Date
June 2, 2025, 2:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 60.660209] ================================================================== [ 60.667273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 60.674650] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 60.682029] [ 60.683510] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 60.683558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.683574] Hardware name: WinLink E850-96 board (DT) [ 60.683593] Call trace: [ 60.683606] show_stack+0x20/0x38 (C) [ 60.683638] dump_stack_lvl+0x8c/0xd0 [ 60.683668] print_report+0x118/0x608 [ 60.683697] kasan_report+0xdc/0x128 [ 60.683725] kasan_check_range+0x100/0x1a8 [ 60.683755] __kasan_check_write+0x20/0x30 [ 60.683785] kasan_atomics_helper+0x175c/0x4858 [ 60.683815] kasan_atomics+0x198/0x2e0 [ 60.683843] kunit_try_run_case+0x170/0x3f0 [ 60.683873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.683912] kthread+0x328/0x630 [ 60.683941] ret_from_fork+0x10/0x20 [ 60.683976] [ 60.753815] Allocated by task 312: [ 60.757203] kasan_save_stack+0x3c/0x68 [ 60.761020] kasan_save_track+0x20/0x40 [ 60.764840] kasan_save_alloc_info+0x40/0x58 [ 60.769094] __kasan_kmalloc+0xd4/0xd8 [ 60.772826] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.777339] kasan_atomics+0xb8/0x2e0 [ 60.780985] kunit_try_run_case+0x170/0x3f0 [ 60.785152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.790621] kthread+0x328/0x630 [ 60.793832] ret_from_fork+0x10/0x20 [ 60.797391] [ 60.798869] The buggy address belongs to the object at ffff000800c2d400 [ 60.798869] which belongs to the cache kmalloc-64 of size 64 [ 60.811194] The buggy address is located 0 bytes to the right of [ 60.811194] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 60.824040] [ 60.825516] The buggy address belongs to the physical page: [ 60.831072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 60.839059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.845568] page_type: f5(slab) [ 60.848700] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.856425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.864144] page dumped because: kasan: bad access detected [ 60.869699] [ 60.871175] Memory state around the buggy address: [ 60.875955] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.883158] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.890363] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.897564] ^ [ 60.902341] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.909546] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.916747] ================================================================== [ 49.357630] ================================================================== [ 49.364667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 49.371956] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 49.379333] [ 49.380816] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 49.380862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.380877] Hardware name: WinLink E850-96 board (DT) [ 49.380897] Call trace: [ 49.380908] show_stack+0x20/0x38 (C) [ 49.380941] dump_stack_lvl+0x8c/0xd0 [ 49.380975] print_report+0x118/0x608 [ 49.381003] kasan_report+0xdc/0x128 [ 49.381031] kasan_check_range+0x100/0x1a8 [ 49.381061] __kasan_check_write+0x20/0x30 [ 49.381094] kasan_atomics_helper+0x894/0x4858 [ 49.381123] kasan_atomics+0x198/0x2e0 [ 49.381149] kunit_try_run_case+0x170/0x3f0 [ 49.381184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.381221] kthread+0x328/0x630 [ 49.381251] ret_from_fork+0x10/0x20 [ 49.381283] [ 49.451034] Allocated by task 312: [ 49.454421] kasan_save_stack+0x3c/0x68 [ 49.458239] kasan_save_track+0x20/0x40 [ 49.462058] kasan_save_alloc_info+0x40/0x58 [ 49.466312] __kasan_kmalloc+0xd4/0xd8 [ 49.470044] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.474558] kasan_atomics+0xb8/0x2e0 [ 49.478204] kunit_try_run_case+0x170/0x3f0 [ 49.482370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.487839] kthread+0x328/0x630 [ 49.491051] ret_from_fork+0x10/0x20 [ 49.494610] [ 49.496085] The buggy address belongs to the object at ffff000800c2d400 [ 49.496085] which belongs to the cache kmalloc-64 of size 64 [ 49.508412] The buggy address is located 0 bytes to the right of [ 49.508412] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 49.521259] [ 49.522735] The buggy address belongs to the physical page: [ 49.528291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 49.536279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.542786] page_type: f5(slab) [ 49.545919] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.553643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.561362] page dumped because: kasan: bad access detected [ 49.566917] [ 49.568393] Memory state around the buggy address: [ 49.573173] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.580376] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.587581] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.594782] ^ [ 49.599560] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.606764] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.613966] ================================================================== [ 49.093862] ================================================================== [ 49.100956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 49.108245] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 49.115623] [ 49.117105] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 49.117149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.117166] Hardware name: WinLink E850-96 board (DT) [ 49.117183] Call trace: [ 49.117196] show_stack+0x20/0x38 (C) [ 49.117226] dump_stack_lvl+0x8c/0xd0 [ 49.117257] print_report+0x118/0x608 [ 49.117287] kasan_report+0xdc/0x128 [ 49.117314] kasan_check_range+0x100/0x1a8 [ 49.117347] __kasan_check_write+0x20/0x30 [ 49.117380] kasan_atomics_helper+0x7cc/0x4858 [ 49.117407] kasan_atomics+0x198/0x2e0 [ 49.117434] kunit_try_run_case+0x170/0x3f0 [ 49.117468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.117504] kthread+0x328/0x630 [ 49.117535] ret_from_fork+0x10/0x20 [ 49.117566] [ 49.187322] Allocated by task 312: [ 49.190709] kasan_save_stack+0x3c/0x68 [ 49.194528] kasan_save_track+0x20/0x40 [ 49.198347] kasan_save_alloc_info+0x40/0x58 [ 49.202600] __kasan_kmalloc+0xd4/0xd8 [ 49.206333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.210847] kasan_atomics+0xb8/0x2e0 [ 49.214493] kunit_try_run_case+0x170/0x3f0 [ 49.218659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.224127] kthread+0x328/0x630 [ 49.227339] ret_from_fork+0x10/0x20 [ 49.230899] [ 49.232374] The buggy address belongs to the object at ffff000800c2d400 [ 49.232374] which belongs to the cache kmalloc-64 of size 64 [ 49.244701] The buggy address is located 0 bytes to the right of [ 49.244701] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 49.257547] [ 49.259023] The buggy address belongs to the physical page: [ 49.264580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 49.272567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.279075] page_type: f5(slab) [ 49.282208] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.289932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.297651] page dumped because: kasan: bad access detected [ 49.303206] [ 49.304682] Memory state around the buggy address: [ 49.309461] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.316665] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.323869] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.331071] ^ [ 49.335849] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.343053] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.350255] ================================================================== [ 44.353258] ================================================================== [ 44.367351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 44.374722] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 44.382013] [ 44.383500] CPU: 5 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 44.383554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.383570] Hardware name: WinLink E850-96 board (DT) [ 44.383594] Call trace: [ 44.383607] show_stack+0x20/0x38 (C) [ 44.383640] dump_stack_lvl+0x8c/0xd0 [ 44.383678] print_report+0x118/0x608 [ 44.383712] kasan_report+0xdc/0x128 [ 44.383742] __asan_report_load4_noabort+0x20/0x30 [ 44.383779] kasan_atomics_helper+0x40a8/0x4858 [ 44.383810] kasan_atomics+0x198/0x2e0 [ 44.383840] kunit_try_run_case+0x170/0x3f0 [ 44.383878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.383918] kthread+0x328/0x630 [ 44.383956] ret_from_fork+0x10/0x20 [ 44.383993] [ 44.450416] Allocated by task 312: [ 44.453803] kasan_save_stack+0x3c/0x68 [ 44.457621] kasan_save_track+0x20/0x40 [ 44.461440] kasan_save_alloc_info+0x40/0x58 [ 44.465692] __kasan_kmalloc+0xd4/0xd8 [ 44.469425] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.473938] kasan_atomics+0xb8/0x2e0 [ 44.477584] kunit_try_run_case+0x170/0x3f0 [ 44.481751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.487221] kthread+0x328/0x630 [ 44.490431] ret_from_fork+0x10/0x20 [ 44.493990] [ 44.495469] The buggy address belongs to the object at ffff000800c2d400 [ 44.495469] which belongs to the cache kmalloc-64 of size 64 [ 44.507795] The buggy address is located 0 bytes to the right of [ 44.507795] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 44.520639] [ 44.522117] The buggy address belongs to the physical page: [ 44.527675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 44.535660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.542169] page_type: f5(slab) [ 44.545309] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 44.553024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.560745] page dumped because: kasan: bad access detected [ 44.566300] [ 44.567774] Memory state around the buggy address: [ 44.572556] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.579757] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.586963] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 44.594162] ^ [ 44.598941] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.606145] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.613348] ================================================================== [ 46.984209] ================================================================== [ 46.991263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 46.998554] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 47.005932] [ 47.007415] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 47.007459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.007476] Hardware name: WinLink E850-96 board (DT) [ 47.007497] Call trace: [ 47.007511] show_stack+0x20/0x38 (C) [ 47.007542] dump_stack_lvl+0x8c/0xd0 [ 47.007574] print_report+0x118/0x608 [ 47.007603] kasan_report+0xdc/0x128 [ 47.007631] kasan_check_range+0x100/0x1a8 [ 47.007664] __kasan_check_write+0x20/0x30 [ 47.007696] kasan_atomics_helper+0x47c/0x4858 [ 47.007724] kasan_atomics+0x198/0x2e0 [ 47.007752] kunit_try_run_case+0x170/0x3f0 [ 47.007784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.007822] kthread+0x328/0x630 [ 47.007855] ret_from_fork+0x10/0x20 [ 47.007889] [ 47.077632] Allocated by task 312: [ 47.081020] kasan_save_stack+0x3c/0x68 [ 47.084837] kasan_save_track+0x20/0x40 [ 47.088656] kasan_save_alloc_info+0x40/0x58 [ 47.092910] __kasan_kmalloc+0xd4/0xd8 [ 47.096642] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.101156] kasan_atomics+0xb8/0x2e0 [ 47.104802] kunit_try_run_case+0x170/0x3f0 [ 47.108969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.114437] kthread+0x328/0x630 [ 47.117649] ret_from_fork+0x10/0x20 [ 47.121208] [ 47.122686] The buggy address belongs to the object at ffff000800c2d400 [ 47.122686] which belongs to the cache kmalloc-64 of size 64 [ 47.135010] The buggy address is located 0 bytes to the right of [ 47.135010] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 47.147857] [ 47.149333] The buggy address belongs to the physical page: [ 47.154890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 47.162876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.169385] page_type: f5(slab) [ 47.172518] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.180241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.187960] page dumped because: kasan: bad access detected [ 47.193516] [ 47.194991] Memory state around the buggy address: [ 47.199771] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.206974] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.214179] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.221380] ^ [ 47.226158] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.233362] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.240564] ================================================================== [ 48.830174] ================================================================== [ 48.837243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 48.844533] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 48.851911] [ 48.853393] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 48.853441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.853458] Hardware name: WinLink E850-96 board (DT) [ 48.853477] Call trace: [ 48.853488] show_stack+0x20/0x38 (C) [ 48.853520] dump_stack_lvl+0x8c/0xd0 [ 48.853553] print_report+0x118/0x608 [ 48.853581] kasan_report+0xdc/0x128 [ 48.853609] kasan_check_range+0x100/0x1a8 [ 48.853639] __kasan_check_write+0x20/0x30 [ 48.853671] kasan_atomics_helper+0x760/0x4858 [ 48.853702] kasan_atomics+0x198/0x2e0 [ 48.853730] kunit_try_run_case+0x170/0x3f0 [ 48.853763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.853801] kthread+0x328/0x630 [ 48.853831] ret_from_fork+0x10/0x20 [ 48.853864] [ 48.923612] Allocated by task 312: [ 48.926997] kasan_save_stack+0x3c/0x68 [ 48.930816] kasan_save_track+0x20/0x40 [ 48.934635] kasan_save_alloc_info+0x40/0x58 [ 48.938889] __kasan_kmalloc+0xd4/0xd8 [ 48.942622] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.947135] kasan_atomics+0xb8/0x2e0 [ 48.950781] kunit_try_run_case+0x170/0x3f0 [ 48.954948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.960416] kthread+0x328/0x630 [ 48.963628] ret_from_fork+0x10/0x20 [ 48.967187] [ 48.968663] The buggy address belongs to the object at ffff000800c2d400 [ 48.968663] which belongs to the cache kmalloc-64 of size 64 [ 48.980989] The buggy address is located 0 bytes to the right of [ 48.980989] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 48.993836] [ 48.995314] The buggy address belongs to the physical page: [ 49.000871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 49.008855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.015363] page_type: f5(slab) [ 49.018496] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.026221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.033940] page dumped because: kasan: bad access detected [ 49.039495] [ 49.040971] Memory state around the buggy address: [ 49.045749] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.052954] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.060158] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.067359] ^ [ 49.072137] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.079342] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.086543] ================================================================== [ 55.396540] ================================================================== [ 55.403637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 55.410927] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 55.418306] [ 55.419788] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 55.419835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.419854] Hardware name: WinLink E850-96 board (DT) [ 55.419873] Call trace: [ 55.419886] show_stack+0x20/0x38 (C) [ 55.419916] dump_stack_lvl+0x8c/0xd0 [ 55.419948] print_report+0x118/0x608 [ 55.419976] kasan_report+0xdc/0x128 [ 55.420006] kasan_check_range+0x100/0x1a8 [ 55.420037] __kasan_check_write+0x20/0x30 [ 55.420072] kasan_atomics_helper+0xff0/0x4858 [ 55.420100] kasan_atomics+0x198/0x2e0 [ 55.420128] kunit_try_run_case+0x170/0x3f0 [ 55.420162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.420199] kthread+0x328/0x630 [ 55.420231] ret_from_fork+0x10/0x20 [ 55.420262] [ 55.490006] Allocated by task 312: [ 55.493393] kasan_save_stack+0x3c/0x68 [ 55.497211] kasan_save_track+0x20/0x40 [ 55.501030] kasan_save_alloc_info+0x40/0x58 [ 55.505283] __kasan_kmalloc+0xd4/0xd8 [ 55.509016] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.513530] kasan_atomics+0xb8/0x2e0 [ 55.517175] kunit_try_run_case+0x170/0x3f0 [ 55.521342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.526811] kthread+0x328/0x630 [ 55.530023] ret_from_fork+0x10/0x20 [ 55.533582] [ 55.535057] The buggy address belongs to the object at ffff000800c2d400 [ 55.535057] which belongs to the cache kmalloc-64 of size 64 [ 55.547384] The buggy address is located 0 bytes to the right of [ 55.547384] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 55.560230] [ 55.561706] The buggy address belongs to the physical page: [ 55.567263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 55.575250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.581759] page_type: f5(slab) [ 55.584892] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.592615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.600334] page dumped because: kasan: bad access detected [ 55.605889] [ 55.607365] Memory state around the buggy address: [ 55.612143] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.619348] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.626552] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.633754] ^ [ 55.638532] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.645736] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.652938] ================================================================== [ 45.672021] ================================================================== [ 45.679133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 45.686508] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 45.693799] [ 45.695284] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 45.695332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.695348] Hardware name: WinLink E850-96 board (DT) [ 45.695371] Call trace: [ 45.695386] show_stack+0x20/0x38 (C) [ 45.695418] dump_stack_lvl+0x8c/0xd0 [ 45.695453] print_report+0x118/0x608 [ 45.695484] kasan_report+0xdc/0x128 [ 45.695512] __asan_report_load4_noabort+0x20/0x30 [ 45.695547] kasan_atomics_helper+0x40fc/0x4858 [ 45.695576] kasan_atomics+0x198/0x2e0 [ 45.695606] kunit_try_run_case+0x170/0x3f0 [ 45.695641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.695677] kthread+0x328/0x630 [ 45.695708] ret_from_fork+0x10/0x20 [ 45.695741] [ 45.762200] Allocated by task 312: [ 45.765586] kasan_save_stack+0x3c/0x68 [ 45.769406] kasan_save_track+0x20/0x40 [ 45.773225] kasan_save_alloc_info+0x40/0x58 [ 45.777478] __kasan_kmalloc+0xd4/0xd8 [ 45.781211] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.785724] kasan_atomics+0xb8/0x2e0 [ 45.789370] kunit_try_run_case+0x170/0x3f0 [ 45.793537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.799006] kthread+0x328/0x630 [ 45.802217] ret_from_fork+0x10/0x20 [ 45.805776] [ 45.807253] The buggy address belongs to the object at ffff000800c2d400 [ 45.807253] which belongs to the cache kmalloc-64 of size 64 [ 45.819579] The buggy address is located 0 bytes to the right of [ 45.819579] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 45.832425] [ 45.833902] The buggy address belongs to the physical page: [ 45.839460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 45.847445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.853952] page_type: f5(slab) [ 45.857088] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.864810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.872528] page dumped because: kasan: bad access detected [ 45.878085] [ 45.879560] Memory state around the buggy address: [ 45.884339] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.891542] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.898747] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.905948] ^ [ 45.910726] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.917931] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.925132] ================================================================== [ 55.660301] ================================================================== [ 55.667349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 55.674726] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 55.682104] [ 55.683585] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 55.683632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.683646] Hardware name: WinLink E850-96 board (DT) [ 55.683665] Call trace: [ 55.683677] show_stack+0x20/0x38 (C) [ 55.683706] dump_stack_lvl+0x8c/0xd0 [ 55.683738] print_report+0x118/0x608 [ 55.683765] kasan_report+0xdc/0x128 [ 55.683793] kasan_check_range+0x100/0x1a8 [ 55.683823] __kasan_check_write+0x20/0x30 [ 55.683853] kasan_atomics_helper+0x1058/0x4858 [ 55.683882] kasan_atomics+0x198/0x2e0 [ 55.683909] kunit_try_run_case+0x170/0x3f0 [ 55.683943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.683981] kthread+0x328/0x630 [ 55.684013] ret_from_fork+0x10/0x20 [ 55.684045] [ 55.753891] Allocated by task 312: [ 55.757278] kasan_save_stack+0x3c/0x68 [ 55.761096] kasan_save_track+0x20/0x40 [ 55.764915] kasan_save_alloc_info+0x40/0x58 [ 55.769169] __kasan_kmalloc+0xd4/0xd8 [ 55.772901] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.777415] kasan_atomics+0xb8/0x2e0 [ 55.781061] kunit_try_run_case+0x170/0x3f0 [ 55.785227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.790696] kthread+0x328/0x630 [ 55.793908] ret_from_fork+0x10/0x20 [ 55.797466] [ 55.798943] The buggy address belongs to the object at ffff000800c2d400 [ 55.798943] which belongs to the cache kmalloc-64 of size 64 [ 55.811269] The buggy address is located 0 bytes to the right of [ 55.811269] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 55.824115] [ 55.825591] The buggy address belongs to the physical page: [ 55.831149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 55.839136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.845643] page_type: f5(slab) [ 55.848776] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.856500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.864219] page dumped because: kasan: bad access detected [ 55.869774] [ 55.871250] Memory state around the buggy address: [ 55.876030] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.883233] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.890437] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.897639] ^ [ 55.902417] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.909621] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.916822] ================================================================== [ 55.924168] ================================================================== [ 55.931234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 55.938611] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 55.945989] [ 55.947472] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 55.947517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.947535] Hardware name: WinLink E850-96 board (DT) [ 55.947553] Call trace: [ 55.947565] show_stack+0x20/0x38 (C) [ 55.947596] dump_stack_lvl+0x8c/0xd0 [ 55.947630] print_report+0x118/0x608 [ 55.947658] kasan_report+0xdc/0x128 [ 55.947686] kasan_check_range+0x100/0x1a8 [ 55.947718] __kasan_check_write+0x20/0x30 [ 55.947749] kasan_atomics_helper+0x10c0/0x4858 [ 55.947779] kasan_atomics+0x198/0x2e0 [ 55.947807] kunit_try_run_case+0x170/0x3f0 [ 55.947840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.947876] kthread+0x328/0x630 [ 55.947908] ret_from_fork+0x10/0x20 [ 55.947940] [ 56.017776] Allocated by task 312: [ 56.021163] kasan_save_stack+0x3c/0x68 [ 56.024981] kasan_save_track+0x20/0x40 [ 56.028800] kasan_save_alloc_info+0x40/0x58 [ 56.033054] __kasan_kmalloc+0xd4/0xd8 [ 56.036786] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.041300] kasan_atomics+0xb8/0x2e0 [ 56.044945] kunit_try_run_case+0x170/0x3f0 [ 56.049112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.054581] kthread+0x328/0x630 [ 56.057793] ret_from_fork+0x10/0x20 [ 56.061351] [ 56.062827] The buggy address belongs to the object at ffff000800c2d400 [ 56.062827] which belongs to the cache kmalloc-64 of size 64 [ 56.075154] The buggy address is located 0 bytes to the right of [ 56.075154] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 56.088000] [ 56.089476] The buggy address belongs to the physical page: [ 56.095032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 56.103021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.109529] page_type: f5(slab) [ 56.112662] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.120385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.128104] page dumped because: kasan: bad access detected [ 56.133659] [ 56.135135] Memory state around the buggy address: [ 56.139915] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.147118] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.154322] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.161524] ^ [ 56.166302] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.173506] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.180707] ================================================================== [ 46.196236] ================================================================== [ 46.203256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 46.210632] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 46.218010] [ 46.219492] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 46.219541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.219559] Hardware name: WinLink E850-96 board (DT) [ 46.219579] Call trace: [ 46.219593] show_stack+0x20/0x38 (C) [ 46.219629] dump_stack_lvl+0x8c/0xd0 [ 46.219661] print_report+0x118/0x608 [ 46.219694] kasan_report+0xdc/0x128 [ 46.219722] __asan_report_store4_noabort+0x20/0x30 [ 46.219754] kasan_atomics_helper+0x3f94/0x4858 [ 46.219785] kasan_atomics+0x198/0x2e0 [ 46.219813] kunit_try_run_case+0x170/0x3f0 [ 46.219846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.219883] kthread+0x328/0x630 [ 46.219913] ret_from_fork+0x10/0x20 [ 46.219945] [ 46.286500] Allocated by task 312: [ 46.289884] kasan_save_stack+0x3c/0x68 [ 46.293703] kasan_save_track+0x20/0x40 [ 46.297523] kasan_save_alloc_info+0x40/0x58 [ 46.301776] __kasan_kmalloc+0xd4/0xd8 [ 46.305508] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.310022] kasan_atomics+0xb8/0x2e0 [ 46.313668] kunit_try_run_case+0x170/0x3f0 [ 46.317835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.323303] kthread+0x328/0x630 [ 46.326515] ret_from_fork+0x10/0x20 [ 46.330074] [ 46.331551] The buggy address belongs to the object at ffff000800c2d400 [ 46.331551] which belongs to the cache kmalloc-64 of size 64 [ 46.343876] The buggy address is located 0 bytes to the right of [ 46.343876] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 46.356723] [ 46.358200] The buggy address belongs to the physical page: [ 46.363758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 46.371742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.378250] page_type: f5(slab) [ 46.381383] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.389107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.396826] page dumped because: kasan: bad access detected [ 46.402382] [ 46.403857] Memory state around the buggy address: [ 46.408635] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.415840] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.423045] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.430246] ^ [ 46.435024] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.442229] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.449430] ================================================================== [ 53.820699] ================================================================== [ 53.827794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 53.835170] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 53.842461] [ 53.843943] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 53.843992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.844007] Hardware name: WinLink E850-96 board (DT) [ 53.844025] Call trace: [ 53.844037] show_stack+0x20/0x38 (C) [ 53.844067] dump_stack_lvl+0x8c/0xd0 [ 53.844096] print_report+0x118/0x608 [ 53.844128] kasan_report+0xdc/0x128 [ 53.844158] __asan_report_load8_noabort+0x20/0x30 [ 53.844190] kasan_atomics_helper+0x3f58/0x4858 [ 53.844219] kasan_atomics+0x198/0x2e0 [ 53.844247] kunit_try_run_case+0x170/0x3f0 [ 53.844281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.844320] kthread+0x328/0x630 [ 53.844352] ret_from_fork+0x10/0x20 [ 53.844385] [ 53.910863] Allocated by task 312: [ 53.914250] kasan_save_stack+0x3c/0x68 [ 53.918067] kasan_save_track+0x20/0x40 [ 53.921887] kasan_save_alloc_info+0x40/0x58 [ 53.926141] __kasan_kmalloc+0xd4/0xd8 [ 53.929873] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.934387] kasan_atomics+0xb8/0x2e0 [ 53.938033] kunit_try_run_case+0x170/0x3f0 [ 53.942199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.947668] kthread+0x328/0x630 [ 53.950879] ret_from_fork+0x10/0x20 [ 53.954439] [ 53.955914] The buggy address belongs to the object at ffff000800c2d400 [ 53.955914] which belongs to the cache kmalloc-64 of size 64 [ 53.968241] The buggy address is located 0 bytes to the right of [ 53.968241] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 53.981087] [ 53.982564] The buggy address belongs to the physical page: [ 53.988120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 53.996107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.002615] page_type: f5(slab) [ 54.005748] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.013472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.021193] page dumped because: kasan: bad access detected [ 54.026746] [ 54.028222] Memory state around the buggy address: [ 54.033000] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.040205] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.047410] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.054611] ^ [ 54.059388] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.066593] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.073794] ================================================================== [ 47.247916] ================================================================== [ 47.254976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 47.262265] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 47.269643] [ 47.271126] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 47.271173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.271192] Hardware name: WinLink E850-96 board (DT) [ 47.271212] Call trace: [ 47.271225] show_stack+0x20/0x38 (C) [ 47.271257] dump_stack_lvl+0x8c/0xd0 [ 47.271290] print_report+0x118/0x608 [ 47.271319] kasan_report+0xdc/0x128 [ 47.271347] kasan_check_range+0x100/0x1a8 [ 47.271381] __kasan_check_write+0x20/0x30 [ 47.271414] kasan_atomics_helper+0x4e4/0x4858 [ 47.271443] kasan_atomics+0x198/0x2e0 [ 47.271471] kunit_try_run_case+0x170/0x3f0 [ 47.271505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.271541] kthread+0x328/0x630 [ 47.271573] ret_from_fork+0x10/0x20 [ 47.271605] [ 47.341344] Allocated by task 312: [ 47.344731] kasan_save_stack+0x3c/0x68 [ 47.348548] kasan_save_track+0x20/0x40 [ 47.352368] kasan_save_alloc_info+0x40/0x58 [ 47.356621] __kasan_kmalloc+0xd4/0xd8 [ 47.360354] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.364868] kasan_atomics+0xb8/0x2e0 [ 47.368513] kunit_try_run_case+0x170/0x3f0 [ 47.372680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.378148] kthread+0x328/0x630 [ 47.381360] ret_from_fork+0x10/0x20 [ 47.384919] [ 47.386395] The buggy address belongs to the object at ffff000800c2d400 [ 47.386395] which belongs to the cache kmalloc-64 of size 64 [ 47.398722] The buggy address is located 0 bytes to the right of [ 47.398722] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 47.411568] [ 47.413044] The buggy address belongs to the physical page: [ 47.418600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 47.426589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.433096] page_type: f5(slab) [ 47.436230] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.443953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.451672] page dumped because: kasan: bad access detected [ 47.457227] [ 47.458703] Memory state around the buggy address: [ 47.463481] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.470686] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.477890] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.485091] ^ [ 47.489869] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.497074] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.504275] ================================================================== [ 48.039046] ================================================================== [ 48.046110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 48.053399] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 48.060777] [ 48.062258] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 48.062307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.062324] Hardware name: WinLink E850-96 board (DT) [ 48.062343] Call trace: [ 48.062358] show_stack+0x20/0x38 (C) [ 48.062389] dump_stack_lvl+0x8c/0xd0 [ 48.062421] print_report+0x118/0x608 [ 48.062451] kasan_report+0xdc/0x128 [ 48.062479] kasan_check_range+0x100/0x1a8 [ 48.062510] __kasan_check_write+0x20/0x30 [ 48.062543] kasan_atomics_helper+0x61c/0x4858 [ 48.062571] kasan_atomics+0x198/0x2e0 [ 48.062598] kunit_try_run_case+0x170/0x3f0 [ 48.062632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.062670] kthread+0x328/0x630 [ 48.062702] ret_from_fork+0x10/0x20 [ 48.062733] [ 48.132477] Allocated by task 312: [ 48.135864] kasan_save_stack+0x3c/0x68 [ 48.139682] kasan_save_track+0x20/0x40 [ 48.143502] kasan_save_alloc_info+0x40/0x58 [ 48.147755] __kasan_kmalloc+0xd4/0xd8 [ 48.151488] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.156001] kasan_atomics+0xb8/0x2e0 [ 48.159647] kunit_try_run_case+0x170/0x3f0 [ 48.163814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.169282] kthread+0x328/0x630 [ 48.172494] ret_from_fork+0x10/0x20 [ 48.176053] [ 48.177529] The buggy address belongs to the object at ffff000800c2d400 [ 48.177529] which belongs to the cache kmalloc-64 of size 64 [ 48.189855] The buggy address is located 0 bytes to the right of [ 48.189855] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 48.202702] [ 48.204178] The buggy address belongs to the physical page: [ 48.209734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 48.217721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.224229] page_type: f5(slab) [ 48.227362] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.235087] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.242806] page dumped because: kasan: bad access detected [ 48.248361] [ 48.249837] Memory state around the buggy address: [ 48.254615] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.261820] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.269024] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.276225] ^ [ 48.281003] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.288208] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.295409] ================================================================== [ 56.979677] ================================================================== [ 56.986775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 56.994150] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 57.001528] [ 57.003012] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 57.003058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.003077] Hardware name: WinLink E850-96 board (DT) [ 57.003096] Call trace: [ 57.003109] show_stack+0x20/0x38 (C) [ 57.003140] dump_stack_lvl+0x8c/0xd0 [ 57.003171] print_report+0x118/0x608 [ 57.003201] kasan_report+0xdc/0x128 [ 57.003228] kasan_check_range+0x100/0x1a8 [ 57.003259] __kasan_check_write+0x20/0x30 [ 57.003290] kasan_atomics_helper+0x126c/0x4858 [ 57.003318] kasan_atomics+0x198/0x2e0 [ 57.003345] kunit_try_run_case+0x170/0x3f0 [ 57.003378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.003416] kthread+0x328/0x630 [ 57.003448] ret_from_fork+0x10/0x20 [ 57.003482] [ 57.073315] Allocated by task 312: [ 57.076702] kasan_save_stack+0x3c/0x68 [ 57.080520] kasan_save_track+0x20/0x40 [ 57.084340] kasan_save_alloc_info+0x40/0x58 [ 57.088593] __kasan_kmalloc+0xd4/0xd8 [ 57.092326] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.096840] kasan_atomics+0xb8/0x2e0 [ 57.100485] kunit_try_run_case+0x170/0x3f0 [ 57.104652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.110120] kthread+0x328/0x630 [ 57.113332] ret_from_fork+0x10/0x20 [ 57.116891] [ 57.118367] The buggy address belongs to the object at ffff000800c2d400 [ 57.118367] which belongs to the cache kmalloc-64 of size 64 [ 57.130693] The buggy address is located 0 bytes to the right of [ 57.130693] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 57.143540] [ 57.145016] The buggy address belongs to the physical page: [ 57.150575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 57.158559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.165069] page_type: f5(slab) [ 57.168200] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.175924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.183644] page dumped because: kasan: bad access detected [ 57.189199] [ 57.190674] Memory state around the buggy address: [ 57.195454] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.202657] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.209862] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.217063] ^ [ 57.221841] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.229046] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.236247] ================================================================== [ 57.771386] ================================================================== [ 57.778429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 57.785805] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 57.793096] [ 57.794579] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 57.794627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.794642] Hardware name: WinLink E850-96 board (DT) [ 57.794664] Call trace: [ 57.794677] show_stack+0x20/0x38 (C) [ 57.794707] dump_stack_lvl+0x8c/0xd0 [ 57.794739] print_report+0x118/0x608 [ 57.794766] kasan_report+0xdc/0x128 [ 57.794794] __asan_report_load8_noabort+0x20/0x30 [ 57.794829] kasan_atomics_helper+0x3f04/0x4858 [ 57.794858] kasan_atomics+0x198/0x2e0 [ 57.794885] kunit_try_run_case+0x170/0x3f0 [ 57.794917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.794956] kthread+0x328/0x630 [ 57.794992] ret_from_fork+0x10/0x20 [ 57.795024] [ 57.861498] Allocated by task 312: [ 57.864885] kasan_save_stack+0x3c/0x68 [ 57.868703] kasan_save_track+0x20/0x40 [ 57.872522] kasan_save_alloc_info+0x40/0x58 [ 57.876776] __kasan_kmalloc+0xd4/0xd8 [ 57.880508] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.885022] kasan_atomics+0xb8/0x2e0 [ 57.888667] kunit_try_run_case+0x170/0x3f0 [ 57.892834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.898303] kthread+0x328/0x630 [ 57.901515] ret_from_fork+0x10/0x20 [ 57.905074] [ 57.906549] The buggy address belongs to the object at ffff000800c2d400 [ 57.906549] which belongs to the cache kmalloc-64 of size 64 [ 57.918876] The buggy address is located 0 bytes to the right of [ 57.918876] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 57.931722] [ 57.933200] The buggy address belongs to the physical page: [ 57.938754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 57.946742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.953250] page_type: f5(slab) [ 57.956383] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.964107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.971826] page dumped because: kasan: bad access detected [ 57.977382] [ 57.978857] Memory state around the buggy address: [ 57.983637] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.990840] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.998045] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.005246] ^ [ 58.010024] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.017229] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.024430] ================================================================== [ 60.924118] ================================================================== [ 60.931158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 60.938535] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 60.945827] [ 60.947309] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 60.947358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.947374] Hardware name: WinLink E850-96 board (DT) [ 60.947393] Call trace: [ 60.947406] show_stack+0x20/0x38 (C) [ 60.947438] dump_stack_lvl+0x8c/0xd0 [ 60.947470] print_report+0x118/0x608 [ 60.947498] kasan_report+0xdc/0x128 [ 60.947526] __asan_report_load8_noabort+0x20/0x30 [ 60.947560] kasan_atomics_helper+0x3e20/0x4858 [ 60.947591] kasan_atomics+0x198/0x2e0 [ 60.947618] kunit_try_run_case+0x170/0x3f0 [ 60.947651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.947690] kthread+0x328/0x630 [ 60.947722] ret_from_fork+0x10/0x20 [ 60.947757] [ 61.014229] Allocated by task 312: [ 61.017616] kasan_save_stack+0x3c/0x68 [ 61.021433] kasan_save_track+0x20/0x40 [ 61.025253] kasan_save_alloc_info+0x40/0x58 [ 61.029506] __kasan_kmalloc+0xd4/0xd8 [ 61.033239] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.037753] kasan_atomics+0xb8/0x2e0 [ 61.041398] kunit_try_run_case+0x170/0x3f0 [ 61.045565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.051033] kthread+0x328/0x630 [ 61.054245] ret_from_fork+0x10/0x20 [ 61.057805] [ 61.059280] The buggy address belongs to the object at ffff000800c2d400 [ 61.059280] which belongs to the cache kmalloc-64 of size 64 [ 61.071607] The buggy address is located 0 bytes to the right of [ 61.071607] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 61.084453] [ 61.085929] The buggy address belongs to the physical page: [ 61.091485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 61.099472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.105980] page_type: f5(slab) [ 61.109115] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.116838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.124557] page dumped because: kasan: bad access detected [ 61.130112] [ 61.131588] Memory state around the buggy address: [ 61.136367] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.143571] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.150775] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.157976] ^ [ 61.162754] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.169959] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.177160] ================================================================== [ 52.248527] ================================================================== [ 52.255594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 52.262971] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 52.270262] [ 52.271746] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 52.271793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.271810] Hardware name: WinLink E850-96 board (DT) [ 52.271829] Call trace: [ 52.271843] show_stack+0x20/0x38 (C) [ 52.271873] dump_stack_lvl+0x8c/0xd0 [ 52.271904] print_report+0x118/0x608 [ 52.271935] kasan_report+0xdc/0x128 [ 52.271964] __asan_report_load4_noabort+0x20/0x30 [ 52.271998] kasan_atomics_helper+0x3de4/0x4858 [ 52.272028] kasan_atomics+0x198/0x2e0 [ 52.272058] kunit_try_run_case+0x170/0x3f0 [ 52.272092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.272131] kthread+0x328/0x630 [ 52.272161] ret_from_fork+0x10/0x20 [ 52.272191] [ 52.338664] Allocated by task 312: [ 52.342051] kasan_save_stack+0x3c/0x68 [ 52.345869] kasan_save_track+0x20/0x40 [ 52.349689] kasan_save_alloc_info+0x40/0x58 [ 52.353942] __kasan_kmalloc+0xd4/0xd8 [ 52.357674] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.362188] kasan_atomics+0xb8/0x2e0 [ 52.365834] kunit_try_run_case+0x170/0x3f0 [ 52.370001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.375469] kthread+0x328/0x630 [ 52.378681] ret_from_fork+0x10/0x20 [ 52.382240] [ 52.383716] The buggy address belongs to the object at ffff000800c2d400 [ 52.383716] which belongs to the cache kmalloc-64 of size 64 [ 52.396042] The buggy address is located 0 bytes to the right of [ 52.396042] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 52.408889] [ 52.410365] The buggy address belongs to the physical page: [ 52.415921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 52.423908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.430416] page_type: f5(slab) [ 52.433549] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.441274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.448993] page dumped because: kasan: bad access detected [ 52.454548] [ 52.456023] Memory state around the buggy address: [ 52.460803] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.468006] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.475211] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.482412] ^ [ 52.487190] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.494395] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.501596] ================================================================== [ 51.984792] ================================================================== [ 51.991883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 51.999173] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 52.006551] [ 52.008034] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 52.008084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.008099] Hardware name: WinLink E850-96 board (DT) [ 52.008117] Call trace: [ 52.008130] show_stack+0x20/0x38 (C) [ 52.008161] dump_stack_lvl+0x8c/0xd0 [ 52.008193] print_report+0x118/0x608 [ 52.008222] kasan_report+0xdc/0x128 [ 52.008252] kasan_check_range+0x100/0x1a8 [ 52.008284] __kasan_check_write+0x20/0x30 [ 52.008314] kasan_atomics_helper+0xc08/0x4858 [ 52.008343] kasan_atomics+0x198/0x2e0 [ 52.008372] kunit_try_run_case+0x170/0x3f0 [ 52.008406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.008444] kthread+0x328/0x630 [ 52.008475] ret_from_fork+0x10/0x20 [ 52.008507] [ 52.078251] Allocated by task 312: [ 52.081639] kasan_save_stack+0x3c/0x68 [ 52.085456] kasan_save_track+0x20/0x40 [ 52.089276] kasan_save_alloc_info+0x40/0x58 [ 52.093529] __kasan_kmalloc+0xd4/0xd8 [ 52.097262] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.101776] kasan_atomics+0xb8/0x2e0 [ 52.105421] kunit_try_run_case+0x170/0x3f0 [ 52.109588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.115056] kthread+0x328/0x630 [ 52.118268] ret_from_fork+0x10/0x20 [ 52.121827] [ 52.123303] The buggy address belongs to the object at ffff000800c2d400 [ 52.123303] which belongs to the cache kmalloc-64 of size 64 [ 52.135629] The buggy address is located 0 bytes to the right of [ 52.135629] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 52.148476] [ 52.149952] The buggy address belongs to the physical page: [ 52.155508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 52.163495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.170004] page_type: f5(slab) [ 52.173138] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.180861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.188580] page dumped because: kasan: bad access detected [ 52.194135] [ 52.195611] Memory state around the buggy address: [ 52.200390] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.207593] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.214798] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.221999] ^ [ 52.226777] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.233982] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.241183] ================================================================== [ 58.295653] ================================================================== [ 58.302726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 58.310103] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 58.317481] [ 58.318964] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 58.319011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.319025] Hardware name: WinLink E850-96 board (DT) [ 58.319042] Call trace: [ 58.319056] show_stack+0x20/0x38 (C) [ 58.319085] dump_stack_lvl+0x8c/0xd0 [ 58.319116] print_report+0x118/0x608 [ 58.319145] kasan_report+0xdc/0x128 [ 58.319172] kasan_check_range+0x100/0x1a8 [ 58.319203] __kasan_check_write+0x20/0x30 [ 58.319234] kasan_atomics_helper+0x147c/0x4858 [ 58.319264] kasan_atomics+0x198/0x2e0 [ 58.319290] kunit_try_run_case+0x170/0x3f0 [ 58.319323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.319361] kthread+0x328/0x630 [ 58.319392] ret_from_fork+0x10/0x20 [ 58.319427] [ 58.389268] Allocated by task 312: [ 58.392655] kasan_save_stack+0x3c/0x68 [ 58.396473] kasan_save_track+0x20/0x40 [ 58.400292] kasan_save_alloc_info+0x40/0x58 [ 58.404545] __kasan_kmalloc+0xd4/0xd8 [ 58.408278] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.412792] kasan_atomics+0xb8/0x2e0 [ 58.416437] kunit_try_run_case+0x170/0x3f0 [ 58.420604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.426073] kthread+0x328/0x630 [ 58.429285] ret_from_fork+0x10/0x20 [ 58.432844] [ 58.434319] The buggy address belongs to the object at ffff000800c2d400 [ 58.434319] which belongs to the cache kmalloc-64 of size 64 [ 58.446646] The buggy address is located 0 bytes to the right of [ 58.446646] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 58.459492] [ 58.460969] The buggy address belongs to the physical page: [ 58.466525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 58.474511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.481020] page_type: f5(slab) [ 58.484154] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.491877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.499596] page dumped because: kasan: bad access detected [ 58.505151] [ 58.506627] Memory state around the buggy address: [ 58.511406] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.518610] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.525815] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.533016] ^ [ 58.537794] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.544998] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.552200] ================================================================== [ 51.200308] ================================================================== [ 51.207346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 51.214723] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 51.222014] [ 51.223497] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 51.223549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.223563] Hardware name: WinLink E850-96 board (DT) [ 51.223584] Call trace: [ 51.223597] show_stack+0x20/0x38 (C) [ 51.223626] dump_stack_lvl+0x8c/0xd0 [ 51.223660] print_report+0x118/0x608 [ 51.223691] kasan_report+0xdc/0x128 [ 51.223720] __asan_report_load4_noabort+0x20/0x30 [ 51.223753] kasan_atomics_helper+0x3dcc/0x4858 [ 51.223785] kasan_atomics+0x198/0x2e0 [ 51.223811] kunit_try_run_case+0x170/0x3f0 [ 51.223844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.223883] kthread+0x328/0x630 [ 51.223916] ret_from_fork+0x10/0x20 [ 51.223948] [ 51.290416] Allocated by task 312: [ 51.293803] kasan_save_stack+0x3c/0x68 [ 51.297621] kasan_save_track+0x20/0x40 [ 51.301440] kasan_save_alloc_info+0x40/0x58 [ 51.305694] __kasan_kmalloc+0xd4/0xd8 [ 51.309426] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.313940] kasan_atomics+0xb8/0x2e0 [ 51.317586] kunit_try_run_case+0x170/0x3f0 [ 51.321752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.327221] kthread+0x328/0x630 [ 51.330433] ret_from_fork+0x10/0x20 [ 51.333992] [ 51.335467] The buggy address belongs to the object at ffff000800c2d400 [ 51.335467] which belongs to the cache kmalloc-64 of size 64 [ 51.347794] The buggy address is located 0 bytes to the right of [ 51.347794] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 51.360641] [ 51.362117] The buggy address belongs to the physical page: [ 51.367672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 51.375660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.382168] page_type: f5(slab) [ 51.385304] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.393025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.400744] page dumped because: kasan: bad access detected [ 51.406300] [ 51.407776] Memory state around the buggy address: [ 51.412555] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.419758] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.426963] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.434164] ^ [ 51.438942] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.446147] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.453348] ================================================================== [ 51.460695] ================================================================== [ 51.467759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 51.475049] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 51.482427] [ 51.483910] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 51.483961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.483977] Hardware name: WinLink E850-96 board (DT) [ 51.483996] Call trace: [ 51.484010] show_stack+0x20/0x38 (C) [ 51.484042] dump_stack_lvl+0x8c/0xd0 [ 51.484071] print_report+0x118/0x608 [ 51.484100] kasan_report+0xdc/0x128 [ 51.484128] kasan_check_range+0x100/0x1a8 [ 51.484159] __kasan_check_write+0x20/0x30 [ 51.484191] kasan_atomics_helper+0xb70/0x4858 [ 51.484221] kasan_atomics+0x198/0x2e0 [ 51.484249] kunit_try_run_case+0x170/0x3f0 [ 51.484283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.484322] kthread+0x328/0x630 [ 51.484353] ret_from_fork+0x10/0x20 [ 51.484386] [ 51.554127] Allocated by task 312: [ 51.557515] kasan_save_stack+0x3c/0x68 [ 51.561332] kasan_save_track+0x20/0x40 [ 51.565152] kasan_save_alloc_info+0x40/0x58 [ 51.569405] __kasan_kmalloc+0xd4/0xd8 [ 51.573138] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.577651] kasan_atomics+0xb8/0x2e0 [ 51.581297] kunit_try_run_case+0x170/0x3f0 [ 51.585464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.590933] kthread+0x328/0x630 [ 51.594144] ret_from_fork+0x10/0x20 [ 51.597703] [ 51.599180] The buggy address belongs to the object at ffff000800c2d400 [ 51.599180] which belongs to the cache kmalloc-64 of size 64 [ 51.611506] The buggy address is located 0 bytes to the right of [ 51.611506] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 51.624352] [ 51.625828] The buggy address belongs to the physical page: [ 51.631385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 51.639371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.645879] page_type: f5(slab) [ 51.649014] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.656737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.664456] page dumped because: kasan: bad access detected [ 51.670011] [ 51.671487] Memory state around the buggy address: [ 51.676266] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.683469] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.690674] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.697875] ^ [ 51.702653] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.709858] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.717059] ================================================================== [ 58.823436] ================================================================== [ 58.830495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 58.837873] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 58.845251] [ 58.846734] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 58.846781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.846796] Hardware name: WinLink E850-96 board (DT) [ 58.846813] Call trace: [ 58.846826] show_stack+0x20/0x38 (C) [ 58.846859] dump_stack_lvl+0x8c/0xd0 [ 58.846892] print_report+0x118/0x608 [ 58.846920] kasan_report+0xdc/0x128 [ 58.846948] kasan_check_range+0x100/0x1a8 [ 58.846978] __kasan_check_write+0x20/0x30 [ 58.847009] kasan_atomics_helper+0x154c/0x4858 [ 58.847040] kasan_atomics+0x198/0x2e0 [ 58.847064] kunit_try_run_case+0x170/0x3f0 [ 58.847095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.847130] kthread+0x328/0x630 [ 58.847163] ret_from_fork+0x10/0x20 [ 58.847194] [ 58.917038] Allocated by task 312: [ 58.920425] kasan_save_stack+0x3c/0x68 [ 58.924243] kasan_save_track+0x20/0x40 [ 58.928062] kasan_save_alloc_info+0x40/0x58 [ 58.932315] __kasan_kmalloc+0xd4/0xd8 [ 58.936048] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.940562] kasan_atomics+0xb8/0x2e0 [ 58.944208] kunit_try_run_case+0x170/0x3f0 [ 58.948374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.953842] kthread+0x328/0x630 [ 58.957055] ret_from_fork+0x10/0x20 [ 58.960614] [ 58.962089] The buggy address belongs to the object at ffff000800c2d400 [ 58.962089] which belongs to the cache kmalloc-64 of size 64 [ 58.974416] The buggy address is located 0 bytes to the right of [ 58.974416] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 58.987263] [ 58.988738] The buggy address belongs to the physical page: [ 58.994294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 59.002282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.008790] page_type: f5(slab) [ 59.011922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.019647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.027366] page dumped because: kasan: bad access detected [ 59.032921] [ 59.034397] Memory state around the buggy address: [ 59.039176] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.046380] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.053585] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.060786] ^ [ 59.065563] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.072768] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.079969] ================================================================== [ 53.296783] ================================================================== [ 53.303844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 53.311219] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 53.318511] [ 53.319993] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 53.320036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.320052] Hardware name: WinLink E850-96 board (DT) [ 53.320073] Call trace: [ 53.320085] show_stack+0x20/0x38 (C) [ 53.320118] dump_stack_lvl+0x8c/0xd0 [ 53.320149] print_report+0x118/0x608 [ 53.320178] kasan_report+0xdc/0x128 [ 53.320206] __asan_report_load4_noabort+0x20/0x30 [ 53.320239] kasan_atomics_helper+0x3e04/0x4858 [ 53.320269] kasan_atomics+0x198/0x2e0 [ 53.320297] kunit_try_run_case+0x170/0x3f0 [ 53.320328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.320367] kthread+0x328/0x630 [ 53.320397] ret_from_fork+0x10/0x20 [ 53.320426] [ 53.386912] Allocated by task 312: [ 53.390299] kasan_save_stack+0x3c/0x68 [ 53.394117] kasan_save_track+0x20/0x40 [ 53.397937] kasan_save_alloc_info+0x40/0x58 [ 53.402190] __kasan_kmalloc+0xd4/0xd8 [ 53.405923] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.410436] kasan_atomics+0xb8/0x2e0 [ 53.414082] kunit_try_run_case+0x170/0x3f0 [ 53.418249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.423717] kthread+0x328/0x630 [ 53.426929] ret_from_fork+0x10/0x20 [ 53.430488] [ 53.431964] The buggy address belongs to the object at ffff000800c2d400 [ 53.431964] which belongs to the cache kmalloc-64 of size 64 [ 53.444290] The buggy address is located 0 bytes to the right of [ 53.444290] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 53.457137] [ 53.458613] The buggy address belongs to the physical page: [ 53.464171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 53.472156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.478665] page_type: f5(slab) [ 53.481799] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.489522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.497241] page dumped because: kasan: bad access detected [ 53.502796] [ 53.504272] Memory state around the buggy address: [ 53.509050] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.516254] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.523459] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.530660] ^ [ 53.535438] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.542643] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.549844] ================================================================== [ 45.144774] ================================================================== [ 45.151883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 45.159172] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 45.166550] [ 45.168035] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 45.168089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.168108] Hardware name: WinLink E850-96 board (DT) [ 45.168129] Call trace: [ 45.168145] show_stack+0x20/0x38 (C) [ 45.168176] dump_stack_lvl+0x8c/0xd0 [ 45.168214] print_report+0x118/0x608 [ 45.168246] kasan_report+0xdc/0x128 [ 45.168275] kasan_check_range+0x100/0x1a8 [ 45.168308] __kasan_check_write+0x20/0x30 [ 45.168341] kasan_atomics_helper+0x24c/0x4858 [ 45.168372] kasan_atomics+0x198/0x2e0 [ 45.168400] kunit_try_run_case+0x170/0x3f0 [ 45.168433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.168472] kthread+0x328/0x630 [ 45.168505] ret_from_fork+0x10/0x20 [ 45.168540] [ 45.238250] Allocated by task 312: [ 45.241636] kasan_save_stack+0x3c/0x68 [ 45.245455] kasan_save_track+0x20/0x40 [ 45.249274] kasan_save_alloc_info+0x40/0x58 [ 45.253528] __kasan_kmalloc+0xd4/0xd8 [ 45.257260] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.261774] kasan_atomics+0xb8/0x2e0 [ 45.265420] kunit_try_run_case+0x170/0x3f0 [ 45.269587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.275055] kthread+0x328/0x630 [ 45.278267] ret_from_fork+0x10/0x20 [ 45.281826] [ 45.283303] The buggy address belongs to the object at ffff000800c2d400 [ 45.283303] which belongs to the cache kmalloc-64 of size 64 [ 45.295630] The buggy address is located 0 bytes to the right of [ 45.295630] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 45.308475] [ 45.309952] The buggy address belongs to the physical page: [ 45.315509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 45.323495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.330004] page_type: f5(slab) [ 45.333136] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.340859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.348578] page dumped because: kasan: bad access detected [ 45.354133] [ 45.355609] Memory state around the buggy address: [ 45.360389] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.367592] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.374797] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.381998] ^ [ 45.386776] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.393980] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.401182] ================================================================== [ 50.145438] ================================================================== [ 50.152502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 50.159791] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 50.167169] [ 50.168652] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 50.168697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.168713] Hardware name: WinLink E850-96 board (DT) [ 50.168734] Call trace: [ 50.168747] show_stack+0x20/0x38 (C) [ 50.168778] dump_stack_lvl+0x8c/0xd0 [ 50.168809] print_report+0x118/0x608 [ 50.168837] kasan_report+0xdc/0x128 [ 50.168867] kasan_check_range+0x100/0x1a8 [ 50.168897] __kasan_check_write+0x20/0x30 [ 50.168929] kasan_atomics_helper+0x99c/0x4858 [ 50.168959] kasan_atomics+0x198/0x2e0 [ 50.168986] kunit_try_run_case+0x170/0x3f0 [ 50.169021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.169060] kthread+0x328/0x630 [ 50.169090] ret_from_fork+0x10/0x20 [ 50.169122] [ 50.238869] Allocated by task 312: [ 50.242256] kasan_save_stack+0x3c/0x68 [ 50.246074] kasan_save_track+0x20/0x40 [ 50.249894] kasan_save_alloc_info+0x40/0x58 [ 50.254147] __kasan_kmalloc+0xd4/0xd8 [ 50.257880] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.262394] kasan_atomics+0xb8/0x2e0 [ 50.266039] kunit_try_run_case+0x170/0x3f0 [ 50.270206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.275675] kthread+0x328/0x630 [ 50.278886] ret_from_fork+0x10/0x20 [ 50.282445] [ 50.283921] The buggy address belongs to the object at ffff000800c2d400 [ 50.283921] which belongs to the cache kmalloc-64 of size 64 [ 50.296248] The buggy address is located 0 bytes to the right of [ 50.296248] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 50.309094] [ 50.310570] The buggy address belongs to the physical page: [ 50.316126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 50.324113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.330622] page_type: f5(slab) [ 50.333756] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.341479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.349198] page dumped because: kasan: bad access detected [ 50.354753] [ 50.356229] Memory state around the buggy address: [ 50.361008] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.368211] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.375416] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.382617] ^ [ 50.387395] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.394600] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.401802] ================================================================== [ 50.672852] ================================================================== [ 50.679923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 50.687214] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 50.694592] [ 50.696074] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 50.696120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.696134] Hardware name: WinLink E850-96 board (DT) [ 50.696155] Call trace: [ 50.696165] show_stack+0x20/0x38 (C) [ 50.696195] dump_stack_lvl+0x8c/0xd0 [ 50.696227] print_report+0x118/0x608 [ 50.696257] kasan_report+0xdc/0x128 [ 50.696286] kasan_check_range+0x100/0x1a8 [ 50.696318] __kasan_check_write+0x20/0x30 [ 50.696350] kasan_atomics_helper+0xa6c/0x4858 [ 50.696381] kasan_atomics+0x198/0x2e0 [ 50.696408] kunit_try_run_case+0x170/0x3f0 [ 50.696440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.696476] kthread+0x328/0x630 [ 50.696509] ret_from_fork+0x10/0x20 [ 50.696539] [ 50.766292] Allocated by task 312: [ 50.769679] kasan_save_stack+0x3c/0x68 [ 50.773497] kasan_save_track+0x20/0x40 [ 50.777316] kasan_save_alloc_info+0x40/0x58 [ 50.781570] __kasan_kmalloc+0xd4/0xd8 [ 50.785302] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.789816] kasan_atomics+0xb8/0x2e0 [ 50.793462] kunit_try_run_case+0x170/0x3f0 [ 50.797629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.803097] kthread+0x328/0x630 [ 50.806309] ret_from_fork+0x10/0x20 [ 50.809868] [ 50.811344] The buggy address belongs to the object at ffff000800c2d400 [ 50.811344] which belongs to the cache kmalloc-64 of size 64 [ 50.823670] The buggy address is located 0 bytes to the right of [ 50.823670] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 50.836517] [ 50.837992] The buggy address belongs to the physical page: [ 50.843550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 50.851535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.858044] page_type: f5(slab) [ 50.861177] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.868901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.876621] page dumped because: kasan: bad access detected [ 50.882176] [ 50.883651] Memory state around the buggy address: [ 50.888431] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.895634] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.902839] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.910040] ^ [ 50.914818] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.922022] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.929224] ================================================================== [ 59.351200] ================================================================== [ 59.358266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 59.365642] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 59.372934] [ 59.374418] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 59.374467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.374483] Hardware name: WinLink E850-96 board (DT) [ 59.374503] Call trace: [ 59.374516] show_stack+0x20/0x38 (C) [ 59.374545] dump_stack_lvl+0x8c/0xd0 [ 59.374579] print_report+0x118/0x608 [ 59.374609] kasan_report+0xdc/0x128 [ 59.374636] __asan_report_load8_noabort+0x20/0x30 [ 59.374670] kasan_atomics_helper+0x3db0/0x4858 [ 59.374699] kasan_atomics+0x198/0x2e0 [ 59.374727] kunit_try_run_case+0x170/0x3f0 [ 59.374760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.374795] kthread+0x328/0x630 [ 59.374825] ret_from_fork+0x10/0x20 [ 59.374861] [ 59.441335] Allocated by task 312: [ 59.444722] kasan_save_stack+0x3c/0x68 [ 59.448541] kasan_save_track+0x20/0x40 [ 59.452360] kasan_save_alloc_info+0x40/0x58 [ 59.456613] __kasan_kmalloc+0xd4/0xd8 [ 59.460346] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.464860] kasan_atomics+0xb8/0x2e0 [ 59.468505] kunit_try_run_case+0x170/0x3f0 [ 59.472671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.478140] kthread+0x328/0x630 [ 59.481352] ret_from_fork+0x10/0x20 [ 59.484911] [ 59.486387] The buggy address belongs to the object at ffff000800c2d400 [ 59.486387] which belongs to the cache kmalloc-64 of size 64 [ 59.498713] The buggy address is located 0 bytes to the right of [ 59.498713] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 59.511560] [ 59.513036] The buggy address belongs to the physical page: [ 59.518592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 59.526579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.533088] page_type: f5(slab) [ 59.536222] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.543945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.551664] page dumped because: kasan: bad access detected [ 59.557219] [ 59.558695] Memory state around the buggy address: [ 59.563474] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.570677] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.577882] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.585083] ^ [ 59.589861] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.597066] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.604267] ================================================================== [ 50.409118] ================================================================== [ 50.416213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 50.423502] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 50.430880] [ 50.432363] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 50.432412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.432426] Hardware name: WinLink E850-96 board (DT) [ 50.432444] Call trace: [ 50.432457] show_stack+0x20/0x38 (C) [ 50.432486] dump_stack_lvl+0x8c/0xd0 [ 50.432520] print_report+0x118/0x608 [ 50.432550] kasan_report+0xdc/0x128 [ 50.432577] kasan_check_range+0x100/0x1a8 [ 50.432608] __kasan_check_write+0x20/0x30 [ 50.432639] kasan_atomics_helper+0xa04/0x4858 [ 50.432667] kasan_atomics+0x198/0x2e0 [ 50.432693] kunit_try_run_case+0x170/0x3f0 [ 50.432725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.432760] kthread+0x328/0x630 [ 50.432791] ret_from_fork+0x10/0x20 [ 50.432822] [ 50.502581] Allocated by task 312: [ 50.505968] kasan_save_stack+0x3c/0x68 [ 50.509786] kasan_save_track+0x20/0x40 [ 50.513605] kasan_save_alloc_info+0x40/0x58 [ 50.517858] __kasan_kmalloc+0xd4/0xd8 [ 50.521591] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.526105] kasan_atomics+0xb8/0x2e0 [ 50.529750] kunit_try_run_case+0x170/0x3f0 [ 50.533917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.539385] kthread+0x328/0x630 [ 50.542598] ret_from_fork+0x10/0x20 [ 50.546157] [ 50.547632] The buggy address belongs to the object at ffff000800c2d400 [ 50.547632] which belongs to the cache kmalloc-64 of size 64 [ 50.559959] The buggy address is located 0 bytes to the right of [ 50.559959] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 50.572805] [ 50.574281] The buggy address belongs to the physical page: [ 50.579837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 50.587824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.594333] page_type: f5(slab) [ 50.597466] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.605190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.612909] page dumped because: kasan: bad access detected [ 50.618465] [ 50.619940] Memory state around the buggy address: [ 50.624719] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.631923] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.639127] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.646328] ^ [ 50.651107] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.658311] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.665512] ================================================================== [ 53.557191] ================================================================== [ 53.564257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 53.571545] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 53.578837] [ 53.580319] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 53.580367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.580382] Hardware name: WinLink E850-96 board (DT) [ 53.580402] Call trace: [ 53.580416] show_stack+0x20/0x38 (C) [ 53.580446] dump_stack_lvl+0x8c/0xd0 [ 53.580480] print_report+0x118/0x608 [ 53.580509] kasan_report+0xdc/0x128 [ 53.580537] kasan_check_range+0x100/0x1a8 [ 53.580569] __kasan_check_read+0x20/0x30 [ 53.580602] kasan_atomics_helper+0xdd4/0x4858 [ 53.580631] kasan_atomics+0x198/0x2e0 [ 53.580661] kunit_try_run_case+0x170/0x3f0 [ 53.580693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.580731] kthread+0x328/0x630 [ 53.580763] ret_from_fork+0x10/0x20 [ 53.580794] [ 53.650450] Allocated by task 312: [ 53.653838] kasan_save_stack+0x3c/0x68 [ 53.657655] kasan_save_track+0x20/0x40 [ 53.661475] kasan_save_alloc_info+0x40/0x58 [ 53.665728] __kasan_kmalloc+0xd4/0xd8 [ 53.669460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.673974] kasan_atomics+0xb8/0x2e0 [ 53.677620] kunit_try_run_case+0x170/0x3f0 [ 53.681786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.687255] kthread+0x328/0x630 [ 53.690467] ret_from_fork+0x10/0x20 [ 53.694026] [ 53.695501] The buggy address belongs to the object at ffff000800c2d400 [ 53.695501] which belongs to the cache kmalloc-64 of size 64 [ 53.707828] The buggy address is located 0 bytes to the right of [ 53.707828] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 53.720675] [ 53.722151] The buggy address belongs to the physical page: [ 53.727708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 53.735694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.742204] page_type: f5(slab) [ 53.745335] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.753059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.760778] page dumped because: kasan: bad access detected [ 53.766334] [ 53.767809] Memory state around the buggy address: [ 53.772589] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.779792] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.786997] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.794198] ^ [ 53.798976] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.806180] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.813382] ================================================================== [ 54.344849] ================================================================== [ 54.351918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 54.359294] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 54.366672] [ 54.368154] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 54.368202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.368219] Hardware name: WinLink E850-96 board (DT) [ 54.368239] Call trace: [ 54.368252] show_stack+0x20/0x38 (C) [ 54.368284] dump_stack_lvl+0x8c/0xd0 [ 54.368316] print_report+0x118/0x608 [ 54.368345] kasan_report+0xdc/0x128 [ 54.368374] __asan_report_store8_noabort+0x20/0x30 [ 54.368408] kasan_atomics_helper+0x3e5c/0x4858 [ 54.368437] kasan_atomics+0x198/0x2e0 [ 54.368465] kunit_try_run_case+0x170/0x3f0 [ 54.368498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.368534] kthread+0x328/0x630 [ 54.368565] ret_from_fork+0x10/0x20 [ 54.368598] [ 54.435160] Allocated by task 312: [ 54.438548] kasan_save_stack+0x3c/0x68 [ 54.442366] kasan_save_track+0x20/0x40 [ 54.446185] kasan_save_alloc_info+0x40/0x58 [ 54.450438] __kasan_kmalloc+0xd4/0xd8 [ 54.454171] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.458685] kasan_atomics+0xb8/0x2e0 [ 54.462330] kunit_try_run_case+0x170/0x3f0 [ 54.466497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.471966] kthread+0x328/0x630 [ 54.475177] ret_from_fork+0x10/0x20 [ 54.478737] [ 54.480213] The buggy address belongs to the object at ffff000800c2d400 [ 54.480213] which belongs to the cache kmalloc-64 of size 64 [ 54.492539] The buggy address is located 0 bytes to the right of [ 54.492539] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 54.505385] [ 54.506861] The buggy address belongs to the physical page: [ 54.512418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 54.520405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.526913] page_type: f5(slab) [ 54.530047] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.537770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.545489] page dumped because: kasan: bad access detected [ 54.551044] [ 54.552520] Memory state around the buggy address: [ 54.557299] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.564502] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.571707] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.578908] ^ [ 54.583686] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.590891] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.598092] ================================================================== [ 48.302784] ================================================================== [ 48.309820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 48.317110] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 48.324488] [ 48.325971] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 48.326019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.326037] Hardware name: WinLink E850-96 board (DT) [ 48.326057] Call trace: [ 48.326070] show_stack+0x20/0x38 (C) [ 48.326100] dump_stack_lvl+0x8c/0xd0 [ 48.326133] print_report+0x118/0x608 [ 48.326161] kasan_report+0xdc/0x128 [ 48.326187] kasan_check_range+0x100/0x1a8 [ 48.326219] __kasan_check_write+0x20/0x30 [ 48.326248] kasan_atomics_helper+0x684/0x4858 [ 48.326280] kasan_atomics+0x198/0x2e0 [ 48.326308] kunit_try_run_case+0x170/0x3f0 [ 48.326342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.326379] kthread+0x328/0x630 [ 48.326409] ret_from_fork+0x10/0x20 [ 48.326443] [ 48.396189] Allocated by task 312: [ 48.399575] kasan_save_stack+0x3c/0x68 [ 48.403394] kasan_save_track+0x20/0x40 [ 48.407213] kasan_save_alloc_info+0x40/0x58 [ 48.411466] __kasan_kmalloc+0xd4/0xd8 [ 48.415199] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.419713] kasan_atomics+0xb8/0x2e0 [ 48.423359] kunit_try_run_case+0x170/0x3f0 [ 48.427525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.432994] kthread+0x328/0x630 [ 48.436206] ret_from_fork+0x10/0x20 [ 48.439765] [ 48.441240] The buggy address belongs to the object at ffff000800c2d400 [ 48.441240] which belongs to the cache kmalloc-64 of size 64 [ 48.453567] The buggy address is located 0 bytes to the right of [ 48.453567] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 48.466413] [ 48.467889] The buggy address belongs to the physical page: [ 48.473445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 48.481432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.487941] page_type: f5(slab) [ 48.491074] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.498798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.506517] page dumped because: kasan: bad access detected [ 48.512072] [ 48.513548] Memory state around the buggy address: [ 48.518327] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.525531] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.532736] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.539937] ^ [ 48.544714] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.551919] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.559120] ================================================================== [ 56.715816] ================================================================== [ 56.722889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 56.730265] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 56.737644] [ 56.739126] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 56.739173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.739188] Hardware name: WinLink E850-96 board (DT) [ 56.739209] Call trace: [ 56.739221] show_stack+0x20/0x38 (C) [ 56.739252] dump_stack_lvl+0x8c/0xd0 [ 56.739285] print_report+0x118/0x608 [ 56.739316] kasan_report+0xdc/0x128 [ 56.739344] kasan_check_range+0x100/0x1a8 [ 56.739377] __kasan_check_write+0x20/0x30 [ 56.739407] kasan_atomics_helper+0x11f8/0x4858 [ 56.739438] kasan_atomics+0x198/0x2e0 [ 56.739464] kunit_try_run_case+0x170/0x3f0 [ 56.739497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.739535] kthread+0x328/0x630 [ 56.739564] ret_from_fork+0x10/0x20 [ 56.739597] [ 56.809431] Allocated by task 312: [ 56.812818] kasan_save_stack+0x3c/0x68 [ 56.816636] kasan_save_track+0x20/0x40 [ 56.820455] kasan_save_alloc_info+0x40/0x58 [ 56.824708] __kasan_kmalloc+0xd4/0xd8 [ 56.828441] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.832954] kasan_atomics+0xb8/0x2e0 [ 56.836600] kunit_try_run_case+0x170/0x3f0 [ 56.840767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.846236] kthread+0x328/0x630 [ 56.849447] ret_from_fork+0x10/0x20 [ 56.853006] [ 56.854483] The buggy address belongs to the object at ffff000800c2d400 [ 56.854483] which belongs to the cache kmalloc-64 of size 64 [ 56.866808] The buggy address is located 0 bytes to the right of [ 56.866808] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 56.879655] [ 56.881131] The buggy address belongs to the physical page: [ 56.886687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 56.894674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.901183] page_type: f5(slab) [ 56.904315] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.912040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.919759] page dumped because: kasan: bad access detected [ 56.925315] [ 56.926790] Memory state around the buggy address: [ 56.931569] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.938773] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.945977] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.953178] ^ [ 56.957956] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.965161] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.972362] ================================================================== [ 53.033089] ================================================================== [ 53.040131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 53.047421] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 53.054799] [ 53.056283] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 53.056331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.056347] Hardware name: WinLink E850-96 board (DT) [ 53.056368] Call trace: [ 53.056379] show_stack+0x20/0x38 (C) [ 53.056411] dump_stack_lvl+0x8c/0xd0 [ 53.056445] print_report+0x118/0x608 [ 53.056475] kasan_report+0xdc/0x128 [ 53.056504] kasan_check_range+0x100/0x1a8 [ 53.056534] __kasan_check_write+0x20/0x30 [ 53.056567] kasan_atomics_helper+0xd3c/0x4858 [ 53.056596] kasan_atomics+0x198/0x2e0 [ 53.056624] kunit_try_run_case+0x170/0x3f0 [ 53.056659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.056695] kthread+0x328/0x630 [ 53.056727] ret_from_fork+0x10/0x20 [ 53.056760] [ 53.126500] Allocated by task 312: [ 53.129887] kasan_save_stack+0x3c/0x68 [ 53.133705] kasan_save_track+0x20/0x40 [ 53.137524] kasan_save_alloc_info+0x40/0x58 [ 53.141777] __kasan_kmalloc+0xd4/0xd8 [ 53.145510] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.150024] kasan_atomics+0xb8/0x2e0 [ 53.153670] kunit_try_run_case+0x170/0x3f0 [ 53.157836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.163305] kthread+0x328/0x630 [ 53.166516] ret_from_fork+0x10/0x20 [ 53.170076] [ 53.171551] The buggy address belongs to the object at ffff000800c2d400 [ 53.171551] which belongs to the cache kmalloc-64 of size 64 [ 53.183878] The buggy address is located 0 bytes to the right of [ 53.183878] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 53.196724] [ 53.198201] The buggy address belongs to the physical page: [ 53.203758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 53.211743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.218252] page_type: f5(slab) [ 53.221386] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.229109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.236828] page dumped because: kasan: bad access detected [ 53.242383] [ 53.243859] Memory state around the buggy address: [ 53.248637] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.255842] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.263046] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.270247] ^ [ 53.275025] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.282230] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.289431] ================================================================== [ 49.881752] ================================================================== [ 49.888790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 49.896080] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 49.903458] [ 49.904939] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 49.904986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.905003] Hardware name: WinLink E850-96 board (DT) [ 49.905023] Call trace: [ 49.905036] show_stack+0x20/0x38 (C) [ 49.905067] dump_stack_lvl+0x8c/0xd0 [ 49.905097] print_report+0x118/0x608 [ 49.905126] kasan_report+0xdc/0x128 [ 49.905156] kasan_check_range+0x100/0x1a8 [ 49.905185] __kasan_check_write+0x20/0x30 [ 49.905217] kasan_atomics_helper+0x934/0x4858 [ 49.905245] kasan_atomics+0x198/0x2e0 [ 49.905275] kunit_try_run_case+0x170/0x3f0 [ 49.905305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.905341] kthread+0x328/0x630 [ 49.905371] ret_from_fork+0x10/0x20 [ 49.905403] [ 49.975158] Allocated by task 312: [ 49.978545] kasan_save_stack+0x3c/0x68 [ 49.982363] kasan_save_track+0x20/0x40 [ 49.986183] kasan_save_alloc_info+0x40/0x58 [ 49.990436] __kasan_kmalloc+0xd4/0xd8 [ 49.994168] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.998682] kasan_atomics+0xb8/0x2e0 [ 50.002328] kunit_try_run_case+0x170/0x3f0 [ 50.006495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.011963] kthread+0x328/0x630 [ 50.015175] ret_from_fork+0x10/0x20 [ 50.018734] [ 50.020209] The buggy address belongs to the object at ffff000800c2d400 [ 50.020209] which belongs to the cache kmalloc-64 of size 64 [ 50.032536] The buggy address is located 0 bytes to the right of [ 50.032536] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 50.045383] [ 50.046859] The buggy address belongs to the physical page: [ 50.052416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 50.060403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.066911] page_type: f5(slab) [ 50.070044] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.077767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.085486] page dumped because: kasan: bad access detected [ 50.091042] [ 50.092518] Memory state around the buggy address: [ 50.097297] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.104500] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.111705] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.118906] ^ [ 50.123684] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.130888] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.138090] ================================================================== [ 45.408496] ================================================================== [ 45.415594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 45.422883] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 45.430174] [ 45.431660] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 45.431710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.431727] Hardware name: WinLink E850-96 board (DT) [ 45.431748] Call trace: [ 45.431762] show_stack+0x20/0x38 (C) [ 45.431795] dump_stack_lvl+0x8c/0xd0 [ 45.431829] print_report+0x118/0x608 [ 45.431859] kasan_report+0xdc/0x128 [ 45.431888] kasan_check_range+0x100/0x1a8 [ 45.431920] __kasan_check_read+0x20/0x30 [ 45.431952] kasan_atomics_helper+0x2b0/0x4858 [ 45.431981] kasan_atomics+0x198/0x2e0 [ 45.432007] kunit_try_run_case+0x170/0x3f0 [ 45.432044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.432080] kthread+0x328/0x630 [ 45.432110] ret_from_fork+0x10/0x20 [ 45.432147] [ 45.501787] Allocated by task 312: [ 45.505175] kasan_save_stack+0x3c/0x68 [ 45.508993] kasan_save_track+0x20/0x40 [ 45.512812] kasan_save_alloc_info+0x40/0x58 [ 45.517065] __kasan_kmalloc+0xd4/0xd8 [ 45.520798] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.525312] kasan_atomics+0xb8/0x2e0 [ 45.528958] kunit_try_run_case+0x170/0x3f0 [ 45.533124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.538592] kthread+0x328/0x630 [ 45.541804] ret_from_fork+0x10/0x20 [ 45.545364] [ 45.546841] The buggy address belongs to the object at ffff000800c2d400 [ 45.546841] which belongs to the cache kmalloc-64 of size 64 [ 45.559166] The buggy address is located 0 bytes to the right of [ 45.559166] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 45.572012] [ 45.573489] The buggy address belongs to the physical page: [ 45.579047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 45.587034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.593541] page_type: f5(slab) [ 45.596675] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.604397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.612116] page dumped because: kasan: bad access detected [ 45.617672] [ 45.619147] Memory state around the buggy address: [ 45.623928] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.631130] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.638334] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.645536] ^ [ 45.650314] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.657518] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.664720] ================================================================== [ 54.081167] ================================================================== [ 54.088208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 54.095496] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 54.102874] [ 54.104356] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 54.104402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.104420] Hardware name: WinLink E850-96 board (DT) [ 54.104441] Call trace: [ 54.104456] show_stack+0x20/0x38 (C) [ 54.104487] dump_stack_lvl+0x8c/0xd0 [ 54.104518] print_report+0x118/0x608 [ 54.104549] kasan_report+0xdc/0x128 [ 54.104578] kasan_check_range+0x100/0x1a8 [ 54.104610] __kasan_check_write+0x20/0x30 [ 54.104642] kasan_atomics_helper+0xe44/0x4858 [ 54.104670] kasan_atomics+0x198/0x2e0 [ 54.104698] kunit_try_run_case+0x170/0x3f0 [ 54.104732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.104769] kthread+0x328/0x630 [ 54.104799] ret_from_fork+0x10/0x20 [ 54.104831] [ 54.174574] Allocated by task 312: [ 54.177961] kasan_save_stack+0x3c/0x68 [ 54.181779] kasan_save_track+0x20/0x40 [ 54.185598] kasan_save_alloc_info+0x40/0x58 [ 54.189852] __kasan_kmalloc+0xd4/0xd8 [ 54.193585] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.198098] kasan_atomics+0xb8/0x2e0 [ 54.201744] kunit_try_run_case+0x170/0x3f0 [ 54.205911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.211379] kthread+0x328/0x630 [ 54.214591] ret_from_fork+0x10/0x20 [ 54.218150] [ 54.219626] The buggy address belongs to the object at ffff000800c2d400 [ 54.219626] which belongs to the cache kmalloc-64 of size 64 [ 54.231952] The buggy address is located 0 bytes to the right of [ 54.231952] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 54.244799] [ 54.246275] The buggy address belongs to the physical page: [ 54.251831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 54.259818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.266328] page_type: f5(slab) [ 54.269461] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.277183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.284902] page dumped because: kasan: bad access detected [ 54.290458] [ 54.291934] Memory state around the buggy address: [ 54.296713] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.303916] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.311120] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.318322] ^ [ 54.323100] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.330305] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.337506] ================================================================== [ 57.507479] ================================================================== [ 57.514545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 57.521920] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 57.529298] [ 57.530782] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 57.530829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.530847] Hardware name: WinLink E850-96 board (DT) [ 57.530864] Call trace: [ 57.530874] show_stack+0x20/0x38 (C) [ 57.530906] dump_stack_lvl+0x8c/0xd0 [ 57.530936] print_report+0x118/0x608 [ 57.530966] kasan_report+0xdc/0x128 [ 57.530994] kasan_check_range+0x100/0x1a8 [ 57.531024] __kasan_check_write+0x20/0x30 [ 57.531055] kasan_atomics_helper+0x1384/0x4858 [ 57.531086] kasan_atomics+0x198/0x2e0 [ 57.531114] kunit_try_run_case+0x170/0x3f0 [ 57.531147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.531187] kthread+0x328/0x630 [ 57.531220] ret_from_fork+0x10/0x20 [ 57.531250] [ 57.601085] Allocated by task 312: [ 57.604472] kasan_save_stack+0x3c/0x68 [ 57.608290] kasan_save_track+0x20/0x40 [ 57.612110] kasan_save_alloc_info+0x40/0x58 [ 57.616363] __kasan_kmalloc+0xd4/0xd8 [ 57.620095] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.624609] kasan_atomics+0xb8/0x2e0 [ 57.628255] kunit_try_run_case+0x170/0x3f0 [ 57.632422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.637890] kthread+0x328/0x630 [ 57.641102] ret_from_fork+0x10/0x20 [ 57.644661] [ 57.646136] The buggy address belongs to the object at ffff000800c2d400 [ 57.646136] which belongs to the cache kmalloc-64 of size 64 [ 57.658463] The buggy address is located 0 bytes to the right of [ 57.658463] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 57.671310] [ 57.672786] The buggy address belongs to the physical page: [ 57.678342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 57.686330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.692837] page_type: f5(slab) [ 57.695970] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.703695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.711413] page dumped because: kasan: bad access detected [ 57.716969] [ 57.718445] Memory state around the buggy address: [ 57.723224] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.730427] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.737632] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.744833] ^ [ 57.749611] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.756816] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.764017] ================================================================== [ 58.031775] ================================================================== [ 58.038840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 58.046218] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 58.053596] [ 58.055077] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 58.055125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.055142] Hardware name: WinLink E850-96 board (DT) [ 58.055161] Call trace: [ 58.055174] show_stack+0x20/0x38 (C) [ 58.055205] dump_stack_lvl+0x8c/0xd0 [ 58.055236] print_report+0x118/0x608 [ 58.055265] kasan_report+0xdc/0x128 [ 58.055294] kasan_check_range+0x100/0x1a8 [ 58.055325] __kasan_check_write+0x20/0x30 [ 58.055357] kasan_atomics_helper+0x1414/0x4858 [ 58.055385] kasan_atomics+0x198/0x2e0 [ 58.055413] kunit_try_run_case+0x170/0x3f0 [ 58.055444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.055480] kthread+0x328/0x630 [ 58.055510] ret_from_fork+0x10/0x20 [ 58.055545] [ 58.125383] Allocated by task 312: [ 58.128770] kasan_save_stack+0x3c/0x68 [ 58.132588] kasan_save_track+0x20/0x40 [ 58.136407] kasan_save_alloc_info+0x40/0x58 [ 58.140660] __kasan_kmalloc+0xd4/0xd8 [ 58.144393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.148907] kasan_atomics+0xb8/0x2e0 [ 58.152553] kunit_try_run_case+0x170/0x3f0 [ 58.156719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.162188] kthread+0x328/0x630 [ 58.165400] ret_from_fork+0x10/0x20 [ 58.168959] [ 58.170434] The buggy address belongs to the object at ffff000800c2d400 [ 58.170434] which belongs to the cache kmalloc-64 of size 64 [ 58.182761] The buggy address is located 0 bytes to the right of [ 58.182761] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 58.195607] [ 58.197084] The buggy address belongs to the physical page: [ 58.202639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 58.210625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.217135] page_type: f5(slab) [ 58.220268] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.227992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.235711] page dumped because: kasan: bad access detected [ 58.241267] [ 58.242742] Memory state around the buggy address: [ 58.247520] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.254725] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.261930] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.269131] ^ [ 58.273909] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.281113] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.288315] ================================================================== [ 56.188078] ================================================================== [ 56.195119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 56.202495] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 56.209874] [ 56.211355] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 56.211403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.211417] Hardware name: WinLink E850-96 board (DT) [ 56.211438] Call trace: [ 56.211448] show_stack+0x20/0x38 (C) [ 56.211478] dump_stack_lvl+0x8c/0xd0 [ 56.211511] print_report+0x118/0x608 [ 56.211541] kasan_report+0xdc/0x128 [ 56.211567] kasan_check_range+0x100/0x1a8 [ 56.211599] __kasan_check_write+0x20/0x30 [ 56.211630] kasan_atomics_helper+0x1128/0x4858 [ 56.211660] kasan_atomics+0x198/0x2e0 [ 56.211687] kunit_try_run_case+0x170/0x3f0 [ 56.211720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.211759] kthread+0x328/0x630 [ 56.211790] ret_from_fork+0x10/0x20 [ 56.211824] [ 56.281661] Allocated by task 312: [ 56.285048] kasan_save_stack+0x3c/0x68 [ 56.288865] kasan_save_track+0x20/0x40 [ 56.292685] kasan_save_alloc_info+0x40/0x58 [ 56.296938] __kasan_kmalloc+0xd4/0xd8 [ 56.300671] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.305184] kasan_atomics+0xb8/0x2e0 [ 56.308830] kunit_try_run_case+0x170/0x3f0 [ 56.312997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.318466] kthread+0x328/0x630 [ 56.321677] ret_from_fork+0x10/0x20 [ 56.325237] [ 56.326712] The buggy address belongs to the object at ffff000800c2d400 [ 56.326712] which belongs to the cache kmalloc-64 of size 64 [ 56.339039] The buggy address is located 0 bytes to the right of [ 56.339039] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 56.351885] [ 56.353361] The buggy address belongs to the physical page: [ 56.358917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 56.366906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.373413] page_type: f5(slab) [ 56.376546] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.384270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.391989] page dumped because: kasan: bad access detected [ 56.397544] [ 56.399020] Memory state around the buggy address: [ 56.403800] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.411002] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.418207] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.425409] ^ [ 56.430186] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.437391] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.444592] ================================================================== [ 52.772654] ================================================================== [ 52.779718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 52.787095] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 52.794387] [ 52.795871] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 52.795920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.795936] Hardware name: WinLink E850-96 board (DT) [ 52.795955] Call trace: [ 52.795967] show_stack+0x20/0x38 (C) [ 52.795999] dump_stack_lvl+0x8c/0xd0 [ 52.796031] print_report+0x118/0x608 [ 52.796060] kasan_report+0xdc/0x128 [ 52.796090] __asan_report_load4_noabort+0x20/0x30 [ 52.796124] kasan_atomics_helper+0x3dd8/0x4858 [ 52.796153] kasan_atomics+0x198/0x2e0 [ 52.796182] kunit_try_run_case+0x170/0x3f0 [ 52.796215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.796253] kthread+0x328/0x630 [ 52.796283] ret_from_fork+0x10/0x20 [ 52.796315] [ 52.862788] Allocated by task 312: [ 52.866176] kasan_save_stack+0x3c/0x68 [ 52.869993] kasan_save_track+0x20/0x40 [ 52.873812] kasan_save_alloc_info+0x40/0x58 [ 52.878066] __kasan_kmalloc+0xd4/0xd8 [ 52.881799] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.886312] kasan_atomics+0xb8/0x2e0 [ 52.889958] kunit_try_run_case+0x170/0x3f0 [ 52.894125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.899593] kthread+0x328/0x630 [ 52.902805] ret_from_fork+0x10/0x20 [ 52.906364] [ 52.907840] The buggy address belongs to the object at ffff000800c2d400 [ 52.907840] which belongs to the cache kmalloc-64 of size 64 [ 52.920166] The buggy address is located 0 bytes to the right of [ 52.920166] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 52.933013] [ 52.934489] The buggy address belongs to the physical page: [ 52.940046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 52.948032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.954541] page_type: f5(slab) [ 52.957675] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.965398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.973117] page dumped because: kasan: bad access detected [ 52.978672] [ 52.980147] Memory state around the buggy address: [ 52.984927] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.992130] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.999335] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.006536] ^ [ 53.011314] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.018519] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.025720] ================================================================== [ 60.135885] ================================================================== [ 60.142976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 60.150353] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 60.157731] [ 60.159213] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 60.159258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.159273] Hardware name: WinLink E850-96 board (DT) [ 60.159294] Call trace: [ 60.159307] show_stack+0x20/0x38 (C) [ 60.159340] dump_stack_lvl+0x8c/0xd0 [ 60.159370] print_report+0x118/0x608 [ 60.159398] kasan_report+0xdc/0x128 [ 60.159425] kasan_check_range+0x100/0x1a8 [ 60.159455] __kasan_check_write+0x20/0x30 [ 60.159486] kasan_atomics_helper+0x16d0/0x4858 [ 60.159516] kasan_atomics+0x198/0x2e0 [ 60.159542] kunit_try_run_case+0x170/0x3f0 [ 60.159574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.159609] kthread+0x328/0x630 [ 60.159643] ret_from_fork+0x10/0x20 [ 60.159674] [ 60.229518] Allocated by task 312: [ 60.232905] kasan_save_stack+0x3c/0x68 [ 60.236723] kasan_save_track+0x20/0x40 [ 60.240542] kasan_save_alloc_info+0x40/0x58 [ 60.244796] __kasan_kmalloc+0xd4/0xd8 [ 60.248528] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.253042] kasan_atomics+0xb8/0x2e0 [ 60.256688] kunit_try_run_case+0x170/0x3f0 [ 60.260854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.266323] kthread+0x328/0x630 [ 60.269535] ret_from_fork+0x10/0x20 [ 60.273094] [ 60.274569] The buggy address belongs to the object at ffff000800c2d400 [ 60.274569] which belongs to the cache kmalloc-64 of size 64 [ 60.286896] The buggy address is located 0 bytes to the right of [ 60.286896] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 60.299743] [ 60.301218] The buggy address belongs to the physical page: [ 60.306774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 60.314762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.321272] page_type: f5(slab) [ 60.324405] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.332127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.339848] page dumped because: kasan: bad access detected [ 60.345401] [ 60.346877] Memory state around the buggy address: [ 60.351657] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.358860] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.366065] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.373266] ^ [ 60.378044] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.385248] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.392450] ================================================================== [ 56.451938] ================================================================== [ 56.459003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 56.466381] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 56.473759] [ 56.475241] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 56.475288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.475303] Hardware name: WinLink E850-96 board (DT) [ 56.475321] Call trace: [ 56.475331] show_stack+0x20/0x38 (C) [ 56.475362] dump_stack_lvl+0x8c/0xd0 [ 56.475393] print_report+0x118/0x608 [ 56.475424] kasan_report+0xdc/0x128 [ 56.475453] kasan_check_range+0x100/0x1a8 [ 56.475484] __kasan_check_write+0x20/0x30 [ 56.475516] kasan_atomics_helper+0x1190/0x4858 [ 56.475544] kasan_atomics+0x198/0x2e0 [ 56.475572] kunit_try_run_case+0x170/0x3f0 [ 56.475603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.475639] kthread+0x328/0x630 [ 56.475671] ret_from_fork+0x10/0x20 [ 56.475701] [ 56.545546] Allocated by task 312: [ 56.548933] kasan_save_stack+0x3c/0x68 [ 56.552751] kasan_save_track+0x20/0x40 [ 56.556570] kasan_save_alloc_info+0x40/0x58 [ 56.560823] __kasan_kmalloc+0xd4/0xd8 [ 56.564556] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.569069] kasan_atomics+0xb8/0x2e0 [ 56.572715] kunit_try_run_case+0x170/0x3f0 [ 56.576882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.582351] kthread+0x328/0x630 [ 56.585562] ret_from_fork+0x10/0x20 [ 56.589121] [ 56.590597] The buggy address belongs to the object at ffff000800c2d400 [ 56.590597] which belongs to the cache kmalloc-64 of size 64 [ 56.602924] The buggy address is located 0 bytes to the right of [ 56.602924] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 56.615770] [ 56.617246] The buggy address belongs to the physical page: [ 56.622802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 56.630789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.637298] page_type: f5(slab) [ 56.640430] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.648155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.655874] page dumped because: kasan: bad access detected [ 56.661429] [ 56.662905] Memory state around the buggy address: [ 56.667684] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.674888] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.682092] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.689294] ^ [ 56.694071] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.701276] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.708477] ================================================================== [ 44.620742] ================================================================== [ 44.627761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 44.635135] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 44.642513] [ 44.643998] CPU: 5 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 44.644053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.644069] Hardware name: WinLink E850-96 board (DT) [ 44.644089] Call trace: [ 44.644101] show_stack+0x20/0x38 (C) [ 44.644134] dump_stack_lvl+0x8c/0xd0 [ 44.644169] print_report+0x118/0x608 [ 44.644202] kasan_report+0xdc/0x128 [ 44.644233] __asan_report_store4_noabort+0x20/0x30 [ 44.644266] kasan_atomics_helper+0x3f7c/0x4858 [ 44.644296] kasan_atomics+0x198/0x2e0 [ 44.644325] kunit_try_run_case+0x170/0x3f0 [ 44.644360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.644397] kthread+0x328/0x630 [ 44.644433] ret_from_fork+0x10/0x20 [ 44.644467] [ 44.711001] Allocated by task 312: [ 44.714388] kasan_save_stack+0x3c/0x68 [ 44.718206] kasan_save_track+0x20/0x40 [ 44.722025] kasan_save_alloc_info+0x40/0x58 [ 44.726279] __kasan_kmalloc+0xd4/0xd8 [ 44.730011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.734525] kasan_atomics+0xb8/0x2e0 [ 44.738171] kunit_try_run_case+0x170/0x3f0 [ 44.742337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.747807] kthread+0x328/0x630 [ 44.751018] ret_from_fork+0x10/0x20 [ 44.754577] [ 44.756054] The buggy address belongs to the object at ffff000800c2d400 [ 44.756054] which belongs to the cache kmalloc-64 of size 64 [ 44.768380] The buggy address is located 0 bytes to the right of [ 44.768380] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 44.781226] [ 44.782705] The buggy address belongs to the physical page: [ 44.788261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 44.796246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.802755] page_type: f5(slab) [ 44.805889] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 44.813610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.821329] page dumped because: kasan: bad access detected [ 44.826884] [ 44.828360] Memory state around the buggy address: [ 44.833140] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.840343] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.847548] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 44.854749] ^ [ 44.859527] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.866732] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.873933] ================================================================== [ 58.559517] ================================================================== [ 58.566610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 58.573988] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 58.581366] [ 58.582849] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 58.582895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.582911] Hardware name: WinLink E850-96 board (DT) [ 58.582932] Call trace: [ 58.582945] show_stack+0x20/0x38 (C) [ 58.582976] dump_stack_lvl+0x8c/0xd0 [ 58.583007] print_report+0x118/0x608 [ 58.583035] kasan_report+0xdc/0x128 [ 58.583065] kasan_check_range+0x100/0x1a8 [ 58.583095] __kasan_check_write+0x20/0x30 [ 58.583128] kasan_atomics_helper+0x14e4/0x4858 [ 58.583157] kasan_atomics+0x198/0x2e0 [ 58.583183] kunit_try_run_case+0x170/0x3f0 [ 58.583215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.583251] kthread+0x328/0x630 [ 58.583284] ret_from_fork+0x10/0x20 [ 58.583316] [ 58.653153] Allocated by task 312: [ 58.656540] kasan_save_stack+0x3c/0x68 [ 58.660358] kasan_save_track+0x20/0x40 [ 58.664177] kasan_save_alloc_info+0x40/0x58 [ 58.668431] __kasan_kmalloc+0xd4/0xd8 [ 58.672163] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.676677] kasan_atomics+0xb8/0x2e0 [ 58.680323] kunit_try_run_case+0x170/0x3f0 [ 58.684489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.689958] kthread+0x328/0x630 [ 58.693169] ret_from_fork+0x10/0x20 [ 58.696728] [ 58.698204] The buggy address belongs to the object at ffff000800c2d400 [ 58.698204] which belongs to the cache kmalloc-64 of size 64 [ 58.710531] The buggy address is located 0 bytes to the right of [ 58.710531] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 58.723377] [ 58.724853] The buggy address belongs to the physical page: [ 58.730410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 58.738396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.744905] page_type: f5(slab) [ 58.748038] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.755762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.763481] page dumped because: kasan: bad access detected [ 58.769037] [ 58.770512] Memory state around the buggy address: [ 58.775290] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.782495] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.789700] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.796901] ^ [ 58.801678] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.808883] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.816085] ================================================================== [ 59.611637] ================================================================== [ 59.618678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 59.626055] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 59.633433] [ 59.634915] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 59.634961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.634976] Hardware name: WinLink E850-96 board (DT) [ 59.634993] Call trace: [ 59.635006] show_stack+0x20/0x38 (C) [ 59.635036] dump_stack_lvl+0x8c/0xd0 [ 59.635066] print_report+0x118/0x608 [ 59.635097] kasan_report+0xdc/0x128 [ 59.635124] kasan_check_range+0x100/0x1a8 [ 59.635156] __kasan_check_write+0x20/0x30 [ 59.635187] kasan_atomics_helper+0x1644/0x4858 [ 59.635217] kasan_atomics+0x198/0x2e0 [ 59.635246] kunit_try_run_case+0x170/0x3f0 [ 59.635280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.635318] kthread+0x328/0x630 [ 59.635349] ret_from_fork+0x10/0x20 [ 59.635381] [ 59.705220] Allocated by task 312: [ 59.708607] kasan_save_stack+0x3c/0x68 [ 59.712425] kasan_save_track+0x20/0x40 [ 59.716245] kasan_save_alloc_info+0x40/0x58 [ 59.720498] __kasan_kmalloc+0xd4/0xd8 [ 59.724231] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.728745] kasan_atomics+0xb8/0x2e0 [ 59.732390] kunit_try_run_case+0x170/0x3f0 [ 59.736557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.742025] kthread+0x328/0x630 [ 59.745237] ret_from_fork+0x10/0x20 [ 59.748796] [ 59.750272] The buggy address belongs to the object at ffff000800c2d400 [ 59.750272] which belongs to the cache kmalloc-64 of size 64 [ 59.762598] The buggy address is located 0 bytes to the right of [ 59.762598] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 59.775445] [ 59.776921] The buggy address belongs to the physical page: [ 59.782477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 59.790464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.796972] page_type: f5(slab) [ 59.800105] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.807830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.815549] page dumped because: kasan: bad access detected [ 59.821104] [ 59.822580] Memory state around the buggy address: [ 59.827359] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.834562] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.841767] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.848968] ^ [ 59.853746] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.860951] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.868152] ================================================================== [ 54.869155] ================================================================== [ 54.876216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 54.883505] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 54.890883] [ 54.892366] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 54.892411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.892426] Hardware name: WinLink E850-96 board (DT) [ 54.892444] Call trace: [ 54.892459] show_stack+0x20/0x38 (C) [ 54.892490] dump_stack_lvl+0x8c/0xd0 [ 54.892522] print_report+0x118/0x608 [ 54.892552] kasan_report+0xdc/0x128 [ 54.892582] kasan_check_range+0x100/0x1a8 [ 54.892613] __kasan_check_write+0x20/0x30 [ 54.892645] kasan_atomics_helper+0xf20/0x4858 [ 54.892673] kasan_atomics+0x198/0x2e0 [ 54.892702] kunit_try_run_case+0x170/0x3f0 [ 54.892735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.892772] kthread+0x328/0x630 [ 54.892803] ret_from_fork+0x10/0x20 [ 54.892834] [ 54.962583] Allocated by task 312: [ 54.965971] kasan_save_stack+0x3c/0x68 [ 54.969788] kasan_save_track+0x20/0x40 [ 54.973608] kasan_save_alloc_info+0x40/0x58 [ 54.977861] __kasan_kmalloc+0xd4/0xd8 [ 54.981594] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.986107] kasan_atomics+0xb8/0x2e0 [ 54.989753] kunit_try_run_case+0x170/0x3f0 [ 54.993920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.999388] kthread+0x328/0x630 [ 55.002600] ret_from_fork+0x10/0x20 [ 55.006159] [ 55.007636] The buggy address belongs to the object at ffff000800c2d400 [ 55.007636] which belongs to the cache kmalloc-64 of size 64 [ 55.019961] The buggy address is located 0 bytes to the right of [ 55.019961] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 55.032808] [ 55.034284] The buggy address belongs to the physical page: [ 55.039839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 55.047827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.054336] page_type: f5(slab) [ 55.057468] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.065192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.072911] page dumped because: kasan: bad access detected [ 55.078467] [ 55.079942] Memory state around the buggy address: [ 55.084722] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.091925] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.099130] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.106331] ^ [ 55.111109] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.118314] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.125515] ================================================================== [ 46.456790] ================================================================== [ 46.463841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 46.471131] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 46.478509] [ 46.479993] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 46.480046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.480064] Hardware name: WinLink E850-96 board (DT) [ 46.480082] Call trace: [ 46.480093] show_stack+0x20/0x38 (C) [ 46.480124] dump_stack_lvl+0x8c/0xd0 [ 46.480156] print_report+0x118/0x608 [ 46.480186] kasan_report+0xdc/0x128 [ 46.480215] kasan_check_range+0x100/0x1a8 [ 46.480246] __kasan_check_write+0x20/0x30 [ 46.480277] kasan_atomics_helper+0x3ac/0x4858 [ 46.480305] kasan_atomics+0x198/0x2e0 [ 46.480333] kunit_try_run_case+0x170/0x3f0 [ 46.480365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.480402] kthread+0x328/0x630 [ 46.480434] ret_from_fork+0x10/0x20 [ 46.480468] [ 46.550210] Allocated by task 312: [ 46.553595] kasan_save_stack+0x3c/0x68 [ 46.557414] kasan_save_track+0x20/0x40 [ 46.561234] kasan_save_alloc_info+0x40/0x58 [ 46.565487] __kasan_kmalloc+0xd4/0xd8 [ 46.569220] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.573733] kasan_atomics+0xb8/0x2e0 [ 46.577379] kunit_try_run_case+0x170/0x3f0 [ 46.581546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.587015] kthread+0x328/0x630 [ 46.590226] ret_from_fork+0x10/0x20 [ 46.593785] [ 46.595260] The buggy address belongs to the object at ffff000800c2d400 [ 46.595260] which belongs to the cache kmalloc-64 of size 64 [ 46.607587] The buggy address is located 0 bytes to the right of [ 46.607587] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 46.620434] [ 46.621910] The buggy address belongs to the physical page: [ 46.627469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 46.635453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.641962] page_type: f5(slab) [ 46.645094] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.652819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.660538] page dumped because: kasan: bad access detected [ 46.666093] [ 46.667568] Memory state around the buggy address: [ 46.672348] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.679552] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.686756] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.693958] ^ [ 46.698735] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.705940] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.713141] ================================================================== [ 54.605459] ================================================================== [ 54.612503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 54.619794] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 54.627172] [ 54.628653] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 54.628699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.628716] Hardware name: WinLink E850-96 board (DT) [ 54.628737] Call trace: [ 54.628748] show_stack+0x20/0x38 (C) [ 54.628779] dump_stack_lvl+0x8c/0xd0 [ 54.628811] print_report+0x118/0x608 [ 54.628841] kasan_report+0xdc/0x128 [ 54.628868] kasan_check_range+0x100/0x1a8 [ 54.628898] __kasan_check_write+0x20/0x30 [ 54.628930] kasan_atomics_helper+0xeb8/0x4858 [ 54.628958] kasan_atomics+0x198/0x2e0 [ 54.628985] kunit_try_run_case+0x170/0x3f0 [ 54.629017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.629054] kthread+0x328/0x630 [ 54.629086] ret_from_fork+0x10/0x20 [ 54.629119] [ 54.698872] Allocated by task 312: [ 54.702257] kasan_save_stack+0x3c/0x68 [ 54.706076] kasan_save_track+0x20/0x40 [ 54.709896] kasan_save_alloc_info+0x40/0x58 [ 54.714150] __kasan_kmalloc+0xd4/0xd8 [ 54.717882] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.722396] kasan_atomics+0xb8/0x2e0 [ 54.726042] kunit_try_run_case+0x170/0x3f0 [ 54.730208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.735677] kthread+0x328/0x630 [ 54.738889] ret_from_fork+0x10/0x20 [ 54.742447] [ 54.743923] The buggy address belongs to the object at ffff000800c2d400 [ 54.743923] which belongs to the cache kmalloc-64 of size 64 [ 54.756250] The buggy address is located 0 bytes to the right of [ 54.756250] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 54.769096] [ 54.770572] The buggy address belongs to the physical page: [ 54.776128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 54.784116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.790624] page_type: f5(slab) [ 54.793758] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.801481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.809200] page dumped because: kasan: bad access detected [ 54.814755] [ 54.816231] Memory state around the buggy address: [ 54.821011] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.828214] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.835419] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.842620] ^ [ 54.847398] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.854602] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.861803] ================================================================== [ 45.932518] ================================================================== [ 45.939545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 45.946833] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 45.954212] [ 45.955696] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 45.955750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.955766] Hardware name: WinLink E850-96 board (DT) [ 45.955786] Call trace: [ 45.955798] show_stack+0x20/0x38 (C) [ 45.955828] dump_stack_lvl+0x8c/0xd0 [ 45.955863] print_report+0x118/0x608 [ 45.955893] kasan_report+0xdc/0x128 [ 45.955922] kasan_check_range+0x100/0x1a8 [ 45.955954] __kasan_check_write+0x20/0x30 [ 45.955986] kasan_atomics_helper+0x32c/0x4858 [ 45.956015] kasan_atomics+0x198/0x2e0 [ 45.956042] kunit_try_run_case+0x170/0x3f0 [ 45.956076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.956114] kthread+0x328/0x630 [ 45.956147] ret_from_fork+0x10/0x20 [ 45.956181] [ 46.025912] Allocated by task 312: [ 46.029299] kasan_save_stack+0x3c/0x68 [ 46.033117] kasan_save_track+0x20/0x40 [ 46.036936] kasan_save_alloc_info+0x40/0x58 [ 46.041190] __kasan_kmalloc+0xd4/0xd8 [ 46.044922] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.049436] kasan_atomics+0xb8/0x2e0 [ 46.053082] kunit_try_run_case+0x170/0x3f0 [ 46.057248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.062717] kthread+0x328/0x630 [ 46.065928] ret_from_fork+0x10/0x20 [ 46.069488] [ 46.070965] The buggy address belongs to the object at ffff000800c2d400 [ 46.070965] which belongs to the cache kmalloc-64 of size 64 [ 46.083290] The buggy address is located 0 bytes to the right of [ 46.083290] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 46.096137] [ 46.097612] The buggy address belongs to the physical page: [ 46.103171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 46.111156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.117664] page_type: f5(slab) [ 46.120797] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.128521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.136240] page dumped because: kasan: bad access detected [ 46.141795] [ 46.143271] Memory state around the buggy address: [ 46.148050] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.155254] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.162459] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.169660] ^ [ 46.174437] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.181642] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.188843] ================================================================== [ 59.875469] ================================================================== [ 59.882564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 59.889940] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 59.897231] [ 59.898714] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 59.898760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.898776] Hardware name: WinLink E850-96 board (DT) [ 59.898795] Call trace: [ 59.898806] show_stack+0x20/0x38 (C) [ 59.898839] dump_stack_lvl+0x8c/0xd0 [ 59.898868] print_report+0x118/0x608 [ 59.898897] kasan_report+0xdc/0x128 [ 59.898925] __asan_report_load8_noabort+0x20/0x30 [ 59.898957] kasan_atomics_helper+0x3df4/0x4858 [ 59.898986] kasan_atomics+0x198/0x2e0 [ 59.899015] kunit_try_run_case+0x170/0x3f0 [ 59.899047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.899085] kthread+0x328/0x630 [ 59.899115] ret_from_fork+0x10/0x20 [ 59.899147] [ 59.965633] Allocated by task 312: [ 59.969020] kasan_save_stack+0x3c/0x68 [ 59.972838] kasan_save_track+0x20/0x40 [ 59.976657] kasan_save_alloc_info+0x40/0x58 [ 59.980911] __kasan_kmalloc+0xd4/0xd8 [ 59.984643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.989157] kasan_atomics+0xb8/0x2e0 [ 59.992803] kunit_try_run_case+0x170/0x3f0 [ 59.996970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.002438] kthread+0x328/0x630 [ 60.005650] ret_from_fork+0x10/0x20 [ 60.009209] [ 60.010685] The buggy address belongs to the object at ffff000800c2d400 [ 60.010685] which belongs to the cache kmalloc-64 of size 64 [ 60.023011] The buggy address is located 0 bytes to the right of [ 60.023011] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 60.035858] [ 60.037334] The buggy address belongs to the physical page: [ 60.042890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 60.050877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.057385] page_type: f5(slab) [ 60.060518] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.068243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.075961] page dumped because: kasan: bad access detected [ 60.081517] [ 60.082992] Memory state around the buggy address: [ 60.087772] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.094975] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.102180] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.109381] ^ [ 60.114159] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.121363] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.128565] ================================================================== [ 61.184513] ================================================================== [ 61.191573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 61.198948] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 61.206326] [ 61.207808] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 61.207857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.207873] Hardware name: WinLink E850-96 board (DT) [ 61.207891] Call trace: [ 61.207906] show_stack+0x20/0x38 (C) [ 61.207938] dump_stack_lvl+0x8c/0xd0 [ 61.207970] print_report+0x118/0x608 [ 61.208000] kasan_report+0xdc/0x128 [ 61.208028] kasan_check_range+0x100/0x1a8 [ 61.208058] __kasan_check_write+0x20/0x30 [ 61.208089] kasan_atomics_helper+0x17ec/0x4858 [ 61.208120] kasan_atomics+0x198/0x2e0 [ 61.208148] kunit_try_run_case+0x170/0x3f0 [ 61.208180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.208215] kthread+0x328/0x630 [ 61.208247] ret_from_fork+0x10/0x20 [ 61.208278] [ 61.278113] Allocated by task 312: [ 61.281500] kasan_save_stack+0x3c/0x68 [ 61.285318] kasan_save_track+0x20/0x40 [ 61.289138] kasan_save_alloc_info+0x40/0x58 [ 61.293391] __kasan_kmalloc+0xd4/0xd8 [ 61.297124] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.301637] kasan_atomics+0xb8/0x2e0 [ 61.305283] kunit_try_run_case+0x170/0x3f0 [ 61.309450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.314918] kthread+0x328/0x630 [ 61.318130] ret_from_fork+0x10/0x20 [ 61.321689] [ 61.323165] The buggy address belongs to the object at ffff000800c2d400 [ 61.323165] which belongs to the cache kmalloc-64 of size 64 [ 61.335492] The buggy address is located 0 bytes to the right of [ 61.335492] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 61.348338] [ 61.349814] The buggy address belongs to the physical page: [ 61.355371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 61.363357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.369866] page_type: f5(slab) [ 61.373000] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.380723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.388442] page dumped because: kasan: bad access detected [ 61.393997] [ 61.395473] Memory state around the buggy address: [ 61.400252] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.407455] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.414660] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.421861] ^ [ 61.426639] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.433843] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.441045] ================================================================== [ 44.881315] ================================================================== [ 44.888348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 44.895634] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 44.902925] [ 44.904412] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 44.904465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.904482] Hardware name: WinLink E850-96 board (DT) [ 44.904504] Call trace: [ 44.904517] show_stack+0x20/0x38 (C) [ 44.904552] dump_stack_lvl+0x8c/0xd0 [ 44.904585] print_report+0x118/0x608 [ 44.904616] kasan_report+0xdc/0x128 [ 44.904644] kasan_check_range+0x100/0x1a8 [ 44.904675] __kasan_check_read+0x20/0x30 [ 44.904708] kasan_atomics_helper+0x1ec/0x4858 [ 44.904737] kasan_atomics+0x198/0x2e0 [ 44.904763] kunit_try_run_case+0x170/0x3f0 [ 44.904799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.904838] kthread+0x328/0x630 [ 44.904872] ret_from_fork+0x10/0x20 [ 44.904908] [ 44.974538] Allocated by task 312: [ 44.977926] kasan_save_stack+0x3c/0x68 [ 44.981744] kasan_save_track+0x20/0x40 [ 44.985563] kasan_save_alloc_info+0x40/0x58 [ 44.989816] __kasan_kmalloc+0xd4/0xd8 [ 44.993549] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.998063] kasan_atomics+0xb8/0x2e0 [ 45.001709] kunit_try_run_case+0x170/0x3f0 [ 45.005875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.011345] kthread+0x328/0x630 [ 45.014555] ret_from_fork+0x10/0x20 [ 45.018114] [ 45.019591] The buggy address belongs to the object at ffff000800c2d400 [ 45.019591] which belongs to the cache kmalloc-64 of size 64 [ 45.031918] The buggy address is located 0 bytes to the right of [ 45.031918] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 45.044763] [ 45.046240] The buggy address belongs to the physical page: [ 45.051799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 45.059783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.066292] page_type: f5(slab) [ 45.069428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.077148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.084867] page dumped because: kasan: bad access detected [ 45.090422] [ 45.091898] Memory state around the buggy address: [ 45.096679] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.103881] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.111085] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.118287] ^ [ 45.123064] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.130269] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.137472] ================================================================== [ 47.511594] ================================================================== [ 47.518686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 47.525976] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 47.533355] [ 47.534837] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 47.534884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.534902] Hardware name: WinLink E850-96 board (DT) [ 47.534920] Call trace: [ 47.534933] show_stack+0x20/0x38 (C) [ 47.534965] dump_stack_lvl+0x8c/0xd0 [ 47.534998] print_report+0x118/0x608 [ 47.535028] kasan_report+0xdc/0x128 [ 47.535057] kasan_check_range+0x100/0x1a8 [ 47.535088] __kasan_check_write+0x20/0x30 [ 47.535121] kasan_atomics_helper+0x54c/0x4858 [ 47.535150] kasan_atomics+0x198/0x2e0 [ 47.535178] kunit_try_run_case+0x170/0x3f0 [ 47.535212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.535246] kthread+0x328/0x630 [ 47.535279] ret_from_fork+0x10/0x20 [ 47.535310] [ 47.605055] Allocated by task 312: [ 47.608440] kasan_save_stack+0x3c/0x68 [ 47.612260] kasan_save_track+0x20/0x40 [ 47.616079] kasan_save_alloc_info+0x40/0x58 [ 47.620333] __kasan_kmalloc+0xd4/0xd8 [ 47.624065] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.628579] kasan_atomics+0xb8/0x2e0 [ 47.632225] kunit_try_run_case+0x170/0x3f0 [ 47.636391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.641860] kthread+0x328/0x630 [ 47.645072] ret_from_fork+0x10/0x20 [ 47.648631] [ 47.650106] The buggy address belongs to the object at ffff000800c2d400 [ 47.650106] which belongs to the cache kmalloc-64 of size 64 [ 47.662433] The buggy address is located 0 bytes to the right of [ 47.662433] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 47.675279] [ 47.676755] The buggy address belongs to the physical page: [ 47.682311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 47.690300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.696807] page_type: f5(slab) [ 47.699940] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.707664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.715383] page dumped because: kasan: bad access detected [ 47.720938] [ 47.722414] Memory state around the buggy address: [ 47.727194] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.734397] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.741602] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.748803] ^ [ 47.753580] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.760785] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.767986] ================================================================== [ 52.508944] ================================================================== [ 52.516007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 52.523297] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 52.530675] [ 52.532158] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 52.532204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.532221] Hardware name: WinLink E850-96 board (DT) [ 52.532241] Call trace: [ 52.532255] show_stack+0x20/0x38 (C) [ 52.532287] dump_stack_lvl+0x8c/0xd0 [ 52.532317] print_report+0x118/0x608 [ 52.532347] kasan_report+0xdc/0x128 [ 52.532373] kasan_check_range+0x100/0x1a8 [ 52.532404] __kasan_check_write+0x20/0x30 [ 52.532435] kasan_atomics_helper+0xca0/0x4858 [ 52.532463] kasan_atomics+0x198/0x2e0 [ 52.532492] kunit_try_run_case+0x170/0x3f0 [ 52.532527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.532565] kthread+0x328/0x630 [ 52.532597] ret_from_fork+0x10/0x20 [ 52.532629] [ 52.602375] Allocated by task 312: [ 52.605763] kasan_save_stack+0x3c/0x68 [ 52.609580] kasan_save_track+0x20/0x40 [ 52.613400] kasan_save_alloc_info+0x40/0x58 [ 52.617653] __kasan_kmalloc+0xd4/0xd8 [ 52.621386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.625900] kasan_atomics+0xb8/0x2e0 [ 52.629546] kunit_try_run_case+0x170/0x3f0 [ 52.633712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.639181] kthread+0x328/0x630 [ 52.642393] ret_from_fork+0x10/0x20 [ 52.645951] [ 52.647427] The buggy address belongs to the object at ffff000800c2d400 [ 52.647427] which belongs to the cache kmalloc-64 of size 64 [ 52.659754] The buggy address is located 0 bytes to the right of [ 52.659754] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 52.672600] [ 52.674076] The buggy address belongs to the physical page: [ 52.679632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 52.687619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.694128] page_type: f5(slab) [ 52.697262] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.704985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.712704] page dumped because: kasan: bad access detected [ 52.718259] [ 52.719735] Memory state around the buggy address: [ 52.724514] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.731718] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.738922] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.746123] ^ [ 52.750901] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.758106] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.765307] ================================================================== [ 46.720522] ================================================================== [ 46.727552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 46.734843] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 46.742221] [ 46.743703] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 46.743754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.743773] Hardware name: WinLink E850-96 board (DT) [ 46.743795] Call trace: [ 46.743809] show_stack+0x20/0x38 (C) [ 46.743840] dump_stack_lvl+0x8c/0xd0 [ 46.743871] print_report+0x118/0x608 [ 46.743900] kasan_report+0xdc/0x128 [ 46.743928] kasan_check_range+0x100/0x1a8 [ 46.743959] __kasan_check_write+0x20/0x30 [ 46.743988] kasan_atomics_helper+0x414/0x4858 [ 46.744019] kasan_atomics+0x198/0x2e0 [ 46.744045] kunit_try_run_case+0x170/0x3f0 [ 46.744078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.744117] kthread+0x328/0x630 [ 46.744148] ret_from_fork+0x10/0x20 [ 46.744182] [ 46.813921] Allocated by task 312: [ 46.817307] kasan_save_stack+0x3c/0x68 [ 46.821126] kasan_save_track+0x20/0x40 [ 46.824945] kasan_save_alloc_info+0x40/0x58 [ 46.829199] __kasan_kmalloc+0xd4/0xd8 [ 46.832931] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.837445] kasan_atomics+0xb8/0x2e0 [ 46.841091] kunit_try_run_case+0x170/0x3f0 [ 46.845257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.850726] kthread+0x328/0x630 [ 46.853938] ret_from_fork+0x10/0x20 [ 46.857497] [ 46.858975] The buggy address belongs to the object at ffff000800c2d400 [ 46.858975] which belongs to the cache kmalloc-64 of size 64 [ 46.871299] The buggy address is located 0 bytes to the right of [ 46.871299] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 46.884145] [ 46.885621] The buggy address belongs to the physical page: [ 46.891177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 46.899166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.905673] page_type: f5(slab) [ 46.908806] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.916530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.924249] page dumped because: kasan: bad access detected [ 46.929805] [ 46.931280] Memory state around the buggy address: [ 46.936058] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.943263] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.950468] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.957669] ^ [ 46.962446] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.969651] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.976852] ================================================================== [ 55.132857] ================================================================== [ 55.139927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 55.147216] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 55.154594] [ 55.156077] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 55.156127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.156140] Hardware name: WinLink E850-96 board (DT) [ 55.156159] Call trace: [ 55.156171] show_stack+0x20/0x38 (C) [ 55.156203] dump_stack_lvl+0x8c/0xd0 [ 55.156234] print_report+0x118/0x608 [ 55.156262] kasan_report+0xdc/0x128 [ 55.156291] kasan_check_range+0x100/0x1a8 [ 55.156323] __kasan_check_write+0x20/0x30 [ 55.156354] kasan_atomics_helper+0xf88/0x4858 [ 55.156385] kasan_atomics+0x198/0x2e0 [ 55.156413] kunit_try_run_case+0x170/0x3f0 [ 55.156446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.156484] kthread+0x328/0x630 [ 55.156514] ret_from_fork+0x10/0x20 [ 55.156546] [ 55.226294] Allocated by task 312: [ 55.229682] kasan_save_stack+0x3c/0x68 [ 55.233499] kasan_save_track+0x20/0x40 [ 55.237319] kasan_save_alloc_info+0x40/0x58 [ 55.241572] __kasan_kmalloc+0xd4/0xd8 [ 55.245305] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.249818] kasan_atomics+0xb8/0x2e0 [ 55.253464] kunit_try_run_case+0x170/0x3f0 [ 55.257631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.263100] kthread+0x328/0x630 [ 55.266311] ret_from_fork+0x10/0x20 [ 55.269870] [ 55.271346] The buggy address belongs to the object at ffff000800c2d400 [ 55.271346] which belongs to the cache kmalloc-64 of size 64 [ 55.283672] The buggy address is located 0 bytes to the right of [ 55.283672] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 55.296519] [ 55.297995] The buggy address belongs to the physical page: [ 55.303551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 55.311538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.318047] page_type: f5(slab) [ 55.321179] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.328904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.336623] page dumped because: kasan: bad access detected [ 55.342178] [ 55.343654] Memory state around the buggy address: [ 55.348433] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.355636] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.362841] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.370043] ^ [ 55.374820] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.382025] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.389226] ================================================================== [ 50.936574] ================================================================== [ 50.943635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 50.950925] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 50.958303] [ 50.959786] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 50.959833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.959848] Hardware name: WinLink E850-96 board (DT) [ 50.959868] Call trace: [ 50.959882] show_stack+0x20/0x38 (C) [ 50.959914] dump_stack_lvl+0x8c/0xd0 [ 50.959947] print_report+0x118/0x608 [ 50.959977] kasan_report+0xdc/0x128 [ 50.960006] kasan_check_range+0x100/0x1a8 [ 50.960037] __kasan_check_write+0x20/0x30 [ 50.960068] kasan_atomics_helper+0xad4/0x4858 [ 50.960096] kasan_atomics+0x198/0x2e0 [ 50.960124] kunit_try_run_case+0x170/0x3f0 [ 50.960158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.960198] kthread+0x328/0x630 [ 50.960230] ret_from_fork+0x10/0x20 [ 50.960261] [ 51.030003] Allocated by task 312: [ 51.033390] kasan_save_stack+0x3c/0x68 [ 51.037209] kasan_save_track+0x20/0x40 [ 51.041027] kasan_save_alloc_info+0x40/0x58 [ 51.045281] __kasan_kmalloc+0xd4/0xd8 [ 51.049014] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.053527] kasan_atomics+0xb8/0x2e0 [ 51.057173] kunit_try_run_case+0x170/0x3f0 [ 51.061340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.066808] kthread+0x328/0x630 [ 51.070020] ret_from_fork+0x10/0x20 [ 51.073579] [ 51.075056] The buggy address belongs to the object at ffff000800c2d400 [ 51.075056] which belongs to the cache kmalloc-64 of size 64 [ 51.087381] The buggy address is located 0 bytes to the right of [ 51.087381] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 51.100228] [ 51.101704] The buggy address belongs to the physical page: [ 51.107260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 51.115247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.121756] page_type: f5(slab) [ 51.124890] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.132613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.140332] page dumped because: kasan: bad access detected [ 51.145887] [ 51.147363] Memory state around the buggy address: [ 51.152142] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.159345] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.166550] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.173751] ^ [ 51.178529] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.185734] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.192935] ================================================================== [ 59.087341] ================================================================== [ 59.094380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 59.101758] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 59.109135] [ 59.110617] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 59.110668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.110684] Hardware name: WinLink E850-96 board (DT) [ 59.110705] Call trace: [ 59.110718] show_stack+0x20/0x38 (C) [ 59.110750] dump_stack_lvl+0x8c/0xd0 [ 59.110782] print_report+0x118/0x608 [ 59.110810] kasan_report+0xdc/0x128 [ 59.110839] kasan_check_range+0x100/0x1a8 [ 59.110869] __kasan_check_write+0x20/0x30 [ 59.110901] kasan_atomics_helper+0x15b4/0x4858 [ 59.110931] kasan_atomics+0x198/0x2e0 [ 59.110957] kunit_try_run_case+0x170/0x3f0 [ 59.110990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.111027] kthread+0x328/0x630 [ 59.111058] ret_from_fork+0x10/0x20 [ 59.111088] [ 59.180923] Allocated by task 312: [ 59.184310] kasan_save_stack+0x3c/0x68 [ 59.188127] kasan_save_track+0x20/0x40 [ 59.191947] kasan_save_alloc_info+0x40/0x58 [ 59.196200] __kasan_kmalloc+0xd4/0xd8 [ 59.199933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.204446] kasan_atomics+0xb8/0x2e0 [ 59.208092] kunit_try_run_case+0x170/0x3f0 [ 59.212259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.217728] kthread+0x328/0x630 [ 59.220939] ret_from_fork+0x10/0x20 [ 59.224499] [ 59.225974] The buggy address belongs to the object at ffff000800c2d400 [ 59.225974] which belongs to the cache kmalloc-64 of size 64 [ 59.238301] The buggy address is located 0 bytes to the right of [ 59.238301] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 59.251147] [ 59.252623] The buggy address belongs to the physical page: [ 59.258181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 59.266166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.272676] page_type: f5(slab) [ 59.275810] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.283532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.291251] page dumped because: kasan: bad access detected [ 59.296806] [ 59.298282] Memory state around the buggy address: [ 59.303062] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.310265] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.317469] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.324671] ^ [ 59.329449] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.336653] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.343854] ================================================================== [ 57.243617] ================================================================== [ 57.250660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 57.258035] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 57.265413] [ 57.266896] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 57.266945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.266962] Hardware name: WinLink E850-96 board (DT) [ 57.266981] Call trace: [ 57.266993] show_stack+0x20/0x38 (C) [ 57.267025] dump_stack_lvl+0x8c/0xd0 [ 57.267056] print_report+0x118/0x608 [ 57.267085] kasan_report+0xdc/0x128 [ 57.267113] kasan_check_range+0x100/0x1a8 [ 57.267144] __kasan_check_write+0x20/0x30 [ 57.267175] kasan_atomics_helper+0x12d8/0x4858 [ 57.267204] kasan_atomics+0x198/0x2e0 [ 57.267233] kunit_try_run_case+0x170/0x3f0 [ 57.267264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.267302] kthread+0x328/0x630 [ 57.267333] ret_from_fork+0x10/0x20 [ 57.267366] [ 57.337201] Allocated by task 312: [ 57.340587] kasan_save_stack+0x3c/0x68 [ 57.344405] kasan_save_track+0x20/0x40 [ 57.348225] kasan_save_alloc_info+0x40/0x58 [ 57.352478] __kasan_kmalloc+0xd4/0xd8 [ 57.356210] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.360724] kasan_atomics+0xb8/0x2e0 [ 57.364370] kunit_try_run_case+0x170/0x3f0 [ 57.368537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.374005] kthread+0x328/0x630 [ 57.377217] ret_from_fork+0x10/0x20 [ 57.380776] [ 57.382252] The buggy address belongs to the object at ffff000800c2d400 [ 57.382252] which belongs to the cache kmalloc-64 of size 64 [ 57.394578] The buggy address is located 0 bytes to the right of [ 57.394578] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 57.407425] [ 57.408901] The buggy address belongs to the physical page: [ 57.414456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 57.422444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.428954] page_type: f5(slab) [ 57.432088] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.439810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.447530] page dumped because: kasan: bad access detected [ 57.453084] [ 57.454560] Memory state around the buggy address: [ 57.459338] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.466542] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.473747] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.480948] ^ [ 57.485726] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.492931] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.500132] ================================================================== [ 60.399820] ================================================================== [ 60.406862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 60.414238] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 60.421529] [ 60.423012] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 60.423063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.423077] Hardware name: WinLink E850-96 board (DT) [ 60.423098] Call trace: [ 60.423111] show_stack+0x20/0x38 (C) [ 60.423145] dump_stack_lvl+0x8c/0xd0 [ 60.423174] print_report+0x118/0x608 [ 60.423203] kasan_report+0xdc/0x128 [ 60.423232] __asan_report_load8_noabort+0x20/0x30 [ 60.423267] kasan_atomics_helper+0x3e10/0x4858 [ 60.423296] kasan_atomics+0x198/0x2e0 [ 60.423324] kunit_try_run_case+0x170/0x3f0 [ 60.423355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.423393] kthread+0x328/0x630 [ 60.423423] ret_from_fork+0x10/0x20 [ 60.423457] [ 60.489930] Allocated by task 312: [ 60.493318] kasan_save_stack+0x3c/0x68 [ 60.497136] kasan_save_track+0x20/0x40 [ 60.500955] kasan_save_alloc_info+0x40/0x58 [ 60.505208] __kasan_kmalloc+0xd4/0xd8 [ 60.508941] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.513455] kasan_atomics+0xb8/0x2e0 [ 60.517101] kunit_try_run_case+0x170/0x3f0 [ 60.521267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.526736] kthread+0x328/0x630 [ 60.529948] ret_from_fork+0x10/0x20 [ 60.533507] [ 60.534982] The buggy address belongs to the object at ffff000800c2d400 [ 60.534982] which belongs to the cache kmalloc-64 of size 64 [ 60.547309] The buggy address is located 0 bytes to the right of [ 60.547309] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 60.560155] [ 60.561631] The buggy address belongs to the physical page: [ 60.567187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 60.575175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.581683] page_type: f5(slab) [ 60.584816] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.592540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.600259] page dumped because: kasan: bad access detected [ 60.605814] [ 60.607290] Memory state around the buggy address: [ 60.612070] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.619273] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.626477] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.633679] ^ [ 60.638456] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.645661] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.652863] ================================================================== [ 51.724437] ================================================================== [ 51.731471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 51.738847] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 51.746138] [ 51.747622] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 51.747671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.747686] Hardware name: WinLink E850-96 board (DT) [ 51.747706] Call trace: [ 51.747721] show_stack+0x20/0x38 (C) [ 51.747753] dump_stack_lvl+0x8c/0xd0 [ 51.747786] print_report+0x118/0x608 [ 51.747817] kasan_report+0xdc/0x128 [ 51.747845] __asan_report_load4_noabort+0x20/0x30 [ 51.747879] kasan_atomics_helper+0x3dbc/0x4858 [ 51.747908] kasan_atomics+0x198/0x2e0 [ 51.747937] kunit_try_run_case+0x170/0x3f0 [ 51.747970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.748007] kthread+0x328/0x630 [ 51.748038] ret_from_fork+0x10/0x20 [ 51.748067] [ 51.814540] Allocated by task 312: [ 51.817927] kasan_save_stack+0x3c/0x68 [ 51.821745] kasan_save_track+0x20/0x40 [ 51.825564] kasan_save_alloc_info+0x40/0x58 [ 51.829818] __kasan_kmalloc+0xd4/0xd8 [ 51.833551] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.838064] kasan_atomics+0xb8/0x2e0 [ 51.841710] kunit_try_run_case+0x170/0x3f0 [ 51.845877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.851345] kthread+0x328/0x630 [ 51.854557] ret_from_fork+0x10/0x20 [ 51.858116] [ 51.859591] The buggy address belongs to the object at ffff000800c2d400 [ 51.859591] which belongs to the cache kmalloc-64 of size 64 [ 51.871918] The buggy address is located 0 bytes to the right of [ 51.871918] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 51.884765] [ 51.886241] The buggy address belongs to the physical page: [ 51.891796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 51.899784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.906292] page_type: f5(slab) [ 51.909428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.917149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.924868] page dumped because: kasan: bad access detected [ 51.930424] [ 51.931899] Memory state around the buggy address: [ 51.936678] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.943882] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.951087] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.958288] ^ [ 51.963066] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.970271] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.977472] ================================================================== [ 48.566473] ================================================================== [ 48.573531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 48.580822] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 48.588200] [ 48.589681] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 48.589728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.589748] Hardware name: WinLink E850-96 board (DT) [ 48.589766] Call trace: [ 48.589779] show_stack+0x20/0x38 (C) [ 48.589810] dump_stack_lvl+0x8c/0xd0 [ 48.589842] print_report+0x118/0x608 [ 48.589871] kasan_report+0xdc/0x128 [ 48.589899] kasan_check_range+0x100/0x1a8 [ 48.589930] __kasan_check_write+0x20/0x30 [ 48.589962] kasan_atomics_helper+0x6ec/0x4858 [ 48.589991] kasan_atomics+0x198/0x2e0 [ 48.590019] kunit_try_run_case+0x170/0x3f0 [ 48.590054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.590093] kthread+0x328/0x630 [ 48.590124] ret_from_fork+0x10/0x20 [ 48.590156] [ 48.659900] Allocated by task 312: [ 48.663287] kasan_save_stack+0x3c/0x68 [ 48.667105] kasan_save_track+0x20/0x40 [ 48.670924] kasan_save_alloc_info+0x40/0x58 [ 48.675178] __kasan_kmalloc+0xd4/0xd8 [ 48.678910] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.683424] kasan_atomics+0xb8/0x2e0 [ 48.687070] kunit_try_run_case+0x170/0x3f0 [ 48.691236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.696705] kthread+0x328/0x630 [ 48.699917] ret_from_fork+0x10/0x20 [ 48.703476] [ 48.704951] The buggy address belongs to the object at ffff000800c2d400 [ 48.704951] which belongs to the cache kmalloc-64 of size 64 [ 48.717278] The buggy address is located 0 bytes to the right of [ 48.717278] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 48.730125] [ 48.731601] The buggy address belongs to the physical page: [ 48.737158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 48.745144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.751652] page_type: f5(slab) [ 48.754785] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.762510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.770228] page dumped because: kasan: bad access detected [ 48.775783] [ 48.777259] Memory state around the buggy address: [ 48.782039] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.789242] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.796447] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.803648] ^ [ 48.808426] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.815630] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.822832] ================================================================== [ 49.621312] ================================================================== [ 49.628377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 49.635754] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 49.643045] [ 49.644528] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 49.644576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.644591] Hardware name: WinLink E850-96 board (DT) [ 49.644610] Call trace: [ 49.644623] show_stack+0x20/0x38 (C) [ 49.644655] dump_stack_lvl+0x8c/0xd0 [ 49.644687] print_report+0x118/0x608 [ 49.644717] kasan_report+0xdc/0x128 [ 49.644745] __asan_report_load4_noabort+0x20/0x30 [ 49.644780] kasan_atomics_helper+0x42d8/0x4858 [ 49.644808] kasan_atomics+0x198/0x2e0 [ 49.644834] kunit_try_run_case+0x170/0x3f0 [ 49.644867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.644904] kthread+0x328/0x630 [ 49.644937] ret_from_fork+0x10/0x20 [ 49.644972] [ 49.711448] Allocated by task 312: [ 49.714834] kasan_save_stack+0x3c/0x68 [ 49.718652] kasan_save_track+0x20/0x40 [ 49.722471] kasan_save_alloc_info+0x40/0x58 [ 49.726725] __kasan_kmalloc+0xd4/0xd8 [ 49.730457] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.734971] kasan_atomics+0xb8/0x2e0 [ 49.738616] kunit_try_run_case+0x170/0x3f0 [ 49.742783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.748252] kthread+0x328/0x630 [ 49.751464] ret_from_fork+0x10/0x20 [ 49.755023] [ 49.756500] The buggy address belongs to the object at ffff000800c2d400 [ 49.756500] which belongs to the cache kmalloc-64 of size 64 [ 49.768825] The buggy address is located 0 bytes to the right of [ 49.768825] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 49.781671] [ 49.783147] The buggy address belongs to the physical page: [ 49.788703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 49.796691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.803199] page_type: f5(slab) [ 49.806333] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.814056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.821775] page dumped because: kasan: bad access detected [ 49.827330] [ 49.828806] Memory state around the buggy address: [ 49.833586] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.840789] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.847993] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.855195] ^ [ 49.859973] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.867177] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.874378] ================================================================== [ 47.775357] ================================================================== [ 47.782399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 47.789688] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312 [ 47.797066] [ 47.798548] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 47.798597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.798616] Hardware name: WinLink E850-96 board (DT) [ 47.798635] Call trace: [ 47.798648] show_stack+0x20/0x38 (C) [ 47.798680] dump_stack_lvl+0x8c/0xd0 [ 47.798712] print_report+0x118/0x608 [ 47.798740] kasan_report+0xdc/0x128 [ 47.798767] kasan_check_range+0x100/0x1a8 [ 47.798799] __kasan_check_write+0x20/0x30 [ 47.798831] kasan_atomics_helper+0x5b4/0x4858 [ 47.798860] kasan_atomics+0x198/0x2e0 [ 47.798887] kunit_try_run_case+0x170/0x3f0 [ 47.798919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.798957] kthread+0x328/0x630 [ 47.798989] ret_from_fork+0x10/0x20 [ 47.799021] [ 47.868766] Allocated by task 312: [ 47.872153] kasan_save_stack+0x3c/0x68 [ 47.875971] kasan_save_track+0x20/0x40 [ 47.879790] kasan_save_alloc_info+0x40/0x58 [ 47.884044] __kasan_kmalloc+0xd4/0xd8 [ 47.887776] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.892290] kasan_atomics+0xb8/0x2e0 [ 47.895936] kunit_try_run_case+0x170/0x3f0 [ 47.900103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.905571] kthread+0x328/0x630 [ 47.908783] ret_from_fork+0x10/0x20 [ 47.912342] [ 47.913817] The buggy address belongs to the object at ffff000800c2d400 [ 47.913817] which belongs to the cache kmalloc-64 of size 64 [ 47.926144] The buggy address is located 0 bytes to the right of [ 47.926144] allocated 48-byte region [ffff000800c2d400, ffff000800c2d430) [ 47.938991] [ 47.940467] The buggy address belongs to the physical page: [ 47.946022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d [ 47.954009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.960518] page_type: f5(slab) [ 47.963653] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.971375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.979094] page dumped because: kasan: bad access detected [ 47.984650] [ 47.986126] Memory state around the buggy address: [ 47.990905] ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.998108] ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.005313] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.012514] ^ [ 48.017292] ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.024497] ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.031697] ==================================================================
[ 21.023168] ================================================================== [ 21.023320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 21.023408] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.023551] [ 21.023588] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.023693] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.023785] Hardware name: linux,dummy-virt (DT) [ 21.023818] Call trace: [ 21.023844] show_stack+0x20/0x38 (C) [ 21.024051] dump_stack_lvl+0x8c/0xd0 [ 21.024119] print_report+0x118/0x608 [ 21.024167] kasan_report+0xdc/0x128 [ 21.024234] kasan_check_range+0x100/0x1a8 [ 21.024288] __kasan_check_read+0x20/0x30 [ 21.024342] kasan_atomics_helper+0xdd4/0x4858 [ 21.024405] kasan_atomics+0x198/0x2e0 [ 21.024510] kunit_try_run_case+0x170/0x3f0 [ 21.024574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.024649] kthread+0x328/0x630 [ 21.024706] ret_from_fork+0x10/0x20 [ 21.024758] [ 21.024780] Allocated by task 268: [ 21.024812] kasan_save_stack+0x3c/0x68 [ 21.024854] kasan_save_track+0x20/0x40 [ 21.024894] kasan_save_alloc_info+0x40/0x58 [ 21.024936] __kasan_kmalloc+0xd4/0xd8 [ 21.024976] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.025022] kasan_atomics+0xb8/0x2e0 [ 21.025069] kunit_try_run_case+0x170/0x3f0 [ 21.025112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.025162] kthread+0x328/0x630 [ 21.025201] ret_from_fork+0x10/0x20 [ 21.025240] [ 21.025261] The buggy address belongs to the object at fff00000c3f85080 [ 21.025261] which belongs to the cache kmalloc-64 of size 64 [ 21.025320] The buggy address is located 0 bytes to the right of [ 21.025320] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.025822] [ 21.026125] The buggy address belongs to the physical page: [ 21.026421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.026509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.026652] page_type: f5(slab) [ 21.026705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.026866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.026934] page dumped because: kasan: bad access detected [ 21.027004] [ 21.027205] Memory state around the buggy address: [ 21.027254] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.027312] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.027394] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.027527] ^ [ 21.027608] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.027685] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.027829] ================================================================== [ 21.040542] ================================================================== [ 21.040711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 21.040885] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.040977] [ 21.041027] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.041116] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.041263] Hardware name: linux,dummy-virt (DT) [ 21.041310] Call trace: [ 21.041336] show_stack+0x20/0x38 (C) [ 21.041497] dump_stack_lvl+0x8c/0xd0 [ 21.041695] print_report+0x118/0x608 [ 21.041754] kasan_report+0xdc/0x128 [ 21.041936] __asan_report_store8_noabort+0x20/0x30 [ 21.042010] kasan_atomics_helper+0x3e5c/0x4858 [ 21.042125] kasan_atomics+0x198/0x2e0 [ 21.042371] kunit_try_run_case+0x170/0x3f0 [ 21.042464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.042635] kthread+0x328/0x630 [ 21.042715] ret_from_fork+0x10/0x20 [ 21.042897] [ 21.042934] Allocated by task 268: [ 21.042966] kasan_save_stack+0x3c/0x68 [ 21.043044] kasan_save_track+0x20/0x40 [ 21.043085] kasan_save_alloc_info+0x40/0x58 [ 21.043364] __kasan_kmalloc+0xd4/0xd8 [ 21.043414] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.043599] kasan_atomics+0xb8/0x2e0 [ 21.043666] kunit_try_run_case+0x170/0x3f0 [ 21.043746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.044003] kthread+0x328/0x630 [ 21.044054] ret_from_fork+0x10/0x20 [ 21.044129] [ 21.044252] The buggy address belongs to the object at fff00000c3f85080 [ 21.044252] which belongs to the cache kmalloc-64 of size 64 [ 21.044340] The buggy address is located 0 bytes to the right of [ 21.044340] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.044502] [ 21.044524] The buggy address belongs to the physical page: [ 21.044557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.044640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.044875] page_type: f5(slab) [ 21.044924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.045004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.045080] page dumped because: kasan: bad access detected [ 21.045299] [ 21.045369] Memory state around the buggy address: [ 21.045408] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.045578] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.045630] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.045672] ^ [ 21.045962] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.046088] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.046209] ================================================================== [ 21.210735] ================================================================== [ 21.210788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 21.210985] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.211045] [ 21.211076] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.211165] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.211255] Hardware name: linux,dummy-virt (DT) [ 21.211359] Call trace: [ 21.211387] show_stack+0x20/0x38 (C) [ 21.211438] dump_stack_lvl+0x8c/0xd0 [ 21.211491] print_report+0x118/0x608 [ 21.211565] kasan_report+0xdc/0x128 [ 21.211775] kasan_check_range+0x100/0x1a8 [ 21.211900] __kasan_check_write+0x20/0x30 [ 21.211967] kasan_atomics_helper+0x17ec/0x4858 [ 21.212026] kasan_atomics+0x198/0x2e0 [ 21.212246] kunit_try_run_case+0x170/0x3f0 [ 21.212312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.212439] kthread+0x328/0x630 [ 21.212495] ret_from_fork+0x10/0x20 [ 21.212637] [ 21.212707] Allocated by task 268: [ 21.212774] kasan_save_stack+0x3c/0x68 [ 21.212838] kasan_save_track+0x20/0x40 [ 21.212963] kasan_save_alloc_info+0x40/0x58 [ 21.213006] __kasan_kmalloc+0xd4/0xd8 [ 21.213047] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.213093] kasan_atomics+0xb8/0x2e0 [ 21.213130] kunit_try_run_case+0x170/0x3f0 [ 21.213174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.213479] kthread+0x328/0x630 [ 21.213596] ret_from_fork+0x10/0x20 [ 21.213782] [ 21.213852] The buggy address belongs to the object at fff00000c3f85080 [ 21.213852] which belongs to the cache kmalloc-64 of size 64 [ 21.214006] The buggy address is located 0 bytes to the right of [ 21.214006] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.214368] [ 21.214411] The buggy address belongs to the physical page: [ 21.214446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.214502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.214553] page_type: f5(slab) [ 21.214917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.215252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.215514] page dumped because: kasan: bad access detected [ 21.215592] [ 21.215724] Memory state around the buggy address: [ 21.215946] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.216084] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.216149] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.216187] ^ [ 21.216545] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.216716] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.216815] ================================================================== [ 21.016144] ================================================================== [ 21.016377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 21.016453] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.016532] [ 21.016568] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.016757] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.016866] Hardware name: linux,dummy-virt (DT) [ 21.016956] Call trace: [ 21.016998] show_stack+0x20/0x38 (C) [ 21.017051] dump_stack_lvl+0x8c/0xd0 [ 21.017121] print_report+0x118/0x608 [ 21.017173] kasan_report+0xdc/0x128 [ 21.017388] __asan_report_load4_noabort+0x20/0x30 [ 21.017508] kasan_atomics_helper+0x3e04/0x4858 [ 21.017790] kasan_atomics+0x198/0x2e0 [ 21.017953] kunit_try_run_case+0x170/0x3f0 [ 21.018051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.018246] kthread+0x328/0x630 [ 21.018300] ret_from_fork+0x10/0x20 [ 21.018556] [ 21.018584] Allocated by task 268: [ 21.018617] kasan_save_stack+0x3c/0x68 [ 21.018691] kasan_save_track+0x20/0x40 [ 21.018766] kasan_save_alloc_info+0x40/0x58 [ 21.018872] __kasan_kmalloc+0xd4/0xd8 [ 21.018938] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.019179] kasan_atomics+0xb8/0x2e0 [ 21.019335] kunit_try_run_case+0x170/0x3f0 [ 21.019413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.019551] kthread+0x328/0x630 [ 21.019636] ret_from_fork+0x10/0x20 [ 21.019678] [ 21.019699] The buggy address belongs to the object at fff00000c3f85080 [ 21.019699] which belongs to the cache kmalloc-64 of size 64 [ 21.020028] The buggy address is located 0 bytes to the right of [ 21.020028] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.020146] [ 21.020363] The buggy address belongs to the physical page: [ 21.020425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.020606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.020701] page_type: f5(slab) [ 21.020799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.020853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.021019] page dumped because: kasan: bad access detected [ 21.021062] [ 21.021115] Memory state around the buggy address: [ 21.021253] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.021327] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.021657] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.021840] ^ [ 21.021921] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.021997] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.022118] ================================================================== [ 21.204497] ================================================================== [ 21.204562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 21.204639] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.204692] [ 21.204742] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.204827] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.204933] Hardware name: linux,dummy-virt (DT) [ 21.205017] Call trace: [ 21.205075] show_stack+0x20/0x38 (C) [ 21.205165] dump_stack_lvl+0x8c/0xd0 [ 21.205317] print_report+0x118/0x608 [ 21.205381] kasan_report+0xdc/0x128 [ 21.205428] __asan_report_load8_noabort+0x20/0x30 [ 21.205494] kasan_atomics_helper+0x3e20/0x4858 [ 21.205546] kasan_atomics+0x198/0x2e0 [ 21.205718] kunit_try_run_case+0x170/0x3f0 [ 21.205948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.206145] kthread+0x328/0x630 [ 21.206228] ret_from_fork+0x10/0x20 [ 21.206280] [ 21.206302] Allocated by task 268: [ 21.206331] kasan_save_stack+0x3c/0x68 [ 21.206384] kasan_save_track+0x20/0x40 [ 21.206425] kasan_save_alloc_info+0x40/0x58 [ 21.206913] __kasan_kmalloc+0xd4/0xd8 [ 21.207027] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.207192] kasan_atomics+0xb8/0x2e0 [ 21.207395] kunit_try_run_case+0x170/0x3f0 [ 21.207439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.207550] kthread+0x328/0x630 [ 21.207648] ret_from_fork+0x10/0x20 [ 21.207821] [ 21.207923] The buggy address belongs to the object at fff00000c3f85080 [ 21.207923] which belongs to the cache kmalloc-64 of size 64 [ 21.208019] The buggy address is located 0 bytes to the right of [ 21.208019] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.208087] [ 21.208108] The buggy address belongs to the physical page: [ 21.208295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.208362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.208457] page_type: f5(slab) [ 21.208623] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.208716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.208971] page dumped because: kasan: bad access detected [ 21.209235] [ 21.209358] Memory state around the buggy address: [ 21.209436] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.209579] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.209652] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.209691] ^ [ 21.209726] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.209787] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.209828] ================================================================== [ 20.968369] ================================================================== [ 20.968434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 20.968502] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.968568] [ 20.968600] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.968688] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.968747] Hardware name: linux,dummy-virt (DT) [ 20.968782] Call trace: [ 20.968818] show_stack+0x20/0x38 (C) [ 20.968909] dump_stack_lvl+0x8c/0xd0 [ 20.968966] print_report+0x118/0x608 [ 20.969021] kasan_report+0xdc/0x128 [ 20.969068] kasan_check_range+0x100/0x1a8 [ 20.969119] __kasan_check_write+0x20/0x30 [ 20.969308] kasan_atomics_helper+0xb70/0x4858 [ 20.969414] kasan_atomics+0x198/0x2e0 [ 20.969502] kunit_try_run_case+0x170/0x3f0 [ 20.969630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.969726] kthread+0x328/0x630 [ 20.969833] ret_from_fork+0x10/0x20 [ 20.969976] [ 20.970016] Allocated by task 268: [ 20.970081] kasan_save_stack+0x3c/0x68 [ 20.970259] kasan_save_track+0x20/0x40 [ 20.970429] kasan_save_alloc_info+0x40/0x58 [ 20.970496] __kasan_kmalloc+0xd4/0xd8 [ 20.970538] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.970591] kasan_atomics+0xb8/0x2e0 [ 20.970630] kunit_try_run_case+0x170/0x3f0 [ 20.970673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.970723] kthread+0x328/0x630 [ 20.970978] ret_from_fork+0x10/0x20 [ 20.971040] [ 20.971158] The buggy address belongs to the object at fff00000c3f85080 [ 20.971158] which belongs to the cache kmalloc-64 of size 64 [ 20.971466] The buggy address is located 0 bytes to the right of [ 20.971466] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.971624] [ 20.971928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.972875] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.974578] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.975818] kunit_try_run_case+0x170/0x3f0 [ 20.976131] [ 20.976304] page_type: f5(slab) [ 20.977932] ^ [ 20.979750] [ 20.981367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.983448] The buggy address is located 0 bytes to the right of [ 20.983448] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.984542] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.984934] ================================================================== [ 21.028166] ================================================================== [ 21.028308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 21.028382] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.028435] [ 21.028470] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.028810] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.028925] Hardware name: linux,dummy-virt (DT) [ 21.028961] Call trace: [ 21.029032] show_stack+0x20/0x38 (C) [ 21.029109] dump_stack_lvl+0x8c/0xd0 [ 21.029175] print_report+0x118/0x608 [ 21.029313] kasan_report+0xdc/0x128 [ 21.029376] __asan_report_load8_noabort+0x20/0x30 [ 21.029432] kasan_atomics_helper+0x3f58/0x4858 [ 21.029490] kasan_atomics+0x198/0x2e0 [ 21.029539] kunit_try_run_case+0x170/0x3f0 [ 21.029864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.030070] kthread+0x328/0x630 [ 21.030313] ret_from_fork+0x10/0x20 [ 21.030549] [ 21.030573] Allocated by task 268: [ 21.030629] kasan_save_stack+0x3c/0x68 [ 21.030682] kasan_save_track+0x20/0x40 [ 21.030911] kasan_save_alloc_info+0x40/0x58 [ 21.031140] __kasan_kmalloc+0xd4/0xd8 [ 21.031220] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.031296] kasan_atomics+0xb8/0x2e0 [ 21.031590] kunit_try_run_case+0x170/0x3f0 [ 21.031766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.031841] kthread+0x328/0x630 [ 21.031905] ret_from_fork+0x10/0x20 [ 21.032139] [ 21.032167] The buggy address belongs to the object at fff00000c3f85080 [ 21.032167] which belongs to the cache kmalloc-64 of size 64 [ 21.032253] The buggy address is located 0 bytes to the right of [ 21.032253] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.032373] [ 21.032417] The buggy address belongs to the physical page: [ 21.032685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.032880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.032936] page_type: f5(slab) [ 21.032985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.033214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.033290] page dumped because: kasan: bad access detected [ 21.033325] [ 21.033371] Memory state around the buggy address: [ 21.033444] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.033727] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.033780] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.033961] ^ [ 21.034184] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.034241] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.034331] ================================================================== [ 20.946026] ================================================================== [ 20.946079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.946131] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.946184] [ 20.946215] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.946646] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.946729] Hardware name: linux,dummy-virt (DT) [ 20.946800] Call trace: [ 20.946840] show_stack+0x20/0x38 (C) [ 20.946926] dump_stack_lvl+0x8c/0xd0 [ 20.947110] print_report+0x118/0x608 [ 20.947162] kasan_report+0xdc/0x128 [ 20.947243] kasan_check_range+0x100/0x1a8 [ 20.947366] __kasan_check_write+0x20/0x30 [ 20.947428] kasan_atomics_helper+0x99c/0x4858 [ 20.947479] kasan_atomics+0x198/0x2e0 [ 20.947534] kunit_try_run_case+0x170/0x3f0 [ 20.947598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.947662] kthread+0x328/0x630 [ 20.947728] ret_from_fork+0x10/0x20 [ 20.947794] [ 20.947821] Allocated by task 268: [ 20.947860] kasan_save_stack+0x3c/0x68 [ 20.947919] kasan_save_track+0x20/0x40 [ 20.947966] kasan_save_alloc_info+0x40/0x58 [ 20.948010] __kasan_kmalloc+0xd4/0xd8 [ 20.948054] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.948109] kasan_atomics+0xb8/0x2e0 [ 20.948156] kunit_try_run_case+0x170/0x3f0 [ 20.948204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.948259] kthread+0x328/0x630 [ 20.948306] ret_from_fork+0x10/0x20 [ 20.948365] [ 20.948387] The buggy address belongs to the object at fff00000c3f85080 [ 20.948387] which belongs to the cache kmalloc-64 of size 64 [ 20.948445] The buggy address is located 0 bytes to the right of [ 20.948445] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.948509] [ 20.948533] The buggy address belongs to the physical page: [ 20.948566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 20.948642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.948693] page_type: f5(slab) [ 20.948734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.948787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.948830] page dumped because: kasan: bad access detected [ 20.948863] [ 20.948885] Memory state around the buggy address: [ 20.948921] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.948990] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.949050] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.949167] ^ [ 20.949222] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.949298] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.949371] ================================================================== [ 21.089316] ================================================================== [ 21.091743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 21.091912] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.092298] [ 21.092344] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.092448] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.092732] Hardware name: linux,dummy-virt (DT) [ 21.093186] Call trace: [ 21.093482] show_stack+0x20/0x38 (C) [ 21.094201] dump_stack_lvl+0x8c/0xd0 [ 21.095075] print_report+0x118/0x608 [ 21.095215] kasan_report+0xdc/0x128 [ 21.095282] kasan_check_range+0x100/0x1a8 [ 21.095583] __kasan_check_write+0x20/0x30 [ 21.095750] kasan_atomics_helper+0x1128/0x4858 [ 21.095816] kasan_atomics+0x198/0x2e0 [ 21.095974] kunit_try_run_case+0x170/0x3f0 [ 21.096059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.096182] kthread+0x328/0x630 [ 21.096269] ret_from_fork+0x10/0x20 [ 21.096401] [ 21.096423] Allocated by task 268: [ 21.096464] kasan_save_stack+0x3c/0x68 [ 21.096569] kasan_save_track+0x20/0x40 [ 21.096834] kasan_save_alloc_info+0x40/0x58 [ 21.097055] __kasan_kmalloc+0xd4/0xd8 [ 21.097104] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.097283] kasan_atomics+0xb8/0x2e0 [ 21.097369] kunit_try_run_case+0x170/0x3f0 [ 21.097415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.097515] kthread+0x328/0x630 [ 21.097667] ret_from_fork+0x10/0x20 [ 21.097745] [ 21.097794] The buggy address belongs to the object at fff00000c3f85080 [ 21.097794] which belongs to the cache kmalloc-64 of size 64 [ 21.098130] The buggy address is located 0 bytes to the right of [ 21.098130] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.098205] [ 21.098250] The buggy address belongs to the physical page: [ 21.098292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.098600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.098739] page_type: f5(slab) [ 21.098850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.099064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.099137] page dumped because: kasan: bad access detected [ 21.099272] [ 21.099325] Memory state around the buggy address: [ 21.099392] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.099439] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.099758] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.099830] ^ [ 21.099878] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.099924] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.099964] ================================================================== [ 21.127909] ================================================================== [ 21.127959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 21.128011] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.128064] [ 21.128098] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.128183] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.128240] Hardware name: linux,dummy-virt (DT) [ 21.128275] Call trace: [ 21.128372] show_stack+0x20/0x38 (C) [ 21.128446] dump_stack_lvl+0x8c/0xd0 [ 21.128502] print_report+0x118/0x608 [ 21.128568] kasan_report+0xdc/0x128 [ 21.128665] __asan_report_load8_noabort+0x20/0x30 [ 21.128722] kasan_atomics_helper+0x3f04/0x4858 [ 21.128850] kasan_atomics+0x198/0x2e0 [ 21.128903] kunit_try_run_case+0x170/0x3f0 [ 21.128956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.129015] kthread+0x328/0x630 [ 21.129223] ret_from_fork+0x10/0x20 [ 21.129319] [ 21.129554] Allocated by task 268: [ 21.129797] kasan_save_stack+0x3c/0x68 [ 21.129866] kasan_save_track+0x20/0x40 [ 21.129923] kasan_save_alloc_info+0x40/0x58 [ 21.130076] __kasan_kmalloc+0xd4/0xd8 [ 21.130143] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.130221] kasan_atomics+0xb8/0x2e0 [ 21.130323] kunit_try_run_case+0x170/0x3f0 [ 21.130389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.130631] kthread+0x328/0x630 [ 21.130682] ret_from_fork+0x10/0x20 [ 21.130774] [ 21.130862] The buggy address belongs to the object at fff00000c3f85080 [ 21.130862] which belongs to the cache kmalloc-64 of size 64 [ 21.130973] The buggy address is located 0 bytes to the right of [ 21.130973] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.131106] [ 21.131257] The buggy address belongs to the physical page: [ 21.131584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.131658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.131712] page_type: f5(slab) [ 21.132174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.132254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.132620] page dumped because: kasan: bad access detected [ 21.132667] [ 21.132688] Memory state around the buggy address: [ 21.132745] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.133052] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.133136] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.133435] ^ [ 21.133672] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.133726] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.133820] ================================================================== [ 21.195260] ================================================================== [ 21.195307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 21.195373] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.195426] [ 21.195460] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.195546] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.195777] Hardware name: linux,dummy-virt (DT) [ 21.195839] Call trace: [ 21.195867] show_stack+0x20/0x38 (C) [ 21.195984] dump_stack_lvl+0x8c/0xd0 [ 21.196089] print_report+0x118/0x608 [ 21.196259] kasan_report+0xdc/0x128 [ 21.196310] __asan_report_load8_noabort+0x20/0x30 [ 21.196386] kasan_atomics_helper+0x3e10/0x4858 [ 21.196528] kasan_atomics+0x198/0x2e0 [ 21.196584] kunit_try_run_case+0x170/0x3f0 [ 21.196658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.196721] kthread+0x328/0x630 [ 21.196770] ret_from_fork+0x10/0x20 [ 21.196857] [ 21.196916] Allocated by task 268: [ 21.196966] kasan_save_stack+0x3c/0x68 [ 21.197050] kasan_save_track+0x20/0x40 [ 21.197125] kasan_save_alloc_info+0x40/0x58 [ 21.197169] __kasan_kmalloc+0xd4/0xd8 [ 21.197207] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.197253] kasan_atomics+0xb8/0x2e0 [ 21.197306] kunit_try_run_case+0x170/0x3f0 [ 21.197359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.197408] kthread+0x328/0x630 [ 21.197694] ret_from_fork+0x10/0x20 [ 21.197798] [ 21.197864] The buggy address belongs to the object at fff00000c3f85080 [ 21.197864] which belongs to the cache kmalloc-64 of size 64 [ 21.198045] The buggy address is located 0 bytes to the right of [ 21.198045] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.198196] [ 21.198396] The buggy address belongs to the physical page: [ 21.198578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.198677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.198751] page_type: f5(slab) [ 21.198794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.199314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.199379] page dumped because: kasan: bad access detected [ 21.199413] [ 21.199435] Memory state around the buggy address: [ 21.199472] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.199517] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.199562] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.199601] ^ [ 21.199637] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.199683] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.199723] ================================================================== [ 21.200113] ================================================================== [ 21.200167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 21.200228] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.200281] [ 21.200363] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.200454] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.200486] Hardware name: linux,dummy-virt (DT) [ 21.200520] Call trace: [ 21.200545] show_stack+0x20/0x38 (C) [ 21.200610] dump_stack_lvl+0x8c/0xd0 [ 21.200661] print_report+0x118/0x608 [ 21.200709] kasan_report+0xdc/0x128 [ 21.200756] kasan_check_range+0x100/0x1a8 [ 21.200806] __kasan_check_write+0x20/0x30 [ 21.200858] kasan_atomics_helper+0x175c/0x4858 [ 21.200912] kasan_atomics+0x198/0x2e0 [ 21.200960] kunit_try_run_case+0x170/0x3f0 [ 21.201011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.201069] kthread+0x328/0x630 [ 21.201118] ret_from_fork+0x10/0x20 [ 21.201169] [ 21.201190] Allocated by task 268: [ 21.201231] kasan_save_stack+0x3c/0x68 [ 21.201275] kasan_save_track+0x20/0x40 [ 21.201314] kasan_save_alloc_info+0x40/0x58 [ 21.201365] __kasan_kmalloc+0xd4/0xd8 [ 21.201404] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.201465] kasan_atomics+0xb8/0x2e0 [ 21.201514] kunit_try_run_case+0x170/0x3f0 [ 21.201557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.201612] kthread+0x328/0x630 [ 21.201652] ret_from_fork+0x10/0x20 [ 21.201692] [ 21.201722] The buggy address belongs to the object at fff00000c3f85080 [ 21.201722] which belongs to the cache kmalloc-64 of size 64 [ 21.201782] The buggy address is located 0 bytes to the right of [ 21.201782] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.201849] [ 21.201871] The buggy address belongs to the physical page: [ 21.201906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.201961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.202028] page_type: f5(slab) [ 21.202070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.202122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.202173] page dumped because: kasan: bad access detected [ 21.202206] [ 21.202228] Memory state around the buggy address: [ 21.202263] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.202317] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.203300] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.203436] ^ [ 21.203602] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.204038] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.204135] ================================================================== [ 20.963531] ================================================================== [ 20.963582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 20.963630] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.963682] [ 20.963872] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.963983] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.964065] Hardware name: linux,dummy-virt (DT) [ 20.964099] Call trace: [ 20.964141] show_stack+0x20/0x38 (C) [ 20.964205] dump_stack_lvl+0x8c/0xd0 [ 20.964341] print_report+0x118/0x608 [ 20.964427] kasan_report+0xdc/0x128 [ 20.964492] __asan_report_load4_noabort+0x20/0x30 [ 20.964567] kasan_atomics_helper+0x3dcc/0x4858 [ 20.964620] kasan_atomics+0x198/0x2e0 [ 20.964695] kunit_try_run_case+0x170/0x3f0 [ 20.964771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.964832] kthread+0x328/0x630 [ 20.964899] ret_from_fork+0x10/0x20 [ 20.964961] [ 20.965014] Allocated by task 268: [ 20.965052] kasan_save_stack+0x3c/0x68 [ 20.965095] kasan_save_track+0x20/0x40 [ 20.965137] kasan_save_alloc_info+0x40/0x58 [ 20.965179] __kasan_kmalloc+0xd4/0xd8 [ 20.965218] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.965395] kasan_atomics+0xb8/0x2e0 [ 20.965481] kunit_try_run_case+0x170/0x3f0 [ 20.965555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.965623] kthread+0x328/0x630 [ 20.965709] ret_from_fork+0x10/0x20 [ 20.965826] [ 20.965878] The buggy address belongs to the object at fff00000c3f85080 [ 20.965878] which belongs to the cache kmalloc-64 of size 64 [ 20.965972] The buggy address is located 0 bytes to the right of [ 20.965972] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.966161] [ 20.966302] The buggy address belongs to the physical page: [ 20.966380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 20.966478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.966551] page_type: f5(slab) [ 20.966659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.966737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.966810] page dumped because: kasan: bad access detected [ 20.966930] [ 20.966949] Memory state around the buggy address: [ 20.966983] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.967033] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.967099] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.967140] ^ [ 20.967422] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.967545] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.967586] ================================================================== [ 21.035462] ================================================================== [ 21.035532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 21.035834] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.035910] [ 21.035945] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.036035] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.036185] Hardware name: linux,dummy-virt (DT) [ 21.036231] Call trace: [ 21.036256] show_stack+0x20/0x38 (C) [ 21.036312] dump_stack_lvl+0x8c/0xd0 [ 21.036449] print_report+0x118/0x608 [ 21.036498] kasan_report+0xdc/0x128 [ 21.036556] kasan_check_range+0x100/0x1a8 [ 21.036607] __kasan_check_write+0x20/0x30 [ 21.036665] kasan_atomics_helper+0xe44/0x4858 [ 21.036716] kasan_atomics+0x198/0x2e0 [ 21.036771] kunit_try_run_case+0x170/0x3f0 [ 21.036824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.036883] kthread+0x328/0x630 [ 21.036938] ret_from_fork+0x10/0x20 [ 21.036995] [ 21.037016] Allocated by task 268: [ 21.037048] kasan_save_stack+0x3c/0x68 [ 21.037090] kasan_save_track+0x20/0x40 [ 21.037130] kasan_save_alloc_info+0x40/0x58 [ 21.037184] __kasan_kmalloc+0xd4/0xd8 [ 21.037230] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.037283] kasan_atomics+0xb8/0x2e0 [ 21.037329] kunit_try_run_case+0x170/0x3f0 [ 21.037385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.037468] kthread+0x328/0x630 [ 21.037953] ret_from_fork+0x10/0x20 [ 21.038009] [ 21.038034] The buggy address belongs to the object at fff00000c3f85080 [ 21.038034] which belongs to the cache kmalloc-64 of size 64 [ 21.038104] The buggy address is located 0 bytes to the right of [ 21.038104] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.038170] [ 21.038192] The buggy address belongs to the physical page: [ 21.038226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.038280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.038329] page_type: f5(slab) [ 21.038531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.038617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.038835] page dumped because: kasan: bad access detected [ 21.038901] [ 21.039135] Memory state around the buggy address: [ 21.039209] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.039337] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.039649] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.039727] ^ [ 21.039788] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.040049] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.040129] ================================================================== [ 21.010668] ================================================================== [ 21.010726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 21.011269] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.011371] [ 21.011483] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.011592] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.011628] Hardware name: linux,dummy-virt (DT) [ 21.011676] Call trace: [ 21.011723] show_stack+0x20/0x38 (C) [ 21.011839] dump_stack_lvl+0x8c/0xd0 [ 21.011892] print_report+0x118/0x608 [ 21.012122] kasan_report+0xdc/0x128 [ 21.012196] kasan_check_range+0x100/0x1a8 [ 21.012256] __kasan_check_write+0x20/0x30 [ 21.012307] kasan_atomics_helper+0xd3c/0x4858 [ 21.012539] kasan_atomics+0x198/0x2e0 [ 21.012623] kunit_try_run_case+0x170/0x3f0 [ 21.012710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.012773] kthread+0x328/0x630 [ 21.012822] ret_from_fork+0x10/0x20 [ 21.012876] [ 21.013032] Allocated by task 268: [ 21.013080] kasan_save_stack+0x3c/0x68 [ 21.013127] kasan_save_track+0x20/0x40 [ 21.013261] kasan_save_alloc_info+0x40/0x58 [ 21.013316] __kasan_kmalloc+0xd4/0xd8 [ 21.013368] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.013415] kasan_atomics+0xb8/0x2e0 [ 21.013615] kunit_try_run_case+0x170/0x3f0 [ 21.013809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.013874] kthread+0x328/0x630 [ 21.013914] ret_from_fork+0x10/0x20 [ 21.014116] [ 21.014162] The buggy address belongs to the object at fff00000c3f85080 [ 21.014162] which belongs to the cache kmalloc-64 of size 64 [ 21.014225] The buggy address is located 0 bytes to the right of [ 21.014225] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.014355] [ 21.014412] The buggy address belongs to the physical page: [ 21.014470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.014533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.014595] page_type: f5(slab) [ 21.014643] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.014713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.014756] page dumped because: kasan: bad access detected [ 21.014788] [ 21.014810] Memory state around the buggy address: [ 21.014852] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.014919] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.014966] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.015019] ^ [ 21.015068] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.015126] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.015195] ================================================================== [ 21.118693] ================================================================== [ 21.118759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 21.118835] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.118889] [ 21.118984] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.119110] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.119412] Hardware name: linux,dummy-virt (DT) [ 21.119459] Call trace: [ 21.119486] show_stack+0x20/0x38 (C) [ 21.119551] dump_stack_lvl+0x8c/0xd0 [ 21.119654] print_report+0x118/0x608 [ 21.119708] kasan_report+0xdc/0x128 [ 21.119755] kasan_check_range+0x100/0x1a8 [ 21.119929] __kasan_check_write+0x20/0x30 [ 21.120026] kasan_atomics_helper+0x12d8/0x4858 [ 21.120088] kasan_atomics+0x198/0x2e0 [ 21.120136] kunit_try_run_case+0x170/0x3f0 [ 21.120238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.120301] kthread+0x328/0x630 [ 21.120481] ret_from_fork+0x10/0x20 [ 21.120551] [ 21.120603] Allocated by task 268: [ 21.120732] kasan_save_stack+0x3c/0x68 [ 21.120798] kasan_save_track+0x20/0x40 [ 21.120844] kasan_save_alloc_info+0x40/0x58 [ 21.120888] __kasan_kmalloc+0xd4/0xd8 [ 21.121196] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.121287] kasan_atomics+0xb8/0x2e0 [ 21.121330] kunit_try_run_case+0x170/0x3f0 [ 21.121384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.121491] kthread+0x328/0x630 [ 21.121536] ret_from_fork+0x10/0x20 [ 21.121603] [ 21.121792] The buggy address belongs to the object at fff00000c3f85080 [ 21.121792] which belongs to the cache kmalloc-64 of size 64 [ 21.121901] The buggy address is located 0 bytes to the right of [ 21.121901] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.122057] [ 21.122117] The buggy address belongs to the physical page: [ 21.122176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.122359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.122449] page_type: f5(slab) [ 21.122492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.122605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.122720] page dumped because: kasan: bad access detected [ 21.122782] [ 21.122965] Memory state around the buggy address: [ 21.123036] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.123178] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.123233] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.123369] ^ [ 21.123409] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.123455] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.123642] ================================================================== [ 21.175334] ================================================================== [ 21.175399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 21.175451] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.175502] [ 21.175539] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.175625] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.175657] Hardware name: linux,dummy-virt (DT) [ 21.175692] Call trace: [ 21.175717] show_stack+0x20/0x38 (C) [ 21.175767] dump_stack_lvl+0x8c/0xd0 [ 21.175820] print_report+0x118/0x608 [ 21.175867] kasan_report+0xdc/0x128 [ 21.175916] __asan_report_load8_noabort+0x20/0x30 [ 21.175971] kasan_atomics_helper+0x3db0/0x4858 [ 21.176020] kasan_atomics+0x198/0x2e0 [ 21.176068] kunit_try_run_case+0x170/0x3f0 [ 21.176119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.176178] kthread+0x328/0x630 [ 21.176225] ret_from_fork+0x10/0x20 [ 21.176279] [ 21.176298] Allocated by task 268: [ 21.176327] kasan_save_stack+0x3c/0x68 [ 21.179279] kasan_save_track+0x20/0x40 [ 21.179325] kasan_save_alloc_info+0x40/0x58 [ 21.179379] __kasan_kmalloc+0xd4/0xd8 [ 21.179419] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.179465] kasan_atomics+0xb8/0x2e0 [ 21.179503] kunit_try_run_case+0x170/0x3f0 [ 21.179546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.179595] kthread+0x328/0x630 [ 21.179634] ret_from_fork+0x10/0x20 [ 21.179674] [ 21.179695] The buggy address belongs to the object at fff00000c3f85080 [ 21.179695] which belongs to the cache kmalloc-64 of size 64 [ 21.179757] The buggy address is located 0 bytes to the right of [ 21.179757] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.179823] [ 21.179846] The buggy address belongs to the physical page: [ 21.179880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.179935] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.179988] page_type: f5(slab) [ 21.180029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.180082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.180125] page dumped because: kasan: bad access detected [ 21.180159] [ 21.180179] Memory state around the buggy address: [ 21.180211] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.180256] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.180300] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.180343] ^ [ 21.180388] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.180434] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.180475] ================================================================== [ 21.190118] ================================================================== [ 21.190168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 21.190385] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.190543] [ 21.190580] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.190708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.190758] Hardware name: linux,dummy-virt (DT) [ 21.190828] Call trace: [ 21.190875] show_stack+0x20/0x38 (C) [ 21.190927] dump_stack_lvl+0x8c/0xd0 [ 21.191088] print_report+0x118/0x608 [ 21.191150] kasan_report+0xdc/0x128 [ 21.191266] kasan_check_range+0x100/0x1a8 [ 21.191325] __kasan_check_write+0x20/0x30 [ 21.191388] kasan_atomics_helper+0x16d0/0x4858 [ 21.191506] kasan_atomics+0x198/0x2e0 [ 21.191601] kunit_try_run_case+0x170/0x3f0 [ 21.191703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.191793] kthread+0x328/0x630 [ 21.191879] ret_from_fork+0x10/0x20 [ 21.191931] [ 21.191953] Allocated by task 268: [ 21.191984] kasan_save_stack+0x3c/0x68 [ 21.192159] kasan_save_track+0x20/0x40 [ 21.192203] kasan_save_alloc_info+0x40/0x58 [ 21.192317] __kasan_kmalloc+0xd4/0xd8 [ 21.192372] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.192420] kasan_atomics+0xb8/0x2e0 [ 21.192489] kunit_try_run_case+0x170/0x3f0 [ 21.192568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.192643] kthread+0x328/0x630 [ 21.192725] ret_from_fork+0x10/0x20 [ 21.192970] [ 21.193035] The buggy address belongs to the object at fff00000c3f85080 [ 21.193035] which belongs to the cache kmalloc-64 of size 64 [ 21.193197] The buggy address is located 0 bytes to the right of [ 21.193197] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.193396] [ 21.193454] The buggy address belongs to the physical page: [ 21.193530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.193610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.193691] page_type: f5(slab) [ 21.193742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.193802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.194055] page dumped because: kasan: bad access detected [ 21.194327] [ 21.194411] Memory state around the buggy address: [ 21.194546] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.194826] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.194880] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.194930] ^ [ 21.194967] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.195016] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.195057] ================================================================== [ 21.149487] ================================================================== [ 21.149565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 21.149727] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.150147] [ 21.150208] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.150300] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.150625] Hardware name: linux,dummy-virt (DT) [ 21.151017] Call trace: [ 21.151083] show_stack+0x20/0x38 (C) [ 21.151224] dump_stack_lvl+0x8c/0xd0 [ 21.151282] print_report+0x118/0x608 [ 21.151331] kasan_report+0xdc/0x128 [ 21.151428] kasan_check_range+0x100/0x1a8 [ 21.151496] __kasan_check_write+0x20/0x30 [ 21.152165] kasan_atomics_helper+0x14e4/0x4858 [ 21.152251] kasan_atomics+0x198/0x2e0 [ 21.152336] kunit_try_run_case+0x170/0x3f0 [ 21.152504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.152579] kthread+0x328/0x630 [ 21.152968] ret_from_fork+0x10/0x20 [ 21.153631] [ 21.153678] Allocated by task 268: [ 21.153715] kasan_save_stack+0x3c/0x68 [ 21.153762] kasan_save_track+0x20/0x40 [ 21.153802] kasan_save_alloc_info+0x40/0x58 [ 21.154156] __kasan_kmalloc+0xd4/0xd8 [ 21.154243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.154529] kasan_atomics+0xb8/0x2e0 [ 21.154919] kunit_try_run_case+0x170/0x3f0 [ 21.155034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.155432] kthread+0x328/0x630 [ 21.156007] ret_from_fork+0x10/0x20 [ 21.156192] [ 21.156273] The buggy address belongs to the object at fff00000c3f85080 [ 21.156273] which belongs to the cache kmalloc-64 of size 64 [ 21.156345] The buggy address is located 0 bytes to the right of [ 21.156345] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.156462] [ 21.156486] The buggy address belongs to the physical page: [ 21.156556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.156919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.157394] page_type: f5(slab) [ 21.157799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.158136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.158259] page dumped because: kasan: bad access detected [ 21.158343] [ 21.158412] Memory state around the buggy address: [ 21.158533] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.158600] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.158813] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.158985] ^ [ 21.159054] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.159403] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.159519] ================================================================== [ 21.101032] ================================================================== [ 21.101091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 21.101199] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.101279] [ 21.101425] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.101556] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.101794] Hardware name: linux,dummy-virt (DT) [ 21.101852] Call trace: [ 21.101957] show_stack+0x20/0x38 (C) [ 21.102055] dump_stack_lvl+0x8c/0xd0 [ 21.102135] print_report+0x118/0x608 [ 21.102221] kasan_report+0xdc/0x128 [ 21.102468] kasan_check_range+0x100/0x1a8 [ 21.102531] __kasan_check_write+0x20/0x30 [ 21.102593] kasan_atomics_helper+0x1190/0x4858 [ 21.102646] kasan_atomics+0x198/0x2e0 [ 21.102693] kunit_try_run_case+0x170/0x3f0 [ 21.102871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.102958] kthread+0x328/0x630 [ 21.103205] ret_from_fork+0x10/0x20 [ 21.103269] [ 21.103392] Allocated by task 268: [ 21.103447] kasan_save_stack+0x3c/0x68 [ 21.103517] kasan_save_track+0x20/0x40 [ 21.103653] kasan_save_alloc_info+0x40/0x58 [ 21.103751] __kasan_kmalloc+0xd4/0xd8 [ 21.103830] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.104176] kasan_atomics+0xb8/0x2e0 [ 21.104255] kunit_try_run_case+0x170/0x3f0 [ 21.104301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.104371] kthread+0x328/0x630 [ 21.104462] ret_from_fork+0x10/0x20 [ 21.104582] [ 21.104631] The buggy address belongs to the object at fff00000c3f85080 [ 21.104631] which belongs to the cache kmalloc-64 of size 64 [ 21.104748] The buggy address is located 0 bytes to the right of [ 21.104748] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.104976] [ 21.105026] The buggy address belongs to the physical page: [ 21.105104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.105215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.105382] page_type: f5(slab) [ 21.105571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.105716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.105785] page dumped because: kasan: bad access detected [ 21.105881] [ 21.105920] Memory state around the buggy address: [ 21.105970] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.106195] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.106251] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.106311] ^ [ 21.106406] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.106453] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.106608] ================================================================== [ 21.068534] ================================================================== [ 21.068596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 21.068651] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.068850] [ 21.068892] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.069062] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.069130] Hardware name: linux,dummy-virt (DT) [ 21.069165] Call trace: [ 21.069324] show_stack+0x20/0x38 (C) [ 21.069412] dump_stack_lvl+0x8c/0xd0 [ 21.069476] print_report+0x118/0x608 [ 21.069527] kasan_report+0xdc/0x128 [ 21.069574] kasan_check_range+0x100/0x1a8 [ 21.069625] __kasan_check_write+0x20/0x30 [ 21.069675] kasan_atomics_helper+0xff0/0x4858 [ 21.069725] kasan_atomics+0x198/0x2e0 [ 21.069771] kunit_try_run_case+0x170/0x3f0 [ 21.069825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.070178] kthread+0x328/0x630 [ 21.070339] ret_from_fork+0x10/0x20 [ 21.070405] [ 21.070428] Allocated by task 268: [ 21.070623] kasan_save_stack+0x3c/0x68 [ 21.070671] kasan_save_track+0x20/0x40 [ 21.070772] kasan_save_alloc_info+0x40/0x58 [ 21.070872] __kasan_kmalloc+0xd4/0xd8 [ 21.070981] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.071263] kasan_atomics+0xb8/0x2e0 [ 21.071418] kunit_try_run_case+0x170/0x3f0 [ 21.071467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.071546] kthread+0x328/0x630 [ 21.071732] ret_from_fork+0x10/0x20 [ 21.071787] [ 21.071850] The buggy address belongs to the object at fff00000c3f85080 [ 21.071850] which belongs to the cache kmalloc-64 of size 64 [ 21.071957] The buggy address is located 0 bytes to the right of [ 21.071957] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.072053] [ 21.072282] The buggy address belongs to the physical page: [ 21.072341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.072433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.072577] page_type: f5(slab) [ 21.072622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.072675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.072871] page dumped because: kasan: bad access detected [ 21.072910] [ 21.072933] Memory state around the buggy address: [ 21.073032] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.073109] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.073192] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.073359] ^ [ 21.073404] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.073715] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.073812] ================================================================== [ 20.999642] ================================================================== [ 20.999696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 21.000044] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.000132] [ 21.000167] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.000257] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.000402] Hardware name: linux,dummy-virt (DT) [ 21.000449] Call trace: [ 21.000475] show_stack+0x20/0x38 (C) [ 21.000531] dump_stack_lvl+0x8c/0xd0 [ 21.000763] print_report+0x118/0x608 [ 21.000899] kasan_report+0xdc/0x128 [ 21.000953] __asan_report_load4_noabort+0x20/0x30 [ 21.001163] kasan_atomics_helper+0x3dd8/0x4858 [ 21.001233] kasan_atomics+0x198/0x2e0 [ 21.001301] kunit_try_run_case+0x170/0x3f0 [ 21.001409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.001636] kthread+0x328/0x630 [ 21.001695] ret_from_fork+0x10/0x20 [ 21.001786] [ 21.001893] Allocated by task 268: [ 21.001953] kasan_save_stack+0x3c/0x68 [ 21.002127] kasan_save_track+0x20/0x40 [ 21.002193] kasan_save_alloc_info+0x40/0x58 [ 21.002237] __kasan_kmalloc+0xd4/0xd8 [ 21.002277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.002360] kasan_atomics+0xb8/0x2e0 [ 21.002399] kunit_try_run_case+0x170/0x3f0 [ 21.002625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.002854] kthread+0x328/0x630 [ 21.002921] ret_from_fork+0x10/0x20 [ 21.003106] [ 21.003196] The buggy address belongs to the object at fff00000c3f85080 [ 21.003196] which belongs to the cache kmalloc-64 of size 64 [ 21.003323] The buggy address is located 0 bytes to the right of [ 21.003323] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.003468] [ 21.003533] The buggy address belongs to the physical page: [ 21.005473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.006299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.006517] page_type: f5(slab) [ 21.006567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.008270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.008506] page dumped because: kasan: bad access detected [ 21.008558] [ 21.008719] Memory state around the buggy address: [ 21.008794] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.008926] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.009002] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.009249] ^ [ 21.009440] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.009543] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.009737] ================================================================== [ 21.053241] ================================================================== [ 21.053300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.053469] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.053564] [ 21.053609] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.053708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.053860] Hardware name: linux,dummy-virt (DT) [ 21.053918] Call trace: [ 21.053964] show_stack+0x20/0x38 (C) [ 21.054136] dump_stack_lvl+0x8c/0xd0 [ 21.054195] print_report+0x118/0x608 [ 21.054270] kasan_report+0xdc/0x128 [ 21.054560] kasan_check_range+0x100/0x1a8 [ 21.054738] __kasan_check_write+0x20/0x30 [ 21.054842] kasan_atomics_helper+0xf20/0x4858 [ 21.055006] kasan_atomics+0x198/0x2e0 [ 21.055123] kunit_try_run_case+0x170/0x3f0 [ 21.055302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.055422] kthread+0x328/0x630 [ 21.055498] ret_from_fork+0x10/0x20 [ 21.055674] [ 21.055723] Allocated by task 268: [ 21.055779] kasan_save_stack+0x3c/0x68 [ 21.055825] kasan_save_track+0x20/0x40 [ 21.056043] kasan_save_alloc_info+0x40/0x58 [ 21.056099] __kasan_kmalloc+0xd4/0xd8 [ 21.056391] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.056802] kasan_atomics+0xb8/0x2e0 [ 21.056859] kunit_try_run_case+0x170/0x3f0 [ 21.056956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.057027] kthread+0x328/0x630 [ 21.057249] ret_from_fork+0x10/0x20 [ 21.057328] [ 21.057405] The buggy address belongs to the object at fff00000c3f85080 [ 21.057405] which belongs to the cache kmalloc-64 of size 64 [ 21.057679] The buggy address is located 0 bytes to the right of [ 21.057679] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.057776] [ 21.057830] The buggy address belongs to the physical page: [ 21.057886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.058096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.058157] page_type: f5(slab) [ 21.058272] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.058330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.058515] page dumped because: kasan: bad access detected [ 21.058589] [ 21.058657] Memory state around the buggy address: [ 21.058953] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.059127] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.059185] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.059458] ^ [ 21.059515] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.059613] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.059692] ================================================================== [ 20.950025] ================================================================== [ 20.950078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 20.950141] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.950202] [ 20.950248] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.950338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.950505] Hardware name: linux,dummy-virt (DT) [ 20.950587] Call trace: [ 20.950663] show_stack+0x20/0x38 (C) [ 20.950736] dump_stack_lvl+0x8c/0xd0 [ 20.950835] print_report+0x118/0x608 [ 20.950890] kasan_report+0xdc/0x128 [ 20.950956] kasan_check_range+0x100/0x1a8 [ 20.951017] __kasan_check_write+0x20/0x30 [ 20.951066] kasan_atomics_helper+0xa04/0x4858 [ 20.951117] kasan_atomics+0x198/0x2e0 [ 20.951165] kunit_try_run_case+0x170/0x3f0 [ 20.951472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.951534] kthread+0x328/0x630 [ 20.951632] ret_from_fork+0x10/0x20 [ 20.951715] [ 20.951754] Allocated by task 268: [ 20.951803] kasan_save_stack+0x3c/0x68 [ 20.951859] kasan_save_track+0x20/0x40 [ 20.951899] kasan_save_alloc_info+0x40/0x58 [ 20.952023] __kasan_kmalloc+0xd4/0xd8 [ 20.952110] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.952187] kasan_atomics+0xb8/0x2e0 [ 20.952247] kunit_try_run_case+0x170/0x3f0 [ 20.952291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.952338] kthread+0x328/0x630 [ 20.952417] ret_from_fork+0x10/0x20 [ 20.952514] [ 20.952544] The buggy address belongs to the object at fff00000c3f85080 [ 20.952544] which belongs to the cache kmalloc-64 of size 64 [ 20.952604] The buggy address is located 0 bytes to the right of [ 20.952604] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.952675] [ 20.952704] The buggy address belongs to the physical page: [ 20.952739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 20.952791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.952852] page_type: f5(slab) [ 20.952910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.952963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.953019] page dumped because: kasan: bad access detected [ 20.953062] [ 20.953091] Memory state around the buggy address: [ 20.953127] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.953173] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.953219] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.953259] ^ [ 20.953405] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.953464] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.953506] ================================================================== [ 21.123970] ================================================================== [ 21.124024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 21.124077] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.124289] [ 21.124336] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.124643] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.124688] Hardware name: linux,dummy-virt (DT) [ 21.124724] Call trace: [ 21.124750] show_stack+0x20/0x38 (C) [ 21.124805] dump_stack_lvl+0x8c/0xd0 [ 21.124886] print_report+0x118/0x608 [ 21.125080] kasan_report+0xdc/0x128 [ 21.125144] kasan_check_range+0x100/0x1a8 [ 21.125257] __kasan_check_write+0x20/0x30 [ 21.125323] kasan_atomics_helper+0x1384/0x4858 [ 21.125386] kasan_atomics+0x198/0x2e0 [ 21.125499] kunit_try_run_case+0x170/0x3f0 [ 21.125587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.125648] kthread+0x328/0x630 [ 21.125696] ret_from_fork+0x10/0x20 [ 21.125766] [ 21.125787] Allocated by task 268: [ 21.125816] kasan_save_stack+0x3c/0x68 [ 21.125876] kasan_save_track+0x20/0x40 [ 21.125939] kasan_save_alloc_info+0x40/0x58 [ 21.125983] __kasan_kmalloc+0xd4/0xd8 [ 21.126023] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.126069] kasan_atomics+0xb8/0x2e0 [ 21.126117] kunit_try_run_case+0x170/0x3f0 [ 21.126170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.126219] kthread+0x328/0x630 [ 21.126258] ret_from_fork+0x10/0x20 [ 21.126298] [ 21.126328] The buggy address belongs to the object at fff00000c3f85080 [ 21.126328] which belongs to the cache kmalloc-64 of size 64 [ 21.126408] The buggy address is located 0 bytes to the right of [ 21.126408] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.126486] [ 21.126523] The buggy address belongs to the physical page: [ 21.126577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.126640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.126691] page_type: f5(slab) [ 21.126738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.126790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.126842] page dumped because: kasan: bad access detected [ 21.126885] [ 21.126914] Memory state around the buggy address: [ 21.126956] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.127015] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.127072] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.127112] ^ [ 21.127149] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.127194] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.127235] ================================================================== [ 20.959740] ================================================================== [ 20.959796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 20.959849] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.959900] [ 20.959933] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.960164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.960200] Hardware name: linux,dummy-virt (DT) [ 20.960234] Call trace: [ 20.960261] show_stack+0x20/0x38 (C) [ 20.960315] dump_stack_lvl+0x8c/0xd0 [ 20.960376] print_report+0x118/0x608 [ 20.960581] kasan_report+0xdc/0x128 [ 20.960767] kasan_check_range+0x100/0x1a8 [ 20.960848] __kasan_check_write+0x20/0x30 [ 20.960900] kasan_atomics_helper+0xad4/0x4858 [ 20.960951] kasan_atomics+0x198/0x2e0 [ 20.960999] kunit_try_run_case+0x170/0x3f0 [ 20.961072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.961132] kthread+0x328/0x630 [ 20.961180] ret_from_fork+0x10/0x20 [ 20.961232] [ 20.961254] Allocated by task 268: [ 20.961486] kasan_save_stack+0x3c/0x68 [ 20.961537] kasan_save_track+0x20/0x40 [ 20.961579] kasan_save_alloc_info+0x40/0x58 [ 20.961622] __kasan_kmalloc+0xd4/0xd8 [ 20.961661] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.961707] kasan_atomics+0xb8/0x2e0 [ 20.961744] kunit_try_run_case+0x170/0x3f0 [ 20.961787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.961837] kthread+0x328/0x630 [ 20.961875] ret_from_fork+0x10/0x20 [ 20.961913] [ 20.961936] The buggy address belongs to the object at fff00000c3f85080 [ 20.961936] which belongs to the cache kmalloc-64 of size 64 [ 20.961997] The buggy address is located 0 bytes to the right of [ 20.961997] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.962063] [ 20.962085] The buggy address belongs to the physical page: [ 20.962118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 20.962170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.962220] page_type: f5(slab) [ 20.962260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.962314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.962366] page dumped because: kasan: bad access detected [ 20.962453] [ 20.962503] Memory state around the buggy address: [ 20.962552] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.962667] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.962722] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.962791] ^ [ 20.962977] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.963135] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.963234] ================================================================== [ 21.180703] ================================================================== [ 21.180751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 21.180799] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.180850] [ 21.180882] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.180968] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.181000] Hardware name: linux,dummy-virt (DT) [ 21.181032] Call trace: [ 21.181056] show_stack+0x20/0x38 (C) [ 21.181107] dump_stack_lvl+0x8c/0xd0 [ 21.181157] print_report+0x118/0x608 [ 21.181205] kasan_report+0xdc/0x128 [ 21.181252] kasan_check_range+0x100/0x1a8 [ 21.181303] __kasan_check_write+0x20/0x30 [ 21.181381] kasan_atomics_helper+0x1644/0x4858 [ 21.181518] kasan_atomics+0x198/0x2e0 [ 21.181591] kunit_try_run_case+0x170/0x3f0 [ 21.181644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.181702] kthread+0x328/0x630 [ 21.181749] ret_from_fork+0x10/0x20 [ 21.181802] [ 21.181823] Allocated by task 268: [ 21.182143] kasan_save_stack+0x3c/0x68 [ 21.182189] kasan_save_track+0x20/0x40 [ 21.182267] kasan_save_alloc_info+0x40/0x58 [ 21.182391] __kasan_kmalloc+0xd4/0xd8 [ 21.182532] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.182628] kasan_atomics+0xb8/0x2e0 [ 21.182695] kunit_try_run_case+0x170/0x3f0 [ 21.182989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.183070] kthread+0x328/0x630 [ 21.183171] ret_from_fork+0x10/0x20 [ 21.183213] [ 21.183243] The buggy address belongs to the object at fff00000c3f85080 [ 21.183243] which belongs to the cache kmalloc-64 of size 64 [ 21.183312] The buggy address is located 0 bytes to the right of [ 21.183312] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.183388] [ 21.183412] The buggy address belongs to the physical page: [ 21.183445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.183520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.183572] page_type: f5(slab) [ 21.183614] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.183681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.183724] page dumped because: kasan: bad access detected [ 21.183759] [ 21.183780] Memory state around the buggy address: [ 21.183812] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.183858] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.183910] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.183950] ^ [ 21.183987] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.184031] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.184072] ================================================================== [ 21.107671] ================================================================== [ 21.107737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 21.107802] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.107854] [ 21.107887] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.107977] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.108010] Hardware name: linux,dummy-virt (DT) [ 21.108075] Call trace: [ 21.108116] show_stack+0x20/0x38 (C) [ 21.108173] dump_stack_lvl+0x8c/0xd0 [ 21.108226] print_report+0x118/0x608 [ 21.108275] kasan_report+0xdc/0x128 [ 21.108321] kasan_check_range+0x100/0x1a8 [ 21.108392] __kasan_check_write+0x20/0x30 [ 21.108444] kasan_atomics_helper+0x11f8/0x4858 [ 21.108493] kasan_atomics+0x198/0x2e0 [ 21.108540] kunit_try_run_case+0x170/0x3f0 [ 21.108598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.108657] kthread+0x328/0x630 [ 21.108704] ret_from_fork+0x10/0x20 [ 21.108765] [ 21.108794] Allocated by task 268: [ 21.108846] kasan_save_stack+0x3c/0x68 [ 21.108898] kasan_save_track+0x20/0x40 [ 21.108946] kasan_save_alloc_info+0x40/0x58 [ 21.108998] __kasan_kmalloc+0xd4/0xd8 [ 21.109038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.109084] kasan_atomics+0xb8/0x2e0 [ 21.109122] kunit_try_run_case+0x170/0x3f0 [ 21.109165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.109214] kthread+0x328/0x630 [ 21.109261] ret_from_fork+0x10/0x20 [ 21.109302] [ 21.109324] The buggy address belongs to the object at fff00000c3f85080 [ 21.109324] which belongs to the cache kmalloc-64 of size 64 [ 21.109798] The buggy address is located 0 bytes to the right of [ 21.109798] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.110103] [ 21.110181] The buggy address belongs to the physical page: [ 21.110233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.110291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.110361] page_type: f5(slab) [ 21.110410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.110465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.110509] page dumped because: kasan: bad access detected [ 21.110546] [ 21.110566] Memory state around the buggy address: [ 21.110763] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.110847] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.110995] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.111271] ^ [ 21.111367] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.111459] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.111565] ================================================================== [ 21.047423] ================================================================== [ 21.047479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 21.047752] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.047842] [ 21.047885] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.048072] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.048127] Hardware name: linux,dummy-virt (DT) [ 21.048184] Call trace: [ 21.048210] show_stack+0x20/0x38 (C) [ 21.048264] dump_stack_lvl+0x8c/0xd0 [ 21.048401] print_report+0x118/0x608 [ 21.048448] kasan_report+0xdc/0x128 [ 21.048497] kasan_check_range+0x100/0x1a8 [ 21.048556] __kasan_check_write+0x20/0x30 [ 21.048623] kasan_atomics_helper+0xeb8/0x4858 [ 21.048672] kasan_atomics+0x198/0x2e0 [ 21.048718] kunit_try_run_case+0x170/0x3f0 [ 21.048777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.048836] kthread+0x328/0x630 [ 21.048885] ret_from_fork+0x10/0x20 [ 21.048937] [ 21.048959] Allocated by task 268: [ 21.048991] kasan_save_stack+0x3c/0x68 [ 21.049035] kasan_save_track+0x20/0x40 [ 21.049075] kasan_save_alloc_info+0x40/0x58 [ 21.049118] __kasan_kmalloc+0xd4/0xd8 [ 21.049155] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.049200] kasan_atomics+0xb8/0x2e0 [ 21.049238] kunit_try_run_case+0x170/0x3f0 [ 21.049281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.049338] kthread+0x328/0x630 [ 21.049388] ret_from_fork+0x10/0x20 [ 21.049442] [ 21.050037] The buggy address belongs to the object at fff00000c3f85080 [ 21.050037] which belongs to the cache kmalloc-64 of size 64 [ 21.050116] The buggy address is located 0 bytes to the right of [ 21.050116] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.050431] [ 21.050506] The buggy address belongs to the physical page: [ 21.050565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.050787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.051033] page_type: f5(slab) [ 21.051103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.051206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.051269] page dumped because: kasan: bad access detected [ 21.051384] [ 21.051445] Memory state around the buggy address: [ 21.051508] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.051727] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.051809] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.052006] ^ [ 21.052063] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.052129] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.052371] ================================================================== [ 20.937073] ================================================================== [ 20.937134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 20.937204] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.937707] show_stack+0x20/0x38 (C) [ 20.939485] The buggy address is located 0 bytes to the right of [ 20.939485] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.940247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.940515] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.942598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.942675] kthread+0x328/0x630 [ 20.942724] ret_from_fork+0x10/0x20 [ 20.943054] [ 20.943112] Allocated by task 268: [ 20.943169] kasan_save_stack+0x3c/0x68 [ 20.943213] kasan_save_track+0x20/0x40 [ 20.943269] kasan_save_alloc_info+0x40/0x58 [ 20.943326] __kasan_kmalloc+0xd4/0xd8 [ 20.943430] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.943489] kasan_atomics+0xb8/0x2e0 [ 20.943548] kunit_try_run_case+0x170/0x3f0 [ 20.943702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.943753] kthread+0x328/0x630 [ 20.943801] ret_from_fork+0x10/0x20 [ 20.943874] [ 20.943971] The buggy address belongs to the object at fff00000c3f85080 [ 20.943971] which belongs to the cache kmalloc-64 of size 64 [ 20.944058] The buggy address is located 0 bytes to the right of [ 20.944058] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.944177] [ 20.944227] The buggy address belongs to the physical page: [ 20.944285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 20.944385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.944472] page_type: f5(slab) [ 20.944537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.944635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.944706] page dumped because: kasan: bad access detected [ 20.944861] [ 20.944883] Memory state around the buggy address: [ 20.944928] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.945045] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.945190] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.945283] ^ [ 20.945320] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.945376] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.945417] ================================================================== [ 21.160035] ================================================================== [ 21.160248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 21.160304] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.160703] [ 21.160811] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.160977] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.161035] Hardware name: linux,dummy-virt (DT) [ 21.161081] Call trace: [ 21.161118] show_stack+0x20/0x38 (C) [ 21.161181] dump_stack_lvl+0x8c/0xd0 [ 21.161237] print_report+0x118/0x608 [ 21.161403] kasan_report+0xdc/0x128 [ 21.161761] kasan_check_range+0x100/0x1a8 [ 21.161885] __kasan_check_write+0x20/0x30 [ 21.161961] kasan_atomics_helper+0x154c/0x4858 [ 21.162064] kasan_atomics+0x198/0x2e0 [ 21.162179] kunit_try_run_case+0x170/0x3f0 [ 21.162238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.162556] kthread+0x328/0x630 [ 21.162719] ret_from_fork+0x10/0x20 [ 21.163081] [ 21.163153] Allocated by task 268: [ 21.163222] kasan_save_stack+0x3c/0x68 [ 21.163336] kasan_save_track+0x20/0x40 [ 21.163420] kasan_save_alloc_info+0x40/0x58 [ 21.163546] __kasan_kmalloc+0xd4/0xd8 [ 21.163615] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.163738] kasan_atomics+0xb8/0x2e0 [ 21.163808] kunit_try_run_case+0x170/0x3f0 [ 21.163918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.163983] kthread+0x328/0x630 [ 21.164023] ret_from_fork+0x10/0x20 [ 21.164089] [ 21.164248] The buggy address belongs to the object at fff00000c3f85080 [ 21.164248] which belongs to the cache kmalloc-64 of size 64 [ 21.164483] The buggy address is located 0 bytes to the right of [ 21.164483] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.164814] [ 21.165207] The buggy address belongs to the physical page: [ 21.165271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.165372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.165597] page_type: f5(slab) [ 21.165650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.165761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.166010] page dumped because: kasan: bad access detected [ 21.166271] [ 21.166440] Memory state around the buggy address: [ 21.166502] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.166714] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.166924] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.166987] ^ [ 21.167166] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.167421] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.167469] ================================================================== [ 21.080551] ================================================================== [ 21.080608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 21.080660] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.080712] [ 21.080745] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.080834] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.080874] Hardware name: linux,dummy-virt (DT) [ 21.080917] Call trace: [ 21.080942] show_stack+0x20/0x38 (C) [ 21.080993] dump_stack_lvl+0x8c/0xd0 [ 21.081043] print_report+0x118/0x608 [ 21.081092] kasan_report+0xdc/0x128 [ 21.081138] kasan_check_range+0x100/0x1a8 [ 21.081194] __kasan_check_write+0x20/0x30 [ 21.081247] kasan_atomics_helper+0x10c0/0x4858 [ 21.081297] kasan_atomics+0x198/0x2e0 [ 21.081343] kunit_try_run_case+0x170/0x3f0 [ 21.081418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.081730] kthread+0x328/0x630 [ 21.081794] ret_from_fork+0x10/0x20 [ 21.081847] [ 21.081877] Allocated by task 268: [ 21.081910] kasan_save_stack+0x3c/0x68 [ 21.081954] kasan_save_track+0x20/0x40 [ 21.081994] kasan_save_alloc_info+0x40/0x58 [ 21.082067] __kasan_kmalloc+0xd4/0xd8 [ 21.082108] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.082321] kasan_atomics+0xb8/0x2e0 [ 21.082690] kunit_try_run_case+0x170/0x3f0 [ 21.082761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.082995] kthread+0x328/0x630 [ 21.083065] ret_from_fork+0x10/0x20 [ 21.083142] [ 21.083205] The buggy address belongs to the object at fff00000c3f85080 [ 21.083205] which belongs to the cache kmalloc-64 of size 64 [ 21.083510] The buggy address is located 0 bytes to the right of [ 21.083510] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.083728] [ 21.083789] The buggy address belongs to the physical page: [ 21.083940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.084024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.084225] page_type: f5(slab) [ 21.084282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.084368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.084471] page dumped because: kasan: bad access detected [ 21.084529] [ 21.084549] Memory state around the buggy address: [ 21.084585] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.084783] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.084852] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.084900] ^ [ 21.084949] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.085058] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.085133] ================================================================== [ 21.184257] ================================================================== [ 21.184303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 21.184367] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.184419] [ 21.184450] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.184533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.184566] Hardware name: linux,dummy-virt (DT) [ 21.184628] Call trace: [ 21.184654] show_stack+0x20/0x38 (C) [ 21.184707] dump_stack_lvl+0x8c/0xd0 [ 21.184757] print_report+0x118/0x608 [ 21.184980] kasan_report+0xdc/0x128 [ 21.185049] __asan_report_load8_noabort+0x20/0x30 [ 21.185104] kasan_atomics_helper+0x3df4/0x4858 [ 21.185156] kasan_atomics+0x198/0x2e0 [ 21.185202] kunit_try_run_case+0x170/0x3f0 [ 21.185276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.185336] kthread+0x328/0x630 [ 21.185394] ret_from_fork+0x10/0x20 [ 21.185452] [ 21.185508] Allocated by task 268: [ 21.185691] kasan_save_stack+0x3c/0x68 [ 21.185984] kasan_save_track+0x20/0x40 [ 21.186151] kasan_save_alloc_info+0x40/0x58 [ 21.186239] __kasan_kmalloc+0xd4/0xd8 [ 21.186439] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.186507] kasan_atomics+0xb8/0x2e0 [ 21.186561] kunit_try_run_case+0x170/0x3f0 [ 21.186609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.186659] kthread+0x328/0x630 [ 21.186893] ret_from_fork+0x10/0x20 [ 21.186981] [ 21.187041] The buggy address belongs to the object at fff00000c3f85080 [ 21.187041] which belongs to the cache kmalloc-64 of size 64 [ 21.187284] The buggy address is located 0 bytes to the right of [ 21.187284] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.187428] [ 21.187658] The buggy address belongs to the physical page: [ 21.187833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.187898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.188090] page_type: f5(slab) [ 21.188177] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.188231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.188445] page dumped because: kasan: bad access detected [ 21.188596] [ 21.188676] Memory state around the buggy address: [ 21.188744] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.188916] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.189046] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.189231] ^ [ 21.189295] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.189525] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.189674] ================================================================== [ 20.953635] ================================================================== [ 20.953710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.953786] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.953865] [ 20.953920] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.954147] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.954252] Hardware name: linux,dummy-virt (DT) [ 20.954400] Call trace: [ 20.954481] show_stack+0x20/0x38 (C) [ 20.954565] dump_stack_lvl+0x8c/0xd0 [ 20.954646] print_report+0x118/0x608 [ 20.954695] kasan_report+0xdc/0x128 [ 20.954743] kasan_check_range+0x100/0x1a8 [ 20.954812] __kasan_check_write+0x20/0x30 [ 20.954863] kasan_atomics_helper+0xa6c/0x4858 [ 20.955034] kasan_atomics+0x198/0x2e0 [ 20.955083] kunit_try_run_case+0x170/0x3f0 [ 20.955136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.955210] kthread+0x328/0x630 [ 20.955286] ret_from_fork+0x10/0x20 [ 20.955407] [ 20.955447] Allocated by task 268: [ 20.955510] kasan_save_stack+0x3c/0x68 [ 20.955570] kasan_save_track+0x20/0x40 [ 20.955712] kasan_save_alloc_info+0x40/0x58 [ 20.955800] __kasan_kmalloc+0xd4/0xd8 [ 20.955973] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.956051] kasan_atomics+0xb8/0x2e0 [ 20.956137] kunit_try_run_case+0x170/0x3f0 [ 20.956217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.956313] kthread+0x328/0x630 [ 20.956437] ret_from_fork+0x10/0x20 [ 20.956516] [ 20.956538] The buggy address belongs to the object at fff00000c3f85080 [ 20.956538] which belongs to the cache kmalloc-64 of size 64 [ 20.956597] The buggy address is located 0 bytes to the right of [ 20.956597] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.956897] [ 20.956968] The buggy address belongs to the physical page: [ 20.957068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 20.957155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.957229] page_type: f5(slab) [ 20.957271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.957329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.957383] page dumped because: kasan: bad access detected [ 20.957416] [ 20.957436] Memory state around the buggy address: [ 20.957509] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.957555] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.957601] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.957639] ^ [ 20.957958] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.958088] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.958147] ================================================================== [ 21.074771] ================================================================== [ 21.075006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 21.075120] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.075174] [ 21.075225] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.075437] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.075483] Hardware name: linux,dummy-virt (DT) [ 21.075518] Call trace: [ 21.075545] show_stack+0x20/0x38 (C) [ 21.075748] dump_stack_lvl+0x8c/0xd0 [ 21.075826] print_report+0x118/0x608 [ 21.075908] kasan_report+0xdc/0x128 [ 21.076007] kasan_check_range+0x100/0x1a8 [ 21.076075] __kasan_check_write+0x20/0x30 [ 21.076127] kasan_atomics_helper+0x1058/0x4858 [ 21.076317] kasan_atomics+0x198/0x2e0 [ 21.076385] kunit_try_run_case+0x170/0x3f0 [ 21.076457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.076519] kthread+0x328/0x630 [ 21.076622] ret_from_fork+0x10/0x20 [ 21.076676] [ 21.076717] Allocated by task 268: [ 21.076750] kasan_save_stack+0x3c/0x68 [ 21.076854] kasan_save_track+0x20/0x40 [ 21.076912] kasan_save_alloc_info+0x40/0x58 [ 21.077094] __kasan_kmalloc+0xd4/0xd8 [ 21.077153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.077224] kasan_atomics+0xb8/0x2e0 [ 21.077272] kunit_try_run_case+0x170/0x3f0 [ 21.077325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.077491] kthread+0x328/0x630 [ 21.077586] ret_from_fork+0x10/0x20 [ 21.077852] [ 21.078126] The buggy address belongs to the object at fff00000c3f85080 [ 21.078126] which belongs to the cache kmalloc-64 of size 64 [ 21.078245] The buggy address is located 0 bytes to the right of [ 21.078245] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.078335] [ 21.078373] The buggy address belongs to the physical page: [ 21.078407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.078598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.078679] page_type: f5(slab) [ 21.078730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.078783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.078885] page dumped because: kasan: bad access detected [ 21.078957] [ 21.079055] Memory state around the buggy address: [ 21.079112] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.079188] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.079560] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.079628] ^ [ 21.079667] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.079732] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.079827] ================================================================== [ 21.143113] ================================================================== [ 21.143427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 21.143601] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.143655] [ 21.143700] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.143790] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.143822] Hardware name: linux,dummy-virt (DT) [ 21.143858] Call trace: [ 21.143885] show_stack+0x20/0x38 (C) [ 21.143936] dump_stack_lvl+0x8c/0xd0 [ 21.143990] print_report+0x118/0x608 [ 21.144038] kasan_report+0xdc/0x128 [ 21.144101] kasan_check_range+0x100/0x1a8 [ 21.144174] __kasan_check_write+0x20/0x30 [ 21.144228] kasan_atomics_helper+0x147c/0x4858 [ 21.144280] kasan_atomics+0x198/0x2e0 [ 21.144327] kunit_try_run_case+0x170/0x3f0 [ 21.144395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.144453] kthread+0x328/0x630 [ 21.144513] ret_from_fork+0x10/0x20 [ 21.144580] [ 21.144606] Allocated by task 268: [ 21.144639] kasan_save_stack+0x3c/0x68 [ 21.144681] kasan_save_track+0x20/0x40 [ 21.144722] kasan_save_alloc_info+0x40/0x58 [ 21.144774] __kasan_kmalloc+0xd4/0xd8 [ 21.144822] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.144869] kasan_atomics+0xb8/0x2e0 [ 21.144907] kunit_try_run_case+0x170/0x3f0 [ 21.144950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.145006] kthread+0x328/0x630 [ 21.145045] ret_from_fork+0x10/0x20 [ 21.145085] [ 21.145115] The buggy address belongs to the object at fff00000c3f85080 [ 21.145115] which belongs to the cache kmalloc-64 of size 64 [ 21.145174] The buggy address is located 0 bytes to the right of [ 21.145174] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.145257] [ 21.145281] The buggy address belongs to the physical page: [ 21.145315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.146376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.146439] page_type: f5(slab) [ 21.146490] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.146657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.146942] page dumped because: kasan: bad access detected [ 21.147303] [ 21.147370] Memory state around the buggy address: [ 21.147423] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.147470] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.147843] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.147915] ^ [ 21.147963] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.148020] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.148060] ================================================================== [ 21.134715] ================================================================== [ 21.134772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 21.134834] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.134889] [ 21.135114] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.135384] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.135429] Hardware name: linux,dummy-virt (DT) [ 21.135465] Call trace: [ 21.135695] show_stack+0x20/0x38 (C) [ 21.135768] dump_stack_lvl+0x8c/0xd0 [ 21.135926] print_report+0x118/0x608 [ 21.135988] kasan_report+0xdc/0x128 [ 21.136035] kasan_check_range+0x100/0x1a8 [ 21.136088] __kasan_check_write+0x20/0x30 [ 21.136141] kasan_atomics_helper+0x1414/0x4858 [ 21.136193] kasan_atomics+0x198/0x2e0 [ 21.136241] kunit_try_run_case+0x170/0x3f0 [ 21.136293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.136855] kthread+0x328/0x630 [ 21.136934] ret_from_fork+0x10/0x20 [ 21.137056] [ 21.137097] Allocated by task 268: [ 21.137134] kasan_save_stack+0x3c/0x68 [ 21.137190] kasan_save_track+0x20/0x40 [ 21.137314] kasan_save_alloc_info+0x40/0x58 [ 21.137401] __kasan_kmalloc+0xd4/0xd8 [ 21.137445] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.137908] kasan_atomics+0xb8/0x2e0 [ 21.137985] kunit_try_run_case+0x170/0x3f0 [ 21.138061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.138385] kthread+0x328/0x630 [ 21.138441] ret_from_fork+0x10/0x20 [ 21.138678] [ 21.139053] The buggy address belongs to the object at fff00000c3f85080 [ 21.139053] which belongs to the cache kmalloc-64 of size 64 [ 21.139164] The buggy address is located 0 bytes to the right of [ 21.139164] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.139444] [ 21.139490] The buggy address belongs to the physical page: [ 21.139526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.139900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.140320] page_type: f5(slab) [ 21.140471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.140529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.140574] page dumped because: kasan: bad access detected [ 21.140868] [ 21.141369] Memory state around the buggy address: [ 21.141449] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.141618] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.141686] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.142016] ^ [ 21.142147] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.142297] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.142421] ================================================================== [ 21.112582] ================================================================== [ 21.112657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 21.112721] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.112833] [ 21.112868] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.113076] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.113120] Hardware name: linux,dummy-virt (DT) [ 21.113261] Call trace: [ 21.113301] show_stack+0x20/0x38 (C) [ 21.113375] dump_stack_lvl+0x8c/0xd0 [ 21.113582] print_report+0x118/0x608 [ 21.113672] kasan_report+0xdc/0x128 [ 21.113755] kasan_check_range+0x100/0x1a8 [ 21.113854] __kasan_check_write+0x20/0x30 [ 21.113944] kasan_atomics_helper+0x126c/0x4858 [ 21.114072] kasan_atomics+0x198/0x2e0 [ 21.114151] kunit_try_run_case+0x170/0x3f0 [ 21.114258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.114345] kthread+0x328/0x630 [ 21.114429] ret_from_fork+0x10/0x20 [ 21.114629] [ 21.114653] Allocated by task 268: [ 21.114684] kasan_save_stack+0x3c/0x68 [ 21.114755] kasan_save_track+0x20/0x40 [ 21.114854] kasan_save_alloc_info+0x40/0x58 [ 21.114954] __kasan_kmalloc+0xd4/0xd8 [ 21.115075] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.115280] kasan_atomics+0xb8/0x2e0 [ 21.115336] kunit_try_run_case+0x170/0x3f0 [ 21.115437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.115530] kthread+0x328/0x630 [ 21.115600] ret_from_fork+0x10/0x20 [ 21.115668] [ 21.115805] The buggy address belongs to the object at fff00000c3f85080 [ 21.115805] which belongs to the cache kmalloc-64 of size 64 [ 21.115869] The buggy address is located 0 bytes to the right of [ 21.115869] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.116078] [ 21.116107] The buggy address belongs to the physical page: [ 21.116141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.116232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.116364] page_type: f5(slab) [ 21.116428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.116612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.116686] page dumped because: kasan: bad access detected [ 21.116723] [ 21.116769] Memory state around the buggy address: [ 21.116819] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.116865] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.116909] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.117124] ^ [ 21.117224] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.117299] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.117362] ================================================================== [ 21.168232] ================================================================== [ 21.168293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 21.168361] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.168415] [ 21.168450] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.168539] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.168963] Hardware name: linux,dummy-virt (DT) [ 21.169097] Call trace: [ 21.169221] show_stack+0x20/0x38 (C) [ 21.169282] dump_stack_lvl+0x8c/0xd0 [ 21.169338] print_report+0x118/0x608 [ 21.169487] kasan_report+0xdc/0x128 [ 21.169598] kasan_check_range+0x100/0x1a8 [ 21.169698] __kasan_check_write+0x20/0x30 [ 21.169752] kasan_atomics_helper+0x15b4/0x4858 [ 21.169805] kasan_atomics+0x198/0x2e0 [ 21.169851] kunit_try_run_case+0x170/0x3f0 [ 21.170150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.170578] kthread+0x328/0x630 [ 21.170664] ret_from_fork+0x10/0x20 [ 21.170827] [ 21.170878] Allocated by task 268: [ 21.170935] kasan_save_stack+0x3c/0x68 [ 21.171068] kasan_save_track+0x20/0x40 [ 21.171139] kasan_save_alloc_info+0x40/0x58 [ 21.171202] __kasan_kmalloc+0xd4/0xd8 [ 21.171243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.171896] kasan_atomics+0xb8/0x2e0 [ 21.171998] kunit_try_run_case+0x170/0x3f0 [ 21.172053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.173608] kthread+0x328/0x630 [ 21.173670] ret_from_fork+0x10/0x20 [ 21.173713] [ 21.173737] The buggy address belongs to the object at fff00000c3f85080 [ 21.173737] which belongs to the cache kmalloc-64 of size 64 [ 21.174391] The buggy address is located 0 bytes to the right of [ 21.174391] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.174473] [ 21.174499] The buggy address belongs to the physical page: [ 21.174534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.174592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.174646] page_type: f5(slab) [ 21.174690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.174743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.174787] page dumped because: kasan: bad access detected [ 21.174822] [ 21.174842] Memory state around the buggy address: [ 21.174878] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.174922] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.174969] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.175014] ^ [ 21.175050] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.175095] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.175134] ================================================================== [ 21.061162] ================================================================== [ 21.061223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.061280] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.061365] [ 21.061406] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.061605] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.061970] Hardware name: linux,dummy-virt (DT) [ 21.062040] Call trace: [ 21.062080] show_stack+0x20/0x38 (C) [ 21.062144] dump_stack_lvl+0x8c/0xd0 [ 21.062221] print_report+0x118/0x608 [ 21.062270] kasan_report+0xdc/0x128 [ 21.062520] kasan_check_range+0x100/0x1a8 [ 21.062592] __kasan_check_write+0x20/0x30 [ 21.062843] kasan_atomics_helper+0xf88/0x4858 [ 21.062960] kasan_atomics+0x198/0x2e0 [ 21.063059] kunit_try_run_case+0x170/0x3f0 [ 21.063277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.063395] kthread+0x328/0x630 [ 21.063748] ret_from_fork+0x10/0x20 [ 21.064007] [ 21.064076] Allocated by task 268: [ 21.064116] kasan_save_stack+0x3c/0x68 [ 21.064165] kasan_save_track+0x20/0x40 [ 21.064362] kasan_save_alloc_info+0x40/0x58 [ 21.064467] __kasan_kmalloc+0xd4/0xd8 [ 21.064643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.064823] kasan_atomics+0xb8/0x2e0 [ 21.064982] kunit_try_run_case+0x170/0x3f0 [ 21.065079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.065193] kthread+0x328/0x630 [ 21.065238] ret_from_fork+0x10/0x20 [ 21.065435] [ 21.065529] The buggy address belongs to the object at fff00000c3f85080 [ 21.065529] which belongs to the cache kmalloc-64 of size 64 [ 21.065700] The buggy address is located 0 bytes to the right of [ 21.065700] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.066019] [ 21.066091] The buggy address belongs to the physical page: [ 21.066146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.066214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.066277] page_type: f5(slab) [ 21.066484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.066636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.066695] page dumped because: kasan: bad access detected [ 21.066774] [ 21.066835] Memory state around the buggy address: [ 21.067006] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.067124] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.067178] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.067219] ^ [ 21.067257] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.067423] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.067496] ==================================================================
[ 19.935853] ================================================================== [ 19.936500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 19.937008] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 19.937405] [ 19.937675] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.937783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.937808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.937848] Call Trace: [ 19.937887] <TASK> [ 19.937925] dump_stack_lvl+0x73/0xb0 [ 19.937983] print_report+0xd1/0x650 [ 19.938022] ? __virt_addr_valid+0x1db/0x2d0 [ 19.938062] ? kasan_atomics_helper+0x4b3a/0x5450 [ 19.938100] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.938135] ? kasan_atomics_helper+0x4b3a/0x5450 [ 19.938172] kasan_report+0x141/0x180 [ 19.938208] ? kasan_atomics_helper+0x4b3a/0x5450 [ 19.938252] __asan_report_store4_noabort+0x1b/0x30 [ 19.938291] kasan_atomics_helper+0x4b3a/0x5450 [ 19.938337] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.938378] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.938415] ? trace_hardirqs_on+0x37/0xe0 [ 19.938451] ? kasan_atomics+0x152/0x310 [ 19.938488] kasan_atomics+0x1dc/0x310 [ 19.938521] ? __pfx_kasan_atomics+0x10/0x10 [ 19.938555] ? __pfx_kasan_atomics+0x10/0x10 [ 19.938593] kunit_try_run_case+0x1a5/0x480 [ 19.938635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.938672] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.938713] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.938804] ? __kthread_parkme+0x82/0x180 [ 19.938853] ? preempt_count_sub+0x50/0x80 [ 19.938904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.938956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.939030] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.939081] kthread+0x337/0x6f0 [ 19.939141] ? trace_preempt_on+0x20/0xc0 [ 19.939197] ? __pfx_kthread+0x10/0x10 [ 19.939249] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.939288] ? calculate_sigpending+0x7b/0xa0 [ 19.939334] ? __pfx_kthread+0x10/0x10 [ 19.939375] ret_from_fork+0x41/0x80 [ 19.939428] ? __pfx_kthread+0x10/0x10 [ 19.939476] ret_from_fork_asm+0x1a/0x30 [ 19.939555] </TASK> [ 19.939589] [ 19.953507] Allocated by task 286: [ 19.953814] kasan_save_stack+0x45/0x70 [ 19.954132] kasan_save_track+0x18/0x40 [ 19.954451] kasan_save_alloc_info+0x3b/0x50 [ 19.958147] __kasan_kmalloc+0xb7/0xc0 [ 19.959064] __kmalloc_cache_noprof+0x189/0x420 [ 19.960389] kasan_atomics+0x95/0x310 [ 19.961879] kunit_try_run_case+0x1a5/0x480 [ 19.963066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.963488] kthread+0x337/0x6f0 [ 19.963777] ret_from_fork+0x41/0x80 [ 19.964039] ret_from_fork_asm+0x1a/0x30 [ 19.964346] [ 19.964815] The buggy address belongs to the object at ffff888101e04b00 [ 19.964815] which belongs to the cache kmalloc-64 of size 64 [ 19.965770] The buggy address is located 0 bytes to the right of [ 19.965770] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 19.966675] [ 19.966857] The buggy address belongs to the physical page: [ 19.967095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 19.967677] flags: 0x200000000000000(node=0|zone=2) [ 19.968248] page_type: f5(slab) [ 19.968610] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.969072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.969617] page dumped because: kasan: bad access detected [ 19.969881] [ 19.970109] Memory state around the buggy address: [ 19.970610] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.971322] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.971798] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.972326] ^ [ 19.972570] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.973091] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.973665] ================================================================== [ 20.209804] ================================================================== [ 20.210615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 20.211384] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.211738] [ 20.211932] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.212056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.212091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.212136] Call Trace: [ 20.212188] <TASK> [ 20.212231] dump_stack_lvl+0x73/0xb0 [ 20.212307] print_report+0xd1/0x650 [ 20.212354] ? __virt_addr_valid+0x1db/0x2d0 [ 20.212405] ? kasan_atomics_helper+0x992/0x5450 [ 20.212447] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.212489] ? kasan_atomics_helper+0x992/0x5450 [ 20.212526] kasan_report+0x141/0x180 [ 20.212573] ? kasan_atomics_helper+0x992/0x5450 [ 20.212630] kasan_check_range+0x10c/0x1c0 [ 20.212669] __kasan_check_write+0x18/0x20 [ 20.212705] kasan_atomics_helper+0x992/0x5450 [ 20.212767] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.212819] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.212864] ? trace_hardirqs_on+0x37/0xe0 [ 20.212904] ? kasan_atomics+0x152/0x310 [ 20.213801] kasan_atomics+0x1dc/0x310 [ 20.213859] ? __pfx_kasan_atomics+0x10/0x10 [ 20.213904] ? __pfx_kasan_atomics+0x10/0x10 [ 20.213957] kunit_try_run_case+0x1a5/0x480 [ 20.214009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.214051] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.214142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.214192] ? __kthread_parkme+0x82/0x180 [ 20.214239] ? preempt_count_sub+0x50/0x80 [ 20.214292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.214341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.214386] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.214427] kthread+0x337/0x6f0 [ 20.214460] ? trace_preempt_on+0x20/0xc0 [ 20.214500] ? __pfx_kthread+0x10/0x10 [ 20.214534] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.214573] ? calculate_sigpending+0x7b/0xa0 [ 20.214617] ? __pfx_kthread+0x10/0x10 [ 20.214656] ret_from_fork+0x41/0x80 [ 20.214703] ? __pfx_kthread+0x10/0x10 [ 20.214743] ret_from_fork_asm+0x1a/0x30 [ 20.214823] </TASK> [ 20.214849] [ 20.230135] Allocated by task 286: [ 20.230668] kasan_save_stack+0x45/0x70 [ 20.231165] kasan_save_track+0x18/0x40 [ 20.231564] kasan_save_alloc_info+0x3b/0x50 [ 20.231947] __kasan_kmalloc+0xb7/0xc0 [ 20.232364] __kmalloc_cache_noprof+0x189/0x420 [ 20.232814] kasan_atomics+0x95/0x310 [ 20.233074] kunit_try_run_case+0x1a5/0x480 [ 20.233585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.234170] kthread+0x337/0x6f0 [ 20.234546] ret_from_fork+0x41/0x80 [ 20.234948] ret_from_fork_asm+0x1a/0x30 [ 20.235203] [ 20.235432] The buggy address belongs to the object at ffff888101e04b00 [ 20.235432] which belongs to the cache kmalloc-64 of size 64 [ 20.236281] The buggy address is located 0 bytes to the right of [ 20.236281] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.237166] [ 20.237399] The buggy address belongs to the physical page: [ 20.237695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.238391] flags: 0x200000000000000(node=0|zone=2) [ 20.238798] page_type: f5(slab) [ 20.239209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.239735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.240320] page dumped because: kasan: bad access detected [ 20.240710] [ 20.240928] Memory state around the buggy address: [ 20.241307] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.241842] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.242518] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.242879] ^ [ 20.243384] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.243810] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.244401] ================================================================== [ 21.068940] ================================================================== [ 21.069592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 21.070260] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.070927] [ 21.071174] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.071311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.071337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.071377] Call Trace: [ 21.071415] <TASK> [ 21.071453] dump_stack_lvl+0x73/0xb0 [ 21.071515] print_report+0xd1/0x650 [ 21.071559] ? __virt_addr_valid+0x1db/0x2d0 [ 21.071599] ? kasan_atomics_helper+0x164f/0x5450 [ 21.071648] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.071685] ? kasan_atomics_helper+0x164f/0x5450 [ 21.071720] kasan_report+0x141/0x180 [ 21.071772] ? kasan_atomics_helper+0x164f/0x5450 [ 21.071818] kasan_check_range+0x10c/0x1c0 [ 21.071854] __kasan_check_write+0x18/0x20 [ 21.071887] kasan_atomics_helper+0x164f/0x5450 [ 21.071926] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.071963] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.071999] ? trace_hardirqs_on+0x37/0xe0 [ 21.072039] ? kasan_atomics+0x152/0x310 [ 21.072088] kasan_atomics+0x1dc/0x310 [ 21.072156] ? __pfx_kasan_atomics+0x10/0x10 [ 21.072215] ? __pfx_kasan_atomics+0x10/0x10 [ 21.072268] kunit_try_run_case+0x1a5/0x480 [ 21.072324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.072401] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.072471] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.072528] ? __kthread_parkme+0x82/0x180 [ 21.072579] ? preempt_count_sub+0x50/0x80 [ 21.072642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.072722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.072801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.072849] kthread+0x337/0x6f0 [ 21.072894] ? trace_preempt_on+0x20/0xc0 [ 21.072948] ? __pfx_kthread+0x10/0x10 [ 21.072995] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.073047] ? calculate_sigpending+0x7b/0xa0 [ 21.073102] ? __pfx_kthread+0x10/0x10 [ 21.073190] ret_from_fork+0x41/0x80 [ 21.073236] ? __pfx_kthread+0x10/0x10 [ 21.073277] ret_from_fork_asm+0x1a/0x30 [ 21.073381] </TASK> [ 21.073417] [ 21.085390] Allocated by task 286: [ 21.085828] kasan_save_stack+0x45/0x70 [ 21.086281] kasan_save_track+0x18/0x40 [ 21.086645] kasan_save_alloc_info+0x3b/0x50 [ 21.087068] __kasan_kmalloc+0xb7/0xc0 [ 21.087465] __kmalloc_cache_noprof+0x189/0x420 [ 21.087939] kasan_atomics+0x95/0x310 [ 21.088352] kunit_try_run_case+0x1a5/0x480 [ 21.088780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.089262] kthread+0x337/0x6f0 [ 21.089603] ret_from_fork+0x41/0x80 [ 21.089904] ret_from_fork_asm+0x1a/0x30 [ 21.090185] [ 21.090407] The buggy address belongs to the object at ffff888101e04b00 [ 21.090407] which belongs to the cache kmalloc-64 of size 64 [ 21.091319] The buggy address is located 0 bytes to the right of [ 21.091319] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.092052] [ 21.092341] The buggy address belongs to the physical page: [ 21.092759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.093440] flags: 0x200000000000000(node=0|zone=2) [ 21.093896] page_type: f5(slab) [ 21.094247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.094762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.095066] page dumped because: kasan: bad access detected [ 21.095691] [ 21.095947] Memory state around the buggy address: [ 21.096406] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.096851] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.097155] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.097711] ^ [ 21.098252] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.098845] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.099342] ================================================================== [ 21.129965] ================================================================== [ 21.130798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 21.131217] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.132021] [ 21.132283] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.132396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.132418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.132456] Call Trace: [ 21.132494] <TASK> [ 21.132532] dump_stack_lvl+0x73/0xb0 [ 21.132589] print_report+0xd1/0x650 [ 21.132627] ? __virt_addr_valid+0x1db/0x2d0 [ 21.132666] ? kasan_atomics_helper+0x177f/0x5450 [ 21.132701] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.132742] ? kasan_atomics_helper+0x177f/0x5450 [ 21.132815] kasan_report+0x141/0x180 [ 21.132861] ? kasan_atomics_helper+0x177f/0x5450 [ 21.132941] kasan_check_range+0x10c/0x1c0 [ 21.132988] __kasan_check_write+0x18/0x20 [ 21.133032] kasan_atomics_helper+0x177f/0x5450 [ 21.133088] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.133184] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.133252] ? trace_hardirqs_on+0x37/0xe0 [ 21.133303] ? kasan_atomics+0x152/0x310 [ 21.133368] kasan_atomics+0x1dc/0x310 [ 21.133418] ? __pfx_kasan_atomics+0x10/0x10 [ 21.133484] ? __pfx_kasan_atomics+0x10/0x10 [ 21.133542] kunit_try_run_case+0x1a5/0x480 [ 21.133611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.133663] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.133736] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.133800] ? __kthread_parkme+0x82/0x180 [ 21.133861] ? preempt_count_sub+0x50/0x80 [ 21.133936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.133993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.134042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.134092] kthread+0x337/0x6f0 [ 21.134177] ? trace_preempt_on+0x20/0xc0 [ 21.134249] ? __pfx_kthread+0x10/0x10 [ 21.134294] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.134345] ? calculate_sigpending+0x7b/0xa0 [ 21.134402] ? __pfx_kthread+0x10/0x10 [ 21.134465] ret_from_fork+0x41/0x80 [ 21.134522] ? __pfx_kthread+0x10/0x10 [ 21.134566] ret_from_fork_asm+0x1a/0x30 [ 21.134647] </TASK> [ 21.134685] [ 21.145453] Allocated by task 286: [ 21.145876] kasan_save_stack+0x45/0x70 [ 21.146221] kasan_save_track+0x18/0x40 [ 21.146558] kasan_save_alloc_info+0x3b/0x50 [ 21.146972] __kasan_kmalloc+0xb7/0xc0 [ 21.147333] __kmalloc_cache_noprof+0x189/0x420 [ 21.147610] kasan_atomics+0x95/0x310 [ 21.147990] kunit_try_run_case+0x1a5/0x480 [ 21.148413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.148763] kthread+0x337/0x6f0 [ 21.149135] ret_from_fork+0x41/0x80 [ 21.149425] ret_from_fork_asm+0x1a/0x30 [ 21.149807] [ 21.149970] The buggy address belongs to the object at ffff888101e04b00 [ 21.149970] which belongs to the cache kmalloc-64 of size 64 [ 21.150791] The buggy address is located 0 bytes to the right of [ 21.150791] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.151567] [ 21.151812] The buggy address belongs to the physical page: [ 21.152169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.152664] flags: 0x200000000000000(node=0|zone=2) [ 21.152929] page_type: f5(slab) [ 21.153164] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.153478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.153782] page dumped because: kasan: bad access detected [ 21.154260] [ 21.154461] Memory state around the buggy address: [ 21.154892] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.155498] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.156035] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.156607] ^ [ 21.157066] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.157642] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.159167] ================================================================== [ 21.222811] ================================================================== [ 21.223169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 21.224496] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.225254] [ 21.225556] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.225723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.225770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.225824] Call Trace: [ 21.225870] <TASK> [ 21.225917] dump_stack_lvl+0x73/0xb0 [ 21.226006] print_report+0xd1/0x650 [ 21.226062] ? __virt_addr_valid+0x1db/0x2d0 [ 21.226158] ? kasan_atomics_helper+0x194a/0x5450 [ 21.226199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.226226] ? kasan_atomics_helper+0x194a/0x5450 [ 21.226252] kasan_report+0x141/0x180 [ 21.226280] ? kasan_atomics_helper+0x194a/0x5450 [ 21.226310] kasan_check_range+0x10c/0x1c0 [ 21.226335] __kasan_check_write+0x18/0x20 [ 21.226359] kasan_atomics_helper+0x194a/0x5450 [ 21.226385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.226411] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.226436] ? trace_hardirqs_on+0x37/0xe0 [ 21.226462] ? kasan_atomics+0x152/0x310 [ 21.226489] kasan_atomics+0x1dc/0x310 [ 21.226511] ? __pfx_kasan_atomics+0x10/0x10 [ 21.226535] ? __pfx_kasan_atomics+0x10/0x10 [ 21.226562] kunit_try_run_case+0x1a5/0x480 [ 21.226590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.226615] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.226643] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.226668] ? __kthread_parkme+0x82/0x180 [ 21.226694] ? preempt_count_sub+0x50/0x80 [ 21.226723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.226771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.226804] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.226830] kthread+0x337/0x6f0 [ 21.226850] ? trace_preempt_on+0x20/0xc0 [ 21.226876] ? __pfx_kthread+0x10/0x10 [ 21.226898] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.226922] ? calculate_sigpending+0x7b/0xa0 [ 21.226948] ? __pfx_kthread+0x10/0x10 [ 21.226972] ret_from_fork+0x41/0x80 [ 21.226998] ? __pfx_kthread+0x10/0x10 [ 21.227021] ret_from_fork_asm+0x1a/0x30 [ 21.227057] </TASK> [ 21.227073] [ 21.239609] Allocated by task 286: [ 21.239981] kasan_save_stack+0x45/0x70 [ 21.240442] kasan_save_track+0x18/0x40 [ 21.240823] kasan_save_alloc_info+0x3b/0x50 [ 21.241235] __kasan_kmalloc+0xb7/0xc0 [ 21.241597] __kmalloc_cache_noprof+0x189/0x420 [ 21.242021] kasan_atomics+0x95/0x310 [ 21.242384] kunit_try_run_case+0x1a5/0x480 [ 21.242786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.243223] kthread+0x337/0x6f0 [ 21.243548] ret_from_fork+0x41/0x80 [ 21.243782] ret_from_fork_asm+0x1a/0x30 [ 21.244004] [ 21.244170] The buggy address belongs to the object at ffff888101e04b00 [ 21.244170] which belongs to the cache kmalloc-64 of size 64 [ 21.244667] The buggy address is located 0 bytes to the right of [ 21.244667] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.245679] [ 21.245890] The buggy address belongs to the physical page: [ 21.246377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.247009] flags: 0x200000000000000(node=0|zone=2) [ 21.247295] page_type: f5(slab) [ 21.247507] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.247867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.248473] page dumped because: kasan: bad access detected [ 21.248934] [ 21.249153] Memory state around the buggy address: [ 21.249598] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.249935] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.250257] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.250547] ^ [ 21.250785] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.251359] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.251946] ================================================================== [ 21.831703] ================================================================== [ 21.832116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 21.834243] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.834854] [ 21.835138] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.835546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.835575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.835615] Call Trace: [ 21.835669] <TASK> [ 21.835710] dump_stack_lvl+0x73/0xb0 [ 21.835808] print_report+0xd1/0x650 [ 21.835851] ? __virt_addr_valid+0x1db/0x2d0 [ 21.835892] ? kasan_atomics_helper+0x5115/0x5450 [ 21.835927] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.835962] ? kasan_atomics_helper+0x5115/0x5450 [ 21.835997] kasan_report+0x141/0x180 [ 21.836035] ? kasan_atomics_helper+0x5115/0x5450 [ 21.836079] __asan_report_load8_noabort+0x18/0x20 [ 21.836116] kasan_atomics_helper+0x5115/0x5450 [ 21.836155] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.836196] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.836236] ? trace_hardirqs_on+0x37/0xe0 [ 21.836277] ? kasan_atomics+0x152/0x310 [ 21.836312] kasan_atomics+0x1dc/0x310 [ 21.836335] ? __pfx_kasan_atomics+0x10/0x10 [ 21.836359] ? __pfx_kasan_atomics+0x10/0x10 [ 21.836386] kunit_try_run_case+0x1a5/0x480 [ 21.836416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.836441] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.836469] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.836496] ? __kthread_parkme+0x82/0x180 [ 21.836521] ? preempt_count_sub+0x50/0x80 [ 21.836551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.836577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.836603] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.836632] kthread+0x337/0x6f0 [ 21.836652] ? trace_preempt_on+0x20/0xc0 [ 21.836678] ? __pfx_kthread+0x10/0x10 [ 21.836699] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.836723] ? calculate_sigpending+0x7b/0xa0 [ 21.836775] ? __pfx_kthread+0x10/0x10 [ 21.836802] ret_from_fork+0x41/0x80 [ 21.836829] ? __pfx_kthread+0x10/0x10 [ 21.836850] ret_from_fork_asm+0x1a/0x30 [ 21.836886] </TASK> [ 21.836903] [ 21.848204] Allocated by task 286: [ 21.848679] kasan_save_stack+0x45/0x70 [ 21.849227] kasan_save_track+0x18/0x40 [ 21.849623] kasan_save_alloc_info+0x3b/0x50 [ 21.850046] __kasan_kmalloc+0xb7/0xc0 [ 21.850478] __kmalloc_cache_noprof+0x189/0x420 [ 21.850923] kasan_atomics+0x95/0x310 [ 21.851352] kunit_try_run_case+0x1a5/0x480 [ 21.851701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.852199] kthread+0x337/0x6f0 [ 21.852576] ret_from_fork+0x41/0x80 [ 21.852856] ret_from_fork_asm+0x1a/0x30 [ 21.853288] [ 21.853498] The buggy address belongs to the object at ffff888101e04b00 [ 21.853498] which belongs to the cache kmalloc-64 of size 64 [ 21.854344] The buggy address is located 0 bytes to the right of [ 21.854344] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.855064] [ 21.855330] The buggy address belongs to the physical page: [ 21.855695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.856383] flags: 0x200000000000000(node=0|zone=2) [ 21.856827] page_type: f5(slab) [ 21.857224] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.857755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.858324] page dumped because: kasan: bad access detected [ 21.858680] [ 21.858886] Memory state around the buggy address: [ 21.859180] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.859829] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.860478] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.860949] ^ [ 21.861372] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.861829] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.862430] ================================================================== [ 19.845945] ================================================================== [ 19.846651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 19.847198] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 19.847644] [ 19.847893] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.848045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.848094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.848171] Call Trace: [ 19.848217] <TASK> [ 19.848266] dump_stack_lvl+0x73/0xb0 [ 19.848370] print_report+0xd1/0x650 [ 19.848421] ? __virt_addr_valid+0x1db/0x2d0 [ 19.848479] ? kasan_atomics_helper+0x3df/0x5450 [ 19.848527] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.848578] ? kasan_atomics_helper+0x3df/0x5450 [ 19.848626] kasan_report+0x141/0x180 [ 19.848678] ? kasan_atomics_helper+0x3df/0x5450 [ 19.848733] kasan_check_range+0x10c/0x1c0 [ 19.848793] __kasan_check_read+0x15/0x20 [ 19.848840] kasan_atomics_helper+0x3df/0x5450 [ 19.848913] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.848964] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.849018] ? trace_hardirqs_on+0x37/0xe0 [ 19.849072] ? kasan_atomics+0x152/0x310 [ 19.849166] kasan_atomics+0x1dc/0x310 [ 19.849214] ? __pfx_kasan_atomics+0x10/0x10 [ 19.849262] ? __pfx_kasan_atomics+0x10/0x10 [ 19.849336] kunit_try_run_case+0x1a5/0x480 [ 19.849390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.849434] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.849491] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.849540] ? __kthread_parkme+0x82/0x180 [ 19.849573] ? preempt_count_sub+0x50/0x80 [ 19.849604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.849632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.849658] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.849684] kthread+0x337/0x6f0 [ 19.849705] ? trace_preempt_on+0x20/0xc0 [ 19.849731] ? __pfx_kthread+0x10/0x10 [ 19.849778] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.849809] ? calculate_sigpending+0x7b/0xa0 [ 19.849890] ? __pfx_kthread+0x10/0x10 [ 19.849915] ret_from_fork+0x41/0x80 [ 19.849943] ? __pfx_kthread+0x10/0x10 [ 19.849964] ret_from_fork_asm+0x1a/0x30 [ 19.850002] </TASK> [ 19.850019] [ 19.860968] Allocated by task 286: [ 19.861392] kasan_save_stack+0x45/0x70 [ 19.861739] kasan_save_track+0x18/0x40 [ 19.862116] kasan_save_alloc_info+0x3b/0x50 [ 19.862413] __kasan_kmalloc+0xb7/0xc0 [ 19.862721] __kmalloc_cache_noprof+0x189/0x420 [ 19.863158] kasan_atomics+0x95/0x310 [ 19.863509] kunit_try_run_case+0x1a5/0x480 [ 19.863901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.864274] kthread+0x337/0x6f0 [ 19.864598] ret_from_fork+0x41/0x80 [ 19.864887] ret_from_fork_asm+0x1a/0x30 [ 19.865257] [ 19.865465] The buggy address belongs to the object at ffff888101e04b00 [ 19.865465] which belongs to the cache kmalloc-64 of size 64 [ 19.866150] The buggy address is located 0 bytes to the right of [ 19.866150] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 19.866671] [ 19.866854] The buggy address belongs to the physical page: [ 19.867337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 19.867974] flags: 0x200000000000000(node=0|zone=2) [ 19.868419] page_type: f5(slab) [ 19.868766] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.869392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.869907] page dumped because: kasan: bad access detected [ 19.870257] [ 19.870453] Memory state around the buggy address: [ 19.870782] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.871337] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.871865] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.872339] ^ [ 19.872688] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.873159] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.873608] ================================================================== [ 20.896035] ================================================================== [ 20.896440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 20.897153] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.897578] [ 20.897773] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.897891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.897934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.897981] Call Trace: [ 20.898044] <TASK> [ 20.898093] dump_stack_lvl+0x73/0xb0 [ 20.898171] print_report+0xd1/0x650 [ 20.898229] ? __virt_addr_valid+0x1db/0x2d0 [ 20.898287] ? kasan_atomics_helper+0x4eae/0x5450 [ 20.898353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.898403] ? kasan_atomics_helper+0x4eae/0x5450 [ 20.898453] kasan_report+0x141/0x180 [ 20.898502] ? kasan_atomics_helper+0x4eae/0x5450 [ 20.898575] __asan_report_load8_noabort+0x18/0x20 [ 20.898644] kasan_atomics_helper+0x4eae/0x5450 [ 20.898698] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.898766] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.898824] ? trace_hardirqs_on+0x37/0xe0 [ 20.898892] ? kasan_atomics+0x152/0x310 [ 20.898948] kasan_atomics+0x1dc/0x310 [ 20.898981] ? __pfx_kasan_atomics+0x10/0x10 [ 20.899006] ? __pfx_kasan_atomics+0x10/0x10 [ 20.899033] kunit_try_run_case+0x1a5/0x480 [ 20.899064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.899093] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.899138] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.899182] ? __kthread_parkme+0x82/0x180 [ 20.899231] ? preempt_count_sub+0x50/0x80 [ 20.899286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.899350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.899421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.899470] kthread+0x337/0x6f0 [ 20.899511] ? trace_preempt_on+0x20/0xc0 [ 20.899562] ? __pfx_kthread+0x10/0x10 [ 20.899619] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.899699] ? calculate_sigpending+0x7b/0xa0 [ 20.899758] ? __pfx_kthread+0x10/0x10 [ 20.899803] ret_from_fork+0x41/0x80 [ 20.899836] ? __pfx_kthread+0x10/0x10 [ 20.899859] ret_from_fork_asm+0x1a/0x30 [ 20.899914] </TASK> [ 20.899933] [ 20.913339] Allocated by task 286: [ 20.913853] kasan_save_stack+0x45/0x70 [ 20.914346] kasan_save_track+0x18/0x40 [ 20.914701] kasan_save_alloc_info+0x3b/0x50 [ 20.915200] __kasan_kmalloc+0xb7/0xc0 [ 20.915558] __kmalloc_cache_noprof+0x189/0x420 [ 20.916071] kasan_atomics+0x95/0x310 [ 20.916491] kunit_try_run_case+0x1a5/0x480 [ 20.916993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.917419] kthread+0x337/0x6f0 [ 20.917803] ret_from_fork+0x41/0x80 [ 20.918144] ret_from_fork_asm+0x1a/0x30 [ 20.918476] [ 20.918729] The buggy address belongs to the object at ffff888101e04b00 [ 20.918729] which belongs to the cache kmalloc-64 of size 64 [ 20.919600] The buggy address is located 0 bytes to the right of [ 20.919600] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.920653] [ 20.920898] The buggy address belongs to the physical page: [ 20.921381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.922033] flags: 0x200000000000000(node=0|zone=2) [ 20.922440] page_type: f5(slab) [ 20.922822] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.923349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.924034] page dumped because: kasan: bad access detected [ 20.924518] [ 20.924872] Memory state around the buggy address: [ 20.925133] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.925862] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.926380] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.926836] ^ [ 20.927407] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.927813] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.928448] ================================================================== [ 20.176117] ================================================================== [ 20.176854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 20.177235] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.177935] [ 20.178124] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.178230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.178262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.178311] Call Trace: [ 20.178358] <TASK> [ 20.178396] dump_stack_lvl+0x73/0xb0 [ 20.178458] print_report+0xd1/0x650 [ 20.178501] ? __virt_addr_valid+0x1db/0x2d0 [ 20.178540] ? kasan_atomics_helper+0x8f9/0x5450 [ 20.178575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.178613] ? kasan_atomics_helper+0x8f9/0x5450 [ 20.178648] kasan_report+0x141/0x180 [ 20.178685] ? kasan_atomics_helper+0x8f9/0x5450 [ 20.178731] kasan_check_range+0x10c/0x1c0 [ 20.178784] __kasan_check_write+0x18/0x20 [ 20.178823] kasan_atomics_helper+0x8f9/0x5450 [ 20.178861] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.178897] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.178934] ? trace_hardirqs_on+0x37/0xe0 [ 20.178971] ? kasan_atomics+0x152/0x310 [ 20.179017] kasan_atomics+0x1dc/0x310 [ 20.179060] ? __pfx_kasan_atomics+0x10/0x10 [ 20.179105] ? __pfx_kasan_atomics+0x10/0x10 [ 20.179587] kunit_try_run_case+0x1a5/0x480 [ 20.179677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.179729] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.179788] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.179817] ? __kthread_parkme+0x82/0x180 [ 20.179844] ? preempt_count_sub+0x50/0x80 [ 20.179875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.179902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.179928] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.179954] kthread+0x337/0x6f0 [ 20.179976] ? trace_preempt_on+0x20/0xc0 [ 20.180002] ? __pfx_kthread+0x10/0x10 [ 20.180024] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.180048] ? calculate_sigpending+0x7b/0xa0 [ 20.180074] ? __pfx_kthread+0x10/0x10 [ 20.180096] ret_from_fork+0x41/0x80 [ 20.180171] ? __pfx_kthread+0x10/0x10 [ 20.180196] ret_from_fork_asm+0x1a/0x30 [ 20.180233] </TASK> [ 20.180251] [ 20.193282] Allocated by task 286: [ 20.193687] kasan_save_stack+0x45/0x70 [ 20.194157] kasan_save_track+0x18/0x40 [ 20.194448] kasan_save_alloc_info+0x3b/0x50 [ 20.194832] __kasan_kmalloc+0xb7/0xc0 [ 20.195236] __kmalloc_cache_noprof+0x189/0x420 [ 20.195487] kasan_atomics+0x95/0x310 [ 20.195804] kunit_try_run_case+0x1a5/0x480 [ 20.196168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.196634] kthread+0x337/0x6f0 [ 20.196943] ret_from_fork+0x41/0x80 [ 20.197150] ret_from_fork_asm+0x1a/0x30 [ 20.197378] [ 20.197516] The buggy address belongs to the object at ffff888101e04b00 [ 20.197516] which belongs to the cache kmalloc-64 of size 64 [ 20.198195] The buggy address is located 0 bytes to the right of [ 20.198195] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.200160] [ 20.200888] The buggy address belongs to the physical page: [ 20.201544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.202512] flags: 0x200000000000000(node=0|zone=2) [ 20.202828] page_type: f5(slab) [ 20.202953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.203330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.203957] page dumped because: kasan: bad access detected [ 20.204453] [ 20.204651] Memory state around the buggy address: [ 20.205007] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.205450] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.206727] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.207245] ^ [ 20.207672] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.208163] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.208616] ================================================================== [ 20.604381] ================================================================== [ 20.605043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 20.605819] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.606455] [ 20.606676] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.606809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.606867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.606916] Call Trace: [ 20.606963] <TASK> [ 20.607010] dump_stack_lvl+0x73/0xb0 [ 20.607137] print_report+0xd1/0x650 [ 20.607210] ? __virt_addr_valid+0x1db/0x2d0 [ 20.607269] ? kasan_atomics_helper+0x1079/0x5450 [ 20.607319] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.607369] ? kasan_atomics_helper+0x1079/0x5450 [ 20.607423] kasan_report+0x141/0x180 [ 20.607475] ? kasan_atomics_helper+0x1079/0x5450 [ 20.607530] kasan_check_range+0x10c/0x1c0 [ 20.607576] __kasan_check_write+0x18/0x20 [ 20.607637] kasan_atomics_helper+0x1079/0x5450 [ 20.607698] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.607765] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.607810] ? trace_hardirqs_on+0x37/0xe0 [ 20.607840] ? kasan_atomics+0x152/0x310 [ 20.607869] kasan_atomics+0x1dc/0x310 [ 20.607892] ? __pfx_kasan_atomics+0x10/0x10 [ 20.607916] ? __pfx_kasan_atomics+0x10/0x10 [ 20.607943] kunit_try_run_case+0x1a5/0x480 [ 20.607974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.607999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.608028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.608054] ? __kthread_parkme+0x82/0x180 [ 20.608080] ? preempt_count_sub+0x50/0x80 [ 20.608132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.608174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.608201] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.608227] kthread+0x337/0x6f0 [ 20.608248] ? trace_preempt_on+0x20/0xc0 [ 20.608274] ? __pfx_kthread+0x10/0x10 [ 20.608295] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.608320] ? calculate_sigpending+0x7b/0xa0 [ 20.608346] ? __pfx_kthread+0x10/0x10 [ 20.608368] ret_from_fork+0x41/0x80 [ 20.608394] ? __pfx_kthread+0x10/0x10 [ 20.608418] ret_from_fork_asm+0x1a/0x30 [ 20.608454] </TASK> [ 20.608472] [ 20.621602] Allocated by task 286: [ 20.621995] kasan_save_stack+0x45/0x70 [ 20.622308] kasan_save_track+0x18/0x40 [ 20.622520] kasan_save_alloc_info+0x3b/0x50 [ 20.622743] __kasan_kmalloc+0xb7/0xc0 [ 20.623088] __kmalloc_cache_noprof+0x189/0x420 [ 20.623526] kasan_atomics+0x95/0x310 [ 20.623929] kunit_try_run_case+0x1a5/0x480 [ 20.624413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.624941] kthread+0x337/0x6f0 [ 20.625319] ret_from_fork+0x41/0x80 [ 20.625730] ret_from_fork_asm+0x1a/0x30 [ 20.626240] [ 20.626480] The buggy address belongs to the object at ffff888101e04b00 [ 20.626480] which belongs to the cache kmalloc-64 of size 64 [ 20.626953] The buggy address is located 0 bytes to the right of [ 20.626953] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.627447] [ 20.627587] The buggy address belongs to the physical page: [ 20.628025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.628734] flags: 0x200000000000000(node=0|zone=2) [ 20.629238] page_type: f5(slab) [ 20.629633] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.630266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.630574] page dumped because: kasan: bad access detected [ 20.630822] [ 20.630944] Memory state around the buggy address: [ 20.631231] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.631724] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.632323] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.632691] ^ [ 20.632941] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.633248] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.633790] ================================================================== [ 21.189157] ================================================================== [ 21.191017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 21.192303] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.193660] [ 21.194148] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.194285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.194323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.194377] Call Trace: [ 21.194426] <TASK> [ 21.194475] dump_stack_lvl+0x73/0xb0 [ 21.194561] print_report+0xd1/0x650 [ 21.194621] ? __virt_addr_valid+0x1db/0x2d0 [ 21.194674] ? kasan_atomics_helper+0x18b1/0x5450 [ 21.194718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.194782] ? kasan_atomics_helper+0x18b1/0x5450 [ 21.194830] kasan_report+0x141/0x180 [ 21.194891] ? kasan_atomics_helper+0x18b1/0x5450 [ 21.194974] kasan_check_range+0x10c/0x1c0 [ 21.195022] __kasan_check_write+0x18/0x20 [ 21.195063] kasan_atomics_helper+0x18b1/0x5450 [ 21.195111] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.195171] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.195220] ? trace_hardirqs_on+0x37/0xe0 [ 21.195282] ? kasan_atomics+0x152/0x310 [ 21.195359] kasan_atomics+0x1dc/0x310 [ 21.195405] ? __pfx_kasan_atomics+0x10/0x10 [ 21.195453] ? __pfx_kasan_atomics+0x10/0x10 [ 21.195485] kunit_try_run_case+0x1a5/0x480 [ 21.195528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.195556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.195603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.195652] ? __kthread_parkme+0x82/0x180 [ 21.195682] ? preempt_count_sub+0x50/0x80 [ 21.195722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.195773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.195806] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.195833] kthread+0x337/0x6f0 [ 21.195863] ? trace_preempt_on+0x20/0xc0 [ 21.195889] ? __pfx_kthread+0x10/0x10 [ 21.195910] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.195945] ? calculate_sigpending+0x7b/0xa0 [ 21.195971] ? __pfx_kthread+0x10/0x10 [ 21.195993] ret_from_fork+0x41/0x80 [ 21.196028] ? __pfx_kthread+0x10/0x10 [ 21.196052] ret_from_fork_asm+0x1a/0x30 [ 21.196097] </TASK> [ 21.196122] [ 21.207359] Allocated by task 286: [ 21.207810] kasan_save_stack+0x45/0x70 [ 21.208248] kasan_save_track+0x18/0x40 [ 21.208583] kasan_save_alloc_info+0x3b/0x50 [ 21.208966] __kasan_kmalloc+0xb7/0xc0 [ 21.209355] __kmalloc_cache_noprof+0x189/0x420 [ 21.209685] kasan_atomics+0x95/0x310 [ 21.209901] kunit_try_run_case+0x1a5/0x480 [ 21.210329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.210765] kthread+0x337/0x6f0 [ 21.211076] ret_from_fork+0x41/0x80 [ 21.211362] ret_from_fork_asm+0x1a/0x30 [ 21.211581] [ 21.211728] The buggy address belongs to the object at ffff888101e04b00 [ 21.211728] which belongs to the cache kmalloc-64 of size 64 [ 21.212183] The buggy address is located 0 bytes to the right of [ 21.212183] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.212659] [ 21.212854] The buggy address belongs to the physical page: [ 21.213370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.214015] flags: 0x200000000000000(node=0|zone=2) [ 21.214583] page_type: f5(slab) [ 21.214925] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.215685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.216288] page dumped because: kasan: bad access detected [ 21.216700] [ 21.216842] Memory state around the buggy address: [ 21.217057] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.217616] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.218156] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.218864] ^ [ 21.219786] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.221040] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.221640] ================================================================== [ 20.275485] ================================================================== [ 20.276802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 20.277790] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.278422] [ 20.278659] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.278839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.278877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.278928] Call Trace: [ 20.278975] <TASK> [ 20.279023] dump_stack_lvl+0x73/0xb0 [ 20.279178] print_report+0xd1/0x650 [ 20.279240] ? __virt_addr_valid+0x1db/0x2d0 [ 20.279297] ? kasan_atomics_helper+0xac7/0x5450 [ 20.279379] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.279437] ? kasan_atomics_helper+0xac7/0x5450 [ 20.279488] kasan_report+0x141/0x180 [ 20.279534] ? kasan_atomics_helper+0xac7/0x5450 [ 20.279567] kasan_check_range+0x10c/0x1c0 [ 20.279591] __kasan_check_write+0x18/0x20 [ 20.279614] kasan_atomics_helper+0xac7/0x5450 [ 20.279661] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.279703] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.279760] ? trace_hardirqs_on+0x37/0xe0 [ 20.279811] ? kasan_atomics+0x152/0x310 [ 20.279903] kasan_atomics+0x1dc/0x310 [ 20.279950] ? __pfx_kasan_atomics+0x10/0x10 [ 20.280000] ? __pfx_kasan_atomics+0x10/0x10 [ 20.280056] kunit_try_run_case+0x1a5/0x480 [ 20.280182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.280234] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.280286] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.280331] ? __kthread_parkme+0x82/0x180 [ 20.280361] ? preempt_count_sub+0x50/0x80 [ 20.280392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.280420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.280447] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.280473] kthread+0x337/0x6f0 [ 20.280494] ? trace_preempt_on+0x20/0xc0 [ 20.280522] ? __pfx_kthread+0x10/0x10 [ 20.280543] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.280568] ? calculate_sigpending+0x7b/0xa0 [ 20.280593] ? __pfx_kthread+0x10/0x10 [ 20.280616] ret_from_fork+0x41/0x80 [ 20.280642] ? __pfx_kthread+0x10/0x10 [ 20.280665] ret_from_fork_asm+0x1a/0x30 [ 20.280701] </TASK> [ 20.280718] [ 20.291641] Allocated by task 286: [ 20.292141] kasan_save_stack+0x45/0x70 [ 20.292473] kasan_save_track+0x18/0x40 [ 20.292834] kasan_save_alloc_info+0x3b/0x50 [ 20.293243] __kasan_kmalloc+0xb7/0xc0 [ 20.293490] __kmalloc_cache_noprof+0x189/0x420 [ 20.293760] kasan_atomics+0x95/0x310 [ 20.294136] kunit_try_run_case+0x1a5/0x480 [ 20.294511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.294987] kthread+0x337/0x6f0 [ 20.295332] ret_from_fork+0x41/0x80 [ 20.295694] ret_from_fork_asm+0x1a/0x30 [ 20.296066] [ 20.296238] The buggy address belongs to the object at ffff888101e04b00 [ 20.296238] which belongs to the cache kmalloc-64 of size 64 [ 20.296696] The buggy address is located 0 bytes to the right of [ 20.296696] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.297710] [ 20.297952] The buggy address belongs to the physical page: [ 20.298448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.299006] flags: 0x200000000000000(node=0|zone=2) [ 20.299354] page_type: f5(slab) [ 20.299662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.300251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.300561] page dumped because: kasan: bad access detected [ 20.300832] [ 20.301056] Memory state around the buggy address: [ 20.301523] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.302126] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.302699] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.303086] ^ [ 20.303543] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.303902] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.304263] ================================================================== [ 19.903555] ================================================================== [ 19.904305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 19.904909] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 19.905476] [ 19.905732] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.905885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.905920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.905984] Call Trace: [ 19.906043] <TASK> [ 19.906127] dump_stack_lvl+0x73/0xb0 [ 19.906215] print_report+0xd1/0x650 [ 19.906282] ? __virt_addr_valid+0x1db/0x2d0 [ 19.906347] ? kasan_atomics_helper+0x4a0/0x5450 [ 19.906390] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.906429] ? kasan_atomics_helper+0x4a0/0x5450 [ 19.906468] kasan_report+0x141/0x180 [ 19.906517] ? kasan_atomics_helper+0x4a0/0x5450 [ 19.906567] kasan_check_range+0x10c/0x1c0 [ 19.906606] __kasan_check_write+0x18/0x20 [ 19.906652] kasan_atomics_helper+0x4a0/0x5450 [ 19.906724] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.906786] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.906855] ? trace_hardirqs_on+0x37/0xe0 [ 19.906901] ? kasan_atomics+0x152/0x310 [ 19.906949] kasan_atomics+0x1dc/0x310 [ 19.906998] ? __pfx_kasan_atomics+0x10/0x10 [ 19.907063] ? __pfx_kasan_atomics+0x10/0x10 [ 19.907147] kunit_try_run_case+0x1a5/0x480 [ 19.907208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.907258] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.907317] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.907372] ? __kthread_parkme+0x82/0x180 [ 19.907411] ? preempt_count_sub+0x50/0x80 [ 19.907469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.907527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.907584] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.907654] kthread+0x337/0x6f0 [ 19.907700] ? trace_preempt_on+0x20/0xc0 [ 19.907764] ? __pfx_kthread+0x10/0x10 [ 19.907814] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.907867] ? calculate_sigpending+0x7b/0xa0 [ 19.907925] ? __pfx_kthread+0x10/0x10 [ 19.907974] ret_from_fork+0x41/0x80 [ 19.908028] ? __pfx_kthread+0x10/0x10 [ 19.908077] ret_from_fork_asm+0x1a/0x30 [ 19.908184] </TASK> [ 19.908217] [ 19.919785] Allocated by task 286: [ 19.920281] kasan_save_stack+0x45/0x70 [ 19.920640] kasan_save_track+0x18/0x40 [ 19.920988] kasan_save_alloc_info+0x3b/0x50 [ 19.921257] __kasan_kmalloc+0xb7/0xc0 [ 19.921465] __kmalloc_cache_noprof+0x189/0x420 [ 19.921699] kasan_atomics+0x95/0x310 [ 19.921912] kunit_try_run_case+0x1a5/0x480 [ 19.922164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.922532] kthread+0x337/0x6f0 [ 19.922876] ret_from_fork+0x41/0x80 [ 19.923289] ret_from_fork_asm+0x1a/0x30 [ 19.923704] [ 19.923927] The buggy address belongs to the object at ffff888101e04b00 [ 19.923927] which belongs to the cache kmalloc-64 of size 64 [ 19.926075] The buggy address is located 0 bytes to the right of [ 19.926075] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 19.927095] [ 19.927687] The buggy address belongs to the physical page: [ 19.928189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 19.928477] flags: 0x200000000000000(node=0|zone=2) [ 19.929019] page_type: f5(slab) [ 19.929521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.930270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.930576] page dumped because: kasan: bad access detected [ 19.931018] [ 19.931176] Memory state around the buggy address: [ 19.931648] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.932082] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.932755] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.933286] ^ [ 19.933624] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.934005] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.934513] ================================================================== [ 20.143152] ================================================================== [ 20.143699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 20.144650] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.145253] [ 20.145500] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.145629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.145666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.145722] Call Trace: [ 20.145780] <TASK> [ 20.145830] dump_stack_lvl+0x73/0xb0 [ 20.145913] print_report+0xd1/0x650 [ 20.145971] ? __virt_addr_valid+0x1db/0x2d0 [ 20.146031] ? kasan_atomics_helper+0x860/0x5450 [ 20.146087] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.146154] ? kasan_atomics_helper+0x860/0x5450 [ 20.146212] kasan_report+0x141/0x180 [ 20.146268] ? kasan_atomics_helper+0x860/0x5450 [ 20.146335] kasan_check_range+0x10c/0x1c0 [ 20.146389] __kasan_check_write+0x18/0x20 [ 20.146429] kasan_atomics_helper+0x860/0x5450 [ 20.146475] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.146525] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.146573] ? trace_hardirqs_on+0x37/0xe0 [ 20.146621] ? kasan_atomics+0x152/0x310 [ 20.146678] kasan_atomics+0x1dc/0x310 [ 20.146721] ? __pfx_kasan_atomics+0x10/0x10 [ 20.146809] ? __pfx_kasan_atomics+0x10/0x10 [ 20.146857] kunit_try_run_case+0x1a5/0x480 [ 20.146914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.146965] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.147021] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.147076] ? __kthread_parkme+0x82/0x180 [ 20.147118] ? preempt_count_sub+0x50/0x80 [ 20.147177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.147208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.147235] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.147260] kthread+0x337/0x6f0 [ 20.147282] ? trace_preempt_on+0x20/0xc0 [ 20.147307] ? __pfx_kthread+0x10/0x10 [ 20.147329] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.147353] ? calculate_sigpending+0x7b/0xa0 [ 20.147378] ? __pfx_kthread+0x10/0x10 [ 20.147400] ret_from_fork+0x41/0x80 [ 20.147425] ? __pfx_kthread+0x10/0x10 [ 20.147447] ret_from_fork_asm+0x1a/0x30 [ 20.147483] </TASK> [ 20.147500] [ 20.159420] Allocated by task 286: [ 20.159859] kasan_save_stack+0x45/0x70 [ 20.160288] kasan_save_track+0x18/0x40 [ 20.160790] kasan_save_alloc_info+0x3b/0x50 [ 20.161283] __kasan_kmalloc+0xb7/0xc0 [ 20.161770] __kmalloc_cache_noprof+0x189/0x420 [ 20.162231] kasan_atomics+0x95/0x310 [ 20.162557] kunit_try_run_case+0x1a5/0x480 [ 20.162923] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.163397] kthread+0x337/0x6f0 [ 20.163779] ret_from_fork+0x41/0x80 [ 20.164125] ret_from_fork_asm+0x1a/0x30 [ 20.164419] [ 20.164658] The buggy address belongs to the object at ffff888101e04b00 [ 20.164658] which belongs to the cache kmalloc-64 of size 64 [ 20.165457] The buggy address is located 0 bytes to the right of [ 20.165457] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.166107] [ 20.166325] The buggy address belongs to the physical page: [ 20.166733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.167364] flags: 0x200000000000000(node=0|zone=2) [ 20.167685] page_type: f5(slab) [ 20.168438] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.169541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.169883] page dumped because: kasan: bad access detected [ 20.170543] [ 20.170886] Memory state around the buggy address: [ 20.171139] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.171731] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.172177] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.172583] ^ [ 20.172999] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.173612] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.174225] ================================================================== [ 20.078488] ================================================================== [ 20.078883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 20.079528] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.079952] [ 20.080271] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.080393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.080428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.080474] Call Trace: [ 20.080523] <TASK> [ 20.080569] dump_stack_lvl+0x73/0xb0 [ 20.080648] print_report+0xd1/0x650 [ 20.080697] ? __virt_addr_valid+0x1db/0x2d0 [ 20.080772] ? kasan_atomics_helper+0x72f/0x5450 [ 20.080822] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.080877] ? kasan_atomics_helper+0x72f/0x5450 [ 20.080931] kasan_report+0x141/0x180 [ 20.080988] ? kasan_atomics_helper+0x72f/0x5450 [ 20.081053] kasan_check_range+0x10c/0x1c0 [ 20.081132] __kasan_check_write+0x18/0x20 [ 20.081169] kasan_atomics_helper+0x72f/0x5450 [ 20.081196] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.081222] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.081248] ? trace_hardirqs_on+0x37/0xe0 [ 20.081274] ? kasan_atomics+0x152/0x310 [ 20.081301] kasan_atomics+0x1dc/0x310 [ 20.081323] ? __pfx_kasan_atomics+0x10/0x10 [ 20.081347] ? __pfx_kasan_atomics+0x10/0x10 [ 20.081374] kunit_try_run_case+0x1a5/0x480 [ 20.081405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.081430] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.081459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.081484] ? __kthread_parkme+0x82/0x180 [ 20.081511] ? preempt_count_sub+0x50/0x80 [ 20.081540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.081567] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.081592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.081618] kthread+0x337/0x6f0 [ 20.081639] ? trace_preempt_on+0x20/0xc0 [ 20.081665] ? __pfx_kthread+0x10/0x10 [ 20.081686] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.081710] ? calculate_sigpending+0x7b/0xa0 [ 20.081736] ? __pfx_kthread+0x10/0x10 [ 20.081783] ret_from_fork+0x41/0x80 [ 20.081811] ? __pfx_kthread+0x10/0x10 [ 20.081835] ret_from_fork_asm+0x1a/0x30 [ 20.081872] </TASK> [ 20.081888] [ 20.094588] Allocated by task 286: [ 20.095065] kasan_save_stack+0x45/0x70 [ 20.095377] kasan_save_track+0x18/0x40 [ 20.095602] kasan_save_alloc_info+0x3b/0x50 [ 20.095854] __kasan_kmalloc+0xb7/0xc0 [ 20.096071] __kmalloc_cache_noprof+0x189/0x420 [ 20.096454] kasan_atomics+0x95/0x310 [ 20.097054] kunit_try_run_case+0x1a5/0x480 [ 20.097728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.098296] kthread+0x337/0x6f0 [ 20.098651] ret_from_fork+0x41/0x80 [ 20.099040] ret_from_fork_asm+0x1a/0x30 [ 20.099460] [ 20.099713] The buggy address belongs to the object at ffff888101e04b00 [ 20.099713] which belongs to the cache kmalloc-64 of size 64 [ 20.100628] The buggy address is located 0 bytes to the right of [ 20.100628] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.101364] [ 20.101528] The buggy address belongs to the physical page: [ 20.102042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.102809] flags: 0x200000000000000(node=0|zone=2) [ 20.103167] page_type: f5(slab) [ 20.103391] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.104072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.104759] page dumped because: kasan: bad access detected [ 20.105267] [ 20.105466] Memory state around the buggy address: [ 20.106146] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.106599] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.107064] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.107455] ^ [ 20.107863] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.108384] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.108856] ================================================================== [ 19.874857] ================================================================== [ 19.875599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 19.876022] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 19.876419] [ 19.876617] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.876732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.876776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.876826] Call Trace: [ 19.876874] <TASK> [ 19.876922] dump_stack_lvl+0x73/0xb0 [ 19.876997] print_report+0xd1/0x650 [ 19.877055] ? __virt_addr_valid+0x1db/0x2d0 [ 19.877149] ? kasan_atomics_helper+0x4b54/0x5450 [ 19.877207] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.877264] ? kasan_atomics_helper+0x4b54/0x5450 [ 19.877317] kasan_report+0x141/0x180 [ 19.877374] ? kasan_atomics_helper+0x4b54/0x5450 [ 19.877426] __asan_report_load4_noabort+0x18/0x20 [ 19.877470] kasan_atomics_helper+0x4b54/0x5450 [ 19.877521] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.877594] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.877648] ? trace_hardirqs_on+0x37/0xe0 [ 19.877715] ? kasan_atomics+0x152/0x310 [ 19.877790] kasan_atomics+0x1dc/0x310 [ 19.877834] ? __pfx_kasan_atomics+0x10/0x10 [ 19.877879] ? __pfx_kasan_atomics+0x10/0x10 [ 19.877933] kunit_try_run_case+0x1a5/0x480 [ 19.877995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.878049] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.878141] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.878195] ? __kthread_parkme+0x82/0x180 [ 19.878240] ? preempt_count_sub+0x50/0x80 [ 19.878288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.878339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.878414] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.878465] kthread+0x337/0x6f0 [ 19.878507] ? trace_preempt_on+0x20/0xc0 [ 19.878560] ? __pfx_kthread+0x10/0x10 [ 19.878604] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.878655] ? calculate_sigpending+0x7b/0xa0 [ 19.878726] ? __pfx_kthread+0x10/0x10 [ 19.878783] ret_from_fork+0x41/0x80 [ 19.878838] ? __pfx_kthread+0x10/0x10 [ 19.878881] ret_from_fork_asm+0x1a/0x30 [ 19.878955] </TASK> [ 19.879004] [ 19.890155] Allocated by task 286: [ 19.890445] kasan_save_stack+0x45/0x70 [ 19.890867] kasan_save_track+0x18/0x40 [ 19.891193] kasan_save_alloc_info+0x3b/0x50 [ 19.891531] __kasan_kmalloc+0xb7/0xc0 [ 19.891836] __kmalloc_cache_noprof+0x189/0x420 [ 19.892092] kasan_atomics+0x95/0x310 [ 19.892315] kunit_try_run_case+0x1a5/0x480 [ 19.892525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.892789] kthread+0x337/0x6f0 [ 19.892977] ret_from_fork+0x41/0x80 [ 19.893220] ret_from_fork_asm+0x1a/0x30 [ 19.893437] [ 19.893625] The buggy address belongs to the object at ffff888101e04b00 [ 19.893625] which belongs to the cache kmalloc-64 of size 64 [ 19.894653] The buggy address is located 0 bytes to the right of [ 19.894653] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 19.895687] [ 19.895918] The buggy address belongs to the physical page: [ 19.896423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 19.897070] flags: 0x200000000000000(node=0|zone=2) [ 19.897409] page_type: f5(slab) [ 19.897613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.897939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.898275] page dumped because: kasan: bad access detected [ 19.898516] [ 19.898645] Memory state around the buggy address: [ 19.898978] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.899616] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.900285] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.900897] ^ [ 19.901346] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.901906] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.902266] ================================================================== [ 20.830165] ================================================================== [ 20.831722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 20.832122] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.832628] [ 20.832798] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.832917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.832967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.833026] Call Trace: [ 20.833081] <TASK> [ 20.833140] dump_stack_lvl+0x73/0xb0 [ 20.833224] print_report+0xd1/0x650 [ 20.833272] ? __virt_addr_valid+0x1db/0x2d0 [ 20.833324] ? kasan_atomics_helper+0x49ce/0x5450 [ 20.833373] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.833420] ? kasan_atomics_helper+0x49ce/0x5450 [ 20.833649] kasan_report+0x141/0x180 [ 20.833725] ? kasan_atomics_helper+0x49ce/0x5450 [ 20.833796] __asan_report_load4_noabort+0x18/0x20 [ 20.833847] kasan_atomics_helper+0x49ce/0x5450 [ 20.833902] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.833958] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.834013] ? trace_hardirqs_on+0x37/0xe0 [ 20.834064] ? kasan_atomics+0x152/0x310 [ 20.834156] kasan_atomics+0x1dc/0x310 [ 20.834205] ? __pfx_kasan_atomics+0x10/0x10 [ 20.834243] ? __pfx_kasan_atomics+0x10/0x10 [ 20.834276] kunit_try_run_case+0x1a5/0x480 [ 20.834308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.834333] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.834376] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.834404] ? __kthread_parkme+0x82/0x180 [ 20.834430] ? preempt_count_sub+0x50/0x80 [ 20.834460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.834487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.834513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.834565] kthread+0x337/0x6f0 [ 20.834602] ? trace_preempt_on+0x20/0xc0 [ 20.834635] ? __pfx_kthread+0x10/0x10 [ 20.834657] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.834681] ? calculate_sigpending+0x7b/0xa0 [ 20.834706] ? __pfx_kthread+0x10/0x10 [ 20.834728] ret_from_fork+0x41/0x80 [ 20.834774] ? __pfx_kthread+0x10/0x10 [ 20.834806] ret_from_fork_asm+0x1a/0x30 [ 20.834855] </TASK> [ 20.834872] [ 20.848989] Allocated by task 286: [ 20.849479] kasan_save_stack+0x45/0x70 [ 20.849969] kasan_save_track+0x18/0x40 [ 20.850204] kasan_save_alloc_info+0x3b/0x50 [ 20.850579] __kasan_kmalloc+0xb7/0xc0 [ 20.850954] __kmalloc_cache_noprof+0x189/0x420 [ 20.851255] kasan_atomics+0x95/0x310 [ 20.851579] kunit_try_run_case+0x1a5/0x480 [ 20.851983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.852333] kthread+0x337/0x6f0 [ 20.852556] ret_from_fork+0x41/0x80 [ 20.852954] ret_from_fork_asm+0x1a/0x30 [ 20.853260] [ 20.853470] The buggy address belongs to the object at ffff888101e04b00 [ 20.853470] which belongs to the cache kmalloc-64 of size 64 [ 20.854272] The buggy address is located 0 bytes to the right of [ 20.854272] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.855053] [ 20.855299] The buggy address belongs to the physical page: [ 20.855658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.856050] flags: 0x200000000000000(node=0|zone=2) [ 20.856518] page_type: f5(slab) [ 20.856872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.857415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.857876] page dumped because: kasan: bad access detected [ 20.858202] [ 20.858404] Memory state around the buggy address: [ 20.858694] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.859017] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.859597] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.860218] ^ [ 20.860644] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.861018] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.861545] ================================================================== [ 20.998359] ================================================================== [ 20.999141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 20.999795] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.000243] [ 21.000547] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.000668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.000967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.001024] Call Trace: [ 21.001098] <TASK> [ 21.001163] dump_stack_lvl+0x73/0xb0 [ 21.001257] print_report+0xd1/0x650 [ 21.001316] ? __virt_addr_valid+0x1db/0x2d0 [ 21.001375] ? kasan_atomics_helper+0x151d/0x5450 [ 21.001431] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.001486] ? kasan_atomics_helper+0x151d/0x5450 [ 21.001543] kasan_report+0x141/0x180 [ 21.001630] ? kasan_atomics_helper+0x151d/0x5450 [ 21.001695] kasan_check_range+0x10c/0x1c0 [ 21.001758] __kasan_check_write+0x18/0x20 [ 21.001811] kasan_atomics_helper+0x151d/0x5450 [ 21.001863] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.001940] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.002012] ? trace_hardirqs_on+0x37/0xe0 [ 21.002069] ? kasan_atomics+0x152/0x310 [ 21.002128] kasan_atomics+0x1dc/0x310 [ 21.002173] ? __pfx_kasan_atomics+0x10/0x10 [ 21.002207] ? __pfx_kasan_atomics+0x10/0x10 [ 21.002236] kunit_try_run_case+0x1a5/0x480 [ 21.002269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.002293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.002321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.002347] ? __kthread_parkme+0x82/0x180 [ 21.002372] ? preempt_count_sub+0x50/0x80 [ 21.002405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.002431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.002457] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.002483] kthread+0x337/0x6f0 [ 21.002504] ? trace_preempt_on+0x20/0xc0 [ 21.002530] ? __pfx_kthread+0x10/0x10 [ 21.002551] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.002575] ? calculate_sigpending+0x7b/0xa0 [ 21.002600] ? __pfx_kthread+0x10/0x10 [ 21.002622] ret_from_fork+0x41/0x80 [ 21.002649] ? __pfx_kthread+0x10/0x10 [ 21.002670] ret_from_fork_asm+0x1a/0x30 [ 21.002708] </TASK> [ 21.002724] [ 21.015981] Allocated by task 286: [ 21.016231] kasan_save_stack+0x45/0x70 [ 21.016625] kasan_save_track+0x18/0x40 [ 21.018111] kasan_save_alloc_info+0x3b/0x50 [ 21.019019] __kasan_kmalloc+0xb7/0xc0 [ 21.020505] __kmalloc_cache_noprof+0x189/0x420 [ 21.021537] kasan_atomics+0x95/0x310 [ 21.022165] kunit_try_run_case+0x1a5/0x480 [ 21.022617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.023131] kthread+0x337/0x6f0 [ 21.023441] ret_from_fork+0x41/0x80 [ 21.023796] ret_from_fork_asm+0x1a/0x30 [ 21.024509] [ 21.024723] The buggy address belongs to the object at ffff888101e04b00 [ 21.024723] which belongs to the cache kmalloc-64 of size 64 [ 21.026401] The buggy address is located 0 bytes to the right of [ 21.026401] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.027220] [ 21.027363] The buggy address belongs to the physical page: [ 21.027604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.027947] flags: 0x200000000000000(node=0|zone=2) [ 21.028180] page_type: f5(slab) [ 21.028419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.029357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.030839] page dumped because: kasan: bad access detected [ 21.031355] [ 21.031569] Memory state around the buggy address: [ 21.031955] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.032525] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.033039] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.033558] ^ [ 21.033934] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.034465] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.035129] ================================================================== [ 21.788764] ================================================================== [ 21.789876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 21.790542] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.791181] [ 21.791438] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.791565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.791600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.791664] Call Trace: [ 21.791714] <TASK> [ 21.791764] dump_stack_lvl+0x73/0xb0 [ 21.791847] print_report+0xd1/0x650 [ 21.791905] ? __virt_addr_valid+0x1db/0x2d0 [ 21.791962] ? kasan_atomics_helper+0x224c/0x5450 [ 21.792017] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.792074] ? kasan_atomics_helper+0x224c/0x5450 [ 21.792578] kasan_report+0x141/0x180 [ 21.792647] ? kasan_atomics_helper+0x224c/0x5450 [ 21.793080] kasan_check_range+0x10c/0x1c0 [ 21.793167] __kasan_check_write+0x18/0x20 [ 21.793196] kasan_atomics_helper+0x224c/0x5450 [ 21.793224] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.793254] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.793280] ? trace_hardirqs_on+0x37/0xe0 [ 21.793306] ? kasan_atomics+0x152/0x310 [ 21.793333] kasan_atomics+0x1dc/0x310 [ 21.793356] ? __pfx_kasan_atomics+0x10/0x10 [ 21.793379] ? __pfx_kasan_atomics+0x10/0x10 [ 21.793407] kunit_try_run_case+0x1a5/0x480 [ 21.793437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.793462] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.793491] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.793518] ? __kthread_parkme+0x82/0x180 [ 21.793544] ? preempt_count_sub+0x50/0x80 [ 21.793573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.793601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.793626] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.793653] kthread+0x337/0x6f0 [ 21.793673] ? trace_preempt_on+0x20/0xc0 [ 21.793699] ? __pfx_kthread+0x10/0x10 [ 21.793721] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.793764] ? calculate_sigpending+0x7b/0xa0 [ 21.793801] ? __pfx_kthread+0x10/0x10 [ 21.793824] ret_from_fork+0x41/0x80 [ 21.793851] ? __pfx_kthread+0x10/0x10 [ 21.793873] ret_from_fork_asm+0x1a/0x30 [ 21.793909] </TASK> [ 21.793925] [ 21.807784] Allocated by task 286: [ 21.808320] kasan_save_stack+0x45/0x70 [ 21.808815] kasan_save_track+0x18/0x40 [ 21.809262] kasan_save_alloc_info+0x3b/0x50 [ 21.809706] __kasan_kmalloc+0xb7/0xc0 [ 21.810057] __kmalloc_cache_noprof+0x189/0x420 [ 21.810456] kasan_atomics+0x95/0x310 [ 21.811510] kunit_try_run_case+0x1a5/0x480 [ 21.811856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.812569] kthread+0x337/0x6f0 [ 21.813180] ret_from_fork+0x41/0x80 [ 21.813766] ret_from_fork_asm+0x1a/0x30 [ 21.813990] [ 21.814103] The buggy address belongs to the object at ffff888101e04b00 [ 21.814103] which belongs to the cache kmalloc-64 of size 64 [ 21.816384] The buggy address is located 0 bytes to the right of [ 21.816384] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.818502] [ 21.819073] The buggy address belongs to the physical page: [ 21.820354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.821337] flags: 0x200000000000000(node=0|zone=2) [ 21.822336] page_type: f5(slab) [ 21.823357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.824714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.825853] page dumped because: kasan: bad access detected [ 21.826292] [ 21.826422] Memory state around the buggy address: [ 21.827217] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.827640] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.828369] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.828792] ^ [ 21.829382] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.829791] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.830393] ================================================================== [ 20.044154] ================================================================== [ 20.045095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 20.045475] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.045778] [ 20.045939] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.046007] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.046025] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.046050] Call Trace: [ 20.046076] <TASK> [ 20.046104] dump_stack_lvl+0x73/0xb0 [ 20.046620] print_report+0xd1/0x650 [ 20.047010] ? __virt_addr_valid+0x1db/0x2d0 [ 20.047098] ? kasan_atomics_helper+0x697/0x5450 [ 20.047146] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.047197] ? kasan_atomics_helper+0x697/0x5450 [ 20.047258] kasan_report+0x141/0x180 [ 20.047315] ? kasan_atomics_helper+0x697/0x5450 [ 20.047355] kasan_check_range+0x10c/0x1c0 [ 20.047380] __kasan_check_write+0x18/0x20 [ 20.047404] kasan_atomics_helper+0x697/0x5450 [ 20.047431] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.047458] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.047483] ? trace_hardirqs_on+0x37/0xe0 [ 20.047510] ? kasan_atomics+0x152/0x310 [ 20.047537] kasan_atomics+0x1dc/0x310 [ 20.047559] ? __pfx_kasan_atomics+0x10/0x10 [ 20.047582] ? __pfx_kasan_atomics+0x10/0x10 [ 20.047609] kunit_try_run_case+0x1a5/0x480 [ 20.047653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.047679] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.047708] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.047736] ? __kthread_parkme+0x82/0x180 [ 20.047787] ? preempt_count_sub+0x50/0x80 [ 20.047817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.047843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.047870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.047895] kthread+0x337/0x6f0 [ 20.047916] ? trace_preempt_on+0x20/0xc0 [ 20.047942] ? __pfx_kthread+0x10/0x10 [ 20.047964] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.047988] ? calculate_sigpending+0x7b/0xa0 [ 20.048013] ? __pfx_kthread+0x10/0x10 [ 20.048035] ret_from_fork+0x41/0x80 [ 20.048061] ? __pfx_kthread+0x10/0x10 [ 20.048082] ret_from_fork_asm+0x1a/0x30 [ 20.048148] </TASK> [ 20.048168] [ 20.061704] Allocated by task 286: [ 20.062279] kasan_save_stack+0x45/0x70 [ 20.062623] kasan_save_track+0x18/0x40 [ 20.062862] kasan_save_alloc_info+0x3b/0x50 [ 20.063384] __kasan_kmalloc+0xb7/0xc0 [ 20.063853] __kmalloc_cache_noprof+0x189/0x420 [ 20.064426] kasan_atomics+0x95/0x310 [ 20.064652] kunit_try_run_case+0x1a5/0x480 [ 20.065028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.065799] kthread+0x337/0x6f0 [ 20.066043] ret_from_fork+0x41/0x80 [ 20.066491] ret_from_fork_asm+0x1a/0x30 [ 20.066944] [ 20.067246] The buggy address belongs to the object at ffff888101e04b00 [ 20.067246] which belongs to the cache kmalloc-64 of size 64 [ 20.068085] The buggy address is located 0 bytes to the right of [ 20.068085] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.068971] [ 20.069252] The buggy address belongs to the physical page: [ 20.069655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.070238] flags: 0x200000000000000(node=0|zone=2) [ 20.070725] page_type: f5(slab) [ 20.071002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.071615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.072096] page dumped because: kasan: bad access detected [ 20.072597] [ 20.072811] Memory state around the buggy address: [ 20.073083] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.073668] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.074144] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.074730] ^ [ 20.075370] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.075941] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.076476] ================================================================== [ 20.635046] ================================================================== [ 20.636175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 20.636672] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.636938] [ 20.637061] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.637153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.637171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.637198] Call Trace: [ 20.637225] <TASK> [ 20.637253] dump_stack_lvl+0x73/0xb0 [ 20.637291] print_report+0xd1/0x650 [ 20.637319] ? __virt_addr_valid+0x1db/0x2d0 [ 20.637347] ? kasan_atomics_helper+0x4a1c/0x5450 [ 20.637373] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.637400] ? kasan_atomics_helper+0x4a1c/0x5450 [ 20.637426] kasan_report+0x141/0x180 [ 20.637452] ? kasan_atomics_helper+0x4a1c/0x5450 [ 20.637483] __asan_report_load4_noabort+0x18/0x20 [ 20.637508] kasan_atomics_helper+0x4a1c/0x5450 [ 20.637535] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.637560] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.637585] ? trace_hardirqs_on+0x37/0xe0 [ 20.637611] ? kasan_atomics+0x152/0x310 [ 20.637639] kasan_atomics+0x1dc/0x310 [ 20.637662] ? __pfx_kasan_atomics+0x10/0x10 [ 20.637685] ? __pfx_kasan_atomics+0x10/0x10 [ 20.637712] kunit_try_run_case+0x1a5/0x480 [ 20.637741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.638008] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.638064] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.638129] ? __kthread_parkme+0x82/0x180 [ 20.638186] ? preempt_count_sub+0x50/0x80 [ 20.638249] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.638308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.638368] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.638419] kthread+0x337/0x6f0 [ 20.638459] ? trace_preempt_on+0x20/0xc0 [ 20.638897] ? __pfx_kthread+0x10/0x10 [ 20.638990] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.639050] ? calculate_sigpending+0x7b/0xa0 [ 20.639114] ? __pfx_kthread+0x10/0x10 [ 20.639165] ret_from_fork+0x41/0x80 [ 20.639227] ? __pfx_kthread+0x10/0x10 [ 20.639274] ret_from_fork_asm+0x1a/0x30 [ 20.639343] </TASK> [ 20.639365] [ 20.652302] Allocated by task 286: [ 20.652739] kasan_save_stack+0x45/0x70 [ 20.653246] kasan_save_track+0x18/0x40 [ 20.653603] kasan_save_alloc_info+0x3b/0x50 [ 20.653885] __kasan_kmalloc+0xb7/0xc0 [ 20.654279] __kmalloc_cache_noprof+0x189/0x420 [ 20.654584] kasan_atomics+0x95/0x310 [ 20.654897] kunit_try_run_case+0x1a5/0x480 [ 20.655328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.655705] kthread+0x337/0x6f0 [ 20.655918] ret_from_fork+0x41/0x80 [ 20.656146] ret_from_fork_asm+0x1a/0x30 [ 20.656547] [ 20.656761] The buggy address belongs to the object at ffff888101e04b00 [ 20.656761] which belongs to the cache kmalloc-64 of size 64 [ 20.657707] The buggy address is located 0 bytes to the right of [ 20.657707] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.658444] [ 20.658677] The buggy address belongs to the physical page: [ 20.659018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.659629] flags: 0x200000000000000(node=0|zone=2) [ 20.659931] page_type: f5(slab) [ 20.660300] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.660702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.661023] page dumped because: kasan: bad access detected [ 20.661514] [ 20.661715] Memory state around the buggy address: [ 20.662165] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.662565] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.663096] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.663539] ^ [ 20.663957] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.664407] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.664698] ================================================================== [ 21.405941] ================================================================== [ 21.406634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 21.407147] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.407563] [ 21.407795] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.407911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.407938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.407967] Call Trace: [ 21.407994] <TASK> [ 21.408022] dump_stack_lvl+0x73/0xb0 [ 21.408076] print_report+0xd1/0x650 [ 21.408158] ? __virt_addr_valid+0x1db/0x2d0 [ 21.408205] ? kasan_atomics_helper+0x1ce1/0x5450 [ 21.408249] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.408300] ? kasan_atomics_helper+0x1ce1/0x5450 [ 21.408345] kasan_report+0x141/0x180 [ 21.408387] ? kasan_atomics_helper+0x1ce1/0x5450 [ 21.408438] kasan_check_range+0x10c/0x1c0 [ 21.408480] __kasan_check_write+0x18/0x20 [ 21.408525] kasan_atomics_helper+0x1ce1/0x5450 [ 21.408576] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.408626] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.408674] ? trace_hardirqs_on+0x37/0xe0 [ 21.408723] ? kasan_atomics+0x152/0x310 [ 21.408793] kasan_atomics+0x1dc/0x310 [ 21.408845] ? __pfx_kasan_atomics+0x10/0x10 [ 21.408886] ? __pfx_kasan_atomics+0x10/0x10 [ 21.408942] kunit_try_run_case+0x1a5/0x480 [ 21.408996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.409042] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.409093] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.409186] ? __kthread_parkme+0x82/0x180 [ 21.409237] ? preempt_count_sub+0x50/0x80 [ 21.409289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.409343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.409391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.409436] kthread+0x337/0x6f0 [ 21.409475] ? trace_preempt_on+0x20/0xc0 [ 21.409525] ? __pfx_kthread+0x10/0x10 [ 21.409567] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.409618] ? calculate_sigpending+0x7b/0xa0 [ 21.409672] ? __pfx_kthread+0x10/0x10 [ 21.409721] ret_from_fork+0x41/0x80 [ 21.409785] ? __pfx_kthread+0x10/0x10 [ 21.409826] ret_from_fork_asm+0x1a/0x30 [ 21.409885] </TASK> [ 21.409914] [ 21.420096] Allocated by task 286: [ 21.420523] kasan_save_stack+0x45/0x70 [ 21.420929] kasan_save_track+0x18/0x40 [ 21.421300] kasan_save_alloc_info+0x3b/0x50 [ 21.421690] __kasan_kmalloc+0xb7/0xc0 [ 21.422033] __kmalloc_cache_noprof+0x189/0x420 [ 21.422460] kasan_atomics+0x95/0x310 [ 21.422805] kunit_try_run_case+0x1a5/0x480 [ 21.423163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.423592] kthread+0x337/0x6f0 [ 21.423871] ret_from_fork+0x41/0x80 [ 21.424083] ret_from_fork_asm+0x1a/0x30 [ 21.424456] [ 21.424643] The buggy address belongs to the object at ffff888101e04b00 [ 21.424643] which belongs to the cache kmalloc-64 of size 64 [ 21.425335] The buggy address is located 0 bytes to the right of [ 21.425335] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.426078] [ 21.426289] The buggy address belongs to the physical page: [ 21.426629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.427170] flags: 0x200000000000000(node=0|zone=2) [ 21.427570] page_type: f5(slab) [ 21.427836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.428343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.428717] page dumped because: kasan: bad access detected [ 21.429145] [ 21.429277] Memory state around the buggy address: [ 21.429512] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.429809] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.430383] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.430948] ^ [ 21.431361] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.431845] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.432291] ================================================================== [ 20.376279] ================================================================== [ 20.377241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 20.377804] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.378347] [ 20.378640] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.378778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.378808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.378857] Call Trace: [ 20.378902] <TASK> [ 20.378949] dump_stack_lvl+0x73/0xb0 [ 20.379009] print_report+0xd1/0x650 [ 20.379039] ? __virt_addr_valid+0x1db/0x2d0 [ 20.379069] ? kasan_atomics_helper+0x4a84/0x5450 [ 20.379093] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.379187] ? kasan_atomics_helper+0x4a84/0x5450 [ 20.379243] kasan_report+0x141/0x180 [ 20.379296] ? kasan_atomics_helper+0x4a84/0x5450 [ 20.379361] __asan_report_load4_noabort+0x18/0x20 [ 20.379415] kasan_atomics_helper+0x4a84/0x5450 [ 20.379473] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.379524] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.379573] ? trace_hardirqs_on+0x37/0xe0 [ 20.379632] ? kasan_atomics+0x152/0x310 [ 20.379732] kasan_atomics+0x1dc/0x310 [ 20.379790] ? __pfx_kasan_atomics+0x10/0x10 [ 20.379841] ? __pfx_kasan_atomics+0x10/0x10 [ 20.379898] kunit_try_run_case+0x1a5/0x480 [ 20.379997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.380047] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.380103] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.380185] ? __kthread_parkme+0x82/0x180 [ 20.380241] ? preempt_count_sub+0x50/0x80 [ 20.380303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.380354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.380406] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.380493] kthread+0x337/0x6f0 [ 20.380537] ? trace_preempt_on+0x20/0xc0 [ 20.380590] ? __pfx_kthread+0x10/0x10 [ 20.380633] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.380675] ? calculate_sigpending+0x7b/0xa0 [ 20.380709] ? __pfx_kthread+0x10/0x10 [ 20.380731] ret_from_fork+0x41/0x80 [ 20.380782] ? __pfx_kthread+0x10/0x10 [ 20.380807] ret_from_fork_asm+0x1a/0x30 [ 20.380845] </TASK> [ 20.380862] [ 20.393699] Allocated by task 286: [ 20.394302] kasan_save_stack+0x45/0x70 [ 20.394878] kasan_save_track+0x18/0x40 [ 20.395240] kasan_save_alloc_info+0x3b/0x50 [ 20.395580] __kasan_kmalloc+0xb7/0xc0 [ 20.396023] __kmalloc_cache_noprof+0x189/0x420 [ 20.396494] kasan_atomics+0x95/0x310 [ 20.396884] kunit_try_run_case+0x1a5/0x480 [ 20.397324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.397838] kthread+0x337/0x6f0 [ 20.398115] ret_from_fork+0x41/0x80 [ 20.398459] ret_from_fork_asm+0x1a/0x30 [ 20.398689] [ 20.398836] The buggy address belongs to the object at ffff888101e04b00 [ 20.398836] which belongs to the cache kmalloc-64 of size 64 [ 20.399949] The buggy address is located 0 bytes to the right of [ 20.399949] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.400858] [ 20.401012] The buggy address belongs to the physical page: [ 20.401270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.401616] flags: 0x200000000000000(node=0|zone=2) [ 20.402167] page_type: f5(slab) [ 20.402602] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.403337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.403983] page dumped because: kasan: bad access detected [ 20.404457] [ 20.404708] Memory state around the buggy address: [ 20.405111] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.405628] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.405947] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.406247] ^ [ 20.406764] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.407532] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.408179] ================================================================== [ 19.814426] ================================================================== [ 19.815080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 19.815679] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 19.816001] [ 19.816179] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.816296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.816331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.816371] Call Trace: [ 19.816412] <TASK> [ 19.816458] dump_stack_lvl+0x73/0xb0 [ 19.816529] print_report+0xd1/0x650 [ 19.816588] ? __virt_addr_valid+0x1db/0x2d0 [ 19.816645] ? kasan_atomics_helper+0x4b6e/0x5450 [ 19.816699] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.816798] ? kasan_atomics_helper+0x4b6e/0x5450 [ 19.816844] kasan_report+0x141/0x180 [ 19.816890] ? kasan_atomics_helper+0x4b6e/0x5450 [ 19.816949] __asan_report_store4_noabort+0x1b/0x30 [ 19.816994] kasan_atomics_helper+0x4b6e/0x5450 [ 19.817045] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.817098] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.817189] ? trace_hardirqs_on+0x37/0xe0 [ 19.817247] ? kasan_atomics+0x152/0x310 [ 19.817291] kasan_atomics+0x1dc/0x310 [ 19.817324] ? __pfx_kasan_atomics+0x10/0x10 [ 19.817357] ? __pfx_kasan_atomics+0x10/0x10 [ 19.817396] kunit_try_run_case+0x1a5/0x480 [ 19.817438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.817474] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.817514] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.817552] ? __kthread_parkme+0x82/0x180 [ 19.817588] ? preempt_count_sub+0x50/0x80 [ 19.817631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.817668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.817705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.817740] kthread+0x337/0x6f0 [ 19.817786] ? trace_preempt_on+0x20/0xc0 [ 19.817824] ? __pfx_kthread+0x10/0x10 [ 19.817855] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.817891] ? calculate_sigpending+0x7b/0xa0 [ 19.817930] ? __pfx_kthread+0x10/0x10 [ 19.817963] ret_from_fork+0x41/0x80 [ 19.818001] ? __pfx_kthread+0x10/0x10 [ 19.818034] ret_from_fork_asm+0x1a/0x30 [ 19.818090] </TASK> [ 19.818146] [ 19.829480] Allocated by task 286: [ 19.829807] kasan_save_stack+0x45/0x70 [ 19.830300] kasan_save_track+0x18/0x40 [ 19.830671] kasan_save_alloc_info+0x3b/0x50 [ 19.831068] __kasan_kmalloc+0xb7/0xc0 [ 19.832968] __kmalloc_cache_noprof+0x189/0x420 [ 19.833770] kasan_atomics+0x95/0x310 [ 19.834094] kunit_try_run_case+0x1a5/0x480 [ 19.834532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.834902] kthread+0x337/0x6f0 [ 19.835280] ret_from_fork+0x41/0x80 [ 19.835684] ret_from_fork_asm+0x1a/0x30 [ 19.835965] [ 19.836206] The buggy address belongs to the object at ffff888101e04b00 [ 19.836206] which belongs to the cache kmalloc-64 of size 64 [ 19.837006] The buggy address is located 0 bytes to the right of [ 19.837006] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 19.837713] [ 19.837996] The buggy address belongs to the physical page: [ 19.838261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 19.838880] flags: 0x200000000000000(node=0|zone=2) [ 19.839353] page_type: f5(slab) [ 19.839713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.840246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.840680] page dumped because: kasan: bad access detected [ 19.840998] [ 19.841232] Memory state around the buggy address: [ 19.841624] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.842231] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.842648] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.843020] ^ [ 19.843427] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.843800] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.844384] ================================================================== [ 20.793974] ================================================================== [ 20.795497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 20.796343] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.797300] [ 20.797559] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.797682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.797703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.797730] Call Trace: [ 20.797775] <TASK> [ 20.797805] dump_stack_lvl+0x73/0xb0 [ 20.797876] print_report+0xd1/0x650 [ 20.797921] ? __virt_addr_valid+0x1db/0x2d0 [ 20.797975] ? kasan_atomics_helper+0x12e6/0x5450 [ 20.798022] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.798070] ? kasan_atomics_helper+0x12e6/0x5450 [ 20.798117] kasan_report+0x141/0x180 [ 20.798169] ? kasan_atomics_helper+0x12e6/0x5450 [ 20.798249] kasan_check_range+0x10c/0x1c0 [ 20.798280] __kasan_check_write+0x18/0x20 [ 20.798304] kasan_atomics_helper+0x12e6/0x5450 [ 20.798332] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.798357] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.798383] ? trace_hardirqs_on+0x37/0xe0 [ 20.798410] ? kasan_atomics+0x152/0x310 [ 20.798438] kasan_atomics+0x1dc/0x310 [ 20.798461] ? __pfx_kasan_atomics+0x10/0x10 [ 20.798485] ? __pfx_kasan_atomics+0x10/0x10 [ 20.798513] kunit_try_run_case+0x1a5/0x480 [ 20.798542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.798567] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.798595] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.798621] ? __kthread_parkme+0x82/0x180 [ 20.798647] ? preempt_count_sub+0x50/0x80 [ 20.798676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.798704] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.798729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.798778] kthread+0x337/0x6f0 [ 20.798803] ? trace_preempt_on+0x20/0xc0 [ 20.798828] ? __pfx_kthread+0x10/0x10 [ 20.798850] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.798874] ? calculate_sigpending+0x7b/0xa0 [ 20.798899] ? __pfx_kthread+0x10/0x10 [ 20.798922] ret_from_fork+0x41/0x80 [ 20.798949] ? __pfx_kthread+0x10/0x10 [ 20.799245] ret_from_fork_asm+0x1a/0x30 [ 20.799300] </TASK> [ 20.799320] [ 20.814176] Allocated by task 286: [ 20.814756] kasan_save_stack+0x45/0x70 [ 20.815054] kasan_save_track+0x18/0x40 [ 20.815250] kasan_save_alloc_info+0x3b/0x50 [ 20.815656] __kasan_kmalloc+0xb7/0xc0 [ 20.815937] __kmalloc_cache_noprof+0x189/0x420 [ 20.816229] kasan_atomics+0x95/0x310 [ 20.816783] kunit_try_run_case+0x1a5/0x480 [ 20.817534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.817968] kthread+0x337/0x6f0 [ 20.818408] ret_from_fork+0x41/0x80 [ 20.818673] ret_from_fork_asm+0x1a/0x30 [ 20.818930] [ 20.819139] The buggy address belongs to the object at ffff888101e04b00 [ 20.819139] which belongs to the cache kmalloc-64 of size 64 [ 20.819883] The buggy address is located 0 bytes to the right of [ 20.819883] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.820856] [ 20.821075] The buggy address belongs to the physical page: [ 20.821687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.822385] flags: 0x200000000000000(node=0|zone=2) [ 20.822963] page_type: f5(slab) [ 20.823332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.823915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.824523] page dumped because: kasan: bad access detected [ 20.824792] [ 20.824998] Memory state around the buggy address: [ 20.825483] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.826048] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.826944] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.827251] ^ [ 20.827485] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.827776] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.828825] ================================================================== [ 21.530520] ================================================================== [ 21.531037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 21.531546] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.532043] [ 21.532265] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.532387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.532420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.532468] Call Trace: [ 21.532539] <TASK> [ 21.532585] dump_stack_lvl+0x73/0xb0 [ 21.532672] print_report+0xd1/0x650 [ 21.532723] ? __virt_addr_valid+0x1db/0x2d0 [ 21.532791] ? kasan_atomics_helper+0x1f43/0x5450 [ 21.532861] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.532927] ? kasan_atomics_helper+0x1f43/0x5450 [ 21.532994] kasan_report+0x141/0x180 [ 21.533063] ? kasan_atomics_helper+0x1f43/0x5450 [ 21.533153] kasan_check_range+0x10c/0x1c0 [ 21.533205] __kasan_check_write+0x18/0x20 [ 21.533250] kasan_atomics_helper+0x1f43/0x5450 [ 21.533307] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.533364] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.533418] ? trace_hardirqs_on+0x37/0xe0 [ 21.533471] ? kasan_atomics+0x152/0x310 [ 21.533527] kasan_atomics+0x1dc/0x310 [ 21.533575] ? __pfx_kasan_atomics+0x10/0x10 [ 21.533627] ? __pfx_kasan_atomics+0x10/0x10 [ 21.533686] kunit_try_run_case+0x1a5/0x480 [ 21.533758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.533805] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.533859] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.533935] ? __kthread_parkme+0x82/0x180 [ 21.533984] ? preempt_count_sub+0x50/0x80 [ 21.534043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.534127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.534206] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.534260] kthread+0x337/0x6f0 [ 21.534304] ? trace_preempt_on+0x20/0xc0 [ 21.534360] ? __pfx_kthread+0x10/0x10 [ 21.534401] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.534440] ? calculate_sigpending+0x7b/0xa0 [ 21.534475] ? __pfx_kthread+0x10/0x10 [ 21.534498] ret_from_fork+0x41/0x80 [ 21.534526] ? __pfx_kthread+0x10/0x10 [ 21.534548] ret_from_fork_asm+0x1a/0x30 [ 21.534584] </TASK> [ 21.534601] [ 21.547050] Allocated by task 286: [ 21.547423] kasan_save_stack+0x45/0x70 [ 21.548501] kasan_save_track+0x18/0x40 [ 21.549634] kasan_save_alloc_info+0x3b/0x50 [ 21.549895] __kasan_kmalloc+0xb7/0xc0 [ 21.550082] __kmalloc_cache_noprof+0x189/0x420 [ 21.550278] kasan_atomics+0x95/0x310 [ 21.550450] kunit_try_run_case+0x1a5/0x480 [ 21.550632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.552942] kthread+0x337/0x6f0 [ 21.553660] ret_from_fork+0x41/0x80 [ 21.554600] ret_from_fork_asm+0x1a/0x30 [ 21.556288] [ 21.556879] The buggy address belongs to the object at ffff888101e04b00 [ 21.556879] which belongs to the cache kmalloc-64 of size 64 [ 21.559349] The buggy address is located 0 bytes to the right of [ 21.559349] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.560946] [ 21.561194] The buggy address belongs to the physical page: [ 21.561702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.562109] flags: 0x200000000000000(node=0|zone=2) [ 21.562807] page_type: f5(slab) [ 21.563340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.563792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.564184] page dumped because: kasan: bad access detected [ 21.564512] [ 21.565169] Memory state around the buggy address: [ 21.565532] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.566094] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.566484] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.566866] ^ [ 21.567158] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.567641] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.568091] ================================================================== [ 19.752543] ================================================================== [ 19.752981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 19.753503] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 19.754134] [ 19.754366] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.754520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.754547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.754591] Call Trace: [ 19.754635] <TASK> [ 19.754678] dump_stack_lvl+0x73/0xb0 [ 19.754763] print_report+0xd1/0x650 [ 19.754820] ? __virt_addr_valid+0x1db/0x2d0 [ 19.754878] ? kasan_atomics_helper+0x4ba2/0x5450 [ 19.754930] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.754980] ? kasan_atomics_helper+0x4ba2/0x5450 [ 19.755032] kasan_report+0x141/0x180 [ 19.755080] ? kasan_atomics_helper+0x4ba2/0x5450 [ 19.755181] __asan_report_store4_noabort+0x1b/0x30 [ 19.755230] kasan_atomics_helper+0x4ba2/0x5450 [ 19.755269] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.755307] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.755343] ? trace_hardirqs_on+0x37/0xe0 [ 19.755378] ? kasan_atomics+0x152/0x310 [ 19.755419] kasan_atomics+0x1dc/0x310 [ 19.755456] ? __pfx_kasan_atomics+0x10/0x10 [ 19.755496] ? __pfx_kasan_atomics+0x10/0x10 [ 19.755542] kunit_try_run_case+0x1a5/0x480 [ 19.755658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.755704] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.755793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.755868] ? __kthread_parkme+0x82/0x180 [ 19.755920] ? preempt_count_sub+0x50/0x80 [ 19.755987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.756038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.756089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.756175] kthread+0x337/0x6f0 [ 19.756242] ? trace_preempt_on+0x20/0xc0 [ 19.756296] ? __pfx_kthread+0x10/0x10 [ 19.756341] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.756390] ? calculate_sigpending+0x7b/0xa0 [ 19.756432] ? __pfx_kthread+0x10/0x10 [ 19.756482] ret_from_fork+0x41/0x80 [ 19.756520] ? __pfx_kthread+0x10/0x10 [ 19.756550] ret_from_fork_asm+0x1a/0x30 [ 19.756599] </TASK> [ 19.756621] [ 19.770908] Allocated by task 286: [ 19.771384] kasan_save_stack+0x45/0x70 [ 19.771828] kasan_save_track+0x18/0x40 [ 19.772195] kasan_save_alloc_info+0x3b/0x50 [ 19.772433] __kasan_kmalloc+0xb7/0xc0 [ 19.772803] __kmalloc_cache_noprof+0x189/0x420 [ 19.773083] kasan_atomics+0x95/0x310 [ 19.773394] kunit_try_run_case+0x1a5/0x480 [ 19.773617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.774129] kthread+0x337/0x6f0 [ 19.774454] ret_from_fork+0x41/0x80 [ 19.774823] ret_from_fork_asm+0x1a/0x30 [ 19.775131] [ 19.775287] The buggy address belongs to the object at ffff888101e04b00 [ 19.775287] which belongs to the cache kmalloc-64 of size 64 [ 19.775733] The buggy address is located 0 bytes to the right of [ 19.775733] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 19.776714] [ 19.776929] The buggy address belongs to the physical page: [ 19.777305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 19.777637] flags: 0x200000000000000(node=0|zone=2) [ 19.778077] page_type: f5(slab) [ 19.778422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.779039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.779492] page dumped because: kasan: bad access detected [ 19.779809] [ 19.779938] Memory state around the buggy address: [ 19.780370] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.780956] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.781385] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.781672] ^ [ 19.782085] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.782700] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.783204] ================================================================== [ 20.508998] ================================================================== [ 20.509601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 20.509952] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.510602] [ 20.510833] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.510956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.510990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.511037] Call Trace: [ 20.511085] <TASK> [ 20.511167] dump_stack_lvl+0x73/0xb0 [ 20.511241] print_report+0xd1/0x650 [ 20.511291] ? __virt_addr_valid+0x1db/0x2d0 [ 20.511345] ? kasan_atomics_helper+0xf10/0x5450 [ 20.511386] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.511439] ? kasan_atomics_helper+0xf10/0x5450 [ 20.511486] kasan_report+0x141/0x180 [ 20.511540] ? kasan_atomics_helper+0xf10/0x5450 [ 20.511601] kasan_check_range+0x10c/0x1c0 [ 20.511660] __kasan_check_write+0x18/0x20 [ 20.511706] kasan_atomics_helper+0xf10/0x5450 [ 20.511770] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.511824] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.511874] ? trace_hardirqs_on+0x37/0xe0 [ 20.511928] ? kasan_atomics+0x152/0x310 [ 20.511988] kasan_atomics+0x1dc/0x310 [ 20.512033] ? __pfx_kasan_atomics+0x10/0x10 [ 20.512059] ? __pfx_kasan_atomics+0x10/0x10 [ 20.512087] kunit_try_run_case+0x1a5/0x480 [ 20.512165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.512195] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.512224] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.512251] ? __kthread_parkme+0x82/0x180 [ 20.512278] ? preempt_count_sub+0x50/0x80 [ 20.512308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.512335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.512362] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.512387] kthread+0x337/0x6f0 [ 20.512409] ? trace_preempt_on+0x20/0xc0 [ 20.512436] ? __pfx_kthread+0x10/0x10 [ 20.512457] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.512482] ? calculate_sigpending+0x7b/0xa0 [ 20.512507] ? __pfx_kthread+0x10/0x10 [ 20.512529] ret_from_fork+0x41/0x80 [ 20.512554] ? __pfx_kthread+0x10/0x10 [ 20.512577] ret_from_fork_asm+0x1a/0x30 [ 20.512613] </TASK> [ 20.512629] [ 20.524924] Allocated by task 286: [ 20.525301] kasan_save_stack+0x45/0x70 [ 20.525712] kasan_save_track+0x18/0x40 [ 20.526041] kasan_save_alloc_info+0x3b/0x50 [ 20.526299] __kasan_kmalloc+0xb7/0xc0 [ 20.526509] __kmalloc_cache_noprof+0x189/0x420 [ 20.526802] kasan_atomics+0x95/0x310 [ 20.527209] kunit_try_run_case+0x1a5/0x480 [ 20.527604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.528070] kthread+0x337/0x6f0 [ 20.528409] ret_from_fork+0x41/0x80 [ 20.528783] ret_from_fork_asm+0x1a/0x30 [ 20.529144] [ 20.529325] The buggy address belongs to the object at ffff888101e04b00 [ 20.529325] which belongs to the cache kmalloc-64 of size 64 [ 20.529931] The buggy address is located 0 bytes to the right of [ 20.529931] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.530850] [ 20.531055] The buggy address belongs to the physical page: [ 20.531522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.531994] flags: 0x200000000000000(node=0|zone=2) [ 20.532489] page_type: f5(slab) [ 20.532825] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.533337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.533677] page dumped because: kasan: bad access detected [ 20.534221] [ 20.534432] Memory state around the buggy address: [ 20.534881] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.535495] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.535820] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.536081] ^ [ 20.536600] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.536924] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.537866] ================================================================== [ 20.665999] ================================================================== [ 20.666700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 20.667349] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.667857] [ 20.668152] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.668285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.668320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.668384] Call Trace: [ 20.668431] <TASK> [ 20.668478] dump_stack_lvl+0x73/0xb0 [ 20.668564] print_report+0xd1/0x650 [ 20.668636] ? __virt_addr_valid+0x1db/0x2d0 [ 20.668695] ? kasan_atomics_helper+0x1148/0x5450 [ 20.668743] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.668807] ? kasan_atomics_helper+0x1148/0x5450 [ 20.668867] kasan_report+0x141/0x180 [ 20.668936] ? kasan_atomics_helper+0x1148/0x5450 [ 20.668994] kasan_check_range+0x10c/0x1c0 [ 20.669030] __kasan_check_write+0x18/0x20 [ 20.669054] kasan_atomics_helper+0x1148/0x5450 [ 20.669080] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.669126] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.669171] ? trace_hardirqs_on+0x37/0xe0 [ 20.669216] ? kasan_atomics+0x152/0x310 [ 20.669261] kasan_atomics+0x1dc/0x310 [ 20.669298] ? __pfx_kasan_atomics+0x10/0x10 [ 20.669342] ? __pfx_kasan_atomics+0x10/0x10 [ 20.669395] kunit_try_run_case+0x1a5/0x480 [ 20.669460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.669523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.669582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.669634] ? __kthread_parkme+0x82/0x180 [ 20.669685] ? preempt_count_sub+0x50/0x80 [ 20.669755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.669811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.669868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.669917] kthread+0x337/0x6f0 [ 20.669957] ? trace_preempt_on+0x20/0xc0 [ 20.670012] ? __pfx_kthread+0x10/0x10 [ 20.670058] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.670108] ? calculate_sigpending+0x7b/0xa0 [ 20.670152] ? __pfx_kthread+0x10/0x10 [ 20.670201] ret_from_fork+0x41/0x80 [ 20.670252] ? __pfx_kthread+0x10/0x10 [ 20.670316] ret_from_fork_asm+0x1a/0x30 [ 20.670397] </TASK> [ 20.670431] [ 20.682935] Allocated by task 286: [ 20.683476] kasan_save_stack+0x45/0x70 [ 20.683837] kasan_save_track+0x18/0x40 [ 20.684189] kasan_save_alloc_info+0x3b/0x50 [ 20.684466] __kasan_kmalloc+0xb7/0xc0 [ 20.684679] __kmalloc_cache_noprof+0x189/0x420 [ 20.685162] kasan_atomics+0x95/0x310 [ 20.685659] kunit_try_run_case+0x1a5/0x480 [ 20.686033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.686536] kthread+0x337/0x6f0 [ 20.686741] ret_from_fork+0x41/0x80 [ 20.686965] ret_from_fork_asm+0x1a/0x30 [ 20.687178] [ 20.687312] The buggy address belongs to the object at ffff888101e04b00 [ 20.687312] which belongs to the cache kmalloc-64 of size 64 [ 20.687920] The buggy address is located 0 bytes to the right of [ 20.687920] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.688886] [ 20.689170] The buggy address belongs to the physical page: [ 20.689636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.689993] flags: 0x200000000000000(node=0|zone=2) [ 20.690488] page_type: f5(slab) [ 20.690802] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.691347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.691812] page dumped because: kasan: bad access detected [ 20.692110] [ 20.692297] Memory state around the buggy address: [ 20.692659] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.693155] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.693493] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.693796] ^ [ 20.694151] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.694794] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.695495] ================================================================== [ 20.245975] ================================================================== [ 20.246724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 20.247267] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.247720] [ 20.248000] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.248166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.248203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.248256] Call Trace: [ 20.248304] <TASK> [ 20.248359] dump_stack_lvl+0x73/0xb0 [ 20.248453] print_report+0xd1/0x650 [ 20.248509] ? __virt_addr_valid+0x1db/0x2d0 [ 20.248570] ? kasan_atomics_helper+0xa2b/0x5450 [ 20.248621] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.248680] ? kasan_atomics_helper+0xa2b/0x5450 [ 20.248737] kasan_report+0x141/0x180 [ 20.248799] ? kasan_atomics_helper+0xa2b/0x5450 [ 20.248853] kasan_check_range+0x10c/0x1c0 [ 20.248880] __kasan_check_write+0x18/0x20 [ 20.248904] kasan_atomics_helper+0xa2b/0x5450 [ 20.248931] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.248958] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.248984] ? trace_hardirqs_on+0x37/0xe0 [ 20.249011] ? kasan_atomics+0x152/0x310 [ 20.249038] kasan_atomics+0x1dc/0x310 [ 20.249061] ? __pfx_kasan_atomics+0x10/0x10 [ 20.249085] ? __pfx_kasan_atomics+0x10/0x10 [ 20.249165] kunit_try_run_case+0x1a5/0x480 [ 20.249202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.249228] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.249257] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.249283] ? __kthread_parkme+0x82/0x180 [ 20.249310] ? preempt_count_sub+0x50/0x80 [ 20.249340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.249367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.249393] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.249419] kthread+0x337/0x6f0 [ 20.249440] ? trace_preempt_on+0x20/0xc0 [ 20.249466] ? __pfx_kthread+0x10/0x10 [ 20.249489] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.249513] ? calculate_sigpending+0x7b/0xa0 [ 20.249539] ? __pfx_kthread+0x10/0x10 [ 20.249561] ret_from_fork+0x41/0x80 [ 20.249586] ? __pfx_kthread+0x10/0x10 [ 20.249609] ret_from_fork_asm+0x1a/0x30 [ 20.249646] </TASK> [ 20.249663] [ 20.260998] Allocated by task 286: [ 20.261482] kasan_save_stack+0x45/0x70 [ 20.261926] kasan_save_track+0x18/0x40 [ 20.262309] kasan_save_alloc_info+0x3b/0x50 [ 20.262702] __kasan_kmalloc+0xb7/0xc0 [ 20.263049] __kmalloc_cache_noprof+0x189/0x420 [ 20.263492] kasan_atomics+0x95/0x310 [ 20.263878] kunit_try_run_case+0x1a5/0x480 [ 20.264179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.264627] kthread+0x337/0x6f0 [ 20.264965] ret_from_fork+0x41/0x80 [ 20.265278] ret_from_fork_asm+0x1a/0x30 [ 20.265632] [ 20.265830] The buggy address belongs to the object at ffff888101e04b00 [ 20.265830] which belongs to the cache kmalloc-64 of size 64 [ 20.266585] The buggy address is located 0 bytes to the right of [ 20.266585] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.267489] [ 20.267679] The buggy address belongs to the physical page: [ 20.267920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.268576] flags: 0x200000000000000(node=0|zone=2) [ 20.269043] page_type: f5(slab) [ 20.269305] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.269662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.270285] page dumped because: kasan: bad access detected [ 20.270584] [ 20.270808] Memory state around the buggy address: [ 20.271192] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.271533] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.271938] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.272535] ^ [ 20.272836] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.273165] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.273716] ================================================================== [ 21.160401] ================================================================== [ 21.160783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 21.161175] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.161881] [ 21.162104] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.162227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.162256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.162317] Call Trace: [ 21.162363] <TASK> [ 21.162407] dump_stack_lvl+0x73/0xb0 [ 21.162463] print_report+0xd1/0x650 [ 21.162501] ? __virt_addr_valid+0x1db/0x2d0 [ 21.162539] ? kasan_atomics_helper+0x1818/0x5450 [ 21.162575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.162611] ? kasan_atomics_helper+0x1818/0x5450 [ 21.162646] kasan_report+0x141/0x180 [ 21.162683] ? kasan_atomics_helper+0x1818/0x5450 [ 21.162731] kasan_check_range+0x10c/0x1c0 [ 21.162793] __kasan_check_write+0x18/0x20 [ 21.162839] kasan_atomics_helper+0x1818/0x5450 [ 21.162887] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.162948] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.163013] ? trace_hardirqs_on+0x37/0xe0 [ 21.163061] ? kasan_atomics+0x152/0x310 [ 21.163112] kasan_atomics+0x1dc/0x310 [ 21.163181] ? __pfx_kasan_atomics+0x10/0x10 [ 21.163236] ? __pfx_kasan_atomics+0x10/0x10 [ 21.163308] kunit_try_run_case+0x1a5/0x480 [ 21.163372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.163422] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.163487] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.163539] ? __kthread_parkme+0x82/0x180 [ 21.163610] ? preempt_count_sub+0x50/0x80 [ 21.163675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.163722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.163789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.163842] kthread+0x337/0x6f0 [ 21.163895] ? trace_preempt_on+0x20/0xc0 [ 21.163964] ? __pfx_kthread+0x10/0x10 [ 21.164010] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.164058] ? calculate_sigpending+0x7b/0xa0 [ 21.164110] ? __pfx_kthread+0x10/0x10 [ 21.164177] ret_from_fork+0x41/0x80 [ 21.164247] ? __pfx_kthread+0x10/0x10 [ 21.164296] ret_from_fork_asm+0x1a/0x30 [ 21.164372] </TASK> [ 21.164414] [ 21.175616] Allocated by task 286: [ 21.176083] kasan_save_stack+0x45/0x70 [ 21.176437] kasan_save_track+0x18/0x40 [ 21.176779] kasan_save_alloc_info+0x3b/0x50 [ 21.177167] __kasan_kmalloc+0xb7/0xc0 [ 21.177416] __kmalloc_cache_noprof+0x189/0x420 [ 21.177819] kasan_atomics+0x95/0x310 [ 21.178194] kunit_try_run_case+0x1a5/0x480 [ 21.178416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.178891] kthread+0x337/0x6f0 [ 21.179073] ret_from_fork+0x41/0x80 [ 21.179444] ret_from_fork_asm+0x1a/0x30 [ 21.179853] [ 21.180050] The buggy address belongs to the object at ffff888101e04b00 [ 21.180050] which belongs to the cache kmalloc-64 of size 64 [ 21.180742] The buggy address is located 0 bytes to the right of [ 21.180742] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.181571] [ 21.181722] The buggy address belongs to the physical page: [ 21.182230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.182594] flags: 0x200000000000000(node=0|zone=2) [ 21.182954] page_type: f5(slab) [ 21.183331] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.183940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.184470] page dumped because: kasan: bad access detected [ 21.184980] [ 21.185211] Memory state around the buggy address: [ 21.185486] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.185796] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.186077] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.186356] ^ [ 21.186587] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.187005] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.187562] ================================================================== [ 21.635616] ================================================================== [ 21.636757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 21.637331] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.637686] [ 21.637928] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.638054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.638086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.638167] Call Trace: [ 21.638214] <TASK> [ 21.638257] dump_stack_lvl+0x73/0xb0 [ 21.638336] print_report+0xd1/0x650 [ 21.638388] ? __virt_addr_valid+0x1db/0x2d0 [ 21.638437] ? kasan_atomics_helper+0x4f98/0x5450 [ 21.638483] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.638529] ? kasan_atomics_helper+0x4f98/0x5450 [ 21.638581] kasan_report+0x141/0x180 [ 21.638636] ? kasan_atomics_helper+0x4f98/0x5450 [ 21.638698] __asan_report_load8_noabort+0x18/0x20 [ 21.638758] kasan_atomics_helper+0x4f98/0x5450 [ 21.638816] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.638869] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.638914] ? trace_hardirqs_on+0x37/0xe0 [ 21.638955] ? kasan_atomics+0x152/0x310 [ 21.638985] kasan_atomics+0x1dc/0x310 [ 21.639009] ? __pfx_kasan_atomics+0x10/0x10 [ 21.639034] ? __pfx_kasan_atomics+0x10/0x10 [ 21.639062] kunit_try_run_case+0x1a5/0x480 [ 21.639093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.639149] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.639183] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.639210] ? __kthread_parkme+0x82/0x180 [ 21.639237] ? preempt_count_sub+0x50/0x80 [ 21.639267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.639295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.639322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.639347] kthread+0x337/0x6f0 [ 21.639368] ? trace_preempt_on+0x20/0xc0 [ 21.639393] ? __pfx_kthread+0x10/0x10 [ 21.639414] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.639439] ? calculate_sigpending+0x7b/0xa0 [ 21.639464] ? __pfx_kthread+0x10/0x10 [ 21.639488] ret_from_fork+0x41/0x80 [ 21.639513] ? __pfx_kthread+0x10/0x10 [ 21.639535] ret_from_fork_asm+0x1a/0x30 [ 21.639572] </TASK> [ 21.639588] [ 21.652892] Allocated by task 286: [ 21.653296] kasan_save_stack+0x45/0x70 [ 21.653640] kasan_save_track+0x18/0x40 [ 21.654380] kasan_save_alloc_info+0x3b/0x50 [ 21.654633] __kasan_kmalloc+0xb7/0xc0 [ 21.655071] __kmalloc_cache_noprof+0x189/0x420 [ 21.655511] kasan_atomics+0x95/0x310 [ 21.655832] kunit_try_run_case+0x1a5/0x480 [ 21.656055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.656310] kthread+0x337/0x6f0 [ 21.656624] ret_from_fork+0x41/0x80 [ 21.657043] ret_from_fork_asm+0x1a/0x30 [ 21.657563] [ 21.657768] The buggy address belongs to the object at ffff888101e04b00 [ 21.657768] which belongs to the cache kmalloc-64 of size 64 [ 21.658357] The buggy address is located 0 bytes to the right of [ 21.658357] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.659672] [ 21.659846] The buggy address belongs to the physical page: [ 21.660094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.660890] flags: 0x200000000000000(node=0|zone=2) [ 21.661189] page_type: f5(slab) [ 21.661560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.662043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.662699] page dumped because: kasan: bad access detected [ 21.663081] [ 21.663219] Memory state around the buggy address: [ 21.663742] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.664250] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.664920] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.665728] ^ [ 21.666017] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.666334] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.666830] ================================================================== [ 20.409572] ================================================================== [ 20.410055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 20.411051] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.411825] [ 20.412084] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.412204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.412237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.412284] Call Trace: [ 20.412330] <TASK> [ 20.412378] dump_stack_lvl+0x73/0xb0 [ 20.412459] print_report+0xd1/0x650 [ 20.412504] ? __virt_addr_valid+0x1db/0x2d0 [ 20.412534] ? kasan_atomics_helper+0xd47/0x5450 [ 20.412575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.412602] ? kasan_atomics_helper+0xd47/0x5450 [ 20.412627] kasan_report+0x141/0x180 [ 20.412653] ? kasan_atomics_helper+0xd47/0x5450 [ 20.412683] kasan_check_range+0x10c/0x1c0 [ 20.412708] __kasan_check_write+0x18/0x20 [ 20.412731] kasan_atomics_helper+0xd47/0x5450 [ 20.412782] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.412809] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.412834] ? trace_hardirqs_on+0x37/0xe0 [ 20.412861] ? kasan_atomics+0x152/0x310 [ 20.412887] kasan_atomics+0x1dc/0x310 [ 20.412910] ? __pfx_kasan_atomics+0x10/0x10 [ 20.412933] ? __pfx_kasan_atomics+0x10/0x10 [ 20.412961] kunit_try_run_case+0x1a5/0x480 [ 20.412990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.413015] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.413043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.413069] ? __kthread_parkme+0x82/0x180 [ 20.413095] ? preempt_count_sub+0x50/0x80 [ 20.413158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.413189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.413217] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.413242] kthread+0x337/0x6f0 [ 20.413264] ? trace_preempt_on+0x20/0xc0 [ 20.413290] ? __pfx_kthread+0x10/0x10 [ 20.413311] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.413335] ? calculate_sigpending+0x7b/0xa0 [ 20.413361] ? __pfx_kthread+0x10/0x10 [ 20.413383] ret_from_fork+0x41/0x80 [ 20.413410] ? __pfx_kthread+0x10/0x10 [ 20.413432] ret_from_fork_asm+0x1a/0x30 [ 20.413467] </TASK> [ 20.413483] [ 20.425936] Allocated by task 286: [ 20.426387] kasan_save_stack+0x45/0x70 [ 20.426638] kasan_save_track+0x18/0x40 [ 20.426879] kasan_save_alloc_info+0x3b/0x50 [ 20.428231] __kasan_kmalloc+0xb7/0xc0 [ 20.428649] __kmalloc_cache_noprof+0x189/0x420 [ 20.428913] kasan_atomics+0x95/0x310 [ 20.429155] kunit_try_run_case+0x1a5/0x480 [ 20.429328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.429502] kthread+0x337/0x6f0 [ 20.429601] ret_from_fork+0x41/0x80 [ 20.429705] ret_from_fork_asm+0x1a/0x30 [ 20.430547] [ 20.430797] The buggy address belongs to the object at ffff888101e04b00 [ 20.430797] which belongs to the cache kmalloc-64 of size 64 [ 20.432031] The buggy address is located 0 bytes to the right of [ 20.432031] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.432523] [ 20.432668] The buggy address belongs to the physical page: [ 20.432965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.433553] flags: 0x200000000000000(node=0|zone=2) [ 20.433949] page_type: f5(slab) [ 20.434335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.434793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.435436] page dumped because: kasan: bad access detected [ 20.435872] [ 20.436077] Memory state around the buggy address: [ 20.436519] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.437020] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.437656] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.438131] ^ [ 20.438489] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.438838] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.439452] ================================================================== [ 21.569468] ================================================================== [ 21.569966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 21.570316] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.570953] [ 21.572123] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.572258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.572291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.572336] Call Trace: [ 21.572380] <TASK> [ 21.572425] dump_stack_lvl+0x73/0xb0 [ 21.572511] print_report+0xd1/0x650 [ 21.572569] ? __virt_addr_valid+0x1db/0x2d0 [ 21.572623] ? kasan_atomics_helper+0x4f71/0x5450 [ 21.572667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.572714] ? kasan_atomics_helper+0x4f71/0x5450 [ 21.572778] kasan_report+0x141/0x180 [ 21.572837] ? kasan_atomics_helper+0x4f71/0x5450 [ 21.572892] __asan_report_load8_noabort+0x18/0x20 [ 21.572919] kasan_atomics_helper+0x4f71/0x5450 [ 21.572945] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.572971] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.572997] ? trace_hardirqs_on+0x37/0xe0 [ 21.573023] ? kasan_atomics+0x152/0x310 [ 21.573050] kasan_atomics+0x1dc/0x310 [ 21.573073] ? __pfx_kasan_atomics+0x10/0x10 [ 21.573097] ? __pfx_kasan_atomics+0x10/0x10 [ 21.573167] kunit_try_run_case+0x1a5/0x480 [ 21.573202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.573226] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.573255] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.573281] ? __kthread_parkme+0x82/0x180 [ 21.573307] ? preempt_count_sub+0x50/0x80 [ 21.573336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.573363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.573389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.573415] kthread+0x337/0x6f0 [ 21.573436] ? trace_preempt_on+0x20/0xc0 [ 21.573461] ? __pfx_kthread+0x10/0x10 [ 21.573482] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.573506] ? calculate_sigpending+0x7b/0xa0 [ 21.573532] ? __pfx_kthread+0x10/0x10 [ 21.573554] ret_from_fork+0x41/0x80 [ 21.573581] ? __pfx_kthread+0x10/0x10 [ 21.573602] ret_from_fork_asm+0x1a/0x30 [ 21.573639] </TASK> [ 21.573656] [ 21.587325] Allocated by task 286: [ 21.587759] kasan_save_stack+0x45/0x70 [ 21.588169] kasan_save_track+0x18/0x40 [ 21.588521] kasan_save_alloc_info+0x3b/0x50 [ 21.588908] __kasan_kmalloc+0xb7/0xc0 [ 21.589376] __kmalloc_cache_noprof+0x189/0x420 [ 21.589611] kasan_atomics+0x95/0x310 [ 21.590317] kunit_try_run_case+0x1a5/0x480 [ 21.591801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.592253] kthread+0x337/0x6f0 [ 21.592517] ret_from_fork+0x41/0x80 [ 21.592788] ret_from_fork_asm+0x1a/0x30 [ 21.593048] [ 21.593672] The buggy address belongs to the object at ffff888101e04b00 [ 21.593672] which belongs to the cache kmalloc-64 of size 64 [ 21.594486] The buggy address is located 0 bytes to the right of [ 21.594486] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.595178] [ 21.595391] The buggy address belongs to the physical page: [ 21.595785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.596171] flags: 0x200000000000000(node=0|zone=2) [ 21.596674] page_type: f5(slab) [ 21.596927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.597289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.597890] page dumped because: kasan: bad access detected [ 21.598338] [ 21.598482] Memory state around the buggy address: [ 21.598718] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.599290] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.599915] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.600253] ^ [ 21.600944] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.601818] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.602113] ================================================================== [ 21.284425] ================================================================== [ 21.285368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 21.285708] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.286400] [ 21.286667] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.286797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.286825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.286865] Call Trace: [ 21.286904] <TASK> [ 21.286942] dump_stack_lvl+0x73/0xb0 [ 21.287005] print_report+0xd1/0x650 [ 21.287046] ? __virt_addr_valid+0x1db/0x2d0 [ 21.287088] ? kasan_atomics_helper+0x1a7f/0x5450 [ 21.287160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.287204] ? kasan_atomics_helper+0x1a7f/0x5450 [ 21.287249] kasan_report+0x141/0x180 [ 21.287297] ? kasan_atomics_helper+0x1a7f/0x5450 [ 21.287352] kasan_check_range+0x10c/0x1c0 [ 21.287395] __kasan_check_write+0x18/0x20 [ 21.287435] kasan_atomics_helper+0x1a7f/0x5450 [ 21.287483] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.287529] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.287571] ? trace_hardirqs_on+0x37/0xe0 [ 21.287612] ? kasan_atomics+0x152/0x310 [ 21.287671] kasan_atomics+0x1dc/0x310 [ 21.287707] ? __pfx_kasan_atomics+0x10/0x10 [ 21.287762] ? __pfx_kasan_atomics+0x10/0x10 [ 21.287811] kunit_try_run_case+0x1a5/0x480 [ 21.287861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.287908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.287960] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.288017] ? __kthread_parkme+0x82/0x180 [ 21.288070] ? preempt_count_sub+0x50/0x80 [ 21.288164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.288224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.288282] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.288338] kthread+0x337/0x6f0 [ 21.288383] ? trace_preempt_on+0x20/0xc0 [ 21.288440] ? __pfx_kthread+0x10/0x10 [ 21.288481] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.288521] ? calculate_sigpending+0x7b/0xa0 [ 21.288563] ? __pfx_kthread+0x10/0x10 [ 21.288595] ret_from_fork+0x41/0x80 [ 21.288638] ? __pfx_kthread+0x10/0x10 [ 21.288671] ret_from_fork_asm+0x1a/0x30 [ 21.288732] </TASK> [ 21.288782] [ 21.304145] Allocated by task 286: [ 21.304524] kasan_save_stack+0x45/0x70 [ 21.304984] kasan_save_track+0x18/0x40 [ 21.305295] kasan_save_alloc_info+0x3b/0x50 [ 21.305561] __kasan_kmalloc+0xb7/0xc0 [ 21.305895] __kmalloc_cache_noprof+0x189/0x420 [ 21.306345] kasan_atomics+0x95/0x310 [ 21.306689] kunit_try_run_case+0x1a5/0x480 [ 21.307088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.307508] kthread+0x337/0x6f0 [ 21.307795] ret_from_fork+0x41/0x80 [ 21.308000] ret_from_fork_asm+0x1a/0x30 [ 21.308377] [ 21.308570] The buggy address belongs to the object at ffff888101e04b00 [ 21.308570] which belongs to the cache kmalloc-64 of size 64 [ 21.309138] The buggy address is located 0 bytes to the right of [ 21.309138] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.309612] [ 21.309758] The buggy address belongs to the physical page: [ 21.310171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.310730] flags: 0x200000000000000(node=0|zone=2) [ 21.311151] page_type: f5(slab) [ 21.311459] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.312065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.312644] page dumped because: kasan: bad access detected [ 21.313067] [ 21.313286] Memory state around the buggy address: [ 21.313662] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.313971] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.314299] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.314586] ^ [ 21.314879] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.315421] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.315935] ================================================================== [ 21.253562] ================================================================== [ 21.254307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 21.254872] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.255225] [ 21.255402] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.255525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.255557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.255612] Call Trace: [ 21.255669] <TASK> [ 21.255755] dump_stack_lvl+0x73/0xb0 [ 21.255827] print_report+0xd1/0x650 [ 21.255881] ? __virt_addr_valid+0x1db/0x2d0 [ 21.255937] ? kasan_atomics_helper+0x19e3/0x5450 [ 21.255990] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.256046] ? kasan_atomics_helper+0x19e3/0x5450 [ 21.256146] kasan_report+0x141/0x180 [ 21.256197] ? kasan_atomics_helper+0x19e3/0x5450 [ 21.256258] kasan_check_range+0x10c/0x1c0 [ 21.256309] __kasan_check_write+0x18/0x20 [ 21.256354] kasan_atomics_helper+0x19e3/0x5450 [ 21.256410] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.256456] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.256529] ? trace_hardirqs_on+0x37/0xe0 [ 21.256578] ? kasan_atomics+0x152/0x310 [ 21.256634] kasan_atomics+0x1dc/0x310 [ 21.256685] ? __pfx_kasan_atomics+0x10/0x10 [ 21.256734] ? __pfx_kasan_atomics+0x10/0x10 [ 21.256805] kunit_try_run_case+0x1a5/0x480 [ 21.256867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.256921] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.256980] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.257038] ? __kthread_parkme+0x82/0x180 [ 21.257090] ? preempt_count_sub+0x50/0x80 [ 21.257151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.257185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.257212] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.257238] kthread+0x337/0x6f0 [ 21.257259] ? trace_preempt_on+0x20/0xc0 [ 21.257284] ? __pfx_kthread+0x10/0x10 [ 21.257305] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.257330] ? calculate_sigpending+0x7b/0xa0 [ 21.257355] ? __pfx_kthread+0x10/0x10 [ 21.257377] ret_from_fork+0x41/0x80 [ 21.257404] ? __pfx_kthread+0x10/0x10 [ 21.257426] ret_from_fork_asm+0x1a/0x30 [ 21.257464] </TASK> [ 21.257482] [ 21.269594] Allocated by task 286: [ 21.270025] kasan_save_stack+0x45/0x70 [ 21.270482] kasan_save_track+0x18/0x40 [ 21.270835] kasan_save_alloc_info+0x3b/0x50 [ 21.271210] __kasan_kmalloc+0xb7/0xc0 [ 21.272099] __kmalloc_cache_noprof+0x189/0x420 [ 21.272464] kasan_atomics+0x95/0x310 [ 21.272677] kunit_try_run_case+0x1a5/0x480 [ 21.272997] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.273569] kthread+0x337/0x6f0 [ 21.273881] ret_from_fork+0x41/0x80 [ 21.274262] ret_from_fork_asm+0x1a/0x30 [ 21.274528] [ 21.274771] The buggy address belongs to the object at ffff888101e04b00 [ 21.274771] which belongs to the cache kmalloc-64 of size 64 [ 21.275561] The buggy address is located 0 bytes to the right of [ 21.275561] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.276279] [ 21.276493] The buggy address belongs to the physical page: [ 21.276803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.277142] flags: 0x200000000000000(node=0|zone=2) [ 21.277642] page_type: f5(slab) [ 21.278092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.278801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.279392] page dumped because: kasan: bad access detected [ 21.279759] [ 21.279875] Memory state around the buggy address: [ 21.280065] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.280654] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.281254] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.281886] ^ [ 21.282333] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.282785] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.283068] ================================================================== [ 21.603976] ================================================================== [ 21.604435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 21.604817] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.605397] [ 21.605625] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.605759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.605790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.605834] Call Trace: [ 21.605880] <TASK> [ 21.605925] dump_stack_lvl+0x73/0xb0 [ 21.606004] print_report+0xd1/0x650 [ 21.606062] ? __virt_addr_valid+0x1db/0x2d0 [ 21.606114] ? kasan_atomics_helper+0x2006/0x5450 [ 21.606165] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.606210] ? kasan_atomics_helper+0x2006/0x5450 [ 21.606254] kasan_report+0x141/0x180 [ 21.606305] ? kasan_atomics_helper+0x2006/0x5450 [ 21.606362] kasan_check_range+0x10c/0x1c0 [ 21.606413] __kasan_check_write+0x18/0x20 [ 21.606457] kasan_atomics_helper+0x2006/0x5450 [ 21.606504] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.606547] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.606592] ? trace_hardirqs_on+0x37/0xe0 [ 21.606640] ? kasan_atomics+0x152/0x310 [ 21.606697] kasan_atomics+0x1dc/0x310 [ 21.606791] ? __pfx_kasan_atomics+0x10/0x10 [ 21.606837] ? __pfx_kasan_atomics+0x10/0x10 [ 21.606866] kunit_try_run_case+0x1a5/0x480 [ 21.606897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.606923] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.606952] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.606979] ? __kthread_parkme+0x82/0x180 [ 21.607005] ? preempt_count_sub+0x50/0x80 [ 21.607034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.607060] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.607085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.607139] kthread+0x337/0x6f0 [ 21.607169] ? trace_preempt_on+0x20/0xc0 [ 21.607194] ? __pfx_kthread+0x10/0x10 [ 21.607217] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.607242] ? calculate_sigpending+0x7b/0xa0 [ 21.607268] ? __pfx_kthread+0x10/0x10 [ 21.607289] ret_from_fork+0x41/0x80 [ 21.607317] ? __pfx_kthread+0x10/0x10 [ 21.607338] ret_from_fork_asm+0x1a/0x30 [ 21.607376] </TASK> [ 21.607393] [ 21.619760] Allocated by task 286: [ 21.620302] kasan_save_stack+0x45/0x70 [ 21.620858] kasan_save_track+0x18/0x40 [ 21.621322] kasan_save_alloc_info+0x3b/0x50 [ 21.621710] __kasan_kmalloc+0xb7/0xc0 [ 21.621940] __kmalloc_cache_noprof+0x189/0x420 [ 21.622324] kasan_atomics+0x95/0x310 [ 21.622855] kunit_try_run_case+0x1a5/0x480 [ 21.623297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.623826] kthread+0x337/0x6f0 [ 21.624254] ret_from_fork+0x41/0x80 [ 21.624570] ret_from_fork_asm+0x1a/0x30 [ 21.625035] [ 21.625238] The buggy address belongs to the object at ffff888101e04b00 [ 21.625238] which belongs to the cache kmalloc-64 of size 64 [ 21.626243] The buggy address is located 0 bytes to the right of [ 21.626243] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.627182] [ 21.627409] The buggy address belongs to the physical page: [ 21.627817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.628565] flags: 0x200000000000000(node=0|zone=2) [ 21.628922] page_type: f5(slab) [ 21.629337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.630016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.630684] page dumped because: kasan: bad access detected [ 21.631004] [ 21.631152] Memory state around the buggy address: [ 21.631765] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.632569] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.633091] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.633431] ^ [ 21.633651] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.634112] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.634490] ================================================================== [ 21.759496] ================================================================== [ 21.760073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 21.760728] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.761037] [ 21.761295] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.761423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.761453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.761504] Call Trace: [ 21.761559] <TASK> [ 21.761605] dump_stack_lvl+0x73/0xb0 [ 21.761693] print_report+0xd1/0x650 [ 21.761758] ? __virt_addr_valid+0x1db/0x2d0 [ 21.761823] ? kasan_atomics_helper+0x4fa5/0x5450 [ 21.761890] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.761944] ? kasan_atomics_helper+0x4fa5/0x5450 [ 21.761995] kasan_report+0x141/0x180 [ 21.762046] ? kasan_atomics_helper+0x4fa5/0x5450 [ 21.762153] __asan_report_load8_noabort+0x18/0x20 [ 21.762207] kasan_atomics_helper+0x4fa5/0x5450 [ 21.762262] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.762323] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.762392] ? trace_hardirqs_on+0x37/0xe0 [ 21.762447] ? kasan_atomics+0x152/0x310 [ 21.762509] kasan_atomics+0x1dc/0x310 [ 21.762555] ? __pfx_kasan_atomics+0x10/0x10 [ 21.762602] ? __pfx_kasan_atomics+0x10/0x10 [ 21.762661] kunit_try_run_case+0x1a5/0x480 [ 21.762721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.762778] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.762834] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.762886] ? __kthread_parkme+0x82/0x180 [ 21.762947] ? preempt_count_sub+0x50/0x80 [ 21.763026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.763086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.763178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.763237] kthread+0x337/0x6f0 [ 21.763285] ? trace_preempt_on+0x20/0xc0 [ 21.763342] ? __pfx_kthread+0x10/0x10 [ 21.763390] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.763436] ? calculate_sigpending+0x7b/0xa0 [ 21.763479] ? __pfx_kthread+0x10/0x10 [ 21.763520] ret_from_fork+0x41/0x80 [ 21.763564] ? __pfx_kthread+0x10/0x10 [ 21.763607] ret_from_fork_asm+0x1a/0x30 [ 21.763694] </TASK> [ 21.763724] [ 21.775968] Allocated by task 286: [ 21.776330] kasan_save_stack+0x45/0x70 [ 21.776614] kasan_save_track+0x18/0x40 [ 21.777044] kasan_save_alloc_info+0x3b/0x50 [ 21.777489] __kasan_kmalloc+0xb7/0xc0 [ 21.777936] __kmalloc_cache_noprof+0x189/0x420 [ 21.778461] kasan_atomics+0x95/0x310 [ 21.778829] kunit_try_run_case+0x1a5/0x480 [ 21.779126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.779422] kthread+0x337/0x6f0 [ 21.779711] ret_from_fork+0x41/0x80 [ 21.779956] ret_from_fork_asm+0x1a/0x30 [ 21.780224] [ 21.780411] The buggy address belongs to the object at ffff888101e04b00 [ 21.780411] which belongs to the cache kmalloc-64 of size 64 [ 21.781068] The buggy address is located 0 bytes to the right of [ 21.781068] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.781792] [ 21.781982] The buggy address belongs to the physical page: [ 21.782364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.782806] flags: 0x200000000000000(node=0|zone=2) [ 21.783161] page_type: f5(slab) [ 21.783461] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.783884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.784338] page dumped because: kasan: bad access detected [ 21.784653] [ 21.784853] Memory state around the buggy address: [ 21.785165] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.785564] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.785945] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.786402] ^ [ 21.786645] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.787135] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.787575] ================================================================== [ 20.007997] ================================================================== [ 20.008535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 20.008954] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.010178] [ 20.010452] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.010626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.010675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.010726] Call Trace: [ 20.010782] <TASK> [ 20.010836] dump_stack_lvl+0x73/0xb0 [ 20.010919] print_report+0xd1/0x650 [ 20.010966] ? __virt_addr_valid+0x1db/0x2d0 [ 20.011000] ? kasan_atomics_helper+0x5fe/0x5450 [ 20.011026] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.011051] ? kasan_atomics_helper+0x5fe/0x5450 [ 20.011077] kasan_report+0x141/0x180 [ 20.011119] ? kasan_atomics_helper+0x5fe/0x5450 [ 20.011187] kasan_check_range+0x10c/0x1c0 [ 20.011213] __kasan_check_write+0x18/0x20 [ 20.011236] kasan_atomics_helper+0x5fe/0x5450 [ 20.011264] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.011289] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.011314] ? trace_hardirqs_on+0x37/0xe0 [ 20.011339] ? kasan_atomics+0x152/0x310 [ 20.011367] kasan_atomics+0x1dc/0x310 [ 20.011390] ? __pfx_kasan_atomics+0x10/0x10 [ 20.011414] ? __pfx_kasan_atomics+0x10/0x10 [ 20.011441] kunit_try_run_case+0x1a5/0x480 [ 20.011471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.011496] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.011524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.011550] ? __kthread_parkme+0x82/0x180 [ 20.011575] ? preempt_count_sub+0x50/0x80 [ 20.011604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.011649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.011731] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.011829] kthread+0x337/0x6f0 [ 20.011862] ? trace_preempt_on+0x20/0xc0 [ 20.011891] ? __pfx_kthread+0x10/0x10 [ 20.011915] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.011939] ? calculate_sigpending+0x7b/0xa0 [ 20.011965] ? __pfx_kthread+0x10/0x10 [ 20.011986] ret_from_fork+0x41/0x80 [ 20.012015] ? __pfx_kthread+0x10/0x10 [ 20.012037] ret_from_fork_asm+0x1a/0x30 [ 20.012073] </TASK> [ 20.012089] [ 20.027976] Allocated by task 286: [ 20.028605] kasan_save_stack+0x45/0x70 [ 20.028958] kasan_save_track+0x18/0x40 [ 20.029182] kasan_save_alloc_info+0x3b/0x50 [ 20.029577] __kasan_kmalloc+0xb7/0xc0 [ 20.029913] __kmalloc_cache_noprof+0x189/0x420 [ 20.030356] kasan_atomics+0x95/0x310 [ 20.030897] kunit_try_run_case+0x1a5/0x480 [ 20.031506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.031862] kthread+0x337/0x6f0 [ 20.032116] ret_from_fork+0x41/0x80 [ 20.032722] ret_from_fork_asm+0x1a/0x30 [ 20.032954] [ 20.033147] The buggy address belongs to the object at ffff888101e04b00 [ 20.033147] which belongs to the cache kmalloc-64 of size 64 [ 20.033886] The buggy address is located 0 bytes to the right of [ 20.033886] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.034690] [ 20.035215] The buggy address belongs to the physical page: [ 20.035692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.036307] flags: 0x200000000000000(node=0|zone=2) [ 20.036586] page_type: f5(slab) [ 20.036803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.037472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.037908] page dumped because: kasan: bad access detected [ 20.038221] [ 20.038447] Memory state around the buggy address: [ 20.038921] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.039312] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.039714] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.040111] ^ [ 20.040409] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.041594] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.042183] ================================================================== [ 21.667837] ================================================================== [ 21.668416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 21.668999] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.669305] [ 21.669569] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.669663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.669687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.669726] Call Trace: [ 21.669780] <TASK> [ 21.669821] dump_stack_lvl+0x73/0xb0 [ 21.669889] print_report+0xd1/0x650 [ 21.669941] ? __virt_addr_valid+0x1db/0x2d0 [ 21.669990] ? kasan_atomics_helper+0x20c8/0x5450 [ 21.670032] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.670083] ? kasan_atomics_helper+0x20c8/0x5450 [ 21.670162] kasan_report+0x141/0x180 [ 21.670216] ? kasan_atomics_helper+0x20c8/0x5450 [ 21.670271] kasan_check_range+0x10c/0x1c0 [ 21.670317] __kasan_check_write+0x18/0x20 [ 21.670363] kasan_atomics_helper+0x20c8/0x5450 [ 21.670422] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.670476] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.670523] ? trace_hardirqs_on+0x37/0xe0 [ 21.670571] ? kasan_atomics+0x152/0x310 [ 21.670629] kasan_atomics+0x1dc/0x310 [ 21.670678] ? __pfx_kasan_atomics+0x10/0x10 [ 21.670728] ? __pfx_kasan_atomics+0x10/0x10 [ 21.670795] kunit_try_run_case+0x1a5/0x480 [ 21.670847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.670893] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.670946] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.670994] ? __kthread_parkme+0x82/0x180 [ 21.671044] ? preempt_count_sub+0x50/0x80 [ 21.671097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.671143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.671195] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.671252] kthread+0x337/0x6f0 [ 21.671298] ? trace_preempt_on+0x20/0xc0 [ 21.671355] ? __pfx_kthread+0x10/0x10 [ 21.671400] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.671448] ? calculate_sigpending+0x7b/0xa0 [ 21.671495] ? __pfx_kthread+0x10/0x10 [ 21.671534] ret_from_fork+0x41/0x80 [ 21.671578] ? __pfx_kthread+0x10/0x10 [ 21.671616] ret_from_fork_asm+0x1a/0x30 [ 21.671707] </TASK> [ 21.671737] [ 21.682004] Allocated by task 286: [ 21.682291] kasan_save_stack+0x45/0x70 [ 21.682562] kasan_save_track+0x18/0x40 [ 21.682916] kasan_save_alloc_info+0x3b/0x50 [ 21.683308] __kasan_kmalloc+0xb7/0xc0 [ 21.683657] __kmalloc_cache_noprof+0x189/0x420 [ 21.684088] kasan_atomics+0x95/0x310 [ 21.684439] kunit_try_run_case+0x1a5/0x480 [ 21.684837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.685411] kthread+0x337/0x6f0 [ 21.685729] ret_from_fork+0x41/0x80 [ 21.686097] ret_from_fork_asm+0x1a/0x30 [ 21.686340] [ 21.686524] The buggy address belongs to the object at ffff888101e04b00 [ 21.686524] which belongs to the cache kmalloc-64 of size 64 [ 21.687085] The buggy address is located 0 bytes to the right of [ 21.687085] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.687737] [ 21.687951] The buggy address belongs to the physical page: [ 21.688488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.688883] flags: 0x200000000000000(node=0|zone=2) [ 21.689370] page_type: f5(slab) [ 21.689679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.690025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.690626] page dumped because: kasan: bad access detected [ 21.691022] [ 21.691189] Memory state around the buggy address: [ 21.691575] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.691988] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.692499] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.692806] ^ [ 21.693242] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.693651] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.693997] ================================================================== [ 20.110141] ================================================================== [ 20.110672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 20.111183] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.111698] [ 20.111893] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.112012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.112045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.112090] Call Trace: [ 20.112173] <TASK> [ 20.112221] dump_stack_lvl+0x73/0xb0 [ 20.112301] print_report+0xd1/0x650 [ 20.112361] ? __virt_addr_valid+0x1db/0x2d0 [ 20.112408] ? kasan_atomics_helper+0x7c7/0x5450 [ 20.112455] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.112504] ? kasan_atomics_helper+0x7c7/0x5450 [ 20.112548] kasan_report+0x141/0x180 [ 20.112600] ? kasan_atomics_helper+0x7c7/0x5450 [ 20.112663] kasan_check_range+0x10c/0x1c0 [ 20.112708] __kasan_check_write+0x18/0x20 [ 20.112763] kasan_atomics_helper+0x7c7/0x5450 [ 20.112819] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.112871] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.112917] ? trace_hardirqs_on+0x37/0xe0 [ 20.112970] ? kasan_atomics+0x152/0x310 [ 20.113026] kasan_atomics+0x1dc/0x310 [ 20.113077] ? __pfx_kasan_atomics+0x10/0x10 [ 20.113153] ? __pfx_kasan_atomics+0x10/0x10 [ 20.113207] kunit_try_run_case+0x1a5/0x480 [ 20.113267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.113316] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.113374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.113430] ? __kthread_parkme+0x82/0x180 [ 20.113481] ? preempt_count_sub+0x50/0x80 [ 20.113539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.113577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.113604] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.113631] kthread+0x337/0x6f0 [ 20.113651] ? trace_preempt_on+0x20/0xc0 [ 20.113677] ? __pfx_kthread+0x10/0x10 [ 20.113698] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.113722] ? calculate_sigpending+0x7b/0xa0 [ 20.113770] ? __pfx_kthread+0x10/0x10 [ 20.113800] ret_from_fork+0x41/0x80 [ 20.113828] ? __pfx_kthread+0x10/0x10 [ 20.113850] ret_from_fork_asm+0x1a/0x30 [ 20.113887] </TASK> [ 20.113904] [ 20.126395] Allocated by task 286: [ 20.127774] kasan_save_stack+0x45/0x70 [ 20.128253] kasan_save_track+0x18/0x40 [ 20.128570] kasan_save_alloc_info+0x3b/0x50 [ 20.129206] __kasan_kmalloc+0xb7/0xc0 [ 20.129523] __kmalloc_cache_noprof+0x189/0x420 [ 20.130232] kasan_atomics+0x95/0x310 [ 20.130466] kunit_try_run_case+0x1a5/0x480 [ 20.130649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.131159] kthread+0x337/0x6f0 [ 20.131495] ret_from_fork+0x41/0x80 [ 20.131770] ret_from_fork_asm+0x1a/0x30 [ 20.132055] [ 20.132665] The buggy address belongs to the object at ffff888101e04b00 [ 20.132665] which belongs to the cache kmalloc-64 of size 64 [ 20.133453] The buggy address is located 0 bytes to the right of [ 20.133453] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.134414] [ 20.134554] The buggy address belongs to the physical page: [ 20.135234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.135787] flags: 0x200000000000000(node=0|zone=2) [ 20.136314] page_type: f5(slab) [ 20.136648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.136999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.137518] page dumped because: kasan: bad access detected [ 20.137741] [ 20.137967] Memory state around the buggy address: [ 20.138922] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.139284] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.140023] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.140630] ^ [ 20.141024] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.141486] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.141948] ================================================================== [ 21.346620] ================================================================== [ 21.347029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 21.347447] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.348024] [ 21.348258] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.348366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.348392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.348434] Call Trace: [ 21.348479] <TASK> [ 21.348524] dump_stack_lvl+0x73/0xb0 [ 21.348589] print_report+0xd1/0x650 [ 21.348634] ? __virt_addr_valid+0x1db/0x2d0 [ 21.348686] ? kasan_atomics_helper+0x1c18/0x5450 [ 21.348737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.348803] ? kasan_atomics_helper+0x1c18/0x5450 [ 21.348859] kasan_report+0x141/0x180 [ 21.348914] ? kasan_atomics_helper+0x1c18/0x5450 [ 21.348980] kasan_check_range+0x10c/0x1c0 [ 21.349035] __kasan_check_write+0x18/0x20 [ 21.349085] kasan_atomics_helper+0x1c18/0x5450 [ 21.349176] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.349234] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.349280] ? trace_hardirqs_on+0x37/0xe0 [ 21.349323] ? kasan_atomics+0x152/0x310 [ 21.349370] kasan_atomics+0x1dc/0x310 [ 21.349412] ? __pfx_kasan_atomics+0x10/0x10 [ 21.349456] ? __pfx_kasan_atomics+0x10/0x10 [ 21.349511] kunit_try_run_case+0x1a5/0x480 [ 21.349572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.349626] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.349683] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.349740] ? __kthread_parkme+0x82/0x180 [ 21.349808] ? preempt_count_sub+0x50/0x80 [ 21.349871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.349928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.349985] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.350041] kthread+0x337/0x6f0 [ 21.350085] ? trace_preempt_on+0x20/0xc0 [ 21.350175] ? __pfx_kthread+0x10/0x10 [ 21.350224] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.350268] ? calculate_sigpending+0x7b/0xa0 [ 21.350314] ? __pfx_kthread+0x10/0x10 [ 21.350351] ret_from_fork+0x41/0x80 [ 21.350393] ? __pfx_kthread+0x10/0x10 [ 21.350437] ret_from_fork_asm+0x1a/0x30 [ 21.350502] </TASK> [ 21.350530] [ 21.362937] Allocated by task 286: [ 21.363349] kasan_save_stack+0x45/0x70 [ 21.363763] kasan_save_track+0x18/0x40 [ 21.364134] kasan_save_alloc_info+0x3b/0x50 [ 21.364375] __kasan_kmalloc+0xb7/0xc0 [ 21.364695] __kmalloc_cache_noprof+0x189/0x420 [ 21.365067] kasan_atomics+0x95/0x310 [ 21.365402] kunit_try_run_case+0x1a5/0x480 [ 21.365773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.366016] kthread+0x337/0x6f0 [ 21.366364] ret_from_fork+0x41/0x80 [ 21.366700] ret_from_fork_asm+0x1a/0x30 [ 21.366949] [ 21.367083] The buggy address belongs to the object at ffff888101e04b00 [ 21.367083] which belongs to the cache kmalloc-64 of size 64 [ 21.367567] The buggy address is located 0 bytes to the right of [ 21.367567] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.368369] [ 21.368581] The buggy address belongs to the physical page: [ 21.369043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.369663] flags: 0x200000000000000(node=0|zone=2) [ 21.370097] page_type: f5(slab) [ 21.370409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.370927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.371321] page dumped because: kasan: bad access detected [ 21.371565] [ 21.371704] Memory state around the buggy address: [ 21.372147] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.372663] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.373237] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.373512] ^ [ 21.373757] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.374271] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.374822] ================================================================== [ 21.375979] ================================================================== [ 21.376743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 21.377297] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.377786] [ 21.377987] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.378086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.378142] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.378180] Call Trace: [ 21.378219] <TASK> [ 21.378255] dump_stack_lvl+0x73/0xb0 [ 21.378317] print_report+0xd1/0x650 [ 21.378370] ? __virt_addr_valid+0x1db/0x2d0 [ 21.378419] ? kasan_atomics_helper+0x4f30/0x5450 [ 21.378461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.378505] ? kasan_atomics_helper+0x4f30/0x5450 [ 21.378553] kasan_report+0x141/0x180 [ 21.378606] ? kasan_atomics_helper+0x4f30/0x5450 [ 21.378665] __asan_report_load8_noabort+0x18/0x20 [ 21.378712] kasan_atomics_helper+0x4f30/0x5450 [ 21.378782] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.378839] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.378892] ? trace_hardirqs_on+0x37/0xe0 [ 21.378943] ? kasan_atomics+0x152/0x310 [ 21.378992] kasan_atomics+0x1dc/0x310 [ 21.379029] ? __pfx_kasan_atomics+0x10/0x10 [ 21.379070] ? __pfx_kasan_atomics+0x10/0x10 [ 21.379134] kunit_try_run_case+0x1a5/0x480 [ 21.379195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.379248] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.379305] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.379361] ? __kthread_parkme+0x82/0x180 [ 21.379416] ? preempt_count_sub+0x50/0x80 [ 21.379477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.379535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.379591] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.379655] kthread+0x337/0x6f0 [ 21.379703] ? trace_preempt_on+0x20/0xc0 [ 21.379767] ? __pfx_kthread+0x10/0x10 [ 21.379817] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.379861] ? calculate_sigpending+0x7b/0xa0 [ 21.379903] ? __pfx_kthread+0x10/0x10 [ 21.379944] ret_from_fork+0x41/0x80 [ 21.379992] ? __pfx_kthread+0x10/0x10 [ 21.380035] ret_from_fork_asm+0x1a/0x30 [ 21.380113] </TASK> [ 21.380148] [ 21.391952] Allocated by task 286: [ 21.392374] kasan_save_stack+0x45/0x70 [ 21.392807] kasan_save_track+0x18/0x40 [ 21.393875] kasan_save_alloc_info+0x3b/0x50 [ 21.394303] __kasan_kmalloc+0xb7/0xc0 [ 21.394656] __kmalloc_cache_noprof+0x189/0x420 [ 21.394894] kasan_atomics+0x95/0x310 [ 21.395220] kunit_try_run_case+0x1a5/0x480 [ 21.395561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.395852] kthread+0x337/0x6f0 [ 21.396053] ret_from_fork+0x41/0x80 [ 21.396397] ret_from_fork_asm+0x1a/0x30 [ 21.396727] [ 21.396918] The buggy address belongs to the object at ffff888101e04b00 [ 21.396918] which belongs to the cache kmalloc-64 of size 64 [ 21.397822] The buggy address is located 0 bytes to the right of [ 21.397822] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.398392] [ 21.398586] The buggy address belongs to the physical page: [ 21.399042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.399584] flags: 0x200000000000000(node=0|zone=2) [ 21.399991] page_type: f5(slab) [ 21.400234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.400555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.401089] page dumped because: kasan: bad access detected [ 21.401547] [ 21.401716] Memory state around the buggy address: [ 21.402157] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.402560] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.402863] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.403432] ^ [ 21.403857] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.404284] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.404574] ================================================================== [ 20.570856] ================================================================== [ 20.571360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 20.572381] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.572987] [ 20.573209] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.573307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.573331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.573369] Call Trace: [ 20.573408] <TASK> [ 20.573447] dump_stack_lvl+0x73/0xb0 [ 20.573518] print_report+0xd1/0x650 [ 20.573562] ? __virt_addr_valid+0x1db/0x2d0 [ 20.573606] ? kasan_atomics_helper+0x4a36/0x5450 [ 20.573843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.574007] ? kasan_atomics_helper+0x4a36/0x5450 [ 20.574066] kasan_report+0x141/0x180 [ 20.574143] ? kasan_atomics_helper+0x4a36/0x5450 [ 20.574209] __asan_report_load4_noabort+0x18/0x20 [ 20.574258] kasan_atomics_helper+0x4a36/0x5450 [ 20.574497] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.574531] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.574559] ? trace_hardirqs_on+0x37/0xe0 [ 20.574586] ? kasan_atomics+0x152/0x310 [ 20.574615] kasan_atomics+0x1dc/0x310 [ 20.574640] ? __pfx_kasan_atomics+0x10/0x10 [ 20.574663] ? __pfx_kasan_atomics+0x10/0x10 [ 20.574691] kunit_try_run_case+0x1a5/0x480 [ 20.574721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.574769] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.574805] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.574832] ? __kthread_parkme+0x82/0x180 [ 20.574859] ? preempt_count_sub+0x50/0x80 [ 20.574890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.574917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.574944] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.574970] kthread+0x337/0x6f0 [ 20.574991] ? trace_preempt_on+0x20/0xc0 [ 20.575017] ? __pfx_kthread+0x10/0x10 [ 20.575039] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.575064] ? calculate_sigpending+0x7b/0xa0 [ 20.575090] ? __pfx_kthread+0x10/0x10 [ 20.575153] ret_from_fork+0x41/0x80 [ 20.575185] ? __pfx_kthread+0x10/0x10 [ 20.575208] ret_from_fork_asm+0x1a/0x30 [ 20.575244] </TASK> [ 20.575262] [ 20.589727] Allocated by task 286: [ 20.590154] kasan_save_stack+0x45/0x70 [ 20.590424] kasan_save_track+0x18/0x40 [ 20.590783] kasan_save_alloc_info+0x3b/0x50 [ 20.591547] __kasan_kmalloc+0xb7/0xc0 [ 20.591899] __kmalloc_cache_noprof+0x189/0x420 [ 20.592401] kasan_atomics+0x95/0x310 [ 20.592605] kunit_try_run_case+0x1a5/0x480 [ 20.592809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.593022] kthread+0x337/0x6f0 [ 20.593191] ret_from_fork+0x41/0x80 [ 20.593358] ret_from_fork_asm+0x1a/0x30 [ 20.593535] [ 20.593643] The buggy address belongs to the object at ffff888101e04b00 [ 20.593643] which belongs to the cache kmalloc-64 of size 64 [ 20.594438] The buggy address is located 0 bytes to the right of [ 20.594438] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.595021] [ 20.595280] The buggy address belongs to the physical page: [ 20.595824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.596577] flags: 0x200000000000000(node=0|zone=2) [ 20.597142] page_type: f5(slab) [ 20.597546] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.598231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.598508] page dumped because: kasan: bad access detected [ 20.599129] [ 20.599326] Memory state around the buggy address: [ 20.599871] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.600571] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.601020] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.601476] ^ [ 20.601902] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.602357] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.602897] ================================================================== [ 21.433685] ================================================================== [ 21.434163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 21.434539] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.434957] [ 21.435229] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.435352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.435386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.435432] Call Trace: [ 21.435473] <TASK> [ 21.435518] dump_stack_lvl+0x73/0xb0 [ 21.435595] print_report+0xd1/0x650 [ 21.435663] ? __virt_addr_valid+0x1db/0x2d0 [ 21.435724] ? kasan_atomics_helper+0x1d7a/0x5450 [ 21.435791] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.435845] ? kasan_atomics_helper+0x1d7a/0x5450 [ 21.435902] kasan_report+0x141/0x180 [ 21.435959] ? kasan_atomics_helper+0x1d7a/0x5450 [ 21.436026] kasan_check_range+0x10c/0x1c0 [ 21.436079] __kasan_check_write+0x18/0x20 [ 21.436164] kasan_atomics_helper+0x1d7a/0x5450 [ 21.436224] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.436281] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.436336] ? trace_hardirqs_on+0x37/0xe0 [ 21.436374] ? kasan_atomics+0x152/0x310 [ 21.436415] kasan_atomics+0x1dc/0x310 [ 21.436447] ? __pfx_kasan_atomics+0x10/0x10 [ 21.436480] ? __pfx_kasan_atomics+0x10/0x10 [ 21.436519] kunit_try_run_case+0x1a5/0x480 [ 21.436562] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.436597] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.436634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.436669] ? __kthread_parkme+0x82/0x180 [ 21.436704] ? preempt_count_sub+0x50/0x80 [ 21.436755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.436797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.436834] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.436870] kthread+0x337/0x6f0 [ 21.436899] ? trace_preempt_on+0x20/0xc0 [ 21.436936] ? __pfx_kthread+0x10/0x10 [ 21.436965] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.436999] ? calculate_sigpending+0x7b/0xa0 [ 21.437033] ? __pfx_kthread+0x10/0x10 [ 21.437063] ret_from_fork+0x41/0x80 [ 21.437126] ? __pfx_kthread+0x10/0x10 [ 21.437167] ret_from_fork_asm+0x1a/0x30 [ 21.437250] </TASK> [ 21.437278] [ 21.449060] Allocated by task 286: [ 21.449522] kasan_save_stack+0x45/0x70 [ 21.449940] kasan_save_track+0x18/0x40 [ 21.450374] kasan_save_alloc_info+0x3b/0x50 [ 21.450780] __kasan_kmalloc+0xb7/0xc0 [ 21.451189] __kmalloc_cache_noprof+0x189/0x420 [ 21.451633] kasan_atomics+0x95/0x310 [ 21.451981] kunit_try_run_case+0x1a5/0x480 [ 21.452424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.452774] kthread+0x337/0x6f0 [ 21.452952] ret_from_fork+0x41/0x80 [ 21.453204] ret_from_fork_asm+0x1a/0x30 [ 21.453579] [ 21.453798] The buggy address belongs to the object at ffff888101e04b00 [ 21.453798] which belongs to the cache kmalloc-64 of size 64 [ 21.454816] The buggy address is located 0 bytes to the right of [ 21.454816] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.455955] [ 21.456214] The buggy address belongs to the physical page: [ 21.456677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.457372] flags: 0x200000000000000(node=0|zone=2) [ 21.457837] page_type: f5(slab) [ 21.458072] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.458508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.458924] page dumped because: kasan: bad access detected [ 21.459279] [ 21.459467] Memory state around the buggy address: [ 21.459761] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.460276] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.460723] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.461214] ^ [ 21.461590] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.461980] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.462525] ================================================================== [ 21.499586] ================================================================== [ 21.500038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 21.500386] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.501037] [ 21.501508] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.501638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.501673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.501725] Call Trace: [ 21.501783] <TASK> [ 21.501835] dump_stack_lvl+0x73/0xb0 [ 21.501909] print_report+0xd1/0x650 [ 21.501959] ? __virt_addr_valid+0x1db/0x2d0 [ 21.502015] ? kasan_atomics_helper+0x1eaa/0x5450 [ 21.502067] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.502146] ? kasan_atomics_helper+0x1eaa/0x5450 [ 21.502191] kasan_report+0x141/0x180 [ 21.502237] ? kasan_atomics_helper+0x1eaa/0x5450 [ 21.502301] kasan_check_range+0x10c/0x1c0 [ 21.502354] __kasan_check_write+0x18/0x20 [ 21.502406] kasan_atomics_helper+0x1eaa/0x5450 [ 21.502463] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.502517] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.502568] ? trace_hardirqs_on+0x37/0xe0 [ 21.502614] ? kasan_atomics+0x152/0x310 [ 21.502692] kasan_atomics+0x1dc/0x310 [ 21.502738] ? __pfx_kasan_atomics+0x10/0x10 [ 21.502799] ? __pfx_kasan_atomics+0x10/0x10 [ 21.502856] kunit_try_run_case+0x1a5/0x480 [ 21.502915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.502990] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.503049] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.503098] ? __kthread_parkme+0x82/0x180 [ 21.503188] ? preempt_count_sub+0x50/0x80 [ 21.503230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.503259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.503287] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.503313] kthread+0x337/0x6f0 [ 21.503334] ? trace_preempt_on+0x20/0xc0 [ 21.503360] ? __pfx_kthread+0x10/0x10 [ 21.503382] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.503406] ? calculate_sigpending+0x7b/0xa0 [ 21.503431] ? __pfx_kthread+0x10/0x10 [ 21.503453] ret_from_fork+0x41/0x80 [ 21.503479] ? __pfx_kthread+0x10/0x10 [ 21.503501] ret_from_fork_asm+0x1a/0x30 [ 21.503536] </TASK> [ 21.503552] [ 21.516013] Allocated by task 286: [ 21.516391] kasan_save_stack+0x45/0x70 [ 21.516704] kasan_save_track+0x18/0x40 [ 21.517079] kasan_save_alloc_info+0x3b/0x50 [ 21.517500] __kasan_kmalloc+0xb7/0xc0 [ 21.517867] __kmalloc_cache_noprof+0x189/0x420 [ 21.518305] kasan_atomics+0x95/0x310 [ 21.518662] kunit_try_run_case+0x1a5/0x480 [ 21.518999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.519357] kthread+0x337/0x6f0 [ 21.519636] ret_from_fork+0x41/0x80 [ 21.520006] ret_from_fork_asm+0x1a/0x30 [ 21.520413] [ 21.520561] The buggy address belongs to the object at ffff888101e04b00 [ 21.520561] which belongs to the cache kmalloc-64 of size 64 [ 21.521481] The buggy address is located 0 bytes to the right of [ 21.521481] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.522082] [ 21.522311] The buggy address belongs to the physical page: [ 21.522795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.523443] flags: 0x200000000000000(node=0|zone=2) [ 21.523770] page_type: f5(slab) [ 21.524140] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.524739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.525326] page dumped because: kasan: bad access detected [ 21.525722] [ 21.525923] Memory state around the buggy address: [ 21.526350] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.526885] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.527335] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.527857] ^ [ 21.528247] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.528812] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.529287] ================================================================== [ 20.305723] ================================================================== [ 20.306415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 20.308789] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.309654] [ 20.310044] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.310318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.310338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.310367] Call Trace: [ 20.310394] <TASK> [ 20.310421] dump_stack_lvl+0x73/0xb0 [ 20.310475] print_report+0xd1/0x650 [ 20.310504] ? __virt_addr_valid+0x1db/0x2d0 [ 20.310531] ? kasan_atomics_helper+0xb6a/0x5450 [ 20.310557] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.310582] ? kasan_atomics_helper+0xb6a/0x5450 [ 20.310607] kasan_report+0x141/0x180 [ 20.310632] ? kasan_atomics_helper+0xb6a/0x5450 [ 20.310662] kasan_check_range+0x10c/0x1c0 [ 20.310685] __kasan_check_write+0x18/0x20 [ 20.310708] kasan_atomics_helper+0xb6a/0x5450 [ 20.310733] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.310782] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.310810] ? trace_hardirqs_on+0x37/0xe0 [ 20.310836] ? kasan_atomics+0x152/0x310 [ 20.310863] kasan_atomics+0x1dc/0x310 [ 20.310887] ? __pfx_kasan_atomics+0x10/0x10 [ 20.310911] ? __pfx_kasan_atomics+0x10/0x10 [ 20.310939] kunit_try_run_case+0x1a5/0x480 [ 20.310969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.310993] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.311021] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.311048] ? __kthread_parkme+0x82/0x180 [ 20.311074] ? preempt_count_sub+0x50/0x80 [ 20.311107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.311157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.311184] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.311210] kthread+0x337/0x6f0 [ 20.311231] ? trace_preempt_on+0x20/0xc0 [ 20.311256] ? __pfx_kthread+0x10/0x10 [ 20.311277] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.311302] ? calculate_sigpending+0x7b/0xa0 [ 20.311328] ? __pfx_kthread+0x10/0x10 [ 20.311351] ret_from_fork+0x41/0x80 [ 20.311378] ? __pfx_kthread+0x10/0x10 [ 20.311400] ret_from_fork_asm+0x1a/0x30 [ 20.311437] </TASK> [ 20.311453] [ 20.325921] Allocated by task 286: [ 20.326920] kasan_save_stack+0x45/0x70 [ 20.327287] kasan_save_track+0x18/0x40 [ 20.327565] kasan_save_alloc_info+0x3b/0x50 [ 20.327895] __kasan_kmalloc+0xb7/0xc0 [ 20.328583] __kmalloc_cache_noprof+0x189/0x420 [ 20.328878] kasan_atomics+0x95/0x310 [ 20.329061] kunit_try_run_case+0x1a5/0x480 [ 20.329684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.329951] kthread+0x337/0x6f0 [ 20.330521] ret_from_fork+0x41/0x80 [ 20.331263] ret_from_fork_asm+0x1a/0x30 [ 20.331597] [ 20.331726] The buggy address belongs to the object at ffff888101e04b00 [ 20.331726] which belongs to the cache kmalloc-64 of size 64 [ 20.332839] The buggy address is located 0 bytes to the right of [ 20.332839] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.333621] [ 20.333983] The buggy address belongs to the physical page: [ 20.334421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.335673] flags: 0x200000000000000(node=0|zone=2) [ 20.336019] page_type: f5(slab) [ 20.336207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.336928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.337440] page dumped because: kasan: bad access detected [ 20.337646] [ 20.337739] Memory state around the buggy address: [ 20.337966] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.339049] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.339642] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.340021] ^ [ 20.340704] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.340987] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.341572] ================================================================== [ 20.697071] ================================================================== [ 20.698974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 20.699848] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.701329] [ 20.701516] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.701593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.701619] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.701661] Call Trace: [ 20.701705] <TASK> [ 20.701761] dump_stack_lvl+0x73/0xb0 [ 20.701841] print_report+0xd1/0x650 [ 20.701886] ? __virt_addr_valid+0x1db/0x2d0 [ 20.701934] ? kasan_atomics_helper+0x4a02/0x5450 [ 20.701983] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.702034] ? kasan_atomics_helper+0x4a02/0x5450 [ 20.702082] kasan_report+0x141/0x180 [ 20.702126] ? kasan_atomics_helper+0x4a02/0x5450 [ 20.702170] __asan_report_load4_noabort+0x18/0x20 [ 20.702195] kasan_atomics_helper+0x4a02/0x5450 [ 20.702222] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.702249] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.702275] ? trace_hardirqs_on+0x37/0xe0 [ 20.702301] ? kasan_atomics+0x152/0x310 [ 20.702329] kasan_atomics+0x1dc/0x310 [ 20.702351] ? __pfx_kasan_atomics+0x10/0x10 [ 20.702375] ? __pfx_kasan_atomics+0x10/0x10 [ 20.702403] kunit_try_run_case+0x1a5/0x480 [ 20.702432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.702456] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.702485] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.702510] ? __kthread_parkme+0x82/0x180 [ 20.702536] ? preempt_count_sub+0x50/0x80 [ 20.702566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.702593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.702618] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.702645] kthread+0x337/0x6f0 [ 20.702665] ? trace_preempt_on+0x20/0xc0 [ 20.702692] ? __pfx_kthread+0x10/0x10 [ 20.702714] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.702739] ? calculate_sigpending+0x7b/0xa0 [ 20.702792] ? __pfx_kthread+0x10/0x10 [ 20.702815] ret_from_fork+0x41/0x80 [ 20.702842] ? __pfx_kthread+0x10/0x10 [ 20.702864] ret_from_fork_asm+0x1a/0x30 [ 20.702901] </TASK> [ 20.702918] [ 20.713315] Allocated by task 286: [ 20.713599] kasan_save_stack+0x45/0x70 [ 20.713999] kasan_save_track+0x18/0x40 [ 20.714302] kasan_save_alloc_info+0x3b/0x50 [ 20.714583] __kasan_kmalloc+0xb7/0xc0 [ 20.714867] __kmalloc_cache_noprof+0x189/0x420 [ 20.715096] kasan_atomics+0x95/0x310 [ 20.715293] kunit_try_run_case+0x1a5/0x480 [ 20.715513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.715934] kthread+0x337/0x6f0 [ 20.716240] ret_from_fork+0x41/0x80 [ 20.716709] ret_from_fork_asm+0x1a/0x30 [ 20.717086] [ 20.717289] The buggy address belongs to the object at ffff888101e04b00 [ 20.717289] which belongs to the cache kmalloc-64 of size 64 [ 20.717934] The buggy address is located 0 bytes to the right of [ 20.717934] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.718386] [ 20.718559] The buggy address belongs to the physical page: [ 20.718991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.719762] flags: 0x200000000000000(node=0|zone=2) [ 20.720014] page_type: f5(slab) [ 20.720229] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.720816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.721309] page dumped because: kasan: bad access detected [ 20.721543] [ 20.721671] Memory state around the buggy address: [ 20.721922] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.722439] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.723209] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.723602] ^ [ 20.723888] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.724165] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.724449] ================================================================== [ 20.539285] ================================================================== [ 20.539825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 20.540273] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.540860] [ 20.541115] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.541233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.541275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.541322] Call Trace: [ 20.541380] <TASK> [ 20.541427] dump_stack_lvl+0x73/0xb0 [ 20.541508] print_report+0xd1/0x650 [ 20.541565] ? __virt_addr_valid+0x1db/0x2d0 [ 20.541624] ? kasan_atomics_helper+0xfa9/0x5450 [ 20.541694] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.541756] ? kasan_atomics_helper+0xfa9/0x5450 [ 20.541809] kasan_report+0x141/0x180 [ 20.541862] ? kasan_atomics_helper+0xfa9/0x5450 [ 20.541932] kasan_check_range+0x10c/0x1c0 [ 20.542000] __kasan_check_write+0x18/0x20 [ 20.542051] kasan_atomics_helper+0xfa9/0x5450 [ 20.542105] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.542161] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.542215] ? trace_hardirqs_on+0x37/0xe0 [ 20.542269] ? kasan_atomics+0x152/0x310 [ 20.542326] kasan_atomics+0x1dc/0x310 [ 20.542367] ? __pfx_kasan_atomics+0x10/0x10 [ 20.542406] ? __pfx_kasan_atomics+0x10/0x10 [ 20.542462] kunit_try_run_case+0x1a5/0x480 [ 20.542515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.542575] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.542652] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.542701] ? __kthread_parkme+0x82/0x180 [ 20.542765] ? preempt_count_sub+0x50/0x80 [ 20.542832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.542905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.542958] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.543006] kthread+0x337/0x6f0 [ 20.543035] ? trace_preempt_on+0x20/0xc0 [ 20.543062] ? __pfx_kthread+0x10/0x10 [ 20.543084] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.543116] ? calculate_sigpending+0x7b/0xa0 [ 20.543181] ? __pfx_kthread+0x10/0x10 [ 20.543205] ret_from_fork+0x41/0x80 [ 20.543234] ? __pfx_kthread+0x10/0x10 [ 20.543256] ret_from_fork_asm+0x1a/0x30 [ 20.543292] </TASK> [ 20.543310] [ 20.554043] Allocated by task 286: [ 20.554456] kasan_save_stack+0x45/0x70 [ 20.554912] kasan_save_track+0x18/0x40 [ 20.555299] kasan_save_alloc_info+0x3b/0x50 [ 20.555546] __kasan_kmalloc+0xb7/0xc0 [ 20.555948] __kmalloc_cache_noprof+0x189/0x420 [ 20.556374] kasan_atomics+0x95/0x310 [ 20.556648] kunit_try_run_case+0x1a5/0x480 [ 20.556888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.557141] kthread+0x337/0x6f0 [ 20.557362] ret_from_fork+0x41/0x80 [ 20.557543] ret_from_fork_asm+0x1a/0x30 [ 20.557949] [ 20.558173] The buggy address belongs to the object at ffff888101e04b00 [ 20.558173] which belongs to the cache kmalloc-64 of size 64 [ 20.558699] The buggy address is located 0 bytes to the right of [ 20.558699] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.560040] [ 20.560245] The buggy address belongs to the physical page: [ 20.560778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.561243] flags: 0x200000000000000(node=0|zone=2) [ 20.561589] page_type: f5(slab) [ 20.561812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.562115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.562738] page dumped because: kasan: bad access detected [ 20.563397] [ 20.563592] Memory state around the buggy address: [ 20.564029] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.564385] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.564682] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.565304] ^ [ 20.565713] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.567098] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.568886] ================================================================== [ 20.862879] ================================================================== [ 20.863372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 20.864073] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.865068] [ 20.865336] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.865456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.865489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.865535] Call Trace: [ 20.865577] <TASK> [ 20.865621] dump_stack_lvl+0x73/0xb0 [ 20.865701] print_report+0xd1/0x650 [ 20.865769] ? __virt_addr_valid+0x1db/0x2d0 [ 20.865824] ? kasan_atomics_helper+0x13b5/0x5450 [ 20.865871] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.865917] ? kasan_atomics_helper+0x13b5/0x5450 [ 20.865967] kasan_report+0x141/0x180 [ 20.866020] ? kasan_atomics_helper+0x13b5/0x5450 [ 20.866084] kasan_check_range+0x10c/0x1c0 [ 20.866167] __kasan_check_read+0x15/0x20 [ 20.866209] kasan_atomics_helper+0x13b5/0x5450 [ 20.866264] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.866320] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.866367] ? trace_hardirqs_on+0x37/0xe0 [ 20.866412] ? kasan_atomics+0x152/0x310 [ 20.866466] kasan_atomics+0x1dc/0x310 [ 20.866510] ? __pfx_kasan_atomics+0x10/0x10 [ 20.866549] ? __pfx_kasan_atomics+0x10/0x10 [ 20.866599] kunit_try_run_case+0x1a5/0x480 [ 20.866654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.866703] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.866765] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.866813] ? __kthread_parkme+0x82/0x180 [ 20.866864] ? preempt_count_sub+0x50/0x80 [ 20.866922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.866980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.867033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.867069] kthread+0x337/0x6f0 [ 20.867090] ? trace_preempt_on+0x20/0xc0 [ 20.867174] ? __pfx_kthread+0x10/0x10 [ 20.867202] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.867228] ? calculate_sigpending+0x7b/0xa0 [ 20.867254] ? __pfx_kthread+0x10/0x10 [ 20.867277] ret_from_fork+0x41/0x80 [ 20.867304] ? __pfx_kthread+0x10/0x10 [ 20.867326] ret_from_fork_asm+0x1a/0x30 [ 20.867364] </TASK> [ 20.867381] [ 20.881304] Allocated by task 286: [ 20.881713] kasan_save_stack+0x45/0x70 [ 20.882085] kasan_save_track+0x18/0x40 [ 20.882330] kasan_save_alloc_info+0x3b/0x50 [ 20.882730] __kasan_kmalloc+0xb7/0xc0 [ 20.883094] __kmalloc_cache_noprof+0x189/0x420 [ 20.883403] kasan_atomics+0x95/0x310 [ 20.883630] kunit_try_run_case+0x1a5/0x480 [ 20.884034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.884549] kthread+0x337/0x6f0 [ 20.884834] ret_from_fork+0x41/0x80 [ 20.885125] ret_from_fork_asm+0x1a/0x30 [ 20.885568] [ 20.885714] The buggy address belongs to the object at ffff888101e04b00 [ 20.885714] which belongs to the cache kmalloc-64 of size 64 [ 20.886520] The buggy address is located 0 bytes to the right of [ 20.886520] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.887511] [ 20.887725] The buggy address belongs to the physical page: [ 20.888007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.888668] flags: 0x200000000000000(node=0|zone=2) [ 20.888951] page_type: f5(slab) [ 20.889322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.889696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.890065] page dumped because: kasan: bad access detected [ 20.890575] [ 20.890798] Memory state around the buggy address: [ 20.891259] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.891728] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.892308] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.892789] ^ [ 20.893036] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.893696] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.894328] ================================================================== [ 21.100646] ================================================================== [ 21.101470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 21.102222] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.102847] [ 21.103033] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.103185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.103221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.103271] Call Trace: [ 21.103322] <TASK> [ 21.103366] dump_stack_lvl+0x73/0xb0 [ 21.103442] print_report+0xd1/0x650 [ 21.103500] ? __virt_addr_valid+0x1db/0x2d0 [ 21.103552] ? kasan_atomics_helper+0x16e7/0x5450 [ 21.103609] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.103684] ? kasan_atomics_helper+0x16e7/0x5450 [ 21.103740] kasan_report+0x141/0x180 [ 21.103808] ? kasan_atomics_helper+0x16e7/0x5450 [ 21.103877] kasan_check_range+0x10c/0x1c0 [ 21.103932] __kasan_check_write+0x18/0x20 [ 21.103982] kasan_atomics_helper+0x16e7/0x5450 [ 21.104035] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.104080] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.104162] ? trace_hardirqs_on+0x37/0xe0 [ 21.104218] ? kasan_atomics+0x152/0x310 [ 21.104284] kasan_atomics+0x1dc/0x310 [ 21.104349] ? __pfx_kasan_atomics+0x10/0x10 [ 21.104404] ? __pfx_kasan_atomics+0x10/0x10 [ 21.104476] kunit_try_run_case+0x1a5/0x480 [ 21.104539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.104592] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.104641] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.104693] ? __kthread_parkme+0x82/0x180 [ 21.104760] ? preempt_count_sub+0x50/0x80 [ 21.104835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.104890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.104943] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.105003] kthread+0x337/0x6f0 [ 21.105049] ? trace_preempt_on+0x20/0xc0 [ 21.105144] ? __pfx_kthread+0x10/0x10 [ 21.105188] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.105238] ? calculate_sigpending+0x7b/0xa0 [ 21.105289] ? __pfx_kthread+0x10/0x10 [ 21.105337] ret_from_fork+0x41/0x80 [ 21.105389] ? __pfx_kthread+0x10/0x10 [ 21.105429] ret_from_fork_asm+0x1a/0x30 [ 21.105529] </TASK> [ 21.105567] [ 21.116128] Allocated by task 286: [ 21.116555] kasan_save_stack+0x45/0x70 [ 21.117020] kasan_save_track+0x18/0x40 [ 21.117410] kasan_save_alloc_info+0x3b/0x50 [ 21.117850] __kasan_kmalloc+0xb7/0xc0 [ 21.118259] __kmalloc_cache_noprof+0x189/0x420 [ 21.118587] kasan_atomics+0x95/0x310 [ 21.118916] kunit_try_run_case+0x1a5/0x480 [ 21.119173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.119632] kthread+0x337/0x6f0 [ 21.119957] ret_from_fork+0x41/0x80 [ 21.120336] ret_from_fork_asm+0x1a/0x30 [ 21.120611] [ 21.120817] The buggy address belongs to the object at ffff888101e04b00 [ 21.120817] which belongs to the cache kmalloc-64 of size 64 [ 21.121605] The buggy address is located 0 bytes to the right of [ 21.121605] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.122333] [ 21.122561] The buggy address belongs to the physical page: [ 21.122910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.123370] flags: 0x200000000000000(node=0|zone=2) [ 21.123619] page_type: f5(slab) [ 21.123860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.124529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.125149] page dumped because: kasan: bad access detected [ 21.125558] [ 21.125716] Memory state around the buggy address: [ 21.126184] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.126637] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.127026] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.127346] ^ [ 21.127577] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.128015] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.128607] ================================================================== [ 21.464142] ================================================================== [ 21.464799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 21.465415] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.466587] [ 21.466778] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.466866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.466894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.466942] Call Trace: [ 21.467013] <TASK> [ 21.467070] dump_stack_lvl+0x73/0xb0 [ 21.467173] print_report+0xd1/0x650 [ 21.467220] ? __virt_addr_valid+0x1db/0x2d0 [ 21.467269] ? kasan_atomics_helper+0x1e12/0x5450 [ 21.467310] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.467338] ? kasan_atomics_helper+0x1e12/0x5450 [ 21.467364] kasan_report+0x141/0x180 [ 21.467392] ? kasan_atomics_helper+0x1e12/0x5450 [ 21.467422] kasan_check_range+0x10c/0x1c0 [ 21.467446] __kasan_check_write+0x18/0x20 [ 21.467469] kasan_atomics_helper+0x1e12/0x5450 [ 21.467495] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.467522] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.467547] ? trace_hardirqs_on+0x37/0xe0 [ 21.467573] ? kasan_atomics+0x152/0x310 [ 21.467600] kasan_atomics+0x1dc/0x310 [ 21.467634] ? __pfx_kasan_atomics+0x10/0x10 [ 21.467667] ? __pfx_kasan_atomics+0x10/0x10 [ 21.467694] kunit_try_run_case+0x1a5/0x480 [ 21.467725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.467773] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.467806] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.467833] ? __kthread_parkme+0x82/0x180 [ 21.467859] ? preempt_count_sub+0x50/0x80 [ 21.467889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.467916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.467942] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.467968] kthread+0x337/0x6f0 [ 21.467988] ? trace_preempt_on+0x20/0xc0 [ 21.468014] ? __pfx_kthread+0x10/0x10 [ 21.468035] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.468059] ? calculate_sigpending+0x7b/0xa0 [ 21.468084] ? __pfx_kthread+0x10/0x10 [ 21.468114] ret_from_fork+0x41/0x80 [ 21.468150] ? __pfx_kthread+0x10/0x10 [ 21.468173] ret_from_fork_asm+0x1a/0x30 [ 21.468210] </TASK> [ 21.468227] [ 21.482824] Allocated by task 286: [ 21.483500] kasan_save_stack+0x45/0x70 [ 21.484000] kasan_save_track+0x18/0x40 [ 21.484344] kasan_save_alloc_info+0x3b/0x50 [ 21.484676] __kasan_kmalloc+0xb7/0xc0 [ 21.485032] __kmalloc_cache_noprof+0x189/0x420 [ 21.485464] kasan_atomics+0x95/0x310 [ 21.485790] kunit_try_run_case+0x1a5/0x480 [ 21.486198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.486477] kthread+0x337/0x6f0 [ 21.486896] ret_from_fork+0x41/0x80 [ 21.487504] ret_from_fork_asm+0x1a/0x30 [ 21.487825] [ 21.488559] The buggy address belongs to the object at ffff888101e04b00 [ 21.488559] which belongs to the cache kmalloc-64 of size 64 [ 21.489078] The buggy address is located 0 bytes to the right of [ 21.489078] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.490300] [ 21.490438] The buggy address belongs to the physical page: [ 21.490636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.491002] flags: 0x200000000000000(node=0|zone=2) [ 21.491996] page_type: f5(slab) [ 21.492203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.492786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.493630] page dumped because: kasan: bad access detected [ 21.493909] [ 21.494025] Memory state around the buggy address: [ 21.494846] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.495394] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.495885] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.496462] ^ [ 21.497014] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.497525] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.498061] ================================================================== [ 21.730672] ================================================================== [ 21.731239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 21.731805] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.732131] [ 21.732391] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.732534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.732569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.732620] Call Trace: [ 21.732665] <TASK> [ 21.732707] dump_stack_lvl+0x73/0xb0 [ 21.732792] print_report+0xd1/0x650 [ 21.732853] ? __virt_addr_valid+0x1db/0x2d0 [ 21.732923] ? kasan_atomics_helper+0x218a/0x5450 [ 21.732978] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.733030] ? kasan_atomics_helper+0x218a/0x5450 [ 21.733082] kasan_report+0x141/0x180 [ 21.733180] ? kasan_atomics_helper+0x218a/0x5450 [ 21.733258] kasan_check_range+0x10c/0x1c0 [ 21.733310] __kasan_check_write+0x18/0x20 [ 21.733366] kasan_atomics_helper+0x218a/0x5450 [ 21.733436] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.733492] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.733535] ? trace_hardirqs_on+0x37/0xe0 [ 21.733566] ? kasan_atomics+0x152/0x310 [ 21.733594] kasan_atomics+0x1dc/0x310 [ 21.733617] ? __pfx_kasan_atomics+0x10/0x10 [ 21.733641] ? __pfx_kasan_atomics+0x10/0x10 [ 21.733682] kunit_try_run_case+0x1a5/0x480 [ 21.733728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.733786] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.733840] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.733902] ? __kthread_parkme+0x82/0x180 [ 21.733973] ? preempt_count_sub+0x50/0x80 [ 21.734029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.734084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.734168] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.734228] kthread+0x337/0x6f0 [ 21.734284] ? trace_preempt_on+0x20/0xc0 [ 21.734339] ? __pfx_kthread+0x10/0x10 [ 21.734369] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.734395] ? calculate_sigpending+0x7b/0xa0 [ 21.734420] ? __pfx_kthread+0x10/0x10 [ 21.734443] ret_from_fork+0x41/0x80 [ 21.734471] ? __pfx_kthread+0x10/0x10 [ 21.734492] ret_from_fork_asm+0x1a/0x30 [ 21.734530] </TASK> [ 21.734547] [ 21.745569] Allocated by task 286: [ 21.745972] kasan_save_stack+0x45/0x70 [ 21.746421] kasan_save_track+0x18/0x40 [ 21.746765] kasan_save_alloc_info+0x3b/0x50 [ 21.747148] __kasan_kmalloc+0xb7/0xc0 [ 21.747526] __kmalloc_cache_noprof+0x189/0x420 [ 21.747900] kasan_atomics+0x95/0x310 [ 21.748294] kunit_try_run_case+0x1a5/0x480 [ 21.748583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.748977] kthread+0x337/0x6f0 [ 21.749305] ret_from_fork+0x41/0x80 [ 21.749665] ret_from_fork_asm+0x1a/0x30 [ 21.749910] [ 21.750160] The buggy address belongs to the object at ffff888101e04b00 [ 21.750160] which belongs to the cache kmalloc-64 of size 64 [ 21.750735] The buggy address is located 0 bytes to the right of [ 21.750735] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.751234] [ 21.751371] The buggy address belongs to the physical page: [ 21.751606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.752224] flags: 0x200000000000000(node=0|zone=2) [ 21.752678] page_type: f5(slab) [ 21.753021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.753659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.754272] page dumped because: kasan: bad access detected [ 21.754712] [ 21.754918] Memory state around the buggy address: [ 21.755181] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.755468] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.756056] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.756665] ^ [ 21.757141] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.757592] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.758034] ================================================================== [ 21.318068] ================================================================== [ 21.318754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 21.319354] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.319838] [ 21.320067] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.320201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.320231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.320272] Call Trace: [ 21.320312] <TASK> [ 21.320352] dump_stack_lvl+0x73/0xb0 [ 21.320428] print_report+0xd1/0x650 [ 21.320477] ? __virt_addr_valid+0x1db/0x2d0 [ 21.320527] ? kasan_atomics_helper+0x1b22/0x5450 [ 21.320608] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.320649] ? kasan_atomics_helper+0x1b22/0x5450 [ 21.320687] kasan_report+0x141/0x180 [ 21.320728] ? kasan_atomics_helper+0x1b22/0x5450 [ 21.320788] kasan_check_range+0x10c/0x1c0 [ 21.320821] __kasan_check_write+0x18/0x20 [ 21.320855] kasan_atomics_helper+0x1b22/0x5450 [ 21.320893] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.320927] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.320961] ? trace_hardirqs_on+0x37/0xe0 [ 21.320996] ? kasan_atomics+0x152/0x310 [ 21.321035] kasan_atomics+0x1dc/0x310 [ 21.321067] ? __pfx_kasan_atomics+0x10/0x10 [ 21.321100] ? __pfx_kasan_atomics+0x10/0x10 [ 21.321172] kunit_try_run_case+0x1a5/0x480 [ 21.321243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.321291] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.321347] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.321400] ? __kthread_parkme+0x82/0x180 [ 21.321444] ? preempt_count_sub+0x50/0x80 [ 21.321493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.321542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.321590] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.321635] kthread+0x337/0x6f0 [ 21.321669] ? trace_preempt_on+0x20/0xc0 [ 21.321710] ? __pfx_kthread+0x10/0x10 [ 21.321763] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.321809] ? calculate_sigpending+0x7b/0xa0 [ 21.321860] ? __pfx_kthread+0x10/0x10 [ 21.321904] ret_from_fork+0x41/0x80 [ 21.321956] ? __pfx_kthread+0x10/0x10 [ 21.322000] ret_from_fork_asm+0x1a/0x30 [ 21.322066] </TASK> [ 21.322096] [ 21.333280] Allocated by task 286: [ 21.333563] kasan_save_stack+0x45/0x70 [ 21.333908] kasan_save_track+0x18/0x40 [ 21.334292] kasan_save_alloc_info+0x3b/0x50 [ 21.334680] __kasan_kmalloc+0xb7/0xc0 [ 21.335047] __kmalloc_cache_noprof+0x189/0x420 [ 21.335460] kasan_atomics+0x95/0x310 [ 21.335792] kunit_try_run_case+0x1a5/0x480 [ 21.336126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.336535] kthread+0x337/0x6f0 [ 21.336795] ret_from_fork+0x41/0x80 [ 21.337171] ret_from_fork_asm+0x1a/0x30 [ 21.337437] [ 21.337619] The buggy address belongs to the object at ffff888101e04b00 [ 21.337619] which belongs to the cache kmalloc-64 of size 64 [ 21.338342] The buggy address is located 0 bytes to the right of [ 21.338342] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.338846] [ 21.339040] The buggy address belongs to the physical page: [ 21.339513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.340164] flags: 0x200000000000000(node=0|zone=2) [ 21.340492] page_type: f5(slab) [ 21.340812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.341290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.341690] page dumped because: kasan: bad access detected [ 21.342072] [ 21.342252] Memory state around the buggy address: [ 21.342555] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.342973] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.343436] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.343737] ^ [ 21.344173] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.344754] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.345162] ================================================================== [ 19.717724] ================================================================== [ 19.718729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 19.719112] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 19.719553] [ 19.719821] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.719934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.719965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.720013] Call Trace: [ 19.720045] <TASK> [ 19.720090] dump_stack_lvl+0x73/0xb0 [ 19.720160] print_report+0xd1/0x650 [ 19.720207] ? __virt_addr_valid+0x1db/0x2d0 [ 19.720261] ? kasan_atomics_helper+0x4bbc/0x5450 [ 19.720304] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.720345] ? kasan_atomics_helper+0x4bbc/0x5450 [ 19.720387] kasan_report+0x141/0x180 [ 19.720427] ? kasan_atomics_helper+0x4bbc/0x5450 [ 19.720480] __asan_report_load4_noabort+0x18/0x20 [ 19.720526] kasan_atomics_helper+0x4bbc/0x5450 [ 19.720573] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.720619] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.720663] ? trace_hardirqs_on+0x37/0xe0 [ 19.720715] ? kasan_atomics+0x152/0x310 [ 19.720784] kasan_atomics+0x1dc/0x310 [ 19.720832] ? __pfx_kasan_atomics+0x10/0x10 [ 19.720880] ? __pfx_kasan_atomics+0x10/0x10 [ 19.720928] kunit_try_run_case+0x1a5/0x480 [ 19.720983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.721028] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.721075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.721118] ? __kthread_parkme+0x82/0x180 [ 19.721174] ? preempt_count_sub+0x50/0x80 [ 19.721222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.721271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.721323] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.721361] kthread+0x337/0x6f0 [ 19.721383] ? trace_preempt_on+0x20/0xc0 [ 19.721408] ? __pfx_kthread+0x10/0x10 [ 19.721429] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.721452] ? calculate_sigpending+0x7b/0xa0 [ 19.721478] ? __pfx_kthread+0x10/0x10 [ 19.721499] ret_from_fork+0x41/0x80 [ 19.721525] ? __pfx_kthread+0x10/0x10 [ 19.721545] ret_from_fork_asm+0x1a/0x30 [ 19.721581] </TASK> [ 19.721598] [ 19.736519] Allocated by task 286: [ 19.736940] kasan_save_stack+0x45/0x70 [ 19.737351] kasan_save_track+0x18/0x40 [ 19.737819] kasan_save_alloc_info+0x3b/0x50 [ 19.738265] __kasan_kmalloc+0xb7/0xc0 [ 19.738857] __kmalloc_cache_noprof+0x189/0x420 [ 19.739440] kasan_atomics+0x95/0x310 [ 19.740030] kunit_try_run_case+0x1a5/0x480 [ 19.740600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.741097] kthread+0x337/0x6f0 [ 19.741622] ret_from_fork+0x41/0x80 [ 19.741922] ret_from_fork_asm+0x1a/0x30 [ 19.742430] [ 19.742802] The buggy address belongs to the object at ffff888101e04b00 [ 19.742802] which belongs to the cache kmalloc-64 of size 64 [ 19.743691] The buggy address is located 0 bytes to the right of [ 19.743691] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 19.744349] [ 19.744501] The buggy address belongs to the physical page: [ 19.744718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 19.745432] flags: 0x200000000000000(node=0|zone=2) [ 19.745705] page_type: f5(slab) [ 19.746079] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.746739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.747254] page dumped because: kasan: bad access detected [ 19.747611] [ 19.747828] Memory state around the buggy address: [ 19.748231] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.748728] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.749285] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.749801] ^ [ 19.750183] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.750689] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.751066] ================================================================== [ 19.975509] ================================================================== [ 19.975972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 19.976613] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 19.977099] [ 19.977280] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.977440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.977492] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.977571] Call Trace: [ 19.977634] <TASK> [ 19.977684] dump_stack_lvl+0x73/0xb0 [ 19.977777] print_report+0xd1/0x650 [ 19.977834] ? __virt_addr_valid+0x1db/0x2d0 [ 19.977890] ? kasan_atomics_helper+0x565/0x5450 [ 19.977939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.978039] ? kasan_atomics_helper+0x565/0x5450 [ 19.978098] kasan_report+0x141/0x180 [ 19.978146] ? kasan_atomics_helper+0x565/0x5450 [ 19.978199] kasan_check_range+0x10c/0x1c0 [ 19.978229] __kasan_check_write+0x18/0x20 [ 19.978253] kasan_atomics_helper+0x565/0x5450 [ 19.978279] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.978305] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.978331] ? trace_hardirqs_on+0x37/0xe0 [ 19.978358] ? kasan_atomics+0x152/0x310 [ 19.978384] kasan_atomics+0x1dc/0x310 [ 19.978407] ? __pfx_kasan_atomics+0x10/0x10 [ 19.978430] ? __pfx_kasan_atomics+0x10/0x10 [ 19.978458] kunit_try_run_case+0x1a5/0x480 [ 19.978488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.978513] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.978541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.978567] ? __kthread_parkme+0x82/0x180 [ 19.978591] ? preempt_count_sub+0x50/0x80 [ 19.978620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.978647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.978673] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.978701] kthread+0x337/0x6f0 [ 19.978721] ? trace_preempt_on+0x20/0xc0 [ 19.978765] ? __pfx_kthread+0x10/0x10 [ 19.978795] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.978820] ? calculate_sigpending+0x7b/0xa0 [ 19.978846] ? __pfx_kthread+0x10/0x10 [ 19.978868] ret_from_fork+0x41/0x80 [ 19.978896] ? __pfx_kthread+0x10/0x10 [ 19.978917] ret_from_fork_asm+0x1a/0x30 [ 19.978954] </TASK> [ 19.978971] [ 19.991868] Allocated by task 286: [ 19.992415] kasan_save_stack+0x45/0x70 [ 19.992693] kasan_save_track+0x18/0x40 [ 19.994395] kasan_save_alloc_info+0x3b/0x50 [ 19.995059] __kasan_kmalloc+0xb7/0xc0 [ 19.995268] __kmalloc_cache_noprof+0x189/0x420 [ 19.995682] kasan_atomics+0x95/0x310 [ 19.995945] kunit_try_run_case+0x1a5/0x480 [ 19.996309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.996593] kthread+0x337/0x6f0 [ 19.996996] ret_from_fork+0x41/0x80 [ 19.997243] ret_from_fork_asm+0x1a/0x30 [ 19.997666] [ 19.997873] The buggy address belongs to the object at ffff888101e04b00 [ 19.997873] which belongs to the cache kmalloc-64 of size 64 [ 19.998451] The buggy address is located 0 bytes to the right of [ 19.998451] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 19.999558] [ 19.999719] The buggy address belongs to the physical page: [ 19.999971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.000706] flags: 0x200000000000000(node=0|zone=2) [ 20.001219] page_type: f5(slab) [ 20.001610] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.002173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.002781] page dumped because: kasan: bad access detected [ 20.003034] [ 20.003187] Memory state around the buggy address: [ 20.003589] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.004259] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.004585] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.005164] ^ [ 20.005598] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.006161] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.006648] ================================================================== [ 20.929656] ================================================================== [ 20.930320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 20.930917] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.931552] [ 20.931882] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.932001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.932036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.932091] Call Trace: [ 20.932152] <TASK> [ 20.932199] dump_stack_lvl+0x73/0xb0 [ 20.932337] print_report+0xd1/0x650 [ 20.932441] ? __virt_addr_valid+0x1db/0x2d0 [ 20.932537] ? kasan_atomics_helper+0x1467/0x5450 [ 20.932589] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.932658] ? kasan_atomics_helper+0x1467/0x5450 [ 20.932714] kasan_report+0x141/0x180 [ 20.932782] ? kasan_atomics_helper+0x1467/0x5450 [ 20.932852] kasan_check_range+0x10c/0x1c0 [ 20.932901] __kasan_check_write+0x18/0x20 [ 20.932931] kasan_atomics_helper+0x1467/0x5450 [ 20.932960] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.932987] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.933013] ? trace_hardirqs_on+0x37/0xe0 [ 20.933045] ? kasan_atomics+0x152/0x310 [ 20.933089] kasan_atomics+0x1dc/0x310 [ 20.933168] ? __pfx_kasan_atomics+0x10/0x10 [ 20.933214] ? __pfx_kasan_atomics+0x10/0x10 [ 20.933272] kunit_try_run_case+0x1a5/0x480 [ 20.933331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.933373] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.933435] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.933501] ? __kthread_parkme+0x82/0x180 [ 20.933555] ? preempt_count_sub+0x50/0x80 [ 20.933619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.933665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.933695] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.933720] kthread+0x337/0x6f0 [ 20.933742] ? trace_preempt_on+0x20/0xc0 [ 20.933796] ? __pfx_kthread+0x10/0x10 [ 20.933819] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.933844] ? calculate_sigpending+0x7b/0xa0 [ 20.933871] ? __pfx_kthread+0x10/0x10 [ 20.933894] ret_from_fork+0x41/0x80 [ 20.933921] ? __pfx_kthread+0x10/0x10 [ 20.933943] ret_from_fork_asm+0x1a/0x30 [ 20.933980] </TASK> [ 20.933996] [ 20.948307] Allocated by task 286: [ 20.948642] kasan_save_stack+0x45/0x70 [ 20.948970] kasan_save_track+0x18/0x40 [ 20.949784] kasan_save_alloc_info+0x3b/0x50 [ 20.950110] __kasan_kmalloc+0xb7/0xc0 [ 20.950386] __kmalloc_cache_noprof+0x189/0x420 [ 20.950918] kasan_atomics+0x95/0x310 [ 20.951465] kunit_try_run_case+0x1a5/0x480 [ 20.951821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.952437] kthread+0x337/0x6f0 [ 20.952792] ret_from_fork+0x41/0x80 [ 20.953096] ret_from_fork_asm+0x1a/0x30 [ 20.953372] [ 20.953537] The buggy address belongs to the object at ffff888101e04b00 [ 20.953537] which belongs to the cache kmalloc-64 of size 64 [ 20.954781] The buggy address is located 0 bytes to the right of [ 20.954781] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.956027] [ 20.956299] The buggy address belongs to the physical page: [ 20.956523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.957488] flags: 0x200000000000000(node=0|zone=2) [ 20.957795] page_type: f5(slab) [ 20.958011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.958857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.959578] page dumped because: kasan: bad access detected [ 20.959923] [ 20.960122] Memory state around the buggy address: [ 20.960509] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.961470] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.961935] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.962767] ^ [ 20.963139] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.963665] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.964399] ================================================================== [ 20.965817] ================================================================== [ 20.966140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 20.966426] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.966628] [ 20.966722] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.966807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.966825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.966853] Call Trace: [ 20.966879] <TASK> [ 20.966906] dump_stack_lvl+0x73/0xb0 [ 20.966942] print_report+0xd1/0x650 [ 20.966968] ? __virt_addr_valid+0x1db/0x2d0 [ 20.966996] ? kasan_atomics_helper+0x50d4/0x5450 [ 20.967021] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.967047] ? kasan_atomics_helper+0x50d4/0x5450 [ 20.967072] kasan_report+0x141/0x180 [ 20.967097] ? kasan_atomics_helper+0x50d4/0x5450 [ 20.967126] __asan_report_store8_noabort+0x1b/0x30 [ 20.967150] kasan_atomics_helper+0x50d4/0x5450 [ 20.967177] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.967203] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.967229] ? trace_hardirqs_on+0x37/0xe0 [ 20.967255] ? kasan_atomics+0x152/0x310 [ 20.967282] kasan_atomics+0x1dc/0x310 [ 20.967304] ? __pfx_kasan_atomics+0x10/0x10 [ 20.967328] ? __pfx_kasan_atomics+0x10/0x10 [ 20.967354] kunit_try_run_case+0x1a5/0x480 [ 20.967384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.967409] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.967438] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.967463] ? __kthread_parkme+0x82/0x180 [ 20.967488] ? preempt_count_sub+0x50/0x80 [ 20.967517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.967545] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.967570] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.967598] kthread+0x337/0x6f0 [ 20.967618] ? trace_preempt_on+0x20/0xc0 [ 20.967665] ? __pfx_kthread+0x10/0x10 [ 20.967688] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.967711] ? calculate_sigpending+0x7b/0xa0 [ 20.967737] ? __pfx_kthread+0x10/0x10 [ 20.967851] ret_from_fork+0x41/0x80 [ 20.967897] ? __pfx_kthread+0x10/0x10 [ 20.967938] ret_from_fork_asm+0x1a/0x30 [ 20.968008] </TASK> [ 20.968036] [ 20.983289] Allocated by task 286: [ 20.983607] kasan_save_stack+0x45/0x70 [ 20.984066] kasan_save_track+0x18/0x40 [ 20.984573] kasan_save_alloc_info+0x3b/0x50 [ 20.984887] __kasan_kmalloc+0xb7/0xc0 [ 20.985355] __kmalloc_cache_noprof+0x189/0x420 [ 20.986058] kasan_atomics+0x95/0x310 [ 20.986309] kunit_try_run_case+0x1a5/0x480 [ 20.986638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.987088] kthread+0x337/0x6f0 [ 20.987382] ret_from_fork+0x41/0x80 [ 20.987740] ret_from_fork_asm+0x1a/0x30 [ 20.987985] [ 20.988290] The buggy address belongs to the object at ffff888101e04b00 [ 20.988290] which belongs to the cache kmalloc-64 of size 64 [ 20.989401] The buggy address is located 0 bytes to the right of [ 20.989401] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.990135] [ 20.990610] The buggy address belongs to the physical page: [ 20.991165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.991926] flags: 0x200000000000000(node=0|zone=2) [ 20.992393] page_type: f5(slab) [ 20.992679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.993166] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.993358] page dumped because: kasan: bad access detected [ 20.993493] [ 20.993559] Memory state around the buggy address: [ 20.993686] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.994285] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.994975] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.995683] ^ [ 20.996189] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.996502] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.997103] ================================================================== [ 20.343494] ================================================================== [ 20.344420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 20.345112] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.345690] [ 20.345917] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.346028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.346062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.346106] Call Trace: [ 20.346149] <TASK> [ 20.346193] dump_stack_lvl+0x73/0xb0 [ 20.346264] print_report+0xd1/0x650 [ 20.346318] ? __virt_addr_valid+0x1db/0x2d0 [ 20.346373] ? kasan_atomics_helper+0xc70/0x5450 [ 20.346420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.346500] ? kasan_atomics_helper+0xc70/0x5450 [ 20.346550] kasan_report+0x141/0x180 [ 20.346602] ? kasan_atomics_helper+0xc70/0x5450 [ 20.346659] kasan_check_range+0x10c/0x1c0 [ 20.346703] __kasan_check_write+0x18/0x20 [ 20.346762] kasan_atomics_helper+0xc70/0x5450 [ 20.346813] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.346866] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.346917] ? trace_hardirqs_on+0x37/0xe0 [ 20.346963] ? kasan_atomics+0x152/0x310 [ 20.347008] kasan_atomics+0x1dc/0x310 [ 20.347054] ? __pfx_kasan_atomics+0x10/0x10 [ 20.347097] ? __pfx_kasan_atomics+0x10/0x10 [ 20.347146] kunit_try_run_case+0x1a5/0x480 [ 20.347206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.347259] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.347304] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.347332] ? __kthread_parkme+0x82/0x180 [ 20.347359] ? preempt_count_sub+0x50/0x80 [ 20.347390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.347416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.347442] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.347468] kthread+0x337/0x6f0 [ 20.347488] ? trace_preempt_on+0x20/0xc0 [ 20.347515] ? __pfx_kthread+0x10/0x10 [ 20.347537] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.347562] ? calculate_sigpending+0x7b/0xa0 [ 20.347588] ? __pfx_kthread+0x10/0x10 [ 20.347610] ret_from_fork+0x41/0x80 [ 20.347651] ? __pfx_kthread+0x10/0x10 [ 20.347675] ret_from_fork_asm+0x1a/0x30 [ 20.347713] </TASK> [ 20.347731] [ 20.361115] Allocated by task 286: [ 20.361358] kasan_save_stack+0x45/0x70 [ 20.361557] kasan_save_track+0x18/0x40 [ 20.361721] kasan_save_alloc_info+0x3b/0x50 [ 20.361905] __kasan_kmalloc+0xb7/0xc0 [ 20.362213] __kmalloc_cache_noprof+0x189/0x420 [ 20.362762] kasan_atomics+0x95/0x310 [ 20.363697] kunit_try_run_case+0x1a5/0x480 [ 20.363936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.364434] kthread+0x337/0x6f0 [ 20.365327] ret_from_fork+0x41/0x80 [ 20.365622] ret_from_fork_asm+0x1a/0x30 [ 20.365847] [ 20.366059] The buggy address belongs to the object at ffff888101e04b00 [ 20.366059] which belongs to the cache kmalloc-64 of size 64 [ 20.366810] The buggy address is located 0 bytes to the right of [ 20.366810] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.367542] [ 20.367716] The buggy address belongs to the physical page: [ 20.368053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.368425] flags: 0x200000000000000(node=0|zone=2) [ 20.368730] page_type: f5(slab) [ 20.369208] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.369902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.370606] page dumped because: kasan: bad access detected [ 20.370879] [ 20.371079] Memory state around the buggy address: [ 20.371636] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.372327] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.372836] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.373442] ^ [ 20.373689] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.374368] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.375001] ================================================================== [ 19.785529] ================================================================== [ 19.786267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 19.786895] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 19.787234] [ 19.787503] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.787599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.787631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.787669] Call Trace: [ 19.787702] <TASK> [ 19.787739] dump_stack_lvl+0x73/0xb0 [ 19.787809] print_report+0xd1/0x650 [ 19.787847] ? __virt_addr_valid+0x1db/0x2d0 [ 19.787886] ? kasan_atomics_helper+0x4b88/0x5450 [ 19.787921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.787956] ? kasan_atomics_helper+0x4b88/0x5450 [ 19.787992] kasan_report+0x141/0x180 [ 19.788025] ? kasan_atomics_helper+0x4b88/0x5450 [ 19.788067] __asan_report_load4_noabort+0x18/0x20 [ 19.788132] kasan_atomics_helper+0x4b88/0x5450 [ 19.788194] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.788239] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.788281] ? trace_hardirqs_on+0x37/0xe0 [ 19.788322] ? kasan_atomics+0x152/0x310 [ 19.788376] kasan_atomics+0x1dc/0x310 [ 19.788419] ? __pfx_kasan_atomics+0x10/0x10 [ 19.788463] ? __pfx_kasan_atomics+0x10/0x10 [ 19.788517] kunit_try_run_case+0x1a5/0x480 [ 19.788596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.788638] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.788683] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.788729] ? __kthread_parkme+0x82/0x180 [ 19.788788] ? preempt_count_sub+0x50/0x80 [ 19.789162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.789233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.789332] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.789391] kthread+0x337/0x6f0 [ 19.789438] ? trace_preempt_on+0x20/0xc0 [ 19.789494] ? __pfx_kthread+0x10/0x10 [ 19.789530] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.789556] ? calculate_sigpending+0x7b/0xa0 [ 19.789583] ? __pfx_kthread+0x10/0x10 [ 19.789605] ret_from_fork+0x41/0x80 [ 19.789633] ? __pfx_kthread+0x10/0x10 [ 19.789655] ret_from_fork_asm+0x1a/0x30 [ 19.789693] </TASK> [ 19.789710] [ 19.799396] Allocated by task 286: [ 19.799612] kasan_save_stack+0x45/0x70 [ 19.800932] kasan_save_track+0x18/0x40 [ 19.801343] kasan_save_alloc_info+0x3b/0x50 [ 19.801726] __kasan_kmalloc+0xb7/0xc0 [ 19.802097] __kmalloc_cache_noprof+0x189/0x420 [ 19.802411] kasan_atomics+0x95/0x310 [ 19.802619] kunit_try_run_case+0x1a5/0x480 [ 19.802959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.803490] kthread+0x337/0x6f0 [ 19.803842] ret_from_fork+0x41/0x80 [ 19.804224] ret_from_fork_asm+0x1a/0x30 [ 19.804474] [ 19.804614] The buggy address belongs to the object at ffff888101e04b00 [ 19.804614] which belongs to the cache kmalloc-64 of size 64 [ 19.805076] The buggy address is located 0 bytes to the right of [ 19.805076] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 19.805653] [ 19.805855] The buggy address belongs to the physical page: [ 19.806357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 19.807013] flags: 0x200000000000000(node=0|zone=2) [ 19.807473] page_type: f5(slab) [ 19.807820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.808482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.808887] page dumped because: kasan: bad access detected [ 19.809159] [ 19.809336] Memory state around the buggy address: [ 19.809769] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.810340] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.810867] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.811193] ^ [ 19.811429] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.811732] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.812321] ================================================================== [ 20.759559] ================================================================== [ 20.761778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 20.763072] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.763531] [ 20.763725] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.763858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.763890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.763937] Call Trace: [ 20.763983] <TASK> [ 20.764031] dump_stack_lvl+0x73/0xb0 [ 20.764115] print_report+0xd1/0x650 [ 20.764184] ? __virt_addr_valid+0x1db/0x2d0 [ 20.764237] ? kasan_atomics_helper+0x49e8/0x5450 [ 20.764284] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.764333] ? kasan_atomics_helper+0x49e8/0x5450 [ 20.764386] kasan_report+0x141/0x180 [ 20.764444] ? kasan_atomics_helper+0x49e8/0x5450 [ 20.764509] __asan_report_load4_noabort+0x18/0x20 [ 20.764562] kasan_atomics_helper+0x49e8/0x5450 [ 20.764610] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.764652] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.764698] ? trace_hardirqs_on+0x37/0xe0 [ 20.764773] ? kasan_atomics+0x152/0x310 [ 20.764827] kasan_atomics+0x1dc/0x310 [ 20.764876] ? __pfx_kasan_atomics+0x10/0x10 [ 20.764919] ? __pfx_kasan_atomics+0x10/0x10 [ 20.764977] kunit_try_run_case+0x1a5/0x480 [ 20.765040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.765090] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.765139] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.765187] ? __kthread_parkme+0x82/0x180 [ 20.765230] ? preempt_count_sub+0x50/0x80 [ 20.765279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.765329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.765378] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.765421] kthread+0x337/0x6f0 [ 20.765455] ? trace_preempt_on+0x20/0xc0 [ 20.765505] ? __pfx_kthread+0x10/0x10 [ 20.765546] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.765597] ? calculate_sigpending+0x7b/0xa0 [ 20.765646] ? __pfx_kthread+0x10/0x10 [ 20.765692] ret_from_fork+0x41/0x80 [ 20.765783] ? __pfx_kthread+0x10/0x10 [ 20.765833] ret_from_fork_asm+0x1a/0x30 [ 20.765908] </TASK> [ 20.765942] [ 20.779994] Allocated by task 286: [ 20.780497] kasan_save_stack+0x45/0x70 [ 20.781368] kasan_save_track+0x18/0x40 [ 20.781574] kasan_save_alloc_info+0x3b/0x50 [ 20.781765] __kasan_kmalloc+0xb7/0xc0 [ 20.781984] __kmalloc_cache_noprof+0x189/0x420 [ 20.782915] kasan_atomics+0x95/0x310 [ 20.783173] kunit_try_run_case+0x1a5/0x480 [ 20.783440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.783707] kthread+0x337/0x6f0 [ 20.784015] ret_from_fork+0x41/0x80 [ 20.784235] ret_from_fork_asm+0x1a/0x30 [ 20.784561] [ 20.784742] The buggy address belongs to the object at ffff888101e04b00 [ 20.784742] which belongs to the cache kmalloc-64 of size 64 [ 20.785392] The buggy address is located 0 bytes to the right of [ 20.785392] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.786317] [ 20.786509] The buggy address belongs to the physical page: [ 20.786859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.787376] flags: 0x200000000000000(node=0|zone=2) [ 20.787816] page_type: f5(slab) [ 20.788019] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.788649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.789085] page dumped because: kasan: bad access detected [ 20.789538] [ 20.789723] Memory state around the buggy address: [ 20.790168] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.790501] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.790944] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.791327] ^ [ 20.791709] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.792226] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.792631] ================================================================== [ 20.474412] ================================================================== [ 20.475010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 20.475422] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.476081] [ 20.476394] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.476521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.476575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.476627] Call Trace: [ 20.476673] <TASK> [ 20.476719] dump_stack_lvl+0x73/0xb0 [ 20.476809] print_report+0xd1/0x650 [ 20.476886] ? __virt_addr_valid+0x1db/0x2d0 [ 20.476942] ? kasan_atomics_helper+0xe78/0x5450 [ 20.476994] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.477040] ? kasan_atomics_helper+0xe78/0x5450 [ 20.477069] kasan_report+0x141/0x180 [ 20.477096] ? kasan_atomics_helper+0xe78/0x5450 [ 20.477160] kasan_check_range+0x10c/0x1c0 [ 20.477204] __kasan_check_write+0x18/0x20 [ 20.477240] kasan_atomics_helper+0xe78/0x5450 [ 20.477267] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.477293] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.477318] ? trace_hardirqs_on+0x37/0xe0 [ 20.477344] ? kasan_atomics+0x152/0x310 [ 20.477372] kasan_atomics+0x1dc/0x310 [ 20.477394] ? __pfx_kasan_atomics+0x10/0x10 [ 20.477418] ? __pfx_kasan_atomics+0x10/0x10 [ 20.477445] kunit_try_run_case+0x1a5/0x480 [ 20.477474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.477499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.477527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.477553] ? __kthread_parkme+0x82/0x180 [ 20.477579] ? preempt_count_sub+0x50/0x80 [ 20.477607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.477635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.477661] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.477687] kthread+0x337/0x6f0 [ 20.477708] ? trace_preempt_on+0x20/0xc0 [ 20.477734] ? __pfx_kthread+0x10/0x10 [ 20.477778] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.477805] ? calculate_sigpending+0x7b/0xa0 [ 20.477830] ? __pfx_kthread+0x10/0x10 [ 20.477852] ret_from_fork+0x41/0x80 [ 20.477880] ? __pfx_kthread+0x10/0x10 [ 20.477902] ret_from_fork_asm+0x1a/0x30 [ 20.477939] </TASK> [ 20.477957] [ 20.491914] Allocated by task 286: [ 20.492400] kasan_save_stack+0x45/0x70 [ 20.493413] kasan_save_track+0x18/0x40 [ 20.493863] kasan_save_alloc_info+0x3b/0x50 [ 20.494343] __kasan_kmalloc+0xb7/0xc0 [ 20.494728] __kmalloc_cache_noprof+0x189/0x420 [ 20.495278] kasan_atomics+0x95/0x310 [ 20.495728] kunit_try_run_case+0x1a5/0x480 [ 20.496223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.496738] kthread+0x337/0x6f0 [ 20.497179] ret_from_fork+0x41/0x80 [ 20.497643] ret_from_fork_asm+0x1a/0x30 [ 20.498070] [ 20.498319] The buggy address belongs to the object at ffff888101e04b00 [ 20.498319] which belongs to the cache kmalloc-64 of size 64 [ 20.499433] The buggy address is located 0 bytes to the right of [ 20.499433] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.500210] [ 20.500449] The buggy address belongs to the physical page: [ 20.500991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.501557] flags: 0x200000000000000(node=0|zone=2) [ 20.501910] page_type: f5(slab) [ 20.502330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.502833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.503276] page dumped because: kasan: bad access detected [ 20.503550] [ 20.503731] Memory state around the buggy address: [ 20.504228] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.504787] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.505322] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.505765] ^ [ 20.506257] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.506682] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.507135] ================================================================== [ 21.036549] ================================================================== [ 21.037219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 21.037756] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.038080] [ 21.038259] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.038372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.038401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.038449] Call Trace: [ 21.038495] <TASK> [ 21.038541] dump_stack_lvl+0x73/0xb0 [ 21.038614] print_report+0xd1/0x650 [ 21.038665] ? __virt_addr_valid+0x1db/0x2d0 [ 21.038717] ? kasan_atomics_helper+0x15b6/0x5450 [ 21.038784] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.038837] ? kasan_atomics_helper+0x15b6/0x5450 [ 21.038885] kasan_report+0x141/0x180 [ 21.038937] ? kasan_atomics_helper+0x15b6/0x5450 [ 21.038993] kasan_check_range+0x10c/0x1c0 [ 21.039040] __kasan_check_write+0x18/0x20 [ 21.039088] kasan_atomics_helper+0x15b6/0x5450 [ 21.039145] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.039194] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.039240] ? trace_hardirqs_on+0x37/0xe0 [ 21.039290] ? kasan_atomics+0x152/0x310 [ 21.039341] kasan_atomics+0x1dc/0x310 [ 21.039384] ? __pfx_kasan_atomics+0x10/0x10 [ 21.039429] ? __pfx_kasan_atomics+0x10/0x10 [ 21.039487] kunit_try_run_case+0x1a5/0x480 [ 21.039544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.039594] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.039662] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.039711] ? __kthread_parkme+0x82/0x180 [ 21.039804] ? preempt_count_sub+0x50/0x80 [ 21.039865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.039906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.039935] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.039961] kthread+0x337/0x6f0 [ 21.039984] ? trace_preempt_on+0x20/0xc0 [ 21.040011] ? __pfx_kthread+0x10/0x10 [ 21.040033] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.040057] ? calculate_sigpending+0x7b/0xa0 [ 21.040083] ? __pfx_kthread+0x10/0x10 [ 21.040126] ret_from_fork+0x41/0x80 [ 21.040168] ? __pfx_kthread+0x10/0x10 [ 21.040191] ret_from_fork_asm+0x1a/0x30 [ 21.040230] </TASK> [ 21.040247] [ 21.053977] Allocated by task 286: [ 21.054357] kasan_save_stack+0x45/0x70 [ 21.054843] kasan_save_track+0x18/0x40 [ 21.055181] kasan_save_alloc_info+0x3b/0x50 [ 21.055587] __kasan_kmalloc+0xb7/0xc0 [ 21.055944] __kmalloc_cache_noprof+0x189/0x420 [ 21.056223] kasan_atomics+0x95/0x310 [ 21.056650] kunit_try_run_case+0x1a5/0x480 [ 21.057079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.057616] kthread+0x337/0x6f0 [ 21.058003] ret_from_fork+0x41/0x80 [ 21.058260] ret_from_fork_asm+0x1a/0x30 [ 21.058687] [ 21.058913] The buggy address belongs to the object at ffff888101e04b00 [ 21.058913] which belongs to the cache kmalloc-64 of size 64 [ 21.059666] The buggy address is located 0 bytes to the right of [ 21.059666] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.060732] [ 21.060893] The buggy address belongs to the physical page: [ 21.061211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.061854] flags: 0x200000000000000(node=0|zone=2) [ 21.062108] page_type: f5(slab) [ 21.062318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.062610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.063325] page dumped because: kasan: bad access detected [ 21.063888] [ 21.064085] Memory state around the buggy address: [ 21.064563] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.065169] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.065456] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.066067] ^ [ 21.066508] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.067091] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.067504] ================================================================== [ 21.695437] ================================================================== [ 21.695837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 21.696606] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 21.698615] [ 21.699075] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 21.699232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.699262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.699309] Call Trace: [ 21.699355] <TASK> [ 21.699400] dump_stack_lvl+0x73/0xb0 [ 21.699487] print_report+0xd1/0x650 [ 21.699547] ? __virt_addr_valid+0x1db/0x2d0 [ 21.699607] ? kasan_atomics_helper+0x4fb2/0x5450 [ 21.699674] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.699732] ? kasan_atomics_helper+0x4fb2/0x5450 [ 21.699798] kasan_report+0x141/0x180 [ 21.699853] ? kasan_atomics_helper+0x4fb2/0x5450 [ 21.699922] __asan_report_load8_noabort+0x18/0x20 [ 21.699975] kasan_atomics_helper+0x4fb2/0x5450 [ 21.700031] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.700080] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.700219] ? trace_hardirqs_on+0x37/0xe0 [ 21.700293] ? kasan_atomics+0x152/0x310 [ 21.700358] kasan_atomics+0x1dc/0x310 [ 21.700410] ? __pfx_kasan_atomics+0x10/0x10 [ 21.700462] ? __pfx_kasan_atomics+0x10/0x10 [ 21.700524] kunit_try_run_case+0x1a5/0x480 [ 21.700581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.700634] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.700691] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.700758] ? __kthread_parkme+0x82/0x180 [ 21.700816] ? preempt_count_sub+0x50/0x80 [ 21.700879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.700938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.700996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.701050] kthread+0x337/0x6f0 [ 21.701096] ? trace_preempt_on+0x20/0xc0 [ 21.701182] ? __pfx_kthread+0x10/0x10 [ 21.701231] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.701278] ? calculate_sigpending+0x7b/0xa0 [ 21.701324] ? __pfx_kthread+0x10/0x10 [ 21.701372] ret_from_fork+0x41/0x80 [ 21.701425] ? __pfx_kthread+0x10/0x10 [ 21.701473] ret_from_fork_asm+0x1a/0x30 [ 21.701551] </TASK> [ 21.701587] [ 21.715974] Allocated by task 286: [ 21.716408] kasan_save_stack+0x45/0x70 [ 21.716650] kasan_save_track+0x18/0x40 [ 21.717369] kasan_save_alloc_info+0x3b/0x50 [ 21.717789] __kasan_kmalloc+0xb7/0xc0 [ 21.717974] __kmalloc_cache_noprof+0x189/0x420 [ 21.718345] kasan_atomics+0x95/0x310 [ 21.718691] kunit_try_run_case+0x1a5/0x480 [ 21.718930] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.719419] kthread+0x337/0x6f0 [ 21.719774] ret_from_fork+0x41/0x80 [ 21.719979] ret_from_fork_asm+0x1a/0x30 [ 21.720393] [ 21.720570] The buggy address belongs to the object at ffff888101e04b00 [ 21.720570] which belongs to the cache kmalloc-64 of size 64 [ 21.721394] The buggy address is located 0 bytes to the right of [ 21.721394] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 21.722285] [ 21.722426] The buggy address belongs to the physical page: [ 21.722902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 21.723427] flags: 0x200000000000000(node=0|zone=2) [ 21.723859] page_type: f5(slab) [ 21.724249] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.724659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.725521] page dumped because: kasan: bad access detected [ 21.725815] [ 21.726032] Memory state around the buggy address: [ 21.726415] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.726892] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.727287] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.727741] ^ [ 21.728139] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.728640] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.729131] ================================================================== [ 20.441531] ================================================================== [ 20.442082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 20.442657] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.442935] [ 20.443125] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.443240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.443273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.443325] Call Trace: [ 20.443373] <TASK> [ 20.443421] dump_stack_lvl+0x73/0xb0 [ 20.443491] print_report+0xd1/0x650 [ 20.443541] ? __virt_addr_valid+0x1db/0x2d0 [ 20.443586] ? kasan_atomics_helper+0xde0/0x5450 [ 20.443639] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.443693] ? kasan_atomics_helper+0xde0/0x5450 [ 20.443736] kasan_report+0x141/0x180 [ 20.443802] ? kasan_atomics_helper+0xde0/0x5450 [ 20.443865] kasan_check_range+0x10c/0x1c0 [ 20.443919] __kasan_check_write+0x18/0x20 [ 20.443971] kasan_atomics_helper+0xde0/0x5450 [ 20.444031] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.444084] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.444169] ? trace_hardirqs_on+0x37/0xe0 [ 20.444221] ? kasan_atomics+0x152/0x310 [ 20.444272] kasan_atomics+0x1dc/0x310 [ 20.444314] ? __pfx_kasan_atomics+0x10/0x10 [ 20.444359] ? __pfx_kasan_atomics+0x10/0x10 [ 20.444415] kunit_try_run_case+0x1a5/0x480 [ 20.444464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.444498] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.444536] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.444572] ? __kthread_parkme+0x82/0x180 [ 20.444607] ? preempt_count_sub+0x50/0x80 [ 20.444647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.444684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.444721] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.444775] kthread+0x337/0x6f0 [ 20.444807] ? trace_preempt_on+0x20/0xc0 [ 20.444847] ? __pfx_kthread+0x10/0x10 [ 20.444878] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.444912] ? calculate_sigpending+0x7b/0xa0 [ 20.444948] ? __pfx_kthread+0x10/0x10 [ 20.444983] ret_from_fork+0x41/0x80 [ 20.445022] ? __pfx_kthread+0x10/0x10 [ 20.445061] ret_from_fork_asm+0x1a/0x30 [ 20.445158] </TASK> [ 20.445191] [ 20.456980] Allocated by task 286: [ 20.457441] kasan_save_stack+0x45/0x70 [ 20.457903] kasan_save_track+0x18/0x40 [ 20.458265] kasan_save_alloc_info+0x3b/0x50 [ 20.458575] __kasan_kmalloc+0xb7/0xc0 [ 20.458853] __kmalloc_cache_noprof+0x189/0x420 [ 20.459273] kasan_atomics+0x95/0x310 [ 20.459555] kunit_try_run_case+0x1a5/0x480 [ 20.459871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.460319] kthread+0x337/0x6f0 [ 20.460527] ret_from_fork+0x41/0x80 [ 20.460772] ret_from_fork_asm+0x1a/0x30 [ 20.461173] [ 20.461391] The buggy address belongs to the object at ffff888101e04b00 [ 20.461391] which belongs to the cache kmalloc-64 of size 64 [ 20.463479] The buggy address is located 0 bytes to the right of [ 20.463479] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.464278] [ 20.465087] The buggy address belongs to the physical page: [ 20.465705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.466191] flags: 0x200000000000000(node=0|zone=2) [ 20.466477] page_type: f5(slab) [ 20.466815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.467260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.468024] page dumped because: kasan: bad access detected [ 20.468609] [ 20.468826] Memory state around the buggy address: [ 20.469491] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.469948] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.470582] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.471150] ^ [ 20.471780] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.472207] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.472772] ================================================================== [ 20.726118] ================================================================== [ 20.727331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 20.728004] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286 [ 20.728808] [ 20.729047] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 20.729164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.729197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.729246] Call Trace: [ 20.729294] <TASK> [ 20.729343] dump_stack_lvl+0x73/0xb0 [ 20.729419] print_report+0xd1/0x650 [ 20.729472] ? __virt_addr_valid+0x1db/0x2d0 [ 20.729526] ? kasan_atomics_helper+0x1217/0x5450 [ 20.729580] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.729635] ? kasan_atomics_helper+0x1217/0x5450 [ 20.729691] kasan_report+0x141/0x180 [ 20.729738] ? kasan_atomics_helper+0x1217/0x5450 [ 20.729807] kasan_check_range+0x10c/0x1c0 [ 20.729845] __kasan_check_write+0x18/0x20 [ 20.729886] kasan_atomics_helper+0x1217/0x5450 [ 20.729936] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.729987] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.730039] ? trace_hardirqs_on+0x37/0xe0 [ 20.730092] ? kasan_atomics+0x152/0x310 [ 20.730149] kasan_atomics+0x1dc/0x310 [ 20.730199] ? __pfx_kasan_atomics+0x10/0x10 [ 20.730236] ? __pfx_kasan_atomics+0x10/0x10 [ 20.730284] kunit_try_run_case+0x1a5/0x480 [ 20.730346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.730396] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.730457] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.730507] ? __kthread_parkme+0x82/0x180 [ 20.730561] ? preempt_count_sub+0x50/0x80 [ 20.730621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.730676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.730733] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.730803] kthread+0x337/0x6f0 [ 20.730848] ? trace_preempt_on+0x20/0xc0 [ 20.730904] ? __pfx_kthread+0x10/0x10 [ 20.730952] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.731005] ? calculate_sigpending+0x7b/0xa0 [ 20.731059] ? __pfx_kthread+0x10/0x10 [ 20.731109] ret_from_fork+0x41/0x80 [ 20.731162] ? __pfx_kthread+0x10/0x10 [ 20.731212] ret_from_fork_asm+0x1a/0x30 [ 20.731288] </TASK> [ 20.731321] [ 20.741937] Allocated by task 286: [ 20.742325] kasan_save_stack+0x45/0x70 [ 20.742602] kasan_save_track+0x18/0x40 [ 20.742830] kasan_save_alloc_info+0x3b/0x50 [ 20.743053] __kasan_kmalloc+0xb7/0xc0 [ 20.743257] __kmalloc_cache_noprof+0x189/0x420 [ 20.743482] kasan_atomics+0x95/0x310 [ 20.743800] kunit_try_run_case+0x1a5/0x480 [ 20.744138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.744545] kthread+0x337/0x6f0 [ 20.744857] ret_from_fork+0x41/0x80 [ 20.745181] ret_from_fork_asm+0x1a/0x30 [ 20.748564] [ 20.748818] The buggy address belongs to the object at ffff888101e04b00 [ 20.748818] which belongs to the cache kmalloc-64 of size 64 [ 20.749269] The buggy address is located 0 bytes to the right of [ 20.749269] allocated 48-byte region [ffff888101e04b00, ffff888101e04b30) [ 20.749698] [ 20.749925] The buggy address belongs to the physical page: [ 20.750163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04 [ 20.750487] flags: 0x200000000000000(node=0|zone=2) [ 20.750732] page_type: f5(slab) [ 20.750941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.754876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.755650] page dumped because: kasan: bad access detected [ 20.756188] [ 20.756388] Memory state around the buggy address: [ 20.756828] ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.757083] ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.757354] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.757614] ^ [ 20.757897] ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.758194] ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.758471] ==================================================================