Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 28.541865] ================================================================== [ 28.543327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 28.544142] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.545112] [ 28.545579] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.545851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.545959] Hardware name: linux,dummy-virt (DT) [ 28.546110] Call trace: [ 28.546189] show_stack+0x20/0x38 (C) [ 28.546259] dump_stack_lvl+0x8c/0xd0 [ 28.546364] print_report+0x118/0x608 [ 28.546439] kasan_report+0xdc/0x128 [ 28.546499] kasan_check_range+0x100/0x1a8 [ 28.546554] __kasan_check_write+0x20/0x30 [ 28.546611] kasan_atomics_helper+0x6ec/0x4858 [ 28.546682] kasan_atomics+0x198/0x2e8 [ 28.546742] kunit_try_run_case+0x170/0x3f0 [ 28.546799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.546873] kthread+0x318/0x620 [ 28.546963] ret_from_fork+0x10/0x20 [ 28.547027] [ 28.556694] Allocated by task 254: [ 28.557393] kasan_save_stack+0x3c/0x68 [ 28.558352] kasan_save_track+0x20/0x40 [ 28.559304] kasan_save_alloc_info+0x40/0x58 [ 28.560058] __kasan_kmalloc+0xd4/0xd8 [ 28.560619] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.561498] kasan_atomics+0xb8/0x2e8 [ 28.562105] kunit_try_run_case+0x170/0x3f0 [ 28.562579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.563417] kthread+0x318/0x620 [ 28.565415] ret_from_fork+0x10/0x20 [ 28.566606] [ 28.566959] The buggy address belongs to the object at fff00000c65edb80 [ 28.566959] which belongs to the cache kmalloc-64 of size 64 [ 28.569299] The buggy address is located 0 bytes to the right of [ 28.569299] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.570504] [ 28.571046] The buggy address belongs to the physical page: [ 28.571923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.573340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.574137] page_type: f5(slab) [ 28.574801] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.576205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.577067] page dumped because: kasan: bad access detected [ 28.577493] [ 28.577703] Memory state around the buggy address: [ 28.578116] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.578674] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.579848] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.581023] ^ [ 28.581847] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.583160] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.584658] ================================================================== [ 28.066612] ================================================================== [ 28.068849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 28.071621] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.073363] [ 28.073638] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.073835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.074555] Hardware name: linux,dummy-virt (DT) [ 28.074640] Call trace: [ 28.074698] show_stack+0x20/0x38 (C) [ 28.074820] dump_stack_lvl+0x8c/0xd0 [ 28.074957] print_report+0x118/0x608 [ 28.075084] kasan_report+0xdc/0x128 [ 28.075202] __asan_report_load4_noabort+0x20/0x30 [ 28.075326] kasan_atomics_helper+0x40fc/0x4858 [ 28.075446] kasan_atomics+0x198/0x2e8 [ 28.075563] kunit_try_run_case+0x170/0x3f0 [ 28.075682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.075813] kthread+0x318/0x620 [ 28.075948] ret_from_fork+0x10/0x20 [ 28.076071] [ 28.088818] Allocated by task 254: [ 28.090011] kasan_save_stack+0x3c/0x68 [ 28.091290] kasan_save_track+0x20/0x40 [ 28.092546] kasan_save_alloc_info+0x40/0x58 [ 28.094006] __kasan_kmalloc+0xd4/0xd8 [ 28.095239] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.096565] kasan_atomics+0xb8/0x2e8 [ 28.097696] kunit_try_run_case+0x170/0x3f0 [ 28.098837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.100301] kthread+0x318/0x620 [ 28.100671] ret_from_fork+0x10/0x20 [ 28.102100] [ 28.102876] The buggy address belongs to the object at fff00000c65edb80 [ 28.102876] which belongs to the cache kmalloc-64 of size 64 [ 28.105673] The buggy address is located 0 bytes to the right of [ 28.105673] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.107056] [ 28.107687] The buggy address belongs to the physical page: [ 28.108145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.109254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.110120] page_type: f5(slab) [ 28.110547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.111838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.112501] page dumped because: kasan: bad access detected [ 28.112767] [ 28.112944] Memory state around the buggy address: [ 28.113489] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.114819] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.115381] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.115922] ^ [ 28.116336] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.116840] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.119037] ================================================================== [ 27.828550] ================================================================== [ 27.829361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 27.830026] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 27.830701] [ 27.831066] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 27.831632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.831705] Hardware name: linux,dummy-virt (DT) [ 27.831792] Call trace: [ 27.831857] show_stack+0x20/0x38 (C) [ 27.832740] dump_stack_lvl+0x8c/0xd0 [ 27.832876] print_report+0x118/0x608 [ 27.835616] kasan_report+0xdc/0x128 [ 27.835742] __asan_report_store4_noabort+0x20/0x30 [ 27.836964] kasan_atomics_helper+0x3f7c/0x4858 [ 27.837106] kasan_atomics+0x198/0x2e8 [ 27.841941] kunit_try_run_case+0x170/0x3f0 [ 27.842101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.842240] kthread+0x318/0x620 [ 27.842362] ret_from_fork+0x10/0x20 [ 27.842505] [ 27.857130] Allocated by task 254: [ 27.857958] kasan_save_stack+0x3c/0x68 [ 27.858399] kasan_save_track+0x20/0x40 [ 27.858781] kasan_save_alloc_info+0x40/0x58 [ 27.859198] __kasan_kmalloc+0xd4/0xd8 [ 27.859951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.860745] kasan_atomics+0xb8/0x2e8 [ 27.862386] kunit_try_run_case+0x170/0x3f0 [ 27.863179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.864229] kthread+0x318/0x620 [ 27.865331] ret_from_fork+0x10/0x20 [ 27.866038] [ 27.866433] The buggy address belongs to the object at fff00000c65edb80 [ 27.866433] which belongs to the cache kmalloc-64 of size 64 [ 27.869127] The buggy address is located 0 bytes to the right of [ 27.869127] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 27.871344] [ 27.871592] The buggy address belongs to the physical page: [ 27.872226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 27.874138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.875225] page_type: f5(slab) [ 27.875849] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.876910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.877478] page dumped because: kasan: bad access detected [ 27.878702] [ 27.879138] Memory state around the buggy address: [ 27.880250] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.881631] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.883033] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.883903] ^ [ 27.885122] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.885830] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.887080] ================================================================== [ 29.323462] ================================================================== [ 29.326824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 29.328342] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.331447] [ 29.331877] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.332530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.332611] Hardware name: linux,dummy-virt (DT) [ 29.332700] Call trace: [ 29.332765] show_stack+0x20/0x38 (C) [ 29.332972] dump_stack_lvl+0x8c/0xd0 [ 29.333117] print_report+0x118/0x608 [ 29.333248] kasan_report+0xdc/0x128 [ 29.333386] __asan_report_load4_noabort+0x20/0x30 [ 29.333528] kasan_atomics_helper+0x3dbc/0x4858 [ 29.333645] kasan_atomics+0x198/0x2e8 [ 29.333749] kunit_try_run_case+0x170/0x3f0 [ 29.333868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.334034] kthread+0x318/0x620 [ 29.334152] ret_from_fork+0x10/0x20 [ 29.334296] [ 29.346497] Allocated by task 254: [ 29.348068] kasan_save_stack+0x3c/0x68 [ 29.348829] kasan_save_track+0x20/0x40 [ 29.349285] kasan_save_alloc_info+0x40/0x58 [ 29.349703] __kasan_kmalloc+0xd4/0xd8 [ 29.351288] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.351961] kasan_atomics+0xb8/0x2e8 [ 29.352416] kunit_try_run_case+0x170/0x3f0 [ 29.354263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.355323] kthread+0x318/0x620 [ 29.356413] ret_from_fork+0x10/0x20 [ 29.356870] [ 29.357182] The buggy address belongs to the object at fff00000c65edb80 [ 29.357182] which belongs to the cache kmalloc-64 of size 64 [ 29.359434] The buggy address is located 0 bytes to the right of [ 29.359434] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.362348] [ 29.362668] The buggy address belongs to the physical page: [ 29.364496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.365415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.367021] page_type: f5(slab) [ 29.367364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.369478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.370633] page dumped because: kasan: bad access detected [ 29.371219] [ 29.371524] Memory state around the buggy address: [ 29.372862] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.374859] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.375745] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.377476] ^ [ 29.378306] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.379536] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.380091] ================================================================== [ 30.281525] ================================================================== [ 30.282334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 30.283134] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.283985] [ 30.284355] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.284570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.284657] Hardware name: linux,dummy-virt (DT) [ 30.284783] Call trace: [ 30.284862] show_stack+0x20/0x38 (C) [ 30.285071] dump_stack_lvl+0x8c/0xd0 [ 30.285277] print_report+0x118/0x608 [ 30.285417] kasan_report+0xdc/0x128 [ 30.285555] kasan_check_range+0x100/0x1a8 [ 30.285633] __kasan_check_write+0x20/0x30 [ 30.285691] kasan_atomics_helper+0x1384/0x4858 [ 30.285753] kasan_atomics+0x198/0x2e8 [ 30.285809] kunit_try_run_case+0x170/0x3f0 [ 30.285868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.285966] kthread+0x318/0x620 [ 30.286024] ret_from_fork+0x10/0x20 [ 30.286086] [ 30.292834] Allocated by task 254: [ 30.293304] kasan_save_stack+0x3c/0x68 [ 30.293826] kasan_save_track+0x20/0x40 [ 30.294491] kasan_save_alloc_info+0x40/0x58 [ 30.295189] __kasan_kmalloc+0xd4/0xd8 [ 30.295691] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.296402] kasan_atomics+0xb8/0x2e8 [ 30.297003] kunit_try_run_case+0x170/0x3f0 [ 30.297612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.298400] kthread+0x318/0x620 [ 30.298916] ret_from_fork+0x10/0x20 [ 30.299525] [ 30.299837] The buggy address belongs to the object at fff00000c65edb80 [ 30.299837] which belongs to the cache kmalloc-64 of size 64 [ 30.300961] The buggy address is located 0 bytes to the right of [ 30.300961] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.302328] [ 30.302606] The buggy address belongs to the physical page: [ 30.303355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.304244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.304984] page_type: f5(slab) [ 30.305530] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.306315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.307152] page dumped because: kasan: bad access detected [ 30.307730] [ 30.308060] Memory state around the buggy address: [ 30.308463] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.309035] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.309543] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.310085] ^ [ 30.310695] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.311342] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.312220] ================================================================== [ 30.213828] ================================================================== [ 30.214457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 30.215423] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.216177] [ 30.216574] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.216832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.216938] Hardware name: linux,dummy-virt (DT) [ 30.217078] Call trace: [ 30.217153] show_stack+0x20/0x38 (C) [ 30.217293] dump_stack_lvl+0x8c/0xd0 [ 30.217441] print_report+0x118/0x608 [ 30.217620] kasan_report+0xdc/0x128 [ 30.217760] kasan_check_range+0x100/0x1a8 [ 30.217826] __kasan_check_write+0x20/0x30 [ 30.217912] kasan_atomics_helper+0x126c/0x4858 [ 30.217983] kasan_atomics+0x198/0x2e8 [ 30.218040] kunit_try_run_case+0x170/0x3f0 [ 30.218100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.218177] kthread+0x318/0x620 [ 30.218236] ret_from_fork+0x10/0x20 [ 30.218297] [ 30.224705] Allocated by task 254: [ 30.225292] kasan_save_stack+0x3c/0x68 [ 30.225935] kasan_save_track+0x20/0x40 [ 30.226639] kasan_save_alloc_info+0x40/0x58 [ 30.227248] __kasan_kmalloc+0xd4/0xd8 [ 30.227802] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.228457] kasan_atomics+0xb8/0x2e8 [ 30.228983] kunit_try_run_case+0x170/0x3f0 [ 30.229595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.230309] kthread+0x318/0x620 [ 30.230818] ret_from_fork+0x10/0x20 [ 30.231395] [ 30.231726] The buggy address belongs to the object at fff00000c65edb80 [ 30.231726] which belongs to the cache kmalloc-64 of size 64 [ 30.232774] The buggy address is located 0 bytes to the right of [ 30.232774] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.234176] [ 30.234511] The buggy address belongs to the physical page: [ 30.235208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.235877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.236740] page_type: f5(slab) [ 30.237358] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.238225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.239041] page dumped because: kasan: bad access detected [ 30.239716] [ 30.240093] Memory state around the buggy address: [ 30.240676] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.241428] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.242250] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.243138] ^ [ 30.243724] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.244488] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.245253] ================================================================== [ 30.730915] ================================================================== [ 30.732268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 30.732964] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.734045] [ 30.734803] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.735129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.735227] Hardware name: linux,dummy-virt (DT) [ 30.735315] Call trace: [ 30.735386] show_stack+0x20/0x38 (C) [ 30.735529] dump_stack_lvl+0x8c/0xd0 [ 30.735737] print_report+0x118/0x608 [ 30.735929] kasan_report+0xdc/0x128 [ 30.736155] __asan_report_load8_noabort+0x20/0x30 [ 30.736251] kasan_atomics_helper+0x3e20/0x4858 [ 30.736317] kasan_atomics+0x198/0x2e8 [ 30.736375] kunit_try_run_case+0x170/0x3f0 [ 30.736435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.736498] kthread+0x318/0x620 [ 30.736557] ret_from_fork+0x10/0x20 [ 30.736617] [ 30.743374] Allocated by task 254: [ 30.743773] kasan_save_stack+0x3c/0x68 [ 30.744529] kasan_save_track+0x20/0x40 [ 30.745256] kasan_save_alloc_info+0x40/0x58 [ 30.745857] __kasan_kmalloc+0xd4/0xd8 [ 30.746543] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.747246] kasan_atomics+0xb8/0x2e8 [ 30.747834] kunit_try_run_case+0x170/0x3f0 [ 30.748501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.749240] kthread+0x318/0x620 [ 30.749809] ret_from_fork+0x10/0x20 [ 30.750411] [ 30.750808] The buggy address belongs to the object at fff00000c65edb80 [ 30.750808] which belongs to the cache kmalloc-64 of size 64 [ 30.752115] The buggy address is located 0 bytes to the right of [ 30.752115] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.753535] [ 30.753952] The buggy address belongs to the physical page: [ 30.754634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.755550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.756220] page_type: f5(slab) [ 30.756438] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.756776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.757801] page dumped because: kasan: bad access detected [ 30.758400] [ 30.758780] Memory state around the buggy address: [ 30.759414] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.760221] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.760990] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.761741] ^ [ 30.762342] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.763171] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.763942] ================================================================== [ 28.331439] ================================================================== [ 28.332159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 28.332905] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.333764] [ 28.334195] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.334411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.334502] Hardware name: linux,dummy-virt (DT) [ 28.334600] Call trace: [ 28.334673] show_stack+0x20/0x38 (C) [ 28.334814] dump_stack_lvl+0x8c/0xd0 [ 28.334977] print_report+0x118/0x608 [ 28.335113] kasan_report+0xdc/0x128 [ 28.335177] kasan_check_range+0x100/0x1a8 [ 28.335235] __kasan_check_write+0x20/0x30 [ 28.335294] kasan_atomics_helper+0x4e4/0x4858 [ 28.335354] kasan_atomics+0x198/0x2e8 [ 28.335410] kunit_try_run_case+0x170/0x3f0 [ 28.335469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.335531] kthread+0x318/0x620 [ 28.335588] ret_from_fork+0x10/0x20 [ 28.335647] [ 28.344187] Allocated by task 254: [ 28.344533] kasan_save_stack+0x3c/0x68 [ 28.344984] kasan_save_track+0x20/0x40 [ 28.345362] kasan_save_alloc_info+0x40/0x58 [ 28.345753] __kasan_kmalloc+0xd4/0xd8 [ 28.350271] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.353095] kasan_atomics+0xb8/0x2e8 [ 28.354547] kunit_try_run_case+0x170/0x3f0 [ 28.357273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.358647] kthread+0x318/0x620 [ 28.359257] ret_from_fork+0x10/0x20 [ 28.359807] [ 28.360152] The buggy address belongs to the object at fff00000c65edb80 [ 28.360152] which belongs to the cache kmalloc-64 of size 64 [ 28.361398] The buggy address is located 0 bytes to the right of [ 28.361398] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.362949] [ 28.363217] The buggy address belongs to the physical page: [ 28.364020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.365370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.366239] page_type: f5(slab) [ 28.366580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.367148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.367710] page dumped because: kasan: bad access detected [ 28.368197] [ 28.368516] Memory state around the buggy address: [ 28.369034] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.369853] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.370837] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.371680] ^ [ 28.372194] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.373380] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.374719] ================================================================== [ 29.010767] ================================================================== [ 29.012015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 29.012601] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.013841] [ 29.016083] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.016311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.016398] Hardware name: linux,dummy-virt (DT) [ 29.016490] Call trace: [ 29.016560] show_stack+0x20/0x38 (C) [ 29.016712] dump_stack_lvl+0x8c/0xd0 [ 29.016853] print_report+0x118/0x608 [ 29.017009] kasan_report+0xdc/0x128 [ 29.017116] kasan_check_range+0x100/0x1a8 [ 29.017217] __kasan_check_write+0x20/0x30 [ 29.017314] kasan_atomics_helper+0xa04/0x4858 [ 29.017435] kasan_atomics+0x198/0x2e8 [ 29.017560] kunit_try_run_case+0x170/0x3f0 [ 29.017686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.017827] kthread+0x318/0x620 [ 29.017993] ret_from_fork+0x10/0x20 [ 29.018129] [ 29.028752] Allocated by task 254: [ 29.029256] kasan_save_stack+0x3c/0x68 [ 29.029744] kasan_save_track+0x20/0x40 [ 29.030523] kasan_save_alloc_info+0x40/0x58 [ 29.031404] __kasan_kmalloc+0xd4/0xd8 [ 29.032164] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.033154] kasan_atomics+0xb8/0x2e8 [ 29.034287] kunit_try_run_case+0x170/0x3f0 [ 29.035983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.036699] kthread+0x318/0x620 [ 29.037073] ret_from_fork+0x10/0x20 [ 29.037405] [ 29.037616] The buggy address belongs to the object at fff00000c65edb80 [ 29.037616] which belongs to the cache kmalloc-64 of size 64 [ 29.040618] The buggy address is located 0 bytes to the right of [ 29.040618] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.043072] [ 29.043441] The buggy address belongs to the physical page: [ 29.044809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.046220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.047341] page_type: f5(slab) [ 29.047724] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.049379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.050841] page dumped because: kasan: bad access detected [ 29.051791] [ 29.052582] Memory state around the buggy address: [ 29.053592] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.054291] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.055485] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.057071] ^ [ 29.058196] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.059643] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.061038] ================================================================== [ 29.194326] ================================================================== [ 29.195763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 29.196790] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.197585] [ 29.197861] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.198057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.198122] Hardware name: linux,dummy-virt (DT) [ 29.198210] Call trace: [ 29.198268] show_stack+0x20/0x38 (C) [ 29.198409] dump_stack_lvl+0x8c/0xd0 [ 29.198545] print_report+0x118/0x608 [ 29.198680] kasan_report+0xdc/0x128 [ 29.198814] __asan_report_load4_noabort+0x20/0x30 [ 29.199447] kasan_atomics_helper+0x3dcc/0x4858 [ 29.199598] kasan_atomics+0x198/0x2e8 [ 29.199753] kunit_try_run_case+0x170/0x3f0 [ 29.199980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.200132] kthread+0x318/0x620 [ 29.200333] ret_from_fork+0x10/0x20 [ 29.200487] [ 29.211130] Allocated by task 254: [ 29.212260] kasan_save_stack+0x3c/0x68 [ 29.213451] kasan_save_track+0x20/0x40 [ 29.214458] kasan_save_alloc_info+0x40/0x58 [ 29.215736] __kasan_kmalloc+0xd4/0xd8 [ 29.216707] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.217451] kasan_atomics+0xb8/0x2e8 [ 29.217835] kunit_try_run_case+0x170/0x3f0 [ 29.219208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.220596] kthread+0x318/0x620 [ 29.222607] ret_from_fork+0x10/0x20 [ 29.223026] [ 29.223268] The buggy address belongs to the object at fff00000c65edb80 [ 29.223268] which belongs to the cache kmalloc-64 of size 64 [ 29.227565] The buggy address is located 0 bytes to the right of [ 29.227565] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.233765] [ 29.234501] The buggy address belongs to the physical page: [ 29.237103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.239479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.240542] page_type: f5(slab) [ 29.242015] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.242557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.243071] page dumped because: kasan: bad access detected [ 29.243472] [ 29.243708] Memory state around the buggy address: [ 29.244815] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.248105] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.248634] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.249346] ^ [ 29.251529] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.253661] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.256031] ================================================================== [ 30.346545] ================================================================== [ 30.347333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 30.348038] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.349218] [ 30.349630] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.349816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.349902] Hardware name: linux,dummy-virt (DT) [ 30.350027] Call trace: [ 30.350133] show_stack+0x20/0x38 (C) [ 30.350350] dump_stack_lvl+0x8c/0xd0 [ 30.350555] print_report+0x118/0x608 [ 30.350755] kasan_report+0xdc/0x128 [ 30.350940] kasan_check_range+0x100/0x1a8 [ 30.351059] __kasan_check_write+0x20/0x30 [ 30.351169] kasan_atomics_helper+0x1414/0x4858 [ 30.351318] kasan_atomics+0x198/0x2e8 [ 30.351429] kunit_try_run_case+0x170/0x3f0 [ 30.351544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.351668] kthread+0x318/0x620 [ 30.351816] ret_from_fork+0x10/0x20 [ 30.351984] [ 30.358741] Allocated by task 254: [ 30.359283] kasan_save_stack+0x3c/0x68 [ 30.359919] kasan_save_track+0x20/0x40 [ 30.360534] kasan_save_alloc_info+0x40/0x58 [ 30.361149] __kasan_kmalloc+0xd4/0xd8 [ 30.361715] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.362252] kasan_atomics+0xb8/0x2e8 [ 30.362688] kunit_try_run_case+0x170/0x3f0 [ 30.363398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.364153] kthread+0x318/0x620 [ 30.364704] ret_from_fork+0x10/0x20 [ 30.365284] [ 30.365594] The buggy address belongs to the object at fff00000c65edb80 [ 30.365594] which belongs to the cache kmalloc-64 of size 64 [ 30.366714] The buggy address is located 0 bytes to the right of [ 30.366714] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.368117] [ 30.368505] The buggy address belongs to the physical page: [ 30.369153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.370021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.371070] page_type: f5(slab) [ 30.371559] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.372572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.373352] page dumped because: kasan: bad access detected [ 30.374351] [ 30.375118] Memory state around the buggy address: [ 30.376025] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.376776] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.377532] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.378262] ^ [ 30.378856] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.379558] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.380571] ================================================================== [ 28.376582] ================================================================== [ 28.377444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 28.379286] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.380560] [ 28.380952] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.381134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.381197] Hardware name: linux,dummy-virt (DT) [ 28.381271] Call trace: [ 28.381326] show_stack+0x20/0x38 (C) [ 28.381440] dump_stack_lvl+0x8c/0xd0 [ 28.381548] print_report+0x118/0x608 [ 28.381650] kasan_report+0xdc/0x128 [ 28.381755] kasan_check_range+0x100/0x1a8 [ 28.381859] __kasan_check_write+0x20/0x30 [ 28.381999] kasan_atomics_helper+0x54c/0x4858 [ 28.382149] kasan_atomics+0x198/0x2e8 [ 28.382303] kunit_try_run_case+0x170/0x3f0 [ 28.382444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.382603] kthread+0x318/0x620 [ 28.382741] ret_from_fork+0x10/0x20 [ 28.382926] [ 28.394376] Allocated by task 254: [ 28.394942] kasan_save_stack+0x3c/0x68 [ 28.395566] kasan_save_track+0x20/0x40 [ 28.396123] kasan_save_alloc_info+0x40/0x58 [ 28.396648] __kasan_kmalloc+0xd4/0xd8 [ 28.397730] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.398151] kasan_atomics+0xb8/0x2e8 [ 28.398509] kunit_try_run_case+0x170/0x3f0 [ 28.398878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.400519] kthread+0x318/0x620 [ 28.401426] ret_from_fork+0x10/0x20 [ 28.401847] [ 28.402227] The buggy address belongs to the object at fff00000c65edb80 [ 28.402227] which belongs to the cache kmalloc-64 of size 64 [ 28.403901] The buggy address is located 0 bytes to the right of [ 28.403901] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.405196] [ 28.405512] The buggy address belongs to the physical page: [ 28.406416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.407298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.407989] page_type: f5(slab) [ 28.408427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.409199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.410069] page dumped because: kasan: bad access detected [ 28.410535] [ 28.410747] Memory state around the buggy address: [ 28.411145] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.411647] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.417131] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.418563] ^ [ 28.419141] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.419875] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.420659] ================================================================== [ 29.664719] ================================================================== [ 29.666557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 29.667370] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.667943] [ 29.668183] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.668369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.668447] Hardware name: linux,dummy-virt (DT) [ 29.668529] Call trace: [ 29.668592] show_stack+0x20/0x38 (C) [ 29.669117] dump_stack_lvl+0x8c/0xd0 [ 29.669710] print_report+0x118/0x608 [ 29.669852] kasan_report+0xdc/0x128 [ 29.670014] kasan_check_range+0x100/0x1a8 [ 29.670078] __kasan_check_read+0x20/0x30 [ 29.670136] kasan_atomics_helper+0xdd4/0x4858 [ 29.670213] kasan_atomics+0x198/0x2e8 [ 29.670270] kunit_try_run_case+0x170/0x3f0 [ 29.670425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.670524] kthread+0x318/0x620 [ 29.670582] ret_from_fork+0x10/0x20 [ 29.670646] [ 29.680223] Allocated by task 254: [ 29.680947] kasan_save_stack+0x3c/0x68 [ 29.682059] kasan_save_track+0x20/0x40 [ 29.682775] kasan_save_alloc_info+0x40/0x58 [ 29.683422] __kasan_kmalloc+0xd4/0xd8 [ 29.683779] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.684912] kasan_atomics+0xb8/0x2e8 [ 29.685712] kunit_try_run_case+0x170/0x3f0 [ 29.686392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.687263] kthread+0x318/0x620 [ 29.687768] ret_from_fork+0x10/0x20 [ 29.688351] [ 29.688764] The buggy address belongs to the object at fff00000c65edb80 [ 29.688764] which belongs to the cache kmalloc-64 of size 64 [ 29.689592] The buggy address is located 0 bytes to the right of [ 29.689592] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.690873] [ 29.691137] The buggy address belongs to the physical page: [ 29.691557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.692277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.693146] page_type: f5(slab) [ 29.693627] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.694460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.697045] page dumped because: kasan: bad access detected [ 29.697709] [ 29.698215] Memory state around the buggy address: [ 29.698906] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.699438] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.700234] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.701025] ^ [ 29.701413] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.701910] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.702396] ================================================================== [ 30.458984] ================================================================== [ 30.459844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 30.460449] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.461535] [ 30.461930] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.462176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.462248] Hardware name: linux,dummy-virt (DT) [ 30.462325] Call trace: [ 30.462418] show_stack+0x20/0x38 (C) [ 30.462562] dump_stack_lvl+0x8c/0xd0 [ 30.462698] print_report+0x118/0x608 [ 30.462838] kasan_report+0xdc/0x128 [ 30.463005] kasan_check_range+0x100/0x1a8 [ 30.463186] __kasan_check_write+0x20/0x30 [ 30.463364] kasan_atomics_helper+0x154c/0x4858 [ 30.463510] kasan_atomics+0x198/0x2e8 [ 30.463635] kunit_try_run_case+0x170/0x3f0 [ 30.463704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.463773] kthread+0x318/0x620 [ 30.463829] ret_from_fork+0x10/0x20 [ 30.463916] [ 30.470754] Allocated by task 254: [ 30.471316] kasan_save_stack+0x3c/0x68 [ 30.471950] kasan_save_track+0x20/0x40 [ 30.472484] kasan_save_alloc_info+0x40/0x58 [ 30.473049] __kasan_kmalloc+0xd4/0xd8 [ 30.473533] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.474075] kasan_atomics+0xb8/0x2e8 [ 30.474638] kunit_try_run_case+0x170/0x3f0 [ 30.475299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.475915] kthread+0x318/0x620 [ 30.476326] ret_from_fork+0x10/0x20 [ 30.476864] [ 30.477276] The buggy address belongs to the object at fff00000c65edb80 [ 30.477276] which belongs to the cache kmalloc-64 of size 64 [ 30.478658] The buggy address is located 0 bytes to the right of [ 30.478658] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.479919] [ 30.480236] The buggy address belongs to the physical page: [ 30.480991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.481961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.482710] page_type: f5(slab) [ 30.483237] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.484054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.484830] page dumped because: kasan: bad access detected [ 30.485466] [ 30.485783] Memory state around the buggy address: [ 30.486313] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.487205] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.487924] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.488750] ^ [ 30.489464] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.490235] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.491085] ================================================================== [ 28.160503] ================================================================== [ 28.161468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 28.162581] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.163931] [ 28.164333] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.164515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.164574] Hardware name: linux,dummy-virt (DT) [ 28.164645] Call trace: [ 28.164694] show_stack+0x20/0x38 (C) [ 28.164803] dump_stack_lvl+0x8c/0xd0 [ 28.164933] print_report+0x118/0x608 [ 28.165041] kasan_report+0xdc/0x128 [ 28.165142] __asan_report_store4_noabort+0x20/0x30 [ 28.165271] kasan_atomics_helper+0x3f94/0x4858 [ 28.165409] kasan_atomics+0x198/0x2e8 [ 28.165556] kunit_try_run_case+0x170/0x3f0 [ 28.165704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.165871] kthread+0x318/0x620 [ 28.166034] ret_from_fork+0x10/0x20 [ 28.166193] [ 28.172472] Allocated by task 254: [ 28.172897] kasan_save_stack+0x3c/0x68 [ 28.173327] kasan_save_track+0x20/0x40 [ 28.173779] kasan_save_alloc_info+0x40/0x58 [ 28.174199] __kasan_kmalloc+0xd4/0xd8 [ 28.174568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.175016] kasan_atomics+0xb8/0x2e8 [ 28.175463] kunit_try_run_case+0x170/0x3f0 [ 28.175964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.176732] kthread+0x318/0x620 [ 28.177263] ret_from_fork+0x10/0x20 [ 28.177822] [ 28.178142] The buggy address belongs to the object at fff00000c65edb80 [ 28.178142] which belongs to the cache kmalloc-64 of size 64 [ 28.179335] The buggy address is located 0 bytes to the right of [ 28.179335] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.180113] [ 28.180330] The buggy address belongs to the physical page: [ 28.180748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.181566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.182441] page_type: f5(slab) [ 28.182985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.183819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.184645] page dumped because: kasan: bad access detected [ 28.185196] [ 28.185510] Memory state around the buggy address: [ 28.186214] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.186968] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.187616] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.188179] ^ [ 28.188585] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.189127] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.189626] ================================================================== [ 28.592093] ================================================================== [ 28.592931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 28.596515] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.597149] [ 28.597444] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.597655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.597734] Hardware name: linux,dummy-virt (DT) [ 28.597820] Call trace: [ 28.597900] show_stack+0x20/0x38 (C) [ 28.598040] dump_stack_lvl+0x8c/0xd0 [ 28.598184] print_report+0x118/0x608 [ 28.598313] kasan_report+0xdc/0x128 [ 28.598439] kasan_check_range+0x100/0x1a8 [ 28.598569] __kasan_check_write+0x20/0x30 [ 28.598699] kasan_atomics_helper+0x760/0x4858 [ 28.598842] kasan_atomics+0x198/0x2e8 [ 28.599643] kunit_try_run_case+0x170/0x3f0 [ 28.599768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.599928] kthread+0x318/0x620 [ 28.600050] ret_from_fork+0x10/0x20 [ 28.600185] [ 28.616651] Allocated by task 254: [ 28.618513] kasan_save_stack+0x3c/0x68 [ 28.618971] kasan_save_track+0x20/0x40 [ 28.619354] kasan_save_alloc_info+0x40/0x58 [ 28.619759] __kasan_kmalloc+0xd4/0xd8 [ 28.621696] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.623414] kasan_atomics+0xb8/0x2e8 [ 28.625018] kunit_try_run_case+0x170/0x3f0 [ 28.626237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.627532] kthread+0x318/0x620 [ 28.629154] ret_from_fork+0x10/0x20 [ 28.631698] [ 28.631959] The buggy address belongs to the object at fff00000c65edb80 [ 28.631959] which belongs to the cache kmalloc-64 of size 64 [ 28.632803] The buggy address is located 0 bytes to the right of [ 28.632803] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.633755] [ 28.636940] The buggy address belongs to the physical page: [ 28.637653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.639734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.640487] page_type: f5(slab) [ 28.643867] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.645432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.647228] page dumped because: kasan: bad access detected [ 28.649082] [ 28.649383] Memory state around the buggy address: [ 28.649815] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.650746] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.654640] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.656079] ^ [ 28.656670] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.661047] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.661943] ================================================================== [ 28.123811] ================================================================== [ 28.125608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 28.126640] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.127375] [ 28.127731] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.128145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.128235] Hardware name: linux,dummy-virt (DT) [ 28.128372] Call trace: [ 28.128448] show_stack+0x20/0x38 (C) [ 28.128608] dump_stack_lvl+0x8c/0xd0 [ 28.128791] print_report+0x118/0x608 [ 28.128864] kasan_report+0xdc/0x128 [ 28.128980] kasan_check_range+0x100/0x1a8 [ 28.129044] __kasan_check_write+0x20/0x30 [ 28.129138] kasan_atomics_helper+0x32c/0x4858 [ 28.129208] kasan_atomics+0x198/0x2e8 [ 28.129265] kunit_try_run_case+0x170/0x3f0 [ 28.129326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.129389] kthread+0x318/0x620 [ 28.129471] ret_from_fork+0x10/0x20 [ 28.129599] [ 28.134973] Allocated by task 254: [ 28.135574] kasan_save_stack+0x3c/0x68 [ 28.136191] kasan_save_track+0x20/0x40 [ 28.136813] kasan_save_alloc_info+0x40/0x58 [ 28.137442] __kasan_kmalloc+0xd4/0xd8 [ 28.138936] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.140310] kasan_atomics+0xb8/0x2e8 [ 28.141231] kunit_try_run_case+0x170/0x3f0 [ 28.141961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.142744] kthread+0x318/0x620 [ 28.143395] ret_from_fork+0x10/0x20 [ 28.144080] [ 28.144414] The buggy address belongs to the object at fff00000c65edb80 [ 28.144414] which belongs to the cache kmalloc-64 of size 64 [ 28.145653] The buggy address is located 0 bytes to the right of [ 28.145653] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.146493] [ 28.146732] The buggy address belongs to the physical page: [ 28.147169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.147742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.149166] page_type: f5(slab) [ 28.150269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.151173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.152080] page dumped because: kasan: bad access detected [ 28.152848] [ 28.153315] Memory state around the buggy address: [ 28.153754] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.154581] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.155495] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.156457] ^ [ 28.156911] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.157869] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.158562] ================================================================== [ 29.747386] ================================================================== [ 29.748083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 29.748660] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.749227] [ 29.749490] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.749675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.749741] Hardware name: linux,dummy-virt (DT) [ 29.749818] Call trace: [ 29.749873] show_stack+0x20/0x38 (C) [ 29.750042] dump_stack_lvl+0x8c/0xd0 [ 29.751322] print_report+0x118/0x608 [ 29.751454] kasan_report+0xdc/0x128 [ 29.751574] kasan_check_range+0x100/0x1a8 [ 29.751686] __kasan_check_write+0x20/0x30 [ 29.751799] kasan_atomics_helper+0xe44/0x4858 [ 29.751946] kasan_atomics+0x198/0x2e8 [ 29.752066] kunit_try_run_case+0x170/0x3f0 [ 29.752183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.752309] kthread+0x318/0x620 [ 29.752432] ret_from_fork+0x10/0x20 [ 29.752560] [ 29.765804] Allocated by task 254: [ 29.766738] kasan_save_stack+0x3c/0x68 [ 29.767916] kasan_save_track+0x20/0x40 [ 29.769006] kasan_save_alloc_info+0x40/0x58 [ 29.770119] __kasan_kmalloc+0xd4/0xd8 [ 29.771137] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.772183] kasan_atomics+0xb8/0x2e8 [ 29.772573] kunit_try_run_case+0x170/0x3f0 [ 29.773559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.774878] kthread+0x318/0x620 [ 29.775876] ret_from_fork+0x10/0x20 [ 29.776515] [ 29.776754] The buggy address belongs to the object at fff00000c65edb80 [ 29.776754] which belongs to the cache kmalloc-64 of size 64 [ 29.781491] The buggy address is located 0 bytes to the right of [ 29.781491] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.784127] [ 29.784740] The buggy address belongs to the physical page: [ 29.785791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.786926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.787438] page_type: f5(slab) [ 29.787753] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.789481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.790290] page dumped because: kasan: bad access detected [ 29.791021] [ 29.791373] Memory state around the buggy address: [ 29.792002] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.792798] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.793360] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.793858] ^ [ 29.794299] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.794816] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.795485] ================================================================== [ 30.524867] ================================================================== [ 30.525569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 30.526314] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.527109] [ 30.527365] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.527554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.527624] Hardware name: linux,dummy-virt (DT) [ 30.527703] Call trace: [ 30.527762] show_stack+0x20/0x38 (C) [ 30.527907] dump_stack_lvl+0x8c/0xd0 [ 30.528026] print_report+0x118/0x608 [ 30.528170] kasan_report+0xdc/0x128 [ 30.528313] __asan_report_load8_noabort+0x20/0x30 [ 30.528454] kasan_atomics_helper+0x3db0/0x4858 [ 30.528601] kasan_atomics+0x198/0x2e8 [ 30.528718] kunit_try_run_case+0x170/0x3f0 [ 30.528834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.528977] kthread+0x318/0x620 [ 30.529078] ret_from_fork+0x10/0x20 [ 30.529187] [ 30.538438] Allocated by task 254: [ 30.538754] kasan_save_stack+0x3c/0x68 [ 30.540371] kasan_save_track+0x20/0x40 [ 30.540944] kasan_save_alloc_info+0x40/0x58 [ 30.541592] __kasan_kmalloc+0xd4/0xd8 [ 30.542618] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.543540] kasan_atomics+0xb8/0x2e8 [ 30.544222] kunit_try_run_case+0x170/0x3f0 [ 30.544689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.545321] kthread+0x318/0x620 [ 30.545742] ret_from_fork+0x10/0x20 [ 30.546300] [ 30.546593] The buggy address belongs to the object at fff00000c65edb80 [ 30.546593] which belongs to the cache kmalloc-64 of size 64 [ 30.547695] The buggy address is located 0 bytes to the right of [ 30.547695] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.548899] [ 30.549222] The buggy address belongs to the physical page: [ 30.549842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.550633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.551306] page_type: f5(slab) [ 30.551831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.552668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.553366] page dumped because: kasan: bad access detected [ 30.554023] [ 30.554345] Memory state around the buggy address: [ 30.554878] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.555661] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.556364] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.557181] ^ [ 30.557738] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.558491] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.559186] ================================================================== [ 29.465966] ================================================================== [ 29.466510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 29.467327] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.468551] [ 29.469060] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.469263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.469330] Hardware name: linux,dummy-virt (DT) [ 29.469414] Call trace: [ 29.469476] show_stack+0x20/0x38 (C) [ 29.469600] dump_stack_lvl+0x8c/0xd0 [ 29.469724] print_report+0x118/0x608 [ 29.469846] kasan_report+0xdc/0x128 [ 29.470002] kasan_check_range+0x100/0x1a8 [ 29.470144] __kasan_check_write+0x20/0x30 [ 29.470294] kasan_atomics_helper+0xca0/0x4858 [ 29.470432] kasan_atomics+0x198/0x2e8 [ 29.470571] kunit_try_run_case+0x170/0x3f0 [ 29.470706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.470858] kthread+0x318/0x620 [ 29.471008] ret_from_fork+0x10/0x20 [ 29.471152] [ 29.481593] Allocated by task 254: [ 29.482336] kasan_save_stack+0x3c/0x68 [ 29.483081] kasan_save_track+0x20/0x40 [ 29.483774] kasan_save_alloc_info+0x40/0x58 [ 29.484623] __kasan_kmalloc+0xd4/0xd8 [ 29.485407] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.486258] kasan_atomics+0xb8/0x2e8 [ 29.486949] kunit_try_run_case+0x170/0x3f0 [ 29.487775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.488822] kthread+0x318/0x620 [ 29.489475] ret_from_fork+0x10/0x20 [ 29.490186] [ 29.490613] The buggy address belongs to the object at fff00000c65edb80 [ 29.490613] which belongs to the cache kmalloc-64 of size 64 [ 29.492479] The buggy address is located 0 bytes to the right of [ 29.492479] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.494502] [ 29.494923] The buggy address belongs to the physical page: [ 29.495789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.497029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.498209] page_type: f5(slab) [ 29.498917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.499603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.500731] page dumped because: kasan: bad access detected [ 29.501628] [ 29.502036] Memory state around the buggy address: [ 29.502830] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.504119] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.505305] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.505833] ^ [ 29.506668] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.508258] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.509565] ================================================================== [ 30.180156] ================================================================== [ 30.181116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 30.182010] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.182828] [ 30.183190] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.183412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.183538] Hardware name: linux,dummy-virt (DT) [ 30.183632] Call trace: [ 30.183706] show_stack+0x20/0x38 (C) [ 30.183899] dump_stack_lvl+0x8c/0xd0 [ 30.184053] print_report+0x118/0x608 [ 30.184228] kasan_report+0xdc/0x128 [ 30.184374] kasan_check_range+0x100/0x1a8 [ 30.184491] __kasan_check_write+0x20/0x30 [ 30.184551] kasan_atomics_helper+0x11f8/0x4858 [ 30.184615] kasan_atomics+0x198/0x2e8 [ 30.184672] kunit_try_run_case+0x170/0x3f0 [ 30.184732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.184800] kthread+0x318/0x620 [ 30.184855] ret_from_fork+0x10/0x20 [ 30.184949] [ 30.191728] Allocated by task 254: [ 30.192236] kasan_save_stack+0x3c/0x68 [ 30.192928] kasan_save_track+0x20/0x40 [ 30.193376] kasan_save_alloc_info+0x40/0x58 [ 30.194012] __kasan_kmalloc+0xd4/0xd8 [ 30.194613] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.195255] kasan_atomics+0xb8/0x2e8 [ 30.195829] kunit_try_run_case+0x170/0x3f0 [ 30.196436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.197083] kthread+0x318/0x620 [ 30.197494] ret_from_fork+0x10/0x20 [ 30.198102] [ 30.198481] The buggy address belongs to the object at fff00000c65edb80 [ 30.198481] which belongs to the cache kmalloc-64 of size 64 [ 30.199795] The buggy address is located 0 bytes to the right of [ 30.199795] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.201080] [ 30.201424] The buggy address belongs to the physical page: [ 30.202024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.202720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.203573] page_type: f5(slab) [ 30.204111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.205047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.205922] page dumped because: kasan: bad access detected [ 30.206616] [ 30.206978] Memory state around the buggy address: [ 30.207678] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.208460] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.209224] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.209985] ^ [ 30.210554] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.211415] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.212188] ================================================================== [ 28.500238] ================================================================== [ 28.501006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 28.501865] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.502661] [ 28.503040] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.503271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.503359] Hardware name: linux,dummy-virt (DT) [ 28.503452] Call trace: [ 28.503539] show_stack+0x20/0x38 (C) [ 28.503681] dump_stack_lvl+0x8c/0xd0 [ 28.503838] print_report+0x118/0x608 [ 28.503997] kasan_report+0xdc/0x128 [ 28.504145] kasan_check_range+0x100/0x1a8 [ 28.504226] __kasan_check_write+0x20/0x30 [ 28.504298] kasan_atomics_helper+0x684/0x4858 [ 28.504362] kasan_atomics+0x198/0x2e8 [ 28.504420] kunit_try_run_case+0x170/0x3f0 [ 28.504478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.504543] kthread+0x318/0x620 [ 28.504600] ret_from_fork+0x10/0x20 [ 28.504660] [ 28.516676] Allocated by task 254: [ 28.517251] kasan_save_stack+0x3c/0x68 [ 28.517875] kasan_save_track+0x20/0x40 [ 28.518319] kasan_save_alloc_info+0x40/0x58 [ 28.518729] __kasan_kmalloc+0xd4/0xd8 [ 28.519099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.519903] kasan_atomics+0xb8/0x2e8 [ 28.520267] kunit_try_run_case+0x170/0x3f0 [ 28.520652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.521101] kthread+0x318/0x620 [ 28.522142] ret_from_fork+0x10/0x20 [ 28.522560] [ 28.522823] The buggy address belongs to the object at fff00000c65edb80 [ 28.522823] which belongs to the cache kmalloc-64 of size 64 [ 28.526133] The buggy address is located 0 bytes to the right of [ 28.526133] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.528947] [ 28.529284] The buggy address belongs to the physical page: [ 28.529976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.530960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.531650] page_type: f5(slab) [ 28.532111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.532932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.533687] page dumped because: kasan: bad access detected [ 28.534313] [ 28.534612] Memory state around the buggy address: [ 28.535198] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.537129] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.537636] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.538135] ^ [ 28.538562] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.539193] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.539669] ================================================================== [ 28.744086] ================================================================== [ 28.744710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 28.745375] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.746346] [ 28.747243] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.748993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.749072] Hardware name: linux,dummy-virt (DT) [ 28.749153] Call trace: [ 28.749211] show_stack+0x20/0x38 (C) [ 28.749332] dump_stack_lvl+0x8c/0xd0 [ 28.749445] print_report+0x118/0x608 [ 28.749564] kasan_report+0xdc/0x128 [ 28.749672] kasan_check_range+0x100/0x1a8 [ 28.750253] __kasan_check_write+0x20/0x30 [ 28.750370] kasan_atomics_helper+0x894/0x4858 [ 28.750485] kasan_atomics+0x198/0x2e8 [ 28.750597] kunit_try_run_case+0x170/0x3f0 [ 28.750704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.750821] kthread+0x318/0x620 [ 28.750975] ret_from_fork+0x10/0x20 [ 28.751111] [ 28.763272] Allocated by task 254: [ 28.763621] kasan_save_stack+0x3c/0x68 [ 28.765932] kasan_save_track+0x20/0x40 [ 28.766626] kasan_save_alloc_info+0x40/0x58 [ 28.767845] __kasan_kmalloc+0xd4/0xd8 [ 28.768740] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.769959] kasan_atomics+0xb8/0x2e8 [ 28.770951] kunit_try_run_case+0x170/0x3f0 [ 28.773085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.773630] kthread+0x318/0x620 [ 28.774037] ret_from_fork+0x10/0x20 [ 28.774443] [ 28.774694] The buggy address belongs to the object at fff00000c65edb80 [ 28.774694] which belongs to the cache kmalloc-64 of size 64 [ 28.779538] The buggy address is located 0 bytes to the right of [ 28.779538] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.782632] [ 28.783130] The buggy address belongs to the physical page: [ 28.787405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.788495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.789779] page_type: f5(slab) [ 28.790762] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.792973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.794209] page dumped because: kasan: bad access detected [ 28.795359] [ 28.795667] Memory state around the buggy address: [ 28.797910] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.798747] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.799399] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.803684] ^ [ 28.804726] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.807326] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.807862] ================================================================== [ 28.018669] ================================================================== [ 28.020557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 28.022488] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.023719] [ 28.024141] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.024333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.024404] Hardware name: linux,dummy-virt (DT) [ 28.024483] Call trace: [ 28.024539] show_stack+0x20/0x38 (C) [ 28.024662] dump_stack_lvl+0x8c/0xd0 [ 28.024778] print_report+0x118/0x608 [ 28.024916] kasan_report+0xdc/0x128 [ 28.025062] kasan_check_range+0x100/0x1a8 [ 28.025243] __kasan_check_read+0x20/0x30 [ 28.025392] kasan_atomics_helper+0x2b0/0x4858 [ 28.025578] kasan_atomics+0x198/0x2e8 [ 28.025722] kunit_try_run_case+0x170/0x3f0 [ 28.025920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.026082] kthread+0x318/0x620 [ 28.026216] ret_from_fork+0x10/0x20 [ 28.026343] [ 28.035664] Allocated by task 254: [ 28.036382] kasan_save_stack+0x3c/0x68 [ 28.037265] kasan_save_track+0x20/0x40 [ 28.038185] kasan_save_alloc_info+0x40/0x58 [ 28.038968] __kasan_kmalloc+0xd4/0xd8 [ 28.039661] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.040512] kasan_atomics+0xb8/0x2e8 [ 28.041321] kunit_try_run_case+0x170/0x3f0 [ 28.042094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.043054] kthread+0x318/0x620 [ 28.043971] ret_from_fork+0x10/0x20 [ 28.044510] [ 28.044748] The buggy address belongs to the object at fff00000c65edb80 [ 28.044748] which belongs to the cache kmalloc-64 of size 64 [ 28.045565] The buggy address is located 0 bytes to the right of [ 28.045565] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.047517] [ 28.047938] The buggy address belongs to the physical page: [ 28.048823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.050203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.051299] page_type: f5(slab) [ 28.051950] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.053364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.054563] page dumped because: kasan: bad access detected [ 28.055578] [ 28.056037] Memory state around the buggy address: [ 28.056905] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.057876] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.059181] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.060115] ^ [ 28.060530] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.061431] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.062684] ================================================================== [ 29.439988] ================================================================== [ 29.441180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 29.442390] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.443680] [ 29.444157] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.444378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.444459] Hardware name: linux,dummy-virt (DT) [ 29.444547] Call trace: [ 29.444605] show_stack+0x20/0x38 (C) [ 29.444737] dump_stack_lvl+0x8c/0xd0 [ 29.444860] print_report+0x118/0x608 [ 29.445015] kasan_report+0xdc/0x128 [ 29.445143] __asan_report_load4_noabort+0x20/0x30 [ 29.445278] kasan_atomics_helper+0x3de4/0x4858 [ 29.445410] kasan_atomics+0x198/0x2e8 [ 29.445535] kunit_try_run_case+0x170/0x3f0 [ 29.445667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.445800] kthread+0x318/0x620 [ 29.445952] ret_from_fork+0x10/0x20 [ 29.446097] [ 29.451405] Allocated by task 254: [ 29.451752] kasan_save_stack+0x3c/0x68 [ 29.452149] kasan_save_track+0x20/0x40 [ 29.452519] kasan_save_alloc_info+0x40/0x58 [ 29.452925] __kasan_kmalloc+0xd4/0xd8 [ 29.453286] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.453687] kasan_atomics+0xb8/0x2e8 [ 29.454064] kunit_try_run_case+0x170/0x3f0 [ 29.454457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.454928] kthread+0x318/0x620 [ 29.455266] ret_from_fork+0x10/0x20 [ 29.455619] [ 29.455840] The buggy address belongs to the object at fff00000c65edb80 [ 29.455840] which belongs to the cache kmalloc-64 of size 64 [ 29.456622] The buggy address is located 0 bytes to the right of [ 29.456622] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.457440] [ 29.457667] The buggy address belongs to the physical page: [ 29.458103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.458690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.459220] page_type: f5(slab) [ 29.459581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.460156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.460688] page dumped because: kasan: bad access detected [ 29.461132] [ 29.461354] Memory state around the buggy address: [ 29.461744] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.462282] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.462797] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.463320] ^ [ 29.463716] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.464251] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.464759] ================================================================== [ 29.926214] ================================================================== [ 29.927968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 29.928575] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.929205] [ 29.929452] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.929650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.929720] Hardware name: linux,dummy-virt (DT) [ 29.929804] Call trace: [ 29.929869] show_stack+0x20/0x38 (C) [ 29.930025] dump_stack_lvl+0x8c/0xd0 [ 29.930184] print_report+0x118/0x608 [ 29.930326] kasan_report+0xdc/0x128 [ 29.930464] kasan_check_range+0x100/0x1a8 [ 29.930588] __kasan_check_write+0x20/0x30 [ 29.930736] kasan_atomics_helper+0xf88/0x4858 [ 29.930905] kasan_atomics+0x198/0x2e8 [ 29.931045] kunit_try_run_case+0x170/0x3f0 [ 29.931186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.931337] kthread+0x318/0x620 [ 29.931480] ret_from_fork+0x10/0x20 [ 29.931623] [ 29.936917] Allocated by task 254: [ 29.937441] kasan_save_stack+0x3c/0x68 [ 29.937985] kasan_save_track+0x20/0x40 [ 29.938480] kasan_save_alloc_info+0x40/0x58 [ 29.939028] __kasan_kmalloc+0xd4/0xd8 [ 29.939600] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.940243] kasan_atomics+0xb8/0x2e8 [ 29.940651] kunit_try_run_case+0x170/0x3f0 [ 29.941098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.941681] kthread+0x318/0x620 [ 29.942472] ret_from_fork+0x10/0x20 [ 29.943605] [ 29.943986] The buggy address belongs to the object at fff00000c65edb80 [ 29.943986] which belongs to the cache kmalloc-64 of size 64 [ 29.945378] The buggy address is located 0 bytes to the right of [ 29.945378] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.946234] [ 29.946467] The buggy address belongs to the physical page: [ 29.946926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.949089] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.949600] page_type: f5(slab) [ 29.949939] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.950787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.951584] page dumped because: kasan: bad access detected [ 29.952221] [ 29.952545] Memory state around the buggy address: [ 29.953495] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.956152] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.957137] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.958195] ^ [ 29.959205] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.960548] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.961923] ================================================================== [ 29.621533] ================================================================== [ 29.625681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 29.626288] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.626857] [ 29.630053] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.630283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.630352] Hardware name: linux,dummy-virt (DT) [ 29.630422] Call trace: [ 29.630475] show_stack+0x20/0x38 (C) [ 29.630590] dump_stack_lvl+0x8c/0xd0 [ 29.630711] print_report+0x118/0x608 [ 29.630836] kasan_report+0xdc/0x128 [ 29.630999] __asan_report_load4_noabort+0x20/0x30 [ 29.631145] kasan_atomics_helper+0x3e04/0x4858 [ 29.631288] kasan_atomics+0x198/0x2e8 [ 29.631409] kunit_try_run_case+0x170/0x3f0 [ 29.631520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.631647] kthread+0x318/0x620 [ 29.631759] ret_from_fork+0x10/0x20 [ 29.631875] [ 29.638605] Allocated by task 254: [ 29.640333] kasan_save_stack+0x3c/0x68 [ 29.641067] kasan_save_track+0x20/0x40 [ 29.641797] kasan_save_alloc_info+0x40/0x58 [ 29.642506] __kasan_kmalloc+0xd4/0xd8 [ 29.643287] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.644583] kasan_atomics+0xb8/0x2e8 [ 29.645315] kunit_try_run_case+0x170/0x3f0 [ 29.645869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.647225] kthread+0x318/0x620 [ 29.647585] ret_from_fork+0x10/0x20 [ 29.647988] [ 29.648219] The buggy address belongs to the object at fff00000c65edb80 [ 29.648219] which belongs to the cache kmalloc-64 of size 64 [ 29.649686] The buggy address is located 0 bytes to the right of [ 29.649686] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.651654] [ 29.652017] The buggy address belongs to the physical page: [ 29.652987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.654280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.654797] page_type: f5(slab) [ 29.655297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.656458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.656981] page dumped because: kasan: bad access detected [ 29.657474] [ 29.658002] Memory state around the buggy address: [ 29.658528] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.659824] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.660768] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.661346] ^ [ 29.661813] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.662381] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.663119] ================================================================== [ 30.560634] ================================================================== [ 30.561337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 30.562683] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.563703] [ 30.564498] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.564732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.564790] Hardware name: linux,dummy-virt (DT) [ 30.564832] Call trace: [ 30.564864] show_stack+0x20/0x38 (C) [ 30.564966] dump_stack_lvl+0x8c/0xd0 [ 30.565031] print_report+0x118/0x608 [ 30.565094] kasan_report+0xdc/0x128 [ 30.565154] kasan_check_range+0x100/0x1a8 [ 30.565237] __kasan_check_write+0x20/0x30 [ 30.565318] kasan_atomics_helper+0x1644/0x4858 [ 30.565406] kasan_atomics+0x198/0x2e8 [ 30.565488] kunit_try_run_case+0x170/0x3f0 [ 30.565573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.565690] kthread+0x318/0x620 [ 30.565750] ret_from_fork+0x10/0x20 [ 30.565812] [ 30.572147] Allocated by task 254: [ 30.572684] kasan_save_stack+0x3c/0x68 [ 30.573190] kasan_save_track+0x20/0x40 [ 30.573769] kasan_save_alloc_info+0x40/0x58 [ 30.574276] __kasan_kmalloc+0xd4/0xd8 [ 30.574841] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.575462] kasan_atomics+0xb8/0x2e8 [ 30.576020] kunit_try_run_case+0x170/0x3f0 [ 30.576606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.577239] kthread+0x318/0x620 [ 30.577725] ret_from_fork+0x10/0x20 [ 30.578273] [ 30.578598] The buggy address belongs to the object at fff00000c65edb80 [ 30.578598] which belongs to the cache kmalloc-64 of size 64 [ 30.579689] The buggy address is located 0 bytes to the right of [ 30.579689] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.580972] [ 30.581274] The buggy address belongs to the physical page: [ 30.581956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.582770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.583437] page_type: f5(slab) [ 30.583948] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.584805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.585571] page dumped because: kasan: bad access detected [ 30.586181] [ 30.586463] Memory state around the buggy address: [ 30.587012] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.587693] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.588329] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.589138] ^ [ 30.589734] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.590521] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.591359] ================================================================== [ 28.194851] ================================================================== [ 28.195854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 28.196664] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.197363] [ 28.197669] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.198041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.198130] Hardware name: linux,dummy-virt (DT) [ 28.198239] Call trace: [ 28.198314] show_stack+0x20/0x38 (C) [ 28.198505] dump_stack_lvl+0x8c/0xd0 [ 28.198648] print_report+0x118/0x608 [ 28.198786] kasan_report+0xdc/0x128 [ 28.198975] kasan_check_range+0x100/0x1a8 [ 28.199142] __kasan_check_write+0x20/0x30 [ 28.199334] kasan_atomics_helper+0x3ac/0x4858 [ 28.199482] kasan_atomics+0x198/0x2e8 [ 28.199551] kunit_try_run_case+0x170/0x3f0 [ 28.199613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.199680] kthread+0x318/0x620 [ 28.199823] ret_from_fork+0x10/0x20 [ 28.199979] [ 28.211474] Allocated by task 254: [ 28.212056] kasan_save_stack+0x3c/0x68 [ 28.212455] kasan_save_track+0x20/0x40 [ 28.212818] kasan_save_alloc_info+0x40/0x58 [ 28.213236] __kasan_kmalloc+0xd4/0xd8 [ 28.213615] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.215014] kasan_atomics+0xb8/0x2e8 [ 28.216221] kunit_try_run_case+0x170/0x3f0 [ 28.217352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.218092] kthread+0x318/0x620 [ 28.218682] ret_from_fork+0x10/0x20 [ 28.219238] [ 28.219638] The buggy address belongs to the object at fff00000c65edb80 [ 28.219638] which belongs to the cache kmalloc-64 of size 64 [ 28.221159] The buggy address is located 0 bytes to the right of [ 28.221159] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.222584] [ 28.223037] The buggy address belongs to the physical page: [ 28.223637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.225917] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.226787] page_type: f5(slab) [ 28.227923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.228777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.229582] page dumped because: kasan: bad access detected [ 28.230286] [ 28.230620] Memory state around the buggy address: [ 28.231432] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.231760] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.232380] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.233046] ^ [ 28.233645] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.234404] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.235154] ================================================================== [ 29.892818] ================================================================== [ 29.893860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 29.895100] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.895875] [ 29.896295] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.896513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.896643] Hardware name: linux,dummy-virt (DT) [ 29.896769] Call trace: [ 29.896868] show_stack+0x20/0x38 (C) [ 29.897036] dump_stack_lvl+0x8c/0xd0 [ 29.897178] print_report+0x118/0x608 [ 29.897322] kasan_report+0xdc/0x128 [ 29.897447] kasan_check_range+0x100/0x1a8 [ 29.897513] __kasan_check_write+0x20/0x30 [ 29.897573] kasan_atomics_helper+0xf20/0x4858 [ 29.897632] kasan_atomics+0x198/0x2e8 [ 29.897690] kunit_try_run_case+0x170/0x3f0 [ 29.897749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.897811] kthread+0x318/0x620 [ 29.897868] ret_from_fork+0x10/0x20 [ 29.897961] [ 29.905089] Allocated by task 254: [ 29.905584] kasan_save_stack+0x3c/0x68 [ 29.906370] kasan_save_track+0x20/0x40 [ 29.907027] kasan_save_alloc_info+0x40/0x58 [ 29.907597] __kasan_kmalloc+0xd4/0xd8 [ 29.908187] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.908809] kasan_atomics+0xb8/0x2e8 [ 29.909381] kunit_try_run_case+0x170/0x3f0 [ 29.909989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.910623] kthread+0x318/0x620 [ 29.911248] ret_from_fork+0x10/0x20 [ 29.911794] [ 29.912146] The buggy address belongs to the object at fff00000c65edb80 [ 29.912146] which belongs to the cache kmalloc-64 of size 64 [ 29.913221] The buggy address is located 0 bytes to the right of [ 29.913221] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.914412] [ 29.914771] The buggy address belongs to the physical page: [ 29.915371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.916241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.916931] page_type: f5(slab) [ 29.917403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.918107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.918649] page dumped because: kasan: bad access detected [ 29.919100] [ 29.919318] Memory state around the buggy address: [ 29.919697] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.920303] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.920952] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.921641] ^ [ 29.922238] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.923025] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.923787] ================================================================== [ 30.384599] ================================================================== [ 30.387342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 30.389497] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.390083] [ 30.390350] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.390547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.390618] Hardware name: linux,dummy-virt (DT) [ 30.390697] Call trace: [ 30.390751] show_stack+0x20/0x38 (C) [ 30.390871] dump_stack_lvl+0x8c/0xd0 [ 30.392080] print_report+0x118/0x608 [ 30.392155] kasan_report+0xdc/0x128 [ 30.392216] kasan_check_range+0x100/0x1a8 [ 30.392272] __kasan_check_write+0x20/0x30 [ 30.392328] kasan_atomics_helper+0x147c/0x4858 [ 30.392387] kasan_atomics+0x198/0x2e8 [ 30.392444] kunit_try_run_case+0x170/0x3f0 [ 30.392503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.392568] kthread+0x318/0x620 [ 30.392623] ret_from_fork+0x10/0x20 [ 30.392681] [ 30.400470] Allocated by task 254: [ 30.401120] kasan_save_stack+0x3c/0x68 [ 30.401813] kasan_save_track+0x20/0x40 [ 30.402433] kasan_save_alloc_info+0x40/0x58 [ 30.403118] __kasan_kmalloc+0xd4/0xd8 [ 30.403738] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.404477] kasan_atomics+0xb8/0x2e8 [ 30.405043] kunit_try_run_case+0x170/0x3f0 [ 30.405743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.406548] kthread+0x318/0x620 [ 30.407141] ret_from_fork+0x10/0x20 [ 30.407653] [ 30.408023] The buggy address belongs to the object at fff00000c65edb80 [ 30.408023] which belongs to the cache kmalloc-64 of size 64 [ 30.409185] The buggy address is located 0 bytes to the right of [ 30.409185] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.410450] [ 30.410756] The buggy address belongs to the physical page: [ 30.411430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.412163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.412865] page_type: f5(slab) [ 30.413442] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.414255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.415152] page dumped because: kasan: bad access detected [ 30.415866] [ 30.416233] Memory state around the buggy address: [ 30.416778] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.417624] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.418378] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.419213] ^ [ 30.419789] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.420538] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.421392] ================================================================== [ 28.463279] ================================================================== [ 28.464441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 28.466863] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.467651] [ 28.467913] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.468095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.468165] Hardware name: linux,dummy-virt (DT) [ 28.468236] Call trace: [ 28.468291] show_stack+0x20/0x38 (C) [ 28.468400] dump_stack_lvl+0x8c/0xd0 [ 28.468517] print_report+0x118/0x608 [ 28.468623] kasan_report+0xdc/0x128 [ 28.468722] kasan_check_range+0x100/0x1a8 [ 28.468815] __kasan_check_write+0x20/0x30 [ 28.468955] kasan_atomics_helper+0x61c/0x4858 [ 28.469067] kasan_atomics+0x198/0x2e8 [ 28.469172] kunit_try_run_case+0x170/0x3f0 [ 28.469280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.469400] kthread+0x318/0x620 [ 28.469499] ret_from_fork+0x10/0x20 [ 28.469609] [ 28.476765] Allocated by task 254: [ 28.477243] kasan_save_stack+0x3c/0x68 [ 28.477793] kasan_save_track+0x20/0x40 [ 28.478323] kasan_save_alloc_info+0x40/0x58 [ 28.478800] __kasan_kmalloc+0xd4/0xd8 [ 28.479317] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.479836] kasan_atomics+0xb8/0x2e8 [ 28.480384] kunit_try_run_case+0x170/0x3f0 [ 28.481015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.482353] kthread+0x318/0x620 [ 28.482856] ret_from_fork+0x10/0x20 [ 28.483402] [ 28.483745] The buggy address belongs to the object at fff00000c65edb80 [ 28.483745] which belongs to the cache kmalloc-64 of size 64 [ 28.485056] The buggy address is located 0 bytes to the right of [ 28.485056] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.487957] [ 28.488719] The buggy address belongs to the physical page: [ 28.489277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.489691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.490147] page_type: f5(slab) [ 28.490708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.491513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.492314] page dumped because: kasan: bad access detected [ 28.492928] [ 28.493237] Memory state around the buggy address: [ 28.493851] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.494651] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.495390] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.496117] ^ [ 28.496691] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.497475] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.498191] ================================================================== [ 29.138473] ================================================================== [ 29.141025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 29.143811] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.145829] [ 29.146802] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.147029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.147112] Hardware name: linux,dummy-virt (DT) [ 29.147198] Call trace: [ 29.147264] show_stack+0x20/0x38 (C) [ 29.147400] dump_stack_lvl+0x8c/0xd0 [ 29.147525] print_report+0x118/0x608 [ 29.147658] kasan_report+0xdc/0x128 [ 29.147781] kasan_check_range+0x100/0x1a8 [ 29.147950] __kasan_check_write+0x20/0x30 [ 29.148097] kasan_atomics_helper+0xad4/0x4858 [ 29.148249] kasan_atomics+0x198/0x2e8 [ 29.148393] kunit_try_run_case+0x170/0x3f0 [ 29.148514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.148641] kthread+0x318/0x620 [ 29.148745] ret_from_fork+0x10/0x20 [ 29.148875] [ 29.163375] Allocated by task 254: [ 29.163872] kasan_save_stack+0x3c/0x68 [ 29.164686] kasan_save_track+0x20/0x40 [ 29.167034] kasan_save_alloc_info+0x40/0x58 [ 29.167438] __kasan_kmalloc+0xd4/0xd8 [ 29.167810] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.168302] kasan_atomics+0xb8/0x2e8 [ 29.168695] kunit_try_run_case+0x170/0x3f0 [ 29.170497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.171563] kthread+0x318/0x620 [ 29.172367] ret_from_fork+0x10/0x20 [ 29.173182] [ 29.173636] The buggy address belongs to the object at fff00000c65edb80 [ 29.173636] which belongs to the cache kmalloc-64 of size 64 [ 29.175737] The buggy address is located 0 bytes to the right of [ 29.175737] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.177484] [ 29.177762] The buggy address belongs to the physical page: [ 29.178286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.179016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.180188] page_type: f5(slab) [ 29.180949] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.182403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.183726] page dumped because: kasan: bad access detected [ 29.184803] [ 29.185263] Memory state around the buggy address: [ 29.186220] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.187510] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.188872] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.190121] ^ [ 29.191136] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.192401] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.193032] ================================================================== [ 27.735498] ================================================================== [ 27.744243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 27.752071] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 27.752860] [ 27.756730] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 27.758996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.759073] Hardware name: linux,dummy-virt (DT) [ 27.759155] Call trace: [ 27.759218] show_stack+0x20/0x38 (C) [ 27.759352] dump_stack_lvl+0x8c/0xd0 [ 27.759478] print_report+0x118/0x608 [ 27.759597] kasan_report+0xdc/0x128 [ 27.759714] __asan_report_load4_noabort+0x20/0x30 [ 27.759834] kasan_atomics_helper+0x40a8/0x4858 [ 27.759979] kasan_atomics+0x198/0x2e8 [ 27.760098] kunit_try_run_case+0x170/0x3f0 [ 27.760218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.760348] kthread+0x318/0x620 [ 27.760461] ret_from_fork+0x10/0x20 [ 27.760583] [ 27.781187] Allocated by task 254: [ 27.784390] kasan_save_stack+0x3c/0x68 [ 27.784839] kasan_save_track+0x20/0x40 [ 27.788482] kasan_save_alloc_info+0x40/0x58 [ 27.789202] __kasan_kmalloc+0xd4/0xd8 [ 27.789632] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.793268] kasan_atomics+0xb8/0x2e8 [ 27.794815] kunit_try_run_case+0x170/0x3f0 [ 27.795386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.798360] kthread+0x318/0x620 [ 27.798983] ret_from_fork+0x10/0x20 [ 27.799374] [ 27.799625] The buggy address belongs to the object at fff00000c65edb80 [ 27.799625] which belongs to the cache kmalloc-64 of size 64 [ 27.800626] The buggy address is located 0 bytes to the right of [ 27.800626] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 27.802856] [ 27.803626] The buggy address belongs to the physical page: [ 27.804185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 27.805095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.807592] page_type: f5(slab) [ 27.810361] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.811388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.814554] page dumped because: kasan: bad access detected [ 27.815063] [ 27.815372] Memory state around the buggy address: [ 27.815851] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.818390] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.818982] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.819515] ^ [ 27.819964] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.822730] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.823638] ================================================================== [ 30.007812] ================================================================== [ 30.008460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 30.009214] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.009754] [ 30.010847] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.011074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.011142] Hardware name: linux,dummy-virt (DT) [ 30.011216] Call trace: [ 30.011268] show_stack+0x20/0x38 (C) [ 30.011389] dump_stack_lvl+0x8c/0xd0 [ 30.011495] print_report+0x118/0x608 [ 30.011595] kasan_report+0xdc/0x128 [ 30.011696] kasan_check_range+0x100/0x1a8 [ 30.011793] __kasan_check_write+0x20/0x30 [ 30.011912] kasan_atomics_helper+0x1058/0x4858 [ 30.012023] kasan_atomics+0x198/0x2e8 [ 30.012128] kunit_try_run_case+0x170/0x3f0 [ 30.012231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.012341] kthread+0x318/0x620 [ 30.012449] ret_from_fork+0x10/0x20 [ 30.012579] [ 30.022937] Allocated by task 254: [ 30.023442] kasan_save_stack+0x3c/0x68 [ 30.024135] kasan_save_track+0x20/0x40 [ 30.024821] kasan_save_alloc_info+0x40/0x58 [ 30.025593] __kasan_kmalloc+0xd4/0xd8 [ 30.026580] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.027290] kasan_atomics+0xb8/0x2e8 [ 30.027679] kunit_try_run_case+0x170/0x3f0 [ 30.028100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.028539] kthread+0x318/0x620 [ 30.028878] ret_from_fork+0x10/0x20 [ 30.029665] [ 30.029923] The buggy address belongs to the object at fff00000c65edb80 [ 30.029923] which belongs to the cache kmalloc-64 of size 64 [ 30.030698] The buggy address is located 0 bytes to the right of [ 30.030698] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.033673] [ 30.034175] The buggy address belongs to the physical page: [ 30.034860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.035752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.036519] page_type: f5(slab) [ 30.036856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.037469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.038037] page dumped because: kasan: bad access detected [ 30.038472] [ 30.038696] Memory state around the buggy address: [ 30.039182] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.040015] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.040727] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.041690] ^ [ 30.042333] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.043169] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.043995] ================================================================== [ 30.247174] ================================================================== [ 30.248169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 30.248974] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.250865] [ 30.251262] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.251512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.251602] Hardware name: linux,dummy-virt (DT) [ 30.251686] Call trace: [ 30.251723] show_stack+0x20/0x38 (C) [ 30.251790] dump_stack_lvl+0x8c/0xd0 [ 30.251853] print_report+0x118/0x608 [ 30.251940] kasan_report+0xdc/0x128 [ 30.252003] kasan_check_range+0x100/0x1a8 [ 30.252062] __kasan_check_write+0x20/0x30 [ 30.252119] kasan_atomics_helper+0x12d8/0x4858 [ 30.252180] kasan_atomics+0x198/0x2e8 [ 30.252235] kunit_try_run_case+0x170/0x3f0 [ 30.252294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.252359] kthread+0x318/0x620 [ 30.252414] ret_from_fork+0x10/0x20 [ 30.252475] [ 30.259286] Allocated by task 254: [ 30.259822] kasan_save_stack+0x3c/0x68 [ 30.260467] kasan_save_track+0x20/0x40 [ 30.261189] kasan_save_alloc_info+0x40/0x58 [ 30.261691] __kasan_kmalloc+0xd4/0xd8 [ 30.262377] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.263014] kasan_atomics+0xb8/0x2e8 [ 30.263622] kunit_try_run_case+0x170/0x3f0 [ 30.264206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.264980] kthread+0x318/0x620 [ 30.265540] ret_from_fork+0x10/0x20 [ 30.266223] [ 30.266496] The buggy address belongs to the object at fff00000c65edb80 [ 30.266496] which belongs to the cache kmalloc-64 of size 64 [ 30.267702] The buggy address is located 0 bytes to the right of [ 30.267702] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.268927] [ 30.269276] The buggy address belongs to the physical page: [ 30.269830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.270663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.271352] page_type: f5(slab) [ 30.271824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.272776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.273543] page dumped because: kasan: bad access detected [ 30.274256] [ 30.274614] Memory state around the buggy address: [ 30.275182] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.276015] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.276826] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.277613] ^ [ 30.278236] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.278983] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.279778] ================================================================== [ 30.492690] ================================================================== [ 30.493597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 30.494493] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.495251] [ 30.495657] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.495928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.496015] Hardware name: linux,dummy-virt (DT) [ 30.496111] Call trace: [ 30.496219] show_stack+0x20/0x38 (C) [ 30.496374] dump_stack_lvl+0x8c/0xd0 [ 30.496558] print_report+0x118/0x608 [ 30.496705] kasan_report+0xdc/0x128 [ 30.496818] kasan_check_range+0x100/0x1a8 [ 30.496879] __kasan_check_write+0x20/0x30 [ 30.496974] kasan_atomics_helper+0x15b4/0x4858 [ 30.497036] kasan_atomics+0x198/0x2e8 [ 30.497096] kunit_try_run_case+0x170/0x3f0 [ 30.497155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.497221] kthread+0x318/0x620 [ 30.497276] ret_from_fork+0x10/0x20 [ 30.497335] [ 30.504132] Allocated by task 254: [ 30.504671] kasan_save_stack+0x3c/0x68 [ 30.505290] kasan_save_track+0x20/0x40 [ 30.505876] kasan_save_alloc_info+0x40/0x58 [ 30.506668] __kasan_kmalloc+0xd4/0xd8 [ 30.507252] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.507899] kasan_atomics+0xb8/0x2e8 [ 30.508552] kunit_try_run_case+0x170/0x3f0 [ 30.509168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.509957] kthread+0x318/0x620 [ 30.510479] ret_from_fork+0x10/0x20 [ 30.511072] [ 30.511419] The buggy address belongs to the object at fff00000c65edb80 [ 30.511419] which belongs to the cache kmalloc-64 of size 64 [ 30.512499] The buggy address is located 0 bytes to the right of [ 30.512499] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.513868] [ 30.514127] The buggy address belongs to the physical page: [ 30.514609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.515327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.516147] page_type: f5(slab) [ 30.516543] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.517216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.517983] page dumped because: kasan: bad access detected [ 30.518611] [ 30.518938] Memory state around the buggy address: [ 30.519459] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.520180] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.520907] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.521565] ^ [ 30.522087] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.522878] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.523436] ================================================================== [ 29.703822] ================================================================== [ 29.705052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 29.705914] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.706497] [ 29.706775] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.707033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.707104] Hardware name: linux,dummy-virt (DT) [ 29.707179] Call trace: [ 29.707238] show_stack+0x20/0x38 (C) [ 29.707359] dump_stack_lvl+0x8c/0xd0 [ 29.707471] print_report+0x118/0x608 [ 29.707588] kasan_report+0xdc/0x128 [ 29.707704] __asan_report_load8_noabort+0x20/0x30 [ 29.707820] kasan_atomics_helper+0x3f58/0x4858 [ 29.707989] kasan_atomics+0x198/0x2e8 [ 29.708216] kunit_try_run_case+0x170/0x3f0 [ 29.708394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.708604] kthread+0x318/0x620 [ 29.708762] ret_from_fork+0x10/0x20 [ 29.708916] [ 29.719102] Allocated by task 254: [ 29.719479] kasan_save_stack+0x3c/0x68 [ 29.719862] kasan_save_track+0x20/0x40 [ 29.721567] kasan_save_alloc_info+0x40/0x58 [ 29.722651] __kasan_kmalloc+0xd4/0xd8 [ 29.723431] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.724408] kasan_atomics+0xb8/0x2e8 [ 29.725380] kunit_try_run_case+0x170/0x3f0 [ 29.726097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.726929] kthread+0x318/0x620 [ 29.727591] ret_from_fork+0x10/0x20 [ 29.728106] [ 29.728436] The buggy address belongs to the object at fff00000c65edb80 [ 29.728436] which belongs to the cache kmalloc-64 of size 64 [ 29.729962] The buggy address is located 0 bytes to the right of [ 29.729962] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.731662] [ 29.732026] The buggy address belongs to the physical page: [ 29.732556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.733114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.733614] page_type: f5(slab) [ 29.734154] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.735223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.736151] page dumped because: kasan: bad access detected [ 29.736979] [ 29.737394] Memory state around the buggy address: [ 29.737962] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.738604] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.739576] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.741046] ^ [ 29.741682] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.742266] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.744407] ================================================================== [ 30.593778] ================================================================== [ 30.595131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 30.595792] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.596618] [ 30.597357] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.597580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.597669] Hardware name: linux,dummy-virt (DT) [ 30.597758] Call trace: [ 30.597831] show_stack+0x20/0x38 (C) [ 30.597995] dump_stack_lvl+0x8c/0xd0 [ 30.598074] print_report+0x118/0x608 [ 30.598135] kasan_report+0xdc/0x128 [ 30.598211] __asan_report_load8_noabort+0x20/0x30 [ 30.598273] kasan_atomics_helper+0x3df4/0x4858 [ 30.598334] kasan_atomics+0x198/0x2e8 [ 30.598393] kunit_try_run_case+0x170/0x3f0 [ 30.598451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.598516] kthread+0x318/0x620 [ 30.598575] ret_from_fork+0x10/0x20 [ 30.598635] [ 30.604615] Allocated by task 254: [ 30.605037] kasan_save_stack+0x3c/0x68 [ 30.605579] kasan_save_track+0x20/0x40 [ 30.606246] kasan_save_alloc_info+0x40/0x58 [ 30.606833] __kasan_kmalloc+0xd4/0xd8 [ 30.607377] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.608026] kasan_atomics+0xb8/0x2e8 [ 30.608538] kunit_try_run_case+0x170/0x3f0 [ 30.609064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.609718] kthread+0x318/0x620 [ 30.610293] ret_from_fork+0x10/0x20 [ 30.610777] [ 30.611125] The buggy address belongs to the object at fff00000c65edb80 [ 30.611125] which belongs to the cache kmalloc-64 of size 64 [ 30.612307] The buggy address is located 0 bytes to the right of [ 30.612307] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.613426] [ 30.613776] The buggy address belongs to the physical page: [ 30.614448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.615167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.615940] page_type: f5(slab) [ 30.616454] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.617281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.618079] page dumped because: kasan: bad access detected [ 30.618694] [ 30.619048] Memory state around the buggy address: [ 30.619627] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.620359] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.621052] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.621860] ^ [ 30.622421] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.623224] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.623919] ================================================================== [ 28.422219] ================================================================== [ 28.422974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 28.423526] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.424060] [ 28.424297] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.424510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.424606] Hardware name: linux,dummy-virt (DT) [ 28.424704] Call trace: [ 28.424775] show_stack+0x20/0x38 (C) [ 28.424931] dump_stack_lvl+0x8c/0xd0 [ 28.425090] print_report+0x118/0x608 [ 28.425246] kasan_report+0xdc/0x128 [ 28.425390] kasan_check_range+0x100/0x1a8 [ 28.425566] __kasan_check_write+0x20/0x30 [ 28.425709] kasan_atomics_helper+0x5b4/0x4858 [ 28.425863] kasan_atomics+0x198/0x2e8 [ 28.426041] kunit_try_run_case+0x170/0x3f0 [ 28.426193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.426360] kthread+0x318/0x620 [ 28.426494] ret_from_fork+0x10/0x20 [ 28.426649] [ 28.435944] Allocated by task 254: [ 28.436419] kasan_save_stack+0x3c/0x68 [ 28.437053] kasan_save_track+0x20/0x40 [ 28.437617] kasan_save_alloc_info+0x40/0x58 [ 28.438227] __kasan_kmalloc+0xd4/0xd8 [ 28.438653] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.439322] kasan_atomics+0xb8/0x2e8 [ 28.439810] kunit_try_run_case+0x170/0x3f0 [ 28.440380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.440991] kthread+0x318/0x620 [ 28.441325] ret_from_fork+0x10/0x20 [ 28.441675] [ 28.443951] The buggy address belongs to the object at fff00000c65edb80 [ 28.443951] which belongs to the cache kmalloc-64 of size 64 [ 28.444867] The buggy address is located 0 bytes to the right of [ 28.444867] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.445991] [ 28.446290] The buggy address belongs to the physical page: [ 28.446970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.447874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.448698] page_type: f5(slab) [ 28.449232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.449825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.450385] page dumped because: kasan: bad access detected [ 28.450843] [ 28.451194] Memory state around the buggy address: [ 28.451767] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.454876] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.455825] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.456618] ^ [ 28.457116] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.457644] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.458255] ================================================================== [ 30.313651] ================================================================== [ 30.315924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 30.316533] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.317296] [ 30.317590] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.317878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.317997] Hardware name: linux,dummy-virt (DT) [ 30.318094] Call trace: [ 30.318177] show_stack+0x20/0x38 (C) [ 30.318331] dump_stack_lvl+0x8c/0xd0 [ 30.318476] print_report+0x118/0x608 [ 30.318608] kasan_report+0xdc/0x128 [ 30.318734] __asan_report_load8_noabort+0x20/0x30 [ 30.318856] kasan_atomics_helper+0x3f04/0x4858 [ 30.319004] kasan_atomics+0x198/0x2e8 [ 30.319131] kunit_try_run_case+0x170/0x3f0 [ 30.319256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.319397] kthread+0x318/0x620 [ 30.319521] ret_from_fork+0x10/0x20 [ 30.319667] [ 30.325319] Allocated by task 254: [ 30.325641] kasan_save_stack+0x3c/0x68 [ 30.326065] kasan_save_track+0x20/0x40 [ 30.326645] kasan_save_alloc_info+0x40/0x58 [ 30.327221] __kasan_kmalloc+0xd4/0xd8 [ 30.327795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.328417] kasan_atomics+0xb8/0x2e8 [ 30.328999] kunit_try_run_case+0x170/0x3f0 [ 30.329569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.330034] kthread+0x318/0x620 [ 30.330379] ret_from_fork+0x10/0x20 [ 30.330705] [ 30.330941] The buggy address belongs to the object at fff00000c65edb80 [ 30.330941] which belongs to the cache kmalloc-64 of size 64 [ 30.332384] The buggy address is located 0 bytes to the right of [ 30.332384] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.333802] [ 30.334088] The buggy address belongs to the physical page: [ 30.334579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.335494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.336340] page_type: f5(slab) [ 30.336755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.337537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.338412] page dumped because: kasan: bad access detected [ 30.338984] [ 30.339258] Memory state around the buggy address: [ 30.339827] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.340736] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.341681] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.342449] ^ [ 30.343189] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.344053] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.344770] ================================================================== [ 29.512393] ================================================================== [ 29.516467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 29.518297] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.519091] [ 29.519449] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.519650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.519726] Hardware name: linux,dummy-virt (DT) [ 29.519807] Call trace: [ 29.519866] show_stack+0x20/0x38 (C) [ 29.521441] dump_stack_lvl+0x8c/0xd0 [ 29.521571] print_report+0x118/0x608 [ 29.521697] kasan_report+0xdc/0x128 [ 29.521816] __asan_report_load4_noabort+0x20/0x30 [ 29.521976] kasan_atomics_helper+0x3dd8/0x4858 [ 29.522106] kasan_atomics+0x198/0x2e8 [ 29.522246] kunit_try_run_case+0x170/0x3f0 [ 29.522373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.522510] kthread+0x318/0x620 [ 29.522627] ret_from_fork+0x10/0x20 [ 29.522753] [ 29.531419] Allocated by task 254: [ 29.533282] kasan_save_stack+0x3c/0x68 [ 29.534113] kasan_save_track+0x20/0x40 [ 29.535152] kasan_save_alloc_info+0x40/0x58 [ 29.536406] __kasan_kmalloc+0xd4/0xd8 [ 29.536818] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.537267] kasan_atomics+0xb8/0x2e8 [ 29.537635] kunit_try_run_case+0x170/0x3f0 [ 29.538046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.538529] kthread+0x318/0x620 [ 29.538900] ret_from_fork+0x10/0x20 [ 29.542363] [ 29.543711] The buggy address belongs to the object at fff00000c65edb80 [ 29.543711] which belongs to the cache kmalloc-64 of size 64 [ 29.546177] The buggy address is located 0 bytes to the right of [ 29.546177] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.549530] [ 29.550350] The buggy address belongs to the physical page: [ 29.551040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.552634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.553661] page_type: f5(slab) [ 29.554135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.554680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.556562] page dumped because: kasan: bad access detected [ 29.557807] [ 29.559163] Memory state around the buggy address: [ 29.559801] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.561929] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.562666] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.563237] ^ [ 29.563670] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.564841] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.566340] ================================================================== [ 30.138360] ================================================================== [ 30.138857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 30.141524] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.143324] [ 30.144402] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.144616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.144689] Hardware name: linux,dummy-virt (DT) [ 30.144775] Call trace: [ 30.144834] show_stack+0x20/0x38 (C) [ 30.144979] dump_stack_lvl+0x8c/0xd0 [ 30.145101] print_report+0x118/0x608 [ 30.145226] kasan_report+0xdc/0x128 [ 30.145345] kasan_check_range+0x100/0x1a8 [ 30.145467] __kasan_check_write+0x20/0x30 [ 30.145587] kasan_atomics_helper+0x1190/0x4858 [ 30.145712] kasan_atomics+0x198/0x2e8 [ 30.145829] kunit_try_run_case+0x170/0x3f0 [ 30.146255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.146399] kthread+0x318/0x620 [ 30.146516] ret_from_fork+0x10/0x20 [ 30.146630] [ 30.154397] Allocated by task 254: [ 30.154726] kasan_save_stack+0x3c/0x68 [ 30.157300] kasan_save_track+0x20/0x40 [ 30.158670] kasan_save_alloc_info+0x40/0x58 [ 30.159653] __kasan_kmalloc+0xd4/0xd8 [ 30.160299] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.161039] kasan_atomics+0xb8/0x2e8 [ 30.161757] kunit_try_run_case+0x170/0x3f0 [ 30.162498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.163305] kthread+0x318/0x620 [ 30.163999] ret_from_fork+0x10/0x20 [ 30.164638] [ 30.164954] The buggy address belongs to the object at fff00000c65edb80 [ 30.164954] which belongs to the cache kmalloc-64 of size 64 [ 30.166034] The buggy address is located 0 bytes to the right of [ 30.166034] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.167228] [ 30.167554] The buggy address belongs to the physical page: [ 30.168309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.169234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.170082] page_type: f5(slab) [ 30.170662] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.171427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.172296] page dumped because: kasan: bad access detected [ 30.172954] [ 30.173304] Memory state around the buggy address: [ 30.173864] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.174649] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.175368] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.176117] ^ [ 30.176854] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.177680] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.178464] ================================================================== [ 28.667746] ================================================================== [ 28.668514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 28.670728] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.673051] [ 28.675006] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.675276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.675355] Hardware name: linux,dummy-virt (DT) [ 28.675441] Call trace: [ 28.675507] show_stack+0x20/0x38 (C) [ 28.675639] dump_stack_lvl+0x8c/0xd0 [ 28.675773] print_report+0x118/0x608 [ 28.675924] kasan_report+0xdc/0x128 [ 28.676057] kasan_check_range+0x100/0x1a8 [ 28.676184] __kasan_check_write+0x20/0x30 [ 28.676313] kasan_atomics_helper+0x7cc/0x4858 [ 28.676456] kasan_atomics+0x198/0x2e8 [ 28.676582] kunit_try_run_case+0x170/0x3f0 [ 28.676712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.676851] kthread+0x318/0x620 [ 28.677362] ret_from_fork+0x10/0x20 [ 28.677498] [ 28.694717] Allocated by task 254: [ 28.697422] kasan_save_stack+0x3c/0x68 [ 28.698809] kasan_save_track+0x20/0x40 [ 28.699314] kasan_save_alloc_info+0x40/0x58 [ 28.699756] __kasan_kmalloc+0xd4/0xd8 [ 28.702021] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.703078] kasan_atomics+0xb8/0x2e8 [ 28.703595] kunit_try_run_case+0x170/0x3f0 [ 28.705480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.706748] kthread+0x318/0x620 [ 28.707154] ret_from_fork+0x10/0x20 [ 28.707560] [ 28.707810] The buggy address belongs to the object at fff00000c65edb80 [ 28.707810] which belongs to the cache kmalloc-64 of size 64 [ 28.710795] The buggy address is located 0 bytes to the right of [ 28.710795] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.713471] [ 28.713784] The buggy address belongs to the physical page: [ 28.716631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.720041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.721005] page_type: f5(slab) [ 28.721488] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.723183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.723771] page dumped because: kasan: bad access detected [ 28.725264] [ 28.726206] Memory state around the buggy address: [ 28.726785] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.727577] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.731998] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.734396] ^ [ 28.735598] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.736366] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.738237] ================================================================== [ 29.797051] ================================================================== [ 29.798354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 29.799160] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.799921] [ 29.800211] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.800402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.800467] Hardware name: linux,dummy-virt (DT) [ 29.800545] Call trace: [ 29.800598] show_stack+0x20/0x38 (C) [ 29.800723] dump_stack_lvl+0x8c/0xd0 [ 29.800859] print_report+0x118/0x608 [ 29.801042] kasan_report+0xdc/0x128 [ 29.801179] __asan_report_store8_noabort+0x20/0x30 [ 29.801309] kasan_atomics_helper+0x3e5c/0x4858 [ 29.801452] kasan_atomics+0x198/0x2e8 [ 29.801662] kunit_try_run_case+0x170/0x3f0 [ 29.801865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.802019] kthread+0x318/0x620 [ 29.802135] ret_from_fork+0x10/0x20 [ 29.802286] [ 29.811708] Allocated by task 254: [ 29.812228] kasan_save_stack+0x3c/0x68 [ 29.812739] kasan_save_track+0x20/0x40 [ 29.813331] kasan_save_alloc_info+0x40/0x58 [ 29.814241] __kasan_kmalloc+0xd4/0xd8 [ 29.815210] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.815868] kasan_atomics+0xb8/0x2e8 [ 29.816763] kunit_try_run_case+0x170/0x3f0 [ 29.818147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.819099] kthread+0x318/0x620 [ 29.820439] ret_from_fork+0x10/0x20 [ 29.821402] [ 29.821634] The buggy address belongs to the object at fff00000c65edb80 [ 29.821634] which belongs to the cache kmalloc-64 of size 64 [ 29.823804] The buggy address is located 0 bytes to the right of [ 29.823804] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.825093] [ 29.825708] The buggy address belongs to the physical page: [ 29.826619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.827389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.828548] page_type: f5(slab) [ 29.830368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.831456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.832133] page dumped because: kasan: bad access detected [ 29.832662] [ 29.833476] Memory state around the buggy address: [ 29.834015] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.835246] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.835805] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.836985] ^ [ 29.837839] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.838764] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.839456] ================================================================== [ 30.423335] ================================================================== [ 30.423950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 30.424742] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.425766] [ 30.426131] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.426393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.426482] Hardware name: linux,dummy-virt (DT) [ 30.426581] Call trace: [ 30.426688] show_stack+0x20/0x38 (C) [ 30.426916] dump_stack_lvl+0x8c/0xd0 [ 30.427060] print_report+0x118/0x608 [ 30.427205] kasan_report+0xdc/0x128 [ 30.427365] kasan_check_range+0x100/0x1a8 [ 30.427475] __kasan_check_write+0x20/0x30 [ 30.427586] kasan_atomics_helper+0x14e4/0x4858 [ 30.427708] kasan_atomics+0x198/0x2e8 [ 30.427849] kunit_try_run_case+0x170/0x3f0 [ 30.428012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.428137] kthread+0x318/0x620 [ 30.428198] ret_from_fork+0x10/0x20 [ 30.428260] [ 30.435046] Allocated by task 254: [ 30.435629] kasan_save_stack+0x3c/0x68 [ 30.436809] kasan_save_track+0x20/0x40 [ 30.437412] kasan_save_alloc_info+0x40/0x58 [ 30.438409] __kasan_kmalloc+0xd4/0xd8 [ 30.438987] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.439742] kasan_atomics+0xb8/0x2e8 [ 30.440387] kunit_try_run_case+0x170/0x3f0 [ 30.441068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.441785] kthread+0x318/0x620 [ 30.442263] ret_from_fork+0x10/0x20 [ 30.442939] [ 30.443415] The buggy address belongs to the object at fff00000c65edb80 [ 30.443415] which belongs to the cache kmalloc-64 of size 64 [ 30.444517] The buggy address is located 0 bytes to the right of [ 30.444517] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.445799] [ 30.446184] The buggy address belongs to the physical page: [ 30.446841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.447688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.448505] page_type: f5(slab) [ 30.449040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.449907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.450624] page dumped because: kasan: bad access detected [ 30.451250] [ 30.451648] Memory state around the buggy address: [ 30.452261] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.453086] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.453812] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.454629] ^ [ 30.455296] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.456081] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.456821] ================================================================== [ 27.892397] ================================================================== [ 27.894407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 27.896932] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 27.898763] [ 27.899463] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 27.900080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.900153] Hardware name: linux,dummy-virt (DT) [ 27.900233] Call trace: [ 27.900289] show_stack+0x20/0x38 (C) [ 27.900421] dump_stack_lvl+0x8c/0xd0 [ 27.900534] print_report+0x118/0x608 [ 27.900652] kasan_report+0xdc/0x128 [ 27.900762] kasan_check_range+0x100/0x1a8 [ 27.900876] __kasan_check_read+0x20/0x30 [ 27.901057] kasan_atomics_helper+0x1ec/0x4858 [ 27.901181] kasan_atomics+0x198/0x2e8 [ 27.901292] kunit_try_run_case+0x170/0x3f0 [ 27.901412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.901536] kthread+0x318/0x620 [ 27.901648] ret_from_fork+0x10/0x20 [ 27.901764] [ 27.912824] Allocated by task 254: [ 27.915713] kasan_save_stack+0x3c/0x68 [ 27.916675] kasan_save_track+0x20/0x40 [ 27.918566] kasan_save_alloc_info+0x40/0x58 [ 27.919521] __kasan_kmalloc+0xd4/0xd8 [ 27.920818] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.922314] kasan_atomics+0xb8/0x2e8 [ 27.923620] kunit_try_run_case+0x170/0x3f0 [ 27.924999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.926281] kthread+0x318/0x620 [ 27.926649] ret_from_fork+0x10/0x20 [ 27.927036] [ 27.927276] The buggy address belongs to the object at fff00000c65edb80 [ 27.927276] which belongs to the cache kmalloc-64 of size 64 [ 27.929499] The buggy address is located 0 bytes to the right of [ 27.929499] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 27.933278] [ 27.934269] The buggy address belongs to the physical page: [ 27.935958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 27.938157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.940125] page_type: f5(slab) [ 27.941269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.941859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.942442] page dumped because: kasan: bad access detected [ 27.943945] [ 27.944465] Memory state around the buggy address: [ 27.946175] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.948417] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.950662] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.952707] ^ [ 27.954285] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.955778] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.957858] ================================================================== [ 28.236448] ================================================================== [ 28.236993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 28.237528] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.238618] [ 28.239014] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.239229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.239314] Hardware name: linux,dummy-virt (DT) [ 28.239410] Call trace: [ 28.239524] show_stack+0x20/0x38 (C) [ 28.239644] dump_stack_lvl+0x8c/0xd0 [ 28.239754] print_report+0x118/0x608 [ 28.239867] kasan_report+0xdc/0x128 [ 28.239994] kasan_check_range+0x100/0x1a8 [ 28.240093] __kasan_check_write+0x20/0x30 [ 28.240194] kasan_atomics_helper+0x414/0x4858 [ 28.240301] kasan_atomics+0x198/0x2e8 [ 28.240403] kunit_try_run_case+0x170/0x3f0 [ 28.240504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.240620] kthread+0x318/0x620 [ 28.240721] ret_from_fork+0x10/0x20 [ 28.240824] [ 28.248756] Allocated by task 254: [ 28.249200] kasan_save_stack+0x3c/0x68 [ 28.249584] kasan_save_track+0x20/0x40 [ 28.253102] kasan_save_alloc_info+0x40/0x58 [ 28.253777] __kasan_kmalloc+0xd4/0xd8 [ 28.254343] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.256238] kasan_atomics+0xb8/0x2e8 [ 28.256851] kunit_try_run_case+0x170/0x3f0 [ 28.257566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.258356] kthread+0x318/0x620 [ 28.259073] ret_from_fork+0x10/0x20 [ 28.259624] [ 28.260098] The buggy address belongs to the object at fff00000c65edb80 [ 28.260098] which belongs to the cache kmalloc-64 of size 64 [ 28.261563] The buggy address is located 0 bytes to the right of [ 28.261563] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.263665] [ 28.264389] The buggy address belongs to the physical page: [ 28.264816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.265406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.266931] page_type: f5(slab) [ 28.267718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.268611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.269534] page dumped because: kasan: bad access detected [ 28.270135] [ 28.270435] Memory state around the buggy address: [ 28.271303] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.272169] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.272862] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.273526] ^ [ 28.274955] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.275976] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.276603] ================================================================== [ 30.087057] ================================================================== [ 30.087921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 30.089687] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.090301] [ 30.090562] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.090749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.090817] Hardware name: linux,dummy-virt (DT) [ 30.090913] Call trace: [ 30.090973] show_stack+0x20/0x38 (C) [ 30.091091] dump_stack_lvl+0x8c/0xd0 [ 30.091200] print_report+0x118/0x608 [ 30.091316] kasan_report+0xdc/0x128 [ 30.091415] kasan_check_range+0x100/0x1a8 [ 30.091515] __kasan_check_write+0x20/0x30 [ 30.091613] kasan_atomics_helper+0x1128/0x4858 [ 30.091721] kasan_atomics+0x198/0x2e8 [ 30.091819] kunit_try_run_case+0x170/0x3f0 [ 30.092709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.092791] kthread+0x318/0x620 [ 30.092851] ret_from_fork+0x10/0x20 [ 30.092945] [ 30.100879] Allocated by task 254: [ 30.101412] kasan_save_stack+0x3c/0x68 [ 30.102014] kasan_save_track+0x20/0x40 [ 30.102595] kasan_save_alloc_info+0x40/0x58 [ 30.103262] __kasan_kmalloc+0xd4/0xd8 [ 30.103803] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.104615] kasan_atomics+0xb8/0x2e8 [ 30.106149] kunit_try_run_case+0x170/0x3f0 [ 30.108048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.109458] kthread+0x318/0x620 [ 30.110420] ret_from_fork+0x10/0x20 [ 30.111284] [ 30.112201] The buggy address belongs to the object at fff00000c65edb80 [ 30.112201] which belongs to the cache kmalloc-64 of size 64 [ 30.113419] The buggy address is located 0 bytes to the right of [ 30.113419] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.116528] [ 30.117705] The buggy address belongs to the physical page: [ 30.119492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.121337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.121867] page_type: f5(slab) [ 30.123804] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.125705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.127840] page dumped because: kasan: bad access detected [ 30.128513] [ 30.128751] Memory state around the buggy address: [ 30.130608] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.132301] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.132983] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.133600] ^ [ 30.134361] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.135061] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.135762] ================================================================== [ 29.062302] ================================================================== [ 29.065762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 29.068431] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.071290] [ 29.071928] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.072137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.072215] Hardware name: linux,dummy-virt (DT) [ 29.072300] Call trace: [ 29.072366] show_stack+0x20/0x38 (C) [ 29.072503] dump_stack_lvl+0x8c/0xd0 [ 29.072632] print_report+0x118/0x608 [ 29.072762] kasan_report+0xdc/0x128 [ 29.072915] kasan_check_range+0x100/0x1a8 [ 29.073046] __kasan_check_write+0x20/0x30 [ 29.073181] kasan_atomics_helper+0xa6c/0x4858 [ 29.073323] kasan_atomics+0x198/0x2e8 [ 29.073454] kunit_try_run_case+0x170/0x3f0 [ 29.073582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.073724] kthread+0x318/0x620 [ 29.073850] ret_from_fork+0x10/0x20 [ 29.074654] [ 29.088924] Allocated by task 254: [ 29.089318] kasan_save_stack+0x3c/0x68 [ 29.089752] kasan_save_track+0x20/0x40 [ 29.092755] kasan_save_alloc_info+0x40/0x58 [ 29.094312] __kasan_kmalloc+0xd4/0xd8 [ 29.095384] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.096877] kasan_atomics+0xb8/0x2e8 [ 29.098267] kunit_try_run_case+0x170/0x3f0 [ 29.099730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.101433] kthread+0x318/0x620 [ 29.102737] ret_from_fork+0x10/0x20 [ 29.103877] [ 29.104156] The buggy address belongs to the object at fff00000c65edb80 [ 29.104156] which belongs to the cache kmalloc-64 of size 64 [ 29.106447] The buggy address is located 0 bytes to the right of [ 29.106447] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.109680] [ 29.110603] The buggy address belongs to the physical page: [ 29.112338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.113711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.116028] page_type: f5(slab) [ 29.117319] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.118337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.118944] page dumped because: kasan: bad access detected [ 29.119407] [ 29.119664] Memory state around the buggy address: [ 29.122555] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.124940] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.126678] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.128612] ^ [ 29.130262] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.132380] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.133689] ================================================================== [ 28.945560] ================================================================== [ 28.948196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 28.948765] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.952404] [ 28.952695] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.953281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.953367] Hardware name: linux,dummy-virt (DT) [ 28.953453] Call trace: [ 28.953519] show_stack+0x20/0x38 (C) [ 28.953655] dump_stack_lvl+0x8c/0xd0 [ 28.953786] print_report+0x118/0x608 [ 28.953937] kasan_report+0xdc/0x128 [ 28.954080] kasan_check_range+0x100/0x1a8 [ 28.954244] __kasan_check_write+0x20/0x30 [ 28.954386] kasan_atomics_helper+0x99c/0x4858 [ 28.954534] kasan_atomics+0x198/0x2e8 [ 28.954674] kunit_try_run_case+0x170/0x3f0 [ 28.954808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.956775] kthread+0x318/0x620 [ 28.956922] ret_from_fork+0x10/0x20 [ 28.957056] [ 28.969578] Allocated by task 254: [ 28.970535] kasan_save_stack+0x3c/0x68 [ 28.975507] kasan_save_track+0x20/0x40 [ 28.976312] kasan_save_alloc_info+0x40/0x58 [ 28.979176] __kasan_kmalloc+0xd4/0xd8 [ 28.979603] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.980324] kasan_atomics+0xb8/0x2e8 [ 28.981099] kunit_try_run_case+0x170/0x3f0 [ 28.982598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.984536] kthread+0x318/0x620 [ 28.985755] ret_from_fork+0x10/0x20 [ 28.986595] [ 28.987248] The buggy address belongs to the object at fff00000c65edb80 [ 28.987248] which belongs to the cache kmalloc-64 of size 64 [ 28.991134] The buggy address is located 0 bytes to the right of [ 28.991134] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.992034] [ 28.992276] The buggy address belongs to the physical page: [ 28.992692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.994275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.995419] page_type: f5(slab) [ 28.996086] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.997489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.998694] page dumped because: kasan: bad access detected [ 28.999599] [ 28.999991] Memory state around the buggy address: [ 29.000980] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.002111] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.003106] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.003939] ^ [ 29.004856] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.007957] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.008786] ================================================================== [ 29.842048] ================================================================== [ 29.842737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 29.843589] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.844512] [ 29.844811] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.845507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.845579] Hardware name: linux,dummy-virt (DT) [ 29.845652] Call trace: [ 29.845711] show_stack+0x20/0x38 (C) [ 29.845839] dump_stack_lvl+0x8c/0xd0 [ 29.846033] print_report+0x118/0x608 [ 29.846584] kasan_report+0xdc/0x128 [ 29.846716] kasan_check_range+0x100/0x1a8 [ 29.846841] __kasan_check_write+0x20/0x30 [ 29.846984] kasan_atomics_helper+0xeb8/0x4858 [ 29.847110] kasan_atomics+0x198/0x2e8 [ 29.847235] kunit_try_run_case+0x170/0x3f0 [ 29.849405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.849546] kthread+0x318/0x620 [ 29.849702] ret_from_fork+0x10/0x20 [ 29.849825] [ 29.864211] Allocated by task 254: [ 29.864569] kasan_save_stack+0x3c/0x68 [ 29.865300] kasan_save_track+0x20/0x40 [ 29.865954] kasan_save_alloc_info+0x40/0x58 [ 29.866484] __kasan_kmalloc+0xd4/0xd8 [ 29.867096] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.867615] kasan_atomics+0xb8/0x2e8 [ 29.870016] kunit_try_run_case+0x170/0x3f0 [ 29.870807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.871522] kthread+0x318/0x620 [ 29.873083] ret_from_fork+0x10/0x20 [ 29.874079] [ 29.874436] The buggy address belongs to the object at fff00000c65edb80 [ 29.874436] which belongs to the cache kmalloc-64 of size 64 [ 29.876441] The buggy address is located 0 bytes to the right of [ 29.876441] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.877701] [ 29.878022] The buggy address belongs to the physical page: [ 29.878500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.879187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.880541] page_type: f5(slab) [ 29.881406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.882404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.883398] page dumped because: kasan: bad access detected [ 29.884214] [ 29.884728] Memory state around the buggy address: [ 29.885121] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.885661] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.886967] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.887685] ^ [ 29.888552] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.889420] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.889990] ================================================================== [ 30.625424] ================================================================== [ 30.626119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 30.627078] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.627840] [ 30.628235] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.628449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.628532] Hardware name: linux,dummy-virt (DT) [ 30.628632] Call trace: [ 30.628700] show_stack+0x20/0x38 (C) [ 30.628845] dump_stack_lvl+0x8c/0xd0 [ 30.629008] print_report+0x118/0x608 [ 30.629235] kasan_report+0xdc/0x128 [ 30.629381] kasan_check_range+0x100/0x1a8 [ 30.629517] __kasan_check_write+0x20/0x30 [ 30.629629] kasan_atomics_helper+0x16d0/0x4858 [ 30.629694] kasan_atomics+0x198/0x2e8 [ 30.629754] kunit_try_run_case+0x170/0x3f0 [ 30.629811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.629876] kthread+0x318/0x620 [ 30.629969] ret_from_fork+0x10/0x20 [ 30.630031] [ 30.636368] Allocated by task 254: [ 30.636832] kasan_save_stack+0x3c/0x68 [ 30.637457] kasan_save_track+0x20/0x40 [ 30.638092] kasan_save_alloc_info+0x40/0x58 [ 30.638674] __kasan_kmalloc+0xd4/0xd8 [ 30.639145] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.639789] kasan_atomics+0xb8/0x2e8 [ 30.640408] kunit_try_run_case+0x170/0x3f0 [ 30.640970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.641648] kthread+0x318/0x620 [ 30.642211] ret_from_fork+0x10/0x20 [ 30.643227] [ 30.643509] The buggy address belongs to the object at fff00000c65edb80 [ 30.643509] which belongs to the cache kmalloc-64 of size 64 [ 30.645646] The buggy address is located 0 bytes to the right of [ 30.645646] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.648941] [ 30.649206] The buggy address belongs to the physical page: [ 30.649679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.652384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.654120] page_type: f5(slab) [ 30.655308] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.656316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.657264] page dumped because: kasan: bad access detected [ 30.657868] [ 30.658455] Memory state around the buggy address: [ 30.659029] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.659851] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.660571] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.661499] ^ [ 30.662286] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.663167] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.664021] ================================================================== [ 30.765697] ================================================================== [ 30.766562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 30.767344] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.768254] [ 30.768629] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.768898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.768983] Hardware name: linux,dummy-virt (DT) [ 30.769094] Call trace: [ 30.769169] show_stack+0x20/0x38 (C) [ 30.769362] dump_stack_lvl+0x8c/0xd0 [ 30.769508] print_report+0x118/0x608 [ 30.769589] kasan_report+0xdc/0x128 [ 30.769648] kasan_check_range+0x100/0x1a8 [ 30.769706] __kasan_check_write+0x20/0x30 [ 30.769761] kasan_atomics_helper+0x17ec/0x4858 [ 30.769823] kasan_atomics+0x198/0x2e8 [ 30.769878] kunit_try_run_case+0x170/0x3f0 [ 30.769974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.770039] kthread+0x318/0x620 [ 30.770097] ret_from_fork+0x10/0x20 [ 30.770156] [ 30.776806] Allocated by task 254: [ 30.777377] kasan_save_stack+0x3c/0x68 [ 30.777967] kasan_save_track+0x20/0x40 [ 30.778563] kasan_save_alloc_info+0x40/0x58 [ 30.779148] __kasan_kmalloc+0xd4/0xd8 [ 30.779754] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.780378] kasan_atomics+0xb8/0x2e8 [ 30.781009] kunit_try_run_case+0x170/0x3f0 [ 30.781595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.782360] kthread+0x318/0x620 [ 30.782932] ret_from_fork+0x10/0x20 [ 30.783493] [ 30.783821] The buggy address belongs to the object at fff00000c65edb80 [ 30.783821] which belongs to the cache kmalloc-64 of size 64 [ 30.784973] The buggy address is located 0 bytes to the right of [ 30.784973] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.786250] [ 30.786656] The buggy address belongs to the physical page: [ 30.787595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.788361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.789243] page_type: f5(slab) [ 30.789684] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.790467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.791342] page dumped because: kasan: bad access detected [ 30.791614] [ 30.791748] Memory state around the buggy address: [ 30.792090] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.792693] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.793874] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.794700] ^ [ 30.795258] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.796038] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.796788] ================================================================== [ 28.282097] ================================================================== [ 28.283484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 28.286274] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.287587] [ 28.287859] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.288066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.288134] Hardware name: linux,dummy-virt (DT) [ 28.288214] Call trace: [ 28.288271] show_stack+0x20/0x38 (C) [ 28.288391] dump_stack_lvl+0x8c/0xd0 [ 28.288508] print_report+0x118/0x608 [ 28.288622] kasan_report+0xdc/0x128 [ 28.288738] kasan_check_range+0x100/0x1a8 [ 28.288849] __kasan_check_write+0x20/0x30 [ 28.289633] kasan_atomics_helper+0x47c/0x4858 [ 28.289756] kasan_atomics+0x198/0x2e8 [ 28.289875] kunit_try_run_case+0x170/0x3f0 [ 28.290013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.290145] kthread+0x318/0x620 [ 28.290276] ret_from_fork+0x10/0x20 [ 28.290402] [ 28.303990] Allocated by task 254: [ 28.304471] kasan_save_stack+0x3c/0x68 [ 28.305005] kasan_save_track+0x20/0x40 [ 28.305451] kasan_save_alloc_info+0x40/0x58 [ 28.306081] __kasan_kmalloc+0xd4/0xd8 [ 28.306657] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.307209] kasan_atomics+0xb8/0x2e8 [ 28.307976] kunit_try_run_case+0x170/0x3f0 [ 28.308527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.309144] kthread+0x318/0x620 [ 28.310372] ret_from_fork+0x10/0x20 [ 28.310742] [ 28.311098] The buggy address belongs to the object at fff00000c65edb80 [ 28.311098] which belongs to the cache kmalloc-64 of size 64 [ 28.312264] The buggy address is located 0 bytes to the right of [ 28.312264] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.313393] [ 28.313989] The buggy address belongs to the physical page: [ 28.314684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.315781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.316728] page_type: f5(slab) [ 28.317245] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.318304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.319328] page dumped because: kasan: bad access detected [ 28.320013] [ 28.320570] Memory state around the buggy address: [ 28.321544] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.322065] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.323026] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.324231] ^ [ 28.325298] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.326114] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.327535] ================================================================== [ 29.384857] ================================================================== [ 29.386299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 29.387207] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.389732] [ 29.390026] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.390242] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.390313] Hardware name: linux,dummy-virt (DT) [ 29.390392] Call trace: [ 29.390449] show_stack+0x20/0x38 (C) [ 29.390573] dump_stack_lvl+0x8c/0xd0 [ 29.390696] print_report+0x118/0x608 [ 29.390813] kasan_report+0xdc/0x128 [ 29.391772] kasan_check_range+0x100/0x1a8 [ 29.391923] __kasan_check_write+0x20/0x30 [ 29.392042] kasan_atomics_helper+0xc08/0x4858 [ 29.392163] kasan_atomics+0x198/0x2e8 [ 29.392281] kunit_try_run_case+0x170/0x3f0 [ 29.392399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.392535] kthread+0x318/0x620 [ 29.392653] ret_from_fork+0x10/0x20 [ 29.392777] [ 29.404183] Allocated by task 254: [ 29.404692] kasan_save_stack+0x3c/0x68 [ 29.406187] kasan_save_track+0x20/0x40 [ 29.406589] kasan_save_alloc_info+0x40/0x58 [ 29.407026] __kasan_kmalloc+0xd4/0xd8 [ 29.407431] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.407854] kasan_atomics+0xb8/0x2e8 [ 29.409188] kunit_try_run_case+0x170/0x3f0 [ 29.409819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.412379] kthread+0x318/0x620 [ 29.413650] ret_from_fork+0x10/0x20 [ 29.414150] [ 29.414410] The buggy address belongs to the object at fff00000c65edb80 [ 29.414410] which belongs to the cache kmalloc-64 of size 64 [ 29.416702] The buggy address is located 0 bytes to the right of [ 29.416702] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.417766] [ 29.418467] The buggy address belongs to the physical page: [ 29.419957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.421672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.422598] page_type: f5(slab) [ 29.424290] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.425376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.426783] page dumped because: kasan: bad access detected [ 29.427811] [ 29.428562] Memory state around the buggy address: [ 29.429174] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.429828] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.431524] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.433809] ^ [ 29.434491] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.435099] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.435625] ================================================================== [ 29.260740] ================================================================== [ 29.261511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 29.265408] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.266341] [ 29.266618] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.266816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.266911] Hardware name: linux,dummy-virt (DT) [ 29.267723] Call trace: [ 29.267790] show_stack+0x20/0x38 (C) [ 29.267995] dump_stack_lvl+0x8c/0xd0 [ 29.268130] print_report+0x118/0x608 [ 29.268252] kasan_report+0xdc/0x128 [ 29.268367] kasan_check_range+0x100/0x1a8 [ 29.268486] __kasan_check_write+0x20/0x30 [ 29.268603] kasan_atomics_helper+0xb70/0x4858 [ 29.268723] kasan_atomics+0x198/0x2e8 [ 29.268847] kunit_try_run_case+0x170/0x3f0 [ 29.269000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.269127] kthread+0x318/0x620 [ 29.269232] ret_from_fork+0x10/0x20 [ 29.269357] [ 29.284145] Allocated by task 254: [ 29.285254] kasan_save_stack+0x3c/0x68 [ 29.285824] kasan_save_track+0x20/0x40 [ 29.286392] kasan_save_alloc_info+0x40/0x58 [ 29.288116] __kasan_kmalloc+0xd4/0xd8 [ 29.288654] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.290156] kasan_atomics+0xb8/0x2e8 [ 29.290955] kunit_try_run_case+0x170/0x3f0 [ 29.291480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.295394] kthread+0x318/0x620 [ 29.296218] ret_from_fork+0x10/0x20 [ 29.297119] [ 29.297353] The buggy address belongs to the object at fff00000c65edb80 [ 29.297353] which belongs to the cache kmalloc-64 of size 64 [ 29.298234] The buggy address is located 0 bytes to the right of [ 29.298234] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.301067] [ 29.301932] The buggy address belongs to the physical page: [ 29.302676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.304508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.305725] page_type: f5(slab) [ 29.306809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.308481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.309682] page dumped because: kasan: bad access detected [ 29.310802] [ 29.312099] Memory state around the buggy address: [ 29.312661] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.313335] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.313879] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.316931] ^ [ 29.317513] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.319806] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.320467] ================================================================== [ 30.666293] ================================================================== [ 30.666977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 30.667733] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.668469] [ 30.668855] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.669149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.669231] Hardware name: linux,dummy-virt (DT) [ 30.669364] Call trace: [ 30.669434] show_stack+0x20/0x38 (C) [ 30.669558] dump_stack_lvl+0x8c/0xd0 [ 30.669623] print_report+0x118/0x608 [ 30.669685] kasan_report+0xdc/0x128 [ 30.669743] __asan_report_load8_noabort+0x20/0x30 [ 30.669804] kasan_atomics_helper+0x3e10/0x4858 [ 30.669866] kasan_atomics+0x198/0x2e8 [ 30.669956] kunit_try_run_case+0x170/0x3f0 [ 30.670018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.670084] kthread+0x318/0x620 [ 30.670140] ret_from_fork+0x10/0x20 [ 30.670217] [ 30.676816] Allocated by task 254: [ 30.677420] kasan_save_stack+0x3c/0x68 [ 30.677975] kasan_save_track+0x20/0x40 [ 30.678634] kasan_save_alloc_info+0x40/0x58 [ 30.679310] __kasan_kmalloc+0xd4/0xd8 [ 30.679841] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.680496] kasan_atomics+0xb8/0x2e8 [ 30.681113] kunit_try_run_case+0x170/0x3f0 [ 30.681671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.682434] kthread+0x318/0x620 [ 30.682958] ret_from_fork+0x10/0x20 [ 30.683532] [ 30.683902] The buggy address belongs to the object at fff00000c65edb80 [ 30.683902] which belongs to the cache kmalloc-64 of size 64 [ 30.684970] The buggy address is located 0 bytes to the right of [ 30.684970] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.686313] [ 30.686643] The buggy address belongs to the physical page: [ 30.687382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.688332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.689085] page_type: f5(slab) [ 30.689795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.690679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.691560] page dumped because: kasan: bad access detected [ 30.692133] [ 30.692419] Memory state around the buggy address: [ 30.692984] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.693654] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.694356] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.695115] ^ [ 30.695852] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.696735] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.697542] ================================================================== [ 29.567751] ================================================================== [ 29.570311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 29.571175] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.571811] [ 29.574479] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.574684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.574758] Hardware name: linux,dummy-virt (DT) [ 29.574843] Call trace: [ 29.574925] show_stack+0x20/0x38 (C) [ 29.575057] dump_stack_lvl+0x8c/0xd0 [ 29.575190] print_report+0x118/0x608 [ 29.575319] kasan_report+0xdc/0x128 [ 29.575439] kasan_check_range+0x100/0x1a8 [ 29.575562] __kasan_check_write+0x20/0x30 [ 29.575679] kasan_atomics_helper+0xd3c/0x4858 [ 29.575794] kasan_atomics+0x198/0x2e8 [ 29.575941] kunit_try_run_case+0x170/0x3f0 [ 29.576068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.576201] kthread+0x318/0x620 [ 29.576320] ret_from_fork+0x10/0x20 [ 29.576444] [ 29.589675] Allocated by task 254: [ 29.591527] kasan_save_stack+0x3c/0x68 [ 29.592225] kasan_save_track+0x20/0x40 [ 29.592616] kasan_save_alloc_info+0x40/0x58 [ 29.594076] __kasan_kmalloc+0xd4/0xd8 [ 29.594856] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.595304] kasan_atomics+0xb8/0x2e8 [ 29.597468] kunit_try_run_case+0x170/0x3f0 [ 29.598372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.599858] kthread+0x318/0x620 [ 29.600700] ret_from_fork+0x10/0x20 [ 29.601521] [ 29.601975] The buggy address belongs to the object at fff00000c65edb80 [ 29.601975] which belongs to the cache kmalloc-64 of size 64 [ 29.604004] The buggy address is located 0 bytes to the right of [ 29.604004] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.605537] [ 29.605798] The buggy address belongs to the physical page: [ 29.607151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.608186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.609229] page_type: f5(slab) [ 29.609714] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.610609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.611415] page dumped because: kasan: bad access detected [ 29.614639] [ 29.614975] Memory state around the buggy address: [ 29.615436] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.616024] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.616726] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.617691] ^ [ 29.618345] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.618951] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.619832] ================================================================== [ 28.873910] ================================================================== [ 28.874441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 28.877197] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.877994] [ 28.878300] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.878460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.878518] Hardware name: linux,dummy-virt (DT) [ 28.878588] Call trace: [ 28.878634] show_stack+0x20/0x38 (C) [ 28.878735] dump_stack_lvl+0x8c/0xd0 [ 28.878828] print_report+0x118/0x608 [ 28.881284] kasan_report+0xdc/0x128 [ 28.881407] kasan_check_range+0x100/0x1a8 [ 28.881524] __kasan_check_write+0x20/0x30 [ 28.881629] kasan_atomics_helper+0x934/0x4858 [ 28.881747] kasan_atomics+0x198/0x2e8 [ 28.881859] kunit_try_run_case+0x170/0x3f0 [ 28.881996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.882121] kthread+0x318/0x620 [ 28.882239] ret_from_fork+0x10/0x20 [ 28.882349] [ 28.896279] Allocated by task 254: [ 28.897010] kasan_save_stack+0x3c/0x68 [ 28.899756] kasan_save_track+0x20/0x40 [ 28.901231] kasan_save_alloc_info+0x40/0x58 [ 28.901670] __kasan_kmalloc+0xd4/0xd8 [ 28.902096] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.902550] kasan_atomics+0xb8/0x2e8 [ 28.903919] kunit_try_run_case+0x170/0x3f0 [ 28.904817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.906220] kthread+0x318/0x620 [ 28.908674] ret_from_fork+0x10/0x20 [ 28.909146] [ 28.909423] The buggy address belongs to the object at fff00000c65edb80 [ 28.909423] which belongs to the cache kmalloc-64 of size 64 [ 28.914560] The buggy address is located 0 bytes to the right of [ 28.914560] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.915452] [ 28.915718] The buggy address belongs to the physical page: [ 28.916658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.918798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.921921] page_type: f5(slab) [ 28.923387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.925393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.927514] page dumped because: kasan: bad access detected [ 28.928511] [ 28.928765] Memory state around the buggy address: [ 28.929218] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.929790] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.932606] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.935923] ^ [ 28.938116] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.938698] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.940934] ================================================================== [ 30.045740] ================================================================== [ 30.046806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 30.047791] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.048383] [ 30.048654] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.048990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.049121] Hardware name: linux,dummy-virt (DT) [ 30.049196] Call trace: [ 30.049253] show_stack+0x20/0x38 (C) [ 30.049387] dump_stack_lvl+0x8c/0xd0 [ 30.049560] print_report+0x118/0x608 [ 30.049670] kasan_report+0xdc/0x128 [ 30.049770] kasan_check_range+0x100/0x1a8 [ 30.049912] __kasan_check_write+0x20/0x30 [ 30.050032] kasan_atomics_helper+0x10c0/0x4858 [ 30.050148] kasan_atomics+0x198/0x2e8 [ 30.050271] kunit_try_run_case+0x170/0x3f0 [ 30.050389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.050516] kthread+0x318/0x620 [ 30.050627] ret_from_fork+0x10/0x20 [ 30.050741] [ 30.063257] Allocated by task 254: [ 30.063601] kasan_save_stack+0x3c/0x68 [ 30.064247] kasan_save_track+0x20/0x40 [ 30.064647] kasan_save_alloc_info+0x40/0x58 [ 30.065033] __kasan_kmalloc+0xd4/0xd8 [ 30.065371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.065909] kasan_atomics+0xb8/0x2e8 [ 30.066921] kunit_try_run_case+0x170/0x3f0 [ 30.068617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.069350] kthread+0x318/0x620 [ 30.069980] ret_from_fork+0x10/0x20 [ 30.070346] [ 30.070575] The buggy address belongs to the object at fff00000c65edb80 [ 30.070575] which belongs to the cache kmalloc-64 of size 64 [ 30.071438] The buggy address is located 0 bytes to the right of [ 30.071438] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.073513] [ 30.073846] The buggy address belongs to the physical page: [ 30.074515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.076059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.077311] page_type: f5(slab) [ 30.077695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.078326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.079095] page dumped because: kasan: bad access detected [ 30.079571] [ 30.079791] Memory state around the buggy address: [ 30.080442] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.081200] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.081731] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.082262] ^ [ 30.082656] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.083225] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.083823] ================================================================== [ 29.963773] ================================================================== [ 29.964539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 29.965896] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 29.966576] [ 29.966960] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 29.967168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.967249] Hardware name: linux,dummy-virt (DT) [ 29.967348] Call trace: [ 29.967482] show_stack+0x20/0x38 (C) [ 29.967634] dump_stack_lvl+0x8c/0xd0 [ 29.967759] print_report+0x118/0x608 [ 29.967923] kasan_report+0xdc/0x128 [ 29.968044] kasan_check_range+0x100/0x1a8 [ 29.968168] __kasan_check_write+0x20/0x30 [ 29.968286] kasan_atomics_helper+0xff0/0x4858 [ 29.968403] kasan_atomics+0x198/0x2e8 [ 29.968514] kunit_try_run_case+0x170/0x3f0 [ 29.968623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.968747] kthread+0x318/0x620 [ 29.968855] ret_from_fork+0x10/0x20 [ 29.968992] [ 29.978931] Allocated by task 254: [ 29.979320] kasan_save_stack+0x3c/0x68 [ 29.979700] kasan_save_track+0x20/0x40 [ 29.981252] kasan_save_alloc_info+0x40/0x58 [ 29.981943] __kasan_kmalloc+0xd4/0xd8 [ 29.982326] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.982733] kasan_atomics+0xb8/0x2e8 [ 29.983148] kunit_try_run_case+0x170/0x3f0 [ 29.984820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.985793] kthread+0x318/0x620 [ 29.986536] ret_from_fork+0x10/0x20 [ 29.987239] [ 29.987699] The buggy address belongs to the object at fff00000c65edb80 [ 29.987699] which belongs to the cache kmalloc-64 of size 64 [ 29.990062] The buggy address is located 0 bytes to the right of [ 29.990062] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 29.991178] [ 29.991432] The buggy address belongs to the physical page: [ 29.991848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 29.994240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.995159] page_type: f5(slab) [ 29.995592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.996343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.997371] page dumped because: kasan: bad access detected [ 29.998205] [ 29.998606] Memory state around the buggy address: [ 29.999519] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.000595] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.001761] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.002635] ^ [ 30.003084] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.004432] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.005338] ================================================================== [ 30.699670] ================================================================== [ 30.700623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 30.701287] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 30.702319] [ 30.702668] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 30.702989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.703074] Hardware name: linux,dummy-virt (DT) [ 30.703235] Call trace: [ 30.703300] show_stack+0x20/0x38 (C) [ 30.703412] dump_stack_lvl+0x8c/0xd0 [ 30.703527] print_report+0x118/0x608 [ 30.703648] kasan_report+0xdc/0x128 [ 30.703789] kasan_check_range+0x100/0x1a8 [ 30.703939] __kasan_check_write+0x20/0x30 [ 30.704081] kasan_atomics_helper+0x175c/0x4858 [ 30.704179] kasan_atomics+0x198/0x2e8 [ 30.704241] kunit_try_run_case+0x170/0x3f0 [ 30.704302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.704367] kthread+0x318/0x620 [ 30.704422] ret_from_fork+0x10/0x20 [ 30.704485] [ 30.711531] Allocated by task 254: [ 30.712068] kasan_save_stack+0x3c/0x68 [ 30.712646] kasan_save_track+0x20/0x40 [ 30.713381] kasan_save_alloc_info+0x40/0x58 [ 30.714102] __kasan_kmalloc+0xd4/0xd8 [ 30.714685] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.715380] kasan_atomics+0xb8/0x2e8 [ 30.716098] kunit_try_run_case+0x170/0x3f0 [ 30.716686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.717470] kthread+0x318/0x620 [ 30.718040] ret_from_fork+0x10/0x20 [ 30.718627] [ 30.719028] The buggy address belongs to the object at fff00000c65edb80 [ 30.719028] which belongs to the cache kmalloc-64 of size 64 [ 30.720308] The buggy address is located 0 bytes to the right of [ 30.720308] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 30.721542] [ 30.721874] The buggy address belongs to the physical page: [ 30.722483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 30.723392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.724206] page_type: f5(slab) [ 30.724652] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.725420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.726147] page dumped because: kasan: bad access detected [ 30.726813] [ 30.727467] Memory state around the buggy address: [ 30.728156] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.728488] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.728802] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.729136] ^ [ 30.729385] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.729699] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.730033] ================================================================== [ 28.814292] ================================================================== [ 28.815605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 28.817443] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 28.819692] [ 28.820009] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 28.820216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.820287] Hardware name: linux,dummy-virt (DT) [ 28.820376] Call trace: [ 28.820439] show_stack+0x20/0x38 (C) [ 28.820578] dump_stack_lvl+0x8c/0xd0 [ 28.820708] print_report+0x118/0x608 [ 28.820837] kasan_report+0xdc/0x128 [ 28.821715] __asan_report_load4_noabort+0x20/0x30 [ 28.821843] kasan_atomics_helper+0x42d8/0x4858 [ 28.822046] kasan_atomics+0x198/0x2e8 [ 28.822190] kunit_try_run_case+0x170/0x3f0 [ 28.822327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.822466] kthread+0x318/0x620 [ 28.822598] ret_from_fork+0x10/0x20 [ 28.822719] [ 28.834747] Allocated by task 254: [ 28.835180] kasan_save_stack+0x3c/0x68 [ 28.835564] kasan_save_track+0x20/0x40 [ 28.836478] kasan_save_alloc_info+0x40/0x58 [ 28.838561] __kasan_kmalloc+0xd4/0xd8 [ 28.839314] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.840526] kasan_atomics+0xb8/0x2e8 [ 28.841811] kunit_try_run_case+0x170/0x3f0 [ 28.842631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.843626] kthread+0x318/0x620 [ 28.844867] ret_from_fork+0x10/0x20 [ 28.846089] [ 28.846362] The buggy address belongs to the object at fff00000c65edb80 [ 28.846362] which belongs to the cache kmalloc-64 of size 64 [ 28.848730] The buggy address is located 0 bytes to the right of [ 28.848730] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 28.850983] [ 28.851218] The buggy address belongs to the physical page: [ 28.851616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.853687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.855714] page_type: f5(slab) [ 28.856612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.858015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.859551] page dumped because: kasan: bad access detected [ 28.861408] [ 28.861752] Memory state around the buggy address: [ 28.863407] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.864618] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.866816] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.867686] ^ [ 28.869078] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.869780] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.870411] ================================================================== [ 27.963527] ================================================================== [ 27.965834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 27.968672] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254 [ 27.970573] [ 27.971501] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 27.971705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.971775] Hardware name: linux,dummy-virt (DT) [ 27.971856] Call trace: [ 27.971936] show_stack+0x20/0x38 (C) [ 27.972069] dump_stack_lvl+0x8c/0xd0 [ 27.972187] print_report+0x118/0x608 [ 27.972305] kasan_report+0xdc/0x128 [ 27.972421] kasan_check_range+0x100/0x1a8 [ 27.972535] __kasan_check_write+0x20/0x30 [ 27.972647] kasan_atomics_helper+0x24c/0x4858 [ 27.972770] kasan_atomics+0x198/0x2e8 [ 27.972901] kunit_try_run_case+0x170/0x3f0 [ 27.973085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.973234] kthread+0x318/0x620 [ 27.973353] ret_from_fork+0x10/0x20 [ 27.973478] [ 27.985454] Allocated by task 254: [ 27.986365] kasan_save_stack+0x3c/0x68 [ 27.987163] kasan_save_track+0x20/0x40 [ 27.987867] kasan_save_alloc_info+0x40/0x58 [ 27.988640] __kasan_kmalloc+0xd4/0xd8 [ 27.989762] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.990899] kasan_atomics+0xb8/0x2e8 [ 27.991659] kunit_try_run_case+0x170/0x3f0 [ 27.992430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.993560] kthread+0x318/0x620 [ 27.993975] ret_from_fork+0x10/0x20 [ 27.994358] [ 27.994599] The buggy address belongs to the object at fff00000c65edb80 [ 27.994599] which belongs to the cache kmalloc-64 of size 64 [ 27.996613] The buggy address is located 0 bytes to the right of [ 27.996613] allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0) [ 27.998934] [ 27.999399] The buggy address belongs to the physical page: [ 28.000433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed [ 28.002056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.003348] page_type: f5(slab) [ 28.004032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.004962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.006580] page dumped because: kasan: bad access detected [ 28.007458] [ 28.007701] Memory state around the buggy address: [ 28.008421] fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.010144] fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.011294] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.012071] ^ [ 28.013105] fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.014420] fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.015662] ==================================================================
[ 21.494962] ================================================================== [ 21.495325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 21.496736] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.497029] [ 21.497768] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.497903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.497939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.497992] Call Trace: [ 21.498034] <TASK> [ 21.498074] dump_stack_lvl+0x73/0xb0 [ 21.498140] print_report+0xd1/0x650 [ 21.498175] ? __virt_addr_valid+0x1db/0x2d0 [ 21.498209] ? kasan_atomics_helper+0x7c8/0x5450 [ 21.498240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.498274] ? kasan_atomics_helper+0x7c8/0x5450 [ 21.498313] kasan_report+0x140/0x180 [ 21.498367] ? kasan_atomics_helper+0x7c8/0x5450 [ 21.498433] kasan_check_range+0x10c/0x1c0 [ 21.498493] __kasan_check_write+0x18/0x20 [ 21.498549] kasan_atomics_helper+0x7c8/0x5450 [ 21.498623] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.498686] ? kasan_save_alloc_info+0x3b/0x50 [ 21.498746] ? kasan_save_track+0x18/0x40 [ 21.498813] kasan_atomics+0x1dd/0x310 [ 21.498894] ? __pfx_kasan_atomics+0x10/0x10 [ 21.498953] ? __pfx_read_tsc+0x10/0x10 [ 21.498987] ? ktime_get_ts64+0x86/0x230 [ 21.499025] kunit_try_run_case+0x1a6/0x480 [ 21.499059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.499089] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.499124] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.499155] ? __kthread_parkme+0x82/0x160 [ 21.499187] ? preempt_count_sub+0x50/0x80 [ 21.499221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.499253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.499288] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.499321] kthread+0x324/0x6e0 [ 21.499351] ? trace_preempt_on+0x20/0xc0 [ 21.499396] ? __pfx_kthread+0x10/0x10 [ 21.499461] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.499527] ? calculate_sigpending+0x7b/0xa0 [ 21.499577] ? __pfx_kthread+0x10/0x10 [ 21.499629] ret_from_fork+0x41/0x80 [ 21.499677] ? __pfx_kthread+0x10/0x10 [ 21.499741] ret_from_fork_asm+0x1a/0x30 [ 21.499813] </TASK> [ 21.499840] [ 21.516159] Allocated by task 273: [ 21.516791] kasan_save_stack+0x45/0x70 [ 21.517222] kasan_save_track+0x18/0x40 [ 21.517709] kasan_save_alloc_info+0x3b/0x50 [ 21.518173] __kasan_kmalloc+0xb7/0xc0 [ 21.519044] __kmalloc_cache_noprof+0x18a/0x420 [ 21.519583] kasan_atomics+0x96/0x310 [ 21.519872] kunit_try_run_case+0x1a6/0x480 [ 21.520406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.521090] kthread+0x324/0x6e0 [ 21.521620] ret_from_fork+0x41/0x80 [ 21.521947] ret_from_fork_asm+0x1a/0x30 [ 21.522553] [ 21.523026] The buggy address belongs to the object at ffff888102993400 [ 21.523026] which belongs to the cache kmalloc-64 of size 64 [ 21.524484] The buggy address is located 0 bytes to the right of [ 21.524484] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.525887] [ 21.526058] The buggy address belongs to the physical page: [ 21.526415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.527927] flags: 0x200000000000000(node=0|zone=2) [ 21.528249] page_type: f5(slab) [ 21.529001] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.529495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.530491] page dumped because: kasan: bad access detected [ 21.530934] [ 21.531145] Memory state around the buggy address: [ 21.531787] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.532323] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.533102] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.534041] ^ [ 21.534405] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.535345] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.536079] ================================================================== [ 22.339308] ================================================================== [ 22.339839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 22.340612] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.341372] [ 22.341627] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.341733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.341772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.341829] Call Trace: [ 22.341891] <TASK> [ 22.341940] dump_stack_lvl+0x73/0xb0 [ 22.342017] print_report+0xd1/0x650 [ 22.342082] ? __virt_addr_valid+0x1db/0x2d0 [ 22.342156] ? kasan_atomics_helper+0x49d0/0x5450 [ 22.342233] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.342304] ? kasan_atomics_helper+0x49d0/0x5450 [ 22.342366] kasan_report+0x140/0x180 [ 22.342433] ? kasan_atomics_helper+0x49d0/0x5450 [ 22.342506] __asan_report_load4_noabort+0x18/0x20 [ 22.342573] kasan_atomics_helper+0x49d0/0x5450 [ 22.342635] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.342691] ? kasan_save_alloc_info+0x3b/0x50 [ 22.342739] ? kasan_save_track+0x18/0x40 [ 22.342773] kasan_atomics+0x1dd/0x310 [ 22.342806] ? __pfx_kasan_atomics+0x10/0x10 [ 22.342838] ? __pfx_read_tsc+0x10/0x10 [ 22.342891] ? ktime_get_ts64+0x86/0x230 [ 22.342929] kunit_try_run_case+0x1a6/0x480 [ 22.342962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.342991] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.343027] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.343059] ? __kthread_parkme+0x82/0x160 [ 22.343091] ? preempt_count_sub+0x50/0x80 [ 22.343124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.343156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.343190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.343225] kthread+0x324/0x6e0 [ 22.343254] ? trace_preempt_on+0x20/0xc0 [ 22.343287] ? __pfx_kthread+0x10/0x10 [ 22.343331] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.343364] ? calculate_sigpending+0x7b/0xa0 [ 22.343395] ? __pfx_kthread+0x10/0x10 [ 22.343425] ret_from_fork+0x41/0x80 [ 22.343452] ? __pfx_kthread+0x10/0x10 [ 22.343482] ret_from_fork_asm+0x1a/0x30 [ 22.343525] </TASK> [ 22.343540] [ 22.359280] Allocated by task 273: [ 22.359657] kasan_save_stack+0x45/0x70 [ 22.360735] kasan_save_track+0x18/0x40 [ 22.361059] kasan_save_alloc_info+0x3b/0x50 [ 22.361349] __kasan_kmalloc+0xb7/0xc0 [ 22.361648] __kmalloc_cache_noprof+0x18a/0x420 [ 22.362000] kasan_atomics+0x96/0x310 [ 22.362383] kunit_try_run_case+0x1a6/0x480 [ 22.362687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.363201] kthread+0x324/0x6e0 [ 22.364123] ret_from_fork+0x41/0x80 [ 22.364336] ret_from_fork_asm+0x1a/0x30 [ 22.364912] [ 22.365225] The buggy address belongs to the object at ffff888102993400 [ 22.365225] which belongs to the cache kmalloc-64 of size 64 [ 22.366160] The buggy address is located 0 bytes to the right of [ 22.366160] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.367138] [ 22.367620] The buggy address belongs to the physical page: [ 22.368120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.368737] flags: 0x200000000000000(node=0|zone=2) [ 22.369000] page_type: f5(slab) [ 22.369228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.370017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.370481] page dumped because: kasan: bad access detected [ 22.370935] [ 22.371145] Memory state around the buggy address: [ 22.371558] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.372371] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.372824] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.373234] ^ [ 22.373726] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.374798] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.375317] ================================================================== [ 22.487833] ================================================================== [ 22.488219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 22.488980] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.489578] [ 22.489758] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.489886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.489945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.490003] Call Trace: [ 22.490048] <TASK> [ 22.490095] dump_stack_lvl+0x73/0xb0 [ 22.490169] print_report+0xd1/0x650 [ 22.490234] ? __virt_addr_valid+0x1db/0x2d0 [ 22.490339] ? kasan_atomics_helper+0x50d6/0x5450 [ 22.490402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.490470] ? kasan_atomics_helper+0x50d6/0x5450 [ 22.490538] kasan_report+0x140/0x180 [ 22.490624] ? kasan_atomics_helper+0x50d6/0x5450 [ 22.490692] __asan_report_store8_noabort+0x1b/0x30 [ 22.490755] kasan_atomics_helper+0x50d6/0x5450 [ 22.490816] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.490917] ? kasan_save_alloc_info+0x3b/0x50 [ 22.490983] ? kasan_save_track+0x18/0x40 [ 22.491042] kasan_atomics+0x1dd/0x310 [ 22.491102] ? __pfx_kasan_atomics+0x10/0x10 [ 22.491161] ? __pfx_read_tsc+0x10/0x10 [ 22.491235] ? ktime_get_ts64+0x86/0x230 [ 22.491360] kunit_try_run_case+0x1a6/0x480 [ 22.491430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.491498] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.491585] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.491651] ? __kthread_parkme+0x82/0x160 [ 22.491718] ? preempt_count_sub+0x50/0x80 [ 22.491762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.491797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.491836] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.491892] kthread+0x324/0x6e0 [ 22.491922] ? trace_preempt_on+0x20/0xc0 [ 22.491956] ? __pfx_kthread+0x10/0x10 [ 22.491986] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.492019] ? calculate_sigpending+0x7b/0xa0 [ 22.492050] ? __pfx_kthread+0x10/0x10 [ 22.492080] ret_from_fork+0x41/0x80 [ 22.492107] ? __pfx_kthread+0x10/0x10 [ 22.492136] ret_from_fork_asm+0x1a/0x30 [ 22.492180] </TASK> [ 22.492195] [ 22.504576] Allocated by task 273: [ 22.504900] kasan_save_stack+0x45/0x70 [ 22.505349] kasan_save_track+0x18/0x40 [ 22.505645] kasan_save_alloc_info+0x3b/0x50 [ 22.506068] __kasan_kmalloc+0xb7/0xc0 [ 22.506486] __kmalloc_cache_noprof+0x18a/0x420 [ 22.506768] kasan_atomics+0x96/0x310 [ 22.507280] kunit_try_run_case+0x1a6/0x480 [ 22.507904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.508486] kthread+0x324/0x6e0 [ 22.508819] ret_from_fork+0x41/0x80 [ 22.509118] ret_from_fork_asm+0x1a/0x30 [ 22.509450] [ 22.509631] The buggy address belongs to the object at ffff888102993400 [ 22.509631] which belongs to the cache kmalloc-64 of size 64 [ 22.510500] The buggy address is located 0 bytes to the right of [ 22.510500] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.511306] [ 22.511465] The buggy address belongs to the physical page: [ 22.511754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.512544] flags: 0x200000000000000(node=0|zone=2) [ 22.513207] page_type: f5(slab) [ 22.513711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.514334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.514756] page dumped because: kasan: bad access detected [ 22.515205] [ 22.515442] Memory state around the buggy address: [ 22.515921] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.516580] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.517082] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.517722] ^ [ 22.518086] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.518668] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.519167] ================================================================== [ 22.049893] ================================================================== [ 22.050544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 22.051011] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.051383] [ 22.051672] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.051796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.051833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.051907] Call Trace: [ 22.051954] <TASK> [ 22.052001] dump_stack_lvl+0x73/0xb0 [ 22.052084] print_report+0xd1/0x650 [ 22.052152] ? __virt_addr_valid+0x1db/0x2d0 [ 22.052220] ? kasan_atomics_helper+0x4a38/0x5450 [ 22.052282] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.052346] ? kasan_atomics_helper+0x4a38/0x5450 [ 22.052400] kasan_report+0x140/0x180 [ 22.052462] ? kasan_atomics_helper+0x4a38/0x5450 [ 22.052533] __asan_report_load4_noabort+0x18/0x20 [ 22.052602] kasan_atomics_helper+0x4a38/0x5450 [ 22.052666] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.052733] ? kasan_save_alloc_info+0x3b/0x50 [ 22.052796] ? kasan_save_track+0x18/0x40 [ 22.052881] kasan_atomics+0x1dd/0x310 [ 22.052947] ? __pfx_kasan_atomics+0x10/0x10 [ 22.053019] ? __pfx_read_tsc+0x10/0x10 [ 22.053083] ? ktime_get_ts64+0x86/0x230 [ 22.053155] kunit_try_run_case+0x1a6/0x480 [ 22.053226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.053288] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.053353] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.053417] ? __kthread_parkme+0x82/0x160 [ 22.053483] ? preempt_count_sub+0x50/0x80 [ 22.053554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.053623] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.053697] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.053770] kthread+0x324/0x6e0 [ 22.053829] ? trace_preempt_on+0x20/0xc0 [ 22.053914] ? __pfx_kthread+0x10/0x10 [ 22.053977] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.054042] ? calculate_sigpending+0x7b/0xa0 [ 22.054108] ? __pfx_kthread+0x10/0x10 [ 22.054172] ret_from_fork+0x41/0x80 [ 22.054229] ? __pfx_kthread+0x10/0x10 [ 22.054283] ret_from_fork_asm+0x1a/0x30 [ 22.054358] </TASK> [ 22.054390] [ 22.072949] Allocated by task 273: [ 22.073215] kasan_save_stack+0x45/0x70 [ 22.074098] kasan_save_track+0x18/0x40 [ 22.074753] kasan_save_alloc_info+0x3b/0x50 [ 22.075160] __kasan_kmalloc+0xb7/0xc0 [ 22.075590] __kmalloc_cache_noprof+0x18a/0x420 [ 22.076266] kasan_atomics+0x96/0x310 [ 22.076658] kunit_try_run_case+0x1a6/0x480 [ 22.077208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.077735] kthread+0x324/0x6e0 [ 22.077994] ret_from_fork+0x41/0x80 [ 22.078235] ret_from_fork_asm+0x1a/0x30 [ 22.078603] [ 22.078738] The buggy address belongs to the object at ffff888102993400 [ 22.078738] which belongs to the cache kmalloc-64 of size 64 [ 22.080254] The buggy address is located 0 bytes to the right of [ 22.080254] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.081430] [ 22.081691] The buggy address belongs to the physical page: [ 22.082204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.082973] flags: 0x200000000000000(node=0|zone=2) [ 22.083376] page_type: f5(slab) [ 22.083706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.084211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.085543] page dumped because: kasan: bad access detected [ 22.085912] [ 22.086067] Memory state around the buggy address: [ 22.086803] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.087457] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.087913] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.088942] ^ [ 22.089267] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.089679] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.090100] ================================================================== [ 21.365031] ================================================================== [ 21.365405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 21.366607] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.367278] [ 21.367522] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.367639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.367674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.367737] Call Trace: [ 21.367781] <TASK> [ 21.367825] dump_stack_lvl+0x73/0xb0 [ 21.368293] print_report+0xd1/0x650 [ 21.368382] ? __virt_addr_valid+0x1db/0x2d0 [ 21.368446] ? kasan_atomics_helper+0x5ff/0x5450 [ 21.368504] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.368568] ? kasan_atomics_helper+0x5ff/0x5450 [ 21.368629] kasan_report+0x140/0x180 [ 21.368693] ? kasan_atomics_helper+0x5ff/0x5450 [ 21.368766] kasan_check_range+0x10c/0x1c0 [ 21.368831] __kasan_check_write+0x18/0x20 [ 21.368914] kasan_atomics_helper+0x5ff/0x5450 [ 21.368951] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.368984] ? kasan_save_alloc_info+0x3b/0x50 [ 21.369014] ? kasan_save_track+0x18/0x40 [ 21.369047] kasan_atomics+0x1dd/0x310 [ 21.369077] ? __pfx_kasan_atomics+0x10/0x10 [ 21.369109] ? __pfx_read_tsc+0x10/0x10 [ 21.369139] ? ktime_get_ts64+0x86/0x230 [ 21.369175] kunit_try_run_case+0x1a6/0x480 [ 21.369209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.369238] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.369271] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.369314] ? __kthread_parkme+0x82/0x160 [ 21.369366] ? preempt_count_sub+0x50/0x80 [ 21.369424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.369478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.369536] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.369593] kthread+0x324/0x6e0 [ 21.369641] ? trace_preempt_on+0x20/0xc0 [ 21.369699] ? __pfx_kthread+0x10/0x10 [ 21.369749] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.369805] ? calculate_sigpending+0x7b/0xa0 [ 21.369876] ? __pfx_kthread+0x10/0x10 [ 21.369912] ret_from_fork+0x41/0x80 [ 21.369940] ? __pfx_kthread+0x10/0x10 [ 21.369971] ret_from_fork_asm+0x1a/0x30 [ 21.370016] </TASK> [ 21.370032] [ 21.387543] Allocated by task 273: [ 21.388004] kasan_save_stack+0x45/0x70 [ 21.388744] kasan_save_track+0x18/0x40 [ 21.389608] kasan_save_alloc_info+0x3b/0x50 [ 21.390061] __kasan_kmalloc+0xb7/0xc0 [ 21.390831] __kmalloc_cache_noprof+0x18a/0x420 [ 21.391576] kasan_atomics+0x96/0x310 [ 21.392139] kunit_try_run_case+0x1a6/0x480 [ 21.392690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.393382] kthread+0x324/0x6e0 [ 21.394250] ret_from_fork+0x41/0x80 [ 21.394645] ret_from_fork_asm+0x1a/0x30 [ 21.395234] [ 21.395463] The buggy address belongs to the object at ffff888102993400 [ 21.395463] which belongs to the cache kmalloc-64 of size 64 [ 21.396583] The buggy address is located 0 bytes to the right of [ 21.396583] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.397720] [ 21.397903] The buggy address belongs to the physical page: [ 21.398946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.399493] flags: 0x200000000000000(node=0|zone=2) [ 21.400093] page_type: f5(slab) [ 21.400520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.401276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.401939] page dumped because: kasan: bad access detected [ 21.402413] [ 21.402989] Memory state around the buggy address: [ 21.403373] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.404423] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.404942] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.405641] ^ [ 21.406121] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.407132] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.407611] ================================================================== [ 22.158315] ================================================================== [ 22.159086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 22.160050] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.160698] [ 22.160878] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.160981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.161014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.161065] Call Trace: [ 22.161106] <TASK> [ 22.161148] dump_stack_lvl+0x73/0xb0 [ 22.161230] print_report+0xd1/0x650 [ 22.161332] ? __virt_addr_valid+0x1db/0x2d0 [ 22.161403] ? kasan_atomics_helper+0x1149/0x5450 [ 22.161464] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.161527] ? kasan_atomics_helper+0x1149/0x5450 [ 22.161586] kasan_report+0x140/0x180 [ 22.161641] ? kasan_atomics_helper+0x1149/0x5450 [ 22.161712] kasan_check_range+0x10c/0x1c0 [ 22.161780] __kasan_check_write+0x18/0x20 [ 22.161844] kasan_atomics_helper+0x1149/0x5450 [ 22.161902] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.161935] ? kasan_save_alloc_info+0x3b/0x50 [ 22.161966] ? kasan_save_track+0x18/0x40 [ 22.161998] kasan_atomics+0x1dd/0x310 [ 22.162028] ? __pfx_kasan_atomics+0x10/0x10 [ 22.162060] ? __pfx_read_tsc+0x10/0x10 [ 22.162092] ? ktime_get_ts64+0x86/0x230 [ 22.162127] kunit_try_run_case+0x1a6/0x480 [ 22.162160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.162189] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.162224] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.162256] ? __kthread_parkme+0x82/0x160 [ 22.162301] ? preempt_count_sub+0x50/0x80 [ 22.162348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.162381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.162418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.162454] kthread+0x324/0x6e0 [ 22.162483] ? trace_preempt_on+0x20/0xc0 [ 22.162517] ? __pfx_kthread+0x10/0x10 [ 22.162547] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.162579] ? calculate_sigpending+0x7b/0xa0 [ 22.162610] ? __pfx_kthread+0x10/0x10 [ 22.162640] ret_from_fork+0x41/0x80 [ 22.162666] ? __pfx_kthread+0x10/0x10 [ 22.162695] ret_from_fork_asm+0x1a/0x30 [ 22.162738] </TASK> [ 22.162753] [ 22.178322] Allocated by task 273: [ 22.178788] kasan_save_stack+0x45/0x70 [ 22.179266] kasan_save_track+0x18/0x40 [ 22.179528] kasan_save_alloc_info+0x3b/0x50 [ 22.180189] __kasan_kmalloc+0xb7/0xc0 [ 22.180756] __kmalloc_cache_noprof+0x18a/0x420 [ 22.181103] kasan_atomics+0x96/0x310 [ 22.181602] kunit_try_run_case+0x1a6/0x480 [ 22.182260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.182630] kthread+0x324/0x6e0 [ 22.182888] ret_from_fork+0x41/0x80 [ 22.183105] ret_from_fork_asm+0x1a/0x30 [ 22.183880] [ 22.184015] The buggy address belongs to the object at ffff888102993400 [ 22.184015] which belongs to the cache kmalloc-64 of size 64 [ 22.185536] The buggy address is located 0 bytes to the right of [ 22.185536] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.186488] [ 22.186725] The buggy address belongs to the physical page: [ 22.187055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.187751] flags: 0x200000000000000(node=0|zone=2) [ 22.188163] page_type: f5(slab) [ 22.188464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.189641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.190167] page dumped because: kasan: bad access detected [ 22.190705] [ 22.191030] Memory state around the buggy address: [ 22.191622] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.191970] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.192623] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.193127] ^ [ 22.193543] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.194032] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.194606] ================================================================== [ 22.971809] ================================================================== [ 22.972263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 22.972709] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.973439] [ 22.973727] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.973838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.973893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.973948] Call Trace: [ 22.973996] <TASK> [ 22.974040] dump_stack_lvl+0x73/0xb0 [ 22.974118] print_report+0xd1/0x650 [ 22.974183] ? __virt_addr_valid+0x1db/0x2d0 [ 22.974248] ? kasan_atomics_helper+0x1c19/0x5450 [ 22.974309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.974381] ? kasan_atomics_helper+0x1c19/0x5450 [ 22.974444] kasan_report+0x140/0x180 [ 22.974527] ? kasan_atomics_helper+0x1c19/0x5450 [ 22.974600] kasan_check_range+0x10c/0x1c0 [ 22.974668] __kasan_check_write+0x18/0x20 [ 22.974733] kasan_atomics_helper+0x1c19/0x5450 [ 22.974798] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.974878] ? kasan_save_alloc_info+0x3b/0x50 [ 22.974944] ? kasan_save_track+0x18/0x40 [ 22.975009] kasan_atomics+0x1dd/0x310 [ 22.975067] ? __pfx_kasan_atomics+0x10/0x10 [ 22.975131] ? __pfx_read_tsc+0x10/0x10 [ 22.975216] ? ktime_get_ts64+0x86/0x230 [ 22.975290] kunit_try_run_case+0x1a6/0x480 [ 22.975354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.975411] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.975506] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.975574] ? __kthread_parkme+0x82/0x160 [ 22.975640] ? preempt_count_sub+0x50/0x80 [ 22.975718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.975779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.975835] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.975894] kthread+0x324/0x6e0 [ 22.975926] ? trace_preempt_on+0x20/0xc0 [ 22.975961] ? __pfx_kthread+0x10/0x10 [ 22.975992] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.976024] ? calculate_sigpending+0x7b/0xa0 [ 22.976054] ? __pfx_kthread+0x10/0x10 [ 22.976085] ret_from_fork+0x41/0x80 [ 22.976112] ? __pfx_kthread+0x10/0x10 [ 22.976141] ret_from_fork_asm+0x1a/0x30 [ 22.976183] </TASK> [ 22.976199] [ 22.990277] Allocated by task 273: [ 22.990581] kasan_save_stack+0x45/0x70 [ 22.990869] kasan_save_track+0x18/0x40 [ 22.991418] kasan_save_alloc_info+0x3b/0x50 [ 22.992070] __kasan_kmalloc+0xb7/0xc0 [ 22.992563] __kmalloc_cache_noprof+0x18a/0x420 [ 22.993117] kasan_atomics+0x96/0x310 [ 22.994036] kunit_try_run_case+0x1a6/0x480 [ 22.994410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.995094] kthread+0x324/0x6e0 [ 22.995711] ret_from_fork+0x41/0x80 [ 22.996214] ret_from_fork_asm+0x1a/0x30 [ 22.996714] [ 22.996962] The buggy address belongs to the object at ffff888102993400 [ 22.996962] which belongs to the cache kmalloc-64 of size 64 [ 22.997666] The buggy address is located 0 bytes to the right of [ 22.997666] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.999196] [ 22.999371] The buggy address belongs to the physical page: [ 22.999634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.000598] flags: 0x200000000000000(node=0|zone=2) [ 23.001214] page_type: f5(slab) [ 23.001666] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.002001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.002965] page dumped because: kasan: bad access detected [ 23.003626] [ 23.004034] Memory state around the buggy address: [ 23.004293] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.004948] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.005664] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.006497] ^ [ 23.007058] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.007478] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.008154] ================================================================== [ 23.072611] ================================================================== [ 23.073272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 23.074056] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.074685] [ 23.075007] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.075111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.075147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.075200] Call Trace: [ 23.075246] <TASK> [ 23.075289] dump_stack_lvl+0x73/0xb0 [ 23.075364] print_report+0xd1/0x650 [ 23.075429] ? __virt_addr_valid+0x1db/0x2d0 [ 23.075494] ? kasan_atomics_helper+0x1d7b/0x5450 [ 23.075555] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.075624] ? kasan_atomics_helper+0x1d7b/0x5450 [ 23.075695] kasan_report+0x140/0x180 [ 23.075761] ? kasan_atomics_helper+0x1d7b/0x5450 [ 23.075835] kasan_check_range+0x10c/0x1c0 [ 23.075922] __kasan_check_write+0x18/0x20 [ 23.075986] kasan_atomics_helper+0x1d7b/0x5450 [ 23.076051] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.076116] ? kasan_save_alloc_info+0x3b/0x50 [ 23.076180] ? kasan_save_track+0x18/0x40 [ 23.076248] kasan_atomics+0x1dd/0x310 [ 23.076310] ? __pfx_kasan_atomics+0x10/0x10 [ 23.076372] ? __pfx_read_tsc+0x10/0x10 [ 23.076429] ? ktime_get_ts64+0x86/0x230 [ 23.076502] kunit_try_run_case+0x1a6/0x480 [ 23.076571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.076627] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.076698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.076763] ? __kthread_parkme+0x82/0x160 [ 23.076829] ? preempt_count_sub+0x50/0x80 [ 23.076913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.076975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.077046] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.077113] kthread+0x324/0x6e0 [ 23.077169] ? trace_preempt_on+0x20/0xc0 [ 23.077230] ? __pfx_kthread+0x10/0x10 [ 23.077289] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.077358] ? calculate_sigpending+0x7b/0xa0 [ 23.077409] ? __pfx_kthread+0x10/0x10 [ 23.077463] ret_from_fork+0x41/0x80 [ 23.077514] ? __pfx_kthread+0x10/0x10 [ 23.077573] ret_from_fork_asm+0x1a/0x30 [ 23.077659] </TASK> [ 23.077691] [ 23.092959] Allocated by task 273: [ 23.093451] kasan_save_stack+0x45/0x70 [ 23.093951] kasan_save_track+0x18/0x40 [ 23.094380] kasan_save_alloc_info+0x3b/0x50 [ 23.094860] __kasan_kmalloc+0xb7/0xc0 [ 23.095303] __kmalloc_cache_noprof+0x18a/0x420 [ 23.095819] kasan_atomics+0x96/0x310 [ 23.096270] kunit_try_run_case+0x1a6/0x480 [ 23.096748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.097238] kthread+0x324/0x6e0 [ 23.097807] ret_from_fork+0x41/0x80 [ 23.098141] ret_from_fork_asm+0x1a/0x30 [ 23.098602] [ 23.099114] The buggy address belongs to the object at ffff888102993400 [ 23.099114] which belongs to the cache kmalloc-64 of size 64 [ 23.099925] The buggy address is located 0 bytes to the right of [ 23.099925] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.101013] [ 23.101100] The buggy address belongs to the physical page: [ 23.101244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.101932] flags: 0x200000000000000(node=0|zone=2) [ 23.102248] page_type: f5(slab) [ 23.103145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.103971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.104583] page dumped because: kasan: bad access detected [ 23.105094] [ 23.105618] Memory state around the buggy address: [ 23.105864] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.106096] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.106269] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.106871] ^ [ 23.107339] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.108197] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.108935] ================================================================== [ 23.426322] ================================================================== [ 23.426931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 23.427584] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.428011] [ 23.428283] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.428417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.428449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.428524] Call Trace: [ 23.428592] <TASK> [ 23.428653] dump_stack_lvl+0x73/0xb0 [ 23.428760] print_report+0xd1/0x650 [ 23.428822] ? __virt_addr_valid+0x1db/0x2d0 [ 23.428879] ? kasan_atomics_helper+0x4fa7/0x5450 [ 23.428912] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.428948] ? kasan_atomics_helper+0x4fa7/0x5450 [ 23.428994] kasan_report+0x140/0x180 [ 23.429049] ? kasan_atomics_helper+0x4fa7/0x5450 [ 23.429116] __asan_report_load8_noabort+0x18/0x20 [ 23.429192] kasan_atomics_helper+0x4fa7/0x5450 [ 23.429275] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.429333] ? kasan_save_alloc_info+0x3b/0x50 [ 23.429399] ? kasan_save_track+0x18/0x40 [ 23.429480] kasan_atomics+0x1dd/0x310 [ 23.429546] ? __pfx_kasan_atomics+0x10/0x10 [ 23.429613] ? __pfx_read_tsc+0x10/0x10 [ 23.429668] ? ktime_get_ts64+0x86/0x230 [ 23.429709] kunit_try_run_case+0x1a6/0x480 [ 23.429745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.429775] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.429811] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.429860] ? __kthread_parkme+0x82/0x160 [ 23.429898] ? preempt_count_sub+0x50/0x80 [ 23.429932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.429964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.430000] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.430035] kthread+0x324/0x6e0 [ 23.430064] ? trace_preempt_on+0x20/0xc0 [ 23.430098] ? __pfx_kthread+0x10/0x10 [ 23.430129] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.430161] ? calculate_sigpending+0x7b/0xa0 [ 23.430191] ? __pfx_kthread+0x10/0x10 [ 23.430221] ret_from_fork+0x41/0x80 [ 23.430248] ? __pfx_kthread+0x10/0x10 [ 23.430277] ret_from_fork_asm+0x1a/0x30 [ 23.430335] </TASK> [ 23.430352] [ 23.443409] Allocated by task 273: [ 23.443866] kasan_save_stack+0x45/0x70 [ 23.444311] kasan_save_track+0x18/0x40 [ 23.444564] kasan_save_alloc_info+0x3b/0x50 [ 23.444830] __kasan_kmalloc+0xb7/0xc0 [ 23.445109] __kmalloc_cache_noprof+0x18a/0x420 [ 23.445431] kasan_atomics+0x96/0x310 [ 23.445888] kunit_try_run_case+0x1a6/0x480 [ 23.446353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.446873] kthread+0x324/0x6e0 [ 23.447292] ret_from_fork+0x41/0x80 [ 23.447672] ret_from_fork_asm+0x1a/0x30 [ 23.448101] [ 23.448319] The buggy address belongs to the object at ffff888102993400 [ 23.448319] which belongs to the cache kmalloc-64 of size 64 [ 23.449016] The buggy address is located 0 bytes to the right of [ 23.449016] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.450143] [ 23.450351] The buggy address belongs to the physical page: [ 23.450834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.451426] flags: 0x200000000000000(node=0|zone=2) [ 23.451739] page_type: f5(slab) [ 23.452021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.452816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.453280] page dumped because: kasan: bad access detected [ 23.453769] [ 23.453961] Memory state around the buggy address: [ 23.454327] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.454736] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.455101] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.455562] ^ [ 23.456131] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.456734] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.457591] ================================================================== [ 22.091179] ================================================================== [ 22.091774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 22.092275] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.093005] [ 22.093239] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.093410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.093441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.093483] Call Trace: [ 22.093524] <TASK> [ 22.093560] dump_stack_lvl+0x73/0xb0 [ 22.093626] print_report+0xd1/0x650 [ 22.093675] ? __virt_addr_valid+0x1db/0x2d0 [ 22.093726] ? kasan_atomics_helper+0x107a/0x5450 [ 22.093806] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.093894] ? kasan_atomics_helper+0x107a/0x5450 [ 22.093955] kasan_report+0x140/0x180 [ 22.094019] ? kasan_atomics_helper+0x107a/0x5450 [ 22.094091] kasan_check_range+0x10c/0x1c0 [ 22.094156] __kasan_check_write+0x18/0x20 [ 22.094214] kasan_atomics_helper+0x107a/0x5450 [ 22.094341] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.094411] ? kasan_save_alloc_info+0x3b/0x50 [ 22.094472] ? kasan_save_track+0x18/0x40 [ 22.094540] kasan_atomics+0x1dd/0x310 [ 22.094632] ? __pfx_kasan_atomics+0x10/0x10 [ 22.094696] ? __pfx_read_tsc+0x10/0x10 [ 22.094755] ? ktime_get_ts64+0x86/0x230 [ 22.094825] kunit_try_run_case+0x1a6/0x480 [ 22.094910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.094996] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.095072] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.095152] ? __kthread_parkme+0x82/0x160 [ 22.095210] ? preempt_count_sub+0x50/0x80 [ 22.095275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.095378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.095456] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.095514] kthread+0x324/0x6e0 [ 22.095548] ? trace_preempt_on+0x20/0xc0 [ 22.095583] ? __pfx_kthread+0x10/0x10 [ 22.095614] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.095647] ? calculate_sigpending+0x7b/0xa0 [ 22.095688] ? __pfx_kthread+0x10/0x10 [ 22.095720] ret_from_fork+0x41/0x80 [ 22.095748] ? __pfx_kthread+0x10/0x10 [ 22.095777] ret_from_fork_asm+0x1a/0x30 [ 22.095820] </TASK> [ 22.095836] [ 22.108961] Allocated by task 273: [ 22.109417] kasan_save_stack+0x45/0x70 [ 22.109745] kasan_save_track+0x18/0x40 [ 22.110206] kasan_save_alloc_info+0x3b/0x50 [ 22.110665] __kasan_kmalloc+0xb7/0xc0 [ 22.111102] __kmalloc_cache_noprof+0x18a/0x420 [ 22.111546] kasan_atomics+0x96/0x310 [ 22.111974] kunit_try_run_case+0x1a6/0x480 [ 22.112478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.112914] kthread+0x324/0x6e0 [ 22.113280] ret_from_fork+0x41/0x80 [ 22.113742] ret_from_fork_asm+0x1a/0x30 [ 22.114028] [ 22.114265] The buggy address belongs to the object at ffff888102993400 [ 22.114265] which belongs to the cache kmalloc-64 of size 64 [ 22.115036] The buggy address is located 0 bytes to the right of [ 22.115036] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.115737] [ 22.115952] The buggy address belongs to the physical page: [ 22.116492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.117240] flags: 0x200000000000000(node=0|zone=2) [ 22.117732] page_type: f5(slab) [ 22.118104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.118804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.119524] page dumped because: kasan: bad access detected [ 22.120195] [ 22.121498] Memory state around the buggy address: [ 22.121969] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.122357] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.122698] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.123057] ^ [ 22.123316] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.123727] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.124323] ================================================================== [ 21.578263] ================================================================== [ 21.578935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 21.579797] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.580928] [ 21.581141] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.581251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.581298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.581356] Call Trace: [ 21.581400] <TASK> [ 21.581446] dump_stack_lvl+0x73/0xb0 [ 21.581527] print_report+0xd1/0x650 [ 21.581592] ? __virt_addr_valid+0x1db/0x2d0 [ 21.581657] ? kasan_atomics_helper+0x8fa/0x5450 [ 21.581717] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.581786] ? kasan_atomics_helper+0x8fa/0x5450 [ 21.581984] kasan_report+0x140/0x180 [ 21.582090] ? kasan_atomics_helper+0x8fa/0x5450 [ 21.582190] kasan_check_range+0x10c/0x1c0 [ 21.582259] __kasan_check_write+0x18/0x20 [ 21.582359] kasan_atomics_helper+0x8fa/0x5450 [ 21.582414] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.582478] ? kasan_save_alloc_info+0x3b/0x50 [ 21.582533] ? kasan_save_track+0x18/0x40 [ 21.582574] kasan_atomics+0x1dd/0x310 [ 21.582610] ? __pfx_kasan_atomics+0x10/0x10 [ 21.582642] ? __pfx_read_tsc+0x10/0x10 [ 21.582674] ? ktime_get_ts64+0x86/0x230 [ 21.582710] kunit_try_run_case+0x1a6/0x480 [ 21.582746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.582776] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.582810] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.582843] ? __kthread_parkme+0x82/0x160 [ 21.582898] ? preempt_count_sub+0x50/0x80 [ 21.582933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.582965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.583000] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.583035] kthread+0x324/0x6e0 [ 21.583064] ? trace_preempt_on+0x20/0xc0 [ 21.583097] ? __pfx_kthread+0x10/0x10 [ 21.583128] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.583159] ? calculate_sigpending+0x7b/0xa0 [ 21.583189] ? __pfx_kthread+0x10/0x10 [ 21.583218] ret_from_fork+0x41/0x80 [ 21.583245] ? __pfx_kthread+0x10/0x10 [ 21.583275] ret_from_fork_asm+0x1a/0x30 [ 21.583333] </TASK> [ 21.583349] [ 21.602284] Allocated by task 273: [ 21.602983] kasan_save_stack+0x45/0x70 [ 21.603414] kasan_save_track+0x18/0x40 [ 21.603846] kasan_save_alloc_info+0x3b/0x50 [ 21.604228] __kasan_kmalloc+0xb7/0xc0 [ 21.604579] __kmalloc_cache_noprof+0x18a/0x420 [ 21.605591] kasan_atomics+0x96/0x310 [ 21.605925] kunit_try_run_case+0x1a6/0x480 [ 21.606419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.607111] kthread+0x324/0x6e0 [ 21.607668] ret_from_fork+0x41/0x80 [ 21.608019] ret_from_fork_asm+0x1a/0x30 [ 21.608950] [ 21.609169] The buggy address belongs to the object at ffff888102993400 [ 21.609169] which belongs to the cache kmalloc-64 of size 64 [ 21.610197] The buggy address is located 0 bytes to the right of [ 21.610197] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.611593] [ 21.611878] The buggy address belongs to the physical page: [ 21.612283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.613239] flags: 0x200000000000000(node=0|zone=2) [ 21.614049] page_type: f5(slab) [ 21.614618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.615223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.616059] page dumped because: kasan: bad access detected [ 21.616888] [ 21.617026] Memory state around the buggy address: [ 21.617287] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.617863] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.618843] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.619355] ^ [ 21.620009] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.620933] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.621406] ================================================================== [ 22.678147] ================================================================== [ 22.678882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 22.679579] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.681010] [ 22.681270] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.681407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.681439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.681491] Call Trace: [ 22.681529] <TASK> [ 22.681569] dump_stack_lvl+0x73/0xb0 [ 22.681639] print_report+0xd1/0x650 [ 22.681694] ? __virt_addr_valid+0x1db/0x2d0 [ 22.681748] ? kasan_atomics_helper+0x16e8/0x5450 [ 22.681796] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.681873] ? kasan_atomics_helper+0x16e8/0x5450 [ 22.681925] kasan_report+0x140/0x180 [ 22.681977] ? kasan_atomics_helper+0x16e8/0x5450 [ 22.682037] kasan_check_range+0x10c/0x1c0 [ 22.682089] __kasan_check_write+0x18/0x20 [ 22.682140] kasan_atomics_helper+0x16e8/0x5450 [ 22.682191] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.682242] ? kasan_save_alloc_info+0x3b/0x50 [ 22.682332] ? kasan_save_track+0x18/0x40 [ 22.682388] kasan_atomics+0x1dd/0x310 [ 22.682441] ? __pfx_kasan_atomics+0x10/0x10 [ 22.682491] ? __pfx_read_tsc+0x10/0x10 [ 22.682540] ? ktime_get_ts64+0x86/0x230 [ 22.682599] kunit_try_run_case+0x1a6/0x480 [ 22.682660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.682722] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.682796] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.682891] ? __kthread_parkme+0x82/0x160 [ 22.682957] ? preempt_count_sub+0x50/0x80 [ 22.683026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.683094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.683185] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.683303] kthread+0x324/0x6e0 [ 22.683357] ? trace_preempt_on+0x20/0xc0 [ 22.683429] ? __pfx_kthread+0x10/0x10 [ 22.683495] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.683557] ? calculate_sigpending+0x7b/0xa0 [ 22.683615] ? __pfx_kthread+0x10/0x10 [ 22.683670] ret_from_fork+0x41/0x80 [ 22.683734] ? __pfx_kthread+0x10/0x10 [ 22.683790] ret_from_fork_asm+0x1a/0x30 [ 22.684843] </TASK> [ 22.684920] [ 22.704002] Allocated by task 273: [ 22.704494] kasan_save_stack+0x45/0x70 [ 22.704962] kasan_save_track+0x18/0x40 [ 22.705177] kasan_save_alloc_info+0x3b/0x50 [ 22.705615] __kasan_kmalloc+0xb7/0xc0 [ 22.705942] __kmalloc_cache_noprof+0x18a/0x420 [ 22.706353] kasan_atomics+0x96/0x310 [ 22.706646] kunit_try_run_case+0x1a6/0x480 [ 22.707109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.707474] kthread+0x324/0x6e0 [ 22.707875] ret_from_fork+0x41/0x80 [ 22.708281] ret_from_fork_asm+0x1a/0x30 [ 22.708766] [ 22.708953] The buggy address belongs to the object at ffff888102993400 [ 22.708953] which belongs to the cache kmalloc-64 of size 64 [ 22.709536] The buggy address is located 0 bytes to the right of [ 22.709536] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.710283] [ 22.710564] The buggy address belongs to the physical page: [ 22.711087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.711640] flags: 0x200000000000000(node=0|zone=2) [ 22.712156] page_type: f5(slab) [ 22.712449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.713086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.713552] page dumped because: kasan: bad access detected [ 22.714048] [ 22.714185] Memory state around the buggy address: [ 22.714863] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.715327] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.715761] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.716197] ^ [ 22.716576] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.717939] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.718474] ================================================================== [ 23.211022] ================================================================== [ 23.211818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 23.212512] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.213055] [ 23.213393] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.213518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.213556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.213628] Call Trace: [ 23.213676] <TASK> [ 23.213737] dump_stack_lvl+0x73/0xb0 [ 23.213839] print_report+0xd1/0x650 [ 23.213921] ? __virt_addr_valid+0x1db/0x2d0 [ 23.213983] ? kasan_atomics_helper+0x4f73/0x5450 [ 23.214047] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.214115] ? kasan_atomics_helper+0x4f73/0x5450 [ 23.214177] kasan_report+0x140/0x180 [ 23.214236] ? kasan_atomics_helper+0x4f73/0x5450 [ 23.214349] __asan_report_load8_noabort+0x18/0x20 [ 23.214424] kasan_atomics_helper+0x4f73/0x5450 [ 23.214487] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.214552] ? kasan_save_alloc_info+0x3b/0x50 [ 23.214617] ? kasan_save_track+0x18/0x40 [ 23.214683] kasan_atomics+0x1dd/0x310 [ 23.214748] ? __pfx_kasan_atomics+0x10/0x10 [ 23.214814] ? __pfx_read_tsc+0x10/0x10 [ 23.214895] ? ktime_get_ts64+0x86/0x230 [ 23.214967] kunit_try_run_case+0x1a6/0x480 [ 23.215038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.215098] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.215168] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.215236] ? __kthread_parkme+0x82/0x160 [ 23.215336] ? preempt_count_sub+0x50/0x80 [ 23.215411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.215484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.215557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.215630] kthread+0x324/0x6e0 [ 23.215700] ? trace_preempt_on+0x20/0xc0 [ 23.215769] ? __pfx_kthread+0x10/0x10 [ 23.215822] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.215904] ? calculate_sigpending+0x7b/0xa0 [ 23.215991] ? __pfx_kthread+0x10/0x10 [ 23.216051] ret_from_fork+0x41/0x80 [ 23.216104] ? __pfx_kthread+0x10/0x10 [ 23.216161] ret_from_fork_asm+0x1a/0x30 [ 23.216264] </TASK> [ 23.216327] [ 23.228808] Allocated by task 273: [ 23.229269] kasan_save_stack+0x45/0x70 [ 23.229682] kasan_save_track+0x18/0x40 [ 23.230061] kasan_save_alloc_info+0x3b/0x50 [ 23.230444] __kasan_kmalloc+0xb7/0xc0 [ 23.230896] __kmalloc_cache_noprof+0x18a/0x420 [ 23.231371] kasan_atomics+0x96/0x310 [ 23.231783] kunit_try_run_case+0x1a6/0x480 [ 23.232111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.232698] kthread+0x324/0x6e0 [ 23.233067] ret_from_fork+0x41/0x80 [ 23.233481] ret_from_fork_asm+0x1a/0x30 [ 23.233943] [ 23.234105] The buggy address belongs to the object at ffff888102993400 [ 23.234105] which belongs to the cache kmalloc-64 of size 64 [ 23.235050] The buggy address is located 0 bytes to the right of [ 23.235050] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.235839] [ 23.236103] The buggy address belongs to the physical page: [ 23.236653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.237236] flags: 0x200000000000000(node=0|zone=2) [ 23.237582] page_type: f5(slab) [ 23.237980] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.238686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.239179] page dumped because: kasan: bad access detected [ 23.240141] [ 23.240311] Memory state around the buggy address: [ 23.240579] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.241463] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.242120] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.243579] ^ [ 23.244446] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.245069] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.245774] ================================================================== [ 23.009535] ================================================================== [ 23.010350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 23.010722] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.012215] [ 23.012375] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.012465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.012494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.012536] Call Trace: [ 23.012574] <TASK> [ 23.012611] dump_stack_lvl+0x73/0xb0 [ 23.012680] print_report+0xd1/0x650 [ 23.012742] ? __virt_addr_valid+0x1db/0x2d0 [ 23.012803] ? kasan_atomics_helper+0x4f32/0x5450 [ 23.013068] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.013141] ? kasan_atomics_helper+0x4f32/0x5450 [ 23.013201] kasan_report+0x140/0x180 [ 23.013264] ? kasan_atomics_helper+0x4f32/0x5450 [ 23.013325] __asan_report_load8_noabort+0x18/0x20 [ 23.013363] kasan_atomics_helper+0x4f32/0x5450 [ 23.013395] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.013429] ? kasan_save_alloc_info+0x3b/0x50 [ 23.013460] ? kasan_save_track+0x18/0x40 [ 23.013492] kasan_atomics+0x1dd/0x310 [ 23.013523] ? __pfx_kasan_atomics+0x10/0x10 [ 23.013555] ? __pfx_read_tsc+0x10/0x10 [ 23.013584] ? ktime_get_ts64+0x86/0x230 [ 23.013620] kunit_try_run_case+0x1a6/0x480 [ 23.013654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.013683] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.013718] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.013750] ? __kthread_parkme+0x82/0x160 [ 23.013781] ? preempt_count_sub+0x50/0x80 [ 23.013814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.013865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.013905] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.013941] kthread+0x324/0x6e0 [ 23.013970] ? trace_preempt_on+0x20/0xc0 [ 23.014003] ? __pfx_kthread+0x10/0x10 [ 23.014033] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.014065] ? calculate_sigpending+0x7b/0xa0 [ 23.014096] ? __pfx_kthread+0x10/0x10 [ 23.014126] ret_from_fork+0x41/0x80 [ 23.014152] ? __pfx_kthread+0x10/0x10 [ 23.014182] ret_from_fork_asm+0x1a/0x30 [ 23.014225] </TASK> [ 23.014241] [ 23.025902] Allocated by task 273: [ 23.026248] kasan_save_stack+0x45/0x70 [ 23.026654] kasan_save_track+0x18/0x40 [ 23.026965] kasan_save_alloc_info+0x3b/0x50 [ 23.027251] __kasan_kmalloc+0xb7/0xc0 [ 23.027634] __kmalloc_cache_noprof+0x18a/0x420 [ 23.027968] kasan_atomics+0x96/0x310 [ 23.028340] kunit_try_run_case+0x1a6/0x480 [ 23.028667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.029228] kthread+0x324/0x6e0 [ 23.029572] ret_from_fork+0x41/0x80 [ 23.029837] ret_from_fork_asm+0x1a/0x30 [ 23.030212] [ 23.030362] The buggy address belongs to the object at ffff888102993400 [ 23.030362] which belongs to the cache kmalloc-64 of size 64 [ 23.031257] The buggy address is located 0 bytes to the right of [ 23.031257] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.032256] [ 23.032434] The buggy address belongs to the physical page: [ 23.032730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.033458] flags: 0x200000000000000(node=0|zone=2) [ 23.033803] page_type: f5(slab) [ 23.034167] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.034992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.035352] page dumped because: kasan: bad access detected [ 23.035630] [ 23.035788] Memory state around the buggy address: [ 23.036306] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.037364] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.038061] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.038627] ^ [ 23.038965] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.039308] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.039913] ================================================================== [ 21.323218] ================================================================== [ 21.323818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 21.324578] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.325257] [ 21.325561] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.325791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.325845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.325910] Call Trace: [ 21.325953] <TASK> [ 21.325998] dump_stack_lvl+0x73/0xb0 [ 21.326082] print_report+0xd1/0x650 [ 21.326145] ? __virt_addr_valid+0x1db/0x2d0 [ 21.326212] ? kasan_atomics_helper+0x566/0x5450 [ 21.326274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.326338] ? kasan_atomics_helper+0x566/0x5450 [ 21.326391] kasan_report+0x140/0x180 [ 21.326430] ? kasan_atomics_helper+0x566/0x5450 [ 21.326488] kasan_check_range+0x10c/0x1c0 [ 21.326543] __kasan_check_write+0x18/0x20 [ 21.326594] kasan_atomics_helper+0x566/0x5450 [ 21.326643] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.326694] ? kasan_save_alloc_info+0x3b/0x50 [ 21.326744] ? kasan_save_track+0x18/0x40 [ 21.326797] kasan_atomics+0x1dd/0x310 [ 21.326845] ? __pfx_kasan_atomics+0x10/0x10 [ 21.326901] ? __pfx_read_tsc+0x10/0x10 [ 21.326934] ? ktime_get_ts64+0x86/0x230 [ 21.326971] kunit_try_run_case+0x1a6/0x480 [ 21.327005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.327034] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.327068] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.327127] ? __kthread_parkme+0x82/0x160 [ 21.327162] ? preempt_count_sub+0x50/0x80 [ 21.327198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.327231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.327267] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.327302] kthread+0x324/0x6e0 [ 21.327331] ? trace_preempt_on+0x20/0xc0 [ 21.327364] ? __pfx_kthread+0x10/0x10 [ 21.327394] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.327426] ? calculate_sigpending+0x7b/0xa0 [ 21.327456] ? __pfx_kthread+0x10/0x10 [ 21.327486] ret_from_fork+0x41/0x80 [ 21.327512] ? __pfx_kthread+0x10/0x10 [ 21.327542] ret_from_fork_asm+0x1a/0x30 [ 21.327585] </TASK> [ 21.327601] [ 21.345975] Allocated by task 273: [ 21.346669] kasan_save_stack+0x45/0x70 [ 21.346922] kasan_save_track+0x18/0x40 [ 21.347311] kasan_save_alloc_info+0x3b/0x50 [ 21.348191] __kasan_kmalloc+0xb7/0xc0 [ 21.348787] __kmalloc_cache_noprof+0x18a/0x420 [ 21.349251] kasan_atomics+0x96/0x310 [ 21.350030] kunit_try_run_case+0x1a6/0x480 [ 21.350540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.350784] kthread+0x324/0x6e0 [ 21.350993] ret_from_fork+0x41/0x80 [ 21.351327] ret_from_fork_asm+0x1a/0x30 [ 21.351786] [ 21.352003] The buggy address belongs to the object at ffff888102993400 [ 21.352003] which belongs to the cache kmalloc-64 of size 64 [ 21.353006] The buggy address is located 0 bytes to the right of [ 21.353006] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.353874] [ 21.354035] The buggy address belongs to the physical page: [ 21.355098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.355949] flags: 0x200000000000000(node=0|zone=2) [ 21.356345] page_type: f5(slab) [ 21.356923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.357378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.358011] page dumped because: kasan: bad access detected [ 21.358399] [ 21.358583] Memory state around the buggy address: [ 21.359062] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.359464] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.361009] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.361799] ^ [ 21.362231] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.362956] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.363567] ================================================================== [ 22.627626] ================================================================== [ 22.628312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 22.630479] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.632217] [ 22.632510] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.632624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.632662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.632718] Call Trace: [ 22.632760] <TASK> [ 22.632800] dump_stack_lvl+0x73/0xb0 [ 22.633525] print_report+0xd1/0x650 [ 22.633601] ? __virt_addr_valid+0x1db/0x2d0 [ 22.633660] ? kasan_atomics_helper+0x1650/0x5450 [ 22.633711] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.633773] ? kasan_atomics_helper+0x1650/0x5450 [ 22.633833] kasan_report+0x140/0x180 [ 22.633919] ? kasan_atomics_helper+0x1650/0x5450 [ 22.633984] kasan_check_range+0x10c/0x1c0 [ 22.634039] __kasan_check_write+0x18/0x20 [ 22.634097] kasan_atomics_helper+0x1650/0x5450 [ 22.634156] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.634207] ? kasan_save_alloc_info+0x3b/0x50 [ 22.634264] ? kasan_save_track+0x18/0x40 [ 22.634375] kasan_atomics+0x1dd/0x310 [ 22.634448] ? __pfx_kasan_atomics+0x10/0x10 [ 22.634510] ? __pfx_read_tsc+0x10/0x10 [ 22.634571] ? ktime_get_ts64+0x86/0x230 [ 22.634635] kunit_try_run_case+0x1a6/0x480 [ 22.634698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.634753] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.634818] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.634902] ? __kthread_parkme+0x82/0x160 [ 22.634965] ? preempt_count_sub+0x50/0x80 [ 22.635032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.635097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.635171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.635242] kthread+0x324/0x6e0 [ 22.635343] ? trace_preempt_on+0x20/0xc0 [ 22.635421] ? __pfx_kthread+0x10/0x10 [ 22.635481] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.635550] ? calculate_sigpending+0x7b/0xa0 [ 22.635612] ? __pfx_kthread+0x10/0x10 [ 22.635672] ret_from_fork+0x41/0x80 [ 22.635741] ? __pfx_kthread+0x10/0x10 [ 22.635801] ret_from_fork_asm+0x1a/0x30 [ 22.635907] </TASK> [ 22.635939] [ 22.655703] Allocated by task 273: [ 22.657253] kasan_save_stack+0x45/0x70 [ 22.657774] kasan_save_track+0x18/0x40 [ 22.658318] kasan_save_alloc_info+0x3b/0x50 [ 22.658588] __kasan_kmalloc+0xb7/0xc0 [ 22.658979] __kmalloc_cache_noprof+0x18a/0x420 [ 22.659308] kasan_atomics+0x96/0x310 [ 22.660368] kunit_try_run_case+0x1a6/0x480 [ 22.660668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.660988] kthread+0x324/0x6e0 [ 22.661225] ret_from_fork+0x41/0x80 [ 22.661469] ret_from_fork_asm+0x1a/0x30 [ 22.661721] [ 22.662901] The buggy address belongs to the object at ffff888102993400 [ 22.662901] which belongs to the cache kmalloc-64 of size 64 [ 22.664538] The buggy address is located 0 bytes to the right of [ 22.664538] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.665649] [ 22.665896] The buggy address belongs to the physical page: [ 22.666461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.667872] flags: 0x200000000000000(node=0|zone=2) [ 22.668422] page_type: f5(slab) [ 22.668795] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.669541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.670222] page dumped because: kasan: bad access detected [ 22.670770] [ 22.670994] Memory state around the buggy address: [ 22.672543] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.673212] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.673916] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.674279] ^ [ 22.674525] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.675181] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.675896] ================================================================== [ 21.986610] ================================================================== [ 21.987266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 21.987887] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.988422] [ 21.988612] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.988720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.988752] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.988806] Call Trace: [ 21.988867] <TASK> [ 21.988910] dump_stack_lvl+0x73/0xb0 [ 21.988986] print_report+0xd1/0x650 [ 21.989049] ? __virt_addr_valid+0x1db/0x2d0 [ 21.989110] ? kasan_atomics_helper+0xf11/0x5450 [ 21.989170] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.989234] ? kasan_atomics_helper+0xf11/0x5450 [ 21.989331] kasan_report+0x140/0x180 [ 21.989399] ? kasan_atomics_helper+0xf11/0x5450 [ 21.989470] kasan_check_range+0x10c/0x1c0 [ 21.989531] __kasan_check_write+0x18/0x20 [ 21.989592] kasan_atomics_helper+0xf11/0x5450 [ 21.989646] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.989707] ? kasan_save_alloc_info+0x3b/0x50 [ 21.989765] ? kasan_save_track+0x18/0x40 [ 21.989824] kasan_atomics+0x1dd/0x310 [ 21.989902] ? __pfx_kasan_atomics+0x10/0x10 [ 21.989968] ? __pfx_read_tsc+0x10/0x10 [ 21.990031] ? ktime_get_ts64+0x86/0x230 [ 21.990105] kunit_try_run_case+0x1a6/0x480 [ 21.990167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.990227] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.990326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.990392] ? __kthread_parkme+0x82/0x160 [ 21.990453] ? preempt_count_sub+0x50/0x80 [ 21.990523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.990568] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.990608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.990645] kthread+0x324/0x6e0 [ 21.990674] ? trace_preempt_on+0x20/0xc0 [ 21.990708] ? __pfx_kthread+0x10/0x10 [ 21.990738] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.990770] ? calculate_sigpending+0x7b/0xa0 [ 21.990799] ? __pfx_kthread+0x10/0x10 [ 21.990831] ret_from_fork+0x41/0x80 [ 21.990879] ? __pfx_kthread+0x10/0x10 [ 21.990910] ret_from_fork_asm+0x1a/0x30 [ 21.990954] </TASK> [ 21.990971] [ 22.002830] Allocated by task 273: [ 22.003235] kasan_save_stack+0x45/0x70 [ 22.003661] kasan_save_track+0x18/0x40 [ 22.004094] kasan_save_alloc_info+0x3b/0x50 [ 22.004608] __kasan_kmalloc+0xb7/0xc0 [ 22.004899] __kmalloc_cache_noprof+0x18a/0x420 [ 22.005353] kasan_atomics+0x96/0x310 [ 22.005623] kunit_try_run_case+0x1a6/0x480 [ 22.005912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.006467] kthread+0x324/0x6e0 [ 22.006787] ret_from_fork+0x41/0x80 [ 22.007090] ret_from_fork_asm+0x1a/0x30 [ 22.007502] [ 22.007717] The buggy address belongs to the object at ffff888102993400 [ 22.007717] which belongs to the cache kmalloc-64 of size 64 [ 22.008794] The buggy address is located 0 bytes to the right of [ 22.008794] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.009356] [ 22.009508] The buggy address belongs to the physical page: [ 22.010015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.010866] flags: 0x200000000000000(node=0|zone=2) [ 22.011313] page_type: f5(slab) [ 22.011617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.012017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.012366] page dumped because: kasan: bad access detected [ 22.012783] [ 22.013018] Memory state around the buggy address: [ 22.013536] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.014422] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.015062] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.015406] ^ [ 22.015670] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.016394] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.016940] ================================================================== [ 22.231936] ================================================================== [ 22.232445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 22.233418] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.233831] [ 22.234094] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.234200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.234236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.234291] Call Trace: [ 22.234338] <TASK> [ 22.234379] dump_stack_lvl+0x73/0xb0 [ 22.234455] print_report+0xd1/0x650 [ 22.234518] ? __virt_addr_valid+0x1db/0x2d0 [ 22.234581] ? kasan_atomics_helper+0x1218/0x5450 [ 22.234643] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.234706] ? kasan_atomics_helper+0x1218/0x5450 [ 22.234759] kasan_report+0x140/0x180 [ 22.234818] ? kasan_atomics_helper+0x1218/0x5450 [ 22.234905] kasan_check_range+0x10c/0x1c0 [ 22.234971] __kasan_check_write+0x18/0x20 [ 22.235036] kasan_atomics_helper+0x1218/0x5450 [ 22.235101] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.235159] ? kasan_save_alloc_info+0x3b/0x50 [ 22.235197] ? kasan_save_track+0x18/0x40 [ 22.235231] kasan_atomics+0x1dd/0x310 [ 22.235263] ? __pfx_kasan_atomics+0x10/0x10 [ 22.235302] ? __pfx_read_tsc+0x10/0x10 [ 22.235344] ? ktime_get_ts64+0x86/0x230 [ 22.235380] kunit_try_run_case+0x1a6/0x480 [ 22.235415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.235444] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.235480] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.235511] ? __kthread_parkme+0x82/0x160 [ 22.235543] ? preempt_count_sub+0x50/0x80 [ 22.235576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.235608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.235643] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.235688] kthread+0x324/0x6e0 [ 22.235719] ? trace_preempt_on+0x20/0xc0 [ 22.235753] ? __pfx_kthread+0x10/0x10 [ 22.235784] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.235816] ? calculate_sigpending+0x7b/0xa0 [ 22.235846] ? __pfx_kthread+0x10/0x10 [ 22.235898] ret_from_fork+0x41/0x80 [ 22.235925] ? __pfx_kthread+0x10/0x10 [ 22.235955] ret_from_fork_asm+0x1a/0x30 [ 22.235997] </TASK> [ 22.236013] [ 22.250355] Allocated by task 273: [ 22.250642] kasan_save_stack+0x45/0x70 [ 22.251158] kasan_save_track+0x18/0x40 [ 22.251508] kasan_save_alloc_info+0x3b/0x50 [ 22.251796] __kasan_kmalloc+0xb7/0xc0 [ 22.252054] __kmalloc_cache_noprof+0x18a/0x420 [ 22.252634] kasan_atomics+0x96/0x310 [ 22.253093] kunit_try_run_case+0x1a6/0x480 [ 22.253567] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.254172] kthread+0x324/0x6e0 [ 22.254632] ret_from_fork+0x41/0x80 [ 22.255083] ret_from_fork_asm+0x1a/0x30 [ 22.255522] [ 22.255673] The buggy address belongs to the object at ffff888102993400 [ 22.255673] which belongs to the cache kmalloc-64 of size 64 [ 22.256770] The buggy address is located 0 bytes to the right of [ 22.256770] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.257694] [ 22.257980] The buggy address belongs to the physical page: [ 22.258520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.259059] flags: 0x200000000000000(node=0|zone=2) [ 22.259605] page_type: f5(slab) [ 22.260048] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.260722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.261384] page dumped because: kasan: bad access detected [ 22.261733] [ 22.261952] Memory state around the buggy address: [ 22.262490] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.263128] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.263872] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.264160] ^ [ 22.264724] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.265323] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.265945] ================================================================== [ 21.450969] ================================================================== [ 21.451641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 21.452490] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.453216] [ 21.453514] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.453613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.453646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.453692] Call Trace: [ 21.453736] <TASK> [ 21.453774] dump_stack_lvl+0x73/0xb0 [ 21.453846] print_report+0xd1/0x650 [ 21.453920] ? __virt_addr_valid+0x1db/0x2d0 [ 21.453976] ? kasan_atomics_helper+0x730/0x5450 [ 21.454033] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.454132] ? kasan_atomics_helper+0x730/0x5450 [ 21.454192] kasan_report+0x140/0x180 [ 21.454275] ? kasan_atomics_helper+0x730/0x5450 [ 21.454400] kasan_check_range+0x10c/0x1c0 [ 21.454518] __kasan_check_write+0x18/0x20 [ 21.454582] kasan_atomics_helper+0x730/0x5450 [ 21.454635] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.454689] ? kasan_save_alloc_info+0x3b/0x50 [ 21.454748] ? kasan_save_track+0x18/0x40 [ 21.454813] kasan_atomics+0x1dd/0x310 [ 21.454896] ? __pfx_kasan_atomics+0x10/0x10 [ 21.454963] ? __pfx_read_tsc+0x10/0x10 [ 21.455025] ? ktime_get_ts64+0x86/0x230 [ 21.455097] kunit_try_run_case+0x1a6/0x480 [ 21.455162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.455197] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.455233] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.455267] ? __kthread_parkme+0x82/0x160 [ 21.455318] ? preempt_count_sub+0x50/0x80 [ 21.455359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.455392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.455433] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.455492] kthread+0x324/0x6e0 [ 21.455542] ? trace_preempt_on+0x20/0xc0 [ 21.455598] ? __pfx_kthread+0x10/0x10 [ 21.455638] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.455673] ? calculate_sigpending+0x7b/0xa0 [ 21.455715] ? __pfx_kthread+0x10/0x10 [ 21.455746] ret_from_fork+0x41/0x80 [ 21.455775] ? __pfx_kthread+0x10/0x10 [ 21.455805] ret_from_fork_asm+0x1a/0x30 [ 21.455848] </TASK> [ 21.455884] [ 21.473711] Allocated by task 273: [ 21.474050] kasan_save_stack+0x45/0x70 [ 21.475121] kasan_save_track+0x18/0x40 [ 21.475876] kasan_save_alloc_info+0x3b/0x50 [ 21.476167] __kasan_kmalloc+0xb7/0xc0 [ 21.476801] __kmalloc_cache_noprof+0x18a/0x420 [ 21.477360] kasan_atomics+0x96/0x310 [ 21.477891] kunit_try_run_case+0x1a6/0x480 [ 21.478288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.478972] kthread+0x324/0x6e0 [ 21.479843] ret_from_fork+0x41/0x80 [ 21.480229] ret_from_fork_asm+0x1a/0x30 [ 21.480827] [ 21.481081] The buggy address belongs to the object at ffff888102993400 [ 21.481081] which belongs to the cache kmalloc-64 of size 64 [ 21.482448] The buggy address is located 0 bytes to the right of [ 21.482448] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.484057] [ 21.484191] The buggy address belongs to the physical page: [ 21.485045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.486091] flags: 0x200000000000000(node=0|zone=2) [ 21.486471] page_type: f5(slab) [ 21.486706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.487161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.487746] page dumped because: kasan: bad access detected [ 21.489032] [ 21.489381] Memory state around the buggy address: [ 21.489961] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.490404] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.491177] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.492134] ^ [ 21.492596] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.493084] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.493556] ================================================================== [ 22.827923] ================================================================== [ 22.828660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 22.828987] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.829905] [ 22.830219] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.830329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.830367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.830421] Call Trace: [ 22.830467] <TASK> [ 22.830511] dump_stack_lvl+0x73/0xb0 [ 22.830590] print_report+0xd1/0x650 [ 22.830659] ? __virt_addr_valid+0x1db/0x2d0 [ 22.830722] ? kasan_atomics_helper+0x194b/0x5450 [ 22.830781] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.830887] ? kasan_atomics_helper+0x194b/0x5450 [ 22.830953] kasan_report+0x140/0x180 [ 22.831020] ? kasan_atomics_helper+0x194b/0x5450 [ 22.831088] kasan_check_range+0x10c/0x1c0 [ 22.831149] __kasan_check_write+0x18/0x20 [ 22.831210] kasan_atomics_helper+0x194b/0x5450 [ 22.831299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.831364] ? kasan_save_alloc_info+0x3b/0x50 [ 22.831428] ? kasan_save_track+0x18/0x40 [ 22.831487] kasan_atomics+0x1dd/0x310 [ 22.831549] ? __pfx_kasan_atomics+0x10/0x10 [ 22.831635] ? __pfx_read_tsc+0x10/0x10 [ 22.831708] ? ktime_get_ts64+0x86/0x230 [ 22.831780] kunit_try_run_case+0x1a6/0x480 [ 22.831861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.831919] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.832016] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.832083] ? __kthread_parkme+0x82/0x160 [ 22.832144] ? preempt_count_sub+0x50/0x80 [ 22.832213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.832296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.832364] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.832429] kthread+0x324/0x6e0 [ 22.832486] ? trace_preempt_on+0x20/0xc0 [ 22.832553] ? __pfx_kthread+0x10/0x10 [ 22.832611] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.832670] ? calculate_sigpending+0x7b/0xa0 [ 22.832726] ? __pfx_kthread+0x10/0x10 [ 22.832789] ret_from_fork+0x41/0x80 [ 22.832894] ? __pfx_kthread+0x10/0x10 [ 22.832958] ret_from_fork_asm+0x1a/0x30 [ 22.833046] </TASK> [ 22.833081] [ 22.847563] Allocated by task 273: [ 22.848069] kasan_save_stack+0x45/0x70 [ 22.848572] kasan_save_track+0x18/0x40 [ 22.849052] kasan_save_alloc_info+0x3b/0x50 [ 22.849375] __kasan_kmalloc+0xb7/0xc0 [ 22.849618] __kmalloc_cache_noprof+0x18a/0x420 [ 22.849898] kasan_atomics+0x96/0x310 [ 22.850358] kunit_try_run_case+0x1a6/0x480 [ 22.850872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.851476] kthread+0x324/0x6e0 [ 22.851869] ret_from_fork+0x41/0x80 [ 22.852351] ret_from_fork_asm+0x1a/0x30 [ 22.852834] [ 22.853074] The buggy address belongs to the object at ffff888102993400 [ 22.853074] which belongs to the cache kmalloc-64 of size 64 [ 22.854169] The buggy address is located 0 bytes to the right of [ 22.854169] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.855199] [ 22.855507] The buggy address belongs to the physical page: [ 22.856086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.856796] flags: 0x200000000000000(node=0|zone=2) [ 22.857325] page_type: f5(slab) [ 22.857728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.858190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.858948] page dumped because: kasan: bad access detected [ 22.859527] [ 22.859721] Memory state around the buggy address: [ 22.860231] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.860863] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.861552] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.862105] ^ [ 22.862615] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.863230] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.863769] ================================================================== [ 20.995998] ================================================================== [ 20.997176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 20.997515] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 20.998205] [ 20.998509] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.998638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.998673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.998730] Call Trace: [ 20.998762] <TASK> [ 20.998803] dump_stack_lvl+0x73/0xb0 [ 20.998900] print_report+0xd1/0x650 [ 20.998963] ? __virt_addr_valid+0x1db/0x2d0 [ 20.999020] ? kasan_atomics_helper+0x4bbe/0x5450 [ 20.999074] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.999137] ? kasan_atomics_helper+0x4bbe/0x5450 [ 20.999194] kasan_report+0x140/0x180 [ 20.999252] ? kasan_atomics_helper+0x4bbe/0x5450 [ 20.999312] __asan_report_load4_noabort+0x18/0x20 [ 20.999380] kasan_atomics_helper+0x4bbe/0x5450 [ 20.999455] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.999527] ? kasan_save_alloc_info+0x3b/0x50 [ 20.999581] ? kasan_save_track+0x18/0x40 [ 20.999634] kasan_atomics+0x1dd/0x310 [ 20.999708] ? __pfx_kasan_atomics+0x10/0x10 [ 20.999769] ? __pfx_read_tsc+0x10/0x10 [ 20.999828] ? ktime_get_ts64+0x86/0x230 [ 20.999920] kunit_try_run_case+0x1a6/0x480 [ 20.999990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.000045] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.000086] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.000118] ? __kthread_parkme+0x82/0x160 [ 21.000151] ? preempt_count_sub+0x50/0x80 [ 21.000184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.000213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.000246] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.000280] kthread+0x324/0x6e0 [ 21.000319] ? trace_preempt_on+0x20/0xc0 [ 21.000356] ? __pfx_kthread+0x10/0x10 [ 21.000385] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.000415] ? calculate_sigpending+0x7b/0xa0 [ 21.000458] ? __pfx_kthread+0x10/0x10 [ 21.000507] ret_from_fork+0x41/0x80 [ 21.000548] ? __pfx_kthread+0x10/0x10 [ 21.000580] ret_from_fork_asm+0x1a/0x30 [ 21.000621] </TASK> [ 21.000637] [ 21.016391] Allocated by task 273: [ 21.016991] kasan_save_stack+0x45/0x70 [ 21.017713] kasan_save_track+0x18/0x40 [ 21.018081] kasan_save_alloc_info+0x3b/0x50 [ 21.018729] __kasan_kmalloc+0xb7/0xc0 [ 21.019114] __kmalloc_cache_noprof+0x18a/0x420 [ 21.019620] kasan_atomics+0x96/0x310 [ 21.020049] kunit_try_run_case+0x1a6/0x480 [ 21.020585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.021161] kthread+0x324/0x6e0 [ 21.021670] ret_from_fork+0x41/0x80 [ 21.022128] ret_from_fork_asm+0x1a/0x30 [ 21.022438] [ 21.022873] The buggy address belongs to the object at ffff888102993400 [ 21.022873] which belongs to the cache kmalloc-64 of size 64 [ 21.023751] The buggy address is located 0 bytes to the right of [ 21.023751] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.025060] [ 21.025309] The buggy address belongs to the physical page: [ 21.026054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.026870] flags: 0x200000000000000(node=0|zone=2) [ 21.027378] page_type: f5(slab) [ 21.027898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.028609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.029203] page dumped because: kasan: bad access detected [ 21.029870] [ 21.030069] Memory state around the buggy address: [ 21.030445] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.031216] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.031963] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.032523] ^ [ 21.032824] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.033557] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.034280] ================================================================== [ 22.018256] ================================================================== [ 22.018605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 22.018996] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.019357] [ 22.019545] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.019652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.019695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.019750] Call Trace: [ 22.019800] <TASK> [ 22.019844] dump_stack_lvl+0x73/0xb0 [ 22.019943] print_report+0xd1/0x650 [ 22.020010] ? __virt_addr_valid+0x1db/0x2d0 [ 22.020077] ? kasan_atomics_helper+0xfaa/0x5450 [ 22.020134] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.020195] ? kasan_atomics_helper+0xfaa/0x5450 [ 22.020248] kasan_report+0x140/0x180 [ 22.020301] ? kasan_atomics_helper+0xfaa/0x5450 [ 22.020362] kasan_check_range+0x10c/0x1c0 [ 22.020418] __kasan_check_write+0x18/0x20 [ 22.020472] kasan_atomics_helper+0xfaa/0x5450 [ 22.020525] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.020580] ? kasan_save_alloc_info+0x3b/0x50 [ 22.020637] ? kasan_save_track+0x18/0x40 [ 22.020697] kasan_atomics+0x1dd/0x310 [ 22.020752] ? __pfx_kasan_atomics+0x10/0x10 [ 22.020813] ? __pfx_read_tsc+0x10/0x10 [ 22.020883] ? ktime_get_ts64+0x86/0x230 [ 22.020949] kunit_try_run_case+0x1a6/0x480 [ 22.021008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.021059] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.021121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.021176] ? __kthread_parkme+0x82/0x160 [ 22.021233] ? preempt_count_sub+0x50/0x80 [ 22.021297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.021356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.021419] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.021482] kthread+0x324/0x6e0 [ 22.021539] ? trace_preempt_on+0x20/0xc0 [ 22.021606] ? __pfx_kthread+0x10/0x10 [ 22.021666] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.021735] ? calculate_sigpending+0x7b/0xa0 [ 22.021796] ? __pfx_kthread+0x10/0x10 [ 22.021876] ret_from_fork+0x41/0x80 [ 22.021930] ? __pfx_kthread+0x10/0x10 [ 22.021981] ret_from_fork_asm+0x1a/0x30 [ 22.022060] </TASK> [ 22.022088] [ 22.034173] Allocated by task 273: [ 22.034613] kasan_save_stack+0x45/0x70 [ 22.035050] kasan_save_track+0x18/0x40 [ 22.035521] kasan_save_alloc_info+0x3b/0x50 [ 22.035904] __kasan_kmalloc+0xb7/0xc0 [ 22.036159] __kmalloc_cache_noprof+0x18a/0x420 [ 22.036528] kasan_atomics+0x96/0x310 [ 22.036935] kunit_try_run_case+0x1a6/0x480 [ 22.037397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.037947] kthread+0x324/0x6e0 [ 22.038277] ret_from_fork+0x41/0x80 [ 22.038521] ret_from_fork_asm+0x1a/0x30 [ 22.038776] [ 22.038979] The buggy address belongs to the object at ffff888102993400 [ 22.038979] which belongs to the cache kmalloc-64 of size 64 [ 22.040387] The buggy address is located 0 bytes to the right of [ 22.040387] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.041113] [ 22.041269] The buggy address belongs to the physical page: [ 22.041750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.042417] flags: 0x200000000000000(node=0|zone=2) [ 22.042712] page_type: f5(slab) [ 22.043078] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.043610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.044070] page dumped because: kasan: bad access detected [ 22.044351] [ 22.044544] Memory state around the buggy address: [ 22.044957] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.045880] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.046245] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.046580] ^ [ 22.046841] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.047516] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.048169] ================================================================== [ 21.872716] ================================================================== [ 21.873281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 21.874000] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.874370] [ 21.874575] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.875174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.875237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.875294] Call Trace: [ 21.875343] <TASK> [ 21.875390] dump_stack_lvl+0x73/0xb0 [ 21.875476] print_report+0xd1/0x650 [ 21.875547] ? __virt_addr_valid+0x1db/0x2d0 [ 21.875618] ? kasan_atomics_helper+0xd48/0x5450 [ 21.875693] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.875763] ? kasan_atomics_helper+0xd48/0x5450 [ 21.875811] kasan_report+0x140/0x180 [ 21.875865] ? kasan_atomics_helper+0xd48/0x5450 [ 21.875930] kasan_check_range+0x10c/0x1c0 [ 21.875989] __kasan_check_write+0x18/0x20 [ 21.876049] kasan_atomics_helper+0xd48/0x5450 [ 21.876102] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.876157] ? kasan_save_alloc_info+0x3b/0x50 [ 21.876214] ? kasan_save_track+0x18/0x40 [ 21.876268] kasan_atomics+0x1dd/0x310 [ 21.876322] ? __pfx_kasan_atomics+0x10/0x10 [ 21.876372] ? __pfx_read_tsc+0x10/0x10 [ 21.876405] ? ktime_get_ts64+0x86/0x230 [ 21.876454] kunit_try_run_case+0x1a6/0x480 [ 21.876491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.876524] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.876561] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.876595] ? __kthread_parkme+0x82/0x160 [ 21.876628] ? preempt_count_sub+0x50/0x80 [ 21.876662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.876694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.876731] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.876768] kthread+0x324/0x6e0 [ 21.876797] ? trace_preempt_on+0x20/0xc0 [ 21.876831] ? __pfx_kthread+0x10/0x10 [ 21.876883] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.876923] ? calculate_sigpending+0x7b/0xa0 [ 21.876955] ? __pfx_kthread+0x10/0x10 [ 21.876986] ret_from_fork+0x41/0x80 [ 21.877014] ? __pfx_kthread+0x10/0x10 [ 21.877045] ret_from_fork_asm+0x1a/0x30 [ 21.877088] </TASK> [ 21.877103] [ 21.890360] Allocated by task 273: [ 21.890609] kasan_save_stack+0x45/0x70 [ 21.890904] kasan_save_track+0x18/0x40 [ 21.891291] kasan_save_alloc_info+0x3b/0x50 [ 21.891817] __kasan_kmalloc+0xb7/0xc0 [ 21.892370] __kmalloc_cache_noprof+0x18a/0x420 [ 21.892910] kasan_atomics+0x96/0x310 [ 21.893362] kunit_try_run_case+0x1a6/0x480 [ 21.893906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.894548] kthread+0x324/0x6e0 [ 21.895012] ret_from_fork+0x41/0x80 [ 21.895558] ret_from_fork_asm+0x1a/0x30 [ 21.896253] [ 21.897067] The buggy address belongs to the object at ffff888102993400 [ 21.897067] which belongs to the cache kmalloc-64 of size 64 [ 21.898508] The buggy address is located 0 bytes to the right of [ 21.898508] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.899816] [ 21.900067] The buggy address belongs to the physical page: [ 21.900518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.901053] flags: 0x200000000000000(node=0|zone=2) [ 21.901513] page_type: f5(slab) [ 21.901924] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.902468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.903149] page dumped because: kasan: bad access detected [ 21.903571] [ 21.903816] Memory state around the buggy address: [ 21.904201] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.904780] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.905283] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.905941] ^ [ 21.906462] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.907180] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.907774] ================================================================== [ 22.377585] ================================================================== [ 22.378109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 22.378860] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.379516] [ 22.380027] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.380112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.380146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.380197] Call Trace: [ 22.380269] <TASK> [ 22.380317] dump_stack_lvl+0x73/0xb0 [ 22.380387] print_report+0xd1/0x650 [ 22.380424] ? __virt_addr_valid+0x1db/0x2d0 [ 22.380458] ? kasan_atomics_helper+0x13b6/0x5450 [ 22.380489] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.380523] ? kasan_atomics_helper+0x13b6/0x5450 [ 22.380552] kasan_report+0x140/0x180 [ 22.380583] ? kasan_atomics_helper+0x13b6/0x5450 [ 22.380617] kasan_check_range+0x10c/0x1c0 [ 22.380648] __kasan_check_read+0x15/0x20 [ 22.380679] kasan_atomics_helper+0x13b6/0x5450 [ 22.380709] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.380740] ? kasan_save_alloc_info+0x3b/0x50 [ 22.380769] ? kasan_save_track+0x18/0x40 [ 22.380801] kasan_atomics+0x1dd/0x310 [ 22.380831] ? __pfx_kasan_atomics+0x10/0x10 [ 22.380889] ? __pfx_read_tsc+0x10/0x10 [ 22.380935] ? ktime_get_ts64+0x86/0x230 [ 22.381002] kunit_try_run_case+0x1a6/0x480 [ 22.381069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.381105] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.381143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.381176] ? __kthread_parkme+0x82/0x160 [ 22.381208] ? preempt_count_sub+0x50/0x80 [ 22.381242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.381274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.381328] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.381366] kthread+0x324/0x6e0 [ 22.381395] ? trace_preempt_on+0x20/0xc0 [ 22.381429] ? __pfx_kthread+0x10/0x10 [ 22.381460] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.381491] ? calculate_sigpending+0x7b/0xa0 [ 22.381522] ? __pfx_kthread+0x10/0x10 [ 22.381553] ret_from_fork+0x41/0x80 [ 22.381579] ? __pfx_kthread+0x10/0x10 [ 22.381608] ret_from_fork_asm+0x1a/0x30 [ 22.381650] </TASK> [ 22.381667] [ 22.396934] Allocated by task 273: [ 22.397218] kasan_save_stack+0x45/0x70 [ 22.397887] kasan_save_track+0x18/0x40 [ 22.398247] kasan_save_alloc_info+0x3b/0x50 [ 22.398909] __kasan_kmalloc+0xb7/0xc0 [ 22.399236] __kmalloc_cache_noprof+0x18a/0x420 [ 22.399654] kasan_atomics+0x96/0x310 [ 22.400121] kunit_try_run_case+0x1a6/0x480 [ 22.400570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.401403] kthread+0x324/0x6e0 [ 22.401721] ret_from_fork+0x41/0x80 [ 22.402017] ret_from_fork_asm+0x1a/0x30 [ 22.402290] [ 22.402437] The buggy address belongs to the object at ffff888102993400 [ 22.402437] which belongs to the cache kmalloc-64 of size 64 [ 22.403057] The buggy address is located 0 bytes to the right of [ 22.403057] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.404021] [ 22.404180] The buggy address belongs to the physical page: [ 22.404795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.405474] flags: 0x200000000000000(node=0|zone=2) [ 22.406003] page_type: f5(slab) [ 22.406241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.406830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.407534] page dumped because: kasan: bad access detected [ 22.408425] [ 22.408675] Memory state around the buggy address: [ 22.409131] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.409894] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.410564] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.411300] ^ [ 22.411815] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.412341] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.412957] ================================================================== [ 21.280295] ================================================================== [ 21.281311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 21.282119] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.282626] [ 21.283502] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.283590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.283610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.283636] Call Trace: [ 21.283663] <TASK> [ 21.283696] dump_stack_lvl+0x73/0xb0 [ 21.283740] print_report+0xd1/0x650 [ 21.283775] ? __virt_addr_valid+0x1db/0x2d0 [ 21.283807] ? kasan_atomics_helper+0x4b3c/0x5450 [ 21.283838] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.284258] ? kasan_atomics_helper+0x4b3c/0x5450 [ 21.284291] kasan_report+0x140/0x180 [ 21.284343] ? kasan_atomics_helper+0x4b3c/0x5450 [ 21.284382] __asan_report_store4_noabort+0x1b/0x30 [ 21.284415] kasan_atomics_helper+0x4b3c/0x5450 [ 21.284463] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.284516] ? kasan_save_alloc_info+0x3b/0x50 [ 21.284564] ? kasan_save_track+0x18/0x40 [ 21.284597] kasan_atomics+0x1dd/0x310 [ 21.284631] ? __pfx_kasan_atomics+0x10/0x10 [ 21.284663] ? __pfx_read_tsc+0x10/0x10 [ 21.284696] ? ktime_get_ts64+0x86/0x230 [ 21.284732] kunit_try_run_case+0x1a6/0x480 [ 21.284766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.284796] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.284831] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.284884] ? __kthread_parkme+0x82/0x160 [ 21.284916] ? preempt_count_sub+0x50/0x80 [ 21.284951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.284983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.285018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.285052] kthread+0x324/0x6e0 [ 21.285081] ? trace_preempt_on+0x20/0xc0 [ 21.285115] ? __pfx_kthread+0x10/0x10 [ 21.285145] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.285176] ? calculate_sigpending+0x7b/0xa0 [ 21.285205] ? __pfx_kthread+0x10/0x10 [ 21.285236] ret_from_fork+0x41/0x80 [ 21.285262] ? __pfx_kthread+0x10/0x10 [ 21.285294] ret_from_fork_asm+0x1a/0x30 [ 21.285349] </TASK> [ 21.285365] [ 21.302117] Allocated by task 273: [ 21.302554] kasan_save_stack+0x45/0x70 [ 21.303166] kasan_save_track+0x18/0x40 [ 21.303582] kasan_save_alloc_info+0x3b/0x50 [ 21.304289] __kasan_kmalloc+0xb7/0xc0 [ 21.304842] __kmalloc_cache_noprof+0x18a/0x420 [ 21.305260] kasan_atomics+0x96/0x310 [ 21.305598] kunit_try_run_case+0x1a6/0x480 [ 21.306007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.306349] kthread+0x324/0x6e0 [ 21.306707] ret_from_fork+0x41/0x80 [ 21.307793] ret_from_fork_asm+0x1a/0x30 [ 21.308106] [ 21.308320] The buggy address belongs to the object at ffff888102993400 [ 21.308320] which belongs to the cache kmalloc-64 of size 64 [ 21.309575] The buggy address is located 0 bytes to the right of [ 21.309575] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.310919] [ 21.311131] The buggy address belongs to the physical page: [ 21.311848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.312644] flags: 0x200000000000000(node=0|zone=2) [ 21.313009] page_type: f5(slab) [ 21.313238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.313668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.315147] page dumped because: kasan: bad access detected [ 21.316067] [ 21.316286] Memory state around the buggy address: [ 21.316691] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.317215] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.318359] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.319159] ^ [ 21.319638] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.320370] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.320870] ================================================================== [ 22.759141] ================================================================== [ 22.759651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 22.760511] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.761214] [ 22.761774] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.761898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.761938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.761993] Call Trace: [ 22.762038] <TASK> [ 22.762075] dump_stack_lvl+0x73/0xb0 [ 22.762141] print_report+0xd1/0x650 [ 22.762198] ? __virt_addr_valid+0x1db/0x2d0 [ 22.762255] ? kasan_atomics_helper+0x1819/0x5450 [ 22.762311] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.762378] ? kasan_atomics_helper+0x1819/0x5450 [ 22.762434] kasan_report+0x140/0x180 [ 22.762492] ? kasan_atomics_helper+0x1819/0x5450 [ 22.762558] kasan_check_range+0x10c/0x1c0 [ 22.762622] __kasan_check_write+0x18/0x20 [ 22.762685] kasan_atomics_helper+0x1819/0x5450 [ 22.762749] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.762815] ? kasan_save_alloc_info+0x3b/0x50 [ 22.762894] ? kasan_save_track+0x18/0x40 [ 22.762947] kasan_atomics+0x1dd/0x310 [ 22.762982] ? __pfx_kasan_atomics+0x10/0x10 [ 22.763017] ? __pfx_read_tsc+0x10/0x10 [ 22.763049] ? ktime_get_ts64+0x86/0x230 [ 22.763086] kunit_try_run_case+0x1a6/0x480 [ 22.763120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.763149] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.763184] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.763215] ? __kthread_parkme+0x82/0x160 [ 22.763247] ? preempt_count_sub+0x50/0x80 [ 22.763281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.763329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.763366] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.763401] kthread+0x324/0x6e0 [ 22.763431] ? trace_preempt_on+0x20/0xc0 [ 22.763463] ? __pfx_kthread+0x10/0x10 [ 22.763494] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.763524] ? calculate_sigpending+0x7b/0xa0 [ 22.763553] ? __pfx_kthread+0x10/0x10 [ 22.763583] ret_from_fork+0x41/0x80 [ 22.763609] ? __pfx_kthread+0x10/0x10 [ 22.763638] ret_from_fork_asm+0x1a/0x30 [ 22.763691] </TASK> [ 22.763708] [ 22.778169] Allocated by task 273: [ 22.778582] kasan_save_stack+0x45/0x70 [ 22.779032] kasan_save_track+0x18/0x40 [ 22.779524] kasan_save_alloc_info+0x3b/0x50 [ 22.780054] __kasan_kmalloc+0xb7/0xc0 [ 22.780530] __kmalloc_cache_noprof+0x18a/0x420 [ 22.780953] kasan_atomics+0x96/0x310 [ 22.781236] kunit_try_run_case+0x1a6/0x480 [ 22.781738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.782124] kthread+0x324/0x6e0 [ 22.782553] ret_from_fork+0x41/0x80 [ 22.782888] ret_from_fork_asm+0x1a/0x30 [ 22.783234] [ 22.783503] The buggy address belongs to the object at ffff888102993400 [ 22.783503] which belongs to the cache kmalloc-64 of size 64 [ 22.784262] The buggy address is located 0 bytes to the right of [ 22.784262] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.785221] [ 22.785486] The buggy address belongs to the physical page: [ 22.785992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.786583] flags: 0x200000000000000(node=0|zone=2) [ 22.787073] page_type: f5(slab) [ 22.787463] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.787984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.788669] page dumped because: kasan: bad access detected [ 22.789162] [ 22.789423] Memory state around the buggy address: [ 22.789735] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.790342] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.790886] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.791464] ^ [ 22.791826] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.792439] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.792938] ================================================================== [ 22.125264] ================================================================== [ 22.126051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 22.126459] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.127143] [ 22.127391] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.127501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.127539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.127596] Call Trace: [ 22.127643] <TASK> [ 22.127695] dump_stack_lvl+0x73/0xb0 [ 22.127776] print_report+0xd1/0x650 [ 22.127836] ? __virt_addr_valid+0x1db/0x2d0 [ 22.127918] ? kasan_atomics_helper+0x4a1e/0x5450 [ 22.127976] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.128041] ? kasan_atomics_helper+0x4a1e/0x5450 [ 22.128095] kasan_report+0x140/0x180 [ 22.128165] ? kasan_atomics_helper+0x4a1e/0x5450 [ 22.128222] __asan_report_load4_noabort+0x18/0x20 [ 22.128282] kasan_atomics_helper+0x4a1e/0x5450 [ 22.128345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.128408] ? kasan_save_alloc_info+0x3b/0x50 [ 22.128470] ? kasan_save_track+0x18/0x40 [ 22.128535] kasan_atomics+0x1dd/0x310 [ 22.128598] ? __pfx_kasan_atomics+0x10/0x10 [ 22.128658] ? __pfx_read_tsc+0x10/0x10 [ 22.128717] ? ktime_get_ts64+0x86/0x230 [ 22.128789] kunit_try_run_case+0x1a6/0x480 [ 22.128875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.128931] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.128996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.129056] ? __kthread_parkme+0x82/0x160 [ 22.129112] ? preempt_count_sub+0x50/0x80 [ 22.129179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.129244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.129314] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.129384] kthread+0x324/0x6e0 [ 22.129445] ? trace_preempt_on+0x20/0xc0 [ 22.129516] ? __pfx_kthread+0x10/0x10 [ 22.129580] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.129646] ? calculate_sigpending+0x7b/0xa0 [ 22.129710] ? __pfx_kthread+0x10/0x10 [ 22.129775] ret_from_fork+0x41/0x80 [ 22.129832] ? __pfx_kthread+0x10/0x10 [ 22.129912] ret_from_fork_asm+0x1a/0x30 [ 22.129987] </TASK> [ 22.130004] [ 22.142061] Allocated by task 273: [ 22.142434] kasan_save_stack+0x45/0x70 [ 22.142865] kasan_save_track+0x18/0x40 [ 22.143279] kasan_save_alloc_info+0x3b/0x50 [ 22.143823] __kasan_kmalloc+0xb7/0xc0 [ 22.144135] __kmalloc_cache_noprof+0x18a/0x420 [ 22.144735] kasan_atomics+0x96/0x310 [ 22.145026] kunit_try_run_case+0x1a6/0x480 [ 22.145407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.146054] kthread+0x324/0x6e0 [ 22.146300] ret_from_fork+0x41/0x80 [ 22.146672] ret_from_fork_asm+0x1a/0x30 [ 22.146991] [ 22.147174] The buggy address belongs to the object at ffff888102993400 [ 22.147174] which belongs to the cache kmalloc-64 of size 64 [ 22.148045] The buggy address is located 0 bytes to the right of [ 22.148045] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.149057] [ 22.149216] The buggy address belongs to the physical page: [ 22.149491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.149880] flags: 0x200000000000000(node=0|zone=2) [ 22.150163] page_type: f5(slab) [ 22.150380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.151071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.151613] page dumped because: kasan: bad access detected [ 22.151970] [ 22.152100] Memory state around the buggy address: [ 22.152425] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.152837] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.154680] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.155035] ^ [ 22.155317] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.155657] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.157054] ================================================================== [ 21.408476] ================================================================== [ 21.409201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 21.410068] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.411158] [ 21.411403] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.411518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.411553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.411734] Call Trace: [ 21.411799] <TASK> [ 21.411863] dump_stack_lvl+0x73/0xb0 [ 21.412012] print_report+0xd1/0x650 [ 21.412082] ? __virt_addr_valid+0x1db/0x2d0 [ 21.412148] ? kasan_atomics_helper+0x698/0x5450 [ 21.412210] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.412273] ? kasan_atomics_helper+0x698/0x5450 [ 21.412326] kasan_report+0x140/0x180 [ 21.412386] ? kasan_atomics_helper+0x698/0x5450 [ 21.412644] kasan_check_range+0x10c/0x1c0 [ 21.412738] __kasan_check_write+0x18/0x20 [ 21.412834] kasan_atomics_helper+0x698/0x5450 [ 21.412914] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.412977] ? kasan_save_alloc_info+0x3b/0x50 [ 21.413034] ? kasan_save_track+0x18/0x40 [ 21.413071] kasan_atomics+0x1dd/0x310 [ 21.413103] ? __pfx_kasan_atomics+0x10/0x10 [ 21.413137] ? __pfx_read_tsc+0x10/0x10 [ 21.413170] ? ktime_get_ts64+0x86/0x230 [ 21.413204] kunit_try_run_case+0x1a6/0x480 [ 21.413238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.413267] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.413308] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.413353] ? __kthread_parkme+0x82/0x160 [ 21.413385] ? preempt_count_sub+0x50/0x80 [ 21.413420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.413474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.413535] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.413581] kthread+0x324/0x6e0 [ 21.413613] ? trace_preempt_on+0x20/0xc0 [ 21.413648] ? __pfx_kthread+0x10/0x10 [ 21.413678] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.413711] ? calculate_sigpending+0x7b/0xa0 [ 21.413741] ? __pfx_kthread+0x10/0x10 [ 21.413771] ret_from_fork+0x41/0x80 [ 21.413798] ? __pfx_kthread+0x10/0x10 [ 21.413828] ret_from_fork_asm+0x1a/0x30 [ 21.413892] </TASK> [ 21.413909] [ 21.432231] Allocated by task 273: [ 21.432644] kasan_save_stack+0x45/0x70 [ 21.432999] kasan_save_track+0x18/0x40 [ 21.433739] kasan_save_alloc_info+0x3b/0x50 [ 21.434051] __kasan_kmalloc+0xb7/0xc0 [ 21.434518] __kmalloc_cache_noprof+0x18a/0x420 [ 21.434868] kasan_atomics+0x96/0x310 [ 21.435266] kunit_try_run_case+0x1a6/0x480 [ 21.435620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.436712] kthread+0x324/0x6e0 [ 21.437283] ret_from_fork+0x41/0x80 [ 21.437669] ret_from_fork_asm+0x1a/0x30 [ 21.438324] [ 21.438536] The buggy address belongs to the object at ffff888102993400 [ 21.438536] which belongs to the cache kmalloc-64 of size 64 [ 21.439872] The buggy address is located 0 bytes to the right of [ 21.439872] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.440915] [ 21.441131] The buggy address belongs to the physical page: [ 21.441902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.442410] flags: 0x200000000000000(node=0|zone=2) [ 21.443025] page_type: f5(slab) [ 21.443385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.444199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.445104] page dumped because: kasan: bad access detected [ 21.445580] [ 21.446005] Memory state around the buggy address: [ 21.446370] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.446981] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.447617] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.448573] ^ [ 21.449229] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.449620] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.450159] ================================================================== [ 23.283841] ================================================================== [ 23.284460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 23.285000] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.285676] [ 23.286029] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.286124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.286151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.286195] Call Trace: [ 23.286234] <TASK> [ 23.286272] dump_stack_lvl+0x73/0xb0 [ 23.286371] print_report+0xd1/0x650 [ 23.286450] ? __virt_addr_valid+0x1db/0x2d0 [ 23.286514] ? kasan_atomics_helper+0x4f9a/0x5450 [ 23.286576] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.286647] ? kasan_atomics_helper+0x4f9a/0x5450 [ 23.286708] kasan_report+0x140/0x180 [ 23.286774] ? kasan_atomics_helper+0x4f9a/0x5450 [ 23.286862] __asan_report_load8_noabort+0x18/0x20 [ 23.286927] kasan_atomics_helper+0x4f9a/0x5450 [ 23.286986] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.287077] ? kasan_save_alloc_info+0x3b/0x50 [ 23.287156] ? kasan_save_track+0x18/0x40 [ 23.287222] kasan_atomics+0x1dd/0x310 [ 23.287357] ? __pfx_kasan_atomics+0x10/0x10 [ 23.287429] ? __pfx_read_tsc+0x10/0x10 [ 23.287483] ? ktime_get_ts64+0x86/0x230 [ 23.287545] kunit_try_run_case+0x1a6/0x480 [ 23.287603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.287654] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.287732] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.287797] ? __kthread_parkme+0x82/0x160 [ 23.287878] ? preempt_count_sub+0x50/0x80 [ 23.287935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.287989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.288045] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.288098] kthread+0x324/0x6e0 [ 23.288143] ? trace_preempt_on+0x20/0xc0 [ 23.288193] ? __pfx_kthread+0x10/0x10 [ 23.288241] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.288342] ? calculate_sigpending+0x7b/0xa0 [ 23.288409] ? __pfx_kthread+0x10/0x10 [ 23.288474] ret_from_fork+0x41/0x80 [ 23.288532] ? __pfx_kthread+0x10/0x10 [ 23.288593] ret_from_fork_asm+0x1a/0x30 [ 23.288683] </TASK> [ 23.288715] [ 23.301140] Allocated by task 273: [ 23.301977] kasan_save_stack+0x45/0x70 [ 23.302662] kasan_save_track+0x18/0x40 [ 23.303607] kasan_save_alloc_info+0x3b/0x50 [ 23.304408] __kasan_kmalloc+0xb7/0xc0 [ 23.304611] __kmalloc_cache_noprof+0x18a/0x420 [ 23.305102] kasan_atomics+0x96/0x310 [ 23.305663] kunit_try_run_case+0x1a6/0x480 [ 23.306266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.306978] kthread+0x324/0x6e0 [ 23.307506] ret_from_fork+0x41/0x80 [ 23.307813] ret_from_fork_asm+0x1a/0x30 [ 23.308126] [ 23.308335] The buggy address belongs to the object at ffff888102993400 [ 23.308335] which belongs to the cache kmalloc-64 of size 64 [ 23.309183] The buggy address is located 0 bytes to the right of [ 23.309183] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.310721] [ 23.310958] The buggy address belongs to the physical page: [ 23.311204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.311933] flags: 0x200000000000000(node=0|zone=2) [ 23.312537] page_type: f5(slab) [ 23.313192] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.313898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.314505] page dumped because: kasan: bad access detected [ 23.314871] [ 23.315080] Memory state around the buggy address: [ 23.315511] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.316027] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.316376] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.316999] ^ [ 23.317418] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.318232] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.318838] ================================================================== [ 23.320249] ================================================================== [ 23.320960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 23.321622] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.322510] [ 23.323022] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.323167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.323224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.323281] Call Trace: [ 23.323345] <TASK> [ 23.323396] dump_stack_lvl+0x73/0xb0 [ 23.323513] print_report+0xd1/0x650 [ 23.323579] ? __virt_addr_valid+0x1db/0x2d0 [ 23.323643] ? kasan_atomics_helper+0x20c9/0x5450 [ 23.323716] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.323787] ? kasan_atomics_helper+0x20c9/0x5450 [ 23.323876] kasan_report+0x140/0x180 [ 23.323942] ? kasan_atomics_helper+0x20c9/0x5450 [ 23.324013] kasan_check_range+0x10c/0x1c0 [ 23.324073] __kasan_check_write+0x18/0x20 [ 23.324125] kasan_atomics_helper+0x20c9/0x5450 [ 23.324186] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.324279] ? kasan_save_alloc_info+0x3b/0x50 [ 23.324344] ? kasan_save_track+0x18/0x40 [ 23.324427] kasan_atomics+0x1dd/0x310 [ 23.324486] ? __pfx_kasan_atomics+0x10/0x10 [ 23.324549] ? __pfx_read_tsc+0x10/0x10 [ 23.324613] ? ktime_get_ts64+0x86/0x230 [ 23.324689] kunit_try_run_case+0x1a6/0x480 [ 23.324752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.324802] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.324842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.324903] ? __kthread_parkme+0x82/0x160 [ 23.324936] ? preempt_count_sub+0x50/0x80 [ 23.324972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.325004] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.325043] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.325096] kthread+0x324/0x6e0 [ 23.325138] ? trace_preempt_on+0x20/0xc0 [ 23.325184] ? __pfx_kthread+0x10/0x10 [ 23.325224] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.325270] ? calculate_sigpending+0x7b/0xa0 [ 23.325318] ? __pfx_kthread+0x10/0x10 [ 23.325362] ret_from_fork+0x41/0x80 [ 23.325393] ? __pfx_kthread+0x10/0x10 [ 23.325424] ret_from_fork_asm+0x1a/0x30 [ 23.325468] </TASK> [ 23.325484] [ 23.340221] Allocated by task 273: [ 23.340751] kasan_save_stack+0x45/0x70 [ 23.341117] kasan_save_track+0x18/0x40 [ 23.341641] kasan_save_alloc_info+0x3b/0x50 [ 23.342124] __kasan_kmalloc+0xb7/0xc0 [ 23.342628] __kmalloc_cache_noprof+0x18a/0x420 [ 23.343087] kasan_atomics+0x96/0x310 [ 23.343631] kunit_try_run_case+0x1a6/0x480 [ 23.344111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.344589] kthread+0x324/0x6e0 [ 23.344826] ret_from_fork+0x41/0x80 [ 23.345236] ret_from_fork_asm+0x1a/0x30 [ 23.345628] [ 23.345819] The buggy address belongs to the object at ffff888102993400 [ 23.345819] which belongs to the cache kmalloc-64 of size 64 [ 23.346520] The buggy address is located 0 bytes to the right of [ 23.346520] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.347317] [ 23.347532] The buggy address belongs to the physical page: [ 23.348022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.348543] flags: 0x200000000000000(node=0|zone=2) [ 23.348964] page_type: f5(slab) [ 23.349334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.349878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.350348] page dumped because: kasan: bad access detected [ 23.350869] [ 23.351093] Memory state around the buggy address: [ 23.351479] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.351949] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.352582] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.352955] ^ [ 23.353456] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.354028] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.354527] ================================================================== [ 22.719768] ================================================================== [ 22.720170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 22.720892] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.721957] [ 22.722819] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.722940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.722978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.723158] Call Trace: [ 22.723206] <TASK> [ 22.723242] dump_stack_lvl+0x73/0xb0 [ 22.723291] print_report+0xd1/0x650 [ 22.723339] ? __virt_addr_valid+0x1db/0x2d0 [ 22.723375] ? kasan_atomics_helper+0x1780/0x5450 [ 22.723406] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.723442] ? kasan_atomics_helper+0x1780/0x5450 [ 22.723471] kasan_report+0x140/0x180 [ 22.723501] ? kasan_atomics_helper+0x1780/0x5450 [ 22.723536] kasan_check_range+0x10c/0x1c0 [ 22.723567] __kasan_check_write+0x18/0x20 [ 22.723598] kasan_atomics_helper+0x1780/0x5450 [ 22.723629] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.723660] ? kasan_save_alloc_info+0x3b/0x50 [ 22.723702] ? kasan_save_track+0x18/0x40 [ 22.723734] kasan_atomics+0x1dd/0x310 [ 22.723763] ? __pfx_kasan_atomics+0x10/0x10 [ 22.723795] ? __pfx_read_tsc+0x10/0x10 [ 22.723824] ? ktime_get_ts64+0x86/0x230 [ 22.723879] kunit_try_run_case+0x1a6/0x480 [ 22.723914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.723944] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.723977] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.724010] ? __kthread_parkme+0x82/0x160 [ 22.724041] ? preempt_count_sub+0x50/0x80 [ 22.724089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.724125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.724162] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.724206] kthread+0x324/0x6e0 [ 22.724238] ? trace_preempt_on+0x20/0xc0 [ 22.724278] ? __pfx_kthread+0x10/0x10 [ 22.724326] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.724360] ? calculate_sigpending+0x7b/0xa0 [ 22.724396] ? __pfx_kthread+0x10/0x10 [ 22.724431] ret_from_fork+0x41/0x80 [ 22.724457] ? __pfx_kthread+0x10/0x10 [ 22.724498] ret_from_fork_asm+0x1a/0x30 [ 22.724541] </TASK> [ 22.724565] [ 22.741980] Allocated by task 273: [ 22.742191] kasan_save_stack+0x45/0x70 [ 22.742819] kasan_save_track+0x18/0x40 [ 22.743222] kasan_save_alloc_info+0x3b/0x50 [ 22.743878] __kasan_kmalloc+0xb7/0xc0 [ 22.744396] __kmalloc_cache_noprof+0x18a/0x420 [ 22.744749] kasan_atomics+0x96/0x310 [ 22.745376] kunit_try_run_case+0x1a6/0x480 [ 22.745926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.746291] kthread+0x324/0x6e0 [ 22.746817] ret_from_fork+0x41/0x80 [ 22.747094] ret_from_fork_asm+0x1a/0x30 [ 22.747712] [ 22.747973] The buggy address belongs to the object at ffff888102993400 [ 22.747973] which belongs to the cache kmalloc-64 of size 64 [ 22.749032] The buggy address is located 0 bytes to the right of [ 22.749032] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.750119] [ 22.750273] The buggy address belongs to the physical page: [ 22.750813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.751412] flags: 0x200000000000000(node=0|zone=2) [ 22.752223] page_type: f5(slab) [ 22.752706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.752929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.753108] page dumped because: kasan: bad access detected [ 22.753245] [ 22.753372] Memory state around the buggy address: [ 22.753634] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.754375] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.755068] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.755754] ^ [ 22.756279] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.756976] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.757583] ================================================================== [ 22.901931] ================================================================== [ 22.902719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 22.903522] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.904188] [ 22.904389] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.904484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.904514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.904558] Call Trace: [ 22.904597] <TASK> [ 22.904633] dump_stack_lvl+0x73/0xb0 [ 22.904699] print_report+0xd1/0x650 [ 22.904750] ? __virt_addr_valid+0x1db/0x2d0 [ 22.904804] ? kasan_atomics_helper+0x1a80/0x5450 [ 22.904878] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.904946] ? kasan_atomics_helper+0x1a80/0x5450 [ 22.905003] kasan_report+0x140/0x180 [ 22.905067] ? kasan_atomics_helper+0x1a80/0x5450 [ 22.905133] kasan_check_range+0x10c/0x1c0 [ 22.905190] __kasan_check_write+0x18/0x20 [ 22.905252] kasan_atomics_helper+0x1a80/0x5450 [ 22.905312] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.905376] ? kasan_save_alloc_info+0x3b/0x50 [ 22.905440] ? kasan_save_track+0x18/0x40 [ 22.905498] kasan_atomics+0x1dd/0x310 [ 22.905554] ? __pfx_kasan_atomics+0x10/0x10 [ 22.905588] ? __pfx_read_tsc+0x10/0x10 [ 22.905631] ? ktime_get_ts64+0x86/0x230 [ 22.905670] kunit_try_run_case+0x1a6/0x480 [ 22.905705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.905735] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.905770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.905802] ? __kthread_parkme+0x82/0x160 [ 22.905833] ? preempt_count_sub+0x50/0x80 [ 22.905887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.905920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.905956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.905991] kthread+0x324/0x6e0 [ 22.906020] ? trace_preempt_on+0x20/0xc0 [ 22.906053] ? __pfx_kthread+0x10/0x10 [ 22.906082] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.906113] ? calculate_sigpending+0x7b/0xa0 [ 22.906143] ? __pfx_kthread+0x10/0x10 [ 22.906173] ret_from_fork+0x41/0x80 [ 22.906200] ? __pfx_kthread+0x10/0x10 [ 22.906230] ret_from_fork_asm+0x1a/0x30 [ 22.906273] </TASK> [ 22.906291] [ 22.918315] Allocated by task 273: [ 22.918608] kasan_save_stack+0x45/0x70 [ 22.918899] kasan_save_track+0x18/0x40 [ 22.919212] kasan_save_alloc_info+0x3b/0x50 [ 22.919659] __kasan_kmalloc+0xb7/0xc0 [ 22.920055] __kmalloc_cache_noprof+0x18a/0x420 [ 22.920552] kasan_atomics+0x96/0x310 [ 22.920926] kunit_try_run_case+0x1a6/0x480 [ 22.921301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.921615] kthread+0x324/0x6e0 [ 22.921844] ret_from_fork+0x41/0x80 [ 22.922245] ret_from_fork_asm+0x1a/0x30 [ 22.922785] [ 22.923025] The buggy address belongs to the object at ffff888102993400 [ 22.923025] which belongs to the cache kmalloc-64 of size 64 [ 22.924187] The buggy address is located 0 bytes to the right of [ 22.924187] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.924770] [ 22.925005] The buggy address belongs to the physical page: [ 22.925518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.926351] flags: 0x200000000000000(node=0|zone=2) [ 22.926745] page_type: f5(slab) [ 22.926997] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.927711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.928147] page dumped because: kasan: bad access detected [ 22.928428] [ 22.928572] Memory state around the buggy address: [ 22.928827] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.929524] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.930481] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.931181] ^ [ 22.932648] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.934244] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.934921] ================================================================== [ 22.520356] ================================================================== [ 22.520919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 22.521297] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.521966] [ 22.522296] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.522416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.522452] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.522526] Call Trace: [ 22.522571] <TASK> [ 22.522613] dump_stack_lvl+0x73/0xb0 [ 22.522697] print_report+0xd1/0x650 [ 22.522762] ? __virt_addr_valid+0x1db/0x2d0 [ 22.522833] ? kasan_atomics_helper+0x151e/0x5450 [ 22.522913] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.522985] ? kasan_atomics_helper+0x151e/0x5450 [ 22.523069] kasan_report+0x140/0x180 [ 22.523171] ? kasan_atomics_helper+0x151e/0x5450 [ 22.523262] kasan_check_range+0x10c/0x1c0 [ 22.523342] __kasan_check_write+0x18/0x20 [ 22.523425] kasan_atomics_helper+0x151e/0x5450 [ 22.523506] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.523584] ? kasan_save_alloc_info+0x3b/0x50 [ 22.523647] ? kasan_save_track+0x18/0x40 [ 22.523729] kasan_atomics+0x1dd/0x310 [ 22.523784] ? __pfx_kasan_atomics+0x10/0x10 [ 22.523840] ? __pfx_read_tsc+0x10/0x10 [ 22.523915] ? ktime_get_ts64+0x86/0x230 [ 22.523989] kunit_try_run_case+0x1a6/0x480 [ 22.524075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.524139] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.524206] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.524270] ? __kthread_parkme+0x82/0x160 [ 22.524352] ? preempt_count_sub+0x50/0x80 [ 22.524437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.524501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.524568] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.524646] kthread+0x324/0x6e0 [ 22.524722] ? trace_preempt_on+0x20/0xc0 [ 22.524792] ? __pfx_kthread+0x10/0x10 [ 22.524865] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.524932] ? calculate_sigpending+0x7b/0xa0 [ 22.525004] ? __pfx_kthread+0x10/0x10 [ 22.525084] ret_from_fork+0x41/0x80 [ 22.525138] ? __pfx_kthread+0x10/0x10 [ 22.525197] ret_from_fork_asm+0x1a/0x30 [ 22.525286] </TASK> [ 22.525319] [ 22.538722] Allocated by task 273: [ 22.539110] kasan_save_stack+0x45/0x70 [ 22.539707] kasan_save_track+0x18/0x40 [ 22.540127] kasan_save_alloc_info+0x3b/0x50 [ 22.540729] __kasan_kmalloc+0xb7/0xc0 [ 22.541026] __kmalloc_cache_noprof+0x18a/0x420 [ 22.541479] kasan_atomics+0x96/0x310 [ 22.541780] kunit_try_run_case+0x1a6/0x480 [ 22.542164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.542953] kthread+0x324/0x6e0 [ 22.543255] ret_from_fork+0x41/0x80 [ 22.543597] ret_from_fork_asm+0x1a/0x30 [ 22.544014] [ 22.544235] The buggy address belongs to the object at ffff888102993400 [ 22.544235] which belongs to the cache kmalloc-64 of size 64 [ 22.544994] The buggy address is located 0 bytes to the right of [ 22.544994] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.545527] [ 22.545675] The buggy address belongs to the physical page: [ 22.546086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.548258] flags: 0x200000000000000(node=0|zone=2) [ 22.548746] page_type: f5(slab) [ 22.548999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.549656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.550317] page dumped because: kasan: bad access detected [ 22.550570] [ 22.550706] Memory state around the buggy address: [ 22.551121] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.552723] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.553065] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.553387] ^ [ 22.553637] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.553969] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.556720] ================================================================== [ 21.909353] ================================================================== [ 21.909914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 21.910581] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.911038] [ 21.911307] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.911417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.911453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.911504] Call Trace: [ 21.911545] <TASK> [ 21.911588] dump_stack_lvl+0x73/0xb0 [ 21.911671] print_report+0xd1/0x650 [ 21.911750] ? __virt_addr_valid+0x1db/0x2d0 [ 21.911819] ? kasan_atomics_helper+0xde1/0x5450 [ 21.911930] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.912001] ? kasan_atomics_helper+0xde1/0x5450 [ 21.912063] kasan_report+0x140/0x180 [ 21.912122] ? kasan_atomics_helper+0xde1/0x5450 [ 21.912177] kasan_check_range+0x10c/0x1c0 [ 21.912215] __kasan_check_write+0x18/0x20 [ 21.912248] kasan_atomics_helper+0xde1/0x5450 [ 21.912278] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.912335] ? kasan_save_alloc_info+0x3b/0x50 [ 21.912368] ? kasan_save_track+0x18/0x40 [ 21.912401] kasan_atomics+0x1dd/0x310 [ 21.912431] ? __pfx_kasan_atomics+0x10/0x10 [ 21.912464] ? __pfx_read_tsc+0x10/0x10 [ 21.912495] ? ktime_get_ts64+0x86/0x230 [ 21.912531] kunit_try_run_case+0x1a6/0x480 [ 21.912566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.912595] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.912631] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.912663] ? __kthread_parkme+0x82/0x160 [ 21.912693] ? preempt_count_sub+0x50/0x80 [ 21.912726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.912759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.912793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.912828] kthread+0x324/0x6e0 [ 21.912876] ? trace_preempt_on+0x20/0xc0 [ 21.912910] ? __pfx_kthread+0x10/0x10 [ 21.912940] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.912971] ? calculate_sigpending+0x7b/0xa0 [ 21.913002] ? __pfx_kthread+0x10/0x10 [ 21.913033] ret_from_fork+0x41/0x80 [ 21.913058] ? __pfx_kthread+0x10/0x10 [ 21.913088] ret_from_fork_asm+0x1a/0x30 [ 21.913131] </TASK> [ 21.913146] [ 21.929218] Allocated by task 273: [ 21.930315] kasan_save_stack+0x45/0x70 [ 21.930875] kasan_save_track+0x18/0x40 [ 21.931185] kasan_save_alloc_info+0x3b/0x50 [ 21.931777] __kasan_kmalloc+0xb7/0xc0 [ 21.932092] __kmalloc_cache_noprof+0x18a/0x420 [ 21.932402] kasan_atomics+0x96/0x310 [ 21.933001] kunit_try_run_case+0x1a6/0x480 [ 21.933350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.933694] kthread+0x324/0x6e0 [ 21.933985] ret_from_fork+0x41/0x80 [ 21.934348] ret_from_fork_asm+0x1a/0x30 [ 21.934653] [ 21.935500] The buggy address belongs to the object at ffff888102993400 [ 21.935500] which belongs to the cache kmalloc-64 of size 64 [ 21.936275] The buggy address is located 0 bytes to the right of [ 21.936275] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.937436] [ 21.937560] The buggy address belongs to the physical page: [ 21.938179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.938962] flags: 0x200000000000000(node=0|zone=2) [ 21.939609] page_type: f5(slab) [ 21.939961] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.940768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.941225] page dumped because: kasan: bad access detected [ 21.942038] [ 21.942254] Memory state around the buggy address: [ 21.942915] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.943341] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.943767] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.944194] ^ [ 21.945198] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.945976] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.946605] ================================================================== [ 21.200784] ================================================================== [ 21.201343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 21.201887] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.202340] [ 21.202528] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.202640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.202675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.202730] Call Trace: [ 21.202772] <TASK> [ 21.202816] dump_stack_lvl+0x73/0xb0 [ 21.202913] print_report+0xd1/0x650 [ 21.202980] ? __virt_addr_valid+0x1db/0x2d0 [ 21.203044] ? kasan_atomics_helper+0x4b56/0x5450 [ 21.203100] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.203167] ? kasan_atomics_helper+0x4b56/0x5450 [ 21.203230] kasan_report+0x140/0x180 [ 21.203293] ? kasan_atomics_helper+0x4b56/0x5450 [ 21.203355] __asan_report_load4_noabort+0x18/0x20 [ 21.203420] kasan_atomics_helper+0x4b56/0x5450 [ 21.203483] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.203548] ? kasan_save_alloc_info+0x3b/0x50 [ 21.203603] ? kasan_save_track+0x18/0x40 [ 21.203639] kasan_atomics+0x1dd/0x310 [ 21.203673] ? __pfx_kasan_atomics+0x10/0x10 [ 21.203718] ? __pfx_read_tsc+0x10/0x10 [ 21.203749] ? ktime_get_ts64+0x86/0x230 [ 21.203786] kunit_try_run_case+0x1a6/0x480 [ 21.203821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.203880] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.203947] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.203999] ? __kthread_parkme+0x82/0x160 [ 21.204051] ? preempt_count_sub+0x50/0x80 [ 21.204106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.204155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.204213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.204269] kthread+0x324/0x6e0 [ 21.204361] ? trace_preempt_on+0x20/0xc0 [ 21.204421] ? __pfx_kthread+0x10/0x10 [ 21.204508] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.204563] ? calculate_sigpending+0x7b/0xa0 [ 21.204615] ? __pfx_kthread+0x10/0x10 [ 21.204665] ret_from_fork+0x41/0x80 [ 21.204702] ? __pfx_kthread+0x10/0x10 [ 21.204733] ret_from_fork_asm+0x1a/0x30 [ 21.204778] </TASK> [ 21.204794] [ 21.222562] Allocated by task 273: [ 21.223007] kasan_save_stack+0x45/0x70 [ 21.223808] kasan_save_track+0x18/0x40 [ 21.224102] kasan_save_alloc_info+0x3b/0x50 [ 21.224368] __kasan_kmalloc+0xb7/0xc0 [ 21.224801] __kmalloc_cache_noprof+0x18a/0x420 [ 21.225279] kasan_atomics+0x96/0x310 [ 21.225840] kunit_try_run_case+0x1a6/0x480 [ 21.226311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.226885] kthread+0x324/0x6e0 [ 21.227285] ret_from_fork+0x41/0x80 [ 21.228175] ret_from_fork_asm+0x1a/0x30 [ 21.228731] [ 21.229082] The buggy address belongs to the object at ffff888102993400 [ 21.229082] which belongs to the cache kmalloc-64 of size 64 [ 21.230045] The buggy address is located 0 bytes to the right of [ 21.230045] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.230974] [ 21.231109] The buggy address belongs to the physical page: [ 21.231500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.231983] flags: 0x200000000000000(node=0|zone=2) [ 21.232265] page_type: f5(slab) [ 21.233389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.234102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.235083] page dumped because: kasan: bad access detected [ 21.235542] [ 21.235942] Memory state around the buggy address: [ 21.236351] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.236925] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.237518] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.237875] ^ [ 21.238319] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.238797] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.240030] ================================================================== [ 23.356146] ================================================================== [ 23.356892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 23.357455] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.358043] [ 23.358237] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.358390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.358425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.358482] Call Trace: [ 23.358529] <TASK> [ 23.358576] dump_stack_lvl+0x73/0xb0 [ 23.358670] print_report+0xd1/0x650 [ 23.358733] ? __virt_addr_valid+0x1db/0x2d0 [ 23.358795] ? kasan_atomics_helper+0x4fb4/0x5450 [ 23.358868] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.358936] ? kasan_atomics_helper+0x4fb4/0x5450 [ 23.358990] kasan_report+0x140/0x180 [ 23.359046] ? kasan_atomics_helper+0x4fb4/0x5450 [ 23.359110] __asan_report_load8_noabort+0x18/0x20 [ 23.359175] kasan_atomics_helper+0x4fb4/0x5450 [ 23.359231] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.359330] ? kasan_save_alloc_info+0x3b/0x50 [ 23.359391] ? kasan_save_track+0x18/0x40 [ 23.359456] kasan_atomics+0x1dd/0x310 [ 23.359513] ? __pfx_kasan_atomics+0x10/0x10 [ 23.359573] ? __pfx_read_tsc+0x10/0x10 [ 23.359632] ? ktime_get_ts64+0x86/0x230 [ 23.359711] kunit_try_run_case+0x1a6/0x480 [ 23.359776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.359834] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.359921] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.359986] ? __kthread_parkme+0x82/0x160 [ 23.360045] ? preempt_count_sub+0x50/0x80 [ 23.360112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.360171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.360236] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.360333] kthread+0x324/0x6e0 [ 23.360397] ? trace_preempt_on+0x20/0xc0 [ 23.360452] ? __pfx_kthread+0x10/0x10 [ 23.360486] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.360522] ? calculate_sigpending+0x7b/0xa0 [ 23.360553] ? __pfx_kthread+0x10/0x10 [ 23.360584] ret_from_fork+0x41/0x80 [ 23.360610] ? __pfx_kthread+0x10/0x10 [ 23.360640] ret_from_fork_asm+0x1a/0x30 [ 23.360684] </TASK> [ 23.360701] [ 23.372221] Allocated by task 273: [ 23.372608] kasan_save_stack+0x45/0x70 [ 23.373018] kasan_save_track+0x18/0x40 [ 23.373411] kasan_save_alloc_info+0x3b/0x50 [ 23.373718] __kasan_kmalloc+0xb7/0xc0 [ 23.374111] __kmalloc_cache_noprof+0x18a/0x420 [ 23.374594] kasan_atomics+0x96/0x310 [ 23.374906] kunit_try_run_case+0x1a6/0x480 [ 23.375178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.375712] kthread+0x324/0x6e0 [ 23.376100] ret_from_fork+0x41/0x80 [ 23.376517] ret_from_fork_asm+0x1a/0x30 [ 23.376926] [ 23.377108] The buggy address belongs to the object at ffff888102993400 [ 23.377108] which belongs to the cache kmalloc-64 of size 64 [ 23.377717] The buggy address is located 0 bytes to the right of [ 23.377717] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.378752] [ 23.378991] The buggy address belongs to the physical page: [ 23.379529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.379946] flags: 0x200000000000000(node=0|zone=2) [ 23.380443] page_type: f5(slab) [ 23.380796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.381479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.382123] page dumped because: kasan: bad access detected [ 23.382442] [ 23.382593] Memory state around the buggy address: [ 23.382876] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.383543] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.384172] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.384813] ^ [ 23.385140] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.385529] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.386070] ================================================================== [ 22.301635] ================================================================== [ 22.302087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 22.302493] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.303469] [ 22.303727] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.303836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.303886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.303928] Call Trace: [ 22.303964] <TASK> [ 22.303998] dump_stack_lvl+0x73/0xb0 [ 22.304060] print_report+0xd1/0x650 [ 22.304109] ? __virt_addr_valid+0x1db/0x2d0 [ 22.304155] ? kasan_atomics_helper+0x12e7/0x5450 [ 22.304201] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.304277] ? kasan_atomics_helper+0x12e7/0x5450 [ 22.304354] kasan_report+0x140/0x180 [ 22.304420] ? kasan_atomics_helper+0x12e7/0x5450 [ 22.304496] kasan_check_range+0x10c/0x1c0 [ 22.304562] __kasan_check_write+0x18/0x20 [ 22.304621] kasan_atomics_helper+0x12e7/0x5450 [ 22.304681] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.304740] ? kasan_save_alloc_info+0x3b/0x50 [ 22.304803] ? kasan_save_track+0x18/0x40 [ 22.304889] kasan_atomics+0x1dd/0x310 [ 22.304962] ? __pfx_kasan_atomics+0x10/0x10 [ 22.305034] ? __pfx_read_tsc+0x10/0x10 [ 22.305084] ? ktime_get_ts64+0x86/0x230 [ 22.305145] kunit_try_run_case+0x1a6/0x480 [ 22.305210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.305270] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.305332] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.305410] ? __kthread_parkme+0x82/0x160 [ 22.305461] ? preempt_count_sub+0x50/0x80 [ 22.305524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.305585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.305659] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.305727] kthread+0x324/0x6e0 [ 22.305788] ? trace_preempt_on+0x20/0xc0 [ 22.305870] ? __pfx_kthread+0x10/0x10 [ 22.305930] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.305997] ? calculate_sigpending+0x7b/0xa0 [ 22.306059] ? __pfx_kthread+0x10/0x10 [ 22.306121] ret_from_fork+0x41/0x80 [ 22.306171] ? __pfx_kthread+0x10/0x10 [ 22.306241] ret_from_fork_asm+0x1a/0x30 [ 22.306343] </TASK> [ 22.306378] [ 22.322279] Allocated by task 273: [ 22.322726] kasan_save_stack+0x45/0x70 [ 22.323393] kasan_save_track+0x18/0x40 [ 22.323983] kasan_save_alloc_info+0x3b/0x50 [ 22.324494] __kasan_kmalloc+0xb7/0xc0 [ 22.324985] __kmalloc_cache_noprof+0x18a/0x420 [ 22.325294] kasan_atomics+0x96/0x310 [ 22.325674] kunit_try_run_case+0x1a6/0x480 [ 22.326346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.326819] kthread+0x324/0x6e0 [ 22.327287] ret_from_fork+0x41/0x80 [ 22.327662] ret_from_fork_asm+0x1a/0x30 [ 22.328165] [ 22.328402] The buggy address belongs to the object at ffff888102993400 [ 22.328402] which belongs to the cache kmalloc-64 of size 64 [ 22.329428] The buggy address is located 0 bytes to the right of [ 22.329428] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.330242] [ 22.330463] The buggy address belongs to the physical page: [ 22.331202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.331755] flags: 0x200000000000000(node=0|zone=2) [ 22.332239] page_type: f5(slab) [ 22.332579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.332989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.333689] page dumped because: kasan: bad access detected [ 22.334115] [ 22.334273] Memory state around the buggy address: [ 22.334706] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.335076] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.336113] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.336549] ^ [ 22.337010] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.337467] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.337842] ================================================================== [ 21.831530] ================================================================== [ 21.832261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 21.833355] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.833819] [ 21.834219] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.834352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.834389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.834444] Call Trace: [ 21.834486] <TASK> [ 21.834530] dump_stack_lvl+0x73/0xb0 [ 21.834815] print_report+0xd1/0x650 [ 21.834910] ? __virt_addr_valid+0x1db/0x2d0 [ 21.834978] ? kasan_atomics_helper+0x4a86/0x5450 [ 21.835042] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.835111] ? kasan_atomics_helper+0x4a86/0x5450 [ 21.835166] kasan_report+0x140/0x180 [ 21.835203] ? kasan_atomics_helper+0x4a86/0x5450 [ 21.835238] __asan_report_load4_noabort+0x18/0x20 [ 21.835271] kasan_atomics_helper+0x4a86/0x5450 [ 21.835310] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.835350] ? kasan_save_alloc_info+0x3b/0x50 [ 21.835380] ? kasan_save_track+0x18/0x40 [ 21.835413] kasan_atomics+0x1dd/0x310 [ 21.835459] ? __pfx_kasan_atomics+0x10/0x10 [ 21.835515] ? __pfx_read_tsc+0x10/0x10 [ 21.835562] ? ktime_get_ts64+0x86/0x230 [ 21.835600] kunit_try_run_case+0x1a6/0x480 [ 21.835635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.835665] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.835711] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.835744] ? __kthread_parkme+0x82/0x160 [ 21.835777] ? preempt_count_sub+0x50/0x80 [ 21.835811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.835844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.835900] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.835935] kthread+0x324/0x6e0 [ 21.835966] ? trace_preempt_on+0x20/0xc0 [ 21.836001] ? __pfx_kthread+0x10/0x10 [ 21.836031] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.836063] ? calculate_sigpending+0x7b/0xa0 [ 21.836093] ? __pfx_kthread+0x10/0x10 [ 21.836124] ret_from_fork+0x41/0x80 [ 21.836151] ? __pfx_kthread+0x10/0x10 [ 21.836181] ret_from_fork_asm+0x1a/0x30 [ 21.836224] </TASK> [ 21.836240] [ 21.853103] Allocated by task 273: [ 21.853533] kasan_save_stack+0x45/0x70 [ 21.853975] kasan_save_track+0x18/0x40 [ 21.854359] kasan_save_alloc_info+0x3b/0x50 [ 21.854805] __kasan_kmalloc+0xb7/0xc0 [ 21.855619] __kmalloc_cache_noprof+0x18a/0x420 [ 21.855986] kasan_atomics+0x96/0x310 [ 21.856943] kunit_try_run_case+0x1a6/0x480 [ 21.857364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.857977] kthread+0x324/0x6e0 [ 21.858386] ret_from_fork+0x41/0x80 [ 21.858961] ret_from_fork_asm+0x1a/0x30 [ 21.859352] [ 21.859663] The buggy address belongs to the object at ffff888102993400 [ 21.859663] which belongs to the cache kmalloc-64 of size 64 [ 21.861082] The buggy address is located 0 bytes to the right of [ 21.861082] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.862182] [ 21.862647] The buggy address belongs to the physical page: [ 21.863052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.863744] flags: 0x200000000000000(node=0|zone=2) [ 21.864250] page_type: f5(slab) [ 21.865090] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.865749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.866378] page dumped because: kasan: bad access detected [ 21.866913] [ 21.867303] Memory state around the buggy address: [ 21.867660] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.868094] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.868488] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.869687] ^ [ 21.870141] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.870660] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.871433] ================================================================== [ 21.241247] ================================================================== [ 21.241838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 21.242538] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.243573] [ 21.243791] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.243953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.243992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.244045] Call Trace: [ 21.244093] <TASK> [ 21.244136] dump_stack_lvl+0x73/0xb0 [ 21.244215] print_report+0xd1/0x650 [ 21.244276] ? __virt_addr_valid+0x1db/0x2d0 [ 21.244657] ? kasan_atomics_helper+0x4a1/0x5450 [ 21.244726] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.244797] ? kasan_atomics_helper+0x4a1/0x5450 [ 21.244876] kasan_report+0x140/0x180 [ 21.244933] ? kasan_atomics_helper+0x4a1/0x5450 [ 21.245004] kasan_check_range+0x10c/0x1c0 [ 21.245071] __kasan_check_write+0x18/0x20 [ 21.245130] kasan_atomics_helper+0x4a1/0x5450 [ 21.245190] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.245251] ? kasan_save_alloc_info+0x3b/0x50 [ 21.245351] ? kasan_save_track+0x18/0x40 [ 21.245408] kasan_atomics+0x1dd/0x310 [ 21.245467] ? __pfx_kasan_atomics+0x10/0x10 [ 21.245501] ? __pfx_read_tsc+0x10/0x10 [ 21.245534] ? ktime_get_ts64+0x86/0x230 [ 21.245570] kunit_try_run_case+0x1a6/0x480 [ 21.245604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.245632] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.245667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.245700] ? __kthread_parkme+0x82/0x160 [ 21.245730] ? preempt_count_sub+0x50/0x80 [ 21.245764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.245795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.245829] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.245890] kthread+0x324/0x6e0 [ 21.245940] ? trace_preempt_on+0x20/0xc0 [ 21.245987] ? __pfx_kthread+0x10/0x10 [ 21.246019] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.246052] ? calculate_sigpending+0x7b/0xa0 [ 21.246083] ? __pfx_kthread+0x10/0x10 [ 21.246113] ret_from_fork+0x41/0x80 [ 21.246140] ? __pfx_kthread+0x10/0x10 [ 21.246169] ret_from_fork_asm+0x1a/0x30 [ 21.246213] </TASK> [ 21.246228] [ 21.261248] Allocated by task 273: [ 21.261735] kasan_save_stack+0x45/0x70 [ 21.262153] kasan_save_track+0x18/0x40 [ 21.262873] kasan_save_alloc_info+0x3b/0x50 [ 21.263324] __kasan_kmalloc+0xb7/0xc0 [ 21.263879] __kmalloc_cache_noprof+0x18a/0x420 [ 21.264318] kasan_atomics+0x96/0x310 [ 21.264693] kunit_try_run_case+0x1a6/0x480 [ 21.264986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.265290] kthread+0x324/0x6e0 [ 21.265659] ret_from_fork+0x41/0x80 [ 21.266044] ret_from_fork_asm+0x1a/0x30 [ 21.266467] [ 21.266680] The buggy address belongs to the object at ffff888102993400 [ 21.266680] which belongs to the cache kmalloc-64 of size 64 [ 21.268252] The buggy address is located 0 bytes to the right of [ 21.268252] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.269281] [ 21.269680] The buggy address belongs to the physical page: [ 21.270057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.271084] flags: 0x200000000000000(node=0|zone=2) [ 21.271560] page_type: f5(slab) [ 21.272098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.272988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.273351] page dumped because: kasan: bad access detected [ 21.273978] [ 21.274192] Memory state around the buggy address: [ 21.275204] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.275972] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.276485] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.276883] ^ [ 21.277352] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.277780] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.278820] ================================================================== [ 23.387554] ================================================================== [ 23.391264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 23.391976] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.392486] [ 23.392751] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.392887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.392925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.392976] Call Trace: [ 23.393019] <TASK> [ 23.393064] dump_stack_lvl+0x73/0xb0 [ 23.393153] print_report+0xd1/0x650 [ 23.393222] ? __virt_addr_valid+0x1db/0x2d0 [ 23.393329] ? kasan_atomics_helper+0x218b/0x5450 [ 23.393398] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.393461] ? kasan_atomics_helper+0x218b/0x5450 [ 23.393511] kasan_report+0x140/0x180 [ 23.393546] ? kasan_atomics_helper+0x218b/0x5450 [ 23.393582] kasan_check_range+0x10c/0x1c0 [ 23.393614] __kasan_check_write+0x18/0x20 [ 23.393645] kasan_atomics_helper+0x218b/0x5450 [ 23.393675] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.393706] ? kasan_save_alloc_info+0x3b/0x50 [ 23.393737] ? kasan_save_track+0x18/0x40 [ 23.393768] kasan_atomics+0x1dd/0x310 [ 23.393799] ? __pfx_kasan_atomics+0x10/0x10 [ 23.393830] ? __pfx_read_tsc+0x10/0x10 [ 23.393885] ? ktime_get_ts64+0x86/0x230 [ 23.393923] kunit_try_run_case+0x1a6/0x480 [ 23.393958] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.393987] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.394023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.394054] ? __kthread_parkme+0x82/0x160 [ 23.394087] ? preempt_count_sub+0x50/0x80 [ 23.394120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.394152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.394186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.394221] kthread+0x324/0x6e0 [ 23.394250] ? trace_preempt_on+0x20/0xc0 [ 23.394294] ? __pfx_kthread+0x10/0x10 [ 23.394340] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.394375] ? calculate_sigpending+0x7b/0xa0 [ 23.394406] ? __pfx_kthread+0x10/0x10 [ 23.394437] ret_from_fork+0x41/0x80 [ 23.394463] ? __pfx_kthread+0x10/0x10 [ 23.394492] ret_from_fork_asm+0x1a/0x30 [ 23.394535] </TASK> [ 23.394552] [ 23.409070] Allocated by task 273: [ 23.409548] kasan_save_stack+0x45/0x70 [ 23.409898] kasan_save_track+0x18/0x40 [ 23.410336] kasan_save_alloc_info+0x3b/0x50 [ 23.410814] __kasan_kmalloc+0xb7/0xc0 [ 23.411205] __kmalloc_cache_noprof+0x18a/0x420 [ 23.411487] kasan_atomics+0x96/0x310 [ 23.411734] kunit_try_run_case+0x1a6/0x480 [ 23.412186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.412763] kthread+0x324/0x6e0 [ 23.413168] ret_from_fork+0x41/0x80 [ 23.413716] ret_from_fork_asm+0x1a/0x30 [ 23.414152] [ 23.414564] The buggy address belongs to the object at ffff888102993400 [ 23.414564] which belongs to the cache kmalloc-64 of size 64 [ 23.415831] The buggy address is located 0 bytes to the right of [ 23.415831] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.416726] [ 23.416903] The buggy address belongs to the physical page: [ 23.417180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.418017] flags: 0x200000000000000(node=0|zone=2) [ 23.418634] page_type: f5(slab) [ 23.419031] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.419782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.420404] page dumped because: kasan: bad access detected [ 23.420650] [ 23.420889] Memory state around the buggy address: [ 23.421365] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.421900] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.422491] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.423038] ^ [ 23.423601] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.424339] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.424791] ================================================================== [ 23.493814] ================================================================== [ 23.495610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 23.496431] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.497188] [ 23.497518] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.497641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.497679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.497740] Call Trace: [ 23.497792] <TASK> [ 23.497842] dump_stack_lvl+0x73/0xb0 [ 23.497987] print_report+0xd1/0x650 [ 23.498059] ? __virt_addr_valid+0x1db/0x2d0 [ 23.498141] ? kasan_atomics_helper+0x5117/0x5450 [ 23.498199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.498259] ? kasan_atomics_helper+0x5117/0x5450 [ 23.498356] kasan_report+0x140/0x180 [ 23.498424] ? kasan_atomics_helper+0x5117/0x5450 [ 23.498499] __asan_report_load8_noabort+0x18/0x20 [ 23.498565] kasan_atomics_helper+0x5117/0x5450 [ 23.498630] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.498695] ? kasan_save_alloc_info+0x3b/0x50 [ 23.498759] ? kasan_save_track+0x18/0x40 [ 23.498824] kasan_atomics+0x1dd/0x310 [ 23.499127] ? __pfx_kasan_atomics+0x10/0x10 [ 23.499174] ? __pfx_read_tsc+0x10/0x10 [ 23.499209] ? ktime_get_ts64+0x86/0x230 [ 23.499245] kunit_try_run_case+0x1a6/0x480 [ 23.499297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.499342] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.499379] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.499414] ? __kthread_parkme+0x82/0x160 [ 23.499446] ? preempt_count_sub+0x50/0x80 [ 23.499480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.499512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.499547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.499582] kthread+0x324/0x6e0 [ 23.499612] ? trace_preempt_on+0x20/0xc0 [ 23.499645] ? __pfx_kthread+0x10/0x10 [ 23.499691] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.499724] ? calculate_sigpending+0x7b/0xa0 [ 23.499754] ? __pfx_kthread+0x10/0x10 [ 23.499785] ret_from_fork+0x41/0x80 [ 23.499810] ? __pfx_kthread+0x10/0x10 [ 23.499840] ret_from_fork_asm+0x1a/0x30 [ 23.499904] </TASK> [ 23.499921] [ 23.512665] Allocated by task 273: [ 23.513003] kasan_save_stack+0x45/0x70 [ 23.513481] kasan_save_track+0x18/0x40 [ 23.513966] kasan_save_alloc_info+0x3b/0x50 [ 23.514254] __kasan_kmalloc+0xb7/0xc0 [ 23.514503] __kmalloc_cache_noprof+0x18a/0x420 [ 23.514881] kasan_atomics+0x96/0x310 [ 23.515435] kunit_try_run_case+0x1a6/0x480 [ 23.515930] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.516582] kthread+0x324/0x6e0 [ 23.516955] ret_from_fork+0x41/0x80 [ 23.517291] ret_from_fork_asm+0x1a/0x30 [ 23.517560] [ 23.517780] The buggy address belongs to the object at ffff888102993400 [ 23.517780] which belongs to the cache kmalloc-64 of size 64 [ 23.518876] The buggy address is located 0 bytes to the right of [ 23.518876] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.519867] [ 23.520076] The buggy address belongs to the physical page: [ 23.520360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.521056] flags: 0x200000000000000(node=0|zone=2) [ 23.521668] page_type: f5(slab) [ 23.522054] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.522693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.523185] page dumped because: kasan: bad access detected [ 23.523467] [ 23.523653] Memory state around the buggy address: [ 23.524179] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.525213] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.525905] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.526300] ^ [ 23.526822] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.527470] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.527824] ================================================================== [ 21.791768] ================================================================== [ 21.792345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 21.793909] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.794363] [ 21.795033] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.795104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.795132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.795182] Call Trace: [ 21.795226] <TASK> [ 21.795267] dump_stack_lvl+0x73/0xb0 [ 21.795415] print_report+0xd1/0x650 [ 21.795498] ? __virt_addr_valid+0x1db/0x2d0 [ 21.795563] ? kasan_atomics_helper+0xc71/0x5450 [ 21.795617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.795677] ? kasan_atomics_helper+0xc71/0x5450 [ 21.795731] kasan_report+0x140/0x180 [ 21.795766] ? kasan_atomics_helper+0xc71/0x5450 [ 21.795802] kasan_check_range+0x10c/0x1c0 [ 21.795834] __kasan_check_write+0x18/0x20 [ 21.795887] kasan_atomics_helper+0xc71/0x5450 [ 21.795918] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.795949] ? kasan_save_alloc_info+0x3b/0x50 [ 21.795979] ? kasan_save_track+0x18/0x40 [ 21.796011] kasan_atomics+0x1dd/0x310 [ 21.796042] ? __pfx_kasan_atomics+0x10/0x10 [ 21.796074] ? __pfx_read_tsc+0x10/0x10 [ 21.796107] ? ktime_get_ts64+0x86/0x230 [ 21.796142] kunit_try_run_case+0x1a6/0x480 [ 21.796176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.796206] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.796241] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.796274] ? __kthread_parkme+0x82/0x160 [ 21.796304] ? preempt_count_sub+0x50/0x80 [ 21.796338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.796370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.796405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.796440] kthread+0x324/0x6e0 [ 21.796483] ? trace_preempt_on+0x20/0xc0 [ 21.796542] ? __pfx_kthread+0x10/0x10 [ 21.796590] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.796624] ? calculate_sigpending+0x7b/0xa0 [ 21.796655] ? __pfx_kthread+0x10/0x10 [ 21.796687] ret_from_fork+0x41/0x80 [ 21.796716] ? __pfx_kthread+0x10/0x10 [ 21.796747] ret_from_fork_asm+0x1a/0x30 [ 21.796792] </TASK> [ 21.796807] [ 21.813029] Allocated by task 273: [ 21.813913] kasan_save_stack+0x45/0x70 [ 21.814266] kasan_save_track+0x18/0x40 [ 21.814819] kasan_save_alloc_info+0x3b/0x50 [ 21.815151] __kasan_kmalloc+0xb7/0xc0 [ 21.815780] __kmalloc_cache_noprof+0x18a/0x420 [ 21.816144] kasan_atomics+0x96/0x310 [ 21.816656] kunit_try_run_case+0x1a6/0x480 [ 21.816987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.817935] kthread+0x324/0x6e0 [ 21.818322] ret_from_fork+0x41/0x80 [ 21.818622] ret_from_fork_asm+0x1a/0x30 [ 21.819076] [ 21.819269] The buggy address belongs to the object at ffff888102993400 [ 21.819269] which belongs to the cache kmalloc-64 of size 64 [ 21.820187] The buggy address is located 0 bytes to the right of [ 21.820187] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.821096] [ 21.821364] The buggy address belongs to the physical page: [ 21.822375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.823088] flags: 0x200000000000000(node=0|zone=2) [ 21.823792] page_type: f5(slab) [ 21.824113] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.824863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.825511] page dumped because: kasan: bad access detected [ 21.825882] [ 21.826100] Memory state around the buggy address: [ 21.826479] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.826896] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.827276] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.827829] ^ [ 21.828668] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.830388] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.830796] ================================================================== [ 21.709431] ================================================================== [ 21.709929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 21.710960] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.711744] [ 21.712017] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.712186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.712223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.712282] Call Trace: [ 21.712329] <TASK> [ 21.712373] dump_stack_lvl+0x73/0xb0 [ 21.712455] print_report+0xd1/0x650 [ 21.712518] ? __virt_addr_valid+0x1db/0x2d0 [ 21.712714] ? kasan_atomics_helper+0xac8/0x5450 [ 21.712781] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.713203] ? kasan_atomics_helper+0xac8/0x5450 [ 21.713275] kasan_report+0x140/0x180 [ 21.713337] ? kasan_atomics_helper+0xac8/0x5450 [ 21.713410] kasan_check_range+0x10c/0x1c0 [ 21.713475] __kasan_check_write+0x18/0x20 [ 21.713513] kasan_atomics_helper+0xac8/0x5450 [ 21.713545] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.713577] ? kasan_save_alloc_info+0x3b/0x50 [ 21.713608] ? kasan_save_track+0x18/0x40 [ 21.713640] kasan_atomics+0x1dd/0x310 [ 21.713671] ? __pfx_kasan_atomics+0x10/0x10 [ 21.713703] ? __pfx_read_tsc+0x10/0x10 [ 21.713733] ? ktime_get_ts64+0x86/0x230 [ 21.713769] kunit_try_run_case+0x1a6/0x480 [ 21.713803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.713832] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.713896] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.713952] ? __kthread_parkme+0x82/0x160 [ 21.714009] ? preempt_count_sub+0x50/0x80 [ 21.714055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.714090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.714127] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.714163] kthread+0x324/0x6e0 [ 21.714192] ? trace_preempt_on+0x20/0xc0 [ 21.714226] ? __pfx_kthread+0x10/0x10 [ 21.714257] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.714290] ? calculate_sigpending+0x7b/0xa0 [ 21.714336] ? __pfx_kthread+0x10/0x10 [ 21.714369] ret_from_fork+0x41/0x80 [ 21.714420] ? __pfx_kthread+0x10/0x10 [ 21.714476] ret_from_fork_asm+0x1a/0x30 [ 21.714546] </TASK> [ 21.714567] [ 21.731197] Allocated by task 273: [ 21.731580] kasan_save_stack+0x45/0x70 [ 21.731948] kasan_save_track+0x18/0x40 [ 21.732364] kasan_save_alloc_info+0x3b/0x50 [ 21.732678] __kasan_kmalloc+0xb7/0xc0 [ 21.733782] __kmalloc_cache_noprof+0x18a/0x420 [ 21.734168] kasan_atomics+0x96/0x310 [ 21.734703] kunit_try_run_case+0x1a6/0x480 [ 21.735166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.735603] kthread+0x324/0x6e0 [ 21.735983] ret_from_fork+0x41/0x80 [ 21.736422] ret_from_fork_asm+0x1a/0x30 [ 21.737473] [ 21.737630] The buggy address belongs to the object at ffff888102993400 [ 21.737630] which belongs to the cache kmalloc-64 of size 64 [ 21.738138] The buggy address is located 0 bytes to the right of [ 21.738138] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.740028] [ 21.740179] The buggy address belongs to the physical page: [ 21.740602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.741390] flags: 0x200000000000000(node=0|zone=2) [ 21.742481] page_type: f5(slab) [ 21.742767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.743266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.744241] page dumped because: kasan: bad access detected [ 21.744874] [ 21.745407] Memory state around the buggy address: [ 21.746346] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.746984] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.747663] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.748237] ^ [ 21.749153] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.749926] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.750357] ================================================================== [ 21.113985] ================================================================== [ 21.114811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 21.115325] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.115788] [ 21.116746] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.116882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.116917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.116970] Call Trace: [ 21.117012] <TASK> [ 21.117055] dump_stack_lvl+0x73/0xb0 [ 21.117129] print_report+0xd1/0x650 [ 21.117192] ? __virt_addr_valid+0x1db/0x2d0 [ 21.117253] ? kasan_atomics_helper+0x4b70/0x5450 [ 21.117309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.117366] ? kasan_atomics_helper+0x4b70/0x5450 [ 21.117420] kasan_report+0x140/0x180 [ 21.117475] ? kasan_atomics_helper+0x4b70/0x5450 [ 21.117543] __asan_report_store4_noabort+0x1b/0x30 [ 21.117604] kasan_atomics_helper+0x4b70/0x5450 [ 21.117658] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.117709] ? kasan_save_alloc_info+0x3b/0x50 [ 21.117757] ? kasan_save_track+0x18/0x40 [ 21.117812] kasan_atomics+0x1dd/0x310 [ 21.117886] ? __pfx_kasan_atomics+0x10/0x10 [ 21.117952] ? __pfx_read_tsc+0x10/0x10 [ 21.118009] ? ktime_get_ts64+0x86/0x230 [ 21.118080] kunit_try_run_case+0x1a6/0x480 [ 21.118142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.118201] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.118268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.118327] ? __kthread_parkme+0x82/0x160 [ 21.118365] ? preempt_count_sub+0x50/0x80 [ 21.118398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.118429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.118465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.118499] kthread+0x324/0x6e0 [ 21.118526] ? trace_preempt_on+0x20/0xc0 [ 21.118558] ? __pfx_kthread+0x10/0x10 [ 21.118586] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.118616] ? calculate_sigpending+0x7b/0xa0 [ 21.118644] ? __pfx_kthread+0x10/0x10 [ 21.118673] ret_from_fork+0x41/0x80 [ 21.118697] ? __pfx_kthread+0x10/0x10 [ 21.118725] ret_from_fork_asm+0x1a/0x30 [ 21.118766] </TASK> [ 21.118780] [ 21.136366] Allocated by task 273: [ 21.137345] kasan_save_stack+0x45/0x70 [ 21.138160] kasan_save_track+0x18/0x40 [ 21.138884] kasan_save_alloc_info+0x3b/0x50 [ 21.139378] __kasan_kmalloc+0xb7/0xc0 [ 21.139623] __kmalloc_cache_noprof+0x18a/0x420 [ 21.139783] kasan_atomics+0x96/0x310 [ 21.139980] kunit_try_run_case+0x1a6/0x480 [ 21.140523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.140828] kthread+0x324/0x6e0 [ 21.141073] ret_from_fork+0x41/0x80 [ 21.141292] ret_from_fork_asm+0x1a/0x30 [ 21.142173] [ 21.142719] The buggy address belongs to the object at ffff888102993400 [ 21.142719] which belongs to the cache kmalloc-64 of size 64 [ 21.143645] The buggy address is located 0 bytes to the right of [ 21.143645] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.144952] [ 21.145201] The buggy address belongs to the physical page: [ 21.145904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.146708] flags: 0x200000000000000(node=0|zone=2) [ 21.147186] page_type: f5(slab) [ 21.147892] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.148347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.148989] page dumped because: kasan: bad access detected [ 21.149307] [ 21.150041] Memory state around the buggy address: [ 21.150615] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.151675] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.152322] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.152816] ^ [ 21.153388] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.153739] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.154825] ================================================================== [ 21.752140] ================================================================== [ 21.753135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 21.753530] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.754390] [ 21.754844] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.754973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.755011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.755062] Call Trace: [ 21.755109] <TASK> [ 21.755156] dump_stack_lvl+0x73/0xb0 [ 21.755234] print_report+0xd1/0x650 [ 21.755337] ? __virt_addr_valid+0x1db/0x2d0 [ 21.755409] ? kasan_atomics_helper+0xb6b/0x5450 [ 21.755506] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.755564] ? kasan_atomics_helper+0xb6b/0x5450 [ 21.755596] kasan_report+0x140/0x180 [ 21.755629] ? kasan_atomics_helper+0xb6b/0x5450 [ 21.755666] kasan_check_range+0x10c/0x1c0 [ 21.755712] __kasan_check_write+0x18/0x20 [ 21.755744] kasan_atomics_helper+0xb6b/0x5450 [ 21.755774] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.755805] ? kasan_save_alloc_info+0x3b/0x50 [ 21.755836] ? kasan_save_track+0x18/0x40 [ 21.755890] kasan_atomics+0x1dd/0x310 [ 21.755922] ? __pfx_kasan_atomics+0x10/0x10 [ 21.755955] ? __pfx_read_tsc+0x10/0x10 [ 21.755987] ? ktime_get_ts64+0x86/0x230 [ 21.756024] kunit_try_run_case+0x1a6/0x480 [ 21.756058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.756089] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.756125] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.756159] ? __kthread_parkme+0x82/0x160 [ 21.756190] ? preempt_count_sub+0x50/0x80 [ 21.756226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.756258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.756296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.756344] kthread+0x324/0x6e0 [ 21.756374] ? trace_preempt_on+0x20/0xc0 [ 21.756410] ? __pfx_kthread+0x10/0x10 [ 21.756456] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.756514] ? calculate_sigpending+0x7b/0xa0 [ 21.756569] ? __pfx_kthread+0x10/0x10 [ 21.756622] ret_from_fork+0x41/0x80 [ 21.756671] ? __pfx_kthread+0x10/0x10 [ 21.756723] ret_from_fork_asm+0x1a/0x30 [ 21.756799] </TASK> [ 21.756821] [ 21.772249] Allocated by task 273: [ 21.772899] kasan_save_stack+0x45/0x70 [ 21.773229] kasan_save_track+0x18/0x40 [ 21.773646] kasan_save_alloc_info+0x3b/0x50 [ 21.774108] __kasan_kmalloc+0xb7/0xc0 [ 21.774999] __kmalloc_cache_noprof+0x18a/0x420 [ 21.775444] kasan_atomics+0x96/0x310 [ 21.775895] kunit_try_run_case+0x1a6/0x480 [ 21.776334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.776751] kthread+0x324/0x6e0 [ 21.777091] ret_from_fork+0x41/0x80 [ 21.777376] ret_from_fork_asm+0x1a/0x30 [ 21.777725] [ 21.778164] The buggy address belongs to the object at ffff888102993400 [ 21.778164] which belongs to the cache kmalloc-64 of size 64 [ 21.779214] The buggy address is located 0 bytes to the right of [ 21.779214] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.780558] [ 21.780797] The buggy address belongs to the physical page: [ 21.781320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.782125] flags: 0x200000000000000(node=0|zone=2) [ 21.782982] page_type: f5(slab) [ 21.783335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.783945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.784744] page dumped because: kasan: bad access detected [ 21.785098] [ 21.785319] Memory state around the buggy address: [ 21.785916] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.786322] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.787394] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.788268] ^ [ 21.789002] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.789745] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.790390] ================================================================== [ 23.041090] ================================================================== [ 23.041575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 23.041969] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.042646] [ 23.042907] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.043016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.043054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.043111] Call Trace: [ 23.043158] <TASK> [ 23.043199] dump_stack_lvl+0x73/0xb0 [ 23.043277] print_report+0xd1/0x650 [ 23.043343] ? __virt_addr_valid+0x1db/0x2d0 [ 23.043407] ? kasan_atomics_helper+0x1ce2/0x5450 [ 23.043469] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.043541] ? kasan_atomics_helper+0x1ce2/0x5450 [ 23.043603] kasan_report+0x140/0x180 [ 23.043667] ? kasan_atomics_helper+0x1ce2/0x5450 [ 23.043752] kasan_check_range+0x10c/0x1c0 [ 23.043819] __kasan_check_write+0x18/0x20 [ 23.043899] kasan_atomics_helper+0x1ce2/0x5450 [ 23.043956] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.044014] ? kasan_save_alloc_info+0x3b/0x50 [ 23.044074] ? kasan_save_track+0x18/0x40 [ 23.044143] kasan_atomics+0x1dd/0x310 [ 23.044207] ? __pfx_kasan_atomics+0x10/0x10 [ 23.044273] ? __pfx_read_tsc+0x10/0x10 [ 23.044329] ? ktime_get_ts64+0x86/0x230 [ 23.044403] kunit_try_run_case+0x1a6/0x480 [ 23.044471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.044530] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.044602] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.044671] ? __kthread_parkme+0x82/0x160 [ 23.044734] ? preempt_count_sub+0x50/0x80 [ 23.044805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.044888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.044965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.045040] kthread+0x324/0x6e0 [ 23.045102] ? trace_preempt_on+0x20/0xc0 [ 23.045169] ? __pfx_kthread+0x10/0x10 [ 23.045233] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.045300] ? calculate_sigpending+0x7b/0xa0 [ 23.045362] ? __pfx_kthread+0x10/0x10 [ 23.045428] ret_from_fork+0x41/0x80 [ 23.045484] ? __pfx_kthread+0x10/0x10 [ 23.045543] ret_from_fork_asm+0x1a/0x30 [ 23.045622] </TASK> [ 23.045654] [ 23.057598] Allocated by task 273: [ 23.058009] kasan_save_stack+0x45/0x70 [ 23.058481] kasan_save_track+0x18/0x40 [ 23.058884] kasan_save_alloc_info+0x3b/0x50 [ 23.059210] __kasan_kmalloc+0xb7/0xc0 [ 23.059826] __kmalloc_cache_noprof+0x18a/0x420 [ 23.060204] kasan_atomics+0x96/0x310 [ 23.060687] kunit_try_run_case+0x1a6/0x480 [ 23.061077] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.061609] kthread+0x324/0x6e0 [ 23.061869] ret_from_fork+0x41/0x80 [ 23.062107] ret_from_fork_asm+0x1a/0x30 [ 23.062355] [ 23.062501] The buggy address belongs to the object at ffff888102993400 [ 23.062501] which belongs to the cache kmalloc-64 of size 64 [ 23.063449] The buggy address is located 0 bytes to the right of [ 23.063449] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.064618] [ 23.064841] The buggy address belongs to the physical page: [ 23.065253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.065668] flags: 0x200000000000000(node=0|zone=2) [ 23.066065] page_type: f5(slab) [ 23.066454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.067089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.067724] page dumped because: kasan: bad access detected [ 23.068126] [ 23.068351] Memory state around the buggy address: [ 23.068662] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.069031] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.069391] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.070177] ^ [ 23.070705] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.071221] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.071625] ================================================================== [ 21.948209] ================================================================== [ 21.949492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 21.949812] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.950496] [ 21.950737] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.950847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.950899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.950953] Call Trace: [ 21.950999] <TASK> [ 21.951041] dump_stack_lvl+0x73/0xb0 [ 21.951120] print_report+0xd1/0x650 [ 21.951182] ? __virt_addr_valid+0x1db/0x2d0 [ 21.951248] ? kasan_atomics_helper+0xe79/0x5450 [ 21.951308] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.951381] ? kasan_atomics_helper+0xe79/0x5450 [ 21.951444] kasan_report+0x140/0x180 [ 21.951509] ? kasan_atomics_helper+0xe79/0x5450 [ 21.951581] kasan_check_range+0x10c/0x1c0 [ 21.951642] __kasan_check_write+0x18/0x20 [ 21.951710] kasan_atomics_helper+0xe79/0x5450 [ 21.951770] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.951830] ? kasan_save_alloc_info+0x3b/0x50 [ 21.951910] ? kasan_save_track+0x18/0x40 [ 21.951971] kasan_atomics+0x1dd/0x310 [ 21.952031] ? __pfx_kasan_atomics+0x10/0x10 [ 21.952087] ? __pfx_read_tsc+0x10/0x10 [ 21.952148] ? ktime_get_ts64+0x86/0x230 [ 21.952219] kunit_try_run_case+0x1a6/0x480 [ 21.952292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.952341] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.952381] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.952417] ? __kthread_parkme+0x82/0x160 [ 21.952448] ? preempt_count_sub+0x50/0x80 [ 21.952482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.952514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.952551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.952586] kthread+0x324/0x6e0 [ 21.952615] ? trace_preempt_on+0x20/0xc0 [ 21.952648] ? __pfx_kthread+0x10/0x10 [ 21.952679] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.952711] ? calculate_sigpending+0x7b/0xa0 [ 21.952740] ? __pfx_kthread+0x10/0x10 [ 21.952770] ret_from_fork+0x41/0x80 [ 21.952796] ? __pfx_kthread+0x10/0x10 [ 21.952826] ret_from_fork_asm+0x1a/0x30 [ 21.952887] </TASK> [ 21.952905] [ 21.968490] Allocated by task 273: [ 21.968877] kasan_save_stack+0x45/0x70 [ 21.969278] kasan_save_track+0x18/0x40 [ 21.969777] kasan_save_alloc_info+0x3b/0x50 [ 21.970118] __kasan_kmalloc+0xb7/0xc0 [ 21.970935] __kmalloc_cache_noprof+0x18a/0x420 [ 21.971502] kasan_atomics+0x96/0x310 [ 21.971921] kunit_try_run_case+0x1a6/0x480 [ 21.973422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.973725] kthread+0x324/0x6e0 [ 21.974149] ret_from_fork+0x41/0x80 [ 21.974679] ret_from_fork_asm+0x1a/0x30 [ 21.975126] [ 21.975374] The buggy address belongs to the object at ffff888102993400 [ 21.975374] which belongs to the cache kmalloc-64 of size 64 [ 21.976595] The buggy address is located 0 bytes to the right of [ 21.976595] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.977623] [ 21.977939] The buggy address belongs to the physical page: [ 21.978533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.979145] flags: 0x200000000000000(node=0|zone=2) [ 21.979448] page_type: f5(slab) [ 21.979806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.980404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.980786] page dumped because: kasan: bad access detected [ 21.981173] [ 21.981410] Memory state around the buggy address: [ 21.981863] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.982490] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.983036] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.983529] ^ [ 21.983957] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.984548] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.985009] ================================================================== [ 23.179585] ================================================================== [ 23.180110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 23.180561] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.180931] [ 23.181238] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.181352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.181381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.181423] Call Trace: [ 23.181465] <TASK> [ 23.181500] dump_stack_lvl+0x73/0xb0 [ 23.181575] print_report+0xd1/0x650 [ 23.181635] ? __virt_addr_valid+0x1db/0x2d0 [ 23.181696] ? kasan_atomics_helper+0x1f44/0x5450 [ 23.181755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.181824] ? kasan_atomics_helper+0x1f44/0x5450 [ 23.181902] kasan_report+0x140/0x180 [ 23.181965] ? kasan_atomics_helper+0x1f44/0x5450 [ 23.182037] kasan_check_range+0x10c/0x1c0 [ 23.182104] __kasan_check_write+0x18/0x20 [ 23.182170] kasan_atomics_helper+0x1f44/0x5450 [ 23.182234] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.182334] ? kasan_save_alloc_info+0x3b/0x50 [ 23.182405] ? kasan_save_track+0x18/0x40 [ 23.182473] kasan_atomics+0x1dd/0x310 [ 23.182535] ? __pfx_kasan_atomics+0x10/0x10 [ 23.182595] ? __pfx_read_tsc+0x10/0x10 [ 23.182672] ? ktime_get_ts64+0x86/0x230 [ 23.182732] kunit_try_run_case+0x1a6/0x480 [ 23.182791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.182863] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.182929] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.182992] ? __kthread_parkme+0x82/0x160 [ 23.183051] ? preempt_count_sub+0x50/0x80 [ 23.183118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.183186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.183263] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.183379] kthread+0x324/0x6e0 [ 23.183442] ? trace_preempt_on+0x20/0xc0 [ 23.183510] ? __pfx_kthread+0x10/0x10 [ 23.183571] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.183638] ? calculate_sigpending+0x7b/0xa0 [ 23.183711] ? __pfx_kthread+0x10/0x10 [ 23.183775] ret_from_fork+0x41/0x80 [ 23.183831] ? __pfx_kthread+0x10/0x10 [ 23.183910] ret_from_fork_asm+0x1a/0x30 [ 23.183999] </TASK> [ 23.184033] [ 23.196431] Allocated by task 273: [ 23.196820] kasan_save_stack+0x45/0x70 [ 23.197215] kasan_save_track+0x18/0x40 [ 23.197509] kasan_save_alloc_info+0x3b/0x50 [ 23.197937] __kasan_kmalloc+0xb7/0xc0 [ 23.198372] __kmalloc_cache_noprof+0x18a/0x420 [ 23.198807] kasan_atomics+0x96/0x310 [ 23.199088] kunit_try_run_case+0x1a6/0x480 [ 23.199406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.199727] kthread+0x324/0x6e0 [ 23.200064] ret_from_fork+0x41/0x80 [ 23.200496] ret_from_fork_asm+0x1a/0x30 [ 23.200929] [ 23.201147] The buggy address belongs to the object at ffff888102993400 [ 23.201147] which belongs to the cache kmalloc-64 of size 64 [ 23.202136] The buggy address is located 0 bytes to the right of [ 23.202136] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.203202] [ 23.203466] The buggy address belongs to the physical page: [ 23.203834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.204228] flags: 0x200000000000000(node=0|zone=2) [ 23.204720] page_type: f5(slab) [ 23.205065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.205718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.206087] page dumped because: kasan: bad access detected [ 23.206406] [ 23.206551] Memory state around the buggy address: [ 23.206809] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.207506] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.208174] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.209017] ^ [ 23.209328] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.209676] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.210019] ================================================================== [ 22.937215] ================================================================== [ 22.937604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 22.938658] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.939230] [ 22.939447] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.939583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.939624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.939688] Call Trace: [ 22.939754] <TASK> [ 22.939801] dump_stack_lvl+0x73/0xb0 [ 22.939892] print_report+0xd1/0x650 [ 22.939958] ? __virt_addr_valid+0x1db/0x2d0 [ 22.940023] ? kasan_atomics_helper+0x1b23/0x5450 [ 22.940084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.940146] ? kasan_atomics_helper+0x1b23/0x5450 [ 22.940203] kasan_report+0x140/0x180 [ 22.940265] ? kasan_atomics_helper+0x1b23/0x5450 [ 22.940334] kasan_check_range+0x10c/0x1c0 [ 22.940400] __kasan_check_write+0x18/0x20 [ 22.940493] kasan_atomics_helper+0x1b23/0x5450 [ 22.940556] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.940621] ? kasan_save_alloc_info+0x3b/0x50 [ 22.940686] ? kasan_save_track+0x18/0x40 [ 22.940731] kasan_atomics+0x1dd/0x310 [ 22.940765] ? __pfx_kasan_atomics+0x10/0x10 [ 22.940799] ? __pfx_read_tsc+0x10/0x10 [ 22.940831] ? ktime_get_ts64+0x86/0x230 [ 22.940888] kunit_try_run_case+0x1a6/0x480 [ 22.940924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.940953] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.940990] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.941022] ? __kthread_parkme+0x82/0x160 [ 22.941054] ? preempt_count_sub+0x50/0x80 [ 22.941088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.941119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.941154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.941190] kthread+0x324/0x6e0 [ 22.941218] ? trace_preempt_on+0x20/0xc0 [ 22.941252] ? __pfx_kthread+0x10/0x10 [ 22.941282] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.941330] ? calculate_sigpending+0x7b/0xa0 [ 22.941361] ? __pfx_kthread+0x10/0x10 [ 22.941391] ret_from_fork+0x41/0x80 [ 22.941418] ? __pfx_kthread+0x10/0x10 [ 22.941448] ret_from_fork_asm+0x1a/0x30 [ 22.941491] </TASK> [ 22.941507] [ 22.954277] Allocated by task 273: [ 22.954883] kasan_save_stack+0x45/0x70 [ 22.955160] kasan_save_track+0x18/0x40 [ 22.955836] kasan_save_alloc_info+0x3b/0x50 [ 22.956164] __kasan_kmalloc+0xb7/0xc0 [ 22.956405] __kmalloc_cache_noprof+0x18a/0x420 [ 22.956677] kasan_atomics+0x96/0x310 [ 22.956927] kunit_try_run_case+0x1a6/0x480 [ 22.957183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.957726] kthread+0x324/0x6e0 [ 22.958218] ret_from_fork+0x41/0x80 [ 22.958541] ret_from_fork_asm+0x1a/0x30 [ 22.959000] [ 22.959188] The buggy address belongs to the object at ffff888102993400 [ 22.959188] which belongs to the cache kmalloc-64 of size 64 [ 22.959986] The buggy address is located 0 bytes to the right of [ 22.959986] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.960524] [ 22.960756] The buggy address belongs to the physical page: [ 22.961286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.962640] flags: 0x200000000000000(node=0|zone=2) [ 22.964059] page_type: f5(slab) [ 22.964408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.965231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.965914] page dumped because: kasan: bad access detected [ 22.966264] [ 22.966515] Memory state around the buggy address: [ 22.966985] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.967361] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.967989] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.968721] ^ [ 22.969261] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.969628] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.970273] ================================================================== [ 22.267082] ================================================================== [ 22.267874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 22.268580] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.269061] [ 22.269392] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.269500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.269572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.269646] Call Trace: [ 22.269698] <TASK> [ 22.269740] dump_stack_lvl+0x73/0xb0 [ 22.269864] print_report+0xd1/0x650 [ 22.269958] ? __virt_addr_valid+0x1db/0x2d0 [ 22.270026] ? kasan_atomics_helper+0x49ea/0x5450 [ 22.270084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.270187] ? kasan_atomics_helper+0x49ea/0x5450 [ 22.270269] kasan_report+0x140/0x180 [ 22.270375] ? kasan_atomics_helper+0x49ea/0x5450 [ 22.270466] __asan_report_load4_noabort+0x18/0x20 [ 22.270572] kasan_atomics_helper+0x49ea/0x5450 [ 22.270656] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.270717] ? kasan_save_alloc_info+0x3b/0x50 [ 22.270809] ? kasan_save_track+0x18/0x40 [ 22.270900] kasan_atomics+0x1dd/0x310 [ 22.270967] ? __pfx_kasan_atomics+0x10/0x10 [ 22.271025] ? __pfx_read_tsc+0x10/0x10 [ 22.271060] ? ktime_get_ts64+0x86/0x230 [ 22.271099] kunit_try_run_case+0x1a6/0x480 [ 22.271134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.271164] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.271200] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.271233] ? __kthread_parkme+0x82/0x160 [ 22.271265] ? preempt_count_sub+0x50/0x80 [ 22.271322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.271359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.271396] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.271430] kthread+0x324/0x6e0 [ 22.271460] ? trace_preempt_on+0x20/0xc0 [ 22.271494] ? __pfx_kthread+0x10/0x10 [ 22.271525] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.271557] ? calculate_sigpending+0x7b/0xa0 [ 22.271588] ? __pfx_kthread+0x10/0x10 [ 22.271619] ret_from_fork+0x41/0x80 [ 22.271645] ? __pfx_kthread+0x10/0x10 [ 22.271676] ret_from_fork_asm+0x1a/0x30 [ 22.271731] </TASK> [ 22.271747] [ 22.285649] Allocated by task 273: [ 22.285919] kasan_save_stack+0x45/0x70 [ 22.286450] kasan_save_track+0x18/0x40 [ 22.286899] kasan_save_alloc_info+0x3b/0x50 [ 22.287454] __kasan_kmalloc+0xb7/0xc0 [ 22.287747] __kmalloc_cache_noprof+0x18a/0x420 [ 22.288044] kasan_atomics+0x96/0x310 [ 22.288287] kunit_try_run_case+0x1a6/0x480 [ 22.288752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.289440] kthread+0x324/0x6e0 [ 22.289811] ret_from_fork+0x41/0x80 [ 22.290216] ret_from_fork_asm+0x1a/0x30 [ 22.290673] [ 22.290940] The buggy address belongs to the object at ffff888102993400 [ 22.290940] which belongs to the cache kmalloc-64 of size 64 [ 22.291814] The buggy address is located 0 bytes to the right of [ 22.291814] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.292725] [ 22.292952] The buggy address belongs to the physical page: [ 22.293522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.293991] flags: 0x200000000000000(node=0|zone=2) [ 22.294504] page_type: f5(slab) [ 22.294781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.295536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.296046] page dumped because: kasan: bad access detected [ 22.296400] [ 22.296632] Memory state around the buggy address: [ 22.297152] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.297595] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.298258] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.298596] ^ [ 22.299093] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.299559] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.300156] ================================================================== [ 22.196025] ================================================================== [ 22.196552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 22.196878] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.197203] [ 22.197396] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.197508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.197543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.197598] Call Trace: [ 22.197648] <TASK> [ 22.197695] dump_stack_lvl+0x73/0xb0 [ 22.197774] print_report+0xd1/0x650 [ 22.197836] ? __virt_addr_valid+0x1db/0x2d0 [ 22.197916] ? kasan_atomics_helper+0x4a04/0x5450 [ 22.197975] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.198048] ? kasan_atomics_helper+0x4a04/0x5450 [ 22.198113] kasan_report+0x140/0x180 [ 22.198178] ? kasan_atomics_helper+0x4a04/0x5450 [ 22.198254] __asan_report_load4_noabort+0x18/0x20 [ 22.198390] kasan_atomics_helper+0x4a04/0x5450 [ 22.198464] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.198527] ? kasan_save_alloc_info+0x3b/0x50 [ 22.198618] ? kasan_save_track+0x18/0x40 [ 22.198698] kasan_atomics+0x1dd/0x310 [ 22.198764] ? __pfx_kasan_atomics+0x10/0x10 [ 22.198831] ? __pfx_read_tsc+0x10/0x10 [ 22.198910] ? ktime_get_ts64+0x86/0x230 [ 22.198985] kunit_try_run_case+0x1a6/0x480 [ 22.199053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.199114] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.199182] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.199246] ? __kthread_parkme+0x82/0x160 [ 22.199346] ? preempt_count_sub+0x50/0x80 [ 22.199420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.199469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.199509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.199545] kthread+0x324/0x6e0 [ 22.199575] ? trace_preempt_on+0x20/0xc0 [ 22.199609] ? __pfx_kthread+0x10/0x10 [ 22.199639] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.199672] ? calculate_sigpending+0x7b/0xa0 [ 22.199715] ? __pfx_kthread+0x10/0x10 [ 22.199745] ret_from_fork+0x41/0x80 [ 22.199772] ? __pfx_kthread+0x10/0x10 [ 22.199801] ret_from_fork_asm+0x1a/0x30 [ 22.199844] </TASK> [ 22.199881] [ 22.212867] Allocated by task 273: [ 22.213261] kasan_save_stack+0x45/0x70 [ 22.213715] kasan_save_track+0x18/0x40 [ 22.214146] kasan_save_alloc_info+0x3b/0x50 [ 22.215113] __kasan_kmalloc+0xb7/0xc0 [ 22.215416] __kmalloc_cache_noprof+0x18a/0x420 [ 22.215697] kasan_atomics+0x96/0x310 [ 22.216107] kunit_try_run_case+0x1a6/0x480 [ 22.216384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.216822] kthread+0x324/0x6e0 [ 22.217103] ret_from_fork+0x41/0x80 [ 22.217592] ret_from_fork_asm+0x1a/0x30 [ 22.218027] [ 22.218195] The buggy address belongs to the object at ffff888102993400 [ 22.218195] which belongs to the cache kmalloc-64 of size 64 [ 22.218820] The buggy address is located 0 bytes to the right of [ 22.218820] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.220514] [ 22.220706] The buggy address belongs to the physical page: [ 22.221120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.221625] flags: 0x200000000000000(node=0|zone=2) [ 22.221928] page_type: f5(slab) [ 22.222149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.223634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.224684] page dumped because: kasan: bad access detected [ 22.225040] [ 22.225172] Memory state around the buggy address: [ 22.225943] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.226881] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.227556] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.228103] ^ [ 22.228509] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.229209] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.229911] ================================================================== [ 23.147091] ================================================================== [ 23.148702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 23.149949] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.150817] [ 23.151347] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.151599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.151642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.151755] Call Trace: [ 23.151792] <TASK> [ 23.151821] dump_stack_lvl+0x73/0xb0 [ 23.151888] print_report+0xd1/0x650 [ 23.151923] ? __virt_addr_valid+0x1db/0x2d0 [ 23.151957] ? kasan_atomics_helper+0x1eab/0x5450 [ 23.151987] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.152022] ? kasan_atomics_helper+0x1eab/0x5450 [ 23.152051] kasan_report+0x140/0x180 [ 23.152082] ? kasan_atomics_helper+0x1eab/0x5450 [ 23.152117] kasan_check_range+0x10c/0x1c0 [ 23.152148] __kasan_check_write+0x18/0x20 [ 23.152179] kasan_atomics_helper+0x1eab/0x5450 [ 23.152209] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.152239] ? kasan_save_alloc_info+0x3b/0x50 [ 23.152268] ? kasan_save_track+0x18/0x40 [ 23.152313] kasan_atomics+0x1dd/0x310 [ 23.152350] ? __pfx_kasan_atomics+0x10/0x10 [ 23.152383] ? __pfx_read_tsc+0x10/0x10 [ 23.152415] ? ktime_get_ts64+0x86/0x230 [ 23.152450] kunit_try_run_case+0x1a6/0x480 [ 23.152484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.152515] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.152549] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.152582] ? __kthread_parkme+0x82/0x160 [ 23.152613] ? preempt_count_sub+0x50/0x80 [ 23.152648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.152680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.152715] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.152749] kthread+0x324/0x6e0 [ 23.152778] ? trace_preempt_on+0x20/0xc0 [ 23.152812] ? __pfx_kthread+0x10/0x10 [ 23.152842] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.152891] ? calculate_sigpending+0x7b/0xa0 [ 23.152921] ? __pfx_kthread+0x10/0x10 [ 23.152952] ret_from_fork+0x41/0x80 [ 23.152979] ? __pfx_kthread+0x10/0x10 [ 23.153009] ret_from_fork_asm+0x1a/0x30 [ 23.153051] </TASK> [ 23.153067] [ 23.164814] Allocated by task 273: [ 23.165181] kasan_save_stack+0x45/0x70 [ 23.165543] kasan_save_track+0x18/0x40 [ 23.165801] kasan_save_alloc_info+0x3b/0x50 [ 23.166233] __kasan_kmalloc+0xb7/0xc0 [ 23.166676] __kmalloc_cache_noprof+0x18a/0x420 [ 23.167101] kasan_atomics+0x96/0x310 [ 23.167395] kunit_try_run_case+0x1a6/0x480 [ 23.167829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.168394] kthread+0x324/0x6e0 [ 23.168752] ret_from_fork+0x41/0x80 [ 23.169046] ret_from_fork_asm+0x1a/0x30 [ 23.169481] [ 23.169697] The buggy address belongs to the object at ffff888102993400 [ 23.169697] which belongs to the cache kmalloc-64 of size 64 [ 23.170532] The buggy address is located 0 bytes to the right of [ 23.170532] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.171282] [ 23.171537] The buggy address belongs to the physical page: [ 23.171829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.172224] flags: 0x200000000000000(node=0|zone=2) [ 23.172547] page_type: f5(slab) [ 23.172768] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.173485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.174159] page dumped because: kasan: bad access detected [ 23.174658] [ 23.174892] Memory state around the buggy address: [ 23.175366] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.175995] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.176641] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.177228] ^ [ 23.177509] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.177919] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.178273] ================================================================== [ 22.794929] ================================================================== [ 22.795531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 22.796037] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.796632] [ 22.796897] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.796995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.797029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.797083] Call Trace: [ 22.797172] <TASK> [ 22.797238] dump_stack_lvl+0x73/0xb0 [ 22.797352] print_report+0xd1/0x650 [ 22.797391] ? __virt_addr_valid+0x1db/0x2d0 [ 22.797427] ? kasan_atomics_helper+0x18b2/0x5450 [ 22.797458] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.797514] ? kasan_atomics_helper+0x18b2/0x5450 [ 22.797569] kasan_report+0x140/0x180 [ 22.797629] ? kasan_atomics_helper+0x18b2/0x5450 [ 22.797702] kasan_check_range+0x10c/0x1c0 [ 22.797764] __kasan_check_write+0x18/0x20 [ 22.797833] kasan_atomics_helper+0x18b2/0x5450 [ 22.797919] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.797985] ? kasan_save_alloc_info+0x3b/0x50 [ 22.798050] ? kasan_save_track+0x18/0x40 [ 22.798106] kasan_atomics+0x1dd/0x310 [ 22.798141] ? __pfx_kasan_atomics+0x10/0x10 [ 22.798175] ? __pfx_read_tsc+0x10/0x10 [ 22.798208] ? ktime_get_ts64+0x86/0x230 [ 22.798245] kunit_try_run_case+0x1a6/0x480 [ 22.798278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.798333] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.798371] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.798405] ? __kthread_parkme+0x82/0x160 [ 22.798436] ? preempt_count_sub+0x50/0x80 [ 22.798469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.798501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.798535] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.798570] kthread+0x324/0x6e0 [ 22.798599] ? trace_preempt_on+0x20/0xc0 [ 22.798632] ? __pfx_kthread+0x10/0x10 [ 22.798662] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.798693] ? calculate_sigpending+0x7b/0xa0 [ 22.798723] ? __pfx_kthread+0x10/0x10 [ 22.798753] ret_from_fork+0x41/0x80 [ 22.798779] ? __pfx_kthread+0x10/0x10 [ 22.798808] ret_from_fork_asm+0x1a/0x30 [ 22.798868] </TASK> [ 22.798885] [ 22.812336] Allocated by task 273: [ 22.812655] kasan_save_stack+0x45/0x70 [ 22.813113] kasan_save_track+0x18/0x40 [ 22.813618] kasan_save_alloc_info+0x3b/0x50 [ 22.814303] __kasan_kmalloc+0xb7/0xc0 [ 22.814685] __kmalloc_cache_noprof+0x18a/0x420 [ 22.814986] kasan_atomics+0x96/0x310 [ 22.815235] kunit_try_run_case+0x1a6/0x480 [ 22.815482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.815995] kthread+0x324/0x6e0 [ 22.816416] ret_from_fork+0x41/0x80 [ 22.816896] ret_from_fork_asm+0x1a/0x30 [ 22.817280] [ 22.817522] The buggy address belongs to the object at ffff888102993400 [ 22.817522] which belongs to the cache kmalloc-64 of size 64 [ 22.818192] The buggy address is located 0 bytes to the right of [ 22.818192] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.819033] [ 22.819194] The buggy address belongs to the physical page: [ 22.819600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.820569] flags: 0x200000000000000(node=0|zone=2) [ 22.821064] page_type: f5(slab) [ 22.821422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.822101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.822459] page dumped because: kasan: bad access detected [ 22.823007] [ 22.823226] Memory state around the buggy address: [ 22.823738] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.824525] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.824989] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.825490] ^ [ 22.825925] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.826288] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.826916] ================================================================== [ 21.537068] ================================================================== [ 21.538042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 21.539170] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.539756] [ 21.539925] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.539988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.540006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.540035] Call Trace: [ 21.540061] <TASK> [ 21.540087] dump_stack_lvl+0x73/0xb0 [ 21.540130] print_report+0xd1/0x650 [ 21.540163] ? __virt_addr_valid+0x1db/0x2d0 [ 21.540198] ? kasan_atomics_helper+0x861/0x5450 [ 21.540228] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.540264] ? kasan_atomics_helper+0x861/0x5450 [ 21.540300] kasan_report+0x140/0x180 [ 21.540359] ? kasan_atomics_helper+0x861/0x5450 [ 21.540429] kasan_check_range+0x10c/0x1c0 [ 21.540499] __kasan_check_write+0x18/0x20 [ 21.540566] kasan_atomics_helper+0x861/0x5450 [ 21.540634] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.540700] ? kasan_save_alloc_info+0x3b/0x50 [ 21.540760] ? kasan_save_track+0x18/0x40 [ 21.540819] kasan_atomics+0x1dd/0x310 [ 21.540890] ? __pfx_kasan_atomics+0x10/0x10 [ 21.540949] ? __pfx_read_tsc+0x10/0x10 [ 21.540999] ? ktime_get_ts64+0x86/0x230 [ 21.541059] kunit_try_run_case+0x1a6/0x480 [ 21.541120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.541188] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.541275] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.541348] ? __kthread_parkme+0x82/0x160 [ 21.541429] ? preempt_count_sub+0x50/0x80 [ 21.541499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.541569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.541644] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.541717] kthread+0x324/0x6e0 [ 21.541777] ? trace_preempt_on+0x20/0xc0 [ 21.541841] ? __pfx_kthread+0x10/0x10 [ 21.541913] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.541978] ? calculate_sigpending+0x7b/0xa0 [ 21.542036] ? __pfx_kthread+0x10/0x10 [ 21.542107] ret_from_fork+0x41/0x80 [ 21.542173] ? __pfx_kthread+0x10/0x10 [ 21.542231] ret_from_fork_asm+0x1a/0x30 [ 21.542306] </TASK> [ 21.542335] [ 21.560058] Allocated by task 273: [ 21.560478] kasan_save_stack+0x45/0x70 [ 21.560848] kasan_save_track+0x18/0x40 [ 21.561568] kasan_save_alloc_info+0x3b/0x50 [ 21.562072] __kasan_kmalloc+0xb7/0xc0 [ 21.562509] __kmalloc_cache_noprof+0x18a/0x420 [ 21.562830] kasan_atomics+0x96/0x310 [ 21.563245] kunit_try_run_case+0x1a6/0x480 [ 21.563569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.564730] kthread+0x324/0x6e0 [ 21.565042] ret_from_fork+0x41/0x80 [ 21.565303] ret_from_fork_asm+0x1a/0x30 [ 21.565701] [ 21.566113] The buggy address belongs to the object at ffff888102993400 [ 21.566113] which belongs to the cache kmalloc-64 of size 64 [ 21.566973] The buggy address is located 0 bytes to the right of [ 21.566973] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.567815] [ 21.567997] The buggy address belongs to the physical page: [ 21.568891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.569491] flags: 0x200000000000000(node=0|zone=2) [ 21.569977] page_type: f5(slab) [ 21.570245] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.571085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.571903] page dumped because: kasan: bad access detected [ 21.572240] [ 21.572369] Memory state around the buggy address: [ 21.573683] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.574109] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.574672] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.574996] ^ [ 21.575442] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.576951] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.577433] ================================================================== [ 21.622392] ================================================================== [ 21.623236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 21.624252] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.625796] [ 21.626055] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.626158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.626191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.626243] Call Trace: [ 21.626306] <TASK> [ 21.626352] dump_stack_lvl+0x73/0xb0 [ 21.626433] print_report+0xd1/0x650 [ 21.626482] ? __virt_addr_valid+0x1db/0x2d0 [ 21.626518] ? kasan_atomics_helper+0x993/0x5450 [ 21.626549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.626585] ? kasan_atomics_helper+0x993/0x5450 [ 21.626630] kasan_report+0x140/0x180 [ 21.626684] ? kasan_atomics_helper+0x993/0x5450 [ 21.626743] kasan_check_range+0x10c/0x1c0 [ 21.626800] __kasan_check_write+0x18/0x20 [ 21.626875] kasan_atomics_helper+0x993/0x5450 [ 21.626941] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.627005] ? kasan_save_alloc_info+0x3b/0x50 [ 21.627068] ? kasan_save_track+0x18/0x40 [ 21.627140] kasan_atomics+0x1dd/0x310 [ 21.627183] ? __pfx_kasan_atomics+0x10/0x10 [ 21.627218] ? __pfx_read_tsc+0x10/0x10 [ 21.627249] ? ktime_get_ts64+0x86/0x230 [ 21.627284] kunit_try_run_case+0x1a6/0x480 [ 21.627333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.627363] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.627399] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.627439] ? __kthread_parkme+0x82/0x160 [ 21.627492] ? preempt_count_sub+0x50/0x80 [ 21.627549] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.627602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.627643] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.627690] kthread+0x324/0x6e0 [ 21.627720] ? trace_preempt_on+0x20/0xc0 [ 21.627754] ? __pfx_kthread+0x10/0x10 [ 21.627784] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.627817] ? calculate_sigpending+0x7b/0xa0 [ 21.627847] ? __pfx_kthread+0x10/0x10 [ 21.627896] ret_from_fork+0x41/0x80 [ 21.627924] ? __pfx_kthread+0x10/0x10 [ 21.627954] ret_from_fork_asm+0x1a/0x30 [ 21.627996] </TASK> [ 21.628011] [ 21.645956] Allocated by task 273: [ 21.646348] kasan_save_stack+0x45/0x70 [ 21.646789] kasan_save_track+0x18/0x40 [ 21.647600] kasan_save_alloc_info+0x3b/0x50 [ 21.648057] __kasan_kmalloc+0xb7/0xc0 [ 21.648493] __kmalloc_cache_noprof+0x18a/0x420 [ 21.648959] kasan_atomics+0x96/0x310 [ 21.649802] kunit_try_run_case+0x1a6/0x480 [ 21.650099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.650868] kthread+0x324/0x6e0 [ 21.651252] ret_from_fork+0x41/0x80 [ 21.651701] ret_from_fork_asm+0x1a/0x30 [ 21.652254] [ 21.652450] The buggy address belongs to the object at ffff888102993400 [ 21.652450] which belongs to the cache kmalloc-64 of size 64 [ 21.653737] The buggy address is located 0 bytes to the right of [ 21.653737] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.654491] [ 21.654706] The buggy address belongs to the physical page: [ 21.655183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.655701] flags: 0x200000000000000(node=0|zone=2) [ 21.656930] page_type: f5(slab) [ 21.657295] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.657812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.658355] page dumped because: kasan: bad access detected [ 21.658675] [ 21.659138] Memory state around the buggy address: [ 21.659554] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.660168] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.660811] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.661938] ^ [ 21.662524] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.663178] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.663807] ================================================================== [ 23.109960] ================================================================== [ 23.110998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 23.111547] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.112050] [ 23.112340] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.112450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.112490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.112540] Call Trace: [ 23.112611] <TASK> [ 23.112654] dump_stack_lvl+0x73/0xb0 [ 23.112735] print_report+0xd1/0x650 [ 23.112802] ? __virt_addr_valid+0x1db/0x2d0 [ 23.112880] ? kasan_atomics_helper+0x1e13/0x5450 [ 23.112969] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.113038] ? kasan_atomics_helper+0x1e13/0x5450 [ 23.113121] kasan_report+0x140/0x180 [ 23.113184] ? kasan_atomics_helper+0x1e13/0x5450 [ 23.113251] kasan_check_range+0x10c/0x1c0 [ 23.113356] __kasan_check_write+0x18/0x20 [ 23.113417] kasan_atomics_helper+0x1e13/0x5450 [ 23.113478] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.113520] ? kasan_save_alloc_info+0x3b/0x50 [ 23.113553] ? kasan_save_track+0x18/0x40 [ 23.113587] kasan_atomics+0x1dd/0x310 [ 23.113617] ? __pfx_kasan_atomics+0x10/0x10 [ 23.113650] ? __pfx_read_tsc+0x10/0x10 [ 23.113681] ? ktime_get_ts64+0x86/0x230 [ 23.113717] kunit_try_run_case+0x1a6/0x480 [ 23.113750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.113779] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.113814] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.113866] ? __kthread_parkme+0x82/0x160 [ 23.113902] ? preempt_count_sub+0x50/0x80 [ 23.113936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.113967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.114004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.114039] kthread+0x324/0x6e0 [ 23.114067] ? trace_preempt_on+0x20/0xc0 [ 23.114101] ? __pfx_kthread+0x10/0x10 [ 23.114131] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.114162] ? calculate_sigpending+0x7b/0xa0 [ 23.114194] ? __pfx_kthread+0x10/0x10 [ 23.114224] ret_from_fork+0x41/0x80 [ 23.114250] ? __pfx_kthread+0x10/0x10 [ 23.114280] ret_from_fork_asm+0x1a/0x30 [ 23.114350] </TASK> [ 23.114368] [ 23.131112] Allocated by task 273: [ 23.131404] kasan_save_stack+0x45/0x70 [ 23.132085] kasan_save_track+0x18/0x40 [ 23.132515] kasan_save_alloc_info+0x3b/0x50 [ 23.132979] __kasan_kmalloc+0xb7/0xc0 [ 23.133411] __kmalloc_cache_noprof+0x18a/0x420 [ 23.133861] kasan_atomics+0x96/0x310 [ 23.134192] kunit_try_run_case+0x1a6/0x480 [ 23.134611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.135447] kthread+0x324/0x6e0 [ 23.135728] ret_from_fork+0x41/0x80 [ 23.136276] ret_from_fork_asm+0x1a/0x30 [ 23.136965] [ 23.137137] The buggy address belongs to the object at ffff888102993400 [ 23.137137] which belongs to the cache kmalloc-64 of size 64 [ 23.137986] The buggy address is located 0 bytes to the right of [ 23.137986] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.138812] [ 23.139075] The buggy address belongs to the physical page: [ 23.139358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.140064] flags: 0x200000000000000(node=0|zone=2) [ 23.140532] page_type: f5(slab) [ 23.140874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.141471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.141866] page dumped because: kasan: bad access detected [ 23.142342] [ 23.142555] Memory state around the buggy address: [ 23.142942] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.143292] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.143920] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.144298] ^ [ 23.144824] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.145310] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.145994] ================================================================== [ 22.559187] ================================================================== [ 22.559978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 22.560484] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.561072] [ 22.561246] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.561321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.561341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.561369] Call Trace: [ 22.561399] <TASK> [ 22.561424] dump_stack_lvl+0x73/0xb0 [ 22.561471] print_report+0xd1/0x650 [ 22.561504] ? __virt_addr_valid+0x1db/0x2d0 [ 22.561537] ? kasan_atomics_helper+0x15b7/0x5450 [ 22.561567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.561601] ? kasan_atomics_helper+0x15b7/0x5450 [ 22.561630] kasan_report+0x140/0x180 [ 22.561669] ? kasan_atomics_helper+0x15b7/0x5450 [ 22.561726] kasan_check_range+0x10c/0x1c0 [ 22.561775] __kasan_check_write+0x18/0x20 [ 22.561823] kasan_atomics_helper+0x15b7/0x5450 [ 22.561885] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.561936] ? kasan_save_alloc_info+0x3b/0x50 [ 22.562001] ? kasan_save_track+0x18/0x40 [ 22.562063] kasan_atomics+0x1dd/0x310 [ 22.562119] ? __pfx_kasan_atomics+0x10/0x10 [ 22.562182] ? __pfx_read_tsc+0x10/0x10 [ 22.562238] ? ktime_get_ts64+0x86/0x230 [ 22.562301] kunit_try_run_case+0x1a6/0x480 [ 22.562363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.562416] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.562484] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.562545] ? __kthread_parkme+0x82/0x160 [ 22.562601] ? preempt_count_sub+0x50/0x80 [ 22.562662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.562720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.562785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.563337] kthread+0x324/0x6e0 [ 22.563427] ? trace_preempt_on+0x20/0xc0 [ 22.563548] ? __pfx_kthread+0x10/0x10 [ 22.563606] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.563663] ? calculate_sigpending+0x7b/0xa0 [ 22.563727] ? __pfx_kthread+0x10/0x10 [ 22.563781] ret_from_fork+0x41/0x80 [ 22.563827] ? __pfx_kthread+0x10/0x10 [ 22.563903] ret_from_fork_asm+0x1a/0x30 [ 22.564006] </TASK> [ 22.564040] [ 22.592322] Allocated by task 273: [ 22.592608] kasan_save_stack+0x45/0x70 [ 22.594640] kasan_save_track+0x18/0x40 [ 22.595885] kasan_save_alloc_info+0x3b/0x50 [ 22.596865] __kasan_kmalloc+0xb7/0xc0 [ 22.597153] __kmalloc_cache_noprof+0x18a/0x420 [ 22.599664] kasan_atomics+0x96/0x310 [ 22.600879] kunit_try_run_case+0x1a6/0x480 [ 22.602123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.603405] kthread+0x324/0x6e0 [ 22.604135] ret_from_fork+0x41/0x80 [ 22.605328] ret_from_fork_asm+0x1a/0x30 [ 22.606084] [ 22.606343] The buggy address belongs to the object at ffff888102993400 [ 22.606343] which belongs to the cache kmalloc-64 of size 64 [ 22.608469] The buggy address is located 0 bytes to the right of [ 22.608469] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.609678] [ 22.609825] The buggy address belongs to the physical page: [ 22.610481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.611191] flags: 0x200000000000000(node=0|zone=2) [ 22.611691] page_type: f5(slab) [ 22.612079] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.613142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.613544] page dumped because: kasan: bad access detected [ 22.613826] [ 22.614012] Memory state around the buggy address: [ 22.614268] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.614594] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.617636] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.618761] ^ [ 22.619064] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.620612] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.622194] ================================================================== [ 23.458934] ================================================================== [ 23.459623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 23.460665] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.461189] [ 23.461421] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.461539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.461573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.461631] Call Trace: [ 23.461680] <TASK> [ 23.461724] dump_stack_lvl+0x73/0xb0 [ 23.461815] print_report+0xd1/0x650 [ 23.461901] ? __virt_addr_valid+0x1db/0x2d0 [ 23.461961] ? kasan_atomics_helper+0x224d/0x5450 [ 23.462023] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.462094] ? kasan_atomics_helper+0x224d/0x5450 [ 23.462149] kasan_report+0x140/0x180 [ 23.462210] ? kasan_atomics_helper+0x224d/0x5450 [ 23.462282] kasan_check_range+0x10c/0x1c0 [ 23.462348] __kasan_check_write+0x18/0x20 [ 23.462411] kasan_atomics_helper+0x224d/0x5450 [ 23.462469] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.462522] ? kasan_save_alloc_info+0x3b/0x50 [ 23.462577] ? kasan_save_track+0x18/0x40 [ 23.462653] kasan_atomics+0x1dd/0x310 [ 23.462703] ? __pfx_kasan_atomics+0x10/0x10 [ 23.462760] ? __pfx_read_tsc+0x10/0x10 [ 23.462819] ? ktime_get_ts64+0x86/0x230 [ 23.462904] kunit_try_run_case+0x1a6/0x480 [ 23.462972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.463030] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.463099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.463161] ? __kthread_parkme+0x82/0x160 [ 23.463223] ? preempt_count_sub+0x50/0x80 [ 23.463290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.463355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.463417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.463484] kthread+0x324/0x6e0 [ 23.463543] ? trace_preempt_on+0x20/0xc0 [ 23.463608] ? __pfx_kthread+0x10/0x10 [ 23.463671] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.463750] ? calculate_sigpending+0x7b/0xa0 [ 23.463800] ? __pfx_kthread+0x10/0x10 [ 23.463955] ret_from_fork+0x41/0x80 [ 23.464028] ? __pfx_kthread+0x10/0x10 [ 23.464094] ret_from_fork_asm+0x1a/0x30 [ 23.464184] </TASK> [ 23.464216] [ 23.477352] Allocated by task 273: [ 23.477737] kasan_save_stack+0x45/0x70 [ 23.478246] kasan_save_track+0x18/0x40 [ 23.478684] kasan_save_alloc_info+0x3b/0x50 [ 23.479135] __kasan_kmalloc+0xb7/0xc0 [ 23.479570] __kmalloc_cache_noprof+0x18a/0x420 [ 23.480060] kasan_atomics+0x96/0x310 [ 23.480510] kunit_try_run_case+0x1a6/0x480 [ 23.480968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.481564] kthread+0x324/0x6e0 [ 23.481964] ret_from_fork+0x41/0x80 [ 23.482377] ret_from_fork_asm+0x1a/0x30 [ 23.482642] [ 23.482778] The buggy address belongs to the object at ffff888102993400 [ 23.482778] which belongs to the cache kmalloc-64 of size 64 [ 23.483792] The buggy address is located 0 bytes to the right of [ 23.483792] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.484778] [ 23.484995] The buggy address belongs to the physical page: [ 23.485422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.485827] flags: 0x200000000000000(node=0|zone=2) [ 23.486126] page_type: f5(slab) [ 23.486353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.486709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.487529] page dumped because: kasan: bad access detected [ 23.488065] [ 23.488337] Memory state around the buggy address: [ 23.488824] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.489534] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.490200] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.490908] ^ [ 23.491368] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.491815] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.492171] ================================================================== [ 21.157050] ================================================================== [ 21.157403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 21.158050] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.158623] [ 21.159087] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.159201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.159236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.159289] Call Trace: [ 21.159335] <TASK> [ 21.159372] dump_stack_lvl+0x73/0xb0 [ 21.159596] print_report+0xd1/0x650 [ 21.159672] ? __virt_addr_valid+0x1db/0x2d0 [ 21.159749] ? kasan_atomics_helper+0x3e0/0x5450 [ 21.159815] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.160139] ? kasan_atomics_helper+0x3e0/0x5450 [ 21.160225] kasan_report+0x140/0x180 [ 21.160357] ? kasan_atomics_helper+0x3e0/0x5450 [ 21.160400] kasan_check_range+0x10c/0x1c0 [ 21.160442] __kasan_check_read+0x15/0x20 [ 21.160764] kasan_atomics_helper+0x3e0/0x5450 [ 21.160799] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.160832] ? kasan_save_alloc_info+0x3b/0x50 [ 21.160888] ? kasan_save_track+0x18/0x40 [ 21.160921] kasan_atomics+0x1dd/0x310 [ 21.160954] ? __pfx_kasan_atomics+0x10/0x10 [ 21.160985] ? __pfx_read_tsc+0x10/0x10 [ 21.161016] ? ktime_get_ts64+0x86/0x230 [ 21.161052] kunit_try_run_case+0x1a6/0x480 [ 21.161086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.161116] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.161150] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.161182] ? __kthread_parkme+0x82/0x160 [ 21.161212] ? preempt_count_sub+0x50/0x80 [ 21.161246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.161279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.161328] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.161366] kthread+0x324/0x6e0 [ 21.161395] ? trace_preempt_on+0x20/0xc0 [ 21.161435] ? __pfx_kthread+0x10/0x10 [ 21.161487] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.161543] ? calculate_sigpending+0x7b/0xa0 [ 21.161579] ? __pfx_kthread+0x10/0x10 [ 21.161610] ret_from_fork+0x41/0x80 [ 21.161639] ? __pfx_kthread+0x10/0x10 [ 21.161669] ret_from_fork_asm+0x1a/0x30 [ 21.161712] </TASK> [ 21.161728] [ 21.178499] Allocated by task 273: [ 21.178939] kasan_save_stack+0x45/0x70 [ 21.179759] kasan_save_track+0x18/0x40 [ 21.180290] kasan_save_alloc_info+0x3b/0x50 [ 21.181055] __kasan_kmalloc+0xb7/0xc0 [ 21.181365] __kmalloc_cache_noprof+0x18a/0x420 [ 21.181885] kasan_atomics+0x96/0x310 [ 21.182803] kunit_try_run_case+0x1a6/0x480 [ 21.183195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.183979] kthread+0x324/0x6e0 [ 21.184539] ret_from_fork+0x41/0x80 [ 21.185070] ret_from_fork_asm+0x1a/0x30 [ 21.185649] [ 21.185805] The buggy address belongs to the object at ffff888102993400 [ 21.185805] which belongs to the cache kmalloc-64 of size 64 [ 21.187431] The buggy address is located 0 bytes to the right of [ 21.187431] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.188165] [ 21.188754] The buggy address belongs to the physical page: [ 21.189315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.190218] flags: 0x200000000000000(node=0|zone=2) [ 21.190737] page_type: f5(slab) [ 21.190985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.192285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.192990] page dumped because: kasan: bad access detected [ 21.193814] [ 21.194173] Memory state around the buggy address: [ 21.195164] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.195794] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.196362] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.196966] ^ [ 21.197320] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.197784] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.198619] ================================================================== [ 22.865769] ================================================================== [ 22.866330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 22.866954] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.867535] [ 22.867901] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.868039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.868093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.868151] Call Trace: [ 22.868196] <TASK> [ 22.868242] dump_stack_lvl+0x73/0xb0 [ 22.868372] print_report+0xd1/0x650 [ 22.868466] ? __virt_addr_valid+0x1db/0x2d0 [ 22.868535] ? kasan_atomics_helper+0x19e4/0x5450 [ 22.868597] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.868659] ? kasan_atomics_helper+0x19e4/0x5450 [ 22.868693] kasan_report+0x140/0x180 [ 22.868727] ? kasan_atomics_helper+0x19e4/0x5450 [ 22.868762] kasan_check_range+0x10c/0x1c0 [ 22.868795] __kasan_check_write+0x18/0x20 [ 22.868826] kasan_atomics_helper+0x19e4/0x5450 [ 22.868881] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.868931] ? kasan_save_alloc_info+0x3b/0x50 [ 22.868963] ? kasan_save_track+0x18/0x40 [ 22.868995] kasan_atomics+0x1dd/0x310 [ 22.869027] ? __pfx_kasan_atomics+0x10/0x10 [ 22.869059] ? __pfx_read_tsc+0x10/0x10 [ 22.869089] ? ktime_get_ts64+0x86/0x230 [ 22.869124] kunit_try_run_case+0x1a6/0x480 [ 22.869158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.869187] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.869222] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.869255] ? __kthread_parkme+0x82/0x160 [ 22.869300] ? preempt_count_sub+0x50/0x80 [ 22.869344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.869378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.869415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.869448] kthread+0x324/0x6e0 [ 22.869476] ? trace_preempt_on+0x20/0xc0 [ 22.869509] ? __pfx_kthread+0x10/0x10 [ 22.869539] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.869570] ? calculate_sigpending+0x7b/0xa0 [ 22.869600] ? __pfx_kthread+0x10/0x10 [ 22.869630] ret_from_fork+0x41/0x80 [ 22.869655] ? __pfx_kthread+0x10/0x10 [ 22.869684] ret_from_fork_asm+0x1a/0x30 [ 22.869727] </TASK> [ 22.869743] [ 22.884469] Allocated by task 273: [ 22.884945] kasan_save_stack+0x45/0x70 [ 22.885455] kasan_save_track+0x18/0x40 [ 22.885875] kasan_save_alloc_info+0x3b/0x50 [ 22.886402] __kasan_kmalloc+0xb7/0xc0 [ 22.886839] __kmalloc_cache_noprof+0x18a/0x420 [ 22.887328] kasan_atomics+0x96/0x310 [ 22.887623] kunit_try_run_case+0x1a6/0x480 [ 22.888151] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.888742] kthread+0x324/0x6e0 [ 22.889172] ret_from_fork+0x41/0x80 [ 22.889650] ret_from_fork_asm+0x1a/0x30 [ 22.890031] [ 22.890311] The buggy address belongs to the object at ffff888102993400 [ 22.890311] which belongs to the cache kmalloc-64 of size 64 [ 22.891163] The buggy address is located 0 bytes to the right of [ 22.891163] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.891896] [ 22.892127] The buggy address belongs to the physical page: [ 22.892503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.893117] flags: 0x200000000000000(node=0|zone=2) [ 22.893450] page_type: f5(slab) [ 22.893683] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.894563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.895280] page dumped because: kasan: bad access detected [ 22.895956] [ 22.896435] Memory state around the buggy address: [ 22.897324] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.897756] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.898432] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.898935] ^ [ 22.899307] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.899911] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.900287] ================================================================== [ 21.035262] ================================================================== [ 21.035612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 21.036352] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.037076] [ 21.037479] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.037588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.037621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.037709] Call Trace: [ 21.037756] <TASK> [ 21.037877] dump_stack_lvl+0x73/0xb0 [ 21.037975] print_report+0xd1/0x650 [ 21.038055] ? __virt_addr_valid+0x1db/0x2d0 [ 21.038119] ? kasan_atomics_helper+0x4ba4/0x5450 [ 21.038179] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.038243] ? kasan_atomics_helper+0x4ba4/0x5450 [ 21.038311] kasan_report+0x140/0x180 [ 21.038374] ? kasan_atomics_helper+0x4ba4/0x5450 [ 21.038440] __asan_report_store4_noabort+0x1b/0x30 [ 21.038498] kasan_atomics_helper+0x4ba4/0x5450 [ 21.038546] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.038589] ? kasan_save_alloc_info+0x3b/0x50 [ 21.038630] ? kasan_save_track+0x18/0x40 [ 21.038674] kasan_atomics+0x1dd/0x310 [ 21.038713] ? __pfx_kasan_atomics+0x10/0x10 [ 21.038759] ? __pfx_read_tsc+0x10/0x10 [ 21.038804] ? ktime_get_ts64+0x86/0x230 [ 21.038871] kunit_try_run_case+0x1a6/0x480 [ 21.038923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.038966] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.039017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.039073] ? __kthread_parkme+0x82/0x160 [ 21.039128] ? preempt_count_sub+0x50/0x80 [ 21.039190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.039248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.039317] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.039426] kthread+0x324/0x6e0 [ 21.039505] ? trace_preempt_on+0x20/0xc0 [ 21.039556] ? __pfx_kthread+0x10/0x10 [ 21.039604] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.039653] ? calculate_sigpending+0x7b/0xa0 [ 21.039712] ? __pfx_kthread+0x10/0x10 [ 21.039761] ret_from_fork+0x41/0x80 [ 21.039802] ? __pfx_kthread+0x10/0x10 [ 21.039866] ret_from_fork_asm+0x1a/0x30 [ 21.039944] </TASK> [ 21.039973] [ 21.056274] Allocated by task 273: [ 21.056716] kasan_save_stack+0x45/0x70 [ 21.057420] kasan_save_track+0x18/0x40 [ 21.057820] kasan_save_alloc_info+0x3b/0x50 [ 21.058080] __kasan_kmalloc+0xb7/0xc0 [ 21.058626] __kmalloc_cache_noprof+0x18a/0x420 [ 21.059031] kasan_atomics+0x96/0x310 [ 21.059395] kunit_try_run_case+0x1a6/0x480 [ 21.059926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.060228] kthread+0x324/0x6e0 [ 21.060510] ret_from_fork+0x41/0x80 [ 21.060966] ret_from_fork_asm+0x1a/0x30 [ 21.061407] [ 21.061642] The buggy address belongs to the object at ffff888102993400 [ 21.061642] which belongs to the cache kmalloc-64 of size 64 [ 21.063276] The buggy address is located 0 bytes to the right of [ 21.063276] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.064736] [ 21.064988] The buggy address belongs to the physical page: [ 21.065953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.066623] flags: 0x200000000000000(node=0|zone=2) [ 21.066966] page_type: f5(slab) [ 21.067359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.068539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.068908] page dumped because: kasan: bad access detected [ 21.069685] [ 21.069921] Memory state around the buggy address: [ 21.070341] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.071051] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.072005] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.072441] ^ [ 21.072705] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.073338] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.074223] ================================================================== [ 23.246686] ================================================================== [ 23.247157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 23.247938] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 23.248635] [ 23.248898] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.249006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.249041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.249090] Call Trace: [ 23.249135] <TASK> [ 23.249175] dump_stack_lvl+0x73/0xb0 [ 23.249253] print_report+0xd1/0x650 [ 23.249362] ? __virt_addr_valid+0x1db/0x2d0 [ 23.249423] ? kasan_atomics_helper+0x2007/0x5450 [ 23.249477] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.249544] ? kasan_atomics_helper+0x2007/0x5450 [ 23.249599] kasan_report+0x140/0x180 [ 23.249660] ? kasan_atomics_helper+0x2007/0x5450 [ 23.249735] kasan_check_range+0x10c/0x1c0 [ 23.249800] __kasan_check_write+0x18/0x20 [ 23.249879] kasan_atomics_helper+0x2007/0x5450 [ 23.249948] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.250015] ? kasan_save_alloc_info+0x3b/0x50 [ 23.250053] ? kasan_save_track+0x18/0x40 [ 23.250087] kasan_atomics+0x1dd/0x310 [ 23.250118] ? __pfx_kasan_atomics+0x10/0x10 [ 23.250150] ? __pfx_read_tsc+0x10/0x10 [ 23.250182] ? ktime_get_ts64+0x86/0x230 [ 23.250217] kunit_try_run_case+0x1a6/0x480 [ 23.250251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.250279] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.250342] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.250377] ? __kthread_parkme+0x82/0x160 [ 23.250409] ? preempt_count_sub+0x50/0x80 [ 23.250444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.250475] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.250511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.250546] kthread+0x324/0x6e0 [ 23.250576] ? trace_preempt_on+0x20/0xc0 [ 23.250609] ? __pfx_kthread+0x10/0x10 [ 23.250639] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.250670] ? calculate_sigpending+0x7b/0xa0 [ 23.250701] ? __pfx_kthread+0x10/0x10 [ 23.250730] ret_from_fork+0x41/0x80 [ 23.250757] ? __pfx_kthread+0x10/0x10 [ 23.250786] ret_from_fork_asm+0x1a/0x30 [ 23.250830] </TASK> [ 23.250863] [ 23.266841] Allocated by task 273: [ 23.267313] kasan_save_stack+0x45/0x70 [ 23.267817] kasan_save_track+0x18/0x40 [ 23.268589] kasan_save_alloc_info+0x3b/0x50 [ 23.268942] __kasan_kmalloc+0xb7/0xc0 [ 23.269492] __kmalloc_cache_noprof+0x18a/0x420 [ 23.269935] kasan_atomics+0x96/0x310 [ 23.270570] kunit_try_run_case+0x1a6/0x480 [ 23.271139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.271597] kthread+0x324/0x6e0 [ 23.272018] ret_from_fork+0x41/0x80 [ 23.272294] ret_from_fork_asm+0x1a/0x30 [ 23.272759] [ 23.273194] The buggy address belongs to the object at ffff888102993400 [ 23.273194] which belongs to the cache kmalloc-64 of size 64 [ 23.274299] The buggy address is located 0 bytes to the right of [ 23.274299] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 23.274997] [ 23.275536] The buggy address belongs to the physical page: [ 23.276132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 23.277022] flags: 0x200000000000000(node=0|zone=2) [ 23.277366] page_type: f5(slab) [ 23.277498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.277682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.277881] page dumped because: kasan: bad access detected [ 23.278354] [ 23.278567] Memory state around the buggy address: [ 23.279086] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.279774] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.280463] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.280900] ^ [ 23.281258] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.281966] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.282541] ================================================================== [ 22.415056] ================================================================== [ 22.415780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 22.416452] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.416928] [ 22.417084] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.417154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.417173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.417203] Call Trace: [ 22.417228] <TASK> [ 22.417253] dump_stack_lvl+0x73/0xb0 [ 22.417315] print_report+0xd1/0x650 [ 22.417354] ? __virt_addr_valid+0x1db/0x2d0 [ 22.417389] ? kasan_atomics_helper+0x4eb0/0x5450 [ 22.417420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.417456] ? kasan_atomics_helper+0x4eb0/0x5450 [ 22.417488] kasan_report+0x140/0x180 [ 22.417519] ? kasan_atomics_helper+0x4eb0/0x5450 [ 22.417553] __asan_report_load8_noabort+0x18/0x20 [ 22.417586] kasan_atomics_helper+0x4eb0/0x5450 [ 22.417616] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.417647] ? kasan_save_alloc_info+0x3b/0x50 [ 22.417677] ? kasan_save_track+0x18/0x40 [ 22.417709] kasan_atomics+0x1dd/0x310 [ 22.417740] ? __pfx_kasan_atomics+0x10/0x10 [ 22.417771] ? __pfx_read_tsc+0x10/0x10 [ 22.417801] ? ktime_get_ts64+0x86/0x230 [ 22.417837] kunit_try_run_case+0x1a6/0x480 [ 22.417906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.417965] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.418306] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.418404] ? __kthread_parkme+0x82/0x160 [ 22.418474] ? preempt_count_sub+0x50/0x80 [ 22.418544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.418609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.418678] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.418747] kthread+0x324/0x6e0 [ 22.418805] ? trace_preempt_on+0x20/0xc0 [ 22.418893] ? __pfx_kthread+0x10/0x10 [ 22.418982] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.419074] ? calculate_sigpending+0x7b/0xa0 [ 22.419141] ? __pfx_kthread+0x10/0x10 [ 22.419202] ret_from_fork+0x41/0x80 [ 22.419235] ? __pfx_kthread+0x10/0x10 [ 22.419267] ret_from_fork_asm+0x1a/0x30 [ 22.419336] </TASK> [ 22.419353] [ 22.435794] Allocated by task 273: [ 22.436548] kasan_save_stack+0x45/0x70 [ 22.436790] kasan_save_track+0x18/0x40 [ 22.437270] kasan_save_alloc_info+0x3b/0x50 [ 22.437775] __kasan_kmalloc+0xb7/0xc0 [ 22.438106] __kmalloc_cache_noprof+0x18a/0x420 [ 22.438598] kasan_atomics+0x96/0x310 [ 22.439096] kunit_try_run_case+0x1a6/0x480 [ 22.439503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.439947] kthread+0x324/0x6e0 [ 22.440425] ret_from_fork+0x41/0x80 [ 22.440878] ret_from_fork_asm+0x1a/0x30 [ 22.441272] [ 22.441487] The buggy address belongs to the object at ffff888102993400 [ 22.441487] which belongs to the cache kmalloc-64 of size 64 [ 22.442102] The buggy address is located 0 bytes to the right of [ 22.442102] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.443359] [ 22.443749] The buggy address belongs to the physical page: [ 22.444023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.444874] flags: 0x200000000000000(node=0|zone=2) [ 22.445156] page_type: f5(slab) [ 22.445675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.446207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.446998] page dumped because: kasan: bad access detected [ 22.447543] [ 22.447825] Memory state around the buggy address: [ 22.448217] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.449107] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.449656] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.450237] ^ [ 22.450576] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.451101] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.451823] ================================================================== [ 21.076265] ================================================================== [ 21.076761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 21.077417] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.078002] [ 21.078196] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.078338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.078379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.078431] Call Trace: [ 21.078474] <TASK> [ 21.078512] dump_stack_lvl+0x73/0xb0 [ 21.078587] print_report+0xd1/0x650 [ 21.078649] ? __virt_addr_valid+0x1db/0x2d0 [ 21.078709] ? kasan_atomics_helper+0x4b8a/0x5450 [ 21.078807] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.078895] ? kasan_atomics_helper+0x4b8a/0x5450 [ 21.078953] kasan_report+0x140/0x180 [ 21.079014] ? kasan_atomics_helper+0x4b8a/0x5450 [ 21.079082] __asan_report_load4_noabort+0x18/0x20 [ 21.079140] kasan_atomics_helper+0x4b8a/0x5450 [ 21.079192] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.079243] ? kasan_save_alloc_info+0x3b/0x50 [ 21.079338] ? kasan_save_track+0x18/0x40 [ 21.079401] kasan_atomics+0x1dd/0x310 [ 21.079490] ? __pfx_kasan_atomics+0x10/0x10 [ 21.079550] ? __pfx_read_tsc+0x10/0x10 [ 21.079599] ? ktime_get_ts64+0x86/0x230 [ 21.079658] kunit_try_run_case+0x1a6/0x480 [ 21.079723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.079771] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.079829] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.079906] ? __kthread_parkme+0x82/0x160 [ 21.079968] ? preempt_count_sub+0x50/0x80 [ 21.080030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.080066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.080104] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.080138] kthread+0x324/0x6e0 [ 21.080166] ? trace_preempt_on+0x20/0xc0 [ 21.080198] ? __pfx_kthread+0x10/0x10 [ 21.080226] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.080257] ? calculate_sigpending+0x7b/0xa0 [ 21.080285] ? __pfx_kthread+0x10/0x10 [ 21.080338] ret_from_fork+0x41/0x80 [ 21.080365] ? __pfx_kthread+0x10/0x10 [ 21.080393] ret_from_fork_asm+0x1a/0x30 [ 21.080446] </TASK> [ 21.080470] [ 21.095277] Allocated by task 273: [ 21.095665] kasan_save_stack+0x45/0x70 [ 21.095966] kasan_save_track+0x18/0x40 [ 21.096213] kasan_save_alloc_info+0x3b/0x50 [ 21.096650] __kasan_kmalloc+0xb7/0xc0 [ 21.097097] __kmalloc_cache_noprof+0x18a/0x420 [ 21.097756] kasan_atomics+0x96/0x310 [ 21.098730] kunit_try_run_case+0x1a6/0x480 [ 21.099197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.099886] kthread+0x324/0x6e0 [ 21.100125] ret_from_fork+0x41/0x80 [ 21.100362] ret_from_fork_asm+0x1a/0x30 [ 21.100740] [ 21.101090] The buggy address belongs to the object at ffff888102993400 [ 21.101090] which belongs to the cache kmalloc-64 of size 64 [ 21.101937] The buggy address is located 0 bytes to the right of [ 21.101937] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.102937] [ 21.103093] The buggy address belongs to the physical page: [ 21.103361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.103743] flags: 0x200000000000000(node=0|zone=2) [ 21.104196] page_type: f5(slab) [ 21.104557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.105232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.106665] page dumped because: kasan: bad access detected [ 21.107148] [ 21.107538] Memory state around the buggy address: [ 21.107927] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.108320] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.108665] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.109362] ^ [ 21.110194] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.111165] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.111847] ================================================================== [ 22.453318] ================================================================== [ 22.454120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 22.455078] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273 [ 22.456016] [ 22.456220] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 22.456323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.456361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.456413] Call Trace: [ 22.456440] <TASK> [ 22.456467] dump_stack_lvl+0x73/0xb0 [ 22.456510] print_report+0xd1/0x650 [ 22.456545] ? __virt_addr_valid+0x1db/0x2d0 [ 22.456598] ? kasan_atomics_helper+0x1468/0x5450 [ 22.456634] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.456669] ? kasan_atomics_helper+0x1468/0x5450 [ 22.456699] kasan_report+0x140/0x180 [ 22.456730] ? kasan_atomics_helper+0x1468/0x5450 [ 22.456765] kasan_check_range+0x10c/0x1c0 [ 22.456797] __kasan_check_write+0x18/0x20 [ 22.456827] kasan_atomics_helper+0x1468/0x5450 [ 22.456884] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.456944] ? kasan_save_alloc_info+0x3b/0x50 [ 22.457006] ? kasan_save_track+0x18/0x40 [ 22.457074] kasan_atomics+0x1dd/0x310 [ 22.457136] ? __pfx_kasan_atomics+0x10/0x10 [ 22.457201] ? __pfx_read_tsc+0x10/0x10 [ 22.457261] ? ktime_get_ts64+0x86/0x230 [ 22.457329] kunit_try_run_case+0x1a6/0x480 [ 22.457397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.457457] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.457530] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.457599] ? __kthread_parkme+0x82/0x160 [ 22.457662] ? preempt_count_sub+0x50/0x80 [ 22.457701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.457735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.457773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.457808] kthread+0x324/0x6e0 [ 22.457837] ? trace_preempt_on+0x20/0xc0 [ 22.457892] ? __pfx_kthread+0x10/0x10 [ 22.457922] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.457955] ? calculate_sigpending+0x7b/0xa0 [ 22.457986] ? __pfx_kthread+0x10/0x10 [ 22.458016] ret_from_fork+0x41/0x80 [ 22.458042] ? __pfx_kthread+0x10/0x10 [ 22.458072] ret_from_fork_asm+0x1a/0x30 [ 22.458114] </TASK> [ 22.458129] [ 22.471751] Allocated by task 273: [ 22.472186] kasan_save_stack+0x45/0x70 [ 22.472701] kasan_save_track+0x18/0x40 [ 22.473153] kasan_save_alloc_info+0x3b/0x50 [ 22.473497] __kasan_kmalloc+0xb7/0xc0 [ 22.473814] __kmalloc_cache_noprof+0x18a/0x420 [ 22.474348] kasan_atomics+0x96/0x310 [ 22.474787] kunit_try_run_case+0x1a6/0x480 [ 22.475315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.475839] kthread+0x324/0x6e0 [ 22.476079] ret_from_fork+0x41/0x80 [ 22.476543] ret_from_fork_asm+0x1a/0x30 [ 22.476918] [ 22.477194] The buggy address belongs to the object at ffff888102993400 [ 22.477194] which belongs to the cache kmalloc-64 of size 64 [ 22.478066] The buggy address is located 0 bytes to the right of [ 22.478066] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 22.478928] [ 22.479181] The buggy address belongs to the physical page: [ 22.479627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 22.480221] flags: 0x200000000000000(node=0|zone=2) [ 22.480672] page_type: f5(slab) [ 22.481071] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.481584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.482198] page dumped because: kasan: bad access detected [ 22.482560] [ 22.482800] Memory state around the buggy address: [ 22.483240] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.483806] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.484402] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.485019] ^ [ 22.485518] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.486112] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.486662] ================================================================== [ 21.665242] ================================================================== [ 21.665773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 21.666285] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273 [ 21.666919] [ 21.667178] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 21.667294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.667327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.667380] Call Trace: [ 21.667423] <TASK> [ 21.667463] dump_stack_lvl+0x73/0xb0 [ 21.667538] print_report+0xd1/0x650 [ 21.667595] ? __virt_addr_valid+0x1db/0x2d0 [ 21.667655] ? kasan_atomics_helper+0xa2c/0x5450 [ 21.667723] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.667787] ? kasan_atomics_helper+0xa2c/0x5450 [ 21.667844] kasan_report+0x140/0x180 [ 21.667922] ? kasan_atomics_helper+0xa2c/0x5450 [ 21.667987] kasan_check_range+0x10c/0x1c0 [ 21.668054] __kasan_check_write+0x18/0x20 [ 21.668118] kasan_atomics_helper+0xa2c/0x5450 [ 21.668178] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.668237] ? kasan_save_alloc_info+0x3b/0x50 [ 21.668295] ? kasan_save_track+0x18/0x40 [ 21.668357] kasan_atomics+0x1dd/0x310 [ 21.668423] ? __pfx_kasan_atomics+0x10/0x10 [ 21.668481] ? __pfx_read_tsc+0x10/0x10 [ 21.668535] ? ktime_get_ts64+0x86/0x230 [ 21.668592] kunit_try_run_case+0x1a6/0x480 [ 21.668649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.668697] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.668755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.668811] ? __kthread_parkme+0x82/0x160 [ 21.668882] ? preempt_count_sub+0x50/0x80 [ 21.668945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.669013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.669088] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.669159] kthread+0x324/0x6e0 [ 21.669218] ? trace_preempt_on+0x20/0xc0 [ 21.669258] ? __pfx_kthread+0x10/0x10 [ 21.669290] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.669339] ? calculate_sigpending+0x7b/0xa0 [ 21.669371] ? __pfx_kthread+0x10/0x10 [ 21.669403] ret_from_fork+0x41/0x80 [ 21.669436] ? __pfx_kthread+0x10/0x10 [ 21.669488] ret_from_fork_asm+0x1a/0x30 [ 21.669561] </TASK> [ 21.669590] [ 21.688521] Allocated by task 273: [ 21.689072] kasan_save_stack+0x45/0x70 [ 21.689637] kasan_save_track+0x18/0x40 [ 21.690011] kasan_save_alloc_info+0x3b/0x50 [ 21.690749] __kasan_kmalloc+0xb7/0xc0 [ 21.691269] __kmalloc_cache_noprof+0x18a/0x420 [ 21.692316] kasan_atomics+0x96/0x310 [ 21.692670] kunit_try_run_case+0x1a6/0x480 [ 21.693332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.693896] kthread+0x324/0x6e0 [ 21.694278] ret_from_fork+0x41/0x80 [ 21.694709] ret_from_fork_asm+0x1a/0x30 [ 21.695172] [ 21.695324] The buggy address belongs to the object at ffff888102993400 [ 21.695324] which belongs to the cache kmalloc-64 of size 64 [ 21.697182] The buggy address is located 0 bytes to the right of [ 21.697182] allocated 48-byte region [ffff888102993400, ffff888102993430) [ 21.698901] [ 21.699051] The buggy address belongs to the physical page: [ 21.699952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993 [ 21.700397] flags: 0x200000000000000(node=0|zone=2) [ 21.700949] page_type: f5(slab) [ 21.701390] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.702156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.703021] page dumped because: kasan: bad access detected [ 21.703576] [ 21.703731] Memory state around the buggy address: [ 21.704032] ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.705143] ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.705715] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.706524] ^ [ 21.706946] ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.707511] ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.708138] ==================================================================