/0x2e0 [ 23.028626] kunit_try_run_case+0x170/0x3f0 [ 23.028637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.028649] kthread+0x328/0x630 [ 23.028659] ret_from_fork+0x10/0x20 [ 23.028668] [ 23.034499] Allocated by task 323: [ 23.034804] kasan_save_stack+0x3c/0x68 [ 23.035149] kasan_save_track+0x20/0x40 [ 23.035493] kasan_save_alloc_info+0x40/0x58 [ 23.035876] __kasan_kmalloc+0xd4/0xd8 [ 23.036213] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.036620] kasan_atomics+0xb8/0x2e0 [ 23.036948] kunit_try_run_case+0x170/0x3f0 [ 23.037324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.037815] kthread+0x328/0x630 [ 23.038108] ret_from_fork+0x10/0x20 [ 23.038431] [ 23.038567] The buggy address belongs to the object at ffff00000ea09200 [ 23.038567] which belongs to the cache kmalloc-64 of size 64 [ 23.039650] The buggy address is located 0 bytes to the right of [ 23.039650] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.040780] [ 23.040917] The buggy address belongs to the physical page: [ 23.041408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.042099] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.042676] page_type: f5(slab) [ 23.042959] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.043643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.044325] page dumped because: kasan: bad access detected [ 23.044817] [ 23.044955] Memory state around the buggy address: [ 23.045380] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.046017] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.046653] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.047289] ^ [ 23.047715] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.048353] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.048989] ================================================================== [ 23.423934] ================================================================== [ 23.424571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 23.425224] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.425878] [ 23.426016] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.426030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.426035] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.426040] Call trace: [ 23.426043] show_stack+0x20/0x38 (C) [ 23.426052] dump_stack_lvl+0x8c/0xd0 [ 23.426061] print_report+0x118/0x608 [ 23.426069] kasan_report+0xdc/0x128 [ 23.426078] kasan_check_range+0x100/0x1a8 [ 23.426087] __kasan_check_write+0x20/0x30 [ 23.426097] kasan_atomics_helper+0x1058/0x4858 [ 23.426105] kasan_atomics+0x198/0x2e0 [ 23.426113] kunit_try_run_case+0x170/0x3f0 [ 23.426123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.426135] kthread+0x328/0x630 [ 23.426145] ret_from_fork+0x10/0x20 [ 23.426155] [ 23.432281] Allocated by task 323: [ 23.432586] kasan_save_stack+0x3c/0x68 [ 23.432930] kasan_save_track+0x20/0x40 [ 23.433273] kasan_save_alloc_info+0x40/0x58 [ 23.433656] __kasan_kmalloc+0xd4/0xd8 [ 23.433993] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.434400] kasan_atomics+0xb8/0x2e0 [ 23.434729] kunit_try_run_case+0x170/0x3f0 [ 23.435104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.435594] kthread+0x328/0x630 [ 23.435887] ret_from_fork+0x10/0x20 [ 23.436209] [ 23.436346] The buggy address belongs to the object at ffff00000ea09200 [ 23.436346] which belongs to the cache kmalloc-64 of size 64 [ 23.437429] The buggy address is located 0 bytes to the right of [ 23.437429] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.438558] [ 23.438695] The buggy address belongs to the physical page: [ 23.439186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.439878] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.440457] page_type: f5(slab) [ 23.440740] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.441424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.442105] page dumped because: kasan: bad access detected [ 23.442597] [ 23.442734] Memory state around the buggy address: [ 23.443159] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.443796] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.444433] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.445069] ^ [ 23.445495] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.446132] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.446768] ================================================================== [ 23.564985] ================================================================== [ 23.565623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 23.566276] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.566930] [ 23.567068] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.567082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.567087] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.567092] Call trace: [ 23.567095] show_stack+0x20/0x38 (C) [ 23.567105] dump_stack_lvl+0x8c/0xd0 [ 23.567113] print_report+0x118/0x608 [ 23.567122] kasan_report+0xdc/0x128 [ 23.567130] kasan_check_range+0x100/0x1a8 [ 23.567140] __kasan_check_write+0x20/0x30 [ 23.567149] kasan_atomics_helper+0x12d8/0x4858 [ 23.567158] kasan_atomics+0x198/0x2e0 [ 23.567165] kunit_try_run_case+0x170/0x3f0 [ 23.567176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.567188] kthread+0x328/0x630 [ 23.567198] ret_from_fork+0x10/0x20 [ 23.567207] [ 23.573335] Allocated by task 323: [ 23.573640] kasan_save_stack+0x3c/0x68 [ 23.573983] kasan_save_track+0x20/0x40 [ 23.574327] kasan_save_alloc_info+0x40/0x58 [ 23.574710] __kasan_kmalloc+0xd4/0xd8 [ 23.575047] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.575454] kasan_atomics+0xb8/0x2e0 [ 23.575782] kunit_try_run_case+0x170/0x3f0 [ 23.576158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.576648] kthread+0x328/0x630 [ 23.576940] ret_from_fork+0x10/0x20 [ 23.577262] [ 23.577400] The buggy address belongs to the object at ffff00000ea09200 [ 23.577400] which belongs to the cache kmalloc-64 of size 64 [ 23.578483] The buggy address is located 0 bytes to the right of [ 23.578483] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.579612] [ 23.579749] The buggy address belongs to the physical page: [ 23.580241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.580932] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.581512] page_type: f5(slab) [ 23.581795] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.582479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.583161] page dumped because: kasan: bad access detected [ 23.583653] [ 23.583791] Memory state around the buggy address: [ 23.584216] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.584853] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.585491] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.586127] ^ [ 23.586553] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.587190] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.587828] ================================================================== [ 22.979490] ================================================================== [ 22.980127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 22.980773] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.981427] [ 22.981565] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.981580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.981584] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.981589] Call trace: [ 22.981592] show_stack+0x20/0x38 (C) [ 22.981601] dump_stack_lvl+0x8c/0xd0 [ 22.981610] print_report+0x118/0x608 [ 22.981619] kasan_report+0xdc/0x128 [ 22.981628] kasan_check_range+0x100/0x1a8 [ 22.981637] __kasan_check_write+0x20/0x30 [ 22.981647] kasan_atomics_helper+0xa6c/0x4858 [ 22.981655] kasan_atomics+0x198/0x2e0 [ 22.981663] kunit_try_run_case+0x170/0x3f0 [ 22.981674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.981686] kthread+0x328/0x630 [ 22.981696] ret_from_fork+0x10/0x20 [ 22.981706] [ 22.987831] Allocated by task 323: [ 22.988135] kasan_save_stack+0x3c/0x68 [ 22.988480] kasan_save_track+0x20/0x40 [ 22.988823] kasan_save_alloc_info+0x40/0x58 [ 22.989206] __kasan_kmalloc+0xd4/0xd8 [ 22.989542] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.989949] kasan_atomics+0xb8/0x2e0 [ 22.990279] kunit_try_run_case+0x170/0x3f0 [ 22.990654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.991145] kthread+0x328/0x630 [ 22.991438] ret_from_fork+0x10/0x20 [ 22.991760] [ 22.991897] The buggy address belongs to the object at ffff00000ea09200 [ 22.991897] which belongs to the cache kmalloc-64 of size 64 [ 22.992979] The buggy address is located 0 bytes to the right of [ 22.992979] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.994109] [ 22.994246] The buggy address belongs to the physical page: [ 22.994738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.995429] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.996008] page_type: f5(slab) [ 22.996292] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.996976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.997658] page dumped because: kasan: bad access detected [ 22.998150] [ 22.998287] Memory state around the buggy address: [ 22.998712] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.999350] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.999987] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.000623] ^ [ 23.001049] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.001686] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.002322] ================================================================== [ 23.470955] ================================================================== [ 23.471593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 23.472248] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.472902] [ 23.473040] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.473055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.473059] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.473064] Call trace: [ 23.473067] show_stack+0x20/0x38 (C) [ 23.473077] dump_stack_lvl+0x8c/0xd0 [ 23.473085] print_report+0x118/0x608 [ 23.473094] kasan_report+0xdc/0x128 [ 23.473102] kasan_check_range+0x100/0x1a8 [ 23.473112] __kasan_check_write+0x20/0x30 [ 23.473122] kasan_atomics_helper+0x1128/0x4858 [ 23.473130] kasan_atomics+0x198/0x2e0 [ 23.473138] kunit_try_run_case+0x170/0x3f0 [ 23.473148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.473160] kthread+0x328/0x630 [ 23.473170] ret_from_fork+0x10/0x20 [ 23.473179] [ 23.479312] Allocated by task 323: [ 23.479617] kasan_save_stack+0x3c/0x68 [ 23.479961] kasan_save_track+0x20/0x40 [ 23.480304] kasan_save_alloc_info+0x40/0x58 [ 23.480687] __kasan_kmalloc+0xd4/0xd8 [ 23.481024] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.481432] kasan_atomics+0xb8/0x2e0 [ 23.481760] kunit_try_run_case+0x170/0x3f0 [ 23.482136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.482625] kthread+0x328/0x630 [ 23.482918] ret_from_fork+0x10/0x20 [ 23.483240] [ 23.483377] The buggy address belongs to the object at ffff00000ea09200 [ 23.483377] which belongs to the cache kmalloc-64 of size 64 [ 23.484459] The buggy address is located 0 bytes to the right of [ 23.484459] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.485589] [ 23.485726] The buggy address belongs to the physical page: [ 23.486218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.486910] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.487489] page_type: f5(slab) [ 23.487774] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.488457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.489139] page dumped because: kasan: bad access detected [ 23.489632] [ 23.489769] Memory state around the buggy address: [ 23.490195] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.490832] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.491469] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.492105] ^ [ 23.492530] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.493168] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.493804] ================================================================== [ 22.575161] ================================================================== [ 22.575816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 22.576487] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.577156] [ 22.577306] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.577338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.577347] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.577358] Call trace: [ 22.577366] show_stack+0x20/0x38 (C) [ 22.577386] dump_stack_lvl+0x8c/0xd0 [ 22.577405] print_report+0x118/0x608 [ 22.577424] kasan_report+0xdc/0x128 [ 22.577442] __asan_report_store4_noabort+0x20/0x30 [ 22.577466] kasan_atomics_helper+0x3f94/0x4858 [ 22.577484] kasan_atomics+0x198/0x2e0 [ 22.577502] kunit_try_run_case+0x170/0x3f0 [ 22.577525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.577551] kthread+0x328/0x630 [ 22.577572] ret_from_fork+0x10/0x20 [ 22.577593] [ 22.583486] Allocated by task 323: [ 22.583801] kasan_save_stack+0x3c/0x68 [ 22.584160] kasan_save_track+0x20/0x40 [ 22.584519] kasan_save_alloc_info+0x40/0x58 [ 22.584917] __kasan_kmalloc+0xd4/0xd8 [ 22.585267] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.585693] kasan_atomics+0xb8/0x2e0 [ 22.586035] kunit_try_run_case+0x170/0x3f0 [ 22.586428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.586936] kthread+0x328/0x630 [ 22.587245] ret_from_fork+0x10/0x20 [ 22.587583] [ 22.587728] The buggy address belongs to the object at ffff00000ea09200 [ 22.587728] which belongs to the cache kmalloc-64 of size 64 [ 22.588828] The buggy address is located 0 bytes to the right of [ 22.588828] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.589976] [ 22.590122] The buggy address belongs to the physical page: [ 22.590627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.591335] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.591927] page_type: f5(slab) [ 22.592225] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.592925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.593621] page dumped because: kasan: bad access detected [ 22.594125] [ 22.594270] Memory state around the buggy address: [ 22.594707] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.595360] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.596012] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.596661] ^ [ 22.597098] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.597751] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.598402] ================================================================== [ 23.635174] ================================================================== [ 23.635812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 23.636465] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.637119] [ 23.637256] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.637271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.637275] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.637280] Call trace: [ 23.637283] show_stack+0x20/0x38 (C) [ 23.637292] dump_stack_lvl+0x8c/0xd0 [ 23.637301] print_report+0x118/0x608 [ 23.637310] kasan_report+0xdc/0x128 [ 23.637318] kasan_check_range+0x100/0x1a8 [ 23.637327] __kasan_check_write+0x20/0x30 [ 23.637337] kasan_atomics_helper+0x1414/0x4858 [ 23.637345] kasan_atomics+0x198/0x2e0 [ 23.637353] kunit_try_run_case+0x170/0x3f0 [ 23.637364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.637375] kthread+0x328/0x630 [ 23.637385] ret_from_fork+0x10/0x20 [ 23.637394] [ 23.643524] Allocated by task 323: [ 23.643828] kasan_save_stack+0x3c/0x68 [ 23.644172] kasan_save_track+0x20/0x40 [ 23.644516] kasan_save_alloc_info+0x40/0x58 [ 23.644899] __kasan_kmalloc+0xd4/0xd8 [ 23.645236] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.645644] kasan_atomics+0xb8/0x2e0 [ 23.645973] kunit_try_run_case+0x170/0x3f0 [ 23.646349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.646839] kthread+0x328/0x630 [ 23.647132] ret_from_fork+0x10/0x20 [ 23.647454] [ 23.647592] The buggy address belongs to the object at ffff00000ea09200 [ 23.647592] which belongs to the cache kmalloc-64 of size 64 [ 23.648675] The buggy address is located 0 bytes to the right of [ 23.648675] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.649804] [ 23.649941] The buggy address belongs to the physical page: [ 23.650434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.651125] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.651703] page_type: f5(slab) [ 23.651986] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.652670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.653352] page dumped because: kasan: bad access detected [ 23.653843] [ 23.653980] Memory state around the buggy address: [ 23.654405] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.655042] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.655679] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.656315] ^ [ 23.656741] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.657377] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.658013] ================================================================== [ 23.073335] ================================================================== [ 23.073974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 23.074628] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.075273] [ 23.075412] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.075426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.075431] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.075435] Call trace: [ 23.075439] show_stack+0x20/0x38 (C) [ 23.075448] dump_stack_lvl+0x8c/0xd0 [ 23.075457] print_report+0x118/0x608 [ 23.075466] kasan_report+0xdc/0x128 [ 23.075474] __asan_report_load4_noabort+0x20/0x30 [ 23.075485] kasan_atomics_helper+0x3dbc/0x4858 [ 23.075494] kasan_atomics+0x198/0x2e0 [ 23.075502] kunit_try_run_case+0x170/0x3f0 [ 23.075512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.075524] kthread+0x328/0x630 [ 23.075534] ret_from_fork+0x10/0x20 [ 23.075544] [ 23.081376] Allocated by task 323: [ 23.081680] kasan_save_stack+0x3c/0x68 [ 23.082025] kasan_save_track+0x20/0x40 [ 23.082369] kasan_save_alloc_info+0x40/0x58 [ 23.082752] __kasan_kmalloc+0xd4/0xd8 [ 23.083090] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.083498] kasan_atomics+0xb8/0x2e0 [ 23.083827] kunit_try_run_case+0x170/0x3f0 [ 23.084204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.084694] kthread+0x328/0x630 [ 23.084987] ret_from_fork+0x10/0x20 [ 23.085309] [ 23.085446] The buggy address belongs to the object at ffff00000ea09200 [ 23.085446] which belongs to the cache kmalloc-64 of size 64 [ 23.086529] The buggy address is located 0 bytes to the right of [ 23.086529] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.087658] [ 23.087796] The buggy address belongs to the physical page: [ 23.088288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.088979] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.089558] page_type: f5(slab) [ 23.089842] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.090526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.091207] page dumped because: kasan: bad access detected [ 23.091699] [ 23.091836] Memory state around the buggy address: [ 23.092261] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.092900] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.093536] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.094172] ^ [ 23.094598] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.095235] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.095872] ================================================================== [ 22.671795] ================================================================== [ 22.672439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 22.673092] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.673752] [ 22.673894] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.673916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.673922] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.673930] Call trace: [ 22.673935] show_stack+0x20/0x38 (C) [ 22.673948] dump_stack_lvl+0x8c/0xd0 [ 22.673961] print_report+0x118/0x608 [ 22.673974] kasan_report+0xdc/0x128 [ 22.673986] kasan_check_range+0x100/0x1a8 [ 22.674000] __kasan_check_write+0x20/0x30 [ 22.674015] kasan_atomics_helper+0x4e4/0x4858 [ 22.674028] kasan_atomics+0x198/0x2e0 [ 22.674039] kunit_try_run_case+0x170/0x3f0 [ 22.674054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.674072] kthread+0x328/0x630 [ 22.674087] ret_from_fork+0x10/0x20 [ 22.674101] [ 22.680249] Allocated by task 323: [ 22.680557] kasan_save_stack+0x3c/0x68 [ 22.680907] kasan_save_track+0x20/0x40 [ 22.681258] kasan_save_alloc_info+0x40/0x58 [ 22.681648] __kasan_kmalloc+0xd4/0xd8 [ 22.681990] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.682405] kasan_atomics+0xb8/0x2e0 [ 22.682740] kunit_try_run_case+0x170/0x3f0 [ 22.683123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.683621] kthread+0x328/0x630 [ 22.683920] ret_from_fork+0x10/0x20 [ 22.684249] [ 22.684391] The buggy address belongs to the object at ffff00000ea09200 [ 22.684391] which belongs to the cache kmalloc-64 of size 64 [ 22.685481] The buggy address is located 0 bytes to the right of [ 22.685481] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.686618] [ 22.686758] The buggy address belongs to the physical page: [ 22.687255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.687952] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.688538] page_type: f5(slab) [ 22.688826] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.689518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.690204] page dumped because: kasan: bad access detected [ 22.690702] [ 22.690842] Memory state around the buggy address: [ 22.691272] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.691915] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.692558] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.693200] ^ [ 22.693631] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.694274] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.694915] ================================================================== [ 23.166716] ================================================================== [ 23.167353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 23.168006] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.168652] [ 23.168791] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.168804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.168809] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.168814] Call trace: [ 23.168817] show_stack+0x20/0x38 (C) [ 23.168826] dump_stack_lvl+0x8c/0xd0 [ 23.168834] print_report+0x118/0x608 [ 23.168842] kasan_report+0xdc/0x128 [ 23.168851] __asan_report_load4_noabort+0x20/0x30 [ 23.168861] kasan_atomics_helper+0x3dd8/0x4858 [ 23.168870] kasan_atomics+0x198/0x2e0 [ 23.168877] kunit_try_run_case+0x170/0x3f0 [ 23.168888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.168900] kthread+0x328/0x630 [ 23.168910] ret_from_fork+0x10/0x20 [ 23.168919] [ 23.174751] Allocated by task 323: [ 23.175055] kasan_save_stack+0x3c/0x68 [ 23.175400] kasan_save_track+0x20/0x40 [ 23.175743] kasan_save_alloc_info+0x40/0x58 [ 23.176126] __kasan_kmalloc+0xd4/0xd8 [ 23.176462] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.176869] kasan_atomics+0xb8/0x2e0 [ 23.177196] kunit_try_run_case+0x170/0x3f0 [ 23.177572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.178063] kthread+0x328/0x630 [ 23.178356] ret_from_fork+0x10/0x20 [ 23.178678] [ 23.178815] The buggy address belongs to the object at ffff00000ea09200 [ 23.178815] which belongs to the cache kmalloc-64 of size 64 [ 23.179897] The buggy address is located 0 bytes to the right of [ 23.179897] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.181027] [ 23.181165] The buggy address belongs to the physical page: [ 23.181656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.182347] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.182924] page_type: f5(slab) [ 23.183207] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.183891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.184572] page dumped because: kasan: bad access detected [ 23.185064] [ 23.185202] Memory state around the buggy address: [ 23.185627] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.186264] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.186902] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.187538] ^ [ 23.187964] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.188601] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.189238] ================================================================== [ 23.869275] ================================================================== [ 23.869912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 23.870565] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.871219] [ 23.871357] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.871371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.871375] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.871380] Call trace: [ 23.871383] show_stack+0x20/0x38 (C) [ 23.871393] dump_stack_lvl+0x8c/0xd0 [ 23.871401] print_report+0x118/0x608 [ 23.871410] kasan_report+0xdc/0x128 [ 23.871418] kasan_check_range+0x100/0x1a8 [ 23.871427] __kasan_check_write+0x20/0x30 [ 23.871437] kasan_atomics_helper+0x175c/0x4858 [ 23.871445] kasan_atomics+0x198/0x2e0 [ 23.871453] kunit_try_run_case+0x170/0x3f0 [ 23.871463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.871475] kthread+0x328/0x630 [ 23.871485] ret_from_fork+0x10/0x20 [ 23.871494] [ 23.877622] Allocated by task 323: [ 23.877926] kasan_save_stack+0x3c/0x68 [ 23.878271] kasan_save_track+0x20/0x40 [ 23.878615] kasan_save_alloc_info+0x40/0x58 [ 23.878998] __kasan_kmalloc+0xd4/0xd8 [ 23.879335] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.879742] kasan_atomics+0xb8/0x2e0 [ 23.880071] kunit_try_run_case+0x170/0x3f0 [ 23.880448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.880939] kthread+0x328/0x630 [ 23.881232] ret_from_fork+0x10/0x20 [ 23.881554] [ 23.881691] The buggy address belongs to the object at ffff00000ea09200 [ 23.881691] which belongs to the cache kmalloc-64 of size 64 [ 23.882773] The buggy address is located 0 bytes to the right of [ 23.882773] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.883903] [ 23.884039] The buggy address belongs to the physical page: [ 23.884531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.885223] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.885800] page_type: f5(slab) [ 23.886084] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.886767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.887449] page dumped because: kasan: bad access detected [ 23.887941] [ 23.888078] Memory state around the buggy address: [ 23.888504] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.889140] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.889779] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.890416] ^ [ 23.890842] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.891479] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.892116] ================================================================== [ 22.647949] ================================================================== [ 22.648596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 22.649250] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.649910] [ 22.650053] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.650075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.650082] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.650089] Call trace: [ 22.650094] show_stack+0x20/0x38 (C) [ 22.650108] dump_stack_lvl+0x8c/0xd0 [ 22.650121] print_report+0x118/0x608 [ 22.650135] kasan_report+0xdc/0x128 [ 22.650147] kasan_check_range+0x100/0x1a8 [ 22.650161] __kasan_check_write+0x20/0x30 [ 22.650176] kasan_atomics_helper+0x47c/0x4858 [ 22.650189] kasan_atomics+0x198/0x2e0 [ 22.650201] kunit_try_run_case+0x170/0x3f0 [ 22.650216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.650234] kthread+0x328/0x630 [ 22.650249] ret_from_fork+0x10/0x20 [ 22.650264] [ 22.656407] Allocated by task 323: [ 22.656716] kasan_save_stack+0x3c/0x68 [ 22.657067] kasan_save_track+0x20/0x40 [ 22.657417] kasan_save_alloc_info+0x40/0x58 [ 22.657807] __kasan_kmalloc+0xd4/0xd8 [ 22.658149] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.658564] kasan_atomics+0xb8/0x2e0 [ 22.658899] kunit_try_run_case+0x170/0x3f0 [ 22.659282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.659779] kthread+0x328/0x630 [ 22.660079] ret_from_fork+0x10/0x20 [ 22.660407] [ 22.660548] The buggy address belongs to the object at ffff00000ea09200 [ 22.660548] which belongs to the cache kmalloc-64 of size 64 [ 22.661638] The buggy address is located 0 bytes to the right of [ 22.661638] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.662777] [ 22.662917] The buggy address belongs to the physical page: [ 22.663415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.664112] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.664698] page_type: f5(slab) [ 22.664987] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.665677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.666364] page dumped because: kasan: bad access detected [ 22.666861] [ 22.667002] Memory state around the buggy address: [ 22.667431] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.668074] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.668718] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.669360] ^ [ 22.669790] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.670433] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.671075] ================================================================== [ 22.838831] ================================================================== [ 22.839471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 22.840117] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.840771] [ 22.840909] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.840924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.840928] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.840934] Call trace: [ 22.840937] show_stack+0x20/0x38 (C) [ 22.840946] dump_stack_lvl+0x8c/0xd0 [ 22.840955] print_report+0x118/0x608 [ 22.840964] kasan_report+0xdc/0x128 [ 22.840972] kasan_check_range+0x100/0x1a8 [ 22.840981] __kasan_check_write+0x20/0x30 [ 22.840991] kasan_atomics_helper+0x7cc/0x4858 [ 22.840999] kasan_atomics+0x198/0x2e0 [ 22.841008] kunit_try_run_case+0x170/0x3f0 [ 22.841018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.841030] kthread+0x328/0x630 [ 22.841040] ret_from_fork+0x10/0x20 [ 22.841049] [ 22.847172] Allocated by task 323: [ 22.847477] kasan_save_stack+0x3c/0x68 [ 22.847821] kasan_save_track+0x20/0x40 [ 22.848165] kasan_save_alloc_info+0x40/0x58 [ 22.848547] __kasan_kmalloc+0xd4/0xd8 [ 22.848884] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.849293] kasan_atomics+0xb8/0x2e0 [ 22.849622] kunit_try_run_case+0x170/0x3f0 [ 22.849998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.850489] kthread+0x328/0x630 [ 22.850782] ret_from_fork+0x10/0x20 [ 22.851104] [ 22.851240] The buggy address belongs to the object at ffff00000ea09200 [ 22.851240] which belongs to the cache kmalloc-64 of size 64 [ 22.852323] The buggy address is located 0 bytes to the right of [ 22.852323] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.853452] [ 22.853589] The buggy address belongs to the physical page: [ 22.854080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.854773] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.855351] page_type: f5(slab) [ 22.855636] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.856319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.857001] page dumped because: kasan: bad access detected [ 22.857493] [ 22.857631] Memory state around the buggy address: [ 22.858057] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.858693] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.859332] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.859968] ^ [ 22.860394] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.861031] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.861667] ================================================================== [ 23.002978] ================================================================== [ 23.003616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 23.004262] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.004916] [ 23.005054] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.005069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.005073] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.005078] Call trace: [ 23.005082] show_stack+0x20/0x38 (C) [ 23.005091] dump_stack_lvl+0x8c/0xd0 [ 23.005099] print_report+0x118/0x608 [ 23.005108] kasan_report+0xdc/0x128 [ 23.005117] kasan_check_range+0x100/0x1a8 [ 23.005126] __kasan_check_write+0x20/0x30 [ 23.005136] kasan_atomics_helper+0xad4/0x4858 [ 23.005144] kasan_atomics+0x198/0x2e0 [ 23.005152] kunit_try_run_case+0x170/0x3f0 [ 23.005162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.005174] kthread+0x328/0x630 [ 23.005184] ret_from_fork+0x10/0x20 [ 23.005194] [ 23.011317] Allocated by task 323: [ 23.011622] kasan_save_stack+0x3c/0x68 [ 23.011967] kasan_save_track+0x20/0x40 [ 23.012311] kasan_save_alloc_info+0x40/0x58 [ 23.012694] __kasan_kmalloc+0xd4/0xd8 [ 23.013030] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.013437] kasan_atomics+0xb8/0x2e0 [ 23.013766] kunit_try_run_case+0x170/0x3f0 [ 23.014142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.014633] kthread+0x328/0x630 [ 23.014926] ret_from_fork+0x10/0x20 [ 23.015248] [ 23.015385] The buggy address belongs to the object at ffff00000ea09200 [ 23.015385] which belongs to the cache kmalloc-64 of size 64 [ 23.016468] The buggy address is located 0 bytes to the right of [ 23.016468] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.017597] [ 23.017735] The buggy address belongs to the physical page: [ 23.018227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.018918] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.019496] page_type: f5(slab) [ 23.019780] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.020464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.021146] page dumped because: kasan: bad access detected [ 23.021638] [ 23.021774] Memory state around the buggy address: [ 23.022200] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.022838] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.023475] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.024112] ^ [ 23.024537] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.025174] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.025810] ================================================================== [ 23.189913] ================================================================== [ 23.190551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 23.191197] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.191850] [ 23.191989] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.192003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.192007] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.192012] Call trace: [ 23.192015] show_stack+0x20/0x38 (C) [ 23.192024] dump_stack_lvl+0x8c/0xd0 [ 23.192033] print_report+0x118/0x608 [ 23.192041] kasan_report+0xdc/0x128 [ 23.192049] kasan_check_range+0x100/0x1a8 [ 23.192059] __kasan_check_write+0x20/0x30 [ 23.192068] kasan_atomics_helper+0xd3c/0x4858 [ 23.192077] kasan_atomics+0x198/0x2e0 [ 23.192085] kunit_try_run_case+0x170/0x3f0 [ 23.192095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.192107] kthread+0x328/0x630 [ 23.192117] ret_from_fork+0x10/0x20 [ 23.192126] [ 23.198249] Allocated by task 323: [ 23.198553] kasan_save_stack+0x3c/0x68 [ 23.198897] kasan_save_track+0x20/0x40 [ 23.199242] kasan_save_alloc_info+0x40/0x58 [ 23.199625] __kasan_kmalloc+0xd4/0xd8 [ 23.199962] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.200369] kasan_atomics+0xb8/0x2e0 [ 23.200698] kunit_try_run_case+0x170/0x3f0 [ 23.201073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.201562] kthread+0x328/0x630 [ 23.201855] ret_from_fork+0x10/0x20 [ 23.202178] [ 23.202316] The buggy address belongs to the object at ffff00000ea09200 [ 23.202316] which belongs to the cache kmalloc-64 of size 64 [ 23.203399] The buggy address is located 0 bytes to the right of [ 23.203399] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.204527] [ 23.204664] The buggy address belongs to the physical page: [ 23.205155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.205847] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.206426] page_type: f5(slab) [ 23.206709] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.207393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.208074] page dumped because: kasan: bad access detected [ 23.208566] [ 23.208702] Memory state around the buggy address: [ 23.209128] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.209766] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.210403] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.211039] ^ [ 23.211465] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.212103] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.212739] ================================================================== [ 22.550825] ================================================================== [ 22.551479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 22.552141] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.552812] [ 22.552961] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.552993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.553003] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.553013] Call trace: [ 22.553021] show_stack+0x20/0x38 (C) [ 22.553041] dump_stack_lvl+0x8c/0xd0 [ 22.553060] print_report+0x118/0x608 [ 22.553079] kasan_report+0xdc/0x128 [ 22.553097] kasan_check_range+0x100/0x1a8 [ 22.553117] __kasan_check_write+0x20/0x30 [ 22.553139] kasan_atomics_helper+0x32c/0x4858 [ 22.553158] kasan_atomics+0x198/0x2e0 [ 22.553175] kunit_try_run_case+0x170/0x3f0 [ 22.553198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.553224] kthread+0x328/0x630 [ 22.553246] ret_from_fork+0x10/0x20 [ 22.553267] [ 22.559446] Allocated by task 323: [ 22.559762] kasan_save_stack+0x3c/0x68 [ 22.560121] kasan_save_track+0x20/0x40 [ 22.560480] kasan_save_alloc_info+0x40/0x58 [ 22.560879] __kasan_kmalloc+0xd4/0xd8 [ 22.561230] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.561656] kasan_atomics+0xb8/0x2e0 [ 22.561999] kunit_try_run_case+0x170/0x3f0 [ 22.562390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.562899] kthread+0x328/0x630 [ 22.563207] ret_from_fork+0x10/0x20 [ 22.563545] [ 22.563691] The buggy address belongs to the object at ffff00000ea09200 [ 22.563691] which belongs to the cache kmalloc-64 of size 64 [ 22.564791] The buggy address is located 0 bytes to the right of [ 22.564791] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.565941] [ 22.566086] The buggy address belongs to the physical page: [ 22.566590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.567299] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.567892] page_type: f5(slab) [ 22.568189] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.568889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.569583] page dumped because: kasan: bad access detected [ 22.570088] [ 22.570233] Memory state around the buggy address: [ 22.570670] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.571322] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.571974] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.572623] ^ [ 22.573060] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.573712] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.574362] ================================================================== [ 22.791057] ================================================================== [ 22.791701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 22.792354] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.793014] [ 22.793156] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.793178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.793184] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.793191] Call trace: [ 22.793196] show_stack+0x20/0x38 (C) [ 22.793210] dump_stack_lvl+0x8c/0xd0 [ 22.793223] print_report+0x118/0x608 [ 22.793236] kasan_report+0xdc/0x128 [ 22.793249] kasan_check_range+0x100/0x1a8 [ 22.793262] __kasan_check_write+0x20/0x30 [ 22.793277] kasan_atomics_helper+0x6ec/0x4858 [ 22.793290] kasan_atomics+0x198/0x2e0 [ 22.793301] kunit_try_run_case+0x170/0x3f0 [ 22.793317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.793335] kthread+0x328/0x630 [ 22.793350] ret_from_fork+0x10/0x20 [ 22.793364] [ 22.799511] Allocated by task 323: [ 22.799820] kasan_save_stack+0x3c/0x68 [ 22.800171] kasan_save_track+0x20/0x40 [ 22.800521] kasan_save_alloc_info+0x40/0x58 [ 22.800911] __kasan_kmalloc+0xd4/0xd8 [ 22.801254] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.801668] kasan_atomics+0xb8/0x2e0 [ 22.802003] kunit_try_run_case+0x170/0x3f0 [ 22.802386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.802883] kthread+0x328/0x630 [ 22.803183] ret_from_fork+0x10/0x20 [ 22.803511] [ 22.803652] The buggy address belongs to the object at ffff00000ea09200 [ 22.803652] which belongs to the cache kmalloc-64 of size 64 [ 22.804741] The buggy address is located 0 bytes to the right of [ 22.804741] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.805877] [ 22.806018] The buggy address belongs to the physical page: [ 22.806515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.807213] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.807798] page_type: f5(slab) [ 22.808088] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.808778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.809464] page dumped because: kasan: bad access detected [ 22.809961] [ 22.810101] Memory state around the buggy address: [ 22.810531] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.811175] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.811818] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.812460] ^ [ 22.812890] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.813534] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.814175] ================================================================== [ 23.329990] ================================================================== [ 23.330628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 23.331274] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.331927] [ 23.332067] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.332081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.332086] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.332091] Call trace: [ 23.332094] show_stack+0x20/0x38 (C) [ 23.332103] dump_stack_lvl+0x8c/0xd0 [ 23.332112] print_report+0x118/0x608 [ 23.332122] kasan_report+0xdc/0x128 [ 23.332130] kasan_check_range+0x100/0x1a8 [ 23.332139] __kasan_check_write+0x20/0x30 [ 23.332150] kasan_atomics_helper+0xeb8/0x4858 [ 23.332158] kasan_atomics+0x198/0x2e0 [ 23.332166] kunit_try_run_case+0x170/0x3f0 [ 23.332177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.332189] kthread+0x328/0x630 [ 23.332199] ret_from_fork+0x10/0x20 [ 23.332209] [ 23.338330] Allocated by task 323: [ 23.338634] kasan_save_stack+0x3c/0x68 [ 23.338978] kasan_save_track+0x20/0x40 [ 23.339323] kasan_save_alloc_info+0x40/0x58 [ 23.339706] __kasan_kmalloc+0xd4/0xd8 [ 23.340043] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.340451] kasan_atomics+0xb8/0x2e0 [ 23.340779] kunit_try_run_case+0x170/0x3f0 [ 23.341155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.341646] kthread+0x328/0x630 [ 23.341939] ret_from_fork+0x10/0x20 [ 23.342261] [ 23.342398] The buggy address belongs to the object at ffff00000ea09200 [ 23.342398] which belongs to the cache kmalloc-64 of size 64 [ 23.343481] The buggy address is located 0 bytes to the right of [ 23.343481] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.344610] [ 23.344747] The buggy address belongs to the physical page: [ 23.345239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.345931] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.346509] page_type: f5(slab) [ 23.346793] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.347477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.348158] page dumped because: kasan: bad access detected [ 23.348651] [ 23.348787] Memory state around the buggy address: [ 23.349213] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.349851] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.350488] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.351123] ^ [ 23.351549] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.352186] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.352822] ================================================================== [ 22.743350] ================================================================== [ 22.743995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 22.744650] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 22.745310] [ 22.745453] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.745474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.745481] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.745488] Call trace: [ 22.745493] show_stack+0x20/0x38 (C) [ 22.745507] dump_stack_lvl+0x8c/0xd0 [ 22.745521] print_report+0x118/0x608 [ 22.745534] kasan_report+0xdc/0x128 [ 22.745546] kasan_check_range+0x100/0x1a8 [ 22.745560] __kasan_check_write+0x20/0x30 [ 22.745575] kasan_atomics_helper+0x61c/0x4858 [ 22.745588] kasan_atomics+0x198/0x2e0 [ 22.745600] kunit_try_run_case+0x170/0x3f0 [ 22.745615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.745633] kthread+0x328/0x630 [ 22.745649] ret_from_fork+0x10/0x20 [ 22.745664] [ 22.751808] Allocated by task 323: [ 22.752116] kasan_save_stack+0x3c/0x68 [ 22.752468] kasan_save_track+0x20/0x40 [ 22.752818] kasan_save_alloc_info+0x40/0x58 [ 22.753208] __kasan_kmalloc+0xd4/0xd8 [ 22.753549] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.753964] kasan_atomics+0xb8/0x2e0 [ 22.754299] kunit_try_run_case+0x170/0x3f0 [ 22.754681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.755179] kthread+0x328/0x630 [ 22.755479] ret_from_fork+0x10/0x20 [ 22.755807] [ 22.755947] The buggy address belongs to the object at ffff00000ea09200 [ 22.755947] which belongs to the cache kmalloc-64 of size 64 [ 22.757037] The buggy address is located 0 bytes to the right of [ 22.757037] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 22.758173] [ 22.758314] The buggy address belongs to the physical page: [ 22.758810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 22.759508] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.760093] page_type: f5(slab) [ 22.760383] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 22.761073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.761760] page dumped because: kasan: bad access detected [ 22.762257] [ 22.762397] Memory state around the buggy address: [ 22.762828] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.763471] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.764115] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.764756] ^ [ 22.765187] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.765831] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.766472] ================================================================== [ 23.658664] ================================================================== [ 23.659302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 23.659955] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.660609] [ 23.660747] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.660761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.660765] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.660770] Call trace: [ 23.660773] show_stack+0x20/0x38 (C) [ 23.660783] dump_stack_lvl+0x8c/0xd0 [ 23.660791] print_report+0x118/0x608 [ 23.660800] kasan_report+0xdc/0x128 [ 23.660808] kasan_check_range+0x100/0x1a8 [ 23.660817] __kasan_check_write+0x20/0x30 [ 23.660827] kasan_atomics_helper+0x147c/0x4858 [ 23.660836] kasan_atomics+0x198/0x2e0 [ 23.660844] kunit_try_run_case+0x170/0x3f0 [ 23.660854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.660865] kthread+0x328/0x630 [ 23.660875] ret_from_fork+0x10/0x20 [ 23.660885] [ 23.667016] Allocated by task 323: [ 23.667320] kasan_save_stack+0x3c/0x68 [ 23.667664] kasan_save_track+0x20/0x40 [ 23.668007] kasan_save_alloc_info+0x40/0x58 [ 23.668390] __kasan_kmalloc+0xd4/0xd8 [ 23.668728] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.669135] kasan_atomics+0xb8/0x2e0 [ 23.669463] kunit_try_run_case+0x170/0x3f0 [ 23.669840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.670329] kthread+0x328/0x630 [ 23.670623] ret_from_fork+0x10/0x20 [ 23.670945] [ 23.671083] The buggy address belongs to the object at ffff00000ea09200 [ 23.671083] which belongs to the cache kmalloc-64 of size 64 [ 23.672165] The buggy address is located 0 bytes to the right of [ 23.672165] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.673295] [ 23.673433] The buggy address belongs to the physical page: [ 23.673926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.674617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.675194] page_type: f5(slab) [ 23.675477] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.676162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.676843] page dumped because: kasan: bad access detected [ 23.677335] [ 23.677472] Memory state around the buggy address: [ 23.677898] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.678534] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.679171] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.679807] ^ [ 23.680233] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.680870] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.681505] ================================================================== [ 23.892776] ================================================================== [ 23.893413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 23.894066] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.894712] [ 23.894851] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.894866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.894870] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.894875] Call trace: [ 23.894878] show_stack+0x20/0x38 (C) [ 23.894887] dump_stack_lvl+0x8c/0xd0 [ 23.894896] print_report+0x118/0x608 [ 23.894905] kasan_report+0xdc/0x128 [ 23.894913] __asan_report_load8_noabort+0x20/0x30 [ 23.894923] kasan_atomics_helper+0x3e20/0x4858 [ 23.894932] kasan_atomics+0x198/0x2e0 [ 23.894940] kunit_try_run_case+0x170/0x3f0 [ 23.894951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.894963] kthread+0x328/0x630 [ 23.894973] ret_from_fork+0x10/0x20 [ 23.894982] [ 23.900816] Allocated by task 323: [ 23.901121] kasan_save_stack+0x3c/0x68 [ 23.901464] kasan_save_track+0x20/0x40 [ 23.901809] kasan_save_alloc_info+0x40/0x58 [ 23.902192] __kasan_kmalloc+0xd4/0xd8 [ 23.902529] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.902937] kasan_atomics+0xb8/0x2e0 [ 23.903266] kunit_try_run_case+0x170/0x3f0 [ 23.903641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.904132] kthread+0x328/0x630 [ 23.904425] ret_from_fork+0x10/0x20 [ 23.904748] [ 23.904884] The buggy address belongs to the object at ffff00000ea09200 [ 23.904884] which belongs to the cache kmalloc-64 of size 64 [ 23.905966] The buggy address is located 0 bytes to the right of [ 23.905966] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.907096] [ 23.907233] The buggy address belongs to the physical page: [ 23.907725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.908417] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.908995] page_type: f5(slab) [ 23.909278] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.909962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.910644] page dumped because: kasan: bad access detected [ 23.911136] [ 23.911273] Memory state around the buggy address: [ 23.911697] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.912334] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.912973] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.913610] ^ [ 23.914036] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.914674] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.915311] ================================================================== [ 23.682175] ================================================================== [ 23.682812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 23.683466] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323 [ 23.684120] [ 23.684258] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.684273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.684277] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.684282] Call trace: [ 23.684285] show_stack+0x20/0x38 (C) [ 23.684295] dump_stack_lvl+0x8c/0xd0 [ 23.684303] print_report+0x118/0x608 [ 23.684312] kasan_report+0xdc/0x128 [ 23.684320] kasan_check_range+0x100/0x1a8 [ 23.684330] __kasan_check_write+0x20/0x30 [ 23.684339] kasan_atomics_helper+0x14e4/0x4858 [ 23.684348] kasan_atomics+0x198/0x2e0 [ 23.684356] kunit_try_run_case+0x170/0x3f0 [ 23.684367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.684379] kthread+0x328/0x630 [ 23.684389] ret_from_fork+0x10/0x20 [ 23.684398] [ 23.690526] Allocated by task 323: [ 23.690831] kasan_save_stack+0x3c/0x68 [ 23.691176] kasan_save_track+0x20/0x40 [ 23.691520] kasan_save_alloc_info+0x40/0x58 [ 23.691903] __kasan_kmalloc+0xd4/0xd8 [ 23.692240] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.692647] kasan_atomics+0xb8/0x2e0 [ 23.692975] kunit_try_run_case+0x170/0x3f0 [ 23.693351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.693842] kthread+0x328/0x630 [ 23.694135] ret_from_fork+0x10/0x20 [ 23.694457] [ 23.694595] The buggy address belongs to the object at ffff00000ea09200 [ 23.694595] which belongs to the cache kmalloc-64 of size 64 [ 23.695677] The buggy address is located 0 bytes to the right of [ 23.695677] allocated 48-byte region [ffff00000ea09200, ffff00000ea09230) [ 23.696807] [ 23.696943] The buggy address belongs to the physical page: [ 23.697435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09 [ 23.698127] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.698705] page_type: f5(slab) [ 23.698988] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 23.699672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.700354] page dumped because: kasan: bad access detected [ 23.700846] [ 23.700983] Memory state around the buggy address: [ 23.701407] ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.702045] ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.702682] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.703318] ^ [ 23.703743] ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.704381] ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.705016] ==================================================================