Date
June 2, 2025, 2:13 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 16.480495] ================================================================== [ 16.481358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 16.481738] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.482059] [ 16.482170] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.482211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.482225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.482247] Call Trace: [ 16.482262] <TASK> [ 16.482278] dump_stack_lvl+0x73/0xb0 [ 16.482315] print_report+0xd1/0x650 [ 16.482337] ? __virt_addr_valid+0x1db/0x2d0 [ 16.482371] ? kasan_atomics_helper+0x2007/0x5450 [ 16.482392] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.482419] ? kasan_atomics_helper+0x2007/0x5450 [ 16.482441] kasan_report+0x140/0x180 [ 16.482463] ? kasan_atomics_helper+0x2007/0x5450 [ 16.482489] kasan_check_range+0x10c/0x1c0 [ 16.482513] __kasan_check_write+0x18/0x20 [ 16.482536] kasan_atomics_helper+0x2007/0x5450 [ 16.482559] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.482581] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.482616] ? kasan_atomics+0x153/0x310 [ 16.482642] kasan_atomics+0x1dd/0x310 [ 16.482674] ? __pfx_kasan_atomics+0x10/0x10 [ 16.482699] ? __pfx_read_tsc+0x10/0x10 [ 16.482721] ? ktime_get_ts64+0x86/0x230 [ 16.482747] kunit_try_run_case+0x1a6/0x480 [ 16.482770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.482792] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.482826] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.482850] ? __kthread_parkme+0x82/0x160 [ 16.482883] ? preempt_count_sub+0x50/0x80 [ 16.482908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.482932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.482959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.482986] kthread+0x324/0x6e0 [ 16.483008] ? trace_preempt_on+0x20/0xc0 [ 16.483040] ? __pfx_kthread+0x10/0x10 [ 16.483063] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.483086] ? calculate_sigpending+0x7b/0xa0 [ 16.483108] ? __pfx_kthread+0x10/0x10 [ 16.483132] ret_from_fork+0x41/0x80 [ 16.483152] ? __pfx_kthread+0x10/0x10 [ 16.483175] ret_from_fork_asm+0x1a/0x30 [ 16.483206] </TASK> [ 16.483217] [ 16.490979] Allocated by task 273: [ 16.491152] kasan_save_stack+0x45/0x70 [ 16.491369] kasan_save_track+0x18/0x40 [ 16.491563] kasan_save_alloc_info+0x3b/0x50 [ 16.491773] __kasan_kmalloc+0xb7/0xc0 [ 16.491958] __kmalloc_cache_noprof+0x18a/0x420 [ 16.492192] kasan_atomics+0x96/0x310 [ 16.492328] kunit_try_run_case+0x1a6/0x480 [ 16.492542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.492802] kthread+0x324/0x6e0 [ 16.492978] ret_from_fork+0x41/0x80 [ 16.493173] ret_from_fork_asm+0x1a/0x30 [ 16.493373] [ 16.493474] The buggy address belongs to the object at ffff888101bf3e00 [ 16.493474] which belongs to the cache kmalloc-64 of size 64 [ 16.493988] The buggy address is located 0 bytes to the right of [ 16.493988] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.494515] [ 16.494643] The buggy address belongs to the physical page: [ 16.494880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.495244] flags: 0x200000000000000(node=0|zone=2) [ 16.495458] page_type: f5(slab) [ 16.495657] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.495901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.496138] page dumped because: kasan: bad access detected [ 16.496311] [ 16.496382] Memory state around the buggy address: [ 16.496629] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.497003] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.497332] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.497623] ^ [ 16.497800] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.498026] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.498237] ================================================================== [ 15.186845] ================================================================== [ 15.187141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 15.187505] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.187895] [ 15.188026] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.188065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.188087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.188108] Call Trace: [ 15.188125] <TASK> [ 15.188140] dump_stack_lvl+0x73/0xb0 [ 15.188164] print_report+0xd1/0x650 [ 15.188184] ? __virt_addr_valid+0x1db/0x2d0 [ 15.188206] ? kasan_atomics_helper+0x4b8a/0x5450 [ 15.188226] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.188251] ? kasan_atomics_helper+0x4b8a/0x5450 [ 15.188271] kasan_report+0x140/0x180 [ 15.188292] ? kasan_atomics_helper+0x4b8a/0x5450 [ 15.188317] __asan_report_load4_noabort+0x18/0x20 [ 15.188340] kasan_atomics_helper+0x4b8a/0x5450 [ 15.188372] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.188393] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.188415] ? kasan_atomics+0x153/0x310 [ 15.188451] kasan_atomics+0x1dd/0x310 [ 15.188472] ? __pfx_kasan_atomics+0x10/0x10 [ 15.188496] ? __pfx_read_tsc+0x10/0x10 [ 15.188517] ? ktime_get_ts64+0x86/0x230 [ 15.188541] kunit_try_run_case+0x1a6/0x480 [ 15.188563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.188583] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.188607] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.188630] ? __kthread_parkme+0x82/0x160 [ 15.188652] ? preempt_count_sub+0x50/0x80 [ 15.188675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.188698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.188723] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.188749] kthread+0x324/0x6e0 [ 15.188770] ? trace_preempt_on+0x20/0xc0 [ 15.188792] ? __pfx_kthread+0x10/0x10 [ 15.188814] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.188835] ? calculate_sigpending+0x7b/0xa0 [ 15.188911] ? __pfx_kthread+0x10/0x10 [ 15.188947] ret_from_fork+0x41/0x80 [ 15.188966] ? __pfx_kthread+0x10/0x10 [ 15.188987] ret_from_fork_asm+0x1a/0x30 [ 15.189026] </TASK> [ 15.189037] [ 15.199285] Allocated by task 273: [ 15.199769] kasan_save_stack+0x45/0x70 [ 15.200055] kasan_save_track+0x18/0x40 [ 15.200429] kasan_save_alloc_info+0x3b/0x50 [ 15.200900] __kasan_kmalloc+0xb7/0xc0 [ 15.201232] __kmalloc_cache_noprof+0x18a/0x420 [ 15.201781] kasan_atomics+0x96/0x310 [ 15.202192] kunit_try_run_case+0x1a6/0x480 [ 15.202554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.202999] kthread+0x324/0x6e0 [ 15.203392] ret_from_fork+0x41/0x80 [ 15.203713] ret_from_fork_asm+0x1a/0x30 [ 15.204129] [ 15.204358] The buggy address belongs to the object at ffff888101bf3e00 [ 15.204358] which belongs to the cache kmalloc-64 of size 64 [ 15.205146] The buggy address is located 0 bytes to the right of [ 15.205146] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.205945] [ 15.206198] The buggy address belongs to the physical page: [ 15.206783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.207434] flags: 0x200000000000000(node=0|zone=2) [ 15.208080] page_type: f5(slab) [ 15.208255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.208550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.208835] page dumped because: kasan: bad access detected [ 15.209055] [ 15.209128] Memory state around the buggy address: [ 15.209287] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.209723] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.210084] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.210364] ^ [ 15.210628] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.210964] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.211490] ================================================================== [ 16.187274] ================================================================== [ 16.187704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 16.188662] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.188915] [ 16.189000] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.189052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.189065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.189087] Call Trace: [ 16.189104] <TASK> [ 16.189120] dump_stack_lvl+0x73/0xb0 [ 16.189146] print_report+0xd1/0x650 [ 16.189168] ? __virt_addr_valid+0x1db/0x2d0 [ 16.189191] ? kasan_atomics_helper+0x18b2/0x5450 [ 16.189213] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.189239] ? kasan_atomics_helper+0x18b2/0x5450 [ 16.189261] kasan_report+0x140/0x180 [ 16.189283] ? kasan_atomics_helper+0x18b2/0x5450 [ 16.189309] kasan_check_range+0x10c/0x1c0 [ 16.189333] __kasan_check_write+0x18/0x20 [ 16.189356] kasan_atomics_helper+0x18b2/0x5450 [ 16.189379] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.189401] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.189426] ? kasan_atomics+0x153/0x310 [ 16.189454] kasan_atomics+0x1dd/0x310 [ 16.189477] ? __pfx_kasan_atomics+0x10/0x10 [ 16.189500] ? __pfx_read_tsc+0x10/0x10 [ 16.189522] ? ktime_get_ts64+0x86/0x230 [ 16.189548] kunit_try_run_case+0x1a6/0x480 [ 16.189571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.189593] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.189617] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.189653] ? __kthread_parkme+0x82/0x160 [ 16.189676] ? preempt_count_sub+0x50/0x80 [ 16.189701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.189742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.189770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.189798] kthread+0x324/0x6e0 [ 16.189820] ? trace_preempt_on+0x20/0xc0 [ 16.189853] ? __pfx_kthread+0x10/0x10 [ 16.189876] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.189899] ? calculate_sigpending+0x7b/0xa0 [ 16.189932] ? __pfx_kthread+0x10/0x10 [ 16.189955] ret_from_fork+0x41/0x80 [ 16.189975] ? __pfx_kthread+0x10/0x10 [ 16.189998] ret_from_fork_asm+0x1a/0x30 [ 16.190038] </TASK> [ 16.190050] [ 16.200732] Allocated by task 273: [ 16.201097] kasan_save_stack+0x45/0x70 [ 16.201487] kasan_save_track+0x18/0x40 [ 16.201918] kasan_save_alloc_info+0x3b/0x50 [ 16.202335] __kasan_kmalloc+0xb7/0xc0 [ 16.202709] __kmalloc_cache_noprof+0x18a/0x420 [ 16.203064] kasan_atomics+0x96/0x310 [ 16.203312] kunit_try_run_case+0x1a6/0x480 [ 16.203616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.203798] kthread+0x324/0x6e0 [ 16.203920] ret_from_fork+0x41/0x80 [ 16.204062] ret_from_fork_asm+0x1a/0x30 [ 16.204205] [ 16.204277] The buggy address belongs to the object at ffff888101bf3e00 [ 16.204277] which belongs to the cache kmalloc-64 of size 64 [ 16.204667] The buggy address is located 0 bytes to the right of [ 16.204667] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.205184] [ 16.205281] The buggy address belongs to the physical page: [ 16.205530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.205805] flags: 0x200000000000000(node=0|zone=2) [ 16.206060] page_type: f5(slab) [ 16.206255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.206589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.206906] page dumped because: kasan: bad access detected [ 16.207167] [ 16.207274] Memory state around the buggy address: [ 16.207475] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.207791] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.208031] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.208373] ^ [ 16.208591] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.208811] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.209146] ================================================================== [ 15.531888] ================================================================== [ 15.532249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 15.532736] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.533103] [ 15.533190] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.533228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.533242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.533264] Call Trace: [ 15.533278] <TASK> [ 15.533292] dump_stack_lvl+0x73/0xb0 [ 15.533317] print_report+0xd1/0x650 [ 15.533339] ? __virt_addr_valid+0x1db/0x2d0 [ 15.533362] ? kasan_atomics_helper+0xa2c/0x5450 [ 15.533383] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.533410] ? kasan_atomics_helper+0xa2c/0x5450 [ 15.533455] kasan_report+0x140/0x180 [ 15.533478] ? kasan_atomics_helper+0xa2c/0x5450 [ 15.533504] kasan_check_range+0x10c/0x1c0 [ 15.533528] __kasan_check_write+0x18/0x20 [ 15.533551] kasan_atomics_helper+0xa2c/0x5450 [ 15.533623] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.533666] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.533691] ? kasan_atomics+0x153/0x310 [ 15.533718] kasan_atomics+0x1dd/0x310 [ 15.533746] ? __pfx_kasan_atomics+0x10/0x10 [ 15.533771] ? __pfx_read_tsc+0x10/0x10 [ 15.533793] ? ktime_get_ts64+0x86/0x230 [ 15.533819] kunit_try_run_case+0x1a6/0x480 [ 15.533843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.533865] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.533890] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.533914] ? __kthread_parkme+0x82/0x160 [ 15.533936] ? preempt_count_sub+0x50/0x80 [ 15.533962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.533985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.534011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.534048] kthread+0x324/0x6e0 [ 15.534089] ? trace_preempt_on+0x20/0xc0 [ 15.534113] ? __pfx_kthread+0x10/0x10 [ 15.534137] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.534160] ? calculate_sigpending+0x7b/0xa0 [ 15.534182] ? __pfx_kthread+0x10/0x10 [ 15.534206] ret_from_fork+0x41/0x80 [ 15.534225] ? __pfx_kthread+0x10/0x10 [ 15.534248] ret_from_fork_asm+0x1a/0x30 [ 15.534279] </TASK> [ 15.534290] [ 15.542822] Allocated by task 273: [ 15.543191] kasan_save_stack+0x45/0x70 [ 15.543407] kasan_save_track+0x18/0x40 [ 15.543746] kasan_save_alloc_info+0x3b/0x50 [ 15.543908] __kasan_kmalloc+0xb7/0xc0 [ 15.544114] __kmalloc_cache_noprof+0x18a/0x420 [ 15.544340] kasan_atomics+0x96/0x310 [ 15.544533] kunit_try_run_case+0x1a6/0x480 [ 15.544793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.545158] kthread+0x324/0x6e0 [ 15.545350] ret_from_fork+0x41/0x80 [ 15.545534] ret_from_fork_asm+0x1a/0x30 [ 15.545800] [ 15.545890] The buggy address belongs to the object at ffff888101bf3e00 [ 15.545890] which belongs to the cache kmalloc-64 of size 64 [ 15.546242] The buggy address is located 0 bytes to the right of [ 15.546242] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.546786] [ 15.546882] The buggy address belongs to the physical page: [ 15.547137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.547572] flags: 0x200000000000000(node=0|zone=2) [ 15.547728] page_type: f5(slab) [ 15.547847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.548200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.548821] page dumped because: kasan: bad access detected [ 15.549088] [ 15.549173] Memory state around the buggy address: [ 15.549327] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.549841] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.550147] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.550357] ^ [ 15.550593] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.550905] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.551214] ================================================================== [ 15.748937] ================================================================== [ 15.749326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 15.749847] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.750204] [ 15.750432] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.750637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.750653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.750675] Call Trace: [ 15.750690] <TASK> [ 15.750706] dump_stack_lvl+0x73/0xb0 [ 15.750735] print_report+0xd1/0x650 [ 15.750757] ? __virt_addr_valid+0x1db/0x2d0 [ 15.750780] ? kasan_atomics_helper+0x4a38/0x5450 [ 15.750826] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.750852] ? kasan_atomics_helper+0x4a38/0x5450 [ 15.750876] kasan_report+0x140/0x180 [ 15.751060] ? kasan_atomics_helper+0x4a38/0x5450 [ 15.751096] __asan_report_load4_noabort+0x18/0x20 [ 15.751139] kasan_atomics_helper+0x4a38/0x5450 [ 15.751164] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.751203] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.751228] ? kasan_atomics+0x153/0x310 [ 15.751255] kasan_atomics+0x1dd/0x310 [ 15.751277] ? __pfx_kasan_atomics+0x10/0x10 [ 15.751301] ? __pfx_read_tsc+0x10/0x10 [ 15.751324] ? ktime_get_ts64+0x86/0x230 [ 15.751349] kunit_try_run_case+0x1a6/0x480 [ 15.751373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.751397] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.751422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.751446] ? __kthread_parkme+0x82/0x160 [ 15.751468] ? preempt_count_sub+0x50/0x80 [ 15.751494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.751517] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.751544] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.751571] kthread+0x324/0x6e0 [ 15.751593] ? trace_preempt_on+0x20/0xc0 [ 15.751617] ? __pfx_kthread+0x10/0x10 [ 15.751640] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.751662] ? calculate_sigpending+0x7b/0xa0 [ 15.751685] ? __pfx_kthread+0x10/0x10 [ 15.751707] ret_from_fork+0x41/0x80 [ 15.751727] ? __pfx_kthread+0x10/0x10 [ 15.751749] ret_from_fork_asm+0x1a/0x30 [ 15.751782] </TASK> [ 15.751792] [ 15.762750] Allocated by task 273: [ 15.762977] kasan_save_stack+0x45/0x70 [ 15.763361] kasan_save_track+0x18/0x40 [ 15.763677] kasan_save_alloc_info+0x3b/0x50 [ 15.763847] __kasan_kmalloc+0xb7/0xc0 [ 15.764047] __kmalloc_cache_noprof+0x18a/0x420 [ 15.764294] kasan_atomics+0x96/0x310 [ 15.764551] kunit_try_run_case+0x1a6/0x480 [ 15.765063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.765366] kthread+0x324/0x6e0 [ 15.765553] ret_from_fork+0x41/0x80 [ 15.765758] ret_from_fork_asm+0x1a/0x30 [ 15.765962] [ 15.766295] The buggy address belongs to the object at ffff888101bf3e00 [ 15.766295] which belongs to the cache kmalloc-64 of size 64 [ 15.766965] The buggy address is located 0 bytes to the right of [ 15.766965] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.767798] [ 15.767904] The buggy address belongs to the physical page: [ 15.768143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.768749] flags: 0x200000000000000(node=0|zone=2) [ 15.769056] page_type: f5(slab) [ 15.769222] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.769521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.769989] page dumped because: kasan: bad access detected [ 15.770461] [ 15.770552] Memory state around the buggy address: [ 15.770774] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.771232] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.771730] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.772137] ^ [ 15.772433] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.772988] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.773449] ================================================================== [ 15.398334] ================================================================== [ 15.398691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 15.399228] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.399632] [ 15.399883] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.399928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.399942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.399965] Call Trace: [ 15.399981] <TASK> [ 15.399996] dump_stack_lvl+0x73/0xb0 [ 15.400037] print_report+0xd1/0x650 [ 15.400059] ? __virt_addr_valid+0x1db/0x2d0 [ 15.400082] ? kasan_atomics_helper+0x698/0x5450 [ 15.400104] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.400131] ? kasan_atomics_helper+0x698/0x5450 [ 15.400153] kasan_report+0x140/0x180 [ 15.400177] ? kasan_atomics_helper+0x698/0x5450 [ 15.400204] kasan_check_range+0x10c/0x1c0 [ 15.400228] __kasan_check_write+0x18/0x20 [ 15.400252] kasan_atomics_helper+0x698/0x5450 [ 15.400275] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.400297] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.400322] ? kasan_atomics+0x153/0x310 [ 15.400348] kasan_atomics+0x1dd/0x310 [ 15.400371] ? __pfx_kasan_atomics+0x10/0x10 [ 15.400395] ? __pfx_read_tsc+0x10/0x10 [ 15.400417] ? ktime_get_ts64+0x86/0x230 [ 15.400443] kunit_try_run_case+0x1a6/0x480 [ 15.400467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.400489] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.400514] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.400538] ? __kthread_parkme+0x82/0x160 [ 15.400561] ? preempt_count_sub+0x50/0x80 [ 15.400586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.400611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.400638] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.400665] kthread+0x324/0x6e0 [ 15.400687] ? trace_preempt_on+0x20/0xc0 [ 15.400711] ? __pfx_kthread+0x10/0x10 [ 15.400734] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.400758] ? calculate_sigpending+0x7b/0xa0 [ 15.400781] ? __pfx_kthread+0x10/0x10 [ 15.400804] ret_from_fork+0x41/0x80 [ 15.400824] ? __pfx_kthread+0x10/0x10 [ 15.400846] ret_from_fork_asm+0x1a/0x30 [ 15.400878] </TASK> [ 15.400889] [ 15.409286] Allocated by task 273: [ 15.409450] kasan_save_stack+0x45/0x70 [ 15.409951] kasan_save_track+0x18/0x40 [ 15.410396] kasan_save_alloc_info+0x3b/0x50 [ 15.410782] __kasan_kmalloc+0xb7/0xc0 [ 15.411163] __kmalloc_cache_noprof+0x18a/0x420 [ 15.411535] kasan_atomics+0x96/0x310 [ 15.411869] kunit_try_run_case+0x1a6/0x480 [ 15.412054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.412275] kthread+0x324/0x6e0 [ 15.412429] ret_from_fork+0x41/0x80 [ 15.412852] ret_from_fork_asm+0x1a/0x30 [ 15.413298] [ 15.413570] The buggy address belongs to the object at ffff888101bf3e00 [ 15.413570] which belongs to the cache kmalloc-64 of size 64 [ 15.414283] The buggy address is located 0 bytes to the right of [ 15.414283] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.415197] [ 15.415290] The buggy address belongs to the physical page: [ 15.415715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.416246] flags: 0x200000000000000(node=0|zone=2) [ 15.416462] page_type: f5(slab) [ 15.416815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.417355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.417946] page dumped because: kasan: bad access detected [ 15.418209] [ 15.418301] Memory state around the buggy address: [ 15.418501] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.418805] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.419519] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.420059] ^ [ 15.420435] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.420946] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.421261] ================================================================== [ 16.246409] ================================================================== [ 16.246719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 16.246958] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.247303] [ 16.247471] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.247510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.247523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.247545] Call Trace: [ 16.247559] <TASK> [ 16.247574] dump_stack_lvl+0x73/0xb0 [ 16.247599] print_report+0xd1/0x650 [ 16.247621] ? __virt_addr_valid+0x1db/0x2d0 [ 16.247644] ? kasan_atomics_helper+0x1a80/0x5450 [ 16.247665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.247692] ? kasan_atomics_helper+0x1a80/0x5450 [ 16.247714] kasan_report+0x140/0x180 [ 16.247737] ? kasan_atomics_helper+0x1a80/0x5450 [ 16.247775] kasan_check_range+0x10c/0x1c0 [ 16.247798] __kasan_check_write+0x18/0x20 [ 16.247829] kasan_atomics_helper+0x1a80/0x5450 [ 16.247851] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.247873] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.247898] ? kasan_atomics+0x153/0x310 [ 16.247924] kasan_atomics+0x1dd/0x310 [ 16.247947] ? __pfx_kasan_atomics+0x10/0x10 [ 16.247971] ? __pfx_read_tsc+0x10/0x10 [ 16.247992] ? ktime_get_ts64+0x86/0x230 [ 16.248027] kunit_try_run_case+0x1a6/0x480 [ 16.248050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.248073] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.248097] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.248122] ? __kthread_parkme+0x82/0x160 [ 16.248146] ? preempt_count_sub+0x50/0x80 [ 16.248171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.248194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.248222] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.248249] kthread+0x324/0x6e0 [ 16.248271] ? trace_preempt_on+0x20/0xc0 [ 16.248295] ? __pfx_kthread+0x10/0x10 [ 16.248317] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.248340] ? calculate_sigpending+0x7b/0xa0 [ 16.248363] ? __pfx_kthread+0x10/0x10 [ 16.248385] ret_from_fork+0x41/0x80 [ 16.248405] ? __pfx_kthread+0x10/0x10 [ 16.248427] ret_from_fork_asm+0x1a/0x30 [ 16.248460] </TASK> [ 16.248470] [ 16.256199] Allocated by task 273: [ 16.256344] kasan_save_stack+0x45/0x70 [ 16.256488] kasan_save_track+0x18/0x40 [ 16.256668] kasan_save_alloc_info+0x3b/0x50 [ 16.257416] __kasan_kmalloc+0xb7/0xc0 [ 16.257706] __kmalloc_cache_noprof+0x18a/0x420 [ 16.257878] kasan_atomics+0x96/0x310 [ 16.258008] kunit_try_run_case+0x1a6/0x480 [ 16.258165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.258341] kthread+0x324/0x6e0 [ 16.258460] ret_from_fork+0x41/0x80 [ 16.258586] ret_from_fork_asm+0x1a/0x30 [ 16.258724] [ 16.258796] The buggy address belongs to the object at ffff888101bf3e00 [ 16.258796] which belongs to the cache kmalloc-64 of size 64 [ 16.259149] The buggy address is located 0 bytes to the right of [ 16.259149] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.260361] [ 16.260441] The buggy address belongs to the physical page: [ 16.260609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.260846] flags: 0x200000000000000(node=0|zone=2) [ 16.261003] page_type: f5(slab) [ 16.261179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.261407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.261792] page dumped because: kasan: bad access detected [ 16.262073] [ 16.262172] Memory state around the buggy address: [ 16.262435] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.262952] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.263184] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.263389] ^ [ 16.263540] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.264479] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.264853] ================================================================== [ 15.773939] ================================================================== [ 15.774304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 15.774646] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.774926] [ 15.775012] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.775063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.775076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.775098] Call Trace: [ 15.775115] <TASK> [ 15.775132] dump_stack_lvl+0x73/0xb0 [ 15.775156] print_report+0xd1/0x650 [ 15.775178] ? __virt_addr_valid+0x1db/0x2d0 [ 15.775201] ? kasan_atomics_helper+0x107a/0x5450 [ 15.775222] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.775248] ? kasan_atomics_helper+0x107a/0x5450 [ 15.775272] kasan_report+0x140/0x180 [ 15.775295] ? kasan_atomics_helper+0x107a/0x5450 [ 15.775321] kasan_check_range+0x10c/0x1c0 [ 15.775345] __kasan_check_write+0x18/0x20 [ 15.775368] kasan_atomics_helper+0x107a/0x5450 [ 15.775390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.775413] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.775437] ? kasan_atomics+0x153/0x310 [ 15.775463] kasan_atomics+0x1dd/0x310 [ 15.775486] ? __pfx_kasan_atomics+0x10/0x10 [ 15.775510] ? __pfx_read_tsc+0x10/0x10 [ 15.775532] ? ktime_get_ts64+0x86/0x230 [ 15.775558] kunit_try_run_case+0x1a6/0x480 [ 15.775581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.775603] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.775627] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.775651] ? __kthread_parkme+0x82/0x160 [ 15.775674] ? preempt_count_sub+0x50/0x80 [ 15.775699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.775723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.775749] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.775776] kthread+0x324/0x6e0 [ 15.775798] ? trace_preempt_on+0x20/0xc0 [ 15.775821] ? __pfx_kthread+0x10/0x10 [ 15.775844] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.775866] ? calculate_sigpending+0x7b/0xa0 [ 15.775889] ? __pfx_kthread+0x10/0x10 [ 15.775912] ret_from_fork+0x41/0x80 [ 15.775932] ? __pfx_kthread+0x10/0x10 [ 15.775955] ret_from_fork_asm+0x1a/0x30 [ 15.775986] </TASK> [ 15.775998] [ 15.783730] Allocated by task 273: [ 15.783956] kasan_save_stack+0x45/0x70 [ 15.784162] kasan_save_track+0x18/0x40 [ 15.784474] kasan_save_alloc_info+0x3b/0x50 [ 15.784626] __kasan_kmalloc+0xb7/0xc0 [ 15.784810] __kmalloc_cache_noprof+0x18a/0x420 [ 15.785092] kasan_atomics+0x96/0x310 [ 15.785251] kunit_try_run_case+0x1a6/0x480 [ 15.785395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.785569] kthread+0x324/0x6e0 [ 15.785690] ret_from_fork+0x41/0x80 [ 15.785937] ret_from_fork_asm+0x1a/0x30 [ 15.786276] [ 15.786373] The buggy address belongs to the object at ffff888101bf3e00 [ 15.786373] which belongs to the cache kmalloc-64 of size 64 [ 15.787060] The buggy address is located 0 bytes to the right of [ 15.787060] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.787427] [ 15.787499] The buggy address belongs to the physical page: [ 15.787872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.788234] flags: 0x200000000000000(node=0|zone=2) [ 15.788520] page_type: f5(slab) [ 15.788844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.789153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.789377] page dumped because: kasan: bad access detected [ 15.789546] [ 15.789615] Memory state around the buggy address: [ 15.789770] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.790433] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.790879] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.791162] ^ [ 15.791316] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.791527] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.791736] ================================================================== [ 16.600467] ================================================================== [ 16.601137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 16.601366] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.601601] [ 16.601706] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.601773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.601785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.601806] Call Trace: [ 16.601821] <TASK> [ 16.601854] dump_stack_lvl+0x73/0xb0 [ 16.601878] print_report+0xd1/0x650 [ 16.601914] ? __virt_addr_valid+0x1db/0x2d0 [ 16.601950] ? kasan_atomics_helper+0x224d/0x5450 [ 16.601971] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.601998] ? kasan_atomics_helper+0x224d/0x5450 [ 16.602029] kasan_report+0x140/0x180 [ 16.602053] ? kasan_atomics_helper+0x224d/0x5450 [ 16.602080] kasan_check_range+0x10c/0x1c0 [ 16.602103] __kasan_check_write+0x18/0x20 [ 16.602126] kasan_atomics_helper+0x224d/0x5450 [ 16.602149] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.602171] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.602196] ? kasan_atomics+0x153/0x310 [ 16.602238] kasan_atomics+0x1dd/0x310 [ 16.602273] ? __pfx_kasan_atomics+0x10/0x10 [ 16.602311] ? __pfx_read_tsc+0x10/0x10 [ 16.602346] ? ktime_get_ts64+0x86/0x230 [ 16.602384] kunit_try_run_case+0x1a6/0x480 [ 16.602421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.602468] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.602506] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.602544] ? __kthread_parkme+0x82/0x160 [ 16.602579] ? preempt_count_sub+0x50/0x80 [ 16.602616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.602652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.602706] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.602748] kthread+0x324/0x6e0 [ 16.602796] ? trace_preempt_on+0x20/0xc0 [ 16.602833] ? __pfx_kthread+0x10/0x10 [ 16.602856] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.602880] ? calculate_sigpending+0x7b/0xa0 [ 16.602902] ? __pfx_kthread+0x10/0x10 [ 16.602925] ret_from_fork+0x41/0x80 [ 16.602944] ? __pfx_kthread+0x10/0x10 [ 16.602969] ret_from_fork_asm+0x1a/0x30 [ 16.603002] </TASK> [ 16.603023] [ 16.610756] Allocated by task 273: [ 16.611028] kasan_save_stack+0x45/0x70 [ 16.611256] kasan_save_track+0x18/0x40 [ 16.611489] kasan_save_alloc_info+0x3b/0x50 [ 16.611800] __kasan_kmalloc+0xb7/0xc0 [ 16.611984] __kmalloc_cache_noprof+0x18a/0x420 [ 16.612212] kasan_atomics+0x96/0x310 [ 16.612371] kunit_try_run_case+0x1a6/0x480 [ 16.612512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.613032] kthread+0x324/0x6e0 [ 16.613173] ret_from_fork+0x41/0x80 [ 16.613384] ret_from_fork_asm+0x1a/0x30 [ 16.613617] [ 16.613744] The buggy address belongs to the object at ffff888101bf3e00 [ 16.613744] which belongs to the cache kmalloc-64 of size 64 [ 16.614282] The buggy address is located 0 bytes to the right of [ 16.614282] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.615010] [ 16.615108] The buggy address belongs to the physical page: [ 16.615350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.615641] flags: 0x200000000000000(node=0|zone=2) [ 16.615881] page_type: f5(slab) [ 16.616750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.617396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.617640] page dumped because: kasan: bad access detected [ 16.617819] [ 16.617892] Memory state around the buggy address: [ 16.618108] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.618794] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.619456] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.619969] ^ [ 16.620386] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.620965] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.621361] ================================================================== [ 15.722799] ================================================================== [ 15.723157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 15.723489] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.723712] [ 15.723791] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.723831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.723844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.723864] Call Trace: [ 15.723964] <TASK> [ 15.723983] dump_stack_lvl+0x73/0xb0 [ 15.724009] print_report+0xd1/0x650 [ 15.724045] ? __virt_addr_valid+0x1db/0x2d0 [ 15.724067] ? kasan_atomics_helper+0xfaa/0x5450 [ 15.724089] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.724115] ? kasan_atomics_helper+0xfaa/0x5450 [ 15.724136] kasan_report+0x140/0x180 [ 15.724158] ? kasan_atomics_helper+0xfaa/0x5450 [ 15.724184] kasan_check_range+0x10c/0x1c0 [ 15.724207] __kasan_check_write+0x18/0x20 [ 15.724230] kasan_atomics_helper+0xfaa/0x5450 [ 15.724254] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.724277] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.724302] ? kasan_atomics+0x153/0x310 [ 15.724328] kasan_atomics+0x1dd/0x310 [ 15.724351] ? __pfx_kasan_atomics+0x10/0x10 [ 15.724374] ? __pfx_read_tsc+0x10/0x10 [ 15.724397] ? ktime_get_ts64+0x86/0x230 [ 15.724421] kunit_try_run_case+0x1a6/0x480 [ 15.724445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.724467] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.724492] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.724516] ? __kthread_parkme+0x82/0x160 [ 15.724538] ? preempt_count_sub+0x50/0x80 [ 15.724563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.724587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.724613] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.724640] kthread+0x324/0x6e0 [ 15.724662] ? trace_preempt_on+0x20/0xc0 [ 15.724685] ? __pfx_kthread+0x10/0x10 [ 15.724708] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.724730] ? calculate_sigpending+0x7b/0xa0 [ 15.724752] ? __pfx_kthread+0x10/0x10 [ 15.724776] ret_from_fork+0x41/0x80 [ 15.724796] ? __pfx_kthread+0x10/0x10 [ 15.724818] ret_from_fork_asm+0x1a/0x30 [ 15.724850] </TASK> [ 15.724861] [ 15.732933] Allocated by task 273: [ 15.733267] kasan_save_stack+0x45/0x70 [ 15.733518] kasan_save_track+0x18/0x40 [ 15.733789] kasan_save_alloc_info+0x3b/0x50 [ 15.734180] __kasan_kmalloc+0xb7/0xc0 [ 15.734351] __kmalloc_cache_noprof+0x18a/0x420 [ 15.734511] kasan_atomics+0x96/0x310 [ 15.734644] kunit_try_run_case+0x1a6/0x480 [ 15.734958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.735295] kthread+0x324/0x6e0 [ 15.735502] ret_from_fork+0x41/0x80 [ 15.735691] ret_from_fork_asm+0x1a/0x30 [ 15.735826] [ 15.735897] The buggy address belongs to the object at ffff888101bf3e00 [ 15.735897] which belongs to the cache kmalloc-64 of size 64 [ 15.736529] The buggy address is located 0 bytes to the right of [ 15.736529] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.737106] [ 15.737181] The buggy address belongs to the physical page: [ 15.737347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.737631] flags: 0x200000000000000(node=0|zone=2) [ 15.740714] page_type: f5(slab) [ 15.741715] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.743415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.744935] page dumped because: kasan: bad access detected [ 15.745563] [ 15.745847] Memory state around the buggy address: [ 15.746147] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.746609] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.747300] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.747595] ^ [ 15.747821] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.748130] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.748424] ================================================================== [ 16.042905] ================================================================== [ 16.043256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 16.043590] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.043952] [ 16.044080] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.044118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.044131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.044152] Call Trace: [ 16.044167] <TASK> [ 16.044182] dump_stack_lvl+0x73/0xb0 [ 16.044206] print_report+0xd1/0x650 [ 16.044228] ? __virt_addr_valid+0x1db/0x2d0 [ 16.044250] ? kasan_atomics_helper+0x151e/0x5450 [ 16.044271] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.044297] ? kasan_atomics_helper+0x151e/0x5450 [ 16.044319] kasan_report+0x140/0x180 [ 16.044341] ? kasan_atomics_helper+0x151e/0x5450 [ 16.044367] kasan_check_range+0x10c/0x1c0 [ 16.044392] __kasan_check_write+0x18/0x20 [ 16.044415] kasan_atomics_helper+0x151e/0x5450 [ 16.044438] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.044461] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.044486] ? kasan_atomics+0x153/0x310 [ 16.044512] kasan_atomics+0x1dd/0x310 [ 16.044534] ? __pfx_kasan_atomics+0x10/0x10 [ 16.044558] ? __pfx_read_tsc+0x10/0x10 [ 16.044581] ? ktime_get_ts64+0x86/0x230 [ 16.044606] kunit_try_run_case+0x1a6/0x480 [ 16.044630] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.044652] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.044676] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.044701] ? __kthread_parkme+0x82/0x160 [ 16.044725] ? preempt_count_sub+0x50/0x80 [ 16.044750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.044774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.044800] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.044827] kthread+0x324/0x6e0 [ 16.044848] ? trace_preempt_on+0x20/0xc0 [ 16.044872] ? __pfx_kthread+0x10/0x10 [ 16.044895] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.044918] ? calculate_sigpending+0x7b/0xa0 [ 16.044941] ? __pfx_kthread+0x10/0x10 [ 16.044964] ret_from_fork+0x41/0x80 [ 16.044984] ? __pfx_kthread+0x10/0x10 [ 16.045007] ret_from_fork_asm+0x1a/0x30 [ 16.045049] </TASK> [ 16.045060] [ 16.053101] Allocated by task 273: [ 16.053294] kasan_save_stack+0x45/0x70 [ 16.053488] kasan_save_track+0x18/0x40 [ 16.053795] kasan_save_alloc_info+0x3b/0x50 [ 16.054004] __kasan_kmalloc+0xb7/0xc0 [ 16.054157] __kmalloc_cache_noprof+0x18a/0x420 [ 16.054313] kasan_atomics+0x96/0x310 [ 16.054501] kunit_try_run_case+0x1a6/0x480 [ 16.054897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.055169] kthread+0x324/0x6e0 [ 16.055327] ret_from_fork+0x41/0x80 [ 16.055497] ret_from_fork_asm+0x1a/0x30 [ 16.055783] [ 16.055869] The buggy address belongs to the object at ffff888101bf3e00 [ 16.055869] which belongs to the cache kmalloc-64 of size 64 [ 16.056346] The buggy address is located 0 bytes to the right of [ 16.056346] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.056808] [ 16.056882] The buggy address belongs to the physical page: [ 16.057134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.057481] flags: 0x200000000000000(node=0|zone=2) [ 16.057727] page_type: f5(slab) [ 16.057860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.058169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.058481] page dumped because: kasan: bad access detected [ 16.058726] [ 16.058859] Memory state around the buggy address: [ 16.059077] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.059354] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.059778] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.060048] ^ [ 16.060268] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.060577] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.060907] ================================================================== [ 16.402820] ================================================================== [ 16.403148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 16.403396] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.403747] [ 16.403840] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.403880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.403893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.403914] Call Trace: [ 16.403927] <TASK> [ 16.403942] dump_stack_lvl+0x73/0xb0 [ 16.403967] print_report+0xd1/0x650 [ 16.403989] ? __virt_addr_valid+0x1db/0x2d0 [ 16.404011] ? kasan_atomics_helper+0x1eab/0x5450 [ 16.404042] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.404069] ? kasan_atomics_helper+0x1eab/0x5450 [ 16.404091] kasan_report+0x140/0x180 [ 16.404114] ? kasan_atomics_helper+0x1eab/0x5450 [ 16.404140] kasan_check_range+0x10c/0x1c0 [ 16.404164] __kasan_check_write+0x18/0x20 [ 16.404187] kasan_atomics_helper+0x1eab/0x5450 [ 16.404210] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.404232] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.404279] ? kasan_atomics+0x153/0x310 [ 16.404315] kasan_atomics+0x1dd/0x310 [ 16.404353] ? __pfx_kasan_atomics+0x10/0x10 [ 16.404404] ? __pfx_read_tsc+0x10/0x10 [ 16.404441] ? ktime_get_ts64+0x86/0x230 [ 16.404492] kunit_try_run_case+0x1a6/0x480 [ 16.404516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.404551] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.404598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.404623] ? __kthread_parkme+0x82/0x160 [ 16.404646] ? preempt_count_sub+0x50/0x80 [ 16.404682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.404706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.404734] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.404761] kthread+0x324/0x6e0 [ 16.404783] ? trace_preempt_on+0x20/0xc0 [ 16.404808] ? __pfx_kthread+0x10/0x10 [ 16.404831] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.404854] ? calculate_sigpending+0x7b/0xa0 [ 16.404877] ? __pfx_kthread+0x10/0x10 [ 16.404900] ret_from_fork+0x41/0x80 [ 16.404920] ? __pfx_kthread+0x10/0x10 [ 16.404943] ret_from_fork_asm+0x1a/0x30 [ 16.404975] </TASK> [ 16.404985] [ 16.413238] Allocated by task 273: [ 16.413369] kasan_save_stack+0x45/0x70 [ 16.413507] kasan_save_track+0x18/0x40 [ 16.413869] kasan_save_alloc_info+0x3b/0x50 [ 16.414100] __kasan_kmalloc+0xb7/0xc0 [ 16.414289] __kmalloc_cache_noprof+0x18a/0x420 [ 16.414509] kasan_atomics+0x96/0x310 [ 16.414800] kunit_try_run_case+0x1a6/0x480 [ 16.415136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.415387] kthread+0x324/0x6e0 [ 16.415520] ret_from_fork+0x41/0x80 [ 16.415732] ret_from_fork_asm+0x1a/0x30 [ 16.415994] [ 16.416173] The buggy address belongs to the object at ffff888101bf3e00 [ 16.416173] which belongs to the cache kmalloc-64 of size 64 [ 16.416621] The buggy address is located 0 bytes to the right of [ 16.416621] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.417210] [ 16.417317] The buggy address belongs to the physical page: [ 16.417483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.417712] flags: 0x200000000000000(node=0|zone=2) [ 16.417874] page_type: f5(slab) [ 16.418081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.418564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.418945] page dumped because: kasan: bad access detected [ 16.419213] [ 16.419309] Memory state around the buggy address: [ 16.419690] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.420098] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.420419] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.420791] ^ [ 16.421114] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.421846] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.422320] ================================================================== [ 15.159528] ================================================================== [ 15.160220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 15.160526] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.161395] [ 15.161801] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.161847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.161859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.161880] Call Trace: [ 15.161894] <TASK> [ 15.161909] dump_stack_lvl+0x73/0xb0 [ 15.161935] print_report+0xd1/0x650 [ 15.161956] ? __virt_addr_valid+0x1db/0x2d0 [ 15.161977] ? kasan_atomics_helper+0x4ba4/0x5450 [ 15.161997] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.162032] ? kasan_atomics_helper+0x4ba4/0x5450 [ 15.162054] kasan_report+0x140/0x180 [ 15.162076] ? kasan_atomics_helper+0x4ba4/0x5450 [ 15.162100] __asan_report_store4_noabort+0x1b/0x30 [ 15.162123] kasan_atomics_helper+0x4ba4/0x5450 [ 15.162145] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.162166] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.162189] ? kasan_atomics+0x153/0x310 [ 15.162214] kasan_atomics+0x1dd/0x310 [ 15.162235] ? __pfx_kasan_atomics+0x10/0x10 [ 15.162258] ? __pfx_read_tsc+0x10/0x10 [ 15.162279] ? ktime_get_ts64+0x86/0x230 [ 15.162303] kunit_try_run_case+0x1a6/0x480 [ 15.162326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.162346] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.162369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.162393] ? __kthread_parkme+0x82/0x160 [ 15.162415] ? preempt_count_sub+0x50/0x80 [ 15.162438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.162461] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.162486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.162512] kthread+0x324/0x6e0 [ 15.162532] ? trace_preempt_on+0x20/0xc0 [ 15.162555] ? __pfx_kthread+0x10/0x10 [ 15.162630] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.162652] ? calculate_sigpending+0x7b/0xa0 [ 15.162673] ? __pfx_kthread+0x10/0x10 [ 15.162695] ret_from_fork+0x41/0x80 [ 15.162715] ? __pfx_kthread+0x10/0x10 [ 15.162736] ret_from_fork_asm+0x1a/0x30 [ 15.162767] </TASK> [ 15.162777] [ 15.175098] Allocated by task 273: [ 15.175374] kasan_save_stack+0x45/0x70 [ 15.175734] kasan_save_track+0x18/0x40 [ 15.176034] kasan_save_alloc_info+0x3b/0x50 [ 15.176332] __kasan_kmalloc+0xb7/0xc0 [ 15.176528] __kmalloc_cache_noprof+0x18a/0x420 [ 15.176969] kasan_atomics+0x96/0x310 [ 15.177279] kunit_try_run_case+0x1a6/0x480 [ 15.177575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.178140] kthread+0x324/0x6e0 [ 15.178443] ret_from_fork+0x41/0x80 [ 15.178811] ret_from_fork_asm+0x1a/0x30 [ 15.179196] [ 15.179421] The buggy address belongs to the object at ffff888101bf3e00 [ 15.179421] which belongs to the cache kmalloc-64 of size 64 [ 15.180207] The buggy address is located 0 bytes to the right of [ 15.180207] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.180978] [ 15.181069] The buggy address belongs to the physical page: [ 15.181334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.181996] flags: 0x200000000000000(node=0|zone=2) [ 15.182279] page_type: f5(slab) [ 15.182450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.182810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.183389] page dumped because: kasan: bad access detected [ 15.183791] [ 15.183908] Memory state around the buggy address: [ 15.184144] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.184420] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.184680] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.185101] ^ [ 15.185455] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.185939] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.186298] ================================================================== [ 16.382511] ================================================================== [ 16.383168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 16.383496] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.383927] [ 16.384073] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.384126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.384139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.384160] Call Trace: [ 16.384176] <TASK> [ 16.384191] dump_stack_lvl+0x73/0xb0 [ 16.384217] print_report+0xd1/0x650 [ 16.384241] ? __virt_addr_valid+0x1db/0x2d0 [ 16.384263] ? kasan_atomics_helper+0x1e13/0x5450 [ 16.384284] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.384341] ? kasan_atomics_helper+0x1e13/0x5450 [ 16.384364] kasan_report+0x140/0x180 [ 16.384404] ? kasan_atomics_helper+0x1e13/0x5450 [ 16.384442] kasan_check_range+0x10c/0x1c0 [ 16.384466] __kasan_check_write+0x18/0x20 [ 16.384489] kasan_atomics_helper+0x1e13/0x5450 [ 16.384512] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.384535] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.384560] ? kasan_atomics+0x153/0x310 [ 16.384586] kasan_atomics+0x1dd/0x310 [ 16.384609] ? __pfx_kasan_atomics+0x10/0x10 [ 16.384633] ? __pfx_read_tsc+0x10/0x10 [ 16.384655] ? ktime_get_ts64+0x86/0x230 [ 16.384680] kunit_try_run_case+0x1a6/0x480 [ 16.384731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.384754] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.384791] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.384816] ? __kthread_parkme+0x82/0x160 [ 16.384839] ? preempt_count_sub+0x50/0x80 [ 16.384889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.384914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.384941] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.384979] kthread+0x324/0x6e0 [ 16.385002] ? trace_preempt_on+0x20/0xc0 [ 16.385060] ? __pfx_kthread+0x10/0x10 [ 16.385084] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.385134] ? calculate_sigpending+0x7b/0xa0 [ 16.385156] ? __pfx_kthread+0x10/0x10 [ 16.385194] ret_from_fork+0x41/0x80 [ 16.385227] ? __pfx_kthread+0x10/0x10 [ 16.385251] ret_from_fork_asm+0x1a/0x30 [ 16.385282] </TASK> [ 16.385293] [ 16.393421] Allocated by task 273: [ 16.393665] kasan_save_stack+0x45/0x70 [ 16.393888] kasan_save_track+0x18/0x40 [ 16.394120] kasan_save_alloc_info+0x3b/0x50 [ 16.394314] __kasan_kmalloc+0xb7/0xc0 [ 16.394535] __kmalloc_cache_noprof+0x18a/0x420 [ 16.394760] kasan_atomics+0x96/0x310 [ 16.394961] kunit_try_run_case+0x1a6/0x480 [ 16.395170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.395452] kthread+0x324/0x6e0 [ 16.395667] ret_from_fork+0x41/0x80 [ 16.395878] ret_from_fork_asm+0x1a/0x30 [ 16.396142] [ 16.396236] The buggy address belongs to the object at ffff888101bf3e00 [ 16.396236] which belongs to the cache kmalloc-64 of size 64 [ 16.396766] The buggy address is located 0 bytes to the right of [ 16.396766] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.397345] [ 16.397421] The buggy address belongs to the physical page: [ 16.397777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.398197] flags: 0x200000000000000(node=0|zone=2) [ 16.398465] page_type: f5(slab) [ 16.398697] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.399034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.399393] page dumped because: kasan: bad access detected [ 16.399619] [ 16.399822] Memory state around the buggy address: [ 16.400081] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.400408] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.400722] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.401106] ^ [ 16.401322] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.401722] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.402055] ================================================================== [ 16.308593] ================================================================== [ 16.308827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 16.309615] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.310368] [ 16.310620] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.310663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.310676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.310697] Call Trace: [ 16.310712] <TASK> [ 16.310729] dump_stack_lvl+0x73/0xb0 [ 16.310757] print_report+0xd1/0x650 [ 16.310778] ? __virt_addr_valid+0x1db/0x2d0 [ 16.310801] ? kasan_atomics_helper+0x4f32/0x5450 [ 16.310823] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.310853] ? kasan_atomics_helper+0x4f32/0x5450 [ 16.310876] kasan_report+0x140/0x180 [ 16.310899] ? kasan_atomics_helper+0x4f32/0x5450 [ 16.310925] __asan_report_load8_noabort+0x18/0x20 [ 16.310950] kasan_atomics_helper+0x4f32/0x5450 [ 16.310973] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.310996] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.311035] ? kasan_atomics+0x153/0x310 [ 16.311100] kasan_atomics+0x1dd/0x310 [ 16.311126] ? __pfx_kasan_atomics+0x10/0x10 [ 16.311162] ? __pfx_read_tsc+0x10/0x10 [ 16.311185] ? ktime_get_ts64+0x86/0x230 [ 16.311211] kunit_try_run_case+0x1a6/0x480 [ 16.311235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.311258] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.311283] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.311307] ? __kthread_parkme+0x82/0x160 [ 16.311328] ? preempt_count_sub+0x50/0x80 [ 16.311353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.311376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.311404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.311431] kthread+0x324/0x6e0 [ 16.311453] ? trace_preempt_on+0x20/0xc0 [ 16.311476] ? __pfx_kthread+0x10/0x10 [ 16.311500] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.311523] ? calculate_sigpending+0x7b/0xa0 [ 16.311565] ? __pfx_kthread+0x10/0x10 [ 16.311590] ret_from_fork+0x41/0x80 [ 16.311609] ? __pfx_kthread+0x10/0x10 [ 16.311632] ret_from_fork_asm+0x1a/0x30 [ 16.311663] </TASK> [ 16.311676] [ 16.323882] Allocated by task 273: [ 16.324254] kasan_save_stack+0x45/0x70 [ 16.324651] kasan_save_track+0x18/0x40 [ 16.325024] kasan_save_alloc_info+0x3b/0x50 [ 16.325434] __kasan_kmalloc+0xb7/0xc0 [ 16.325758] __kmalloc_cache_noprof+0x18a/0x420 [ 16.326092] kasan_atomics+0x96/0x310 [ 16.326286] kunit_try_run_case+0x1a6/0x480 [ 16.326693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.326871] kthread+0x324/0x6e0 [ 16.326993] ret_from_fork+0x41/0x80 [ 16.327131] ret_from_fork_asm+0x1a/0x30 [ 16.327270] [ 16.327341] The buggy address belongs to the object at ffff888101bf3e00 [ 16.327341] which belongs to the cache kmalloc-64 of size 64 [ 16.328086] The buggy address is located 0 bytes to the right of [ 16.328086] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.329217] [ 16.329396] The buggy address belongs to the physical page: [ 16.329916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.330416] flags: 0x200000000000000(node=0|zone=2) [ 16.330676] page_type: f5(slab) [ 16.331000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.331698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.332138] page dumped because: kasan: bad access detected [ 16.332310] [ 16.332380] Memory state around the buggy address: [ 16.332532] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.333193] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.333852] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.334485] ^ [ 16.334954] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.335432] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.335902] ================================================================== [ 16.582076] ================================================================== [ 16.582431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 16.582917] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.583174] [ 16.583277] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.583316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.583328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.583349] Call Trace: [ 16.583389] <TASK> [ 16.583404] dump_stack_lvl+0x73/0xb0 [ 16.583429] print_report+0xd1/0x650 [ 16.583468] ? __virt_addr_valid+0x1db/0x2d0 [ 16.583490] ? kasan_atomics_helper+0x4fa7/0x5450 [ 16.583511] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.583538] ? kasan_atomics_helper+0x4fa7/0x5450 [ 16.583560] kasan_report+0x140/0x180 [ 16.583582] ? kasan_atomics_helper+0x4fa7/0x5450 [ 16.583608] __asan_report_load8_noabort+0x18/0x20 [ 16.583632] kasan_atomics_helper+0x4fa7/0x5450 [ 16.583654] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.583676] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.583701] ? kasan_atomics+0x153/0x310 [ 16.583743] kasan_atomics+0x1dd/0x310 [ 16.583766] ? __pfx_kasan_atomics+0x10/0x10 [ 16.583790] ? __pfx_read_tsc+0x10/0x10 [ 16.583812] ? ktime_get_ts64+0x86/0x230 [ 16.583837] kunit_try_run_case+0x1a6/0x480 [ 16.583860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.583882] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.583906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.583931] ? __kthread_parkme+0x82/0x160 [ 16.583955] ? preempt_count_sub+0x50/0x80 [ 16.583980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.584003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.584038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.584064] kthread+0x324/0x6e0 [ 16.584087] ? trace_preempt_on+0x20/0xc0 [ 16.584129] ? __pfx_kthread+0x10/0x10 [ 16.584152] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.584175] ? calculate_sigpending+0x7b/0xa0 [ 16.584214] ? __pfx_kthread+0x10/0x10 [ 16.584238] ret_from_fork+0x41/0x80 [ 16.584256] ? __pfx_kthread+0x10/0x10 [ 16.584279] ret_from_fork_asm+0x1a/0x30 [ 16.584312] </TASK> [ 16.584323] [ 16.591821] Allocated by task 273: [ 16.592035] kasan_save_stack+0x45/0x70 [ 16.592223] kasan_save_track+0x18/0x40 [ 16.592405] kasan_save_alloc_info+0x3b/0x50 [ 16.592713] __kasan_kmalloc+0xb7/0xc0 [ 16.592902] __kmalloc_cache_noprof+0x18a/0x420 [ 16.593083] kasan_atomics+0x96/0x310 [ 16.593276] kunit_try_run_case+0x1a6/0x480 [ 16.593454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.593673] kthread+0x324/0x6e0 [ 16.593809] ret_from_fork+0x41/0x80 [ 16.593938] ret_from_fork_asm+0x1a/0x30 [ 16.594117] [ 16.594212] The buggy address belongs to the object at ffff888101bf3e00 [ 16.594212] which belongs to the cache kmalloc-64 of size 64 [ 16.594721] The buggy address is located 0 bytes to the right of [ 16.594721] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.595287] [ 16.595381] The buggy address belongs to the physical page: [ 16.595580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.595809] flags: 0x200000000000000(node=0|zone=2) [ 16.595966] page_type: f5(slab) [ 16.596091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.596311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.596775] page dumped because: kasan: bad access detected [ 16.597057] [ 16.597175] Memory state around the buggy address: [ 16.597420] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.598035] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.598407] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.598955] ^ [ 16.599208] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.599436] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.599877] ================================================================== [ 16.562523] ================================================================== [ 16.563009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 16.563637] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.563956] [ 16.564071] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.564110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.564123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.564144] Call Trace: [ 16.564158] <TASK> [ 16.564173] dump_stack_lvl+0x73/0xb0 [ 16.564197] print_report+0xd1/0x650 [ 16.564218] ? __virt_addr_valid+0x1db/0x2d0 [ 16.564240] ? kasan_atomics_helper+0x218b/0x5450 [ 16.564262] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.564287] ? kasan_atomics_helper+0x218b/0x5450 [ 16.564309] kasan_report+0x140/0x180 [ 16.564332] ? kasan_atomics_helper+0x218b/0x5450 [ 16.564357] kasan_check_range+0x10c/0x1c0 [ 16.564380] __kasan_check_write+0x18/0x20 [ 16.564403] kasan_atomics_helper+0x218b/0x5450 [ 16.564425] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.564448] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.564472] ? kasan_atomics+0x153/0x310 [ 16.564497] kasan_atomics+0x1dd/0x310 [ 16.564520] ? __pfx_kasan_atomics+0x10/0x10 [ 16.564545] ? __pfx_read_tsc+0x10/0x10 [ 16.564567] ? ktime_get_ts64+0x86/0x230 [ 16.564613] kunit_try_run_case+0x1a6/0x480 [ 16.564649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.564672] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.564709] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.564746] ? __kthread_parkme+0x82/0x160 [ 16.564782] ? preempt_count_sub+0x50/0x80 [ 16.564820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.564846] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.564872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.564899] kthread+0x324/0x6e0 [ 16.564921] ? trace_preempt_on+0x20/0xc0 [ 16.564945] ? __pfx_kthread+0x10/0x10 [ 16.564968] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.564991] ? calculate_sigpending+0x7b/0xa0 [ 16.565022] ? __pfx_kthread+0x10/0x10 [ 16.565046] ret_from_fork+0x41/0x80 [ 16.565081] ? __pfx_kthread+0x10/0x10 [ 16.565117] ret_from_fork_asm+0x1a/0x30 [ 16.565162] </TASK> [ 16.565172] [ 16.572943] Allocated by task 273: [ 16.573263] kasan_save_stack+0x45/0x70 [ 16.573513] kasan_save_track+0x18/0x40 [ 16.573934] kasan_save_alloc_info+0x3b/0x50 [ 16.574118] __kasan_kmalloc+0xb7/0xc0 [ 16.574248] __kmalloc_cache_noprof+0x18a/0x420 [ 16.574397] kasan_atomics+0x96/0x310 [ 16.574523] kunit_try_run_case+0x1a6/0x480 [ 16.574697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.574973] kthread+0x324/0x6e0 [ 16.575239] ret_from_fork+0x41/0x80 [ 16.575426] ret_from_fork_asm+0x1a/0x30 [ 16.575698] [ 16.575796] The buggy address belongs to the object at ffff888101bf3e00 [ 16.575796] which belongs to the cache kmalloc-64 of size 64 [ 16.576336] The buggy address is located 0 bytes to the right of [ 16.576336] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.576923] [ 16.577026] The buggy address belongs to the physical page: [ 16.577279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.577824] flags: 0x200000000000000(node=0|zone=2) [ 16.578061] page_type: f5(slab) [ 16.578226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.578486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.578700] page dumped because: kasan: bad access detected [ 16.578864] [ 16.578932] Memory state around the buggy address: [ 16.579427] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.579976] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.580319] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.580666] ^ [ 16.580906] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.581223] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.581526] ================================================================== [ 15.641206] ================================================================== [ 15.641677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 15.641908] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.642141] [ 15.642222] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.642263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.642275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.642296] Call Trace: [ 15.642312] <TASK> [ 15.642326] dump_stack_lvl+0x73/0xb0 [ 15.642350] print_report+0xd1/0x650 [ 15.642372] ? __virt_addr_valid+0x1db/0x2d0 [ 15.642394] ? kasan_atomics_helper+0xd48/0x5450 [ 15.642415] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.642457] ? kasan_atomics_helper+0xd48/0x5450 [ 15.642480] kasan_report+0x140/0x180 [ 15.642502] ? kasan_atomics_helper+0xd48/0x5450 [ 15.642528] kasan_check_range+0x10c/0x1c0 [ 15.642552] __kasan_check_write+0x18/0x20 [ 15.642576] kasan_atomics_helper+0xd48/0x5450 [ 15.642600] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.642622] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.642647] ? kasan_atomics+0x153/0x310 [ 15.642674] kasan_atomics+0x1dd/0x310 [ 15.642697] ? __pfx_kasan_atomics+0x10/0x10 [ 15.642721] ? __pfx_read_tsc+0x10/0x10 [ 15.642743] ? ktime_get_ts64+0x86/0x230 [ 15.642768] kunit_try_run_case+0x1a6/0x480 [ 15.642792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.642815] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.642839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.642864] ? __kthread_parkme+0x82/0x160 [ 15.642887] ? preempt_count_sub+0x50/0x80 [ 15.642912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.642936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.642963] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.642990] kthread+0x324/0x6e0 [ 15.643012] ? trace_preempt_on+0x20/0xc0 [ 15.643047] ? __pfx_kthread+0x10/0x10 [ 15.643071] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.643094] ? calculate_sigpending+0x7b/0xa0 [ 15.643116] ? __pfx_kthread+0x10/0x10 [ 15.643140] ret_from_fork+0x41/0x80 [ 15.643159] ? __pfx_kthread+0x10/0x10 [ 15.643182] ret_from_fork_asm+0x1a/0x30 [ 15.643214] </TASK> [ 15.643225] [ 15.651923] Allocated by task 273: [ 15.652110] kasan_save_stack+0x45/0x70 [ 15.652308] kasan_save_track+0x18/0x40 [ 15.652471] kasan_save_alloc_info+0x3b/0x50 [ 15.652770] __kasan_kmalloc+0xb7/0xc0 [ 15.652941] __kmalloc_cache_noprof+0x18a/0x420 [ 15.653171] kasan_atomics+0x96/0x310 [ 15.653308] kunit_try_run_case+0x1a6/0x480 [ 15.653454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.653994] kthread+0x324/0x6e0 [ 15.654181] ret_from_fork+0x41/0x80 [ 15.654368] ret_from_fork_asm+0x1a/0x30 [ 15.654552] [ 15.654626] The buggy address belongs to the object at ffff888101bf3e00 [ 15.654626] which belongs to the cache kmalloc-64 of size 64 [ 15.654974] The buggy address is located 0 bytes to the right of [ 15.654974] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.655346] [ 15.655418] The buggy address belongs to the physical page: [ 15.655589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.656161] flags: 0x200000000000000(node=0|zone=2) [ 15.656612] page_type: f5(slab) [ 15.656943] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.657327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.657554] page dumped because: kasan: bad access detected [ 15.658083] [ 15.658179] Memory state around the buggy address: [ 15.658358] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.658572] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.658784] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.658994] ^ [ 15.659226] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.659542] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.660261] ================================================================== [ 15.512267] ================================================================== [ 15.512525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 15.512984] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.513316] [ 15.513418] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.513478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.513491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.513514] Call Trace: [ 15.513530] <TASK> [ 15.513546] dump_stack_lvl+0x73/0xb0 [ 15.513620] print_report+0xd1/0x650 [ 15.513667] ? __virt_addr_valid+0x1db/0x2d0 [ 15.513690] ? kasan_atomics_helper+0x993/0x5450 [ 15.513711] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.513742] ? kasan_atomics_helper+0x993/0x5450 [ 15.513764] kasan_report+0x140/0x180 [ 15.513787] ? kasan_atomics_helper+0x993/0x5450 [ 15.513831] kasan_check_range+0x10c/0x1c0 [ 15.513856] __kasan_check_write+0x18/0x20 [ 15.513879] kasan_atomics_helper+0x993/0x5450 [ 15.513901] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.513924] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.513950] ? kasan_atomics+0x153/0x310 [ 15.513976] kasan_atomics+0x1dd/0x310 [ 15.513999] ? __pfx_kasan_atomics+0x10/0x10 [ 15.514037] ? __pfx_read_tsc+0x10/0x10 [ 15.514059] ? ktime_get_ts64+0x86/0x230 [ 15.514085] kunit_try_run_case+0x1a6/0x480 [ 15.514108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.514149] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.514174] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.514198] ? __kthread_parkme+0x82/0x160 [ 15.514221] ? preempt_count_sub+0x50/0x80 [ 15.514246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.514270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.514297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.514324] kthread+0x324/0x6e0 [ 15.514346] ? trace_preempt_on+0x20/0xc0 [ 15.514369] ? __pfx_kthread+0x10/0x10 [ 15.514393] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.514416] ? calculate_sigpending+0x7b/0xa0 [ 15.514440] ? __pfx_kthread+0x10/0x10 [ 15.514464] ret_from_fork+0x41/0x80 [ 15.514483] ? __pfx_kthread+0x10/0x10 [ 15.514505] ret_from_fork_asm+0x1a/0x30 [ 15.514554] </TASK> [ 15.514567] [ 15.522728] Allocated by task 273: [ 15.522859] kasan_save_stack+0x45/0x70 [ 15.523002] kasan_save_track+0x18/0x40 [ 15.523503] kasan_save_alloc_info+0x3b/0x50 [ 15.523732] __kasan_kmalloc+0xb7/0xc0 [ 15.524169] __kmalloc_cache_noprof+0x18a/0x420 [ 15.524399] kasan_atomics+0x96/0x310 [ 15.524601] kunit_try_run_case+0x1a6/0x480 [ 15.524895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.525165] kthread+0x324/0x6e0 [ 15.525306] ret_from_fork+0x41/0x80 [ 15.525491] ret_from_fork_asm+0x1a/0x30 [ 15.525761] [ 15.525860] The buggy address belongs to the object at ffff888101bf3e00 [ 15.525860] which belongs to the cache kmalloc-64 of size 64 [ 15.526343] The buggy address is located 0 bytes to the right of [ 15.526343] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.527033] [ 15.527163] The buggy address belongs to the physical page: [ 15.527408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.527860] flags: 0x200000000000000(node=0|zone=2) [ 15.528113] page_type: f5(slab) [ 15.528287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.528543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.528921] page dumped because: kasan: bad access detected [ 15.529134] [ 15.529231] Memory state around the buggy address: [ 15.529456] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.529665] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.530206] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.530541] ^ [ 15.530965] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.531294] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.531505] ================================================================== [ 15.212069] ================================================================== [ 15.212361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 15.212843] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.213138] [ 15.213220] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.213261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.213273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.213293] Call Trace: [ 15.213307] <TASK> [ 15.213339] dump_stack_lvl+0x73/0xb0 [ 15.213362] print_report+0xd1/0x650 [ 15.213383] ? __virt_addr_valid+0x1db/0x2d0 [ 15.213404] ? kasan_atomics_helper+0x4b70/0x5450 [ 15.213424] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.213449] ? kasan_atomics_helper+0x4b70/0x5450 [ 15.213469] kasan_report+0x140/0x180 [ 15.213491] ? kasan_atomics_helper+0x4b70/0x5450 [ 15.213516] __asan_report_store4_noabort+0x1b/0x30 [ 15.213540] kasan_atomics_helper+0x4b70/0x5450 [ 15.213667] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.213690] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.213776] ? kasan_atomics+0x153/0x310 [ 15.213804] kasan_atomics+0x1dd/0x310 [ 15.213840] ? __pfx_kasan_atomics+0x10/0x10 [ 15.213865] ? __pfx_read_tsc+0x10/0x10 [ 15.213888] ? ktime_get_ts64+0x86/0x230 [ 15.213914] kunit_try_run_case+0x1a6/0x480 [ 15.213937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.213959] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.213983] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.214007] ? __kthread_parkme+0x82/0x160 [ 15.214039] ? preempt_count_sub+0x50/0x80 [ 15.214064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.214119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.214146] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.214184] kthread+0x324/0x6e0 [ 15.214206] ? trace_preempt_on+0x20/0xc0 [ 15.214229] ? __pfx_kthread+0x10/0x10 [ 15.214253] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.214277] ? calculate_sigpending+0x7b/0xa0 [ 15.214300] ? __pfx_kthread+0x10/0x10 [ 15.214323] ret_from_fork+0x41/0x80 [ 15.214343] ? __pfx_kthread+0x10/0x10 [ 15.214366] ret_from_fork_asm+0x1a/0x30 [ 15.214397] </TASK> [ 15.214409] [ 15.229481] Allocated by task 273: [ 15.230241] kasan_save_stack+0x45/0x70 [ 15.230426] kasan_save_track+0x18/0x40 [ 15.230725] kasan_save_alloc_info+0x3b/0x50 [ 15.231136] __kasan_kmalloc+0xb7/0xc0 [ 15.231332] __kmalloc_cache_noprof+0x18a/0x420 [ 15.231733] kasan_atomics+0x96/0x310 [ 15.231973] kunit_try_run_case+0x1a6/0x480 [ 15.232268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.232640] kthread+0x324/0x6e0 [ 15.232787] ret_from_fork+0x41/0x80 [ 15.232973] ret_from_fork_asm+0x1a/0x30 [ 15.233168] [ 15.233266] The buggy address belongs to the object at ffff888101bf3e00 [ 15.233266] which belongs to the cache kmalloc-64 of size 64 [ 15.233768] The buggy address is located 0 bytes to the right of [ 15.233768] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.234731] [ 15.235080] The buggy address belongs to the physical page: [ 15.235402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.235856] flags: 0x200000000000000(node=0|zone=2) [ 15.236123] page_type: f5(slab) [ 15.236264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.236889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.237194] page dumped because: kasan: bad access detected [ 15.237524] [ 15.238051] Memory state around the buggy address: [ 15.238265] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.238559] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.239048] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.239356] ^ [ 15.239745] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.240210] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.240619] ================================================================== [ 15.660686] ================================================================== [ 15.661043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 15.661343] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.661703] [ 15.661810] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.661847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.661859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.661880] Call Trace: [ 15.661895] <TASK> [ 15.661910] dump_stack_lvl+0x73/0xb0 [ 15.661934] print_report+0xd1/0x650 [ 15.661956] ? __virt_addr_valid+0x1db/0x2d0 [ 15.661979] ? kasan_atomics_helper+0xde1/0x5450 [ 15.662000] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.662038] ? kasan_atomics_helper+0xde1/0x5450 [ 15.662059] kasan_report+0x140/0x180 [ 15.662081] ? kasan_atomics_helper+0xde1/0x5450 [ 15.662107] kasan_check_range+0x10c/0x1c0 [ 15.662132] __kasan_check_write+0x18/0x20 [ 15.662156] kasan_atomics_helper+0xde1/0x5450 [ 15.662178] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.662200] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.662224] ? kasan_atomics+0x153/0x310 [ 15.662250] kasan_atomics+0x1dd/0x310 [ 15.662273] ? __pfx_kasan_atomics+0x10/0x10 [ 15.662297] ? __pfx_read_tsc+0x10/0x10 [ 15.662319] ? ktime_get_ts64+0x86/0x230 [ 15.662346] kunit_try_run_case+0x1a6/0x480 [ 15.662370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.662392] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.662417] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.662441] ? __kthread_parkme+0x82/0x160 [ 15.662464] ? preempt_count_sub+0x50/0x80 [ 15.662490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.662514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.662541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.662567] kthread+0x324/0x6e0 [ 15.662590] ? trace_preempt_on+0x20/0xc0 [ 15.662614] ? __pfx_kthread+0x10/0x10 [ 15.662637] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.662660] ? calculate_sigpending+0x7b/0xa0 [ 15.662682] ? __pfx_kthread+0x10/0x10 [ 15.662706] ret_from_fork+0x41/0x80 [ 15.662725] ? __pfx_kthread+0x10/0x10 [ 15.662748] ret_from_fork_asm+0x1a/0x30 [ 15.662780] </TASK> [ 15.662791] [ 15.674111] Allocated by task 273: [ 15.674441] kasan_save_stack+0x45/0x70 [ 15.674851] kasan_save_track+0x18/0x40 [ 15.675249] kasan_save_alloc_info+0x3b/0x50 [ 15.675699] __kasan_kmalloc+0xb7/0xc0 [ 15.676258] __kmalloc_cache_noprof+0x18a/0x420 [ 15.676689] kasan_atomics+0x96/0x310 [ 15.677119] kunit_try_run_case+0x1a6/0x480 [ 15.677440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.677924] kthread+0x324/0x6e0 [ 15.678302] ret_from_fork+0x41/0x80 [ 15.678696] ret_from_fork_asm+0x1a/0x30 [ 15.678973] [ 15.679062] The buggy address belongs to the object at ffff888101bf3e00 [ 15.679062] which belongs to the cache kmalloc-64 of size 64 [ 15.679412] The buggy address is located 0 bytes to the right of [ 15.679412] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.679974] [ 15.680108] The buggy address belongs to the physical page: [ 15.680375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.680838] flags: 0x200000000000000(node=0|zone=2) [ 15.681010] page_type: f5(slab) [ 15.681188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.681531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.681926] page dumped because: kasan: bad access detected [ 15.682152] [ 15.682254] Memory state around the buggy address: [ 15.682430] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.682890] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.683193] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.683431] ^ [ 15.683658] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.684154] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.684455] ================================================================== [ 15.133376] ================================================================== [ 15.133973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 15.134335] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.134679] [ 15.134859] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.134917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.134930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.134962] Call Trace: [ 15.134987] <TASK> [ 15.135011] dump_stack_lvl+0x73/0xb0 [ 15.135046] print_report+0xd1/0x650 [ 15.135079] ? __virt_addr_valid+0x1db/0x2d0 [ 15.135101] ? kasan_atomics_helper+0x4bbe/0x5450 [ 15.135121] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.135145] ? kasan_atomics_helper+0x4bbe/0x5450 [ 15.135165] kasan_report+0x140/0x180 [ 15.135187] ? kasan_atomics_helper+0x4bbe/0x5450 [ 15.135212] __asan_report_load4_noabort+0x18/0x20 [ 15.135235] kasan_atomics_helper+0x4bbe/0x5450 [ 15.135256] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.135278] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.135302] ? kasan_atomics+0x153/0x310 [ 15.135327] kasan_atomics+0x1dd/0x310 [ 15.135348] ? __pfx_kasan_atomics+0x10/0x10 [ 15.135371] ? __pfx_read_tsc+0x10/0x10 [ 15.135413] ? ktime_get_ts64+0x86/0x230 [ 15.135447] kunit_try_run_case+0x1a6/0x480 [ 15.135470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.135519] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.135542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.135565] ? __kthread_parkme+0x82/0x160 [ 15.135586] ? preempt_count_sub+0x50/0x80 [ 15.135610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.135631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.135657] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.135684] kthread+0x324/0x6e0 [ 15.135704] ? trace_preempt_on+0x20/0xc0 [ 15.135726] ? __pfx_kthread+0x10/0x10 [ 15.135748] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.135770] ? calculate_sigpending+0x7b/0xa0 [ 15.135791] ? __pfx_kthread+0x10/0x10 [ 15.135813] ret_from_fork+0x41/0x80 [ 15.135831] ? __pfx_kthread+0x10/0x10 [ 15.135853] ret_from_fork_asm+0x1a/0x30 [ 15.135884] </TASK> [ 15.135894] [ 15.147113] Allocated by task 273: [ 15.147447] kasan_save_stack+0x45/0x70 [ 15.147830] kasan_save_track+0x18/0x40 [ 15.147979] kasan_save_alloc_info+0x3b/0x50 [ 15.148209] __kasan_kmalloc+0xb7/0xc0 [ 15.148403] __kmalloc_cache_noprof+0x18a/0x420 [ 15.148643] kasan_atomics+0x96/0x310 [ 15.149167] kunit_try_run_case+0x1a6/0x480 [ 15.149363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.149616] kthread+0x324/0x6e0 [ 15.150062] ret_from_fork+0x41/0x80 [ 15.150350] ret_from_fork_asm+0x1a/0x30 [ 15.150511] [ 15.150701] The buggy address belongs to the object at ffff888101bf3e00 [ 15.150701] which belongs to the cache kmalloc-64 of size 64 [ 15.151489] The buggy address is located 0 bytes to the right of [ 15.151489] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.152336] [ 15.152441] The buggy address belongs to the physical page: [ 15.152869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.153522] flags: 0x200000000000000(node=0|zone=2) [ 15.153892] page_type: f5(slab) [ 15.154226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.154805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.155198] page dumped because: kasan: bad access detected [ 15.155541] [ 15.155675] Memory state around the buggy address: [ 15.156064] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.156551] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.156957] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.157579] ^ [ 15.157977] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.158397] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.158929] ================================================================== [ 15.325560] ================================================================== [ 15.326220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 15.326962] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.327198] [ 15.327278] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.327317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.327329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.327350] Call Trace: [ 15.327365] <TASK> [ 15.327381] dump_stack_lvl+0x73/0xb0 [ 15.327406] print_report+0xd1/0x650 [ 15.327428] ? __virt_addr_valid+0x1db/0x2d0 [ 15.327451] ? kasan_atomics_helper+0x4b3c/0x5450 [ 15.327472] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.327499] ? kasan_atomics_helper+0x4b3c/0x5450 [ 15.327520] kasan_report+0x140/0x180 [ 15.327543] ? kasan_atomics_helper+0x4b3c/0x5450 [ 15.327570] __asan_report_store4_noabort+0x1b/0x30 [ 15.327594] kasan_atomics_helper+0x4b3c/0x5450 [ 15.327617] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.327640] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.327666] ? kasan_atomics+0x153/0x310 [ 15.327692] kasan_atomics+0x1dd/0x310 [ 15.327715] ? __pfx_kasan_atomics+0x10/0x10 [ 15.327739] ? __pfx_read_tsc+0x10/0x10 [ 15.327762] ? ktime_get_ts64+0x86/0x230 [ 15.327787] kunit_try_run_case+0x1a6/0x480 [ 15.327811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.327834] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.327859] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.327884] ? __kthread_parkme+0x82/0x160 [ 15.327907] ? preempt_count_sub+0x50/0x80 [ 15.327933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.327957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.327984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.328011] kthread+0x324/0x6e0 [ 15.328044] ? trace_preempt_on+0x20/0xc0 [ 15.328069] ? __pfx_kthread+0x10/0x10 [ 15.328093] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.328116] ? calculate_sigpending+0x7b/0xa0 [ 15.328138] ? __pfx_kthread+0x10/0x10 [ 15.328162] ret_from_fork+0x41/0x80 [ 15.328182] ? __pfx_kthread+0x10/0x10 [ 15.328205] ret_from_fork_asm+0x1a/0x30 [ 15.328237] </TASK> [ 15.328247] [ 15.335747] Allocated by task 273: [ 15.335904] kasan_save_stack+0x45/0x70 [ 15.336115] kasan_save_track+0x18/0x40 [ 15.336288] kasan_save_alloc_info+0x3b/0x50 [ 15.336543] __kasan_kmalloc+0xb7/0xc0 [ 15.336764] __kmalloc_cache_noprof+0x18a/0x420 [ 15.336966] kasan_atomics+0x96/0x310 [ 15.337161] kunit_try_run_case+0x1a6/0x480 [ 15.337363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.337541] kthread+0x324/0x6e0 [ 15.337663] ret_from_fork+0x41/0x80 [ 15.337800] ret_from_fork_asm+0x1a/0x30 [ 15.338050] [ 15.338143] The buggy address belongs to the object at ffff888101bf3e00 [ 15.338143] which belongs to the cache kmalloc-64 of size 64 [ 15.338770] The buggy address is located 0 bytes to the right of [ 15.338770] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.339179] [ 15.339305] The buggy address belongs to the physical page: [ 15.339565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.340033] flags: 0x200000000000000(node=0|zone=2) [ 15.340312] page_type: f5(slab) [ 15.340473] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.340830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.341110] page dumped because: kasan: bad access detected [ 15.341363] [ 15.341435] Memory state around the buggy address: [ 15.341706] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.342040] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.342335] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.342545] ^ [ 15.342782] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.343151] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.343499] ================================================================== [ 15.703619] ================================================================== [ 15.704225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 15.704455] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.705042] [ 15.705153] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.705191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.705204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.705225] Call Trace: [ 15.705239] <TASK> [ 15.705253] dump_stack_lvl+0x73/0xb0 [ 15.705277] print_report+0xd1/0x650 [ 15.705298] ? __virt_addr_valid+0x1db/0x2d0 [ 15.705320] ? kasan_atomics_helper+0xf11/0x5450 [ 15.705343] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.705370] ? kasan_atomics_helper+0xf11/0x5450 [ 15.705391] kasan_report+0x140/0x180 [ 15.705414] ? kasan_atomics_helper+0xf11/0x5450 [ 15.705439] kasan_check_range+0x10c/0x1c0 [ 15.705463] __kasan_check_write+0x18/0x20 [ 15.705486] kasan_atomics_helper+0xf11/0x5450 [ 15.705509] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.705531] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.705558] ? kasan_atomics+0x153/0x310 [ 15.705584] kasan_atomics+0x1dd/0x310 [ 15.705606] ? __pfx_kasan_atomics+0x10/0x10 [ 15.705631] ? __pfx_read_tsc+0x10/0x10 [ 15.705652] ? ktime_get_ts64+0x86/0x230 [ 15.705677] kunit_try_run_case+0x1a6/0x480 [ 15.705700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.705722] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.705752] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.705777] ? __kthread_parkme+0x82/0x160 [ 15.705799] ? preempt_count_sub+0x50/0x80 [ 15.705824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.705847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.705873] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.705900] kthread+0x324/0x6e0 [ 15.705922] ? trace_preempt_on+0x20/0xc0 [ 15.705945] ? __pfx_kthread+0x10/0x10 [ 15.705968] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.705991] ? calculate_sigpending+0x7b/0xa0 [ 15.706024] ? __pfx_kthread+0x10/0x10 [ 15.706048] ret_from_fork+0x41/0x80 [ 15.706066] ? __pfx_kthread+0x10/0x10 [ 15.706089] ret_from_fork_asm+0x1a/0x30 [ 15.706121] </TASK> [ 15.706133] [ 15.714112] Allocated by task 273: [ 15.714278] kasan_save_stack+0x45/0x70 [ 15.714460] kasan_save_track+0x18/0x40 [ 15.714733] kasan_save_alloc_info+0x3b/0x50 [ 15.714943] __kasan_kmalloc+0xb7/0xc0 [ 15.715112] __kmalloc_cache_noprof+0x18a/0x420 [ 15.715306] kasan_atomics+0x96/0x310 [ 15.715437] kunit_try_run_case+0x1a6/0x480 [ 15.715579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.715752] kthread+0x324/0x6e0 [ 15.716049] ret_from_fork+0x41/0x80 [ 15.716242] ret_from_fork_asm+0x1a/0x30 [ 15.716443] [ 15.716541] The buggy address belongs to the object at ffff888101bf3e00 [ 15.716541] which belongs to the cache kmalloc-64 of size 64 [ 15.716976] The buggy address is located 0 bytes to the right of [ 15.716976] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.717343] [ 15.717416] The buggy address belongs to the physical page: [ 15.718141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.718512] flags: 0x200000000000000(node=0|zone=2) [ 15.719008] page_type: f5(slab) [ 15.719189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.719484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.719769] page dumped because: kasan: bad access detected [ 15.719941] [ 15.720012] Memory state around the buggy address: [ 15.720176] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.720444] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.720758] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.721090] ^ [ 15.721473] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.721880] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.722337] ================================================================== [ 15.818414] ================================================================== [ 15.818648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 15.819723] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.819988] [ 15.820228] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.820273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.820288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.820386] Call Trace: [ 15.820463] <TASK> [ 15.820480] dump_stack_lvl+0x73/0xb0 [ 15.820508] print_report+0xd1/0x650 [ 15.820530] ? __virt_addr_valid+0x1db/0x2d0 [ 15.820555] ? kasan_atomics_helper+0x1149/0x5450 [ 15.820576] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.820603] ? kasan_atomics_helper+0x1149/0x5450 [ 15.820625] kasan_report+0x140/0x180 [ 15.820647] ? kasan_atomics_helper+0x1149/0x5450 [ 15.820674] kasan_check_range+0x10c/0x1c0 [ 15.820697] __kasan_check_write+0x18/0x20 [ 15.820720] kasan_atomics_helper+0x1149/0x5450 [ 15.820743] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.820765] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.820791] ? kasan_atomics+0x153/0x310 [ 15.820817] kasan_atomics+0x1dd/0x310 [ 15.820839] ? __pfx_kasan_atomics+0x10/0x10 [ 15.820864] ? __pfx_read_tsc+0x10/0x10 [ 15.820887] ? ktime_get_ts64+0x86/0x230 [ 15.820912] kunit_try_run_case+0x1a6/0x480 [ 15.820936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.820958] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.820983] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.821007] ? __kthread_parkme+0x82/0x160 [ 15.821042] ? preempt_count_sub+0x50/0x80 [ 15.821067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.821091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.821117] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.821144] kthread+0x324/0x6e0 [ 15.821166] ? trace_preempt_on+0x20/0xc0 [ 15.821189] ? __pfx_kthread+0x10/0x10 [ 15.821212] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.821235] ? calculate_sigpending+0x7b/0xa0 [ 15.821257] ? __pfx_kthread+0x10/0x10 [ 15.821280] ret_from_fork+0x41/0x80 [ 15.821300] ? __pfx_kthread+0x10/0x10 [ 15.821323] ret_from_fork_asm+0x1a/0x30 [ 15.821355] </TASK> [ 15.821365] [ 15.831626] Allocated by task 273: [ 15.832436] kasan_save_stack+0x45/0x70 [ 15.832590] kasan_save_track+0x18/0x40 [ 15.832946] kasan_save_alloc_info+0x3b/0x50 [ 15.833236] __kasan_kmalloc+0xb7/0xc0 [ 15.833392] __kmalloc_cache_noprof+0x18a/0x420 [ 15.833610] kasan_atomics+0x96/0x310 [ 15.833908] kunit_try_run_case+0x1a6/0x480 [ 15.834128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.834366] kthread+0x324/0x6e0 [ 15.834522] ret_from_fork+0x41/0x80 [ 15.834713] ret_from_fork_asm+0x1a/0x30 [ 15.835284] [ 15.835365] The buggy address belongs to the object at ffff888101bf3e00 [ 15.835365] which belongs to the cache kmalloc-64 of size 64 [ 15.836107] The buggy address is located 0 bytes to the right of [ 15.836107] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.836612] [ 15.836686] The buggy address belongs to the physical page: [ 15.837106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.837451] flags: 0x200000000000000(node=0|zone=2) [ 15.838009] page_type: f5(slab) [ 15.838170] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.838623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.839088] page dumped because: kasan: bad access detected [ 15.839308] [ 15.839408] Memory state around the buggy address: [ 15.839860] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.840125] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.840439] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.841001] ^ [ 15.841225] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.841743] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.842211] ================================================================== [ 15.864541] ================================================================== [ 15.864876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 15.865186] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.865480] [ 15.865575] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.865613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.865626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.865652] Call Trace: [ 15.865669] <TASK> [ 15.865684] dump_stack_lvl+0x73/0xb0 [ 15.865708] print_report+0xd1/0x650 [ 15.865730] ? __virt_addr_valid+0x1db/0x2d0 [ 15.865759] ? kasan_atomics_helper+0x1218/0x5450 [ 15.865781] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.865808] ? kasan_atomics_helper+0x1218/0x5450 [ 15.865830] kasan_report+0x140/0x180 [ 15.865852] ? kasan_atomics_helper+0x1218/0x5450 [ 15.865878] kasan_check_range+0x10c/0x1c0 [ 15.865902] __kasan_check_write+0x18/0x20 [ 15.865925] kasan_atomics_helper+0x1218/0x5450 [ 15.865948] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.865970] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.865995] ? kasan_atomics+0x153/0x310 [ 15.866031] kasan_atomics+0x1dd/0x310 [ 15.866054] ? __pfx_kasan_atomics+0x10/0x10 [ 15.866078] ? __pfx_read_tsc+0x10/0x10 [ 15.866100] ? ktime_get_ts64+0x86/0x230 [ 15.866126] kunit_try_run_case+0x1a6/0x480 [ 15.866150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.866173] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.866197] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.866222] ? __kthread_parkme+0x82/0x160 [ 15.866245] ? preempt_count_sub+0x50/0x80 [ 15.866270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.866293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.866320] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.866347] kthread+0x324/0x6e0 [ 15.866369] ? trace_preempt_on+0x20/0xc0 [ 15.866392] ? __pfx_kthread+0x10/0x10 [ 15.866416] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.866438] ? calculate_sigpending+0x7b/0xa0 [ 15.866460] ? __pfx_kthread+0x10/0x10 [ 15.866483] ret_from_fork+0x41/0x80 [ 15.866502] ? __pfx_kthread+0x10/0x10 [ 15.866525] ret_from_fork_asm+0x1a/0x30 [ 15.866557] </TASK> [ 15.866567] [ 15.874528] Allocated by task 273: [ 15.874717] kasan_save_stack+0x45/0x70 [ 15.874925] kasan_save_track+0x18/0x40 [ 15.875324] kasan_save_alloc_info+0x3b/0x50 [ 15.875522] __kasan_kmalloc+0xb7/0xc0 [ 15.875805] __kmalloc_cache_noprof+0x18a/0x420 [ 15.875969] kasan_atomics+0x96/0x310 [ 15.876118] kunit_try_run_case+0x1a6/0x480 [ 15.876333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.876586] kthread+0x324/0x6e0 [ 15.876779] ret_from_fork+0x41/0x80 [ 15.876946] ret_from_fork_asm+0x1a/0x30 [ 15.877152] [ 15.877238] The buggy address belongs to the object at ffff888101bf3e00 [ 15.877238] which belongs to the cache kmalloc-64 of size 64 [ 15.877949] The buggy address is located 0 bytes to the right of [ 15.877949] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.878440] [ 15.878537] The buggy address belongs to the physical page: [ 15.878937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.879199] flags: 0x200000000000000(node=0|zone=2) [ 15.879371] page_type: f5(slab) [ 15.879542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.880111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.880446] page dumped because: kasan: bad access detected [ 15.880885] [ 15.880984] Memory state around the buggy address: [ 15.881178] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.881395] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.881842] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.882143] ^ [ 15.882351] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.882594] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.882908] ================================================================== [ 15.958344] ================================================================== [ 15.958569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 15.958793] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.959452] [ 15.959555] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.959591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.959604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.959626] Call Trace: [ 15.959639] <TASK> [ 15.959653] dump_stack_lvl+0x73/0xb0 [ 15.959690] print_report+0xd1/0x650 [ 15.959712] ? __virt_addr_valid+0x1db/0x2d0 [ 15.959734] ? kasan_atomics_helper+0x4eb0/0x5450 [ 15.959755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.959783] ? kasan_atomics_helper+0x4eb0/0x5450 [ 15.959805] kasan_report+0x140/0x180 [ 15.959828] ? kasan_atomics_helper+0x4eb0/0x5450 [ 15.959854] __asan_report_load8_noabort+0x18/0x20 [ 15.959878] kasan_atomics_helper+0x4eb0/0x5450 [ 15.959901] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.959923] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.959947] ? kasan_atomics+0x153/0x310 [ 15.959974] kasan_atomics+0x1dd/0x310 [ 15.959996] ? __pfx_kasan_atomics+0x10/0x10 [ 15.960030] ? __pfx_read_tsc+0x10/0x10 [ 15.960051] ? ktime_get_ts64+0x86/0x230 [ 15.960077] kunit_try_run_case+0x1a6/0x480 [ 15.960101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.960122] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.960146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.960171] ? __kthread_parkme+0x82/0x160 [ 15.960192] ? preempt_count_sub+0x50/0x80 [ 15.960218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.960241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.960269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.960296] kthread+0x324/0x6e0 [ 15.960317] ? trace_preempt_on+0x20/0xc0 [ 15.960341] ? __pfx_kthread+0x10/0x10 [ 15.960364] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.960386] ? calculate_sigpending+0x7b/0xa0 [ 15.960409] ? __pfx_kthread+0x10/0x10 [ 15.960431] ret_from_fork+0x41/0x80 [ 15.960451] ? __pfx_kthread+0x10/0x10 [ 15.960473] ret_from_fork_asm+0x1a/0x30 [ 15.960505] </TASK> [ 15.960516] [ 15.969211] Allocated by task 273: [ 15.969398] kasan_save_stack+0x45/0x70 [ 15.969884] kasan_save_track+0x18/0x40 [ 15.970160] kasan_save_alloc_info+0x3b/0x50 [ 15.970558] __kasan_kmalloc+0xb7/0xc0 [ 15.970907] __kmalloc_cache_noprof+0x18a/0x420 [ 15.971110] kasan_atomics+0x96/0x310 [ 15.971247] kunit_try_run_case+0x1a6/0x480 [ 15.971396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.971835] kthread+0x324/0x6e0 [ 15.972295] ret_from_fork+0x41/0x80 [ 15.972617] ret_from_fork_asm+0x1a/0x30 [ 15.973010] [ 15.973242] The buggy address belongs to the object at ffff888101bf3e00 [ 15.973242] which belongs to the cache kmalloc-64 of size 64 [ 15.974224] The buggy address is located 0 bytes to the right of [ 15.974224] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.975497] [ 15.975771] The buggy address belongs to the physical page: [ 15.975997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.976327] flags: 0x200000000000000(node=0|zone=2) [ 15.976544] page_type: f5(slab) [ 15.977029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.977470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.977936] page dumped because: kasan: bad access detected [ 15.978357] [ 15.978454] Memory state around the buggy address: [ 15.978835] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.979317] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.979833] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.980302] ^ [ 15.980777] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.981080] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.981363] ================================================================== [ 15.684948] ================================================================== [ 15.685310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 15.685567] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.685896] [ 15.685979] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.686026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.686039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.686061] Call Trace: [ 15.686079] <TASK> [ 15.686096] dump_stack_lvl+0x73/0xb0 [ 15.686208] print_report+0xd1/0x650 [ 15.686232] ? __virt_addr_valid+0x1db/0x2d0 [ 15.686256] ? kasan_atomics_helper+0xe79/0x5450 [ 15.686278] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.686304] ? kasan_atomics_helper+0xe79/0x5450 [ 15.686326] kasan_report+0x140/0x180 [ 15.686348] ? kasan_atomics_helper+0xe79/0x5450 [ 15.686374] kasan_check_range+0x10c/0x1c0 [ 15.686398] __kasan_check_write+0x18/0x20 [ 15.686421] kasan_atomics_helper+0xe79/0x5450 [ 15.686444] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.686466] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.686491] ? kasan_atomics+0x153/0x310 [ 15.686516] kasan_atomics+0x1dd/0x310 [ 15.686541] ? __pfx_kasan_atomics+0x10/0x10 [ 15.686565] ? __pfx_read_tsc+0x10/0x10 [ 15.686587] ? ktime_get_ts64+0x86/0x230 [ 15.686613] kunit_try_run_case+0x1a6/0x480 [ 15.686636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.686658] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.686682] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.686708] ? __kthread_parkme+0x82/0x160 [ 15.686731] ? preempt_count_sub+0x50/0x80 [ 15.686757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.686780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.686806] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.686834] kthread+0x324/0x6e0 [ 15.686855] ? trace_preempt_on+0x20/0xc0 [ 15.686879] ? __pfx_kthread+0x10/0x10 [ 15.686902] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.686925] ? calculate_sigpending+0x7b/0xa0 [ 15.686948] ? __pfx_kthread+0x10/0x10 [ 15.686971] ret_from_fork+0x41/0x80 [ 15.686990] ? __pfx_kthread+0x10/0x10 [ 15.687026] ret_from_fork_asm+0x1a/0x30 [ 15.687059] </TASK> [ 15.687070] [ 15.694813] Allocated by task 273: [ 15.694995] kasan_save_stack+0x45/0x70 [ 15.695216] kasan_save_track+0x18/0x40 [ 15.695408] kasan_save_alloc_info+0x3b/0x50 [ 15.695626] __kasan_kmalloc+0xb7/0xc0 [ 15.695819] __kmalloc_cache_noprof+0x18a/0x420 [ 15.696314] kasan_atomics+0x96/0x310 [ 15.696519] kunit_try_run_case+0x1a6/0x480 [ 15.696671] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.696850] kthread+0x324/0x6e0 [ 15.697091] ret_from_fork+0x41/0x80 [ 15.697282] ret_from_fork_asm+0x1a/0x30 [ 15.697481] [ 15.697577] The buggy address belongs to the object at ffff888101bf3e00 [ 15.697577] which belongs to the cache kmalloc-64 of size 64 [ 15.698156] The buggy address is located 0 bytes to the right of [ 15.698156] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.698553] [ 15.698656] The buggy address belongs to the physical page: [ 15.698913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.699374] flags: 0x200000000000000(node=0|zone=2) [ 15.699773] page_type: f5(slab) [ 15.699937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.700247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.700659] page dumped because: kasan: bad access detected [ 15.700882] [ 15.700981] Memory state around the buggy address: [ 15.701151] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.701430] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.701747] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.702366] ^ [ 15.702630] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.702926] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.703194] ================================================================== [ 16.138933] ================================================================== [ 16.139994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 16.140445] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.140869] [ 16.141074] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.141126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.141139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.141160] Call Trace: [ 16.141177] <TASK> [ 16.141213] dump_stack_lvl+0x73/0xb0 [ 16.141239] print_report+0xd1/0x650 [ 16.141260] ? __virt_addr_valid+0x1db/0x2d0 [ 16.141293] ? kasan_atomics_helper+0x1780/0x5450 [ 16.141315] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.141340] ? kasan_atomics_helper+0x1780/0x5450 [ 16.141362] kasan_report+0x140/0x180 [ 16.141384] ? kasan_atomics_helper+0x1780/0x5450 [ 16.141411] kasan_check_range+0x10c/0x1c0 [ 16.141433] __kasan_check_write+0x18/0x20 [ 16.141457] kasan_atomics_helper+0x1780/0x5450 [ 16.141479] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.141501] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.141526] ? kasan_atomics+0x153/0x310 [ 16.141551] kasan_atomics+0x1dd/0x310 [ 16.141574] ? __pfx_kasan_atomics+0x10/0x10 [ 16.141598] ? __pfx_read_tsc+0x10/0x10 [ 16.141620] ? ktime_get_ts64+0x86/0x230 [ 16.141645] kunit_try_run_case+0x1a6/0x480 [ 16.141669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.141690] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.141715] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.141746] ? __kthread_parkme+0x82/0x160 [ 16.141767] ? preempt_count_sub+0x50/0x80 [ 16.141793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.141817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.141843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.141871] kthread+0x324/0x6e0 [ 16.141892] ? trace_preempt_on+0x20/0xc0 [ 16.141916] ? __pfx_kthread+0x10/0x10 [ 16.141939] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.141962] ? calculate_sigpending+0x7b/0xa0 [ 16.141986] ? __pfx_kthread+0x10/0x10 [ 16.142009] ret_from_fork+0x41/0x80 [ 16.142038] ? __pfx_kthread+0x10/0x10 [ 16.142061] ret_from_fork_asm+0x1a/0x30 [ 16.142093] </TASK> [ 16.142103] [ 16.155034] Allocated by task 273: [ 16.155167] kasan_save_stack+0x45/0x70 [ 16.155312] kasan_save_track+0x18/0x40 [ 16.155445] kasan_save_alloc_info+0x3b/0x50 [ 16.155680] __kasan_kmalloc+0xb7/0xc0 [ 16.156034] __kmalloc_cache_noprof+0x18a/0x420 [ 16.156454] kasan_atomics+0x96/0x310 [ 16.156883] kunit_try_run_case+0x1a6/0x480 [ 16.157328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.157984] kthread+0x324/0x6e0 [ 16.158328] ret_from_fork+0x41/0x80 [ 16.158671] ret_from_fork_asm+0x1a/0x30 [ 16.159087] [ 16.159249] The buggy address belongs to the object at ffff888101bf3e00 [ 16.159249] which belongs to the cache kmalloc-64 of size 64 [ 16.160349] The buggy address is located 0 bytes to the right of [ 16.160349] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.160969] [ 16.161139] The buggy address belongs to the physical page: [ 16.161519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.162148] flags: 0x200000000000000(node=0|zone=2) [ 16.162314] page_type: f5(slab) [ 16.162436] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.162916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.163585] page dumped because: kasan: bad access detected [ 16.164132] [ 16.164314] Memory state around the buggy address: [ 16.164874] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.165350] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.165581] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.165976] ^ [ 16.166142] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.166356] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.166578] ================================================================== [ 15.344083] ================================================================== [ 15.344355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 15.344584] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.344813] [ 15.344893] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.344932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.344946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.344968] Call Trace: [ 15.344985] <TASK> [ 15.345002] dump_stack_lvl+0x73/0xb0 [ 15.345038] print_report+0xd1/0x650 [ 15.345060] ? __virt_addr_valid+0x1db/0x2d0 [ 15.345083] ? kasan_atomics_helper+0x566/0x5450 [ 15.345105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.345131] ? kasan_atomics_helper+0x566/0x5450 [ 15.345168] kasan_report+0x140/0x180 [ 15.345191] ? kasan_atomics_helper+0x566/0x5450 [ 15.345217] kasan_check_range+0x10c/0x1c0 [ 15.345240] __kasan_check_write+0x18/0x20 [ 15.345264] kasan_atomics_helper+0x566/0x5450 [ 15.345286] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.345309] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.345334] ? kasan_atomics+0x153/0x310 [ 15.345359] kasan_atomics+0x1dd/0x310 [ 15.345382] ? __pfx_kasan_atomics+0x10/0x10 [ 15.345406] ? __pfx_read_tsc+0x10/0x10 [ 15.345429] ? ktime_get_ts64+0x86/0x230 [ 15.345454] kunit_try_run_case+0x1a6/0x480 [ 15.345478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.345501] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.345525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.345550] ? __kthread_parkme+0x82/0x160 [ 15.345573] ? preempt_count_sub+0x50/0x80 [ 15.345598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.345622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.345649] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.345676] kthread+0x324/0x6e0 [ 15.345698] ? trace_preempt_on+0x20/0xc0 [ 15.345721] ? __pfx_kthread+0x10/0x10 [ 15.345751] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.345774] ? calculate_sigpending+0x7b/0xa0 [ 15.345797] ? __pfx_kthread+0x10/0x10 [ 15.345820] ret_from_fork+0x41/0x80 [ 15.345840] ? __pfx_kthread+0x10/0x10 [ 15.345863] ret_from_fork_asm+0x1a/0x30 [ 15.345895] </TASK> [ 15.345906] [ 15.358896] Allocated by task 273: [ 15.359297] kasan_save_stack+0x45/0x70 [ 15.359510] kasan_save_track+0x18/0x40 [ 15.360104] kasan_save_alloc_info+0x3b/0x50 [ 15.360399] __kasan_kmalloc+0xb7/0xc0 [ 15.360812] __kmalloc_cache_noprof+0x18a/0x420 [ 15.360972] kasan_atomics+0x96/0x310 [ 15.361117] kunit_try_run_case+0x1a6/0x480 [ 15.361259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.361431] kthread+0x324/0x6e0 [ 15.361576] ret_from_fork+0x41/0x80 [ 15.362172] ret_from_fork_asm+0x1a/0x30 [ 15.362665] [ 15.362841] The buggy address belongs to the object at ffff888101bf3e00 [ 15.362841] which belongs to the cache kmalloc-64 of size 64 [ 15.364082] The buggy address is located 0 bytes to the right of [ 15.364082] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.365318] [ 15.365486] The buggy address belongs to the physical page: [ 15.366118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.366844] flags: 0x200000000000000(node=0|zone=2) [ 15.367011] page_type: f5(slab) [ 15.367146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.367372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.367727] page dumped because: kasan: bad access detected [ 15.368271] [ 15.368435] Memory state around the buggy address: [ 15.368996] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.369869] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.370551] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.371250] ^ [ 15.371771] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.372333] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.372557] ================================================================== [ 16.453895] ================================================================== [ 16.454594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 16.455324] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.456137] [ 16.456339] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.456379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.456391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.456415] Call Trace: [ 16.456432] <TASK> [ 16.456449] dump_stack_lvl+0x73/0xb0 [ 16.456474] print_report+0xd1/0x650 [ 16.456496] ? __virt_addr_valid+0x1db/0x2d0 [ 16.456518] ? kasan_atomics_helper+0x4f73/0x5450 [ 16.456539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.456565] ? kasan_atomics_helper+0x4f73/0x5450 [ 16.456587] kasan_report+0x140/0x180 [ 16.456610] ? kasan_atomics_helper+0x4f73/0x5450 [ 16.456636] __asan_report_load8_noabort+0x18/0x20 [ 16.456661] kasan_atomics_helper+0x4f73/0x5450 [ 16.456684] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.456705] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.456730] ? kasan_atomics+0x153/0x310 [ 16.456756] kasan_atomics+0x1dd/0x310 [ 16.456779] ? __pfx_kasan_atomics+0x10/0x10 [ 16.456803] ? __pfx_read_tsc+0x10/0x10 [ 16.456825] ? ktime_get_ts64+0x86/0x230 [ 16.456851] kunit_try_run_case+0x1a6/0x480 [ 16.456875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.456897] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.456921] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.456946] ? __kthread_parkme+0x82/0x160 [ 16.456969] ? preempt_count_sub+0x50/0x80 [ 16.456994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.457032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.457070] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.457097] kthread+0x324/0x6e0 [ 16.457125] ? trace_preempt_on+0x20/0xc0 [ 16.457149] ? __pfx_kthread+0x10/0x10 [ 16.457172] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.457195] ? calculate_sigpending+0x7b/0xa0 [ 16.457218] ? __pfx_kthread+0x10/0x10 [ 16.457242] ret_from_fork+0x41/0x80 [ 16.457261] ? __pfx_kthread+0x10/0x10 [ 16.457284] ret_from_fork_asm+0x1a/0x30 [ 16.457316] </TASK> [ 16.457327] [ 16.468153] Allocated by task 273: [ 16.468344] kasan_save_stack+0x45/0x70 [ 16.468565] kasan_save_track+0x18/0x40 [ 16.468854] kasan_save_alloc_info+0x3b/0x50 [ 16.469024] __kasan_kmalloc+0xb7/0xc0 [ 16.469160] __kmalloc_cache_noprof+0x18a/0x420 [ 16.469387] kasan_atomics+0x96/0x310 [ 16.469573] kunit_try_run_case+0x1a6/0x480 [ 16.469783] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.470546] kthread+0x324/0x6e0 [ 16.470969] ret_from_fork+0x41/0x80 [ 16.471279] ret_from_fork_asm+0x1a/0x30 [ 16.471754] [ 16.471990] The buggy address belongs to the object at ffff888101bf3e00 [ 16.471990] which belongs to the cache kmalloc-64 of size 64 [ 16.472509] The buggy address is located 0 bytes to the right of [ 16.472509] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.473524] [ 16.473792] The buggy address belongs to the physical page: [ 16.474235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.474859] flags: 0x200000000000000(node=0|zone=2) [ 16.475235] page_type: f5(slab) [ 16.475675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.476214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.476884] page dumped because: kasan: bad access detected [ 16.477279] [ 16.477373] Memory state around the buggy address: [ 16.477790] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.478251] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.478541] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.478821] ^ [ 16.479036] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.479255] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.479586] ================================================================== [ 16.517228] ================================================================== [ 16.517582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 16.517921] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.518247] [ 16.518353] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.518392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.518405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.518436] Call Trace: [ 16.518451] <TASK> [ 16.518467] dump_stack_lvl+0x73/0xb0 [ 16.518491] print_report+0xd1/0x650 [ 16.518525] ? __virt_addr_valid+0x1db/0x2d0 [ 16.518546] ? kasan_atomics_helper+0x20c9/0x5450 [ 16.518568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.518594] ? kasan_atomics_helper+0x20c9/0x5450 [ 16.518616] kasan_report+0x140/0x180 [ 16.518647] ? kasan_atomics_helper+0x20c9/0x5450 [ 16.518673] kasan_check_range+0x10c/0x1c0 [ 16.518696] __kasan_check_write+0x18/0x20 [ 16.518731] kasan_atomics_helper+0x20c9/0x5450 [ 16.518754] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.518776] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.518810] ? kasan_atomics+0x153/0x310 [ 16.518835] kasan_atomics+0x1dd/0x310 [ 16.518857] ? __pfx_kasan_atomics+0x10/0x10 [ 16.518892] ? __pfx_read_tsc+0x10/0x10 [ 16.518915] ? ktime_get_ts64+0x86/0x230 [ 16.518940] kunit_try_run_case+0x1a6/0x480 [ 16.518971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.518993] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.519414] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.519454] ? __kthread_parkme+0x82/0x160 [ 16.519478] ? preempt_count_sub+0x50/0x80 [ 16.519504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.519528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.519558] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.519586] kthread+0x324/0x6e0 [ 16.519621] ? trace_preempt_on+0x20/0xc0 [ 16.519645] ? __pfx_kthread+0x10/0x10 [ 16.519668] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.520070] ? calculate_sigpending+0x7b/0xa0 [ 16.520098] ? __pfx_kthread+0x10/0x10 [ 16.520135] ret_from_fork+0x41/0x80 [ 16.520156] ? __pfx_kthread+0x10/0x10 [ 16.520179] ret_from_fork_asm+0x1a/0x30 [ 16.521605] </TASK> [ 16.521623] [ 16.535278] Allocated by task 273: [ 16.535525] kasan_save_stack+0x45/0x70 [ 16.535961] kasan_save_track+0x18/0x40 [ 16.536396] kasan_save_alloc_info+0x3b/0x50 [ 16.536792] __kasan_kmalloc+0xb7/0xc0 [ 16.536928] __kmalloc_cache_noprof+0x18a/0x420 [ 16.537097] kasan_atomics+0x96/0x310 [ 16.537233] kunit_try_run_case+0x1a6/0x480 [ 16.537379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.537556] kthread+0x324/0x6e0 [ 16.537716] ret_from_fork+0x41/0x80 [ 16.537884] ret_from_fork_asm+0x1a/0x30 [ 16.538091] [ 16.538189] The buggy address belongs to the object at ffff888101bf3e00 [ 16.538189] which belongs to the cache kmalloc-64 of size 64 [ 16.538659] The buggy address is located 0 bytes to the right of [ 16.538659] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.539282] [ 16.539359] The buggy address belongs to the physical page: [ 16.539530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.539907] flags: 0x200000000000000(node=0|zone=2) [ 16.540269] page_type: f5(slab) [ 16.540482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.540893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.541263] page dumped because: kasan: bad access detected [ 16.541486] [ 16.541600] Memory state around the buggy address: [ 16.541796] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.542050] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.542418] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.542744] ^ [ 16.543078] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.543356] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.543731] ================================================================== [ 15.842685] ================================================================== [ 15.842936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 15.843247] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.843556] [ 15.843720] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.843775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.843788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.843809] Call Trace: [ 15.843825] <TASK> [ 15.843842] dump_stack_lvl+0x73/0xb0 [ 15.843867] print_report+0xd1/0x650 [ 15.843890] ? __virt_addr_valid+0x1db/0x2d0 [ 15.843912] ? kasan_atomics_helper+0x4a04/0x5450 [ 15.843933] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.843960] ? kasan_atomics_helper+0x4a04/0x5450 [ 15.843982] kasan_report+0x140/0x180 [ 15.844004] ? kasan_atomics_helper+0x4a04/0x5450 [ 15.844039] __asan_report_load4_noabort+0x18/0x20 [ 15.844064] kasan_atomics_helper+0x4a04/0x5450 [ 15.844087] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.844109] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.844134] ? kasan_atomics+0x153/0x310 [ 15.844160] kasan_atomics+0x1dd/0x310 [ 15.844183] ? __pfx_kasan_atomics+0x10/0x10 [ 15.844207] ? __pfx_read_tsc+0x10/0x10 [ 15.844229] ? ktime_get_ts64+0x86/0x230 [ 15.844254] kunit_try_run_case+0x1a6/0x480 [ 15.844278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.844300] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.844324] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.844349] ? __kthread_parkme+0x82/0x160 [ 15.844370] ? preempt_count_sub+0x50/0x80 [ 15.844395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.844420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.844446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.844473] kthread+0x324/0x6e0 [ 15.844494] ? trace_preempt_on+0x20/0xc0 [ 15.844518] ? __pfx_kthread+0x10/0x10 [ 15.844540] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.844564] ? calculate_sigpending+0x7b/0xa0 [ 15.844586] ? __pfx_kthread+0x10/0x10 [ 15.844609] ret_from_fork+0x41/0x80 [ 15.844628] ? __pfx_kthread+0x10/0x10 [ 15.844651] ret_from_fork_asm+0x1a/0x30 [ 15.844683] </TASK> [ 15.844693] [ 15.854507] Allocated by task 273: [ 15.855190] kasan_save_stack+0x45/0x70 [ 15.855375] kasan_save_track+0x18/0x40 [ 15.855651] kasan_save_alloc_info+0x3b/0x50 [ 15.856069] __kasan_kmalloc+0xb7/0xc0 [ 15.856272] __kmalloc_cache_noprof+0x18a/0x420 [ 15.856482] kasan_atomics+0x96/0x310 [ 15.856946] kunit_try_run_case+0x1a6/0x480 [ 15.857218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.857536] kthread+0x324/0x6e0 [ 15.857831] ret_from_fork+0x41/0x80 [ 15.857979] ret_from_fork_asm+0x1a/0x30 [ 15.858204] [ 15.858306] The buggy address belongs to the object at ffff888101bf3e00 [ 15.858306] which belongs to the cache kmalloc-64 of size 64 [ 15.859058] The buggy address is located 0 bytes to the right of [ 15.859058] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.859536] [ 15.859619] The buggy address belongs to the physical page: [ 15.859959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.860305] flags: 0x200000000000000(node=0|zone=2) [ 15.860524] page_type: f5(slab) [ 15.860851] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.861159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.861414] page dumped because: kasan: bad access detected [ 15.861661] [ 15.861763] Memory state around the buggy address: [ 15.862008] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.862382] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.862653] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.863192] ^ [ 15.863434] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.863732] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.864088] ================================================================== [ 15.241299] ================================================================== [ 15.242031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 15.242364] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.242802] [ 15.242896] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.242938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.242951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.242973] Call Trace: [ 15.242987] <TASK> [ 15.243003] dump_stack_lvl+0x73/0xb0 [ 15.243041] print_report+0xd1/0x650 [ 15.243064] ? __virt_addr_valid+0x1db/0x2d0 [ 15.243086] ? kasan_atomics_helper+0x3e0/0x5450 [ 15.243108] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.243134] ? kasan_atomics_helper+0x3e0/0x5450 [ 15.243156] kasan_report+0x140/0x180 [ 15.243404] ? kasan_atomics_helper+0x3e0/0x5450 [ 15.243435] kasan_check_range+0x10c/0x1c0 [ 15.243460] __kasan_check_read+0x15/0x20 [ 15.243482] kasan_atomics_helper+0x3e0/0x5450 [ 15.243505] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.243527] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.243552] ? kasan_atomics+0x153/0x310 [ 15.243577] kasan_atomics+0x1dd/0x310 [ 15.243600] ? __pfx_kasan_atomics+0x10/0x10 [ 15.243624] ? __pfx_read_tsc+0x10/0x10 [ 15.243646] ? ktime_get_ts64+0x86/0x230 [ 15.243671] kunit_try_run_case+0x1a6/0x480 [ 15.243695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.243718] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.243741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.243767] ? __kthread_parkme+0x82/0x160 [ 15.243790] ? preempt_count_sub+0x50/0x80 [ 15.243815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.243838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.243865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.243892] kthread+0x324/0x6e0 [ 15.243915] ? trace_preempt_on+0x20/0xc0 [ 15.243938] ? __pfx_kthread+0x10/0x10 [ 15.243961] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.243985] ? calculate_sigpending+0x7b/0xa0 [ 15.244007] ? __pfx_kthread+0x10/0x10 [ 15.244041] ret_from_fork+0x41/0x80 [ 15.244061] ? __pfx_kthread+0x10/0x10 [ 15.244084] ret_from_fork_asm+0x1a/0x30 [ 15.244115] </TASK> [ 15.244127] [ 15.254717] Allocated by task 273: [ 15.254847] kasan_save_stack+0x45/0x70 [ 15.255251] kasan_save_track+0x18/0x40 [ 15.255443] kasan_save_alloc_info+0x3b/0x50 [ 15.255638] __kasan_kmalloc+0xb7/0xc0 [ 15.256003] __kmalloc_cache_noprof+0x18a/0x420 [ 15.256407] kasan_atomics+0x96/0x310 [ 15.256604] kunit_try_run_case+0x1a6/0x480 [ 15.256973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.257327] kthread+0x324/0x6e0 [ 15.257468] ret_from_fork+0x41/0x80 [ 15.257833] ret_from_fork_asm+0x1a/0x30 [ 15.258134] [ 15.258237] The buggy address belongs to the object at ffff888101bf3e00 [ 15.258237] which belongs to the cache kmalloc-64 of size 64 [ 15.258905] The buggy address is located 0 bytes to the right of [ 15.258905] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.259728] [ 15.259834] The buggy address belongs to the physical page: [ 15.260393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.260838] flags: 0x200000000000000(node=0|zone=2) [ 15.261155] page_type: f5(slab) [ 15.261337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.262034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.262465] page dumped because: kasan: bad access detected [ 15.262671] [ 15.262980] Memory state around the buggy address: [ 15.263508] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.264419] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.265088] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.265850] ^ [ 15.266134] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.266894] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.267121] ================================================================== [ 15.421951] ================================================================== [ 15.422281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 15.423002] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.423504] [ 15.423728] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.423776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.423885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.423909] Call Trace: [ 15.423926] <TASK> [ 15.423943] dump_stack_lvl+0x73/0xb0 [ 15.423971] print_report+0xd1/0x650 [ 15.423993] ? __virt_addr_valid+0x1db/0x2d0 [ 15.424030] ? kasan_atomics_helper+0x730/0x5450 [ 15.424052] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.424079] ? kasan_atomics_helper+0x730/0x5450 [ 15.424101] kasan_report+0x140/0x180 [ 15.424125] ? kasan_atomics_helper+0x730/0x5450 [ 15.424152] kasan_check_range+0x10c/0x1c0 [ 15.424176] __kasan_check_write+0x18/0x20 [ 15.424200] kasan_atomics_helper+0x730/0x5450 [ 15.424223] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.424246] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.424270] ? kasan_atomics+0x153/0x310 [ 15.424296] kasan_atomics+0x1dd/0x310 [ 15.424319] ? __pfx_kasan_atomics+0x10/0x10 [ 15.424343] ? __pfx_read_tsc+0x10/0x10 [ 15.424365] ? ktime_get_ts64+0x86/0x230 [ 15.424391] kunit_try_run_case+0x1a6/0x480 [ 15.424415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.424437] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.424462] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.424486] ? __kthread_parkme+0x82/0x160 [ 15.424509] ? preempt_count_sub+0x50/0x80 [ 15.424535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.424611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.424638] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.424666] kthread+0x324/0x6e0 [ 15.424688] ? trace_preempt_on+0x20/0xc0 [ 15.424712] ? __pfx_kthread+0x10/0x10 [ 15.424735] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.424759] ? calculate_sigpending+0x7b/0xa0 [ 15.424781] ? __pfx_kthread+0x10/0x10 [ 15.424804] ret_from_fork+0x41/0x80 [ 15.424824] ? __pfx_kthread+0x10/0x10 [ 15.424851] ret_from_fork_asm+0x1a/0x30 [ 15.424884] </TASK> [ 15.424896] [ 15.435689] Allocated by task 273: [ 15.435872] kasan_save_stack+0x45/0x70 [ 15.436656] kasan_save_track+0x18/0x40 [ 15.436988] kasan_save_alloc_info+0x3b/0x50 [ 15.437420] __kasan_kmalloc+0xb7/0xc0 [ 15.437932] __kmalloc_cache_noprof+0x18a/0x420 [ 15.438338] kasan_atomics+0x96/0x310 [ 15.438800] kunit_try_run_case+0x1a6/0x480 [ 15.439075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.439329] kthread+0x324/0x6e0 [ 15.439492] ret_from_fork+0x41/0x80 [ 15.439994] ret_from_fork_asm+0x1a/0x30 [ 15.440448] [ 15.440704] The buggy address belongs to the object at ffff888101bf3e00 [ 15.440704] which belongs to the cache kmalloc-64 of size 64 [ 15.441637] The buggy address is located 0 bytes to the right of [ 15.441637] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.442617] [ 15.442842] The buggy address belongs to the physical page: [ 15.443322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.443802] flags: 0x200000000000000(node=0|zone=2) [ 15.444036] page_type: f5(slab) [ 15.444200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.444493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.445140] page dumped because: kasan: bad access detected [ 15.445973] [ 15.446092] Memory state around the buggy address: [ 15.446475] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.447145] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.447665] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.448168] ^ [ 15.448654] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.449097] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.449594] ================================================================== [ 16.361011] ================================================================== [ 16.361465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 16.361960] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.362515] [ 16.362605] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.362645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.362659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.362682] Call Trace: [ 16.362699] <TASK> [ 16.362716] dump_stack_lvl+0x73/0xb0 [ 16.362740] print_report+0xd1/0x650 [ 16.363077] ? __virt_addr_valid+0x1db/0x2d0 [ 16.363109] ? kasan_atomics_helper+0x1d7b/0x5450 [ 16.363131] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.363158] ? kasan_atomics_helper+0x1d7b/0x5450 [ 16.363179] kasan_report+0x140/0x180 [ 16.363203] ? kasan_atomics_helper+0x1d7b/0x5450 [ 16.363229] kasan_check_range+0x10c/0x1c0 [ 16.363253] __kasan_check_write+0x18/0x20 [ 16.363276] kasan_atomics_helper+0x1d7b/0x5450 [ 16.363299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.363322] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.363348] ? kasan_atomics+0x153/0x310 [ 16.363374] kasan_atomics+0x1dd/0x310 [ 16.363397] ? __pfx_kasan_atomics+0x10/0x10 [ 16.363421] ? __pfx_read_tsc+0x10/0x10 [ 16.363444] ? ktime_get_ts64+0x86/0x230 [ 16.363470] kunit_try_run_case+0x1a6/0x480 [ 16.363494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.363517] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.363542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.363566] ? __kthread_parkme+0x82/0x160 [ 16.363589] ? preempt_count_sub+0x50/0x80 [ 16.363614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.363638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.363665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.363693] kthread+0x324/0x6e0 [ 16.363714] ? trace_preempt_on+0x20/0xc0 [ 16.363738] ? __pfx_kthread+0x10/0x10 [ 16.363762] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.363785] ? calculate_sigpending+0x7b/0xa0 [ 16.363807] ? __pfx_kthread+0x10/0x10 [ 16.363831] ret_from_fork+0x41/0x80 [ 16.363850] ? __pfx_kthread+0x10/0x10 [ 16.363874] ret_from_fork_asm+0x1a/0x30 [ 16.363906] </TASK> [ 16.363918] [ 16.372944] Allocated by task 273: [ 16.373111] kasan_save_stack+0x45/0x70 [ 16.373259] kasan_save_track+0x18/0x40 [ 16.373452] kasan_save_alloc_info+0x3b/0x50 [ 16.373795] __kasan_kmalloc+0xb7/0xc0 [ 16.374028] __kmalloc_cache_noprof+0x18a/0x420 [ 16.374194] kasan_atomics+0x96/0x310 [ 16.374465] kunit_try_run_case+0x1a6/0x480 [ 16.374817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.375121] kthread+0x324/0x6e0 [ 16.375283] ret_from_fork+0x41/0x80 [ 16.375510] ret_from_fork_asm+0x1a/0x30 [ 16.375713] [ 16.375814] The buggy address belongs to the object at ffff888101bf3e00 [ 16.375814] which belongs to the cache kmalloc-64 of size 64 [ 16.376386] The buggy address is located 0 bytes to the right of [ 16.376386] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.376999] [ 16.377131] The buggy address belongs to the physical page: [ 16.377425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.377840] flags: 0x200000000000000(node=0|zone=2) [ 16.378134] page_type: f5(slab) [ 16.378326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.378647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.379040] page dumped because: kasan: bad access detected [ 16.379266] [ 16.379394] Memory state around the buggy address: [ 16.379653] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.380034] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.380363] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.380655] ^ [ 16.380911] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.381267] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.381591] ================================================================== [ 16.622334] ================================================================== [ 16.622807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 16.623501] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.624002] [ 16.624097] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.624136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.624150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.624172] Call Trace: [ 16.624188] <TASK> [ 16.624202] dump_stack_lvl+0x73/0xb0 [ 16.624227] print_report+0xd1/0x650 [ 16.624248] ? __virt_addr_valid+0x1db/0x2d0 [ 16.624271] ? kasan_atomics_helper+0x5117/0x5450 [ 16.624292] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.624318] ? kasan_atomics_helper+0x5117/0x5450 [ 16.624339] kasan_report+0x140/0x180 [ 16.624362] ? kasan_atomics_helper+0x5117/0x5450 [ 16.624387] __asan_report_load8_noabort+0x18/0x20 [ 16.624411] kasan_atomics_helper+0x5117/0x5450 [ 16.624434] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.624456] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.624480] ? kasan_atomics+0x153/0x310 [ 16.624506] kasan_atomics+0x1dd/0x310 [ 16.624528] ? __pfx_kasan_atomics+0x10/0x10 [ 16.624578] ? __pfx_read_tsc+0x10/0x10 [ 16.624601] ? ktime_get_ts64+0x86/0x230 [ 16.624626] kunit_try_run_case+0x1a6/0x480 [ 16.624660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.624682] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.624706] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.624742] ? __kthread_parkme+0x82/0x160 [ 16.624766] ? preempt_count_sub+0x50/0x80 [ 16.624790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.624814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.624850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.624878] kthread+0x324/0x6e0 [ 16.624900] ? trace_preempt_on+0x20/0xc0 [ 16.624934] ? __pfx_kthread+0x10/0x10 [ 16.624957] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.624980] ? calculate_sigpending+0x7b/0xa0 [ 16.625003] ? __pfx_kthread+0x10/0x10 [ 16.625035] ret_from_fork+0x41/0x80 [ 16.625054] ? __pfx_kthread+0x10/0x10 [ 16.625078] ret_from_fork_asm+0x1a/0x30 [ 16.625109] </TASK> [ 16.625120] [ 16.637742] Allocated by task 273: [ 16.638108] kasan_save_stack+0x45/0x70 [ 16.638495] kasan_save_track+0x18/0x40 [ 16.638826] kasan_save_alloc_info+0x3b/0x50 [ 16.639095] __kasan_kmalloc+0xb7/0xc0 [ 16.639391] __kmalloc_cache_noprof+0x18a/0x420 [ 16.639570] kasan_atomics+0x96/0x310 [ 16.639948] kunit_try_run_case+0x1a6/0x480 [ 16.640359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.640810] kthread+0x324/0x6e0 [ 16.640964] ret_from_fork+0x41/0x80 [ 16.641194] ret_from_fork_asm+0x1a/0x30 [ 16.641611] [ 16.641778] The buggy address belongs to the object at ffff888101bf3e00 [ 16.641778] which belongs to the cache kmalloc-64 of size 64 [ 16.642292] The buggy address is located 0 bytes to the right of [ 16.642292] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.642926] [ 16.643107] The buggy address belongs to the physical page: [ 16.643633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.644330] flags: 0x200000000000000(node=0|zone=2) [ 16.644794] page_type: f5(slab) [ 16.645104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.645521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.646476] page dumped because: kasan: bad access detected [ 16.646843] [ 16.647004] Memory state around the buggy address: [ 16.647309] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.647747] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.647963] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.648188] ^ [ 16.648344] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.648582] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.649250] ================================================================== [ 16.014223] ================================================================== [ 16.014961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 16.015953] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.016282] [ 16.016369] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.016410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.016423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.016445] Call Trace: [ 16.016463] <TASK> [ 16.016480] dump_stack_lvl+0x73/0xb0 [ 16.016507] print_report+0xd1/0x650 [ 16.016529] ? __virt_addr_valid+0x1db/0x2d0 [ 16.016559] ? kasan_atomics_helper+0x50d6/0x5450 [ 16.016581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.016607] ? kasan_atomics_helper+0x50d6/0x5450 [ 16.016629] kasan_report+0x140/0x180 [ 16.016653] ? kasan_atomics_helper+0x50d6/0x5450 [ 16.016679] __asan_report_store8_noabort+0x1b/0x30 [ 16.016703] kasan_atomics_helper+0x50d6/0x5450 [ 16.016725] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.016748] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.016772] ? kasan_atomics+0x153/0x310 [ 16.016800] kasan_atomics+0x1dd/0x310 [ 16.016824] ? __pfx_kasan_atomics+0x10/0x10 [ 16.016848] ? __pfx_read_tsc+0x10/0x10 [ 16.016871] ? ktime_get_ts64+0x86/0x230 [ 16.016897] kunit_try_run_case+0x1a6/0x480 [ 16.016921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.016943] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.016969] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.016993] ? __kthread_parkme+0x82/0x160 [ 16.017210] ? preempt_count_sub+0x50/0x80 [ 16.017245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.017270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.017297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.017325] kthread+0x324/0x6e0 [ 16.017378] ? trace_preempt_on+0x20/0xc0 [ 16.017404] ? __pfx_kthread+0x10/0x10 [ 16.017427] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.017450] ? calculate_sigpending+0x7b/0xa0 [ 16.017473] ? __pfx_kthread+0x10/0x10 [ 16.017496] ret_from_fork+0x41/0x80 [ 16.017515] ? __pfx_kthread+0x10/0x10 [ 16.017538] ret_from_fork_asm+0x1a/0x30 [ 16.017570] </TASK> [ 16.017582] [ 16.033247] Allocated by task 273: [ 16.033597] kasan_save_stack+0x45/0x70 [ 16.034006] kasan_save_track+0x18/0x40 [ 16.034421] kasan_save_alloc_info+0x3b/0x50 [ 16.034891] __kasan_kmalloc+0xb7/0xc0 [ 16.035280] __kmalloc_cache_noprof+0x18a/0x420 [ 16.035710] kasan_atomics+0x96/0x310 [ 16.035979] kunit_try_run_case+0x1a6/0x480 [ 16.036137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.036318] kthread+0x324/0x6e0 [ 16.036443] ret_from_fork+0x41/0x80 [ 16.036574] ret_from_fork_asm+0x1a/0x30 [ 16.036800] [ 16.036872] The buggy address belongs to the object at ffff888101bf3e00 [ 16.036872] which belongs to the cache kmalloc-64 of size 64 [ 16.037487] The buggy address is located 0 bytes to the right of [ 16.037487] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.038086] [ 16.038205] The buggy address belongs to the physical page: [ 16.038455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.038874] flags: 0x200000000000000(node=0|zone=2) [ 16.039131] page_type: f5(slab) [ 16.039259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.039565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.039941] page dumped because: kasan: bad access detected [ 16.040191] [ 16.040272] Memory state around the buggy address: [ 16.040428] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.040996] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.041299] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.041511] ^ [ 16.041795] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.042279] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.042495] ================================================================== [ 15.940706] ================================================================== [ 15.941071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 15.941351] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.941773] [ 15.941860] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.941901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.941914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.941938] Call Trace: [ 15.941956] <TASK> [ 15.941973] dump_stack_lvl+0x73/0xb0 [ 15.941998] print_report+0xd1/0x650 [ 15.942032] ? __virt_addr_valid+0x1db/0x2d0 [ 15.942056] ? kasan_atomics_helper+0x13b6/0x5450 [ 15.942077] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.942103] ? kasan_atomics_helper+0x13b6/0x5450 [ 15.942125] kasan_report+0x140/0x180 [ 15.942148] ? kasan_atomics_helper+0x13b6/0x5450 [ 15.942174] kasan_check_range+0x10c/0x1c0 [ 15.942198] __kasan_check_read+0x15/0x20 [ 15.942221] kasan_atomics_helper+0x13b6/0x5450 [ 15.942246] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.942268] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.942293] ? kasan_atomics+0x153/0x310 [ 15.942320] kasan_atomics+0x1dd/0x310 [ 15.942343] ? __pfx_kasan_atomics+0x10/0x10 [ 15.942368] ? __pfx_read_tsc+0x10/0x10 [ 15.942390] ? ktime_get_ts64+0x86/0x230 [ 15.942416] kunit_try_run_case+0x1a6/0x480 [ 15.942439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.942462] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.942486] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.942510] ? __kthread_parkme+0x82/0x160 [ 15.942533] ? preempt_count_sub+0x50/0x80 [ 15.942558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.942581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.942608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.942635] kthread+0x324/0x6e0 [ 15.942656] ? trace_preempt_on+0x20/0xc0 [ 15.942680] ? __pfx_kthread+0x10/0x10 [ 15.942702] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.942725] ? calculate_sigpending+0x7b/0xa0 [ 15.942747] ? __pfx_kthread+0x10/0x10 [ 15.942771] ret_from_fork+0x41/0x80 [ 15.942790] ? __pfx_kthread+0x10/0x10 [ 15.942814] ret_from_fork_asm+0x1a/0x30 [ 15.942845] </TASK> [ 15.942857] [ 15.950541] Allocated by task 273: [ 15.950737] kasan_save_stack+0x45/0x70 [ 15.950905] kasan_save_track+0x18/0x40 [ 15.951084] kasan_save_alloc_info+0x3b/0x50 [ 15.951236] __kasan_kmalloc+0xb7/0xc0 [ 15.951370] __kmalloc_cache_noprof+0x18a/0x420 [ 15.951525] kasan_atomics+0x96/0x310 [ 15.951657] kunit_try_run_case+0x1a6/0x480 [ 15.951814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.952197] kthread+0x324/0x6e0 [ 15.952367] ret_from_fork+0x41/0x80 [ 15.952546] ret_from_fork_asm+0x1a/0x30 [ 15.952740] [ 15.952843] The buggy address belongs to the object at ffff888101bf3e00 [ 15.952843] which belongs to the cache kmalloc-64 of size 64 [ 15.953370] The buggy address is located 0 bytes to the right of [ 15.953370] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.953934] [ 15.954039] The buggy address belongs to the physical page: [ 15.954282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.954522] flags: 0x200000000000000(node=0|zone=2) [ 15.955027] page_type: f5(slab) [ 15.955201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.955540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.955874] page dumped because: kasan: bad access detected [ 15.956083] [ 15.956154] Memory state around the buggy address: [ 15.956306] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.956522] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.956834] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.957158] ^ [ 15.957530] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.957829] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.958052] ================================================================== [ 16.228538] ================================================================== [ 16.228885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 16.229130] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.229585] [ 16.229767] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.229833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.229846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.229894] Call Trace: [ 16.229910] <TASK> [ 16.229925] dump_stack_lvl+0x73/0xb0 [ 16.229963] print_report+0xd1/0x650 [ 16.229985] ? __virt_addr_valid+0x1db/0x2d0 [ 16.230007] ? kasan_atomics_helper+0x19e4/0x5450 [ 16.230037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.230063] ? kasan_atomics_helper+0x19e4/0x5450 [ 16.230085] kasan_report+0x140/0x180 [ 16.230107] ? kasan_atomics_helper+0x19e4/0x5450 [ 16.230132] kasan_check_range+0x10c/0x1c0 [ 16.230156] __kasan_check_write+0x18/0x20 [ 16.230179] kasan_atomics_helper+0x19e4/0x5450 [ 16.230202] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.230224] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.230249] ? kasan_atomics+0x153/0x310 [ 16.230275] kasan_atomics+0x1dd/0x310 [ 16.230297] ? __pfx_kasan_atomics+0x10/0x10 [ 16.230321] ? __pfx_read_tsc+0x10/0x10 [ 16.230342] ? ktime_get_ts64+0x86/0x230 [ 16.230368] kunit_try_run_case+0x1a6/0x480 [ 16.230391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.230414] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.230441] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.230475] ? __kthread_parkme+0x82/0x160 [ 16.230496] ? preempt_count_sub+0x50/0x80 [ 16.230532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.230556] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.230582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.230609] kthread+0x324/0x6e0 [ 16.230631] ? trace_preempt_on+0x20/0xc0 [ 16.230654] ? __pfx_kthread+0x10/0x10 [ 16.230677] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.230700] ? calculate_sigpending+0x7b/0xa0 [ 16.230731] ? __pfx_kthread+0x10/0x10 [ 16.230754] ret_from_fork+0x41/0x80 [ 16.230773] ? __pfx_kthread+0x10/0x10 [ 16.230795] ret_from_fork_asm+0x1a/0x30 [ 16.230838] </TASK> [ 16.230849] [ 16.238360] Allocated by task 273: [ 16.238539] kasan_save_stack+0x45/0x70 [ 16.238732] kasan_save_track+0x18/0x40 [ 16.238918] kasan_save_alloc_info+0x3b/0x50 [ 16.239124] __kasan_kmalloc+0xb7/0xc0 [ 16.239252] __kmalloc_cache_noprof+0x18a/0x420 [ 16.239399] kasan_atomics+0x96/0x310 [ 16.239527] kunit_try_run_case+0x1a6/0x480 [ 16.239667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.239924] kthread+0x324/0x6e0 [ 16.240106] ret_from_fork+0x41/0x80 [ 16.240315] ret_from_fork_asm+0x1a/0x30 [ 16.240517] [ 16.240621] The buggy address belongs to the object at ffff888101bf3e00 [ 16.240621] which belongs to the cache kmalloc-64 of size 64 [ 16.241252] The buggy address is located 0 bytes to the right of [ 16.241252] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.241649] [ 16.241770] The buggy address belongs to the physical page: [ 16.242028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.242306] flags: 0x200000000000000(node=0|zone=2) [ 16.242462] page_type: f5(slab) [ 16.242580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.242861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.243233] page dumped because: kasan: bad access detected [ 16.243491] [ 16.243593] Memory state around the buggy address: [ 16.243967] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.244320] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.244656] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.244927] ^ [ 16.245088] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.245394] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.245803] ================================================================== [ 16.422878] ================================================================== [ 16.423678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 16.424450] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.425202] [ 16.425433] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.425473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.425486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.425506] Call Trace: [ 16.425520] <TASK> [ 16.425583] dump_stack_lvl+0x73/0xb0 [ 16.425610] print_report+0xd1/0x650 [ 16.425644] ? __virt_addr_valid+0x1db/0x2d0 [ 16.425667] ? kasan_atomics_helper+0x1f44/0x5450 [ 16.425689] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.425716] ? kasan_atomics_helper+0x1f44/0x5450 [ 16.425743] kasan_report+0x140/0x180 [ 16.425766] ? kasan_atomics_helper+0x1f44/0x5450 [ 16.425792] kasan_check_range+0x10c/0x1c0 [ 16.425816] __kasan_check_write+0x18/0x20 [ 16.425839] kasan_atomics_helper+0x1f44/0x5450 [ 16.425862] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.425885] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.425909] ? kasan_atomics+0x153/0x310 [ 16.425936] kasan_atomics+0x1dd/0x310 [ 16.425958] ? __pfx_kasan_atomics+0x10/0x10 [ 16.425982] ? __pfx_read_tsc+0x10/0x10 [ 16.426005] ? ktime_get_ts64+0x86/0x230 [ 16.426041] kunit_try_run_case+0x1a6/0x480 [ 16.426065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.426088] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.426112] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.426137] ? __kthread_parkme+0x82/0x160 [ 16.426160] ? preempt_count_sub+0x50/0x80 [ 16.426186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.426209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.426236] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.426263] kthread+0x324/0x6e0 [ 16.426285] ? trace_preempt_on+0x20/0xc0 [ 16.426309] ? __pfx_kthread+0x10/0x10 [ 16.426333] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.426357] ? calculate_sigpending+0x7b/0xa0 [ 16.426379] ? __pfx_kthread+0x10/0x10 [ 16.426403] ret_from_fork+0x41/0x80 [ 16.426422] ? __pfx_kthread+0x10/0x10 [ 16.426446] ret_from_fork_asm+0x1a/0x30 [ 16.426478] </TASK> [ 16.426488] [ 16.439623] Allocated by task 273: [ 16.440048] kasan_save_stack+0x45/0x70 [ 16.440445] kasan_save_track+0x18/0x40 [ 16.440888] kasan_save_alloc_info+0x3b/0x50 [ 16.441322] __kasan_kmalloc+0xb7/0xc0 [ 16.441709] __kmalloc_cache_noprof+0x18a/0x420 [ 16.442229] kasan_atomics+0x96/0x310 [ 16.442683] kunit_try_run_case+0x1a6/0x480 [ 16.443194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.443379] kthread+0x324/0x6e0 [ 16.443503] ret_from_fork+0x41/0x80 [ 16.443837] ret_from_fork_asm+0x1a/0x30 [ 16.444251] [ 16.444440] The buggy address belongs to the object at ffff888101bf3e00 [ 16.444440] which belongs to the cache kmalloc-64 of size 64 [ 16.445803] The buggy address is located 0 bytes to the right of [ 16.445803] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.446184] [ 16.446259] The buggy address belongs to the physical page: [ 16.446432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.446961] flags: 0x200000000000000(node=0|zone=2) [ 16.447437] page_type: f5(slab) [ 16.447788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.448512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.449207] page dumped because: kasan: bad access detected [ 16.449762] [ 16.449922] Memory state around the buggy address: [ 16.450426] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.451086] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.451762] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.452034] ^ [ 16.452479] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.453110] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.453325] ================================================================== [ 15.467538] ================================================================== [ 15.468230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 15.468605] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.468942] [ 15.469060] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.469100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.469112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.469133] Call Trace: [ 15.469147] <TASK> [ 15.469162] dump_stack_lvl+0x73/0xb0 [ 15.469186] print_report+0xd1/0x650 [ 15.469208] ? __virt_addr_valid+0x1db/0x2d0 [ 15.469230] ? kasan_atomics_helper+0x861/0x5450 [ 15.469251] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.469278] ? kasan_atomics_helper+0x861/0x5450 [ 15.469300] kasan_report+0x140/0x180 [ 15.469322] ? kasan_atomics_helper+0x861/0x5450 [ 15.469348] kasan_check_range+0x10c/0x1c0 [ 15.469372] __kasan_check_write+0x18/0x20 [ 15.469397] kasan_atomics_helper+0x861/0x5450 [ 15.469420] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.469444] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.469470] ? kasan_atomics+0x153/0x310 [ 15.469496] kasan_atomics+0x1dd/0x310 [ 15.469519] ? __pfx_kasan_atomics+0x10/0x10 [ 15.469576] ? __pfx_read_tsc+0x10/0x10 [ 15.469600] ? ktime_get_ts64+0x86/0x230 [ 15.469625] kunit_try_run_case+0x1a6/0x480 [ 15.469649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.469671] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.469697] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.469721] ? __kthread_parkme+0x82/0x160 [ 15.469750] ? preempt_count_sub+0x50/0x80 [ 15.469775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.469798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.469825] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.469853] kthread+0x324/0x6e0 [ 15.469875] ? trace_preempt_on+0x20/0xc0 [ 15.469899] ? __pfx_kthread+0x10/0x10 [ 15.469922] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.469945] ? calculate_sigpending+0x7b/0xa0 [ 15.469967] ? __pfx_kthread+0x10/0x10 [ 15.469991] ret_from_fork+0x41/0x80 [ 15.470011] ? __pfx_kthread+0x10/0x10 [ 15.470043] ret_from_fork_asm+0x1a/0x30 [ 15.470075] </TASK> [ 15.470086] [ 15.478497] Allocated by task 273: [ 15.478659] kasan_save_stack+0x45/0x70 [ 15.478807] kasan_save_track+0x18/0x40 [ 15.478943] kasan_save_alloc_info+0x3b/0x50 [ 15.479244] __kasan_kmalloc+0xb7/0xc0 [ 15.479505] __kmalloc_cache_noprof+0x18a/0x420 [ 15.479728] kasan_atomics+0x96/0x310 [ 15.479864] kunit_try_run_case+0x1a6/0x480 [ 15.480056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.480316] kthread+0x324/0x6e0 [ 15.480489] ret_from_fork+0x41/0x80 [ 15.481111] ret_from_fork_asm+0x1a/0x30 [ 15.481730] [ 15.481844] The buggy address belongs to the object at ffff888101bf3e00 [ 15.481844] which belongs to the cache kmalloc-64 of size 64 [ 15.483330] The buggy address is located 0 bytes to the right of [ 15.483330] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.484413] [ 15.484519] The buggy address belongs to the physical page: [ 15.487303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.487811] flags: 0x200000000000000(node=0|zone=2) [ 15.488165] page_type: f5(slab) [ 15.488342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.488671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.488986] page dumped because: kasan: bad access detected [ 15.489279] [ 15.489356] Memory state around the buggy address: [ 15.489702] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.490034] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.490340] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.490755] ^ [ 15.490985] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.491318] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.491597] ================================================================== [ 16.336818] ================================================================== [ 16.337231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 16.337892] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.338132] [ 16.338215] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.338254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.338268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.338289] Call Trace: [ 16.338304] <TASK> [ 16.338319] dump_stack_lvl+0x73/0xb0 [ 16.338346] print_report+0xd1/0x650 [ 16.338368] ? __virt_addr_valid+0x1db/0x2d0 [ 16.338391] ? kasan_atomics_helper+0x1ce2/0x5450 [ 16.338413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.338440] ? kasan_atomics_helper+0x1ce2/0x5450 [ 16.338461] kasan_report+0x140/0x180 [ 16.338484] ? kasan_atomics_helper+0x1ce2/0x5450 [ 16.338510] kasan_check_range+0x10c/0x1c0 [ 16.338534] __kasan_check_write+0x18/0x20 [ 16.338588] kasan_atomics_helper+0x1ce2/0x5450 [ 16.338614] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.338636] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.338672] ? kasan_atomics+0x153/0x310 [ 16.338698] kasan_atomics+0x1dd/0x310 [ 16.338721] ? __pfx_kasan_atomics+0x10/0x10 [ 16.338757] ? __pfx_read_tsc+0x10/0x10 [ 16.338779] ? ktime_get_ts64+0x86/0x230 [ 16.338805] kunit_try_run_case+0x1a6/0x480 [ 16.338838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.338861] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.338888] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.338923] ? __kthread_parkme+0x82/0x160 [ 16.338946] ? preempt_count_sub+0x50/0x80 [ 16.338972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.339003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.339045] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.339072] kthread+0x324/0x6e0 [ 16.339094] ? trace_preempt_on+0x20/0xc0 [ 16.339118] ? __pfx_kthread+0x10/0x10 [ 16.339142] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.339165] ? calculate_sigpending+0x7b/0xa0 [ 16.339187] ? __pfx_kthread+0x10/0x10 [ 16.339210] ret_from_fork+0x41/0x80 [ 16.339229] ? __pfx_kthread+0x10/0x10 [ 16.339252] ret_from_fork_asm+0x1a/0x30 [ 16.339285] </TASK> [ 16.339295] [ 16.351906] Allocated by task 273: [ 16.352258] kasan_save_stack+0x45/0x70 [ 16.352630] kasan_save_track+0x18/0x40 [ 16.352983] kasan_save_alloc_info+0x3b/0x50 [ 16.353380] __kasan_kmalloc+0xb7/0xc0 [ 16.353769] __kmalloc_cache_noprof+0x18a/0x420 [ 16.354189] kasan_atomics+0x96/0x310 [ 16.354534] kunit_try_run_case+0x1a6/0x480 [ 16.354928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.355158] kthread+0x324/0x6e0 [ 16.355282] ret_from_fork+0x41/0x80 [ 16.355410] ret_from_fork_asm+0x1a/0x30 [ 16.355552] [ 16.355631] The buggy address belongs to the object at ffff888101bf3e00 [ 16.355631] which belongs to the cache kmalloc-64 of size 64 [ 16.356108] The buggy address is located 0 bytes to the right of [ 16.356108] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.356543] [ 16.356639] The buggy address belongs to the physical page: [ 16.356944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.357239] flags: 0x200000000000000(node=0|zone=2) [ 16.357475] page_type: f5(slab) [ 16.357684] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.357989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.358272] page dumped because: kasan: bad access detected [ 16.358458] [ 16.358552] Memory state around the buggy address: [ 16.358777] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.359071] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.359324] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.359638] ^ [ 16.359857] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360158] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360420] ================================================================== [ 15.570584] ================================================================== [ 15.570825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 15.571212] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.571546] [ 15.571646] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.571684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.571697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.571719] Call Trace: [ 15.571731] <TASK> [ 15.571746] dump_stack_lvl+0x73/0xb0 [ 15.571770] print_report+0xd1/0x650 [ 15.571792] ? __virt_addr_valid+0x1db/0x2d0 [ 15.571814] ? kasan_atomics_helper+0xb6b/0x5450 [ 15.571835] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.571861] ? kasan_atomics_helper+0xb6b/0x5450 [ 15.571883] kasan_report+0x140/0x180 [ 15.571906] ? kasan_atomics_helper+0xb6b/0x5450 [ 15.571932] kasan_check_range+0x10c/0x1c0 [ 15.571956] __kasan_check_write+0x18/0x20 [ 15.571980] kasan_atomics_helper+0xb6b/0x5450 [ 15.572002] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.572055] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.572079] ? kasan_atomics+0x153/0x310 [ 15.572106] kasan_atomics+0x1dd/0x310 [ 15.572129] ? __pfx_kasan_atomics+0x10/0x10 [ 15.572154] ? __pfx_read_tsc+0x10/0x10 [ 15.572176] ? ktime_get_ts64+0x86/0x230 [ 15.572202] kunit_try_run_case+0x1a6/0x480 [ 15.572226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.572248] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.572273] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.572298] ? __kthread_parkme+0x82/0x160 [ 15.572321] ? preempt_count_sub+0x50/0x80 [ 15.572347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.572371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.572399] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.572427] kthread+0x324/0x6e0 [ 15.572448] ? trace_preempt_on+0x20/0xc0 [ 15.572471] ? __pfx_kthread+0x10/0x10 [ 15.572495] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.572517] ? calculate_sigpending+0x7b/0xa0 [ 15.572540] ? __pfx_kthread+0x10/0x10 [ 15.572563] ret_from_fork+0x41/0x80 [ 15.572582] ? __pfx_kthread+0x10/0x10 [ 15.572606] ret_from_fork_asm+0x1a/0x30 [ 15.572638] </TASK> [ 15.572649] [ 15.583317] Allocated by task 273: [ 15.583488] kasan_save_stack+0x45/0x70 [ 15.584041] kasan_save_track+0x18/0x40 [ 15.584267] kasan_save_alloc_info+0x3b/0x50 [ 15.584639] __kasan_kmalloc+0xb7/0xc0 [ 15.584961] __kmalloc_cache_noprof+0x18a/0x420 [ 15.585350] kasan_atomics+0x96/0x310 [ 15.585692] kunit_try_run_case+0x1a6/0x480 [ 15.586031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.586279] kthread+0x324/0x6e0 [ 15.586447] ret_from_fork+0x41/0x80 [ 15.586835] ret_from_fork_asm+0x1a/0x30 [ 15.587174] [ 15.587401] The buggy address belongs to the object at ffff888101bf3e00 [ 15.587401] which belongs to the cache kmalloc-64 of size 64 [ 15.588296] The buggy address is located 0 bytes to the right of [ 15.588296] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.589168] [ 15.589275] The buggy address belongs to the physical page: [ 15.589489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.590055] flags: 0x200000000000000(node=0|zone=2) [ 15.590415] page_type: f5(slab) [ 15.590732] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.591115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.591439] page dumped because: kasan: bad access detected [ 15.592058] [ 15.592147] Memory state around the buggy address: [ 15.592558] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.593037] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.593529] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.594128] ^ [ 15.594352] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.594833] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.595327] ================================================================== [ 15.883317] ================================================================== [ 15.883816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 15.884103] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.884414] [ 15.884518] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.884558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.884624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.884645] Call Trace: [ 15.884661] <TASK> [ 15.884677] dump_stack_lvl+0x73/0xb0 [ 15.884702] print_report+0xd1/0x650 [ 15.884724] ? __virt_addr_valid+0x1db/0x2d0 [ 15.884746] ? kasan_atomics_helper+0x49ea/0x5450 [ 15.884768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.884795] ? kasan_atomics_helper+0x49ea/0x5450 [ 15.884817] kasan_report+0x140/0x180 [ 15.884839] ? kasan_atomics_helper+0x49ea/0x5450 [ 15.884866] __asan_report_load4_noabort+0x18/0x20 [ 15.884892] kasan_atomics_helper+0x49ea/0x5450 [ 15.884915] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.884937] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.884962] ? kasan_atomics+0x153/0x310 [ 15.884989] kasan_atomics+0x1dd/0x310 [ 15.885012] ? __pfx_kasan_atomics+0x10/0x10 [ 15.885047] ? __pfx_read_tsc+0x10/0x10 [ 15.885069] ? ktime_get_ts64+0x86/0x230 [ 15.885095] kunit_try_run_case+0x1a6/0x480 [ 15.885119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.885141] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.885165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.885190] ? __kthread_parkme+0x82/0x160 [ 15.885213] ? preempt_count_sub+0x50/0x80 [ 15.885239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.885262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.885288] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.885315] kthread+0x324/0x6e0 [ 15.885337] ? trace_preempt_on+0x20/0xc0 [ 15.885361] ? __pfx_kthread+0x10/0x10 [ 15.885384] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.885408] ? calculate_sigpending+0x7b/0xa0 [ 15.885430] ? __pfx_kthread+0x10/0x10 [ 15.885453] ret_from_fork+0x41/0x80 [ 15.885473] ? __pfx_kthread+0x10/0x10 [ 15.885495] ret_from_fork_asm+0x1a/0x30 [ 15.885527] </TASK> [ 15.885538] [ 15.893237] Allocated by task 273: [ 15.893369] kasan_save_stack+0x45/0x70 [ 15.893513] kasan_save_track+0x18/0x40 [ 15.893647] kasan_save_alloc_info+0x3b/0x50 [ 15.893801] __kasan_kmalloc+0xb7/0xc0 [ 15.894161] __kmalloc_cache_noprof+0x18a/0x420 [ 15.894408] kasan_atomics+0x96/0x310 [ 15.894631] kunit_try_run_case+0x1a6/0x480 [ 15.894844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.895116] kthread+0x324/0x6e0 [ 15.895289] ret_from_fork+0x41/0x80 [ 15.895474] ret_from_fork_asm+0x1a/0x30 [ 15.895873] [ 15.895975] The buggy address belongs to the object at ffff888101bf3e00 [ 15.895975] which belongs to the cache kmalloc-64 of size 64 [ 15.896458] The buggy address is located 0 bytes to the right of [ 15.896458] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.896959] [ 15.897051] The buggy address belongs to the physical page: [ 15.897307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.897877] flags: 0x200000000000000(node=0|zone=2) [ 15.898110] page_type: f5(slab) [ 15.898258] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.898527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.899154] page dumped because: kasan: bad access detected [ 15.899359] [ 15.899431] Memory state around the buggy address: [ 15.899585] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.899799] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.900184] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.900504] ^ [ 15.900733] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.901062] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.901293] ================================================================== [ 16.544296] ================================================================== [ 16.544636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 16.544985] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.545374] [ 16.545458] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.545495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.545508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.545529] Call Trace: [ 16.545544] <TASK> [ 16.545560] dump_stack_lvl+0x73/0xb0 [ 16.545583] print_report+0xd1/0x650 [ 16.545605] ? __virt_addr_valid+0x1db/0x2d0 [ 16.545627] ? kasan_atomics_helper+0x4fb4/0x5450 [ 16.545648] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.545699] ? kasan_atomics_helper+0x4fb4/0x5450 [ 16.545721] kasan_report+0x140/0x180 [ 16.545749] ? kasan_atomics_helper+0x4fb4/0x5450 [ 16.545793] __asan_report_load8_noabort+0x18/0x20 [ 16.545817] kasan_atomics_helper+0x4fb4/0x5450 [ 16.545841] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.545863] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.545887] ? kasan_atomics+0x153/0x310 [ 16.545913] kasan_atomics+0x1dd/0x310 [ 16.545935] ? __pfx_kasan_atomics+0x10/0x10 [ 16.545959] ? __pfx_read_tsc+0x10/0x10 [ 16.545999] ? ktime_get_ts64+0x86/0x230 [ 16.546034] kunit_try_run_case+0x1a6/0x480 [ 16.546058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.546097] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.546121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.546146] ? __kthread_parkme+0x82/0x160 [ 16.546168] ? preempt_count_sub+0x50/0x80 [ 16.546193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.546217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.546243] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.546271] kthread+0x324/0x6e0 [ 16.546308] ? trace_preempt_on+0x20/0xc0 [ 16.546346] ? __pfx_kthread+0x10/0x10 [ 16.546383] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.546419] ? calculate_sigpending+0x7b/0xa0 [ 16.546442] ? __pfx_kthread+0x10/0x10 [ 16.546465] ret_from_fork+0x41/0x80 [ 16.546484] ? __pfx_kthread+0x10/0x10 [ 16.546507] ret_from_fork_asm+0x1a/0x30 [ 16.546539] </TASK> [ 16.546550] [ 16.554481] Allocated by task 273: [ 16.554733] kasan_save_stack+0x45/0x70 [ 16.554951] kasan_save_track+0x18/0x40 [ 16.555136] kasan_save_alloc_info+0x3b/0x50 [ 16.555350] __kasan_kmalloc+0xb7/0xc0 [ 16.555552] __kmalloc_cache_noprof+0x18a/0x420 [ 16.555711] kasan_atomics+0x96/0x310 [ 16.555913] kunit_try_run_case+0x1a6/0x480 [ 16.556120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.556372] kthread+0x324/0x6e0 [ 16.556560] ret_from_fork+0x41/0x80 [ 16.556786] ret_from_fork_asm+0x1a/0x30 [ 16.556951] [ 16.557033] The buggy address belongs to the object at ffff888101bf3e00 [ 16.557033] which belongs to the cache kmalloc-64 of size 64 [ 16.557543] The buggy address is located 0 bytes to the right of [ 16.557543] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.558004] [ 16.558085] The buggy address belongs to the physical page: [ 16.558255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.558492] flags: 0x200000000000000(node=0|zone=2) [ 16.558833] page_type: f5(slab) [ 16.559119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.559461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.559809] page dumped because: kasan: bad access detected [ 16.560049] [ 16.560162] Memory state around the buggy address: [ 16.560397] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.560739] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.560997] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.561210] ^ [ 16.561358] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.561563] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.561906] ================================================================== [ 16.167607] ================================================================== [ 16.168297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 16.169010] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.169748] [ 16.169918] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.169967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.169979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.170000] Call Trace: [ 16.170035] <TASK> [ 16.170052] dump_stack_lvl+0x73/0xb0 [ 16.170079] print_report+0xd1/0x650 [ 16.170100] ? __virt_addr_valid+0x1db/0x2d0 [ 16.170124] ? kasan_atomics_helper+0x1819/0x5450 [ 16.170154] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.170181] ? kasan_atomics_helper+0x1819/0x5450 [ 16.170203] kasan_report+0x140/0x180 [ 16.170236] ? kasan_atomics_helper+0x1819/0x5450 [ 16.170262] kasan_check_range+0x10c/0x1c0 [ 16.170285] __kasan_check_write+0x18/0x20 [ 16.170308] kasan_atomics_helper+0x1819/0x5450 [ 16.170331] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.170353] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.170377] ? kasan_atomics+0x153/0x310 [ 16.170403] kasan_atomics+0x1dd/0x310 [ 16.170425] ? __pfx_kasan_atomics+0x10/0x10 [ 16.170449] ? __pfx_read_tsc+0x10/0x10 [ 16.170471] ? ktime_get_ts64+0x86/0x230 [ 16.170496] kunit_try_run_case+0x1a6/0x480 [ 16.170519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.170541] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.170567] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.170591] ? __kthread_parkme+0x82/0x160 [ 16.170614] ? preempt_count_sub+0x50/0x80 [ 16.170640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.170664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.170690] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.170718] kthread+0x324/0x6e0 [ 16.170739] ? trace_preempt_on+0x20/0xc0 [ 16.170763] ? __pfx_kthread+0x10/0x10 [ 16.170786] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.170809] ? calculate_sigpending+0x7b/0xa0 [ 16.170831] ? __pfx_kthread+0x10/0x10 [ 16.170855] ret_from_fork+0x41/0x80 [ 16.170874] ? __pfx_kthread+0x10/0x10 [ 16.170897] ret_from_fork_asm+0x1a/0x30 [ 16.170929] </TASK> [ 16.170940] [ 16.178840] Allocated by task 273: [ 16.179041] kasan_save_stack+0x45/0x70 [ 16.179207] kasan_save_track+0x18/0x40 [ 16.179417] kasan_save_alloc_info+0x3b/0x50 [ 16.179624] __kasan_kmalloc+0xb7/0xc0 [ 16.179894] __kmalloc_cache_noprof+0x18a/0x420 [ 16.180078] kasan_atomics+0x96/0x310 [ 16.180221] kunit_try_run_case+0x1a6/0x480 [ 16.180451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.180730] kthread+0x324/0x6e0 [ 16.180976] ret_from_fork+0x41/0x80 [ 16.181168] ret_from_fork_asm+0x1a/0x30 [ 16.181326] [ 16.181400] The buggy address belongs to the object at ffff888101bf3e00 [ 16.181400] which belongs to the cache kmalloc-64 of size 64 [ 16.182069] The buggy address is located 0 bytes to the right of [ 16.182069] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.182606] [ 16.182711] The buggy address belongs to the physical page: [ 16.182949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.183307] flags: 0x200000000000000(node=0|zone=2) [ 16.183535] page_type: f5(slab) [ 16.183745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.184062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.184388] page dumped because: kasan: bad access detected [ 16.184676] [ 16.184757] Memory state around the buggy address: [ 16.184971] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.185195] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.185409] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.185619] ^ [ 16.185872] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.186201] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.186514] ================================================================== [ 16.498626] ================================================================== [ 16.498979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 16.499326] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.499855] [ 16.499969] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.500008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.500032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.500063] Call Trace: [ 16.500078] <TASK> [ 16.500093] dump_stack_lvl+0x73/0xb0 [ 16.500130] print_report+0xd1/0x650 [ 16.500151] ? __virt_addr_valid+0x1db/0x2d0 [ 16.500174] ? kasan_atomics_helper+0x4f9a/0x5450 [ 16.500195] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.500222] ? kasan_atomics_helper+0x4f9a/0x5450 [ 16.500244] kasan_report+0x140/0x180 [ 16.500266] ? kasan_atomics_helper+0x4f9a/0x5450 [ 16.500292] __asan_report_load8_noabort+0x18/0x20 [ 16.500325] kasan_atomics_helper+0x4f9a/0x5450 [ 16.500349] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.500371] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.500407] ? kasan_atomics+0x153/0x310 [ 16.500434] kasan_atomics+0x1dd/0x310 [ 16.500457] ? __pfx_kasan_atomics+0x10/0x10 [ 16.500482] ? __pfx_read_tsc+0x10/0x10 [ 16.500504] ? ktime_get_ts64+0x86/0x230 [ 16.500529] kunit_try_run_case+0x1a6/0x480 [ 16.500553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.500576] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.500610] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.500634] ? __kthread_parkme+0x82/0x160 [ 16.500658] ? preempt_count_sub+0x50/0x80 [ 16.500694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.500717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.500745] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.500772] kthread+0x324/0x6e0 [ 16.500797] ? trace_preempt_on+0x20/0xc0 [ 16.500821] ? __pfx_kthread+0x10/0x10 [ 16.500853] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.500877] ? calculate_sigpending+0x7b/0xa0 [ 16.500900] ? __pfx_kthread+0x10/0x10 [ 16.500934] ret_from_fork+0x41/0x80 [ 16.500953] ? __pfx_kthread+0x10/0x10 [ 16.500976] ret_from_fork_asm+0x1a/0x30 [ 16.501026] </TASK> [ 16.501037] [ 16.508535] Allocated by task 273: [ 16.508787] kasan_save_stack+0x45/0x70 [ 16.508960] kasan_save_track+0x18/0x40 [ 16.509201] kasan_save_alloc_info+0x3b/0x50 [ 16.509391] __kasan_kmalloc+0xb7/0xc0 [ 16.509604] __kmalloc_cache_noprof+0x18a/0x420 [ 16.509823] kasan_atomics+0x96/0x310 [ 16.510005] kunit_try_run_case+0x1a6/0x480 [ 16.510231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.510471] kthread+0x324/0x6e0 [ 16.510672] ret_from_fork+0x41/0x80 [ 16.510871] ret_from_fork_asm+0x1a/0x30 [ 16.511084] [ 16.511184] The buggy address belongs to the object at ffff888101bf3e00 [ 16.511184] which belongs to the cache kmalloc-64 of size 64 [ 16.511705] The buggy address is located 0 bytes to the right of [ 16.511705] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.512242] [ 16.512343] The buggy address belongs to the physical page: [ 16.512626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.512871] flags: 0x200000000000000(node=0|zone=2) [ 16.513044] page_type: f5(slab) [ 16.513163] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.513432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.513794] page dumped because: kasan: bad access detected [ 16.514110] [ 16.514223] Memory state around the buggy address: [ 16.514500] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.514898] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.515154] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.515404] ^ [ 16.515664] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.516021] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.516365] ================================================================== [ 15.551750] ================================================================== [ 15.552335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 15.553065] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.553333] [ 15.553442] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.553482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.553496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.553517] Call Trace: [ 15.553529] <TASK> [ 15.553546] dump_stack_lvl+0x73/0xb0 [ 15.553571] print_report+0xd1/0x650 [ 15.553594] ? __virt_addr_valid+0x1db/0x2d0 [ 15.553616] ? kasan_atomics_helper+0xac8/0x5450 [ 15.553638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.553664] ? kasan_atomics_helper+0xac8/0x5450 [ 15.553686] kasan_report+0x140/0x180 [ 15.553709] ? kasan_atomics_helper+0xac8/0x5450 [ 15.553741] kasan_check_range+0x10c/0x1c0 [ 15.553765] __kasan_check_write+0x18/0x20 [ 15.553788] kasan_atomics_helper+0xac8/0x5450 [ 15.553811] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.553833] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.553859] ? kasan_atomics+0x153/0x310 [ 15.553886] kasan_atomics+0x1dd/0x310 [ 15.553909] ? __pfx_kasan_atomics+0x10/0x10 [ 15.553933] ? __pfx_read_tsc+0x10/0x10 [ 15.553956] ? ktime_get_ts64+0x86/0x230 [ 15.553981] kunit_try_run_case+0x1a6/0x480 [ 15.554005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.554037] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.554061] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.554086] ? __kthread_parkme+0x82/0x160 [ 15.554109] ? preempt_count_sub+0x50/0x80 [ 15.554134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.554158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.554184] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.554212] kthread+0x324/0x6e0 [ 15.554234] ? trace_preempt_on+0x20/0xc0 [ 15.554258] ? __pfx_kthread+0x10/0x10 [ 15.554281] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.554304] ? calculate_sigpending+0x7b/0xa0 [ 15.554326] ? __pfx_kthread+0x10/0x10 [ 15.554350] ret_from_fork+0x41/0x80 [ 15.554369] ? __pfx_kthread+0x10/0x10 [ 15.554393] ret_from_fork_asm+0x1a/0x30 [ 15.554424] </TASK> [ 15.554434] [ 15.562273] Allocated by task 273: [ 15.562456] kasan_save_stack+0x45/0x70 [ 15.562688] kasan_save_track+0x18/0x40 [ 15.562822] kasan_save_alloc_info+0x3b/0x50 [ 15.562970] __kasan_kmalloc+0xb7/0xc0 [ 15.563233] __kmalloc_cache_noprof+0x18a/0x420 [ 15.563477] kasan_atomics+0x96/0x310 [ 15.563663] kunit_try_run_case+0x1a6/0x480 [ 15.563829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.564007] kthread+0x324/0x6e0 [ 15.564137] ret_from_fork+0x41/0x80 [ 15.564477] ret_from_fork_asm+0x1a/0x30 [ 15.564849] [ 15.565035] The buggy address belongs to the object at ffff888101bf3e00 [ 15.565035] which belongs to the cache kmalloc-64 of size 64 [ 15.565504] The buggy address is located 0 bytes to the right of [ 15.565504] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.566035] [ 15.566109] The buggy address belongs to the physical page: [ 15.566281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.566518] flags: 0x200000000000000(node=0|zone=2) [ 15.566678] page_type: f5(slab) [ 15.566798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.567240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.567570] page dumped because: kasan: bad access detected [ 15.567793] [ 15.567916] Memory state around the buggy address: [ 15.568188] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.568406] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.568816] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.569244] ^ [ 15.569482] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.569778] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.570171] ================================================================== [ 15.982424] ================================================================== [ 15.983075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 15.983536] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.984095] [ 15.984212] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.984256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.984270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.984292] Call Trace: [ 15.984308] <TASK> [ 15.984325] dump_stack_lvl+0x73/0xb0 [ 15.984350] print_report+0xd1/0x650 [ 15.984372] ? __virt_addr_valid+0x1db/0x2d0 [ 15.984394] ? kasan_atomics_helper+0x1468/0x5450 [ 15.984415] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.984441] ? kasan_atomics_helper+0x1468/0x5450 [ 15.984462] kasan_report+0x140/0x180 [ 15.984484] ? kasan_atomics_helper+0x1468/0x5450 [ 15.984511] kasan_check_range+0x10c/0x1c0 [ 15.984534] __kasan_check_write+0x18/0x20 [ 15.984557] kasan_atomics_helper+0x1468/0x5450 [ 15.984580] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.984601] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.984625] ? kasan_atomics+0x153/0x310 [ 15.984651] kasan_atomics+0x1dd/0x310 [ 15.984674] ? __pfx_kasan_atomics+0x10/0x10 [ 15.984697] ? __pfx_read_tsc+0x10/0x10 [ 15.984719] ? ktime_get_ts64+0x86/0x230 [ 15.984744] kunit_try_run_case+0x1a6/0x480 [ 15.984767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.984789] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.984814] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.984837] ? __kthread_parkme+0x82/0x160 [ 15.984859] ? preempt_count_sub+0x50/0x80 [ 15.984884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.984907] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.984934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.984961] kthread+0x324/0x6e0 [ 15.984984] ? trace_preempt_on+0x20/0xc0 [ 15.985008] ? __pfx_kthread+0x10/0x10 [ 15.985040] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.985063] ? calculate_sigpending+0x7b/0xa0 [ 15.985086] ? __pfx_kthread+0x10/0x10 [ 15.985110] ret_from_fork+0x41/0x80 [ 15.985129] ? __pfx_kthread+0x10/0x10 [ 15.985152] ret_from_fork_asm+0x1a/0x30 [ 15.985183] </TASK> [ 15.985195] [ 15.995414] Allocated by task 273: [ 15.995655] kasan_save_stack+0x45/0x70 [ 15.995859] kasan_save_track+0x18/0x40 [ 15.996067] kasan_save_alloc_info+0x3b/0x50 [ 15.996473] __kasan_kmalloc+0xb7/0xc0 [ 15.997297] __kmalloc_cache_noprof+0x18a/0x420 [ 15.997473] kasan_atomics+0x96/0x310 [ 15.997609] kunit_try_run_case+0x1a6/0x480 [ 15.997763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.997941] kthread+0x324/0x6e0 [ 15.998629] ret_from_fork+0x41/0x80 [ 15.999427] ret_from_fork_asm+0x1a/0x30 [ 16.000004] [ 16.000197] The buggy address belongs to the object at ffff888101bf3e00 [ 16.000197] which belongs to the cache kmalloc-64 of size 64 [ 16.002406] The buggy address is located 0 bytes to the right of [ 16.002406] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.003361] [ 16.003446] The buggy address belongs to the physical page: [ 16.004090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.004984] flags: 0x200000000000000(node=0|zone=2) [ 16.005684] page_type: f5(slab) [ 16.006133] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.006374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.006980] page dumped because: kasan: bad access detected [ 16.007713] [ 16.008025] Memory state around the buggy address: [ 16.008616] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.009480] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.010158] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.011132] ^ [ 16.011462] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.012247] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.013288] ================================================================== [ 16.267187] ================================================================== [ 16.268506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 16.269300] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.269813] [ 16.269939] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.269983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.270059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.270082] Call Trace: [ 16.270110] <TASK> [ 16.270129] dump_stack_lvl+0x73/0xb0 [ 16.270156] print_report+0xd1/0x650 [ 16.270178] ? __virt_addr_valid+0x1db/0x2d0 [ 16.270240] ? kasan_atomics_helper+0x1b23/0x5450 [ 16.270263] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.270289] ? kasan_atomics_helper+0x1b23/0x5450 [ 16.270311] kasan_report+0x140/0x180 [ 16.270334] ? kasan_atomics_helper+0x1b23/0x5450 [ 16.270360] kasan_check_range+0x10c/0x1c0 [ 16.270384] __kasan_check_write+0x18/0x20 [ 16.270407] kasan_atomics_helper+0x1b23/0x5450 [ 16.270430] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.270452] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.270477] ? kasan_atomics+0x153/0x310 [ 16.270503] kasan_atomics+0x1dd/0x310 [ 16.270525] ? __pfx_kasan_atomics+0x10/0x10 [ 16.270556] ? __pfx_read_tsc+0x10/0x10 [ 16.270580] ? ktime_get_ts64+0x86/0x230 [ 16.270605] kunit_try_run_case+0x1a6/0x480 [ 16.270628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.270650] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.270674] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.270699] ? __kthread_parkme+0x82/0x160 [ 16.270721] ? preempt_count_sub+0x50/0x80 [ 16.270747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.270771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.270797] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.270825] kthread+0x324/0x6e0 [ 16.270847] ? trace_preempt_on+0x20/0xc0 [ 16.270869] ? __pfx_kthread+0x10/0x10 [ 16.270892] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.270914] ? calculate_sigpending+0x7b/0xa0 [ 16.270937] ? __pfx_kthread+0x10/0x10 [ 16.270960] ret_from_fork+0x41/0x80 [ 16.270979] ? __pfx_kthread+0x10/0x10 [ 16.271002] ret_from_fork_asm+0x1a/0x30 [ 16.271043] </TASK> [ 16.271054] [ 16.280416] Allocated by task 273: [ 16.280623] kasan_save_stack+0x45/0x70 [ 16.280782] kasan_save_track+0x18/0x40 [ 16.280919] kasan_save_alloc_info+0x3b/0x50 [ 16.281080] __kasan_kmalloc+0xb7/0xc0 [ 16.281269] __kmalloc_cache_noprof+0x18a/0x420 [ 16.281492] kasan_atomics+0x96/0x310 [ 16.281675] kunit_try_run_case+0x1a6/0x480 [ 16.281883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.282156] kthread+0x324/0x6e0 [ 16.282293] ret_from_fork+0x41/0x80 [ 16.282498] ret_from_fork_asm+0x1a/0x30 [ 16.282662] [ 16.282763] The buggy address belongs to the object at ffff888101bf3e00 [ 16.282763] which belongs to the cache kmalloc-64 of size 64 [ 16.283220] The buggy address is located 0 bytes to the right of [ 16.283220] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.283879] [ 16.284003] The buggy address belongs to the physical page: [ 16.284270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.284571] flags: 0x200000000000000(node=0|zone=2) [ 16.284843] page_type: f5(slab) [ 16.285042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.285281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.285683] page dumped because: kasan: bad access detected [ 16.285912] [ 16.285984] Memory state around the buggy address: [ 16.286152] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.286447] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.286893] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.287177] ^ [ 16.287380] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.287705] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.288011] ================================================================== [ 15.920222] ================================================================== [ 15.920566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 15.921179] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.921511] [ 15.921737] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.921779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.921792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.921812] Call Trace: [ 15.921826] <TASK> [ 15.921841] dump_stack_lvl+0x73/0xb0 [ 15.921866] print_report+0xd1/0x650 [ 15.921888] ? __virt_addr_valid+0x1db/0x2d0 [ 15.921910] ? kasan_atomics_helper+0x49d0/0x5450 [ 15.921932] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.921958] ? kasan_atomics_helper+0x49d0/0x5450 [ 15.921981] kasan_report+0x140/0x180 [ 15.922004] ? kasan_atomics_helper+0x49d0/0x5450 [ 15.922042] __asan_report_load4_noabort+0x18/0x20 [ 15.922067] kasan_atomics_helper+0x49d0/0x5450 [ 15.922090] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.922113] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.922137] ? kasan_atomics+0x153/0x310 [ 15.922164] kasan_atomics+0x1dd/0x310 [ 15.922186] ? __pfx_kasan_atomics+0x10/0x10 [ 15.922210] ? __pfx_read_tsc+0x10/0x10 [ 15.922232] ? ktime_get_ts64+0x86/0x230 [ 15.922258] kunit_try_run_case+0x1a6/0x480 [ 15.922282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.922304] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.922329] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.922354] ? __kthread_parkme+0x82/0x160 [ 15.922377] ? preempt_count_sub+0x50/0x80 [ 15.922403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.922426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.922452] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.922480] kthread+0x324/0x6e0 [ 15.922502] ? trace_preempt_on+0x20/0xc0 [ 15.922526] ? __pfx_kthread+0x10/0x10 [ 15.922548] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.922613] ? calculate_sigpending+0x7b/0xa0 [ 15.922637] ? __pfx_kthread+0x10/0x10 [ 15.922661] ret_from_fork+0x41/0x80 [ 15.922680] ? __pfx_kthread+0x10/0x10 [ 15.922703] ret_from_fork_asm+0x1a/0x30 [ 15.922734] </TASK> [ 15.922745] [ 15.930685] Allocated by task 273: [ 15.930824] kasan_save_stack+0x45/0x70 [ 15.930966] kasan_save_track+0x18/0x40 [ 15.931113] kasan_save_alloc_info+0x3b/0x50 [ 15.931261] __kasan_kmalloc+0xb7/0xc0 [ 15.931396] __kmalloc_cache_noprof+0x18a/0x420 [ 15.931662] kasan_atomics+0x96/0x310 [ 15.931848] kunit_try_run_case+0x1a6/0x480 [ 15.932319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.932674] kthread+0x324/0x6e0 [ 15.932852] ret_from_fork+0x41/0x80 [ 15.933043] ret_from_fork_asm+0x1a/0x30 [ 15.933214] [ 15.933314] The buggy address belongs to the object at ffff888101bf3e00 [ 15.933314] which belongs to the cache kmalloc-64 of size 64 [ 15.933946] The buggy address is located 0 bytes to the right of [ 15.933946] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.934438] [ 15.934542] The buggy address belongs to the physical page: [ 15.934821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.935136] flags: 0x200000000000000(node=0|zone=2) [ 15.935333] page_type: f5(slab) [ 15.935455] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.935683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.936077] page dumped because: kasan: bad access detected [ 15.936316] [ 15.936409] Memory state around the buggy address: [ 15.937483] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.937806] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.938033] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.938982] ^ [ 15.939309] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.939926] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.940258] ================================================================== [ 15.596392] ================================================================== [ 15.597051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 15.597341] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.597866] [ 15.598225] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.598271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.598285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.598307] Call Trace: [ 15.598323] <TASK> [ 15.598378] dump_stack_lvl+0x73/0xb0 [ 15.598408] print_report+0xd1/0x650 [ 15.598430] ? __virt_addr_valid+0x1db/0x2d0 [ 15.598454] ? kasan_atomics_helper+0xc71/0x5450 [ 15.598477] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.598506] ? kasan_atomics_helper+0xc71/0x5450 [ 15.598528] kasan_report+0x140/0x180 [ 15.598550] ? kasan_atomics_helper+0xc71/0x5450 [ 15.598578] kasan_check_range+0x10c/0x1c0 [ 15.598603] __kasan_check_write+0x18/0x20 [ 15.598626] kasan_atomics_helper+0xc71/0x5450 [ 15.598651] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.598675] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.598699] ? kasan_atomics+0x153/0x310 [ 15.598727] kasan_atomics+0x1dd/0x310 [ 15.598751] ? __pfx_kasan_atomics+0x10/0x10 [ 15.598775] ? __pfx_read_tsc+0x10/0x10 [ 15.598798] ? ktime_get_ts64+0x86/0x230 [ 15.598824] kunit_try_run_case+0x1a6/0x480 [ 15.598847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.598870] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.598894] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.598918] ? __kthread_parkme+0x82/0x160 [ 15.598941] ? preempt_count_sub+0x50/0x80 [ 15.598968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.598991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.599029] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.599058] kthread+0x324/0x6e0 [ 15.599080] ? trace_preempt_on+0x20/0xc0 [ 15.599103] ? __pfx_kthread+0x10/0x10 [ 15.599126] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.599149] ? calculate_sigpending+0x7b/0xa0 [ 15.599172] ? __pfx_kthread+0x10/0x10 [ 15.599195] ret_from_fork+0x41/0x80 [ 15.599215] ? __pfx_kthread+0x10/0x10 [ 15.599239] ret_from_fork_asm+0x1a/0x30 [ 15.599272] </TASK> [ 15.599284] [ 15.610859] Allocated by task 273: [ 15.611301] kasan_save_stack+0x45/0x70 [ 15.611558] kasan_save_track+0x18/0x40 [ 15.611765] kasan_save_alloc_info+0x3b/0x50 [ 15.611965] __kasan_kmalloc+0xb7/0xc0 [ 15.612147] __kmalloc_cache_noprof+0x18a/0x420 [ 15.612346] kasan_atomics+0x96/0x310 [ 15.612516] kunit_try_run_case+0x1a6/0x480 [ 15.613085] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.613370] kthread+0x324/0x6e0 [ 15.613702] ret_from_fork+0x41/0x80 [ 15.613983] ret_from_fork_asm+0x1a/0x30 [ 15.614356] [ 15.614447] The buggy address belongs to the object at ffff888101bf3e00 [ 15.614447] which belongs to the cache kmalloc-64 of size 64 [ 15.615277] The buggy address is located 0 bytes to the right of [ 15.615277] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.616134] [ 15.616380] The buggy address belongs to the physical page: [ 15.616844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.617466] flags: 0x200000000000000(node=0|zone=2) [ 15.617849] page_type: f5(slab) [ 15.618030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.618346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.619030] page dumped because: kasan: bad access detected [ 15.619314] [ 15.619545] Memory state around the buggy address: [ 15.620025] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.620510] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.621186] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.621544] ^ [ 15.621831] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.622246] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.622505] ================================================================== [ 15.622996] ================================================================== [ 15.623370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 15.623614] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.623939] [ 15.624082] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.624122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.624135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.624156] Call Trace: [ 15.624171] <TASK> [ 15.624186] dump_stack_lvl+0x73/0xb0 [ 15.624210] print_report+0xd1/0x650 [ 15.624232] ? __virt_addr_valid+0x1db/0x2d0 [ 15.624255] ? kasan_atomics_helper+0x4a86/0x5450 [ 15.624276] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.624302] ? kasan_atomics_helper+0x4a86/0x5450 [ 15.624324] kasan_report+0x140/0x180 [ 15.624347] ? kasan_atomics_helper+0x4a86/0x5450 [ 15.624372] __asan_report_load4_noabort+0x18/0x20 [ 15.624397] kasan_atomics_helper+0x4a86/0x5450 [ 15.624420] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.624442] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.624467] ? kasan_atomics+0x153/0x310 [ 15.624493] kasan_atomics+0x1dd/0x310 [ 15.624516] ? __pfx_kasan_atomics+0x10/0x10 [ 15.624540] ? __pfx_read_tsc+0x10/0x10 [ 15.624562] ? ktime_get_ts64+0x86/0x230 [ 15.624588] kunit_try_run_case+0x1a6/0x480 [ 15.624611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.624634] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.624658] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.624685] ? __kthread_parkme+0x82/0x160 [ 15.624707] ? preempt_count_sub+0x50/0x80 [ 15.624733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.624757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.624783] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.624811] kthread+0x324/0x6e0 [ 15.624833] ? trace_preempt_on+0x20/0xc0 [ 15.624857] ? __pfx_kthread+0x10/0x10 [ 15.624880] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.624903] ? calculate_sigpending+0x7b/0xa0 [ 15.624927] ? __pfx_kthread+0x10/0x10 [ 15.624950] ret_from_fork+0x41/0x80 [ 15.624970] ? __pfx_kthread+0x10/0x10 [ 15.624993] ret_from_fork_asm+0x1a/0x30 [ 15.625037] </TASK> [ 15.625049] [ 15.632633] Allocated by task 273: [ 15.632791] kasan_save_stack+0x45/0x70 [ 15.633190] kasan_save_track+0x18/0x40 [ 15.633383] kasan_save_alloc_info+0x3b/0x50 [ 15.633589] __kasan_kmalloc+0xb7/0xc0 [ 15.633778] __kmalloc_cache_noprof+0x18a/0x420 [ 15.634339] kasan_atomics+0x96/0x310 [ 15.634482] kunit_try_run_case+0x1a6/0x480 [ 15.634630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.635145] kthread+0x324/0x6e0 [ 15.635321] ret_from_fork+0x41/0x80 [ 15.635506] ret_from_fork_asm+0x1a/0x30 [ 15.635819] [ 15.636005] The buggy address belongs to the object at ffff888101bf3e00 [ 15.636005] which belongs to the cache kmalloc-64 of size 64 [ 15.636458] The buggy address is located 0 bytes to the right of [ 15.636458] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.637049] [ 15.637147] The buggy address belongs to the physical page: [ 15.637384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.637711] flags: 0x200000000000000(node=0|zone=2) [ 15.637913] page_type: f5(slab) [ 15.638100] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.638331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.638711] page dumped because: kasan: bad access detected [ 15.638964] [ 15.639068] Memory state around the buggy address: [ 15.639248] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.639544] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.639757] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.639966] ^ [ 15.640130] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.640343] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.640737] ================================================================== [ 16.061276] ================================================================== [ 16.061582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 16.061872] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.062444] [ 16.062550] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.062590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.062601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.062622] Call Trace: [ 16.062637] <TASK> [ 16.062651] dump_stack_lvl+0x73/0xb0 [ 16.062676] print_report+0xd1/0x650 [ 16.062697] ? __virt_addr_valid+0x1db/0x2d0 [ 16.062720] ? kasan_atomics_helper+0x15b7/0x5450 [ 16.062741] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.062767] ? kasan_atomics_helper+0x15b7/0x5450 [ 16.062789] kasan_report+0x140/0x180 [ 16.062811] ? kasan_atomics_helper+0x15b7/0x5450 [ 16.062837] kasan_check_range+0x10c/0x1c0 [ 16.062861] __kasan_check_write+0x18/0x20 [ 16.062884] kasan_atomics_helper+0x15b7/0x5450 [ 16.062907] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.062930] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.062954] ? kasan_atomics+0x153/0x310 [ 16.062980] kasan_atomics+0x1dd/0x310 [ 16.063003] ? __pfx_kasan_atomics+0x10/0x10 [ 16.063038] ? __pfx_read_tsc+0x10/0x10 [ 16.063061] ? ktime_get_ts64+0x86/0x230 [ 16.063087] kunit_try_run_case+0x1a6/0x480 [ 16.063110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.063133] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.063157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.063182] ? __kthread_parkme+0x82/0x160 [ 16.063205] ? preempt_count_sub+0x50/0x80 [ 16.063230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.063253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.063280] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.063307] kthread+0x324/0x6e0 [ 16.063329] ? trace_preempt_on+0x20/0xc0 [ 16.063353] ? __pfx_kthread+0x10/0x10 [ 16.063375] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.063398] ? calculate_sigpending+0x7b/0xa0 [ 16.063421] ? __pfx_kthread+0x10/0x10 [ 16.063445] ret_from_fork+0x41/0x80 [ 16.063464] ? __pfx_kthread+0x10/0x10 [ 16.063487] ret_from_fork_asm+0x1a/0x30 [ 16.063519] </TASK> [ 16.063531] [ 16.070912] Allocated by task 273: [ 16.071097] kasan_save_stack+0x45/0x70 [ 16.071292] kasan_save_track+0x18/0x40 [ 16.071481] kasan_save_alloc_info+0x3b/0x50 [ 16.071898] __kasan_kmalloc+0xb7/0xc0 [ 16.072121] __kmalloc_cache_noprof+0x18a/0x420 [ 16.072333] kasan_atomics+0x96/0x310 [ 16.072465] kunit_try_run_case+0x1a6/0x480 [ 16.072609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.072785] kthread+0x324/0x6e0 [ 16.072907] ret_from_fork+0x41/0x80 [ 16.073043] ret_from_fork_asm+0x1a/0x30 [ 16.073182] [ 16.073252] The buggy address belongs to the object at ffff888101bf3e00 [ 16.073252] which belongs to the cache kmalloc-64 of size 64 [ 16.074276] The buggy address is located 0 bytes to the right of [ 16.074276] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.075217] [ 16.075308] The buggy address belongs to the physical page: [ 16.075521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.075950] flags: 0x200000000000000(node=0|zone=2) [ 16.076184] page_type: f5(slab) [ 16.076305] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.076534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.076758] page dumped because: kasan: bad access detected [ 16.076928] [ 16.076997] Memory state around the buggy address: [ 16.077302] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.077659] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.077978] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.078296] ^ [ 16.078681] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.079179] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.079621] ================================================================== [ 16.080186] ================================================================== [ 16.080416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 16.080699] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.081038] [ 16.081145] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.081182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.081194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.081215] Call Trace: [ 16.081228] <TASK> [ 16.081243] dump_stack_lvl+0x73/0xb0 [ 16.081267] print_report+0xd1/0x650 [ 16.081289] ? __virt_addr_valid+0x1db/0x2d0 [ 16.081311] ? kasan_atomics_helper+0x1650/0x5450 [ 16.081333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.081360] ? kasan_atomics_helper+0x1650/0x5450 [ 16.081381] kasan_report+0x140/0x180 [ 16.081418] ? kasan_atomics_helper+0x1650/0x5450 [ 16.081446] kasan_check_range+0x10c/0x1c0 [ 16.081469] __kasan_check_write+0x18/0x20 [ 16.081492] kasan_atomics_helper+0x1650/0x5450 [ 16.081515] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.081536] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.081561] ? kasan_atomics+0x153/0x310 [ 16.081587] kasan_atomics+0x1dd/0x310 [ 16.081610] ? __pfx_kasan_atomics+0x10/0x10 [ 16.081634] ? __pfx_read_tsc+0x10/0x10 [ 16.081656] ? ktime_get_ts64+0x86/0x230 [ 16.081682] kunit_try_run_case+0x1a6/0x480 [ 16.081704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.081727] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.081758] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.081783] ? __kthread_parkme+0x82/0x160 [ 16.081805] ? preempt_count_sub+0x50/0x80 [ 16.081831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.081855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.081882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.081909] kthread+0x324/0x6e0 [ 16.081931] ? trace_preempt_on+0x20/0xc0 [ 16.081955] ? __pfx_kthread+0x10/0x10 [ 16.081978] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.082000] ? calculate_sigpending+0x7b/0xa0 [ 16.082033] ? __pfx_kthread+0x10/0x10 [ 16.082057] ret_from_fork+0x41/0x80 [ 16.082076] ? __pfx_kthread+0x10/0x10 [ 16.082099] ret_from_fork_asm+0x1a/0x30 [ 16.082131] </TASK> [ 16.082141] [ 16.090689] Allocated by task 273: [ 16.090821] kasan_save_stack+0x45/0x70 [ 16.090966] kasan_save_track+0x18/0x40 [ 16.091113] kasan_save_alloc_info+0x3b/0x50 [ 16.091326] __kasan_kmalloc+0xb7/0xc0 [ 16.091519] __kmalloc_cache_noprof+0x18a/0x420 [ 16.091749] kasan_atomics+0x96/0x310 [ 16.091945] kunit_try_run_case+0x1a6/0x480 [ 16.093228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.094270] kthread+0x324/0x6e0 [ 16.094853] ret_from_fork+0x41/0x80 [ 16.095493] ret_from_fork_asm+0x1a/0x30 [ 16.096384] [ 16.096791] The buggy address belongs to the object at ffff888101bf3e00 [ 16.096791] which belongs to the cache kmalloc-64 of size 64 [ 16.098276] The buggy address is located 0 bytes to the right of [ 16.098276] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.099044] [ 16.099439] The buggy address belongs to the physical page: [ 16.100336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.101448] flags: 0x200000000000000(node=0|zone=2) [ 16.101994] page_type: f5(slab) [ 16.102527] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.103310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.104100] page dumped because: kasan: bad access detected [ 16.104287] [ 16.104364] Memory state around the buggy address: [ 16.104522] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.105215] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.105916] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.106622] ^ [ 16.107088] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.107751] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.108286] ================================================================== [ 16.209726] ================================================================== [ 16.210063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 16.210355] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.210733] [ 16.210854] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.210905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.210918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.210940] Call Trace: [ 16.210954] <TASK> [ 16.210968] dump_stack_lvl+0x73/0xb0 [ 16.210991] print_report+0xd1/0x650 [ 16.211023] ? __virt_addr_valid+0x1db/0x2d0 [ 16.211056] ? kasan_atomics_helper+0x194b/0x5450 [ 16.211076] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.211103] ? kasan_atomics_helper+0x194b/0x5450 [ 16.211136] kasan_report+0x140/0x180 [ 16.211158] ? kasan_atomics_helper+0x194b/0x5450 [ 16.211184] kasan_check_range+0x10c/0x1c0 [ 16.211208] __kasan_check_write+0x18/0x20 [ 16.211241] kasan_atomics_helper+0x194b/0x5450 [ 16.211263] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.211285] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.211321] ? kasan_atomics+0x153/0x310 [ 16.211346] kasan_atomics+0x1dd/0x310 [ 16.211370] ? __pfx_kasan_atomics+0x10/0x10 [ 16.211394] ? __pfx_read_tsc+0x10/0x10 [ 16.211415] ? ktime_get_ts64+0x86/0x230 [ 16.211440] kunit_try_run_case+0x1a6/0x480 [ 16.211463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.211486] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.211510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.211534] ? __kthread_parkme+0x82/0x160 [ 16.211556] ? preempt_count_sub+0x50/0x80 [ 16.211581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.211613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.211639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.211676] kthread+0x324/0x6e0 [ 16.211699] ? trace_preempt_on+0x20/0xc0 [ 16.211723] ? __pfx_kthread+0x10/0x10 [ 16.211746] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.211768] ? calculate_sigpending+0x7b/0xa0 [ 16.211800] ? __pfx_kthread+0x10/0x10 [ 16.211824] ret_from_fork+0x41/0x80 [ 16.211843] ? __pfx_kthread+0x10/0x10 [ 16.211875] ret_from_fork_asm+0x1a/0x30 [ 16.211908] </TASK> [ 16.211919] [ 16.219549] Allocated by task 273: [ 16.219738] kasan_save_stack+0x45/0x70 [ 16.219989] kasan_save_track+0x18/0x40 [ 16.220191] kasan_save_alloc_info+0x3b/0x50 [ 16.220402] __kasan_kmalloc+0xb7/0xc0 [ 16.220620] __kmalloc_cache_noprof+0x18a/0x420 [ 16.220876] kasan_atomics+0x96/0x310 [ 16.221082] kunit_try_run_case+0x1a6/0x480 [ 16.221228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.221422] kthread+0x324/0x6e0 [ 16.221638] ret_from_fork+0x41/0x80 [ 16.221968] ret_from_fork_asm+0x1a/0x30 [ 16.222236] [ 16.222400] The buggy address belongs to the object at ffff888101bf3e00 [ 16.222400] which belongs to the cache kmalloc-64 of size 64 [ 16.222999] The buggy address is located 0 bytes to the right of [ 16.222999] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.223480] [ 16.223637] The buggy address belongs to the physical page: [ 16.223895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.224143] flags: 0x200000000000000(node=0|zone=2) [ 16.224302] page_type: f5(slab) [ 16.224516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.225268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.225612] page dumped because: kasan: bad access detected [ 16.225896] [ 16.226009] Memory state around the buggy address: [ 16.226258] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.226479] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.226694] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.226940] ^ [ 16.227199] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.227594] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.228001] ================================================================== [ 15.901936] ================================================================== [ 15.902284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 15.902669] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.902907] [ 15.902987] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.903037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.903049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.903071] Call Trace: [ 15.903084] <TASK> [ 15.903099] dump_stack_lvl+0x73/0xb0 [ 15.903125] print_report+0xd1/0x650 [ 15.903146] ? __virt_addr_valid+0x1db/0x2d0 [ 15.903168] ? kasan_atomics_helper+0x12e7/0x5450 [ 15.903190] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.903217] ? kasan_atomics_helper+0x12e7/0x5450 [ 15.903239] kasan_report+0x140/0x180 [ 15.903261] ? kasan_atomics_helper+0x12e7/0x5450 [ 15.903287] kasan_check_range+0x10c/0x1c0 [ 15.903311] __kasan_check_write+0x18/0x20 [ 15.903334] kasan_atomics_helper+0x12e7/0x5450 [ 15.903357] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.903380] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.903405] ? kasan_atomics+0x153/0x310 [ 15.903430] kasan_atomics+0x1dd/0x310 [ 15.903453] ? __pfx_kasan_atomics+0x10/0x10 [ 15.903478] ? __pfx_read_tsc+0x10/0x10 [ 15.903500] ? ktime_get_ts64+0x86/0x230 [ 15.903526] kunit_try_run_case+0x1a6/0x480 [ 15.903550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.903573] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.903596] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.903621] ? __kthread_parkme+0x82/0x160 [ 15.903644] ? preempt_count_sub+0x50/0x80 [ 15.903668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.903692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.903719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.903746] kthread+0x324/0x6e0 [ 15.903847] ? trace_preempt_on+0x20/0xc0 [ 15.903873] ? __pfx_kthread+0x10/0x10 [ 15.903896] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.903920] ? calculate_sigpending+0x7b/0xa0 [ 15.903941] ? __pfx_kthread+0x10/0x10 [ 15.903965] ret_from_fork+0x41/0x80 [ 15.903984] ? __pfx_kthread+0x10/0x10 [ 15.904008] ret_from_fork_asm+0x1a/0x30 [ 15.904050] </TASK> [ 15.904061] [ 15.912263] Allocated by task 273: [ 15.912414] kasan_save_stack+0x45/0x70 [ 15.912678] kasan_save_track+0x18/0x40 [ 15.912818] kasan_save_alloc_info+0x3b/0x50 [ 15.912978] __kasan_kmalloc+0xb7/0xc0 [ 15.913182] __kmalloc_cache_noprof+0x18a/0x420 [ 15.913406] kasan_atomics+0x96/0x310 [ 15.913598] kunit_try_run_case+0x1a6/0x480 [ 15.913787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.914034] kthread+0x324/0x6e0 [ 15.914191] ret_from_fork+0x41/0x80 [ 15.914321] ret_from_fork_asm+0x1a/0x30 [ 15.914492] [ 15.914786] The buggy address belongs to the object at ffff888101bf3e00 [ 15.914786] which belongs to the cache kmalloc-64 of size 64 [ 15.915304] The buggy address is located 0 bytes to the right of [ 15.915304] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.915971] [ 15.916074] The buggy address belongs to the physical page: [ 15.916249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.916653] flags: 0x200000000000000(node=0|zone=2) [ 15.916896] page_type: f5(slab) [ 15.917083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.917406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.917750] page dumped because: kasan: bad access detected [ 15.917978] [ 15.918091] Memory state around the buggy address: [ 15.918305] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.918566] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.918873] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.919153] ^ [ 15.919309] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.919520] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.919730] ================================================================== [ 16.288582] ================================================================== [ 16.288821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 16.289173] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.289539] [ 16.289648] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.289685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.289698] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.289719] Call Trace: [ 16.289739] <TASK> [ 16.289752] dump_stack_lvl+0x73/0xb0 [ 16.289814] print_report+0xd1/0x650 [ 16.289836] ? __virt_addr_valid+0x1db/0x2d0 [ 16.289858] ? kasan_atomics_helper+0x1c19/0x5450 [ 16.289880] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.289906] ? kasan_atomics_helper+0x1c19/0x5450 [ 16.289929] kasan_report+0x140/0x180 [ 16.289951] ? kasan_atomics_helper+0x1c19/0x5450 [ 16.289977] kasan_check_range+0x10c/0x1c0 [ 16.290001] __kasan_check_write+0x18/0x20 [ 16.290036] kasan_atomics_helper+0x1c19/0x5450 [ 16.290059] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.290081] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.290106] ? kasan_atomics+0x153/0x310 [ 16.290132] kasan_atomics+0x1dd/0x310 [ 16.290154] ? __pfx_kasan_atomics+0x10/0x10 [ 16.290179] ? __pfx_read_tsc+0x10/0x10 [ 16.290201] ? ktime_get_ts64+0x86/0x230 [ 16.290227] kunit_try_run_case+0x1a6/0x480 [ 16.290251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.290273] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.290318] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.290344] ? __kthread_parkme+0x82/0x160 [ 16.290366] ? preempt_count_sub+0x50/0x80 [ 16.290390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.290415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.290442] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.290469] kthread+0x324/0x6e0 [ 16.290490] ? trace_preempt_on+0x20/0xc0 [ 16.290514] ? __pfx_kthread+0x10/0x10 [ 16.290537] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.290561] ? calculate_sigpending+0x7b/0xa0 [ 16.290584] ? __pfx_kthread+0x10/0x10 [ 16.290606] ret_from_fork+0x41/0x80 [ 16.290626] ? __pfx_kthread+0x10/0x10 [ 16.290649] ret_from_fork_asm+0x1a/0x30 [ 16.290681] </TASK> [ 16.290691] [ 16.298773] Allocated by task 273: [ 16.299005] kasan_save_stack+0x45/0x70 [ 16.299198] kasan_save_track+0x18/0x40 [ 16.299450] kasan_save_alloc_info+0x3b/0x50 [ 16.299672] __kasan_kmalloc+0xb7/0xc0 [ 16.299908] __kmalloc_cache_noprof+0x18a/0x420 [ 16.300143] kasan_atomics+0x96/0x310 [ 16.300276] kunit_try_run_case+0x1a6/0x480 [ 16.300428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.300857] kthread+0x324/0x6e0 [ 16.301042] ret_from_fork+0x41/0x80 [ 16.301207] ret_from_fork_asm+0x1a/0x30 [ 16.301596] [ 16.301789] The buggy address belongs to the object at ffff888101bf3e00 [ 16.301789] which belongs to the cache kmalloc-64 of size 64 [ 16.302471] The buggy address is located 0 bytes to the right of [ 16.302471] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.303075] [ 16.303150] The buggy address belongs to the physical page: [ 16.303320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.303555] flags: 0x200000000000000(node=0|zone=2) [ 16.304026] page_type: f5(slab) [ 16.304197] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.304636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.305210] page dumped because: kasan: bad access detected [ 16.305428] [ 16.305500] Memory state around the buggy address: [ 16.305949] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.306275] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.306608] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.306915] ^ [ 16.307726] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.307973] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.308207] ================================================================== [ 15.268072] ================================================================== [ 15.268949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 15.269458] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.269749] [ 15.269836] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.269976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.269991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.270181] Call Trace: [ 15.270201] <TASK> [ 15.270218] dump_stack_lvl+0x73/0xb0 [ 15.270269] print_report+0xd1/0x650 [ 15.270292] ? __virt_addr_valid+0x1db/0x2d0 [ 15.270315] ? kasan_atomics_helper+0x4b56/0x5450 [ 15.270446] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.270477] ? kasan_atomics_helper+0x4b56/0x5450 [ 15.270499] kasan_report+0x140/0x180 [ 15.270522] ? kasan_atomics_helper+0x4b56/0x5450 [ 15.270548] __asan_report_load4_noabort+0x18/0x20 [ 15.270573] kasan_atomics_helper+0x4b56/0x5450 [ 15.270596] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.270618] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.270643] ? kasan_atomics+0x153/0x310 [ 15.270670] kasan_atomics+0x1dd/0x310 [ 15.270692] ? __pfx_kasan_atomics+0x10/0x10 [ 15.270716] ? __pfx_read_tsc+0x10/0x10 [ 15.270738] ? ktime_get_ts64+0x86/0x230 [ 15.270764] kunit_try_run_case+0x1a6/0x480 [ 15.270787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.270809] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.270834] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.270858] ? __kthread_parkme+0x82/0x160 [ 15.270880] ? preempt_count_sub+0x50/0x80 [ 15.270905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.270929] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.270956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.270982] kthread+0x324/0x6e0 [ 15.271004] ? trace_preempt_on+0x20/0xc0 [ 15.271040] ? __pfx_kthread+0x10/0x10 [ 15.271063] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.271086] ? calculate_sigpending+0x7b/0xa0 [ 15.271107] ? __pfx_kthread+0x10/0x10 [ 15.271131] ret_from_fork+0x41/0x80 [ 15.271150] ? __pfx_kthread+0x10/0x10 [ 15.271173] ret_from_fork_asm+0x1a/0x30 [ 15.271204] </TASK> [ 15.271216] [ 15.284075] Allocated by task 273: [ 15.284588] kasan_save_stack+0x45/0x70 [ 15.284773] kasan_save_track+0x18/0x40 [ 15.285313] kasan_save_alloc_info+0x3b/0x50 [ 15.285502] __kasan_kmalloc+0xb7/0xc0 [ 15.285706] __kmalloc_cache_noprof+0x18a/0x420 [ 15.286301] kasan_atomics+0x96/0x310 [ 15.286443] kunit_try_run_case+0x1a6/0x480 [ 15.286639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.286979] kthread+0x324/0x6e0 [ 15.287273] ret_from_fork+0x41/0x80 [ 15.287701] ret_from_fork_asm+0x1a/0x30 [ 15.287912] [ 15.287995] The buggy address belongs to the object at ffff888101bf3e00 [ 15.287995] which belongs to the cache kmalloc-64 of size 64 [ 15.288904] The buggy address is located 0 bytes to the right of [ 15.288904] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.289514] [ 15.289639] The buggy address belongs to the physical page: [ 15.289824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.290199] flags: 0x200000000000000(node=0|zone=2) [ 15.290428] page_type: f5(slab) [ 15.290907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.291190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.291666] page dumped because: kasan: bad access detected [ 15.292064] [ 15.292153] Memory state around the buggy address: [ 15.292514] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.292997] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.293317] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.293839] ^ [ 15.294059] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.294373] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.294847] ================================================================== [ 15.792157] ================================================================== [ 15.792494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 15.793096] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.793420] [ 15.793522] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.793560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.793572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.793593] Call Trace: [ 15.793606] <TASK> [ 15.793621] dump_stack_lvl+0x73/0xb0 [ 15.793646] print_report+0xd1/0x650 [ 15.793667] ? __virt_addr_valid+0x1db/0x2d0 [ 15.793690] ? kasan_atomics_helper+0x4a1e/0x5450 [ 15.793714] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.793748] ? kasan_atomics_helper+0x4a1e/0x5450 [ 15.793771] kasan_report+0x140/0x180 [ 15.793795] ? kasan_atomics_helper+0x4a1e/0x5450 [ 15.793821] __asan_report_load4_noabort+0x18/0x20 [ 15.793845] kasan_atomics_helper+0x4a1e/0x5450 [ 15.793868] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.793890] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.793915] ? kasan_atomics+0x153/0x310 [ 15.793941] kasan_atomics+0x1dd/0x310 [ 15.793963] ? __pfx_kasan_atomics+0x10/0x10 [ 15.793989] ? __pfx_read_tsc+0x10/0x10 [ 15.794010] ? ktime_get_ts64+0x86/0x230 [ 15.794046] kunit_try_run_case+0x1a6/0x480 [ 15.794070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.794092] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.794115] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.794139] ? __kthread_parkme+0x82/0x160 [ 15.794162] ? preempt_count_sub+0x50/0x80 [ 15.794186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.794209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.794237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.794263] kthread+0x324/0x6e0 [ 15.794284] ? trace_preempt_on+0x20/0xc0 [ 15.794309] ? __pfx_kthread+0x10/0x10 [ 15.794331] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.794354] ? calculate_sigpending+0x7b/0xa0 [ 15.794376] ? __pfx_kthread+0x10/0x10 [ 15.794400] ret_from_fork+0x41/0x80 [ 15.794419] ? __pfx_kthread+0x10/0x10 [ 15.794442] ret_from_fork_asm+0x1a/0x30 [ 15.794473] </TASK> [ 15.794484] [ 15.803187] Allocated by task 273: [ 15.803325] kasan_save_stack+0x45/0x70 [ 15.803470] kasan_save_track+0x18/0x40 [ 15.803607] kasan_save_alloc_info+0x3b/0x50 [ 15.803753] __kasan_kmalloc+0xb7/0xc0 [ 15.803884] __kmalloc_cache_noprof+0x18a/0x420 [ 15.804050] kasan_atomics+0x96/0x310 [ 15.804186] kunit_try_run_case+0x1a6/0x480 [ 15.805393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.806312] kthread+0x324/0x6e0 [ 15.806972] ret_from_fork+0x41/0x80 [ 15.807922] ret_from_fork_asm+0x1a/0x30 [ 15.808855] [ 15.809131] The buggy address belongs to the object at ffff888101bf3e00 [ 15.809131] which belongs to the cache kmalloc-64 of size 64 [ 15.810929] The buggy address is located 0 bytes to the right of [ 15.810929] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.812361] [ 15.812452] The buggy address belongs to the physical page: [ 15.812986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.813365] flags: 0x200000000000000(node=0|zone=2) [ 15.813546] page_type: f5(slab) [ 15.813899] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.814298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.814785] page dumped because: kasan: bad access detected [ 15.815149] [ 15.815256] Memory state around the buggy address: [ 15.815459] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.815987] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.816448] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.816844] ^ [ 15.817163] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.817460] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.817906] ================================================================== [ 15.492219] ================================================================== [ 15.492545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 15.492840] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.493168] [ 15.493248] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.493287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.493300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.493321] Call Trace: [ 15.493337] <TASK> [ 15.493353] dump_stack_lvl+0x73/0xb0 [ 15.493378] print_report+0xd1/0x650 [ 15.493400] ? __virt_addr_valid+0x1db/0x2d0 [ 15.493489] ? kasan_atomics_helper+0x8fa/0x5450 [ 15.493511] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.493537] ? kasan_atomics_helper+0x8fa/0x5450 [ 15.493559] kasan_report+0x140/0x180 [ 15.493582] ? kasan_atomics_helper+0x8fa/0x5450 [ 15.493608] kasan_check_range+0x10c/0x1c0 [ 15.493632] __kasan_check_write+0x18/0x20 [ 15.493655] kasan_atomics_helper+0x8fa/0x5450 [ 15.493677] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.493980] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.494030] ? kasan_atomics+0x153/0x310 [ 15.494057] kasan_atomics+0x1dd/0x310 [ 15.494081] ? __pfx_kasan_atomics+0x10/0x10 [ 15.494105] ? __pfx_read_tsc+0x10/0x10 [ 15.494151] ? ktime_get_ts64+0x86/0x230 [ 15.494178] kunit_try_run_case+0x1a6/0x480 [ 15.494202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.494225] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.494250] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.494275] ? __kthread_parkme+0x82/0x160 [ 15.494318] ? preempt_count_sub+0x50/0x80 [ 15.494344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.494368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.494394] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.494422] kthread+0x324/0x6e0 [ 15.494444] ? trace_preempt_on+0x20/0xc0 [ 15.494468] ? __pfx_kthread+0x10/0x10 [ 15.494491] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.494514] ? calculate_sigpending+0x7b/0xa0 [ 15.494536] ? __pfx_kthread+0x10/0x10 [ 15.494560] ret_from_fork+0x41/0x80 [ 15.494746] ? __pfx_kthread+0x10/0x10 [ 15.494772] ret_from_fork_asm+0x1a/0x30 [ 15.494805] </TASK> [ 15.494816] [ 15.503086] Allocated by task 273: [ 15.503415] kasan_save_stack+0x45/0x70 [ 15.503631] kasan_save_track+0x18/0x40 [ 15.503827] kasan_save_alloc_info+0x3b/0x50 [ 15.503984] __kasan_kmalloc+0xb7/0xc0 [ 15.504128] __kmalloc_cache_noprof+0x18a/0x420 [ 15.504282] kasan_atomics+0x96/0x310 [ 15.504465] kunit_try_run_case+0x1a6/0x480 [ 15.504797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.505059] kthread+0x324/0x6e0 [ 15.505318] ret_from_fork+0x41/0x80 [ 15.505452] ret_from_fork_asm+0x1a/0x30 [ 15.505778] [ 15.505876] The buggy address belongs to the object at ffff888101bf3e00 [ 15.505876] which belongs to the cache kmalloc-64 of size 64 [ 15.506459] The buggy address is located 0 bytes to the right of [ 15.506459] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.507143] [ 15.507250] The buggy address belongs to the physical page: [ 15.507510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.507885] flags: 0x200000000000000(node=0|zone=2) [ 15.508078] page_type: f5(slab) [ 15.508288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.508757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.509195] page dumped because: kasan: bad access detected [ 15.509414] [ 15.509511] Memory state around the buggy address: [ 15.509858] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.510141] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.510471] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.510736] ^ [ 15.510967] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.511504] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.511732] ================================================================== [ 15.295543] ================================================================== [ 15.296499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 15.297158] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.297684] [ 15.297916] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.297962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.297976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.297996] Call Trace: [ 15.298012] <TASK> [ 15.298043] dump_stack_lvl+0x73/0xb0 [ 15.298070] print_report+0xd1/0x650 [ 15.298092] ? __virt_addr_valid+0x1db/0x2d0 [ 15.298137] ? kasan_atomics_helper+0x4a1/0x5450 [ 15.298159] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.298186] ? kasan_atomics_helper+0x4a1/0x5450 [ 15.298208] kasan_report+0x140/0x180 [ 15.298230] ? kasan_atomics_helper+0x4a1/0x5450 [ 15.298256] kasan_check_range+0x10c/0x1c0 [ 15.298280] __kasan_check_write+0x18/0x20 [ 15.298303] kasan_atomics_helper+0x4a1/0x5450 [ 15.298326] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.298349] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.298374] ? kasan_atomics+0x153/0x310 [ 15.298402] kasan_atomics+0x1dd/0x310 [ 15.298425] ? __pfx_kasan_atomics+0x10/0x10 [ 15.298449] ? __pfx_read_tsc+0x10/0x10 [ 15.298472] ? ktime_get_ts64+0x86/0x230 [ 15.298497] kunit_try_run_case+0x1a6/0x480 [ 15.298521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.298543] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.298568] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.298592] ? __kthread_parkme+0x82/0x160 [ 15.298614] ? preempt_count_sub+0x50/0x80 [ 15.298639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.298662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.298688] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.298716] kthread+0x324/0x6e0 [ 15.298738] ? trace_preempt_on+0x20/0xc0 [ 15.298761] ? __pfx_kthread+0x10/0x10 [ 15.298784] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.298807] ? calculate_sigpending+0x7b/0xa0 [ 15.298830] ? __pfx_kthread+0x10/0x10 [ 15.298853] ret_from_fork+0x41/0x80 [ 15.298872] ? __pfx_kthread+0x10/0x10 [ 15.298895] ret_from_fork_asm+0x1a/0x30 [ 15.298926] </TASK> [ 15.298937] [ 15.310979] Allocated by task 273: [ 15.311116] kasan_save_stack+0x45/0x70 [ 15.311259] kasan_save_track+0x18/0x40 [ 15.311391] kasan_save_alloc_info+0x3b/0x50 [ 15.311533] __kasan_kmalloc+0xb7/0xc0 [ 15.311892] __kmalloc_cache_noprof+0x18a/0x420 [ 15.312327] kasan_atomics+0x96/0x310 [ 15.312695] kunit_try_run_case+0x1a6/0x480 [ 15.313192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.313717] kthread+0x324/0x6e0 [ 15.314070] ret_from_fork+0x41/0x80 [ 15.314393] ret_from_fork_asm+0x1a/0x30 [ 15.314811] [ 15.314995] The buggy address belongs to the object at ffff888101bf3e00 [ 15.314995] which belongs to the cache kmalloc-64 of size 64 [ 15.316264] The buggy address is located 0 bytes to the right of [ 15.316264] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.317550] [ 15.317715] The buggy address belongs to the physical page: [ 15.318181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.318570] flags: 0x200000000000000(node=0|zone=2) [ 15.319084] page_type: f5(slab) [ 15.319410] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.320195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.320860] page dumped because: kasan: bad access detected [ 15.321084] [ 15.321155] Memory state around the buggy address: [ 15.321304] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.321508] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.322095] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.322807] ^ [ 15.323248] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.323996] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.324694] ================================================================== [ 16.108713] ================================================================== [ 16.109323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 16.109994] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 16.110790] [ 16.111157] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 16.111202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.111215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.111237] Call Trace: [ 16.111249] <TASK> [ 16.111266] dump_stack_lvl+0x73/0xb0 [ 16.111460] print_report+0xd1/0x650 [ 16.111497] ? __virt_addr_valid+0x1db/0x2d0 [ 16.111520] ? kasan_atomics_helper+0x16e8/0x5450 [ 16.111541] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.111580] ? kasan_atomics_helper+0x16e8/0x5450 [ 16.111601] kasan_report+0x140/0x180 [ 16.111624] ? kasan_atomics_helper+0x16e8/0x5450 [ 16.111662] kasan_check_range+0x10c/0x1c0 [ 16.111686] __kasan_check_write+0x18/0x20 [ 16.111710] kasan_atomics_helper+0x16e8/0x5450 [ 16.111744] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.111765] ? __kmalloc_cache_noprof+0x18a/0x420 [ 16.111791] ? kasan_atomics+0x153/0x310 [ 16.111828] kasan_atomics+0x1dd/0x310 [ 16.111851] ? __pfx_kasan_atomics+0x10/0x10 [ 16.111886] ? __pfx_read_tsc+0x10/0x10 [ 16.111908] ? ktime_get_ts64+0x86/0x230 [ 16.111934] kunit_try_run_case+0x1a6/0x480 [ 16.111968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.111991] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.112031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.112056] ? __kthread_parkme+0x82/0x160 [ 16.112079] ? preempt_count_sub+0x50/0x80 [ 16.112116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.112140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.112167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.112206] kthread+0x324/0x6e0 [ 16.112228] ? trace_preempt_on+0x20/0xc0 [ 16.112263] ? __pfx_kthread+0x10/0x10 [ 16.112286] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.112309] ? calculate_sigpending+0x7b/0xa0 [ 16.112344] ? __pfx_kthread+0x10/0x10 [ 16.112367] ret_from_fork+0x41/0x80 [ 16.112386] ? __pfx_kthread+0x10/0x10 [ 16.112419] ret_from_fork_asm+0x1a/0x30 [ 16.112451] </TASK> [ 16.112462] [ 16.125258] Allocated by task 273: [ 16.125391] kasan_save_stack+0x45/0x70 [ 16.125534] kasan_save_track+0x18/0x40 [ 16.125912] kasan_save_alloc_info+0x3b/0x50 [ 16.126312] __kasan_kmalloc+0xb7/0xc0 [ 16.126683] __kmalloc_cache_noprof+0x18a/0x420 [ 16.127111] kasan_atomics+0x96/0x310 [ 16.127473] kunit_try_run_case+0x1a6/0x480 [ 16.127905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.128408] kthread+0x324/0x6e0 [ 16.128753] ret_from_fork+0x41/0x80 [ 16.129142] ret_from_fork_asm+0x1a/0x30 [ 16.129531] [ 16.129724] The buggy address belongs to the object at ffff888101bf3e00 [ 16.129724] which belongs to the cache kmalloc-64 of size 64 [ 16.130333] The buggy address is located 0 bytes to the right of [ 16.130333] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 16.131027] [ 16.131203] The buggy address belongs to the physical page: [ 16.131723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 16.132428] flags: 0x200000000000000(node=0|zone=2) [ 16.132942] page_type: f5(slab) [ 16.133289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.133522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.134220] page dumped because: kasan: bad access detected [ 16.134767] [ 16.134990] Memory state around the buggy address: [ 16.135410] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.135653] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.136225] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.136437] ^ [ 16.136618] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.137265] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.137953] ================================================================== [ 15.450105] ================================================================== [ 15.450353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 15.450748] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.451094] [ 15.451215] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.451255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.451268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.451291] Call Trace: [ 15.451307] <TASK> [ 15.451322] dump_stack_lvl+0x73/0xb0 [ 15.451346] print_report+0xd1/0x650 [ 15.451369] ? __virt_addr_valid+0x1db/0x2d0 [ 15.451392] ? kasan_atomics_helper+0x7c8/0x5450 [ 15.451414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.451442] ? kasan_atomics_helper+0x7c8/0x5450 [ 15.451467] kasan_report+0x140/0x180 [ 15.451490] ? kasan_atomics_helper+0x7c8/0x5450 [ 15.451517] kasan_check_range+0x10c/0x1c0 [ 15.451540] __kasan_check_write+0x18/0x20 [ 15.451588] kasan_atomics_helper+0x7c8/0x5450 [ 15.451611] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.451634] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.451678] ? kasan_atomics+0x153/0x310 [ 15.451704] kasan_atomics+0x1dd/0x310 [ 15.451728] ? __pfx_kasan_atomics+0x10/0x10 [ 15.451752] ? __pfx_read_tsc+0x10/0x10 [ 15.451774] ? ktime_get_ts64+0x86/0x230 [ 15.451801] kunit_try_run_case+0x1a6/0x480 [ 15.451823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.451846] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.451870] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.451895] ? __kthread_parkme+0x82/0x160 [ 15.451918] ? preempt_count_sub+0x50/0x80 [ 15.451943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.451967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.451994] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.452030] kthread+0x324/0x6e0 [ 15.452053] ? trace_preempt_on+0x20/0xc0 [ 15.452077] ? __pfx_kthread+0x10/0x10 [ 15.452100] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.452123] ? calculate_sigpending+0x7b/0xa0 [ 15.452145] ? __pfx_kthread+0x10/0x10 [ 15.452169] ret_from_fork+0x41/0x80 [ 15.452188] ? __pfx_kthread+0x10/0x10 [ 15.452211] ret_from_fork_asm+0x1a/0x30 [ 15.452243] </TASK> [ 15.452255] [ 15.459540] Allocated by task 273: [ 15.459788] kasan_save_stack+0x45/0x70 [ 15.460056] kasan_save_track+0x18/0x40 [ 15.460249] kasan_save_alloc_info+0x3b/0x50 [ 15.460465] __kasan_kmalloc+0xb7/0xc0 [ 15.460686] __kmalloc_cache_noprof+0x18a/0x420 [ 15.460921] kasan_atomics+0x96/0x310 [ 15.461124] kunit_try_run_case+0x1a6/0x480 [ 15.461426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.461764] kthread+0x324/0x6e0 [ 15.461888] ret_from_fork+0x41/0x80 [ 15.462079] ret_from_fork_asm+0x1a/0x30 [ 15.462279] [ 15.462378] The buggy address belongs to the object at ffff888101bf3e00 [ 15.462378] which belongs to the cache kmalloc-64 of size 64 [ 15.462855] The buggy address is located 0 bytes to the right of [ 15.462855] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.463357] [ 15.463454] The buggy address belongs to the physical page: [ 15.463783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.464140] flags: 0x200000000000000(node=0|zone=2) [ 15.464344] page_type: f5(slab) [ 15.464468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.464724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.464949] page dumped because: kasan: bad access detected [ 15.465178] [ 15.465272] Memory state around the buggy address: [ 15.465495] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.465939] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.466218] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.466523] ^ [ 15.466710] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.466924] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.467146] ================================================================== [ 15.372932] ================================================================== [ 15.373208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 15.373541] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273 [ 15.374144] [ 15.374348] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.374430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.374445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.374468] Call Trace: [ 15.374483] <TASK> [ 15.374499] dump_stack_lvl+0x73/0xb0 [ 15.374525] print_report+0xd1/0x650 [ 15.374548] ? __virt_addr_valid+0x1db/0x2d0 [ 15.374571] ? kasan_atomics_helper+0x5ff/0x5450 [ 15.374592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.374618] ? kasan_atomics_helper+0x5ff/0x5450 [ 15.374640] kasan_report+0x140/0x180 [ 15.374663] ? kasan_atomics_helper+0x5ff/0x5450 [ 15.374689] kasan_check_range+0x10c/0x1c0 [ 15.374713] __kasan_check_write+0x18/0x20 [ 15.374736] kasan_atomics_helper+0x5ff/0x5450 [ 15.374760] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.374783] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.374808] ? kasan_atomics+0x153/0x310 [ 15.374834] kasan_atomics+0x1dd/0x310 [ 15.374857] ? __pfx_kasan_atomics+0x10/0x10 [ 15.374881] ? __pfx_read_tsc+0x10/0x10 [ 15.374904] ? ktime_get_ts64+0x86/0x230 [ 15.374930] kunit_try_run_case+0x1a6/0x480 [ 15.374953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.374975] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.375000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.375036] ? __kthread_parkme+0x82/0x160 [ 15.375059] ? preempt_count_sub+0x50/0x80 [ 15.375084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.375108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.375135] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.375162] kthread+0x324/0x6e0 [ 15.375184] ? trace_preempt_on+0x20/0xc0 [ 15.375208] ? __pfx_kthread+0x10/0x10 [ 15.375231] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.375255] ? calculate_sigpending+0x7b/0xa0 [ 15.375278] ? __pfx_kthread+0x10/0x10 [ 15.375302] ret_from_fork+0x41/0x80 [ 15.375322] ? __pfx_kthread+0x10/0x10 [ 15.375345] ret_from_fork_asm+0x1a/0x30 [ 15.375378] </TASK> [ 15.375390] [ 15.386896] Allocated by task 273: [ 15.387281] kasan_save_stack+0x45/0x70 [ 15.387452] kasan_save_track+0x18/0x40 [ 15.387891] kasan_save_alloc_info+0x3b/0x50 [ 15.388085] __kasan_kmalloc+0xb7/0xc0 [ 15.388302] __kmalloc_cache_noprof+0x18a/0x420 [ 15.388714] kasan_atomics+0x96/0x310 [ 15.388881] kunit_try_run_case+0x1a6/0x480 [ 15.389243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.389531] kthread+0x324/0x6e0 [ 15.389888] ret_from_fork+0x41/0x80 [ 15.390093] ret_from_fork_asm+0x1a/0x30 [ 15.390287] [ 15.390359] The buggy address belongs to the object at ffff888101bf3e00 [ 15.390359] which belongs to the cache kmalloc-64 of size 64 [ 15.390971] The buggy address is located 0 bytes to the right of [ 15.390971] allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30) [ 15.391854] [ 15.391955] The buggy address belongs to the physical page: [ 15.392192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3 [ 15.392544] flags: 0x200000000000000(node=0|zone=2) [ 15.392914] page_type: f5(slab) [ 15.393464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.393895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.394458] page dumped because: kasan: bad access detected [ 15.394728] [ 15.395028] Memory state around the buggy address: [ 15.395327] ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.395766] ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.396172] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.396495] ^ [ 15.396877] ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.397167] ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.397472] ==================================================================