Date
May 23, 2025, 11:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.216537] ================================================================== [ 32.216678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 32.217230] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.218176] [ 32.218302] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.218489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.218569] Hardware name: linux,dummy-virt (DT) [ 32.218663] Call trace: [ 32.218732] show_stack+0x20/0x38 (C) [ 32.218880] dump_stack_lvl+0x8c/0xd0 [ 32.219027] print_report+0x118/0x608 [ 32.219165] kasan_report+0xdc/0x128 [ 32.219325] kasan_check_range+0x100/0x1a8 [ 32.219501] __kasan_check_write+0x20/0x30 [ 32.219705] kasan_atomics_helper+0x175c/0x4858 [ 32.219910] kasan_atomics+0x198/0x2e0 [ 32.220074] kunit_try_run_case+0x170/0x3f0 [ 32.220224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.220468] kthread+0x328/0x630 [ 32.220599] ret_from_fork+0x10/0x20 [ 32.221007] [ 32.221118] Allocated by task 267: [ 32.221734] kasan_save_stack+0x3c/0x68 [ 32.221952] kasan_save_track+0x20/0x40 [ 32.222116] kasan_save_alloc_info+0x40/0x58 [ 32.222734] __kasan_kmalloc+0xd4/0xd8 [ 32.223107] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.223692] kasan_atomics+0xb8/0x2e0 [ 32.224239] kunit_try_run_case+0x170/0x3f0 [ 32.224422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.224565] kthread+0x328/0x630 [ 32.224669] ret_from_fork+0x10/0x20 [ 32.224761] [ 32.224811] The buggy address belongs to the object at fff00000c78a2180 [ 32.224811] which belongs to the cache kmalloc-64 of size 64 [ 32.224985] The buggy address is located 0 bytes to the right of [ 32.224985] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.225188] [ 32.225259] The buggy address belongs to the physical page: [ 32.225362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.225726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.226369] page_type: f5(slab) [ 32.226771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.227313] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.227484] page dumped because: kasan: bad access detected [ 32.228727] [ 32.229374] Memory state around the buggy address: [ 32.229687] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.230057] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.231120] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.231782] ^ [ 32.232945] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.233103] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.233843] ================================================================== [ 31.851426] ================================================================== [ 31.851610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 31.851811] Read of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.851988] [ 31.852117] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.852426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.852521] Hardware name: linux,dummy-virt (DT) [ 31.852603] Call trace: [ 31.852700] show_stack+0x20/0x38 (C) [ 31.853101] dump_stack_lvl+0x8c/0xd0 [ 31.853410] print_report+0x118/0x608 [ 31.853555] kasan_report+0xdc/0x128 [ 31.853685] __asan_report_load4_noabort+0x20/0x30 [ 31.853950] kasan_atomics_helper+0x3dd8/0x4858 [ 31.854104] kasan_atomics+0x198/0x2e0 [ 31.854263] kunit_try_run_case+0x170/0x3f0 [ 31.854413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.854600] kthread+0x328/0x630 [ 31.854755] ret_from_fork+0x10/0x20 [ 31.854976] [ 31.855038] Allocated by task 267: [ 31.855121] kasan_save_stack+0x3c/0x68 [ 31.855242] kasan_save_track+0x20/0x40 [ 31.855351] kasan_save_alloc_info+0x40/0x58 [ 31.855501] __kasan_kmalloc+0xd4/0xd8 [ 31.855618] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.855749] kasan_atomics+0xb8/0x2e0 [ 31.855867] kunit_try_run_case+0x170/0x3f0 [ 31.856024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.856152] kthread+0x328/0x630 [ 31.856266] ret_from_fork+0x10/0x20 [ 31.856463] [ 31.856519] The buggy address belongs to the object at fff00000c78a2180 [ 31.856519] which belongs to the cache kmalloc-64 of size 64 [ 31.857118] The buggy address is located 0 bytes to the right of [ 31.857118] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.857358] [ 31.857415] The buggy address belongs to the physical page: [ 31.857507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.857660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.857813] page_type: f5(slab) [ 31.858595] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.859048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.859435] page dumped because: kasan: bad access detected [ 31.859570] [ 31.859625] Memory state around the buggy address: [ 31.860003] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.860094] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.860162] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.860221] ^ [ 31.860271] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.860337] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.860394] ================================================================== [ 32.046257] ================================================================== [ 32.046749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 32.047229] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.047634] [ 32.047753] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.049502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.049575] Hardware name: linux,dummy-virt (DT) [ 32.049624] Call trace: [ 32.049668] show_stack+0x20/0x38 (C) [ 32.049783] dump_stack_lvl+0x8c/0xd0 [ 32.049859] print_report+0x118/0x608 [ 32.049927] kasan_report+0xdc/0x128 [ 32.049991] kasan_check_range+0x100/0x1a8 [ 32.050061] __kasan_check_write+0x20/0x30 [ 32.050128] kasan_atomics_helper+0x126c/0x4858 [ 32.050197] kasan_atomics+0x198/0x2e0 [ 32.050259] kunit_try_run_case+0x170/0x3f0 [ 32.050331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.050409] kthread+0x328/0x630 [ 32.050514] ret_from_fork+0x10/0x20 [ 32.050659] [ 32.050716] Allocated by task 267: [ 32.050803] kasan_save_stack+0x3c/0x68 [ 32.050922] kasan_save_track+0x20/0x40 [ 32.051037] kasan_save_alloc_info+0x40/0x58 [ 32.051157] __kasan_kmalloc+0xd4/0xd8 [ 32.051551] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.051711] kasan_atomics+0xb8/0x2e0 [ 32.051836] kunit_try_run_case+0x170/0x3f0 [ 32.052351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.052507] kthread+0x328/0x630 [ 32.052647] ret_from_fork+0x10/0x20 [ 32.052754] [ 32.053168] The buggy address belongs to the object at fff00000c78a2180 [ 32.053168] which belongs to the cache kmalloc-64 of size 64 [ 32.053377] The buggy address is located 0 bytes to the right of [ 32.053377] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.053599] [ 32.054031] The buggy address belongs to the physical page: [ 32.054537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.054708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.055128] page_type: f5(slab) [ 32.055547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.055852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.056119] page dumped because: kasan: bad access detected [ 32.056519] [ 32.056591] Memory state around the buggy address: [ 32.056698] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.056830] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.056967] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.057323] ^ [ 32.057863] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.058189] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.058500] ================================================================== [ 32.252927] ================================================================== [ 32.253139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 32.253323] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.253495] [ 32.253597] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.253848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.253940] Hardware name: linux,dummy-virt (DT) [ 32.254037] Call trace: [ 32.254115] show_stack+0x20/0x38 (C) [ 32.254321] dump_stack_lvl+0x8c/0xd0 [ 32.254501] print_report+0x118/0x608 [ 32.254638] kasan_report+0xdc/0x128 [ 32.254888] kasan_check_range+0x100/0x1a8 [ 32.255429] __kasan_check_write+0x20/0x30 [ 32.255632] kasan_atomics_helper+0x17ec/0x4858 [ 32.255810] kasan_atomics+0x198/0x2e0 [ 32.256146] kunit_try_run_case+0x170/0x3f0 [ 32.256393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.256588] kthread+0x328/0x630 [ 32.256730] ret_from_fork+0x10/0x20 [ 32.256876] [ 32.256943] Allocated by task 267: [ 32.257651] kasan_save_stack+0x3c/0x68 [ 32.258136] kasan_save_track+0x20/0x40 [ 32.258246] kasan_save_alloc_info+0x40/0x58 [ 32.258839] __kasan_kmalloc+0xd4/0xd8 [ 32.259831] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.259994] kasan_atomics+0xb8/0x2e0 [ 32.260091] kunit_try_run_case+0x170/0x3f0 [ 32.260188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.260642] kthread+0x328/0x630 [ 32.260790] ret_from_fork+0x10/0x20 [ 32.261811] [ 32.261925] The buggy address belongs to the object at fff00000c78a2180 [ 32.261925] which belongs to the cache kmalloc-64 of size 64 [ 32.262130] The buggy address is located 0 bytes to the right of [ 32.262130] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.262338] [ 32.262523] The buggy address belongs to the physical page: [ 32.262734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.262997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.263169] page_type: f5(slab) [ 32.263280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.263468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.263606] page dumped because: kasan: bad access detected [ 32.264569] [ 32.264775] Memory state around the buggy address: [ 32.264912] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.265053] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.265161] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.265252] ^ [ 32.265598] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.266115] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.266665] ================================================================== [ 31.909682] ================================================================== [ 31.909899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 31.910118] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.910325] [ 31.910473] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.910695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.910815] Hardware name: linux,dummy-virt (DT) [ 31.910961] Call trace: [ 31.911024] show_stack+0x20/0x38 (C) [ 31.911202] dump_stack_lvl+0x8c/0xd0 [ 31.911324] print_report+0x118/0x608 [ 31.911482] kasan_report+0xdc/0x128 [ 31.911612] kasan_check_range+0x100/0x1a8 [ 31.911731] __kasan_check_write+0x20/0x30 [ 31.911872] kasan_atomics_helper+0xe44/0x4858 [ 31.912151] kasan_atomics+0x198/0x2e0 [ 31.912343] kunit_try_run_case+0x170/0x3f0 [ 31.912495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.912723] kthread+0x328/0x630 [ 31.912924] ret_from_fork+0x10/0x20 [ 31.913072] [ 31.913134] Allocated by task 267: [ 31.913225] kasan_save_stack+0x3c/0x68 [ 31.913346] kasan_save_track+0x20/0x40 [ 31.913535] kasan_save_alloc_info+0x40/0x58 [ 31.913665] __kasan_kmalloc+0xd4/0xd8 [ 31.913779] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.913938] kasan_atomics+0xb8/0x2e0 [ 31.914027] kunit_try_run_case+0x170/0x3f0 [ 31.914124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.914258] kthread+0x328/0x630 [ 31.914361] ret_from_fork+0x10/0x20 [ 31.914478] [ 31.914537] The buggy address belongs to the object at fff00000c78a2180 [ 31.914537] which belongs to the cache kmalloc-64 of size 64 [ 31.914750] The buggy address is located 0 bytes to the right of [ 31.914750] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.914950] [ 31.915003] The buggy address belongs to the physical page: [ 31.915098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.915259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.915426] page_type: f5(slab) [ 31.915570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.915883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.916101] page dumped because: kasan: bad access detected [ 31.916158] [ 31.916188] Memory state around the buggy address: [ 31.916290] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.916426] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.916592] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.916718] ^ [ 31.916834] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.916975] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.917101] ================================================================== [ 31.761921] ================================================================== [ 31.762099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 31.762257] Write of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.762412] [ 31.762532] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.762787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.762875] Hardware name: linux,dummy-virt (DT) [ 31.762976] Call trace: [ 31.763047] show_stack+0x20/0x38 (C) [ 31.763196] dump_stack_lvl+0x8c/0xd0 [ 31.763341] print_report+0x118/0x608 [ 31.763528] kasan_report+0xdc/0x128 [ 31.763658] kasan_check_range+0x100/0x1a8 [ 31.764118] __kasan_check_write+0x20/0x30 [ 31.764252] kasan_atomics_helper+0xad4/0x4858 [ 31.764417] kasan_atomics+0x198/0x2e0 [ 31.764587] kunit_try_run_case+0x170/0x3f0 [ 31.764732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.764971] kthread+0x328/0x630 [ 31.765409] ret_from_fork+0x10/0x20 [ 31.765758] [ 31.765847] Allocated by task 267: [ 31.765947] kasan_save_stack+0x3c/0x68 [ 31.766165] kasan_save_track+0x20/0x40 [ 31.766404] kasan_save_alloc_info+0x40/0x58 [ 31.766551] __kasan_kmalloc+0xd4/0xd8 [ 31.766666] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.766800] kasan_atomics+0xb8/0x2e0 [ 31.766912] kunit_try_run_case+0x170/0x3f0 [ 31.767038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.767177] kthread+0x328/0x630 [ 31.767299] ret_from_fork+0x10/0x20 [ 31.767419] [ 31.767501] The buggy address belongs to the object at fff00000c78a2180 [ 31.767501] which belongs to the cache kmalloc-64 of size 64 [ 31.767945] The buggy address is located 0 bytes to the right of [ 31.767945] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.768195] [ 31.768269] The buggy address belongs to the physical page: [ 31.768481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.768641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.768771] page_type: f5(slab) [ 31.768861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.769005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.769130] page dumped because: kasan: bad access detected [ 31.769385] [ 31.769466] Memory state around the buggy address: [ 31.769597] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.769749] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.769923] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.770065] ^ [ 31.770182] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.770356] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.770514] ================================================================== [ 31.939224] ================================================================== [ 31.939368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 31.939533] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.939705] [ 31.939808] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.940059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.940148] Hardware name: linux,dummy-virt (DT) [ 31.940249] Call trace: [ 31.940320] show_stack+0x20/0x38 (C) [ 31.940478] dump_stack_lvl+0x8c/0xd0 [ 31.940616] print_report+0x118/0x608 [ 31.940759] kasan_report+0xdc/0x128 [ 31.940893] kasan_check_range+0x100/0x1a8 [ 31.941099] __kasan_check_write+0x20/0x30 [ 31.941624] kasan_atomics_helper+0xf20/0x4858 [ 31.942252] kasan_atomics+0x198/0x2e0 [ 31.942388] kunit_try_run_case+0x170/0x3f0 [ 31.942786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.942978] kthread+0x328/0x630 [ 31.943123] ret_from_fork+0x10/0x20 [ 31.943259] [ 31.943317] Allocated by task 267: [ 31.943469] kasan_save_stack+0x3c/0x68 [ 31.943645] kasan_save_track+0x20/0x40 [ 31.943785] kasan_save_alloc_info+0x40/0x58 [ 31.943904] __kasan_kmalloc+0xd4/0xd8 [ 31.944019] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.944151] kasan_atomics+0xb8/0x2e0 [ 31.944257] kunit_try_run_case+0x170/0x3f0 [ 31.944796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.945157] kthread+0x328/0x630 [ 31.945407] ret_from_fork+0x10/0x20 [ 31.945754] [ 31.945824] The buggy address belongs to the object at fff00000c78a2180 [ 31.945824] which belongs to the cache kmalloc-64 of size 64 [ 31.946012] The buggy address is located 0 bytes to the right of [ 31.946012] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.946353] [ 31.946783] The buggy address belongs to the physical page: [ 31.947043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.947228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.947395] page_type: f5(slab) [ 31.947526] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.947682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.947814] page dumped because: kasan: bad access detected [ 31.947948] [ 31.948004] Memory state around the buggy address: [ 31.948109] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.948506] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.948664] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.948776] ^ [ 31.948858] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.948961] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.949402] ================================================================== [ 32.124861] ================================================================== [ 32.124994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 32.125132] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.125282] [ 32.125387] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.125659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.125742] Hardware name: linux,dummy-virt (DT) [ 32.125843] Call trace: [ 32.125914] show_stack+0x20/0x38 (C) [ 32.126062] dump_stack_lvl+0x8c/0xd0 [ 32.126207] print_report+0x118/0x608 [ 32.126336] kasan_report+0xdc/0x128 [ 32.127334] kasan_check_range+0x100/0x1a8 [ 32.127869] __kasan_check_write+0x20/0x30 [ 32.128063] kasan_atomics_helper+0x154c/0x4858 [ 32.128204] kasan_atomics+0x198/0x2e0 [ 32.128333] kunit_try_run_case+0x170/0x3f0 [ 32.128496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.128693] kthread+0x328/0x630 [ 32.128861] ret_from_fork+0x10/0x20 [ 32.128983] [ 32.129046] Allocated by task 267: [ 32.129132] kasan_save_stack+0x3c/0x68 [ 32.129661] kasan_save_track+0x20/0x40 [ 32.130217] kasan_save_alloc_info+0x40/0x58 [ 32.130495] __kasan_kmalloc+0xd4/0xd8 [ 32.130894] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.131153] kasan_atomics+0xb8/0x2e0 [ 32.131259] kunit_try_run_case+0x170/0x3f0 [ 32.131399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.131555] kthread+0x328/0x630 [ 32.131666] ret_from_fork+0x10/0x20 [ 32.132385] [ 32.132472] The buggy address belongs to the object at fff00000c78a2180 [ 32.132472] which belongs to the cache kmalloc-64 of size 64 [ 32.132628] The buggy address is located 0 bytes to the right of [ 32.132628] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.132857] [ 32.133609] The buggy address belongs to the physical page: [ 32.133872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.134263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.134437] page_type: f5(slab) [ 32.134577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.134743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.134880] page dumped because: kasan: bad access detected [ 32.135602] [ 32.135868] Memory state around the buggy address: [ 32.136350] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.136660] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.137048] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.137331] ^ [ 32.137730] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.137908] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.138007] ================================================================== [ 32.203962] ================================================================== [ 32.204145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 32.204549] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.204772] [ 32.204902] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.205152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.205459] Hardware name: linux,dummy-virt (DT) [ 32.205768] Call trace: [ 32.205870] show_stack+0x20/0x38 (C) [ 32.206096] dump_stack_lvl+0x8c/0xd0 [ 32.206251] print_report+0x118/0x608 [ 32.206389] kasan_report+0xdc/0x128 [ 32.206533] __asan_report_load8_noabort+0x20/0x30 [ 32.206655] kasan_atomics_helper+0x3e10/0x4858 [ 32.206787] kasan_atomics+0x198/0x2e0 [ 32.206912] kunit_try_run_case+0x170/0x3f0 [ 32.207061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.207232] kthread+0x328/0x630 [ 32.207371] ret_from_fork+0x10/0x20 [ 32.207553] [ 32.207613] Allocated by task 267: [ 32.207704] kasan_save_stack+0x3c/0x68 [ 32.207819] kasan_save_track+0x20/0x40 [ 32.207931] kasan_save_alloc_info+0x40/0x58 [ 32.208050] __kasan_kmalloc+0xd4/0xd8 [ 32.208164] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.208294] kasan_atomics+0xb8/0x2e0 [ 32.208405] kunit_try_run_case+0x170/0x3f0 [ 32.208788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.209129] kthread+0x328/0x630 [ 32.209267] ret_from_fork+0x10/0x20 [ 32.209618] [ 32.209687] The buggy address belongs to the object at fff00000c78a2180 [ 32.209687] which belongs to the cache kmalloc-64 of size 64 [ 32.209930] The buggy address is located 0 bytes to the right of [ 32.209930] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.210217] [ 32.210317] The buggy address belongs to the physical page: [ 32.210466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.210763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.211239] page_type: f5(slab) [ 32.211391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.211562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.211803] page dumped because: kasan: bad access detected [ 32.212106] [ 32.212202] Memory state around the buggy address: [ 32.212323] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.212510] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.212703] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.212879] ^ [ 32.213025] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.213193] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.213296] ================================================================== [ 31.730782] ================================================================== [ 31.730944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 31.731163] Write of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.731872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.734158] kunit_try_run_case+0x170/0x3f0 [ 31.734949] ret_from_fork+0x10/0x20 [ 31.735494] [ 31.735592] Allocated by task 267: [ 31.735826] kasan_save_stack+0x3c/0x68 [ 31.736092] kasan_save_track+0x20/0x40 [ 31.736298] kasan_save_alloc_info+0x40/0x58 [ 31.736462] __kasan_kmalloc+0xd4/0xd8 [ 31.736601] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.736751] kasan_atomics+0xb8/0x2e0 [ 31.736933] kunit_try_run_case+0x170/0x3f0 [ 31.737136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.737307] kthread+0x328/0x630 [ 31.737460] ret_from_fork+0x10/0x20 [ 31.737581] [ 31.737644] The buggy address belongs to the object at fff00000c78a2180 [ 31.737644] which belongs to the cache kmalloc-64 of size 64 [ 31.737819] The buggy address is located 0 bytes to the right of [ 31.737819] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.738022] [ 31.738093] The buggy address belongs to the physical page: [ 31.738190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.738351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.738525] page_type: f5(slab) [ 31.738642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.738827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.738995] page dumped because: kasan: bad access detected [ 31.739107] [ 31.739170] Memory state around the buggy address: [ 31.739275] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.739492] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.739886] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.740296] ^ [ 31.740427] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.740557] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.740684] ================================================================== [ 32.072838] ================================================================== [ 32.072988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 32.073128] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.073282] [ 32.073379] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.073652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.073742] Hardware name: linux,dummy-virt (DT) [ 32.073881] Call trace: [ 32.073962] show_stack+0x20/0x38 (C) [ 32.074107] dump_stack_lvl+0x8c/0xd0 [ 32.074255] print_report+0x118/0x608 [ 32.074393] kasan_report+0xdc/0x128 [ 32.076126] kasan_check_range+0x100/0x1a8 [ 32.076295] __kasan_check_write+0x20/0x30 [ 32.076475] kasan_atomics_helper+0x1384/0x4858 [ 32.076621] kasan_atomics+0x198/0x2e0 [ 32.076753] kunit_try_run_case+0x170/0x3f0 [ 32.077756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.078415] kthread+0x328/0x630 [ 32.078581] ret_from_fork+0x10/0x20 [ 32.078872] [ 32.078937] Allocated by task 267: [ 32.079138] kasan_save_stack+0x3c/0x68 [ 32.079726] kasan_save_track+0x20/0x40 [ 32.079937] kasan_save_alloc_info+0x40/0x58 [ 32.080514] __kasan_kmalloc+0xd4/0xd8 [ 32.080676] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.080945] kasan_atomics+0xb8/0x2e0 [ 32.081067] kunit_try_run_case+0x170/0x3f0 [ 32.081642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.081792] kthread+0x328/0x630 [ 32.082053] ret_from_fork+0x10/0x20 [ 32.082600] [ 32.083029] The buggy address belongs to the object at fff00000c78a2180 [ 32.083029] which belongs to the cache kmalloc-64 of size 64 [ 32.083617] The buggy address is located 0 bytes to the right of [ 32.083617] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.083840] [ 32.083911] The buggy address belongs to the physical page: [ 32.084007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.085425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.085629] page_type: f5(slab) [ 32.085800] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.086088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.086248] page dumped because: kasan: bad access detected [ 32.086389] [ 32.087090] Memory state around the buggy address: [ 32.087442] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.087618] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.087758] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.088423] ^ [ 32.088579] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.088709] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.088837] ================================================================== [ 32.184039] ================================================================== [ 32.184175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 32.184361] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.184516] [ 32.184584] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.184771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.184890] Hardware name: linux,dummy-virt (DT) [ 32.185020] Call trace: [ 32.185089] show_stack+0x20/0x38 (C) [ 32.185216] dump_stack_lvl+0x8c/0xd0 [ 32.185346] print_report+0x118/0x608 [ 32.185479] kasan_report+0xdc/0x128 [ 32.185600] __asan_report_load8_noabort+0x20/0x30 [ 32.185734] kasan_atomics_helper+0x3df4/0x4858 [ 32.185865] kasan_atomics+0x198/0x2e0 [ 32.186002] kunit_try_run_case+0x170/0x3f0 [ 32.186200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.186402] kthread+0x328/0x630 [ 32.186566] ret_from_fork+0x10/0x20 [ 32.186714] [ 32.186780] Allocated by task 267: [ 32.186865] kasan_save_stack+0x3c/0x68 [ 32.186987] kasan_save_track+0x20/0x40 [ 32.187097] kasan_save_alloc_info+0x40/0x58 [ 32.187217] __kasan_kmalloc+0xd4/0xd8 [ 32.187322] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.187479] kasan_atomics+0xb8/0x2e0 [ 32.187588] kunit_try_run_case+0x170/0x3f0 [ 32.187713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.187852] kthread+0x328/0x630 [ 32.187960] ret_from_fork+0x10/0x20 [ 32.188071] [ 32.188500] The buggy address belongs to the object at fff00000c78a2180 [ 32.188500] which belongs to the cache kmalloc-64 of size 64 [ 32.190013] The buggy address is located 0 bytes to the right of [ 32.190013] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.190219] [ 32.190288] The buggy address belongs to the physical page: [ 32.190393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.190575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.190731] page_type: f5(slab) [ 32.190875] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.191032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.191160] page dumped because: kasan: bad access detected [ 32.191247] [ 32.191305] Memory state around the buggy address: [ 32.191424] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.191624] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.191813] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.191984] ^ [ 32.192109] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.192244] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.192365] ================================================================== [ 32.106218] ================================================================== [ 32.106381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 32.106539] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.106689] [ 32.106753] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.106876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.106916] Hardware name: linux,dummy-virt (DT) [ 32.106964] Call trace: [ 32.107000] show_stack+0x20/0x38 (C) [ 32.107078] dump_stack_lvl+0x8c/0xd0 [ 32.107150] print_report+0x118/0x608 [ 32.107215] kasan_report+0xdc/0x128 [ 32.107281] kasan_check_range+0x100/0x1a8 [ 32.107348] __kasan_check_write+0x20/0x30 [ 32.107433] kasan_atomics_helper+0x147c/0x4858 [ 32.107558] kasan_atomics+0x198/0x2e0 [ 32.107660] kunit_try_run_case+0x170/0x3f0 [ 32.107801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.107967] kthread+0x328/0x630 [ 32.108097] ret_from_fork+0x10/0x20 [ 32.108240] [ 32.108306] Allocated by task 267: [ 32.108391] kasan_save_stack+0x3c/0x68 [ 32.108529] kasan_save_track+0x20/0x40 [ 32.108640] kasan_save_alloc_info+0x40/0x58 [ 32.108762] __kasan_kmalloc+0xd4/0xd8 [ 32.109074] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.109618] kasan_atomics+0xb8/0x2e0 [ 32.109748] kunit_try_run_case+0x170/0x3f0 [ 32.109865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.109977] kthread+0x328/0x630 [ 32.110085] ret_from_fork+0x10/0x20 [ 32.110197] [ 32.110267] The buggy address belongs to the object at fff00000c78a2180 [ 32.110267] which belongs to the cache kmalloc-64 of size 64 [ 32.110864] The buggy address is located 0 bytes to the right of [ 32.110864] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.111407] [ 32.111535] The buggy address belongs to the physical page: [ 32.111664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.111834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.112003] page_type: f5(slab) [ 32.112174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.112398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.112601] page dumped because: kasan: bad access detected [ 32.112746] [ 32.112835] Memory state around the buggy address: [ 32.112976] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.113170] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.113358] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.113504] ^ [ 32.113601] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.113724] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.113847] ================================================================== [ 31.706346] ================================================================== [ 31.706512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 31.706669] Write of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.706822] [ 31.706926] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.707182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.708241] Hardware name: linux,dummy-virt (DT) [ 31.708377] Call trace: [ 31.709021] show_stack+0x20/0x38 (C) [ 31.709403] dump_stack_lvl+0x8c/0xd0 [ 31.709734] print_report+0x118/0x608 [ 31.710856] kasan_report+0xdc/0x128 [ 31.711219] kasan_check_range+0x100/0x1a8 [ 31.712307] __kasan_check_write+0x20/0x30 [ 31.712793] kasan_atomics_helper+0x99c/0x4858 [ 31.712974] kasan_atomics+0x198/0x2e0 [ 31.713564] kunit_try_run_case+0x170/0x3f0 [ 31.713725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.713894] kthread+0x328/0x630 [ 31.714678] ret_from_fork+0x10/0x20 [ 31.715843] [ 31.716084] Allocated by task 267: [ 31.716338] kasan_save_stack+0x3c/0x68 [ 31.716541] kasan_save_track+0x20/0x40 [ 31.716801] kasan_save_alloc_info+0x40/0x58 [ 31.717261] __kasan_kmalloc+0xd4/0xd8 [ 31.717697] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.718053] kasan_atomics+0xb8/0x2e0 [ 31.718292] kunit_try_run_case+0x170/0x3f0 [ 31.718417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.718571] kthread+0x328/0x630 [ 31.719819] ret_from_fork+0x10/0x20 [ 31.720569] [ 31.721160] The buggy address belongs to the object at fff00000c78a2180 [ 31.721160] which belongs to the cache kmalloc-64 of size 64 [ 31.721478] The buggy address is located 0 bytes to the right of [ 31.721478] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.721863] [ 31.721942] The buggy address belongs to the physical page: [ 31.722193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.722695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.723514] page_type: f5(slab) [ 31.723737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.724196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.724657] page dumped because: kasan: bad access detected [ 31.725595] [ 31.725697] Memory state around the buggy address: [ 31.725907] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.726935] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.727076] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.727725] ^ [ 31.728140] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.728510] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.728640] ================================================================== [ 31.741925] ================================================================== [ 31.742134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 31.742303] Write of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.742492] [ 31.742641] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.742987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.743119] Hardware name: linux,dummy-virt (DT) [ 31.743222] Call trace: [ 31.743293] show_stack+0x20/0x38 (C) [ 31.743901] dump_stack_lvl+0x8c/0xd0 [ 31.744118] print_report+0x118/0x608 [ 31.744253] kasan_report+0xdc/0x128 [ 31.744386] kasan_check_range+0x100/0x1a8 [ 31.744555] __kasan_check_write+0x20/0x30 [ 31.744704] kasan_atomics_helper+0xa6c/0x4858 [ 31.744850] kasan_atomics+0x198/0x2e0 [ 31.744988] kunit_try_run_case+0x170/0x3f0 [ 31.747789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.748319] kthread+0x328/0x630 [ 31.748484] ret_from_fork+0x10/0x20 [ 31.748609] [ 31.748658] Allocated by task 267: [ 31.748740] kasan_save_stack+0x3c/0x68 [ 31.749237] kasan_save_track+0x20/0x40 [ 31.749504] kasan_save_alloc_info+0x40/0x58 [ 31.750089] __kasan_kmalloc+0xd4/0xd8 [ 31.750211] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.750341] kasan_atomics+0xb8/0x2e0 [ 31.750469] kunit_try_run_case+0x170/0x3f0 [ 31.750600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.750741] kthread+0x328/0x630 [ 31.750852] ret_from_fork+0x10/0x20 [ 31.750967] [ 31.751036] The buggy address belongs to the object at fff00000c78a2180 [ 31.751036] which belongs to the cache kmalloc-64 of size 64 [ 31.751984] The buggy address is located 0 bytes to the right of [ 31.751984] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.753329] [ 31.753405] The buggy address belongs to the physical page: [ 31.753566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.753819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.754069] page_type: f5(slab) [ 31.754245] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.754715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.755129] page dumped because: kasan: bad access detected [ 31.755252] [ 31.755315] Memory state around the buggy address: [ 31.755683] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.755869] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.756008] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.756306] ^ [ 31.756659] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.756790] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.756891] ================================================================== [ 31.986897] ================================================================== [ 31.987046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 31.987198] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.987356] [ 31.987900] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.988328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.988422] Hardware name: linux,dummy-virt (DT) [ 31.988743] Call trace: [ 31.988897] show_stack+0x20/0x38 (C) [ 31.989057] dump_stack_lvl+0x8c/0xd0 [ 31.989197] print_report+0x118/0x608 [ 31.989379] kasan_report+0xdc/0x128 [ 31.989643] kasan_check_range+0x100/0x1a8 [ 31.990239] __kasan_check_write+0x20/0x30 [ 31.990511] kasan_atomics_helper+0x10c0/0x4858 [ 31.990728] kasan_atomics+0x198/0x2e0 [ 31.990921] kunit_try_run_case+0x170/0x3f0 [ 31.991266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.991564] kthread+0x328/0x630 [ 31.991732] ret_from_fork+0x10/0x20 [ 31.991960] [ 31.992028] Allocated by task 267: [ 31.992468] kasan_save_stack+0x3c/0x68 [ 31.992759] kasan_save_track+0x20/0x40 [ 31.992885] kasan_save_alloc_info+0x40/0x58 [ 31.993108] __kasan_kmalloc+0xd4/0xd8 [ 31.993404] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.993649] kasan_atomics+0xb8/0x2e0 [ 31.993761] kunit_try_run_case+0x170/0x3f0 [ 31.993874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.994003] kthread+0x328/0x630 [ 31.994184] ret_from_fork+0x10/0x20 [ 31.994413] [ 31.994687] The buggy address belongs to the object at fff00000c78a2180 [ 31.994687] which belongs to the cache kmalloc-64 of size 64 [ 31.995151] The buggy address is located 0 bytes to the right of [ 31.995151] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.995535] [ 31.995603] The buggy address belongs to the physical page: [ 31.996250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.996714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.997132] page_type: f5(slab) [ 31.997313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.997440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.997577] page dumped because: kasan: bad access detected [ 31.997677] [ 31.997730] Memory state around the buggy address: [ 31.998015] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.998291] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.998637] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.998855] ^ [ 31.998971] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.999104] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.999229] ================================================================== [ 32.139199] ================================================================== [ 32.139473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 32.139878] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.140202] [ 32.140318] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.140572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.140657] Hardware name: linux,dummy-virt (DT) [ 32.140762] Call trace: [ 32.140835] show_stack+0x20/0x38 (C) [ 32.141645] dump_stack_lvl+0x8c/0xd0 [ 32.142048] print_report+0x118/0x608 [ 32.142182] kasan_report+0xdc/0x128 [ 32.142355] kasan_check_range+0x100/0x1a8 [ 32.142514] __kasan_check_write+0x20/0x30 [ 32.142666] kasan_atomics_helper+0x15b4/0x4858 [ 32.143397] kasan_atomics+0x198/0x2e0 [ 32.143871] kunit_try_run_case+0x170/0x3f0 [ 32.144247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.144814] kthread+0x328/0x630 [ 32.145171] ret_from_fork+0x10/0x20 [ 32.145341] [ 32.145410] Allocated by task 267: [ 32.145915] kasan_save_stack+0x3c/0x68 [ 32.146187] kasan_save_track+0x20/0x40 [ 32.146491] kasan_save_alloc_info+0x40/0x58 [ 32.146754] __kasan_kmalloc+0xd4/0xd8 [ 32.146865] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.147652] kasan_atomics+0xb8/0x2e0 [ 32.147946] kunit_try_run_case+0x170/0x3f0 [ 32.148497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.148639] kthread+0x328/0x630 [ 32.148753] ret_from_fork+0x10/0x20 [ 32.148856] [ 32.148911] The buggy address belongs to the object at fff00000c78a2180 [ 32.148911] which belongs to the cache kmalloc-64 of size 64 [ 32.149460] The buggy address is located 0 bytes to the right of [ 32.149460] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.149686] [ 32.149898] The buggy address belongs to the physical page: [ 32.150008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.150170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.150320] page_type: f5(slab) [ 32.150442] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.150625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.150762] page dumped because: kasan: bad access detected [ 32.150875] [ 32.150942] Memory state around the buggy address: [ 32.151046] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.151188] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.151327] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.151865] ^ [ 32.152038] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.152179] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.152305] ================================================================== [ 32.098328] ================================================================== [ 32.098529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 32.098665] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.098927] [ 32.099070] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.099342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.099428] Hardware name: linux,dummy-virt (DT) [ 32.099530] Call trace: [ 32.099605] show_stack+0x20/0x38 (C) [ 32.099778] dump_stack_lvl+0x8c/0xd0 [ 32.100027] print_report+0x118/0x608 [ 32.100183] kasan_report+0xdc/0x128 [ 32.100296] kasan_check_range+0x100/0x1a8 [ 32.100467] __kasan_check_write+0x20/0x30 [ 32.100599] kasan_atomics_helper+0x1414/0x4858 [ 32.100772] kasan_atomics+0x198/0x2e0 [ 32.100903] kunit_try_run_case+0x170/0x3f0 [ 32.101046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.101194] kthread+0x328/0x630 [ 32.101358] ret_from_fork+0x10/0x20 [ 32.101601] [ 32.101690] Allocated by task 267: [ 32.101826] kasan_save_stack+0x3c/0x68 [ 32.101956] kasan_save_track+0x20/0x40 [ 32.102116] kasan_save_alloc_info+0x40/0x58 [ 32.102237] __kasan_kmalloc+0xd4/0xd8 [ 32.102352] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.102493] kasan_atomics+0xb8/0x2e0 [ 32.102607] kunit_try_run_case+0x170/0x3f0 [ 32.102725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.102864] kthread+0x328/0x630 [ 32.102973] ret_from_fork+0x10/0x20 [ 32.103085] [ 32.103155] The buggy address belongs to the object at fff00000c78a2180 [ 32.103155] which belongs to the cache kmalloc-64 of size 64 [ 32.103340] The buggy address is located 0 bytes to the right of [ 32.103340] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.103555] [ 32.103623] The buggy address belongs to the physical page: [ 32.103746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.103894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.104078] page_type: f5(slab) [ 32.104206] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.104373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.104512] page dumped because: kasan: bad access detected [ 32.104619] [ 32.104682] Memory state around the buggy address: [ 32.104824] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.104963] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.105128] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.105273] ^ [ 32.105428] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.105631] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.105749] ================================================================== [ 32.237293] ================================================================== [ 32.237460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 32.237695] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.237917] [ 32.238057] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.238333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.238501] Hardware name: linux,dummy-virt (DT) [ 32.238608] Call trace: [ 32.238681] show_stack+0x20/0x38 (C) [ 32.239272] dump_stack_lvl+0x8c/0xd0 [ 32.239535] print_report+0x118/0x608 [ 32.239736] kasan_report+0xdc/0x128 [ 32.239966] __asan_report_load8_noabort+0x20/0x30 [ 32.240159] kasan_atomics_helper+0x3e20/0x4858 [ 32.240614] kasan_atomics+0x198/0x2e0 [ 32.241016] kunit_try_run_case+0x170/0x3f0 [ 32.241216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.241593] kthread+0x328/0x630 [ 32.242012] ret_from_fork+0x10/0x20 [ 32.242588] [ 32.242715] Allocated by task 267: [ 32.242810] kasan_save_stack+0x3c/0x68 [ 32.242995] kasan_save_track+0x20/0x40 [ 32.243539] kasan_save_alloc_info+0x40/0x58 [ 32.244078] __kasan_kmalloc+0xd4/0xd8 [ 32.244206] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.244515] kasan_atomics+0xb8/0x2e0 [ 32.244859] kunit_try_run_case+0x170/0x3f0 [ 32.245058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.245282] kthread+0x328/0x630 [ 32.245376] ret_from_fork+0x10/0x20 [ 32.245486] [ 32.245547] The buggy address belongs to the object at fff00000c78a2180 [ 32.245547] which belongs to the cache kmalloc-64 of size 64 [ 32.246119] The buggy address is located 0 bytes to the right of [ 32.246119] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.246702] [ 32.246897] The buggy address belongs to the physical page: [ 32.247314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.247540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.247866] page_type: f5(slab) [ 32.248107] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.248817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.248965] page dumped because: kasan: bad access detected [ 32.249049] [ 32.249225] Memory state around the buggy address: [ 32.249339] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.249572] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.249871] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.250417] ^ [ 32.250737] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.251087] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.251580] ================================================================== [ 31.927679] ================================================================== [ 31.927831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 31.928669] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.928851] [ 31.928986] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.929333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.929503] Hardware name: linux,dummy-virt (DT) [ 31.929605] Call trace: [ 31.930130] show_stack+0x20/0x38 (C) [ 31.930319] dump_stack_lvl+0x8c/0xd0 [ 31.930560] print_report+0x118/0x608 [ 31.930696] kasan_report+0xdc/0x128 [ 31.930931] kasan_check_range+0x100/0x1a8 [ 31.931156] __kasan_check_write+0x20/0x30 [ 31.931370] kasan_atomics_helper+0xeb8/0x4858 [ 31.931599] kasan_atomics+0x198/0x2e0 [ 31.931776] kunit_try_run_case+0x170/0x3f0 [ 31.931925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.932599] kthread+0x328/0x630 [ 31.932742] ret_from_fork+0x10/0x20 [ 31.932859] [ 31.933186] Allocated by task 267: [ 31.933491] kasan_save_stack+0x3c/0x68 [ 31.933689] kasan_save_track+0x20/0x40 [ 31.933858] kasan_save_alloc_info+0x40/0x58 [ 31.934023] __kasan_kmalloc+0xd4/0xd8 [ 31.934186] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.934362] kasan_atomics+0xb8/0x2e0 [ 31.934526] kunit_try_run_case+0x170/0x3f0 [ 31.934703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.934894] kthread+0x328/0x630 [ 31.935056] ret_from_fork+0x10/0x20 [ 31.935218] [ 31.935288] The buggy address belongs to the object at fff00000c78a2180 [ 31.935288] which belongs to the cache kmalloc-64 of size 64 [ 31.935482] The buggy address is located 0 bytes to the right of [ 31.935482] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.935699] [ 31.935784] The buggy address belongs to the physical page: [ 31.935877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.936531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.936761] page_type: f5(slab) [ 31.937129] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.937367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.938066] page dumped because: kasan: bad access detected [ 31.938143] [ 31.938173] Memory state around the buggy address: [ 31.938230] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.938296] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.938362] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.938417] ^ [ 31.938506] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.938633] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.938752] ================================================================== [ 32.090704] ================================================================== [ 32.090850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 32.090995] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.091145] [ 32.091250] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.091525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.091610] Hardware name: linux,dummy-virt (DT) [ 32.091714] Call trace: [ 32.091784] show_stack+0x20/0x38 (C) [ 32.091980] dump_stack_lvl+0x8c/0xd0 [ 32.092114] print_report+0x118/0x608 [ 32.092249] kasan_report+0xdc/0x128 [ 32.092390] __asan_report_load8_noabort+0x20/0x30 [ 32.092570] kasan_atomics_helper+0x3f04/0x4858 [ 32.092704] kasan_atomics+0x198/0x2e0 [ 32.092838] kunit_try_run_case+0x170/0x3f0 [ 32.092995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.093216] kthread+0x328/0x630 [ 32.093339] ret_from_fork+0x10/0x20 [ 32.093617] [ 32.093701] Allocated by task 267: [ 32.093782] kasan_save_stack+0x3c/0x68 [ 32.093935] kasan_save_track+0x20/0x40 [ 32.094041] kasan_save_alloc_info+0x40/0x58 [ 32.094196] __kasan_kmalloc+0xd4/0xd8 [ 32.094300] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.094437] kasan_atomics+0xb8/0x2e0 [ 32.094587] kunit_try_run_case+0x170/0x3f0 [ 32.094691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.094824] kthread+0x328/0x630 [ 32.094962] ret_from_fork+0x10/0x20 [ 32.095069] [ 32.095125] The buggy address belongs to the object at fff00000c78a2180 [ 32.095125] which belongs to the cache kmalloc-64 of size 64 [ 32.095269] The buggy address is located 0 bytes to the right of [ 32.095269] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.095493] [ 32.095562] The buggy address belongs to the physical page: [ 32.095697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.095997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.096160] page_type: f5(slab) [ 32.096287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.096505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.096699] page dumped because: kasan: bad access detected [ 32.096846] [ 32.096911] Memory state around the buggy address: [ 32.097009] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.097126] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.097276] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.097384] ^ [ 32.097512] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.097654] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.097796] ================================================================== [ 32.114583] ================================================================== [ 32.114719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 32.114858] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.115038] [ 32.115185] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.115561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.115679] Hardware name: linux,dummy-virt (DT) [ 32.115825] Call trace: [ 32.115900] show_stack+0x20/0x38 (C) [ 32.116059] dump_stack_lvl+0x8c/0xd0 [ 32.116397] print_report+0x118/0x608 [ 32.116555] kasan_report+0xdc/0x128 [ 32.116887] kasan_check_range+0x100/0x1a8 [ 32.117019] __kasan_check_write+0x20/0x30 [ 32.117167] kasan_atomics_helper+0x14e4/0x4858 [ 32.117349] kasan_atomics+0x198/0x2e0 [ 32.117563] kunit_try_run_case+0x170/0x3f0 [ 32.117722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.117956] kthread+0x328/0x630 [ 32.118147] ret_from_fork+0x10/0x20 [ 32.118354] [ 32.118460] Allocated by task 267: [ 32.118537] kasan_save_stack+0x3c/0x68 [ 32.118648] kasan_save_track+0x20/0x40 [ 32.118952] kasan_save_alloc_info+0x40/0x58 [ 32.119097] __kasan_kmalloc+0xd4/0xd8 [ 32.119408] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.119580] kasan_atomics+0xb8/0x2e0 [ 32.119733] kunit_try_run_case+0x170/0x3f0 [ 32.119846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.120006] kthread+0x328/0x630 [ 32.120162] ret_from_fork+0x10/0x20 [ 32.120317] [ 32.120389] The buggy address belongs to the object at fff00000c78a2180 [ 32.120389] which belongs to the cache kmalloc-64 of size 64 [ 32.120591] The buggy address is located 0 bytes to the right of [ 32.120591] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.120807] [ 32.120902] The buggy address belongs to the physical page: [ 32.121044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.121223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.121399] page_type: f5(slab) [ 32.121516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.121660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.121790] page dumped because: kasan: bad access detected [ 32.122153] [ 32.122251] Memory state around the buggy address: [ 32.122371] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.122527] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.122690] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.122822] ^ [ 32.122941] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.123123] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.123273] ================================================================== [ 32.031753] ================================================================== [ 32.031903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 32.032574] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.032734] [ 32.032911] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.033549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.033646] Hardware name: linux,dummy-virt (DT) [ 32.033743] Call trace: [ 32.033844] show_stack+0x20/0x38 (C) [ 32.034115] dump_stack_lvl+0x8c/0xd0 [ 32.034707] print_report+0x118/0x608 [ 32.035105] kasan_report+0xdc/0x128 [ 32.035403] kasan_check_range+0x100/0x1a8 [ 32.035572] __kasan_check_write+0x20/0x30 [ 32.035718] kasan_atomics_helper+0x11f8/0x4858 [ 32.035865] kasan_atomics+0x198/0x2e0 [ 32.035995] kunit_try_run_case+0x170/0x3f0 [ 32.036719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.037301] kthread+0x328/0x630 [ 32.037539] ret_from_fork+0x10/0x20 [ 32.037720] [ 32.037786] Allocated by task 267: [ 32.037879] kasan_save_stack+0x3c/0x68 [ 32.037999] kasan_save_track+0x20/0x40 [ 32.038252] kasan_save_alloc_info+0x40/0x58 [ 32.038555] __kasan_kmalloc+0xd4/0xd8 [ 32.038996] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.039407] kasan_atomics+0xb8/0x2e0 [ 32.039742] kunit_try_run_case+0x170/0x3f0 [ 32.039991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.040133] kthread+0x328/0x630 [ 32.040481] ret_from_fork+0x10/0x20 [ 32.040809] [ 32.040899] The buggy address belongs to the object at fff00000c78a2180 [ 32.040899] which belongs to the cache kmalloc-64 of size 64 [ 32.041099] The buggy address is located 0 bytes to the right of [ 32.041099] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.041302] [ 32.041372] The buggy address belongs to the physical page: [ 32.041489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.041649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.042392] page_type: f5(slab) [ 32.042622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.042889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.043119] page dumped because: kasan: bad access detected [ 32.043391] [ 32.043473] Memory state around the buggy address: [ 32.043582] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.043994] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.044139] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.044782] ^ [ 32.045130] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.045278] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.045376] ================================================================== [ 32.176210] ================================================================== [ 32.176362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 32.176596] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.176805] [ 32.176943] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.177236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.177325] Hardware name: linux,dummy-virt (DT) [ 32.177420] Call trace: [ 32.177512] show_stack+0x20/0x38 (C) [ 32.177650] dump_stack_lvl+0x8c/0xd0 [ 32.177772] print_report+0x118/0x608 [ 32.177902] kasan_report+0xdc/0x128 [ 32.178031] kasan_check_range+0x100/0x1a8 [ 32.178178] __kasan_check_write+0x20/0x30 [ 32.178321] kasan_atomics_helper+0x1644/0x4858 [ 32.178489] kasan_atomics+0x198/0x2e0 [ 32.178619] kunit_try_run_case+0x170/0x3f0 [ 32.178760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.178902] kthread+0x328/0x630 [ 32.179101] ret_from_fork+0x10/0x20 [ 32.179294] [ 32.179356] Allocated by task 267: [ 32.179466] kasan_save_stack+0x3c/0x68 [ 32.179642] kasan_save_track+0x20/0x40 [ 32.179792] kasan_save_alloc_info+0x40/0x58 [ 32.179915] __kasan_kmalloc+0xd4/0xd8 [ 32.180018] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.180170] kasan_atomics+0xb8/0x2e0 [ 32.180275] kunit_try_run_case+0x170/0x3f0 [ 32.180388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.180553] kthread+0x328/0x630 [ 32.180666] ret_from_fork+0x10/0x20 [ 32.180777] [ 32.180846] The buggy address belongs to the object at fff00000c78a2180 [ 32.180846] which belongs to the cache kmalloc-64 of size 64 [ 32.181041] The buggy address is located 0 bytes to the right of [ 32.181041] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.181267] [ 32.181339] The buggy address belongs to the physical page: [ 32.181432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.181599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.181801] page_type: f5(slab) [ 32.181942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.182189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.182318] page dumped because: kasan: bad access detected [ 32.182397] [ 32.182466] Memory state around the buggy address: [ 32.182561] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.182705] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.182838] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.182983] ^ [ 32.183138] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.183331] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.183529] ================================================================== [ 32.193127] ================================================================== [ 32.193228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 32.193306] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.193502] [ 32.193644] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.193994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.194070] Hardware name: linux,dummy-virt (DT) [ 32.194152] Call trace: [ 32.194212] show_stack+0x20/0x38 (C) [ 32.194347] dump_stack_lvl+0x8c/0xd0 [ 32.194502] print_report+0x118/0x608 [ 32.194690] kasan_report+0xdc/0x128 [ 32.194889] kasan_check_range+0x100/0x1a8 [ 32.195087] __kasan_check_write+0x20/0x30 [ 32.195297] kasan_atomics_helper+0x16d0/0x4858 [ 32.195463] kasan_atomics+0x198/0x2e0 [ 32.195594] kunit_try_run_case+0x170/0x3f0 [ 32.195737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.195902] kthread+0x328/0x630 [ 32.196667] ret_from_fork+0x10/0x20 [ 32.197209] [ 32.197401] Allocated by task 267: [ 32.197591] kasan_save_stack+0x3c/0x68 [ 32.197764] kasan_save_track+0x20/0x40 [ 32.197907] kasan_save_alloc_info+0x40/0x58 [ 32.198058] __kasan_kmalloc+0xd4/0xd8 [ 32.198210] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.198396] kasan_atomics+0xb8/0x2e0 [ 32.198519] kunit_try_run_case+0x170/0x3f0 [ 32.198624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.199038] kthread+0x328/0x630 [ 32.199460] ret_from_fork+0x10/0x20 [ 32.199629] [ 32.199699] The buggy address belongs to the object at fff00000c78a2180 [ 32.199699] which belongs to the cache kmalloc-64 of size 64 [ 32.199937] The buggy address is located 0 bytes to the right of [ 32.199937] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.200120] [ 32.200441] The buggy address belongs to the physical page: [ 32.200663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.200861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.201021] page_type: f5(slab) [ 32.201138] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.201310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.201492] page dumped because: kasan: bad access detected [ 32.201603] [ 32.201660] Memory state around the buggy address: [ 32.201759] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.202119] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.202283] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.202405] ^ [ 32.202566] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.202759] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.202921] ================================================================== [ 31.884383] ================================================================== [ 31.884534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 31.884686] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.884899] [ 31.885045] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.885299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.885383] Hardware name: linux,dummy-virt (DT) [ 31.885501] Call trace: [ 31.885574] show_stack+0x20/0x38 (C) [ 31.885722] dump_stack_lvl+0x8c/0xd0 [ 31.885866] print_report+0x118/0x608 [ 31.885998] kasan_report+0xdc/0x128 [ 31.886140] kasan_check_range+0x100/0x1a8 [ 31.886282] __kasan_check_read+0x20/0x30 [ 31.886477] kasan_atomics_helper+0xdd4/0x4858 [ 31.886602] kasan_atomics+0x198/0x2e0 [ 31.886727] kunit_try_run_case+0x170/0x3f0 [ 31.886857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.887021] kthread+0x328/0x630 [ 31.887166] ret_from_fork+0x10/0x20 [ 31.887422] [ 31.887505] Allocated by task 267: [ 31.887604] kasan_save_stack+0x3c/0x68 [ 31.887729] kasan_save_track+0x20/0x40 [ 31.887829] kasan_save_alloc_info+0x40/0x58 [ 31.887986] __kasan_kmalloc+0xd4/0xd8 [ 31.888147] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.888265] kasan_atomics+0xb8/0x2e0 [ 31.888414] kunit_try_run_case+0x170/0x3f0 [ 31.888538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.888824] kthread+0x328/0x630 [ 31.888941] ret_from_fork+0x10/0x20 [ 31.889038] [ 31.889108] The buggy address belongs to the object at fff00000c78a2180 [ 31.889108] which belongs to the cache kmalloc-64 of size 64 [ 31.889460] The buggy address is located 0 bytes to the right of [ 31.889460] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.889677] [ 31.889766] The buggy address belongs to the physical page: [ 31.889878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.890020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.890230] page_type: f5(slab) [ 31.890341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.890479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.890575] page dumped because: kasan: bad access detected [ 31.890687] [ 31.890744] Memory state around the buggy address: [ 31.890845] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.890973] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.891111] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.891236] ^ [ 31.891388] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.891525] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.891677] ================================================================== [ 31.917678] ================================================================== [ 31.917806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 31.917937] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.918088] [ 31.918182] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.918839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.918994] Hardware name: linux,dummy-virt (DT) [ 31.919090] Call trace: [ 31.919199] show_stack+0x20/0x38 (C) [ 31.919421] dump_stack_lvl+0x8c/0xd0 [ 31.919575] print_report+0x118/0x608 [ 31.919751] kasan_report+0xdc/0x128 [ 31.919950] __asan_report_store8_noabort+0x20/0x30 [ 31.920163] kasan_atomics_helper+0x3e5c/0x4858 [ 31.920369] kasan_atomics+0x198/0x2e0 [ 31.920576] kunit_try_run_case+0x170/0x3f0 [ 31.920775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.920988] kthread+0x328/0x630 [ 31.921134] ret_from_fork+0x10/0x20 [ 31.921344] [ 31.921427] Allocated by task 267: [ 31.921520] kasan_save_stack+0x3c/0x68 [ 31.921622] kasan_save_track+0x20/0x40 [ 31.921720] kasan_save_alloc_info+0x40/0x58 [ 31.921899] __kasan_kmalloc+0xd4/0xd8 [ 31.922045] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.922508] kasan_atomics+0xb8/0x2e0 [ 31.922613] kunit_try_run_case+0x170/0x3f0 [ 31.923068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.923270] kthread+0x328/0x630 [ 31.923712] ret_from_fork+0x10/0x20 [ 31.923819] [ 31.923871] The buggy address belongs to the object at fff00000c78a2180 [ 31.923871] which belongs to the cache kmalloc-64 of size 64 [ 31.924284] The buggy address is located 0 bytes to the right of [ 31.924284] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.924777] [ 31.924877] The buggy address belongs to the physical page: [ 31.925023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.925256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.925395] page_type: f5(slab) [ 31.925510] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.925628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.925728] page dumped because: kasan: bad access detected [ 31.925810] [ 31.925858] Memory state around the buggy address: [ 31.925938] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.926069] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.926213] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.926316] ^ [ 31.926458] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.926576] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.926720] ================================================================== [ 31.961572] ================================================================== [ 31.961977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 31.962158] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.962315] [ 31.962768] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.963361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.963491] Hardware name: linux,dummy-virt (DT) [ 31.963677] Call trace: [ 31.963755] show_stack+0x20/0x38 (C) [ 31.964235] dump_stack_lvl+0x8c/0xd0 [ 31.964369] print_report+0x118/0x608 [ 31.964518] kasan_report+0xdc/0x128 [ 31.964649] kasan_check_range+0x100/0x1a8 [ 31.964798] __kasan_check_write+0x20/0x30 [ 31.964946] kasan_atomics_helper+0xff0/0x4858 [ 31.965094] kasan_atomics+0x198/0x2e0 [ 31.965227] kunit_try_run_case+0x170/0x3f0 [ 31.965377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.965560] kthread+0x328/0x630 [ 31.965986] ret_from_fork+0x10/0x20 [ 31.966489] [ 31.966580] Allocated by task 267: [ 31.966672] kasan_save_stack+0x3c/0x68 [ 31.966805] kasan_save_track+0x20/0x40 [ 31.966913] kasan_save_alloc_info+0x40/0x58 [ 31.967332] __kasan_kmalloc+0xd4/0xd8 [ 31.967784] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.968198] kasan_atomics+0xb8/0x2e0 [ 31.968378] kunit_try_run_case+0x170/0x3f0 [ 31.968607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.968766] kthread+0x328/0x630 [ 31.968884] ret_from_fork+0x10/0x20 [ 31.968996] [ 31.969064] The buggy address belongs to the object at fff00000c78a2180 [ 31.969064] which belongs to the cache kmalloc-64 of size 64 [ 31.969211] The buggy address is located 0 bytes to the right of [ 31.969211] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.969357] [ 31.969673] The buggy address belongs to the physical page: [ 31.969776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.970163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.970436] page_type: f5(slab) [ 31.970850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.971173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.971319] page dumped because: kasan: bad access detected [ 31.971429] [ 31.971505] Memory state around the buggy address: [ 31.971607] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.971751] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.972309] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.972691] ^ [ 31.972967] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.973225] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.973540] ================================================================== [ 31.872746] ================================================================== [ 31.872892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 31.873064] Read of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.873511] [ 31.873915] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.874181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.874267] Hardware name: linux,dummy-virt (DT) [ 31.874371] Call trace: [ 31.874459] show_stack+0x20/0x38 (C) [ 31.874617] dump_stack_lvl+0x8c/0xd0 [ 31.874759] print_report+0x118/0x608 [ 31.875951] kasan_report+0xdc/0x128 [ 31.876476] __asan_report_load4_noabort+0x20/0x30 [ 31.876656] kasan_atomics_helper+0x3e04/0x4858 [ 31.877160] kasan_atomics+0x198/0x2e0 [ 31.877378] kunit_try_run_case+0x170/0x3f0 [ 31.877583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.877741] kthread+0x328/0x630 [ 31.877853] ret_from_fork+0x10/0x20 [ 31.878006] [ 31.878070] Allocated by task 267: [ 31.878155] kasan_save_stack+0x3c/0x68 [ 31.878260] kasan_save_track+0x20/0x40 [ 31.878363] kasan_save_alloc_info+0x40/0x58 [ 31.878494] __kasan_kmalloc+0xd4/0xd8 [ 31.878821] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.879020] kasan_atomics+0xb8/0x2e0 [ 31.879289] kunit_try_run_case+0x170/0x3f0 [ 31.879876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.880033] kthread+0x328/0x630 [ 31.880188] ret_from_fork+0x10/0x20 [ 31.880302] [ 31.880360] The buggy address belongs to the object at fff00000c78a2180 [ 31.880360] which belongs to the cache kmalloc-64 of size 64 [ 31.880678] The buggy address is located 0 bytes to the right of [ 31.880678] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.880958] [ 31.881043] The buggy address belongs to the physical page: [ 31.881148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.881312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.881484] page_type: f5(slab) [ 31.881582] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.881700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.881822] page dumped because: kasan: bad access detected [ 31.881927] [ 31.881983] Memory state around the buggy address: [ 31.882113] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.882237] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.882359] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.882527] ^ [ 31.882714] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.882864] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.882977] ================================================================== [ 31.893582] ================================================================== [ 31.893797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 31.894009] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.894168] [ 31.894273] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.894536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.894626] Hardware name: linux,dummy-virt (DT) [ 31.894726] Call trace: [ 31.894791] show_stack+0x20/0x38 (C) [ 31.894934] dump_stack_lvl+0x8c/0xd0 [ 31.895083] print_report+0x118/0x608 [ 31.895222] kasan_report+0xdc/0x128 [ 31.895363] __asan_report_load8_noabort+0x20/0x30 [ 31.895944] kasan_atomics_helper+0x3f58/0x4858 [ 31.896597] kasan_atomics+0x198/0x2e0 [ 31.896780] kunit_try_run_case+0x170/0x3f0 [ 31.897117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.897734] kthread+0x328/0x630 [ 31.898718] ret_from_fork+0x10/0x20 [ 31.899066] [ 31.899157] Allocated by task 267: [ 31.899260] kasan_save_stack+0x3c/0x68 [ 31.899558] kasan_save_track+0x20/0x40 [ 31.899679] kasan_save_alloc_info+0x40/0x58 [ 31.899811] __kasan_kmalloc+0xd4/0xd8 [ 31.899923] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.900035] kasan_atomics+0xb8/0x2e0 [ 31.900123] kunit_try_run_case+0x170/0x3f0 [ 31.900228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.900364] kthread+0x328/0x630 [ 31.900495] ret_from_fork+0x10/0x20 [ 31.902250] [ 31.902339] The buggy address belongs to the object at fff00000c78a2180 [ 31.902339] which belongs to the cache kmalloc-64 of size 64 [ 31.902549] The buggy address is located 0 bytes to the right of [ 31.902549] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.902756] [ 31.902820] The buggy address belongs to the physical page: [ 31.902919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.903085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.903241] page_type: f5(slab) [ 31.903364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.905077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.905233] page dumped because: kasan: bad access detected [ 31.905345] [ 31.905406] Memory state around the buggy address: [ 31.905728] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.905868] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.906004] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.906114] ^ [ 31.906220] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.906350] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.906633] ================================================================== [ 32.002134] ================================================================== [ 32.002472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 32.002780] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.003132] [ 32.003332] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.003852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.004175] Hardware name: linux,dummy-virt (DT) [ 32.004291] Call trace: [ 32.004552] show_stack+0x20/0x38 (C) [ 32.004949] dump_stack_lvl+0x8c/0xd0 [ 32.005295] print_report+0x118/0x608 [ 32.005675] kasan_report+0xdc/0x128 [ 32.006217] kasan_check_range+0x100/0x1a8 [ 32.006540] __kasan_check_write+0x20/0x30 [ 32.006879] kasan_atomics_helper+0x1128/0x4858 [ 32.007290] kasan_atomics+0x198/0x2e0 [ 32.007582] kunit_try_run_case+0x170/0x3f0 [ 32.007851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.008288] kthread+0x328/0x630 [ 32.008654] ret_from_fork+0x10/0x20 [ 32.008806] [ 32.008868] Allocated by task 267: [ 32.008953] kasan_save_stack+0x3c/0x68 [ 32.009323] kasan_save_track+0x20/0x40 [ 32.009785] kasan_save_alloc_info+0x40/0x58 [ 32.009938] __kasan_kmalloc+0xd4/0xd8 [ 32.010229] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.010376] kasan_atomics+0xb8/0x2e0 [ 32.010819] kunit_try_run_case+0x170/0x3f0 [ 32.011466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.011679] kthread+0x328/0x630 [ 32.011853] ret_from_fork+0x10/0x20 [ 32.011976] [ 32.012031] The buggy address belongs to the object at fff00000c78a2180 [ 32.012031] which belongs to the cache kmalloc-64 of size 64 [ 32.012231] The buggy address is located 0 bytes to the right of [ 32.012231] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.012488] [ 32.012567] The buggy address belongs to the physical page: [ 32.012699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.012866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.013022] page_type: f5(slab) [ 32.013125] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.013246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.013550] page dumped because: kasan: bad access detected [ 32.013655] [ 32.013719] Memory state around the buggy address: [ 32.014069] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.014249] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.014385] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.014524] ^ [ 32.014642] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.014782] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.014901] ================================================================== [ 31.974417] ================================================================== [ 31.974808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 31.974964] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.975125] [ 31.975227] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.975504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.975594] Hardware name: linux,dummy-virt (DT) [ 31.975693] Call trace: [ 31.975773] show_stack+0x20/0x38 (C) [ 31.975971] dump_stack_lvl+0x8c/0xd0 [ 31.976409] print_report+0x118/0x608 [ 31.976671] kasan_report+0xdc/0x128 [ 31.977024] kasan_check_range+0x100/0x1a8 [ 31.977279] __kasan_check_write+0x20/0x30 [ 31.977460] kasan_atomics_helper+0x1058/0x4858 [ 31.977610] kasan_atomics+0x198/0x2e0 [ 31.977748] kunit_try_run_case+0x170/0x3f0 [ 31.978144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.978486] kthread+0x328/0x630 [ 31.978735] ret_from_fork+0x10/0x20 [ 31.978960] [ 31.979030] Allocated by task 267: [ 31.979124] kasan_save_stack+0x3c/0x68 [ 31.979271] kasan_save_track+0x20/0x40 [ 31.979399] kasan_save_alloc_info+0x40/0x58 [ 31.979536] __kasan_kmalloc+0xd4/0xd8 [ 31.979666] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.979799] kasan_atomics+0xb8/0x2e0 [ 31.979906] kunit_try_run_case+0x170/0x3f0 [ 31.980397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.980802] kthread+0x328/0x630 [ 31.980936] ret_from_fork+0x10/0x20 [ 31.981029] [ 31.981085] The buggy address belongs to the object at fff00000c78a2180 [ 31.981085] which belongs to the cache kmalloc-64 of size 64 [ 31.981508] The buggy address is located 0 bytes to the right of [ 31.981508] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.982368] [ 31.982951] The buggy address belongs to the physical page: [ 31.983077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.983333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.983593] page_type: f5(slab) [ 31.984030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.984281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.984503] page dumped because: kasan: bad access detected [ 31.984800] [ 31.984992] Memory state around the buggy address: [ 31.985174] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.985512] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.985630] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.985728] ^ [ 31.985820] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.985917] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.986025] ================================================================== [ 32.153144] ================================================================== [ 32.153649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 32.153809] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.155558] [ 32.155707] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.155963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.156049] Hardware name: linux,dummy-virt (DT) [ 32.156152] Call trace: [ 32.156219] show_stack+0x20/0x38 (C) [ 32.156372] dump_stack_lvl+0x8c/0xd0 [ 32.156540] print_report+0x118/0x608 [ 32.156680] kasan_report+0xdc/0x128 [ 32.156822] __asan_report_load8_noabort+0x20/0x30 [ 32.156974] kasan_atomics_helper+0x3db0/0x4858 [ 32.157122] kasan_atomics+0x198/0x2e0 [ 32.157259] kunit_try_run_case+0x170/0x3f0 [ 32.157412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.160412] kthread+0x328/0x630 [ 32.161568] ret_from_fork+0x10/0x20 [ 32.162302] [ 32.162876] Allocated by task 267: [ 32.163020] kasan_save_stack+0x3c/0x68 [ 32.163439] kasan_save_track+0x20/0x40 [ 32.164182] kasan_save_alloc_info+0x40/0x58 [ 32.164324] __kasan_kmalloc+0xd4/0xd8 [ 32.164421] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.164536] kasan_atomics+0xb8/0x2e0 [ 32.164621] kunit_try_run_case+0x170/0x3f0 [ 32.164720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.164830] kthread+0x328/0x630 [ 32.164921] ret_from_fork+0x10/0x20 [ 32.165026] [ 32.165091] The buggy address belongs to the object at fff00000c78a2180 [ 32.165091] which belongs to the cache kmalloc-64 of size 64 [ 32.165280] The buggy address is located 0 bytes to the right of [ 32.165280] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.165503] [ 32.168089] The buggy address belongs to the physical page: [ 32.168420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.168585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.169238] page_type: f5(slab) [ 32.169697] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.169891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.170033] page dumped because: kasan: bad access detected [ 32.170132] [ 32.170194] Memory state around the buggy address: [ 32.170296] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.170440] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.172637] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.172887] ^ [ 32.173973] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.174796] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.175144] ================================================================== [ 32.060077] ================================================================== [ 32.060518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 32.060745] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.060910] [ 32.060998] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.061238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.061327] Hardware name: linux,dummy-virt (DT) [ 32.061541] Call trace: [ 32.061620] show_stack+0x20/0x38 (C) [ 32.061968] dump_stack_lvl+0x8c/0xd0 [ 32.062205] print_report+0x118/0x608 [ 32.062359] kasan_report+0xdc/0x128 [ 32.062564] kasan_check_range+0x100/0x1a8 [ 32.062721] __kasan_check_write+0x20/0x30 [ 32.062888] kasan_atomics_helper+0x12d8/0x4858 [ 32.063091] kasan_atomics+0x198/0x2e0 [ 32.063278] kunit_try_run_case+0x170/0x3f0 [ 32.063488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.063680] kthread+0x328/0x630 [ 32.063845] ret_from_fork+0x10/0x20 [ 32.064027] [ 32.064084] Allocated by task 267: [ 32.064170] kasan_save_stack+0x3c/0x68 [ 32.064294] kasan_save_track+0x20/0x40 [ 32.064804] kasan_save_alloc_info+0x40/0x58 [ 32.064980] __kasan_kmalloc+0xd4/0xd8 [ 32.065320] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.065483] kasan_atomics+0xb8/0x2e0 [ 32.065584] kunit_try_run_case+0x170/0x3f0 [ 32.065684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.065795] kthread+0x328/0x630 [ 32.066153] ret_from_fork+0x10/0x20 [ 32.066289] [ 32.066350] The buggy address belongs to the object at fff00000c78a2180 [ 32.066350] which belongs to the cache kmalloc-64 of size 64 [ 32.066574] The buggy address is located 0 bytes to the right of [ 32.066574] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.066826] [ 32.066899] The buggy address belongs to the physical page: [ 32.067040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.067267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.067489] page_type: f5(slab) [ 32.067657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.067814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.067993] page dumped because: kasan: bad access detected [ 32.068086] [ 32.068147] Memory state around the buggy address: [ 32.068343] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.068503] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.068989] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.069136] ^ [ 32.069865] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.070582] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.071183] ================================================================== [ 31.862479] ================================================================== [ 31.862627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 31.862783] Write of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.864094] [ 31.864222] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.864359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.864400] Hardware name: linux,dummy-virt (DT) [ 31.864471] Call trace: [ 31.864541] show_stack+0x20/0x38 (C) [ 31.864676] dump_stack_lvl+0x8c/0xd0 [ 31.864793] print_report+0x118/0x608 [ 31.864900] kasan_report+0xdc/0x128 [ 31.865014] kasan_check_range+0x100/0x1a8 [ 31.865133] __kasan_check_write+0x20/0x30 [ 31.865264] kasan_atomics_helper+0xd3c/0x4858 [ 31.865403] kasan_atomics+0x198/0x2e0 [ 31.865549] kunit_try_run_case+0x170/0x3f0 [ 31.865689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.865856] kthread+0x328/0x630 [ 31.865998] ret_from_fork+0x10/0x20 [ 31.866353] [ 31.866471] Allocated by task 267: [ 31.866573] kasan_save_stack+0x3c/0x68 [ 31.867070] kasan_save_track+0x20/0x40 [ 31.867216] kasan_save_alloc_info+0x40/0x58 [ 31.867331] __kasan_kmalloc+0xd4/0xd8 [ 31.867465] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.867611] kasan_atomics+0xb8/0x2e0 [ 31.867772] kunit_try_run_case+0x170/0x3f0 [ 31.867902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.868046] kthread+0x328/0x630 [ 31.868200] ret_from_fork+0x10/0x20 [ 31.868356] [ 31.868421] The buggy address belongs to the object at fff00000c78a2180 [ 31.868421] which belongs to the cache kmalloc-64 of size 64 [ 31.868619] The buggy address is located 0 bytes to the right of [ 31.868619] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.868830] [ 31.868922] The buggy address belongs to the physical page: [ 31.869077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.869305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.869500] page_type: f5(slab) [ 31.869603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.869747] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.869880] page dumped because: kasan: bad access detected [ 31.869985] [ 31.870152] Memory state around the buggy address: [ 31.870348] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.870496] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.870627] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.870744] ^ [ 31.870837] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.870975] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.871112] ================================================================== [ 32.017491] ================================================================== [ 32.017765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 32.017925] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 32.018077] [ 32.018175] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 32.018420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.018512] Hardware name: linux,dummy-virt (DT) [ 32.018609] Call trace: [ 32.018676] show_stack+0x20/0x38 (C) [ 32.018830] dump_stack_lvl+0x8c/0xd0 [ 32.018970] print_report+0x118/0x608 [ 32.019681] kasan_report+0xdc/0x128 [ 32.020053] kasan_check_range+0x100/0x1a8 [ 32.020413] __kasan_check_write+0x20/0x30 [ 32.020712] kasan_atomics_helper+0x1190/0x4858 [ 32.020907] kasan_atomics+0x198/0x2e0 [ 32.021022] kunit_try_run_case+0x170/0x3f0 [ 32.021155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.021322] kthread+0x328/0x630 [ 32.021955] ret_from_fork+0x10/0x20 [ 32.022290] [ 32.022487] Allocated by task 267: [ 32.022992] kasan_save_stack+0x3c/0x68 [ 32.023306] kasan_save_track+0x20/0x40 [ 32.023700] kasan_save_alloc_info+0x40/0x58 [ 32.023865] __kasan_kmalloc+0xd4/0xd8 [ 32.024018] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.024236] kasan_atomics+0xb8/0x2e0 [ 32.024358] kunit_try_run_case+0x170/0x3f0 [ 32.024501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.024846] kthread+0x328/0x630 [ 32.024966] ret_from_fork+0x10/0x20 [ 32.025057] [ 32.025323] The buggy address belongs to the object at fff00000c78a2180 [ 32.025323] which belongs to the cache kmalloc-64 of size 64 [ 32.025531] The buggy address is located 0 bytes to the right of [ 32.025531] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 32.025990] [ 32.026627] The buggy address belongs to the physical page: [ 32.026883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 32.027060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.027585] page_type: f5(slab) [ 32.027730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.028264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.028611] page dumped because: kasan: bad access detected [ 32.028754] [ 32.028810] Memory state around the buggy address: [ 32.028896] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.029020] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.029160] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.029564] ^ [ 32.029808] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.030272] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.030734] ================================================================== [ 31.950496] ================================================================== [ 31.950665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 31.950809] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267 [ 31.951130] [ 31.951262] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.951548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.951640] Hardware name: linux,dummy-virt (DT) [ 31.951772] Call trace: [ 31.951854] show_stack+0x20/0x38 (C) [ 31.952071] dump_stack_lvl+0x8c/0xd0 [ 31.952208] print_report+0x118/0x608 [ 31.952318] kasan_report+0xdc/0x128 [ 31.952532] kasan_check_range+0x100/0x1a8 [ 31.952653] __kasan_check_write+0x20/0x30 [ 31.952728] kasan_atomics_helper+0xf88/0x4858 [ 31.952831] kasan_atomics+0x198/0x2e0 [ 31.952951] kunit_try_run_case+0x170/0x3f0 [ 31.953094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.953588] kthread+0x328/0x630 [ 31.954004] ret_from_fork+0x10/0x20 [ 31.954336] [ 31.954428] Allocated by task 267: [ 31.954537] kasan_save_stack+0x3c/0x68 [ 31.954668] kasan_save_track+0x20/0x40 [ 31.954794] kasan_save_alloc_info+0x40/0x58 [ 31.954970] __kasan_kmalloc+0xd4/0xd8 [ 31.955075] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.955199] kasan_atomics+0xb8/0x2e0 [ 31.955308] kunit_try_run_case+0x170/0x3f0 [ 31.955441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.955589] kthread+0x328/0x630 [ 31.955706] ret_from_fork+0x10/0x20 [ 31.955822] [ 31.955885] The buggy address belongs to the object at fff00000c78a2180 [ 31.955885] which belongs to the cache kmalloc-64 of size 64 [ 31.956067] The buggy address is located 0 bytes to the right of [ 31.956067] allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0) [ 31.956267] [ 31.956374] The buggy address belongs to the physical page: [ 31.956807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2 [ 31.957246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.957612] page_type: f5(slab) [ 31.957751] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.958031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.958159] page dumped because: kasan: bad access detected [ 31.958239] [ 31.958284] Memory state around the buggy address: [ 31.958545] fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.958683] fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.958871] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.958996] ^ [ 31.959140] fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.959328] fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.959526] ==================================================================
[ 15.362612] ================================================================== [ 15.363008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.363316] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.363579] [ 15.363672] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.363720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.363734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.363756] Call Trace: [ 15.363775] <TASK> [ 15.363794] dump_stack_lvl+0x73/0xb0 [ 15.363822] print_report+0xd1/0x650 [ 15.363846] ? __virt_addr_valid+0x1db/0x2d0 [ 15.363869] ? kasan_atomics_helper+0xc70/0x5450 [ 15.363892] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.363916] ? kasan_atomics_helper+0xc70/0x5450 [ 15.363938] kasan_report+0x141/0x180 [ 15.363962] ? kasan_atomics_helper+0xc70/0x5450 [ 15.363990] kasan_check_range+0x10c/0x1c0 [ 15.364011] __kasan_check_write+0x18/0x20 [ 15.364033] kasan_atomics_helper+0xc70/0x5450 [ 15.364058] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.364081] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.364106] ? kasan_atomics+0x152/0x310 [ 15.364132] kasan_atomics+0x1dc/0x310 [ 15.364155] ? __pfx_kasan_atomics+0x10/0x10 [ 15.364177] ? trace_hardirqs_on+0x37/0xe0 [ 15.364203] ? __pfx_read_tsc+0x10/0x10 [ 15.364224] ? ktime_get_ts64+0x86/0x230 [ 15.364250] kunit_try_run_case+0x1a5/0x480 [ 15.364276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.364311] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.364337] ? __kthread_parkme+0x82/0x180 [ 15.364360] ? preempt_count_sub+0x50/0x80 [ 15.364387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.364412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.364455] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.364479] kthread+0x337/0x6f0 [ 15.364497] ? trace_preempt_on+0x20/0xc0 [ 15.364520] ? __pfx_kthread+0x10/0x10 [ 15.364539] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.364562] ? calculate_sigpending+0x7b/0xa0 [ 15.364585] ? __pfx_kthread+0x10/0x10 [ 15.364604] ret_from_fork+0x41/0x80 [ 15.364626] ? __pfx_kthread+0x10/0x10 [ 15.364645] ret_from_fork_asm+0x1a/0x30 [ 15.364678] </TASK> [ 15.364691] [ 15.372171] Allocated by task 284: [ 15.372367] kasan_save_stack+0x45/0x70 [ 15.372572] kasan_save_track+0x18/0x40 [ 15.372714] kasan_save_alloc_info+0x3b/0x50 [ 15.372925] __kasan_kmalloc+0xb7/0xc0 [ 15.373119] __kmalloc_cache_noprof+0x189/0x420 [ 15.373348] kasan_atomics+0x95/0x310 [ 15.373529] kunit_try_run_case+0x1a5/0x480 [ 15.373732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.373973] kthread+0x337/0x6f0 [ 15.374136] ret_from_fork+0x41/0x80 [ 15.374278] ret_from_fork_asm+0x1a/0x30 [ 15.374502] [ 15.374602] The buggy address belongs to the object at ffff888102717100 [ 15.374602] which belongs to the cache kmalloc-64 of size 64 [ 15.375057] The buggy address is located 0 bytes to the right of [ 15.375057] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.375466] [ 15.375543] The buggy address belongs to the physical page: [ 15.375715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.376063] flags: 0x200000000000000(node=0|zone=2) [ 15.376309] page_type: f5(slab) [ 15.376506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.376848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.377142] page dumped because: kasan: bad access detected [ 15.377328] [ 15.377399] Memory state around the buggy address: [ 15.377580] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.377853] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.378176] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.378547] ^ [ 15.378789] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.379112] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.380003] ================================================================== [ 15.545094] ================================================================== [ 15.545457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.545737] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.546162] [ 15.546277] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.546343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.546357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.546389] Call Trace: [ 15.546408] <TASK> [ 15.546426] dump_stack_lvl+0x73/0xb0 [ 15.546462] print_report+0xd1/0x650 [ 15.546485] ? __virt_addr_valid+0x1db/0x2d0 [ 15.546516] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.546538] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.546561] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.546594] kasan_report+0x141/0x180 [ 15.546618] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.546647] __asan_report_load4_noabort+0x18/0x20 [ 15.546668] kasan_atomics_helper+0x4a1c/0x5450 [ 15.546709] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.546732] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.546765] ? kasan_atomics+0x152/0x310 [ 15.546789] kasan_atomics+0x1dc/0x310 [ 15.546809] ? __pfx_kasan_atomics+0x10/0x10 [ 15.546828] ? trace_hardirqs_on+0x37/0xe0 [ 15.546861] ? __pfx_read_tsc+0x10/0x10 [ 15.546881] ? ktime_get_ts64+0x86/0x230 [ 15.546908] kunit_try_run_case+0x1a5/0x480 [ 15.546942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.546966] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.547000] ? __kthread_parkme+0x82/0x180 [ 15.547022] ? preempt_count_sub+0x50/0x80 [ 15.547047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.547082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.547106] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.547130] kthread+0x337/0x6f0 [ 15.547155] ? trace_preempt_on+0x20/0xc0 [ 15.547179] ? __pfx_kthread+0x10/0x10 [ 15.547198] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.547231] ? calculate_sigpending+0x7b/0xa0 [ 15.547254] ? __pfx_kthread+0x10/0x10 [ 15.547273] ret_from_fork+0x41/0x80 [ 15.547295] ? __pfx_kthread+0x10/0x10 [ 15.547324] ret_from_fork_asm+0x1a/0x30 [ 15.547356] </TASK> [ 15.547368] [ 15.555034] Allocated by task 284: [ 15.555219] kasan_save_stack+0x45/0x70 [ 15.555454] kasan_save_track+0x18/0x40 [ 15.555627] kasan_save_alloc_info+0x3b/0x50 [ 15.555775] __kasan_kmalloc+0xb7/0xc0 [ 15.555914] __kmalloc_cache_noprof+0x189/0x420 [ 15.556070] kasan_atomics+0x95/0x310 [ 15.556236] kunit_try_run_case+0x1a5/0x480 [ 15.556464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.556717] kthread+0x337/0x6f0 [ 15.556885] ret_from_fork+0x41/0x80 [ 15.557057] ret_from_fork_asm+0x1a/0x30 [ 15.557199] [ 15.557271] The buggy address belongs to the object at ffff888102717100 [ 15.557271] which belongs to the cache kmalloc-64 of size 64 [ 15.557631] The buggy address is located 0 bytes to the right of [ 15.557631] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.558188] [ 15.558315] The buggy address belongs to the physical page: [ 15.558583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.558960] flags: 0x200000000000000(node=0|zone=2) [ 15.559235] page_type: f5(slab) [ 15.559405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.559775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.560006] page dumped because: kasan: bad access detected [ 15.560248] [ 15.560354] Memory state around the buggy address: [ 15.560786] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.561108] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.561438] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.561717] ^ [ 15.561953] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.562262] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.562593] ================================================================== [ 14.974275] ================================================================== [ 14.975199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.975554] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 14.975858] [ 14.975978] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 14.976029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.976043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.976065] Call Trace: [ 14.976096] <TASK> [ 14.976115] dump_stack_lvl+0x73/0xb0 [ 14.976146] print_report+0xd1/0x650 [ 14.976168] ? __virt_addr_valid+0x1db/0x2d0 [ 14.976192] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.976214] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.976236] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.976259] kasan_report+0x141/0x180 [ 14.976281] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.976320] __asan_report_load4_noabort+0x18/0x20 [ 14.976341] kasan_atomics_helper+0x4bbc/0x5450 [ 14.976363] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.976386] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.976410] ? kasan_atomics+0x152/0x310 [ 14.976433] kasan_atomics+0x1dc/0x310 [ 14.976453] ? __pfx_kasan_atomics+0x10/0x10 [ 14.976472] ? trace_hardirqs_on+0x37/0xe0 [ 14.976496] ? __pfx_read_tsc+0x10/0x10 [ 14.976517] ? ktime_get_ts64+0x86/0x230 [ 14.976543] kunit_try_run_case+0x1a5/0x480 [ 14.976568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.976593] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.976618] ? __kthread_parkme+0x82/0x180 [ 14.976641] ? preempt_count_sub+0x50/0x80 [ 14.976669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.976693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.976716] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.976738] kthread+0x337/0x6f0 [ 14.976755] ? trace_preempt_on+0x20/0xc0 [ 14.976777] ? __pfx_kthread+0x10/0x10 [ 14.976796] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.976816] ? calculate_sigpending+0x7b/0xa0 [ 14.976838] ? __pfx_kthread+0x10/0x10 [ 14.976856] ret_from_fork+0x41/0x80 [ 14.976877] ? __pfx_kthread+0x10/0x10 [ 14.976895] ret_from_fork_asm+0x1a/0x30 [ 14.976927] </TASK> [ 14.976939] [ 14.985339] Allocated by task 284: [ 14.985497] kasan_save_stack+0x45/0x70 [ 14.985652] kasan_save_track+0x18/0x40 [ 14.985792] kasan_save_alloc_info+0x3b/0x50 [ 14.986089] __kasan_kmalloc+0xb7/0xc0 [ 14.986466] __kmalloc_cache_noprof+0x189/0x420 [ 14.986799] kasan_atomics+0x95/0x310 [ 14.987021] kunit_try_run_case+0x1a5/0x480 [ 14.987215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.987466] kthread+0x337/0x6f0 [ 14.987640] ret_from_fork+0x41/0x80 [ 14.987825] ret_from_fork_asm+0x1a/0x30 [ 14.988063] [ 14.988162] The buggy address belongs to the object at ffff888102717100 [ 14.988162] which belongs to the cache kmalloc-64 of size 64 [ 14.988682] The buggy address is located 0 bytes to the right of [ 14.988682] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 14.989324] [ 14.989405] The buggy address belongs to the physical page: [ 14.989582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 14.989836] flags: 0x200000000000000(node=0|zone=2) [ 14.990143] page_type: f5(slab) [ 14.990331] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.990669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.991314] page dumped because: kasan: bad access detected [ 14.991853] [ 14.992056] Memory state around the buggy address: [ 14.992263] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.992607] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.992900] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.993195] ^ [ 14.993395] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.993618] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.994078] ================================================================== [ 16.100997] ================================================================== [ 16.101686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.101945] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.102173] [ 16.102260] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.102696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.102718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.102741] Call Trace: [ 16.102758] <TASK> [ 16.102773] dump_stack_lvl+0x73/0xb0 [ 16.102803] print_report+0xd1/0x650 [ 16.102987] ? __virt_addr_valid+0x1db/0x2d0 [ 16.103021] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.103045] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.103070] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.103093] kasan_report+0x141/0x180 [ 16.103118] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.103146] kasan_check_range+0x10c/0x1c0 [ 16.103167] __kasan_check_write+0x18/0x20 [ 16.103188] kasan_atomics_helper+0x1f43/0x5450 [ 16.103213] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.103237] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.103259] ? kasan_atomics+0x152/0x310 [ 16.103283] kasan_atomics+0x1dc/0x310 [ 16.103315] ? __pfx_kasan_atomics+0x10/0x10 [ 16.103336] ? trace_hardirqs_on+0x37/0xe0 [ 16.103359] ? __pfx_read_tsc+0x10/0x10 [ 16.103380] ? ktime_get_ts64+0x86/0x230 [ 16.103405] kunit_try_run_case+0x1a5/0x480 [ 16.103430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.103466] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.103491] ? __kthread_parkme+0x82/0x180 [ 16.103514] ? preempt_count_sub+0x50/0x80 [ 16.103540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.103565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.103589] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.103613] kthread+0x337/0x6f0 [ 16.103632] ? trace_preempt_on+0x20/0xc0 [ 16.103658] ? __pfx_kthread+0x10/0x10 [ 16.103679] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.103703] ? calculate_sigpending+0x7b/0xa0 [ 16.103727] ? __pfx_kthread+0x10/0x10 [ 16.103747] ret_from_fork+0x41/0x80 [ 16.103772] ? __pfx_kthread+0x10/0x10 [ 16.103794] ret_from_fork_asm+0x1a/0x30 [ 16.103826] </TASK> [ 16.103838] [ 16.116358] Allocated by task 284: [ 16.116749] kasan_save_stack+0x45/0x70 [ 16.116973] kasan_save_track+0x18/0x40 [ 16.117157] kasan_save_alloc_info+0x3b/0x50 [ 16.117353] __kasan_kmalloc+0xb7/0xc0 [ 16.117807] __kmalloc_cache_noprof+0x189/0x420 [ 16.118139] kasan_atomics+0x95/0x310 [ 16.118727] kunit_try_run_case+0x1a5/0x480 [ 16.119009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.119392] kthread+0x337/0x6f0 [ 16.119883] ret_from_fork+0x41/0x80 [ 16.120115] ret_from_fork_asm+0x1a/0x30 [ 16.120428] [ 16.120668] The buggy address belongs to the object at ffff888102717100 [ 16.120668] which belongs to the cache kmalloc-64 of size 64 [ 16.121159] The buggy address is located 0 bytes to the right of [ 16.121159] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.121945] [ 16.122189] The buggy address belongs to the physical page: [ 16.122648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.123074] flags: 0x200000000000000(node=0|zone=2) [ 16.123291] page_type: f5(slab) [ 16.123655] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.124100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.124832] page dumped because: kasan: bad access detected [ 16.125081] [ 16.125168] Memory state around the buggy address: [ 16.125385] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.126151] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.126473] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.126704] ^ [ 16.126861] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.127072] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.127280] ================================================================== [ 15.841808] ================================================================== [ 15.842200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.842915] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.843245] [ 15.843385] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.843431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.843443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.843465] Call Trace: [ 15.843480] <TASK> [ 15.843495] dump_stack_lvl+0x73/0xb0 [ 15.843523] print_report+0xd1/0x650 [ 15.843546] ? __virt_addr_valid+0x1db/0x2d0 [ 15.843568] ? kasan_atomics_helper+0x177f/0x5450 [ 15.843590] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.843625] ? kasan_atomics_helper+0x177f/0x5450 [ 15.843648] kasan_report+0x141/0x180 [ 15.843672] ? kasan_atomics_helper+0x177f/0x5450 [ 15.843711] kasan_check_range+0x10c/0x1c0 [ 15.843733] __kasan_check_write+0x18/0x20 [ 15.843753] kasan_atomics_helper+0x177f/0x5450 [ 15.843778] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.843801] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.843822] ? kasan_atomics+0x152/0x310 [ 15.843848] kasan_atomics+0x1dc/0x310 [ 15.843869] ? __pfx_kasan_atomics+0x10/0x10 [ 15.843888] ? trace_hardirqs_on+0x37/0xe0 [ 15.843912] ? __pfx_read_tsc+0x10/0x10 [ 15.843932] ? ktime_get_ts64+0x86/0x230 [ 15.843958] kunit_try_run_case+0x1a5/0x480 [ 15.843993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.844017] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.844052] ? __kthread_parkme+0x82/0x180 [ 15.844075] ? preempt_count_sub+0x50/0x80 [ 15.844100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.844125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.844156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.844180] kthread+0x337/0x6f0 [ 15.844197] ? trace_preempt_on+0x20/0xc0 [ 15.844230] ? __pfx_kthread+0x10/0x10 [ 15.844249] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.844272] ? calculate_sigpending+0x7b/0xa0 [ 15.844309] ? __pfx_kthread+0x10/0x10 [ 15.844329] ret_from_fork+0x41/0x80 [ 15.844351] ? __pfx_kthread+0x10/0x10 [ 15.844380] ret_from_fork_asm+0x1a/0x30 [ 15.844413] </TASK> [ 15.844425] [ 15.852483] Allocated by task 284: [ 15.852673] kasan_save_stack+0x45/0x70 [ 15.852878] kasan_save_track+0x18/0x40 [ 15.853049] kasan_save_alloc_info+0x3b/0x50 [ 15.853265] __kasan_kmalloc+0xb7/0xc0 [ 15.853470] __kmalloc_cache_noprof+0x189/0x420 [ 15.853687] kasan_atomics+0x95/0x310 [ 15.853874] kunit_try_run_case+0x1a5/0x480 [ 15.854098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.854339] kthread+0x337/0x6f0 [ 15.854537] ret_from_fork+0x41/0x80 [ 15.854723] ret_from_fork_asm+0x1a/0x30 [ 15.854924] [ 15.855011] The buggy address belongs to the object at ffff888102717100 [ 15.855011] which belongs to the cache kmalloc-64 of size 64 [ 15.855560] The buggy address is located 0 bytes to the right of [ 15.855560] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.855964] [ 15.856038] The buggy address belongs to the physical page: [ 15.856213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.856543] flags: 0x200000000000000(node=0|zone=2) [ 15.856863] page_type: f5(slab) [ 15.857036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.857381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.857705] page dumped because: kasan: bad access detected [ 15.857880] [ 15.857951] Memory state around the buggy address: [ 15.858108] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.858425] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.858784] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.859129] ^ [ 15.859364] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.859715] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.860013] ================================================================== [ 15.034159] ================================================================== [ 15.034733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.035196] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.035551] [ 15.035638] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.035685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.035699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.035720] Call Trace: [ 15.035738] <TASK> [ 15.035757] dump_stack_lvl+0x73/0xb0 [ 15.035784] print_report+0xd1/0x650 [ 15.035807] ? __virt_addr_valid+0x1db/0x2d0 [ 15.035828] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.035851] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.035874] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.035897] kasan_report+0x141/0x180 [ 15.035921] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.035948] __asan_report_store4_noabort+0x1b/0x30 [ 15.035971] kasan_atomics_helper+0x4b6e/0x5450 [ 15.035995] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.036019] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.036042] ? kasan_atomics+0x152/0x310 [ 15.036078] kasan_atomics+0x1dc/0x310 [ 15.036098] ? __pfx_kasan_atomics+0x10/0x10 [ 15.036119] ? trace_hardirqs_on+0x37/0xe0 [ 15.036143] ? __pfx_read_tsc+0x10/0x10 [ 15.036164] ? ktime_get_ts64+0x86/0x230 [ 15.036216] kunit_try_run_case+0x1a5/0x480 [ 15.036241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.036266] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.036292] ? __kthread_parkme+0x82/0x180 [ 15.036326] ? preempt_count_sub+0x50/0x80 [ 15.036352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.036376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.036400] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.036424] kthread+0x337/0x6f0 [ 15.036603] ? trace_preempt_on+0x20/0xc0 [ 15.036787] ? __pfx_kthread+0x10/0x10 [ 15.037128] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.037154] ? calculate_sigpending+0x7b/0xa0 [ 15.037178] ? __pfx_kthread+0x10/0x10 [ 15.037198] ret_from_fork+0x41/0x80 [ 15.037220] ? __pfx_kthread+0x10/0x10 [ 15.037240] ret_from_fork_asm+0x1a/0x30 [ 15.037274] </TASK> [ 15.037287] [ 15.048852] Allocated by task 284: [ 15.049377] kasan_save_stack+0x45/0x70 [ 15.049777] kasan_save_track+0x18/0x40 [ 15.050062] kasan_save_alloc_info+0x3b/0x50 [ 15.050285] __kasan_kmalloc+0xb7/0xc0 [ 15.050686] __kmalloc_cache_noprof+0x189/0x420 [ 15.050926] kasan_atomics+0x95/0x310 [ 15.051243] kunit_try_run_case+0x1a5/0x480 [ 15.051634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.051892] kthread+0x337/0x6f0 [ 15.052118] ret_from_fork+0x41/0x80 [ 15.052278] ret_from_fork_asm+0x1a/0x30 [ 15.052729] [ 15.052979] The buggy address belongs to the object at ffff888102717100 [ 15.052979] which belongs to the cache kmalloc-64 of size 64 [ 15.053476] The buggy address is located 0 bytes to the right of [ 15.053476] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.054284] [ 15.054383] The buggy address belongs to the physical page: [ 15.054953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.055486] flags: 0x200000000000000(node=0|zone=2) [ 15.055840] page_type: f5(slab) [ 15.056249] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.056706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.057203] page dumped because: kasan: bad access detected [ 15.057513] [ 15.057782] Memory state around the buggy address: [ 15.058171] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.058655] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.059254] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.059810] ^ [ 15.060166] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.060478] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.060965] ================================================================== [ 15.263552] ================================================================== [ 15.263841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.264419] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.264747] [ 15.264845] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.264895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.264912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.264934] Call Trace: [ 15.264948] <TASK> [ 15.264962] dump_stack_lvl+0x73/0xb0 [ 15.264992] print_report+0xd1/0x650 [ 15.265015] ? __virt_addr_valid+0x1db/0x2d0 [ 15.265039] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.265062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.265086] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.265109] kasan_report+0x141/0x180 [ 15.265134] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.265163] kasan_check_range+0x10c/0x1c0 [ 15.265186] __kasan_check_write+0x18/0x20 [ 15.265206] kasan_atomics_helper+0x8f9/0x5450 [ 15.265231] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.265255] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.265278] ? kasan_atomics+0x152/0x310 [ 15.265316] kasan_atomics+0x1dc/0x310 [ 15.265337] ? __pfx_kasan_atomics+0x10/0x10 [ 15.265358] ? trace_hardirqs_on+0x37/0xe0 [ 15.265382] ? __pfx_read_tsc+0x10/0x10 [ 15.265402] ? ktime_get_ts64+0x86/0x230 [ 15.265428] kunit_try_run_case+0x1a5/0x480 [ 15.265462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.265488] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.265513] ? __kthread_parkme+0x82/0x180 [ 15.265536] ? preempt_count_sub+0x50/0x80 [ 15.265562] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.265586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.265609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.265633] kthread+0x337/0x6f0 [ 15.265650] ? trace_preempt_on+0x20/0xc0 [ 15.265675] ? __pfx_kthread+0x10/0x10 [ 15.265694] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.265716] ? calculate_sigpending+0x7b/0xa0 [ 15.265741] ? __pfx_kthread+0x10/0x10 [ 15.265761] ret_from_fork+0x41/0x80 [ 15.265786] ? __pfx_kthread+0x10/0x10 [ 15.265807] ret_from_fork_asm+0x1a/0x30 [ 15.265839] </TASK> [ 15.265851] [ 15.273578] Allocated by task 284: [ 15.273764] kasan_save_stack+0x45/0x70 [ 15.273951] kasan_save_track+0x18/0x40 [ 15.274102] kasan_save_alloc_info+0x3b/0x50 [ 15.274324] __kasan_kmalloc+0xb7/0xc0 [ 15.274517] __kmalloc_cache_noprof+0x189/0x420 [ 15.274732] kasan_atomics+0x95/0x310 [ 15.274896] kunit_try_run_case+0x1a5/0x480 [ 15.275072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.275296] kthread+0x337/0x6f0 [ 15.275493] ret_from_fork+0x41/0x80 [ 15.275658] ret_from_fork_asm+0x1a/0x30 [ 15.275823] [ 15.275896] The buggy address belongs to the object at ffff888102717100 [ 15.275896] which belongs to the cache kmalloc-64 of size 64 [ 15.276256] The buggy address is located 0 bytes to the right of [ 15.276256] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.276664] [ 15.276763] The buggy address belongs to the physical page: [ 15.277021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.277395] flags: 0x200000000000000(node=0|zone=2) [ 15.277634] page_type: f5(slab) [ 15.277804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.278035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.278263] page dumped because: kasan: bad access detected [ 15.278451] [ 15.278565] Memory state around the buggy address: [ 15.278795] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.279115] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.279455] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.279775] ^ [ 15.279994] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.280298] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.280627] ================================================================== [ 15.126713] ================================================================== [ 15.127370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.127937] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.128548] [ 15.128666] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.128717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.128731] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.128754] Call Trace: [ 15.128795] <TASK> [ 15.128813] dump_stack_lvl+0x73/0xb0 [ 15.128860] print_report+0xd1/0x650 [ 15.128885] ? __virt_addr_valid+0x1db/0x2d0 [ 15.128920] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.128957] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.128982] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.129019] kasan_report+0x141/0x180 [ 15.129042] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.129084] __asan_report_store4_noabort+0x1b/0x30 [ 15.129106] kasan_atomics_helper+0x4b3a/0x5450 [ 15.129143] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.129180] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.129251] ? kasan_atomics+0x152/0x310 [ 15.129277] kasan_atomics+0x1dc/0x310 [ 15.129310] ? __pfx_kasan_atomics+0x10/0x10 [ 15.129331] ? trace_hardirqs_on+0x37/0xe0 [ 15.129356] ? __pfx_read_tsc+0x10/0x10 [ 15.129376] ? ktime_get_ts64+0x86/0x230 [ 15.129402] kunit_try_run_case+0x1a5/0x480 [ 15.129426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.129451] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.129477] ? __kthread_parkme+0x82/0x180 [ 15.129500] ? preempt_count_sub+0x50/0x80 [ 15.129525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.129550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.129573] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.129597] kthread+0x337/0x6f0 [ 15.129615] ? trace_preempt_on+0x20/0xc0 [ 15.129638] ? __pfx_kthread+0x10/0x10 [ 15.129658] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.129679] ? calculate_sigpending+0x7b/0xa0 [ 15.129701] ? __pfx_kthread+0x10/0x10 [ 15.129721] ret_from_fork+0x41/0x80 [ 15.129742] ? __pfx_kthread+0x10/0x10 [ 15.129761] ret_from_fork_asm+0x1a/0x30 [ 15.129793] </TASK> [ 15.129805] [ 15.138797] Allocated by task 284: [ 15.139045] kasan_save_stack+0x45/0x70 [ 15.139201] kasan_save_track+0x18/0x40 [ 15.139363] kasan_save_alloc_info+0x3b/0x50 [ 15.139588] __kasan_kmalloc+0xb7/0xc0 [ 15.139821] __kmalloc_cache_noprof+0x189/0x420 [ 15.140318] kasan_atomics+0x95/0x310 [ 15.140525] kunit_try_run_case+0x1a5/0x480 [ 15.140779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.141049] kthread+0x337/0x6f0 [ 15.141220] ret_from_fork+0x41/0x80 [ 15.141466] ret_from_fork_asm+0x1a/0x30 [ 15.141701] [ 15.141776] The buggy address belongs to the object at ffff888102717100 [ 15.141776] which belongs to the cache kmalloc-64 of size 64 [ 15.142544] The buggy address is located 0 bytes to the right of [ 15.142544] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.143240] [ 15.143332] The buggy address belongs to the physical page: [ 15.143710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.144094] flags: 0x200000000000000(node=0|zone=2) [ 15.144369] page_type: f5(slab) [ 15.144602] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.145148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.145511] page dumped because: kasan: bad access detected [ 15.145741] [ 15.145815] Memory state around the buggy address: [ 15.146010] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.146376] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.146783] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.147073] ^ [ 15.147231] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.147827] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.148320] ================================================================== [ 15.306170] ================================================================== [ 15.306521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.306762] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.307062] [ 15.307150] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.307196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.307209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.307231] Call Trace: [ 15.307244] <TASK> [ 15.307258] dump_stack_lvl+0x73/0xb0 [ 15.307285] print_report+0xd1/0x650 [ 15.307318] ? __virt_addr_valid+0x1db/0x2d0 [ 15.307341] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.307363] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.307385] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.307408] kasan_report+0x141/0x180 [ 15.307431] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.307459] kasan_check_range+0x10c/0x1c0 [ 15.307479] __kasan_check_write+0x18/0x20 [ 15.307500] kasan_atomics_helper+0xa2b/0x5450 [ 15.307523] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.307546] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.307570] ? kasan_atomics+0x152/0x310 [ 15.307594] kasan_atomics+0x1dc/0x310 [ 15.307614] ? __pfx_kasan_atomics+0x10/0x10 [ 15.307634] ? trace_hardirqs_on+0x37/0xe0 [ 15.307658] ? __pfx_read_tsc+0x10/0x10 [ 15.307678] ? ktime_get_ts64+0x86/0x230 [ 15.307703] kunit_try_run_case+0x1a5/0x480 [ 15.307728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.307752] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.307777] ? __kthread_parkme+0x82/0x180 [ 15.307799] ? preempt_count_sub+0x50/0x80 [ 15.307826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.307850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.307873] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.307897] kthread+0x337/0x6f0 [ 15.307914] ? trace_preempt_on+0x20/0xc0 [ 15.307937] ? __pfx_kthread+0x10/0x10 [ 15.307957] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.307978] ? calculate_sigpending+0x7b/0xa0 [ 15.308000] ? __pfx_kthread+0x10/0x10 [ 15.308019] ret_from_fork+0x41/0x80 [ 15.308040] ? __pfx_kthread+0x10/0x10 [ 15.308059] ret_from_fork_asm+0x1a/0x30 [ 15.308091] </TASK> [ 15.308102] [ 15.315713] Allocated by task 284: [ 15.315904] kasan_save_stack+0x45/0x70 [ 15.316110] kasan_save_track+0x18/0x40 [ 15.316336] kasan_save_alloc_info+0x3b/0x50 [ 15.316565] __kasan_kmalloc+0xb7/0xc0 [ 15.316738] __kmalloc_cache_noprof+0x189/0x420 [ 15.316945] kasan_atomics+0x95/0x310 [ 15.317119] kunit_try_run_case+0x1a5/0x480 [ 15.317315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.318472] kthread+0x337/0x6f0 [ 15.318641] ret_from_fork+0x41/0x80 [ 15.318789] ret_from_fork_asm+0x1a/0x30 [ 15.318995] [ 15.319100] The buggy address belongs to the object at ffff888102717100 [ 15.319100] which belongs to the cache kmalloc-64 of size 64 [ 15.320242] The buggy address is located 0 bytes to the right of [ 15.320242] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.320893] [ 15.321131] The buggy address belongs to the physical page: [ 15.321371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.321882] flags: 0x200000000000000(node=0|zone=2) [ 15.322180] page_type: f5(slab) [ 15.322334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.322821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.323208] page dumped because: kasan: bad access detected [ 15.323589] [ 15.323695] Memory state around the buggy address: [ 15.323902] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.324365] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.324780] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.325148] ^ [ 15.325385] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.325837] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.326159] ================================================================== [ 15.599856] ================================================================== [ 15.600275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.600876] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.601198] [ 15.601291] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.601350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.601364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.601386] Call Trace: [ 15.601401] <TASK> [ 15.601416] dump_stack_lvl+0x73/0xb0 [ 15.601445] print_report+0xd1/0x650 [ 15.601469] ? __virt_addr_valid+0x1db/0x2d0 [ 15.601491] ? kasan_atomics_helper+0x1217/0x5450 [ 15.601514] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.601538] ? kasan_atomics_helper+0x1217/0x5450 [ 15.601563] kasan_report+0x141/0x180 [ 15.601588] ? kasan_atomics_helper+0x1217/0x5450 [ 15.601617] kasan_check_range+0x10c/0x1c0 [ 15.601638] __kasan_check_write+0x18/0x20 [ 15.601658] kasan_atomics_helper+0x1217/0x5450 [ 15.601682] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.601705] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.601728] ? kasan_atomics+0x152/0x310 [ 15.601753] kasan_atomics+0x1dc/0x310 [ 15.601774] ? __pfx_kasan_atomics+0x10/0x10 [ 15.601793] ? trace_hardirqs_on+0x37/0xe0 [ 15.601817] ? __pfx_read_tsc+0x10/0x10 [ 15.601838] ? ktime_get_ts64+0x86/0x230 [ 15.601865] kunit_try_run_case+0x1a5/0x480 [ 15.601890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.601915] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.601940] ? __kthread_parkme+0x82/0x180 [ 15.601962] ? preempt_count_sub+0x50/0x80 [ 15.601988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.602024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.602048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.602082] kthread+0x337/0x6f0 [ 15.602100] ? trace_preempt_on+0x20/0xc0 [ 15.602122] ? __pfx_kthread+0x10/0x10 [ 15.602142] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.602164] ? calculate_sigpending+0x7b/0xa0 [ 15.602197] ? __pfx_kthread+0x10/0x10 [ 15.602216] ret_from_fork+0x41/0x80 [ 15.602238] ? __pfx_kthread+0x10/0x10 [ 15.602267] ret_from_fork_asm+0x1a/0x30 [ 15.602300] </TASK> [ 15.602319] [ 15.610475] Allocated by task 284: [ 15.610690] kasan_save_stack+0x45/0x70 [ 15.610916] kasan_save_track+0x18/0x40 [ 15.611082] kasan_save_alloc_info+0x3b/0x50 [ 15.611286] __kasan_kmalloc+0xb7/0xc0 [ 15.611520] __kmalloc_cache_noprof+0x189/0x420 [ 15.611730] kasan_atomics+0x95/0x310 [ 15.611924] kunit_try_run_case+0x1a5/0x480 [ 15.612097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.612370] kthread+0x337/0x6f0 [ 15.612580] ret_from_fork+0x41/0x80 [ 15.612752] ret_from_fork_asm+0x1a/0x30 [ 15.612959] [ 15.613051] The buggy address belongs to the object at ffff888102717100 [ 15.613051] which belongs to the cache kmalloc-64 of size 64 [ 15.613417] The buggy address is located 0 bytes to the right of [ 15.613417] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.613782] [ 15.613855] The buggy address belongs to the physical page: [ 15.614028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.614382] flags: 0x200000000000000(node=0|zone=2) [ 15.614866] page_type: f5(slab) [ 15.615038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.615389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.616098] page dumped because: kasan: bad access detected [ 15.616282] [ 15.616363] Memory state around the buggy address: [ 15.616725] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.617053] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.617395] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.617697] ^ [ 15.617860] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.618078] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.618294] ================================================================== [ 15.879198] ================================================================== [ 15.879521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.879871] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.880476] [ 15.880565] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.880611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.880625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.880646] Call Trace: [ 15.880663] <TASK> [ 15.880679] dump_stack_lvl+0x73/0xb0 [ 15.880705] print_report+0xd1/0x650 [ 15.880728] ? __virt_addr_valid+0x1db/0x2d0 [ 15.880750] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.880773] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.880795] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.880817] kasan_report+0x141/0x180 [ 15.880841] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.880867] kasan_check_range+0x10c/0x1c0 [ 15.880889] __kasan_check_write+0x18/0x20 [ 15.880909] kasan_atomics_helper+0x18b1/0x5450 [ 15.880933] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.880972] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.881008] ? kasan_atomics+0x152/0x310 [ 15.881032] kasan_atomics+0x1dc/0x310 [ 15.881051] ? __pfx_kasan_atomics+0x10/0x10 [ 15.881084] ? trace_hardirqs_on+0x37/0xe0 [ 15.881107] ? __pfx_read_tsc+0x10/0x10 [ 15.881127] ? ktime_get_ts64+0x86/0x230 [ 15.881152] kunit_try_run_case+0x1a5/0x480 [ 15.881177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.881201] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.881225] ? __kthread_parkme+0x82/0x180 [ 15.881247] ? preempt_count_sub+0x50/0x80 [ 15.881273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.881297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.881330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.881353] kthread+0x337/0x6f0 [ 15.881371] ? trace_preempt_on+0x20/0xc0 [ 15.881394] ? __pfx_kthread+0x10/0x10 [ 15.881413] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.881434] ? calculate_sigpending+0x7b/0xa0 [ 15.881456] ? __pfx_kthread+0x10/0x10 [ 15.881475] ret_from_fork+0x41/0x80 [ 15.881496] ? __pfx_kthread+0x10/0x10 [ 15.881517] ret_from_fork_asm+0x1a/0x30 [ 15.881549] </TASK> [ 15.881561] [ 15.889452] Allocated by task 284: [ 15.889605] kasan_save_stack+0x45/0x70 [ 15.889754] kasan_save_track+0x18/0x40 [ 15.889891] kasan_save_alloc_info+0x3b/0x50 [ 15.890038] __kasan_kmalloc+0xb7/0xc0 [ 15.890257] __kmalloc_cache_noprof+0x189/0x420 [ 15.890486] kasan_atomics+0x95/0x310 [ 15.890671] kunit_try_run_case+0x1a5/0x480 [ 15.890883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.891120] kthread+0x337/0x6f0 [ 15.891242] ret_from_fork+0x41/0x80 [ 15.891386] ret_from_fork_asm+0x1a/0x30 [ 15.891538] [ 15.891635] The buggy address belongs to the object at ffff888102717100 [ 15.891635] which belongs to the cache kmalloc-64 of size 64 [ 15.892193] The buggy address is located 0 bytes to the right of [ 15.892193] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.892759] [ 15.892833] The buggy address belongs to the physical page: [ 15.893007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.893248] flags: 0x200000000000000(node=0|zone=2) [ 15.893537] page_type: f5(slab) [ 15.893722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.894064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.894408] page dumped because: kasan: bad access detected [ 15.894812] [ 15.894971] Memory state around the buggy address: [ 15.895128] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.895357] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.895576] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.896213] ^ [ 15.896449] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.896799] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.897184] ================================================================== [ 16.079439] ================================================================== [ 16.079783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.080419] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.080775] [ 16.080883] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.080927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.080941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.080962] Call Trace: [ 16.080987] <TASK> [ 16.081003] dump_stack_lvl+0x73/0xb0 [ 16.081031] print_report+0xd1/0x650 [ 16.081066] ? __virt_addr_valid+0x1db/0x2d0 [ 16.081087] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.081110] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.081133] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.081156] kasan_report+0x141/0x180 [ 16.081180] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.081208] kasan_check_range+0x10c/0x1c0 [ 16.081229] __kasan_check_write+0x18/0x20 [ 16.081249] kasan_atomics_helper+0x1eaa/0x5450 [ 16.081273] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.081297] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.081329] ? kasan_atomics+0x152/0x310 [ 16.081363] kasan_atomics+0x1dc/0x310 [ 16.081384] ? __pfx_kasan_atomics+0x10/0x10 [ 16.081404] ? trace_hardirqs_on+0x37/0xe0 [ 16.081448] ? __pfx_read_tsc+0x10/0x10 [ 16.081469] ? ktime_get_ts64+0x86/0x230 [ 16.081494] kunit_try_run_case+0x1a5/0x480 [ 16.081520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.081555] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.081579] ? __kthread_parkme+0x82/0x180 [ 16.081601] ? preempt_count_sub+0x50/0x80 [ 16.081637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.081661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.081684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.081708] kthread+0x337/0x6f0 [ 16.081735] ? trace_preempt_on+0x20/0xc0 [ 16.081758] ? __pfx_kthread+0x10/0x10 [ 16.081777] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.081809] ? calculate_sigpending+0x7b/0xa0 [ 16.081831] ? __pfx_kthread+0x10/0x10 [ 16.081850] ret_from_fork+0x41/0x80 [ 16.081872] ? __pfx_kthread+0x10/0x10 [ 16.081899] ret_from_fork_asm+0x1a/0x30 [ 16.081930] </TASK> [ 16.081943] [ 16.089923] Allocated by task 284: [ 16.090133] kasan_save_stack+0x45/0x70 [ 16.090295] kasan_save_track+0x18/0x40 [ 16.090532] kasan_save_alloc_info+0x3b/0x50 [ 16.090698] __kasan_kmalloc+0xb7/0xc0 [ 16.090910] __kmalloc_cache_noprof+0x189/0x420 [ 16.091107] kasan_atomics+0x95/0x310 [ 16.091270] kunit_try_run_case+0x1a5/0x480 [ 16.091483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.091715] kthread+0x337/0x6f0 [ 16.091886] ret_from_fork+0x41/0x80 [ 16.092079] ret_from_fork_asm+0x1a/0x30 [ 16.092245] [ 16.092356] The buggy address belongs to the object at ffff888102717100 [ 16.092356] which belongs to the cache kmalloc-64 of size 64 [ 16.092852] The buggy address is located 0 bytes to the right of [ 16.092852] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.093265] [ 16.093347] The buggy address belongs to the physical page: [ 16.093560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.094102] flags: 0x200000000000000(node=0|zone=2) [ 16.094260] page_type: f5(slab) [ 16.094428] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.094777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.095144] page dumped because: kasan: bad access detected [ 16.095367] [ 16.095439] Memory state around the buggy address: [ 16.095589] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.095910] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.096231] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.097806] ^ [ 16.098485] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.099248] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.099874] ================================================================== [ 15.581520] ================================================================== [ 15.581881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.582297] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.582665] [ 15.582759] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.582802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.582815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.582836] Call Trace: [ 15.582850] <TASK> [ 15.582866] dump_stack_lvl+0x73/0xb0 [ 15.582893] print_report+0xd1/0x650 [ 15.582917] ? __virt_addr_valid+0x1db/0x2d0 [ 15.582938] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.582960] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.582983] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.583006] kasan_report+0x141/0x180 [ 15.583029] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.583058] __asan_report_load4_noabort+0x18/0x20 [ 15.583093] kasan_atomics_helper+0x4a02/0x5450 [ 15.583117] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.583141] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.583174] ? kasan_atomics+0x152/0x310 [ 15.583199] kasan_atomics+0x1dc/0x310 [ 15.583219] ? __pfx_kasan_atomics+0x10/0x10 [ 15.583238] ? trace_hardirqs_on+0x37/0xe0 [ 15.583261] ? __pfx_read_tsc+0x10/0x10 [ 15.583281] ? ktime_get_ts64+0x86/0x230 [ 15.583314] kunit_try_run_case+0x1a5/0x480 [ 15.583339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.583363] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.583387] ? __kthread_parkme+0x82/0x180 [ 15.583409] ? preempt_count_sub+0x50/0x80 [ 15.583435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.583458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.583481] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.583505] kthread+0x337/0x6f0 [ 15.583523] ? trace_preempt_on+0x20/0xc0 [ 15.583546] ? __pfx_kthread+0x10/0x10 [ 15.583565] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.583587] ? calculate_sigpending+0x7b/0xa0 [ 15.583618] ? __pfx_kthread+0x10/0x10 [ 15.583638] ret_from_fork+0x41/0x80 [ 15.583659] ? __pfx_kthread+0x10/0x10 [ 15.583678] ret_from_fork_asm+0x1a/0x30 [ 15.583721] </TASK> [ 15.583733] [ 15.591740] Allocated by task 284: [ 15.591917] kasan_save_stack+0x45/0x70 [ 15.592119] kasan_save_track+0x18/0x40 [ 15.592338] kasan_save_alloc_info+0x3b/0x50 [ 15.592582] __kasan_kmalloc+0xb7/0xc0 [ 15.592769] __kmalloc_cache_noprof+0x189/0x420 [ 15.592926] kasan_atomics+0x95/0x310 [ 15.593059] kunit_try_run_case+0x1a5/0x480 [ 15.593209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.593482] kthread+0x337/0x6f0 [ 15.593652] ret_from_fork+0x41/0x80 [ 15.593836] ret_from_fork_asm+0x1a/0x30 [ 15.594032] [ 15.594130] The buggy address belongs to the object at ffff888102717100 [ 15.594130] which belongs to the cache kmalloc-64 of size 64 [ 15.594784] The buggy address is located 0 bytes to the right of [ 15.594784] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.595151] [ 15.595224] The buggy address belongs to the physical page: [ 15.595407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.595737] flags: 0x200000000000000(node=0|zone=2) [ 15.595971] page_type: f5(slab) [ 15.596138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.596495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.596833] page dumped because: kasan: bad access detected [ 15.597099] [ 15.597194] Memory state around the buggy address: [ 15.597405] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.597785] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.598106] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.598352] ^ [ 15.598511] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.598732] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.599149] ================================================================== [ 16.309293] ================================================================== [ 16.309686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.309971] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.310314] [ 16.310462] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.310507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.310520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.310541] Call Trace: [ 16.310554] <TASK> [ 16.310569] dump_stack_lvl+0x73/0xb0 [ 16.310597] print_report+0xd1/0x650 [ 16.310621] ? __virt_addr_valid+0x1db/0x2d0 [ 16.310643] ? kasan_atomics_helper+0x224c/0x5450 [ 16.310665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.310692] ? kasan_atomics_helper+0x224c/0x5450 [ 16.310716] kasan_report+0x141/0x180 [ 16.310740] ? kasan_atomics_helper+0x224c/0x5450 [ 16.310767] kasan_check_range+0x10c/0x1c0 [ 16.310790] __kasan_check_write+0x18/0x20 [ 16.310811] kasan_atomics_helper+0x224c/0x5450 [ 16.310834] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.310869] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.310892] ? kasan_atomics+0x152/0x310 [ 16.310927] kasan_atomics+0x1dc/0x310 [ 16.310948] ? __pfx_kasan_atomics+0x10/0x10 [ 16.310968] ? trace_hardirqs_on+0x37/0xe0 [ 16.310991] ? __pfx_read_tsc+0x10/0x10 [ 16.311012] ? ktime_get_ts64+0x86/0x230 [ 16.311036] kunit_try_run_case+0x1a5/0x480 [ 16.311061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.311086] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.311111] ? __kthread_parkme+0x82/0x180 [ 16.311134] ? preempt_count_sub+0x50/0x80 [ 16.311160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.311184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.311208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.311233] kthread+0x337/0x6f0 [ 16.311258] ? trace_preempt_on+0x20/0xc0 [ 16.311281] ? __pfx_kthread+0x10/0x10 [ 16.311300] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.311337] ? calculate_sigpending+0x7b/0xa0 [ 16.311359] ? __pfx_kthread+0x10/0x10 [ 16.311379] ret_from_fork+0x41/0x80 [ 16.311400] ? __pfx_kthread+0x10/0x10 [ 16.311419] ret_from_fork_asm+0x1a/0x30 [ 16.311469] </TASK> [ 16.311481] [ 16.318934] Allocated by task 284: [ 16.319062] kasan_save_stack+0x45/0x70 [ 16.319211] kasan_save_track+0x18/0x40 [ 16.319450] kasan_save_alloc_info+0x3b/0x50 [ 16.319662] __kasan_kmalloc+0xb7/0xc0 [ 16.319851] __kmalloc_cache_noprof+0x189/0x420 [ 16.320069] kasan_atomics+0x95/0x310 [ 16.320253] kunit_try_run_case+0x1a5/0x480 [ 16.320497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.320720] kthread+0x337/0x6f0 [ 16.320840] ret_from_fork+0x41/0x80 [ 16.321025] ret_from_fork_asm+0x1a/0x30 [ 16.321226] [ 16.321355] The buggy address belongs to the object at ffff888102717100 [ 16.321355] which belongs to the cache kmalloc-64 of size 64 [ 16.321867] The buggy address is located 0 bytes to the right of [ 16.321867] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.322324] [ 16.322465] The buggy address belongs to the physical page: [ 16.322722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.323081] flags: 0x200000000000000(node=0|zone=2) [ 16.323259] page_type: f5(slab) [ 16.323396] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.323802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.324183] page dumped because: kasan: bad access detected [ 16.324366] [ 16.324488] Memory state around the buggy address: [ 16.324743] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.325082] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.325363] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.325706] ^ [ 16.325947] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.326239] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.326536] ================================================================== [ 15.226524] ================================================================== [ 15.226848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.227369] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.227726] [ 15.227820] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.227869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.227883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.227906] Call Trace: [ 15.227919] <TASK> [ 15.227934] dump_stack_lvl+0x73/0xb0 [ 15.227963] print_report+0xd1/0x650 [ 15.227986] ? __virt_addr_valid+0x1db/0x2d0 [ 15.228009] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.228031] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.228056] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.228079] kasan_report+0x141/0x180 [ 15.228103] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.228131] kasan_check_range+0x10c/0x1c0 [ 15.228153] __kasan_check_write+0x18/0x20 [ 15.228174] kasan_atomics_helper+0x7c7/0x5450 [ 15.228198] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.228222] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.228246] ? kasan_atomics+0x152/0x310 [ 15.228270] kasan_atomics+0x1dc/0x310 [ 15.228291] ? __pfx_kasan_atomics+0x10/0x10 [ 15.228324] ? trace_hardirqs_on+0x37/0xe0 [ 15.228347] ? __pfx_read_tsc+0x10/0x10 [ 15.228368] ? ktime_get_ts64+0x86/0x230 [ 15.228393] kunit_try_run_case+0x1a5/0x480 [ 15.228417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.228453] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.228478] ? __kthread_parkme+0x82/0x180 [ 15.228500] ? preempt_count_sub+0x50/0x80 [ 15.228527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.228551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.228575] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.228598] kthread+0x337/0x6f0 [ 15.228616] ? trace_preempt_on+0x20/0xc0 [ 15.228639] ? __pfx_kthread+0x10/0x10 [ 15.228659] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.228681] ? calculate_sigpending+0x7b/0xa0 [ 15.228703] ? __pfx_kthread+0x10/0x10 [ 15.228722] ret_from_fork+0x41/0x80 [ 15.228744] ? __pfx_kthread+0x10/0x10 [ 15.228763] ret_from_fork_asm+0x1a/0x30 [ 15.228795] </TASK> [ 15.228808] [ 15.236054] Allocated by task 284: [ 15.236205] kasan_save_stack+0x45/0x70 [ 15.236421] kasan_save_track+0x18/0x40 [ 15.236761] kasan_save_alloc_info+0x3b/0x50 [ 15.236973] __kasan_kmalloc+0xb7/0xc0 [ 15.237166] __kmalloc_cache_noprof+0x189/0x420 [ 15.237402] kasan_atomics+0x95/0x310 [ 15.237628] kunit_try_run_case+0x1a5/0x480 [ 15.237810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.238051] kthread+0x337/0x6f0 [ 15.238206] ret_from_fork+0x41/0x80 [ 15.238352] ret_from_fork_asm+0x1a/0x30 [ 15.238712] [ 15.238809] The buggy address belongs to the object at ffff888102717100 [ 15.238809] which belongs to the cache kmalloc-64 of size 64 [ 15.239218] The buggy address is located 0 bytes to the right of [ 15.239218] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.239854] [ 15.239954] The buggy address belongs to the physical page: [ 15.240179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.240443] flags: 0x200000000000000(node=0|zone=2) [ 15.240606] page_type: f5(slab) [ 15.240729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.240988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.241334] page dumped because: kasan: bad access detected [ 15.241788] [ 15.241866] Memory state around the buggy address: [ 15.242023] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.242242] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.242470] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.242733] ^ [ 15.242959] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.243286] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.243616] ================================================================== [ 15.456099] ================================================================== [ 15.456775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.457107] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.457402] [ 15.457540] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.457587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.457600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.457621] Call Trace: [ 15.457640] <TASK> [ 15.457657] dump_stack_lvl+0x73/0xb0 [ 15.457684] print_report+0xd1/0x650 [ 15.457707] ? __virt_addr_valid+0x1db/0x2d0 [ 15.457729] ? kasan_atomics_helper+0xf10/0x5450 [ 15.457751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.457775] ? kasan_atomics_helper+0xf10/0x5450 [ 15.457797] kasan_report+0x141/0x180 [ 15.457820] ? kasan_atomics_helper+0xf10/0x5450 [ 15.457849] kasan_check_range+0x10c/0x1c0 [ 15.457871] __kasan_check_write+0x18/0x20 [ 15.457891] kasan_atomics_helper+0xf10/0x5450 [ 15.457915] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.457939] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.457962] ? kasan_atomics+0x152/0x310 [ 15.457987] kasan_atomics+0x1dc/0x310 [ 15.458008] ? __pfx_kasan_atomics+0x10/0x10 [ 15.458027] ? trace_hardirqs_on+0x37/0xe0 [ 15.458051] ? __pfx_read_tsc+0x10/0x10 [ 15.458071] ? ktime_get_ts64+0x86/0x230 [ 15.458097] kunit_try_run_case+0x1a5/0x480 [ 15.458123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.458147] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.458173] ? __kthread_parkme+0x82/0x180 [ 15.458196] ? preempt_count_sub+0x50/0x80 [ 15.458221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.458245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.458269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.458293] kthread+0x337/0x6f0 [ 15.458322] ? trace_preempt_on+0x20/0xc0 [ 15.458346] ? __pfx_kthread+0x10/0x10 [ 15.458365] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.458387] ? calculate_sigpending+0x7b/0xa0 [ 15.458409] ? __pfx_kthread+0x10/0x10 [ 15.458447] ret_from_fork+0x41/0x80 [ 15.458468] ? __pfx_kthread+0x10/0x10 [ 15.458488] ret_from_fork_asm+0x1a/0x30 [ 15.458521] </TASK> [ 15.458533] [ 15.465629] Allocated by task 284: [ 15.465804] kasan_save_stack+0x45/0x70 [ 15.466009] kasan_save_track+0x18/0x40 [ 15.466201] kasan_save_alloc_info+0x3b/0x50 [ 15.466420] __kasan_kmalloc+0xb7/0xc0 [ 15.466630] __kmalloc_cache_noprof+0x189/0x420 [ 15.466792] kasan_atomics+0x95/0x310 [ 15.466924] kunit_try_run_case+0x1a5/0x480 [ 15.467139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.467413] kthread+0x337/0x6f0 [ 15.467602] ret_from_fork+0x41/0x80 [ 15.467788] ret_from_fork_asm+0x1a/0x30 [ 15.467966] [ 15.468055] The buggy address belongs to the object at ffff888102717100 [ 15.468055] which belongs to the cache kmalloc-64 of size 64 [ 15.468581] The buggy address is located 0 bytes to the right of [ 15.468581] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.469066] [ 15.469152] The buggy address belongs to the physical page: [ 15.469410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.469685] flags: 0x200000000000000(node=0|zone=2) [ 15.469854] page_type: f5(slab) [ 15.469979] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.470213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.470585] page dumped because: kasan: bad access detected [ 15.470845] [ 15.470939] Memory state around the buggy address: [ 15.471163] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.471517] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.471834] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.472058] ^ [ 15.472214] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.472951] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.473234] ================================================================== [ 15.728058] ================================================================== [ 15.728377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.729260] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.729621] [ 15.729731] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.729781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.729796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.729818] Call Trace: [ 15.729833] <TASK> [ 15.729850] dump_stack_lvl+0x73/0xb0 [ 15.729879] print_report+0xd1/0x650 [ 15.729914] ? __virt_addr_valid+0x1db/0x2d0 [ 15.729937] ? kasan_atomics_helper+0x1467/0x5450 [ 15.729960] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.729994] ? kasan_atomics_helper+0x1467/0x5450 [ 15.730017] kasan_report+0x141/0x180 [ 15.730041] ? kasan_atomics_helper+0x1467/0x5450 [ 15.730069] kasan_check_range+0x10c/0x1c0 [ 15.730089] __kasan_check_write+0x18/0x20 [ 15.730110] kasan_atomics_helper+0x1467/0x5450 [ 15.730134] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.730157] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.730181] ? kasan_atomics+0x152/0x310 [ 15.730213] kasan_atomics+0x1dc/0x310 [ 15.730233] ? __pfx_kasan_atomics+0x10/0x10 [ 15.730253] ? trace_hardirqs_on+0x37/0xe0 [ 15.730289] ? __pfx_read_tsc+0x10/0x10 [ 15.730318] ? ktime_get_ts64+0x86/0x230 [ 15.730344] kunit_try_run_case+0x1a5/0x480 [ 15.730370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.730395] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.730421] ? __kthread_parkme+0x82/0x180 [ 15.730453] ? preempt_count_sub+0x50/0x80 [ 15.730480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.730504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.730528] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.730552] kthread+0x337/0x6f0 [ 15.730569] ? trace_preempt_on+0x20/0xc0 [ 15.730593] ? __pfx_kthread+0x10/0x10 [ 15.730611] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.730634] ? calculate_sigpending+0x7b/0xa0 [ 15.730656] ? __pfx_kthread+0x10/0x10 [ 15.730680] ret_from_fork+0x41/0x80 [ 15.730702] ? __pfx_kthread+0x10/0x10 [ 15.730721] ret_from_fork_asm+0x1a/0x30 [ 15.730754] </TASK> [ 15.730766] [ 15.738335] Allocated by task 284: [ 15.738556] kasan_save_stack+0x45/0x70 [ 15.738792] kasan_save_track+0x18/0x40 [ 15.739012] kasan_save_alloc_info+0x3b/0x50 [ 15.739225] __kasan_kmalloc+0xb7/0xc0 [ 15.739452] __kmalloc_cache_noprof+0x189/0x420 [ 15.739656] kasan_atomics+0x95/0x310 [ 15.739836] kunit_try_run_case+0x1a5/0x480 [ 15.740047] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.740264] kthread+0x337/0x6f0 [ 15.740453] ret_from_fork+0x41/0x80 [ 15.740660] ret_from_fork_asm+0x1a/0x30 [ 15.740851] [ 15.740964] The buggy address belongs to the object at ffff888102717100 [ 15.740964] which belongs to the cache kmalloc-64 of size 64 [ 15.741513] The buggy address is located 0 bytes to the right of [ 15.741513] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.741902] [ 15.741977] The buggy address belongs to the physical page: [ 15.742154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.742555] flags: 0x200000000000000(node=0|zone=2) [ 15.742794] page_type: f5(slab) [ 15.743149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.743400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.743770] page dumped because: kasan: bad access detected [ 15.744078] [ 15.744198] Memory state around the buggy address: [ 15.744400] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.744620] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.744839] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.745428] ^ [ 15.745758] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746105] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746327] ================================================================== [ 15.747100] ================================================================== [ 15.747414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.747760] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.748188] [ 15.748288] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.748343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.748357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.748378] Call Trace: [ 15.748393] <TASK> [ 15.748408] dump_stack_lvl+0x73/0xb0 [ 15.748445] print_report+0xd1/0x650 [ 15.748479] ? __virt_addr_valid+0x1db/0x2d0 [ 15.748501] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.748523] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.748559] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.748583] kasan_report+0x141/0x180 [ 15.748606] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.748635] __asan_report_store8_noabort+0x1b/0x30 [ 15.748658] kasan_atomics_helper+0x50d4/0x5450 [ 15.748682] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.748706] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.748728] ? kasan_atomics+0x152/0x310 [ 15.748751] kasan_atomics+0x1dc/0x310 [ 15.748772] ? __pfx_kasan_atomics+0x10/0x10 [ 15.748792] ? trace_hardirqs_on+0x37/0xe0 [ 15.748825] ? __pfx_read_tsc+0x10/0x10 [ 15.748846] ? ktime_get_ts64+0x86/0x230 [ 15.748871] kunit_try_run_case+0x1a5/0x480 [ 15.748905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.748931] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.748955] ? __kthread_parkme+0x82/0x180 [ 15.748978] ? preempt_count_sub+0x50/0x80 [ 15.749012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.749036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.749059] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.749093] kthread+0x337/0x6f0 [ 15.749111] ? trace_preempt_on+0x20/0xc0 [ 15.749134] ? __pfx_kthread+0x10/0x10 [ 15.749153] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.749183] ? calculate_sigpending+0x7b/0xa0 [ 15.749205] ? __pfx_kthread+0x10/0x10 [ 15.749225] ret_from_fork+0x41/0x80 [ 15.749256] ? __pfx_kthread+0x10/0x10 [ 15.749275] ret_from_fork_asm+0x1a/0x30 [ 15.749316] </TASK> [ 15.749337] [ 15.756914] Allocated by task 284: [ 15.757095] kasan_save_stack+0x45/0x70 [ 15.757241] kasan_save_track+0x18/0x40 [ 15.757389] kasan_save_alloc_info+0x3b/0x50 [ 15.757537] __kasan_kmalloc+0xb7/0xc0 [ 15.757673] __kmalloc_cache_noprof+0x189/0x420 [ 15.757827] kasan_atomics+0x95/0x310 [ 15.757957] kunit_try_run_case+0x1a5/0x480 [ 15.758431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.758702] kthread+0x337/0x6f0 [ 15.758870] ret_from_fork+0x41/0x80 [ 15.759053] ret_from_fork_asm+0x1a/0x30 [ 15.759248] [ 15.759352] The buggy address belongs to the object at ffff888102717100 [ 15.759352] which belongs to the cache kmalloc-64 of size 64 [ 15.760149] The buggy address is located 0 bytes to the right of [ 15.760149] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.760815] [ 15.760927] The buggy address belongs to the physical page: [ 15.761192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.761593] flags: 0x200000000000000(node=0|zone=2) [ 15.761809] page_type: f5(slab) [ 15.761931] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.762163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.762441] page dumped because: kasan: bad access detected [ 15.762704] [ 15.762800] Memory state around the buggy address: [ 15.763116] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.763473] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.763856] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.764091] ^ [ 15.764337] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.764842] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.765151] ================================================================== [ 16.061397] ================================================================== [ 16.062095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.062497] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.062827] [ 16.062919] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.062966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.062979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.063002] Call Trace: [ 16.063015] <TASK> [ 16.063030] dump_stack_lvl+0x73/0xb0 [ 16.063057] print_report+0xd1/0x650 [ 16.063080] ? __virt_addr_valid+0x1db/0x2d0 [ 16.063114] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.063136] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.063160] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.063195] kasan_report+0x141/0x180 [ 16.063219] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.063247] kasan_check_range+0x10c/0x1c0 [ 16.063276] __kasan_check_write+0x18/0x20 [ 16.063296] kasan_atomics_helper+0x1e12/0x5450 [ 16.063337] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.063360] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.063384] ? kasan_atomics+0x152/0x310 [ 16.063408] kasan_atomics+0x1dc/0x310 [ 16.063428] ? __pfx_kasan_atomics+0x10/0x10 [ 16.063457] ? trace_hardirqs_on+0x37/0xe0 [ 16.063481] ? __pfx_read_tsc+0x10/0x10 [ 16.063502] ? ktime_get_ts64+0x86/0x230 [ 16.063537] kunit_try_run_case+0x1a5/0x480 [ 16.063562] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.063588] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.063614] ? __kthread_parkme+0x82/0x180 [ 16.063645] ? preempt_count_sub+0x50/0x80 [ 16.063671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.063705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.063729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.063753] kthread+0x337/0x6f0 [ 16.063770] ? trace_preempt_on+0x20/0xc0 [ 16.063793] ? __pfx_kthread+0x10/0x10 [ 16.063812] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.063833] ? calculate_sigpending+0x7b/0xa0 [ 16.063855] ? __pfx_kthread+0x10/0x10 [ 16.063875] ret_from_fork+0x41/0x80 [ 16.063896] ? __pfx_kthread+0x10/0x10 [ 16.063915] ret_from_fork_asm+0x1a/0x30 [ 16.063946] </TASK> [ 16.063959] [ 16.071734] Allocated by task 284: [ 16.071882] kasan_save_stack+0x45/0x70 [ 16.072062] kasan_save_track+0x18/0x40 [ 16.072196] kasan_save_alloc_info+0x3b/0x50 [ 16.072358] __kasan_kmalloc+0xb7/0xc0 [ 16.072545] __kmalloc_cache_noprof+0x189/0x420 [ 16.072803] kasan_atomics+0x95/0x310 [ 16.073002] kunit_try_run_case+0x1a5/0x480 [ 16.073160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.073340] kthread+0x337/0x6f0 [ 16.073579] ret_from_fork+0x41/0x80 [ 16.073792] ret_from_fork_asm+0x1a/0x30 [ 16.073991] [ 16.074085] The buggy address belongs to the object at ffff888102717100 [ 16.074085] which belongs to the cache kmalloc-64 of size 64 [ 16.074652] The buggy address is located 0 bytes to the right of [ 16.074652] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.075168] [ 16.075268] The buggy address belongs to the physical page: [ 16.075545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.075876] flags: 0x200000000000000(node=0|zone=2) [ 16.076106] page_type: f5(slab) [ 16.076266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.076632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.076954] page dumped because: kasan: bad access detected [ 16.077180] [ 16.077250] Memory state around the buggy address: [ 16.077415] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.077625] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.077863] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.078399] ^ [ 16.078643] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.078864] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.079071] ================================================================== [ 16.223805] ================================================================== [ 16.224555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.224876] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.225106] [ 16.225197] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.225243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.225258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.225279] Call Trace: [ 16.225298] <TASK> [ 16.225329] dump_stack_lvl+0x73/0xb0 [ 16.225357] print_report+0xd1/0x650 [ 16.225380] ? __virt_addr_valid+0x1db/0x2d0 [ 16.225403] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.225452] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.225476] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.225499] kasan_report+0x141/0x180 [ 16.225523] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.225550] kasan_check_range+0x10c/0x1c0 [ 16.225572] __kasan_check_write+0x18/0x20 [ 16.225592] kasan_atomics_helper+0x20c8/0x5450 [ 16.225617] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.225641] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.225663] ? kasan_atomics+0x152/0x310 [ 16.225686] kasan_atomics+0x1dc/0x310 [ 16.225707] ? __pfx_kasan_atomics+0x10/0x10 [ 16.225727] ? trace_hardirqs_on+0x37/0xe0 [ 16.225750] ? __pfx_read_tsc+0x10/0x10 [ 16.225771] ? ktime_get_ts64+0x86/0x230 [ 16.225797] kunit_try_run_case+0x1a5/0x480 [ 16.225822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.225847] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.225872] ? __kthread_parkme+0x82/0x180 [ 16.225894] ? preempt_count_sub+0x50/0x80 [ 16.225920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.225944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.225968] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.225992] kthread+0x337/0x6f0 [ 16.226009] ? trace_preempt_on+0x20/0xc0 [ 16.226033] ? __pfx_kthread+0x10/0x10 [ 16.226052] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.226074] ? calculate_sigpending+0x7b/0xa0 [ 16.226097] ? __pfx_kthread+0x10/0x10 [ 16.226117] ret_from_fork+0x41/0x80 [ 16.226140] ? __pfx_kthread+0x10/0x10 [ 16.226159] ret_from_fork_asm+0x1a/0x30 [ 16.226192] </TASK> [ 16.226206] [ 16.233593] Allocated by task 284: [ 16.233725] kasan_save_stack+0x45/0x70 [ 16.233870] kasan_save_track+0x18/0x40 [ 16.234031] kasan_save_alloc_info+0x3b/0x50 [ 16.234244] __kasan_kmalloc+0xb7/0xc0 [ 16.234446] __kmalloc_cache_noprof+0x189/0x420 [ 16.234668] kasan_atomics+0x95/0x310 [ 16.234856] kunit_try_run_case+0x1a5/0x480 [ 16.235041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.235217] kthread+0x337/0x6f0 [ 16.235394] ret_from_fork+0x41/0x80 [ 16.235765] ret_from_fork_asm+0x1a/0x30 [ 16.235964] [ 16.236060] The buggy address belongs to the object at ffff888102717100 [ 16.236060] which belongs to the cache kmalloc-64 of size 64 [ 16.236557] The buggy address is located 0 bytes to the right of [ 16.236557] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.236960] [ 16.237034] The buggy address belongs to the physical page: [ 16.237207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.238356] flags: 0x200000000000000(node=0|zone=2) [ 16.238979] page_type: f5(slab) [ 16.239561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.240578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.241330] page dumped because: kasan: bad access detected [ 16.241918] [ 16.241999] Memory state around the buggy address: [ 16.242162] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.242865] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.243716] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.244592] ^ [ 16.245052] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.245614] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.245840] ================================================================== [ 15.327343] ================================================================== [ 15.327703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.328029] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.328355] [ 15.328474] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.328522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.328536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.328557] Call Trace: [ 15.328574] <TASK> [ 15.328591] dump_stack_lvl+0x73/0xb0 [ 15.328620] print_report+0xd1/0x650 [ 15.328643] ? __virt_addr_valid+0x1db/0x2d0 [ 15.328665] ? kasan_atomics_helper+0xac7/0x5450 [ 15.328687] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.328711] ? kasan_atomics_helper+0xac7/0x5450 [ 15.328734] kasan_report+0x141/0x180 [ 15.328757] ? kasan_atomics_helper+0xac7/0x5450 [ 15.328785] kasan_check_range+0x10c/0x1c0 [ 15.328806] __kasan_check_write+0x18/0x20 [ 15.328827] kasan_atomics_helper+0xac7/0x5450 [ 15.328851] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.328876] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.328898] ? kasan_atomics+0x152/0x310 [ 15.328923] kasan_atomics+0x1dc/0x310 [ 15.328944] ? __pfx_kasan_atomics+0x10/0x10 [ 15.328966] ? trace_hardirqs_on+0x37/0xe0 [ 15.328992] ? __pfx_read_tsc+0x10/0x10 [ 15.329013] ? ktime_get_ts64+0x86/0x230 [ 15.329039] kunit_try_run_case+0x1a5/0x480 [ 15.329064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.329089] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.329114] ? __kthread_parkme+0x82/0x180 [ 15.329137] ? preempt_count_sub+0x50/0x80 [ 15.329163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.329187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.329211] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.329235] kthread+0x337/0x6f0 [ 15.329253] ? trace_preempt_on+0x20/0xc0 [ 15.329276] ? __pfx_kthread+0x10/0x10 [ 15.329296] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.329329] ? calculate_sigpending+0x7b/0xa0 [ 15.329351] ? __pfx_kthread+0x10/0x10 [ 15.329371] ret_from_fork+0x41/0x80 [ 15.329394] ? __pfx_kthread+0x10/0x10 [ 15.329413] ret_from_fork_asm+0x1a/0x30 [ 15.329464] </TASK> [ 15.329477] [ 15.336632] Allocated by task 284: [ 15.336766] kasan_save_stack+0x45/0x70 [ 15.336912] kasan_save_track+0x18/0x40 [ 15.337082] kasan_save_alloc_info+0x3b/0x50 [ 15.337293] __kasan_kmalloc+0xb7/0xc0 [ 15.337519] __kmalloc_cache_noprof+0x189/0x420 [ 15.337753] kasan_atomics+0x95/0x310 [ 15.337945] kunit_try_run_case+0x1a5/0x480 [ 15.338154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.338417] kthread+0x337/0x6f0 [ 15.338611] ret_from_fork+0x41/0x80 [ 15.338774] ret_from_fork_asm+0x1a/0x30 [ 15.338964] [ 15.339062] The buggy address belongs to the object at ffff888102717100 [ 15.339062] which belongs to the cache kmalloc-64 of size 64 [ 15.339540] The buggy address is located 0 bytes to the right of [ 15.339540] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.340042] [ 15.340117] The buggy address belongs to the physical page: [ 15.340292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.340589] flags: 0x200000000000000(node=0|zone=2) [ 15.340823] page_type: f5(slab) [ 15.340993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.341347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.341700] page dumped because: kasan: bad access detected [ 15.341908] [ 15.341980] Memory state around the buggy address: [ 15.342137] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.342364] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.342652] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.342985] ^ [ 15.343218] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.343578] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.343904] ================================================================== [ 15.344883] ================================================================== [ 15.345241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.345557] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.345788] [ 15.345901] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.345946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.345960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.345981] Call Trace: [ 15.345996] <TASK> [ 15.346011] dump_stack_lvl+0x73/0xb0 [ 15.346040] print_report+0xd1/0x650 [ 15.346063] ? __virt_addr_valid+0x1db/0x2d0 [ 15.346085] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.346107] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.346131] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.346154] kasan_report+0x141/0x180 [ 15.346177] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.346205] kasan_check_range+0x10c/0x1c0 [ 15.346227] __kasan_check_write+0x18/0x20 [ 15.346247] kasan_atomics_helper+0xb6a/0x5450 [ 15.346271] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.346295] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.346327] ? kasan_atomics+0x152/0x310 [ 15.346352] kasan_atomics+0x1dc/0x310 [ 15.346371] ? __pfx_kasan_atomics+0x10/0x10 [ 15.346391] ? trace_hardirqs_on+0x37/0xe0 [ 15.346416] ? __pfx_read_tsc+0x10/0x10 [ 15.346456] ? ktime_get_ts64+0x86/0x230 [ 15.346482] kunit_try_run_case+0x1a5/0x480 [ 15.346508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.346532] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.346558] ? __kthread_parkme+0x82/0x180 [ 15.346581] ? preempt_count_sub+0x50/0x80 [ 15.346606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.346632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.346654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.346684] kthread+0x337/0x6f0 [ 15.346702] ? trace_preempt_on+0x20/0xc0 [ 15.346725] ? __pfx_kthread+0x10/0x10 [ 15.346744] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.346768] ? calculate_sigpending+0x7b/0xa0 [ 15.346791] ? __pfx_kthread+0x10/0x10 [ 15.346811] ret_from_fork+0x41/0x80 [ 15.346832] ? __pfx_kthread+0x10/0x10 [ 15.346856] ret_from_fork_asm+0x1a/0x30 [ 15.346891] </TASK> [ 15.346904] [ 15.354190] Allocated by task 284: [ 15.354386] kasan_save_stack+0x45/0x70 [ 15.354612] kasan_save_track+0x18/0x40 [ 15.354809] kasan_save_alloc_info+0x3b/0x50 [ 15.354987] __kasan_kmalloc+0xb7/0xc0 [ 15.355180] __kmalloc_cache_noprof+0x189/0x420 [ 15.355357] kasan_atomics+0x95/0x310 [ 15.355515] kunit_try_run_case+0x1a5/0x480 [ 15.355667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.355859] kthread+0x337/0x6f0 [ 15.356028] ret_from_fork+0x41/0x80 [ 15.356217] ret_from_fork_asm+0x1a/0x30 [ 15.356442] [ 15.356541] The buggy address belongs to the object at ffff888102717100 [ 15.356541] which belongs to the cache kmalloc-64 of size 64 [ 15.357011] The buggy address is located 0 bytes to the right of [ 15.357011] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.357389] [ 15.357512] The buggy address belongs to the physical page: [ 15.357769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.358124] flags: 0x200000000000000(node=0|zone=2) [ 15.358368] page_type: f5(slab) [ 15.358559] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.358900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.359131] page dumped because: kasan: bad access detected [ 15.359316] [ 15.359412] Memory state around the buggy address: [ 15.359660] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.360000] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.360351] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.360676] ^ [ 15.360866] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.361084] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.361344] ================================================================== [ 15.399588] ================================================================== [ 15.399984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.400334] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.400662] [ 15.400765] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.400813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.400827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.400850] Call Trace: [ 15.400867] <TASK> [ 15.400884] dump_stack_lvl+0x73/0xb0 [ 15.400912] print_report+0xd1/0x650 [ 15.400935] ? __virt_addr_valid+0x1db/0x2d0 [ 15.400958] ? kasan_atomics_helper+0xd47/0x5450 [ 15.400980] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.401003] ? kasan_atomics_helper+0xd47/0x5450 [ 15.401027] kasan_report+0x141/0x180 [ 15.401051] ? kasan_atomics_helper+0xd47/0x5450 [ 15.401079] kasan_check_range+0x10c/0x1c0 [ 15.401101] __kasan_check_write+0x18/0x20 [ 15.401122] kasan_atomics_helper+0xd47/0x5450 [ 15.401146] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.401170] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.401193] ? kasan_atomics+0x152/0x310 [ 15.401218] kasan_atomics+0x1dc/0x310 [ 15.401239] ? __pfx_kasan_atomics+0x10/0x10 [ 15.401260] ? trace_hardirqs_on+0x37/0xe0 [ 15.401284] ? __pfx_read_tsc+0x10/0x10 [ 15.401315] ? ktime_get_ts64+0x86/0x230 [ 15.401342] kunit_try_run_case+0x1a5/0x480 [ 15.401367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.401392] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.401417] ? __kthread_parkme+0x82/0x180 [ 15.401460] ? preempt_count_sub+0x50/0x80 [ 15.401487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.401511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.401535] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.401560] kthread+0x337/0x6f0 [ 15.401578] ? trace_preempt_on+0x20/0xc0 [ 15.401602] ? __pfx_kthread+0x10/0x10 [ 15.401621] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.401643] ? calculate_sigpending+0x7b/0xa0 [ 15.401665] ? __pfx_kthread+0x10/0x10 [ 15.401685] ret_from_fork+0x41/0x80 [ 15.401707] ? __pfx_kthread+0x10/0x10 [ 15.401726] ret_from_fork_asm+0x1a/0x30 [ 15.401759] </TASK> [ 15.401772] [ 15.408884] Allocated by task 284: [ 15.409052] kasan_save_stack+0x45/0x70 [ 15.409251] kasan_save_track+0x18/0x40 [ 15.409482] kasan_save_alloc_info+0x3b/0x50 [ 15.409691] __kasan_kmalloc+0xb7/0xc0 [ 15.409880] __kmalloc_cache_noprof+0x189/0x420 [ 15.410100] kasan_atomics+0x95/0x310 [ 15.410284] kunit_try_run_case+0x1a5/0x480 [ 15.410465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.410645] kthread+0x337/0x6f0 [ 15.410779] ret_from_fork+0x41/0x80 [ 15.410966] ret_from_fork_asm+0x1a/0x30 [ 15.411170] [ 15.411265] The buggy address belongs to the object at ffff888102717100 [ 15.411265] which belongs to the cache kmalloc-64 of size 64 [ 15.411838] The buggy address is located 0 bytes to the right of [ 15.411838] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.412345] [ 15.412465] The buggy address belongs to the physical page: [ 15.412694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.413010] flags: 0x200000000000000(node=0|zone=2) [ 15.413232] page_type: f5(slab) [ 15.413400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.413717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.414010] page dumped because: kasan: bad access detected [ 15.414252] [ 15.414354] Memory state around the buggy address: [ 15.414576] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.414851] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.415136] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.415417] ^ [ 15.415594] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.415812] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.416027] ================================================================== [ 15.860534] ================================================================== [ 15.861061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.861409] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.861748] [ 15.861854] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.861910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.861924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.861946] Call Trace: [ 15.861963] <TASK> [ 15.861990] dump_stack_lvl+0x73/0xb0 [ 15.862019] print_report+0xd1/0x650 [ 15.862041] ? __virt_addr_valid+0x1db/0x2d0 [ 15.862063] ? kasan_atomics_helper+0x1818/0x5450 [ 15.862085] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.862108] ? kasan_atomics_helper+0x1818/0x5450 [ 15.862131] kasan_report+0x141/0x180 [ 15.862154] ? kasan_atomics_helper+0x1818/0x5450 [ 15.862191] kasan_check_range+0x10c/0x1c0 [ 15.862212] __kasan_check_write+0x18/0x20 [ 15.862232] kasan_atomics_helper+0x1818/0x5450 [ 15.862268] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.862291] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.862322] ? kasan_atomics+0x152/0x310 [ 15.862346] kasan_atomics+0x1dc/0x310 [ 15.862376] ? __pfx_kasan_atomics+0x10/0x10 [ 15.862396] ? trace_hardirqs_on+0x37/0xe0 [ 15.862420] ? __pfx_read_tsc+0x10/0x10 [ 15.862450] ? ktime_get_ts64+0x86/0x230 [ 15.862475] kunit_try_run_case+0x1a5/0x480 [ 15.862500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.862525] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.862550] ? __kthread_parkme+0x82/0x180 [ 15.862572] ? preempt_count_sub+0x50/0x80 [ 15.862598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.862622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.862645] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.862668] kthread+0x337/0x6f0 [ 15.862690] ? trace_preempt_on+0x20/0xc0 [ 15.862713] ? __pfx_kthread+0x10/0x10 [ 15.862732] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.862754] ? calculate_sigpending+0x7b/0xa0 [ 15.862776] ? __pfx_kthread+0x10/0x10 [ 15.862796] ret_from_fork+0x41/0x80 [ 15.862817] ? __pfx_kthread+0x10/0x10 [ 15.862836] ret_from_fork_asm+0x1a/0x30 [ 15.862868] </TASK> [ 15.862879] [ 15.870968] Allocated by task 284: [ 15.871178] kasan_save_stack+0x45/0x70 [ 15.871371] kasan_save_track+0x18/0x40 [ 15.871618] kasan_save_alloc_info+0x3b/0x50 [ 15.871834] __kasan_kmalloc+0xb7/0xc0 [ 15.872023] __kmalloc_cache_noprof+0x189/0x420 [ 15.872244] kasan_atomics+0x95/0x310 [ 15.872446] kunit_try_run_case+0x1a5/0x480 [ 15.872669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.872930] kthread+0x337/0x6f0 [ 15.873111] ret_from_fork+0x41/0x80 [ 15.873317] ret_from_fork_asm+0x1a/0x30 [ 15.873518] [ 15.873604] The buggy address belongs to the object at ffff888102717100 [ 15.873604] which belongs to the cache kmalloc-64 of size 64 [ 15.873955] The buggy address is located 0 bytes to the right of [ 15.873955] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.874326] [ 15.874436] The buggy address belongs to the physical page: [ 15.874757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.875122] flags: 0x200000000000000(node=0|zone=2) [ 15.875367] page_type: f5(slab) [ 15.875649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.875991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.876221] page dumped because: kasan: bad access detected [ 15.876404] [ 15.876570] Memory state around the buggy address: [ 15.876825] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.877180] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.877576] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.877901] ^ [ 15.878114] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.878424] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.878747] ================================================================== [ 15.920285] ================================================================== [ 15.920831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.921143] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.921627] [ 15.921860] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.922075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.922094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.922116] Call Trace: [ 15.922131] <TASK> [ 15.922147] dump_stack_lvl+0x73/0xb0 [ 15.922176] print_report+0xd1/0x650 [ 15.922200] ? __virt_addr_valid+0x1db/0x2d0 [ 15.922221] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.922244] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.922267] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.922290] kasan_report+0x141/0x180 [ 15.922323] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.922351] kasan_check_range+0x10c/0x1c0 [ 15.922373] __kasan_check_write+0x18/0x20 [ 15.922393] kasan_atomics_helper+0x19e3/0x5450 [ 15.922417] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.922506] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.922544] ? kasan_atomics+0x152/0x310 [ 15.922569] kasan_atomics+0x1dc/0x310 [ 15.922601] ? __pfx_kasan_atomics+0x10/0x10 [ 15.922621] ? trace_hardirqs_on+0x37/0xe0 [ 15.922644] ? __pfx_read_tsc+0x10/0x10 [ 15.922697] ? ktime_get_ts64+0x86/0x230 [ 15.922723] kunit_try_run_case+0x1a5/0x480 [ 15.922748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.922773] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.922797] ? __kthread_parkme+0x82/0x180 [ 15.922819] ? preempt_count_sub+0x50/0x80 [ 15.922845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.922869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.922892] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.922915] kthread+0x337/0x6f0 [ 15.922933] ? trace_preempt_on+0x20/0xc0 [ 15.922956] ? __pfx_kthread+0x10/0x10 [ 15.922975] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.922997] ? calculate_sigpending+0x7b/0xa0 [ 15.923018] ? __pfx_kthread+0x10/0x10 [ 15.923038] ret_from_fork+0x41/0x80 [ 15.923059] ? __pfx_kthread+0x10/0x10 [ 15.923078] ret_from_fork_asm+0x1a/0x30 [ 15.923110] </TASK> [ 15.923122] [ 15.934223] Allocated by task 284: [ 15.934405] kasan_save_stack+0x45/0x70 [ 15.934864] kasan_save_track+0x18/0x40 [ 15.935059] kasan_save_alloc_info+0x3b/0x50 [ 15.935243] __kasan_kmalloc+0xb7/0xc0 [ 15.935403] __kmalloc_cache_noprof+0x189/0x420 [ 15.935571] kasan_atomics+0x95/0x310 [ 15.935782] kunit_try_run_case+0x1a5/0x480 [ 15.935985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.936236] kthread+0x337/0x6f0 [ 15.936427] ret_from_fork+0x41/0x80 [ 15.936672] ret_from_fork_asm+0x1a/0x30 [ 15.936813] [ 15.936958] The buggy address belongs to the object at ffff888102717100 [ 15.936958] which belongs to the cache kmalloc-64 of size 64 [ 15.937550] The buggy address is located 0 bytes to the right of [ 15.937550] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.938039] [ 15.938151] The buggy address belongs to the physical page: [ 15.938357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.938635] flags: 0x200000000000000(node=0|zone=2) [ 15.939007] page_type: f5(slab) [ 15.939182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.939642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.939997] page dumped because: kasan: bad access detected [ 15.940172] [ 15.940248] Memory state around the buggy address: [ 15.940522] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.940821] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.941173] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.941498] ^ [ 15.941729] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.942030] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.942346] ================================================================== [ 15.563231] ================================================================== [ 15.563603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.563840] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.564499] [ 15.564612] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.564669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.564683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.564705] Call Trace: [ 15.564730] <TASK> [ 15.564745] dump_stack_lvl+0x73/0xb0 [ 15.564775] print_report+0xd1/0x650 [ 15.564798] ? __virt_addr_valid+0x1db/0x2d0 [ 15.564819] ? kasan_atomics_helper+0x1148/0x5450 [ 15.564841] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.564865] ? kasan_atomics_helper+0x1148/0x5450 [ 15.564889] kasan_report+0x141/0x180 [ 15.564912] ? kasan_atomics_helper+0x1148/0x5450 [ 15.564940] kasan_check_range+0x10c/0x1c0 [ 15.564961] __kasan_check_write+0x18/0x20 [ 15.564982] kasan_atomics_helper+0x1148/0x5450 [ 15.565006] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.565029] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.565051] ? kasan_atomics+0x152/0x310 [ 15.565085] kasan_atomics+0x1dc/0x310 [ 15.565106] ? __pfx_kasan_atomics+0x10/0x10 [ 15.565126] ? trace_hardirqs_on+0x37/0xe0 [ 15.565160] ? __pfx_read_tsc+0x10/0x10 [ 15.565180] ? ktime_get_ts64+0x86/0x230 [ 15.565206] kunit_try_run_case+0x1a5/0x480 [ 15.565236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.565261] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.565286] ? __kthread_parkme+0x82/0x180 [ 15.565324] ? preempt_count_sub+0x50/0x80 [ 15.565350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.565374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.565397] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.565429] kthread+0x337/0x6f0 [ 15.565456] ? trace_preempt_on+0x20/0xc0 [ 15.565480] ? __pfx_kthread+0x10/0x10 [ 15.565509] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.565531] ? calculate_sigpending+0x7b/0xa0 [ 15.565553] ? __pfx_kthread+0x10/0x10 [ 15.565572] ret_from_fork+0x41/0x80 [ 15.565594] ? __pfx_kthread+0x10/0x10 [ 15.565613] ret_from_fork_asm+0x1a/0x30 [ 15.565645] </TASK> [ 15.565656] [ 15.573364] Allocated by task 284: [ 15.573496] kasan_save_stack+0x45/0x70 [ 15.573642] kasan_save_track+0x18/0x40 [ 15.573780] kasan_save_alloc_info+0x3b/0x50 [ 15.573990] __kasan_kmalloc+0xb7/0xc0 [ 15.574181] __kmalloc_cache_noprof+0x189/0x420 [ 15.574434] kasan_atomics+0x95/0x310 [ 15.574623] kunit_try_run_case+0x1a5/0x480 [ 15.574834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.575091] kthread+0x337/0x6f0 [ 15.575286] ret_from_fork+0x41/0x80 [ 15.575513] ret_from_fork_asm+0x1a/0x30 [ 15.575710] [ 15.575804] The buggy address belongs to the object at ffff888102717100 [ 15.575804] which belongs to the cache kmalloc-64 of size 64 [ 15.576219] The buggy address is located 0 bytes to the right of [ 15.576219] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.576982] [ 15.577056] The buggy address belongs to the physical page: [ 15.577229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.577799] flags: 0x200000000000000(node=0|zone=2) [ 15.578059] page_type: f5(slab) [ 15.578251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.578613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.578849] page dumped because: kasan: bad access detected [ 15.579024] [ 15.579095] Memory state around the buggy address: [ 15.579299] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.579669] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.579991] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.580299] ^ [ 15.580560] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.580873] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.581120] ================================================================== [ 16.159458] ================================================================== [ 16.160255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.161083] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.162062] [ 16.162283] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.162432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.162448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.162470] Call Trace: [ 16.162485] <TASK> [ 16.162501] dump_stack_lvl+0x73/0xb0 [ 16.162531] print_report+0xd1/0x650 [ 16.162555] ? __virt_addr_valid+0x1db/0x2d0 [ 16.162578] ? kasan_atomics_helper+0x2006/0x5450 [ 16.162693] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.162721] ? kasan_atomics_helper+0x2006/0x5450 [ 16.162745] kasan_report+0x141/0x180 [ 16.162769] ? kasan_atomics_helper+0x2006/0x5450 [ 16.162797] kasan_check_range+0x10c/0x1c0 [ 16.162819] __kasan_check_write+0x18/0x20 [ 16.162840] kasan_atomics_helper+0x2006/0x5450 [ 16.162866] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.162890] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.162913] ? kasan_atomics+0x152/0x310 [ 16.162937] kasan_atomics+0x1dc/0x310 [ 16.162957] ? __pfx_kasan_atomics+0x10/0x10 [ 16.162977] ? trace_hardirqs_on+0x37/0xe0 [ 16.163001] ? __pfx_read_tsc+0x10/0x10 [ 16.163021] ? ktime_get_ts64+0x86/0x230 [ 16.163047] kunit_try_run_case+0x1a5/0x480 [ 16.163071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.163096] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.163121] ? __kthread_parkme+0x82/0x180 [ 16.163144] ? preempt_count_sub+0x50/0x80 [ 16.163170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.163195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.163218] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.163242] kthread+0x337/0x6f0 [ 16.163260] ? trace_preempt_on+0x20/0xc0 [ 16.163283] ? __pfx_kthread+0x10/0x10 [ 16.163313] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.163335] ? calculate_sigpending+0x7b/0xa0 [ 16.163358] ? __pfx_kthread+0x10/0x10 [ 16.163377] ret_from_fork+0x41/0x80 [ 16.163399] ? __pfx_kthread+0x10/0x10 [ 16.163418] ret_from_fork_asm+0x1a/0x30 [ 16.163450] </TASK> [ 16.163462] [ 16.177463] Allocated by task 284: [ 16.177635] kasan_save_stack+0x45/0x70 [ 16.177815] kasan_save_track+0x18/0x40 [ 16.177976] kasan_save_alloc_info+0x3b/0x50 [ 16.178156] __kasan_kmalloc+0xb7/0xc0 [ 16.178906] __kmalloc_cache_noprof+0x189/0x420 [ 16.179777] kasan_atomics+0x95/0x310 [ 16.180238] kunit_try_run_case+0x1a5/0x480 [ 16.180970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.181587] kthread+0x337/0x6f0 [ 16.182076] ret_from_fork+0x41/0x80 [ 16.182671] ret_from_fork_asm+0x1a/0x30 [ 16.183215] [ 16.183631] The buggy address belongs to the object at ffff888102717100 [ 16.183631] which belongs to the cache kmalloc-64 of size 64 [ 16.185097] The buggy address is located 0 bytes to the right of [ 16.185097] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.186698] [ 16.187005] The buggy address belongs to the physical page: [ 16.187677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.187948] flags: 0x200000000000000(node=0|zone=2) [ 16.188118] page_type: f5(slab) [ 16.188244] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.188951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.190015] page dumped because: kasan: bad access detected [ 16.190821] [ 16.191223] Memory state around the buggy address: [ 16.191965] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.192833] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.193063] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.193279] ^ [ 16.193804] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.194463] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.195068] ================================================================== [ 15.646493] ================================================================== [ 15.647219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.647988] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.648505] [ 15.648705] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.648753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.648767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.648790] Call Trace: [ 15.648803] <TASK> [ 15.648818] dump_stack_lvl+0x73/0xb0 [ 15.648846] print_report+0xd1/0x650 [ 15.648881] ? __virt_addr_valid+0x1db/0x2d0 [ 15.648903] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.648925] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.648960] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.648982] kasan_report+0x141/0x180 [ 15.649006] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.649034] kasan_check_range+0x10c/0x1c0 [ 15.649054] __kasan_check_write+0x18/0x20 [ 15.649076] kasan_atomics_helper+0x12e6/0x5450 [ 15.649100] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.649122] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.649146] ? kasan_atomics+0x152/0x310 [ 15.649170] kasan_atomics+0x1dc/0x310 [ 15.649189] ? __pfx_kasan_atomics+0x10/0x10 [ 15.649209] ? trace_hardirqs_on+0x37/0xe0 [ 15.649232] ? __pfx_read_tsc+0x10/0x10 [ 15.649253] ? ktime_get_ts64+0x86/0x230 [ 15.649279] kunit_try_run_case+0x1a5/0x480 [ 15.649362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.649387] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.649413] ? __kthread_parkme+0x82/0x180 [ 15.649447] ? preempt_count_sub+0x50/0x80 [ 15.649473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.649497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.649520] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.649546] kthread+0x337/0x6f0 [ 15.649563] ? trace_preempt_on+0x20/0xc0 [ 15.649586] ? __pfx_kthread+0x10/0x10 [ 15.649605] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.649627] ? calculate_sigpending+0x7b/0xa0 [ 15.649648] ? __pfx_kthread+0x10/0x10 [ 15.649667] ret_from_fork+0x41/0x80 [ 15.649690] ? __pfx_kthread+0x10/0x10 [ 15.649709] ret_from_fork_asm+0x1a/0x30 [ 15.649741] </TASK> [ 15.649754] [ 15.660753] Allocated by task 284: [ 15.660887] kasan_save_stack+0x45/0x70 [ 15.661114] kasan_save_track+0x18/0x40 [ 15.661327] kasan_save_alloc_info+0x3b/0x50 [ 15.661553] __kasan_kmalloc+0xb7/0xc0 [ 15.661742] __kmalloc_cache_noprof+0x189/0x420 [ 15.661898] kasan_atomics+0x95/0x310 [ 15.662030] kunit_try_run_case+0x1a5/0x480 [ 15.662209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.662498] kthread+0x337/0x6f0 [ 15.662701] ret_from_fork+0x41/0x80 [ 15.662954] ret_from_fork_asm+0x1a/0x30 [ 15.663155] [ 15.663262] The buggy address belongs to the object at ffff888102717100 [ 15.663262] which belongs to the cache kmalloc-64 of size 64 [ 15.663815] The buggy address is located 0 bytes to the right of [ 15.663815] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.664357] [ 15.664439] The buggy address belongs to the physical page: [ 15.664752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.665107] flags: 0x200000000000000(node=0|zone=2) [ 15.665347] page_type: f5(slab) [ 15.665523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.665853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.666190] page dumped because: kasan: bad access detected [ 15.666448] [ 15.666555] Memory state around the buggy address: [ 15.666777] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.667080] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.667290] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.667643] ^ [ 15.667875] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.668192] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.668507] ================================================================== [ 15.475196] ================================================================== [ 15.475542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.475783] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.476593] [ 15.477004] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.477056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.477071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.477094] Call Trace: [ 15.477108] <TASK> [ 15.477124] dump_stack_lvl+0x73/0xb0 [ 15.477154] print_report+0xd1/0x650 [ 15.477178] ? __virt_addr_valid+0x1db/0x2d0 [ 15.477200] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.477222] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.477247] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.477269] kasan_report+0x141/0x180 [ 15.477293] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.477332] kasan_check_range+0x10c/0x1c0 [ 15.477354] __kasan_check_write+0x18/0x20 [ 15.477374] kasan_atomics_helper+0xfa9/0x5450 [ 15.477398] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.477422] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.477445] ? kasan_atomics+0x152/0x310 [ 15.477491] kasan_atomics+0x1dc/0x310 [ 15.477512] ? __pfx_kasan_atomics+0x10/0x10 [ 15.477532] ? trace_hardirqs_on+0x37/0xe0 [ 15.477556] ? __pfx_read_tsc+0x10/0x10 [ 15.477576] ? ktime_get_ts64+0x86/0x230 [ 15.477601] kunit_try_run_case+0x1a5/0x480 [ 15.477626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.477650] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.477676] ? __kthread_parkme+0x82/0x180 [ 15.477698] ? preempt_count_sub+0x50/0x80 [ 15.477724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.477749] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.477772] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.477795] kthread+0x337/0x6f0 [ 15.477813] ? trace_preempt_on+0x20/0xc0 [ 15.477836] ? __pfx_kthread+0x10/0x10 [ 15.477856] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.477877] ? calculate_sigpending+0x7b/0xa0 [ 15.477899] ? __pfx_kthread+0x10/0x10 [ 15.477918] ret_from_fork+0x41/0x80 [ 15.477940] ? __pfx_kthread+0x10/0x10 [ 15.477959] ret_from_fork_asm+0x1a/0x30 [ 15.477991] </TASK> [ 15.478004] [ 15.489875] Allocated by task 284: [ 15.490106] kasan_save_stack+0x45/0x70 [ 15.490531] kasan_save_track+0x18/0x40 [ 15.490849] kasan_save_alloc_info+0x3b/0x50 [ 15.491191] __kasan_kmalloc+0xb7/0xc0 [ 15.491370] __kmalloc_cache_noprof+0x189/0x420 [ 15.491823] kasan_atomics+0x95/0x310 [ 15.492172] kunit_try_run_case+0x1a5/0x480 [ 15.492413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.492901] kthread+0x337/0x6f0 [ 15.493023] ret_from_fork+0x41/0x80 [ 15.493154] ret_from_fork_asm+0x1a/0x30 [ 15.493296] [ 15.493380] The buggy address belongs to the object at ffff888102717100 [ 15.493380] which belongs to the cache kmalloc-64 of size 64 [ 15.494433] The buggy address is located 0 bytes to the right of [ 15.494433] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.495564] [ 15.495785] The buggy address belongs to the physical page: [ 15.496284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.496984] flags: 0x200000000000000(node=0|zone=2) [ 15.497366] page_type: f5(slab) [ 15.497519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.498181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.498780] page dumped because: kasan: bad access detected [ 15.499130] [ 15.499327] Memory state around the buggy address: [ 15.499658] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.500016] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.500235] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.500472] ^ [ 15.500639] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.500982] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.501264] ================================================================== [ 15.688235] ================================================================== [ 15.688930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.689271] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.689670] [ 15.689774] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.689825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.689839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.689863] Call Trace: [ 15.689886] <TASK> [ 15.689910] dump_stack_lvl+0x73/0xb0 [ 15.689942] print_report+0xd1/0x650 [ 15.689967] ? __virt_addr_valid+0x1db/0x2d0 [ 15.689992] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.690014] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.690038] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.690061] kasan_report+0x141/0x180 [ 15.690084] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.690113] kasan_check_range+0x10c/0x1c0 [ 15.690133] __kasan_check_read+0x15/0x20 [ 15.690154] kasan_atomics_helper+0x13b5/0x5450 [ 15.690178] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.690201] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.690224] ? kasan_atomics+0x152/0x310 [ 15.690248] kasan_atomics+0x1dc/0x310 [ 15.690268] ? __pfx_kasan_atomics+0x10/0x10 [ 15.690288] ? trace_hardirqs_on+0x37/0xe0 [ 15.690323] ? __pfx_read_tsc+0x10/0x10 [ 15.690345] ? ktime_get_ts64+0x86/0x230 [ 15.690372] kunit_try_run_case+0x1a5/0x480 [ 15.690400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.690425] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.690453] ? __kthread_parkme+0x82/0x180 [ 15.690475] ? preempt_count_sub+0x50/0x80 [ 15.690502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.690526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.690549] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.690573] kthread+0x337/0x6f0 [ 15.690590] ? trace_preempt_on+0x20/0xc0 [ 15.690613] ? __pfx_kthread+0x10/0x10 [ 15.690632] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.690654] ? calculate_sigpending+0x7b/0xa0 [ 15.690682] ? __pfx_kthread+0x10/0x10 [ 15.690701] ret_from_fork+0x41/0x80 [ 15.690723] ? __pfx_kthread+0x10/0x10 [ 15.690741] ret_from_fork_asm+0x1a/0x30 [ 15.690775] </TASK> [ 15.690789] [ 15.698544] Allocated by task 284: [ 15.698736] kasan_save_stack+0x45/0x70 [ 15.698946] kasan_save_track+0x18/0x40 [ 15.699142] kasan_save_alloc_info+0x3b/0x50 [ 15.699367] __kasan_kmalloc+0xb7/0xc0 [ 15.699629] __kmalloc_cache_noprof+0x189/0x420 [ 15.699837] kasan_atomics+0x95/0x310 [ 15.699976] kunit_try_run_case+0x1a5/0x480 [ 15.700124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.700298] kthread+0x337/0x6f0 [ 15.700501] ret_from_fork+0x41/0x80 [ 15.700794] ret_from_fork_asm+0x1a/0x30 [ 15.701045] [ 15.701143] The buggy address belongs to the object at ffff888102717100 [ 15.701143] which belongs to the cache kmalloc-64 of size 64 [ 15.701780] The buggy address is located 0 bytes to the right of [ 15.701780] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.702149] [ 15.702226] The buggy address belongs to the physical page: [ 15.702577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.702955] flags: 0x200000000000000(node=0|zone=2) [ 15.703230] page_type: f5(slab) [ 15.703414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.703803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.704175] page dumped because: kasan: bad access detected [ 15.704362] [ 15.704442] Memory state around the buggy address: [ 15.704640] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.705002] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.705561] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.705812] ^ [ 15.706064] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.706371] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.706737] ================================================================== [ 16.022383] ================================================================== [ 16.023119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.023417] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.023686] [ 16.023775] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.023821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.023835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.023868] Call Trace: [ 16.023886] <TASK> [ 16.023903] dump_stack_lvl+0x73/0xb0 [ 16.023942] print_report+0xd1/0x650 [ 16.023966] ? __virt_addr_valid+0x1db/0x2d0 [ 16.023989] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.024012] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.024035] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.024058] kasan_report+0x141/0x180 [ 16.024082] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.024111] kasan_check_range+0x10c/0x1c0 [ 16.024132] __kasan_check_write+0x18/0x20 [ 16.024153] kasan_atomics_helper+0x1ce1/0x5450 [ 16.024178] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.024201] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.024224] ? kasan_atomics+0x152/0x310 [ 16.024248] kasan_atomics+0x1dc/0x310 [ 16.024269] ? __pfx_kasan_atomics+0x10/0x10 [ 16.024289] ? trace_hardirqs_on+0x37/0xe0 [ 16.024321] ? __pfx_read_tsc+0x10/0x10 [ 16.024341] ? ktime_get_ts64+0x86/0x230 [ 16.024368] kunit_try_run_case+0x1a5/0x480 [ 16.024393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.024418] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.024442] ? __kthread_parkme+0x82/0x180 [ 16.024464] ? preempt_count_sub+0x50/0x80 [ 16.024489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.024513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.024536] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.024560] kthread+0x337/0x6f0 [ 16.024577] ? trace_preempt_on+0x20/0xc0 [ 16.024600] ? __pfx_kthread+0x10/0x10 [ 16.024619] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.024641] ? calculate_sigpending+0x7b/0xa0 [ 16.024663] ? __pfx_kthread+0x10/0x10 [ 16.024683] ret_from_fork+0x41/0x80 [ 16.024703] ? __pfx_kthread+0x10/0x10 [ 16.024722] ret_from_fork_asm+0x1a/0x30 [ 16.024754] </TASK> [ 16.024766] [ 16.032779] Allocated by task 284: [ 16.032991] kasan_save_stack+0x45/0x70 [ 16.033193] kasan_save_track+0x18/0x40 [ 16.033392] kasan_save_alloc_info+0x3b/0x50 [ 16.033764] __kasan_kmalloc+0xb7/0xc0 [ 16.033957] __kmalloc_cache_noprof+0x189/0x420 [ 16.034177] kasan_atomics+0x95/0x310 [ 16.034352] kunit_try_run_case+0x1a5/0x480 [ 16.034655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.034915] kthread+0x337/0x6f0 [ 16.035087] ret_from_fork+0x41/0x80 [ 16.035286] ret_from_fork_asm+0x1a/0x30 [ 16.035442] [ 16.035569] The buggy address belongs to the object at ffff888102717100 [ 16.035569] which belongs to the cache kmalloc-64 of size 64 [ 16.036147] The buggy address is located 0 bytes to the right of [ 16.036147] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.036672] [ 16.036799] The buggy address belongs to the physical page: [ 16.037030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.037319] flags: 0x200000000000000(node=0|zone=2) [ 16.037488] page_type: f5(slab) [ 16.037613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.037899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.038263] page dumped because: kasan: bad access detected [ 16.038528] [ 16.038707] Memory state around the buggy address: [ 16.038932] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.039166] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.039393] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.039944] ^ [ 16.040182] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.040646] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.041045] ================================================================== [ 16.041652] ================================================================== [ 16.042316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.042806] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.043046] [ 16.043180] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.043225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.043239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.043260] Call Trace: [ 16.043277] <TASK> [ 16.043295] dump_stack_lvl+0x73/0xb0 [ 16.043332] print_report+0xd1/0x650 [ 16.043355] ? __virt_addr_valid+0x1db/0x2d0 [ 16.043377] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.043399] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.043422] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.043446] kasan_report+0x141/0x180 [ 16.043480] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.043508] kasan_check_range+0x10c/0x1c0 [ 16.043529] __kasan_check_write+0x18/0x20 [ 16.043561] kasan_atomics_helper+0x1d7a/0x5450 [ 16.043585] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.043609] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.043632] ? kasan_atomics+0x152/0x310 [ 16.043656] kasan_atomics+0x1dc/0x310 [ 16.043676] ? __pfx_kasan_atomics+0x10/0x10 [ 16.043696] ? trace_hardirqs_on+0x37/0xe0 [ 16.043720] ? __pfx_read_tsc+0x10/0x10 [ 16.043740] ? ktime_get_ts64+0x86/0x230 [ 16.043766] kunit_try_run_case+0x1a5/0x480 [ 16.043791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.043816] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.043849] ? __kthread_parkme+0x82/0x180 [ 16.043872] ? preempt_count_sub+0x50/0x80 [ 16.043899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.043933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.043956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.043979] kthread+0x337/0x6f0 [ 16.043996] ? trace_preempt_on+0x20/0xc0 [ 16.044029] ? __pfx_kthread+0x10/0x10 [ 16.044047] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.044069] ? calculate_sigpending+0x7b/0xa0 [ 16.044101] ? __pfx_kthread+0x10/0x10 [ 16.044122] ret_from_fork+0x41/0x80 [ 16.044144] ? __pfx_kthread+0x10/0x10 [ 16.044163] ret_from_fork_asm+0x1a/0x30 [ 16.044195] </TASK> [ 16.044207] [ 16.052172] Allocated by task 284: [ 16.052360] kasan_save_stack+0x45/0x70 [ 16.052584] kasan_save_track+0x18/0x40 [ 16.052783] kasan_save_alloc_info+0x3b/0x50 [ 16.053001] __kasan_kmalloc+0xb7/0xc0 [ 16.053166] __kmalloc_cache_noprof+0x189/0x420 [ 16.053406] kasan_atomics+0x95/0x310 [ 16.053645] kunit_try_run_case+0x1a5/0x480 [ 16.053793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.053985] kthread+0x337/0x6f0 [ 16.054175] ret_from_fork+0x41/0x80 [ 16.054372] ret_from_fork_asm+0x1a/0x30 [ 16.054574] [ 16.054648] The buggy address belongs to the object at ffff888102717100 [ 16.054648] which belongs to the cache kmalloc-64 of size 64 [ 16.055285] The buggy address is located 0 bytes to the right of [ 16.055285] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.055758] [ 16.055835] The buggy address belongs to the physical page: [ 16.056012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.056364] flags: 0x200000000000000(node=0|zone=2) [ 16.056742] page_type: f5(slab) [ 16.057018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.057385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.057677] page dumped because: kasan: bad access detected [ 16.057853] [ 16.057925] Memory state around the buggy address: [ 16.058084] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.058380] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.059056] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.059422] ^ [ 16.059679] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.059990] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.060287] ================================================================== [ 15.526613] ================================================================== [ 15.527067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.527429] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.527731] [ 15.527873] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.527919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.527933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.527956] Call Trace: [ 15.527982] <TASK> [ 15.527999] dump_stack_lvl+0x73/0xb0 [ 15.528027] print_report+0xd1/0x650 [ 15.528065] ? __virt_addr_valid+0x1db/0x2d0 [ 15.528087] ? kasan_atomics_helper+0x1079/0x5450 [ 15.528110] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.528134] ? kasan_atomics_helper+0x1079/0x5450 [ 15.528157] kasan_report+0x141/0x180 [ 15.528181] ? kasan_atomics_helper+0x1079/0x5450 [ 15.528209] kasan_check_range+0x10c/0x1c0 [ 15.528237] __kasan_check_write+0x18/0x20 [ 15.528258] kasan_atomics_helper+0x1079/0x5450 [ 15.528282] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.528320] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.528343] ? kasan_atomics+0x152/0x310 [ 15.528366] kasan_atomics+0x1dc/0x310 [ 15.528386] ? __pfx_kasan_atomics+0x10/0x10 [ 15.528406] ? trace_hardirqs_on+0x37/0xe0 [ 15.528429] ? __pfx_read_tsc+0x10/0x10 [ 15.528463] ? ktime_get_ts64+0x86/0x230 [ 15.528489] kunit_try_run_case+0x1a5/0x480 [ 15.528515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.528539] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.528563] ? __kthread_parkme+0x82/0x180 [ 15.528596] ? preempt_count_sub+0x50/0x80 [ 15.528621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.528664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.528687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.528710] kthread+0x337/0x6f0 [ 15.528739] ? trace_preempt_on+0x20/0xc0 [ 15.528763] ? __pfx_kthread+0x10/0x10 [ 15.528782] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.528804] ? calculate_sigpending+0x7b/0xa0 [ 15.528828] ? __pfx_kthread+0x10/0x10 [ 15.528849] ret_from_fork+0x41/0x80 [ 15.528879] ? __pfx_kthread+0x10/0x10 [ 15.528899] ret_from_fork_asm+0x1a/0x30 [ 15.528932] </TASK> [ 15.528954] [ 15.536518] Allocated by task 284: [ 15.536662] kasan_save_stack+0x45/0x70 [ 15.536819] kasan_save_track+0x18/0x40 [ 15.537058] kasan_save_alloc_info+0x3b/0x50 [ 15.537300] __kasan_kmalloc+0xb7/0xc0 [ 15.537503] __kmalloc_cache_noprof+0x189/0x420 [ 15.537770] kasan_atomics+0x95/0x310 [ 15.538142] kunit_try_run_case+0x1a5/0x480 [ 15.538373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.538596] kthread+0x337/0x6f0 [ 15.538723] ret_from_fork+0x41/0x80 [ 15.538999] ret_from_fork_asm+0x1a/0x30 [ 15.539221] [ 15.539327] The buggy address belongs to the object at ffff888102717100 [ 15.539327] which belongs to the cache kmalloc-64 of size 64 [ 15.539845] The buggy address is located 0 bytes to the right of [ 15.539845] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.540379] [ 15.540493] The buggy address belongs to the physical page: [ 15.540802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.541143] flags: 0x200000000000000(node=0|zone=2) [ 15.541318] page_type: f5(slab) [ 15.541443] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.541676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.541991] page dumped because: kasan: bad access detected [ 15.542242] [ 15.542344] Memory state around the buggy address: [ 15.542567] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.542817] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.543038] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.543253] ^ [ 15.543756] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.544081] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.544440] ================================================================== [ 15.962313] ================================================================== [ 15.962876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.963182] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.963549] [ 15.963647] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.963695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.963710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.963744] Call Trace: [ 15.963762] <TASK> [ 15.963779] dump_stack_lvl+0x73/0xb0 [ 15.963817] print_report+0xd1/0x650 [ 15.963841] ? __virt_addr_valid+0x1db/0x2d0 [ 15.963864] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.963896] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.963921] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.963945] kasan_report+0x141/0x180 [ 15.963979] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.964008] kasan_check_range+0x10c/0x1c0 [ 15.964031] __kasan_check_write+0x18/0x20 [ 15.964060] kasan_atomics_helper+0x1b22/0x5450 [ 15.964085] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.964120] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.964143] ? kasan_atomics+0x152/0x310 [ 15.964168] kasan_atomics+0x1dc/0x310 [ 15.964197] ? __pfx_kasan_atomics+0x10/0x10 [ 15.964218] ? trace_hardirqs_on+0x37/0xe0 [ 15.964242] ? __pfx_read_tsc+0x10/0x10 [ 15.964272] ? ktime_get_ts64+0x86/0x230 [ 15.964300] kunit_try_run_case+0x1a5/0x480 [ 15.964334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.964367] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.964393] ? __kthread_parkme+0x82/0x180 [ 15.964416] ? preempt_count_sub+0x50/0x80 [ 15.964464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.964489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.964513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.964537] kthread+0x337/0x6f0 [ 15.964565] ? trace_preempt_on+0x20/0xc0 [ 15.964589] ? __pfx_kthread+0x10/0x10 [ 15.964608] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.964641] ? calculate_sigpending+0x7b/0xa0 [ 15.964663] ? __pfx_kthread+0x10/0x10 [ 15.964683] ret_from_fork+0x41/0x80 [ 15.964704] ? __pfx_kthread+0x10/0x10 [ 15.964733] ret_from_fork_asm+0x1a/0x30 [ 15.964766] </TASK> [ 15.964777] [ 15.972591] Allocated by task 284: [ 15.972866] kasan_save_stack+0x45/0x70 [ 15.973056] kasan_save_track+0x18/0x40 [ 15.973209] kasan_save_alloc_info+0x3b/0x50 [ 15.973368] __kasan_kmalloc+0xb7/0xc0 [ 15.973505] __kmalloc_cache_noprof+0x189/0x420 [ 15.973660] kasan_atomics+0x95/0x310 [ 15.973791] kunit_try_run_case+0x1a5/0x480 [ 15.973986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.974362] kthread+0x337/0x6f0 [ 15.974543] ret_from_fork+0x41/0x80 [ 15.974731] ret_from_fork_asm+0x1a/0x30 [ 15.974926] [ 15.975019] The buggy address belongs to the object at ffff888102717100 [ 15.975019] which belongs to the cache kmalloc-64 of size 64 [ 15.975534] The buggy address is located 0 bytes to the right of [ 15.975534] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.975898] [ 15.975970] The buggy address belongs to the physical page: [ 15.976141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.976392] flags: 0x200000000000000(node=0|zone=2) [ 15.976601] page_type: f5(slab) [ 15.976724] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.976955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.977181] page dumped because: kasan: bad access detected [ 15.977403] [ 15.977501] Memory state around the buggy address: [ 15.977699] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.977920] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.978137] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.978363] ^ [ 15.978520] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.978743] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.978958] ================================================================== [ 15.083477] ================================================================== [ 15.083858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.084384] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.084708] [ 15.084820] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.084937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.084953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.084975] Call Trace: [ 15.084990] <TASK> [ 15.085004] dump_stack_lvl+0x73/0xb0 [ 15.085034] print_report+0xd1/0x650 [ 15.085079] ? __virt_addr_valid+0x1db/0x2d0 [ 15.085101] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.085123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.085164] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.085186] kasan_report+0x141/0x180 [ 15.085210] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.085239] __asan_report_load4_noabort+0x18/0x20 [ 15.085260] kasan_atomics_helper+0x4b54/0x5450 [ 15.085284] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.085320] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.085359] ? kasan_atomics+0x152/0x310 [ 15.085383] kasan_atomics+0x1dc/0x310 [ 15.085403] ? __pfx_kasan_atomics+0x10/0x10 [ 15.085424] ? trace_hardirqs_on+0x37/0xe0 [ 15.085447] ? __pfx_read_tsc+0x10/0x10 [ 15.085467] ? ktime_get_ts64+0x86/0x230 [ 15.085493] kunit_try_run_case+0x1a5/0x480 [ 15.085518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.085543] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.085568] ? __kthread_parkme+0x82/0x180 [ 15.085590] ? preempt_count_sub+0x50/0x80 [ 15.085632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.085657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.085681] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.085705] kthread+0x337/0x6f0 [ 15.085724] ? trace_preempt_on+0x20/0xc0 [ 15.085748] ? __pfx_kthread+0x10/0x10 [ 15.085767] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.085804] ? calculate_sigpending+0x7b/0xa0 [ 15.085827] ? __pfx_kthread+0x10/0x10 [ 15.085847] ret_from_fork+0x41/0x80 [ 15.085869] ? __pfx_kthread+0x10/0x10 [ 15.085927] ret_from_fork_asm+0x1a/0x30 [ 15.085963] </TASK> [ 15.085976] [ 15.094729] Allocated by task 284: [ 15.094864] kasan_save_stack+0x45/0x70 [ 15.095100] kasan_save_track+0x18/0x40 [ 15.095486] kasan_save_alloc_info+0x3b/0x50 [ 15.095772] __kasan_kmalloc+0xb7/0xc0 [ 15.096068] __kmalloc_cache_noprof+0x189/0x420 [ 15.096234] kasan_atomics+0x95/0x310 [ 15.096439] kunit_try_run_case+0x1a5/0x480 [ 15.097013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.097245] kthread+0x337/0x6f0 [ 15.097588] ret_from_fork+0x41/0x80 [ 15.097831] ret_from_fork_asm+0x1a/0x30 [ 15.098121] [ 15.098228] The buggy address belongs to the object at ffff888102717100 [ 15.098228] which belongs to the cache kmalloc-64 of size 64 [ 15.098816] The buggy address is located 0 bytes to the right of [ 15.098816] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.099384] [ 15.099528] The buggy address belongs to the physical page: [ 15.099865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.100255] flags: 0x200000000000000(node=0|zone=2) [ 15.100533] page_type: f5(slab) [ 15.100730] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.101076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.101594] page dumped because: kasan: bad access detected [ 15.101843] [ 15.102036] Memory state around the buggy address: [ 15.102266] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.102617] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.102864] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.103204] ^ [ 15.103513] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.103835] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.104197] ================================================================== [ 15.381380] ================================================================== [ 15.381736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.382065] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.382992] [ 15.383168] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.383221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.383237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.383260] Call Trace: [ 15.383279] <TASK> [ 15.383295] dump_stack_lvl+0x73/0xb0 [ 15.383339] print_report+0xd1/0x650 [ 15.383364] ? __virt_addr_valid+0x1db/0x2d0 [ 15.383387] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.383410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.383456] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.383481] kasan_report+0x141/0x180 [ 15.383504] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.383533] __asan_report_load4_noabort+0x18/0x20 [ 15.383555] kasan_atomics_helper+0x4a84/0x5450 [ 15.383579] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.383603] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.383625] ? kasan_atomics+0x152/0x310 [ 15.383650] kasan_atomics+0x1dc/0x310 [ 15.383669] ? __pfx_kasan_atomics+0x10/0x10 [ 15.383689] ? trace_hardirqs_on+0x37/0xe0 [ 15.383713] ? __pfx_read_tsc+0x10/0x10 [ 15.383734] ? ktime_get_ts64+0x86/0x230 [ 15.383760] kunit_try_run_case+0x1a5/0x480 [ 15.383785] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.383811] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.383835] ? __kthread_parkme+0x82/0x180 [ 15.383858] ? preempt_count_sub+0x50/0x80 [ 15.383884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.383908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.383932] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.383955] kthread+0x337/0x6f0 [ 15.383973] ? trace_preempt_on+0x20/0xc0 [ 15.383997] ? __pfx_kthread+0x10/0x10 [ 15.384016] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.384038] ? calculate_sigpending+0x7b/0xa0 [ 15.384060] ? __pfx_kthread+0x10/0x10 [ 15.384080] ret_from_fork+0x41/0x80 [ 15.384102] ? __pfx_kthread+0x10/0x10 [ 15.384121] ret_from_fork_asm+0x1a/0x30 [ 15.384153] </TASK> [ 15.384166] [ 15.391209] Allocated by task 284: [ 15.391400] kasan_save_stack+0x45/0x70 [ 15.391596] kasan_save_track+0x18/0x40 [ 15.391781] kasan_save_alloc_info+0x3b/0x50 [ 15.391972] __kasan_kmalloc+0xb7/0xc0 [ 15.392145] __kmalloc_cache_noprof+0x189/0x420 [ 15.392372] kasan_atomics+0x95/0x310 [ 15.392558] kunit_try_run_case+0x1a5/0x480 [ 15.392739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.392981] kthread+0x337/0x6f0 [ 15.393139] ret_from_fork+0x41/0x80 [ 15.393272] ret_from_fork_asm+0x1a/0x30 [ 15.393484] [ 15.393586] The buggy address belongs to the object at ffff888102717100 [ 15.393586] which belongs to the cache kmalloc-64 of size 64 [ 15.394042] The buggy address is located 0 bytes to the right of [ 15.394042] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.394585] [ 15.394671] The buggy address belongs to the physical page: [ 15.394898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.395234] flags: 0x200000000000000(node=0|zone=2) [ 15.395412] page_type: f5(slab) [ 15.395558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.395792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.396103] page dumped because: kasan: bad access detected [ 15.396364] [ 15.396486] Memory state around the buggy address: [ 15.396714] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.397040] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.397329] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.397573] ^ [ 15.397732] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.398015] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.398344] ================================================================== [ 15.169042] ================================================================== [ 15.169414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.169979] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.170664] [ 15.170760] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.170805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.170819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.170840] Call Trace: [ 15.170856] <TASK> [ 15.170872] dump_stack_lvl+0x73/0xb0 [ 15.170900] print_report+0xd1/0x650 [ 15.171102] ? __virt_addr_valid+0x1db/0x2d0 [ 15.171132] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.171155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.171180] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.171203] kasan_report+0x141/0x180 [ 15.171227] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.171255] kasan_check_range+0x10c/0x1c0 [ 15.171276] __kasan_check_write+0x18/0x20 [ 15.171299] kasan_atomics_helper+0x5fe/0x5450 [ 15.171336] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.171360] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.171383] ? kasan_atomics+0x152/0x310 [ 15.171407] kasan_atomics+0x1dc/0x310 [ 15.171427] ? __pfx_kasan_atomics+0x10/0x10 [ 15.171447] ? trace_hardirqs_on+0x37/0xe0 [ 15.171469] ? __pfx_read_tsc+0x10/0x10 [ 15.171490] ? ktime_get_ts64+0x86/0x230 [ 15.171517] kunit_try_run_case+0x1a5/0x480 [ 15.171542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.171567] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.171591] ? __kthread_parkme+0x82/0x180 [ 15.171614] ? preempt_count_sub+0x50/0x80 [ 15.171639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.171664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.171687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.171711] kthread+0x337/0x6f0 [ 15.171729] ? trace_preempt_on+0x20/0xc0 [ 15.171753] ? __pfx_kthread+0x10/0x10 [ 15.171772] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.171794] ? calculate_sigpending+0x7b/0xa0 [ 15.171815] ? __pfx_kthread+0x10/0x10 [ 15.171835] ret_from_fork+0x41/0x80 [ 15.171856] ? __pfx_kthread+0x10/0x10 [ 15.171884] ret_from_fork_asm+0x1a/0x30 [ 15.171916] </TASK> [ 15.171928] [ 15.179558] Allocated by task 284: [ 15.179689] kasan_save_stack+0x45/0x70 [ 15.179884] kasan_save_track+0x18/0x40 [ 15.180081] kasan_save_alloc_info+0x3b/0x50 [ 15.180314] __kasan_kmalloc+0xb7/0xc0 [ 15.180496] __kmalloc_cache_noprof+0x189/0x420 [ 15.180699] kasan_atomics+0x95/0x310 [ 15.180858] kunit_try_run_case+0x1a5/0x480 [ 15.181067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.181329] kthread+0x337/0x6f0 [ 15.181512] ret_from_fork+0x41/0x80 [ 15.181667] ret_from_fork_asm+0x1a/0x30 [ 15.181845] [ 15.181949] The buggy address belongs to the object at ffff888102717100 [ 15.181949] which belongs to the cache kmalloc-64 of size 64 [ 15.182447] The buggy address is located 0 bytes to the right of [ 15.182447] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.182842] [ 15.182918] The buggy address belongs to the physical page: [ 15.183092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.183401] flags: 0x200000000000000(node=0|zone=2) [ 15.183634] page_type: f5(slab) [ 15.183806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.184149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.184465] page dumped because: kasan: bad access detected [ 15.184641] [ 15.184713] Memory state around the buggy address: [ 15.184868] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.185179] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.185598] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.185921] ^ [ 15.186153] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.186536] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.186836] ================================================================== [ 15.979370] ================================================================== [ 15.979967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.980386] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.980959] [ 15.981075] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.981121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.981135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.981157] Call Trace: [ 15.981170] <TASK> [ 15.981185] dump_stack_lvl+0x73/0xb0 [ 15.981212] print_report+0xd1/0x650 [ 15.981235] ? __virt_addr_valid+0x1db/0x2d0 [ 15.981258] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.981280] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.981318] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.981342] kasan_report+0x141/0x180 [ 15.981365] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.981393] kasan_check_range+0x10c/0x1c0 [ 15.981415] __kasan_check_write+0x18/0x20 [ 15.981436] kasan_atomics_helper+0x1c18/0x5450 [ 15.981468] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.981492] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.981525] ? kasan_atomics+0x152/0x310 [ 15.981550] kasan_atomics+0x1dc/0x310 [ 15.981570] ? __pfx_kasan_atomics+0x10/0x10 [ 15.981590] ? trace_hardirqs_on+0x37/0xe0 [ 15.981632] ? __pfx_read_tsc+0x10/0x10 [ 15.981653] ? ktime_get_ts64+0x86/0x230 [ 15.981678] kunit_try_run_case+0x1a5/0x480 [ 15.981712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.981737] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.981762] ? __kthread_parkme+0x82/0x180 [ 15.981784] ? preempt_count_sub+0x50/0x80 [ 15.981811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.981835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.981858] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.981882] kthread+0x337/0x6f0 [ 15.981899] ? trace_preempt_on+0x20/0xc0 [ 15.981922] ? __pfx_kthread+0x10/0x10 [ 15.981941] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.981963] ? calculate_sigpending+0x7b/0xa0 [ 15.981986] ? __pfx_kthread+0x10/0x10 [ 15.982005] ret_from_fork+0x41/0x80 [ 15.982026] ? __pfx_kthread+0x10/0x10 [ 15.982045] ret_from_fork_asm+0x1a/0x30 [ 15.982078] </TASK> [ 15.982090] [ 15.989881] Allocated by task 284: [ 15.990081] kasan_save_stack+0x45/0x70 [ 15.990284] kasan_save_track+0x18/0x40 [ 15.990598] kasan_save_alloc_info+0x3b/0x50 [ 15.990784] __kasan_kmalloc+0xb7/0xc0 [ 15.990991] __kmalloc_cache_noprof+0x189/0x420 [ 15.991211] kasan_atomics+0x95/0x310 [ 15.991407] kunit_try_run_case+0x1a5/0x480 [ 15.991580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.991779] kthread+0x337/0x6f0 [ 15.991918] ret_from_fork+0x41/0x80 [ 15.992087] ret_from_fork_asm+0x1a/0x30 [ 15.992265] [ 15.992373] The buggy address belongs to the object at ffff888102717100 [ 15.992373] which belongs to the cache kmalloc-64 of size 64 [ 15.992869] The buggy address is located 0 bytes to the right of [ 15.992869] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.993268] [ 15.993353] The buggy address belongs to the physical page: [ 15.993528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.993771] flags: 0x200000000000000(node=0|zone=2) [ 15.993933] page_type: f5(slab) [ 15.994055] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.994356] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.995078] page dumped because: kasan: bad access detected [ 15.995340] [ 15.995436] Memory state around the buggy address: [ 15.995787] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.996164] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.996548] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.996868] ^ [ 15.997091] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.997422] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.997676] ================================================================== [ 15.998108] ================================================================== [ 15.998377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.998716] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.999247] [ 15.999428] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.999471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.999484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.999516] Call Trace: [ 15.999530] <TASK> [ 15.999545] dump_stack_lvl+0x73/0xb0 [ 15.999572] print_report+0xd1/0x650 [ 15.999594] ? __virt_addr_valid+0x1db/0x2d0 [ 15.999616] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.999638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.999662] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.999685] kasan_report+0x141/0x180 [ 15.999709] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.999737] __asan_report_load8_noabort+0x18/0x20 [ 15.999759] kasan_atomics_helper+0x4f30/0x5450 [ 15.999783] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.999806] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.999828] ? kasan_atomics+0x152/0x310 [ 15.999852] kasan_atomics+0x1dc/0x310 [ 15.999872] ? __pfx_kasan_atomics+0x10/0x10 [ 15.999891] ? trace_hardirqs_on+0x37/0xe0 [ 15.999914] ? __pfx_read_tsc+0x10/0x10 [ 15.999935] ? ktime_get_ts64+0x86/0x230 [ 15.999960] kunit_try_run_case+0x1a5/0x480 [ 15.999984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.000009] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.000033] ? __kthread_parkme+0x82/0x180 [ 16.000055] ? preempt_count_sub+0x50/0x80 [ 16.000082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.000107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.000129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.000152] kthread+0x337/0x6f0 [ 16.000170] ? trace_preempt_on+0x20/0xc0 [ 16.000194] ? __pfx_kthread+0x10/0x10 [ 16.000213] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.000234] ? calculate_sigpending+0x7b/0xa0 [ 16.000256] ? __pfx_kthread+0x10/0x10 [ 16.000275] ret_from_fork+0x41/0x80 [ 16.000298] ? __pfx_kthread+0x10/0x10 [ 16.000335] ret_from_fork_asm+0x1a/0x30 [ 16.000368] </TASK> [ 16.000379] [ 16.011221] Allocated by task 284: [ 16.011405] kasan_save_stack+0x45/0x70 [ 16.012016] kasan_save_track+0x18/0x40 [ 16.012279] kasan_save_alloc_info+0x3b/0x50 [ 16.012660] __kasan_kmalloc+0xb7/0xc0 [ 16.012852] __kmalloc_cache_noprof+0x189/0x420 [ 16.013056] kasan_atomics+0x95/0x310 [ 16.013217] kunit_try_run_case+0x1a5/0x480 [ 16.013415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.013918] kthread+0x337/0x6f0 [ 16.014082] ret_from_fork+0x41/0x80 [ 16.014249] ret_from_fork_asm+0x1a/0x30 [ 16.014425] [ 16.014801] The buggy address belongs to the object at ffff888102717100 [ 16.014801] which belongs to the cache kmalloc-64 of size 64 [ 16.015474] The buggy address is located 0 bytes to the right of [ 16.015474] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.015849] [ 16.015923] The buggy address belongs to the physical page: [ 16.016097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.016350] flags: 0x200000000000000(node=0|zone=2) [ 16.016515] page_type: f5(slab) [ 16.016639] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.017509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.017886] page dumped because: kasan: bad access detected [ 16.018131] [ 16.018222] Memory state around the buggy address: [ 16.018441] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.018740] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.019020] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.019292] ^ [ 16.020009] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.020657] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.021100] ================================================================== [ 15.416625] ================================================================== [ 15.416976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.417643] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.417923] [ 15.418012] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.418058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.418072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.418094] Call Trace: [ 15.418111] <TASK> [ 15.418127] dump_stack_lvl+0x73/0xb0 [ 15.418155] print_report+0xd1/0x650 [ 15.418178] ? __virt_addr_valid+0x1db/0x2d0 [ 15.418200] ? kasan_atomics_helper+0xde0/0x5450 [ 15.418223] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.418246] ? kasan_atomics_helper+0xde0/0x5450 [ 15.418270] kasan_report+0x141/0x180 [ 15.418294] ? kasan_atomics_helper+0xde0/0x5450 [ 15.418335] kasan_check_range+0x10c/0x1c0 [ 15.418357] __kasan_check_write+0x18/0x20 [ 15.418378] kasan_atomics_helper+0xde0/0x5450 [ 15.418402] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.418447] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.418472] ? kasan_atomics+0x152/0x310 [ 15.418496] kasan_atomics+0x1dc/0x310 [ 15.418516] ? __pfx_kasan_atomics+0x10/0x10 [ 15.418537] ? trace_hardirqs_on+0x37/0xe0 [ 15.418561] ? __pfx_read_tsc+0x10/0x10 [ 15.418582] ? ktime_get_ts64+0x86/0x230 [ 15.418608] kunit_try_run_case+0x1a5/0x480 [ 15.418633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.418659] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.418691] ? __kthread_parkme+0x82/0x180 [ 15.418714] ? preempt_count_sub+0x50/0x80 [ 15.418739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.418764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.418787] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.418812] kthread+0x337/0x6f0 [ 15.418831] ? trace_preempt_on+0x20/0xc0 [ 15.418854] ? __pfx_kthread+0x10/0x10 [ 15.418874] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.418896] ? calculate_sigpending+0x7b/0xa0 [ 15.418919] ? __pfx_kthread+0x10/0x10 [ 15.418939] ret_from_fork+0x41/0x80 [ 15.418961] ? __pfx_kthread+0x10/0x10 [ 15.418981] ret_from_fork_asm+0x1a/0x30 [ 15.419013] </TASK> [ 15.419025] [ 15.426389] Allocated by task 284: [ 15.426541] kasan_save_stack+0x45/0x70 [ 15.426694] kasan_save_track+0x18/0x40 [ 15.426834] kasan_save_alloc_info+0x3b/0x50 [ 15.426982] __kasan_kmalloc+0xb7/0xc0 [ 15.427118] __kmalloc_cache_noprof+0x189/0x420 [ 15.427317] kasan_atomics+0x95/0x310 [ 15.427527] kunit_try_run_case+0x1a5/0x480 [ 15.427739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.427992] kthread+0x337/0x6f0 [ 15.428159] ret_from_fork+0x41/0x80 [ 15.428355] ret_from_fork_asm+0x1a/0x30 [ 15.428578] [ 15.428674] The buggy address belongs to the object at ffff888102717100 [ 15.428674] which belongs to the cache kmalloc-64 of size 64 [ 15.429197] The buggy address is located 0 bytes to the right of [ 15.429197] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.429736] [ 15.429817] The buggy address belongs to the physical page: [ 15.429993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.430356] flags: 0x200000000000000(node=0|zone=2) [ 15.430615] page_type: f5(slab) [ 15.430798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.431140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.431490] page dumped because: kasan: bad access detected [ 15.431718] [ 15.431814] Memory state around the buggy address: [ 15.432015] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.432278] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.432532] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.432843] ^ [ 15.433081] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.433408] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.433647] ================================================================== [ 15.804004] ================================================================== [ 15.804366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.804748] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.805124] [ 15.805254] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.805324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.805338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.805360] Call Trace: [ 15.805381] <TASK> [ 15.805412] dump_stack_lvl+0x73/0xb0 [ 15.805444] print_report+0xd1/0x650 [ 15.805468] ? __virt_addr_valid+0x1db/0x2d0 [ 15.805492] ? kasan_atomics_helper+0x164f/0x5450 [ 15.805523] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.805547] ? kasan_atomics_helper+0x164f/0x5450 [ 15.805572] kasan_report+0x141/0x180 [ 15.805606] ? kasan_atomics_helper+0x164f/0x5450 [ 15.805635] kasan_check_range+0x10c/0x1c0 [ 15.805656] __kasan_check_write+0x18/0x20 [ 15.805676] kasan_atomics_helper+0x164f/0x5450 [ 15.805700] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.805725] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.805758] ? kasan_atomics+0x152/0x310 [ 15.805784] kasan_atomics+0x1dc/0x310 [ 15.805804] ? __pfx_kasan_atomics+0x10/0x10 [ 15.805835] ? trace_hardirqs_on+0x37/0xe0 [ 15.805860] ? __pfx_read_tsc+0x10/0x10 [ 15.805882] ? ktime_get_ts64+0x86/0x230 [ 15.805917] kunit_try_run_case+0x1a5/0x480 [ 15.805943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.805968] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.806005] ? __kthread_parkme+0x82/0x180 [ 15.806029] ? preempt_count_sub+0x50/0x80 [ 15.806065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.806089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.806112] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.806148] kthread+0x337/0x6f0 [ 15.806166] ? trace_preempt_on+0x20/0xc0 [ 15.806190] ? __pfx_kthread+0x10/0x10 [ 15.806221] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.806243] ? calculate_sigpending+0x7b/0xa0 [ 15.806266] ? __pfx_kthread+0x10/0x10 [ 15.806296] ret_from_fork+0x41/0x80 [ 15.806326] ? __pfx_kthread+0x10/0x10 [ 15.806344] ret_from_fork_asm+0x1a/0x30 [ 15.806389] </TASK> [ 15.806403] [ 15.814105] Allocated by task 284: [ 15.814434] kasan_save_stack+0x45/0x70 [ 15.814871] kasan_save_track+0x18/0x40 [ 15.815018] kasan_save_alloc_info+0x3b/0x50 [ 15.815168] __kasan_kmalloc+0xb7/0xc0 [ 15.815312] __kmalloc_cache_noprof+0x189/0x420 [ 15.815547] kasan_atomics+0x95/0x310 [ 15.815737] kunit_try_run_case+0x1a5/0x480 [ 15.815954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.816219] kthread+0x337/0x6f0 [ 15.816408] ret_from_fork+0x41/0x80 [ 15.816589] ret_from_fork_asm+0x1a/0x30 [ 15.816780] [ 15.816855] The buggy address belongs to the object at ffff888102717100 [ 15.816855] which belongs to the cache kmalloc-64 of size 64 [ 15.817285] The buggy address is located 0 bytes to the right of [ 15.817285] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.818220] [ 15.818298] The buggy address belongs to the physical page: [ 15.818578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.818964] flags: 0x200000000000000(node=0|zone=2) [ 15.819165] page_type: f5(slab) [ 15.819292] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.819815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.820088] page dumped because: kasan: bad access detected [ 15.820362] [ 15.820469] Memory state around the buggy address: [ 15.820700] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.820977] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.821286] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.821669] ^ [ 15.821890] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.822187] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.822543] ================================================================== [ 15.148784] ================================================================== [ 15.149218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.149586] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.149900] [ 15.150017] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.150065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.150078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.150101] Call Trace: [ 15.150114] <TASK> [ 15.150128] dump_stack_lvl+0x73/0xb0 [ 15.150156] print_report+0xd1/0x650 [ 15.150179] ? __virt_addr_valid+0x1db/0x2d0 [ 15.150201] ? kasan_atomics_helper+0x565/0x5450 [ 15.150224] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.150248] ? kasan_atomics_helper+0x565/0x5450 [ 15.150272] kasan_report+0x141/0x180 [ 15.150296] ? kasan_atomics_helper+0x565/0x5450 [ 15.150336] kasan_check_range+0x10c/0x1c0 [ 15.150359] __kasan_check_write+0x18/0x20 [ 15.150380] kasan_atomics_helper+0x565/0x5450 [ 15.150405] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.150429] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.150532] ? kasan_atomics+0x152/0x310 [ 15.150577] kasan_atomics+0x1dc/0x310 [ 15.150598] ? __pfx_kasan_atomics+0x10/0x10 [ 15.150619] ? trace_hardirqs_on+0x37/0xe0 [ 15.150642] ? __pfx_read_tsc+0x10/0x10 [ 15.150662] ? ktime_get_ts64+0x86/0x230 [ 15.150693] kunit_try_run_case+0x1a5/0x480 [ 15.150717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.150742] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.150767] ? __kthread_parkme+0x82/0x180 [ 15.150790] ? preempt_count_sub+0x50/0x80 [ 15.150816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.150840] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.150916] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.150943] kthread+0x337/0x6f0 [ 15.150962] ? trace_preempt_on+0x20/0xc0 [ 15.150985] ? __pfx_kthread+0x10/0x10 [ 15.151025] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.151048] ? calculate_sigpending+0x7b/0xa0 [ 15.151070] ? __pfx_kthread+0x10/0x10 [ 15.151089] ret_from_fork+0x41/0x80 [ 15.151127] ? __pfx_kthread+0x10/0x10 [ 15.151146] ret_from_fork_asm+0x1a/0x30 [ 15.151179] </TASK> [ 15.151192] [ 15.160417] Allocated by task 284: [ 15.160608] kasan_save_stack+0x45/0x70 [ 15.160817] kasan_save_track+0x18/0x40 [ 15.161039] kasan_save_alloc_info+0x3b/0x50 [ 15.161198] __kasan_kmalloc+0xb7/0xc0 [ 15.161407] __kmalloc_cache_noprof+0x189/0x420 [ 15.161634] kasan_atomics+0x95/0x310 [ 15.161842] kunit_try_run_case+0x1a5/0x480 [ 15.162062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.162281] kthread+0x337/0x6f0 [ 15.162465] ret_from_fork+0x41/0x80 [ 15.162697] ret_from_fork_asm+0x1a/0x30 [ 15.162953] [ 15.163040] The buggy address belongs to the object at ffff888102717100 [ 15.163040] which belongs to the cache kmalloc-64 of size 64 [ 15.163502] The buggy address is located 0 bytes to the right of [ 15.163502] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.163870] [ 15.163945] The buggy address belongs to the physical page: [ 15.164487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.164864] flags: 0x200000000000000(node=0|zone=2) [ 15.165368] page_type: f5(slab) [ 15.165619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.165871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.166257] page dumped because: kasan: bad access detected [ 15.166519] [ 15.166617] Memory state around the buggy address: [ 15.166811] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.167186] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.167435] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.167770] ^ [ 15.168069] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.168321] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.168537] ================================================================== [ 15.823248] ================================================================== [ 15.823733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.823978] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.824342] [ 15.824492] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.824543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.824556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.824580] Call Trace: [ 15.824601] <TASK> [ 15.824620] dump_stack_lvl+0x73/0xb0 [ 15.824653] print_report+0xd1/0x650 [ 15.824678] ? __virt_addr_valid+0x1db/0x2d0 [ 15.824701] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.824724] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.824747] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.824771] kasan_report+0x141/0x180 [ 15.824794] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.824823] kasan_check_range+0x10c/0x1c0 [ 15.824844] __kasan_check_write+0x18/0x20 [ 15.824876] kasan_atomics_helper+0x16e7/0x5450 [ 15.824901] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.824924] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.824959] ? kasan_atomics+0x152/0x310 [ 15.824984] kasan_atomics+0x1dc/0x310 [ 15.825003] ? __pfx_kasan_atomics+0x10/0x10 [ 15.825024] ? trace_hardirqs_on+0x37/0xe0 [ 15.825050] ? __pfx_read_tsc+0x10/0x10 [ 15.825070] ? ktime_get_ts64+0x86/0x230 [ 15.825097] kunit_try_run_case+0x1a5/0x480 [ 15.825122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.825147] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.825174] ? __kthread_parkme+0x82/0x180 [ 15.825198] ? preempt_count_sub+0x50/0x80 [ 15.825224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.825249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.825272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.825296] kthread+0x337/0x6f0 [ 15.825324] ? trace_preempt_on+0x20/0xc0 [ 15.825347] ? __pfx_kthread+0x10/0x10 [ 15.825367] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.825388] ? calculate_sigpending+0x7b/0xa0 [ 15.825411] ? __pfx_kthread+0x10/0x10 [ 15.825431] ret_from_fork+0x41/0x80 [ 15.825452] ? __pfx_kthread+0x10/0x10 [ 15.825471] ret_from_fork_asm+0x1a/0x30 [ 15.825504] </TASK> [ 15.825517] [ 15.833008] Allocated by task 284: [ 15.833219] kasan_save_stack+0x45/0x70 [ 15.833452] kasan_save_track+0x18/0x40 [ 15.833684] kasan_save_alloc_info+0x3b/0x50 [ 15.833899] __kasan_kmalloc+0xb7/0xc0 [ 15.834115] __kmalloc_cache_noprof+0x189/0x420 [ 15.834319] kasan_atomics+0x95/0x310 [ 15.834516] kunit_try_run_case+0x1a5/0x480 [ 15.834731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.834971] kthread+0x337/0x6f0 [ 15.835152] ret_from_fork+0x41/0x80 [ 15.835338] ret_from_fork_asm+0x1a/0x30 [ 15.835567] [ 15.835651] The buggy address belongs to the object at ffff888102717100 [ 15.835651] which belongs to the cache kmalloc-64 of size 64 [ 15.836130] The buggy address is located 0 bytes to the right of [ 15.836130] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.836736] [ 15.836815] The buggy address belongs to the physical page: [ 15.837056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.837377] flags: 0x200000000000000(node=0|zone=2) [ 15.837753] page_type: f5(slab) [ 15.837957] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.838277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.838634] page dumped because: kasan: bad access detected [ 15.838896] [ 15.838969] Memory state around the buggy address: [ 15.839125] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.839354] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.839644] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.840011] ^ [ 15.840274] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.840725] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.840962] ================================================================== [ 15.619492] ================================================================== [ 15.619901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.620254] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.620805] [ 15.620943] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.620990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.621004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.621025] Call Trace: [ 15.621044] <TASK> [ 15.621063] dump_stack_lvl+0x73/0xb0 [ 15.621092] print_report+0xd1/0x650 [ 15.621116] ? __virt_addr_valid+0x1db/0x2d0 [ 15.621137] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.621160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.621183] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.621206] kasan_report+0x141/0x180 [ 15.621229] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.621258] __asan_report_load4_noabort+0x18/0x20 [ 15.621280] kasan_atomics_helper+0x49e8/0x5450 [ 15.621315] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.621338] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.621361] ? kasan_atomics+0x152/0x310 [ 15.621385] kasan_atomics+0x1dc/0x310 [ 15.621405] ? __pfx_kasan_atomics+0x10/0x10 [ 15.621424] ? trace_hardirqs_on+0x37/0xe0 [ 15.621448] ? __pfx_read_tsc+0x10/0x10 [ 15.621468] ? ktime_get_ts64+0x86/0x230 [ 15.621495] kunit_try_run_case+0x1a5/0x480 [ 15.621520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.621545] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.621570] ? __kthread_parkme+0x82/0x180 [ 15.621592] ? preempt_count_sub+0x50/0x80 [ 15.621617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.621642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.621665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.621689] kthread+0x337/0x6f0 [ 15.621708] ? trace_preempt_on+0x20/0xc0 [ 15.621731] ? __pfx_kthread+0x10/0x10 [ 15.621751] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.621772] ? calculate_sigpending+0x7b/0xa0 [ 15.621794] ? __pfx_kthread+0x10/0x10 [ 15.621814] ret_from_fork+0x41/0x80 [ 15.621835] ? __pfx_kthread+0x10/0x10 [ 15.621854] ret_from_fork_asm+0x1a/0x30 [ 15.621886] </TASK> [ 15.621897] [ 15.629542] Allocated by task 284: [ 15.629740] kasan_save_stack+0x45/0x70 [ 15.629897] kasan_save_track+0x18/0x40 [ 15.630112] kasan_save_alloc_info+0x3b/0x50 [ 15.630260] __kasan_kmalloc+0xb7/0xc0 [ 15.631223] __kmalloc_cache_noprof+0x189/0x420 [ 15.631993] kasan_atomics+0x95/0x310 [ 15.632382] kunit_try_run_case+0x1a5/0x480 [ 15.633141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.634045] kthread+0x337/0x6f0 [ 15.634459] ret_from_fork+0x41/0x80 [ 15.634870] ret_from_fork_asm+0x1a/0x30 [ 15.635021] [ 15.635096] The buggy address belongs to the object at ffff888102717100 [ 15.635096] which belongs to the cache kmalloc-64 of size 64 [ 15.635729] The buggy address is located 0 bytes to the right of [ 15.635729] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.637234] [ 15.637595] The buggy address belongs to the physical page: [ 15.638230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.639310] flags: 0x200000000000000(node=0|zone=2) [ 15.639787] page_type: f5(slab) [ 15.640159] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.640404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.641412] page dumped because: kasan: bad access detected [ 15.642057] [ 15.642445] Memory state around the buggy address: [ 15.642916] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.643137] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.643360] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.643711] ^ [ 15.644154] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.644883] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.645567] ================================================================== [ 15.897842] ================================================================== [ 15.898121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.898372] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.899055] [ 15.899182] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.899240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.899254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.899276] Call Trace: [ 15.899290] <TASK> [ 15.899320] dump_stack_lvl+0x73/0xb0 [ 15.899348] print_report+0xd1/0x650 [ 15.899371] ? __virt_addr_valid+0x1db/0x2d0 [ 15.899393] ? kasan_atomics_helper+0x194a/0x5450 [ 15.899416] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.899440] ? kasan_atomics_helper+0x194a/0x5450 [ 15.899464] kasan_report+0x141/0x180 [ 15.899496] ? kasan_atomics_helper+0x194a/0x5450 [ 15.899524] kasan_check_range+0x10c/0x1c0 [ 15.899545] __kasan_check_write+0x18/0x20 [ 15.899576] kasan_atomics_helper+0x194a/0x5450 [ 15.899600] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.899623] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.899646] ? kasan_atomics+0x152/0x310 [ 15.899678] kasan_atomics+0x1dc/0x310 [ 15.899698] ? __pfx_kasan_atomics+0x10/0x10 [ 15.899718] ? trace_hardirqs_on+0x37/0xe0 [ 15.899752] ? __pfx_read_tsc+0x10/0x10 [ 15.899772] ? ktime_get_ts64+0x86/0x230 [ 15.899797] kunit_try_run_case+0x1a5/0x480 [ 15.899829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.899854] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.899880] ? __kthread_parkme+0x82/0x180 [ 15.899913] ? preempt_count_sub+0x50/0x80 [ 15.899939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.899962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.899995] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.900019] kthread+0x337/0x6f0 [ 15.900037] ? trace_preempt_on+0x20/0xc0 [ 15.900071] ? __pfx_kthread+0x10/0x10 [ 15.900091] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.900113] ? calculate_sigpending+0x7b/0xa0 [ 15.900143] ? __pfx_kthread+0x10/0x10 [ 15.900162] ret_from_fork+0x41/0x80 [ 15.900184] ? __pfx_kthread+0x10/0x10 [ 15.900212] ret_from_fork_asm+0x1a/0x30 [ 15.900245] </TASK> [ 15.900258] [ 15.908056] Allocated by task 284: [ 15.908184] kasan_save_stack+0x45/0x70 [ 15.908345] kasan_save_track+0x18/0x40 [ 15.908536] kasan_save_alloc_info+0x3b/0x50 [ 15.908762] __kasan_kmalloc+0xb7/0xc0 [ 15.908955] __kmalloc_cache_noprof+0x189/0x420 [ 15.909182] kasan_atomics+0x95/0x310 [ 15.909380] kunit_try_run_case+0x1a5/0x480 [ 15.909703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.909880] kthread+0x337/0x6f0 [ 15.910000] ret_from_fork+0x41/0x80 [ 15.910133] ret_from_fork_asm+0x1a/0x30 [ 15.910335] [ 15.910426] The buggy address belongs to the object at ffff888102717100 [ 15.910426] which belongs to the cache kmalloc-64 of size 64 [ 15.910894] The buggy address is located 0 bytes to the right of [ 15.910894] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.912334] [ 15.912444] The buggy address belongs to the physical page: [ 15.912681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.912980] flags: 0x200000000000000(node=0|zone=2) [ 15.913185] page_type: f5(slab) [ 15.913343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.914436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.915094] page dumped because: kasan: bad access detected [ 15.915561] [ 15.915799] Memory state around the buggy address: [ 15.916233] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.916761] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.917289] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.917941] ^ [ 15.918233] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.918672] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.919163] ================================================================== [ 15.765767] ================================================================== [ 15.766358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.766804] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.767103] [ 15.767189] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.767235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.767249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.767270] Call Trace: [ 15.767285] <TASK> [ 15.767300] dump_stack_lvl+0x73/0xb0 [ 15.767341] print_report+0xd1/0x650 [ 15.767365] ? __virt_addr_valid+0x1db/0x2d0 [ 15.767387] ? kasan_atomics_helper+0x151d/0x5450 [ 15.767409] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.767433] ? kasan_atomics_helper+0x151d/0x5450 [ 15.767456] kasan_report+0x141/0x180 [ 15.767480] ? kasan_atomics_helper+0x151d/0x5450 [ 15.767508] kasan_check_range+0x10c/0x1c0 [ 15.767529] __kasan_check_write+0x18/0x20 [ 15.767550] kasan_atomics_helper+0x151d/0x5450 [ 15.767574] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.767599] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.767622] ? kasan_atomics+0x152/0x310 [ 15.767646] kasan_atomics+0x1dc/0x310 [ 15.767666] ? __pfx_kasan_atomics+0x10/0x10 [ 15.767686] ? trace_hardirqs_on+0x37/0xe0 [ 15.767710] ? __pfx_read_tsc+0x10/0x10 [ 15.767741] ? ktime_get_ts64+0x86/0x230 [ 15.767767] kunit_try_run_case+0x1a5/0x480 [ 15.767792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.767828] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.767853] ? __kthread_parkme+0x82/0x180 [ 15.767876] ? preempt_count_sub+0x50/0x80 [ 15.767902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.767926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.767950] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.767974] kthread+0x337/0x6f0 [ 15.767992] ? trace_preempt_on+0x20/0xc0 [ 15.768017] ? __pfx_kthread+0x10/0x10 [ 15.768036] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.768067] ? calculate_sigpending+0x7b/0xa0 [ 15.768092] ? __pfx_kthread+0x10/0x10 [ 15.768113] ret_from_fork+0x41/0x80 [ 15.768146] ? __pfx_kthread+0x10/0x10 [ 15.768166] ret_from_fork_asm+0x1a/0x30 [ 15.768200] </TASK> [ 15.768214] [ 15.776736] Allocated by task 284: [ 15.776918] kasan_save_stack+0x45/0x70 [ 15.777118] kasan_save_track+0x18/0x40 [ 15.777297] kasan_save_alloc_info+0x3b/0x50 [ 15.777584] __kasan_kmalloc+0xb7/0xc0 [ 15.777776] __kmalloc_cache_noprof+0x189/0x420 [ 15.778005] kasan_atomics+0x95/0x310 [ 15.778198] kunit_try_run_case+0x1a5/0x480 [ 15.778416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.778681] kthread+0x337/0x6f0 [ 15.778837] ret_from_fork+0x41/0x80 [ 15.779033] ret_from_fork_asm+0x1a/0x30 [ 15.779228] [ 15.779330] The buggy address belongs to the object at ffff888102717100 [ 15.779330] which belongs to the cache kmalloc-64 of size 64 [ 15.779781] The buggy address is located 0 bytes to the right of [ 15.779781] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.780328] [ 15.780401] The buggy address belongs to the physical page: [ 15.780652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.781015] flags: 0x200000000000000(node=0|zone=2) [ 15.781248] page_type: f5(slab) [ 15.781381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.781964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.782248] page dumped because: kasan: bad access detected [ 15.782431] [ 15.782502] Memory state around the buggy address: [ 15.782732] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.783081] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.783333] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.783550] ^ [ 15.783714] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.784096] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.784450] ================================================================== [ 15.501831] ================================================================== [ 15.502282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.503122] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.503581] [ 15.503682] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.503740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.503753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.503774] Call Trace: [ 15.503797] <TASK> [ 15.503813] dump_stack_lvl+0x73/0xb0 [ 15.503841] print_report+0xd1/0x650 [ 15.503873] ? __virt_addr_valid+0x1db/0x2d0 [ 15.503895] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.503917] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.503952] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.503974] kasan_report+0x141/0x180 [ 15.503997] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.504025] __asan_report_load4_noabort+0x18/0x20 [ 15.504047] kasan_atomics_helper+0x4a36/0x5450 [ 15.504070] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.504095] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.504117] ? kasan_atomics+0x152/0x310 [ 15.504141] kasan_atomics+0x1dc/0x310 [ 15.504171] ? __pfx_kasan_atomics+0x10/0x10 [ 15.504190] ? trace_hardirqs_on+0x37/0xe0 [ 15.504213] ? __pfx_read_tsc+0x10/0x10 [ 15.504234] ? ktime_get_ts64+0x86/0x230 [ 15.504271] kunit_try_run_case+0x1a5/0x480 [ 15.504296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.504329] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.504362] ? __kthread_parkme+0x82/0x180 [ 15.504385] ? preempt_count_sub+0x50/0x80 [ 15.504411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.504445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.504468] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.504492] kthread+0x337/0x6f0 [ 15.504510] ? trace_preempt_on+0x20/0xc0 [ 15.504533] ? __pfx_kthread+0x10/0x10 [ 15.504552] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.504573] ? calculate_sigpending+0x7b/0xa0 [ 15.504595] ? __pfx_kthread+0x10/0x10 [ 15.504615] ret_from_fork+0x41/0x80 [ 15.504636] ? __pfx_kthread+0x10/0x10 [ 15.504655] ret_from_fork_asm+0x1a/0x30 [ 15.504687] </TASK> [ 15.504699] [ 15.516922] Allocated by task 284: [ 15.517106] kasan_save_stack+0x45/0x70 [ 15.517527] kasan_save_track+0x18/0x40 [ 15.517843] kasan_save_alloc_info+0x3b/0x50 [ 15.518464] __kasan_kmalloc+0xb7/0xc0 [ 15.518616] __kmalloc_cache_noprof+0x189/0x420 [ 15.518976] kasan_atomics+0x95/0x310 [ 15.519355] kunit_try_run_case+0x1a5/0x480 [ 15.519811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.520127] kthread+0x337/0x6f0 [ 15.520484] ret_from_fork+0x41/0x80 [ 15.520732] ret_from_fork_asm+0x1a/0x30 [ 15.520876] [ 15.520949] The buggy address belongs to the object at ffff888102717100 [ 15.520949] which belongs to the cache kmalloc-64 of size 64 [ 15.521314] The buggy address is located 0 bytes to the right of [ 15.521314] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.521856] [ 15.521936] The buggy address belongs to the physical page: [ 15.522168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.522581] flags: 0x200000000000000(node=0|zone=2) [ 15.522791] page_type: f5(slab) [ 15.522969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.523213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.523687] page dumped because: kasan: bad access detected [ 15.523934] [ 15.524016] Memory state around the buggy address: [ 15.524265] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.524517] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.524948] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.525174] ^ [ 15.525409] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.525756] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.526045] ================================================================== [ 16.195793] ================================================================== [ 16.196501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.197379] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.197971] [ 16.198061] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.198109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.198122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.198145] Call Trace: [ 16.198162] <TASK> [ 16.198178] dump_stack_lvl+0x73/0xb0 [ 16.198208] print_report+0xd1/0x650 [ 16.198231] ? __virt_addr_valid+0x1db/0x2d0 [ 16.198254] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.198276] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.198300] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.198334] kasan_report+0x141/0x180 [ 16.198357] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.198385] __asan_report_load8_noabort+0x18/0x20 [ 16.198407] kasan_atomics_helper+0x4f98/0x5450 [ 16.198478] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.198502] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.198525] ? kasan_atomics+0x152/0x310 [ 16.198549] kasan_atomics+0x1dc/0x310 [ 16.198570] ? __pfx_kasan_atomics+0x10/0x10 [ 16.198589] ? trace_hardirqs_on+0x37/0xe0 [ 16.198613] ? __pfx_read_tsc+0x10/0x10 [ 16.198633] ? ktime_get_ts64+0x86/0x230 [ 16.198659] kunit_try_run_case+0x1a5/0x480 [ 16.198691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.198716] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.198743] ? __kthread_parkme+0x82/0x180 [ 16.198766] ? preempt_count_sub+0x50/0x80 [ 16.198793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.198818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.198841] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.198865] kthread+0x337/0x6f0 [ 16.198884] ? trace_preempt_on+0x20/0xc0 [ 16.198908] ? __pfx_kthread+0x10/0x10 [ 16.198927] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.198949] ? calculate_sigpending+0x7b/0xa0 [ 16.198972] ? __pfx_kthread+0x10/0x10 [ 16.198992] ret_from_fork+0x41/0x80 [ 16.199014] ? __pfx_kthread+0x10/0x10 [ 16.199034] ret_from_fork_asm+0x1a/0x30 [ 16.199067] </TASK> [ 16.199079] [ 16.210977] Allocated by task 284: [ 16.211123] kasan_save_stack+0x45/0x70 [ 16.211273] kasan_save_track+0x18/0x40 [ 16.211423] kasan_save_alloc_info+0x3b/0x50 [ 16.211826] __kasan_kmalloc+0xb7/0xc0 [ 16.212167] __kmalloc_cache_noprof+0x189/0x420 [ 16.212607] kasan_atomics+0x95/0x310 [ 16.212941] kunit_try_run_case+0x1a5/0x480 [ 16.213325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.213814] kthread+0x337/0x6f0 [ 16.214110] ret_from_fork+0x41/0x80 [ 16.214476] ret_from_fork_asm+0x1a/0x30 [ 16.214835] [ 16.214998] The buggy address belongs to the object at ffff888102717100 [ 16.214998] which belongs to the cache kmalloc-64 of size 64 [ 16.216075] The buggy address is located 0 bytes to the right of [ 16.216075] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.216562] [ 16.216728] The buggy address belongs to the physical page: [ 16.217217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.217927] flags: 0x200000000000000(node=0|zone=2) [ 16.218117] page_type: f5(slab) [ 16.218242] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.218614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.219272] page dumped because: kasan: bad access detected [ 16.219778] [ 16.219938] Memory state around the buggy address: [ 16.220368] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.220819] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.221037] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.221252] ^ [ 16.221636] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.222251] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.222899] ================================================================== [ 16.326977] ================================================================== [ 16.327344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.327714] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.328076] [ 16.328187] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.328230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.328244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.328264] Call Trace: [ 16.328278] <TASK> [ 16.328293] dump_stack_lvl+0x73/0xb0 [ 16.328333] print_report+0xd1/0x650 [ 16.328355] ? __virt_addr_valid+0x1db/0x2d0 [ 16.328377] ? kasan_atomics_helper+0x5115/0x5450 [ 16.328399] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.328422] ? kasan_atomics_helper+0x5115/0x5450 [ 16.328468] kasan_report+0x141/0x180 [ 16.328492] ? kasan_atomics_helper+0x5115/0x5450 [ 16.328520] __asan_report_load8_noabort+0x18/0x20 [ 16.328542] kasan_atomics_helper+0x5115/0x5450 [ 16.328566] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.328589] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.328611] ? kasan_atomics+0x152/0x310 [ 16.328636] kasan_atomics+0x1dc/0x310 [ 16.328656] ? __pfx_kasan_atomics+0x10/0x10 [ 16.328676] ? trace_hardirqs_on+0x37/0xe0 [ 16.328699] ? __pfx_read_tsc+0x10/0x10 [ 16.328718] ? ktime_get_ts64+0x86/0x230 [ 16.328743] kunit_try_run_case+0x1a5/0x480 [ 16.328767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.328793] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.328829] ? __kthread_parkme+0x82/0x180 [ 16.328851] ? preempt_count_sub+0x50/0x80 [ 16.328877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.328913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.328937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.328960] kthread+0x337/0x6f0 [ 16.328978] ? trace_preempt_on+0x20/0xc0 [ 16.329001] ? __pfx_kthread+0x10/0x10 [ 16.329020] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.329042] ? calculate_sigpending+0x7b/0xa0 [ 16.329065] ? __pfx_kthread+0x10/0x10 [ 16.329085] ret_from_fork+0x41/0x80 [ 16.329106] ? __pfx_kthread+0x10/0x10 [ 16.329125] ret_from_fork_asm+0x1a/0x30 [ 16.329157] </TASK> [ 16.329169] [ 16.336587] Allocated by task 284: [ 16.336766] kasan_save_stack+0x45/0x70 [ 16.336974] kasan_save_track+0x18/0x40 [ 16.337191] kasan_save_alloc_info+0x3b/0x50 [ 16.337401] __kasan_kmalloc+0xb7/0xc0 [ 16.337609] __kmalloc_cache_noprof+0x189/0x420 [ 16.337830] kasan_atomics+0x95/0x310 [ 16.338008] kunit_try_run_case+0x1a5/0x480 [ 16.338157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.338382] kthread+0x337/0x6f0 [ 16.338588] ret_from_fork+0x41/0x80 [ 16.338785] ret_from_fork_asm+0x1a/0x30 [ 16.338983] [ 16.339074] The buggy address belongs to the object at ffff888102717100 [ 16.339074] which belongs to the cache kmalloc-64 of size 64 [ 16.339576] The buggy address is located 0 bytes to the right of [ 16.339576] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.340102] [ 16.340210] The buggy address belongs to the physical page: [ 16.340408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.340667] flags: 0x200000000000000(node=0|zone=2) [ 16.340829] page_type: f5(slab) [ 16.340949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.341335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.341756] page dumped because: kasan: bad access detected [ 16.342026] [ 16.342115] Memory state around the buggy address: [ 16.342272] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.342525] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.342790] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.343126] ^ [ 16.343372] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.343746] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.344063] ================================================================== [ 15.285561] ================================================================== [ 15.286363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.286994] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.287371] [ 15.287504] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.287554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.287567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.287590] Call Trace: [ 15.287610] <TASK> [ 15.287628] dump_stack_lvl+0x73/0xb0 [ 15.287656] print_report+0xd1/0x650 [ 15.287679] ? __virt_addr_valid+0x1db/0x2d0 [ 15.287701] ? kasan_atomics_helper+0x992/0x5450 [ 15.287723] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.287747] ? kasan_atomics_helper+0x992/0x5450 [ 15.287770] kasan_report+0x141/0x180 [ 15.287793] ? kasan_atomics_helper+0x992/0x5450 [ 15.287820] kasan_check_range+0x10c/0x1c0 [ 15.287841] __kasan_check_write+0x18/0x20 [ 15.287862] kasan_atomics_helper+0x992/0x5450 [ 15.287886] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.287908] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.287931] ? kasan_atomics+0x152/0x310 [ 15.287955] kasan_atomics+0x1dc/0x310 [ 15.287975] ? __pfx_kasan_atomics+0x10/0x10 [ 15.287995] ? trace_hardirqs_on+0x37/0xe0 [ 15.288019] ? __pfx_read_tsc+0x10/0x10 [ 15.288039] ? ktime_get_ts64+0x86/0x230 [ 15.288065] kunit_try_run_case+0x1a5/0x480 [ 15.288090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.288115] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.288140] ? __kthread_parkme+0x82/0x180 [ 15.288162] ? preempt_count_sub+0x50/0x80 [ 15.288188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.288212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.288235] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.288260] kthread+0x337/0x6f0 [ 15.288277] ? trace_preempt_on+0x20/0xc0 [ 15.288331] ? __pfx_kthread+0x10/0x10 [ 15.288353] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.288376] ? calculate_sigpending+0x7b/0xa0 [ 15.288398] ? __pfx_kthread+0x10/0x10 [ 15.288418] ret_from_fork+0x41/0x80 [ 15.288460] ? __pfx_kthread+0x10/0x10 [ 15.288479] ret_from_fork_asm+0x1a/0x30 [ 15.288512] </TASK> [ 15.288525] [ 15.297552] Allocated by task 284: [ 15.297739] kasan_save_stack+0x45/0x70 [ 15.297943] kasan_save_track+0x18/0x40 [ 15.298136] kasan_save_alloc_info+0x3b/0x50 [ 15.298320] __kasan_kmalloc+0xb7/0xc0 [ 15.298482] __kmalloc_cache_noprof+0x189/0x420 [ 15.298711] kasan_atomics+0x95/0x310 [ 15.298920] kunit_try_run_case+0x1a5/0x480 [ 15.299154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.299410] kthread+0x337/0x6f0 [ 15.299603] ret_from_fork+0x41/0x80 [ 15.299783] ret_from_fork_asm+0x1a/0x30 [ 15.299961] [ 15.300077] The buggy address belongs to the object at ffff888102717100 [ 15.300077] which belongs to the cache kmalloc-64 of size 64 [ 15.300585] The buggy address is located 0 bytes to the right of [ 15.300585] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.301127] [ 15.301215] The buggy address belongs to the physical page: [ 15.301484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.301849] flags: 0x200000000000000(node=0|zone=2) [ 15.302082] page_type: f5(slab) [ 15.302276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.302643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.302967] page dumped because: kasan: bad access detected [ 15.303205] [ 15.303291] Memory state around the buggy address: [ 15.303564] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.303889] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.304145] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.304522] ^ [ 15.304756] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.305066] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.305467] ================================================================== [ 16.291769] ================================================================== [ 16.292176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.292529] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.292871] [ 16.292988] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.293032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.293045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.293067] Call Trace: [ 16.293085] <TASK> [ 16.293101] dump_stack_lvl+0x73/0xb0 [ 16.293139] print_report+0xd1/0x650 [ 16.293163] ? __virt_addr_valid+0x1db/0x2d0 [ 16.293184] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.293217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.293240] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.293263] kasan_report+0x141/0x180 [ 16.293294] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.293336] __asan_report_load8_noabort+0x18/0x20 [ 16.293359] kasan_atomics_helper+0x4fa5/0x5450 [ 16.293383] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.293406] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.293446] ? kasan_atomics+0x152/0x310 [ 16.293470] kasan_atomics+0x1dc/0x310 [ 16.293490] ? __pfx_kasan_atomics+0x10/0x10 [ 16.293510] ? trace_hardirqs_on+0x37/0xe0 [ 16.293534] ? __pfx_read_tsc+0x10/0x10 [ 16.293554] ? ktime_get_ts64+0x86/0x230 [ 16.293580] kunit_try_run_case+0x1a5/0x480 [ 16.293604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.293629] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.293654] ? __kthread_parkme+0x82/0x180 [ 16.293676] ? preempt_count_sub+0x50/0x80 [ 16.293702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.293726] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.293749] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.293773] kthread+0x337/0x6f0 [ 16.293791] ? trace_preempt_on+0x20/0xc0 [ 16.293815] ? __pfx_kthread+0x10/0x10 [ 16.293834] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.293856] ? calculate_sigpending+0x7b/0xa0 [ 16.293887] ? __pfx_kthread+0x10/0x10 [ 16.293907] ret_from_fork+0x41/0x80 [ 16.293928] ? __pfx_kthread+0x10/0x10 [ 16.293958] ret_from_fork_asm+0x1a/0x30 [ 16.293990] </TASK> [ 16.294002] [ 16.301407] Allocated by task 284: [ 16.301616] kasan_save_stack+0x45/0x70 [ 16.301795] kasan_save_track+0x18/0x40 [ 16.301935] kasan_save_alloc_info+0x3b/0x50 [ 16.302083] __kasan_kmalloc+0xb7/0xc0 [ 16.302245] __kmalloc_cache_noprof+0x189/0x420 [ 16.302508] kasan_atomics+0x95/0x310 [ 16.302697] kunit_try_run_case+0x1a5/0x480 [ 16.302905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.303159] kthread+0x337/0x6f0 [ 16.303329] ret_from_fork+0x41/0x80 [ 16.303489] ret_from_fork_asm+0x1a/0x30 [ 16.303696] [ 16.303793] The buggy address belongs to the object at ffff888102717100 [ 16.303793] which belongs to the cache kmalloc-64 of size 64 [ 16.304227] The buggy address is located 0 bytes to the right of [ 16.304227] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.304628] [ 16.304728] The buggy address belongs to the physical page: [ 16.305009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.305369] flags: 0x200000000000000(node=0|zone=2) [ 16.305628] page_type: f5(slab) [ 16.305797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.306079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.306317] page dumped because: kasan: bad access detected [ 16.306594] [ 16.306721] Memory state around the buggy address: [ 16.306977] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.307299] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.307599] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.307936] ^ [ 16.308142] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.308506] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.308822] ================================================================== [ 15.669070] ================================================================== [ 15.669466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.669835] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.670385] [ 15.670477] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.670525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.670538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.670560] Call Trace: [ 15.670574] <TASK> [ 15.670590] dump_stack_lvl+0x73/0xb0 [ 15.670617] print_report+0xd1/0x650 [ 15.670640] ? __virt_addr_valid+0x1db/0x2d0 [ 15.670661] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.670690] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.670713] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.670737] kasan_report+0x141/0x180 [ 15.670760] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.670787] __asan_report_load4_noabort+0x18/0x20 [ 15.670809] kasan_atomics_helper+0x49ce/0x5450 [ 15.670832] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.670856] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.670878] ? kasan_atomics+0x152/0x310 [ 15.670902] kasan_atomics+0x1dc/0x310 [ 15.670922] ? __pfx_kasan_atomics+0x10/0x10 [ 15.670941] ? trace_hardirqs_on+0x37/0xe0 [ 15.670965] ? __pfx_read_tsc+0x10/0x10 [ 15.670984] ? ktime_get_ts64+0x86/0x230 [ 15.671010] kunit_try_run_case+0x1a5/0x480 [ 15.671034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.671058] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.671083] ? __kthread_parkme+0x82/0x180 [ 15.671105] ? preempt_count_sub+0x50/0x80 [ 15.671130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.671155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.671178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.671201] kthread+0x337/0x6f0 [ 15.671219] ? trace_preempt_on+0x20/0xc0 [ 15.671242] ? __pfx_kthread+0x10/0x10 [ 15.671261] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.671282] ? calculate_sigpending+0x7b/0xa0 [ 15.671314] ? __pfx_kthread+0x10/0x10 [ 15.671335] ret_from_fork+0x41/0x80 [ 15.671356] ? __pfx_kthread+0x10/0x10 [ 15.671376] ret_from_fork_asm+0x1a/0x30 [ 15.671407] </TASK> [ 15.671420] [ 15.679431] Allocated by task 284: [ 15.679630] kasan_save_stack+0x45/0x70 [ 15.679872] kasan_save_track+0x18/0x40 [ 15.680144] kasan_save_alloc_info+0x3b/0x50 [ 15.680386] __kasan_kmalloc+0xb7/0xc0 [ 15.680589] __kmalloc_cache_noprof+0x189/0x420 [ 15.680741] kasan_atomics+0x95/0x310 [ 15.680870] kunit_try_run_case+0x1a5/0x480 [ 15.681030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.681298] kthread+0x337/0x6f0 [ 15.681493] ret_from_fork+0x41/0x80 [ 15.681880] ret_from_fork_asm+0x1a/0x30 [ 15.682098] [ 15.682230] The buggy address belongs to the object at ffff888102717100 [ 15.682230] which belongs to the cache kmalloc-64 of size 64 [ 15.682750] The buggy address is located 0 bytes to the right of [ 15.682750] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.683373] [ 15.683452] The buggy address belongs to the physical page: [ 15.683816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.684204] flags: 0x200000000000000(node=0|zone=2) [ 15.684431] page_type: f5(slab) [ 15.684618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.684965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.685288] page dumped because: kasan: bad access detected [ 15.685597] [ 15.685682] Memory state around the buggy address: [ 15.685843] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.686181] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.686491] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.686863] ^ [ 15.687021] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.687239] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.687573] ================================================================== [ 15.014079] ================================================================== [ 15.014336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.014699] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.015249] [ 15.015369] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.015413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.015425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.015446] Call Trace: [ 15.015460] <TASK> [ 15.015474] dump_stack_lvl+0x73/0xb0 [ 15.015501] print_report+0xd1/0x650 [ 15.015522] ? __virt_addr_valid+0x1db/0x2d0 [ 15.015543] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.015564] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.015587] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.015608] kasan_report+0x141/0x180 [ 15.015631] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.015658] __asan_report_load4_noabort+0x18/0x20 [ 15.015678] kasan_atomics_helper+0x4b88/0x5450 [ 15.015701] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.015724] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.015745] ? kasan_atomics+0x152/0x310 [ 15.015769] kasan_atomics+0x1dc/0x310 [ 15.015787] ? __pfx_kasan_atomics+0x10/0x10 [ 15.015806] ? trace_hardirqs_on+0x37/0xe0 [ 15.015829] ? __pfx_read_tsc+0x10/0x10 [ 15.015848] ? ktime_get_ts64+0x86/0x230 [ 15.015873] kunit_try_run_case+0x1a5/0x480 [ 15.015898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.015922] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.015947] ? __kthread_parkme+0x82/0x180 [ 15.015969] ? preempt_count_sub+0x50/0x80 [ 15.015993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.016016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.016039] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.016061] kthread+0x337/0x6f0 [ 15.016078] ? trace_preempt_on+0x20/0xc0 [ 15.016101] ? __pfx_kthread+0x10/0x10 [ 15.016118] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.016139] ? calculate_sigpending+0x7b/0xa0 [ 15.016161] ? __pfx_kthread+0x10/0x10 [ 15.016180] ret_from_fork+0x41/0x80 [ 15.016200] ? __pfx_kthread+0x10/0x10 [ 15.016218] ret_from_fork_asm+0x1a/0x30 [ 15.016249] </TASK> [ 15.016260] [ 15.024561] Allocated by task 284: [ 15.024717] kasan_save_stack+0x45/0x70 [ 15.024885] kasan_save_track+0x18/0x40 [ 15.025023] kasan_save_alloc_info+0x3b/0x50 [ 15.025171] __kasan_kmalloc+0xb7/0xc0 [ 15.025320] __kmalloc_cache_noprof+0x189/0x420 [ 15.025474] kasan_atomics+0x95/0x310 [ 15.025744] kunit_try_run_case+0x1a5/0x480 [ 15.025966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.026227] kthread+0x337/0x6f0 [ 15.026428] ret_from_fork+0x41/0x80 [ 15.026844] ret_from_fork_asm+0x1a/0x30 [ 15.027032] [ 15.027107] The buggy address belongs to the object at ffff888102717100 [ 15.027107] which belongs to the cache kmalloc-64 of size 64 [ 15.027479] The buggy address is located 0 bytes to the right of [ 15.027479] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.028281] [ 15.028393] The buggy address belongs to the physical page: [ 15.029102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.029489] flags: 0x200000000000000(node=0|zone=2) [ 15.029691] page_type: f5(slab) [ 15.029846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.030233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.030480] page dumped because: kasan: bad access detected [ 15.030656] [ 15.030736] Memory state around the buggy address: [ 15.030988] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.031338] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.031800] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.032281] ^ [ 15.032659] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.032990] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.033486] ================================================================== [ 15.105131] ================================================================== [ 15.105712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.106142] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.106525] [ 15.106615] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.106661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.106681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.106703] Call Trace: [ 15.106716] <TASK> [ 15.106731] dump_stack_lvl+0x73/0xb0 [ 15.106784] print_report+0xd1/0x650 [ 15.106807] ? __virt_addr_valid+0x1db/0x2d0 [ 15.106846] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.106869] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.106905] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.106940] kasan_report+0x141/0x180 [ 15.106964] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.106992] kasan_check_range+0x10c/0x1c0 [ 15.107013] __kasan_check_write+0x18/0x20 [ 15.107037] kasan_atomics_helper+0x4a0/0x5450 [ 15.107061] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.107084] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.107107] ? kasan_atomics+0x152/0x310 [ 15.107131] kasan_atomics+0x1dc/0x310 [ 15.107152] ? __pfx_kasan_atomics+0x10/0x10 [ 15.107172] ? trace_hardirqs_on+0x37/0xe0 [ 15.107196] ? __pfx_read_tsc+0x10/0x10 [ 15.107215] ? ktime_get_ts64+0x86/0x230 [ 15.107242] kunit_try_run_case+0x1a5/0x480 [ 15.107340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.107385] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.107424] ? __kthread_parkme+0x82/0x180 [ 15.107460] ? preempt_count_sub+0x50/0x80 [ 15.107486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.107511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.107548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.107586] kthread+0x337/0x6f0 [ 15.107603] ? trace_preempt_on+0x20/0xc0 [ 15.107627] ? __pfx_kthread+0x10/0x10 [ 15.107647] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.107668] ? calculate_sigpending+0x7b/0xa0 [ 15.107692] ? __pfx_kthread+0x10/0x10 [ 15.107720] ret_from_fork+0x41/0x80 [ 15.107741] ? __pfx_kthread+0x10/0x10 [ 15.107760] ret_from_fork_asm+0x1a/0x30 [ 15.107793] </TASK> [ 15.107805] [ 15.116928] Allocated by task 284: [ 15.117245] kasan_save_stack+0x45/0x70 [ 15.117535] kasan_save_track+0x18/0x40 [ 15.117694] kasan_save_alloc_info+0x3b/0x50 [ 15.117845] __kasan_kmalloc+0xb7/0xc0 [ 15.118288] __kmalloc_cache_noprof+0x189/0x420 [ 15.118597] kasan_atomics+0x95/0x310 [ 15.118800] kunit_try_run_case+0x1a5/0x480 [ 15.119056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.119336] kthread+0x337/0x6f0 [ 15.119460] ret_from_fork+0x41/0x80 [ 15.119644] ret_from_fork_asm+0x1a/0x30 [ 15.119841] [ 15.119976] The buggy address belongs to the object at ffff888102717100 [ 15.119976] which belongs to the cache kmalloc-64 of size 64 [ 15.120640] The buggy address is located 0 bytes to the right of [ 15.120640] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.121259] [ 15.121395] The buggy address belongs to the physical page: [ 15.121681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.122058] flags: 0x200000000000000(node=0|zone=2) [ 15.122409] page_type: f5(slab) [ 15.122547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.122790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.123474] page dumped because: kasan: bad access detected [ 15.123748] [ 15.123870] Memory state around the buggy address: [ 15.124180] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.124538] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.124842] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.125142] ^ [ 15.125573] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.126035] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.126373] ================================================================== [ 15.434451] ================================================================== [ 15.434814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.435183] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.435552] [ 15.435668] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.435714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.435728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.435749] Call Trace: [ 15.435765] <TASK> [ 15.435781] dump_stack_lvl+0x73/0xb0 [ 15.435810] print_report+0xd1/0x650 [ 15.435834] ? __virt_addr_valid+0x1db/0x2d0 [ 15.435856] ? kasan_atomics_helper+0xe78/0x5450 [ 15.435879] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.435903] ? kasan_atomics_helper+0xe78/0x5450 [ 15.435926] kasan_report+0x141/0x180 [ 15.435950] ? kasan_atomics_helper+0xe78/0x5450 [ 15.435979] kasan_check_range+0x10c/0x1c0 [ 15.436000] __kasan_check_write+0x18/0x20 [ 15.436021] kasan_atomics_helper+0xe78/0x5450 [ 15.436045] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.436069] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.436091] ? kasan_atomics+0x152/0x310 [ 15.436116] kasan_atomics+0x1dc/0x310 [ 15.436137] ? __pfx_kasan_atomics+0x10/0x10 [ 15.436157] ? trace_hardirqs_on+0x37/0xe0 [ 15.436181] ? __pfx_read_tsc+0x10/0x10 [ 15.436201] ? ktime_get_ts64+0x86/0x230 [ 15.436228] kunit_try_run_case+0x1a5/0x480 [ 15.436253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.436279] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.436315] ? __kthread_parkme+0x82/0x180 [ 15.436338] ? preempt_count_sub+0x50/0x80 [ 15.436364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.436389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.436412] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.436456] kthread+0x337/0x6f0 [ 15.436474] ? trace_preempt_on+0x20/0xc0 [ 15.436498] ? __pfx_kthread+0x10/0x10 [ 15.436518] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.436540] ? calculate_sigpending+0x7b/0xa0 [ 15.436563] ? __pfx_kthread+0x10/0x10 [ 15.436583] ret_from_fork+0x41/0x80 [ 15.436605] ? __pfx_kthread+0x10/0x10 [ 15.436625] ret_from_fork_asm+0x1a/0x30 [ 15.436657] </TASK> [ 15.436669] [ 15.445354] Allocated by task 284: [ 15.445797] kasan_save_stack+0x45/0x70 [ 15.446074] kasan_save_track+0x18/0x40 [ 15.446356] kasan_save_alloc_info+0x3b/0x50 [ 15.446630] __kasan_kmalloc+0xb7/0xc0 [ 15.446828] __kmalloc_cache_noprof+0x189/0x420 [ 15.447031] kasan_atomics+0x95/0x310 [ 15.447210] kunit_try_run_case+0x1a5/0x480 [ 15.447408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.447904] kthread+0x337/0x6f0 [ 15.448080] ret_from_fork+0x41/0x80 [ 15.448417] ret_from_fork_asm+0x1a/0x30 [ 15.448727] [ 15.448889] The buggy address belongs to the object at ffff888102717100 [ 15.448889] which belongs to the cache kmalloc-64 of size 64 [ 15.449461] The buggy address is located 0 bytes to the right of [ 15.449461] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.450128] [ 15.450227] The buggy address belongs to the physical page: [ 15.450661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.451112] flags: 0x200000000000000(node=0|zone=2) [ 15.451359] page_type: f5(slab) [ 15.451661] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.452059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.452497] page dumped because: kasan: bad access detected [ 15.452703] [ 15.452808] Memory state around the buggy address: [ 15.453180] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.453601] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.453995] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.454260] ^ [ 15.454635] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.455014] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.455337] ================================================================== [ 15.188044] ================================================================== [ 15.188384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.188882] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.189224] [ 15.189345] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.189447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.189462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.189485] Call Trace: [ 15.189501] <TASK> [ 15.189516] dump_stack_lvl+0x73/0xb0 [ 15.189545] print_report+0xd1/0x650 [ 15.189568] ? __virt_addr_valid+0x1db/0x2d0 [ 15.189591] ? kasan_atomics_helper+0x697/0x5450 [ 15.189613] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.189637] ? kasan_atomics_helper+0x697/0x5450 [ 15.189661] kasan_report+0x141/0x180 [ 15.189685] ? kasan_atomics_helper+0x697/0x5450 [ 15.189713] kasan_check_range+0x10c/0x1c0 [ 15.189735] __kasan_check_write+0x18/0x20 [ 15.189756] kasan_atomics_helper+0x697/0x5450 [ 15.189779] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.189802] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.189825] ? kasan_atomics+0x152/0x310 [ 15.189849] kasan_atomics+0x1dc/0x310 [ 15.189869] ? __pfx_kasan_atomics+0x10/0x10 [ 15.189889] ? trace_hardirqs_on+0x37/0xe0 [ 15.189913] ? __pfx_read_tsc+0x10/0x10 [ 15.189932] ? ktime_get_ts64+0x86/0x230 [ 15.189959] kunit_try_run_case+0x1a5/0x480 [ 15.189984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.190009] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.190033] ? __kthread_parkme+0x82/0x180 [ 15.190055] ? preempt_count_sub+0x50/0x80 [ 15.190082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.190105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.190129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.190153] kthread+0x337/0x6f0 [ 15.190171] ? trace_preempt_on+0x20/0xc0 [ 15.190194] ? __pfx_kthread+0x10/0x10 [ 15.190213] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.190234] ? calculate_sigpending+0x7b/0xa0 [ 15.190258] ? __pfx_kthread+0x10/0x10 [ 15.190277] ret_from_fork+0x41/0x80 [ 15.190311] ? __pfx_kthread+0x10/0x10 [ 15.190330] ret_from_fork_asm+0x1a/0x30 [ 15.190363] </TASK> [ 15.190374] [ 15.198143] Allocated by task 284: [ 15.198320] kasan_save_stack+0x45/0x70 [ 15.198552] kasan_save_track+0x18/0x40 [ 15.198704] kasan_save_alloc_info+0x3b/0x50 [ 15.198924] __kasan_kmalloc+0xb7/0xc0 [ 15.199103] __kmalloc_cache_noprof+0x189/0x420 [ 15.199262] kasan_atomics+0x95/0x310 [ 15.199475] kunit_try_run_case+0x1a5/0x480 [ 15.199691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.199921] kthread+0x337/0x6f0 [ 15.200075] ret_from_fork+0x41/0x80 [ 15.200265] ret_from_fork_asm+0x1a/0x30 [ 15.200508] [ 15.200607] The buggy address belongs to the object at ffff888102717100 [ 15.200607] which belongs to the cache kmalloc-64 of size 64 [ 15.201073] The buggy address is located 0 bytes to the right of [ 15.201073] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.201590] [ 15.201697] The buggy address belongs to the physical page: [ 15.201954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.202265] flags: 0x200000000000000(node=0|zone=2) [ 15.202534] page_type: f5(slab) [ 15.202661] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.202945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.203279] page dumped because: kasan: bad access detected [ 15.203504] [ 15.203576] Memory state around the buggy address: [ 15.203819] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.204111] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.204379] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.204595] ^ [ 15.204751] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.204966] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.205442] ================================================================== [ 16.128405] ================================================================== [ 16.129504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.130155] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.130510] [ 16.130692] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.130742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.130756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.130779] Call Trace: [ 16.130799] <TASK> [ 16.130818] dump_stack_lvl+0x73/0xb0 [ 16.130845] print_report+0xd1/0x650 [ 16.130869] ? __virt_addr_valid+0x1db/0x2d0 [ 16.130891] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.130913] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.130937] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.130960] kasan_report+0x141/0x180 [ 16.130984] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.131014] __asan_report_load8_noabort+0x18/0x20 [ 16.131036] kasan_atomics_helper+0x4f71/0x5450 [ 16.131060] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.131084] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.131106] ? kasan_atomics+0x152/0x310 [ 16.131131] kasan_atomics+0x1dc/0x310 [ 16.131151] ? __pfx_kasan_atomics+0x10/0x10 [ 16.131171] ? trace_hardirqs_on+0x37/0xe0 [ 16.131195] ? __pfx_read_tsc+0x10/0x10 [ 16.131215] ? ktime_get_ts64+0x86/0x230 [ 16.131241] kunit_try_run_case+0x1a5/0x480 [ 16.131267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.131292] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.131329] ? __kthread_parkme+0x82/0x180 [ 16.131352] ? preempt_count_sub+0x50/0x80 [ 16.131378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.131402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.131446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.131471] kthread+0x337/0x6f0 [ 16.131489] ? trace_preempt_on+0x20/0xc0 [ 16.131513] ? __pfx_kthread+0x10/0x10 [ 16.131533] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.131555] ? calculate_sigpending+0x7b/0xa0 [ 16.131578] ? __pfx_kthread+0x10/0x10 [ 16.131597] ret_from_fork+0x41/0x80 [ 16.131619] ? __pfx_kthread+0x10/0x10 [ 16.131638] ret_from_fork_asm+0x1a/0x30 [ 16.131670] </TASK> [ 16.131683] [ 16.145006] Allocated by task 284: [ 16.145574] kasan_save_stack+0x45/0x70 [ 16.146100] kasan_save_track+0x18/0x40 [ 16.146660] kasan_save_alloc_info+0x3b/0x50 [ 16.147185] __kasan_kmalloc+0xb7/0xc0 [ 16.147422] __kmalloc_cache_noprof+0x189/0x420 [ 16.147970] kasan_atomics+0x95/0x310 [ 16.148112] kunit_try_run_case+0x1a5/0x480 [ 16.148263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.148479] kthread+0x337/0x6f0 [ 16.148870] ret_from_fork+0x41/0x80 [ 16.149256] ret_from_fork_asm+0x1a/0x30 [ 16.149721] [ 16.149923] The buggy address belongs to the object at ffff888102717100 [ 16.149923] which belongs to the cache kmalloc-64 of size 64 [ 16.150923] The buggy address is located 0 bytes to the right of [ 16.150923] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.151321] [ 16.151398] The buggy address belongs to the physical page: [ 16.151890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.152675] flags: 0x200000000000000(node=0|zone=2) [ 16.153244] page_type: f5(slab) [ 16.153625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.154313] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.154743] page dumped because: kasan: bad access detected [ 16.155249] [ 16.155455] Memory state around the buggy address: [ 16.155905] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.156142] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.156454] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.157117] ^ [ 16.157671] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.158391] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.158953] ================================================================== [ 15.707364] ================================================================== [ 15.707942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.708192] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.708512] [ 15.708640] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.708699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.708712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.708747] Call Trace: [ 15.708768] <TASK> [ 15.708788] dump_stack_lvl+0x73/0xb0 [ 15.708828] print_report+0xd1/0x650 [ 15.708851] ? __virt_addr_valid+0x1db/0x2d0 [ 15.708874] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.708908] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.708932] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.708966] kasan_report+0x141/0x180 [ 15.708989] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.709028] __asan_report_load8_noabort+0x18/0x20 [ 15.709061] kasan_atomics_helper+0x4eae/0x5450 [ 15.709085] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.709108] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.709140] ? kasan_atomics+0x152/0x310 [ 15.709164] kasan_atomics+0x1dc/0x310 [ 15.709183] ? __pfx_kasan_atomics+0x10/0x10 [ 15.709214] ? trace_hardirqs_on+0x37/0xe0 [ 15.709239] ? __pfx_read_tsc+0x10/0x10 [ 15.709259] ? ktime_get_ts64+0x86/0x230 [ 15.709286] kunit_try_run_case+0x1a5/0x480 [ 15.709329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.709354] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.709390] ? __kthread_parkme+0x82/0x180 [ 15.709413] ? preempt_count_sub+0x50/0x80 [ 15.709449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.709473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.709497] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.709520] kthread+0x337/0x6f0 [ 15.709537] ? trace_preempt_on+0x20/0xc0 [ 15.709561] ? __pfx_kthread+0x10/0x10 [ 15.709581] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.709604] ? calculate_sigpending+0x7b/0xa0 [ 15.709627] ? __pfx_kthread+0x10/0x10 [ 15.709647] ret_from_fork+0x41/0x80 [ 15.709669] ? __pfx_kthread+0x10/0x10 [ 15.709688] ret_from_fork_asm+0x1a/0x30 [ 15.709719] </TASK> [ 15.709732] [ 15.717457] Allocated by task 284: [ 15.717589] kasan_save_stack+0x45/0x70 [ 15.717780] kasan_save_track+0x18/0x40 [ 15.717968] kasan_save_alloc_info+0x3b/0x50 [ 15.718182] __kasan_kmalloc+0xb7/0xc0 [ 15.718397] __kmalloc_cache_noprof+0x189/0x420 [ 15.718683] kasan_atomics+0x95/0x310 [ 15.718817] kunit_try_run_case+0x1a5/0x480 [ 15.718968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.719144] kthread+0x337/0x6f0 [ 15.719264] ret_from_fork+0x41/0x80 [ 15.719407] ret_from_fork_asm+0x1a/0x30 [ 15.719548] [ 15.719621] The buggy address belongs to the object at ffff888102717100 [ 15.719621] which belongs to the cache kmalloc-64 of size 64 [ 15.720228] The buggy address is located 0 bytes to the right of [ 15.720228] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.720887] [ 15.720996] The buggy address belongs to the physical page: [ 15.721251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.721855] flags: 0x200000000000000(node=0|zone=2) [ 15.722024] page_type: f5(slab) [ 15.722148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.722390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.722891] page dumped because: kasan: bad access detected [ 15.723151] [ 15.723266] Memory state around the buggy address: [ 15.724147] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.725621] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.725958] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.726252] ^ [ 15.726478] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.726775] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.727110] ================================================================== [ 16.246203] ================================================================== [ 16.246781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.247626] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.248423] [ 16.248622] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.248670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.248684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.248706] Call Trace: [ 16.248721] <TASK> [ 16.248736] dump_stack_lvl+0x73/0xb0 [ 16.248763] print_report+0xd1/0x650 [ 16.248799] ? __virt_addr_valid+0x1db/0x2d0 [ 16.248822] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.248844] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.248879] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.248902] kasan_report+0x141/0x180 [ 16.248926] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.248954] __asan_report_load8_noabort+0x18/0x20 [ 16.248976] kasan_atomics_helper+0x4fb2/0x5450 [ 16.249001] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.249024] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.249046] ? kasan_atomics+0x152/0x310 [ 16.249070] kasan_atomics+0x1dc/0x310 [ 16.249090] ? __pfx_kasan_atomics+0x10/0x10 [ 16.249110] ? trace_hardirqs_on+0x37/0xe0 [ 16.249133] ? __pfx_read_tsc+0x10/0x10 [ 16.249153] ? ktime_get_ts64+0x86/0x230 [ 16.249178] kunit_try_run_case+0x1a5/0x480 [ 16.249202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.249228] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.249253] ? __kthread_parkme+0x82/0x180 [ 16.249275] ? preempt_count_sub+0x50/0x80 [ 16.249301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.249335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.249359] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.249383] kthread+0x337/0x6f0 [ 16.249400] ? trace_preempt_on+0x20/0xc0 [ 16.249424] ? __pfx_kthread+0x10/0x10 [ 16.249463] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.249484] ? calculate_sigpending+0x7b/0xa0 [ 16.249507] ? __pfx_kthread+0x10/0x10 [ 16.249526] ret_from_fork+0x41/0x80 [ 16.249547] ? __pfx_kthread+0x10/0x10 [ 16.249567] ret_from_fork_asm+0x1a/0x30 [ 16.249599] </TASK> [ 16.249612] [ 16.261198] Allocated by task 284: [ 16.261568] kasan_save_stack+0x45/0x70 [ 16.261743] kasan_save_track+0x18/0x40 [ 16.262125] kasan_save_alloc_info+0x3b/0x50 [ 16.262345] __kasan_kmalloc+0xb7/0xc0 [ 16.262749] __kmalloc_cache_noprof+0x189/0x420 [ 16.263024] kasan_atomics+0x95/0x310 [ 16.263158] kunit_try_run_case+0x1a5/0x480 [ 16.263323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.263839] kthread+0x337/0x6f0 [ 16.264157] ret_from_fork+0x41/0x80 [ 16.264602] ret_from_fork_asm+0x1a/0x30 [ 16.264994] [ 16.265154] The buggy address belongs to the object at ffff888102717100 [ 16.265154] which belongs to the cache kmalloc-64 of size 64 [ 16.265740] The buggy address is located 0 bytes to the right of [ 16.265740] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.266107] [ 16.266180] The buggy address belongs to the physical page: [ 16.266468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.267163] flags: 0x200000000000000(node=0|zone=2) [ 16.267649] page_type: f5(slab) [ 16.267970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.268672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.269351] page dumped because: kasan: bad access detected [ 16.269876] [ 16.270056] Memory state around the buggy address: [ 16.270532] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.270967] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.271185] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.271652] ^ [ 16.272122] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.272817] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.273261] ================================================================== [ 15.061489] ================================================================== [ 15.061789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.062236] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.062584] [ 15.062682] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.062730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.062744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.062766] Call Trace: [ 15.062779] <TASK> [ 15.062794] dump_stack_lvl+0x73/0xb0 [ 15.062823] print_report+0xd1/0x650 [ 15.062847] ? __virt_addr_valid+0x1db/0x2d0 [ 15.062869] ? kasan_atomics_helper+0x3df/0x5450 [ 15.062892] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.062915] ? kasan_atomics_helper+0x3df/0x5450 [ 15.062939] kasan_report+0x141/0x180 [ 15.062962] ? kasan_atomics_helper+0x3df/0x5450 [ 15.063042] kasan_check_range+0x10c/0x1c0 [ 15.063068] __kasan_check_read+0x15/0x20 [ 15.063089] kasan_atomics_helper+0x3df/0x5450 [ 15.063114] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.063138] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.063162] ? kasan_atomics+0x152/0x310 [ 15.063186] kasan_atomics+0x1dc/0x310 [ 15.063208] ? __pfx_kasan_atomics+0x10/0x10 [ 15.063227] ? trace_hardirqs_on+0x37/0xe0 [ 15.063251] ? __pfx_read_tsc+0x10/0x10 [ 15.063272] ? ktime_get_ts64+0x86/0x230 [ 15.063298] kunit_try_run_case+0x1a5/0x480 [ 15.063337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.063362] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.063387] ? __kthread_parkme+0x82/0x180 [ 15.063410] ? preempt_count_sub+0x50/0x80 [ 15.063447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.063471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.063495] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.063518] kthread+0x337/0x6f0 [ 15.063537] ? trace_preempt_on+0x20/0xc0 [ 15.063560] ? __pfx_kthread+0x10/0x10 [ 15.063581] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.063603] ? calculate_sigpending+0x7b/0xa0 [ 15.063626] ? __pfx_kthread+0x10/0x10 [ 15.063646] ret_from_fork+0x41/0x80 [ 15.063668] ? __pfx_kthread+0x10/0x10 [ 15.063687] ret_from_fork_asm+0x1a/0x30 [ 15.063720] </TASK> [ 15.063732] [ 15.072427] Allocated by task 284: [ 15.072563] kasan_save_stack+0x45/0x70 [ 15.072726] kasan_save_track+0x18/0x40 [ 15.073021] kasan_save_alloc_info+0x3b/0x50 [ 15.073264] __kasan_kmalloc+0xb7/0xc0 [ 15.073539] __kmalloc_cache_noprof+0x189/0x420 [ 15.073726] kasan_atomics+0x95/0x310 [ 15.074023] kunit_try_run_case+0x1a5/0x480 [ 15.074275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.074747] kthread+0x337/0x6f0 [ 15.074964] ret_from_fork+0x41/0x80 [ 15.075103] ret_from_fork_asm+0x1a/0x30 [ 15.075316] [ 15.075454] The buggy address belongs to the object at ffff888102717100 [ 15.075454] which belongs to the cache kmalloc-64 of size 64 [ 15.076073] The buggy address is located 0 bytes to the right of [ 15.076073] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.076698] [ 15.076806] The buggy address belongs to the physical page: [ 15.077105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.077804] flags: 0x200000000000000(node=0|zone=2) [ 15.078056] page_type: f5(slab) [ 15.078278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.078759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.079259] page dumped because: kasan: bad access detected [ 15.079544] [ 15.079665] Memory state around the buggy address: [ 15.079842] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.080072] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.080708] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.081421] ^ [ 15.081731] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.082060] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.082422] ================================================================== [ 15.245568] ================================================================== [ 15.246080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.246366] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.246881] [ 15.246972] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.247017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.247031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.247052] Call Trace: [ 15.247067] <TASK> [ 15.247083] dump_stack_lvl+0x73/0xb0 [ 15.247109] print_report+0xd1/0x650 [ 15.247133] ? __virt_addr_valid+0x1db/0x2d0 [ 15.247155] ? kasan_atomics_helper+0x860/0x5450 [ 15.247177] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.247200] ? kasan_atomics_helper+0x860/0x5450 [ 15.247223] kasan_report+0x141/0x180 [ 15.247247] ? kasan_atomics_helper+0x860/0x5450 [ 15.247276] kasan_check_range+0x10c/0x1c0 [ 15.247297] __kasan_check_write+0x18/0x20 [ 15.247329] kasan_atomics_helper+0x860/0x5450 [ 15.247353] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.247377] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.247400] ? kasan_atomics+0x152/0x310 [ 15.247425] kasan_atomics+0x1dc/0x310 [ 15.247445] ? __pfx_kasan_atomics+0x10/0x10 [ 15.247465] ? trace_hardirqs_on+0x37/0xe0 [ 15.247488] ? __pfx_read_tsc+0x10/0x10 [ 15.247509] ? ktime_get_ts64+0x86/0x230 [ 15.247535] kunit_try_run_case+0x1a5/0x480 [ 15.247560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.247584] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.247608] ? __kthread_parkme+0x82/0x180 [ 15.247630] ? preempt_count_sub+0x50/0x80 [ 15.247655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.247680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.247703] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.247726] kthread+0x337/0x6f0 [ 15.247745] ? trace_preempt_on+0x20/0xc0 [ 15.247768] ? __pfx_kthread+0x10/0x10 [ 15.247788] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.247811] ? calculate_sigpending+0x7b/0xa0 [ 15.247833] ? __pfx_kthread+0x10/0x10 [ 15.247853] ret_from_fork+0x41/0x80 [ 15.247874] ? __pfx_kthread+0x10/0x10 [ 15.247894] ret_from_fork_asm+0x1a/0x30 [ 15.247926] </TASK> [ 15.247938] [ 15.255560] Allocated by task 284: [ 15.255706] kasan_save_stack+0x45/0x70 [ 15.255900] kasan_save_track+0x18/0x40 [ 15.256046] kasan_save_alloc_info+0x3b/0x50 [ 15.256195] __kasan_kmalloc+0xb7/0xc0 [ 15.256342] __kmalloc_cache_noprof+0x189/0x420 [ 15.256602] kasan_atomics+0x95/0x310 [ 15.256794] kunit_try_run_case+0x1a5/0x480 [ 15.257008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.257215] kthread+0x337/0x6f0 [ 15.257350] ret_from_fork+0x41/0x80 [ 15.257485] ret_from_fork_asm+0x1a/0x30 [ 15.257680] [ 15.257776] The buggy address belongs to the object at ffff888102717100 [ 15.257776] which belongs to the cache kmalloc-64 of size 64 [ 15.258315] The buggy address is located 0 bytes to the right of [ 15.258315] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.258854] [ 15.258929] The buggy address belongs to the physical page: [ 15.259102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.259378] flags: 0x200000000000000(node=0|zone=2) [ 15.259608] page_type: f5(slab) [ 15.259777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.260121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.260644] page dumped because: kasan: bad access detected [ 15.260820] [ 15.260892] Memory state around the buggy address: [ 15.261050] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.261321] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.261720] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.262058] ^ [ 15.262453] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.262727] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.263055] ================================================================== [ 16.273840] ================================================================== [ 16.274138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.274623] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 16.274930] [ 16.275043] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 16.275100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.275114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.275155] Call Trace: [ 16.275172] <TASK> [ 16.275189] dump_stack_lvl+0x73/0xb0 [ 16.275228] print_report+0xd1/0x650 [ 16.275252] ? __virt_addr_valid+0x1db/0x2d0 [ 16.275274] ? kasan_atomics_helper+0x218a/0x5450 [ 16.275296] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.275329] ? kasan_atomics_helper+0x218a/0x5450 [ 16.275352] kasan_report+0x141/0x180 [ 16.275383] ? kasan_atomics_helper+0x218a/0x5450 [ 16.275412] kasan_check_range+0x10c/0x1c0 [ 16.275468] __kasan_check_write+0x18/0x20 [ 16.275490] kasan_atomics_helper+0x218a/0x5450 [ 16.275514] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.275547] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.275570] ? kasan_atomics+0x152/0x310 [ 16.275593] kasan_atomics+0x1dc/0x310 [ 16.275613] ? __pfx_kasan_atomics+0x10/0x10 [ 16.275633] ? trace_hardirqs_on+0x37/0xe0 [ 16.275657] ? __pfx_read_tsc+0x10/0x10 [ 16.275678] ? ktime_get_ts64+0x86/0x230 [ 16.275705] kunit_try_run_case+0x1a5/0x480 [ 16.275730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.275763] ? queued_spin_lock_slowpath+0x116/0xb40 [ 16.275789] ? __kthread_parkme+0x82/0x180 [ 16.275812] ? preempt_count_sub+0x50/0x80 [ 16.275848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.275872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.275896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.275919] kthread+0x337/0x6f0 [ 16.275937] ? trace_preempt_on+0x20/0xc0 [ 16.275961] ? __pfx_kthread+0x10/0x10 [ 16.275980] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.276003] ? calculate_sigpending+0x7b/0xa0 [ 16.276026] ? __pfx_kthread+0x10/0x10 [ 16.276045] ret_from_fork+0x41/0x80 [ 16.276067] ? __pfx_kthread+0x10/0x10 [ 16.276086] ret_from_fork_asm+0x1a/0x30 [ 16.276118] </TASK> [ 16.276139] [ 16.283554] Allocated by task 284: [ 16.283754] kasan_save_stack+0x45/0x70 [ 16.283981] kasan_save_track+0x18/0x40 [ 16.284198] kasan_save_alloc_info+0x3b/0x50 [ 16.284417] __kasan_kmalloc+0xb7/0xc0 [ 16.284624] __kmalloc_cache_noprof+0x189/0x420 [ 16.284779] kasan_atomics+0x95/0x310 [ 16.284991] kunit_try_run_case+0x1a5/0x480 [ 16.285202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.285420] kthread+0x337/0x6f0 [ 16.285610] ret_from_fork+0x41/0x80 [ 16.285799] ret_from_fork_asm+0x1a/0x30 [ 16.286006] [ 16.286079] The buggy address belongs to the object at ffff888102717100 [ 16.286079] which belongs to the cache kmalloc-64 of size 64 [ 16.286459] The buggy address is located 0 bytes to the right of [ 16.286459] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 16.287041] [ 16.287144] The buggy address belongs to the physical page: [ 16.287403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 16.287777] flags: 0x200000000000000(node=0|zone=2) [ 16.287973] page_type: f5(slab) [ 16.288166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.288416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.288730] page dumped because: kasan: bad access detected [ 16.289004] [ 16.289101] Memory state around the buggy address: [ 16.289362] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.289710] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.290045] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.290359] ^ [ 16.290609] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.290916] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.291218] ================================================================== [ 14.994606] ================================================================== [ 14.994944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.995452] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 14.995738] [ 14.995823] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 14.995865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.995878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.995898] Call Trace: [ 14.995914] <TASK> [ 14.995927] dump_stack_lvl+0x73/0xb0 [ 14.995953] print_report+0xd1/0x650 [ 14.995975] ? __virt_addr_valid+0x1db/0x2d0 [ 14.995995] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.996016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.996038] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.996060] kasan_report+0x141/0x180 [ 14.996082] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.996110] __asan_report_store4_noabort+0x1b/0x30 [ 14.996131] kasan_atomics_helper+0x4ba2/0x5450 [ 14.996153] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.996176] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.996198] ? kasan_atomics+0x152/0x310 [ 14.996221] kasan_atomics+0x1dc/0x310 [ 14.996240] ? __pfx_kasan_atomics+0x10/0x10 [ 14.996259] ? trace_hardirqs_on+0x37/0xe0 [ 14.996281] ? __pfx_read_tsc+0x10/0x10 [ 14.996313] ? ktime_get_ts64+0x86/0x230 [ 14.996337] kunit_try_run_case+0x1a5/0x480 [ 14.996361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.996434] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.996463] ? __kthread_parkme+0x82/0x180 [ 14.996484] ? preempt_count_sub+0x50/0x80 [ 14.996508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.996532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.996554] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.996577] kthread+0x337/0x6f0 [ 14.996594] ? trace_preempt_on+0x20/0xc0 [ 14.996615] ? __pfx_kthread+0x10/0x10 [ 14.996634] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.996654] ? calculate_sigpending+0x7b/0xa0 [ 14.996675] ? __pfx_kthread+0x10/0x10 [ 14.996694] ret_from_fork+0x41/0x80 [ 14.996715] ? __pfx_kthread+0x10/0x10 [ 14.996732] ret_from_fork_asm+0x1a/0x30 [ 14.996763] </TASK> [ 14.996774] [ 15.004916] Allocated by task 284: [ 15.005052] kasan_save_stack+0x45/0x70 [ 15.005200] kasan_save_track+0x18/0x40 [ 15.005361] kasan_save_alloc_info+0x3b/0x50 [ 15.005581] __kasan_kmalloc+0xb7/0xc0 [ 15.005896] __kmalloc_cache_noprof+0x189/0x420 [ 15.006114] kasan_atomics+0x95/0x310 [ 15.006307] kunit_try_run_case+0x1a5/0x480 [ 15.006561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.006807] kthread+0x337/0x6f0 [ 15.007181] ret_from_fork+0x41/0x80 [ 15.007382] ret_from_fork_asm+0x1a/0x30 [ 15.007604] [ 15.007678] The buggy address belongs to the object at ffff888102717100 [ 15.007678] which belongs to the cache kmalloc-64 of size 64 [ 15.008383] The buggy address is located 0 bytes to the right of [ 15.008383] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.008926] [ 15.008999] The buggy address belongs to the physical page: [ 15.009169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.009421] flags: 0x200000000000000(node=0|zone=2) [ 15.009583] page_type: f5(slab) [ 15.009874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.010213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.010762] page dumped because: kasan: bad access detected [ 15.011068] [ 15.011142] Memory state around the buggy address: [ 15.011312] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.011944] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.012210] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.012547] ^ [ 15.012756] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.013268] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.013646] ================================================================== [ 15.943485] ================================================================== [ 15.943825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.944234] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.944610] [ 15.944712] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.944759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.944772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.944805] Call Trace: [ 15.944822] <TASK> [ 15.944838] dump_stack_lvl+0x73/0xb0 [ 15.944879] print_report+0xd1/0x650 [ 15.944903] ? __virt_addr_valid+0x1db/0x2d0 [ 15.944925] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.944956] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.944980] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.945003] kasan_report+0x141/0x180 [ 15.945038] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.945066] kasan_check_range+0x10c/0x1c0 [ 15.945089] __kasan_check_write+0x18/0x20 [ 15.945109] kasan_atomics_helper+0x1a7f/0x5450 [ 15.945134] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.945157] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.945179] ? kasan_atomics+0x152/0x310 [ 15.945203] kasan_atomics+0x1dc/0x310 [ 15.945222] ? __pfx_kasan_atomics+0x10/0x10 [ 15.945243] ? trace_hardirqs_on+0x37/0xe0 [ 15.945266] ? __pfx_read_tsc+0x10/0x10 [ 15.945286] ? ktime_get_ts64+0x86/0x230 [ 15.945322] kunit_try_run_case+0x1a5/0x480 [ 15.945347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.945382] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.945407] ? __kthread_parkme+0x82/0x180 [ 15.945429] ? preempt_count_sub+0x50/0x80 [ 15.945465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.945498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.945522] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.945555] kthread+0x337/0x6f0 [ 15.945572] ? trace_preempt_on+0x20/0xc0 [ 15.945596] ? __pfx_kthread+0x10/0x10 [ 15.945625] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.945648] ? calculate_sigpending+0x7b/0xa0 [ 15.945670] ? __pfx_kthread+0x10/0x10 [ 15.945690] ret_from_fork+0x41/0x80 [ 15.945711] ? __pfx_kthread+0x10/0x10 [ 15.945730] ret_from_fork_asm+0x1a/0x30 [ 15.945762] </TASK> [ 15.945773] [ 15.953646] Allocated by task 284: [ 15.953849] kasan_save_stack+0x45/0x70 [ 15.954056] kasan_save_track+0x18/0x40 [ 15.954265] kasan_save_alloc_info+0x3b/0x50 [ 15.954437] __kasan_kmalloc+0xb7/0xc0 [ 15.954599] __kmalloc_cache_noprof+0x189/0x420 [ 15.954822] kasan_atomics+0x95/0x310 [ 15.955038] kunit_try_run_case+0x1a5/0x480 [ 15.955248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.955523] kthread+0x337/0x6f0 [ 15.955643] ret_from_fork+0x41/0x80 [ 15.955827] ret_from_fork_asm+0x1a/0x30 [ 15.956027] [ 15.956155] The buggy address belongs to the object at ffff888102717100 [ 15.956155] which belongs to the cache kmalloc-64 of size 64 [ 15.956782] The buggy address is located 0 bytes to the right of [ 15.956782] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.957210] [ 15.957286] The buggy address belongs to the physical page: [ 15.957470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.957781] flags: 0x200000000000000(node=0|zone=2) [ 15.958099] page_type: f5(slab) [ 15.958270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.958597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.958829] page dumped because: kasan: bad access detected [ 15.959001] [ 15.959072] Memory state around the buggy address: [ 15.959361] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.960011] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.960365] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.960727] ^ [ 15.960981] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.961257] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.961677] ================================================================== [ 15.207008] ================================================================== [ 15.207382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.207998] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.208332] [ 15.208447] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.208495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.208509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.208532] Call Trace: [ 15.208550] <TASK> [ 15.208568] dump_stack_lvl+0x73/0xb0 [ 15.208596] print_report+0xd1/0x650 [ 15.208619] ? __virt_addr_valid+0x1db/0x2d0 [ 15.208641] ? kasan_atomics_helper+0x72f/0x5450 [ 15.208663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.208687] ? kasan_atomics_helper+0x72f/0x5450 [ 15.208710] kasan_report+0x141/0x180 [ 15.208735] ? kasan_atomics_helper+0x72f/0x5450 [ 15.208762] kasan_check_range+0x10c/0x1c0 [ 15.208784] __kasan_check_write+0x18/0x20 [ 15.208805] kasan_atomics_helper+0x72f/0x5450 [ 15.208828] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.208851] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.208874] ? kasan_atomics+0x152/0x310 [ 15.208899] kasan_atomics+0x1dc/0x310 [ 15.208919] ? __pfx_kasan_atomics+0x10/0x10 [ 15.208939] ? trace_hardirqs_on+0x37/0xe0 [ 15.208963] ? __pfx_read_tsc+0x10/0x10 [ 15.208983] ? ktime_get_ts64+0x86/0x230 [ 15.209008] kunit_try_run_case+0x1a5/0x480 [ 15.209034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.209059] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.209083] ? __kthread_parkme+0x82/0x180 [ 15.209106] ? preempt_count_sub+0x50/0x80 [ 15.209132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.209156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.209179] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.209203] kthread+0x337/0x6f0 [ 15.209221] ? trace_preempt_on+0x20/0xc0 [ 15.209244] ? __pfx_kthread+0x10/0x10 [ 15.209265] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.209287] ? calculate_sigpending+0x7b/0xa0 [ 15.209320] ? __pfx_kthread+0x10/0x10 [ 15.209341] ret_from_fork+0x41/0x80 [ 15.209362] ? __pfx_kthread+0x10/0x10 [ 15.209381] ret_from_fork_asm+0x1a/0x30 [ 15.209414] </TASK> [ 15.209425] [ 15.216908] Allocated by task 284: [ 15.217088] kasan_save_stack+0x45/0x70 [ 15.217269] kasan_save_track+0x18/0x40 [ 15.217427] kasan_save_alloc_info+0x3b/0x50 [ 15.217578] __kasan_kmalloc+0xb7/0xc0 [ 15.217714] __kmalloc_cache_noprof+0x189/0x420 [ 15.217911] kasan_atomics+0x95/0x310 [ 15.218093] kunit_try_run_case+0x1a5/0x480 [ 15.218309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.218565] kthread+0x337/0x6f0 [ 15.218758] ret_from_fork+0x41/0x80 [ 15.218893] ret_from_fork_asm+0x1a/0x30 [ 15.219034] [ 15.219120] The buggy address belongs to the object at ffff888102717100 [ 15.219120] which belongs to the cache kmalloc-64 of size 64 [ 15.219939] The buggy address is located 0 bytes to the right of [ 15.219939] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.220432] [ 15.220778] The buggy address belongs to the physical page: [ 15.221009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.221338] flags: 0x200000000000000(node=0|zone=2) [ 15.222243] page_type: f5(slab) [ 15.222888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.223189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.223560] page dumped because: kasan: bad access detected [ 15.223740] [ 15.223813] Memory state around the buggy address: [ 15.224045] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.224354] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.224766] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.225017] ^ [ 15.225244] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.225581] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.225870] ================================================================== [ 15.785117] ================================================================== [ 15.785499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.785798] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284 [ 15.786288] [ 15.786439] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 15.786487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.786510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.786534] Call Trace: [ 15.786553] <TASK> [ 15.786570] dump_stack_lvl+0x73/0xb0 [ 15.786608] print_report+0xd1/0x650 [ 15.786631] ? __virt_addr_valid+0x1db/0x2d0 [ 15.786654] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.786683] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.786707] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.786731] kasan_report+0x141/0x180 [ 15.786755] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.786784] kasan_check_range+0x10c/0x1c0 [ 15.786808] __kasan_check_write+0x18/0x20 [ 15.786829] kasan_atomics_helper+0x15b6/0x5450 [ 15.786853] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.786877] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.786900] ? kasan_atomics+0x152/0x310 [ 15.786925] kasan_atomics+0x1dc/0x310 [ 15.786945] ? __pfx_kasan_atomics+0x10/0x10 [ 15.786965] ? trace_hardirqs_on+0x37/0xe0 [ 15.786989] ? __pfx_read_tsc+0x10/0x10 [ 15.787009] ? ktime_get_ts64+0x86/0x230 [ 15.787035] kunit_try_run_case+0x1a5/0x480 [ 15.787060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.787084] ? queued_spin_lock_slowpath+0x116/0xb40 [ 15.787108] ? __kthread_parkme+0x82/0x180 [ 15.787131] ? preempt_count_sub+0x50/0x80 [ 15.787156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.787180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.787204] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.787227] kthread+0x337/0x6f0 [ 15.787253] ? trace_preempt_on+0x20/0xc0 [ 15.787276] ? __pfx_kthread+0x10/0x10 [ 15.787295] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.787331] ? calculate_sigpending+0x7b/0xa0 [ 15.787353] ? __pfx_kthread+0x10/0x10 [ 15.787373] ret_from_fork+0x41/0x80 [ 15.787394] ? __pfx_kthread+0x10/0x10 [ 15.787414] ret_from_fork_asm+0x1a/0x30 [ 15.787457] </TASK> [ 15.787469] [ 15.795356] Allocated by task 284: [ 15.795541] kasan_save_stack+0x45/0x70 [ 15.795711] kasan_save_track+0x18/0x40 [ 15.795932] kasan_save_alloc_info+0x3b/0x50 [ 15.796084] __kasan_kmalloc+0xb7/0xc0 [ 15.796221] __kmalloc_cache_noprof+0x189/0x420 [ 15.796386] kasan_atomics+0x95/0x310 [ 15.796520] kunit_try_run_case+0x1a5/0x480 [ 15.796670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.796848] kthread+0x337/0x6f0 [ 15.796997] ret_from_fork+0x41/0x80 [ 15.797230] ret_from_fork_asm+0x1a/0x30 [ 15.797458] [ 15.797555] The buggy address belongs to the object at ffff888102717100 [ 15.797555] which belongs to the cache kmalloc-64 of size 64 [ 15.798080] The buggy address is located 0 bytes to the right of [ 15.798080] allocated 48-byte region [ffff888102717100, ffff888102717130) [ 15.798775] [ 15.798851] The buggy address belongs to the physical page: [ 15.799024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717 [ 15.799266] flags: 0x200000000000000(node=0|zone=2) [ 15.799453] page_type: f5(slab) [ 15.799630] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.800008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.800409] page dumped because: kasan: bad access detected [ 15.800736] [ 15.800835] Memory state around the buggy address: [ 15.801101] ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.801456] ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.801762] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.801976] ^ [ 15.802133] ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.802402] ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.803105] ==================================================================