Date
May 12, 2025, 6:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.714017] ================================================================== [ 21.714339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 21.714945] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.715407] [ 21.715621] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.715746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.715788] Hardware name: linux,dummy-virt (DT) [ 21.715828] Call trace: [ 21.715857] show_stack+0x20/0x38 (C) [ 21.715916] dump_stack_lvl+0x8c/0xd0 [ 21.715990] print_report+0x118/0x608 [ 21.716044] kasan_report+0xdc/0x128 [ 21.716098] kasan_check_range+0x100/0x1a8 [ 21.716154] __kasan_check_write+0x20/0x30 [ 21.716220] kasan_atomics_helper+0xad4/0x4858 [ 21.716283] kasan_atomics+0x198/0x2e8 [ 21.716338] kunit_try_run_case+0x170/0x3f0 [ 21.716393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.716455] kthread+0x318/0x620 [ 21.716506] ret_from_fork+0x10/0x20 [ 21.716562] [ 21.720031] Allocated by task 254: [ 21.720364] kasan_save_stack+0x3c/0x68 [ 21.720713] kasan_save_track+0x20/0x40 [ 21.720993] kasan_save_alloc_info+0x40/0x58 [ 21.721360] __kasan_kmalloc+0xd4/0xd8 [ 21.721664] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.721976] kasan_atomics+0xb8/0x2e8 [ 21.722362] kunit_try_run_case+0x170/0x3f0 [ 21.722669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.723031] kthread+0x318/0x620 [ 21.723252] ret_from_fork+0x10/0x20 [ 21.723499] [ 21.723707] The buggy address belongs to the object at fff00000c66ea700 [ 21.723707] which belongs to the cache kmalloc-64 of size 64 [ 21.724321] The buggy address is located 0 bytes to the right of [ 21.724321] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.725038] [ 21.725176] The buggy address belongs to the physical page: [ 21.725483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.726008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.726412] page_type: f5(slab) [ 21.726773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.727382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.727652] page dumped because: kasan: bad access detected [ 21.728054] [ 21.728363] Memory state around the buggy address: [ 21.728637] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.729038] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.729455] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.730243] ^ [ 21.730580] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.731082] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.731456] ================================================================== [ 21.301652] ================================================================== [ 21.301993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 21.302269] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.302889] [ 21.303141] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.303248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.303286] Hardware name: linux,dummy-virt (DT) [ 21.303343] Call trace: [ 21.303376] show_stack+0x20/0x38 (C) [ 21.303438] dump_stack_lvl+0x8c/0xd0 [ 21.303496] print_report+0x118/0x608 [ 21.303551] kasan_report+0xdc/0x128 [ 21.303606] kasan_check_range+0x100/0x1a8 [ 21.303663] __kasan_check_write+0x20/0x30 [ 21.303715] kasan_atomics_helper+0x24c/0x4858 [ 21.303785] kasan_atomics+0x198/0x2e8 [ 21.303839] kunit_try_run_case+0x170/0x3f0 [ 21.303893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.303948] kthread+0x318/0x620 [ 21.303998] ret_from_fork+0x10/0x20 [ 21.304053] [ 21.307207] Allocated by task 254: [ 21.307505] kasan_save_stack+0x3c/0x68 [ 21.307758] kasan_save_track+0x20/0x40 [ 21.308024] kasan_save_alloc_info+0x40/0x58 [ 21.308233] __kasan_kmalloc+0xd4/0xd8 [ 21.308466] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.308643] kasan_atomics+0xb8/0x2e8 [ 21.308811] kunit_try_run_case+0x170/0x3f0 [ 21.309143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.309543] kthread+0x318/0x620 [ 21.309849] ret_from_fork+0x10/0x20 [ 21.310193] [ 21.310381] The buggy address belongs to the object at fff00000c66ea700 [ 21.310381] which belongs to the cache kmalloc-64 of size 64 [ 21.311141] The buggy address is located 0 bytes to the right of [ 21.311141] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.311679] [ 21.311870] The buggy address belongs to the physical page: [ 21.312184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.312504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.312722] page_type: f5(slab) [ 21.313019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.313487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.313976] page dumped because: kasan: bad access detected [ 21.314254] [ 21.314392] Memory state around the buggy address: [ 21.314845] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.315229] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.315568] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.315878] ^ [ 21.316198] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.316611] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.316993] ================================================================== [ 22.271916] ================================================================== [ 22.272593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 22.273083] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.273409] [ 22.273633] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.274392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.274447] Hardware name: linux,dummy-virt (DT) [ 22.274526] Call trace: [ 22.274560] show_stack+0x20/0x38 (C) [ 22.274629] dump_stack_lvl+0x8c/0xd0 [ 22.274687] print_report+0x118/0x608 [ 22.274764] kasan_report+0xdc/0x128 [ 22.274824] kasan_check_range+0x100/0x1a8 [ 22.274880] __kasan_check_write+0x20/0x30 [ 22.274935] kasan_atomics_helper+0x1644/0x4858 [ 22.274993] kasan_atomics+0x198/0x2e8 [ 22.275040] kunit_try_run_case+0x170/0x3f0 [ 22.275093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.275149] kthread+0x318/0x620 [ 22.275195] ret_from_fork+0x10/0x20 [ 22.275249] [ 22.279516] Allocated by task 254: [ 22.280008] kasan_save_stack+0x3c/0x68 [ 22.280381] kasan_save_track+0x20/0x40 [ 22.280720] kasan_save_alloc_info+0x40/0x58 [ 22.281009] __kasan_kmalloc+0xd4/0xd8 [ 22.281249] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.281501] kasan_atomics+0xb8/0x2e8 [ 22.281743] kunit_try_run_case+0x170/0x3f0 [ 22.282001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.282366] kthread+0x318/0x620 [ 22.282591] ret_from_fork+0x10/0x20 [ 22.283291] [ 22.283415] The buggy address belongs to the object at fff00000c66ea700 [ 22.283415] which belongs to the cache kmalloc-64 of size 64 [ 22.284184] The buggy address is located 0 bytes to the right of [ 22.284184] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.284997] [ 22.285112] The buggy address belongs to the physical page: [ 22.285516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.286092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.286479] page_type: f5(slab) [ 22.286651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.287216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.287728] page dumped because: kasan: bad access detected [ 22.288142] [ 22.288366] Memory state around the buggy address: [ 22.288787] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.289285] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.289776] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.290249] ^ [ 22.290701] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.291196] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.291655] ================================================================== [ 21.384783] ================================================================== [ 21.385084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 21.385473] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.386443] [ 21.386687] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.386865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.386904] Hardware name: linux,dummy-virt (DT) [ 21.386942] Call trace: [ 21.386973] show_stack+0x20/0x38 (C) [ 21.387036] dump_stack_lvl+0x8c/0xd0 [ 21.387091] print_report+0x118/0x608 [ 21.387145] kasan_report+0xdc/0x128 [ 21.387196] kasan_check_range+0x100/0x1a8 [ 21.387251] __kasan_check_write+0x20/0x30 [ 21.387305] kasan_atomics_helper+0x3ac/0x4858 [ 21.387359] kasan_atomics+0x198/0x2e8 [ 21.387411] kunit_try_run_case+0x170/0x3f0 [ 21.387465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.387523] kthread+0x318/0x620 [ 21.387573] ret_from_fork+0x10/0x20 [ 21.387630] [ 21.392601] Allocated by task 254: [ 21.392856] kasan_save_stack+0x3c/0x68 [ 21.393179] kasan_save_track+0x20/0x40 [ 21.393584] kasan_save_alloc_info+0x40/0x58 [ 21.393945] __kasan_kmalloc+0xd4/0xd8 [ 21.394193] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.394482] kasan_atomics+0xb8/0x2e8 [ 21.394734] kunit_try_run_case+0x170/0x3f0 [ 21.395441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.395855] kthread+0x318/0x620 [ 21.396105] ret_from_fork+0x10/0x20 [ 21.396394] [ 21.396604] The buggy address belongs to the object at fff00000c66ea700 [ 21.396604] which belongs to the cache kmalloc-64 of size 64 [ 21.397133] The buggy address is located 0 bytes to the right of [ 21.397133] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.397662] [ 21.397845] The buggy address belongs to the physical page: [ 21.398196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.398951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.399301] page_type: f5(slab) [ 21.399572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.399978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.400340] page dumped because: kasan: bad access detected [ 21.400631] [ 21.400824] Memory state around the buggy address: [ 21.401062] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.401476] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.401873] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.402175] ^ [ 21.402455] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.402972] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.403652] ================================================================== [ 22.292766] ================================================================== [ 22.293054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 22.293304] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.293537] [ 22.293659] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.293786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.293823] Hardware name: linux,dummy-virt (DT) [ 22.293864] Call trace: [ 22.293895] show_stack+0x20/0x38 (C) [ 22.293960] dump_stack_lvl+0x8c/0xd0 [ 22.294018] print_report+0x118/0x608 [ 22.294094] kasan_report+0xdc/0x128 [ 22.294157] __asan_report_load8_noabort+0x20/0x30 [ 22.294216] kasan_atomics_helper+0x3df4/0x4858 [ 22.294273] kasan_atomics+0x198/0x2e8 [ 22.294329] kunit_try_run_case+0x170/0x3f0 [ 22.294390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.294456] kthread+0x318/0x620 [ 22.294545] ret_from_fork+0x10/0x20 [ 22.294611] [ 22.297922] Allocated by task 254: [ 22.298214] kasan_save_stack+0x3c/0x68 [ 22.298462] kasan_save_track+0x20/0x40 [ 22.298687] kasan_save_alloc_info+0x40/0x58 [ 22.300714] __kasan_kmalloc+0xd4/0xd8 [ 22.301075] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.301499] kasan_atomics+0xb8/0x2e8 [ 22.301898] kunit_try_run_case+0x170/0x3f0 [ 22.302302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.302883] kthread+0x318/0x620 [ 22.303191] ret_from_fork+0x10/0x20 [ 22.303539] [ 22.303775] The buggy address belongs to the object at fff00000c66ea700 [ 22.303775] which belongs to the cache kmalloc-64 of size 64 [ 22.304561] The buggy address is located 0 bytes to the right of [ 22.304561] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.305106] [ 22.305280] The buggy address belongs to the physical page: [ 22.305464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.305721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.305980] page_type: f5(slab) [ 22.306157] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.306406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.306645] page dumped because: kasan: bad access detected [ 22.307013] [ 22.307246] Memory state around the buggy address: [ 22.307648] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.308102] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.308597] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.309144] ^ [ 22.309373] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.309707] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.309960] ================================================================== [ 21.284090] ================================================================== [ 21.284444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 21.284984] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.285380] [ 21.285573] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.285680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.285718] Hardware name: linux,dummy-virt (DT) [ 21.285769] Call trace: [ 21.285803] show_stack+0x20/0x38 (C) [ 21.285865] dump_stack_lvl+0x8c/0xd0 [ 21.285924] print_report+0x118/0x608 [ 21.285980] kasan_report+0xdc/0x128 [ 21.286031] kasan_check_range+0x100/0x1a8 [ 21.286100] __kasan_check_read+0x20/0x30 [ 21.286156] kasan_atomics_helper+0x1ec/0x4858 [ 21.286214] kasan_atomics+0x198/0x2e8 [ 21.286268] kunit_try_run_case+0x170/0x3f0 [ 21.286326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.286387] kthread+0x318/0x620 [ 21.286440] ret_from_fork+0x10/0x20 [ 21.286515] [ 21.290397] Allocated by task 254: [ 21.290827] kasan_save_stack+0x3c/0x68 [ 21.291019] kasan_save_track+0x20/0x40 [ 21.291313] kasan_save_alloc_info+0x40/0x58 [ 21.291667] __kasan_kmalloc+0xd4/0xd8 [ 21.291898] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.292127] kasan_atomics+0xb8/0x2e8 [ 21.292293] kunit_try_run_case+0x170/0x3f0 [ 21.292460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.292652] kthread+0x318/0x620 [ 21.292947] ret_from_fork+0x10/0x20 [ 21.293256] [ 21.293431] The buggy address belongs to the object at fff00000c66ea700 [ 21.293431] which belongs to the cache kmalloc-64 of size 64 [ 21.294077] The buggy address is located 0 bytes to the right of [ 21.294077] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.294821] [ 21.295076] The buggy address belongs to the physical page: [ 21.295267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.295581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.296091] page_type: f5(slab) [ 21.296272] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.296605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.297030] page dumped because: kasan: bad access detected [ 21.297325] [ 21.297500] Memory state around the buggy address: [ 21.297755] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.298252] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.298788] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.299209] ^ [ 21.299561] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.299864] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.300343] ================================================================== [ 21.839905] ================================================================== [ 21.840377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 21.841052] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.841504] [ 21.841790] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.841893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.841928] Hardware name: linux,dummy-virt (DT) [ 21.841967] Call trace: [ 21.841996] show_stack+0x20/0x38 (C) [ 21.842078] dump_stack_lvl+0x8c/0xd0 [ 21.842143] print_report+0x118/0x608 [ 21.842197] kasan_report+0xdc/0x128 [ 21.842253] __asan_report_load4_noabort+0x20/0x30 [ 21.842312] kasan_atomics_helper+0x3dd8/0x4858 [ 21.842366] kasan_atomics+0x198/0x2e8 [ 21.842420] kunit_try_run_case+0x170/0x3f0 [ 21.842475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.843145] kthread+0x318/0x620 [ 21.843221] ret_from_fork+0x10/0x20 [ 21.843334] [ 21.846539] Allocated by task 254: [ 21.846840] kasan_save_stack+0x3c/0x68 [ 21.847105] kasan_save_track+0x20/0x40 [ 21.847339] kasan_save_alloc_info+0x40/0x58 [ 21.847647] __kasan_kmalloc+0xd4/0xd8 [ 21.847965] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.848254] kasan_atomics+0xb8/0x2e8 [ 21.848473] kunit_try_run_case+0x170/0x3f0 [ 21.848798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.849148] kthread+0x318/0x620 [ 21.849409] ret_from_fork+0x10/0x20 [ 21.849619] [ 21.849814] The buggy address belongs to the object at fff00000c66ea700 [ 21.849814] which belongs to the cache kmalloc-64 of size 64 [ 21.850365] The buggy address is located 0 bytes to the right of [ 21.850365] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.851009] [ 21.851122] The buggy address belongs to the physical page: [ 21.851538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.851937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.852425] page_type: f5(slab) [ 21.852592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.852862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.853101] page dumped because: kasan: bad access detected [ 21.853290] [ 21.853393] Memory state around the buggy address: [ 21.853567] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.853873] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.854399] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.854865] ^ [ 21.855226] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.855638] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.855946] ================================================================== [ 21.335233] ================================================================== [ 21.335557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 21.335931] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.336281] [ 21.336454] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.336559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.336596] Hardware name: linux,dummy-virt (DT) [ 21.336636] Call trace: [ 21.336664] show_stack+0x20/0x38 (C) [ 21.336722] dump_stack_lvl+0x8c/0xd0 [ 21.336794] print_report+0x118/0x608 [ 21.336851] kasan_report+0xdc/0x128 [ 21.336904] __asan_report_load4_noabort+0x20/0x30 [ 21.336961] kasan_atomics_helper+0x40fc/0x4858 [ 21.337017] kasan_atomics+0x198/0x2e8 [ 21.337069] kunit_try_run_case+0x170/0x3f0 [ 21.337125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.337185] kthread+0x318/0x620 [ 21.337239] ret_from_fork+0x10/0x20 [ 21.337296] [ 21.340553] Allocated by task 254: [ 21.340751] kasan_save_stack+0x3c/0x68 [ 21.340921] kasan_save_track+0x20/0x40 [ 21.341239] kasan_save_alloc_info+0x40/0x58 [ 21.341571] __kasan_kmalloc+0xd4/0xd8 [ 21.341769] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.341945] kasan_atomics+0xb8/0x2e8 [ 21.342208] kunit_try_run_case+0x170/0x3f0 [ 21.342698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.343136] kthread+0x318/0x620 [ 21.343300] ret_from_fork+0x10/0x20 [ 21.343601] [ 21.343783] The buggy address belongs to the object at fff00000c66ea700 [ 21.343783] which belongs to the cache kmalloc-64 of size 64 [ 21.344288] The buggy address is located 0 bytes to the right of [ 21.344288] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.344787] [ 21.344959] The buggy address belongs to the physical page: [ 21.345310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.345831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.346194] page_type: f5(slab) [ 21.346387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.347049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.347379] page dumped because: kasan: bad access detected [ 21.347615] [ 21.347796] Memory state around the buggy address: [ 21.348009] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.348342] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.348683] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.349056] ^ [ 21.349303] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.349627] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.349996] ================================================================== [ 21.461115] ================================================================== [ 21.461811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 21.462306] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.463118] [ 21.463982] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.464110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.464148] Hardware name: linux,dummy-virt (DT) [ 21.464189] Call trace: [ 21.464221] show_stack+0x20/0x38 (C) [ 21.464293] dump_stack_lvl+0x8c/0xd0 [ 21.464351] print_report+0x118/0x608 [ 21.464410] kasan_report+0xdc/0x128 [ 21.464464] kasan_check_range+0x100/0x1a8 [ 21.464521] __kasan_check_write+0x20/0x30 [ 21.464575] kasan_atomics_helper+0x54c/0x4858 [ 21.464632] kasan_atomics+0x198/0x2e8 [ 21.464686] kunit_try_run_case+0x170/0x3f0 [ 21.464766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.464830] kthread+0x318/0x620 [ 21.464883] ret_from_fork+0x10/0x20 [ 21.464939] [ 21.468648] Allocated by task 254: [ 21.469728] kasan_save_stack+0x3c/0x68 [ 21.470122] kasan_save_track+0x20/0x40 [ 21.470707] kasan_save_alloc_info+0x40/0x58 [ 21.471126] __kasan_kmalloc+0xd4/0xd8 [ 21.471603] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.472112] kasan_atomics+0xb8/0x2e8 [ 21.472475] kunit_try_run_case+0x170/0x3f0 [ 21.472861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.473289] kthread+0x318/0x620 [ 21.473621] ret_from_fork+0x10/0x20 [ 21.474027] [ 21.474206] The buggy address belongs to the object at fff00000c66ea700 [ 21.474206] which belongs to the cache kmalloc-64 of size 64 [ 21.475370] The buggy address is located 0 bytes to the right of [ 21.475370] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.476122] [ 21.476352] The buggy address belongs to the physical page: [ 21.476621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.476887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.477118] page_type: f5(slab) [ 21.477598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.478104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.478692] page dumped because: kasan: bad access detected [ 21.479243] [ 21.479516] Memory state around the buggy address: [ 21.479902] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.480247] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.480785] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.481286] ^ [ 21.481650] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.482088] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.482723] ================================================================== [ 22.083500] ================================================================== [ 22.083820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 22.084205] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.084525] [ 22.084708] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.084815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.084850] Hardware name: linux,dummy-virt (DT) [ 22.084889] Call trace: [ 22.084917] show_stack+0x20/0x38 (C) [ 22.084975] dump_stack_lvl+0x8c/0xd0 [ 22.085029] print_report+0x118/0x608 [ 22.085084] kasan_report+0xdc/0x128 [ 22.085137] kasan_check_range+0x100/0x1a8 [ 22.085191] __kasan_check_write+0x20/0x30 [ 22.085243] kasan_atomics_helper+0x11f8/0x4858 [ 22.085299] kasan_atomics+0x198/0x2e8 [ 22.085349] kunit_try_run_case+0x170/0x3f0 [ 22.085404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.085463] kthread+0x318/0x620 [ 22.085512] ret_from_fork+0x10/0x20 [ 22.085568] [ 22.088420] Allocated by task 254: [ 22.088689] kasan_save_stack+0x3c/0x68 [ 22.088873] kasan_save_track+0x20/0x40 [ 22.089171] kasan_save_alloc_info+0x40/0x58 [ 22.089546] __kasan_kmalloc+0xd4/0xd8 [ 22.089844] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.090102] kasan_atomics+0xb8/0x2e8 [ 22.090412] kunit_try_run_case+0x170/0x3f0 [ 22.090652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.091051] kthread+0x318/0x620 [ 22.091248] ret_from_fork+0x10/0x20 [ 22.091573] [ 22.091753] The buggy address belongs to the object at fff00000c66ea700 [ 22.091753] which belongs to the cache kmalloc-64 of size 64 [ 22.092287] The buggy address is located 0 bytes to the right of [ 22.092287] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.092830] [ 22.093000] The buggy address belongs to the physical page: [ 22.093235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.093781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.094120] page_type: f5(slab) [ 22.094417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.094791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.095287] page dumped because: kasan: bad access detected [ 22.095559] [ 22.095729] Memory state around the buggy address: [ 22.095935] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.096272] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.096644] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.096962] ^ [ 22.097238] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.097623] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.097939] ================================================================== [ 21.541450] ================================================================== [ 21.542789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 21.543063] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.543297] [ 21.543421] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.543522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.543558] Hardware name: linux,dummy-virt (DT) [ 21.543596] Call trace: [ 21.543627] show_stack+0x20/0x38 (C) [ 21.543686] dump_stack_lvl+0x8c/0xd0 [ 21.543761] print_report+0x118/0x608 [ 21.543822] kasan_report+0xdc/0x128 [ 21.543876] kasan_check_range+0x100/0x1a8 [ 21.543933] __kasan_check_write+0x20/0x30 [ 21.543986] kasan_atomics_helper+0x6ec/0x4858 [ 21.544042] kasan_atomics+0x198/0x2e8 [ 21.544096] kunit_try_run_case+0x170/0x3f0 [ 21.544155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.544214] kthread+0x318/0x620 [ 21.544267] ret_from_fork+0x10/0x20 [ 21.544324] [ 21.548775] Allocated by task 254: [ 21.548983] kasan_save_stack+0x3c/0x68 [ 21.549222] kasan_save_track+0x20/0x40 [ 21.549431] kasan_save_alloc_info+0x40/0x58 [ 21.549648] __kasan_kmalloc+0xd4/0xd8 [ 21.551177] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.551416] kasan_atomics+0xb8/0x2e8 [ 21.551874] kunit_try_run_case+0x170/0x3f0 [ 21.552280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.552573] kthread+0x318/0x620 [ 21.552787] ret_from_fork+0x10/0x20 [ 21.553023] [ 21.553175] The buggy address belongs to the object at fff00000c66ea700 [ 21.553175] which belongs to the cache kmalloc-64 of size 64 [ 21.553709] The buggy address is located 0 bytes to the right of [ 21.553709] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.554908] [ 21.555080] The buggy address belongs to the physical page: [ 21.555287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.555698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.556193] page_type: f5(slab) [ 21.556513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.556774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.557406] page dumped because: kasan: bad access detected [ 21.557744] [ 21.557952] Memory state around the buggy address: [ 21.558318] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.558727] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.559325] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.559790] ^ [ 21.560097] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.560466] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.560958] ================================================================== [ 22.129603] ================================================================== [ 22.129907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 22.130420] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.130815] [ 22.130996] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.131092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.131127] Hardware name: linux,dummy-virt (DT) [ 22.131167] Call trace: [ 22.131195] show_stack+0x20/0x38 (C) [ 22.131254] dump_stack_lvl+0x8c/0xd0 [ 22.131308] print_report+0x118/0x608 [ 22.131362] kasan_report+0xdc/0x128 [ 22.131414] kasan_check_range+0x100/0x1a8 [ 22.131467] __kasan_check_write+0x20/0x30 [ 22.131519] kasan_atomics_helper+0x1384/0x4858 [ 22.131573] kasan_atomics+0x198/0x2e8 [ 22.131623] kunit_try_run_case+0x170/0x3f0 [ 22.131677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.131735] kthread+0x318/0x620 [ 22.131800] ret_from_fork+0x10/0x20 [ 22.131855] [ 22.134837] Allocated by task 254: [ 22.135134] kasan_save_stack+0x3c/0x68 [ 22.135323] kasan_save_track+0x20/0x40 [ 22.135574] kasan_save_alloc_info+0x40/0x58 [ 22.135882] __kasan_kmalloc+0xd4/0xd8 [ 22.136116] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.136440] kasan_atomics+0xb8/0x2e8 [ 22.136646] kunit_try_run_case+0x170/0x3f0 [ 22.136866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.137160] kthread+0x318/0x620 [ 22.137316] ret_from_fork+0x10/0x20 [ 22.137644] [ 22.137827] The buggy address belongs to the object at fff00000c66ea700 [ 22.137827] which belongs to the cache kmalloc-64 of size 64 [ 22.138300] The buggy address is located 0 bytes to the right of [ 22.138300] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.138925] [ 22.139094] The buggy address belongs to the physical page: [ 22.139352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.139707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.140021] page_type: f5(slab) [ 22.140260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.140571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.141064] page dumped because: kasan: bad access detected [ 22.141299] [ 22.141465] Memory state around the buggy address: [ 22.141668] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.142082] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.142468] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.142791] ^ [ 22.143085] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.143393] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.143733] ================================================================== [ 21.957142] ================================================================== [ 21.957599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 21.957917] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.958322] [ 21.958543] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.958641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.958695] Hardware name: linux,dummy-virt (DT) [ 21.958734] Call trace: [ 21.958775] show_stack+0x20/0x38 (C) [ 21.958849] dump_stack_lvl+0x8c/0xd0 [ 21.958902] print_report+0x118/0x608 [ 21.958955] kasan_report+0xdc/0x128 [ 21.959006] kasan_check_range+0x100/0x1a8 [ 21.959060] __kasan_check_write+0x20/0x30 [ 21.959135] kasan_atomics_helper+0xeb8/0x4858 [ 21.959189] kasan_atomics+0x198/0x2e8 [ 21.959254] kunit_try_run_case+0x170/0x3f0 [ 21.959306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.959364] kthread+0x318/0x620 [ 21.959411] ret_from_fork+0x10/0x20 [ 21.959461] [ 21.962763] Allocated by task 254: [ 21.963087] kasan_save_stack+0x3c/0x68 [ 21.963328] kasan_save_track+0x20/0x40 [ 21.963557] kasan_save_alloc_info+0x40/0x58 [ 21.963938] __kasan_kmalloc+0xd4/0xd8 [ 21.964180] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.964411] kasan_atomics+0xb8/0x2e8 [ 21.964649] kunit_try_run_case+0x170/0x3f0 [ 21.964893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.965183] kthread+0x318/0x620 [ 21.965387] ret_from_fork+0x10/0x20 [ 21.965614] [ 21.965731] The buggy address belongs to the object at fff00000c66ea700 [ 21.965731] which belongs to the cache kmalloc-64 of size 64 [ 21.966851] The buggy address is located 0 bytes to the right of [ 21.966851] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.967279] [ 21.967453] The buggy address belongs to the physical page: [ 21.967708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.968461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.968790] page_type: f5(slab) [ 21.969191] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.969715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.970205] page dumped because: kasan: bad access detected [ 21.970619] [ 21.970858] Memory state around the buggy address: [ 21.971262] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.971751] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.972240] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.972694] ^ [ 21.973084] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.973447] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.973764] ================================================================== [ 21.245549] ================================================================== [ 21.246219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 21.246964] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.247804] [ 21.247945] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.248049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.248080] Hardware name: linux,dummy-virt (DT) [ 21.248120] Call trace: [ 21.248148] show_stack+0x20/0x38 (C) [ 21.248216] dump_stack_lvl+0x8c/0xd0 [ 21.248274] print_report+0x118/0x608 [ 21.248329] kasan_report+0xdc/0x128 [ 21.248378] __asan_report_load4_noabort+0x20/0x30 [ 21.248432] kasan_atomics_helper+0x40a8/0x4858 [ 21.248485] kasan_atomics+0x198/0x2e8 [ 21.248533] kunit_try_run_case+0x170/0x3f0 [ 21.248586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.248641] kthread+0x318/0x620 [ 21.248691] ret_from_fork+0x10/0x20 [ 21.248767] [ 21.253605] Allocated by task 254: [ 21.253822] kasan_save_stack+0x3c/0x68 [ 21.254225] kasan_save_track+0x20/0x40 [ 21.254503] kasan_save_alloc_info+0x40/0x58 [ 21.255052] __kasan_kmalloc+0xd4/0xd8 [ 21.255289] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.255559] kasan_atomics+0xb8/0x2e8 [ 21.255865] kunit_try_run_case+0x170/0x3f0 [ 21.256135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.256469] kthread+0x318/0x620 [ 21.256694] ret_from_fork+0x10/0x20 [ 21.256892] [ 21.257087] The buggy address belongs to the object at fff00000c66ea700 [ 21.257087] which belongs to the cache kmalloc-64 of size 64 [ 21.257658] The buggy address is located 0 bytes to the right of [ 21.257658] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.258332] [ 21.258625] The buggy address belongs to the physical page: [ 21.258874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.259537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.259837] page_type: f5(slab) [ 21.260185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.260711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.261153] page dumped because: kasan: bad access detected [ 21.261486] [ 21.261698] Memory state around the buggy address: [ 21.262073] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.262767] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.263267] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.263689] ^ [ 21.264001] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.264475] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.264909] ================================================================== [ 21.991890] ================================================================== [ 21.992294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.992825] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.993260] [ 21.993459] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.993576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.993612] Hardware name: linux,dummy-virt (DT) [ 21.993652] Call trace: [ 21.993680] show_stack+0x20/0x38 (C) [ 21.993746] dump_stack_lvl+0x8c/0xd0 [ 21.993808] print_report+0x118/0x608 [ 21.993877] kasan_report+0xdc/0x128 [ 21.993939] kasan_check_range+0x100/0x1a8 [ 21.993996] __kasan_check_write+0x20/0x30 [ 21.994047] kasan_atomics_helper+0xf88/0x4858 [ 21.994115] kasan_atomics+0x198/0x2e8 [ 21.994168] kunit_try_run_case+0x170/0x3f0 [ 21.994223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.994280] kthread+0x318/0x620 [ 21.994329] ret_from_fork+0x10/0x20 [ 21.994386] [ 21.997370] Allocated by task 254: [ 21.997515] kasan_save_stack+0x3c/0x68 [ 21.997700] kasan_save_track+0x20/0x40 [ 21.998072] kasan_save_alloc_info+0x40/0x58 [ 21.998387] __kasan_kmalloc+0xd4/0xd8 [ 21.998550] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.998957] kasan_atomics+0xb8/0x2e8 [ 21.999313] kunit_try_run_case+0x170/0x3f0 [ 21.999510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.999876] kthread+0x318/0x620 [ 22.000180] ret_from_fork+0x10/0x20 [ 22.000479] [ 22.000666] The buggy address belongs to the object at fff00000c66ea700 [ 22.000666] which belongs to the cache kmalloc-64 of size 64 [ 22.001120] The buggy address is located 0 bytes to the right of [ 22.001120] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.001763] [ 22.001892] The buggy address belongs to the physical page: [ 22.002348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.002775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.003083] page_type: f5(slab) [ 22.003317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.003775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.004066] page dumped because: kasan: bad access detected [ 22.004403] [ 22.004568] Memory state around the buggy address: [ 22.004854] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.005213] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.005638] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.005968] ^ [ 22.006335] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.006690] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.007063] ================================================================== [ 22.160588] ================================================================== [ 22.161112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 22.161547] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.161870] [ 22.162105] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.162208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.162243] Hardware name: linux,dummy-virt (DT) [ 22.162283] Call trace: [ 22.162312] show_stack+0x20/0x38 (C) [ 22.162372] dump_stack_lvl+0x8c/0xd0 [ 22.162435] print_report+0x118/0x608 [ 22.162491] kasan_report+0xdc/0x128 [ 22.162998] kasan_check_range+0x100/0x1a8 [ 22.163062] __kasan_check_write+0x20/0x30 [ 22.163118] kasan_atomics_helper+0x1414/0x4858 [ 22.163177] kasan_atomics+0x198/0x2e8 [ 22.163230] kunit_try_run_case+0x170/0x3f0 [ 22.163294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.163354] kthread+0x318/0x620 [ 22.163404] ret_from_fork+0x10/0x20 [ 22.163461] [ 22.167878] Allocated by task 254: [ 22.168268] kasan_save_stack+0x3c/0x68 [ 22.168642] kasan_save_track+0x20/0x40 [ 22.169073] kasan_save_alloc_info+0x40/0x58 [ 22.169310] __kasan_kmalloc+0xd4/0xd8 [ 22.169537] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.169842] kasan_atomics+0xb8/0x2e8 [ 22.170084] kunit_try_run_case+0x170/0x3f0 [ 22.170343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.170617] kthread+0x318/0x620 [ 22.170847] ret_from_fork+0x10/0x20 [ 22.171017] [ 22.171125] The buggy address belongs to the object at fff00000c66ea700 [ 22.171125] which belongs to the cache kmalloc-64 of size 64 [ 22.171982] The buggy address is located 0 bytes to the right of [ 22.171982] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.172540] [ 22.172752] The buggy address belongs to the physical page: [ 22.173268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.173755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.174171] page_type: f5(slab) [ 22.174445] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.174867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.175103] page dumped because: kasan: bad access detected [ 22.175289] [ 22.175393] Memory state around the buggy address: [ 22.175570] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.175826] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.176054] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.176274] ^ [ 22.176458] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.176686] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.177247] ================================================================== [ 21.749570] ================================================================== [ 21.749914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 21.750458] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.750962] [ 21.751134] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.751250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.751287] Hardware name: linux,dummy-virt (DT) [ 21.751325] Call trace: [ 21.751353] show_stack+0x20/0x38 (C) [ 21.751410] dump_stack_lvl+0x8c/0xd0 [ 21.751465] print_report+0x118/0x608 [ 21.751517] kasan_report+0xdc/0x128 [ 21.751593] kasan_check_range+0x100/0x1a8 [ 21.751649] __kasan_check_write+0x20/0x30 [ 21.751704] kasan_atomics_helper+0xb70/0x4858 [ 21.751788] kasan_atomics+0x198/0x2e8 [ 21.751843] kunit_try_run_case+0x170/0x3f0 [ 21.751899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.751958] kthread+0x318/0x620 [ 21.752011] ret_from_fork+0x10/0x20 [ 21.752067] [ 21.755262] Allocated by task 254: [ 21.755509] kasan_save_stack+0x3c/0x68 [ 21.755872] kasan_save_track+0x20/0x40 [ 21.756174] kasan_save_alloc_info+0x40/0x58 [ 21.756344] __kasan_kmalloc+0xd4/0xd8 [ 21.756721] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.757158] kasan_atomics+0xb8/0x2e8 [ 21.757434] kunit_try_run_case+0x170/0x3f0 [ 21.757642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.758139] kthread+0x318/0x620 [ 21.758385] ret_from_fork+0x10/0x20 [ 21.758622] [ 21.758855] The buggy address belongs to the object at fff00000c66ea700 [ 21.758855] which belongs to the cache kmalloc-64 of size 64 [ 21.759466] The buggy address is located 0 bytes to the right of [ 21.759466] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.760114] [ 21.760303] The buggy address belongs to the physical page: [ 21.760589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.761120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.761537] page_type: f5(slab) [ 21.761781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.762243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.762731] page dumped because: kasan: bad access detected [ 21.763061] [ 21.763211] Memory state around the buggy address: [ 21.763498] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.763897] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.764317] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.764726] ^ [ 21.764989] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.765349] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.765774] ================================================================== [ 21.820799] ================================================================== [ 21.821570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 21.822256] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.823023] [ 21.823557] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.823669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.823708] Hardware name: linux,dummy-virt (DT) [ 21.823787] Call trace: [ 21.823824] show_stack+0x20/0x38 (C) [ 21.823903] dump_stack_lvl+0x8c/0xd0 [ 21.823960] print_report+0x118/0x608 [ 21.824014] kasan_report+0xdc/0x128 [ 21.824068] kasan_check_range+0x100/0x1a8 [ 21.824123] __kasan_check_write+0x20/0x30 [ 21.824177] kasan_atomics_helper+0xca0/0x4858 [ 21.824232] kasan_atomics+0x198/0x2e8 [ 21.824284] kunit_try_run_case+0x170/0x3f0 [ 21.824340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.824402] kthread+0x318/0x620 [ 21.824454] ret_from_fork+0x10/0x20 [ 21.824509] [ 21.828105] Allocated by task 254: [ 21.828314] kasan_save_stack+0x3c/0x68 [ 21.828537] kasan_save_track+0x20/0x40 [ 21.829460] kasan_save_alloc_info+0x40/0x58 [ 21.829831] __kasan_kmalloc+0xd4/0xd8 [ 21.830023] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.830371] kasan_atomics+0xb8/0x2e8 [ 21.830619] kunit_try_run_case+0x170/0x3f0 [ 21.830991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.831332] kthread+0x318/0x620 [ 21.831556] ret_from_fork+0x10/0x20 [ 21.831784] [ 21.831988] The buggy address belongs to the object at fff00000c66ea700 [ 21.831988] which belongs to the cache kmalloc-64 of size 64 [ 21.832584] The buggy address is located 0 bytes to the right of [ 21.832584] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.833269] [ 21.833418] The buggy address belongs to the physical page: [ 21.833684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.834170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.834660] page_type: f5(slab) [ 21.834858] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.835362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.835767] page dumped because: kasan: bad access detected [ 21.836074] [ 21.836232] Memory state around the buggy address: [ 21.836578] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.836968] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.837390] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.837817] ^ [ 21.838092] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.838439] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.838895] ================================================================== [ 22.198395] ================================================================== [ 22.198734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 22.199033] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.199288] [ 22.199458] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.199567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.199604] Hardware name: linux,dummy-virt (DT) [ 22.199644] Call trace: [ 22.199676] show_stack+0x20/0x38 (C) [ 22.199822] dump_stack_lvl+0x8c/0xd0 [ 22.200237] print_report+0x118/0x608 [ 22.200301] kasan_report+0xdc/0x128 [ 22.200357] kasan_check_range+0x100/0x1a8 [ 22.200414] __kasan_check_write+0x20/0x30 [ 22.200466] kasan_atomics_helper+0x14e4/0x4858 [ 22.200523] kasan_atomics+0x198/0x2e8 [ 22.200579] kunit_try_run_case+0x170/0x3f0 [ 22.200635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.200695] kthread+0x318/0x620 [ 22.200769] ret_from_fork+0x10/0x20 [ 22.200831] [ 22.205586] Allocated by task 254: [ 22.205921] kasan_save_stack+0x3c/0x68 [ 22.206403] kasan_save_track+0x20/0x40 [ 22.206603] kasan_save_alloc_info+0x40/0x58 [ 22.207094] __kasan_kmalloc+0xd4/0xd8 [ 22.207612] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.208006] kasan_atomics+0xb8/0x2e8 [ 22.208349] kunit_try_run_case+0x170/0x3f0 [ 22.208599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.209126] kthread+0x318/0x620 [ 22.209449] ret_from_fork+0x10/0x20 [ 22.209692] [ 22.209963] The buggy address belongs to the object at fff00000c66ea700 [ 22.209963] which belongs to the cache kmalloc-64 of size 64 [ 22.210804] The buggy address is located 0 bytes to the right of [ 22.210804] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.211652] [ 22.211982] The buggy address belongs to the physical page: [ 22.212285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.212765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.213117] page_type: f5(slab) [ 22.213435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.213809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.214319] page dumped because: kasan: bad access detected [ 22.214659] [ 22.214814] Memory state around the buggy address: [ 22.215086] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.215573] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.216043] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.216384] ^ [ 22.216652] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.217050] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.217440] ================================================================== [ 22.329227] ================================================================== [ 22.329606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 22.330581] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.330947] [ 22.331088] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.331189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.331226] Hardware name: linux,dummy-virt (DT) [ 22.331266] Call trace: [ 22.331296] show_stack+0x20/0x38 (C) [ 22.331357] dump_stack_lvl+0x8c/0xd0 [ 22.331414] print_report+0x118/0x608 [ 22.331468] kasan_report+0xdc/0x128 [ 22.331521] __asan_report_load8_noabort+0x20/0x30 [ 22.331577] kasan_atomics_helper+0x3e10/0x4858 [ 22.331633] kasan_atomics+0x198/0x2e8 [ 22.331684] kunit_try_run_case+0x170/0x3f0 [ 22.331752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.331817] kthread+0x318/0x620 [ 22.331871] ret_from_fork+0x10/0x20 [ 22.331929] [ 22.334935] Allocated by task 254: [ 22.335258] kasan_save_stack+0x3c/0x68 [ 22.335640] kasan_save_track+0x20/0x40 [ 22.335890] kasan_save_alloc_info+0x40/0x58 [ 22.336188] __kasan_kmalloc+0xd4/0xd8 [ 22.336538] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.336724] kasan_atomics+0xb8/0x2e8 [ 22.337089] kunit_try_run_case+0x170/0x3f0 [ 22.337470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.337763] kthread+0x318/0x620 [ 22.337997] ret_from_fork+0x10/0x20 [ 22.338274] [ 22.338462] The buggy address belongs to the object at fff00000c66ea700 [ 22.338462] which belongs to the cache kmalloc-64 of size 64 [ 22.339022] The buggy address is located 0 bytes to the right of [ 22.339022] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.339700] [ 22.339851] The buggy address belongs to the physical page: [ 22.340191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.340619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.340956] page_type: f5(slab) [ 22.341280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.341613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.342124] page dumped because: kasan: bad access detected [ 22.342496] [ 22.342673] Memory state around the buggy address: [ 22.342982] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.343304] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.343783] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.344175] ^ [ 22.344451] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.344850] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.345232] ================================================================== [ 22.068029] ================================================================== [ 22.068412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 22.068648] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.069284] [ 22.069405] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.069497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.069534] Hardware name: linux,dummy-virt (DT) [ 22.069572] Call trace: [ 22.069600] show_stack+0x20/0x38 (C) [ 22.069656] dump_stack_lvl+0x8c/0xd0 [ 22.069710] print_report+0x118/0x608 [ 22.069775] kasan_report+0xdc/0x128 [ 22.069831] kasan_check_range+0x100/0x1a8 [ 22.069888] __kasan_check_write+0x20/0x30 [ 22.069941] kasan_atomics_helper+0x1190/0x4858 [ 22.069996] kasan_atomics+0x198/0x2e8 [ 22.070049] kunit_try_run_case+0x170/0x3f0 [ 22.070117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.070180] kthread+0x318/0x620 [ 22.070232] ret_from_fork+0x10/0x20 [ 22.070287] [ 22.073640] Allocated by task 254: [ 22.073842] kasan_save_stack+0x3c/0x68 [ 22.074017] kasan_save_track+0x20/0x40 [ 22.074196] kasan_save_alloc_info+0x40/0x58 [ 22.074580] __kasan_kmalloc+0xd4/0xd8 [ 22.074909] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.075087] kasan_atomics+0xb8/0x2e8 [ 22.075422] kunit_try_run_case+0x170/0x3f0 [ 22.075808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.076077] kthread+0x318/0x620 [ 22.076294] ret_from_fork+0x10/0x20 [ 22.076514] [ 22.076681] The buggy address belongs to the object at fff00000c66ea700 [ 22.076681] which belongs to the cache kmalloc-64 of size 64 [ 22.077193] The buggy address is located 0 bytes to the right of [ 22.077193] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.077616] [ 22.077721] The buggy address belongs to the physical page: [ 22.078162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.078584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.078947] page_type: f5(slab) [ 22.079147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.079514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.079778] page dumped because: kasan: bad access detected [ 22.080148] [ 22.080317] Memory state around the buggy address: [ 22.080623] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.080906] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.081408] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.081728] ^ [ 22.081984] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.082417] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.082719] ================================================================== [ 21.678232] ================================================================== [ 21.678824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 21.679250] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.679727] [ 21.679956] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.680051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.680091] Hardware name: linux,dummy-virt (DT) [ 21.680130] Call trace: [ 21.680157] show_stack+0x20/0x38 (C) [ 21.680213] dump_stack_lvl+0x8c/0xd0 [ 21.680264] print_report+0x118/0x608 [ 21.680315] kasan_report+0xdc/0x128 [ 21.680365] kasan_check_range+0x100/0x1a8 [ 21.680416] __kasan_check_write+0x20/0x30 [ 21.680465] kasan_atomics_helper+0xa04/0x4858 [ 21.680516] kasan_atomics+0x198/0x2e8 [ 21.680563] kunit_try_run_case+0x170/0x3f0 [ 21.680613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.680666] kthread+0x318/0x620 [ 21.680748] ret_from_fork+0x10/0x20 [ 21.680806] [ 21.684079] Allocated by task 254: [ 21.684509] kasan_save_stack+0x3c/0x68 [ 21.684734] kasan_save_track+0x20/0x40 [ 21.684909] kasan_save_alloc_info+0x40/0x58 [ 21.685324] __kasan_kmalloc+0xd4/0xd8 [ 21.685768] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.685995] kasan_atomics+0xb8/0x2e8 [ 21.686214] kunit_try_run_case+0x170/0x3f0 [ 21.686611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.686954] kthread+0x318/0x620 [ 21.687224] ret_from_fork+0x10/0x20 [ 21.687561] [ 21.687802] The buggy address belongs to the object at fff00000c66ea700 [ 21.687802] which belongs to the cache kmalloc-64 of size 64 [ 21.688304] The buggy address is located 0 bytes to the right of [ 21.688304] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.689111] [ 21.689308] The buggy address belongs to the physical page: [ 21.689681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.690297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.690826] page_type: f5(slab) [ 21.691023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.691525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.691911] page dumped because: kasan: bad access detected [ 21.692323] [ 21.692496] Memory state around the buggy address: [ 21.692791] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.693291] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.693639] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.694024] ^ [ 21.694311] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.694712] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.695245] ================================================================== [ 21.483624] ================================================================== [ 21.483940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 21.484267] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.484568] [ 21.484718] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.484929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.484969] Hardware name: linux,dummy-virt (DT) [ 21.485010] Call trace: [ 21.485042] show_stack+0x20/0x38 (C) [ 21.485115] dump_stack_lvl+0x8c/0xd0 [ 21.485176] print_report+0x118/0x608 [ 21.485233] kasan_report+0xdc/0x128 [ 21.485286] kasan_check_range+0x100/0x1a8 [ 21.485345] __kasan_check_write+0x20/0x30 [ 21.485397] kasan_atomics_helper+0x5b4/0x4858 [ 21.485453] kasan_atomics+0x198/0x2e8 [ 21.485506] kunit_try_run_case+0x170/0x3f0 [ 21.485560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.485619] kthread+0x318/0x620 [ 21.485672] ret_from_fork+0x10/0x20 [ 21.485729] [ 21.489535] Allocated by task 254: [ 21.489911] kasan_save_stack+0x3c/0x68 [ 21.490144] kasan_save_track+0x20/0x40 [ 21.490778] kasan_save_alloc_info+0x40/0x58 [ 21.491179] __kasan_kmalloc+0xd4/0xd8 [ 21.491417] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.491676] kasan_atomics+0xb8/0x2e8 [ 21.491908] kunit_try_run_case+0x170/0x3f0 [ 21.492158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.492446] kthread+0x318/0x620 [ 21.492660] ret_from_fork+0x10/0x20 [ 21.492991] [ 21.493147] The buggy address belongs to the object at fff00000c66ea700 [ 21.493147] which belongs to the cache kmalloc-64 of size 64 [ 21.493478] The buggy address is located 0 bytes to the right of [ 21.493478] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.493836] [ 21.493951] The buggy address belongs to the physical page: [ 21.494159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.494436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.495328] page_type: f5(slab) [ 21.495571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.495945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.496252] page dumped because: kasan: bad access detected [ 21.496510] [ 21.496641] Memory state around the buggy address: [ 21.497735] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.498167] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.498745] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.499142] ^ [ 21.499517] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.500141] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.500449] ================================================================== [ 21.561994] ================================================================== [ 21.562346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 21.564002] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.564542] [ 21.564713] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.564867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.564905] Hardware name: linux,dummy-virt (DT) [ 21.564946] Call trace: [ 21.564977] show_stack+0x20/0x38 (C) [ 21.565066] dump_stack_lvl+0x8c/0xd0 [ 21.565126] print_report+0x118/0x608 [ 21.565181] kasan_report+0xdc/0x128 [ 21.565235] kasan_check_range+0x100/0x1a8 [ 21.565291] __kasan_check_write+0x20/0x30 [ 21.565343] kasan_atomics_helper+0x760/0x4858 [ 21.565399] kasan_atomics+0x198/0x2e8 [ 21.565451] kunit_try_run_case+0x170/0x3f0 [ 21.565506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.565566] kthread+0x318/0x620 [ 21.565620] ret_from_fork+0x10/0x20 [ 21.565679] [ 21.569565] Allocated by task 254: [ 21.569845] kasan_save_stack+0x3c/0x68 [ 21.570281] kasan_save_track+0x20/0x40 [ 21.570557] kasan_save_alloc_info+0x40/0x58 [ 21.570939] __kasan_kmalloc+0xd4/0xd8 [ 21.571284] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.571514] kasan_atomics+0xb8/0x2e8 [ 21.572503] kunit_try_run_case+0x170/0x3f0 [ 21.572780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.573215] kthread+0x318/0x620 [ 21.573506] ret_from_fork+0x10/0x20 [ 21.573805] [ 21.574046] The buggy address belongs to the object at fff00000c66ea700 [ 21.574046] which belongs to the cache kmalloc-64 of size 64 [ 21.574966] The buggy address is located 0 bytes to the right of [ 21.574966] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.575409] [ 21.575754] The buggy address belongs to the physical page: [ 21.576252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.576510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.577015] page_type: f5(slab) [ 21.577227] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.577707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.578222] page dumped because: kasan: bad access detected [ 21.578556] [ 21.578766] Memory state around the buggy address: [ 21.579038] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.579512] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.579905] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.580354] ^ [ 21.580744] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.581149] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.581525] ================================================================== [ 21.659312] ================================================================== [ 21.659993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 21.660354] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.660823] [ 21.661065] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.661169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.661225] Hardware name: linux,dummy-virt (DT) [ 21.661270] Call trace: [ 21.661299] show_stack+0x20/0x38 (C) [ 21.661361] dump_stack_lvl+0x8c/0xd0 [ 21.661418] print_report+0x118/0x608 [ 21.661499] kasan_report+0xdc/0x128 [ 21.661554] kasan_check_range+0x100/0x1a8 [ 21.661633] __kasan_check_write+0x20/0x30 [ 21.661689] kasan_atomics_helper+0x99c/0x4858 [ 21.661755] kasan_atomics+0x198/0x2e8 [ 21.661813] kunit_try_run_case+0x170/0x3f0 [ 21.661866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.661924] kthread+0x318/0x620 [ 21.661976] ret_from_fork+0x10/0x20 [ 21.662034] [ 21.666853] Allocated by task 254: [ 21.667275] kasan_save_stack+0x3c/0x68 [ 21.667521] kasan_save_track+0x20/0x40 [ 21.667754] kasan_save_alloc_info+0x40/0x58 [ 21.667933] __kasan_kmalloc+0xd4/0xd8 [ 21.668091] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.668517] kasan_atomics+0xb8/0x2e8 [ 21.668876] kunit_try_run_case+0x170/0x3f0 [ 21.669278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.669536] kthread+0x318/0x620 [ 21.669786] ret_from_fork+0x10/0x20 [ 21.669941] [ 21.670106] The buggy address belongs to the object at fff00000c66ea700 [ 21.670106] which belongs to the cache kmalloc-64 of size 64 [ 21.670940] The buggy address is located 0 bytes to the right of [ 21.670940] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.671399] [ 21.671598] The buggy address belongs to the physical page: [ 21.672085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.672639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.672874] page_type: f5(slab) [ 21.673194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.673617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.674080] page dumped because: kasan: bad access detected [ 21.674421] [ 21.674629] Memory state around the buggy address: [ 21.674923] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.675314] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.675731] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.676149] ^ [ 21.676429] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.676869] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.677298] ================================================================== [ 21.404753] ================================================================== [ 21.405137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 21.405491] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.405922] [ 21.406131] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.406254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.406295] Hardware name: linux,dummy-virt (DT) [ 21.406346] Call trace: [ 21.406380] show_stack+0x20/0x38 (C) [ 21.406441] dump_stack_lvl+0x8c/0xd0 [ 21.406678] print_report+0x118/0x608 [ 21.407315] kasan_report+0xdc/0x128 [ 21.407381] kasan_check_range+0x100/0x1a8 [ 21.407439] __kasan_check_write+0x20/0x30 [ 21.407489] kasan_atomics_helper+0x414/0x4858 [ 21.407545] kasan_atomics+0x198/0x2e8 [ 21.407597] kunit_try_run_case+0x170/0x3f0 [ 21.407650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.407705] kthread+0x318/0x620 [ 21.407780] ret_from_fork+0x10/0x20 [ 21.407839] [ 21.410868] Allocated by task 254: [ 21.411192] kasan_save_stack+0x3c/0x68 [ 21.411490] kasan_save_track+0x20/0x40 [ 21.412019] kasan_save_alloc_info+0x40/0x58 [ 21.412309] __kasan_kmalloc+0xd4/0xd8 [ 21.412578] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.412943] kasan_atomics+0xb8/0x2e8 [ 21.413257] kunit_try_run_case+0x170/0x3f0 [ 21.413544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.413813] kthread+0x318/0x620 [ 21.414130] ret_from_fork+0x10/0x20 [ 21.414400] [ 21.414645] The buggy address belongs to the object at fff00000c66ea700 [ 21.414645] which belongs to the cache kmalloc-64 of size 64 [ 21.415371] The buggy address is located 0 bytes to the right of [ 21.415371] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.415940] [ 21.416117] The buggy address belongs to the physical page: [ 21.416427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.416873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.417237] page_type: f5(slab) [ 21.417413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.417684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.418141] page dumped because: kasan: bad access detected [ 21.418448] [ 21.418715] Memory state around the buggy address: [ 21.419069] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.419429] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.419843] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.420213] ^ [ 21.420503] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.420816] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.421215] ================================================================== [ 22.022421] ================================================================== [ 22.022690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 22.023236] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.023493] [ 22.023703] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.023822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.023859] Hardware name: linux,dummy-virt (DT) [ 22.023898] Call trace: [ 22.023928] show_stack+0x20/0x38 (C) [ 22.023984] dump_stack_lvl+0x8c/0xd0 [ 22.024039] print_report+0x118/0x608 [ 22.024090] kasan_report+0xdc/0x128 [ 22.024140] kasan_check_range+0x100/0x1a8 [ 22.024194] __kasan_check_write+0x20/0x30 [ 22.024247] kasan_atomics_helper+0x1058/0x4858 [ 22.024303] kasan_atomics+0x198/0x2e8 [ 22.024354] kunit_try_run_case+0x170/0x3f0 [ 22.024411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.024466] kthread+0x318/0x620 [ 22.024517] ret_from_fork+0x10/0x20 [ 22.024570] [ 22.027697] Allocated by task 254: [ 22.027982] kasan_save_stack+0x3c/0x68 [ 22.028155] kasan_save_track+0x20/0x40 [ 22.028316] kasan_save_alloc_info+0x40/0x58 [ 22.028679] __kasan_kmalloc+0xd4/0xd8 [ 22.028992] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.029159] kasan_atomics+0xb8/0x2e8 [ 22.029473] kunit_try_run_case+0x170/0x3f0 [ 22.029832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.030106] kthread+0x318/0x620 [ 22.030312] ret_from_fork+0x10/0x20 [ 22.030621] [ 22.030771] The buggy address belongs to the object at fff00000c66ea700 [ 22.030771] which belongs to the cache kmalloc-64 of size 64 [ 22.031379] The buggy address is located 0 bytes to the right of [ 22.031379] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.031813] [ 22.031982] The buggy address belongs to the physical page: [ 22.032324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.032564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.033056] page_type: f5(slab) [ 22.033288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.033731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.034136] page dumped because: kasan: bad access detected [ 22.034357] [ 22.034601] Memory state around the buggy address: [ 22.034895] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.035379] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.035733] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.035986] ^ [ 22.036318] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.036611] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.036822] ================================================================== [ 21.601513] ================================================================== [ 21.602098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 21.602864] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.603459] [ 21.603599] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.603719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.603767] Hardware name: linux,dummy-virt (DT) [ 21.603810] Call trace: [ 21.603841] show_stack+0x20/0x38 (C) [ 21.603910] dump_stack_lvl+0x8c/0xd0 [ 21.603969] print_report+0x118/0x608 [ 21.604029] kasan_report+0xdc/0x128 [ 21.604084] kasan_check_range+0x100/0x1a8 [ 21.604143] __kasan_check_write+0x20/0x30 [ 21.604219] kasan_atomics_helper+0x894/0x4858 [ 21.604286] kasan_atomics+0x198/0x2e8 [ 21.604340] kunit_try_run_case+0x170/0x3f0 [ 21.604418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.604490] kthread+0x318/0x620 [ 21.604843] ret_from_fork+0x10/0x20 [ 21.604906] [ 21.608143] Allocated by task 254: [ 21.608354] kasan_save_stack+0x3c/0x68 [ 21.608583] kasan_save_track+0x20/0x40 [ 21.609882] kasan_save_alloc_info+0x40/0x58 [ 21.610143] __kasan_kmalloc+0xd4/0xd8 [ 21.610317] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.610516] kasan_atomics+0xb8/0x2e8 [ 21.610680] kunit_try_run_case+0x170/0x3f0 [ 21.610874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.611073] kthread+0x318/0x620 [ 21.611249] ret_from_fork+0x10/0x20 [ 21.611409] [ 21.611523] The buggy address belongs to the object at fff00000c66ea700 [ 21.611523] which belongs to the cache kmalloc-64 of size 64 [ 21.612040] The buggy address is located 0 bytes to the right of [ 21.612040] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.612424] [ 21.612539] The buggy address belongs to the physical page: [ 21.612728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.613036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.613279] page_type: f5(slab) [ 21.613444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.613707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.615689] page dumped because: kasan: bad access detected [ 21.615940] [ 21.616142] Memory state around the buggy address: [ 21.616419] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.616818] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.617174] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.617560] ^ [ 21.618208] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.618690] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.619279] ================================================================== [ 21.856846] ================================================================== [ 21.857260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 21.857555] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.857809] [ 21.858024] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.858174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.858212] Hardware name: linux,dummy-virt (DT) [ 21.858282] Call trace: [ 21.858324] show_stack+0x20/0x38 (C) [ 21.858386] dump_stack_lvl+0x8c/0xd0 [ 21.858465] print_report+0x118/0x608 [ 21.858555] kasan_report+0xdc/0x128 [ 21.858623] kasan_check_range+0x100/0x1a8 [ 21.858685] __kasan_check_write+0x20/0x30 [ 21.858889] kasan_atomics_helper+0xd3c/0x4858 [ 21.858950] kasan_atomics+0x198/0x2e8 [ 21.859004] kunit_try_run_case+0x170/0x3f0 [ 21.859059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.859118] kthread+0x318/0x620 [ 21.859168] ret_from_fork+0x10/0x20 [ 21.859225] [ 21.861691] Allocated by task 254: [ 21.861888] kasan_save_stack+0x3c/0x68 [ 21.862095] kasan_save_track+0x20/0x40 [ 21.862289] kasan_save_alloc_info+0x40/0x58 [ 21.862630] __kasan_kmalloc+0xd4/0xd8 [ 21.862821] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.863014] kasan_atomics+0xb8/0x2e8 [ 21.863308] kunit_try_run_case+0x170/0x3f0 [ 21.863661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.864174] kthread+0x318/0x620 [ 21.864472] ret_from_fork+0x10/0x20 [ 21.864778] [ 21.864950] The buggy address belongs to the object at fff00000c66ea700 [ 21.864950] which belongs to the cache kmalloc-64 of size 64 [ 21.865624] The buggy address is located 0 bytes to the right of [ 21.865624] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.866370] [ 21.866499] The buggy address belongs to the physical page: [ 21.866872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.867329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.867732] page_type: f5(slab) [ 21.868065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.868433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.868830] page dumped because: kasan: bad access detected [ 21.869150] [ 21.869278] Memory state around the buggy address: [ 21.869470] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.869895] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.870325] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.870674] ^ [ 21.871008] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.871402] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.871779] ================================================================== [ 21.905765] ================================================================== [ 21.906171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 21.906692] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.906934] [ 21.907055] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.907152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.907185] Hardware name: linux,dummy-virt (DT) [ 21.907221] Call trace: [ 21.907248] show_stack+0x20/0x38 (C) [ 21.907307] dump_stack_lvl+0x8c/0xd0 [ 21.907360] print_report+0x118/0x608 [ 21.907413] kasan_report+0xdc/0x128 [ 21.907464] __asan_report_load8_noabort+0x20/0x30 [ 21.907516] kasan_atomics_helper+0x3f58/0x4858 [ 21.907569] kasan_atomics+0x198/0x2e8 [ 21.907618] kunit_try_run_case+0x170/0x3f0 [ 21.907670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.907726] kthread+0x318/0x620 [ 21.907791] ret_from_fork+0x10/0x20 [ 21.907847] [ 21.911552] Allocated by task 254: [ 21.911843] kasan_save_stack+0x3c/0x68 [ 21.912195] kasan_save_track+0x20/0x40 [ 21.912529] kasan_save_alloc_info+0x40/0x58 [ 21.912911] __kasan_kmalloc+0xd4/0xd8 [ 21.913217] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.913562] kasan_atomics+0xb8/0x2e8 [ 21.913887] kunit_try_run_case+0x170/0x3f0 [ 21.914162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.914571] kthread+0x318/0x620 [ 21.914869] ret_from_fork+0x10/0x20 [ 21.915174] [ 21.915378] The buggy address belongs to the object at fff00000c66ea700 [ 21.915378] which belongs to the cache kmalloc-64 of size 64 [ 21.915896] The buggy address is located 0 bytes to the right of [ 21.915896] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.916625] [ 21.916771] The buggy address belongs to the physical page: [ 21.917051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.917408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.918005] page_type: f5(slab) [ 21.918246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.918799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.919438] page dumped because: kasan: bad access detected [ 21.919658] [ 21.919811] Memory state around the buggy address: [ 21.920238] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.920687] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.921021] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.921587] ^ [ 21.922033] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.922400] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.922772] ================================================================== [ 22.144685] ================================================================== [ 22.145119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 22.145471] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.145777] [ 22.145941] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.146034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.146082] Hardware name: linux,dummy-virt (DT) [ 22.146123] Call trace: [ 22.146153] show_stack+0x20/0x38 (C) [ 22.146214] dump_stack_lvl+0x8c/0xd0 [ 22.146270] print_report+0x118/0x608 [ 22.146325] kasan_report+0xdc/0x128 [ 22.146375] __asan_report_load8_noabort+0x20/0x30 [ 22.146427] kasan_atomics_helper+0x3f04/0x4858 [ 22.146482] kasan_atomics+0x198/0x2e8 [ 22.146532] kunit_try_run_case+0x170/0x3f0 [ 22.146588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.146647] kthread+0x318/0x620 [ 22.146697] ret_from_fork+0x10/0x20 [ 22.146763] [ 22.149578] Allocated by task 254: [ 22.149716] kasan_save_stack+0x3c/0x68 [ 22.149887] kasan_save_track+0x20/0x40 [ 22.150211] kasan_save_alloc_info+0x40/0x58 [ 22.150595] __kasan_kmalloc+0xd4/0xd8 [ 22.150844] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.151017] kasan_atomics+0xb8/0x2e8 [ 22.151252] kunit_try_run_case+0x170/0x3f0 [ 22.151563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.151940] kthread+0x318/0x620 [ 22.152231] ret_from_fork+0x10/0x20 [ 22.152418] [ 22.152517] The buggy address belongs to the object at fff00000c66ea700 [ 22.152517] which belongs to the cache kmalloc-64 of size 64 [ 22.153055] The buggy address is located 0 bytes to the right of [ 22.153055] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.153634] [ 22.153930] The buggy address belongs to the physical page: [ 22.154680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.154957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.155247] page_type: f5(slab) [ 22.155533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.155954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.156321] page dumped because: kasan: bad access detected [ 22.156576] [ 22.156721] Memory state around the buggy address: [ 22.157090] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.157358] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.157598] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.157859] ^ [ 22.158060] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.158343] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.158588] ================================================================== [ 21.421899] ================================================================== [ 21.422264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 21.422749] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.423612] [ 21.424019] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.424334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.424374] Hardware name: linux,dummy-virt (DT) [ 21.424413] Call trace: [ 21.424445] show_stack+0x20/0x38 (C) [ 21.424511] dump_stack_lvl+0x8c/0xd0 [ 21.424565] print_report+0x118/0x608 [ 21.424619] kasan_report+0xdc/0x128 [ 21.424670] kasan_check_range+0x100/0x1a8 [ 21.424723] __kasan_check_write+0x20/0x30 [ 21.424797] kasan_atomics_helper+0x47c/0x4858 [ 21.424850] kasan_atomics+0x198/0x2e8 [ 21.424898] kunit_try_run_case+0x170/0x3f0 [ 21.424950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.425004] kthread+0x318/0x620 [ 21.425052] ret_from_fork+0x10/0x20 [ 21.425105] [ 21.428607] Allocated by task 254: [ 21.428800] kasan_save_stack+0x3c/0x68 [ 21.429070] kasan_save_track+0x20/0x40 [ 21.429227] kasan_save_alloc_info+0x40/0x58 [ 21.429598] __kasan_kmalloc+0xd4/0xd8 [ 21.429866] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.430205] kasan_atomics+0xb8/0x2e8 [ 21.430454] kunit_try_run_case+0x170/0x3f0 [ 21.430797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.431288] kthread+0x318/0x620 [ 21.431444] ret_from_fork+0x10/0x20 [ 21.431781] [ 21.431921] The buggy address belongs to the object at fff00000c66ea700 [ 21.431921] which belongs to the cache kmalloc-64 of size 64 [ 21.432508] The buggy address is located 0 bytes to the right of [ 21.432508] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.433111] [ 21.433267] The buggy address belongs to the physical page: [ 21.433579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.433947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.434407] page_type: f5(slab) [ 21.434695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.435056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.435420] page dumped because: kasan: bad access detected [ 21.435635] [ 21.435743] Memory state around the buggy address: [ 21.435959] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.436346] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.436644] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.437285] ^ [ 21.437670] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.438125] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.438624] ================================================================== [ 21.941137] ================================================================== [ 21.941590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 21.942121] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.942467] [ 21.942653] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.942767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.942808] Hardware name: linux,dummy-virt (DT) [ 21.942869] Call trace: [ 21.942917] show_stack+0x20/0x38 (C) [ 21.942981] dump_stack_lvl+0x8c/0xd0 [ 21.943039] print_report+0x118/0x608 [ 21.943092] kasan_report+0xdc/0x128 [ 21.943158] __asan_report_store8_noabort+0x20/0x30 [ 21.943223] kasan_atomics_helper+0x3e5c/0x4858 [ 21.943279] kasan_atomics+0x198/0x2e8 [ 21.943331] kunit_try_run_case+0x170/0x3f0 [ 21.943385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.943443] kthread+0x318/0x620 [ 21.943493] ret_from_fork+0x10/0x20 [ 21.943549] [ 21.946664] Allocated by task 254: [ 21.947000] kasan_save_stack+0x3c/0x68 [ 21.947272] kasan_save_track+0x20/0x40 [ 21.947622] kasan_save_alloc_info+0x40/0x58 [ 21.947920] __kasan_kmalloc+0xd4/0xd8 [ 21.948215] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.948467] kasan_atomics+0xb8/0x2e8 [ 21.948716] kunit_try_run_case+0x170/0x3f0 [ 21.948978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.949269] kthread+0x318/0x620 [ 21.949479] ret_from_fork+0x10/0x20 [ 21.949734] [ 21.949946] The buggy address belongs to the object at fff00000c66ea700 [ 21.949946] which belongs to the cache kmalloc-64 of size 64 [ 21.950495] The buggy address is located 0 bytes to the right of [ 21.950495] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.951023] [ 21.951224] The buggy address belongs to the physical page: [ 21.951481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.951999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.952388] page_type: f5(slab) [ 21.952563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.953029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.953428] page dumped because: kasan: bad access detected [ 21.953713] [ 21.953900] Memory state around the buggy address: [ 21.954199] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.954489] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.954909] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.955253] ^ [ 21.955462] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.955942] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.956388] ================================================================== [ 22.385946] ================================================================== [ 22.386732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 22.387313] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.387891] [ 22.388062] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.388165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.388199] Hardware name: linux,dummy-virt (DT) [ 22.388254] Call trace: [ 22.388286] show_stack+0x20/0x38 (C) [ 22.388343] dump_stack_lvl+0x8c/0xd0 [ 22.388396] print_report+0x118/0x608 [ 22.388445] kasan_report+0xdc/0x128 [ 22.388494] kasan_check_range+0x100/0x1a8 [ 22.388544] __kasan_check_write+0x20/0x30 [ 22.388593] kasan_atomics_helper+0x17ec/0x4858 [ 22.388643] kasan_atomics+0x198/0x2e8 [ 22.388691] kunit_try_run_case+0x170/0x3f0 [ 22.388836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.389007] kthread+0x318/0x620 [ 22.389061] ret_from_fork+0x10/0x20 [ 22.389127] [ 22.393852] Allocated by task 254: [ 22.394234] kasan_save_stack+0x3c/0x68 [ 22.394449] kasan_save_track+0x20/0x40 [ 22.394731] kasan_save_alloc_info+0x40/0x58 [ 22.394962] __kasan_kmalloc+0xd4/0xd8 [ 22.395539] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.395807] kasan_atomics+0xb8/0x2e8 [ 22.396298] kunit_try_run_case+0x170/0x3f0 [ 22.396530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.397112] kthread+0x318/0x620 [ 22.397449] ret_from_fork+0x10/0x20 [ 22.397690] [ 22.398031] The buggy address belongs to the object at fff00000c66ea700 [ 22.398031] which belongs to the cache kmalloc-64 of size 64 [ 22.398878] The buggy address is located 0 bytes to the right of [ 22.398878] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.399653] [ 22.400044] The buggy address belongs to the physical page: [ 22.400425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.401021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.401406] page_type: f5(slab) [ 22.401601] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.402080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.402392] page dumped because: kasan: bad access detected [ 22.402601] [ 22.402713] Memory state around the buggy address: [ 22.402917] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.403162] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.403398] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.403627] ^ [ 22.403913] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.404393] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.404913] ================================================================== [ 22.037846] ================================================================== [ 22.038292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 22.038731] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.038978] [ 22.039167] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.039255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.039290] Hardware name: linux,dummy-virt (DT) [ 22.039327] Call trace: [ 22.039355] show_stack+0x20/0x38 (C) [ 22.039410] dump_stack_lvl+0x8c/0xd0 [ 22.039459] print_report+0x118/0x608 [ 22.039510] kasan_report+0xdc/0x128 [ 22.039557] kasan_check_range+0x100/0x1a8 [ 22.039608] __kasan_check_write+0x20/0x30 [ 22.039655] kasan_atomics_helper+0x10c0/0x4858 [ 22.039709] kasan_atomics+0x198/0x2e8 [ 22.039770] kunit_try_run_case+0x170/0x3f0 [ 22.039823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.039880] kthread+0x318/0x620 [ 22.039926] ret_from_fork+0x10/0x20 [ 22.039979] [ 22.043056] Allocated by task 254: [ 22.043226] kasan_save_stack+0x3c/0x68 [ 22.043506] kasan_save_track+0x20/0x40 [ 22.043819] kasan_save_alloc_info+0x40/0x58 [ 22.044151] __kasan_kmalloc+0xd4/0xd8 [ 22.044314] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.044543] kasan_atomics+0xb8/0x2e8 [ 22.044692] kunit_try_run_case+0x170/0x3f0 [ 22.045022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.045365] kthread+0x318/0x620 [ 22.045507] ret_from_fork+0x10/0x20 [ 22.045746] [ 22.045903] The buggy address belongs to the object at fff00000c66ea700 [ 22.045903] which belongs to the cache kmalloc-64 of size 64 [ 22.046634] The buggy address is located 0 bytes to the right of [ 22.046634] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.047145] [ 22.047324] The buggy address belongs to the physical page: [ 22.047604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.048002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.048338] page_type: f5(slab) [ 22.048527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.048938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.049206] page dumped because: kasan: bad access detected [ 22.049555] [ 22.049744] Memory state around the buggy address: [ 22.049969] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.050409] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.050747] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.051203] ^ [ 22.051406] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.051789] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.052028] ================================================================== [ 22.098977] ================================================================== [ 22.099258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 22.099681] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.099952] [ 22.100135] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.100234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.100266] Hardware name: linux,dummy-virt (DT) [ 22.100304] Call trace: [ 22.100331] show_stack+0x20/0x38 (C) [ 22.100388] dump_stack_lvl+0x8c/0xd0 [ 22.100440] print_report+0x118/0x608 [ 22.100493] kasan_report+0xdc/0x128 [ 22.100545] kasan_check_range+0x100/0x1a8 [ 22.100598] __kasan_check_write+0x20/0x30 [ 22.100649] kasan_atomics_helper+0x126c/0x4858 [ 22.100702] kasan_atomics+0x198/0x2e8 [ 22.100764] kunit_try_run_case+0x170/0x3f0 [ 22.100822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.100880] kthread+0x318/0x620 [ 22.100929] ret_from_fork+0x10/0x20 [ 22.100983] [ 22.104022] Allocated by task 254: [ 22.104220] kasan_save_stack+0x3c/0x68 [ 22.104545] kasan_save_track+0x20/0x40 [ 22.104781] kasan_save_alloc_info+0x40/0x58 [ 22.104966] __kasan_kmalloc+0xd4/0xd8 [ 22.105127] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.105506] kasan_atomics+0xb8/0x2e8 [ 22.105854] kunit_try_run_case+0x170/0x3f0 [ 22.106145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.106418] kthread+0x318/0x620 [ 22.106604] ret_from_fork+0x10/0x20 [ 22.106895] [ 22.107085] The buggy address belongs to the object at fff00000c66ea700 [ 22.107085] which belongs to the cache kmalloc-64 of size 64 [ 22.107432] The buggy address is located 0 bytes to the right of [ 22.107432] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.108136] [ 22.108321] The buggy address belongs to the physical page: [ 22.108612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.109010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.109285] page_type: f5(slab) [ 22.109521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.110024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.110334] page dumped because: kasan: bad access detected [ 22.110705] [ 22.110907] Memory state around the buggy address: [ 22.111136] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.111486] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.111824] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.112171] ^ [ 22.112446] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.112817] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.113172] ================================================================== [ 21.440353] ================================================================== [ 21.440842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 21.441308] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.441931] [ 21.442124] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.442293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.442344] Hardware name: linux,dummy-virt (DT) [ 21.442389] Call trace: [ 21.442419] show_stack+0x20/0x38 (C) [ 21.442491] dump_stack_lvl+0x8c/0xd0 [ 21.443320] print_report+0x118/0x608 [ 21.443379] kasan_report+0xdc/0x128 [ 21.443434] kasan_check_range+0x100/0x1a8 [ 21.443489] __kasan_check_write+0x20/0x30 [ 21.443543] kasan_atomics_helper+0x4e4/0x4858 [ 21.443597] kasan_atomics+0x198/0x2e8 [ 21.443649] kunit_try_run_case+0x170/0x3f0 [ 21.443706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.443782] kthread+0x318/0x620 [ 21.443835] ret_from_fork+0x10/0x20 [ 21.443891] [ 21.447141] Allocated by task 254: [ 21.447632] kasan_save_stack+0x3c/0x68 [ 21.448047] kasan_save_track+0x20/0x40 [ 21.448316] kasan_save_alloc_info+0x40/0x58 [ 21.448692] __kasan_kmalloc+0xd4/0xd8 [ 21.448866] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.449284] kasan_atomics+0xb8/0x2e8 [ 21.449657] kunit_try_run_case+0x170/0x3f0 [ 21.449966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.450386] kthread+0x318/0x620 [ 21.450666] ret_from_fork+0x10/0x20 [ 21.450989] [ 21.451144] The buggy address belongs to the object at fff00000c66ea700 [ 21.451144] which belongs to the cache kmalloc-64 of size 64 [ 21.451779] The buggy address is located 0 bytes to the right of [ 21.451779] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.452349] [ 21.452516] The buggy address belongs to the physical page: [ 21.453052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.453323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.453614] page_type: f5(slab) [ 21.453847] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.454267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.454854] page dumped because: kasan: bad access detected [ 21.455426] [ 21.456206] Memory state around the buggy address: [ 21.456461] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.456908] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.457614] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.458135] ^ [ 21.458854] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.459324] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.460074] ================================================================== [ 21.975760] ================================================================== [ 21.976057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.976522] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.977048] [ 21.977204] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.977410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.977447] Hardware name: linux,dummy-virt (DT) [ 21.977486] Call trace: [ 21.977517] show_stack+0x20/0x38 (C) [ 21.977578] dump_stack_lvl+0x8c/0xd0 [ 21.977635] print_report+0x118/0x608 [ 21.977688] kasan_report+0xdc/0x128 [ 21.977761] kasan_check_range+0x100/0x1a8 [ 21.977824] __kasan_check_write+0x20/0x30 [ 21.977876] kasan_atomics_helper+0xf20/0x4858 [ 21.977932] kasan_atomics+0x198/0x2e8 [ 21.977984] kunit_try_run_case+0x170/0x3f0 [ 21.978040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.978114] kthread+0x318/0x620 [ 21.978169] ret_from_fork+0x10/0x20 [ 21.978229] [ 21.981038] Allocated by task 254: [ 21.981363] kasan_save_stack+0x3c/0x68 [ 21.981717] kasan_save_track+0x20/0x40 [ 21.981985] kasan_save_alloc_info+0x40/0x58 [ 21.982272] __kasan_kmalloc+0xd4/0xd8 [ 21.982520] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.982829] kasan_atomics+0xb8/0x2e8 [ 21.983072] kunit_try_run_case+0x170/0x3f0 [ 21.983368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.983643] kthread+0x318/0x620 [ 21.983848] ret_from_fork+0x10/0x20 [ 21.984086] [ 21.984192] The buggy address belongs to the object at fff00000c66ea700 [ 21.984192] which belongs to the cache kmalloc-64 of size 64 [ 21.984517] The buggy address is located 0 bytes to the right of [ 21.984517] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.985427] [ 21.985611] The buggy address belongs to the physical page: [ 21.985919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.986256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.986481] page_type: f5(slab) [ 21.986815] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.987435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.987818] page dumped because: kasan: bad access detected [ 21.988271] [ 21.988401] Memory state around the buggy address: [ 21.988717] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.989117] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.989608] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.989980] ^ [ 21.990190] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.990612] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.991062] ================================================================== [ 21.766879] ================================================================== [ 21.767308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 21.767704] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.768006] [ 21.768128] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.768225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.768261] Hardware name: linux,dummy-virt (DT) [ 21.768321] Call trace: [ 21.768351] show_stack+0x20/0x38 (C) [ 21.768409] dump_stack_lvl+0x8c/0xd0 [ 21.768464] print_report+0x118/0x608 [ 21.768517] kasan_report+0xdc/0x128 [ 21.768595] __asan_report_load4_noabort+0x20/0x30 [ 21.768650] kasan_atomics_helper+0x3dbc/0x4858 [ 21.768707] kasan_atomics+0x198/0x2e8 [ 21.768770] kunit_try_run_case+0x170/0x3f0 [ 21.768830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.768889] kthread+0x318/0x620 [ 21.768942] ret_from_fork+0x10/0x20 [ 21.768998] [ 21.772369] Allocated by task 254: [ 21.772574] kasan_save_stack+0x3c/0x68 [ 21.772829] kasan_save_track+0x20/0x40 [ 21.773073] kasan_save_alloc_info+0x40/0x58 [ 21.773377] __kasan_kmalloc+0xd4/0xd8 [ 21.773746] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.773983] kasan_atomics+0xb8/0x2e8 [ 21.774259] kunit_try_run_case+0x170/0x3f0 [ 21.774587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.774934] kthread+0x318/0x620 [ 21.775224] ret_from_fork+0x10/0x20 [ 21.775449] [ 21.775632] The buggy address belongs to the object at fff00000c66ea700 [ 21.775632] which belongs to the cache kmalloc-64 of size 64 [ 21.776190] The buggy address is located 0 bytes to the right of [ 21.776190] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.776836] [ 21.777009] The buggy address belongs to the physical page: [ 21.777346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.777706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.778130] page_type: f5(slab) [ 21.778318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.778804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.779098] page dumped because: kasan: bad access detected [ 21.779470] [ 21.779602] Memory state around the buggy address: [ 21.779923] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.780230] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.780681] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.781077] ^ [ 21.781331] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.781760] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.782113] ================================================================== [ 21.783206] ================================================================== [ 21.783631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 21.784359] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.784777] [ 21.785011] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.785113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.785169] Hardware name: linux,dummy-virt (DT) [ 21.785208] Call trace: [ 21.785238] show_stack+0x20/0x38 (C) [ 21.785296] dump_stack_lvl+0x8c/0xd0 [ 21.785353] print_report+0x118/0x608 [ 21.785408] kasan_report+0xdc/0x128 [ 21.785463] kasan_check_range+0x100/0x1a8 [ 21.785545] __kasan_check_write+0x20/0x30 [ 21.785602] kasan_atomics_helper+0xc08/0x4858 [ 21.785680] kasan_atomics+0x198/0x2e8 [ 21.785751] kunit_try_run_case+0x170/0x3f0 [ 21.785812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.785874] kthread+0x318/0x620 [ 21.785927] ret_from_fork+0x10/0x20 [ 21.785982] [ 21.789512] Allocated by task 254: [ 21.789716] kasan_save_stack+0x3c/0x68 [ 21.790033] kasan_save_track+0x20/0x40 [ 21.790377] kasan_save_alloc_info+0x40/0x58 [ 21.790669] __kasan_kmalloc+0xd4/0xd8 [ 21.791013] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.791435] kasan_atomics+0xb8/0x2e8 [ 21.791604] kunit_try_run_case+0x170/0x3f0 [ 21.791926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.792398] kthread+0x318/0x620 [ 21.792600] ret_from_fork+0x10/0x20 [ 21.792933] [ 21.793075] The buggy address belongs to the object at fff00000c66ea700 [ 21.793075] which belongs to the cache kmalloc-64 of size 64 [ 21.793635] The buggy address is located 0 bytes to the right of [ 21.793635] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.794436] [ 21.794665] The buggy address belongs to the physical page: [ 21.795013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.795578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.796023] page_type: f5(slab) [ 21.796318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.796814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.797276] page dumped because: kasan: bad access detected [ 21.797645] [ 21.797866] Memory state around the buggy address: [ 21.798197] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.798520] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.798921] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.799368] ^ [ 21.799583] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.800062] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.800462] ================================================================== [ 22.114354] ================================================================== [ 22.114732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 22.115256] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.115668] [ 22.115869] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.115968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.116002] Hardware name: linux,dummy-virt (DT) [ 22.116041] Call trace: [ 22.116068] show_stack+0x20/0x38 (C) [ 22.116127] dump_stack_lvl+0x8c/0xd0 [ 22.116180] print_report+0x118/0x608 [ 22.116234] kasan_report+0xdc/0x128 [ 22.116288] kasan_check_range+0x100/0x1a8 [ 22.116342] __kasan_check_write+0x20/0x30 [ 22.116394] kasan_atomics_helper+0x12d8/0x4858 [ 22.116449] kasan_atomics+0x198/0x2e8 [ 22.116499] kunit_try_run_case+0x170/0x3f0 [ 22.116553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.116611] kthread+0x318/0x620 [ 22.116660] ret_from_fork+0x10/0x20 [ 22.116715] [ 22.119672] Allocated by task 254: [ 22.119850] kasan_save_stack+0x3c/0x68 [ 22.120020] kasan_save_track+0x20/0x40 [ 22.120242] kasan_save_alloc_info+0x40/0x58 [ 22.120606] __kasan_kmalloc+0xd4/0xd8 [ 22.120895] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.121193] kasan_atomics+0xb8/0x2e8 [ 22.121483] kunit_try_run_case+0x170/0x3f0 [ 22.121698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.121967] kthread+0x318/0x620 [ 22.122286] ret_from_fork+0x10/0x20 [ 22.122531] [ 22.122697] The buggy address belongs to the object at fff00000c66ea700 [ 22.122697] which belongs to the cache kmalloc-64 of size 64 [ 22.123267] The buggy address is located 0 bytes to the right of [ 22.123267] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.123802] [ 22.123958] The buggy address belongs to the physical page: [ 22.124142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.124719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.125208] page_type: f5(slab) [ 22.125460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.125788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.126139] page dumped because: kasan: bad access detected [ 22.126329] [ 22.126499] Memory state around the buggy address: [ 22.126827] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.127254] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.127551] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.127844] ^ [ 22.128207] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.128526] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.128838] ================================================================== [ 22.007856] ================================================================== [ 22.008234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 22.008487] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.008978] [ 22.009130] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.009231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.009269] Hardware name: linux,dummy-virt (DT) [ 22.009329] Call trace: [ 22.009360] show_stack+0x20/0x38 (C) [ 22.009420] dump_stack_lvl+0x8c/0xd0 [ 22.009495] print_report+0x118/0x608 [ 22.009553] kasan_report+0xdc/0x128 [ 22.009607] kasan_check_range+0x100/0x1a8 [ 22.009663] __kasan_check_write+0x20/0x30 [ 22.009715] kasan_atomics_helper+0xff0/0x4858 [ 22.009791] kasan_atomics+0x198/0x2e8 [ 22.009846] kunit_try_run_case+0x170/0x3f0 [ 22.009900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.009957] kthread+0x318/0x620 [ 22.010009] ret_from_fork+0x10/0x20 [ 22.010070] [ 22.012544] Allocated by task 254: [ 22.012815] kasan_save_stack+0x3c/0x68 [ 22.013142] kasan_save_track+0x20/0x40 [ 22.013400] kasan_save_alloc_info+0x40/0x58 [ 22.013699] __kasan_kmalloc+0xd4/0xd8 [ 22.013951] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.014190] kasan_atomics+0xb8/0x2e8 [ 22.014429] kunit_try_run_case+0x170/0x3f0 [ 22.014605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.015040] kthread+0x318/0x620 [ 22.015309] ret_from_fork+0x10/0x20 [ 22.015514] [ 22.015681] The buggy address belongs to the object at fff00000c66ea700 [ 22.015681] which belongs to the cache kmalloc-64 of size 64 [ 22.016156] The buggy address is located 0 bytes to the right of [ 22.016156] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.016658] [ 22.016832] The buggy address belongs to the physical page: [ 22.017068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.017521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.017777] page_type: f5(slab) [ 22.018082] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.018524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.018924] page dumped because: kasan: bad access detected [ 22.019187] [ 22.019346] Memory state around the buggy address: [ 22.019585] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.019935] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.020268] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.020566] ^ [ 22.020867] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.021214] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.021596] ================================================================== [ 21.620657] ================================================================== [ 21.621090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 21.621649] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.622101] [ 21.622272] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.622443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.622908] Hardware name: linux,dummy-virt (DT) [ 21.622966] Call trace: [ 21.622997] show_stack+0x20/0x38 (C) [ 21.623071] dump_stack_lvl+0x8c/0xd0 [ 21.623129] print_report+0x118/0x608 [ 21.623186] kasan_report+0xdc/0x128 [ 21.623239] __asan_report_load4_noabort+0x20/0x30 [ 21.623297] kasan_atomics_helper+0x42d8/0x4858 [ 21.623356] kasan_atomics+0x198/0x2e8 [ 21.623409] kunit_try_run_case+0x170/0x3f0 [ 21.623468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.623529] kthread+0x318/0x620 [ 21.623582] ret_from_fork+0x10/0x20 [ 21.623642] [ 21.628502] Allocated by task 254: [ 21.628922] kasan_save_stack+0x3c/0x68 [ 21.629220] kasan_save_track+0x20/0x40 [ 21.629611] kasan_save_alloc_info+0x40/0x58 [ 21.629953] __kasan_kmalloc+0xd4/0xd8 [ 21.630211] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.630932] kasan_atomics+0xb8/0x2e8 [ 21.631350] kunit_try_run_case+0x170/0x3f0 [ 21.631701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.632100] kthread+0x318/0x620 [ 21.632333] ret_from_fork+0x10/0x20 [ 21.632586] [ 21.632725] The buggy address belongs to the object at fff00000c66ea700 [ 21.632725] which belongs to the cache kmalloc-64 of size 64 [ 21.633218] The buggy address is located 0 bytes to the right of [ 21.633218] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.633591] [ 21.633819] The buggy address belongs to the physical page: [ 21.634201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.634841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.635192] page_type: f5(slab) [ 21.635504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.636010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.636505] page dumped because: kasan: bad access detected [ 21.636827] [ 21.637003] Memory state around the buggy address: [ 21.637224] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.637712] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.638104] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.638569] ^ [ 21.638955] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.639279] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.639810] ================================================================== [ 21.266320] ================================================================== [ 21.267106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 21.267416] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.267664] [ 21.267818] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.267928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.267960] Hardware name: linux,dummy-virt (DT) [ 21.267999] Call trace: [ 21.268027] show_stack+0x20/0x38 (C) [ 21.268090] dump_stack_lvl+0x8c/0xd0 [ 21.268143] print_report+0x118/0x608 [ 21.268198] kasan_report+0xdc/0x128 [ 21.268255] __asan_report_store4_noabort+0x20/0x30 [ 21.268313] kasan_atomics_helper+0x3f7c/0x4858 [ 21.268369] kasan_atomics+0x198/0x2e8 [ 21.268425] kunit_try_run_case+0x170/0x3f0 [ 21.268482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.268540] kthread+0x318/0x620 [ 21.268594] ret_from_fork+0x10/0x20 [ 21.268651] [ 21.273157] Allocated by task 254: [ 21.273421] kasan_save_stack+0x3c/0x68 [ 21.273636] kasan_save_track+0x20/0x40 [ 21.273924] kasan_save_alloc_info+0x40/0x58 [ 21.274189] __kasan_kmalloc+0xd4/0xd8 [ 21.274642] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.274884] kasan_atomics+0xb8/0x2e8 [ 21.275195] kunit_try_run_case+0x170/0x3f0 [ 21.275384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.275714] kthread+0x318/0x620 [ 21.275972] ret_from_fork+0x10/0x20 [ 21.276205] [ 21.276319] The buggy address belongs to the object at fff00000c66ea700 [ 21.276319] which belongs to the cache kmalloc-64 of size 64 [ 21.277149] The buggy address is located 0 bytes to the right of [ 21.277149] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.277658] [ 21.277784] The buggy address belongs to the physical page: [ 21.278228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.278875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.279242] page_type: f5(slab) [ 21.279497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.279898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.280253] page dumped because: kasan: bad access detected [ 21.280609] [ 21.280789] Memory state around the buggy address: [ 21.281018] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.281474] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.281874] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.282246] ^ [ 21.282660] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.283006] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.283430] ================================================================== [ 21.696546] ================================================================== [ 21.696853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 21.697413] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.697804] [ 21.698014] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.698140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.698179] Hardware name: linux,dummy-virt (DT) [ 21.698219] Call trace: [ 21.698249] show_stack+0x20/0x38 (C) [ 21.698308] dump_stack_lvl+0x8c/0xd0 [ 21.698363] print_report+0x118/0x608 [ 21.698435] kasan_report+0xdc/0x128 [ 21.698520] kasan_check_range+0x100/0x1a8 [ 21.698581] __kasan_check_write+0x20/0x30 [ 21.698633] kasan_atomics_helper+0xa6c/0x4858 [ 21.698690] kasan_atomics+0x198/0x2e8 [ 21.698759] kunit_try_run_case+0x170/0x3f0 [ 21.698820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.698880] kthread+0x318/0x620 [ 21.698932] ret_from_fork+0x10/0x20 [ 21.698990] [ 21.702289] Allocated by task 254: [ 21.702578] kasan_save_stack+0x3c/0x68 [ 21.702874] kasan_save_track+0x20/0x40 [ 21.703196] kasan_save_alloc_info+0x40/0x58 [ 21.703489] __kasan_kmalloc+0xd4/0xd8 [ 21.703762] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.704056] kasan_atomics+0xb8/0x2e8 [ 21.704408] kunit_try_run_case+0x170/0x3f0 [ 21.704801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.705242] kthread+0x318/0x620 [ 21.705477] ret_from_fork+0x10/0x20 [ 21.705782] [ 21.705948] The buggy address belongs to the object at fff00000c66ea700 [ 21.705948] which belongs to the cache kmalloc-64 of size 64 [ 21.706610] The buggy address is located 0 bytes to the right of [ 21.706610] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.707266] [ 21.707464] The buggy address belongs to the physical page: [ 21.707760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.708184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.708636] page_type: f5(slab) [ 21.708863] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.709302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.709775] page dumped because: kasan: bad access detected [ 21.710075] [ 21.710281] Memory state around the buggy address: [ 21.710531] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.710974] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.711403] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.711796] ^ [ 21.712083] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.712445] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.712879] ================================================================== [ 22.233826] ================================================================== [ 22.234178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 22.234528] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.234847] [ 22.234968] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.235066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.235102] Hardware name: linux,dummy-virt (DT) [ 22.235138] Call trace: [ 22.235168] show_stack+0x20/0x38 (C) [ 22.235226] dump_stack_lvl+0x8c/0xd0 [ 22.235281] print_report+0x118/0x608 [ 22.235337] kasan_report+0xdc/0x128 [ 22.235386] kasan_check_range+0x100/0x1a8 [ 22.235438] __kasan_check_write+0x20/0x30 [ 22.235484] kasan_atomics_helper+0x15b4/0x4858 [ 22.235537] kasan_atomics+0x198/0x2e8 [ 22.235587] kunit_try_run_case+0x170/0x3f0 [ 22.235637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.235694] kthread+0x318/0x620 [ 22.235757] ret_from_fork+0x10/0x20 [ 22.235817] [ 22.238864] Allocated by task 254: [ 22.239171] kasan_save_stack+0x3c/0x68 [ 22.239438] kasan_save_track+0x20/0x40 [ 22.239692] kasan_save_alloc_info+0x40/0x58 [ 22.239938] __kasan_kmalloc+0xd4/0xd8 [ 22.240103] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.240465] kasan_atomics+0xb8/0x2e8 [ 22.240772] kunit_try_run_case+0x170/0x3f0 [ 22.240986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.241273] kthread+0x318/0x620 [ 22.241523] ret_from_fork+0x10/0x20 [ 22.241717] [ 22.241907] The buggy address belongs to the object at fff00000c66ea700 [ 22.241907] which belongs to the cache kmalloc-64 of size 64 [ 22.242368] The buggy address is located 0 bytes to the right of [ 22.242368] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.243411] [ 22.243589] The buggy address belongs to the physical page: [ 22.243785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.244038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.244259] page_type: f5(slab) [ 22.244418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.244656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.245097] page dumped because: kasan: bad access detected [ 22.245428] [ 22.245572] Memory state around the buggy address: [ 22.245875] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.246534] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.246945] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.247229] ^ [ 22.247462] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.247721] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.248009] ================================================================== [ 22.052848] ================================================================== [ 22.053259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 22.053657] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.053983] [ 22.054165] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.054262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.054296] Hardware name: linux,dummy-virt (DT) [ 22.054333] Call trace: [ 22.054360] show_stack+0x20/0x38 (C) [ 22.054417] dump_stack_lvl+0x8c/0xd0 [ 22.054501] print_report+0x118/0x608 [ 22.054558] kasan_report+0xdc/0x128 [ 22.054611] kasan_check_range+0x100/0x1a8 [ 22.054664] __kasan_check_write+0x20/0x30 [ 22.054715] kasan_atomics_helper+0x1128/0x4858 [ 22.054790] kasan_atomics+0x198/0x2e8 [ 22.054843] kunit_try_run_case+0x170/0x3f0 [ 22.054896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.054954] kthread+0x318/0x620 [ 22.054999] ret_from_fork+0x10/0x20 [ 22.055049] [ 22.057650] Allocated by task 254: [ 22.057891] kasan_save_stack+0x3c/0x68 [ 22.058112] kasan_save_track+0x20/0x40 [ 22.058365] kasan_save_alloc_info+0x40/0x58 [ 22.058623] __kasan_kmalloc+0xd4/0xd8 [ 22.058856] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.059031] kasan_atomics+0xb8/0x2e8 [ 22.059188] kunit_try_run_case+0x170/0x3f0 [ 22.059534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.059977] kthread+0x318/0x620 [ 22.060145] ret_from_fork+0x10/0x20 [ 22.060309] [ 22.060413] The buggy address belongs to the object at fff00000c66ea700 [ 22.060413] which belongs to the cache kmalloc-64 of size 64 [ 22.061515] The buggy address is located 0 bytes to the right of [ 22.061515] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.061922] [ 22.062203] The buggy address belongs to the physical page: [ 22.062619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.062950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.063190] page_type: f5(slab) [ 22.063357] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.063624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.064226] page dumped because: kasan: bad access detected [ 22.064417] [ 22.064655] Memory state around the buggy address: [ 22.065053] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.065403] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.065629] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.066124] ^ [ 22.066456] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.066827] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.067191] ================================================================== [ 21.872534] ================================================================== [ 21.872964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 21.873392] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.873751] [ 21.873920] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.874016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.874049] Hardware name: linux,dummy-virt (DT) [ 21.874096] Call trace: [ 21.874128] show_stack+0x20/0x38 (C) [ 21.874190] dump_stack_lvl+0x8c/0xd0 [ 21.874250] print_report+0x118/0x608 [ 21.874305] kasan_report+0xdc/0x128 [ 21.874359] __asan_report_load4_noabort+0x20/0x30 [ 21.874413] kasan_atomics_helper+0x3e04/0x4858 [ 21.874471] kasan_atomics+0x198/0x2e8 [ 21.874545] kunit_try_run_case+0x170/0x3f0 [ 21.874606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.874663] kthread+0x318/0x620 [ 21.874711] ret_from_fork+0x10/0x20 [ 21.874776] [ 21.877316] Allocated by task 254: [ 21.877620] kasan_save_stack+0x3c/0x68 [ 21.877880] kasan_save_track+0x20/0x40 [ 21.878127] kasan_save_alloc_info+0x40/0x58 [ 21.878426] __kasan_kmalloc+0xd4/0xd8 [ 21.878648] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.879036] kasan_atomics+0xb8/0x2e8 [ 21.879291] kunit_try_run_case+0x170/0x3f0 [ 21.879547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.879774] kthread+0x318/0x620 [ 21.880039] ret_from_fork+0x10/0x20 [ 21.880285] [ 21.880385] The buggy address belongs to the object at fff00000c66ea700 [ 21.880385] which belongs to the cache kmalloc-64 of size 64 [ 21.881118] The buggy address is located 0 bytes to the right of [ 21.881118] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.881693] [ 21.881886] The buggy address belongs to the physical page: [ 21.882143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.882560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.882917] page_type: f5(slab) [ 21.883153] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.883464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.884015] page dumped because: kasan: bad access detected [ 21.884394] [ 21.884529] Memory state around the buggy address: [ 21.884711] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.885171] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.885506] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.885900] ^ [ 21.886160] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.886475] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.886986] ================================================================== [ 21.801308] ================================================================== [ 21.801702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 21.802299] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.802694] [ 21.802866] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.802967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.803003] Hardware name: linux,dummy-virt (DT) [ 21.803062] Call trace: [ 21.803095] show_stack+0x20/0x38 (C) [ 21.803164] dump_stack_lvl+0x8c/0xd0 [ 21.803222] print_report+0x118/0x608 [ 21.803276] kasan_report+0xdc/0x128 [ 21.803331] __asan_report_load4_noabort+0x20/0x30 [ 21.803386] kasan_atomics_helper+0x3de4/0x4858 [ 21.803442] kasan_atomics+0x198/0x2e8 [ 21.803495] kunit_try_run_case+0x170/0x3f0 [ 21.803552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.803611] kthread+0x318/0x620 [ 21.803662] ret_from_fork+0x10/0x20 [ 21.803716] [ 21.807920] Allocated by task 254: [ 21.808103] kasan_save_stack+0x3c/0x68 [ 21.808702] kasan_save_track+0x20/0x40 [ 21.809116] kasan_save_alloc_info+0x40/0x58 [ 21.809398] __kasan_kmalloc+0xd4/0xd8 [ 21.809751] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.810104] kasan_atomics+0xb8/0x2e8 [ 21.810282] kunit_try_run_case+0x170/0x3f0 [ 21.810461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.810665] kthread+0x318/0x620 [ 21.810935] ret_from_fork+0x10/0x20 [ 21.811481] [ 21.811596] The buggy address belongs to the object at fff00000c66ea700 [ 21.811596] which belongs to the cache kmalloc-64 of size 64 [ 21.812017] The buggy address is located 0 bytes to the right of [ 21.812017] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.812373] [ 21.812480] The buggy address belongs to the physical page: [ 21.812672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.813873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.814428] page_type: f5(slab) [ 21.814807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.815359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.815870] page dumped because: kasan: bad access detected [ 21.816163] [ 21.816317] Memory state around the buggy address: [ 21.816592] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.816924] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.817358] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.817776] ^ [ 21.818092] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.818585] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.819081] ================================================================== [ 21.582392] ================================================================== [ 21.583587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 21.583893] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.584341] [ 21.584551] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.584654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.584689] Hardware name: linux,dummy-virt (DT) [ 21.584729] Call trace: [ 21.584772] show_stack+0x20/0x38 (C) [ 21.584834] dump_stack_lvl+0x8c/0xd0 [ 21.584887] print_report+0x118/0x608 [ 21.584937] kasan_report+0xdc/0x128 [ 21.584986] kasan_check_range+0x100/0x1a8 [ 21.585037] __kasan_check_write+0x20/0x30 [ 21.585086] kasan_atomics_helper+0x7cc/0x4858 [ 21.585137] kasan_atomics+0x198/0x2e8 [ 21.585186] kunit_try_run_case+0x170/0x3f0 [ 21.585237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.585291] kthread+0x318/0x620 [ 21.585338] ret_from_fork+0x10/0x20 [ 21.585389] [ 21.589276] Allocated by task 254: [ 21.589595] kasan_save_stack+0x3c/0x68 [ 21.589974] kasan_save_track+0x20/0x40 [ 21.590313] kasan_save_alloc_info+0x40/0x58 [ 21.590735] __kasan_kmalloc+0xd4/0xd8 [ 21.591178] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.591528] kasan_atomics+0xb8/0x2e8 [ 21.591794] kunit_try_run_case+0x170/0x3f0 [ 21.591967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.592384] kthread+0x318/0x620 [ 21.592614] ret_from_fork+0x10/0x20 [ 21.592910] [ 21.593047] The buggy address belongs to the object at fff00000c66ea700 [ 21.593047] which belongs to the cache kmalloc-64 of size 64 [ 21.593672] The buggy address is located 0 bytes to the right of [ 21.593672] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.594408] [ 21.594690] The buggy address belongs to the physical page: [ 21.595147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.595600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.595987] page_type: f5(slab) [ 21.596176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.596528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.596995] page dumped because: kasan: bad access detected [ 21.597252] [ 21.597360] Memory state around the buggy address: [ 21.597708] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.598052] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.598558] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.599172] ^ [ 21.599503] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.599834] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.600616] ================================================================== [ 21.523038] ================================================================== [ 21.523405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 21.523785] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.524363] [ 21.524550] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.524651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.524685] Hardware name: linux,dummy-virt (DT) [ 21.524726] Call trace: [ 21.524769] show_stack+0x20/0x38 (C) [ 21.524828] dump_stack_lvl+0x8c/0xd0 [ 21.524885] print_report+0x118/0x608 [ 21.524938] kasan_report+0xdc/0x128 [ 21.524990] kasan_check_range+0x100/0x1a8 [ 21.525044] __kasan_check_write+0x20/0x30 [ 21.525095] kasan_atomics_helper+0x684/0x4858 [ 21.525149] kasan_atomics+0x198/0x2e8 [ 21.525200] kunit_try_run_case+0x170/0x3f0 [ 21.525254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.525310] kthread+0x318/0x620 [ 21.525359] ret_from_fork+0x10/0x20 [ 21.525415] [ 21.529963] Allocated by task 254: [ 21.530202] kasan_save_stack+0x3c/0x68 [ 21.530846] kasan_save_track+0x20/0x40 [ 21.531100] kasan_save_alloc_info+0x40/0x58 [ 21.531383] __kasan_kmalloc+0xd4/0xd8 [ 21.531734] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.532093] kasan_atomics+0xb8/0x2e8 [ 21.532343] kunit_try_run_case+0x170/0x3f0 [ 21.532522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.532785] kthread+0x318/0x620 [ 21.533228] ret_from_fork+0x10/0x20 [ 21.533526] [ 21.533643] The buggy address belongs to the object at fff00000c66ea700 [ 21.533643] which belongs to the cache kmalloc-64 of size 64 [ 21.534286] The buggy address is located 0 bytes to the right of [ 21.534286] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.535049] [ 21.535328] The buggy address belongs to the physical page: [ 21.535588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.535987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.536343] page_type: f5(slab) [ 21.536575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.537325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.537710] page dumped because: kasan: bad access detected [ 21.538118] [ 21.538323] Memory state around the buggy address: [ 21.538839] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.539373] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.539669] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.539940] ^ [ 21.540149] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.540417] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.540676] ================================================================== [ 21.640672] ================================================================== [ 21.641166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 21.641643] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.642164] [ 21.642416] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.642573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.642612] Hardware name: linux,dummy-virt (DT) [ 21.642671] Call trace: [ 21.642701] show_stack+0x20/0x38 (C) [ 21.642807] dump_stack_lvl+0x8c/0xd0 [ 21.642881] print_report+0x118/0x608 [ 21.642938] kasan_report+0xdc/0x128 [ 21.642993] kasan_check_range+0x100/0x1a8 [ 21.643051] __kasan_check_write+0x20/0x30 [ 21.643104] kasan_atomics_helper+0x934/0x4858 [ 21.643162] kasan_atomics+0x198/0x2e8 [ 21.643215] kunit_try_run_case+0x170/0x3f0 [ 21.643269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.643327] kthread+0x318/0x620 [ 21.643379] ret_from_fork+0x10/0x20 [ 21.643438] [ 21.647045] Allocated by task 254: [ 21.647349] kasan_save_stack+0x3c/0x68 [ 21.647722] kasan_save_track+0x20/0x40 [ 21.648340] kasan_save_alloc_info+0x40/0x58 [ 21.648732] __kasan_kmalloc+0xd4/0xd8 [ 21.648977] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.649296] kasan_atomics+0xb8/0x2e8 [ 21.649539] kunit_try_run_case+0x170/0x3f0 [ 21.649818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.650262] kthread+0x318/0x620 [ 21.650620] ret_from_fork+0x10/0x20 [ 21.650888] [ 21.651075] The buggy address belongs to the object at fff00000c66ea700 [ 21.651075] which belongs to the cache kmalloc-64 of size 64 [ 21.651780] The buggy address is located 0 bytes to the right of [ 21.651780] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.652462] [ 21.652669] The buggy address belongs to the physical page: [ 21.653038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.653505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.654027] page_type: f5(slab) [ 21.654277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.654829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.655282] page dumped because: kasan: bad access detected [ 21.655555] [ 21.655703] Memory state around the buggy address: [ 21.656087] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.656464] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.656966] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.657378] ^ [ 21.657557] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.658030] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.658375] ================================================================== [ 21.501911] ================================================================== [ 21.502247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 21.502561] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.503202] [ 21.503621] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.503926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.503965] Hardware name: linux,dummy-virt (DT) [ 21.504004] Call trace: [ 21.504037] show_stack+0x20/0x38 (C) [ 21.504101] dump_stack_lvl+0x8c/0xd0 [ 21.504338] print_report+0x118/0x608 [ 21.504406] kasan_report+0xdc/0x128 [ 21.504462] kasan_check_range+0x100/0x1a8 [ 21.504549] __kasan_check_write+0x20/0x30 [ 21.504606] kasan_atomics_helper+0x61c/0x4858 [ 21.504679] kasan_atomics+0x198/0x2e8 [ 21.504734] kunit_try_run_case+0x170/0x3f0 [ 21.504811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.504870] kthread+0x318/0x620 [ 21.504922] ret_from_fork+0x10/0x20 [ 21.504978] [ 21.509106] Allocated by task 254: [ 21.509587] kasan_save_stack+0x3c/0x68 [ 21.509852] kasan_save_track+0x20/0x40 [ 21.510268] kasan_save_alloc_info+0x40/0x58 [ 21.510667] __kasan_kmalloc+0xd4/0xd8 [ 21.510998] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.511264] kasan_atomics+0xb8/0x2e8 [ 21.511628] kunit_try_run_case+0x170/0x3f0 [ 21.512027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.512320] kthread+0x318/0x620 [ 21.512696] ret_from_fork+0x10/0x20 [ 21.513022] [ 21.513224] The buggy address belongs to the object at fff00000c66ea700 [ 21.513224] which belongs to the cache kmalloc-64 of size 64 [ 21.514147] The buggy address is located 0 bytes to the right of [ 21.514147] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.515466] [ 21.515608] The buggy address belongs to the physical page: [ 21.515841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.516441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.516896] page_type: f5(slab) [ 21.517197] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.517782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.518300] page dumped because: kasan: bad access detected [ 21.518640] [ 21.518803] Memory state around the buggy address: [ 21.519007] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.519348] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.520122] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.520358] ^ [ 21.520539] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.521119] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.521579] ================================================================== [ 22.311616] ================================================================== [ 22.312048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 22.312666] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.313012] [ 22.313227] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.313329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.313366] Hardware name: linux,dummy-virt (DT) [ 22.313406] Call trace: [ 22.313435] show_stack+0x20/0x38 (C) [ 22.313495] dump_stack_lvl+0x8c/0xd0 [ 22.313551] print_report+0x118/0x608 [ 22.313603] kasan_report+0xdc/0x128 [ 22.313655] kasan_check_range+0x100/0x1a8 [ 22.313710] __kasan_check_write+0x20/0x30 [ 22.314081] kasan_atomics_helper+0x16d0/0x4858 [ 22.314146] kasan_atomics+0x198/0x2e8 [ 22.314203] kunit_try_run_case+0x170/0x3f0 [ 22.314259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.314320] kthread+0x318/0x620 [ 22.314375] ret_from_fork+0x10/0x20 [ 22.314434] [ 22.317917] Allocated by task 254: [ 22.318301] kasan_save_stack+0x3c/0x68 [ 22.318624] kasan_save_track+0x20/0x40 [ 22.318856] kasan_save_alloc_info+0x40/0x58 [ 22.319263] __kasan_kmalloc+0xd4/0xd8 [ 22.319535] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.319933] kasan_atomics+0xb8/0x2e8 [ 22.320267] kunit_try_run_case+0x170/0x3f0 [ 22.320539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.320802] kthread+0x318/0x620 [ 22.321046] ret_from_fork+0x10/0x20 [ 22.321309] [ 22.321453] The buggy address belongs to the object at fff00000c66ea700 [ 22.321453] which belongs to the cache kmalloc-64 of size 64 [ 22.322070] The buggy address is located 0 bytes to the right of [ 22.322070] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.322450] [ 22.322653] The buggy address belongs to the physical page: [ 22.323159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.323768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.324138] page_type: f5(slab) [ 22.324371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.324827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.325280] page dumped because: kasan: bad access detected [ 22.325597] [ 22.325772] Memory state around the buggy address: [ 22.326031] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.326468] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.326866] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.327278] ^ [ 22.327604] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.328042] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.328403] ================================================================== [ 22.346099] ================================================================== [ 22.346420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 22.346998] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.347724] [ 22.347877] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.347977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.348011] Hardware name: linux,dummy-virt (DT) [ 22.348071] Call trace: [ 22.348110] show_stack+0x20/0x38 (C) [ 22.348172] dump_stack_lvl+0x8c/0xd0 [ 22.348225] print_report+0x118/0x608 [ 22.348278] kasan_report+0xdc/0x128 [ 22.348328] kasan_check_range+0x100/0x1a8 [ 22.348384] __kasan_check_write+0x20/0x30 [ 22.348433] kasan_atomics_helper+0x175c/0x4858 [ 22.348487] kasan_atomics+0x198/0x2e8 [ 22.348537] kunit_try_run_case+0x170/0x3f0 [ 22.348591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.348648] kthread+0x318/0x620 [ 22.348698] ret_from_fork+0x10/0x20 [ 22.348766] [ 22.352045] Allocated by task 254: [ 22.352389] kasan_save_stack+0x3c/0x68 [ 22.352761] kasan_save_track+0x20/0x40 [ 22.352969] kasan_save_alloc_info+0x40/0x58 [ 22.353331] __kasan_kmalloc+0xd4/0xd8 [ 22.353622] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.353889] kasan_atomics+0xb8/0x2e8 [ 22.354166] kunit_try_run_case+0x170/0x3f0 [ 22.354505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.354911] kthread+0x318/0x620 [ 22.355232] ret_from_fork+0x10/0x20 [ 22.355456] [ 22.355645] The buggy address belongs to the object at fff00000c66ea700 [ 22.355645] which belongs to the cache kmalloc-64 of size 64 [ 22.356086] The buggy address is located 0 bytes to the right of [ 22.356086] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.356811] [ 22.357012] The buggy address belongs to the physical page: [ 22.357328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.357719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.358158] page_type: f5(slab) [ 22.358379] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.358823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.359220] page dumped because: kasan: bad access detected [ 22.359497] [ 22.359660] Memory state around the buggy address: [ 22.359935] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.360336] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.360712] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.361028] ^ [ 22.361212] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.361801] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.362083] ================================================================== [ 22.363643] ================================================================== [ 22.364322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 22.365138] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.366049] [ 22.366431] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.366668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.366706] Hardware name: linux,dummy-virt (DT) [ 22.366769] Call trace: [ 22.366803] show_stack+0x20/0x38 (C) [ 22.366869] dump_stack_lvl+0x8c/0xd0 [ 22.366927] print_report+0x118/0x608 [ 22.366985] kasan_report+0xdc/0x128 [ 22.367039] __asan_report_load8_noabort+0x20/0x30 [ 22.367098] kasan_atomics_helper+0x3e20/0x4858 [ 22.367155] kasan_atomics+0x198/0x2e8 [ 22.367211] kunit_try_run_case+0x170/0x3f0 [ 22.367267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.367327] kthread+0x318/0x620 [ 22.367382] ret_from_fork+0x10/0x20 [ 22.367442] [ 22.372157] Allocated by task 254: [ 22.372541] kasan_save_stack+0x3c/0x68 [ 22.372865] kasan_save_track+0x20/0x40 [ 22.373287] kasan_save_alloc_info+0x40/0x58 [ 22.373563] __kasan_kmalloc+0xd4/0xd8 [ 22.374003] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.374320] kasan_atomics+0xb8/0x2e8 [ 22.374731] kunit_try_run_case+0x170/0x3f0 [ 22.375130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.375466] kthread+0x318/0x620 [ 22.375852] ret_from_fork+0x10/0x20 [ 22.376220] [ 22.376458] The buggy address belongs to the object at fff00000c66ea700 [ 22.376458] which belongs to the cache kmalloc-64 of size 64 [ 22.376920] The buggy address is located 0 bytes to the right of [ 22.376920] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.377911] [ 22.378115] The buggy address belongs to the physical page: [ 22.378485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.379259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.379648] page_type: f5(slab) [ 22.380053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.380576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.381152] page dumped because: kasan: bad access detected [ 22.381564] [ 22.381718] Memory state around the buggy address: [ 22.382109] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.382654] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.383204] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.383612] ^ [ 22.383876] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.384289] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.384564] ================================================================== [ 22.251085] ================================================================== [ 22.251822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 22.252598] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.253464] [ 22.253734] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.253943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.253981] Hardware name: linux,dummy-virt (DT) [ 22.254020] Call trace: [ 22.254052] show_stack+0x20/0x38 (C) [ 22.254143] dump_stack_lvl+0x8c/0xd0 [ 22.254206] print_report+0x118/0x608 [ 22.254266] kasan_report+0xdc/0x128 [ 22.254321] __asan_report_load8_noabort+0x20/0x30 [ 22.254384] kasan_atomics_helper+0x3db0/0x4858 [ 22.254450] kasan_atomics+0x198/0x2e8 [ 22.254522] kunit_try_run_case+0x170/0x3f0 [ 22.254594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.254659] kthread+0x318/0x620 [ 22.254716] ret_from_fork+0x10/0x20 [ 22.254801] [ 22.258161] Allocated by task 254: [ 22.258389] kasan_save_stack+0x3c/0x68 [ 22.258662] kasan_save_track+0x20/0x40 [ 22.259521] kasan_save_alloc_info+0x40/0x58 [ 22.259878] __kasan_kmalloc+0xd4/0xd8 [ 22.260192] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.260478] kasan_atomics+0xb8/0x2e8 [ 22.260761] kunit_try_run_case+0x170/0x3f0 [ 22.261051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.261402] kthread+0x318/0x620 [ 22.261775] ret_from_fork+0x10/0x20 [ 22.262055] [ 22.262260] The buggy address belongs to the object at fff00000c66ea700 [ 22.262260] which belongs to the cache kmalloc-64 of size 64 [ 22.262824] The buggy address is located 0 bytes to the right of [ 22.262824] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.263421] [ 22.263556] The buggy address belongs to the physical page: [ 22.264228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.264618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.265166] page_type: f5(slab) [ 22.265513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.266045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.266593] page dumped because: kasan: bad access detected [ 22.267238] [ 22.267487] Memory state around the buggy address: [ 22.267689] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.268009] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.268332] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.268670] ^ [ 22.269576] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.270176] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.270724] ================================================================== [ 21.350873] ================================================================== [ 21.351207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 21.351617] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.352097] [ 21.352264] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.352362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.352396] Hardware name: linux,dummy-virt (DT) [ 21.352435] Call trace: [ 21.352463] show_stack+0x20/0x38 (C) [ 21.352522] dump_stack_lvl+0x8c/0xd0 [ 21.352579] print_report+0x118/0x608 [ 21.352631] kasan_report+0xdc/0x128 [ 21.352686] kasan_check_range+0x100/0x1a8 [ 21.352788] __kasan_check_write+0x20/0x30 [ 21.352846] kasan_atomics_helper+0x32c/0x4858 [ 21.352903] kasan_atomics+0x198/0x2e8 [ 21.352956] kunit_try_run_case+0x170/0x3f0 [ 21.353013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.353072] kthread+0x318/0x620 [ 21.353124] ret_from_fork+0x10/0x20 [ 21.353181] [ 21.356233] Allocated by task 254: [ 21.356411] kasan_save_stack+0x3c/0x68 [ 21.356703] kasan_save_track+0x20/0x40 [ 21.357943] kasan_save_alloc_info+0x40/0x58 [ 21.358213] __kasan_kmalloc+0xd4/0xd8 [ 21.358436] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.358910] kasan_atomics+0xb8/0x2e8 [ 21.359127] kunit_try_run_case+0x170/0x3f0 [ 21.359368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.359706] kthread+0x318/0x620 [ 21.359981] ret_from_fork+0x10/0x20 [ 21.360204] [ 21.360337] The buggy address belongs to the object at fff00000c66ea700 [ 21.360337] which belongs to the cache kmalloc-64 of size 64 [ 21.360862] The buggy address is located 0 bytes to the right of [ 21.360862] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.361430] [ 21.361541] The buggy address belongs to the physical page: [ 21.361819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.362196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.362549] page_type: f5(slab) [ 21.363462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.363808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.364143] page dumped because: kasan: bad access detected [ 21.364457] [ 21.364599] Memory state around the buggy address: [ 21.364974] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.365284] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.365618] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.365941] ^ [ 21.366232] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.366599] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.366946] ================================================================== [ 22.218307] ================================================================== [ 22.218929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 22.219285] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.219646] [ 22.219836] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.219938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.219974] Hardware name: linux,dummy-virt (DT) [ 22.220012] Call trace: [ 22.220042] show_stack+0x20/0x38 (C) [ 22.220102] dump_stack_lvl+0x8c/0xd0 [ 22.220160] print_report+0x118/0x608 [ 22.220216] kasan_report+0xdc/0x128 [ 22.220267] kasan_check_range+0x100/0x1a8 [ 22.220321] __kasan_check_write+0x20/0x30 [ 22.220372] kasan_atomics_helper+0x154c/0x4858 [ 22.220426] kasan_atomics+0x198/0x2e8 [ 22.220478] kunit_try_run_case+0x170/0x3f0 [ 22.220532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.220589] kthread+0x318/0x620 [ 22.220640] ret_from_fork+0x10/0x20 [ 22.220694] [ 22.223638] Allocated by task 254: [ 22.223868] kasan_save_stack+0x3c/0x68 [ 22.224130] kasan_save_track+0x20/0x40 [ 22.224423] kasan_save_alloc_info+0x40/0x58 [ 22.224642] __kasan_kmalloc+0xd4/0xd8 [ 22.224914] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.225177] kasan_atomics+0xb8/0x2e8 [ 22.225415] kunit_try_run_case+0x170/0x3f0 [ 22.225682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.225946] kthread+0x318/0x620 [ 22.226179] ret_from_fork+0x10/0x20 [ 22.226401] [ 22.226534] The buggy address belongs to the object at fff00000c66ea700 [ 22.226534] which belongs to the cache kmalloc-64 of size 64 [ 22.227002] The buggy address is located 0 bytes to the right of [ 22.227002] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.227594] [ 22.227786] The buggy address belongs to the physical page: [ 22.227997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.228436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.228807] page_type: f5(slab) [ 22.229010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.229359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.229830] page dumped because: kasan: bad access detected [ 22.230111] [ 22.230304] Memory state around the buggy address: [ 22.230595] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.231052] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.231387] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.231679] ^ [ 22.232034] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.232448] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.232784] ================================================================== [ 22.178304] ================================================================== [ 22.178796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 22.179374] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.179728] [ 22.179895] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.180000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.180038] Hardware name: linux,dummy-virt (DT) [ 22.180076] Call trace: [ 22.180108] show_stack+0x20/0x38 (C) [ 22.180172] dump_stack_lvl+0x8c/0xd0 [ 22.180229] print_report+0x118/0x608 [ 22.180284] kasan_report+0xdc/0x128 [ 22.180337] kasan_check_range+0x100/0x1a8 [ 22.180393] __kasan_check_write+0x20/0x30 [ 22.180445] kasan_atomics_helper+0x147c/0x4858 [ 22.180500] kasan_atomics+0x198/0x2e8 [ 22.180553] kunit_try_run_case+0x170/0x3f0 [ 22.180607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.180664] kthread+0x318/0x620 [ 22.180714] ret_from_fork+0x10/0x20 [ 22.180789] [ 22.185345] Allocated by task 254: [ 22.185677] kasan_save_stack+0x3c/0x68 [ 22.185929] kasan_save_track+0x20/0x40 [ 22.186175] kasan_save_alloc_info+0x40/0x58 [ 22.186463] __kasan_kmalloc+0xd4/0xd8 [ 22.186695] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.186963] kasan_atomics+0xb8/0x2e8 [ 22.187190] kunit_try_run_case+0x170/0x3f0 [ 22.187462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.188327] kthread+0x318/0x620 [ 22.188570] ret_from_fork+0x10/0x20 [ 22.188760] [ 22.189116] The buggy address belongs to the object at fff00000c66ea700 [ 22.189116] which belongs to the cache kmalloc-64 of size 64 [ 22.189946] The buggy address is located 0 bytes to the right of [ 22.189946] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.190669] [ 22.190864] The buggy address belongs to the physical page: [ 22.191121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.191462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.191781] page_type: f5(slab) [ 22.191994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.192326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.192651] page dumped because: kasan: bad access detected [ 22.193928] [ 22.194080] Memory state around the buggy address: [ 22.194353] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.194773] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.195093] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.195547] ^ [ 22.195904] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.196424] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.196820] ================================================================== [ 21.732385] ================================================================== [ 21.732852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 21.733507] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.733944] [ 21.734156] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.734258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.734292] Hardware name: linux,dummy-virt (DT) [ 21.734331] Call trace: [ 21.734359] show_stack+0x20/0x38 (C) [ 21.734444] dump_stack_lvl+0x8c/0xd0 [ 21.734535] print_report+0x118/0x608 [ 21.734592] kasan_report+0xdc/0x128 [ 21.734667] __asan_report_load4_noabort+0x20/0x30 [ 21.734724] kasan_atomics_helper+0x3dcc/0x4858 [ 21.734797] kasan_atomics+0x198/0x2e8 [ 21.734854] kunit_try_run_case+0x170/0x3f0 [ 21.734913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.734976] kthread+0x318/0x620 [ 21.735029] ret_from_fork+0x10/0x20 [ 21.735118] [ 21.738235] Allocated by task 254: [ 21.738588] kasan_save_stack+0x3c/0x68 [ 21.738907] kasan_save_track+0x20/0x40 [ 21.739278] kasan_save_alloc_info+0x40/0x58 [ 21.739572] __kasan_kmalloc+0xd4/0xd8 [ 21.739816] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.740002] kasan_atomics+0xb8/0x2e8 [ 21.740357] kunit_try_run_case+0x170/0x3f0 [ 21.740743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.741115] kthread+0x318/0x620 [ 21.741320] ret_from_fork+0x10/0x20 [ 21.741610] [ 21.741818] The buggy address belongs to the object at fff00000c66ea700 [ 21.741818] which belongs to the cache kmalloc-64 of size 64 [ 21.742382] The buggy address is located 0 bytes to the right of [ 21.742382] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.743185] [ 21.743389] The buggy address belongs to the physical page: [ 21.743658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.744135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.744438] page_type: f5(slab) [ 21.744747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.745203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.745514] page dumped because: kasan: bad access detected [ 21.745924] [ 21.746041] Memory state around the buggy address: [ 21.746381] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.746864] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.747189] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.747681] ^ [ 21.748016] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.748356] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.748758] ================================================================== [ 21.924103] ================================================================== [ 21.924531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 21.924916] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.925218] [ 21.925431] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.925535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.925573] Hardware name: linux,dummy-virt (DT) [ 21.925614] Call trace: [ 21.925644] show_stack+0x20/0x38 (C) [ 21.925706] dump_stack_lvl+0x8c/0xd0 [ 21.926614] print_report+0x118/0x608 [ 21.926686] kasan_report+0xdc/0x128 [ 21.926750] kasan_check_range+0x100/0x1a8 [ 21.926811] __kasan_check_write+0x20/0x30 [ 21.926862] kasan_atomics_helper+0xe44/0x4858 [ 21.926918] kasan_atomics+0x198/0x2e8 [ 21.926970] kunit_try_run_case+0x170/0x3f0 [ 21.927023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.927081] kthread+0x318/0x620 [ 21.927130] ret_from_fork+0x10/0x20 [ 21.927187] [ 21.930577] Allocated by task 254: [ 21.930789] kasan_save_stack+0x3c/0x68 [ 21.931165] kasan_save_track+0x20/0x40 [ 21.931478] kasan_save_alloc_info+0x40/0x58 [ 21.931784] __kasan_kmalloc+0xd4/0xd8 [ 21.932117] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.932392] kasan_atomics+0xb8/0x2e8 [ 21.932624] kunit_try_run_case+0x170/0x3f0 [ 21.933013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.933326] kthread+0x318/0x620 [ 21.933664] ret_from_fork+0x10/0x20 [ 21.933923] [ 21.934060] The buggy address belongs to the object at fff00000c66ea700 [ 21.934060] which belongs to the cache kmalloc-64 of size 64 [ 21.934632] The buggy address is located 0 bytes to the right of [ 21.934632] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.935365] [ 21.935481] The buggy address belongs to the physical page: [ 21.935833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.936250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.936540] page_type: f5(slab) [ 21.936797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.937228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.937627] page dumped because: kasan: bad access detected [ 21.937892] [ 21.938087] Memory state around the buggy address: [ 21.938359] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.938712] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.939074] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.939447] ^ [ 21.939700] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.939959] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.940173] ================================================================== [ 21.367825] ================================================================== [ 21.368219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 21.368622] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.370027] [ 21.370209] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.370318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.370352] Hardware name: linux,dummy-virt (DT) [ 21.370393] Call trace: [ 21.370424] show_stack+0x20/0x38 (C) [ 21.370506] dump_stack_lvl+0x8c/0xd0 [ 21.370565] print_report+0x118/0x608 [ 21.370621] kasan_report+0xdc/0x128 [ 21.370676] __asan_report_store4_noabort+0x20/0x30 [ 21.370734] kasan_atomics_helper+0x3f94/0x4858 [ 21.370824] kasan_atomics+0x198/0x2e8 [ 21.370878] kunit_try_run_case+0x170/0x3f0 [ 21.370935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.370994] kthread+0x318/0x620 [ 21.371046] ret_from_fork+0x10/0x20 [ 21.371103] [ 21.374026] Allocated by task 254: [ 21.374256] kasan_save_stack+0x3c/0x68 [ 21.374439] kasan_save_track+0x20/0x40 [ 21.374798] kasan_save_alloc_info+0x40/0x58 [ 21.375050] __kasan_kmalloc+0xd4/0xd8 [ 21.375224] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.375611] kasan_atomics+0xb8/0x2e8 [ 21.375890] kunit_try_run_case+0x170/0x3f0 [ 21.376129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.376519] kthread+0x318/0x620 [ 21.376683] ret_from_fork+0x10/0x20 [ 21.376855] [ 21.377021] The buggy address belongs to the object at fff00000c66ea700 [ 21.377021] which belongs to the cache kmalloc-64 of size 64 [ 21.377630] The buggy address is located 0 bytes to the right of [ 21.377630] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.378305] [ 21.378434] The buggy address belongs to the physical page: [ 21.378859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.379153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.379547] page_type: f5(slab) [ 21.379925] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.380172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.380556] page dumped because: kasan: bad access detected [ 21.380958] [ 21.381128] Memory state around the buggy address: [ 21.381415] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.381801] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.382125] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.382491] ^ [ 21.382766] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.383523] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.383840] ================================================================== [ 21.317668] ================================================================== [ 21.317954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 21.318438] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.318681] [ 21.318816] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.318935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.318973] Hardware name: linux,dummy-virt (DT) [ 21.319014] Call trace: [ 21.319043] show_stack+0x20/0x38 (C) [ 21.319103] dump_stack_lvl+0x8c/0xd0 [ 21.319159] print_report+0x118/0x608 [ 21.319214] kasan_report+0xdc/0x128 [ 21.319268] kasan_check_range+0x100/0x1a8 [ 21.319324] __kasan_check_read+0x20/0x30 [ 21.319377] kasan_atomics_helper+0x2b0/0x4858 [ 21.319433] kasan_atomics+0x198/0x2e8 [ 21.319485] kunit_try_run_case+0x170/0x3f0 [ 21.319542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.319600] kthread+0x318/0x620 [ 21.319650] ret_from_fork+0x10/0x20 [ 21.319705] [ 21.323846] Allocated by task 254: [ 21.324163] kasan_save_stack+0x3c/0x68 [ 21.324423] kasan_save_track+0x20/0x40 [ 21.324680] kasan_save_alloc_info+0x40/0x58 [ 21.324856] __kasan_kmalloc+0xd4/0xd8 [ 21.325059] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.325403] kasan_atomics+0xb8/0x2e8 [ 21.325656] kunit_try_run_case+0x170/0x3f0 [ 21.325914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.326235] kthread+0x318/0x620 [ 21.326637] ret_from_fork+0x10/0x20 [ 21.326874] [ 21.327024] The buggy address belongs to the object at fff00000c66ea700 [ 21.327024] which belongs to the cache kmalloc-64 of size 64 [ 21.327497] The buggy address is located 0 bytes to the right of [ 21.327497] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.328130] [ 21.328302] The buggy address belongs to the physical page: [ 21.328656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.329007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.329401] page_type: f5(slab) [ 21.329668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.330040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.330449] page dumped because: kasan: bad access detected [ 21.330791] [ 21.330917] Memory state around the buggy address: [ 21.331108] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.331500] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.331897] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.332160] ^ [ 21.332380] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.332611] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.333613] ================================================================== [ 21.887666] ================================================================== [ 21.888059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 21.888545] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.888926] [ 21.889068] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.889161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.889194] Hardware name: linux,dummy-virt (DT) [ 21.889229] Call trace: [ 21.889256] show_stack+0x20/0x38 (C) [ 21.889308] dump_stack_lvl+0x8c/0xd0 [ 21.889359] print_report+0x118/0x608 [ 21.889408] kasan_report+0xdc/0x128 [ 21.889457] kasan_check_range+0x100/0x1a8 [ 21.889506] __kasan_check_read+0x20/0x30 [ 21.889554] kasan_atomics_helper+0xdd4/0x4858 [ 21.889603] kasan_atomics+0x198/0x2e8 [ 21.889651] kunit_try_run_case+0x170/0x3f0 [ 21.889701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.889765] kthread+0x318/0x620 [ 21.889817] ret_from_fork+0x10/0x20 [ 21.889867] [ 21.893897] Allocated by task 254: [ 21.894131] kasan_save_stack+0x3c/0x68 [ 21.894526] kasan_save_track+0x20/0x40 [ 21.894709] kasan_save_alloc_info+0x40/0x58 [ 21.894891] __kasan_kmalloc+0xd4/0xd8 [ 21.895327] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.895605] kasan_atomics+0xb8/0x2e8 [ 21.895791] kunit_try_run_case+0x170/0x3f0 [ 21.895967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.896447] kthread+0x318/0x620 [ 21.896777] ret_from_fork+0x10/0x20 [ 21.897059] [ 21.897275] The buggy address belongs to the object at fff00000c66ea700 [ 21.897275] which belongs to the cache kmalloc-64 of size 64 [ 21.897921] The buggy address is located 0 bytes to the right of [ 21.897921] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.898295] [ 21.898483] The buggy address belongs to the physical page: [ 21.898925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.899468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.899835] page_type: f5(slab) [ 21.900145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.900700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.901097] page dumped because: kasan: bad access detected [ 21.901415] [ 21.901532] Memory state around the buggy address: [ 21.901932] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.902311] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.902669] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.903044] ^ [ 21.903292] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.903642] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.904422] ==================================================================
[ 15.534464] ================================================================== [ 15.534828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 15.535567] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.535916] [ 15.536030] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.536087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.536101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.536124] Call Trace: [ 15.536146] <TASK> [ 15.536168] dump_stack_lvl+0x73/0xb0 [ 15.536197] print_report+0xd1/0x650 [ 15.536221] ? __virt_addr_valid+0x1db/0x2d0 [ 15.536245] ? kasan_atomics_helper+0x13b6/0x5450 [ 15.536267] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.536293] ? kasan_atomics_helper+0x13b6/0x5450 [ 15.536315] kasan_report+0x140/0x180 [ 15.536339] ? kasan_atomics_helper+0x13b6/0x5450 [ 15.536366] kasan_check_range+0x10c/0x1c0 [ 15.536392] __kasan_check_read+0x15/0x20 [ 15.536415] kasan_atomics_helper+0x13b6/0x5450 [ 15.536438] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.536460] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.536487] ? kasan_atomics+0x153/0x310 [ 15.536514] kasan_atomics+0x1dd/0x310 [ 15.536537] ? __pfx_kasan_atomics+0x10/0x10 [ 15.536562] ? __pfx_read_tsc+0x10/0x10 [ 15.536585] ? ktime_get_ts64+0x86/0x230 [ 15.536612] kunit_try_run_case+0x1a6/0x480 [ 15.536639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.536661] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.536687] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.536713] ? __kthread_parkme+0x82/0x160 [ 15.536737] ? preempt_count_sub+0x50/0x80 [ 15.536763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.536786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.536813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.536853] kthread+0x324/0x6e0 [ 15.536875] ? trace_preempt_on+0x20/0xc0 [ 15.536900] ? __pfx_kthread+0x10/0x10 [ 15.536923] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.536948] ? calculate_sigpending+0x7b/0xa0 [ 15.536971] ? __pfx_kthread+0x10/0x10 [ 15.536995] ret_from_fork+0x41/0x80 [ 15.537016] ? __pfx_kthread+0x10/0x10 [ 15.537038] ret_from_fork_asm+0x1a/0x30 [ 15.537082] </TASK> [ 15.537093] [ 15.544696] Allocated by task 273: [ 15.544885] kasan_save_stack+0x45/0x70 [ 15.545094] kasan_save_track+0x18/0x40 [ 15.545300] kasan_save_alloc_info+0x3b/0x50 [ 15.545518] __kasan_kmalloc+0xb7/0xc0 [ 15.545667] __kmalloc_cache_noprof+0x18a/0x420 [ 15.545867] kasan_atomics+0x96/0x310 [ 15.546002] kunit_try_run_case+0x1a6/0x480 [ 15.546149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.546328] kthread+0x324/0x6e0 [ 15.546455] ret_from_fork+0x41/0x80 [ 15.546585] ret_from_fork_asm+0x1a/0x30 [ 15.546726] [ 15.546811] The buggy address belongs to the object at ffff888101b3e000 [ 15.546811] which belongs to the cache kmalloc-64 of size 64 [ 15.547503] The buggy address is located 0 bytes to the right of [ 15.547503] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.548074] [ 15.548173] The buggy address belongs to the physical page: [ 15.548425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.548778] flags: 0x200000000000000(node=0|zone=2) [ 15.549027] page_type: f5(slab) [ 15.549216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.549449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.549676] page dumped because: kasan: bad access detected [ 15.549862] [ 15.549958] Memory state around the buggy address: [ 15.550339] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.550666] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.550998] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.551658] ^ [ 15.551864] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.552189] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.552462] ================================================================== [ 15.182747] ================================================================== [ 15.183282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 15.183631] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.183955] [ 15.184044] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.184090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.184103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.184127] Call Trace: [ 15.184150] <TASK> [ 15.184172] dump_stack_lvl+0x73/0xb0 [ 15.184201] print_report+0xd1/0x650 [ 15.184224] ? __virt_addr_valid+0x1db/0x2d0 [ 15.184248] ? kasan_atomics_helper+0xb6b/0x5450 [ 15.184270] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.184296] ? kasan_atomics_helper+0xb6b/0x5450 [ 15.184318] kasan_report+0x140/0x180 [ 15.184341] ? kasan_atomics_helper+0xb6b/0x5450 [ 15.184366] kasan_check_range+0x10c/0x1c0 [ 15.184392] __kasan_check_write+0x18/0x20 [ 15.184415] kasan_atomics_helper+0xb6b/0x5450 [ 15.184437] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.184460] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.184487] ? kasan_atomics+0x153/0x310 [ 15.184513] kasan_atomics+0x1dd/0x310 [ 15.184535] ? __pfx_kasan_atomics+0x10/0x10 [ 15.184559] ? __pfx_read_tsc+0x10/0x10 [ 15.184583] ? ktime_get_ts64+0x86/0x230 [ 15.184610] kunit_try_run_case+0x1a6/0x480 [ 15.184634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.184657] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.184680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.184707] ? __kthread_parkme+0x82/0x160 [ 15.184731] ? preempt_count_sub+0x50/0x80 [ 15.184757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.184781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.184807] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.184834] kthread+0x324/0x6e0 [ 15.184890] ? trace_preempt_on+0x20/0xc0 [ 15.184917] ? __pfx_kthread+0x10/0x10 [ 15.184940] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.184965] ? calculate_sigpending+0x7b/0xa0 [ 15.184989] ? __pfx_kthread+0x10/0x10 [ 15.185012] ret_from_fork+0x41/0x80 [ 15.185060] ? __pfx_kthread+0x10/0x10 [ 15.185084] ret_from_fork_asm+0x1a/0x30 [ 15.185117] </TASK> [ 15.185129] [ 15.193266] Allocated by task 273: [ 15.193449] kasan_save_stack+0x45/0x70 [ 15.193685] kasan_save_track+0x18/0x40 [ 15.193846] kasan_save_alloc_info+0x3b/0x50 [ 15.193993] __kasan_kmalloc+0xb7/0xc0 [ 15.194340] __kmalloc_cache_noprof+0x18a/0x420 [ 15.194584] kasan_atomics+0x96/0x310 [ 15.194793] kunit_try_run_case+0x1a6/0x480 [ 15.195023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.195296] kthread+0x324/0x6e0 [ 15.195440] ret_from_fork+0x41/0x80 [ 15.195570] ret_from_fork_asm+0x1a/0x30 [ 15.195707] [ 15.195803] The buggy address belongs to the object at ffff888101b3e000 [ 15.195803] which belongs to the cache kmalloc-64 of size 64 [ 15.196506] The buggy address is located 0 bytes to the right of [ 15.196506] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.196870] [ 15.196953] The buggy address belongs to the physical page: [ 15.197396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.197779] flags: 0x200000000000000(node=0|zone=2) [ 15.198064] page_type: f5(slab) [ 15.198258] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.198519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.198738] page dumped because: kasan: bad access detected [ 15.198955] [ 15.199068] Memory state around the buggy address: [ 15.199367] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.199739] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.200124] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.200464] ^ [ 15.200672] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.200922] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.201133] ================================================================== [ 15.696651] ================================================================== [ 15.697443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 15.700157] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.701163] [ 15.701373] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.701428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.701443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.701466] Call Trace: [ 15.701492] <TASK> [ 15.701514] dump_stack_lvl+0x73/0xb0 [ 15.701552] print_report+0xd1/0x650 [ 15.701577] ? __virt_addr_valid+0x1db/0x2d0 [ 15.701602] ? kasan_atomics_helper+0x1780/0x5450 [ 15.701626] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.701652] ? kasan_atomics_helper+0x1780/0x5450 [ 15.701674] kasan_report+0x140/0x180 [ 15.701696] ? kasan_atomics_helper+0x1780/0x5450 [ 15.701722] kasan_check_range+0x10c/0x1c0 [ 15.701752] __kasan_check_write+0x18/0x20 [ 15.701775] kasan_atomics_helper+0x1780/0x5450 [ 15.701798] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.701819] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.701855] ? kasan_atomics+0x153/0x310 [ 15.701881] kasan_atomics+0x1dd/0x310 [ 15.701903] ? __pfx_kasan_atomics+0x10/0x10 [ 15.701928] ? __pfx_read_tsc+0x10/0x10 [ 15.701951] ? ktime_get_ts64+0x86/0x230 [ 15.701977] kunit_try_run_case+0x1a6/0x480 [ 15.702002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.702025] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.702058] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.702085] ? __kthread_parkme+0x82/0x160 [ 15.702109] ? preempt_count_sub+0x50/0x80 [ 15.702134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.702157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.702184] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.702210] kthread+0x324/0x6e0 [ 15.702232] ? trace_preempt_on+0x20/0xc0 [ 15.702257] ? __pfx_kthread+0x10/0x10 [ 15.702281] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.702304] ? calculate_sigpending+0x7b/0xa0 [ 15.702328] ? __pfx_kthread+0x10/0x10 [ 15.702351] ret_from_fork+0x41/0x80 [ 15.702370] ? __pfx_kthread+0x10/0x10 [ 15.702393] ret_from_fork_asm+0x1a/0x30 [ 15.702426] </TASK> [ 15.702437] [ 15.716329] Allocated by task 273: [ 15.716556] kasan_save_stack+0x45/0x70 [ 15.716760] kasan_save_track+0x18/0x40 [ 15.716930] kasan_save_alloc_info+0x3b/0x50 [ 15.717083] __kasan_kmalloc+0xb7/0xc0 [ 15.717220] __kmalloc_cache_noprof+0x18a/0x420 [ 15.717443] kasan_atomics+0x96/0x310 [ 15.717645] kunit_try_run_case+0x1a6/0x480 [ 15.717804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.718008] kthread+0x324/0x6e0 [ 15.718533] ret_from_fork+0x41/0x80 [ 15.718956] ret_from_fork_asm+0x1a/0x30 [ 15.719343] [ 15.719524] The buggy address belongs to the object at ffff888101b3e000 [ 15.719524] which belongs to the cache kmalloc-64 of size 64 [ 15.720784] The buggy address is located 0 bytes to the right of [ 15.720784] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.721905] [ 15.721986] The buggy address belongs to the physical page: [ 15.722207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.722933] flags: 0x200000000000000(node=0|zone=2) [ 15.723425] page_type: f5(slab) [ 15.723738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.724476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.724943] page dumped because: kasan: bad access detected [ 15.725300] [ 15.725487] Memory state around the buggy address: [ 15.725942] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.726659] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.726905] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.727269] ^ [ 15.727714] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.728382] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.729110] ================================================================== [ 15.201730] ================================================================== [ 15.202121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 15.202486] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.202873] [ 15.202986] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.203068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.203099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.203127] Call Trace: [ 15.203154] <TASK> [ 15.203196] dump_stack_lvl+0x73/0xb0 [ 15.203250] print_report+0xd1/0x650 [ 15.203277] ? __virt_addr_valid+0x1db/0x2d0 [ 15.203301] ? kasan_atomics_helper+0xc71/0x5450 [ 15.203323] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.203351] ? kasan_atomics_helper+0xc71/0x5450 [ 15.203374] kasan_report+0x140/0x180 [ 15.203400] ? kasan_atomics_helper+0xc71/0x5450 [ 15.203442] kasan_check_range+0x10c/0x1c0 [ 15.203467] __kasan_check_write+0x18/0x20 [ 15.203491] kasan_atomics_helper+0xc71/0x5450 [ 15.203514] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.203536] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.203562] ? kasan_atomics+0x153/0x310 [ 15.203606] kasan_atomics+0x1dd/0x310 [ 15.203630] ? __pfx_kasan_atomics+0x10/0x10 [ 15.203654] ? __pfx_read_tsc+0x10/0x10 [ 15.203677] ? ktime_get_ts64+0x86/0x230 [ 15.203704] kunit_try_run_case+0x1a6/0x480 [ 15.203728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203768] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.203792] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.203819] ? __kthread_parkme+0x82/0x160 [ 15.203856] ? preempt_count_sub+0x50/0x80 [ 15.203882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.203933] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.203960] kthread+0x324/0x6e0 [ 15.203983] ? trace_preempt_on+0x20/0xc0 [ 15.204008] ? __pfx_kthread+0x10/0x10 [ 15.204032] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.204068] ? calculate_sigpending+0x7b/0xa0 [ 15.204090] ? __pfx_kthread+0x10/0x10 [ 15.204114] ret_from_fork+0x41/0x80 [ 15.204135] ? __pfx_kthread+0x10/0x10 [ 15.204158] ret_from_fork_asm+0x1a/0x30 [ 15.204191] </TASK> [ 15.204203] [ 15.211896] Allocated by task 273: [ 15.212121] kasan_save_stack+0x45/0x70 [ 15.212364] kasan_save_track+0x18/0x40 [ 15.212570] kasan_save_alloc_info+0x3b/0x50 [ 15.212740] __kasan_kmalloc+0xb7/0xc0 [ 15.212915] __kmalloc_cache_noprof+0x18a/0x420 [ 15.213152] kasan_atomics+0x96/0x310 [ 15.213381] kunit_try_run_case+0x1a6/0x480 [ 15.213575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.213903] kthread+0x324/0x6e0 [ 15.214111] ret_from_fork+0x41/0x80 [ 15.214302] ret_from_fork_asm+0x1a/0x30 [ 15.214501] [ 15.214602] The buggy address belongs to the object at ffff888101b3e000 [ 15.214602] which belongs to the cache kmalloc-64 of size 64 [ 15.215131] The buggy address is located 0 bytes to the right of [ 15.215131] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.215674] [ 15.215877] The buggy address belongs to the physical page: [ 15.216149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.216390] flags: 0x200000000000000(node=0|zone=2) [ 15.216554] page_type: f5(slab) [ 15.216706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.217068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.217427] page dumped because: kasan: bad access detected [ 15.217699] [ 15.217804] Memory state around the buggy address: [ 15.218048] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.218287] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.218594] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.218936] ^ [ 15.219176] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.219447] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.219797] ================================================================== [ 15.321166] ================================================================== [ 15.321519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 15.321895] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.322544] [ 15.322661] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.322707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.322721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.322745] Call Trace: [ 15.322767] <TASK> [ 15.322788] dump_stack_lvl+0x73/0xb0 [ 15.322817] print_report+0xd1/0x650 [ 15.322851] ? __virt_addr_valid+0x1db/0x2d0 [ 15.322875] ? kasan_atomics_helper+0xfaa/0x5450 [ 15.322897] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.322924] ? kasan_atomics_helper+0xfaa/0x5450 [ 15.322946] kasan_report+0x140/0x180 [ 15.322968] ? kasan_atomics_helper+0xfaa/0x5450 [ 15.322994] kasan_check_range+0x10c/0x1c0 [ 15.323018] __kasan_check_write+0x18/0x20 [ 15.323041] kasan_atomics_helper+0xfaa/0x5450 [ 15.323074] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.323096] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.323122] ? kasan_atomics+0x153/0x310 [ 15.323149] kasan_atomics+0x1dd/0x310 [ 15.323172] ? __pfx_kasan_atomics+0x10/0x10 [ 15.323198] ? __pfx_read_tsc+0x10/0x10 [ 15.323221] ? ktime_get_ts64+0x86/0x230 [ 15.323248] kunit_try_run_case+0x1a6/0x480 [ 15.323272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.323294] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.323317] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.323343] ? __kthread_parkme+0x82/0x160 [ 15.323367] ? preempt_count_sub+0x50/0x80 [ 15.323393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.323415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.323442] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.323469] kthread+0x324/0x6e0 [ 15.323492] ? trace_preempt_on+0x20/0xc0 [ 15.323517] ? __pfx_kthread+0x10/0x10 [ 15.323540] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.323564] ? calculate_sigpending+0x7b/0xa0 [ 15.323586] ? __pfx_kthread+0x10/0x10 [ 15.323611] ret_from_fork+0x41/0x80 [ 15.323630] ? __pfx_kthread+0x10/0x10 [ 15.323654] ret_from_fork_asm+0x1a/0x30 [ 15.323686] </TASK> [ 15.323709] [ 15.331466] Allocated by task 273: [ 15.331616] kasan_save_stack+0x45/0x70 [ 15.331772] kasan_save_track+0x18/0x40 [ 15.331993] kasan_save_alloc_info+0x3b/0x50 [ 15.332256] __kasan_kmalloc+0xb7/0xc0 [ 15.332444] __kmalloc_cache_noprof+0x18a/0x420 [ 15.332666] kasan_atomics+0x96/0x310 [ 15.332860] kunit_try_run_case+0x1a6/0x480 [ 15.333083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.333314] kthread+0x324/0x6e0 [ 15.333541] ret_from_fork+0x41/0x80 [ 15.333787] ret_from_fork_asm+0x1a/0x30 [ 15.334039] [ 15.334168] The buggy address belongs to the object at ffff888101b3e000 [ 15.334168] which belongs to the cache kmalloc-64 of size 64 [ 15.334729] The buggy address is located 0 bytes to the right of [ 15.334729] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.335220] [ 15.335296] The buggy address belongs to the physical page: [ 15.335465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.335791] flags: 0x200000000000000(node=0|zone=2) [ 15.336037] page_type: f5(slab) [ 15.336295] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.336676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.337018] page dumped because: kasan: bad access detected [ 15.337442] [ 15.337520] Memory state around the buggy address: [ 15.337720] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.338077] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.338416] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.338742] ^ [ 15.338974] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.339373] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.339668] ================================================================== [ 16.034289] ================================================================== [ 16.034659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 16.035053] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 16.035386] [ 16.035474] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 16.035524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.035537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.035560] Call Trace: [ 16.035582] <TASK> [ 16.035604] dump_stack_lvl+0x73/0xb0 [ 16.035632] print_report+0xd1/0x650 [ 16.035655] ? __virt_addr_valid+0x1db/0x2d0 [ 16.035679] ? kasan_atomics_helper+0x20c9/0x5450 [ 16.035700] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.035726] ? kasan_atomics_helper+0x20c9/0x5450 [ 16.035750] kasan_report+0x140/0x180 [ 16.035773] ? kasan_atomics_helper+0x20c9/0x5450 [ 16.035799] kasan_check_range+0x10c/0x1c0 [ 16.035823] __kasan_check_write+0x18/0x20 [ 16.035858] kasan_atomics_helper+0x20c9/0x5450 [ 16.035881] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.035903] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.035929] ? kasan_atomics+0x153/0x310 [ 16.035954] kasan_atomics+0x1dd/0x310 [ 16.035977] ? __pfx_kasan_atomics+0x10/0x10 [ 16.036001] ? __pfx_read_tsc+0x10/0x10 [ 16.036023] ? ktime_get_ts64+0x86/0x230 [ 16.036050] kunit_try_run_case+0x1a6/0x480 [ 16.036076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.036098] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.036122] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.036148] ? __kthread_parkme+0x82/0x160 [ 16.036171] ? preempt_count_sub+0x50/0x80 [ 16.036197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.036259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.036288] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.036340] kthread+0x324/0x6e0 [ 16.036390] ? trace_preempt_on+0x20/0xc0 [ 16.036415] ? __pfx_kthread+0x10/0x10 [ 16.036439] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.036462] ? calculate_sigpending+0x7b/0xa0 [ 16.036485] ? __pfx_kthread+0x10/0x10 [ 16.036519] ret_from_fork+0x41/0x80 [ 16.036539] ? __pfx_kthread+0x10/0x10 [ 16.036563] ret_from_fork_asm+0x1a/0x30 [ 16.036596] </TASK> [ 16.036608] [ 16.048287] Allocated by task 273: [ 16.048543] kasan_save_stack+0x45/0x70 [ 16.048878] kasan_save_track+0x18/0x40 [ 16.049188] kasan_save_alloc_info+0x3b/0x50 [ 16.049501] __kasan_kmalloc+0xb7/0xc0 [ 16.049697] __kmalloc_cache_noprof+0x18a/0x420 [ 16.049927] kasan_atomics+0x96/0x310 [ 16.050374] kunit_try_run_case+0x1a6/0x480 [ 16.050670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.051142] kthread+0x324/0x6e0 [ 16.051427] ret_from_fork+0x41/0x80 [ 16.051615] ret_from_fork_asm+0x1a/0x30 [ 16.051802] [ 16.051905] The buggy address belongs to the object at ffff888101b3e000 [ 16.051905] which belongs to the cache kmalloc-64 of size 64 [ 16.052849] The buggy address is located 0 bytes to the right of [ 16.052849] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 16.053711] [ 16.054005] The buggy address belongs to the physical page: [ 16.054353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 16.054663] flags: 0x200000000000000(node=0|zone=2) [ 16.054893] page_type: f5(slab) [ 16.055054] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.055368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.055672] page dumped because: kasan: bad access detected [ 16.056254] [ 16.056496] Memory state around the buggy address: [ 16.056978] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.057437] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.057916] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.058438] ^ [ 16.058832] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.059341] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.059757] ================================================================== [ 15.035722] ================================================================== [ 15.036208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 15.036568] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.036869] [ 15.036976] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.037029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.037044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.037067] Call Trace: [ 15.037089] <TASK> [ 15.037110] dump_stack_lvl+0x73/0xb0 [ 15.037140] print_report+0xd1/0x650 [ 15.037163] ? __virt_addr_valid+0x1db/0x2d0 [ 15.037187] ? kasan_atomics_helper+0x7c8/0x5450 [ 15.037208] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.037234] ? kasan_atomics_helper+0x7c8/0x5450 [ 15.037256] kasan_report+0x140/0x180 [ 15.037277] ? kasan_atomics_helper+0x7c8/0x5450 [ 15.037303] kasan_check_range+0x10c/0x1c0 [ 15.037326] __kasan_check_write+0x18/0x20 [ 15.037350] kasan_atomics_helper+0x7c8/0x5450 [ 15.037372] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.037394] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.037420] ? kasan_atomics+0x153/0x310 [ 15.037447] kasan_atomics+0x1dd/0x310 [ 15.037469] ? __pfx_kasan_atomics+0x10/0x10 [ 15.037494] ? __pfx_read_tsc+0x10/0x10 [ 15.037518] ? ktime_get_ts64+0x86/0x230 [ 15.037546] kunit_try_run_case+0x1a6/0x480 [ 15.037571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.037594] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.037628] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.037657] ? __kthread_parkme+0x82/0x160 [ 15.037680] ? preempt_count_sub+0x50/0x80 [ 15.037706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.037732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.037764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.037792] kthread+0x324/0x6e0 [ 15.037814] ? trace_preempt_on+0x20/0xc0 [ 15.037849] ? __pfx_kthread+0x10/0x10 [ 15.037873] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.037897] ? calculate_sigpending+0x7b/0xa0 [ 15.037922] ? __pfx_kthread+0x10/0x10 [ 15.037945] ret_from_fork+0x41/0x80 [ 15.037965] ? __pfx_kthread+0x10/0x10 [ 15.037988] ret_from_fork_asm+0x1a/0x30 [ 15.038021] </TASK> [ 15.038034] [ 15.047777] Allocated by task 273: [ 15.048007] kasan_save_stack+0x45/0x70 [ 15.048212] kasan_save_track+0x18/0x40 [ 15.048387] kasan_save_alloc_info+0x3b/0x50 [ 15.048561] __kasan_kmalloc+0xb7/0xc0 [ 15.048755] __kmalloc_cache_noprof+0x18a/0x420 [ 15.050240] kasan_atomics+0x96/0x310 [ 15.050730] kunit_try_run_case+0x1a6/0x480 [ 15.051351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.051888] kthread+0x324/0x6e0 [ 15.052545] ret_from_fork+0x41/0x80 [ 15.053166] ret_from_fork_asm+0x1a/0x30 [ 15.053798] [ 15.054206] The buggy address belongs to the object at ffff888101b3e000 [ 15.054206] which belongs to the cache kmalloc-64 of size 64 [ 15.054635] The buggy address is located 0 bytes to the right of [ 15.054635] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.055154] [ 15.055386] The buggy address belongs to the physical page: [ 15.055929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.056666] flags: 0x200000000000000(node=0|zone=2) [ 15.057160] page_type: f5(slab) [ 15.057507] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.058211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.058682] page dumped because: kasan: bad access detected [ 15.058868] [ 15.058940] Memory state around the buggy address: [ 15.059237] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.059877] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.060520] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.061172] ^ [ 15.061577] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.061803] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.062027] ================================================================== [ 15.383498] ================================================================== [ 15.383891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 15.384311] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.384661] [ 15.384791] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.384847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.384861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.384885] Call Trace: [ 15.385029] <TASK> [ 15.385053] dump_stack_lvl+0x73/0xb0 [ 15.385090] print_report+0xd1/0x650 [ 15.385114] ? __virt_addr_valid+0x1db/0x2d0 [ 15.385138] ? kasan_atomics_helper+0x4a1e/0x5450 [ 15.385159] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.385186] ? kasan_atomics_helper+0x4a1e/0x5450 [ 15.385207] kasan_report+0x140/0x180 [ 15.385230] ? kasan_atomics_helper+0x4a1e/0x5450 [ 15.385256] __asan_report_load4_noabort+0x18/0x20 [ 15.385280] kasan_atomics_helper+0x4a1e/0x5450 [ 15.385302] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.385325] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.385352] ? kasan_atomics+0x153/0x310 [ 15.385379] kasan_atomics+0x1dd/0x310 [ 15.385402] ? __pfx_kasan_atomics+0x10/0x10 [ 15.385426] ? __pfx_read_tsc+0x10/0x10 [ 15.385450] ? ktime_get_ts64+0x86/0x230 [ 15.385476] kunit_try_run_case+0x1a6/0x480 [ 15.385501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.385523] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.385546] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.385573] ? __kthread_parkme+0x82/0x160 [ 15.385597] ? preempt_count_sub+0x50/0x80 [ 15.385623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.385646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.385673] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.385699] kthread+0x324/0x6e0 [ 15.385722] ? trace_preempt_on+0x20/0xc0 [ 15.385754] ? __pfx_kthread+0x10/0x10 [ 15.385778] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.385801] ? calculate_sigpending+0x7b/0xa0 [ 15.385824] ? __pfx_kthread+0x10/0x10 [ 15.385856] ret_from_fork+0x41/0x80 [ 15.385875] ? __pfx_kthread+0x10/0x10 [ 15.385898] ret_from_fork_asm+0x1a/0x30 [ 15.385931] </TASK> [ 15.385942] [ 15.394409] Allocated by task 273: [ 15.394713] kasan_save_stack+0x45/0x70 [ 15.395338] kasan_save_track+0x18/0x40 [ 15.395535] kasan_save_alloc_info+0x3b/0x50 [ 15.395681] __kasan_kmalloc+0xb7/0xc0 [ 15.395810] __kmalloc_cache_noprof+0x18a/0x420 [ 15.396119] kasan_atomics+0x96/0x310 [ 15.396413] kunit_try_run_case+0x1a6/0x480 [ 15.396850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.397220] kthread+0x324/0x6e0 [ 15.397808] ret_from_fork+0x41/0x80 [ 15.398277] ret_from_fork_asm+0x1a/0x30 [ 15.398466] [ 15.398561] The buggy address belongs to the object at ffff888101b3e000 [ 15.398561] which belongs to the cache kmalloc-64 of size 64 [ 15.399568] The buggy address is located 0 bytes to the right of [ 15.399568] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.400080] [ 15.400160] The buggy address belongs to the physical page: [ 15.400794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.401209] flags: 0x200000000000000(node=0|zone=2) [ 15.401627] page_type: f5(slab) [ 15.401956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.402256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.402695] page dumped because: kasan: bad access detected [ 15.402931] [ 15.403001] Memory state around the buggy address: [ 15.403336] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.403684] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.404027] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.404357] ^ [ 15.404574] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.404913] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.405298] ================================================================== [ 15.113172] ================================================================== [ 15.113495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 15.113816] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.114200] [ 15.114309] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.114356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.114370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.114394] Call Trace: [ 15.114417] <TASK> [ 15.114439] dump_stack_lvl+0x73/0xb0 [ 15.114473] print_report+0xd1/0x650 [ 15.114496] ? __virt_addr_valid+0x1db/0x2d0 [ 15.114520] ? kasan_atomics_helper+0x993/0x5450 [ 15.114542] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.114569] ? kasan_atomics_helper+0x993/0x5450 [ 15.114590] kasan_report+0x140/0x180 [ 15.114612] ? kasan_atomics_helper+0x993/0x5450 [ 15.114638] kasan_check_range+0x10c/0x1c0 [ 15.114662] __kasan_check_write+0x18/0x20 [ 15.114685] kasan_atomics_helper+0x993/0x5450 [ 15.114707] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.114729] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.114755] ? kasan_atomics+0x153/0x310 [ 15.114782] kasan_atomics+0x1dd/0x310 [ 15.114804] ? __pfx_kasan_atomics+0x10/0x10 [ 15.114830] ? __pfx_read_tsc+0x10/0x10 [ 15.114876] ? ktime_get_ts64+0x86/0x230 [ 15.114904] kunit_try_run_case+0x1a6/0x480 [ 15.114928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.114950] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.114974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.114999] ? __kthread_parkme+0x82/0x160 [ 15.115023] ? preempt_count_sub+0x50/0x80 [ 15.115060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.115083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.115110] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.115137] kthread+0x324/0x6e0 [ 15.115159] ? trace_preempt_on+0x20/0xc0 [ 15.115184] ? __pfx_kthread+0x10/0x10 [ 15.115207] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.115231] ? calculate_sigpending+0x7b/0xa0 [ 15.115254] ? __pfx_kthread+0x10/0x10 [ 15.115278] ret_from_fork+0x41/0x80 [ 15.115297] ? __pfx_kthread+0x10/0x10 [ 15.115320] ret_from_fork_asm+0x1a/0x30 [ 15.115353] </TASK> [ 15.115365] [ 15.125268] Allocated by task 273: [ 15.125676] kasan_save_stack+0x45/0x70 [ 15.125920] kasan_save_track+0x18/0x40 [ 15.126335] kasan_save_alloc_info+0x3b/0x50 [ 15.126655] __kasan_kmalloc+0xb7/0xc0 [ 15.126870] __kmalloc_cache_noprof+0x18a/0x420 [ 15.127262] kasan_atomics+0x96/0x310 [ 15.127535] kunit_try_run_case+0x1a6/0x480 [ 15.127827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.128179] kthread+0x324/0x6e0 [ 15.128323] ret_from_fork+0x41/0x80 [ 15.128655] ret_from_fork_asm+0x1a/0x30 [ 15.128890] [ 15.129161] The buggy address belongs to the object at ffff888101b3e000 [ 15.129161] which belongs to the cache kmalloc-64 of size 64 [ 15.129655] The buggy address is located 0 bytes to the right of [ 15.129655] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.130419] [ 15.130522] The buggy address belongs to the physical page: [ 15.130888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.131430] flags: 0x200000000000000(node=0|zone=2) [ 15.131754] page_type: f5(slab) [ 15.132074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.132416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.132885] page dumped because: kasan: bad access detected [ 15.133219] [ 15.133342] Memory state around the buggy address: [ 15.133669] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.133993] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.134539] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.134980] ^ [ 15.135310] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.135617] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.136062] ================================================================== [ 16.082736] ================================================================== [ 16.083031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 16.083372] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 16.083615] [ 16.083702] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 16.083746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.083759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.083781] Call Trace: [ 16.083804] <TASK> [ 16.083827] dump_stack_lvl+0x73/0xb0 [ 16.083866] print_report+0xd1/0x650 [ 16.083889] ? __virt_addr_valid+0x1db/0x2d0 [ 16.083913] ? kasan_atomics_helper+0x218b/0x5450 [ 16.083934] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.083960] ? kasan_atomics_helper+0x218b/0x5450 [ 16.083982] kasan_report+0x140/0x180 [ 16.084018] ? kasan_atomics_helper+0x218b/0x5450 [ 16.084056] kasan_check_range+0x10c/0x1c0 [ 16.084080] __kasan_check_write+0x18/0x20 [ 16.084104] kasan_atomics_helper+0x218b/0x5450 [ 16.084126] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.084148] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.084175] ? kasan_atomics+0x153/0x310 [ 16.084200] kasan_atomics+0x1dd/0x310 [ 16.084223] ? __pfx_kasan_atomics+0x10/0x10 [ 16.084247] ? __pfx_read_tsc+0x10/0x10 [ 16.084269] ? ktime_get_ts64+0x86/0x230 [ 16.084295] kunit_try_run_case+0x1a6/0x480 [ 16.084321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.084343] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.084718] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.084745] ? __kthread_parkme+0x82/0x160 [ 16.084768] ? preempt_count_sub+0x50/0x80 [ 16.084794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.084817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.084855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.084882] kthread+0x324/0x6e0 [ 16.084905] ? trace_preempt_on+0x20/0xc0 [ 16.084931] ? __pfx_kthread+0x10/0x10 [ 16.084954] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.084978] ? calculate_sigpending+0x7b/0xa0 [ 16.085014] ? __pfx_kthread+0x10/0x10 [ 16.085038] ret_from_fork+0x41/0x80 [ 16.085066] ? __pfx_kthread+0x10/0x10 [ 16.085090] ret_from_fork_asm+0x1a/0x30 [ 16.085123] </TASK> [ 16.085135] [ 16.092369] Allocated by task 273: [ 16.092528] kasan_save_stack+0x45/0x70 [ 16.092740] kasan_save_track+0x18/0x40 [ 16.092944] kasan_save_alloc_info+0x3b/0x50 [ 16.093163] __kasan_kmalloc+0xb7/0xc0 [ 16.093358] __kmalloc_cache_noprof+0x18a/0x420 [ 16.093588] kasan_atomics+0x96/0x310 [ 16.093784] kunit_try_run_case+0x1a6/0x480 [ 16.093989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.094212] kthread+0x324/0x6e0 [ 16.094358] ret_from_fork+0x41/0x80 [ 16.094490] ret_from_fork_asm+0x1a/0x30 [ 16.094651] [ 16.094750] The buggy address belongs to the object at ffff888101b3e000 [ 16.094750] which belongs to the cache kmalloc-64 of size 64 [ 16.095357] The buggy address is located 0 bytes to the right of [ 16.095357] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 16.095772] [ 16.095856] The buggy address belongs to the physical page: [ 16.096034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 16.096277] flags: 0x200000000000000(node=0|zone=2) [ 16.096525] page_type: f5(slab) [ 16.096699] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.097057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.097392] page dumped because: kasan: bad access detected [ 16.097592] [ 16.097691] Memory state around the buggy address: [ 16.097939] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.098222] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.098441] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.098655] ^ [ 16.098813] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.099148] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.099469] ================================================================== [ 15.839963] ================================================================== [ 15.841103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 15.841468] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.841803] [ 15.841911] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.841958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.841972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.841995] Call Trace: [ 15.842017] <TASK> [ 15.842040] dump_stack_lvl+0x73/0xb0 [ 15.842068] print_report+0xd1/0x650 [ 15.842092] ? __virt_addr_valid+0x1db/0x2d0 [ 15.842116] ? kasan_atomics_helper+0x1c19/0x5450 [ 15.842138] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.842165] ? kasan_atomics_helper+0x1c19/0x5450 [ 15.842188] kasan_report+0x140/0x180 [ 15.842210] ? kasan_atomics_helper+0x1c19/0x5450 [ 15.842236] kasan_check_range+0x10c/0x1c0 [ 15.842259] __kasan_check_write+0x18/0x20 [ 15.842283] kasan_atomics_helper+0x1c19/0x5450 [ 15.842305] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.842328] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.842353] ? kasan_atomics+0x153/0x310 [ 15.842379] kasan_atomics+0x1dd/0x310 [ 15.842402] ? __pfx_kasan_atomics+0x10/0x10 [ 15.842426] ? __pfx_read_tsc+0x10/0x10 [ 15.842449] ? ktime_get_ts64+0x86/0x230 [ 15.842476] kunit_try_run_case+0x1a6/0x480 [ 15.842502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.842526] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.842552] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.842578] ? __kthread_parkme+0x82/0x160 [ 15.842602] ? preempt_count_sub+0x50/0x80 [ 15.842628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.842652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.842679] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.842706] kthread+0x324/0x6e0 [ 15.843106] ? trace_preempt_on+0x20/0xc0 [ 15.843133] ? __pfx_kthread+0x10/0x10 [ 15.843155] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.843180] ? calculate_sigpending+0x7b/0xa0 [ 15.843202] ? __pfx_kthread+0x10/0x10 [ 15.843225] ret_from_fork+0x41/0x80 [ 15.843246] ? __pfx_kthread+0x10/0x10 [ 15.843268] ret_from_fork_asm+0x1a/0x30 [ 15.843301] </TASK> [ 15.843313] [ 15.850660] Allocated by task 273: [ 15.850853] kasan_save_stack+0x45/0x70 [ 15.851061] kasan_save_track+0x18/0x40 [ 15.851251] kasan_save_alloc_info+0x3b/0x50 [ 15.851480] __kasan_kmalloc+0xb7/0xc0 [ 15.851667] __kmalloc_cache_noprof+0x18a/0x420 [ 15.851847] kasan_atomics+0x96/0x310 [ 15.852035] kunit_try_run_case+0x1a6/0x480 [ 15.852198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.852404] kthread+0x324/0x6e0 [ 15.852579] ret_from_fork+0x41/0x80 [ 15.852784] ret_from_fork_asm+0x1a/0x30 [ 15.852955] [ 15.853027] The buggy address belongs to the object at ffff888101b3e000 [ 15.853027] which belongs to the cache kmalloc-64 of size 64 [ 15.853487] The buggy address is located 0 bytes to the right of [ 15.853487] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.853963] [ 15.854073] The buggy address belongs to the physical page: [ 15.854319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.854689] flags: 0x200000000000000(node=0|zone=2) [ 15.854891] page_type: f5(slab) [ 15.855014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.855264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.855623] page dumped because: kasan: bad access detected [ 15.855906] [ 15.856006] Memory state around the buggy address: [ 15.856243] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.856489] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.856810] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.857164] ^ [ 15.857324] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.857585] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.857912] ================================================================== [ 15.955202] ================================================================== [ 15.955774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 15.956166] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.956720] [ 15.956879] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.956926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.956940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.956962] Call Trace: [ 15.956983] <TASK> [ 15.957005] dump_stack_lvl+0x73/0xb0 [ 15.957034] print_report+0xd1/0x650 [ 15.957056] ? __virt_addr_valid+0x1db/0x2d0 [ 15.957080] ? kasan_atomics_helper+0x1f44/0x5450 [ 15.957102] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.957142] ? kasan_atomics_helper+0x1f44/0x5450 [ 15.957164] kasan_report+0x140/0x180 [ 15.957224] ? kasan_atomics_helper+0x1f44/0x5450 [ 15.957251] kasan_check_range+0x10c/0x1c0 [ 15.957275] __kasan_check_write+0x18/0x20 [ 15.957298] kasan_atomics_helper+0x1f44/0x5450 [ 15.957321] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.957344] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.957399] ? kasan_atomics+0x153/0x310 [ 15.957425] kasan_atomics+0x1dd/0x310 [ 15.957448] ? __pfx_kasan_atomics+0x10/0x10 [ 15.957472] ? __pfx_read_tsc+0x10/0x10 [ 15.957524] ? ktime_get_ts64+0x86/0x230 [ 15.957551] kunit_try_run_case+0x1a6/0x480 [ 15.957575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.957597] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.957620] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.957675] ? __kthread_parkme+0x82/0x160 [ 15.957699] ? preempt_count_sub+0x50/0x80 [ 15.957725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.957754] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.957781] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.957849] kthread+0x324/0x6e0 [ 15.957872] ? trace_preempt_on+0x20/0xc0 [ 15.957897] ? __pfx_kthread+0x10/0x10 [ 15.957920] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.957944] ? calculate_sigpending+0x7b/0xa0 [ 15.957999] ? __pfx_kthread+0x10/0x10 [ 15.958024] ret_from_fork+0x41/0x80 [ 15.958044] ? __pfx_kthread+0x10/0x10 [ 15.958067] ret_from_fork_asm+0x1a/0x30 [ 15.958102] </TASK> [ 15.958116] [ 15.966114] Allocated by task 273: [ 15.966293] kasan_save_stack+0x45/0x70 [ 15.966545] kasan_save_track+0x18/0x40 [ 15.966752] kasan_save_alloc_info+0x3b/0x50 [ 15.966995] __kasan_kmalloc+0xb7/0xc0 [ 15.967256] __kmalloc_cache_noprof+0x18a/0x420 [ 15.967505] kasan_atomics+0x96/0x310 [ 15.967701] kunit_try_run_case+0x1a6/0x480 [ 15.967908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.968221] kthread+0x324/0x6e0 [ 15.968400] ret_from_fork+0x41/0x80 [ 15.968588] ret_from_fork_asm+0x1a/0x30 [ 15.968799] [ 15.968914] The buggy address belongs to the object at ffff888101b3e000 [ 15.968914] which belongs to the cache kmalloc-64 of size 64 [ 15.969463] The buggy address is located 0 bytes to the right of [ 15.969463] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.969921] [ 15.970021] The buggy address belongs to the physical page: [ 15.970309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.970575] flags: 0x200000000000000(node=0|zone=2) [ 15.970799] page_type: f5(slab) [ 15.970984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.971414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.971694] page dumped because: kasan: bad access detected [ 15.971989] [ 15.972156] Memory state around the buggy address: [ 15.972315] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.972645] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.972962] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.973422] ^ [ 15.973657] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.973943] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.974334] ================================================================== [ 14.888955] ================================================================== [ 14.889386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 14.889667] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 14.889908] [ 14.889996] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.890042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.890080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.890289] Call Trace: [ 14.890328] <TASK> [ 14.890351] dump_stack_lvl+0x73/0xb0 [ 14.890383] print_report+0xd1/0x650 [ 14.890407] ? __virt_addr_valid+0x1db/0x2d0 [ 14.890430] ? kasan_atomics_helper+0x4b56/0x5450 [ 14.890452] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.890479] ? kasan_atomics_helper+0x4b56/0x5450 [ 14.890501] kasan_report+0x140/0x180 [ 14.890523] ? kasan_atomics_helper+0x4b56/0x5450 [ 14.890550] __asan_report_load4_noabort+0x18/0x20 [ 14.890575] kasan_atomics_helper+0x4b56/0x5450 [ 14.890599] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.890621] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.890647] ? kasan_atomics+0x153/0x310 [ 14.890673] kasan_atomics+0x1dd/0x310 [ 14.890696] ? __pfx_kasan_atomics+0x10/0x10 [ 14.890720] ? __pfx_read_tsc+0x10/0x10 [ 14.890743] ? ktime_get_ts64+0x86/0x230 [ 14.890771] kunit_try_run_case+0x1a6/0x480 [ 14.890795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.890818] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.890853] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.890880] ? __kthread_parkme+0x82/0x160 [ 14.890903] ? preempt_count_sub+0x50/0x80 [ 14.890929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.890953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.890980] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.891009] kthread+0x324/0x6e0 [ 14.891031] ? trace_preempt_on+0x20/0xc0 [ 14.891059] ? __pfx_kthread+0x10/0x10 [ 14.891194] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.891222] ? calculate_sigpending+0x7b/0xa0 [ 14.891245] ? __pfx_kthread+0x10/0x10 [ 14.891527] ret_from_fork+0x41/0x80 [ 14.891554] ? __pfx_kthread+0x10/0x10 [ 14.891597] ret_from_fork_asm+0x1a/0x30 [ 14.891747] </TASK> [ 14.891808] [ 14.903870] Allocated by task 273: [ 14.904201] kasan_save_stack+0x45/0x70 [ 14.904464] kasan_save_track+0x18/0x40 [ 14.904666] kasan_save_alloc_info+0x3b/0x50 [ 14.904868] __kasan_kmalloc+0xb7/0xc0 [ 14.905174] __kmalloc_cache_noprof+0x18a/0x420 [ 14.905402] kasan_atomics+0x96/0x310 [ 14.905580] kunit_try_run_case+0x1a6/0x480 [ 14.905779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.906209] kthread+0x324/0x6e0 [ 14.906414] ret_from_fork+0x41/0x80 [ 14.906622] ret_from_fork_asm+0x1a/0x30 [ 14.906826] [ 14.906943] The buggy address belongs to the object at ffff888101b3e000 [ 14.906943] which belongs to the cache kmalloc-64 of size 64 [ 14.907712] The buggy address is located 0 bytes to the right of [ 14.907712] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 14.908313] [ 14.908418] The buggy address belongs to the physical page: [ 14.908720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 14.909269] flags: 0x200000000000000(node=0|zone=2) [ 14.909505] page_type: f5(slab) [ 14.909641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.910193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.910495] page dumped because: kasan: bad access detected [ 14.910783] [ 14.910883] Memory state around the buggy address: [ 14.911372] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.911782] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.912285] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.912600] ^ [ 14.912819] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.913315] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.913645] ================================================================== [ 15.405958] ================================================================== [ 15.406444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 15.406803] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.407175] [ 15.407273] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.407349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.407364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.407387] Call Trace: [ 15.407435] <TASK> [ 15.407458] dump_stack_lvl+0x73/0xb0 [ 15.407486] print_report+0xd1/0x650 [ 15.407509] ? __virt_addr_valid+0x1db/0x2d0 [ 15.407533] ? kasan_atomics_helper+0x1149/0x5450 [ 15.407554] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.407581] ? kasan_atomics_helper+0x1149/0x5450 [ 15.407630] kasan_report+0x140/0x180 [ 15.407652] ? kasan_atomics_helper+0x1149/0x5450 [ 15.407678] kasan_check_range+0x10c/0x1c0 [ 15.407712] __kasan_check_write+0x18/0x20 [ 15.407736] kasan_atomics_helper+0x1149/0x5450 [ 15.407758] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.407781] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.407806] ? kasan_atomics+0x153/0x310 [ 15.407833] kasan_atomics+0x1dd/0x310 [ 15.407868] ? __pfx_kasan_atomics+0x10/0x10 [ 15.407892] ? __pfx_read_tsc+0x10/0x10 [ 15.407916] ? ktime_get_ts64+0x86/0x230 [ 15.407942] kunit_try_run_case+0x1a6/0x480 [ 15.407967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.408016] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.408040] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.408067] ? __kthread_parkme+0x82/0x160 [ 15.408101] ? preempt_count_sub+0x50/0x80 [ 15.408127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.408150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.408177] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.408232] kthread+0x324/0x6e0 [ 15.408254] ? trace_preempt_on+0x20/0xc0 [ 15.408305] ? __pfx_kthread+0x10/0x10 [ 15.408328] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.408352] ? calculate_sigpending+0x7b/0xa0 [ 15.408376] ? __pfx_kthread+0x10/0x10 [ 15.408399] ret_from_fork+0x41/0x80 [ 15.408419] ? __pfx_kthread+0x10/0x10 [ 15.408442] ret_from_fork_asm+0x1a/0x30 [ 15.408502] </TASK> [ 15.408514] [ 15.416647] Allocated by task 273: [ 15.416805] kasan_save_stack+0x45/0x70 [ 15.417027] kasan_save_track+0x18/0x40 [ 15.417275] kasan_save_alloc_info+0x3b/0x50 [ 15.417524] __kasan_kmalloc+0xb7/0xc0 [ 15.417715] __kmalloc_cache_noprof+0x18a/0x420 [ 15.417948] kasan_atomics+0x96/0x310 [ 15.418237] kunit_try_run_case+0x1a6/0x480 [ 15.418451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.418717] kthread+0x324/0x6e0 [ 15.418914] ret_from_fork+0x41/0x80 [ 15.419073] ret_from_fork_asm+0x1a/0x30 [ 15.419334] [ 15.419441] The buggy address belongs to the object at ffff888101b3e000 [ 15.419441] which belongs to the cache kmalloc-64 of size 64 [ 15.420044] The buggy address is located 0 bytes to the right of [ 15.420044] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.420590] [ 15.420720] The buggy address belongs to the physical page: [ 15.420985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.421281] flags: 0x200000000000000(node=0|zone=2) [ 15.421444] page_type: f5(slab) [ 15.421568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.421888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.422456] page dumped because: kasan: bad access detected [ 15.422758] [ 15.422901] Memory state around the buggy address: [ 15.423301] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.423681] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.423903] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.424342] ^ [ 15.424586] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.424913] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.425312] ================================================================== [ 15.284606] ================================================================== [ 15.285031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 15.285404] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.285718] [ 15.285817] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.285874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.285888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.285924] Call Trace: [ 15.285946] <TASK> [ 15.285971] dump_stack_lvl+0x73/0xb0 [ 15.286011] print_report+0xd1/0x650 [ 15.286034] ? __virt_addr_valid+0x1db/0x2d0 [ 15.286059] ? kasan_atomics_helper+0xe79/0x5450 [ 15.286081] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.286107] ? kasan_atomics_helper+0xe79/0x5450 [ 15.286129] kasan_report+0x140/0x180 [ 15.286152] ? kasan_atomics_helper+0xe79/0x5450 [ 15.286177] kasan_check_range+0x10c/0x1c0 [ 15.286202] __kasan_check_write+0x18/0x20 [ 15.286225] kasan_atomics_helper+0xe79/0x5450 [ 15.286248] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.286270] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.286296] ? kasan_atomics+0x153/0x310 [ 15.286323] kasan_atomics+0x1dd/0x310 [ 15.286367] ? __pfx_kasan_atomics+0x10/0x10 [ 15.286391] ? __pfx_read_tsc+0x10/0x10 [ 15.286425] ? ktime_get_ts64+0x86/0x230 [ 15.286453] kunit_try_run_case+0x1a6/0x480 [ 15.286477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.286498] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.286522] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.286547] ? __kthread_parkme+0x82/0x160 [ 15.286572] ? preempt_count_sub+0x50/0x80 [ 15.286598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.286621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.286647] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.286683] kthread+0x324/0x6e0 [ 15.286706] ? trace_preempt_on+0x20/0xc0 [ 15.286730] ? __pfx_kthread+0x10/0x10 [ 15.286763] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.286788] ? calculate_sigpending+0x7b/0xa0 [ 15.286810] ? __pfx_kthread+0x10/0x10 [ 15.286843] ret_from_fork+0x41/0x80 [ 15.286871] ? __pfx_kthread+0x10/0x10 [ 15.286895] ret_from_fork_asm+0x1a/0x30 [ 15.286927] </TASK> [ 15.286950] [ 15.294645] Allocated by task 273: [ 15.294855] kasan_save_stack+0x45/0x70 [ 15.295019] kasan_save_track+0x18/0x40 [ 15.295388] kasan_save_alloc_info+0x3b/0x50 [ 15.295625] __kasan_kmalloc+0xb7/0xc0 [ 15.295805] __kmalloc_cache_noprof+0x18a/0x420 [ 15.296007] kasan_atomics+0x96/0x310 [ 15.296303] kunit_try_run_case+0x1a6/0x480 [ 15.296517] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.296696] kthread+0x324/0x6e0 [ 15.296870] ret_from_fork+0x41/0x80 [ 15.297063] ret_from_fork_asm+0x1a/0x30 [ 15.297267] [ 15.297365] The buggy address belongs to the object at ffff888101b3e000 [ 15.297365] which belongs to the cache kmalloc-64 of size 64 [ 15.297897] The buggy address is located 0 bytes to the right of [ 15.297897] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.298446] [ 15.298549] The buggy address belongs to the physical page: [ 15.298764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.299086] flags: 0x200000000000000(node=0|zone=2) [ 15.299318] page_type: f5(slab) [ 15.299449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.299780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.300110] page dumped because: kasan: bad access detected [ 15.300358] [ 15.300466] Memory state around the buggy address: [ 15.300679] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.301006] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.301361] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.301671] ^ [ 15.301898] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.302115] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.302329] ================================================================== [ 14.981370] ================================================================== [ 14.981730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 14.982187] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 14.982521] [ 14.982619] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.982664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.982678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.982702] Call Trace: [ 14.982752] <TASK> [ 14.982774] dump_stack_lvl+0x73/0xb0 [ 14.982804] print_report+0xd1/0x650 [ 14.982827] ? __virt_addr_valid+0x1db/0x2d0 [ 14.982867] ? kasan_atomics_helper+0x5ff/0x5450 [ 14.982887] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.982914] ? kasan_atomics_helper+0x5ff/0x5450 [ 14.982935] kasan_report+0x140/0x180 [ 14.982958] ? kasan_atomics_helper+0x5ff/0x5450 [ 14.982983] kasan_check_range+0x10c/0x1c0 [ 14.983007] __kasan_check_write+0x18/0x20 [ 14.983029] kasan_atomics_helper+0x5ff/0x5450 [ 14.983062] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.983085] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.983111] ? kasan_atomics+0x153/0x310 [ 14.983155] kasan_atomics+0x1dd/0x310 [ 14.983191] ? __pfx_kasan_atomics+0x10/0x10 [ 14.983215] ? __pfx_read_tsc+0x10/0x10 [ 14.983252] ? ktime_get_ts64+0x86/0x230 [ 14.983305] kunit_try_run_case+0x1a6/0x480 [ 14.983343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.983378] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.983419] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.983459] ? __kthread_parkme+0x82/0x160 [ 14.983483] ? preempt_count_sub+0x50/0x80 [ 14.983510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.983533] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.983559] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.983587] kthread+0x324/0x6e0 [ 14.983610] ? trace_preempt_on+0x20/0xc0 [ 14.983634] ? __pfx_kthread+0x10/0x10 [ 14.983658] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.983682] ? calculate_sigpending+0x7b/0xa0 [ 14.983706] ? __pfx_kthread+0x10/0x10 [ 14.983729] ret_from_fork+0x41/0x80 [ 14.983749] ? __pfx_kthread+0x10/0x10 [ 14.983772] ret_from_fork_asm+0x1a/0x30 [ 14.983805] </TASK> [ 14.983817] [ 14.991631] Allocated by task 273: [ 14.991793] kasan_save_stack+0x45/0x70 [ 14.991995] kasan_save_track+0x18/0x40 [ 14.992134] kasan_save_alloc_info+0x3b/0x50 [ 14.992284] __kasan_kmalloc+0xb7/0xc0 [ 14.992416] __kmalloc_cache_noprof+0x18a/0x420 [ 14.992573] kasan_atomics+0x96/0x310 [ 14.992706] kunit_try_run_case+0x1a6/0x480 [ 14.992862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.993241] kthread+0x324/0x6e0 [ 14.993420] ret_from_fork+0x41/0x80 [ 14.993730] ret_from_fork_asm+0x1a/0x30 [ 14.993964] [ 14.994063] The buggy address belongs to the object at ffff888101b3e000 [ 14.994063] which belongs to the cache kmalloc-64 of size 64 [ 14.994816] The buggy address is located 0 bytes to the right of [ 14.994816] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 14.995544] [ 14.995623] The buggy address belongs to the physical page: [ 14.995832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 14.996087] flags: 0x200000000000000(node=0|zone=2) [ 14.996274] page_type: f5(slab) [ 14.996606] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.996951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.997412] page dumped because: kasan: bad access detected [ 14.997650] [ 14.997719] Memory state around the buggy address: [ 14.997888] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.998099] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.998307] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.998513] ^ [ 14.998663] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.999033] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.999573] ================================================================== [ 15.445783] ================================================================== [ 15.446297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 15.446685] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.447026] [ 15.447176] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.447234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.447248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.447271] Call Trace: [ 15.447311] <TASK> [ 15.447334] dump_stack_lvl+0x73/0xb0 [ 15.447363] print_report+0xd1/0x650 [ 15.447386] ? __virt_addr_valid+0x1db/0x2d0 [ 15.447410] ? kasan_atomics_helper+0x1218/0x5450 [ 15.447431] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.447481] ? kasan_atomics_helper+0x1218/0x5450 [ 15.447503] kasan_report+0x140/0x180 [ 15.447536] ? kasan_atomics_helper+0x1218/0x5450 [ 15.447562] kasan_check_range+0x10c/0x1c0 [ 15.447587] __kasan_check_write+0x18/0x20 [ 15.447639] kasan_atomics_helper+0x1218/0x5450 [ 15.447662] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.447684] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.447720] ? kasan_atomics+0x153/0x310 [ 15.447746] kasan_atomics+0x1dd/0x310 [ 15.447793] ? __pfx_kasan_atomics+0x10/0x10 [ 15.447817] ? __pfx_read_tsc+0x10/0x10 [ 15.447856] ? ktime_get_ts64+0x86/0x230 [ 15.447884] kunit_try_run_case+0x1a6/0x480 [ 15.447909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.447931] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.447955] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.448008] ? __kthread_parkme+0x82/0x160 [ 15.448070] ? preempt_count_sub+0x50/0x80 [ 15.448097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.448122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.448160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.448186] kthread+0x324/0x6e0 [ 15.448209] ? trace_preempt_on+0x20/0xc0 [ 15.448234] ? __pfx_kthread+0x10/0x10 [ 15.448257] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.448282] ? calculate_sigpending+0x7b/0xa0 [ 15.448305] ? __pfx_kthread+0x10/0x10 [ 15.448328] ret_from_fork+0x41/0x80 [ 15.448348] ? __pfx_kthread+0x10/0x10 [ 15.448371] ret_from_fork_asm+0x1a/0x30 [ 15.448431] </TASK> [ 15.448444] [ 15.457130] Allocated by task 273: [ 15.457518] kasan_save_stack+0x45/0x70 [ 15.457748] kasan_save_track+0x18/0x40 [ 15.457945] kasan_save_alloc_info+0x3b/0x50 [ 15.458092] __kasan_kmalloc+0xb7/0xc0 [ 15.458221] __kmalloc_cache_noprof+0x18a/0x420 [ 15.458395] kasan_atomics+0x96/0x310 [ 15.458703] kunit_try_run_case+0x1a6/0x480 [ 15.459095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.459410] kthread+0x324/0x6e0 [ 15.459585] ret_from_fork+0x41/0x80 [ 15.459767] ret_from_fork_asm+0x1a/0x30 [ 15.459938] [ 15.460011] The buggy address belongs to the object at ffff888101b3e000 [ 15.460011] which belongs to the cache kmalloc-64 of size 64 [ 15.460589] The buggy address is located 0 bytes to the right of [ 15.460589] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.461077] [ 15.461218] The buggy address belongs to the physical page: [ 15.461477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.461891] flags: 0x200000000000000(node=0|zone=2) [ 15.462139] page_type: f5(slab) [ 15.462350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.462722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.463120] page dumped because: kasan: bad access detected [ 15.463421] [ 15.463567] Memory state around the buggy address: [ 15.463816] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.464242] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.464538] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.464886] ^ [ 15.465227] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.465576] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.465913] ================================================================== [ 14.943150] ================================================================== [ 14.943550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 14.944036] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 14.944352] [ 14.944486] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.944548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.944575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.944599] Call Trace: [ 14.944623] <TASK> [ 14.944646] dump_stack_lvl+0x73/0xb0 [ 14.944704] print_report+0xd1/0x650 [ 14.944729] ? __virt_addr_valid+0x1db/0x2d0 [ 14.944753] ? kasan_atomics_helper+0x4b3c/0x5450 [ 14.944775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.944803] ? kasan_atomics_helper+0x4b3c/0x5450 [ 14.944825] kasan_report+0x140/0x180 [ 14.944858] ? kasan_atomics_helper+0x4b3c/0x5450 [ 14.944884] __asan_report_store4_noabort+0x1b/0x30 [ 14.944908] kasan_atomics_helper+0x4b3c/0x5450 [ 14.944931] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.944953] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.944979] ? kasan_atomics+0x153/0x310 [ 14.945013] kasan_atomics+0x1dd/0x310 [ 14.945035] ? __pfx_kasan_atomics+0x10/0x10 [ 14.945070] ? __pfx_read_tsc+0x10/0x10 [ 14.945093] ? ktime_get_ts64+0x86/0x230 [ 14.945120] kunit_try_run_case+0x1a6/0x480 [ 14.945145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.945167] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.945190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.945217] ? __kthread_parkme+0x82/0x160 [ 14.945240] ? preempt_count_sub+0x50/0x80 [ 14.945267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.945291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.945318] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.945345] kthread+0x324/0x6e0 [ 14.945368] ? trace_preempt_on+0x20/0xc0 [ 14.945393] ? __pfx_kthread+0x10/0x10 [ 14.945426] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.945605] ? calculate_sigpending+0x7b/0xa0 [ 14.945629] ? __pfx_kthread+0x10/0x10 [ 14.945654] ret_from_fork+0x41/0x80 [ 14.945674] ? __pfx_kthread+0x10/0x10 [ 14.945697] ret_from_fork_asm+0x1a/0x30 [ 14.945730] </TASK> [ 14.945748] [ 14.953583] Allocated by task 273: [ 14.953791] kasan_save_stack+0x45/0x70 [ 14.954018] kasan_save_track+0x18/0x40 [ 14.954262] kasan_save_alloc_info+0x3b/0x50 [ 14.954476] __kasan_kmalloc+0xb7/0xc0 [ 14.954695] __kmalloc_cache_noprof+0x18a/0x420 [ 14.954929] kasan_atomics+0x96/0x310 [ 14.955126] kunit_try_run_case+0x1a6/0x480 [ 14.955304] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.955590] kthread+0x324/0x6e0 [ 14.955824] ret_from_fork+0x41/0x80 [ 14.956030] ret_from_fork_asm+0x1a/0x30 [ 14.956230] [ 14.956328] The buggy address belongs to the object at ffff888101b3e000 [ 14.956328] which belongs to the cache kmalloc-64 of size 64 [ 14.956862] The buggy address is located 0 bytes to the right of [ 14.956862] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 14.957403] [ 14.957503] The buggy address belongs to the physical page: [ 14.957679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 14.957928] flags: 0x200000000000000(node=0|zone=2) [ 14.958091] page_type: f5(slab) [ 14.958276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.958637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.959027] page dumped because: kasan: bad access detected [ 14.959314] [ 14.959411] Memory state around the buggy address: [ 14.959654] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.959950] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.960410] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.960747] ^ [ 14.961007] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.961312] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.961673] ================================================================== [ 15.570603] ================================================================== [ 15.570960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 15.571253] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.571478] [ 15.571563] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.571608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.571621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.571644] Call Trace: [ 15.571665] <TASK> [ 15.571684] dump_stack_lvl+0x73/0xb0 [ 15.571712] print_report+0xd1/0x650 [ 15.571734] ? __virt_addr_valid+0x1db/0x2d0 [ 15.571758] ? kasan_atomics_helper+0x1468/0x5450 [ 15.571781] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.571807] ? kasan_atomics_helper+0x1468/0x5450 [ 15.571829] kasan_report+0x140/0x180 [ 15.571862] ? kasan_atomics_helper+0x1468/0x5450 [ 15.571887] kasan_check_range+0x10c/0x1c0 [ 15.571929] __kasan_check_write+0x18/0x20 [ 15.571953] kasan_atomics_helper+0x1468/0x5450 [ 15.571976] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.571998] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.572024] ? kasan_atomics+0x153/0x310 [ 15.572050] kasan_atomics+0x1dd/0x310 [ 15.572073] ? __pfx_kasan_atomics+0x10/0x10 [ 15.572097] ? __pfx_read_tsc+0x10/0x10 [ 15.572120] ? ktime_get_ts64+0x86/0x230 [ 15.572153] kunit_try_run_case+0x1a6/0x480 [ 15.572178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.572199] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.572222] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.572248] ? __kthread_parkme+0x82/0x160 [ 15.572272] ? preempt_count_sub+0x50/0x80 [ 15.572297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.572320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.572347] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.572374] kthread+0x324/0x6e0 [ 15.572396] ? trace_preempt_on+0x20/0xc0 [ 15.572421] ? __pfx_kthread+0x10/0x10 [ 15.572443] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.572468] ? calculate_sigpending+0x7b/0xa0 [ 15.572490] ? __pfx_kthread+0x10/0x10 [ 15.572514] ret_from_fork+0x41/0x80 [ 15.572533] ? __pfx_kthread+0x10/0x10 [ 15.572556] ret_from_fork_asm+0x1a/0x30 [ 15.572588] </TASK> [ 15.572599] [ 15.580346] Allocated by task 273: [ 15.580503] kasan_save_stack+0x45/0x70 [ 15.580662] kasan_save_track+0x18/0x40 [ 15.580833] kasan_save_alloc_info+0x3b/0x50 [ 15.581063] __kasan_kmalloc+0xb7/0xc0 [ 15.581253] __kmalloc_cache_noprof+0x18a/0x420 [ 15.581452] kasan_atomics+0x96/0x310 [ 15.581624] kunit_try_run_case+0x1a6/0x480 [ 15.581809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.582062] kthread+0x324/0x6e0 [ 15.582226] ret_from_fork+0x41/0x80 [ 15.582401] ret_from_fork_asm+0x1a/0x30 [ 15.582555] [ 15.582632] The buggy address belongs to the object at ffff888101b3e000 [ 15.582632] which belongs to the cache kmalloc-64 of size 64 [ 15.583283] The buggy address is located 0 bytes to the right of [ 15.583283] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.583690] [ 15.583765] The buggy address belongs to the physical page: [ 15.585149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.585958] flags: 0x200000000000000(node=0|zone=2) [ 15.586535] page_type: f5(slab) [ 15.586869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.587165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.587388] page dumped because: kasan: bad access detected [ 15.587554] [ 15.587626] Memory state around the buggy address: [ 15.587782] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.588011] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.588708] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.589402] ^ [ 15.589862] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.590491] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.591168] ================================================================== [ 14.867776] ================================================================== [ 14.868253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 14.868623] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 14.868860] [ 14.868949] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.868993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.869007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.869030] Call Trace: [ 14.869051] <TASK> [ 14.869071] dump_stack_lvl+0x73/0xb0 [ 14.869098] print_report+0xd1/0x650 [ 14.869120] ? __virt_addr_valid+0x1db/0x2d0 [ 14.869144] ? kasan_atomics_helper+0x3e0/0x5450 [ 14.869167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.869193] ? kasan_atomics_helper+0x3e0/0x5450 [ 14.869215] kasan_report+0x140/0x180 [ 14.869238] ? kasan_atomics_helper+0x3e0/0x5450 [ 14.869263] kasan_check_range+0x10c/0x1c0 [ 14.869287] __kasan_check_read+0x15/0x20 [ 14.869311] kasan_atomics_helper+0x3e0/0x5450 [ 14.869334] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.869356] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.869382] ? kasan_atomics+0x153/0x310 [ 14.869408] kasan_atomics+0x1dd/0x310 [ 14.869432] ? __pfx_kasan_atomics+0x10/0x10 [ 14.869456] ? __pfx_read_tsc+0x10/0x10 [ 14.869478] ? ktime_get_ts64+0x86/0x230 [ 14.869529] kunit_try_run_case+0x1a6/0x480 [ 14.869554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.869577] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.869617] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.869658] ? __kthread_parkme+0x82/0x160 [ 14.869695] ? preempt_count_sub+0x50/0x80 [ 14.869734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.869765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.869805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.869857] kthread+0x324/0x6e0 [ 14.869894] ? trace_preempt_on+0x20/0xc0 [ 14.869933] ? __pfx_kthread+0x10/0x10 [ 14.869969] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.870020] ? calculate_sigpending+0x7b/0xa0 [ 14.870043] ? __pfx_kthread+0x10/0x10 [ 14.870078] ret_from_fork+0x41/0x80 [ 14.870098] ? __pfx_kthread+0x10/0x10 [ 14.870121] ret_from_fork_asm+0x1a/0x30 [ 14.870153] </TASK> [ 14.870165] [ 14.879402] Allocated by task 273: [ 14.879649] kasan_save_stack+0x45/0x70 [ 14.879884] kasan_save_track+0x18/0x40 [ 14.880151] kasan_save_alloc_info+0x3b/0x50 [ 14.880340] __kasan_kmalloc+0xb7/0xc0 [ 14.880537] __kmalloc_cache_noprof+0x18a/0x420 [ 14.880746] kasan_atomics+0x96/0x310 [ 14.880971] kunit_try_run_case+0x1a6/0x480 [ 14.881227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.881462] kthread+0x324/0x6e0 [ 14.881632] ret_from_fork+0x41/0x80 [ 14.881782] ret_from_fork_asm+0x1a/0x30 [ 14.881987] [ 14.882181] The buggy address belongs to the object at ffff888101b3e000 [ 14.882181] which belongs to the cache kmalloc-64 of size 64 [ 14.882819] The buggy address is located 0 bytes to the right of [ 14.882819] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 14.883378] [ 14.883480] The buggy address belongs to the physical page: [ 14.883749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 14.884126] flags: 0x200000000000000(node=0|zone=2) [ 14.884357] page_type: f5(slab) [ 14.884532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.884874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.885309] page dumped because: kasan: bad access detected [ 14.885539] [ 14.885648] Memory state around the buggy address: [ 14.885886] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.886358] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.886740] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.887091] ^ [ 14.887297] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.887582] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.888089] ================================================================== [ 15.635241] ================================================================== [ 15.635740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 15.636143] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.636438] [ 15.636577] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.636627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.636640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.636664] Call Trace: [ 15.636691] <TASK> [ 15.636718] dump_stack_lvl+0x73/0xb0 [ 15.636751] print_report+0xd1/0x650 [ 15.636775] ? __virt_addr_valid+0x1db/0x2d0 [ 15.636801] ? kasan_atomics_helper+0x15b7/0x5450 [ 15.636823] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.636861] ? kasan_atomics_helper+0x15b7/0x5450 [ 15.636883] kasan_report+0x140/0x180 [ 15.636906] ? kasan_atomics_helper+0x15b7/0x5450 [ 15.636932] kasan_check_range+0x10c/0x1c0 [ 15.636955] __kasan_check_write+0x18/0x20 [ 15.636978] kasan_atomics_helper+0x15b7/0x5450 [ 15.637001] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.637023] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.637049] ? kasan_atomics+0x153/0x310 [ 15.637075] kasan_atomics+0x1dd/0x310 [ 15.637098] ? __pfx_kasan_atomics+0x10/0x10 [ 15.637121] ? __pfx_read_tsc+0x10/0x10 [ 15.637144] ? ktime_get_ts64+0x86/0x230 [ 15.637171] kunit_try_run_case+0x1a6/0x480 [ 15.637195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.637241] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.637265] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.637290] ? __kthread_parkme+0x82/0x160 [ 15.637315] ? preempt_count_sub+0x50/0x80 [ 15.637342] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.637365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.637401] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.637429] kthread+0x324/0x6e0 [ 15.637451] ? trace_preempt_on+0x20/0xc0 [ 15.637476] ? __pfx_kthread+0x10/0x10 [ 15.637499] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.637523] ? calculate_sigpending+0x7b/0xa0 [ 15.637547] ? __pfx_kthread+0x10/0x10 [ 15.637571] ret_from_fork+0x41/0x80 [ 15.637591] ? __pfx_kthread+0x10/0x10 [ 15.637614] ret_from_fork_asm+0x1a/0x30 [ 15.637647] </TASK> [ 15.637659] [ 15.645169] Allocated by task 273: [ 15.645399] kasan_save_stack+0x45/0x70 [ 15.645636] kasan_save_track+0x18/0x40 [ 15.645870] kasan_save_alloc_info+0x3b/0x50 [ 15.646133] __kasan_kmalloc+0xb7/0xc0 [ 15.646340] __kmalloc_cache_noprof+0x18a/0x420 [ 15.646498] kasan_atomics+0x96/0x310 [ 15.646632] kunit_try_run_case+0x1a6/0x480 [ 15.646850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.647244] kthread+0x324/0x6e0 [ 15.647422] ret_from_fork+0x41/0x80 [ 15.647598] ret_from_fork_asm+0x1a/0x30 [ 15.647793] [ 15.647910] The buggy address belongs to the object at ffff888101b3e000 [ 15.647910] which belongs to the cache kmalloc-64 of size 64 [ 15.648461] The buggy address is located 0 bytes to the right of [ 15.648461] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.648977] [ 15.649100] The buggy address belongs to the physical page: [ 15.649355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.649598] flags: 0x200000000000000(node=0|zone=2) [ 15.649772] page_type: f5(slab) [ 15.649914] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.650146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.650707] page dumped because: kasan: bad access detected [ 15.650968] [ 15.651063] Memory state around the buggy address: [ 15.651286] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.651904] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.652119] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.652344] ^ [ 15.652498] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.652707] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.653392] ================================================================== [ 15.675205] ================================================================== [ 15.675476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 15.675829] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.676171] [ 15.676285] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.676333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.676347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.676371] Call Trace: [ 15.676395] <TASK> [ 15.676419] dump_stack_lvl+0x73/0xb0 [ 15.676448] print_report+0xd1/0x650 [ 15.676472] ? __virt_addr_valid+0x1db/0x2d0 [ 15.676495] ? kasan_atomics_helper+0x16e8/0x5450 [ 15.676516] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.676543] ? kasan_atomics_helper+0x16e8/0x5450 [ 15.676564] kasan_report+0x140/0x180 [ 15.676587] ? kasan_atomics_helper+0x16e8/0x5450 [ 15.676612] kasan_check_range+0x10c/0x1c0 [ 15.676636] __kasan_check_write+0x18/0x20 [ 15.676660] kasan_atomics_helper+0x16e8/0x5450 [ 15.676682] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.676704] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.676729] ? kasan_atomics+0x153/0x310 [ 15.676756] kasan_atomics+0x1dd/0x310 [ 15.676778] ? __pfx_kasan_atomics+0x10/0x10 [ 15.676802] ? __pfx_read_tsc+0x10/0x10 [ 15.676826] ? ktime_get_ts64+0x86/0x230 [ 15.676866] kunit_try_run_case+0x1a6/0x480 [ 15.676891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.676913] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.676935] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.676961] ? __kthread_parkme+0x82/0x160 [ 15.676985] ? preempt_count_sub+0x50/0x80 [ 15.677014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.677037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.677075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.677102] kthread+0x324/0x6e0 [ 15.677124] ? trace_preempt_on+0x20/0xc0 [ 15.677149] ? __pfx_kthread+0x10/0x10 [ 15.677172] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.677196] ? calculate_sigpending+0x7b/0xa0 [ 15.677219] ? __pfx_kthread+0x10/0x10 [ 15.677242] ret_from_fork+0x41/0x80 [ 15.677262] ? __pfx_kthread+0x10/0x10 [ 15.677286] ret_from_fork_asm+0x1a/0x30 [ 15.677318] </TASK> [ 15.677329] [ 15.684439] Allocated by task 273: [ 15.684617] kasan_save_stack+0x45/0x70 [ 15.684826] kasan_save_track+0x18/0x40 [ 15.685025] kasan_save_alloc_info+0x3b/0x50 [ 15.685239] __kasan_kmalloc+0xb7/0xc0 [ 15.685425] __kmalloc_cache_noprof+0x18a/0x420 [ 15.685651] kasan_atomics+0x96/0x310 [ 15.685973] kunit_try_run_case+0x1a6/0x480 [ 15.686211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.686390] kthread+0x324/0x6e0 [ 15.686515] ret_from_fork+0x41/0x80 [ 15.686692] ret_from_fork_asm+0x1a/0x30 [ 15.686901] [ 15.686999] The buggy address belongs to the object at ffff888101b3e000 [ 15.686999] which belongs to the cache kmalloc-64 of size 64 [ 15.687820] The buggy address is located 0 bytes to the right of [ 15.687820] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.688421] [ 15.688500] The buggy address belongs to the physical page: [ 15.688720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.689040] flags: 0x200000000000000(node=0|zone=2) [ 15.689251] page_type: f5(slab) [ 15.689424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.689759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.690066] page dumped because: kasan: bad access detected [ 15.690262] [ 15.690333] Memory state around the buggy address: [ 15.690492] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.690710] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.692228] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.692910] ^ [ 15.693507] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.694393] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.695063] ================================================================== [ 16.060914] ================================================================== [ 16.061387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 16.061717] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 16.062033] [ 16.062363] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 16.062638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.062656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.062681] Call Trace: [ 16.062703] <TASK> [ 16.062728] dump_stack_lvl+0x73/0xb0 [ 16.062804] print_report+0xd1/0x650 [ 16.062830] ? __virt_addr_valid+0x1db/0x2d0 [ 16.062864] ? kasan_atomics_helper+0x4fb4/0x5450 [ 16.062886] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.062912] ? kasan_atomics_helper+0x4fb4/0x5450 [ 16.062934] kasan_report+0x140/0x180 [ 16.062957] ? kasan_atomics_helper+0x4fb4/0x5450 [ 16.062983] __asan_report_load8_noabort+0x18/0x20 [ 16.063007] kasan_atomics_helper+0x4fb4/0x5450 [ 16.063031] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.063054] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.063080] ? kasan_atomics+0x153/0x310 [ 16.063106] kasan_atomics+0x1dd/0x310 [ 16.063128] ? __pfx_kasan_atomics+0x10/0x10 [ 16.063153] ? __pfx_read_tsc+0x10/0x10 [ 16.063175] ? ktime_get_ts64+0x86/0x230 [ 16.063203] kunit_try_run_case+0x1a6/0x480 [ 16.063228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.063250] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.063277] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.063302] ? __kthread_parkme+0x82/0x160 [ 16.063326] ? preempt_count_sub+0x50/0x80 [ 16.063353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.063376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.063404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.063430] kthread+0x324/0x6e0 [ 16.063452] ? trace_preempt_on+0x20/0xc0 [ 16.063477] ? __pfx_kthread+0x10/0x10 [ 16.063500] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.063524] ? calculate_sigpending+0x7b/0xa0 [ 16.063548] ? __pfx_kthread+0x10/0x10 [ 16.063572] ret_from_fork+0x41/0x80 [ 16.063592] ? __pfx_kthread+0x10/0x10 [ 16.063615] ret_from_fork_asm+0x1a/0x30 [ 16.063648] </TASK> [ 16.063660] [ 16.074351] Allocated by task 273: [ 16.074674] kasan_save_stack+0x45/0x70 [ 16.075086] kasan_save_track+0x18/0x40 [ 16.075280] kasan_save_alloc_info+0x3b/0x50 [ 16.075469] __kasan_kmalloc+0xb7/0xc0 [ 16.075638] __kmalloc_cache_noprof+0x18a/0x420 [ 16.075832] kasan_atomics+0x96/0x310 [ 16.075974] kunit_try_run_case+0x1a6/0x480 [ 16.076183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.076423] kthread+0x324/0x6e0 [ 16.076548] ret_from_fork+0x41/0x80 [ 16.076706] ret_from_fork_asm+0x1a/0x30 [ 16.076914] [ 16.077013] The buggy address belongs to the object at ffff888101b3e000 [ 16.077013] which belongs to the cache kmalloc-64 of size 64 [ 16.077489] The buggy address is located 0 bytes to the right of [ 16.077489] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 16.078105] [ 16.078229] The buggy address belongs to the physical page: [ 16.078447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 16.078757] flags: 0x200000000000000(node=0|zone=2) [ 16.078972] page_type: f5(slab) [ 16.079144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.079460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.079740] page dumped because: kasan: bad access detected [ 16.079976] [ 16.080046] Memory state around the buggy address: [ 16.080204] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.080479] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.080924] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.081164] ^ [ 16.081317] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.081628] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.081963] ================================================================== [ 15.000254] ================================================================== [ 15.000608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 15.000966] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.001309] [ 15.001418] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.001463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.001476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.001500] Call Trace: [ 15.001521] <TASK> [ 15.001543] dump_stack_lvl+0x73/0xb0 [ 15.001571] print_report+0xd1/0x650 [ 15.001594] ? __virt_addr_valid+0x1db/0x2d0 [ 15.001617] ? kasan_atomics_helper+0x698/0x5450 [ 15.001640] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.001665] ? kasan_atomics_helper+0x698/0x5450 [ 15.001708] kasan_report+0x140/0x180 [ 15.001731] ? kasan_atomics_helper+0x698/0x5450 [ 15.001762] kasan_check_range+0x10c/0x1c0 [ 15.001786] __kasan_check_write+0x18/0x20 [ 15.001809] kasan_atomics_helper+0x698/0x5450 [ 15.001831] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.001864] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.001889] ? kasan_atomics+0x153/0x310 [ 15.001915] kasan_atomics+0x1dd/0x310 [ 15.001937] ? __pfx_kasan_atomics+0x10/0x10 [ 15.001962] ? __pfx_read_tsc+0x10/0x10 [ 15.001984] ? ktime_get_ts64+0x86/0x230 [ 15.002010] kunit_try_run_case+0x1a6/0x480 [ 15.002035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.002067] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.002090] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.002116] ? __kthread_parkme+0x82/0x160 [ 15.002140] ? preempt_count_sub+0x50/0x80 [ 15.002166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.002190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.002218] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.002244] kthread+0x324/0x6e0 [ 15.002267] ? trace_preempt_on+0x20/0xc0 [ 15.002292] ? __pfx_kthread+0x10/0x10 [ 15.002315] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.002339] ? calculate_sigpending+0x7b/0xa0 [ 15.002362] ? __pfx_kthread+0x10/0x10 [ 15.002385] ret_from_fork+0x41/0x80 [ 15.002405] ? __pfx_kthread+0x10/0x10 [ 15.002428] ret_from_fork_asm+0x1a/0x30 [ 15.002461] </TASK> [ 15.002473] [ 15.009894] Allocated by task 273: [ 15.010052] kasan_save_stack+0x45/0x70 [ 15.010213] kasan_save_track+0x18/0x40 [ 15.010349] kasan_save_alloc_info+0x3b/0x50 [ 15.010498] __kasan_kmalloc+0xb7/0xc0 [ 15.010703] __kmalloc_cache_noprof+0x18a/0x420 [ 15.010941] kasan_atomics+0x96/0x310 [ 15.011128] kunit_try_run_case+0x1a6/0x480 [ 15.011339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.011602] kthread+0x324/0x6e0 [ 15.011791] ret_from_fork+0x41/0x80 [ 15.011986] ret_from_fork_asm+0x1a/0x30 [ 15.012194] [ 15.012299] The buggy address belongs to the object at ffff888101b3e000 [ 15.012299] which belongs to the cache kmalloc-64 of size 64 [ 15.012826] The buggy address is located 0 bytes to the right of [ 15.012826] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.013297] [ 15.013373] The buggy address belongs to the physical page: [ 15.013550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.013935] flags: 0x200000000000000(node=0|zone=2) [ 15.014326] page_type: f5(slab) [ 15.014511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.014784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.015190] page dumped because: kasan: bad access detected [ 15.015405] [ 15.015501] Memory state around the buggy address: [ 15.015694] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.016005] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.016307] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.016584] ^ [ 15.016791] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.017069] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.017375] ================================================================== [ 14.914266] ================================================================== [ 14.914665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 14.915226] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 14.915665] [ 14.915784] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.915832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.915884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.915908] Call Trace: [ 14.915942] <TASK> [ 14.915964] dump_stack_lvl+0x73/0xb0 [ 14.916015] print_report+0xd1/0x650 [ 14.916045] ? __virt_addr_valid+0x1db/0x2d0 [ 14.916069] ? kasan_atomics_helper+0x4a1/0x5450 [ 14.916091] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.916117] ? kasan_atomics_helper+0x4a1/0x5450 [ 14.916139] kasan_report+0x140/0x180 [ 14.916163] ? kasan_atomics_helper+0x4a1/0x5450 [ 14.916188] kasan_check_range+0x10c/0x1c0 [ 14.916211] __kasan_check_write+0x18/0x20 [ 14.916235] kasan_atomics_helper+0x4a1/0x5450 [ 14.916258] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.916280] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.916307] ? kasan_atomics+0x153/0x310 [ 14.916333] kasan_atomics+0x1dd/0x310 [ 14.916357] ? __pfx_kasan_atomics+0x10/0x10 [ 14.916381] ? __pfx_read_tsc+0x10/0x10 [ 14.916404] ? ktime_get_ts64+0x86/0x230 [ 14.916432] kunit_try_run_case+0x1a6/0x480 [ 14.916457] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.916480] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.916503] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.916530] ? __kthread_parkme+0x82/0x160 [ 14.916554] ? preempt_count_sub+0x50/0x80 [ 14.916580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.916605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.916632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.916660] kthread+0x324/0x6e0 [ 14.916684] ? trace_preempt_on+0x20/0xc0 [ 14.916710] ? __pfx_kthread+0x10/0x10 [ 14.916734] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.916759] ? calculate_sigpending+0x7b/0xa0 [ 14.916783] ? __pfx_kthread+0x10/0x10 [ 14.916807] ret_from_fork+0x41/0x80 [ 14.916830] ? __pfx_kthread+0x10/0x10 [ 14.916868] ret_from_fork_asm+0x1a/0x30 [ 14.916902] </TASK> [ 14.917023] [ 14.931647] Allocated by task 273: [ 14.932240] kasan_save_stack+0x45/0x70 [ 14.932581] kasan_save_track+0x18/0x40 [ 14.932735] kasan_save_alloc_info+0x3b/0x50 [ 14.932898] __kasan_kmalloc+0xb7/0xc0 [ 14.933036] __kmalloc_cache_noprof+0x18a/0x420 [ 14.933617] kasan_atomics+0x96/0x310 [ 14.933761] kunit_try_run_case+0x1a6/0x480 [ 14.933997] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.934177] kthread+0x324/0x6e0 [ 14.934525] ret_from_fork+0x41/0x80 [ 14.934938] ret_from_fork_asm+0x1a/0x30 [ 14.935452] [ 14.935619] The buggy address belongs to the object at ffff888101b3e000 [ 14.935619] which belongs to the cache kmalloc-64 of size 64 [ 14.936716] The buggy address is located 0 bytes to the right of [ 14.936716] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 14.937505] [ 14.937724] The buggy address belongs to the physical page: [ 14.938263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 14.939053] flags: 0x200000000000000(node=0|zone=2) [ 14.939226] page_type: f5(slab) [ 14.939371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.939603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.939822] page dumped because: kasan: bad access detected [ 14.940005] [ 14.940127] Memory state around the buggy address: [ 14.940408] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.940714] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.940937] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.941151] ^ [ 14.941555] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.942075] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.942470] ================================================================== [ 15.303014] ================================================================== [ 15.303374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 15.303717] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.304055] [ 15.304165] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.304212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.304225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.304248] Call Trace: [ 15.304269] <TASK> [ 15.304291] dump_stack_lvl+0x73/0xb0 [ 15.304319] print_report+0xd1/0x650 [ 15.304342] ? __virt_addr_valid+0x1db/0x2d0 [ 15.304366] ? kasan_atomics_helper+0xf11/0x5450 [ 15.304387] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.304413] ? kasan_atomics_helper+0xf11/0x5450 [ 15.304434] kasan_report+0x140/0x180 [ 15.304457] ? kasan_atomics_helper+0xf11/0x5450 [ 15.304482] kasan_check_range+0x10c/0x1c0 [ 15.304506] __kasan_check_write+0x18/0x20 [ 15.304529] kasan_atomics_helper+0xf11/0x5450 [ 15.304571] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.304594] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.304620] ? kasan_atomics+0x153/0x310 [ 15.304646] kasan_atomics+0x1dd/0x310 [ 15.304668] ? __pfx_kasan_atomics+0x10/0x10 [ 15.304692] ? __pfx_read_tsc+0x10/0x10 [ 15.304715] ? ktime_get_ts64+0x86/0x230 [ 15.304742] kunit_try_run_case+0x1a6/0x480 [ 15.304780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.304802] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.304846] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.304873] ? __kthread_parkme+0x82/0x160 [ 15.304897] ? preempt_count_sub+0x50/0x80 [ 15.304923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.304946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.304973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.305000] kthread+0x324/0x6e0 [ 15.305023] ? trace_preempt_on+0x20/0xc0 [ 15.305059] ? __pfx_kthread+0x10/0x10 [ 15.305092] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.305120] ? calculate_sigpending+0x7b/0xa0 [ 15.305143] ? __pfx_kthread+0x10/0x10 [ 15.305178] ret_from_fork+0x41/0x80 [ 15.305199] ? __pfx_kthread+0x10/0x10 [ 15.305223] ret_from_fork_asm+0x1a/0x30 [ 15.305256] </TASK> [ 15.305268] [ 15.312895] Allocated by task 273: [ 15.313062] kasan_save_stack+0x45/0x70 [ 15.313282] kasan_save_track+0x18/0x40 [ 15.313476] kasan_save_alloc_info+0x3b/0x50 [ 15.313701] __kasan_kmalloc+0xb7/0xc0 [ 15.313900] __kmalloc_cache_noprof+0x18a/0x420 [ 15.314166] kasan_atomics+0x96/0x310 [ 15.314354] kunit_try_run_case+0x1a6/0x480 [ 15.314573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.314811] kthread+0x324/0x6e0 [ 15.315003] ret_from_fork+0x41/0x80 [ 15.315186] ret_from_fork_asm+0x1a/0x30 [ 15.315412] [ 15.315500] The buggy address belongs to the object at ffff888101b3e000 [ 15.315500] which belongs to the cache kmalloc-64 of size 64 [ 15.315984] The buggy address is located 0 bytes to the right of [ 15.315984] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.316649] [ 15.316724] The buggy address belongs to the physical page: [ 15.316908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.317151] flags: 0x200000000000000(node=0|zone=2) [ 15.317319] page_type: f5(slab) [ 15.317444] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.317736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.318172] page dumped because: kasan: bad access detected [ 15.318427] [ 15.318521] Memory state around the buggy address: [ 15.318748] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.319099] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.319363] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.319577] ^ [ 15.319733] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.319959] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.320448] ================================================================== [ 15.654182] ================================================================== [ 15.654416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 15.654643] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.654871] [ 15.654955] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.654999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.655013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.655106] Call Trace: [ 15.655133] <TASK> [ 15.655154] dump_stack_lvl+0x73/0xb0 [ 15.655182] print_report+0xd1/0x650 [ 15.655204] ? __virt_addr_valid+0x1db/0x2d0 [ 15.655228] ? kasan_atomics_helper+0x1650/0x5450 [ 15.655277] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.655305] ? kasan_atomics_helper+0x1650/0x5450 [ 15.655326] kasan_report+0x140/0x180 [ 15.655349] ? kasan_atomics_helper+0x1650/0x5450 [ 15.655375] kasan_check_range+0x10c/0x1c0 [ 15.655398] __kasan_check_write+0x18/0x20 [ 15.655421] kasan_atomics_helper+0x1650/0x5450 [ 15.655444] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.655465] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.655491] ? kasan_atomics+0x153/0x310 [ 15.655517] kasan_atomics+0x1dd/0x310 [ 15.655541] ? __pfx_kasan_atomics+0x10/0x10 [ 15.655566] ? __pfx_read_tsc+0x10/0x10 [ 15.655588] ? ktime_get_ts64+0x86/0x230 [ 15.655615] kunit_try_run_case+0x1a6/0x480 [ 15.655641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.655663] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.655685] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.655712] ? __kthread_parkme+0x82/0x160 [ 15.655735] ? preempt_count_sub+0x50/0x80 [ 15.655761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.655784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.655810] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.655849] kthread+0x324/0x6e0 [ 15.655872] ? trace_preempt_on+0x20/0xc0 [ 15.655896] ? __pfx_kthread+0x10/0x10 [ 15.655920] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.655943] ? calculate_sigpending+0x7b/0xa0 [ 15.655966] ? __pfx_kthread+0x10/0x10 [ 15.655989] ret_from_fork+0x41/0x80 [ 15.656009] ? __pfx_kthread+0x10/0x10 [ 15.656031] ret_from_fork_asm+0x1a/0x30 [ 15.656064] </TASK> [ 15.656076] [ 15.665101] Allocated by task 273: [ 15.665858] kasan_save_stack+0x45/0x70 [ 15.666316] kasan_save_track+0x18/0x40 [ 15.666515] kasan_save_alloc_info+0x3b/0x50 [ 15.666672] __kasan_kmalloc+0xb7/0xc0 [ 15.666990] __kmalloc_cache_noprof+0x18a/0x420 [ 15.667397] kasan_atomics+0x96/0x310 [ 15.667695] kunit_try_run_case+0x1a6/0x480 [ 15.668112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.668476] kthread+0x324/0x6e0 [ 15.668649] ret_from_fork+0x41/0x80 [ 15.668822] ret_from_fork_asm+0x1a/0x30 [ 15.668978] [ 15.669052] The buggy address belongs to the object at ffff888101b3e000 [ 15.669052] which belongs to the cache kmalloc-64 of size 64 [ 15.669697] The buggy address is located 0 bytes to the right of [ 15.669697] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.670374] [ 15.670461] The buggy address belongs to the physical page: [ 15.670705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.670977] flags: 0x200000000000000(node=0|zone=2) [ 15.671252] page_type: f5(slab) [ 15.671462] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.671805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.672185] page dumped because: kasan: bad access detected [ 15.672366] [ 15.672439] Memory state around the buggy address: [ 15.672676] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.673010] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.673309] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.673565] ^ [ 15.673799] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.674066] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.674331] ================================================================== [ 15.975231] ================================================================== [ 15.975602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 15.976014] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.976353] [ 15.976533] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.977026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.977059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.977085] Call Trace: [ 15.977122] <TASK> [ 15.977148] dump_stack_lvl+0x73/0xb0 [ 15.977187] print_report+0xd1/0x650 [ 15.977211] ? __virt_addr_valid+0x1db/0x2d0 [ 15.977236] ? kasan_atomics_helper+0x4f73/0x5450 [ 15.977257] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.977286] ? kasan_atomics_helper+0x4f73/0x5450 [ 15.977309] kasan_report+0x140/0x180 [ 15.977332] ? kasan_atomics_helper+0x4f73/0x5450 [ 15.977361] __asan_report_load8_noabort+0x18/0x20 [ 15.977386] kasan_atomics_helper+0x4f73/0x5450 [ 15.977410] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.977432] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.977459] ? kasan_atomics+0x153/0x310 [ 15.977484] kasan_atomics+0x1dd/0x310 [ 15.977508] ? __pfx_kasan_atomics+0x10/0x10 [ 15.977532] ? __pfx_read_tsc+0x10/0x10 [ 15.977555] ? ktime_get_ts64+0x86/0x230 [ 15.977582] kunit_try_run_case+0x1a6/0x480 [ 15.977607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.977629] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.977652] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.977679] ? __kthread_parkme+0x82/0x160 [ 15.977703] ? preempt_count_sub+0x50/0x80 [ 15.977729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.977759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.977786] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.977813] kthread+0x324/0x6e0 [ 15.977846] ? trace_preempt_on+0x20/0xc0 [ 15.977871] ? __pfx_kthread+0x10/0x10 [ 15.977894] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.977919] ? calculate_sigpending+0x7b/0xa0 [ 15.977982] ? __pfx_kthread+0x10/0x10 [ 15.978017] ret_from_fork+0x41/0x80 [ 15.978037] ? __pfx_kthread+0x10/0x10 [ 15.978069] ret_from_fork_asm+0x1a/0x30 [ 15.978102] </TASK> [ 15.978114] [ 15.985918] Allocated by task 273: [ 15.986137] kasan_save_stack+0x45/0x70 [ 15.986296] kasan_save_track+0x18/0x40 [ 15.986429] kasan_save_alloc_info+0x3b/0x50 [ 15.986574] __kasan_kmalloc+0xb7/0xc0 [ 15.986935] __kmalloc_cache_noprof+0x18a/0x420 [ 15.987289] kasan_atomics+0x96/0x310 [ 15.987474] kunit_try_run_case+0x1a6/0x480 [ 15.987669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.987960] kthread+0x324/0x6e0 [ 15.988141] ret_from_fork+0x41/0x80 [ 15.988568] ret_from_fork_asm+0x1a/0x30 [ 15.988710] [ 15.988783] The buggy address belongs to the object at ffff888101b3e000 [ 15.988783] which belongs to the cache kmalloc-64 of size 64 [ 15.989313] The buggy address is located 0 bytes to the right of [ 15.989313] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.989956] [ 15.990054] The buggy address belongs to the physical page: [ 15.990304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.990798] flags: 0x200000000000000(node=0|zone=2) [ 15.991046] page_type: f5(slab) [ 15.991218] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.991460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.991680] page dumped because: kasan: bad access detected [ 15.991856] [ 15.991952] Memory state around the buggy address: [ 15.992332] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.992692] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.993258] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.993569] ^ [ 15.993796] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.994202] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.994520] ================================================================== [ 15.616120] ================================================================== [ 15.616536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 15.616888] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.617305] [ 15.617446] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.617494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.617508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.617532] Call Trace: [ 15.617554] <TASK> [ 15.617576] dump_stack_lvl+0x73/0xb0 [ 15.617606] print_report+0xd1/0x650 [ 15.617629] ? __virt_addr_valid+0x1db/0x2d0 [ 15.617653] ? kasan_atomics_helper+0x151e/0x5450 [ 15.617675] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.617702] ? kasan_atomics_helper+0x151e/0x5450 [ 15.617724] kasan_report+0x140/0x180 [ 15.617753] ? kasan_atomics_helper+0x151e/0x5450 [ 15.617778] kasan_check_range+0x10c/0x1c0 [ 15.617802] __kasan_check_write+0x18/0x20 [ 15.617826] kasan_atomics_helper+0x151e/0x5450 [ 15.617858] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.617880] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.617905] ? kasan_atomics+0x153/0x310 [ 15.617930] kasan_atomics+0x1dd/0x310 [ 15.617953] ? __pfx_kasan_atomics+0x10/0x10 [ 15.617977] ? __pfx_read_tsc+0x10/0x10 [ 15.618038] ? ktime_get_ts64+0x86/0x230 [ 15.618067] kunit_try_run_case+0x1a6/0x480 [ 15.618116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.618138] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.618162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.618187] ? __kthread_parkme+0x82/0x160 [ 15.618211] ? preempt_count_sub+0x50/0x80 [ 15.618237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.618260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.618287] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.618346] kthread+0x324/0x6e0 [ 15.618368] ? trace_preempt_on+0x20/0xc0 [ 15.618393] ? __pfx_kthread+0x10/0x10 [ 15.618416] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.618440] ? calculate_sigpending+0x7b/0xa0 [ 15.618464] ? __pfx_kthread+0x10/0x10 [ 15.618490] ret_from_fork+0x41/0x80 [ 15.618510] ? __pfx_kthread+0x10/0x10 [ 15.618532] ret_from_fork_asm+0x1a/0x30 [ 15.618616] </TASK> [ 15.618629] [ 15.626135] Allocated by task 273: [ 15.626442] kasan_save_stack+0x45/0x70 [ 15.626639] kasan_save_track+0x18/0x40 [ 15.626864] kasan_save_alloc_info+0x3b/0x50 [ 15.627017] __kasan_kmalloc+0xb7/0xc0 [ 15.627344] __kmalloc_cache_noprof+0x18a/0x420 [ 15.627585] kasan_atomics+0x96/0x310 [ 15.627793] kunit_try_run_case+0x1a6/0x480 [ 15.628013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.628230] kthread+0x324/0x6e0 [ 15.628398] ret_from_fork+0x41/0x80 [ 15.628585] ret_from_fork_asm+0x1a/0x30 [ 15.628808] [ 15.628920] The buggy address belongs to the object at ffff888101b3e000 [ 15.628920] which belongs to the cache kmalloc-64 of size 64 [ 15.629409] The buggy address is located 0 bytes to the right of [ 15.629409] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.629778] [ 15.629861] The buggy address belongs to the physical page: [ 15.630317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.630672] flags: 0x200000000000000(node=0|zone=2) [ 15.630895] page_type: f5(slab) [ 15.631028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.631390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.631720] page dumped because: kasan: bad access detected [ 15.631941] [ 15.632012] Memory state around the buggy address: [ 15.632412] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.632631] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.633033] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.633449] ^ [ 15.633927] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.634200] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.634413] ================================================================== [ 15.858736] ================================================================== [ 15.859087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 15.859487] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.859750] [ 15.859873] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.859919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.859933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.859956] Call Trace: [ 15.859978] <TASK> [ 15.860000] dump_stack_lvl+0x73/0xb0 [ 15.860029] print_report+0xd1/0x650 [ 15.860051] ? __virt_addr_valid+0x1db/0x2d0 [ 15.860086] ? kasan_atomics_helper+0x4f32/0x5450 [ 15.860107] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.860134] ? kasan_atomics_helper+0x4f32/0x5450 [ 15.860159] kasan_report+0x140/0x180 [ 15.860182] ? kasan_atomics_helper+0x4f32/0x5450 [ 15.860207] __asan_report_load8_noabort+0x18/0x20 [ 15.860232] kasan_atomics_helper+0x4f32/0x5450 [ 15.860255] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.860276] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.860302] ? kasan_atomics+0x153/0x310 [ 15.860329] kasan_atomics+0x1dd/0x310 [ 15.860351] ? __pfx_kasan_atomics+0x10/0x10 [ 15.860375] ? __pfx_read_tsc+0x10/0x10 [ 15.860399] ? ktime_get_ts64+0x86/0x230 [ 15.860426] kunit_try_run_case+0x1a6/0x480 [ 15.860453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.860475] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.860498] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.860525] ? __kthread_parkme+0x82/0x160 [ 15.860549] ? preempt_count_sub+0x50/0x80 [ 15.860575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.860598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.860625] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.860652] kthread+0x324/0x6e0 [ 15.860685] ? trace_preempt_on+0x20/0xc0 [ 15.860710] ? __pfx_kthread+0x10/0x10 [ 15.860772] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.860796] ? calculate_sigpending+0x7b/0xa0 [ 15.860820] ? __pfx_kthread+0x10/0x10 [ 15.860852] ret_from_fork+0x41/0x80 [ 15.860872] ? __pfx_kthread+0x10/0x10 [ 15.860895] ret_from_fork_asm+0x1a/0x30 [ 15.860927] </TASK> [ 15.860938] [ 15.868206] Allocated by task 273: [ 15.868417] kasan_save_stack+0x45/0x70 [ 15.868615] kasan_save_track+0x18/0x40 [ 15.868748] kasan_save_alloc_info+0x3b/0x50 [ 15.868904] __kasan_kmalloc+0xb7/0xc0 [ 15.869037] __kmalloc_cache_noprof+0x18a/0x420 [ 15.869468] kasan_atomics+0x96/0x310 [ 15.869678] kunit_try_run_case+0x1a6/0x480 [ 15.869901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.870106] kthread+0x324/0x6e0 [ 15.870229] ret_from_fork+0x41/0x80 [ 15.870357] ret_from_fork_asm+0x1a/0x30 [ 15.870495] [ 15.870566] The buggy address belongs to the object at ffff888101b3e000 [ 15.870566] which belongs to the cache kmalloc-64 of size 64 [ 15.871660] The buggy address is located 0 bytes to the right of [ 15.871660] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.872089] [ 15.872194] The buggy address belongs to the physical page: [ 15.872475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.872783] flags: 0x200000000000000(node=0|zone=2) [ 15.872957] page_type: f5(slab) [ 15.873081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.873659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.873968] page dumped because: kasan: bad access detected [ 15.874389] [ 15.874489] Memory state around the buggy address: [ 15.874655] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.874892] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.875691] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.876445] ^ [ 15.876704] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.877013] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.877589] ================================================================== [ 15.896795] ================================================================== [ 15.897060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 15.897684] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.898059] [ 15.898174] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.898219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.898233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.898256] Call Trace: [ 15.898278] <TASK> [ 15.898301] dump_stack_lvl+0x73/0xb0 [ 15.898328] print_report+0xd1/0x650 [ 15.898351] ? __virt_addr_valid+0x1db/0x2d0 [ 15.898375] ? kasan_atomics_helper+0x1d7b/0x5450 [ 15.898397] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.898424] ? kasan_atomics_helper+0x1d7b/0x5450 [ 15.898446] kasan_report+0x140/0x180 [ 15.898468] ? kasan_atomics_helper+0x1d7b/0x5450 [ 15.898494] kasan_check_range+0x10c/0x1c0 [ 15.898518] __kasan_check_write+0x18/0x20 [ 15.898541] kasan_atomics_helper+0x1d7b/0x5450 [ 15.898564] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.898586] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.898611] ? kasan_atomics+0x153/0x310 [ 15.898637] kasan_atomics+0x1dd/0x310 [ 15.898660] ? __pfx_kasan_atomics+0x10/0x10 [ 15.898684] ? __pfx_read_tsc+0x10/0x10 [ 15.898707] ? ktime_get_ts64+0x86/0x230 [ 15.898734] kunit_try_run_case+0x1a6/0x480 [ 15.898783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.898806] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.898829] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.898864] ? __kthread_parkme+0x82/0x160 [ 15.898888] ? preempt_count_sub+0x50/0x80 [ 15.898915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.898939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.898966] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.898993] kthread+0x324/0x6e0 [ 15.899016] ? trace_preempt_on+0x20/0xc0 [ 15.899041] ? __pfx_kthread+0x10/0x10 [ 15.899064] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.899088] ? calculate_sigpending+0x7b/0xa0 [ 15.899111] ? __pfx_kthread+0x10/0x10 [ 15.899135] ret_from_fork+0x41/0x80 [ 15.899155] ? __pfx_kthread+0x10/0x10 [ 15.899178] ret_from_fork_asm+0x1a/0x30 [ 15.899229] </TASK> [ 15.899240] [ 15.906450] Allocated by task 273: [ 15.906671] kasan_save_stack+0x45/0x70 [ 15.906889] kasan_save_track+0x18/0x40 [ 15.907095] kasan_save_alloc_info+0x3b/0x50 [ 15.907291] __kasan_kmalloc+0xb7/0xc0 [ 15.907420] __kmalloc_cache_noprof+0x18a/0x420 [ 15.907572] kasan_atomics+0x96/0x310 [ 15.907707] kunit_try_run_case+0x1a6/0x480 [ 15.907859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.908034] kthread+0x324/0x6e0 [ 15.908154] ret_from_fork+0x41/0x80 [ 15.908339] ret_from_fork_asm+0x1a/0x30 [ 15.908606] [ 15.908735] The buggy address belongs to the object at ffff888101b3e000 [ 15.908735] which belongs to the cache kmalloc-64 of size 64 [ 15.909440] The buggy address is located 0 bytes to the right of [ 15.909440] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.910505] [ 15.910721] The buggy address belongs to the physical page: [ 15.911042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.911381] flags: 0x200000000000000(node=0|zone=2) [ 15.911551] page_type: f5(slab) [ 15.911677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.911946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.912343] page dumped because: kasan: bad access detected [ 15.912676] [ 15.912902] Memory state around the buggy address: [ 15.913271] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.913582] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.913798] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.914016] ^ [ 15.914228] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.914616] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.915204] ================================================================== [ 15.765656] ================================================================== [ 15.766021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 15.766461] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.766966] [ 15.767079] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.767126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.767139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.767162] Call Trace: [ 15.767184] <TASK> [ 15.767205] dump_stack_lvl+0x73/0xb0 [ 15.767235] print_report+0xd1/0x650 [ 15.767258] ? __virt_addr_valid+0x1db/0x2d0 [ 15.767281] ? kasan_atomics_helper+0x194b/0x5450 [ 15.767303] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.767329] ? kasan_atomics_helper+0x194b/0x5450 [ 15.767352] kasan_report+0x140/0x180 [ 15.767374] ? kasan_atomics_helper+0x194b/0x5450 [ 15.767401] kasan_check_range+0x10c/0x1c0 [ 15.767424] __kasan_check_write+0x18/0x20 [ 15.767447] kasan_atomics_helper+0x194b/0x5450 [ 15.767472] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.767494] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.767519] ? kasan_atomics+0x153/0x310 [ 15.767545] kasan_atomics+0x1dd/0x310 [ 15.767568] ? __pfx_kasan_atomics+0x10/0x10 [ 15.767592] ? __pfx_read_tsc+0x10/0x10 [ 15.767616] ? ktime_get_ts64+0x86/0x230 [ 15.767642] kunit_try_run_case+0x1a6/0x480 [ 15.767665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.767698] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.767720] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.767747] ? __kthread_parkme+0x82/0x160 [ 15.767770] ? preempt_count_sub+0x50/0x80 [ 15.767796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.767820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.767884] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.767912] kthread+0x324/0x6e0 [ 15.767934] ? trace_preempt_on+0x20/0xc0 [ 15.767960] ? __pfx_kthread+0x10/0x10 [ 15.767983] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.768008] ? calculate_sigpending+0x7b/0xa0 [ 15.768031] ? __pfx_kthread+0x10/0x10 [ 15.768054] ret_from_fork+0x41/0x80 [ 15.768074] ? __pfx_kthread+0x10/0x10 [ 15.768115] ret_from_fork_asm+0x1a/0x30 [ 15.768148] </TASK> [ 15.768160] [ 15.775630] Allocated by task 273: [ 15.775846] kasan_save_stack+0x45/0x70 [ 15.776080] kasan_save_track+0x18/0x40 [ 15.776273] kasan_save_alloc_info+0x3b/0x50 [ 15.776482] __kasan_kmalloc+0xb7/0xc0 [ 15.776672] __kmalloc_cache_noprof+0x18a/0x420 [ 15.776890] kasan_atomics+0x96/0x310 [ 15.777091] kunit_try_run_case+0x1a6/0x480 [ 15.777304] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.777539] kthread+0x324/0x6e0 [ 15.777704] ret_from_fork+0x41/0x80 [ 15.777888] ret_from_fork_asm+0x1a/0x30 [ 15.778116] [ 15.778219] The buggy address belongs to the object at ffff888101b3e000 [ 15.778219] which belongs to the cache kmalloc-64 of size 64 [ 15.778709] The buggy address is located 0 bytes to the right of [ 15.778709] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.779254] [ 15.779360] The buggy address belongs to the physical page: [ 15.779592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.779946] flags: 0x200000000000000(node=0|zone=2) [ 15.780145] page_type: f5(slab) [ 15.780327] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.780652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.780889] page dumped because: kasan: bad access detected [ 15.781062] [ 15.781135] Memory state around the buggy address: [ 15.781293] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.781604] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.781940] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.782253] ^ [ 15.782518] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.782845] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.783316] ================================================================== [ 15.220810] ================================================================== [ 15.221119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 15.221880] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.222286] [ 15.222412] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.222465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.222478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.222501] Call Trace: [ 15.222524] <TASK> [ 15.222584] dump_stack_lvl+0x73/0xb0 [ 15.222634] print_report+0xd1/0x650 [ 15.222685] ? __virt_addr_valid+0x1db/0x2d0 [ 15.222722] ? kasan_atomics_helper+0x4a86/0x5450 [ 15.222758] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.222789] ? kasan_atomics_helper+0x4a86/0x5450 [ 15.222811] kasan_report+0x140/0x180 [ 15.222833] ? kasan_atomics_helper+0x4a86/0x5450 [ 15.222873] __asan_report_load4_noabort+0x18/0x20 [ 15.222897] kasan_atomics_helper+0x4a86/0x5450 [ 15.222920] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.222942] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.222967] ? kasan_atomics+0x153/0x310 [ 15.222994] kasan_atomics+0x1dd/0x310 [ 15.223018] ? __pfx_kasan_atomics+0x10/0x10 [ 15.223041] ? __pfx_read_tsc+0x10/0x10 [ 15.223064] ? ktime_get_ts64+0x86/0x230 [ 15.223092] kunit_try_run_case+0x1a6/0x480 [ 15.223117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.223139] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.223163] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.223189] ? __kthread_parkme+0x82/0x160 [ 15.223213] ? preempt_count_sub+0x50/0x80 [ 15.223239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.223262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.223289] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.223315] kthread+0x324/0x6e0 [ 15.223338] ? trace_preempt_on+0x20/0xc0 [ 15.223362] ? __pfx_kthread+0x10/0x10 [ 15.223386] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.223423] ? calculate_sigpending+0x7b/0xa0 [ 15.223447] ? __pfx_kthread+0x10/0x10 [ 15.223470] ret_from_fork+0x41/0x80 [ 15.223490] ? __pfx_kthread+0x10/0x10 [ 15.223513] ret_from_fork_asm+0x1a/0x30 [ 15.223546] </TASK> [ 15.223558] [ 15.230970] Allocated by task 273: [ 15.231263] kasan_save_stack+0x45/0x70 [ 15.231493] kasan_save_track+0x18/0x40 [ 15.231652] kasan_save_alloc_info+0x3b/0x50 [ 15.231892] __kasan_kmalloc+0xb7/0xc0 [ 15.232068] __kmalloc_cache_noprof+0x18a/0x420 [ 15.232260] kasan_atomics+0x96/0x310 [ 15.232448] kunit_try_run_case+0x1a6/0x480 [ 15.232634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.232877] kthread+0x324/0x6e0 [ 15.233073] ret_from_fork+0x41/0x80 [ 15.233234] ret_from_fork_asm+0x1a/0x30 [ 15.233427] [ 15.233508] The buggy address belongs to the object at ffff888101b3e000 [ 15.233508] which belongs to the cache kmalloc-64 of size 64 [ 15.234034] The buggy address is located 0 bytes to the right of [ 15.234034] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.234557] [ 15.234635] The buggy address belongs to the physical page: [ 15.234907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.235492] flags: 0x200000000000000(node=0|zone=2) [ 15.235703] page_type: f5(slab) [ 15.235828] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.236278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.236652] page dumped because: kasan: bad access detected [ 15.237050] [ 15.237150] Memory state around the buggy address: [ 15.237414] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.237772] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.238231] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.238553] ^ [ 15.238710] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.238932] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.239141] ================================================================== [ 14.826778] ================================================================== [ 14.827269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 14.827777] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 14.828093] [ 14.828238] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.828299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.828324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.828347] Call Trace: [ 14.828370] <TASK> [ 14.828391] dump_stack_lvl+0x73/0xb0 [ 14.828420] print_report+0xd1/0x650 [ 14.828443] ? __virt_addr_valid+0x1db/0x2d0 [ 14.828465] ? kasan_atomics_helper+0x4b8a/0x5450 [ 14.828486] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.828529] ? kasan_atomics_helper+0x4b8a/0x5450 [ 14.828550] kasan_report+0x140/0x180 [ 14.828571] ? kasan_atomics_helper+0x4b8a/0x5450 [ 14.828596] __asan_report_load4_noabort+0x18/0x20 [ 14.828619] kasan_atomics_helper+0x4b8a/0x5450 [ 14.828641] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.828662] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.828688] ? kasan_atomics+0x153/0x310 [ 14.828714] kasan_atomics+0x1dd/0x310 [ 14.828735] ? __pfx_kasan_atomics+0x10/0x10 [ 14.828759] ? __pfx_read_tsc+0x10/0x10 [ 14.828781] ? ktime_get_ts64+0x86/0x230 [ 14.828808] kunit_try_run_case+0x1a6/0x480 [ 14.828871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.828895] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.828918] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.828943] ? __kthread_parkme+0x82/0x160 [ 14.828966] ? preempt_count_sub+0x50/0x80 [ 14.828998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.829021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.829047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.829108] kthread+0x324/0x6e0 [ 14.829142] ? trace_preempt_on+0x20/0xc0 [ 14.829166] ? __pfx_kthread+0x10/0x10 [ 14.829187] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.829212] ? calculate_sigpending+0x7b/0xa0 [ 14.829234] ? __pfx_kthread+0x10/0x10 [ 14.829255] ret_from_fork+0x41/0x80 [ 14.829275] ? __pfx_kthread+0x10/0x10 [ 14.829296] ret_from_fork_asm+0x1a/0x30 [ 14.829328] </TASK> [ 14.829339] [ 14.837669] Allocated by task 273: [ 14.837860] kasan_save_stack+0x45/0x70 [ 14.838093] kasan_save_track+0x18/0x40 [ 14.838366] kasan_save_alloc_info+0x3b/0x50 [ 14.838569] __kasan_kmalloc+0xb7/0xc0 [ 14.838755] __kmalloc_cache_noprof+0x18a/0x420 [ 14.838965] kasan_atomics+0x96/0x310 [ 14.839186] kunit_try_run_case+0x1a6/0x480 [ 14.839361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.839638] kthread+0x324/0x6e0 [ 14.839818] ret_from_fork+0x41/0x80 [ 14.840120] ret_from_fork_asm+0x1a/0x30 [ 14.840444] [ 14.840541] The buggy address belongs to the object at ffff888101b3e000 [ 14.840541] which belongs to the cache kmalloc-64 of size 64 [ 14.841091] The buggy address is located 0 bytes to the right of [ 14.841091] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 14.841534] [ 14.841650] The buggy address belongs to the physical page: [ 14.841924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 14.842528] flags: 0x200000000000000(node=0|zone=2) [ 14.842943] page_type: f5(slab) [ 14.843171] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.843547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.843980] page dumped because: kasan: bad access detected [ 14.844300] [ 14.844392] Memory state around the buggy address: [ 14.844612] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.844928] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.845416] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.845644] ^ [ 14.845902] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.846302] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.846556] ================================================================== [ 15.466790] ================================================================== [ 15.467417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 15.467757] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.467999] [ 15.468088] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.468133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.468157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.468181] Call Trace: [ 15.468202] <TASK> [ 15.468256] dump_stack_lvl+0x73/0xb0 [ 15.468286] print_report+0xd1/0x650 [ 15.468309] ? __virt_addr_valid+0x1db/0x2d0 [ 15.468345] ? kasan_atomics_helper+0x49ea/0x5450 [ 15.468367] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.468394] ? kasan_atomics_helper+0x49ea/0x5450 [ 15.468416] kasan_report+0x140/0x180 [ 15.468439] ? kasan_atomics_helper+0x49ea/0x5450 [ 15.468465] __asan_report_load4_noabort+0x18/0x20 [ 15.468489] kasan_atomics_helper+0x49ea/0x5450 [ 15.468512] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.468535] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.468588] ? kasan_atomics+0x153/0x310 [ 15.468614] kasan_atomics+0x1dd/0x310 [ 15.468647] ? __pfx_kasan_atomics+0x10/0x10 [ 15.468671] ? __pfx_read_tsc+0x10/0x10 [ 15.468695] ? ktime_get_ts64+0x86/0x230 [ 15.468748] kunit_try_run_case+0x1a6/0x480 [ 15.468773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.468805] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.468829] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.468865] ? __kthread_parkme+0x82/0x160 [ 15.468916] ? preempt_count_sub+0x50/0x80 [ 15.468942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.468978] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.469005] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.469057] kthread+0x324/0x6e0 [ 15.469081] ? trace_preempt_on+0x20/0xc0 [ 15.469106] ? __pfx_kthread+0x10/0x10 [ 15.469151] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.469176] ? calculate_sigpending+0x7b/0xa0 [ 15.469199] ? __pfx_kthread+0x10/0x10 [ 15.469223] ret_from_fork+0x41/0x80 [ 15.469243] ? __pfx_kthread+0x10/0x10 [ 15.469266] ret_from_fork_asm+0x1a/0x30 [ 15.469300] </TASK> [ 15.469311] [ 15.477716] Allocated by task 273: [ 15.477950] kasan_save_stack+0x45/0x70 [ 15.478183] kasan_save_track+0x18/0x40 [ 15.478444] kasan_save_alloc_info+0x3b/0x50 [ 15.478743] __kasan_kmalloc+0xb7/0xc0 [ 15.478957] __kmalloc_cache_noprof+0x18a/0x420 [ 15.479361] kasan_atomics+0x96/0x310 [ 15.479550] kunit_try_run_case+0x1a6/0x480 [ 15.479757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.480022] kthread+0x324/0x6e0 [ 15.480208] ret_from_fork+0x41/0x80 [ 15.480393] ret_from_fork_asm+0x1a/0x30 [ 15.480591] [ 15.480723] The buggy address belongs to the object at ffff888101b3e000 [ 15.480723] which belongs to the cache kmalloc-64 of size 64 [ 15.481372] The buggy address is located 0 bytes to the right of [ 15.481372] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.481949] [ 15.482028] The buggy address belongs to the physical page: [ 15.482421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.482736] flags: 0x200000000000000(node=0|zone=2) [ 15.482916] page_type: f5(slab) [ 15.483045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.483347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.483691] page dumped because: kasan: bad access detected [ 15.483957] [ 15.484083] Memory state around the buggy address: [ 15.484393] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.484814] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.485300] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.485564] ^ [ 15.485724] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.485953] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.486541] ================================================================== [ 15.487294] ================================================================== [ 15.487719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 15.488150] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.488499] [ 15.488648] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.488734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.488748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.488797] Call Trace: [ 15.488848] <TASK> [ 15.488869] dump_stack_lvl+0x73/0xb0 [ 15.488912] print_report+0xd1/0x650 [ 15.488936] ? __virt_addr_valid+0x1db/0x2d0 [ 15.488979] ? kasan_atomics_helper+0x12e7/0x5450 [ 15.489002] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.489040] ? kasan_atomics_helper+0x12e7/0x5450 [ 15.489062] kasan_report+0x140/0x180 [ 15.489085] ? kasan_atomics_helper+0x12e7/0x5450 [ 15.489111] kasan_check_range+0x10c/0x1c0 [ 15.489135] __kasan_check_write+0x18/0x20 [ 15.489158] kasan_atomics_helper+0x12e7/0x5450 [ 15.489182] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.489204] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.489230] ? kasan_atomics+0x153/0x310 [ 15.489256] kasan_atomics+0x1dd/0x310 [ 15.489279] ? __pfx_kasan_atomics+0x10/0x10 [ 15.489303] ? __pfx_read_tsc+0x10/0x10 [ 15.489326] ? ktime_get_ts64+0x86/0x230 [ 15.489353] kunit_try_run_case+0x1a6/0x480 [ 15.489379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.489401] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.489424] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.489451] ? __kthread_parkme+0x82/0x160 [ 15.489474] ? preempt_count_sub+0x50/0x80 [ 15.489500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.489524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.489562] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.489589] kthread+0x324/0x6e0 [ 15.489611] ? trace_preempt_on+0x20/0xc0 [ 15.489663] ? __pfx_kthread+0x10/0x10 [ 15.489686] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.489711] ? calculate_sigpending+0x7b/0xa0 [ 15.489772] ? __pfx_kthread+0x10/0x10 [ 15.489796] ret_from_fork+0x41/0x80 [ 15.489816] ? __pfx_kthread+0x10/0x10 [ 15.489859] ret_from_fork_asm+0x1a/0x30 [ 15.489894] </TASK> [ 15.489906] [ 15.502113] Allocated by task 273: [ 15.502333] kasan_save_stack+0x45/0x70 [ 15.502799] kasan_save_track+0x18/0x40 [ 15.502968] kasan_save_alloc_info+0x3b/0x50 [ 15.503471] __kasan_kmalloc+0xb7/0xc0 [ 15.503972] __kmalloc_cache_noprof+0x18a/0x420 [ 15.504533] kasan_atomics+0x96/0x310 [ 15.504861] kunit_try_run_case+0x1a6/0x480 [ 15.505020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.505199] kthread+0x324/0x6e0 [ 15.505329] ret_from_fork+0x41/0x80 [ 15.505461] ret_from_fork_asm+0x1a/0x30 [ 15.505606] [ 15.505681] The buggy address belongs to the object at ffff888101b3e000 [ 15.505681] which belongs to the cache kmalloc-64 of size 64 [ 15.507073] The buggy address is located 0 bytes to the right of [ 15.507073] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.508240] [ 15.508446] The buggy address belongs to the physical page: [ 15.508956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.509667] flags: 0x200000000000000(node=0|zone=2) [ 15.510141] page_type: f5(slab) [ 15.510441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.511127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.511786] page dumped because: kasan: bad access detected [ 15.512295] [ 15.512460] Memory state around the buggy address: [ 15.512624] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.512849] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.513090] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.513714] ^ [ 15.514196] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.514810] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.515475] ================================================================== [ 15.783985] ================================================================== [ 15.784375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 15.784659] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.784898] [ 15.784985] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.785029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.785042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.785066] Call Trace: [ 15.785087] <TASK> [ 15.785107] dump_stack_lvl+0x73/0xb0 [ 15.785134] print_report+0xd1/0x650 [ 15.785176] ? __virt_addr_valid+0x1db/0x2d0 [ 15.785200] ? kasan_atomics_helper+0x19e4/0x5450 [ 15.785221] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.785247] ? kasan_atomics_helper+0x19e4/0x5450 [ 15.785272] kasan_report+0x140/0x180 [ 15.785294] ? kasan_atomics_helper+0x19e4/0x5450 [ 15.785321] kasan_check_range+0x10c/0x1c0 [ 15.785345] __kasan_check_write+0x18/0x20 [ 15.785369] kasan_atomics_helper+0x19e4/0x5450 [ 15.785392] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.785414] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.785439] ? kasan_atomics+0x153/0x310 [ 15.785466] kasan_atomics+0x1dd/0x310 [ 15.785490] ? __pfx_kasan_atomics+0x10/0x10 [ 15.785515] ? __pfx_read_tsc+0x10/0x10 [ 15.785538] ? ktime_get_ts64+0x86/0x230 [ 15.785564] kunit_try_run_case+0x1a6/0x480 [ 15.785589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.785612] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.785635] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.785660] ? __kthread_parkme+0x82/0x160 [ 15.785684] ? preempt_count_sub+0x50/0x80 [ 15.785728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.785758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.785785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.785811] kthread+0x324/0x6e0 [ 15.785834] ? trace_preempt_on+0x20/0xc0 [ 15.785867] ? __pfx_kthread+0x10/0x10 [ 15.785891] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.785914] ? calculate_sigpending+0x7b/0xa0 [ 15.785937] ? __pfx_kthread+0x10/0x10 [ 15.785960] ret_from_fork+0x41/0x80 [ 15.785980] ? __pfx_kthread+0x10/0x10 [ 15.786003] ret_from_fork_asm+0x1a/0x30 [ 15.786035] </TASK> [ 15.786046] [ 15.794108] Allocated by task 273: [ 15.794310] kasan_save_stack+0x45/0x70 [ 15.794525] kasan_save_track+0x18/0x40 [ 15.794715] kasan_save_alloc_info+0x3b/0x50 [ 15.794924] __kasan_kmalloc+0xb7/0xc0 [ 15.795267] __kmalloc_cache_noprof+0x18a/0x420 [ 15.796242] kasan_atomics+0x96/0x310 [ 15.796450] kunit_try_run_case+0x1a6/0x480 [ 15.796621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.796864] kthread+0x324/0x6e0 [ 15.797030] ret_from_fork+0x41/0x80 [ 15.797235] ret_from_fork_asm+0x1a/0x30 [ 15.797407] [ 15.797524] The buggy address belongs to the object at ffff888101b3e000 [ 15.797524] which belongs to the cache kmalloc-64 of size 64 [ 15.797926] The buggy address is located 0 bytes to the right of [ 15.797926] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.798523] [ 15.798602] The buggy address belongs to the physical page: [ 15.798802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.799352] flags: 0x200000000000000(node=0|zone=2) [ 15.799554] page_type: f5(slab) [ 15.799716] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.800096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.800320] page dumped because: kasan: bad access detected [ 15.800486] [ 15.800586] Memory state around the buggy address: [ 15.800847] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.801354] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.801668] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.801971] ^ [ 15.802239] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.802553] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.802772] ================================================================== [ 15.803505] ================================================================== [ 15.803847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 15.804160] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.804493] [ 15.804606] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.804651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.804664] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.804711] Call Trace: [ 15.804732] <TASK> [ 15.804753] dump_stack_lvl+0x73/0xb0 [ 15.804783] print_report+0xd1/0x650 [ 15.804806] ? __virt_addr_valid+0x1db/0x2d0 [ 15.804829] ? kasan_atomics_helper+0x1a80/0x5450 [ 15.804861] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.804906] ? kasan_atomics_helper+0x1a80/0x5450 [ 15.804928] kasan_report+0x140/0x180 [ 15.804951] ? kasan_atomics_helper+0x1a80/0x5450 [ 15.804977] kasan_check_range+0x10c/0x1c0 [ 15.805002] __kasan_check_write+0x18/0x20 [ 15.805025] kasan_atomics_helper+0x1a80/0x5450 [ 15.805048] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.805071] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.805096] ? kasan_atomics+0x153/0x310 [ 15.805122] kasan_atomics+0x1dd/0x310 [ 15.805159] ? __pfx_kasan_atomics+0x10/0x10 [ 15.805183] ? __pfx_read_tsc+0x10/0x10 [ 15.805206] ? ktime_get_ts64+0x86/0x230 [ 15.805241] kunit_try_run_case+0x1a6/0x480 [ 15.805283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.805308] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.805332] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.805358] ? __kthread_parkme+0x82/0x160 [ 15.805382] ? preempt_count_sub+0x50/0x80 [ 15.805408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.805447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.805473] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.805500] kthread+0x324/0x6e0 [ 15.805522] ? trace_preempt_on+0x20/0xc0 [ 15.805547] ? __pfx_kthread+0x10/0x10 [ 15.805569] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.805594] ? calculate_sigpending+0x7b/0xa0 [ 15.805617] ? __pfx_kthread+0x10/0x10 [ 15.805640] ret_from_fork+0x41/0x80 [ 15.805659] ? __pfx_kthread+0x10/0x10 [ 15.805682] ret_from_fork_asm+0x1a/0x30 [ 15.805715] </TASK> [ 15.805726] [ 15.813446] Allocated by task 273: [ 15.813692] kasan_save_stack+0x45/0x70 [ 15.813929] kasan_save_track+0x18/0x40 [ 15.814070] kasan_save_alloc_info+0x3b/0x50 [ 15.814222] __kasan_kmalloc+0xb7/0xc0 [ 15.814409] __kmalloc_cache_noprof+0x18a/0x420 [ 15.814740] kasan_atomics+0x96/0x310 [ 15.814939] kunit_try_run_case+0x1a6/0x480 [ 15.815177] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.815502] kthread+0x324/0x6e0 [ 15.815642] ret_from_fork+0x41/0x80 [ 15.815773] ret_from_fork_asm+0x1a/0x30 [ 15.815925] [ 15.815999] The buggy address belongs to the object at ffff888101b3e000 [ 15.815999] which belongs to the cache kmalloc-64 of size 64 [ 15.816401] The buggy address is located 0 bytes to the right of [ 15.816401] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.816989] [ 15.817093] The buggy address belongs to the physical page: [ 15.817404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.817796] flags: 0x200000000000000(node=0|zone=2) [ 15.818094] page_type: f5(slab) [ 15.818230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.818463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.818777] page dumped because: kasan: bad access detected [ 15.819053] [ 15.819150] Memory state around the buggy address: [ 15.819386] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.819628] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.819853] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.820188] ^ [ 15.820414] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.820866] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.821081] ================================================================== [ 15.821892] ================================================================== [ 15.822215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 15.822539] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.822801] [ 15.822900] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.822947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.822961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.822984] Call Trace: [ 15.823006] <TASK> [ 15.823028] dump_stack_lvl+0x73/0xb0 [ 15.823055] print_report+0xd1/0x650 [ 15.823078] ? __virt_addr_valid+0x1db/0x2d0 [ 15.823132] ? kasan_atomics_helper+0x1b23/0x5450 [ 15.823154] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.823181] ? kasan_atomics_helper+0x1b23/0x5450 [ 15.823202] kasan_report+0x140/0x180 [ 15.823225] ? kasan_atomics_helper+0x1b23/0x5450 [ 15.823251] kasan_check_range+0x10c/0x1c0 [ 15.823274] __kasan_check_write+0x18/0x20 [ 15.823298] kasan_atomics_helper+0x1b23/0x5450 [ 15.823321] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.823344] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.823369] ? kasan_atomics+0x153/0x310 [ 15.823395] kasan_atomics+0x1dd/0x310 [ 15.823418] ? __pfx_kasan_atomics+0x10/0x10 [ 15.823443] ? __pfx_read_tsc+0x10/0x10 [ 15.823466] ? ktime_get_ts64+0x86/0x230 [ 15.823492] kunit_try_run_case+0x1a6/0x480 [ 15.823518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.823539] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.823562] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.823588] ? __kthread_parkme+0x82/0x160 [ 15.823612] ? preempt_count_sub+0x50/0x80 [ 15.823638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.823662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.823688] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.823714] kthread+0x324/0x6e0 [ 15.823737] ? trace_preempt_on+0x20/0xc0 [ 15.823780] ? __pfx_kthread+0x10/0x10 [ 15.823803] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.823827] ? calculate_sigpending+0x7b/0xa0 [ 15.823862] ? __pfx_kthread+0x10/0x10 [ 15.823885] ret_from_fork+0x41/0x80 [ 15.823906] ? __pfx_kthread+0x10/0x10 [ 15.823928] ret_from_fork_asm+0x1a/0x30 [ 15.823961] </TASK> [ 15.823973] [ 15.831639] Allocated by task 273: [ 15.831795] kasan_save_stack+0x45/0x70 [ 15.832007] kasan_save_track+0x18/0x40 [ 15.832217] kasan_save_alloc_info+0x3b/0x50 [ 15.832506] __kasan_kmalloc+0xb7/0xc0 [ 15.832643] __kmalloc_cache_noprof+0x18a/0x420 [ 15.832800] kasan_atomics+0x96/0x310 [ 15.832945] kunit_try_run_case+0x1a6/0x480 [ 15.833094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.833316] kthread+0x324/0x6e0 [ 15.833474] ret_from_fork+0x41/0x80 [ 15.833629] ret_from_fork_asm+0x1a/0x30 [ 15.833790] [ 15.833875] The buggy address belongs to the object at ffff888101b3e000 [ 15.833875] which belongs to the cache kmalloc-64 of size 64 [ 15.834478] The buggy address is located 0 bytes to the right of [ 15.834478] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.835035] [ 15.835110] The buggy address belongs to the physical page: [ 15.835285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.835937] flags: 0x200000000000000(node=0|zone=2) [ 15.836195] page_type: f5(slab) [ 15.836371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.836717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.837034] page dumped because: kasan: bad access detected [ 15.837270] [ 15.837343] Memory state around the buggy address: [ 15.837567] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.837868] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.838165] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.838484] ^ [ 15.838710] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.838988] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.839299] ================================================================== [ 15.916068] ================================================================== [ 15.916429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 15.916861] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.917193] [ 15.917312] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.917394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.917408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.917431] Call Trace: [ 15.917454] <TASK> [ 15.917476] dump_stack_lvl+0x73/0xb0 [ 15.917537] print_report+0xd1/0x650 [ 15.917560] ? __virt_addr_valid+0x1db/0x2d0 [ 15.917584] ? kasan_atomics_helper+0x1e13/0x5450 [ 15.917606] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.917631] ? kasan_atomics_helper+0x1e13/0x5450 [ 15.917653] kasan_report+0x140/0x180 [ 15.917675] ? kasan_atomics_helper+0x1e13/0x5450 [ 15.917731] kasan_check_range+0x10c/0x1c0 [ 15.917761] __kasan_check_write+0x18/0x20 [ 15.917785] kasan_atomics_helper+0x1e13/0x5450 [ 15.917808] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.917873] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.917902] ? kasan_atomics+0x153/0x310 [ 15.917928] kasan_atomics+0x1dd/0x310 [ 15.917951] ? __pfx_kasan_atomics+0x10/0x10 [ 15.918005] ? __pfx_read_tsc+0x10/0x10 [ 15.918029] ? ktime_get_ts64+0x86/0x230 [ 15.918056] kunit_try_run_case+0x1a6/0x480 [ 15.918090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.918113] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.918135] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.918194] ? __kthread_parkme+0x82/0x160 [ 15.918218] ? preempt_count_sub+0x50/0x80 [ 15.918244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.918267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.918294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.918321] kthread+0x324/0x6e0 [ 15.918343] ? trace_preempt_on+0x20/0xc0 [ 15.918368] ? __pfx_kthread+0x10/0x10 [ 15.918392] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.918416] ? calculate_sigpending+0x7b/0xa0 [ 15.918440] ? __pfx_kthread+0x10/0x10 [ 15.918491] ret_from_fork+0x41/0x80 [ 15.918534] ? __pfx_kthread+0x10/0x10 [ 15.918581] ret_from_fork_asm+0x1a/0x30 [ 15.918636] </TASK> [ 15.918649] [ 15.926699] Allocated by task 273: [ 15.926928] kasan_save_stack+0x45/0x70 [ 15.927227] kasan_save_track+0x18/0x40 [ 15.927432] kasan_save_alloc_info+0x3b/0x50 [ 15.927656] __kasan_kmalloc+0xb7/0xc0 [ 15.927869] __kmalloc_cache_noprof+0x18a/0x420 [ 15.928115] kasan_atomics+0x96/0x310 [ 15.928253] kunit_try_run_case+0x1a6/0x480 [ 15.928397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.928568] kthread+0x324/0x6e0 [ 15.928741] ret_from_fork+0x41/0x80 [ 15.928936] ret_from_fork_asm+0x1a/0x30 [ 15.929221] [ 15.929463] The buggy address belongs to the object at ffff888101b3e000 [ 15.929463] which belongs to the cache kmalloc-64 of size 64 [ 15.930088] The buggy address is located 0 bytes to the right of [ 15.930088] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.930525] [ 15.930599] The buggy address belongs to the physical page: [ 15.930807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.931322] flags: 0x200000000000000(node=0|zone=2) [ 15.931623] page_type: f5(slab) [ 15.931750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.932108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.932467] page dumped because: kasan: bad access detected [ 15.932695] [ 15.932767] Memory state around the buggy address: [ 15.932934] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.933438] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.933755] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.934108] ^ [ 15.934343] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.934659] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.934948] ================================================================== [ 16.141258] ================================================================== [ 16.142173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 16.142625] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 16.143182] [ 16.143389] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 16.143450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.143464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.143489] Call Trace: [ 16.143511] <TASK> [ 16.143534] dump_stack_lvl+0x73/0xb0 [ 16.143597] print_report+0xd1/0x650 [ 16.143620] ? __virt_addr_valid+0x1db/0x2d0 [ 16.143655] ? kasan_atomics_helper+0x5117/0x5450 [ 16.143678] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.143704] ? kasan_atomics_helper+0x5117/0x5450 [ 16.143726] kasan_report+0x140/0x180 [ 16.143749] ? kasan_atomics_helper+0x5117/0x5450 [ 16.143774] __asan_report_load8_noabort+0x18/0x20 [ 16.143798] kasan_atomics_helper+0x5117/0x5450 [ 16.143822] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.143854] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.143880] ? kasan_atomics+0x153/0x310 [ 16.143906] kasan_atomics+0x1dd/0x310 [ 16.143928] ? __pfx_kasan_atomics+0x10/0x10 [ 16.143953] ? __pfx_read_tsc+0x10/0x10 [ 16.143978] ? ktime_get_ts64+0x86/0x230 [ 16.144007] kunit_try_run_case+0x1a6/0x480 [ 16.144054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.144076] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.144100] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.144127] ? __kthread_parkme+0x82/0x160 [ 16.144151] ? preempt_count_sub+0x50/0x80 [ 16.144177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.144202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.144229] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.144256] kthread+0x324/0x6e0 [ 16.144280] ? trace_preempt_on+0x20/0xc0 [ 16.144305] ? __pfx_kthread+0x10/0x10 [ 16.144328] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.144352] ? calculate_sigpending+0x7b/0xa0 [ 16.144375] ? __pfx_kthread+0x10/0x10 [ 16.144399] ret_from_fork+0x41/0x80 [ 16.144419] ? __pfx_kthread+0x10/0x10 [ 16.144442] ret_from_fork_asm+0x1a/0x30 [ 16.144475] </TASK> [ 16.144487] [ 16.153887] Allocated by task 273: [ 16.154136] kasan_save_stack+0x45/0x70 [ 16.154447] kasan_save_track+0x18/0x40 [ 16.154690] kasan_save_alloc_info+0x3b/0x50 [ 16.154912] __kasan_kmalloc+0xb7/0xc0 [ 16.155142] __kmalloc_cache_noprof+0x18a/0x420 [ 16.155374] kasan_atomics+0x96/0x310 [ 16.155567] kunit_try_run_case+0x1a6/0x480 [ 16.155764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.156044] kthread+0x324/0x6e0 [ 16.156231] ret_from_fork+0x41/0x80 [ 16.156418] ret_from_fork_asm+0x1a/0x30 [ 16.156656] [ 16.156748] The buggy address belongs to the object at ffff888101b3e000 [ 16.156748] which belongs to the cache kmalloc-64 of size 64 [ 16.157510] The buggy address is located 0 bytes to the right of [ 16.157510] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 16.158063] [ 16.158185] The buggy address belongs to the physical page: [ 16.158450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 16.158825] flags: 0x200000000000000(node=0|zone=2) [ 16.159124] page_type: f5(slab) [ 16.159334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.159699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.160135] page dumped because: kasan: bad access detected [ 16.160383] [ 16.160474] Memory state around the buggy address: [ 16.160754] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.161079] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.161813] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.162394] ^ [ 16.162606] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.162903] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.163630] ================================================================== [ 15.730197] ================================================================== [ 15.730437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 15.730674] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.730913] [ 15.731003] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.731048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.731061] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.731084] Call Trace: [ 15.731106] <TASK> [ 15.731129] dump_stack_lvl+0x73/0xb0 [ 15.731169] print_report+0xd1/0x650 [ 15.731192] ? __virt_addr_valid+0x1db/0x2d0 [ 15.731217] ? kasan_atomics_helper+0x1819/0x5450 [ 15.731239] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.731265] ? kasan_atomics_helper+0x1819/0x5450 [ 15.731287] kasan_report+0x140/0x180 [ 15.731309] ? kasan_atomics_helper+0x1819/0x5450 [ 15.731335] kasan_check_range+0x10c/0x1c0 [ 15.731359] __kasan_check_write+0x18/0x20 [ 15.731383] kasan_atomics_helper+0x1819/0x5450 [ 15.731408] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.731430] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.731455] ? kasan_atomics+0x153/0x310 [ 15.731480] kasan_atomics+0x1dd/0x310 [ 15.731503] ? __pfx_kasan_atomics+0x10/0x10 [ 15.731527] ? __pfx_read_tsc+0x10/0x10 [ 15.731550] ? ktime_get_ts64+0x86/0x230 [ 15.731576] kunit_try_run_case+0x1a6/0x480 [ 15.731600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.731622] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.731645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.731671] ? __kthread_parkme+0x82/0x160 [ 15.731694] ? preempt_count_sub+0x50/0x80 [ 15.731720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.731743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.731771] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.731798] kthread+0x324/0x6e0 [ 15.731821] ? trace_preempt_on+0x20/0xc0 [ 15.731855] ? __pfx_kthread+0x10/0x10 [ 15.731879] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.731902] ? calculate_sigpending+0x7b/0xa0 [ 15.731925] ? __pfx_kthread+0x10/0x10 [ 15.731949] ret_from_fork+0x41/0x80 [ 15.731968] ? __pfx_kthread+0x10/0x10 [ 15.731993] ret_from_fork_asm+0x1a/0x30 [ 15.732025] </TASK> [ 15.732037] [ 15.739080] Allocated by task 273: [ 15.739224] kasan_save_stack+0x45/0x70 [ 15.739494] kasan_save_track+0x18/0x40 [ 15.739689] kasan_save_alloc_info+0x3b/0x50 [ 15.739920] __kasan_kmalloc+0xb7/0xc0 [ 15.740108] __kmalloc_cache_noprof+0x18a/0x420 [ 15.740357] kasan_atomics+0x96/0x310 [ 15.740668] kunit_try_run_case+0x1a6/0x480 [ 15.740894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.741279] kthread+0x324/0x6e0 [ 15.741455] ret_from_fork+0x41/0x80 [ 15.741629] ret_from_fork_asm+0x1a/0x30 [ 15.741798] [ 15.741895] The buggy address belongs to the object at ffff888101b3e000 [ 15.741895] which belongs to the cache kmalloc-64 of size 64 [ 15.742326] The buggy address is located 0 bytes to the right of [ 15.742326] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.742694] [ 15.742789] The buggy address belongs to the physical page: [ 15.743051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.743408] flags: 0x200000000000000(node=0|zone=2) [ 15.743858] page_type: f5(slab) [ 15.744028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.744264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.744484] page dumped because: kasan: bad access detected [ 15.744650] [ 15.744720] Memory state around the buggy address: [ 15.744955] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.745378] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.745693] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.746017] ^ [ 15.746229] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746503] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746767] ================================================================== [ 15.137154] ================================================================== [ 15.137498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 15.138320] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.138767] [ 15.139083] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.139138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.139153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.139177] Call Trace: [ 15.139200] <TASK> [ 15.139224] dump_stack_lvl+0x73/0xb0 [ 15.139260] print_report+0xd1/0x650 [ 15.139285] ? __virt_addr_valid+0x1db/0x2d0 [ 15.139309] ? kasan_atomics_helper+0xa2c/0x5450 [ 15.139331] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.139358] ? kasan_atomics_helper+0xa2c/0x5450 [ 15.139380] kasan_report+0x140/0x180 [ 15.139404] ? kasan_atomics_helper+0xa2c/0x5450 [ 15.139430] kasan_check_range+0x10c/0x1c0 [ 15.139453] __kasan_check_write+0x18/0x20 [ 15.139477] kasan_atomics_helper+0xa2c/0x5450 [ 15.139499] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.139522] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.139552] ? kasan_atomics+0x153/0x310 [ 15.139578] kasan_atomics+0x1dd/0x310 [ 15.139601] ? __pfx_kasan_atomics+0x10/0x10 [ 15.139625] ? __pfx_read_tsc+0x10/0x10 [ 15.139649] ? ktime_get_ts64+0x86/0x230 [ 15.139676] kunit_try_run_case+0x1a6/0x480 [ 15.139702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.139725] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.139749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.139776] ? __kthread_parkme+0x82/0x160 [ 15.139799] ? preempt_count_sub+0x50/0x80 [ 15.139826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.139864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.139892] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.139920] kthread+0x324/0x6e0 [ 15.139943] ? trace_preempt_on+0x20/0xc0 [ 15.139968] ? __pfx_kthread+0x10/0x10 [ 15.139991] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.140015] ? calculate_sigpending+0x7b/0xa0 [ 15.140038] ? __pfx_kthread+0x10/0x10 [ 15.140062] ret_from_fork+0x41/0x80 [ 15.140083] ? __pfx_kthread+0x10/0x10 [ 15.140106] ret_from_fork_asm+0x1a/0x30 [ 15.140138] </TASK> [ 15.140150] [ 15.150453] Allocated by task 273: [ 15.150638] kasan_save_stack+0x45/0x70 [ 15.150859] kasan_save_track+0x18/0x40 [ 15.151037] kasan_save_alloc_info+0x3b/0x50 [ 15.151585] __kasan_kmalloc+0xb7/0xc0 [ 15.151784] __kmalloc_cache_noprof+0x18a/0x420 [ 15.152199] kasan_atomics+0x96/0x310 [ 15.152470] kunit_try_run_case+0x1a6/0x480 [ 15.152682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.153138] kthread+0x324/0x6e0 [ 15.153400] ret_from_fork+0x41/0x80 [ 15.153652] ret_from_fork_asm+0x1a/0x30 [ 15.153884] [ 15.153984] The buggy address belongs to the object at ffff888101b3e000 [ 15.153984] which belongs to the cache kmalloc-64 of size 64 [ 15.154731] The buggy address is located 0 bytes to the right of [ 15.154731] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.155467] [ 15.155558] The buggy address belongs to the physical page: [ 15.155894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.156526] flags: 0x200000000000000(node=0|zone=2) [ 15.156853] page_type: f5(slab) [ 15.157109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.157438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.157901] page dumped because: kasan: bad access detected [ 15.158296] [ 15.158419] Memory state around the buggy address: [ 15.158690] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.158986] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.159548] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.159929] ^ [ 15.160322] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.160708] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.161143] ================================================================== [ 16.014569] ================================================================== [ 16.014875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 16.015275] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 16.015629] [ 16.015742] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 16.015788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.015844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.015868] Call Trace: [ 16.015889] <TASK> [ 16.015911] dump_stack_lvl+0x73/0xb0 [ 16.015973] print_report+0xd1/0x650 [ 16.015996] ? __virt_addr_valid+0x1db/0x2d0 [ 16.016020] ? kasan_atomics_helper+0x4f9a/0x5450 [ 16.016043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.016071] ? kasan_atomics_helper+0x4f9a/0x5450 [ 16.016092] kasan_report+0x140/0x180 [ 16.016147] ? kasan_atomics_helper+0x4f9a/0x5450 [ 16.016176] __asan_report_load8_noabort+0x18/0x20 [ 16.016201] kasan_atomics_helper+0x4f9a/0x5450 [ 16.016225] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.016248] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.016273] ? kasan_atomics+0x153/0x310 [ 16.016331] kasan_atomics+0x1dd/0x310 [ 16.016379] ? __pfx_kasan_atomics+0x10/0x10 [ 16.016432] ? __pfx_read_tsc+0x10/0x10 [ 16.016455] ? ktime_get_ts64+0x86/0x230 [ 16.016483] kunit_try_run_case+0x1a6/0x480 [ 16.016510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.016534] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.016559] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.016585] ? __kthread_parkme+0x82/0x160 [ 16.016609] ? preempt_count_sub+0x50/0x80 [ 16.016636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.016660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.016687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.016714] kthread+0x324/0x6e0 [ 16.016768] ? trace_preempt_on+0x20/0xc0 [ 16.016795] ? __pfx_kthread+0x10/0x10 [ 16.016819] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.016851] ? calculate_sigpending+0x7b/0xa0 [ 16.016874] ? __pfx_kthread+0x10/0x10 [ 16.016924] ret_from_fork+0x41/0x80 [ 16.016967] ? __pfx_kthread+0x10/0x10 [ 16.017014] ret_from_fork_asm+0x1a/0x30 [ 16.017114] </TASK> [ 16.017149] [ 16.025160] Allocated by task 273: [ 16.025402] kasan_save_stack+0x45/0x70 [ 16.025635] kasan_save_track+0x18/0x40 [ 16.025809] kasan_save_alloc_info+0x3b/0x50 [ 16.026044] __kasan_kmalloc+0xb7/0xc0 [ 16.026245] __kmalloc_cache_noprof+0x18a/0x420 [ 16.026471] kasan_atomics+0x96/0x310 [ 16.026669] kunit_try_run_case+0x1a6/0x480 [ 16.026882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.027062] kthread+0x324/0x6e0 [ 16.027187] ret_from_fork+0x41/0x80 [ 16.027316] ret_from_fork_asm+0x1a/0x30 [ 16.027455] [ 16.027527] The buggy address belongs to the object at ffff888101b3e000 [ 16.027527] which belongs to the cache kmalloc-64 of size 64 [ 16.027977] The buggy address is located 0 bytes to the right of [ 16.027977] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 16.028906] [ 16.029007] The buggy address belongs to the physical page: [ 16.029270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 16.029509] flags: 0x200000000000000(node=0|zone=2) [ 16.029674] page_type: f5(slab) [ 16.029805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.030058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.030394] page dumped because: kasan: bad access detected [ 16.030682] [ 16.030810] Memory state around the buggy address: [ 16.031159] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.031560] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.031896] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.032493] ^ [ 16.032667] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.032891] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.033164] ================================================================== [ 16.100094] ================================================================== [ 16.100713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 16.101054] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 16.101381] [ 16.101468] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 16.101512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.101526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.101549] Call Trace: [ 16.101570] <TASK> [ 16.101591] dump_stack_lvl+0x73/0xb0 [ 16.101618] print_report+0xd1/0x650 [ 16.101642] ? __virt_addr_valid+0x1db/0x2d0 [ 16.101666] ? kasan_atomics_helper+0x4fa7/0x5450 [ 16.101688] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.101715] ? kasan_atomics_helper+0x4fa7/0x5450 [ 16.101736] kasan_report+0x140/0x180 [ 16.101764] ? kasan_atomics_helper+0x4fa7/0x5450 [ 16.101790] __asan_report_load8_noabort+0x18/0x20 [ 16.101814] kasan_atomics_helper+0x4fa7/0x5450 [ 16.101885] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.101909] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.101935] ? kasan_atomics+0x153/0x310 [ 16.101960] kasan_atomics+0x1dd/0x310 [ 16.101983] ? __pfx_kasan_atomics+0x10/0x10 [ 16.102006] ? __pfx_read_tsc+0x10/0x10 [ 16.102029] ? ktime_get_ts64+0x86/0x230 [ 16.102055] kunit_try_run_case+0x1a6/0x480 [ 16.102080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.102102] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.102125] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.102152] ? __kthread_parkme+0x82/0x160 [ 16.102175] ? preempt_count_sub+0x50/0x80 [ 16.102201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.102224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.102251] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.102277] kthread+0x324/0x6e0 [ 16.102301] ? trace_preempt_on+0x20/0xc0 [ 16.102326] ? __pfx_kthread+0x10/0x10 [ 16.102350] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.102374] ? calculate_sigpending+0x7b/0xa0 [ 16.102397] ? __pfx_kthread+0x10/0x10 [ 16.102421] ret_from_fork+0x41/0x80 [ 16.102440] ? __pfx_kthread+0x10/0x10 [ 16.102463] ret_from_fork_asm+0x1a/0x30 [ 16.102496] </TASK> [ 16.102507] [ 16.109918] Allocated by task 273: [ 16.110116] kasan_save_stack+0x45/0x70 [ 16.110336] kasan_save_track+0x18/0x40 [ 16.110528] kasan_save_alloc_info+0x3b/0x50 [ 16.110920] __kasan_kmalloc+0xb7/0xc0 [ 16.111091] __kmalloc_cache_noprof+0x18a/0x420 [ 16.111295] kasan_atomics+0x96/0x310 [ 16.111457] kunit_try_run_case+0x1a6/0x480 [ 16.111606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.111786] kthread+0x324/0x6e0 [ 16.111926] ret_from_fork+0x41/0x80 [ 16.112113] ret_from_fork_asm+0x1a/0x30 [ 16.112315] [ 16.112418] The buggy address belongs to the object at ffff888101b3e000 [ 16.112418] which belongs to the cache kmalloc-64 of size 64 [ 16.112963] The buggy address is located 0 bytes to the right of [ 16.112963] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 16.113473] [ 16.113565] The buggy address belongs to the physical page: [ 16.113764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 16.114018] flags: 0x200000000000000(node=0|zone=2) [ 16.114273] page_type: f5(slab) [ 16.114449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.114796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.115242] page dumped because: kasan: bad access detected [ 16.115464] [ 16.115536] Memory state around the buggy address: [ 16.115696] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.115926] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.116207] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.116525] ^ [ 16.116752] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.116996] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.117212] ================================================================== [ 15.239996] ================================================================== [ 15.240519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 15.241045] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.241373] [ 15.241484] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.241531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.241545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.241568] Call Trace: [ 15.241629] <TASK> [ 15.241654] dump_stack_lvl+0x73/0xb0 [ 15.241684] print_report+0xd1/0x650 [ 15.241708] ? __virt_addr_valid+0x1db/0x2d0 [ 15.241734] ? kasan_atomics_helper+0xd48/0x5450 [ 15.241760] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.241819] ? kasan_atomics_helper+0xd48/0x5450 [ 15.241851] kasan_report+0x140/0x180 [ 15.241874] ? kasan_atomics_helper+0xd48/0x5450 [ 15.241900] kasan_check_range+0x10c/0x1c0 [ 15.241924] __kasan_check_write+0x18/0x20 [ 15.241979] kasan_atomics_helper+0xd48/0x5450 [ 15.242002] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.242024] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.242062] ? kasan_atomics+0x153/0x310 [ 15.242089] kasan_atomics+0x1dd/0x310 [ 15.242142] ? __pfx_kasan_atomics+0x10/0x10 [ 15.242167] ? __pfx_read_tsc+0x10/0x10 [ 15.242189] ? ktime_get_ts64+0x86/0x230 [ 15.242217] kunit_try_run_case+0x1a6/0x480 [ 15.242241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.242293] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.242317] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.242344] ? __kthread_parkme+0x82/0x160 [ 15.242367] ? preempt_count_sub+0x50/0x80 [ 15.242424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.242447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.242474] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.242502] kthread+0x324/0x6e0 [ 15.242551] ? trace_preempt_on+0x20/0xc0 [ 15.242576] ? __pfx_kthread+0x10/0x10 [ 15.242599] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.242624] ? calculate_sigpending+0x7b/0xa0 [ 15.242673] ? __pfx_kthread+0x10/0x10 [ 15.242697] ret_from_fork+0x41/0x80 [ 15.242717] ? __pfx_kthread+0x10/0x10 [ 15.242740] ret_from_fork_asm+0x1a/0x30 [ 15.242804] </TASK> [ 15.242816] [ 15.251030] Allocated by task 273: [ 15.251273] kasan_save_stack+0x45/0x70 [ 15.251505] kasan_save_track+0x18/0x40 [ 15.251728] kasan_save_alloc_info+0x3b/0x50 [ 15.251976] __kasan_kmalloc+0xb7/0xc0 [ 15.252206] __kmalloc_cache_noprof+0x18a/0x420 [ 15.252483] kasan_atomics+0x96/0x310 [ 15.252651] kunit_try_run_case+0x1a6/0x480 [ 15.252796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.252981] kthread+0x324/0x6e0 [ 15.253287] ret_from_fork+0x41/0x80 [ 15.253564] ret_from_fork_asm+0x1a/0x30 [ 15.253862] [ 15.253994] The buggy address belongs to the object at ffff888101b3e000 [ 15.253994] which belongs to the cache kmalloc-64 of size 64 [ 15.254497] The buggy address is located 0 bytes to the right of [ 15.254497] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.255003] [ 15.255154] The buggy address belongs to the physical page: [ 15.255435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.255758] flags: 0x200000000000000(node=0|zone=2) [ 15.255976] page_type: f5(slab) [ 15.256143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.256606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.256925] page dumped because: kasan: bad access detected [ 15.257221] [ 15.257347] Memory state around the buggy address: [ 15.257593] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.257959] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.258315] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.258625] ^ [ 15.258867] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.259229] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.259531] ================================================================== [ 15.359893] ================================================================== [ 15.360446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 15.360975] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.361322] [ 15.361413] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.361458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.361472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.361499] Call Trace: [ 15.361550] <TASK> [ 15.361573] dump_stack_lvl+0x73/0xb0 [ 15.361634] print_report+0xd1/0x650 [ 15.361657] ? __virt_addr_valid+0x1db/0x2d0 [ 15.361680] ? kasan_atomics_helper+0x107a/0x5450 [ 15.361702] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.361728] ? kasan_atomics_helper+0x107a/0x5450 [ 15.361756] kasan_report+0x140/0x180 [ 15.361803] ? kasan_atomics_helper+0x107a/0x5450 [ 15.361830] kasan_check_range+0x10c/0x1c0 [ 15.361871] __kasan_check_write+0x18/0x20 [ 15.361894] kasan_atomics_helper+0x107a/0x5450 [ 15.361917] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.361965] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.361992] ? kasan_atomics+0x153/0x310 [ 15.362019] kasan_atomics+0x1dd/0x310 [ 15.362053] ? __pfx_kasan_atomics+0x10/0x10 [ 15.362077] ? __pfx_read_tsc+0x10/0x10 [ 15.362101] ? ktime_get_ts64+0x86/0x230 [ 15.362153] kunit_try_run_case+0x1a6/0x480 [ 15.362178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.362211] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.362235] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.362287] ? __kthread_parkme+0x82/0x160 [ 15.362311] ? preempt_count_sub+0x50/0x80 [ 15.362337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.362371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.362422] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.362450] kthread+0x324/0x6e0 [ 15.362473] ? trace_preempt_on+0x20/0xc0 [ 15.362508] ? __pfx_kthread+0x10/0x10 [ 15.362531] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.362581] ? calculate_sigpending+0x7b/0xa0 [ 15.362604] ? __pfx_kthread+0x10/0x10 [ 15.362627] ret_from_fork+0x41/0x80 [ 15.362658] ? __pfx_kthread+0x10/0x10 [ 15.362706] ret_from_fork_asm+0x1a/0x30 [ 15.362739] </TASK> [ 15.362751] [ 15.374007] Allocated by task 273: [ 15.374298] kasan_save_stack+0x45/0x70 [ 15.374527] kasan_save_track+0x18/0x40 [ 15.374741] kasan_save_alloc_info+0x3b/0x50 [ 15.374970] __kasan_kmalloc+0xb7/0xc0 [ 15.375233] __kmalloc_cache_noprof+0x18a/0x420 [ 15.375496] kasan_atomics+0x96/0x310 [ 15.375678] kunit_try_run_case+0x1a6/0x480 [ 15.375918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.376196] kthread+0x324/0x6e0 [ 15.376411] ret_from_fork+0x41/0x80 [ 15.376629] ret_from_fork_asm+0x1a/0x30 [ 15.376832] [ 15.376975] The buggy address belongs to the object at ffff888101b3e000 [ 15.376975] which belongs to the cache kmalloc-64 of size 64 [ 15.377513] The buggy address is located 0 bytes to the right of [ 15.377513] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.378105] [ 15.378205] The buggy address belongs to the physical page: [ 15.378490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.378938] flags: 0x200000000000000(node=0|zone=2) [ 15.379187] page_type: f5(slab) [ 15.379372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.379723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.379991] page dumped because: kasan: bad access detected [ 15.380177] [ 15.380274] Memory state around the buggy address: [ 15.380503] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.380949] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.381340] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.381569] ^ [ 15.381852] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.382319] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.382569] ================================================================== [ 15.553087] ================================================================== [ 15.553399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 15.553699] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.554026] [ 15.554130] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.554174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.554188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.554210] Call Trace: [ 15.554231] <TASK> [ 15.554252] dump_stack_lvl+0x73/0xb0 [ 15.554279] print_report+0xd1/0x650 [ 15.554302] ? __virt_addr_valid+0x1db/0x2d0 [ 15.554326] ? kasan_atomics_helper+0x4eb0/0x5450 [ 15.554347] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.554373] ? kasan_atomics_helper+0x4eb0/0x5450 [ 15.554395] kasan_report+0x140/0x180 [ 15.554418] ? kasan_atomics_helper+0x4eb0/0x5450 [ 15.554443] __asan_report_load8_noabort+0x18/0x20 [ 15.554468] kasan_atomics_helper+0x4eb0/0x5450 [ 15.554490] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.554513] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.554538] ? kasan_atomics+0x153/0x310 [ 15.554563] kasan_atomics+0x1dd/0x310 [ 15.554586] ? __pfx_kasan_atomics+0x10/0x10 [ 15.554610] ? __pfx_read_tsc+0x10/0x10 [ 15.554632] ? ktime_get_ts64+0x86/0x230 [ 15.554659] kunit_try_run_case+0x1a6/0x480 [ 15.554683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.554705] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.554729] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.554757] ? __kthread_parkme+0x82/0x160 [ 15.554781] ? preempt_count_sub+0x50/0x80 [ 15.554807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.554830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.554868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.554894] kthread+0x324/0x6e0 [ 15.554916] ? trace_preempt_on+0x20/0xc0 [ 15.554941] ? __pfx_kthread+0x10/0x10 [ 15.554964] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.554988] ? calculate_sigpending+0x7b/0xa0 [ 15.555011] ? __pfx_kthread+0x10/0x10 [ 15.555034] ret_from_fork+0x41/0x80 [ 15.555064] ? __pfx_kthread+0x10/0x10 [ 15.555087] ret_from_fork_asm+0x1a/0x30 [ 15.555121] </TASK> [ 15.555132] [ 15.562560] Allocated by task 273: [ 15.562743] kasan_save_stack+0x45/0x70 [ 15.562941] kasan_save_track+0x18/0x40 [ 15.563078] kasan_save_alloc_info+0x3b/0x50 [ 15.563372] __kasan_kmalloc+0xb7/0xc0 [ 15.563562] __kmalloc_cache_noprof+0x18a/0x420 [ 15.563786] kasan_atomics+0x96/0x310 [ 15.563935] kunit_try_run_case+0x1a6/0x480 [ 15.564083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.564264] kthread+0x324/0x6e0 [ 15.564390] ret_from_fork+0x41/0x80 [ 15.564522] ret_from_fork_asm+0x1a/0x30 [ 15.564664] [ 15.564736] The buggy address belongs to the object at ffff888101b3e000 [ 15.564736] which belongs to the cache kmalloc-64 of size 64 [ 15.565281] The buggy address is located 0 bytes to the right of [ 15.565281] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.565938] [ 15.566035] The buggy address belongs to the physical page: [ 15.566273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.566524] flags: 0x200000000000000(node=0|zone=2) [ 15.566692] page_type: f5(slab) [ 15.566819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.567066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.567411] page dumped because: kasan: bad access detected [ 15.567665] [ 15.567762] Memory state around the buggy address: [ 15.568008] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.568711] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.569033] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.569324] ^ [ 15.569501] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.569718] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.569998] ================================================================== [ 14.800373] ================================================================== [ 14.801295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 14.801674] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 14.802595] [ 14.802715] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.802764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.802779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.802802] Call Trace: [ 14.802815] <TASK> [ 14.802848] dump_stack_lvl+0x73/0xb0 [ 14.802882] print_report+0xd1/0x650 [ 14.802903] ? __virt_addr_valid+0x1db/0x2d0 [ 14.802927] ? kasan_atomics_helper+0x4ba4/0x5450 [ 14.802948] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.802973] ? kasan_atomics_helper+0x4ba4/0x5450 [ 14.802994] kasan_report+0x140/0x180 [ 14.803017] ? kasan_atomics_helper+0x4ba4/0x5450 [ 14.803042] __asan_report_store4_noabort+0x1b/0x30 [ 14.803066] kasan_atomics_helper+0x4ba4/0x5450 [ 14.803087] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.803139] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.803164] ? kasan_atomics+0x153/0x310 [ 14.803190] kasan_atomics+0x1dd/0x310 [ 14.803212] ? __pfx_kasan_atomics+0x10/0x10 [ 14.803235] ? __pfx_read_tsc+0x10/0x10 [ 14.803258] ? ktime_get_ts64+0x86/0x230 [ 14.803283] kunit_try_run_case+0x1a6/0x480 [ 14.803307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.803328] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.803351] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.803376] ? __kthread_parkme+0x82/0x160 [ 14.803398] ? preempt_count_sub+0x50/0x80 [ 14.803424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.803447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.803472] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.803498] kthread+0x324/0x6e0 [ 14.803518] ? trace_preempt_on+0x20/0xc0 [ 14.803541] ? __pfx_kthread+0x10/0x10 [ 14.803563] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.803587] ? calculate_sigpending+0x7b/0xa0 [ 14.803609] ? __pfx_kthread+0x10/0x10 [ 14.803630] ret_from_fork+0x41/0x80 [ 14.803649] ? __pfx_kthread+0x10/0x10 [ 14.803670] ret_from_fork_asm+0x1a/0x30 [ 14.803702] </TASK> [ 14.803713] [ 14.814211] Allocated by task 273: [ 14.814409] kasan_save_stack+0x45/0x70 [ 14.814578] kasan_save_track+0x18/0x40 [ 14.814709] kasan_save_alloc_info+0x3b/0x50 [ 14.815209] __kasan_kmalloc+0xb7/0xc0 [ 14.815667] __kmalloc_cache_noprof+0x18a/0x420 [ 14.815997] kasan_atomics+0x96/0x310 [ 14.816556] kunit_try_run_case+0x1a6/0x480 [ 14.816809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.816999] kthread+0x324/0x6e0 [ 14.817529] ret_from_fork+0x41/0x80 [ 14.817972] ret_from_fork_asm+0x1a/0x30 [ 14.818489] [ 14.818761] The buggy address belongs to the object at ffff888101b3e000 [ 14.818761] which belongs to the cache kmalloc-64 of size 64 [ 14.819870] The buggy address is located 0 bytes to the right of [ 14.819870] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 14.820737] [ 14.820816] The buggy address belongs to the physical page: [ 14.820998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 14.821663] flags: 0x200000000000000(node=0|zone=2) [ 14.822171] page_type: f5(slab) [ 14.822517] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.823330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.823820] page dumped because: kasan: bad access detected [ 14.824000] [ 14.824314] Memory state around the buggy address: [ 14.824491] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.824700] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.824921] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.825144] ^ [ 14.825571] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.825936] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.826250] ================================================================== [ 14.774119] ================================================================== [ 14.774792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 14.775214] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 14.775534] [ 14.775659] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.775710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.775723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.775755] Call Trace: [ 14.775768] <TASK> [ 14.775788] dump_stack_lvl+0x73/0xb0 [ 14.775818] print_report+0xd1/0x650 [ 14.775889] ? __virt_addr_valid+0x1db/0x2d0 [ 14.775913] ? kasan_atomics_helper+0x4bbe/0x5450 [ 14.775934] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.775960] ? kasan_atomics_helper+0x4bbe/0x5450 [ 14.775980] kasan_report+0x140/0x180 [ 14.776002] ? kasan_atomics_helper+0x4bbe/0x5450 [ 14.776148] __asan_report_load4_noabort+0x18/0x20 [ 14.776174] kasan_atomics_helper+0x4bbe/0x5450 [ 14.776196] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.776217] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.776243] ? kasan_atomics+0x153/0x310 [ 14.776268] kasan_atomics+0x1dd/0x310 [ 14.776290] ? __pfx_kasan_atomics+0x10/0x10 [ 14.776313] ? __pfx_read_tsc+0x10/0x10 [ 14.776336] ? ktime_get_ts64+0x86/0x230 [ 14.776362] kunit_try_run_case+0x1a6/0x480 [ 14.776386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.776472] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.776497] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.776522] ? __kthread_parkme+0x82/0x160 [ 14.776545] ? preempt_count_sub+0x50/0x80 [ 14.776570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.776593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.776620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.776645] kthread+0x324/0x6e0 [ 14.776666] ? trace_preempt_on+0x20/0xc0 [ 14.776690] ? __pfx_kthread+0x10/0x10 [ 14.776712] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.776735] ? calculate_sigpending+0x7b/0xa0 [ 14.776757] ? __pfx_kthread+0x10/0x10 [ 14.776780] ret_from_fork+0x41/0x80 [ 14.776799] ? __pfx_kthread+0x10/0x10 [ 14.776821] ret_from_fork_asm+0x1a/0x30 [ 14.776864] </TASK> [ 14.776875] [ 14.785067] Allocated by task 273: [ 14.785309] kasan_save_stack+0x45/0x70 [ 14.785531] kasan_save_track+0x18/0x40 [ 14.785731] kasan_save_alloc_info+0x3b/0x50 [ 14.786132] __kasan_kmalloc+0xb7/0xc0 [ 14.786493] __kmalloc_cache_noprof+0x18a/0x420 [ 14.786657] kasan_atomics+0x96/0x310 [ 14.786906] kunit_try_run_case+0x1a6/0x480 [ 14.787897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.788112] kthread+0x324/0x6e0 [ 14.788233] ret_from_fork+0x41/0x80 [ 14.788463] ret_from_fork_asm+0x1a/0x30 [ 14.788696] [ 14.788795] The buggy address belongs to the object at ffff888101b3e000 [ 14.788795] which belongs to the cache kmalloc-64 of size 64 [ 14.789849] The buggy address is located 0 bytes to the right of [ 14.789849] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 14.791672] [ 14.791992] The buggy address belongs to the physical page: [ 14.792415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 14.792671] flags: 0x200000000000000(node=0|zone=2) [ 14.792852] page_type: f5(slab) [ 14.793561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.794588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.795418] page dumped because: kasan: bad access detected [ 14.795598] [ 14.795670] Memory state around the buggy address: [ 14.795830] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.796353] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.796832] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.797359] ^ [ 14.797931] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.798692] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.799394] ================================================================== [ 15.516579] ================================================================== [ 15.517251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 15.518036] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.518709] [ 15.518899] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.518947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.518960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.518983] Call Trace: [ 15.519007] <TASK> [ 15.519031] dump_stack_lvl+0x73/0xb0 [ 15.519071] print_report+0xd1/0x650 [ 15.519094] ? __virt_addr_valid+0x1db/0x2d0 [ 15.519118] ? kasan_atomics_helper+0x49d0/0x5450 [ 15.519140] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.519166] ? kasan_atomics_helper+0x49d0/0x5450 [ 15.519189] kasan_report+0x140/0x180 [ 15.519212] ? kasan_atomics_helper+0x49d0/0x5450 [ 15.519238] __asan_report_load4_noabort+0x18/0x20 [ 15.519262] kasan_atomics_helper+0x49d0/0x5450 [ 15.519284] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.519306] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.519332] ? kasan_atomics+0x153/0x310 [ 15.519359] kasan_atomics+0x1dd/0x310 [ 15.519382] ? __pfx_kasan_atomics+0x10/0x10 [ 15.519406] ? __pfx_read_tsc+0x10/0x10 [ 15.519428] ? ktime_get_ts64+0x86/0x230 [ 15.519455] kunit_try_run_case+0x1a6/0x480 [ 15.519480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.519502] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.519526] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.519552] ? __kthread_parkme+0x82/0x160 [ 15.519576] ? preempt_count_sub+0x50/0x80 [ 15.519602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.519626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.519653] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.519681] kthread+0x324/0x6e0 [ 15.519704] ? trace_preempt_on+0x20/0xc0 [ 15.519729] ? __pfx_kthread+0x10/0x10 [ 15.519752] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.519776] ? calculate_sigpending+0x7b/0xa0 [ 15.519799] ? __pfx_kthread+0x10/0x10 [ 15.519823] ret_from_fork+0x41/0x80 [ 15.519855] ? __pfx_kthread+0x10/0x10 [ 15.519878] ret_from_fork_asm+0x1a/0x30 [ 15.519911] </TASK> [ 15.519922] [ 15.526704] Allocated by task 273: [ 15.526867] kasan_save_stack+0x45/0x70 [ 15.527099] kasan_save_track+0x18/0x40 [ 15.527295] kasan_save_alloc_info+0x3b/0x50 [ 15.527510] __kasan_kmalloc+0xb7/0xc0 [ 15.527702] __kmalloc_cache_noprof+0x18a/0x420 [ 15.527939] kasan_atomics+0x96/0x310 [ 15.528226] kunit_try_run_case+0x1a6/0x480 [ 15.528435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.528659] kthread+0x324/0x6e0 [ 15.528803] ret_from_fork+0x41/0x80 [ 15.529000] ret_from_fork_asm+0x1a/0x30 [ 15.529170] [ 15.529243] The buggy address belongs to the object at ffff888101b3e000 [ 15.529243] which belongs to the cache kmalloc-64 of size 64 [ 15.529746] The buggy address is located 0 bytes to the right of [ 15.529746] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.530300] [ 15.530384] The buggy address belongs to the physical page: [ 15.530625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.530973] flags: 0x200000000000000(node=0|zone=2) [ 15.531185] page_type: f5(slab) [ 15.531313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.531547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.531776] page dumped because: kasan: bad access detected [ 15.531987] [ 15.532078] Memory state around the buggy address: [ 15.532303] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.532618] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.532920] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.533135] ^ [ 15.533290] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.533505] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.533734] ================================================================== [ 15.592135] ================================================================== [ 15.592849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 15.593645] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.594362] [ 15.594559] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.594622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.594640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.594665] Call Trace: [ 15.594686] <TASK> [ 15.594709] dump_stack_lvl+0x73/0xb0 [ 15.594741] print_report+0xd1/0x650 [ 15.594764] ? __virt_addr_valid+0x1db/0x2d0 [ 15.594788] ? kasan_atomics_helper+0x50d6/0x5450 [ 15.594809] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.594847] ? kasan_atomics_helper+0x50d6/0x5450 [ 15.594868] kasan_report+0x140/0x180 [ 15.594891] ? kasan_atomics_helper+0x50d6/0x5450 [ 15.594916] __asan_report_store8_noabort+0x1b/0x30 [ 15.594941] kasan_atomics_helper+0x50d6/0x5450 [ 15.594964] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.594986] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.595011] ? kasan_atomics+0x153/0x310 [ 15.595038] kasan_atomics+0x1dd/0x310 [ 15.595061] ? __pfx_kasan_atomics+0x10/0x10 [ 15.595085] ? __pfx_read_tsc+0x10/0x10 [ 15.595108] ? ktime_get_ts64+0x86/0x230 [ 15.595135] kunit_try_run_case+0x1a6/0x480 [ 15.595160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.595181] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.595205] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.595231] ? __kthread_parkme+0x82/0x160 [ 15.595254] ? preempt_count_sub+0x50/0x80 [ 15.595280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.595303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.595330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.595356] kthread+0x324/0x6e0 [ 15.595378] ? trace_preempt_on+0x20/0xc0 [ 15.595403] ? __pfx_kthread+0x10/0x10 [ 15.595426] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.595450] ? calculate_sigpending+0x7b/0xa0 [ 15.595473] ? __pfx_kthread+0x10/0x10 [ 15.595497] ret_from_fork+0x41/0x80 [ 15.595516] ? __pfx_kthread+0x10/0x10 [ 15.595540] ret_from_fork_asm+0x1a/0x30 [ 15.595574] </TASK> [ 15.595586] [ 15.606996] Allocated by task 273: [ 15.607335] kasan_save_stack+0x45/0x70 [ 15.607552] kasan_save_track+0x18/0x40 [ 15.607748] kasan_save_alloc_info+0x3b/0x50 [ 15.607971] __kasan_kmalloc+0xb7/0xc0 [ 15.608188] __kmalloc_cache_noprof+0x18a/0x420 [ 15.608382] kasan_atomics+0x96/0x310 [ 15.608518] kunit_try_run_case+0x1a6/0x480 [ 15.608701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.608998] kthread+0x324/0x6e0 [ 15.609356] ret_from_fork+0x41/0x80 [ 15.609557] ret_from_fork_asm+0x1a/0x30 [ 15.609749] [ 15.609824] The buggy address belongs to the object at ffff888101b3e000 [ 15.609824] which belongs to the cache kmalloc-64 of size 64 [ 15.610545] The buggy address is located 0 bytes to the right of [ 15.610545] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.611102] [ 15.611202] The buggy address belongs to the physical page: [ 15.611517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.611896] flags: 0x200000000000000(node=0|zone=2) [ 15.612130] page_type: f5(slab) [ 15.612307] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.612652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.612926] page dumped because: kasan: bad access detected [ 15.613098] [ 15.613184] Memory state around the buggy address: [ 15.613416] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.613788] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.614154] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.614464] ^ [ 15.614660] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.614969] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.615365] ================================================================== [ 15.425962] ================================================================== [ 15.426454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 15.426858] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.427254] [ 15.427381] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.427455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.427469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.427503] Call Trace: [ 15.427526] <TASK> [ 15.427566] dump_stack_lvl+0x73/0xb0 [ 15.427607] print_report+0xd1/0x650 [ 15.427630] ? __virt_addr_valid+0x1db/0x2d0 [ 15.427666] ? kasan_atomics_helper+0x4a04/0x5450 [ 15.427688] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.427741] ? kasan_atomics_helper+0x4a04/0x5450 [ 15.427763] kasan_report+0x140/0x180 [ 15.427825] ? kasan_atomics_helper+0x4a04/0x5450 [ 15.427878] __asan_report_load4_noabort+0x18/0x20 [ 15.427903] kasan_atomics_helper+0x4a04/0x5450 [ 15.427939] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.427975] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.428014] ? kasan_atomics+0x153/0x310 [ 15.428040] kasan_atomics+0x1dd/0x310 [ 15.428084] ? __pfx_kasan_atomics+0x10/0x10 [ 15.428108] ? __pfx_read_tsc+0x10/0x10 [ 15.428131] ? ktime_get_ts64+0x86/0x230 [ 15.428169] kunit_try_run_case+0x1a6/0x480 [ 15.428194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.428216] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.428239] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.428265] ? __kthread_parkme+0x82/0x160 [ 15.428289] ? preempt_count_sub+0x50/0x80 [ 15.428315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.428338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.428364] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.428391] kthread+0x324/0x6e0 [ 15.428414] ? trace_preempt_on+0x20/0xc0 [ 15.428439] ? __pfx_kthread+0x10/0x10 [ 15.428462] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.428487] ? calculate_sigpending+0x7b/0xa0 [ 15.428509] ? __pfx_kthread+0x10/0x10 [ 15.428560] ret_from_fork+0x41/0x80 [ 15.428580] ? __pfx_kthread+0x10/0x10 [ 15.428603] ret_from_fork_asm+0x1a/0x30 [ 15.428648] </TASK> [ 15.428660] [ 15.436291] Allocated by task 273: [ 15.436521] kasan_save_stack+0x45/0x70 [ 15.436766] kasan_save_track+0x18/0x40 [ 15.437011] kasan_save_alloc_info+0x3b/0x50 [ 15.437287] __kasan_kmalloc+0xb7/0xc0 [ 15.437528] __kmalloc_cache_noprof+0x18a/0x420 [ 15.437754] kasan_atomics+0x96/0x310 [ 15.437902] kunit_try_run_case+0x1a6/0x480 [ 15.438054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.438236] kthread+0x324/0x6e0 [ 15.438408] ret_from_fork+0x41/0x80 [ 15.438602] ret_from_fork_asm+0x1a/0x30 [ 15.438945] [ 15.439076] The buggy address belongs to the object at ffff888101b3e000 [ 15.439076] which belongs to the cache kmalloc-64 of size 64 [ 15.440055] The buggy address is located 0 bytes to the right of [ 15.440055] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.440531] [ 15.440607] The buggy address belongs to the physical page: [ 15.440809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.441277] flags: 0x200000000000000(node=0|zone=2) [ 15.441526] page_type: f5(slab) [ 15.441677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.441916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.442178] page dumped because: kasan: bad access detected [ 15.442423] [ 15.442607] Memory state around the buggy address: [ 15.442991] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.443452] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.443676] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.443941] ^ [ 15.444314] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.444752] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.445157] ================================================================== [ 15.935448] ================================================================== [ 15.935876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 15.936498] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.936877] [ 15.937021] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.937066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.937080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.937103] Call Trace: [ 15.937126] <TASK> [ 15.937147] dump_stack_lvl+0x73/0xb0 [ 15.937176] print_report+0xd1/0x650 [ 15.937197] ? __virt_addr_valid+0x1db/0x2d0 [ 15.937258] ? kasan_atomics_helper+0x1eab/0x5450 [ 15.937280] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.937307] ? kasan_atomics_helper+0x1eab/0x5450 [ 15.937329] kasan_report+0x140/0x180 [ 15.937352] ? kasan_atomics_helper+0x1eab/0x5450 [ 15.937407] kasan_check_range+0x10c/0x1c0 [ 15.937431] __kasan_check_write+0x18/0x20 [ 15.937454] kasan_atomics_helper+0x1eab/0x5450 [ 15.937477] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.937499] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.937554] ? kasan_atomics+0x153/0x310 [ 15.937581] kasan_atomics+0x1dd/0x310 [ 15.937604] ? __pfx_kasan_atomics+0x10/0x10 [ 15.937628] ? __pfx_read_tsc+0x10/0x10 [ 15.937651] ? ktime_get_ts64+0x86/0x230 [ 15.937707] kunit_try_run_case+0x1a6/0x480 [ 15.937732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.937760] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.937783] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.937809] ? __kthread_parkme+0x82/0x160 [ 15.937833] ? preempt_count_sub+0x50/0x80 [ 15.937903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.937927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.937953] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.937982] kthread+0x324/0x6e0 [ 15.938004] ? trace_preempt_on+0x20/0xc0 [ 15.938059] ? __pfx_kthread+0x10/0x10 [ 15.938082] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.938107] ? calculate_sigpending+0x7b/0xa0 [ 15.938138] ? __pfx_kthread+0x10/0x10 [ 15.938161] ret_from_fork+0x41/0x80 [ 15.938208] ? __pfx_kthread+0x10/0x10 [ 15.938232] ret_from_fork_asm+0x1a/0x30 [ 15.938265] </TASK> [ 15.938277] [ 15.946066] Allocated by task 273: [ 15.946298] kasan_save_stack+0x45/0x70 [ 15.946459] kasan_save_track+0x18/0x40 [ 15.946591] kasan_save_alloc_info+0x3b/0x50 [ 15.946737] __kasan_kmalloc+0xb7/0xc0 [ 15.946880] __kmalloc_cache_noprof+0x18a/0x420 [ 15.947033] kasan_atomics+0x96/0x310 [ 15.947161] kunit_try_run_case+0x1a6/0x480 [ 15.947342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.947636] kthread+0x324/0x6e0 [ 15.947807] ret_from_fork+0x41/0x80 [ 15.947999] ret_from_fork_asm+0x1a/0x30 [ 15.948194] [ 15.948289] The buggy address belongs to the object at ffff888101b3e000 [ 15.948289] which belongs to the cache kmalloc-64 of size 64 [ 15.948916] The buggy address is located 0 bytes to the right of [ 15.948916] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.949754] [ 15.949966] The buggy address belongs to the physical page: [ 15.950257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.950618] flags: 0x200000000000000(node=0|zone=2) [ 15.951000] page_type: f5(slab) [ 15.951333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.951665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.951951] page dumped because: kasan: bad access detected [ 15.952293] [ 15.952389] Memory state around the buggy address: [ 15.952655] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.952905] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.953271] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.953589] ^ [ 15.953933] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.954236] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.954446] ================================================================== [ 15.162256] ================================================================== [ 15.162572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 15.162898] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.164315] [ 15.164427] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.164520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.164534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.164559] Call Trace: [ 15.164582] <TASK> [ 15.164606] dump_stack_lvl+0x73/0xb0 [ 15.164642] print_report+0xd1/0x650 [ 15.164666] ? __virt_addr_valid+0x1db/0x2d0 [ 15.164690] ? kasan_atomics_helper+0xac8/0x5450 [ 15.164712] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.164739] ? kasan_atomics_helper+0xac8/0x5450 [ 15.164761] kasan_report+0x140/0x180 [ 15.164783] ? kasan_atomics_helper+0xac8/0x5450 [ 15.164809] kasan_check_range+0x10c/0x1c0 [ 15.164833] __kasan_check_write+0x18/0x20 [ 15.164867] kasan_atomics_helper+0xac8/0x5450 [ 15.164891] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.164914] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.164939] ? kasan_atomics+0x153/0x310 [ 15.164967] kasan_atomics+0x1dd/0x310 [ 15.164990] ? __pfx_kasan_atomics+0x10/0x10 [ 15.165014] ? __pfx_read_tsc+0x10/0x10 [ 15.165037] ? ktime_get_ts64+0x86/0x230 [ 15.165076] kunit_try_run_case+0x1a6/0x480 [ 15.165101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.165124] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.165147] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.165174] ? __kthread_parkme+0x82/0x160 [ 15.165197] ? preempt_count_sub+0x50/0x80 [ 15.165224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.165248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.165274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.165302] kthread+0x324/0x6e0 [ 15.165324] ? trace_preempt_on+0x20/0xc0 [ 15.165349] ? __pfx_kthread+0x10/0x10 [ 15.165373] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.165398] ? calculate_sigpending+0x7b/0xa0 [ 15.165421] ? __pfx_kthread+0x10/0x10 [ 15.165444] ret_from_fork+0x41/0x80 [ 15.165465] ? __pfx_kthread+0x10/0x10 [ 15.165488] ret_from_fork_asm+0x1a/0x30 [ 15.165521] </TASK> [ 15.165534] [ 15.173421] Allocated by task 273: [ 15.173632] kasan_save_stack+0x45/0x70 [ 15.173853] kasan_save_track+0x18/0x40 [ 15.174068] kasan_save_alloc_info+0x3b/0x50 [ 15.174258] __kasan_kmalloc+0xb7/0xc0 [ 15.174455] __kmalloc_cache_noprof+0x18a/0x420 [ 15.174660] kasan_atomics+0x96/0x310 [ 15.174791] kunit_try_run_case+0x1a6/0x480 [ 15.174966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.175445] kthread+0x324/0x6e0 [ 15.175644] ret_from_fork+0x41/0x80 [ 15.175790] ret_from_fork_asm+0x1a/0x30 [ 15.176010] [ 15.176146] The buggy address belongs to the object at ffff888101b3e000 [ 15.176146] which belongs to the cache kmalloc-64 of size 64 [ 15.176620] The buggy address is located 0 bytes to the right of [ 15.176620] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.177193] [ 15.177278] The buggy address belongs to the physical page: [ 15.177561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.177965] flags: 0x200000000000000(node=0|zone=2) [ 15.178260] page_type: f5(slab) [ 15.178456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.178806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.179148] page dumped because: kasan: bad access detected [ 15.179476] [ 15.179546] Memory state around the buggy address: [ 15.179699] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.180092] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.180414] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.180730] ^ [ 15.180964] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.181548] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.181855] ================================================================== [ 14.847331] ================================================================== [ 14.847756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 14.848296] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 14.848614] [ 14.848711] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.848756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.848768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.848791] Call Trace: [ 14.848812] <TASK> [ 14.848833] dump_stack_lvl+0x73/0xb0 [ 14.848872] print_report+0xd1/0x650 [ 14.848894] ? __virt_addr_valid+0x1db/0x2d0 [ 14.848917] ? kasan_atomics_helper+0x4b70/0x5450 [ 14.848937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.848962] ? kasan_atomics_helper+0x4b70/0x5450 [ 14.848983] kasan_report+0x140/0x180 [ 14.849026] ? kasan_atomics_helper+0x4b70/0x5450 [ 14.849067] __asan_report_store4_noabort+0x1b/0x30 [ 14.849090] kasan_atomics_helper+0x4b70/0x5450 [ 14.849112] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.849133] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.849158] ? kasan_atomics+0x153/0x310 [ 14.849183] kasan_atomics+0x1dd/0x310 [ 14.849205] ? __pfx_kasan_atomics+0x10/0x10 [ 14.849228] ? __pfx_read_tsc+0x10/0x10 [ 14.849250] ? ktime_get_ts64+0x86/0x230 [ 14.849275] kunit_try_run_case+0x1a6/0x480 [ 14.849300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.849320] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.849343] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.849369] ? __kthread_parkme+0x82/0x160 [ 14.849392] ? preempt_count_sub+0x50/0x80 [ 14.849417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.849440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.849465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.849491] kthread+0x324/0x6e0 [ 14.849511] ? trace_preempt_on+0x20/0xc0 [ 14.849535] ? __pfx_kthread+0x10/0x10 [ 14.849557] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.849580] ? calculate_sigpending+0x7b/0xa0 [ 14.849602] ? __pfx_kthread+0x10/0x10 [ 14.849624] ret_from_fork+0x41/0x80 [ 14.849642] ? __pfx_kthread+0x10/0x10 [ 14.849664] ret_from_fork_asm+0x1a/0x30 [ 14.849718] </TASK> [ 14.849729] [ 14.858468] Allocated by task 273: [ 14.858654] kasan_save_stack+0x45/0x70 [ 14.858799] kasan_save_track+0x18/0x40 [ 14.859066] kasan_save_alloc_info+0x3b/0x50 [ 14.859306] __kasan_kmalloc+0xb7/0xc0 [ 14.859459] __kmalloc_cache_noprof+0x18a/0x420 [ 14.859611] kasan_atomics+0x96/0x310 [ 14.859738] kunit_try_run_case+0x1a6/0x480 [ 14.859894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.860214] kthread+0x324/0x6e0 [ 14.860389] ret_from_fork+0x41/0x80 [ 14.860597] ret_from_fork_asm+0x1a/0x30 [ 14.860974] [ 14.861076] The buggy address belongs to the object at ffff888101b3e000 [ 14.861076] which belongs to the cache kmalloc-64 of size 64 [ 14.861605] The buggy address is located 0 bytes to the right of [ 14.861605] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 14.862270] [ 14.862371] The buggy address belongs to the physical page: [ 14.862657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 14.863042] flags: 0x200000000000000(node=0|zone=2) [ 14.863469] page_type: f5(slab) [ 14.863723] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.864070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.864303] page dumped because: kasan: bad access detected [ 14.864474] [ 14.864543] Memory state around the buggy address: [ 14.864700] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.865090] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.865419] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.866293] ^ [ 14.866557] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.866888] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.867194] ================================================================== [ 15.340347] ================================================================== [ 15.340695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 15.341061] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.341431] [ 15.341543] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.341589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.341603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.341626] Call Trace: [ 15.341647] <TASK> [ 15.341670] dump_stack_lvl+0x73/0xb0 [ 15.341699] print_report+0xd1/0x650 [ 15.341722] ? __virt_addr_valid+0x1db/0x2d0 [ 15.341752] ? kasan_atomics_helper+0x4a38/0x5450 [ 15.341774] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.341801] ? kasan_atomics_helper+0x4a38/0x5450 [ 15.341823] kasan_report+0x140/0x180 [ 15.341854] ? kasan_atomics_helper+0x4a38/0x5450 [ 15.341881] __asan_report_load4_noabort+0x18/0x20 [ 15.341905] kasan_atomics_helper+0x4a38/0x5450 [ 15.341928] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.341950] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.341976] ? kasan_atomics+0x153/0x310 [ 15.342001] kasan_atomics+0x1dd/0x310 [ 15.342037] ? __pfx_kasan_atomics+0x10/0x10 [ 15.342062] ? __pfx_read_tsc+0x10/0x10 [ 15.342086] ? ktime_get_ts64+0x86/0x230 [ 15.342134] kunit_try_run_case+0x1a6/0x480 [ 15.342169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.342207] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.342255] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.342296] ? __kthread_parkme+0x82/0x160 [ 15.342332] ? preempt_count_sub+0x50/0x80 [ 15.342359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.342405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.342432] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.342469] kthread+0x324/0x6e0 [ 15.342491] ? trace_preempt_on+0x20/0xc0 [ 15.342517] ? __pfx_kthread+0x10/0x10 [ 15.342540] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.342565] ? calculate_sigpending+0x7b/0xa0 [ 15.342587] ? __pfx_kthread+0x10/0x10 [ 15.342611] ret_from_fork+0x41/0x80 [ 15.342631] ? __pfx_kthread+0x10/0x10 [ 15.342655] ret_from_fork_asm+0x1a/0x30 [ 15.342687] </TASK> [ 15.342700] [ 15.350338] Allocated by task 273: [ 15.350565] kasan_save_stack+0x45/0x70 [ 15.350809] kasan_save_track+0x18/0x40 [ 15.351066] kasan_save_alloc_info+0x3b/0x50 [ 15.351307] __kasan_kmalloc+0xb7/0xc0 [ 15.351480] __kmalloc_cache_noprof+0x18a/0x420 [ 15.351690] kasan_atomics+0x96/0x310 [ 15.351859] kunit_try_run_case+0x1a6/0x480 [ 15.352148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.352548] kthread+0x324/0x6e0 [ 15.352792] ret_from_fork+0x41/0x80 [ 15.353010] ret_from_fork_asm+0x1a/0x30 [ 15.353416] [ 15.353512] The buggy address belongs to the object at ffff888101b3e000 [ 15.353512] which belongs to the cache kmalloc-64 of size 64 [ 15.354051] The buggy address is located 0 bytes to the right of [ 15.354051] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.354655] [ 15.354757] The buggy address belongs to the physical page: [ 15.355015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.355373] flags: 0x200000000000000(node=0|zone=2) [ 15.355606] page_type: f5(slab) [ 15.355739] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.355982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.356623] page dumped because: kasan: bad access detected [ 15.356888] [ 15.356985] Memory state around the buggy address: [ 15.357289] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.357608] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.357824] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.358176] ^ [ 15.358435] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.358894] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359248] ================================================================== [ 15.018099] ================================================================== [ 15.018355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 15.018604] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.018872] [ 15.018980] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.019040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.019054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.019077] Call Trace: [ 15.019099] <TASK> [ 15.019121] dump_stack_lvl+0x73/0xb0 [ 15.019150] print_report+0xd1/0x650 [ 15.019173] ? __virt_addr_valid+0x1db/0x2d0 [ 15.019197] ? kasan_atomics_helper+0x730/0x5450 [ 15.019218] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.019244] ? kasan_atomics_helper+0x730/0x5450 [ 15.019265] kasan_report+0x140/0x180 [ 15.019288] ? kasan_atomics_helper+0x730/0x5450 [ 15.019313] kasan_check_range+0x10c/0x1c0 [ 15.019337] __kasan_check_write+0x18/0x20 [ 15.019360] kasan_atomics_helper+0x730/0x5450 [ 15.019382] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.019404] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.019430] ? kasan_atomics+0x153/0x310 [ 15.019455] kasan_atomics+0x1dd/0x310 [ 15.019478] ? __pfx_kasan_atomics+0x10/0x10 [ 15.019502] ? __pfx_read_tsc+0x10/0x10 [ 15.019524] ? ktime_get_ts64+0x86/0x230 [ 15.019551] kunit_try_run_case+0x1a6/0x480 [ 15.019575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.019597] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.019620] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.019647] ? __kthread_parkme+0x82/0x160 [ 15.019670] ? preempt_count_sub+0x50/0x80 [ 15.019698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.019721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.019748] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.019775] kthread+0x324/0x6e0 [ 15.019797] ? trace_preempt_on+0x20/0xc0 [ 15.019822] ? __pfx_kthread+0x10/0x10 [ 15.019856] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.019880] ? calculate_sigpending+0x7b/0xa0 [ 15.019903] ? __pfx_kthread+0x10/0x10 [ 15.019927] ret_from_fork+0x41/0x80 [ 15.019946] ? __pfx_kthread+0x10/0x10 [ 15.019969] ret_from_fork_asm+0x1a/0x30 [ 15.020002] </TASK> [ 15.020014] [ 15.027877] Allocated by task 273: [ 15.028026] kasan_save_stack+0x45/0x70 [ 15.028245] kasan_save_track+0x18/0x40 [ 15.028445] kasan_save_alloc_info+0x3b/0x50 [ 15.028668] __kasan_kmalloc+0xb7/0xc0 [ 15.028866] __kmalloc_cache_noprof+0x18a/0x420 [ 15.029066] kasan_atomics+0x96/0x310 [ 15.029225] kunit_try_run_case+0x1a6/0x480 [ 15.029416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.029594] kthread+0x324/0x6e0 [ 15.029730] ret_from_fork+0x41/0x80 [ 15.029931] ret_from_fork_asm+0x1a/0x30 [ 15.030228] [ 15.030327] The buggy address belongs to the object at ffff888101b3e000 [ 15.030327] which belongs to the cache kmalloc-64 of size 64 [ 15.030785] The buggy address is located 0 bytes to the right of [ 15.030785] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.031341] [ 15.031442] The buggy address belongs to the physical page: [ 15.031670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.031978] flags: 0x200000000000000(node=0|zone=2) [ 15.032258] page_type: f5(slab) [ 15.032410] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.032697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.033017] page dumped because: kasan: bad access detected [ 15.033271] [ 15.033355] Memory state around the buggy address: [ 15.033547] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.033857] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.034154] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.034396] ^ [ 15.034553] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.034766] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.035057] ================================================================== [ 15.088779] ================================================================== [ 15.089172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 15.089535] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.089876] [ 15.089986] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.090032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.090048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.090072] Call Trace: [ 15.090096] <TASK> [ 15.090120] dump_stack_lvl+0x73/0xb0 [ 15.090152] print_report+0xd1/0x650 [ 15.090175] ? __virt_addr_valid+0x1db/0x2d0 [ 15.090199] ? kasan_atomics_helper+0x8fa/0x5450 [ 15.090221] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.090247] ? kasan_atomics_helper+0x8fa/0x5450 [ 15.090269] kasan_report+0x140/0x180 [ 15.090291] ? kasan_atomics_helper+0x8fa/0x5450 [ 15.090318] kasan_check_range+0x10c/0x1c0 [ 15.090341] __kasan_check_write+0x18/0x20 [ 15.090365] kasan_atomics_helper+0x8fa/0x5450 [ 15.090388] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.090409] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.090435] ? kasan_atomics+0x153/0x310 [ 15.090461] kasan_atomics+0x1dd/0x310 [ 15.090484] ? __pfx_kasan_atomics+0x10/0x10 [ 15.090508] ? __pfx_read_tsc+0x10/0x10 [ 15.090531] ? ktime_get_ts64+0x86/0x230 [ 15.090560] kunit_try_run_case+0x1a6/0x480 [ 15.090585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.090607] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.090629] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.090656] ? __kthread_parkme+0x82/0x160 [ 15.090679] ? preempt_count_sub+0x50/0x80 [ 15.090705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.090728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.090755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.090781] kthread+0x324/0x6e0 [ 15.090804] ? trace_preempt_on+0x20/0xc0 [ 15.090829] ? __pfx_kthread+0x10/0x10 [ 15.091299] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.091329] ? calculate_sigpending+0x7b/0xa0 [ 15.091354] ? __pfx_kthread+0x10/0x10 [ 15.091378] ret_from_fork+0x41/0x80 [ 15.091400] ? __pfx_kthread+0x10/0x10 [ 15.091424] ret_from_fork_asm+0x1a/0x30 [ 15.091457] </TASK> [ 15.091469] [ 15.102383] Allocated by task 273: [ 15.102609] kasan_save_stack+0x45/0x70 [ 15.102922] kasan_save_track+0x18/0x40 [ 15.103287] kasan_save_alloc_info+0x3b/0x50 [ 15.103645] __kasan_kmalloc+0xb7/0xc0 [ 15.103851] __kmalloc_cache_noprof+0x18a/0x420 [ 15.104311] kasan_atomics+0x96/0x310 [ 15.104668] kunit_try_run_case+0x1a6/0x480 [ 15.105209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.105896] kthread+0x324/0x6e0 [ 15.106444] ret_from_fork+0x41/0x80 [ 15.106847] ret_from_fork_asm+0x1a/0x30 [ 15.106999] [ 15.107083] The buggy address belongs to the object at ffff888101b3e000 [ 15.107083] which belongs to the cache kmalloc-64 of size 64 [ 15.107430] The buggy address is located 0 bytes to the right of [ 15.107430] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.107904] [ 15.108011] The buggy address belongs to the physical page: [ 15.108246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.108611] flags: 0x200000000000000(node=0|zone=2) [ 15.109413] page_type: f5(slab) [ 15.109597] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.109977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.110322] page dumped because: kasan: bad access detected [ 15.110543] [ 15.110638] Memory state around the buggy address: [ 15.110858] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.111139] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.111445] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.111733] ^ [ 15.111948] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.112229] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.112515] ================================================================== [ 15.878574] ================================================================== [ 15.878867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 15.879230] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.879583] [ 15.879708] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.879758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.879773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.879798] Call Trace: [ 15.879821] <TASK> [ 15.879856] dump_stack_lvl+0x73/0xb0 [ 15.879909] print_report+0xd1/0x650 [ 15.879933] ? __virt_addr_valid+0x1db/0x2d0 [ 15.879957] ? kasan_atomics_helper+0x1ce2/0x5450 [ 15.879979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.880006] ? kasan_atomics_helper+0x1ce2/0x5450 [ 15.880028] kasan_report+0x140/0x180 [ 15.880051] ? kasan_atomics_helper+0x1ce2/0x5450 [ 15.880077] kasan_check_range+0x10c/0x1c0 [ 15.880101] __kasan_check_write+0x18/0x20 [ 15.880125] kasan_atomics_helper+0x1ce2/0x5450 [ 15.880159] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.880181] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.880207] ? kasan_atomics+0x153/0x310 [ 15.880234] kasan_atomics+0x1dd/0x310 [ 15.880257] ? __pfx_kasan_atomics+0x10/0x10 [ 15.880281] ? __pfx_read_tsc+0x10/0x10 [ 15.880304] ? ktime_get_ts64+0x86/0x230 [ 15.880331] kunit_try_run_case+0x1a6/0x480 [ 15.880357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.880379] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.880403] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.880430] ? __kthread_parkme+0x82/0x160 [ 15.880454] ? preempt_count_sub+0x50/0x80 [ 15.880481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.880505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.880532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.880560] kthread+0x324/0x6e0 [ 15.880583] ? trace_preempt_on+0x20/0xc0 [ 15.880608] ? __pfx_kthread+0x10/0x10 [ 15.880652] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.880679] ? calculate_sigpending+0x7b/0xa0 [ 15.880701] ? __pfx_kthread+0x10/0x10 [ 15.880726] ret_from_fork+0x41/0x80 [ 15.880746] ? __pfx_kthread+0x10/0x10 [ 15.880769] ret_from_fork_asm+0x1a/0x30 [ 15.880802] </TASK> [ 15.880813] [ 15.888363] Allocated by task 273: [ 15.888516] kasan_save_stack+0x45/0x70 [ 15.888678] kasan_save_track+0x18/0x40 [ 15.888877] kasan_save_alloc_info+0x3b/0x50 [ 15.889087] __kasan_kmalloc+0xb7/0xc0 [ 15.889274] __kmalloc_cache_noprof+0x18a/0x420 [ 15.889636] kasan_atomics+0x96/0x310 [ 15.889806] kunit_try_run_case+0x1a6/0x480 [ 15.889963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.890187] kthread+0x324/0x6e0 [ 15.890362] ret_from_fork+0x41/0x80 [ 15.890548] ret_from_fork_asm+0x1a/0x30 [ 15.890861] [ 15.890936] The buggy address belongs to the object at ffff888101b3e000 [ 15.890936] which belongs to the cache kmalloc-64 of size 64 [ 15.891318] The buggy address is located 0 bytes to the right of [ 15.891318] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.891899] [ 15.891986] The buggy address belongs to the physical page: [ 15.892342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.892628] flags: 0x200000000000000(node=0|zone=2) [ 15.892799] page_type: f5(slab) [ 15.892937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.893171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.893608] page dumped because: kasan: bad access detected [ 15.893888] [ 15.894006] Memory state around the buggy address: [ 15.894236] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.894558] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.894892] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.895195] ^ [ 15.895355] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.895717] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.895984] ================================================================== [ 15.747445] ================================================================== [ 15.747749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 15.748037] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.748467] [ 15.748613] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.748657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.748670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.748694] Call Trace: [ 15.748714] <TASK> [ 15.748734] dump_stack_lvl+0x73/0xb0 [ 15.748763] print_report+0xd1/0x650 [ 15.748785] ? __virt_addr_valid+0x1db/0x2d0 [ 15.748809] ? kasan_atomics_helper+0x18b2/0x5450 [ 15.748830] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.748868] ? kasan_atomics_helper+0x18b2/0x5450 [ 15.748890] kasan_report+0x140/0x180 [ 15.748913] ? kasan_atomics_helper+0x18b2/0x5450 [ 15.748951] kasan_check_range+0x10c/0x1c0 [ 15.748975] __kasan_check_write+0x18/0x20 [ 15.748998] kasan_atomics_helper+0x18b2/0x5450 [ 15.749020] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.749042] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.749068] ? kasan_atomics+0x153/0x310 [ 15.749094] kasan_atomics+0x1dd/0x310 [ 15.749116] ? __pfx_kasan_atomics+0x10/0x10 [ 15.749139] ? __pfx_read_tsc+0x10/0x10 [ 15.749162] ? ktime_get_ts64+0x86/0x230 [ 15.749188] kunit_try_run_case+0x1a6/0x480 [ 15.749211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.749233] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.749256] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.749281] ? __kthread_parkme+0x82/0x160 [ 15.749304] ? preempt_count_sub+0x50/0x80 [ 15.749331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.749354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.749381] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.749407] kthread+0x324/0x6e0 [ 15.749436] ? trace_preempt_on+0x20/0xc0 [ 15.749462] ? __pfx_kthread+0x10/0x10 [ 15.749485] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.749508] ? calculate_sigpending+0x7b/0xa0 [ 15.749532] ? __pfx_kthread+0x10/0x10 [ 15.749555] ret_from_fork+0x41/0x80 [ 15.749575] ? __pfx_kthread+0x10/0x10 [ 15.749598] ret_from_fork_asm+0x1a/0x30 [ 15.749630] </TASK> [ 15.749641] [ 15.757528] Allocated by task 273: [ 15.757715] kasan_save_stack+0x45/0x70 [ 15.757955] kasan_save_track+0x18/0x40 [ 15.758148] kasan_save_alloc_info+0x3b/0x50 [ 15.758298] __kasan_kmalloc+0xb7/0xc0 [ 15.758430] __kmalloc_cache_noprof+0x18a/0x420 [ 15.758586] kasan_atomics+0x96/0x310 [ 15.758722] kunit_try_run_case+0x1a6/0x480 [ 15.758881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.759058] kthread+0x324/0x6e0 [ 15.759250] ret_from_fork+0x41/0x80 [ 15.759427] ret_from_fork_asm+0x1a/0x30 [ 15.759621] [ 15.759716] The buggy address belongs to the object at ffff888101b3e000 [ 15.759716] which belongs to the cache kmalloc-64 of size 64 [ 15.760235] The buggy address is located 0 bytes to the right of [ 15.760235] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.760725] [ 15.760799] The buggy address belongs to the physical page: [ 15.760984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.761225] flags: 0x200000000000000(node=0|zone=2) [ 15.761714] page_type: f5(slab) [ 15.761900] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.762272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.762731] page dumped because: kasan: bad access detected [ 15.762929] [ 15.763026] Memory state around the buggy address: [ 15.763379] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.763650] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.763959] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.764234] ^ [ 15.764392] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.764727] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.765069] ================================================================== [ 15.995123] ================================================================== [ 15.995909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 15.996335] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.996693] [ 15.996804] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.996862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.996876] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.996899] Call Trace: [ 15.996922] <TASK> [ 15.996944] dump_stack_lvl+0x73/0xb0 [ 15.996972] print_report+0xd1/0x650 [ 15.996995] ? __virt_addr_valid+0x1db/0x2d0 [ 15.997019] ? kasan_atomics_helper+0x2007/0x5450 [ 15.997041] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.997067] ? kasan_atomics_helper+0x2007/0x5450 [ 15.997089] kasan_report+0x140/0x180 [ 15.997111] ? kasan_atomics_helper+0x2007/0x5450 [ 15.997136] kasan_check_range+0x10c/0x1c0 [ 15.997160] __kasan_check_write+0x18/0x20 [ 15.997184] kasan_atomics_helper+0x2007/0x5450 [ 15.997207] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.997229] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.997255] ? kasan_atomics+0x153/0x310 [ 15.997281] kasan_atomics+0x1dd/0x310 [ 15.997303] ? __pfx_kasan_atomics+0x10/0x10 [ 15.997327] ? __pfx_read_tsc+0x10/0x10 [ 15.997350] ? ktime_get_ts64+0x86/0x230 [ 15.997377] kunit_try_run_case+0x1a6/0x480 [ 15.997401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.997423] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.997446] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.997473] ? __kthread_parkme+0x82/0x160 [ 15.997496] ? preempt_count_sub+0x50/0x80 [ 15.997522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.997546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.997572] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.997599] kthread+0x324/0x6e0 [ 15.997622] ? trace_preempt_on+0x20/0xc0 [ 15.997647] ? __pfx_kthread+0x10/0x10 [ 15.997670] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.997694] ? calculate_sigpending+0x7b/0xa0 [ 15.997717] ? __pfx_kthread+0x10/0x10 [ 15.997787] ret_from_fork+0x41/0x80 [ 15.997833] ? __pfx_kthread+0x10/0x10 [ 15.997864] ret_from_fork_asm+0x1a/0x30 [ 15.997898] </TASK> [ 15.997910] [ 16.005706] Allocated by task 273: [ 16.005872] kasan_save_stack+0x45/0x70 [ 16.006025] kasan_save_track+0x18/0x40 [ 16.006259] kasan_save_alloc_info+0x3b/0x50 [ 16.006469] __kasan_kmalloc+0xb7/0xc0 [ 16.006651] __kmalloc_cache_noprof+0x18a/0x420 [ 16.006880] kasan_atomics+0x96/0x310 [ 16.007060] kunit_try_run_case+0x1a6/0x480 [ 16.007265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.007542] kthread+0x324/0x6e0 [ 16.007734] ret_from_fork+0x41/0x80 [ 16.007972] ret_from_fork_asm+0x1a/0x30 [ 16.008191] [ 16.008288] The buggy address belongs to the object at ffff888101b3e000 [ 16.008288] which belongs to the cache kmalloc-64 of size 64 [ 16.008814] The buggy address is located 0 bytes to the right of [ 16.008814] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 16.009393] [ 16.009526] The buggy address belongs to the physical page: [ 16.009788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 16.010172] flags: 0x200000000000000(node=0|zone=2) [ 16.010430] page_type: f5(slab) [ 16.010631] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.010963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.011373] page dumped because: kasan: bad access detected [ 16.011627] [ 16.011722] Memory state around the buggy address: [ 16.011980] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.012312] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.012628] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.012978] ^ [ 16.013204] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.013529] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.013849] ================================================================== [ 16.118180] ================================================================== [ 16.118548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 16.118917] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 16.119385] [ 16.119495] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 16.119539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.119552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.119576] Call Trace: [ 16.119597] <TASK> [ 16.119618] dump_stack_lvl+0x73/0xb0 [ 16.119645] print_report+0xd1/0x650 [ 16.119667] ? __virt_addr_valid+0x1db/0x2d0 [ 16.119691] ? kasan_atomics_helper+0x224d/0x5450 [ 16.119713] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.119740] ? kasan_atomics_helper+0x224d/0x5450 [ 16.119761] kasan_report+0x140/0x180 [ 16.119783] ? kasan_atomics_helper+0x224d/0x5450 [ 16.119809] kasan_check_range+0x10c/0x1c0 [ 16.119832] __kasan_check_write+0x18/0x20 [ 16.119867] kasan_atomics_helper+0x224d/0x5450 [ 16.119889] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.119912] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.119936] ? kasan_atomics+0x153/0x310 [ 16.119962] kasan_atomics+0x1dd/0x310 [ 16.119984] ? __pfx_kasan_atomics+0x10/0x10 [ 16.120008] ? __pfx_read_tsc+0x10/0x10 [ 16.120031] ? ktime_get_ts64+0x86/0x230 [ 16.120068] kunit_try_run_case+0x1a6/0x480 [ 16.120095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.120117] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.120140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.120166] ? __kthread_parkme+0x82/0x160 [ 16.120190] ? preempt_count_sub+0x50/0x80 [ 16.120215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.120238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.120265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.120291] kthread+0x324/0x6e0 [ 16.120315] ? trace_preempt_on+0x20/0xc0 [ 16.120339] ? __pfx_kthread+0x10/0x10 [ 16.120363] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.120387] ? calculate_sigpending+0x7b/0xa0 [ 16.120410] ? __pfx_kthread+0x10/0x10 [ 16.120433] ret_from_fork+0x41/0x80 [ 16.120452] ? __pfx_kthread+0x10/0x10 [ 16.120476] ret_from_fork_asm+0x1a/0x30 [ 16.120508] </TASK> [ 16.120520] [ 16.127819] Allocated by task 273: [ 16.128024] kasan_save_stack+0x45/0x70 [ 16.128234] kasan_save_track+0x18/0x40 [ 16.128436] kasan_save_alloc_info+0x3b/0x50 [ 16.128669] __kasan_kmalloc+0xb7/0xc0 [ 16.128874] __kmalloc_cache_noprof+0x18a/0x420 [ 16.129101] kasan_atomics+0x96/0x310 [ 16.129295] kunit_try_run_case+0x1a6/0x480 [ 16.129507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.129852] kthread+0x324/0x6e0 [ 16.130125] ret_from_fork+0x41/0x80 [ 16.130259] ret_from_fork_asm+0x1a/0x30 [ 16.130403] [ 16.130475] The buggy address belongs to the object at ffff888101b3e000 [ 16.130475] which belongs to the cache kmalloc-64 of size 64 [ 16.131015] The buggy address is located 0 bytes to the right of [ 16.131015] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 16.131528] [ 16.131608] The buggy address belongs to the physical page: [ 16.131782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 16.132534] flags: 0x200000000000000(node=0|zone=2) [ 16.132741] page_type: f5(slab) [ 16.132914] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.134499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.134755] page dumped because: kasan: bad access detected [ 16.135501] [ 16.135952] Memory state around the buggy address: [ 16.136631] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.137759] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.138337] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.138561] ^ [ 16.138726] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.139321] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.139993] ================================================================== [ 15.260230] ================================================================== [ 15.260475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 15.260705] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.261322] [ 15.261483] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.261536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.261552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.261577] Call Trace: [ 15.261598] <TASK> [ 15.261620] dump_stack_lvl+0x73/0xb0 [ 15.261651] print_report+0xd1/0x650 [ 15.261676] ? __virt_addr_valid+0x1db/0x2d0 [ 15.261699] ? kasan_atomics_helper+0xde1/0x5450 [ 15.261720] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.261754] ? kasan_atomics_helper+0xde1/0x5450 [ 15.261776] kasan_report+0x140/0x180 [ 15.261799] ? kasan_atomics_helper+0xde1/0x5450 [ 15.261825] kasan_check_range+0x10c/0x1c0 [ 15.261862] __kasan_check_write+0x18/0x20 [ 15.261886] kasan_atomics_helper+0xde1/0x5450 [ 15.261908] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.261930] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.261956] ? kasan_atomics+0x153/0x310 [ 15.261982] kasan_atomics+0x1dd/0x310 [ 15.262005] ? __pfx_kasan_atomics+0x10/0x10 [ 15.262029] ? __pfx_read_tsc+0x10/0x10 [ 15.262052] ? ktime_get_ts64+0x86/0x230 [ 15.262078] kunit_try_run_case+0x1a6/0x480 [ 15.262104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.262126] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.262149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.262176] ? __kthread_parkme+0x82/0x160 [ 15.262199] ? preempt_count_sub+0x50/0x80 [ 15.262225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.262248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.262275] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.262301] kthread+0x324/0x6e0 [ 15.262323] ? trace_preempt_on+0x20/0xc0 [ 15.262348] ? __pfx_kthread+0x10/0x10 [ 15.262371] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.262395] ? calculate_sigpending+0x7b/0xa0 [ 15.262418] ? __pfx_kthread+0x10/0x10 [ 15.262442] ret_from_fork+0x41/0x80 [ 15.262462] ? __pfx_kthread+0x10/0x10 [ 15.262484] ret_from_fork_asm+0x1a/0x30 [ 15.262517] </TASK> [ 15.262529] [ 15.272615] Allocated by task 273: [ 15.273227] kasan_save_stack+0x45/0x70 [ 15.273861] kasan_save_track+0x18/0x40 [ 15.274465] kasan_save_alloc_info+0x3b/0x50 [ 15.275026] __kasan_kmalloc+0xb7/0xc0 [ 15.275570] __kmalloc_cache_noprof+0x18a/0x420 [ 15.275746] kasan_atomics+0x96/0x310 [ 15.275891] kunit_try_run_case+0x1a6/0x480 [ 15.276037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.276213] kthread+0x324/0x6e0 [ 15.276336] ret_from_fork+0x41/0x80 [ 15.276544] ret_from_fork_asm+0x1a/0x30 [ 15.276780] [ 15.276908] The buggy address belongs to the object at ffff888101b3e000 [ 15.276908] which belongs to the cache kmalloc-64 of size 64 [ 15.277755] The buggy address is located 0 bytes to the right of [ 15.277755] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.279061] [ 15.279226] The buggy address belongs to the physical page: [ 15.279645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.280056] flags: 0x200000000000000(node=0|zone=2) [ 15.280603] page_type: f5(slab) [ 15.280931] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.281318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.281547] page dumped because: kasan: bad access detected [ 15.281719] [ 15.281797] Memory state around the buggy address: [ 15.281974] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.282334] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.282613] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.282927] ^ [ 15.283219] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.283493] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.283813] ================================================================== [ 14.962479] ================================================================== [ 14.962792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 14.963337] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 14.963650] [ 14.963738] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.963813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.963827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.963876] Call Trace: [ 14.963898] <TASK> [ 14.963934] dump_stack_lvl+0x73/0xb0 [ 14.963990] print_report+0xd1/0x650 [ 14.964027] ? __virt_addr_valid+0x1db/0x2d0 [ 14.964051] ? kasan_atomics_helper+0x566/0x5450 [ 14.964085] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.964139] ? kasan_atomics_helper+0x566/0x5450 [ 14.964174] kasan_report+0x140/0x180 [ 14.964212] ? kasan_atomics_helper+0x566/0x5450 [ 14.964252] kasan_check_range+0x10c/0x1c0 [ 14.964289] __kasan_check_write+0x18/0x20 [ 14.964312] kasan_atomics_helper+0x566/0x5450 [ 14.964335] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.964358] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.964384] ? kasan_atomics+0x153/0x310 [ 14.964410] kasan_atomics+0x1dd/0x310 [ 14.964432] ? __pfx_kasan_atomics+0x10/0x10 [ 14.964456] ? __pfx_read_tsc+0x10/0x10 [ 14.964480] ? ktime_get_ts64+0x86/0x230 [ 14.964509] kunit_try_run_case+0x1a6/0x480 [ 14.964535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.964557] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.964580] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.964607] ? __kthread_parkme+0x82/0x160 [ 14.964631] ? preempt_count_sub+0x50/0x80 [ 14.964657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.964680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.964708] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.964735] kthread+0x324/0x6e0 [ 14.964757] ? trace_preempt_on+0x20/0xc0 [ 14.964782] ? __pfx_kthread+0x10/0x10 [ 14.964806] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.964831] ? calculate_sigpending+0x7b/0xa0 [ 14.964864] ? __pfx_kthread+0x10/0x10 [ 14.964887] ret_from_fork+0x41/0x80 [ 14.964906] ? __pfx_kthread+0x10/0x10 [ 14.964929] ret_from_fork_asm+0x1a/0x30 [ 14.964962] </TASK> [ 14.964974] [ 14.972672] Allocated by task 273: [ 14.972883] kasan_save_stack+0x45/0x70 [ 14.973040] kasan_save_track+0x18/0x40 [ 14.973171] kasan_save_alloc_info+0x3b/0x50 [ 14.973317] __kasan_kmalloc+0xb7/0xc0 [ 14.973446] __kmalloc_cache_noprof+0x18a/0x420 [ 14.973729] kasan_atomics+0x96/0x310 [ 14.974116] kunit_try_run_case+0x1a6/0x480 [ 14.974324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.974567] kthread+0x324/0x6e0 [ 14.974741] ret_from_fork+0x41/0x80 [ 14.974933] ret_from_fork_asm+0x1a/0x30 [ 14.975218] [ 14.975303] The buggy address belongs to the object at ffff888101b3e000 [ 14.975303] which belongs to the cache kmalloc-64 of size 64 [ 14.975644] The buggy address is located 0 bytes to the right of [ 14.975644] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 14.976004] [ 14.976153] The buggy address belongs to the physical page: [ 14.976412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 14.976804] flags: 0x200000000000000(node=0|zone=2) [ 14.977120] page_type: f5(slab) [ 14.977328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.977716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.978144] page dumped because: kasan: bad access detected [ 14.978404] [ 14.978513] Memory state around the buggy address: [ 14.978734] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.979113] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.979432] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.979757] ^ [ 14.979973] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.980383] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.980746] ================================================================== [ 15.063220] ================================================================== [ 15.063901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 15.064617] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273 [ 15.065299] [ 15.065504] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 15.065552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.065565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.065589] Call Trace: [ 15.065612] <TASK> [ 15.065644] dump_stack_lvl+0x73/0xb0 [ 15.065674] print_report+0xd1/0x650 [ 15.065709] ? __virt_addr_valid+0x1db/0x2d0 [ 15.065732] ? kasan_atomics_helper+0x861/0x5450 [ 15.065758] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.065785] ? kasan_atomics_helper+0x861/0x5450 [ 15.065806] kasan_report+0x140/0x180 [ 15.065829] ? kasan_atomics_helper+0x861/0x5450 [ 15.065863] kasan_check_range+0x10c/0x1c0 [ 15.065886] __kasan_check_write+0x18/0x20 [ 15.065909] kasan_atomics_helper+0x861/0x5450 [ 15.065932] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.065954] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.065980] ? kasan_atomics+0x153/0x310 [ 15.066005] kasan_atomics+0x1dd/0x310 [ 15.066028] ? __pfx_kasan_atomics+0x10/0x10 [ 15.066070] ? __pfx_read_tsc+0x10/0x10 [ 15.066093] ? ktime_get_ts64+0x86/0x230 [ 15.066120] kunit_try_run_case+0x1a6/0x480 [ 15.066144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.066170] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.066193] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.066220] ? __kthread_parkme+0x82/0x160 [ 15.066243] ? preempt_count_sub+0x50/0x80 [ 15.066269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.066293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.066319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.066346] kthread+0x324/0x6e0 [ 15.066368] ? trace_preempt_on+0x20/0xc0 [ 15.066394] ? __pfx_kthread+0x10/0x10 [ 15.066417] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.066443] ? calculate_sigpending+0x7b/0xa0 [ 15.066465] ? __pfx_kthread+0x10/0x10 [ 15.066489] ret_from_fork+0x41/0x80 [ 15.066509] ? __pfx_kthread+0x10/0x10 [ 15.066532] ret_from_fork_asm+0x1a/0x30 [ 15.066565] </TASK> [ 15.066577] [ 15.077764] Allocated by task 273: [ 15.078239] kasan_save_stack+0x45/0x70 [ 15.078408] kasan_save_track+0x18/0x40 [ 15.078541] kasan_save_alloc_info+0x3b/0x50 [ 15.078686] __kasan_kmalloc+0xb7/0xc0 [ 15.078814] __kmalloc_cache_noprof+0x18a/0x420 [ 15.078984] kasan_atomics+0x96/0x310 [ 15.079280] kunit_try_run_case+0x1a6/0x480 [ 15.079512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.079763] kthread+0x324/0x6e0 [ 15.079966] ret_from_fork+0x41/0x80 [ 15.080191] ret_from_fork_asm+0x1a/0x30 [ 15.080402] [ 15.080500] The buggy address belongs to the object at ffff888101b3e000 [ 15.080500] which belongs to the cache kmalloc-64 of size 64 [ 15.080969] The buggy address is located 0 bytes to the right of [ 15.080969] allocated 48-byte region [ffff888101b3e000, ffff888101b3e030) [ 15.081323] [ 15.081445] The buggy address belongs to the physical page: [ 15.081727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 15.082140] flags: 0x200000000000000(node=0|zone=2) [ 15.082682] page_type: f5(slab) [ 15.083176] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.083918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.084360] page dumped because: kasan: bad access detected [ 15.084735] [ 15.084876] Memory state around the buggy address: [ 15.085246] ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.085536] ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.085967] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.086288] ^ [ 15.086634] ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.087039] ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.087500] ==================================================================