Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 26.112901] ================================================================== [ 26.113025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 26.113709] [ 26.114117] Hardware name: linux,dummy-virt (DT) [ 26.114461] dump_stack_lvl+0x8c/0xd0 [ 26.114945] kasan_atomics_helper+0x3f94/0x4858 [ 26.115333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.116207] ret_from_fork+0x10/0x20 [ 26.117090] kasan_save_alloc_info+0x40/0x58 [ 26.117988] kasan_atomics+0xb8/0x2e0 [ 26.118936] [ 26.118981] The buggy address belongs to the physical page: [ 26.119056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.119210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.120225] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.120576] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.122749] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.125644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.129625] [ 26.129772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.129915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.131076] [ 26.131683] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.134598] [ 26.135238] Call trace: [ 26.137068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.139110] kasan_save_alloc_info+0x40/0x58 [ 26.139664] kasan_atomics+0xb8/0x2e0 [ 26.141847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.143597] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.145099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 26.148993] kasan_save_stack+0x3c/0x68 [ 26.151487] [ 26.151936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.152690] page_type: f5(slab) [ 26.153109] page dumped because: kasan: bad access detected [ 26.153605] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.154733] ================================================================== [ 26.732380] ================================================================== [ 26.732526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 26.732657] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.732771] [ 26.732851] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.733051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.733119] Hardware name: linux,dummy-virt (DT) [ 26.733199] Call trace: [ 26.733256] show_stack+0x20/0x38 (C) [ 26.733378] dump_stack_lvl+0x8c/0xd0 [ 26.733516] print_report+0x118/0x608 [ 26.733959] kasan_report+0xdc/0x128 [ 26.734153] kasan_check_range+0x100/0x1a8 [ 26.734335] __kasan_check_write+0x20/0x30 [ 26.734495] kasan_atomics_helper+0x175c/0x4858 [ 26.734626] kasan_atomics+0x198/0x2e0 [ 26.734745] kunit_try_run_case+0x170/0x3f0 [ 26.734925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.735123] kthread+0x328/0x630 [ 26.735238] ret_from_fork+0x10/0x20 [ 26.735393] [ 26.735453] Allocated by task 269: [ 26.735526] kasan_save_stack+0x3c/0x68 [ 26.735627] kasan_save_track+0x20/0x40 [ 26.735726] kasan_save_alloc_info+0x40/0x58 [ 26.735825] __kasan_kmalloc+0xd4/0xd8 [ 26.735930] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.736105] kasan_atomics+0xb8/0x2e0 [ 26.736187] kunit_try_run_case+0x170/0x3f0 [ 26.736291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.736451] kthread+0x328/0x630 [ 26.736602] ret_from_fork+0x10/0x20 [ 26.736746] [ 26.736825] The buggy address belongs to the object at fff00000c7733980 [ 26.736825] which belongs to the cache kmalloc-64 of size 64 [ 26.737057] The buggy address is located 0 bytes to the right of [ 26.737057] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.737301] [ 26.737358] The buggy address belongs to the physical page: [ 26.737456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.737593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.737732] page_type: f5(slab) [ 26.737837] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.737973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.738094] page dumped because: kasan: bad access detected [ 26.738186] [ 26.738238] Memory state around the buggy address: [ 26.738345] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.738533] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.738704] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.738806] ^ [ 26.738903] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.739032] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.739129] ================================================================== [ 26.440320] ================================================================== [ 26.440455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 26.440561] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.440679] [ 26.440756] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.440969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.441029] Hardware name: linux,dummy-virt (DT) [ 26.441116] Call trace: [ 26.441197] show_stack+0x20/0x38 (C) [ 26.441350] dump_stack_lvl+0x8c/0xd0 [ 26.441497] print_report+0x118/0x608 [ 26.441665] kasan_report+0xdc/0x128 [ 26.441766] kasan_check_range+0x100/0x1a8 [ 26.441877] __kasan_check_write+0x20/0x30 [ 26.441998] kasan_atomics_helper+0xe44/0x4858 [ 26.442119] kasan_atomics+0x198/0x2e0 [ 26.442230] kunit_try_run_case+0x170/0x3f0 [ 26.442373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.442527] kthread+0x328/0x630 [ 26.442640] ret_from_fork+0x10/0x20 [ 26.442757] [ 26.442820] Allocated by task 269: [ 26.442905] kasan_save_stack+0x3c/0x68 [ 26.443007] kasan_save_track+0x20/0x40 [ 26.443114] kasan_save_alloc_info+0x40/0x58 [ 26.443224] __kasan_kmalloc+0xd4/0xd8 [ 26.443305] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.443423] kasan_atomics+0xb8/0x2e0 [ 26.443542] kunit_try_run_case+0x170/0x3f0 [ 26.443639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.443750] kthread+0x328/0x630 [ 26.443876] ret_from_fork+0x10/0x20 [ 26.443978] [ 26.444059] The buggy address belongs to the object at fff00000c7733980 [ 26.444059] which belongs to the cache kmalloc-64 of size 64 [ 26.444263] The buggy address is located 0 bytes to the right of [ 26.444263] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.444489] [ 26.444582] The buggy address belongs to the physical page: [ 26.444665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.444808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.444925] page_type: f5(slab) [ 26.445006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.445128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.445243] page dumped because: kasan: bad access detected [ 26.445322] [ 26.445369] Memory state around the buggy address: [ 26.445480] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.445586] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.445705] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.445821] ^ [ 26.445954] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.446123] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.446273] ================================================================== [ 26.676764] ================================================================== [ 26.676896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 26.677024] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.677153] [ 26.677243] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.677471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.677943] Hardware name: linux,dummy-virt (DT) [ 26.678035] Call trace: [ 26.678174] show_stack+0x20/0x38 (C) [ 26.678442] dump_stack_lvl+0x8c/0xd0 [ 26.678610] print_report+0x118/0x608 [ 26.678673] kasan_report+0xdc/0x128 [ 26.678754] __asan_report_load8_noabort+0x20/0x30 [ 26.678815] kasan_atomics_helper+0x3db0/0x4858 [ 26.678882] kasan_atomics+0x198/0x2e0 [ 26.679028] kunit_try_run_case+0x170/0x3f0 [ 26.679206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.679398] kthread+0x328/0x630 [ 26.679506] ret_from_fork+0x10/0x20 [ 26.679623] [ 26.679666] Allocated by task 269: [ 26.679738] kasan_save_stack+0x3c/0x68 [ 26.679840] kasan_save_track+0x20/0x40 [ 26.679929] kasan_save_alloc_info+0x40/0x58 [ 26.680020] __kasan_kmalloc+0xd4/0xd8 [ 26.680145] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.680281] kasan_atomics+0xb8/0x2e0 [ 26.680389] kunit_try_run_case+0x170/0x3f0 [ 26.680536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.680683] kthread+0x328/0x630 [ 26.680801] ret_from_fork+0x10/0x20 [ 26.680938] [ 26.680987] The buggy address belongs to the object at fff00000c7733980 [ 26.680987] which belongs to the cache kmalloc-64 of size 64 [ 26.681124] The buggy address is located 0 bytes to the right of [ 26.681124] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.681281] [ 26.681327] The buggy address belongs to the physical page: [ 26.681766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.682091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.682220] page_type: f5(slab) [ 26.682601] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.682739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.683062] page dumped because: kasan: bad access detected [ 26.683187] [ 26.683235] Memory state around the buggy address: [ 26.683355] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.683547] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.683663] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.683747] ^ [ 26.684111] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.684232] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.684695] ================================================================== [ 26.283150] ================================================================== [ 26.283294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 26.283427] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.283566] [ 26.283660] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.283881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.283960] Hardware name: linux,dummy-virt (DT) [ 26.284498] Call trace: [ 26.284587] show_stack+0x20/0x38 (C) [ 26.285163] dump_stack_lvl+0x8c/0xd0 [ 26.285666] print_report+0x118/0x608 [ 26.285881] kasan_report+0xdc/0x128 [ 26.286009] kasan_check_range+0x100/0x1a8 [ 26.286141] __kasan_check_write+0x20/0x30 [ 26.286268] kasan_atomics_helper+0xa6c/0x4858 [ 26.286457] kasan_atomics+0x198/0x2e0 [ 26.286834] kunit_try_run_case+0x170/0x3f0 [ 26.287328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.287666] kthread+0x328/0x630 [ 26.287816] ret_from_fork+0x10/0x20 [ 26.288026] [ 26.288115] Allocated by task 269: [ 26.288514] kasan_save_stack+0x3c/0x68 [ 26.288757] kasan_save_track+0x20/0x40 [ 26.288972] kasan_save_alloc_info+0x40/0x58 [ 26.289106] __kasan_kmalloc+0xd4/0xd8 [ 26.289274] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.289717] kasan_atomics+0xb8/0x2e0 [ 26.289895] kunit_try_run_case+0x170/0x3f0 [ 26.290227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.290511] kthread+0x328/0x630 [ 26.290629] ret_from_fork+0x10/0x20 [ 26.291338] [ 26.291535] The buggy address belongs to the object at fff00000c7733980 [ 26.291535] which belongs to the cache kmalloc-64 of size 64 [ 26.291899] The buggy address is located 0 bytes to the right of [ 26.291899] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.292249] [ 26.292306] The buggy address belongs to the physical page: [ 26.292612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.293061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.293492] page_type: f5(slab) [ 26.293675] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.293980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.294208] page dumped because: kasan: bad access detected [ 26.294488] [ 26.294598] Memory state around the buggy address: [ 26.294694] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.294992] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.295424] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.295543] ^ [ 26.295657] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.296140] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.296242] ================================================================== [ 26.411534] ================================================================== [ 26.411674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 26.412249] Read of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.412497] [ 26.412647] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.412957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.413044] Hardware name: linux,dummy-virt (DT) [ 26.413135] Call trace: [ 26.413196] show_stack+0x20/0x38 (C) [ 26.413324] dump_stack_lvl+0x8c/0xd0 [ 26.413472] print_report+0x118/0x608 [ 26.413598] kasan_report+0xdc/0x128 [ 26.413721] __asan_report_load4_noabort+0x20/0x30 [ 26.413856] kasan_atomics_helper+0x3e04/0x4858 [ 26.413991] kasan_atomics+0x198/0x2e0 [ 26.414110] kunit_try_run_case+0x170/0x3f0 [ 26.414252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.414424] kthread+0x328/0x630 [ 26.414540] ret_from_fork+0x10/0x20 [ 26.415338] [ 26.415422] Allocated by task 269: [ 26.415521] kasan_save_stack+0x3c/0x68 [ 26.416178] kasan_save_track+0x20/0x40 [ 26.416398] kasan_save_alloc_info+0x40/0x58 [ 26.416569] __kasan_kmalloc+0xd4/0xd8 [ 26.416662] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.416934] kasan_atomics+0xb8/0x2e0 [ 26.417237] kunit_try_run_case+0x170/0x3f0 [ 26.417340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.417805] kthread+0x328/0x630 [ 26.417972] ret_from_fork+0x10/0x20 [ 26.418122] [ 26.418179] The buggy address belongs to the object at fff00000c7733980 [ 26.418179] which belongs to the cache kmalloc-64 of size 64 [ 26.418371] The buggy address is located 0 bytes to the right of [ 26.418371] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.418651] [ 26.418708] The buggy address belongs to the physical page: [ 26.418795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.418948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.419101] page_type: f5(slab) [ 26.419248] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.419390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.419505] page dumped because: kasan: bad access detected [ 26.419817] [ 26.420071] Memory state around the buggy address: [ 26.420254] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.420433] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.420556] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.420817] ^ [ 26.420944] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.421089] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.421185] ================================================================== [ 26.709123] ================================================================== [ 26.709299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 26.709488] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.709692] [ 26.709993] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.710251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.710644] Hardware name: linux,dummy-virt (DT) [ 26.710774] Call trace: [ 26.710904] show_stack+0x20/0x38 (C) [ 26.711312] dump_stack_lvl+0x8c/0xd0 [ 26.711662] print_report+0x118/0x608 [ 26.711940] kasan_report+0xdc/0x128 [ 26.712168] kasan_check_range+0x100/0x1a8 [ 26.712357] __kasan_check_write+0x20/0x30 [ 26.712746] kasan_atomics_helper+0x16d0/0x4858 [ 26.713164] kasan_atomics+0x198/0x2e0 [ 26.713421] kunit_try_run_case+0x170/0x3f0 [ 26.713580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.713728] kthread+0x328/0x630 [ 26.714261] ret_from_fork+0x10/0x20 [ 26.714464] [ 26.714522] Allocated by task 269: [ 26.714700] kasan_save_stack+0x3c/0x68 [ 26.714816] kasan_save_track+0x20/0x40 [ 26.714893] kasan_save_alloc_info+0x40/0x58 [ 26.715217] __kasan_kmalloc+0xd4/0xd8 [ 26.715503] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.715849] kasan_atomics+0xb8/0x2e0 [ 26.716188] kunit_try_run_case+0x170/0x3f0 [ 26.716331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.716879] kthread+0x328/0x630 [ 26.717536] ret_from_fork+0x10/0x20 [ 26.717647] [ 26.717870] The buggy address belongs to the object at fff00000c7733980 [ 26.717870] which belongs to the cache kmalloc-64 of size 64 [ 26.718279] The buggy address is located 0 bytes to the right of [ 26.718279] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.718860] [ 26.719202] The buggy address belongs to the physical page: [ 26.719345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.720069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.720217] page_type: f5(slab) [ 26.720324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.720467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.720879] page dumped because: kasan: bad access detected [ 26.721020] [ 26.721085] Memory state around the buggy address: [ 26.721641] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.721808] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.721934] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.722042] ^ [ 26.722315] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.722914] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.723320] ================================================================== [ 26.630241] ================================================================== [ 26.630378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 26.630851] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.631144] [ 26.631304] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.631514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.631584] Hardware name: linux,dummy-virt (DT) [ 26.631674] Call trace: [ 26.631757] show_stack+0x20/0x38 (C) [ 26.631864] dump_stack_lvl+0x8c/0xd0 [ 26.632197] print_report+0x118/0x608 [ 26.632413] kasan_report+0xdc/0x128 [ 26.632632] kasan_check_range+0x100/0x1a8 [ 26.632989] __kasan_check_write+0x20/0x30 [ 26.633315] kasan_atomics_helper+0x147c/0x4858 [ 26.633477] kasan_atomics+0x198/0x2e0 [ 26.633607] kunit_try_run_case+0x170/0x3f0 [ 26.633742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.633891] kthread+0x328/0x630 [ 26.634006] ret_from_fork+0x10/0x20 [ 26.634137] [ 26.634190] Allocated by task 269: [ 26.634271] kasan_save_stack+0x3c/0x68 [ 26.634417] kasan_save_track+0x20/0x40 [ 26.634524] kasan_save_alloc_info+0x40/0x58 [ 26.634636] __kasan_kmalloc+0xd4/0xd8 [ 26.634732] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.634854] kasan_atomics+0xb8/0x2e0 [ 26.634955] kunit_try_run_case+0x170/0x3f0 [ 26.635064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.635182] kthread+0x328/0x630 [ 26.635279] ret_from_fork+0x10/0x20 [ 26.636013] [ 26.636257] The buggy address belongs to the object at fff00000c7733980 [ 26.636257] which belongs to the cache kmalloc-64 of size 64 [ 26.636709] The buggy address is located 0 bytes to the right of [ 26.636709] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.636903] [ 26.636970] The buggy address belongs to the physical page: [ 26.637056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.637212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.637600] page_type: f5(slab) [ 26.638090] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.638338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.638492] page dumped because: kasan: bad access detected [ 26.638538] [ 26.638563] Memory state around the buggy address: [ 26.638608] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.638716] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.638813] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.638928] ^ [ 26.639025] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.639132] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.639233] ================================================================== [ 26.433497] ================================================================== [ 26.433676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 26.433858] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.434045] [ 26.434172] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.434488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.434585] Hardware name: linux,dummy-virt (DT) [ 26.434660] Call trace: [ 26.434720] show_stack+0x20/0x38 (C) [ 26.434869] dump_stack_lvl+0x8c/0xd0 [ 26.435043] print_report+0x118/0x608 [ 26.435201] kasan_report+0xdc/0x128 [ 26.435360] __asan_report_load8_noabort+0x20/0x30 [ 26.435497] kasan_atomics_helper+0x3f58/0x4858 [ 26.435617] kasan_atomics+0x198/0x2e0 [ 26.435755] kunit_try_run_case+0x170/0x3f0 [ 26.435908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.436056] kthread+0x328/0x630 [ 26.436175] ret_from_fork+0x10/0x20 [ 26.436330] [ 26.436418] Allocated by task 269: [ 26.436514] kasan_save_stack+0x3c/0x68 [ 26.436643] kasan_save_track+0x20/0x40 [ 26.436771] kasan_save_alloc_info+0x40/0x58 [ 26.436880] __kasan_kmalloc+0xd4/0xd8 [ 26.436998] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.437128] kasan_atomics+0xb8/0x2e0 [ 26.437285] kunit_try_run_case+0x170/0x3f0 [ 26.437379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.437484] kthread+0x328/0x630 [ 26.437550] ret_from_fork+0x10/0x20 [ 26.437626] [ 26.437673] The buggy address belongs to the object at fff00000c7733980 [ 26.437673] which belongs to the cache kmalloc-64 of size 64 [ 26.437813] The buggy address is located 0 bytes to the right of [ 26.437813] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.437978] [ 26.438034] The buggy address belongs to the physical page: [ 26.438111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.438254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.438396] page_type: f5(slab) [ 26.438512] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.438665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.438781] page dumped because: kasan: bad access detected [ 26.438859] [ 26.438915] Memory state around the buggy address: [ 26.438996] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.439098] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.439198] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.439312] ^ [ 26.439395] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.439517] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.439610] ================================================================== [ 26.545847] ================================================================== [ 26.545983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 26.546117] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.546252] [ 26.546358] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.546600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.546679] Hardware name: linux,dummy-virt (DT) [ 26.546765] Call trace: [ 26.546827] show_stack+0x20/0x38 (C) [ 26.546958] dump_stack_lvl+0x8c/0xd0 [ 26.547089] print_report+0x118/0x608 [ 26.547232] kasan_report+0xdc/0x128 [ 26.547354] kasan_check_range+0x100/0x1a8 [ 26.547488] __kasan_check_write+0x20/0x30 [ 26.547624] kasan_atomics_helper+0x1190/0x4858 [ 26.547829] kasan_atomics+0x198/0x2e0 [ 26.547946] kunit_try_run_case+0x170/0x3f0 [ 26.548087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.548236] kthread+0x328/0x630 [ 26.548364] ret_from_fork+0x10/0x20 [ 26.548492] [ 26.548552] Allocated by task 269: [ 26.548635] kasan_save_stack+0x3c/0x68 [ 26.548734] kasan_save_track+0x20/0x40 [ 26.548826] kasan_save_alloc_info+0x40/0x58 [ 26.548945] __kasan_kmalloc+0xd4/0xd8 [ 26.549088] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.549257] kasan_atomics+0xb8/0x2e0 [ 26.549387] kunit_try_run_case+0x170/0x3f0 [ 26.549491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.549585] kthread+0x328/0x630 [ 26.549920] ret_from_fork+0x10/0x20 [ 26.550032] [ 26.550084] The buggy address belongs to the object at fff00000c7733980 [ 26.550084] which belongs to the cache kmalloc-64 of size 64 [ 26.550244] The buggy address is located 0 bytes to the right of [ 26.550244] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.550456] [ 26.550511] The buggy address belongs to the physical page: [ 26.550593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.550788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.550929] page_type: f5(slab) [ 26.551025] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.551169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.551287] page dumped because: kasan: bad access detected [ 26.551376] [ 26.551439] Memory state around the buggy address: [ 26.551526] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.551627] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.551762] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.551868] ^ [ 26.551991] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.552153] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.552297] ================================================================== [ 26.698083] ================================================================== [ 26.698209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 26.698344] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.698975] [ 26.699141] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.699397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.699626] Hardware name: linux,dummy-virt (DT) [ 26.699927] Call trace: [ 26.700463] show_stack+0x20/0x38 (C) [ 26.700734] dump_stack_lvl+0x8c/0xd0 [ 26.700939] print_report+0x118/0x608 [ 26.701215] kasan_report+0xdc/0x128 [ 26.701704] __asan_report_load8_noabort+0x20/0x30 [ 26.701998] kasan_atomics_helper+0x3df4/0x4858 [ 26.702283] kasan_atomics+0x198/0x2e0 [ 26.702504] kunit_try_run_case+0x170/0x3f0 [ 26.702809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.703020] kthread+0x328/0x630 [ 26.703113] ret_from_fork+0x10/0x20 [ 26.703230] [ 26.703277] Allocated by task 269: [ 26.703688] kasan_save_stack+0x3c/0x68 [ 26.703894] kasan_save_track+0x20/0x40 [ 26.704109] kasan_save_alloc_info+0x40/0x58 [ 26.704454] __kasan_kmalloc+0xd4/0xd8 [ 26.704578] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.704721] kasan_atomics+0xb8/0x2e0 [ 26.704851] kunit_try_run_case+0x170/0x3f0 [ 26.704958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.705073] kthread+0x328/0x630 [ 26.705159] ret_from_fork+0x10/0x20 [ 26.705250] [ 26.705302] The buggy address belongs to the object at fff00000c7733980 [ 26.705302] which belongs to the cache kmalloc-64 of size 64 [ 26.705470] The buggy address is located 0 bytes to the right of [ 26.705470] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.705647] [ 26.705700] The buggy address belongs to the physical page: [ 26.705784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.705927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.706065] page_type: f5(slab) [ 26.706173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.706351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.706569] page dumped because: kasan: bad access detected [ 26.706664] [ 26.706712] Memory state around the buggy address: [ 26.707224] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.707422] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.707562] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.707679] ^ [ 26.707780] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.708020] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.708268] ================================================================== [ 26.609679] ================================================================== [ 26.609968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 26.610234] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.610429] [ 26.610522] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.610728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.610791] Hardware name: linux,dummy-virt (DT) [ 26.610874] Call trace: [ 26.610931] show_stack+0x20/0x38 (C) [ 26.611060] dump_stack_lvl+0x8c/0xd0 [ 26.611892] print_report+0x118/0x608 [ 26.612102] kasan_report+0xdc/0x128 [ 26.612211] kasan_check_range+0x100/0x1a8 [ 26.612327] __kasan_check_write+0x20/0x30 [ 26.612458] kasan_atomics_helper+0x1414/0x4858 [ 26.612578] kasan_atomics+0x198/0x2e0 [ 26.612686] kunit_try_run_case+0x170/0x3f0 [ 26.612803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.612941] kthread+0x328/0x630 [ 26.614924] ret_from_fork+0x10/0x20 [ 26.615272] [ 26.615319] Allocated by task 269: [ 26.615397] kasan_save_stack+0x3c/0x68 [ 26.615507] kasan_save_track+0x20/0x40 [ 26.616606] kasan_save_alloc_info+0x40/0x58 [ 26.616711] __kasan_kmalloc+0xd4/0xd8 [ 26.617547] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.617802] kasan_atomics+0xb8/0x2e0 [ 26.617889] kunit_try_run_case+0x170/0x3f0 [ 26.618376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.618782] kthread+0x328/0x630 [ 26.618865] ret_from_fork+0x10/0x20 [ 26.618958] [ 26.619786] The buggy address belongs to the object at fff00000c7733980 [ 26.619786] which belongs to the cache kmalloc-64 of size 64 [ 26.620509] The buggy address is located 0 bytes to the right of [ 26.620509] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.621204] [ 26.621642] The buggy address belongs to the physical page: [ 26.622087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.622409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.623427] page_type: f5(slab) [ 26.624133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.624666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.625120] page dumped because: kasan: bad access detected [ 26.625770] [ 26.626005] Memory state around the buggy address: [ 26.626113] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.626946] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.627083] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.627174] ^ [ 26.627253] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.627355] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.628998] ================================================================== [ 26.297643] ================================================================== [ 26.298188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 26.298347] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.298759] [ 26.298875] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.299063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.299120] Hardware name: linux,dummy-virt (DT) [ 26.299181] Call trace: [ 26.299239] show_stack+0x20/0x38 (C) [ 26.299937] dump_stack_lvl+0x8c/0xd0 [ 26.300360] print_report+0x118/0x608 [ 26.300543] kasan_report+0xdc/0x128 [ 26.301015] kasan_check_range+0x100/0x1a8 [ 26.301511] __kasan_check_write+0x20/0x30 [ 26.301675] kasan_atomics_helper+0xad4/0x4858 [ 26.302242] kasan_atomics+0x198/0x2e0 [ 26.302673] kunit_try_run_case+0x170/0x3f0 [ 26.303752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.303927] kthread+0x328/0x630 [ 26.304052] ret_from_fork+0x10/0x20 [ 26.304351] [ 26.304419] Allocated by task 269: [ 26.304611] kasan_save_stack+0x3c/0x68 [ 26.304778] kasan_save_track+0x20/0x40 [ 26.304907] kasan_save_alloc_info+0x40/0x58 [ 26.305062] __kasan_kmalloc+0xd4/0xd8 [ 26.305196] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.305335] kasan_atomics+0xb8/0x2e0 [ 26.305436] kunit_try_run_case+0x170/0x3f0 [ 26.305546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.305671] kthread+0x328/0x630 [ 26.305772] ret_from_fork+0x10/0x20 [ 26.305876] [ 26.305936] The buggy address belongs to the object at fff00000c7733980 [ 26.305936] which belongs to the cache kmalloc-64 of size 64 [ 26.306111] The buggy address is located 0 bytes to the right of [ 26.306111] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.306369] [ 26.306867] The buggy address belongs to the physical page: [ 26.307088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.307426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.307619] page_type: f5(slab) [ 26.307711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.307830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.308255] page dumped because: kasan: bad access detected [ 26.308482] [ 26.308641] Memory state around the buggy address: [ 26.308848] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.309190] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.309386] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.309625] ^ [ 26.309815] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.310365] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.310508] ================================================================== [ 26.245477] ================================================================== [ 26.245604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 26.245728] Read of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.245870] [ 26.245982] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.246176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.246279] Hardware name: linux,dummy-virt (DT) [ 26.246451] Call trace: [ 26.246515] show_stack+0x20/0x38 (C) [ 26.246645] dump_stack_lvl+0x8c/0xd0 [ 26.246799] print_report+0x118/0x608 [ 26.246929] kasan_report+0xdc/0x128 [ 26.247108] __asan_report_load4_noabort+0x20/0x30 [ 26.247272] kasan_atomics_helper+0x42d8/0x4858 [ 26.247479] kasan_atomics+0x198/0x2e0 [ 26.247607] kunit_try_run_case+0x170/0x3f0 [ 26.247740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.247868] kthread+0x328/0x630 [ 26.248001] ret_from_fork+0x10/0x20 [ 26.248169] [ 26.248224] Allocated by task 269: [ 26.248308] kasan_save_stack+0x3c/0x68 [ 26.248427] kasan_save_track+0x20/0x40 [ 26.248522] kasan_save_alloc_info+0x40/0x58 [ 26.248628] __kasan_kmalloc+0xd4/0xd8 [ 26.248727] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.248891] kasan_atomics+0xb8/0x2e0 [ 26.248982] kunit_try_run_case+0x170/0x3f0 [ 26.249087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.249218] kthread+0x328/0x630 [ 26.249314] ret_from_fork+0x10/0x20 [ 26.249468] [ 26.249610] The buggy address belongs to the object at fff00000c7733980 [ 26.249610] which belongs to the cache kmalloc-64 of size 64 [ 26.249840] The buggy address is located 0 bytes to the right of [ 26.249840] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.250023] [ 26.250081] The buggy address belongs to the physical page: [ 26.250227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.250452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.250646] page_type: f5(slab) [ 26.250787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.250928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.251038] page dumped because: kasan: bad access detected [ 26.251149] [ 26.251193] Memory state around the buggy address: [ 26.251295] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.251420] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.251540] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.251972] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.253321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 26.254250] Call trace: [ 26.254362] show_stack+0x20/0x38 (C) [ 26.254543] dump_stack_lvl+0x8c/0xd0 [ 26.254676] print_report+0x118/0x608 [ 26.254850] kasan_report+0xdc/0x128 [ 26.254960] kasan_check_range+0x100/0x1a8 [ 26.255101] __kasan_check_write+0x20/0x30 [ 26.255239] kasan_atomics_helper+0x934/0x4858 [ 26.255372] kasan_atomics+0x198/0x2e0 [ 26.255502] kunit_try_run_case+0x170/0x3f0 [ 26.255618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.255760] kthread+0x328/0x630 [ 26.255883] ret_from_fork+0x10/0x20 [ 26.256050] [ 26.256104] Allocated by task 269: [ 26.256181] kasan_save_stack+0x3c/0x68 [ 26.256319] kasan_save_track+0x20/0x40 [ 26.256429] kasan_save_alloc_info+0x40/0x58 [ 26.256562] __kasan_kmalloc+0xd4/0xd8 [ 26.256655] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.256825] kasan_atomics+0xb8/0x2e0 [ 26.256964] kunit_try_run_case+0x170/0x3f0 [ 26.257082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.257240] kthread+0x328/0x630 [ 26.257374] ret_from_fork+0x10/0x20 [ 26.257486] [ 26.257547] The buggy address belongs to the object at fff00000c7733980 [ 26.257547] which belongs to the cache kmalloc-64 of size 64 [ 26.257745] The buggy address is located 0 bytes to the right of [ 26.257745] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.257919] [ 26.257984] The buggy address belongs to the physical page: [ 26.258080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.258262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.258453] page_type: f5(slab) [ 26.258558] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.258724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.258829] page dumped because: kasan: bad access detected [ 26.258918] [ 26.258963] Memory state around the buggy address: [ 26.259074] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.259139] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.259194] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.259241] ^ [ 26.259286] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.259339] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.259385] ================================================================== [ 26.685890] ================================================================== [ 26.686018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 26.686132] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.686257] [ 26.686352] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.687255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.687332] Hardware name: linux,dummy-virt (DT) [ 26.687482] Call trace: [ 26.687667] show_stack+0x20/0x38 (C) [ 26.687956] dump_stack_lvl+0x8c/0xd0 [ 26.688479] print_report+0x118/0x608 [ 26.688611] kasan_report+0xdc/0x128 [ 26.688760] kasan_check_range+0x100/0x1a8 [ 26.689073] __kasan_check_write+0x20/0x30 [ 26.689305] kasan_atomics_helper+0x1644/0x4858 [ 26.689687] kasan_atomics+0x198/0x2e0 [ 26.689894] kunit_try_run_case+0x170/0x3f0 [ 26.690098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.690388] kthread+0x328/0x630 [ 26.691022] ret_from_fork+0x10/0x20 [ 26.691343] [ 26.691554] Allocated by task 269: [ 26.691769] kasan_save_stack+0x3c/0x68 [ 26.691993] kasan_save_track+0x20/0x40 [ 26.692112] kasan_save_alloc_info+0x40/0x58 [ 26.692207] __kasan_kmalloc+0xd4/0xd8 [ 26.692292] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.692395] kasan_atomics+0xb8/0x2e0 [ 26.692832] kunit_try_run_case+0x170/0x3f0 [ 26.693152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.693270] kthread+0x328/0x630 [ 26.693525] ret_from_fork+0x10/0x20 [ 26.693708] [ 26.693772] The buggy address belongs to the object at fff00000c7733980 [ 26.693772] which belongs to the cache kmalloc-64 of size 64 [ 26.693926] The buggy address is located 0 bytes to the right of [ 26.693926] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.694215] [ 26.694381] The buggy address belongs to the physical page: [ 26.694529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.694825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.695103] page_type: f5(slab) [ 26.695203] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.695558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.695668] page dumped because: kasan: bad access detected [ 26.695755] [ 26.695806] Memory state around the buggy address: [ 26.695994] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.696537] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.696662] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.696774] ^ [ 26.696994] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.697330] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.697634] ================================================================== [ 26.260206] ================================================================== [ 26.260331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 26.261157] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.261962] [ 26.262366] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.262664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.262735] Hardware name: linux,dummy-virt (DT) [ 26.262822] Call trace: [ 26.262887] show_stack+0x20/0x38 (C) [ 26.263021] dump_stack_lvl+0x8c/0xd0 [ 26.263141] print_report+0x118/0x608 [ 26.263260] kasan_report+0xdc/0x128 [ 26.263372] kasan_check_range+0x100/0x1a8 [ 26.263513] __kasan_check_write+0x20/0x30 [ 26.263645] kasan_atomics_helper+0x99c/0x4858 [ 26.263771] kasan_atomics+0x198/0x2e0 [ 26.263882] kunit_try_run_case+0x170/0x3f0 [ 26.264019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.264164] kthread+0x328/0x630 [ 26.264282] ret_from_fork+0x10/0x20 [ 26.264421] [ 26.264468] Allocated by task 269: [ 26.264546] kasan_save_stack+0x3c/0x68 [ 26.264693] kasan_save_track+0x20/0x40 [ 26.264811] kasan_save_alloc_info+0x40/0x58 [ 26.265628] __kasan_kmalloc+0xd4/0xd8 [ 26.265731] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.265834] kasan_atomics+0xb8/0x2e0 [ 26.265965] kunit_try_run_case+0x170/0x3f0 [ 26.266071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.266199] kthread+0x328/0x630 [ 26.266427] ret_from_fork+0x10/0x20 [ 26.266494] [ 26.266528] The buggy address belongs to the object at fff00000c7733980 [ 26.266528] which belongs to the cache kmalloc-64 of size 64 [ 26.266861] The buggy address is located 0 bytes to the right of [ 26.266861] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.267041] [ 26.267120] The buggy address belongs to the physical page: [ 26.267206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.267348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.267540] page_type: f5(slab) [ 26.267664] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.267899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.268040] page dumped because: kasan: bad access detected [ 26.268132] [ 26.268386] Memory state around the buggy address: [ 26.268502] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.268654] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.268872] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.269002] ^ [ 26.269102] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.269217] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.269325] ================================================================== [ 26.453637] ================================================================== [ 26.453777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 26.453896] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.454035] [ 26.454117] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.454329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.454418] Hardware name: linux,dummy-virt (DT) [ 26.454490] Call trace: [ 26.454550] show_stack+0x20/0x38 (C) [ 26.454674] dump_stack_lvl+0x8c/0xd0 [ 26.454810] print_report+0x118/0x608 [ 26.454937] kasan_report+0xdc/0x128 [ 26.455090] kasan_check_range+0x100/0x1a8 [ 26.455252] __kasan_check_write+0x20/0x30 [ 26.455495] kasan_atomics_helper+0xeb8/0x4858 [ 26.455623] kasan_atomics+0x198/0x2e0 [ 26.455734] kunit_try_run_case+0x170/0x3f0 [ 26.455888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.456054] kthread+0x328/0x630 [ 26.456190] ret_from_fork+0x10/0x20 [ 26.456319] [ 26.456377] Allocated by task 269: [ 26.456474] kasan_save_stack+0x3c/0x68 [ 26.456582] kasan_save_track+0x20/0x40 [ 26.456675] kasan_save_alloc_info+0x40/0x58 [ 26.456769] __kasan_kmalloc+0xd4/0xd8 [ 26.456846] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.456957] kasan_atomics+0xb8/0x2e0 [ 26.457045] kunit_try_run_case+0x170/0x3f0 [ 26.457149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.457278] kthread+0x328/0x630 [ 26.457365] ret_from_fork+0x10/0x20 [ 26.457463] [ 26.457518] The buggy address belongs to the object at fff00000c7733980 [ 26.457518] which belongs to the cache kmalloc-64 of size 64 [ 26.457688] The buggy address is located 0 bytes to the right of [ 26.457688] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.457859] [ 26.457939] The buggy address belongs to the physical page: [ 26.458239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.458431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.458572] page_type: f5(slab) [ 26.458672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.458812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.458936] page dumped because: kasan: bad access detected [ 26.459058] [ 26.459119] Memory state around the buggy address: [ 26.459248] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.459357] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.459465] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.459693] ^ [ 26.459803] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.459914] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.460009] ================================================================== [ 26.597387] ================================================================== [ 26.597583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 26.597822] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.597953] [ 26.598054] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.598560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.598642] Hardware name: linux,dummy-virt (DT) [ 26.598870] Call trace: [ 26.598967] show_stack+0x20/0x38 (C) [ 26.599113] dump_stack_lvl+0x8c/0xd0 [ 26.599238] print_report+0x118/0x608 [ 26.599351] kasan_report+0xdc/0x128 [ 26.599460] __asan_report_load8_noabort+0x20/0x30 [ 26.599570] kasan_atomics_helper+0x3f04/0x4858 [ 26.599689] kasan_atomics+0x198/0x2e0 [ 26.600584] kunit_try_run_case+0x170/0x3f0 [ 26.600857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.601004] kthread+0x328/0x630 [ 26.601104] ret_from_fork+0x10/0x20 [ 26.601567] [ 26.601617] Allocated by task 269: [ 26.601708] kasan_save_stack+0x3c/0x68 [ 26.601809] kasan_save_track+0x20/0x40 [ 26.602241] kasan_save_alloc_info+0x40/0x58 [ 26.602462] __kasan_kmalloc+0xd4/0xd8 [ 26.602577] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.602760] kasan_atomics+0xb8/0x2e0 [ 26.602865] kunit_try_run_case+0x170/0x3f0 [ 26.603094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.603228] kthread+0x328/0x630 [ 26.603302] ret_from_fork+0x10/0x20 [ 26.603394] [ 26.603451] The buggy address belongs to the object at fff00000c7733980 [ 26.603451] which belongs to the cache kmalloc-64 of size 64 [ 26.603589] The buggy address is located 0 bytes to the right of [ 26.603589] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.604195] [ 26.604309] The buggy address belongs to the physical page: [ 26.604553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.604867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.605385] page_type: f5(slab) [ 26.606125] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.606507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.606644] page dumped because: kasan: bad access detected [ 26.606745] [ 26.606796] Memory state around the buggy address: [ 26.606891] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.607054] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.607231] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.607576] ^ [ 26.607697] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.607970] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.608122] ================================================================== [ 26.398453] ================================================================== [ 26.398708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 26.398991] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.399450] [ 26.399675] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.400189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.400344] Hardware name: linux,dummy-virt (DT) [ 26.400620] Call trace: [ 26.400702] show_stack+0x20/0x38 (C) [ 26.400845] dump_stack_lvl+0x8c/0xd0 [ 26.401081] print_report+0x118/0x608 [ 26.401277] kasan_report+0xdc/0x128 [ 26.401533] kasan_check_range+0x100/0x1a8 [ 26.401899] __kasan_check_write+0x20/0x30 [ 26.402027] kasan_atomics_helper+0xd3c/0x4858 [ 26.402160] kasan_atomics+0x198/0x2e0 [ 26.402466] kunit_try_run_case+0x170/0x3f0 [ 26.402599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.402731] kthread+0x328/0x630 [ 26.403442] ret_from_fork+0x10/0x20 [ 26.403692] [ 26.403747] Allocated by task 269: [ 26.403831] kasan_save_stack+0x3c/0x68 [ 26.404283] kasan_save_track+0x20/0x40 [ 26.404546] kasan_save_alloc_info+0x40/0x58 [ 26.404746] __kasan_kmalloc+0xd4/0xd8 [ 26.404933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.405181] kasan_atomics+0xb8/0x2e0 [ 26.405479] kunit_try_run_case+0x170/0x3f0 [ 26.405709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.406014] kthread+0x328/0x630 [ 26.406113] ret_from_fork+0x10/0x20 [ 26.406337] [ 26.406556] The buggy address belongs to the object at fff00000c7733980 [ 26.406556] which belongs to the cache kmalloc-64 of size 64 [ 26.406734] The buggy address is located 0 bytes to the right of [ 26.406734] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.407249] [ 26.407336] The buggy address belongs to the physical page: [ 26.407480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.407889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.408084] page_type: f5(slab) [ 26.408329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.408656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.408816] page dumped because: kasan: bad access detected [ 26.409015] [ 26.409095] Memory state around the buggy address: [ 26.409326] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.409720] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.409975] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.410127] ^ [ 26.410220] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.410347] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.410507] ================================================================== [ 26.478368] ================================================================== [ 26.478700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 26.478826] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.478964] [ 26.479097] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.479276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.479360] Hardware name: linux,dummy-virt (DT) [ 26.479447] Call trace: [ 26.479505] show_stack+0x20/0x38 (C) [ 26.479640] dump_stack_lvl+0x8c/0xd0 [ 26.479757] print_report+0x118/0x608 [ 26.479854] kasan_report+0xdc/0x128 [ 26.479960] kasan_check_range+0x100/0x1a8 [ 26.480097] __kasan_check_write+0x20/0x30 [ 26.480304] kasan_atomics_helper+0xff0/0x4858 [ 26.480484] kasan_atomics+0x198/0x2e0 [ 26.480648] kunit_try_run_case+0x170/0x3f0 [ 26.480822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.482062] kthread+0x328/0x630 [ 26.482183] ret_from_fork+0x10/0x20 [ 26.482323] [ 26.484220] Allocated by task 269: [ 26.484317] kasan_save_stack+0x3c/0x68 [ 26.484458] kasan_save_track+0x20/0x40 [ 26.484557] kasan_save_alloc_info+0x40/0x58 [ 26.484663] __kasan_kmalloc+0xd4/0xd8 [ 26.484746] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.484849] kasan_atomics+0xb8/0x2e0 [ 26.486243] kunit_try_run_case+0x170/0x3f0 [ 26.486377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.486547] kthread+0x328/0x630 [ 26.486715] ret_from_fork+0x10/0x20 [ 26.487388] [ 26.488028] The buggy address belongs to the object at fff00000c7733980 [ 26.488028] which belongs to the cache kmalloc-64 of size 64 [ 26.488224] The buggy address is located 0 bytes to the right of [ 26.488224] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.488389] [ 26.490645] The buggy address belongs to the physical page: [ 26.490750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.490906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.491059] page_type: f5(slab) [ 26.491161] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.491275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.491379] page dumped because: kasan: bad access detected [ 26.491508] [ 26.491564] Memory state around the buggy address: [ 26.492579] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.492702] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.493200] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.493322] ^ [ 26.493413] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.493508] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.494212] ================================================================== [ 26.423430] ================================================================== [ 26.423547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 26.424002] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.424158] [ 26.424251] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.424678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.424763] Hardware name: linux,dummy-virt (DT) [ 26.424855] Call trace: [ 26.424921] show_stack+0x20/0x38 (C) [ 26.425056] dump_stack_lvl+0x8c/0xd0 [ 26.425183] print_report+0x118/0x608 [ 26.425304] kasan_report+0xdc/0x128 [ 26.425437] kasan_check_range+0x100/0x1a8 [ 26.425966] __kasan_check_read+0x20/0x30 [ 26.426142] kasan_atomics_helper+0xdd4/0x4858 [ 26.426267] kasan_atomics+0x198/0x2e0 [ 26.426888] kunit_try_run_case+0x170/0x3f0 [ 26.427041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.427195] kthread+0x328/0x630 [ 26.427304] ret_from_fork+0x10/0x20 [ 26.427451] [ 26.427500] Allocated by task 269: [ 26.427651] kasan_save_stack+0x3c/0x68 [ 26.427971] kasan_save_track+0x20/0x40 [ 26.428207] kasan_save_alloc_info+0x40/0x58 [ 26.428437] __kasan_kmalloc+0xd4/0xd8 [ 26.428643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.428879] kasan_atomics+0xb8/0x2e0 [ 26.428972] kunit_try_run_case+0x170/0x3f0 [ 26.429073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.429187] kthread+0x328/0x630 [ 26.429274] ret_from_fork+0x10/0x20 [ 26.429368] [ 26.429433] The buggy address belongs to the object at fff00000c7733980 [ 26.429433] which belongs to the cache kmalloc-64 of size 64 [ 26.429580] The buggy address is located 0 bytes to the right of [ 26.429580] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.430345] [ 26.430473] The buggy address belongs to the physical page: [ 26.430624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.430805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.431015] page_type: f5(slab) [ 26.431154] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.431267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.431363] page dumped because: kasan: bad access detected [ 26.431458] [ 26.431507] Memory state around the buggy address: [ 26.432161] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.432480] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.432541] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.432622] ^ [ 26.432724] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.432829] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.432926] ================================================================== [ 26.460606] ================================================================== [ 26.460737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 26.460851] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.460983] [ 26.461063] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.461285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.461355] Hardware name: linux,dummy-virt (DT) [ 26.461451] Call trace: [ 26.461510] show_stack+0x20/0x38 (C) [ 26.461630] dump_stack_lvl+0x8c/0xd0 [ 26.461751] print_report+0x118/0x608 [ 26.461882] kasan_report+0xdc/0x128 [ 26.461988] kasan_check_range+0x100/0x1a8 [ 26.462110] __kasan_check_write+0x20/0x30 [ 26.462300] kasan_atomics_helper+0xf20/0x4858 [ 26.462575] kasan_atomics+0x198/0x2e0 [ 26.462659] kunit_try_run_case+0x170/0x3f0 [ 26.462812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.463012] kthread+0x328/0x630 [ 26.463128] ret_from_fork+0x10/0x20 [ 26.463257] [ 26.463318] Allocated by task 269: [ 26.463439] kasan_save_stack+0x3c/0x68 [ 26.463601] kasan_save_track+0x20/0x40 [ 26.463740] kasan_save_alloc_info+0x40/0x58 [ 26.463830] __kasan_kmalloc+0xd4/0xd8 [ 26.463909] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.464008] kasan_atomics+0xb8/0x2e0 [ 26.464101] kunit_try_run_case+0x170/0x3f0 [ 26.464234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.464374] kthread+0x328/0x630 [ 26.464481] ret_from_fork+0x10/0x20 [ 26.464603] [ 26.464660] The buggy address belongs to the object at fff00000c7733980 [ 26.464660] which belongs to the cache kmalloc-64 of size 64 [ 26.465344] The buggy address is located 0 bytes to the right of [ 26.465344] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.465733] [ 26.465803] The buggy address belongs to the physical page: [ 26.465883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.466021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.466178] page_type: f5(slab) [ 26.466282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.466454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.466558] page dumped because: kasan: bad access detected [ 26.466644] [ 26.466908] Memory state around the buggy address: [ 26.467211] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.467394] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.467533] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.467620] ^ [ 26.467699] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.468014] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.468118] ================================================================== [ 26.496514] ================================================================== [ 26.496652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 26.496788] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.496941] [ 26.497083] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.497264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.497321] Hardware name: linux,dummy-virt (DT) [ 26.497381] Call trace: [ 26.497444] show_stack+0x20/0x38 (C) [ 26.497570] dump_stack_lvl+0x8c/0xd0 [ 26.499273] print_report+0x118/0x608 [ 26.499612] kasan_report+0xdc/0x128 [ 26.499955] kasan_check_range+0x100/0x1a8 [ 26.500142] __kasan_check_write+0x20/0x30 [ 26.500585] kasan_atomics_helper+0x1058/0x4858 [ 26.501288] kasan_atomics+0x198/0x2e0 [ 26.501790] kunit_try_run_case+0x170/0x3f0 [ 26.502452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.502701] kthread+0x328/0x630 [ 26.503362] ret_from_fork+0x10/0x20 [ 26.503917] [ 26.504214] Allocated by task 269: [ 26.504478] kasan_save_stack+0x3c/0x68 [ 26.504706] kasan_save_track+0x20/0x40 [ 26.504814] kasan_save_alloc_info+0x40/0x58 [ 26.505315] __kasan_kmalloc+0xd4/0xd8 [ 26.505718] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.505844] kasan_atomics+0xb8/0x2e0 [ 26.505933] kunit_try_run_case+0x170/0x3f0 [ 26.506035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.506162] kthread+0x328/0x630 [ 26.506262] ret_from_fork+0x10/0x20 [ 26.506384] [ 26.506452] The buggy address belongs to the object at fff00000c7733980 [ 26.506452] which belongs to the cache kmalloc-64 of size 64 [ 26.507092] The buggy address is located 0 bytes to the right of [ 26.507092] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.507516] [ 26.507608] The buggy address belongs to the physical page: [ 26.507730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.507872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.508387] page_type: f5(slab) [ 26.508518] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.508728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.508838] page dumped because: kasan: bad access detected [ 26.508926] [ 26.508975] Memory state around the buggy address: [ 26.509070] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.509250] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.509540] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.509707] ^ [ 26.509801] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.509914] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.510052] ================================================================== [ 26.552954] ================================================================== [ 26.553128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 26.553252] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.553363] [ 26.553464] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.553677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.553734] Hardware name: linux,dummy-virt (DT) [ 26.553840] Call trace: [ 26.553925] show_stack+0x20/0x38 (C) [ 26.554105] dump_stack_lvl+0x8c/0xd0 [ 26.554299] print_report+0x118/0x608 [ 26.554501] kasan_report+0xdc/0x128 [ 26.554665] kasan_check_range+0x100/0x1a8 [ 26.554799] __kasan_check_write+0x20/0x30 [ 26.554932] kasan_atomics_helper+0x11f8/0x4858 [ 26.555057] kasan_atomics+0x198/0x2e0 [ 26.555177] kunit_try_run_case+0x170/0x3f0 [ 26.555325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.555475] kthread+0x328/0x630 [ 26.555602] ret_from_fork+0x10/0x20 [ 26.555731] [ 26.555804] Allocated by task 269: [ 26.555925] kasan_save_stack+0x3c/0x68 [ 26.556019] kasan_save_track+0x20/0x40 [ 26.556132] kasan_save_alloc_info+0x40/0x58 [ 26.556235] __kasan_kmalloc+0xd4/0xd8 [ 26.556379] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.556496] kasan_atomics+0xb8/0x2e0 [ 26.556581] kunit_try_run_case+0x170/0x3f0 [ 26.556687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.556860] kthread+0x328/0x630 [ 26.557002] ret_from_fork+0x10/0x20 [ 26.557147] [ 26.557232] The buggy address belongs to the object at fff00000c7733980 [ 26.557232] which belongs to the cache kmalloc-64 of size 64 [ 26.557482] The buggy address is located 0 bytes to the right of [ 26.557482] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.557752] [ 26.557812] The buggy address belongs to the physical page: [ 26.557903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.558120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.558333] page_type: f5(slab) [ 26.558494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.558622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.558793] page dumped because: kasan: bad access detected [ 26.558888] [ 26.558932] Memory state around the buggy address: [ 26.559011] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.559177] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.559283] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.559441] ^ [ 26.559721] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.559847] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.559900] ================================================================== [ 26.653028] ================================================================== [ 26.653473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 26.653826] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.654019] [ 26.654153] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.654483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.654589] Hardware name: linux,dummy-virt (DT) [ 26.654715] Call trace: [ 26.654810] show_stack+0x20/0x38 (C) [ 26.654924] dump_stack_lvl+0x8c/0xd0 [ 26.655059] print_report+0x118/0x608 [ 26.655163] kasan_report+0xdc/0x128 [ 26.655482] kasan_check_range+0x100/0x1a8 [ 26.655603] __kasan_check_write+0x20/0x30 [ 26.655783] kasan_atomics_helper+0x154c/0x4858 [ 26.655956] kasan_atomics+0x198/0x2e0 [ 26.656109] kunit_try_run_case+0x170/0x3f0 [ 26.656246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.656456] kthread+0x328/0x630 [ 26.656617] ret_from_fork+0x10/0x20 [ 26.656794] [ 26.656867] Allocated by task 269: [ 26.656975] kasan_save_stack+0x3c/0x68 [ 26.657081] kasan_save_track+0x20/0x40 [ 26.657170] kasan_save_alloc_info+0x40/0x58 [ 26.657274] __kasan_kmalloc+0xd4/0xd8 [ 26.657366] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.657477] kasan_atomics+0xb8/0x2e0 [ 26.657564] kunit_try_run_case+0x170/0x3f0 [ 26.657862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.658215] kthread+0x328/0x630 [ 26.658369] ret_from_fork+0x10/0x20 [ 26.658524] [ 26.658579] The buggy address belongs to the object at fff00000c7733980 [ 26.658579] which belongs to the cache kmalloc-64 of size 64 [ 26.658966] The buggy address is located 0 bytes to the right of [ 26.658966] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.659182] [ 26.659318] The buggy address belongs to the physical page: [ 26.659560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.659689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.659794] page_type: f5(slab) [ 26.659887] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.660011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.660541] page dumped because: kasan: bad access detected [ 26.660634] [ 26.660679] Memory state around the buggy address: [ 26.660770] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.661139] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.661374] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.661495] ^ [ 26.661570] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.661673] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.661765] ================================================================== [ 26.740429] ================================================================== [ 26.740551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 26.740681] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.740814] [ 26.740906] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.741121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.741191] Hardware name: linux,dummy-virt (DT) [ 26.741276] Call trace: [ 26.741334] show_stack+0x20/0x38 (C) [ 26.741472] dump_stack_lvl+0x8c/0xd0 [ 26.741603] print_report+0x118/0x608 [ 26.741722] kasan_report+0xdc/0x128 [ 26.741838] __asan_report_load8_noabort+0x20/0x30 [ 26.742602] kasan_atomics_helper+0x3e20/0x4858 [ 26.742973] kasan_atomics+0x198/0x2e0 [ 26.743481] kunit_try_run_case+0x170/0x3f0 [ 26.744388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.744807] kthread+0x328/0x630 [ 26.744944] ret_from_fork+0x10/0x20 [ 26.745839] [ 26.745972] Allocated by task 269: [ 26.746060] kasan_save_stack+0x3c/0x68 [ 26.746186] kasan_save_track+0x20/0x40 [ 26.746992] kasan_save_alloc_info+0x40/0x58 [ 26.748492] __kasan_kmalloc+0xd4/0xd8 [ 26.748620] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.748776] kasan_atomics+0xb8/0x2e0 [ 26.748881] kunit_try_run_case+0x170/0x3f0 [ 26.749231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.749340] kthread+0x328/0x630 [ 26.749435] ret_from_fork+0x10/0x20 [ 26.749520] [ 26.749568] The buggy address belongs to the object at fff00000c7733980 [ 26.749568] which belongs to the cache kmalloc-64 of size 64 [ 26.749708] The buggy address is located 0 bytes to the right of [ 26.749708] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.749882] [ 26.749936] The buggy address belongs to the physical page: [ 26.750022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.750163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.751377] page_type: f5(slab) [ 26.751510] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.751637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.751743] page dumped because: kasan: bad access detected [ 26.751824] [ 26.751868] Memory state around the buggy address: [ 26.751954] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.752061] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.752170] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.752265] ^ [ 26.752345] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.753378] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.753508] ================================================================== [ 26.662300] ================================================================== [ 26.663435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 26.664003] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.664411] [ 26.664512] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.665279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.665389] Hardware name: linux,dummy-virt (DT) [ 26.665497] Call trace: [ 26.665824] show_stack+0x20/0x38 (C) [ 26.666158] dump_stack_lvl+0x8c/0xd0 [ 26.666383] print_report+0x118/0x608 [ 26.666510] kasan_report+0xdc/0x128 [ 26.666865] kasan_check_range+0x100/0x1a8 [ 26.667202] __kasan_check_write+0x20/0x30 [ 26.667580] kasan_atomics_helper+0x15b4/0x4858 [ 26.667868] kasan_atomics+0x198/0x2e0 [ 26.668023] kunit_try_run_case+0x170/0x3f0 [ 26.668287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.668446] kthread+0x328/0x630 [ 26.668574] ret_from_fork+0x10/0x20 [ 26.668712] [ 26.668766] Allocated by task 269: [ 26.668848] kasan_save_stack+0x3c/0x68 [ 26.668963] kasan_save_track+0x20/0x40 [ 26.669083] kasan_save_alloc_info+0x40/0x58 [ 26.669236] __kasan_kmalloc+0xd4/0xd8 [ 26.669368] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.669497] kasan_atomics+0xb8/0x2e0 [ 26.669593] kunit_try_run_case+0x170/0x3f0 [ 26.669703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.669843] kthread+0x328/0x630 [ 26.669979] ret_from_fork+0x10/0x20 [ 26.670119] [ 26.670191] The buggy address belongs to the object at fff00000c7733980 [ 26.670191] which belongs to the cache kmalloc-64 of size 64 [ 26.670366] The buggy address is located 0 bytes to the right of [ 26.670366] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.671551] [ 26.671669] The buggy address belongs to the physical page: [ 26.671928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.672213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.672512] page_type: f5(slab) [ 26.672649] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.672747] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.672839] page dumped because: kasan: bad access detected [ 26.672921] [ 26.672963] Memory state around the buggy address: [ 26.673843] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.674183] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.674310] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.674653] ^ [ 26.675505] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.675612] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.675723] ================================================================== [ 26.724505] ================================================================== [ 26.724641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 26.724782] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.725246] [ 26.725585] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.725939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.726059] Hardware name: linux,dummy-virt (DT) [ 26.726149] Call trace: [ 26.726214] show_stack+0x20/0x38 (C) [ 26.726366] dump_stack_lvl+0x8c/0xd0 [ 26.726550] print_report+0x118/0x608 [ 26.726674] kasan_report+0xdc/0x128 [ 26.726988] __asan_report_load8_noabort+0x20/0x30 [ 26.727502] kasan_atomics_helper+0x3e10/0x4858 [ 26.727627] kasan_atomics+0x198/0x2e0 [ 26.727764] kunit_try_run_case+0x170/0x3f0 [ 26.727896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.728053] kthread+0x328/0x630 [ 26.728237] ret_from_fork+0x10/0x20 [ 26.728444] [ 26.728528] Allocated by task 269: [ 26.728651] kasan_save_stack+0x3c/0x68 [ 26.728810] kasan_save_track+0x20/0x40 [ 26.728960] kasan_save_alloc_info+0x40/0x58 [ 26.729113] __kasan_kmalloc+0xd4/0xd8 [ 26.729213] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.729333] kasan_atomics+0xb8/0x2e0 [ 26.729437] kunit_try_run_case+0x170/0x3f0 [ 26.729540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.729662] kthread+0x328/0x630 [ 26.729800] ret_from_fork+0x10/0x20 [ 26.729902] [ 26.729955] The buggy address belongs to the object at fff00000c7733980 [ 26.729955] which belongs to the cache kmalloc-64 of size 64 [ 26.730109] The buggy address is located 0 bytes to the right of [ 26.730109] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.730318] [ 26.730486] The buggy address belongs to the physical page: [ 26.730566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.730641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.730744] page_type: f5(slab) [ 26.730804] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.730866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.730918] page dumped because: kasan: bad access detected [ 26.730959] [ 26.730982] Memory state around the buggy address: [ 26.731026] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.731081] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.731133] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.731180] ^ [ 26.731223] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.731277] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.731321] ================================================================== [ 26.313348] ================================================================== [ 26.313547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 26.314009] Read of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.314326] [ 26.314718] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.315178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.315268] Hardware name: linux,dummy-virt (DT) [ 26.315342] Call trace: [ 26.315706] show_stack+0x20/0x38 (C) [ 26.315995] dump_stack_lvl+0x8c/0xd0 [ 26.316150] print_report+0x118/0x608 [ 26.316274] kasan_report+0xdc/0x128 [ 26.316399] __asan_report_load4_noabort+0x20/0x30 [ 26.316535] kasan_atomics_helper+0x3dcc/0x4858 [ 26.316672] kasan_atomics+0x198/0x2e0 [ 26.316794] kunit_try_run_case+0x170/0x3f0 [ 26.316925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.317075] kthread+0x328/0x630 [ 26.317204] ret_from_fork+0x10/0x20 [ 26.317336] [ 26.318096] Allocated by task 269: [ 26.318227] kasan_save_stack+0x3c/0x68 [ 26.318323] kasan_save_track+0x20/0x40 [ 26.318376] kasan_save_alloc_info+0x40/0x58 [ 26.318486] __kasan_kmalloc+0xd4/0xd8 [ 26.318631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.318795] kasan_atomics+0xb8/0x2e0 [ 26.318933] kunit_try_run_case+0x170/0x3f0 [ 26.319281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.319515] kthread+0x328/0x630 [ 26.319672] ret_from_fork+0x10/0x20 [ 26.319875] [ 26.320012] The buggy address belongs to the object at fff00000c7733980 [ 26.320012] which belongs to the cache kmalloc-64 of size 64 [ 26.320414] The buggy address is located 0 bytes to the right of [ 26.320414] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.320996] [ 26.321063] The buggy address belongs to the physical page: [ 26.321186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.321587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.321975] page_type: f5(slab) [ 26.322184] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.322453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.322864] page dumped because: kasan: bad access detected [ 26.323236] [ 26.323301] Memory state around the buggy address: [ 26.323391] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.323766] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.323909] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.324015] ^ [ 26.324666] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.325236] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.325890] ================================================================== [ 26.468731] ================================================================== [ 26.468850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 26.468964] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.469092] [ 26.469204] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.469524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.469589] Hardware name: linux,dummy-virt (DT) [ 26.469671] Call trace: [ 26.469729] show_stack+0x20/0x38 (C) [ 26.469856] dump_stack_lvl+0x8c/0xd0 [ 26.470121] print_report+0x118/0x608 [ 26.470427] kasan_report+0xdc/0x128 [ 26.470547] kasan_check_range+0x100/0x1a8 [ 26.470666] __kasan_check_write+0x20/0x30 [ 26.470785] kasan_atomics_helper+0xf88/0x4858 [ 26.471162] kasan_atomics+0x198/0x2e0 [ 26.471355] kunit_try_run_case+0x170/0x3f0 [ 26.471502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.471641] kthread+0x328/0x630 [ 26.471737] ret_from_fork+0x10/0x20 [ 26.472046] [ 26.472110] Allocated by task 269: [ 26.472186] kasan_save_stack+0x3c/0x68 [ 26.472476] kasan_save_track+0x20/0x40 [ 26.472605] kasan_save_alloc_info+0x40/0x58 [ 26.472707] __kasan_kmalloc+0xd4/0xd8 [ 26.472857] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.473223] kasan_atomics+0xb8/0x2e0 [ 26.473330] kunit_try_run_case+0x170/0x3f0 [ 26.473488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.473636] kthread+0x328/0x630 [ 26.473726] ret_from_fork+0x10/0x20 [ 26.473844] [ 26.473974] The buggy address belongs to the object at fff00000c7733980 [ 26.473974] which belongs to the cache kmalloc-64 of size 64 [ 26.474122] The buggy address is located 0 bytes to the right of [ 26.474122] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.474277] [ 26.474643] The buggy address belongs to the physical page: [ 26.474746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.474912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.475054] page_type: f5(slab) [ 26.475480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.475799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.476216] page dumped because: kasan: bad access detected [ 26.476451] [ 26.476503] Memory state around the buggy address: [ 26.476590] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.476717] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.476844] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.477010] ^ [ 26.477093] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.477458] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.477798] ================================================================== [ 26.581670] ================================================================== [ 26.581735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 26.581804] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.581864] [ 26.581913] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.582014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.582046] Hardware name: linux,dummy-virt (DT) [ 26.582085] Call trace: [ 26.582115] show_stack+0x20/0x38 (C) [ 26.582175] dump_stack_lvl+0x8c/0xd0 [ 26.582232] print_report+0x118/0x608 [ 26.582286] kasan_report+0xdc/0x128 [ 26.582363] kasan_check_range+0x100/0x1a8 [ 26.582876] __kasan_check_write+0x20/0x30 [ 26.583216] kasan_atomics_helper+0x1384/0x4858 [ 26.583373] kasan_atomics+0x198/0x2e0 [ 26.583508] kunit_try_run_case+0x170/0x3f0 [ 26.583634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.584342] kthread+0x328/0x630 [ 26.585883] ret_from_fork+0x10/0x20 [ 26.586018] [ 26.586067] Allocated by task 269: [ 26.586148] kasan_save_stack+0x3c/0x68 [ 26.586254] kasan_save_track+0x20/0x40 [ 26.586367] kasan_save_alloc_info+0x40/0x58 [ 26.586481] __kasan_kmalloc+0xd4/0xd8 [ 26.586579] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.586692] kasan_atomics+0xb8/0x2e0 [ 26.586782] kunit_try_run_case+0x170/0x3f0 [ 26.588086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.588230] kthread+0x328/0x630 [ 26.588331] ret_from_fork+0x10/0x20 [ 26.588433] [ 26.588487] The buggy address belongs to the object at fff00000c7733980 [ 26.588487] which belongs to the cache kmalloc-64 of size 64 [ 26.588984] The buggy address is located 0 bytes to the right of [ 26.588984] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.589199] [ 26.589262] The buggy address belongs to the physical page: [ 26.589481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.589640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.589776] page_type: f5(slab) [ 26.589878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.590784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.591181] page dumped because: kasan: bad access detected [ 26.591572] [ 26.591618] Memory state around the buggy address: [ 26.592217] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.592540] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.593145] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.593493] ^ [ 26.594145] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.594278] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.594861] ================================================================== [ 26.271070] ================================================================== [ 26.271215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 26.271340] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.271484] [ 26.271579] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.271804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.271877] Hardware name: linux,dummy-virt (DT) [ 26.271959] Call trace: [ 26.272025] show_stack+0x20/0x38 (C) [ 26.272158] dump_stack_lvl+0x8c/0xd0 [ 26.272282] print_report+0x118/0x608 [ 26.272409] kasan_report+0xdc/0x128 [ 26.272533] kasan_check_range+0x100/0x1a8 [ 26.273240] __kasan_check_write+0x20/0x30 [ 26.273432] kasan_atomics_helper+0xa04/0x4858 [ 26.273570] kasan_atomics+0x198/0x2e0 [ 26.273688] kunit_try_run_case+0x170/0x3f0 [ 26.273818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.273964] kthread+0x328/0x630 [ 26.274080] ret_from_fork+0x10/0x20 [ 26.274207] [ 26.274259] Allocated by task 269: [ 26.274356] kasan_save_stack+0x3c/0x68 [ 26.275081] kasan_save_track+0x20/0x40 [ 26.275203] kasan_save_alloc_info+0x40/0x58 [ 26.275303] __kasan_kmalloc+0xd4/0xd8 [ 26.275877] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.276014] kasan_atomics+0xb8/0x2e0 [ 26.276116] kunit_try_run_case+0x170/0x3f0 [ 26.276634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.278755] kthread+0x328/0x630 [ 26.278873] ret_from_fork+0x10/0x20 [ 26.278982] [ 26.279038] The buggy address belongs to the object at fff00000c7733980 [ 26.279038] which belongs to the cache kmalloc-64 of size 64 [ 26.279198] The buggy address is located 0 bytes to the right of [ 26.279198] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.279364] [ 26.279441] The buggy address belongs to the physical page: [ 26.279528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.279671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.279788] page_type: f5(slab) [ 26.279876] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.280003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.280111] page dumped because: kasan: bad access detected [ 26.280194] [ 26.280245] Memory state around the buggy address: [ 26.280325] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.280866] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.281017] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.281120] ^ [ 26.281200] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.281303] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.281414] ================================================================== [ 26.446812] ================================================================== [ 26.446975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 26.447091] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.447223] [ 26.447319] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.447531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.447612] Hardware name: linux,dummy-virt (DT) [ 26.447694] Call trace: [ 26.447764] show_stack+0x20/0x38 (C) [ 26.447959] dump_stack_lvl+0x8c/0xd0 [ 26.448128] print_report+0x118/0x608 [ 26.448300] kasan_report+0xdc/0x128 [ 26.448474] __asan_report_store8_noabort+0x20/0x30 [ 26.448666] kasan_atomics_helper+0x3e5c/0x4858 [ 26.448835] kasan_atomics+0x198/0x2e0 [ 26.449001] kunit_try_run_case+0x170/0x3f0 [ 26.449178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.449351] kthread+0x328/0x630 [ 26.449472] ret_from_fork+0x10/0x20 [ 26.449613] [ 26.449666] Allocated by task 269: [ 26.449748] kasan_save_stack+0x3c/0x68 [ 26.449868] kasan_save_track+0x20/0x40 [ 26.449976] kasan_save_alloc_info+0x40/0x58 [ 26.450092] __kasan_kmalloc+0xd4/0xd8 [ 26.450200] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.450318] kasan_atomics+0xb8/0x2e0 [ 26.450425] kunit_try_run_case+0x170/0x3f0 [ 26.450521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.450633] kthread+0x328/0x630 [ 26.450730] ret_from_fork+0x10/0x20 [ 26.450824] [ 26.450873] The buggy address belongs to the object at fff00000c7733980 [ 26.450873] which belongs to the cache kmalloc-64 of size 64 [ 26.451078] The buggy address is located 0 bytes to the right of [ 26.451078] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.451293] [ 26.451358] The buggy address belongs to the physical page: [ 26.451470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.451614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.451747] page_type: f5(slab) [ 26.451849] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.451981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.452094] page dumped because: kasan: bad access detected [ 26.452180] [ 26.452233] Memory state around the buggy address: [ 26.452329] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.452452] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.452561] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.452684] ^ [ 26.452774] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.452894] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.453012] ================================================================== [ 26.530234] ================================================================== [ 26.530400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 26.530547] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.531796] [ 26.532055] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.532431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.532688] Hardware name: linux,dummy-virt (DT) [ 26.532783] Call trace: [ 26.533198] show_stack+0x20/0x38 (C) [ 26.533840] dump_stack_lvl+0x8c/0xd0 [ 26.534002] print_report+0x118/0x608 [ 26.534126] kasan_report+0xdc/0x128 [ 26.534231] kasan_check_range+0x100/0x1a8 [ 26.535197] __kasan_check_write+0x20/0x30 [ 26.535360] kasan_atomics_helper+0x1128/0x4858 [ 26.535567] kasan_atomics+0x198/0x2e0 [ 26.535976] kunit_try_run_case+0x170/0x3f0 [ 26.536478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.537180] kthread+0x328/0x630 [ 26.537365] ret_from_fork+0x10/0x20 [ 26.537770] [ 26.538005] Allocated by task 269: [ 26.538486] kasan_save_stack+0x3c/0x68 [ 26.538611] kasan_save_track+0x20/0x40 [ 26.538695] kasan_save_alloc_info+0x40/0x58 [ 26.538747] __kasan_kmalloc+0xd4/0xd8 [ 26.538795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.538887] kasan_atomics+0xb8/0x2e0 [ 26.538963] kunit_try_run_case+0x170/0x3f0 [ 26.539373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.539573] kthread+0x328/0x630 [ 26.539676] ret_from_fork+0x10/0x20 [ 26.539755] [ 26.539831] The buggy address belongs to the object at fff00000c7733980 [ 26.539831] which belongs to the cache kmalloc-64 of size 64 [ 26.539972] The buggy address is located 0 bytes to the right of [ 26.539972] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.540383] [ 26.540653] The buggy address belongs to the physical page: [ 26.540863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.541199] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.541869] page_type: f5(slab) [ 26.542308] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.542665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.542809] page dumped because: kasan: bad access detected [ 26.543594] [ 26.543684] Memory state around the buggy address: [ 26.543781] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.543912] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.544030] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.544798] ^ [ 26.544922] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.545031] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.545188] ================================================================== [ 26.326589] ================================================================== [ 26.326721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 26.326853] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.326990] [ 26.327084] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.327315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.327393] Hardware name: linux,dummy-virt (DT) [ 26.330510] Call trace: [ 26.330708] show_stack+0x20/0x38 (C) [ 26.331527] dump_stack_lvl+0x8c/0xd0 [ 26.332190] print_report+0x118/0x608 [ 26.332446] kasan_report+0xdc/0x128 [ 26.332621] kasan_check_range+0x100/0x1a8 [ 26.332753] __kasan_check_write+0x20/0x30 [ 26.332879] kasan_atomics_helper+0xb70/0x4858 [ 26.333004] kasan_atomics+0x198/0x2e0 [ 26.333120] kunit_try_run_case+0x170/0x3f0 [ 26.333242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.333390] kthread+0x328/0x630 [ 26.335535] ret_from_fork+0x10/0x20 [ 26.335966] [ 26.336023] Allocated by task 269: [ 26.336235] kasan_save_stack+0x3c/0x68 [ 26.336644] kasan_save_track+0x20/0x40 [ 26.337545] kasan_save_alloc_info+0x40/0x58 [ 26.337668] __kasan_kmalloc+0xd4/0xd8 [ 26.338070] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.338758] kasan_atomics+0xb8/0x2e0 [ 26.339137] kunit_try_run_case+0x170/0x3f0 [ 26.339504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.340057] kthread+0x328/0x630 [ 26.340388] ret_from_fork+0x10/0x20 [ 26.340523] [ 26.340584] The buggy address belongs to the object at fff00000c7733980 [ 26.340584] which belongs to the cache kmalloc-64 of size 64 [ 26.340760] The buggy address is located 0 bytes to the right of [ 26.340760] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.340935] [ 26.340991] The buggy address belongs to the physical page: [ 26.341080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.342529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.343234] page_type: f5(slab) [ 26.343346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.343713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.345655] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.347061] ================================================================== [ 26.571426] ================================================================== [ 26.571553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 26.571680] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.571815] [ 26.571906] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.572153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.572221] Hardware name: linux,dummy-virt (DT) [ 26.572303] Call trace: [ 26.572424] show_stack+0x20/0x38 (C) [ 26.572549] dump_stack_lvl+0x8c/0xd0 [ 26.572718] print_report+0x118/0x608 [ 26.572883] kasan_report+0xdc/0x128 [ 26.573041] kasan_check_range+0x100/0x1a8 [ 26.573161] __kasan_check_write+0x20/0x30 [ 26.573270] kasan_atomics_helper+0x12d8/0x4858 [ 26.573383] kasan_atomics+0x198/0x2e0 [ 26.573499] kunit_try_run_case+0x170/0x3f0 [ 26.573639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.573781] kthread+0x328/0x630 [ 26.573893] ret_from_fork+0x10/0x20 [ 26.574016] [ 26.574062] Allocated by task 269: [ 26.574134] kasan_save_stack+0x3c/0x68 [ 26.574299] kasan_save_track+0x20/0x40 [ 26.574441] kasan_save_alloc_info+0x40/0x58 [ 26.574621] __kasan_kmalloc+0xd4/0xd8 [ 26.574728] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.574845] kasan_atomics+0xb8/0x2e0 [ 26.575454] kunit_try_run_case+0x170/0x3f0 [ 26.575808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.576202] kthread+0x328/0x630 [ 26.576496] ret_from_fork+0x10/0x20 [ 26.576735] [ 26.576806] The buggy address belongs to the object at fff00000c7733980 [ 26.576806] which belongs to the cache kmalloc-64 of size 64 [ 26.576975] The buggy address is located 0 bytes to the right of [ 26.576975] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.577156] [ 26.577211] The buggy address belongs to the physical page: [ 26.577299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.577447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.577583] page_type: f5(slab) [ 26.577686] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.578780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.578957] page dumped because: kasan: bad access detected [ 26.579082] [ 26.579147] Memory state around the buggy address: [ 26.579242] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.579336] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.579454] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.579555] ^ [ 26.580121] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.580249] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.581211] ================================================================== [ 26.387395] ================================================================== [ 26.387608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 26.387788] Read of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.387977] [ 26.388099] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.388412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.388518] Hardware name: linux,dummy-virt (DT) [ 26.388641] Call trace: [ 26.388730] show_stack+0x20/0x38 (C) [ 26.388908] dump_stack_lvl+0x8c/0xd0 [ 26.389046] print_report+0x118/0x608 [ 26.389140] kasan_report+0xdc/0x128 [ 26.389626] __asan_report_load4_noabort+0x20/0x30 [ 26.389800] kasan_atomics_helper+0x3dd8/0x4858 [ 26.389964] kasan_atomics+0x198/0x2e0 [ 26.390155] kunit_try_run_case+0x170/0x3f0 [ 26.390302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.390520] kthread+0x328/0x630 [ 26.390667] ret_from_fork+0x10/0x20 [ 26.390905] [ 26.391087] Allocated by task 269: [ 26.391348] kasan_save_stack+0x3c/0x68 [ 26.391710] kasan_save_track+0x20/0x40 [ 26.391922] kasan_save_alloc_info+0x40/0x58 [ 26.392022] __kasan_kmalloc+0xd4/0xd8 [ 26.392272] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.392595] kasan_atomics+0xb8/0x2e0 [ 26.393130] kunit_try_run_case+0x170/0x3f0 [ 26.393418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.393635] kthread+0x328/0x630 [ 26.393811] ret_from_fork+0x10/0x20 [ 26.394143] [ 26.394438] The buggy address belongs to the object at fff00000c7733980 [ 26.394438] which belongs to the cache kmalloc-64 of size 64 [ 26.394765] The buggy address is located 0 bytes to the right of [ 26.394765] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.394962] [ 26.395231] The buggy address belongs to the physical page: [ 26.395381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.395742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.396045] page_type: f5(slab) [ 26.396307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.396442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.397303] page dumped because: kasan: bad access detected [ 26.397529] [ 26.397561] Memory state around the buggy address: [ 26.397612] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.397671] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.397722] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.397768] ^ [ 26.397813] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.397866] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.397911] ================================================================== [ 26.512783] ================================================================== [ 26.513037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 26.513165] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.513299] [ 26.513396] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.513627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.513703] Hardware name: linux,dummy-virt (DT) [ 26.513787] Call trace: [ 26.513853] show_stack+0x20/0x38 (C) [ 26.513976] dump_stack_lvl+0x8c/0xd0 [ 26.516299] print_report+0x118/0x608 [ 26.516810] kasan_report+0xdc/0x128 [ 26.517123] kasan_check_range+0x100/0x1a8 [ 26.517264] __kasan_check_write+0x20/0x30 [ 26.517925] kasan_atomics_helper+0x10c0/0x4858 [ 26.518335] kasan_atomics+0x198/0x2e0 [ 26.518537] kunit_try_run_case+0x170/0x3f0 [ 26.518678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.518850] kthread+0x328/0x630 [ 26.518958] ret_from_fork+0x10/0x20 [ 26.519586] [ 26.519665] Allocated by task 269: [ 26.519770] kasan_save_stack+0x3c/0x68 [ 26.519886] kasan_save_track+0x20/0x40 [ 26.519984] kasan_save_alloc_info+0x40/0x58 [ 26.520083] __kasan_kmalloc+0xd4/0xd8 [ 26.520174] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.520273] kasan_atomics+0xb8/0x2e0 [ 26.520357] kunit_try_run_case+0x170/0x3f0 [ 26.520450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.520544] kthread+0x328/0x630 [ 26.520625] ret_from_fork+0x10/0x20 [ 26.520714] [ 26.520767] The buggy address belongs to the object at fff00000c7733980 [ 26.520767] which belongs to the cache kmalloc-64 of size 64 [ 26.520918] The buggy address is located 0 bytes to the right of [ 26.520918] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.521078] [ 26.521129] The buggy address belongs to the physical page: [ 26.522049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.522505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.523340] page_type: f5(slab) [ 26.523472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.524303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.524769] page dumped because: kasan: bad access detected [ 26.525151] [ 26.525217] Memory state around the buggy address: [ 26.525310] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.525451] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.526167] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.526308] ^ [ 26.527065] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.527456] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.527963] ================================================================== [ 26.641757] ================================================================== [ 26.641887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 26.642028] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.642160] [ 26.642247] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.642497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.642576] Hardware name: linux,dummy-virt (DT) [ 26.642660] Call trace: [ 26.642727] show_stack+0x20/0x38 (C) [ 26.642864] dump_stack_lvl+0x8c/0xd0 [ 26.643948] print_report+0x118/0x608 [ 26.644343] kasan_report+0xdc/0x128 [ 26.645647] kasan_check_range+0x100/0x1a8 [ 26.645800] __kasan_check_write+0x20/0x30 [ 26.645902] kasan_atomics_helper+0x14e4/0x4858 [ 26.645963] kasan_atomics+0x198/0x2e0 [ 26.646014] kunit_try_run_case+0x170/0x3f0 [ 26.646078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.646140] kthread+0x328/0x630 [ 26.646193] ret_from_fork+0x10/0x20 [ 26.646254] [ 26.646279] Allocated by task 269: [ 26.646340] kasan_save_stack+0x3c/0x68 [ 26.646398] kasan_save_track+0x20/0x40 [ 26.646498] kasan_save_alloc_info+0x40/0x58 [ 26.646582] __kasan_kmalloc+0xd4/0xd8 [ 26.646680] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.646808] kasan_atomics+0xb8/0x2e0 [ 26.646906] kunit_try_run_case+0x170/0x3f0 [ 26.647013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.647131] kthread+0x328/0x630 [ 26.647225] ret_from_fork+0x10/0x20 [ 26.647323] [ 26.647382] The buggy address belongs to the object at fff00000c7733980 [ 26.647382] which belongs to the cache kmalloc-64 of size 64 [ 26.647563] The buggy address is located 0 bytes to the right of [ 26.647563] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.647760] [ 26.647822] The buggy address belongs to the physical page: [ 26.647926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.648079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.648224] page_type: f5(slab) [ 26.648348] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.648899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.650013] page dumped because: kasan: bad access detected [ 26.650245] [ 26.650914] Memory state around the buggy address: [ 26.651269] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.651658] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.651826] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.651973] ^ [ 26.652105] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.652264] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.652381] ================================================================== [ 26.756055] ================================================================== [ 26.756169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 26.756284] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.756396] [ 26.758048] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.758236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.758317] Hardware name: linux,dummy-virt (DT) [ 26.759971] Call trace: [ 26.760057] show_stack+0x20/0x38 (C) [ 26.760192] dump_stack_lvl+0x8c/0xd0 [ 26.760296] print_report+0x118/0x608 [ 26.760383] kasan_report+0xdc/0x128 [ 26.760490] kasan_check_range+0x100/0x1a8 [ 26.760578] __kasan_check_write+0x20/0x30 [ 26.760674] kasan_atomics_helper+0x17ec/0x4858 [ 26.762199] kasan_atomics+0x198/0x2e0 [ 26.762612] kunit_try_run_case+0x170/0x3f0 [ 26.762801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.763028] kthread+0x328/0x630 [ 26.763133] ret_from_fork+0x10/0x20 [ 26.763283] [ 26.763325] Allocated by task 269: [ 26.763395] kasan_save_stack+0x3c/0x68 [ 26.763508] kasan_save_track+0x20/0x40 [ 26.763624] kasan_save_alloc_info+0x40/0x58 [ 26.763754] __kasan_kmalloc+0xd4/0xd8 [ 26.763874] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.764015] kasan_atomics+0xb8/0x2e0 [ 26.764129] kunit_try_run_case+0x170/0x3f0 [ 26.764221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.764327] kthread+0x328/0x630 [ 26.764441] ret_from_fork+0x10/0x20 [ 26.764539] [ 26.764588] The buggy address belongs to the object at fff00000c7733980 [ 26.764588] which belongs to the cache kmalloc-64 of size 64 [ 26.764723] The buggy address is located 0 bytes to the right of [ 26.764723] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.764882] [ 26.764950] The buggy address belongs to the physical page: [ 26.765065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.765241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.765420] page_type: f5(slab) [ 26.765501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.765638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.765757] page dumped because: kasan: bad access detected [ 26.765825] [ 26.765866] Memory state around the buggy address: [ 26.765940] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.766046] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.766161] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.766274] ^ [ 26.766449] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.766585] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.766700] ================================================================== [ 26.560295] ================================================================== [ 26.560521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 26.560769] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269 [ 26.561560] [ 26.561866] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 26.562369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.562470] Hardware name: linux,dummy-virt (DT) [ 26.562552] Call trace: [ 26.562613] show_stack+0x20/0x38 (C) [ 26.562751] dump_stack_lvl+0x8c/0xd0 [ 26.562878] print_report+0x118/0x608 [ 26.562998] kasan_report+0xdc/0x128 [ 26.563112] kasan_check_range+0x100/0x1a8 [ 26.563242] __kasan_check_write+0x20/0x30 [ 26.563370] kasan_atomics_helper+0x126c/0x4858 [ 26.563517] kasan_atomics+0x198/0x2e0 [ 26.563638] kunit_try_run_case+0x170/0x3f0 [ 26.563767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.563914] kthread+0x328/0x630 [ 26.564035] ret_from_fork+0x10/0x20 [ 26.564163] [ 26.564216] Allocated by task 269: [ 26.564300] kasan_save_stack+0x3c/0x68 [ 26.565415] kasan_save_track+0x20/0x40 [ 26.566180] kasan_save_alloc_info+0x40/0x58 [ 26.566296] __kasan_kmalloc+0xd4/0xd8 [ 26.566394] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.566507] kasan_atomics+0xb8/0x2e0 [ 26.566581] kunit_try_run_case+0x170/0x3f0 [ 26.566669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.566765] kthread+0x328/0x630 [ 26.566840] ret_from_fork+0x10/0x20 [ 26.566913] [ 26.566954] The buggy address belongs to the object at fff00000c7733980 [ 26.566954] which belongs to the cache kmalloc-64 of size 64 [ 26.567088] The buggy address is located 0 bytes to the right of [ 26.567088] allocated 48-byte region [fff00000c7733980, fff00000c77339b0) [ 26.567502] [ 26.567562] The buggy address belongs to the physical page: [ 26.567664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733 [ 26.567868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.568031] page_type: f5(slab) [ 26.568142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.568279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.568379] page dumped because: kasan: bad access detected [ 26.568473] [ 26.568522] Memory state around the buggy address: [ 26.568607] fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.569654] fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.569806] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.569912] ^ [ 26.570233] fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.570458] fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.570557] ==================================================================
[ 18.142896] ================================================================== [ 18.143749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 18.144375] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 18.144979] [ 18.145212] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.145314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.145344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.145393] Call Trace: [ 18.145437] <TASK> [ 18.145479] dump_stack_lvl+0x73/0xb0 [ 18.145546] print_report+0xd1/0x650 [ 18.145609] ? __virt_addr_valid+0x1db/0x2d0 [ 18.145656] ? kasan_atomics_helper+0x4fb2/0x5450 [ 18.145709] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.145763] ? kasan_atomics_helper+0x4fb2/0x5450 [ 18.145811] kasan_report+0x141/0x180 [ 18.145861] ? kasan_atomics_helper+0x4fb2/0x5450 [ 18.145931] __asan_report_load8_noabort+0x18/0x20 [ 18.145980] kasan_atomics_helper+0x4fb2/0x5450 [ 18.146030] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.146081] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.146123] ? ret_from_fork_asm+0x1a/0x30 [ 18.146165] ? kasan_atomics+0x152/0x310 [ 18.146220] kasan_atomics+0x1dc/0x310 [ 18.146264] ? __pfx_kasan_atomics+0x10/0x10 [ 18.146323] ? __pfx_read_tsc+0x10/0x10 [ 18.146365] ? ktime_get_ts64+0x86/0x230 [ 18.146425] kunit_try_run_case+0x1a5/0x480 [ 18.146492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.146538] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.146598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.146652] ? __kthread_parkme+0x82/0x180 [ 18.146718] ? preempt_count_sub+0x50/0x80 [ 18.146769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.146821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.146868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.146914] kthread+0x337/0x6f0 [ 18.146961] ? trace_preempt_on+0x20/0xc0 [ 18.147024] ? __pfx_kthread+0x10/0x10 [ 18.147066] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.147112] ? calculate_sigpending+0x7b/0xa0 [ 18.147176] ? __pfx_kthread+0x10/0x10 [ 18.147219] ret_from_fork+0x41/0x80 [ 18.147281] ? __pfx_kthread+0x10/0x10 [ 18.147324] ret_from_fork_asm+0x1a/0x30 [ 18.147397] </TASK> [ 18.147427] [ 18.156925] Allocated by task 285: [ 18.157280] kasan_save_stack+0x45/0x70 [ 18.157673] kasan_save_track+0x18/0x40 [ 18.158019] kasan_save_alloc_info+0x3b/0x50 [ 18.158470] __kasan_kmalloc+0xb7/0xc0 [ 18.158808] __kmalloc_cache_noprof+0x189/0x420 [ 18.159057] kasan_atomics+0x95/0x310 [ 18.159316] kunit_try_run_case+0x1a5/0x480 [ 18.159578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.161044] kthread+0x337/0x6f0 [ 18.161255] ret_from_fork+0x41/0x80 [ 18.161433] ret_from_fork_asm+0x1a/0x30 [ 18.162168] [ 18.162326] The buggy address belongs to the object at ffff8881033b5600 [ 18.162326] which belongs to the cache kmalloc-64 of size 64 [ 18.163473] The buggy address is located 0 bytes to the right of [ 18.163473] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 18.164243] [ 18.164382] The buggy address belongs to the physical page: [ 18.164606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 18.165492] flags: 0x200000000000000(node=0|zone=2) [ 18.165820] page_type: f5(slab) [ 18.165995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.166433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.166847] page dumped because: kasan: bad access detected [ 18.167232] [ 18.167407] Memory state around the buggy address: [ 18.167625] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.168056] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.168414] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.168756] ^ [ 18.169033] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.169423] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.169843] ================================================================== [ 16.980188] ================================================================== [ 16.980908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 16.981393] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.981784] [ 16.982062] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.982156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.982183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.982226] Call Trace: [ 16.982292] <TASK> [ 16.982334] dump_stack_lvl+0x73/0xb0 [ 16.982447] print_report+0xd1/0x650 [ 16.982501] ? __virt_addr_valid+0x1db/0x2d0 [ 16.982547] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.982598] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.982642] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.982743] kasan_report+0x141/0x180 [ 16.982807] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.982857] __asan_report_load4_noabort+0x18/0x20 [ 16.982894] kasan_atomics_helper+0x4a84/0x5450 [ 16.982931] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.982956] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.982978] ? ret_from_fork_asm+0x1a/0x30 [ 16.983001] ? kasan_atomics+0x152/0x310 [ 16.983024] kasan_atomics+0x1dc/0x310 [ 16.983044] ? __pfx_kasan_atomics+0x10/0x10 [ 16.983065] ? __pfx_read_tsc+0x10/0x10 [ 16.983087] ? ktime_get_ts64+0x86/0x230 [ 16.983115] kunit_try_run_case+0x1a5/0x480 [ 16.983164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.983191] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.983220] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.983247] ? __kthread_parkme+0x82/0x180 [ 16.983273] ? preempt_count_sub+0x50/0x80 [ 16.983302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.983330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.983357] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.983382] kthread+0x337/0x6f0 [ 16.983401] ? trace_preempt_on+0x20/0xc0 [ 16.983427] ? __pfx_kthread+0x10/0x10 [ 16.983446] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.983467] ? calculate_sigpending+0x7b/0xa0 [ 16.983492] ? __pfx_kthread+0x10/0x10 [ 16.983511] ret_from_fork+0x41/0x80 [ 16.983533] ? __pfx_kthread+0x10/0x10 [ 16.983552] ret_from_fork_asm+0x1a/0x30 [ 16.983604] </TASK> [ 16.983620] [ 16.993915] Allocated by task 285: [ 16.994322] kasan_save_stack+0x45/0x70 [ 16.994691] kasan_save_track+0x18/0x40 [ 16.995085] kasan_save_alloc_info+0x3b/0x50 [ 16.995349] __kasan_kmalloc+0xb7/0xc0 [ 16.995544] __kmalloc_cache_noprof+0x189/0x420 [ 16.995763] kasan_atomics+0x95/0x310 [ 16.995954] kunit_try_run_case+0x1a5/0x480 [ 16.996158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.996474] kthread+0x337/0x6f0 [ 16.996811] ret_from_fork+0x41/0x80 [ 16.997129] ret_from_fork_asm+0x1a/0x30 [ 16.997458] [ 16.997640] The buggy address belongs to the object at ffff8881033b5600 [ 16.997640] which belongs to the cache kmalloc-64 of size 64 [ 16.998447] The buggy address is located 0 bytes to the right of [ 16.998447] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.999598] [ 16.999826] The buggy address belongs to the physical page: [ 17.000168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.000713] flags: 0x200000000000000(node=0|zone=2) [ 17.000972] page_type: f5(slab) [ 17.001316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.001855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.002246] page dumped because: kasan: bad access detected [ 17.002597] [ 17.002784] Memory state around the buggy address: [ 17.003231] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.003655] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.004076] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.004466] ^ [ 17.004872] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.005236] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.005707] ================================================================== [ 17.145568] ================================================================== [ 17.146136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 17.146453] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.146925] [ 17.147139] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.147248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.147283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.147332] Call Trace: [ 17.147378] <TASK> [ 17.147422] dump_stack_lvl+0x73/0xb0 [ 17.147493] print_report+0xd1/0x650 [ 17.147549] ? __virt_addr_valid+0x1db/0x2d0 [ 17.147616] ? kasan_atomics_helper+0x4a36/0x5450 [ 17.147663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.147715] ? kasan_atomics_helper+0x4a36/0x5450 [ 17.147769] kasan_report+0x141/0x180 [ 17.147826] ? kasan_atomics_helper+0x4a36/0x5450 [ 17.147889] __asan_report_load4_noabort+0x18/0x20 [ 17.147941] kasan_atomics_helper+0x4a36/0x5450 [ 17.147997] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.148046] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.148091] ? ret_from_fork_asm+0x1a/0x30 [ 17.148136] ? kasan_atomics+0x152/0x310 [ 17.148187] kasan_atomics+0x1dc/0x310 [ 17.148231] ? __pfx_kasan_atomics+0x10/0x10 [ 17.148278] ? __pfx_read_tsc+0x10/0x10 [ 17.148322] ? ktime_get_ts64+0x86/0x230 [ 17.148372] kunit_try_run_case+0x1a5/0x480 [ 17.148416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.148456] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.148493] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.148531] ? __kthread_parkme+0x82/0x180 [ 17.148584] ? preempt_count_sub+0x50/0x80 [ 17.148641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.148689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.148754] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.148804] kthread+0x337/0x6f0 [ 17.148843] ? trace_preempt_on+0x20/0xc0 [ 17.148894] ? __pfx_kthread+0x10/0x10 [ 17.148936] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.148982] ? calculate_sigpending+0x7b/0xa0 [ 17.149030] ? __pfx_kthread+0x10/0x10 [ 17.149073] ret_from_fork+0x41/0x80 [ 17.149118] ? __pfx_kthread+0x10/0x10 [ 17.149160] ret_from_fork_asm+0x1a/0x30 [ 17.149218] </TASK> [ 17.149252] [ 17.158947] Allocated by task 285: [ 17.159196] kasan_save_stack+0x45/0x70 [ 17.159546] kasan_save_track+0x18/0x40 [ 17.160036] kasan_save_alloc_info+0x3b/0x50 [ 17.160261] __kasan_kmalloc+0xb7/0xc0 [ 17.160447] __kmalloc_cache_noprof+0x189/0x420 [ 17.160799] kasan_atomics+0x95/0x310 [ 17.161106] kunit_try_run_case+0x1a5/0x480 [ 17.161476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.161986] kthread+0x337/0x6f0 [ 17.162308] ret_from_fork+0x41/0x80 [ 17.162634] ret_from_fork_asm+0x1a/0x30 [ 17.162926] [ 17.163047] The buggy address belongs to the object at ffff8881033b5600 [ 17.163047] which belongs to the cache kmalloc-64 of size 64 [ 17.163606] The buggy address is located 0 bytes to the right of [ 17.163606] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.164791] [ 17.164941] The buggy address belongs to the physical page: [ 17.165155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.165738] flags: 0x200000000000000(node=0|zone=2) [ 17.166146] page_type: f5(slab) [ 17.166351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.166717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.167141] page dumped because: kasan: bad access detected [ 17.168278] [ 17.168396] Memory state around the buggy address: [ 17.168595] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.168839] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.169061] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.169275] ^ [ 17.169431] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.169762] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.170045] ================================================================== [ 17.064390] ================================================================== [ 17.064780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 17.065409] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.066205] [ 17.066732] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.066799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.066815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.066848] Call Trace: [ 17.066886] <TASK> [ 17.066924] dump_stack_lvl+0x73/0xb0 [ 17.067010] print_report+0xd1/0x650 [ 17.067040] ? __virt_addr_valid+0x1db/0x2d0 [ 17.067067] ? kasan_atomics_helper+0xe78/0x5450 [ 17.067103] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.067138] ? kasan_atomics_helper+0xe78/0x5450 [ 17.067166] kasan_report+0x141/0x180 [ 17.067190] ? kasan_atomics_helper+0xe78/0x5450 [ 17.067218] kasan_check_range+0x10c/0x1c0 [ 17.067241] __kasan_check_write+0x18/0x20 [ 17.067263] kasan_atomics_helper+0xe78/0x5450 [ 17.067288] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.067314] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.067336] ? ret_from_fork_asm+0x1a/0x30 [ 17.067359] ? kasan_atomics+0x152/0x310 [ 17.067383] kasan_atomics+0x1dc/0x310 [ 17.067403] ? __pfx_kasan_atomics+0x10/0x10 [ 17.067424] ? __pfx_read_tsc+0x10/0x10 [ 17.067445] ? ktime_get_ts64+0x86/0x230 [ 17.067472] kunit_try_run_case+0x1a5/0x480 [ 17.067499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.067522] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.067547] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.067590] ? __kthread_parkme+0x82/0x180 [ 17.067614] ? preempt_count_sub+0x50/0x80 [ 17.067641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.067677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.067705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.067729] kthread+0x337/0x6f0 [ 17.067746] ? trace_preempt_on+0x20/0xc0 [ 17.067770] ? __pfx_kthread+0x10/0x10 [ 17.067789] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.067811] ? calculate_sigpending+0x7b/0xa0 [ 17.067834] ? __pfx_kthread+0x10/0x10 [ 17.067853] ret_from_fork+0x41/0x80 [ 17.067874] ? __pfx_kthread+0x10/0x10 [ 17.067893] ret_from_fork_asm+0x1a/0x30 [ 17.067922] </TASK> [ 17.067935] [ 17.079186] Allocated by task 285: [ 17.079349] kasan_save_stack+0x45/0x70 [ 17.079512] kasan_save_track+0x18/0x40 [ 17.081303] kasan_save_alloc_info+0x3b/0x50 [ 17.081737] __kasan_kmalloc+0xb7/0xc0 [ 17.082075] __kmalloc_cache_noprof+0x189/0x420 [ 17.082443] kasan_atomics+0x95/0x310 [ 17.082754] kunit_try_run_case+0x1a5/0x480 [ 17.083160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.083531] kthread+0x337/0x6f0 [ 17.083786] ret_from_fork+0x41/0x80 [ 17.084432] ret_from_fork_asm+0x1a/0x30 [ 17.084665] [ 17.085115] The buggy address belongs to the object at ffff8881033b5600 [ 17.085115] which belongs to the cache kmalloc-64 of size 64 [ 17.085733] The buggy address is located 0 bytes to the right of [ 17.085733] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.086423] [ 17.086616] The buggy address belongs to the physical page: [ 17.087486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.088162] flags: 0x200000000000000(node=0|zone=2) [ 17.088448] page_type: f5(slab) [ 17.088621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.089396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.089741] page dumped because: kasan: bad access detected [ 17.090100] [ 17.090267] Memory state around the buggy address: [ 17.090594] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.091455] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.091822] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.092240] ^ [ 17.092755] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.092989] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.093487] ================================================================== [ 17.687688] ================================================================== [ 17.688388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 17.689000] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.689275] [ 17.689913] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.689995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.690013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.690038] Call Trace: [ 17.690064] <TASK> [ 17.690089] dump_stack_lvl+0x73/0xb0 [ 17.690132] print_report+0xd1/0x650 [ 17.690159] ? __virt_addr_valid+0x1db/0x2d0 [ 17.690186] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.690210] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.690234] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.690259] kasan_report+0x141/0x180 [ 17.690283] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.690312] kasan_check_range+0x10c/0x1c0 [ 17.690334] __kasan_check_write+0x18/0x20 [ 17.690356] kasan_atomics_helper+0x18b1/0x5450 [ 17.690380] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.690404] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.690426] ? ret_from_fork_asm+0x1a/0x30 [ 17.690449] ? kasan_atomics+0x152/0x310 [ 17.690474] kasan_atomics+0x1dc/0x310 [ 17.690494] ? __pfx_kasan_atomics+0x10/0x10 [ 17.690517] ? __pfx_read_tsc+0x10/0x10 [ 17.690539] ? ktime_get_ts64+0x86/0x230 [ 17.690588] kunit_try_run_case+0x1a5/0x480 [ 17.690619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.690643] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.690684] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.690711] ? __kthread_parkme+0x82/0x180 [ 17.690736] ? preempt_count_sub+0x50/0x80 [ 17.690764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.690792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.690817] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.690843] kthread+0x337/0x6f0 [ 17.690864] ? trace_preempt_on+0x20/0xc0 [ 17.690892] ? __pfx_kthread+0x10/0x10 [ 17.690913] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.690937] ? calculate_sigpending+0x7b/0xa0 [ 17.690962] ? __pfx_kthread+0x10/0x10 [ 17.690984] ret_from_fork+0x41/0x80 [ 17.691008] ? __pfx_kthread+0x10/0x10 [ 17.691029] ret_from_fork_asm+0x1a/0x30 [ 17.691062] </TASK> [ 17.691077] [ 17.703902] Allocated by task 285: [ 17.704152] kasan_save_stack+0x45/0x70 [ 17.704395] kasan_save_track+0x18/0x40 [ 17.705809] kasan_save_alloc_info+0x3b/0x50 [ 17.707688] __kasan_kmalloc+0xb7/0xc0 [ 17.708269] __kmalloc_cache_noprof+0x189/0x420 [ 17.708752] kasan_atomics+0x95/0x310 [ 17.709517] kunit_try_run_case+0x1a5/0x480 [ 17.710139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.711119] kthread+0x337/0x6f0 [ 17.711506] ret_from_fork+0x41/0x80 [ 17.712575] ret_from_fork_asm+0x1a/0x30 [ 17.713178] [ 17.713295] The buggy address belongs to the object at ffff8881033b5600 [ 17.713295] which belongs to the cache kmalloc-64 of size 64 [ 17.715064] The buggy address is located 0 bytes to the right of [ 17.715064] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.716807] [ 17.717156] The buggy address belongs to the physical page: [ 17.717655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.718190] flags: 0x200000000000000(node=0|zone=2) [ 17.718477] page_type: f5(slab) [ 17.719163] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.719511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.720193] page dumped because: kasan: bad access detected [ 17.720861] [ 17.720986] Memory state around the buggy address: [ 17.721466] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.721912] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.722583] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.723198] ^ [ 17.723513] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.723984] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.724370] ================================================================== [ 17.094442] ================================================================== [ 17.094865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 17.095436] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.096068] [ 17.096290] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.096395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.096431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.096467] Call Trace: [ 17.096505] <TASK> [ 17.096542] dump_stack_lvl+0x73/0xb0 [ 17.096620] print_report+0xd1/0x650 [ 17.096678] ? __virt_addr_valid+0x1db/0x2d0 [ 17.096728] ? kasan_atomics_helper+0xf10/0x5450 [ 17.096776] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.096826] ? kasan_atomics_helper+0xf10/0x5450 [ 17.096874] kasan_report+0x141/0x180 [ 17.096915] ? kasan_atomics_helper+0xf10/0x5450 [ 17.096967] kasan_check_range+0x10c/0x1c0 [ 17.097012] __kasan_check_write+0x18/0x20 [ 17.097056] kasan_atomics_helper+0xf10/0x5450 [ 17.097108] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.097182] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.097246] ? ret_from_fork_asm+0x1a/0x30 [ 17.097299] ? kasan_atomics+0x152/0x310 [ 17.097353] kasan_atomics+0x1dc/0x310 [ 17.097398] ? __pfx_kasan_atomics+0x10/0x10 [ 17.097446] ? __pfx_read_tsc+0x10/0x10 [ 17.097491] ? ktime_get_ts64+0x86/0x230 [ 17.097539] kunit_try_run_case+0x1a5/0x480 [ 17.097600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.097643] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.097728] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.097790] ? __kthread_parkme+0x82/0x180 [ 17.097835] ? preempt_count_sub+0x50/0x80 [ 17.097886] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.097948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.098011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.098055] kthread+0x337/0x6f0 [ 17.098088] ? trace_preempt_on+0x20/0xc0 [ 17.098117] ? __pfx_kthread+0x10/0x10 [ 17.098136] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.098158] ? calculate_sigpending+0x7b/0xa0 [ 17.098182] ? __pfx_kthread+0x10/0x10 [ 17.098201] ret_from_fork+0x41/0x80 [ 17.098223] ? __pfx_kthread+0x10/0x10 [ 17.098242] ret_from_fork_asm+0x1a/0x30 [ 17.098271] </TASK> [ 17.098286] [ 17.107468] Allocated by task 285: [ 17.107795] kasan_save_stack+0x45/0x70 [ 17.108149] kasan_save_track+0x18/0x40 [ 17.108475] kasan_save_alloc_info+0x3b/0x50 [ 17.108848] __kasan_kmalloc+0xb7/0xc0 [ 17.109159] __kmalloc_cache_noprof+0x189/0x420 [ 17.109510] kasan_atomics+0x95/0x310 [ 17.109852] kunit_try_run_case+0x1a5/0x480 [ 17.110180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.110505] kthread+0x337/0x6f0 [ 17.110815] ret_from_fork+0x41/0x80 [ 17.111020] ret_from_fork_asm+0x1a/0x30 [ 17.111328] [ 17.111539] The buggy address belongs to the object at ffff8881033b5600 [ 17.111539] which belongs to the cache kmalloc-64 of size 64 [ 17.112247] The buggy address is located 0 bytes to the right of [ 17.112247] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.112903] [ 17.113088] The buggy address belongs to the physical page: [ 17.113390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.113897] flags: 0x200000000000000(node=0|zone=2) [ 17.114219] page_type: f5(slab) [ 17.114493] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.114789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.115052] page dumped because: kasan: bad access detected [ 17.115270] [ 17.115385] Memory state around the buggy address: [ 17.115771] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.116289] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.116814] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.117311] ^ [ 17.117680] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.118172] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.118747] ================================================================== [ 16.511384] ================================================================== [ 16.511776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 16.512687] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.513046] [ 16.513301] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.513479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.513707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.513737] Call Trace: [ 16.513764] <TASK> [ 16.513788] dump_stack_lvl+0x73/0xb0 [ 16.513830] print_report+0xd1/0x650 [ 16.513858] ? __virt_addr_valid+0x1db/0x2d0 [ 16.513884] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.513909] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.513934] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.513960] kasan_report+0x141/0x180 [ 16.513985] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.514014] kasan_check_range+0x10c/0x1c0 [ 16.514038] __kasan_check_write+0x18/0x20 [ 16.514062] kasan_atomics_helper+0x4a0/0x5450 [ 16.514088] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.514114] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.514139] ? ret_from_fork_asm+0x1a/0x30 [ 16.514164] ? kasan_atomics+0x152/0x310 [ 16.514190] kasan_atomics+0x1dc/0x310 [ 16.514212] ? __pfx_kasan_atomics+0x10/0x10 [ 16.514235] ? __pfx_read_tsc+0x10/0x10 [ 16.514259] ? ktime_get_ts64+0x86/0x230 [ 16.514289] kunit_try_run_case+0x1a5/0x480 [ 16.514318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.514344] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.514371] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.514398] ? __kthread_parkme+0x82/0x180 [ 16.514423] ? preempt_count_sub+0x50/0x80 [ 16.514451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.514479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.514505] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.514532] kthread+0x337/0x6f0 [ 16.514552] ? trace_preempt_on+0x20/0xc0 [ 16.514732] ? __pfx_kthread+0x10/0x10 [ 16.514765] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.514796] ? calculate_sigpending+0x7b/0xa0 [ 16.514828] ? __pfx_kthread+0x10/0x10 [ 16.514851] ret_from_fork+0x41/0x80 [ 16.514885] ? __pfx_kthread+0x10/0x10 [ 16.514906] ret_from_fork_asm+0x1a/0x30 [ 16.514942] </TASK> [ 16.514958] [ 16.526289] Allocated by task 285: [ 16.526446] kasan_save_stack+0x45/0x70 [ 16.527341] kasan_save_track+0x18/0x40 [ 16.527511] kasan_save_alloc_info+0x3b/0x50 [ 16.527675] __kasan_kmalloc+0xb7/0xc0 [ 16.528000] __kmalloc_cache_noprof+0x189/0x420 [ 16.528317] kasan_atomics+0x95/0x310 [ 16.529147] kunit_try_run_case+0x1a5/0x480 [ 16.529376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.529603] kthread+0x337/0x6f0 [ 16.530338] ret_from_fork+0x41/0x80 [ 16.531318] ret_from_fork_asm+0x1a/0x30 [ 16.531538] [ 16.532008] The buggy address belongs to the object at ffff8881033b5600 [ 16.532008] which belongs to the cache kmalloc-64 of size 64 [ 16.532574] The buggy address is located 0 bytes to the right of [ 16.532574] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.533328] [ 16.533432] The buggy address belongs to the physical page: [ 16.534128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.535396] flags: 0x200000000000000(node=0|zone=2) [ 16.535846] page_type: f5(slab) [ 16.536072] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.536395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.536601] page dumped because: kasan: bad access detected [ 16.537195] [ 16.537299] Memory state around the buggy address: [ 16.537465] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.538197] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.538482] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.538755] ^ [ 16.539816] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.540800] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.541114] ================================================================== [ 17.783249] ================================================================== [ 17.784000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 17.784306] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.784704] [ 17.784919] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.785017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.785050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.785098] Call Trace: [ 17.785145] <TASK> [ 17.785187] dump_stack_lvl+0x73/0xb0 [ 17.785254] print_report+0xd1/0x650 [ 17.785306] ? __virt_addr_valid+0x1db/0x2d0 [ 17.785357] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.785406] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.785458] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.785509] kasan_report+0x141/0x180 [ 17.785572] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.785633] kasan_check_range+0x10c/0x1c0 [ 17.785682] __kasan_check_write+0x18/0x20 [ 17.785731] kasan_atomics_helper+0x1a7f/0x5450 [ 17.785781] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.785829] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.785869] ? ret_from_fork_asm+0x1a/0x30 [ 17.785906] ? kasan_atomics+0x152/0x310 [ 17.785947] kasan_atomics+0x1dc/0x310 [ 17.785978] ? __pfx_kasan_atomics+0x10/0x10 [ 17.786013] ? __pfx_read_tsc+0x10/0x10 [ 17.786049] ? ktime_get_ts64+0x86/0x230 [ 17.786095] kunit_try_run_case+0x1a5/0x480 [ 17.786151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.786194] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.786259] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.786309] ? __kthread_parkme+0x82/0x180 [ 17.786355] ? preempt_count_sub+0x50/0x80 [ 17.786408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.786460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.786510] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.786569] kthread+0x337/0x6f0 [ 17.786611] ? trace_preempt_on+0x20/0xc0 [ 17.786660] ? __pfx_kthread+0x10/0x10 [ 17.786699] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.786744] ? calculate_sigpending+0x7b/0xa0 [ 17.786793] ? __pfx_kthread+0x10/0x10 [ 17.786830] ret_from_fork+0x41/0x80 [ 17.786889] ? __pfx_kthread+0x10/0x10 [ 17.786930] ret_from_fork_asm+0x1a/0x30 [ 17.786996] </TASK> [ 17.787026] [ 17.797286] Allocated by task 285: [ 17.797625] kasan_save_stack+0x45/0x70 [ 17.798001] kasan_save_track+0x18/0x40 [ 17.798277] kasan_save_alloc_info+0x3b/0x50 [ 17.798467] __kasan_kmalloc+0xb7/0xc0 [ 17.798649] __kmalloc_cache_noprof+0x189/0x420 [ 17.798842] kasan_atomics+0x95/0x310 [ 17.799015] kunit_try_run_case+0x1a5/0x480 [ 17.799231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.799659] kthread+0x337/0x6f0 [ 17.799939] ret_from_fork+0x41/0x80 [ 17.800240] ret_from_fork_asm+0x1a/0x30 [ 17.800556] [ 17.800731] The buggy address belongs to the object at ffff8881033b5600 [ 17.800731] which belongs to the cache kmalloc-64 of size 64 [ 17.801512] The buggy address is located 0 bytes to the right of [ 17.801512] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.802471] [ 17.802588] The buggy address belongs to the physical page: [ 17.803145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.803487] flags: 0x200000000000000(node=0|zone=2) [ 17.803763] page_type: f5(slab) [ 17.804059] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.804624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.805001] page dumped because: kasan: bad access detected [ 17.805217] [ 17.805327] Memory state around the buggy address: [ 17.805526] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.805996] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.806507] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.807206] ^ [ 17.807529] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.807956] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.808323] ================================================================== [ 17.866126] ================================================================== [ 17.866484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 17.867770] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.868013] [ 17.868142] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.868226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.868250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.868286] Call Trace: [ 17.868324] <TASK> [ 17.868359] dump_stack_lvl+0x73/0xb0 [ 17.868416] print_report+0xd1/0x650 [ 17.868454] ? __virt_addr_valid+0x1db/0x2d0 [ 17.868489] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.868523] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.868553] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.868603] kasan_report+0x141/0x180 [ 17.868627] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.868653] __asan_report_load8_noabort+0x18/0x20 [ 17.868675] kasan_atomics_helper+0x4f30/0x5450 [ 17.868698] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.868721] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.868742] ? ret_from_fork_asm+0x1a/0x30 [ 17.868764] ? kasan_atomics+0x152/0x310 [ 17.868787] kasan_atomics+0x1dc/0x310 [ 17.868806] ? __pfx_kasan_atomics+0x10/0x10 [ 17.868827] ? __pfx_read_tsc+0x10/0x10 [ 17.868847] ? ktime_get_ts64+0x86/0x230 [ 17.868874] kunit_try_run_case+0x1a5/0x480 [ 17.868900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.868922] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.868947] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.868970] ? __kthread_parkme+0x82/0x180 [ 17.868992] ? preempt_count_sub+0x50/0x80 [ 17.869017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.869042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.869066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.869088] kthread+0x337/0x6f0 [ 17.869106] ? trace_preempt_on+0x20/0xc0 [ 17.869130] ? __pfx_kthread+0x10/0x10 [ 17.869149] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.869170] ? calculate_sigpending+0x7b/0xa0 [ 17.869193] ? __pfx_kthread+0x10/0x10 [ 17.869214] ret_from_fork+0x41/0x80 [ 17.869234] ? __pfx_kthread+0x10/0x10 [ 17.869253] ret_from_fork_asm+0x1a/0x30 [ 17.869281] </TASK> [ 17.869295] [ 17.881584] Allocated by task 285: [ 17.882016] kasan_save_stack+0x45/0x70 [ 17.882260] kasan_save_track+0x18/0x40 [ 17.882542] kasan_save_alloc_info+0x3b/0x50 [ 17.882799] __kasan_kmalloc+0xb7/0xc0 [ 17.883362] __kmalloc_cache_noprof+0x189/0x420 [ 17.883590] kasan_atomics+0x95/0x310 [ 17.884049] kunit_try_run_case+0x1a5/0x480 [ 17.884514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.884859] kthread+0x337/0x6f0 [ 17.885016] ret_from_fork+0x41/0x80 [ 17.885300] ret_from_fork_asm+0x1a/0x30 [ 17.885519] [ 17.885688] The buggy address belongs to the object at ffff8881033b5600 [ 17.885688] which belongs to the cache kmalloc-64 of size 64 [ 17.886377] The buggy address is located 0 bytes to the right of [ 17.886377] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.887729] [ 17.888023] The buggy address belongs to the physical page: [ 17.888209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.888444] flags: 0x200000000000000(node=0|zone=2) [ 17.888645] page_type: f5(slab) [ 17.889522] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.889782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.890534] page dumped because: kasan: bad access detected [ 17.890939] [ 17.891075] Memory state around the buggy address: [ 17.891346] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.891792] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.892439] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.893066] ^ [ 17.893243] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.893439] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.894310] ================================================================== [ 17.726208] ================================================================== [ 17.727002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 17.727513] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.728352] [ 17.728521] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.728631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.728659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.728701] Call Trace: [ 17.728742] <TASK> [ 17.728784] dump_stack_lvl+0x73/0xb0 [ 17.728851] print_report+0xd1/0x650 [ 17.728900] ? __virt_addr_valid+0x1db/0x2d0 [ 17.728945] ? kasan_atomics_helper+0x194a/0x5450 [ 17.728987] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.729035] ? kasan_atomics_helper+0x194a/0x5450 [ 17.729074] kasan_report+0x141/0x180 [ 17.729100] ? kasan_atomics_helper+0x194a/0x5450 [ 17.729127] kasan_check_range+0x10c/0x1c0 [ 17.729148] __kasan_check_write+0x18/0x20 [ 17.729169] kasan_atomics_helper+0x194a/0x5450 [ 17.729201] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.729239] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.729264] ? ret_from_fork_asm+0x1a/0x30 [ 17.729288] ? kasan_atomics+0x152/0x310 [ 17.729312] kasan_atomics+0x1dc/0x310 [ 17.729332] ? __pfx_kasan_atomics+0x10/0x10 [ 17.729354] ? __pfx_read_tsc+0x10/0x10 [ 17.729377] ? ktime_get_ts64+0x86/0x230 [ 17.729405] kunit_try_run_case+0x1a5/0x480 [ 17.729432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.729456] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.729483] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.729507] ? __kthread_parkme+0x82/0x180 [ 17.729530] ? preempt_count_sub+0x50/0x80 [ 17.729556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.729602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.729627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.729654] kthread+0x337/0x6f0 [ 17.729684] ? trace_preempt_on+0x20/0xc0 [ 17.729712] ? __pfx_kthread+0x10/0x10 [ 17.729731] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.729754] ? calculate_sigpending+0x7b/0xa0 [ 17.729777] ? __pfx_kthread+0x10/0x10 [ 17.729796] ret_from_fork+0x41/0x80 [ 17.729818] ? __pfx_kthread+0x10/0x10 [ 17.729837] ret_from_fork_asm+0x1a/0x30 [ 17.729867] </TASK> [ 17.729881] [ 17.743892] Allocated by task 285: [ 17.744134] kasan_save_stack+0x45/0x70 [ 17.744343] kasan_save_track+0x18/0x40 [ 17.744523] kasan_save_alloc_info+0x3b/0x50 [ 17.745410] __kasan_kmalloc+0xb7/0xc0 [ 17.745600] __kmalloc_cache_noprof+0x189/0x420 [ 17.746107] kasan_atomics+0x95/0x310 [ 17.746388] kunit_try_run_case+0x1a5/0x480 [ 17.746896] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.747203] kthread+0x337/0x6f0 [ 17.747491] ret_from_fork+0x41/0x80 [ 17.747756] ret_from_fork_asm+0x1a/0x30 [ 17.748300] [ 17.748398] The buggy address belongs to the object at ffff8881033b5600 [ 17.748398] which belongs to the cache kmalloc-64 of size 64 [ 17.749147] The buggy address is located 0 bytes to the right of [ 17.749147] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.750064] [ 17.750233] The buggy address belongs to the physical page: [ 17.750527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.751541] flags: 0x200000000000000(node=0|zone=2) [ 17.751852] page_type: f5(slab) [ 17.752030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.752582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.753259] page dumped because: kasan: bad access detected [ 17.753798] [ 17.753929] Memory state around the buggy address: [ 17.754450] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.754771] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.755375] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.755960] ^ [ 17.756327] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.756626] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.757235] ================================================================== [ 17.949194] ================================================================== [ 17.950431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 17.951012] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.951548] [ 17.952509] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.952636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.952663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.952894] Call Trace: [ 17.952940] <TASK> [ 17.952989] dump_stack_lvl+0x73/0xb0 [ 17.953037] print_report+0xd1/0x650 [ 17.953064] ? __virt_addr_valid+0x1db/0x2d0 [ 17.953090] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.953113] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.953137] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.953159] kasan_report+0x141/0x180 [ 17.953182] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.953208] kasan_check_range+0x10c/0x1c0 [ 17.953229] __kasan_check_write+0x18/0x20 [ 17.953250] kasan_atomics_helper+0x1e12/0x5450 [ 17.953273] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.953297] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.953319] ? ret_from_fork_asm+0x1a/0x30 [ 17.953341] ? kasan_atomics+0x152/0x310 [ 17.953364] kasan_atomics+0x1dc/0x310 [ 17.953383] ? __pfx_kasan_atomics+0x10/0x10 [ 17.953404] ? __pfx_read_tsc+0x10/0x10 [ 17.953425] ? ktime_get_ts64+0x86/0x230 [ 17.953451] kunit_try_run_case+0x1a5/0x480 [ 17.953476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.953499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.953524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.953547] ? __kthread_parkme+0x82/0x180 [ 17.953591] ? preempt_count_sub+0x50/0x80 [ 17.953620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.953645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.953681] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.953711] kthread+0x337/0x6f0 [ 17.953730] ? trace_preempt_on+0x20/0xc0 [ 17.953756] ? __pfx_kthread+0x10/0x10 [ 17.953775] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.953797] ? calculate_sigpending+0x7b/0xa0 [ 17.953820] ? __pfx_kthread+0x10/0x10 [ 17.953839] ret_from_fork+0x41/0x80 [ 17.953861] ? __pfx_kthread+0x10/0x10 [ 17.953879] ret_from_fork_asm+0x1a/0x30 [ 17.953908] </TASK> [ 17.953922] [ 17.964388] Allocated by task 285: [ 17.964576] kasan_save_stack+0x45/0x70 [ 17.964757] kasan_save_track+0x18/0x40 [ 17.964933] kasan_save_alloc_info+0x3b/0x50 [ 17.965267] __kasan_kmalloc+0xb7/0xc0 [ 17.965577] __kmalloc_cache_noprof+0x189/0x420 [ 17.965922] kasan_atomics+0x95/0x310 [ 17.966126] kunit_try_run_case+0x1a5/0x480 [ 17.966287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.966467] kthread+0x337/0x6f0 [ 17.966664] ret_from_fork+0x41/0x80 [ 17.967106] ret_from_fork_asm+0x1a/0x30 [ 17.967337] [ 17.967460] The buggy address belongs to the object at ffff8881033b5600 [ 17.967460] which belongs to the cache kmalloc-64 of size 64 [ 17.967926] The buggy address is located 0 bytes to the right of [ 17.967926] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.970468] [ 17.970618] The buggy address belongs to the physical page: [ 17.970995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.971281] flags: 0x200000000000000(node=0|zone=2) [ 17.971495] page_type: f5(slab) [ 17.972166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.972749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.973040] page dumped because: kasan: bad access detected [ 17.974267] [ 17.974486] Memory state around the buggy address: [ 17.975432] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.975753] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.976208] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.976992] ^ [ 17.977282] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.977512] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.978126] ================================================================== [ 18.011469] ================================================================== [ 18.012114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 18.012580] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 18.013277] [ 18.013444] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.013519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.013541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.013584] Call Trace: [ 18.013622] <TASK> [ 18.013656] dump_stack_lvl+0x73/0xb0 [ 18.013716] print_report+0xd1/0x650 [ 18.013759] ? __virt_addr_valid+0x1db/0x2d0 [ 18.013801] ? kasan_atomics_helper+0x1f43/0x5450 [ 18.013846] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.013894] ? kasan_atomics_helper+0x1f43/0x5450 [ 18.013935] kasan_report+0x141/0x180 [ 18.013997] ? kasan_atomics_helper+0x1f43/0x5450 [ 18.014044] kasan_check_range+0x10c/0x1c0 [ 18.014085] __kasan_check_write+0x18/0x20 [ 18.014127] kasan_atomics_helper+0x1f43/0x5450 [ 18.014177] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.014224] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.014270] ? ret_from_fork_asm+0x1a/0x30 [ 18.014318] ? kasan_atomics+0x152/0x310 [ 18.014367] kasan_atomics+0x1dc/0x310 [ 18.014412] ? __pfx_kasan_atomics+0x10/0x10 [ 18.014458] ? __pfx_read_tsc+0x10/0x10 [ 18.014500] ? ktime_get_ts64+0x86/0x230 [ 18.014544] kunit_try_run_case+0x1a5/0x480 [ 18.014599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.014642] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.014686] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.014750] ? __kthread_parkme+0x82/0x180 [ 18.014797] ? preempt_count_sub+0x50/0x80 [ 18.014853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.014902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.014951] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.015016] kthread+0x337/0x6f0 [ 18.015060] ? trace_preempt_on+0x20/0xc0 [ 18.015110] ? __pfx_kthread+0x10/0x10 [ 18.015155] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.015202] ? calculate_sigpending+0x7b/0xa0 [ 18.015251] ? __pfx_kthread+0x10/0x10 [ 18.015297] ret_from_fork+0x41/0x80 [ 18.015339] ? __pfx_kthread+0x10/0x10 [ 18.015376] ret_from_fork_asm+0x1a/0x30 [ 18.015440] </TASK> [ 18.015471] [ 18.025405] Allocated by task 285: [ 18.025632] kasan_save_stack+0x45/0x70 [ 18.025835] kasan_save_track+0x18/0x40 [ 18.025976] kasan_save_alloc_info+0x3b/0x50 [ 18.026124] __kasan_kmalloc+0xb7/0xc0 [ 18.026267] __kmalloc_cache_noprof+0x189/0x420 [ 18.026418] kasan_atomics+0x95/0x310 [ 18.026551] kunit_try_run_case+0x1a5/0x480 [ 18.028259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.028808] kthread+0x337/0x6f0 [ 18.029014] ret_from_fork+0x41/0x80 [ 18.029195] ret_from_fork_asm+0x1a/0x30 [ 18.029380] [ 18.029494] The buggy address belongs to the object at ffff8881033b5600 [ 18.029494] which belongs to the cache kmalloc-64 of size 64 [ 18.030610] The buggy address is located 0 bytes to the right of [ 18.030610] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 18.031157] [ 18.031700] The buggy address belongs to the physical page: [ 18.031895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 18.032131] flags: 0x200000000000000(node=0|zone=2) [ 18.032303] page_type: f5(slab) [ 18.032435] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.033202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.033637] page dumped because: kasan: bad access detected [ 18.034069] [ 18.034289] Memory state around the buggy address: [ 18.034683] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.035216] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.035516] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.036006] ^ [ 18.036211] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.036721] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.037015] ================================================================== [ 18.061652] ================================================================== [ 18.062349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 18.063027] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 18.063580] [ 18.063833] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.063943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.063976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.064028] Call Trace: [ 18.064074] <TASK> [ 18.064117] dump_stack_lvl+0x73/0xb0 [ 18.064188] print_report+0xd1/0x650 [ 18.064242] ? __virt_addr_valid+0x1db/0x2d0 [ 18.064294] ? kasan_atomics_helper+0x2006/0x5450 [ 18.064345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.064395] ? kasan_atomics_helper+0x2006/0x5450 [ 18.064443] kasan_report+0x141/0x180 [ 18.064494] ? kasan_atomics_helper+0x2006/0x5450 [ 18.064552] kasan_check_range+0x10c/0x1c0 [ 18.065336] __kasan_check_write+0x18/0x20 [ 18.066077] kasan_atomics_helper+0x2006/0x5450 [ 18.066174] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.066230] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.066283] ? ret_from_fork_asm+0x1a/0x30 [ 18.066331] ? kasan_atomics+0x152/0x310 [ 18.066385] kasan_atomics+0x1dc/0x310 [ 18.066430] ? __pfx_kasan_atomics+0x10/0x10 [ 18.066480] ? __pfx_read_tsc+0x10/0x10 [ 18.066523] ? ktime_get_ts64+0x86/0x230 [ 18.066589] kunit_try_run_case+0x1a5/0x480 [ 18.066647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.066689] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.066740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.066780] ? __kthread_parkme+0x82/0x180 [ 18.066807] ? preempt_count_sub+0x50/0x80 [ 18.066834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.066859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.066883] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.066907] kthread+0x337/0x6f0 [ 18.066925] ? trace_preempt_on+0x20/0xc0 [ 18.066950] ? __pfx_kthread+0x10/0x10 [ 18.066969] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.066991] ? calculate_sigpending+0x7b/0xa0 [ 18.067014] ? __pfx_kthread+0x10/0x10 [ 18.067034] ret_from_fork+0x41/0x80 [ 18.067056] ? __pfx_kthread+0x10/0x10 [ 18.067076] ret_from_fork_asm+0x1a/0x30 [ 18.067106] </TASK> [ 18.067121] [ 18.076550] Allocated by task 285: [ 18.076840] kasan_save_stack+0x45/0x70 [ 18.077054] kasan_save_track+0x18/0x40 [ 18.077237] kasan_save_alloc_info+0x3b/0x50 [ 18.077429] __kasan_kmalloc+0xb7/0xc0 [ 18.077704] __kmalloc_cache_noprof+0x189/0x420 [ 18.078040] kasan_atomics+0x95/0x310 [ 18.078336] kunit_try_run_case+0x1a5/0x480 [ 18.078816] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.079238] kthread+0x337/0x6f0 [ 18.079489] ret_from_fork+0x41/0x80 [ 18.079689] ret_from_fork_asm+0x1a/0x30 [ 18.079995] [ 18.080169] The buggy address belongs to the object at ffff8881033b5600 [ 18.080169] which belongs to the cache kmalloc-64 of size 64 [ 18.080897] The buggy address is located 0 bytes to the right of [ 18.080897] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 18.081446] [ 18.081605] The buggy address belongs to the physical page: [ 18.082148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 18.082436] flags: 0x200000000000000(node=0|zone=2) [ 18.082792] page_type: f5(slab) [ 18.083067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.083589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.084177] page dumped because: kasan: bad access detected [ 18.084611] [ 18.084738] Memory state around the buggy address: [ 18.084994] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.085453] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.085863] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.086199] ^ [ 18.086500] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.086975] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.087265] ================================================================== [ 16.638902] ================================================================== [ 16.639487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 16.640044] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.640362] [ 16.641764] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.642717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.642756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.642803] Call Trace: [ 16.642845] <TASK> [ 16.642881] dump_stack_lvl+0x73/0xb0 [ 16.642949] print_report+0xd1/0x650 [ 16.643000] ? __virt_addr_valid+0x1db/0x2d0 [ 16.643042] ? kasan_atomics_helper+0x697/0x5450 [ 16.643085] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.643138] ? kasan_atomics_helper+0x697/0x5450 [ 16.643188] kasan_report+0x141/0x180 [ 16.643236] ? kasan_atomics_helper+0x697/0x5450 [ 16.643288] kasan_check_range+0x10c/0x1c0 [ 16.643328] __kasan_check_write+0x18/0x20 [ 16.643370] kasan_atomics_helper+0x697/0x5450 [ 16.643417] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.643465] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.643507] ? ret_from_fork_asm+0x1a/0x30 [ 16.643552] ? kasan_atomics+0x152/0x310 [ 16.644133] kasan_atomics+0x1dc/0x310 [ 16.644226] ? __pfx_kasan_atomics+0x10/0x10 [ 16.644273] ? __pfx_read_tsc+0x10/0x10 [ 16.644308] ? ktime_get_ts64+0x86/0x230 [ 16.644349] kunit_try_run_case+0x1a5/0x480 [ 16.644392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.644431] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.644480] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.644520] ? __kthread_parkme+0x82/0x180 [ 16.644552] ? preempt_count_sub+0x50/0x80 [ 16.644607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.644652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.644692] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.644735] kthread+0x337/0x6f0 [ 16.644769] ? trace_preempt_on+0x20/0xc0 [ 16.644811] ? __pfx_kthread+0x10/0x10 [ 16.644846] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.644885] ? calculate_sigpending+0x7b/0xa0 [ 16.644927] ? __pfx_kthread+0x10/0x10 [ 16.644961] ret_from_fork+0x41/0x80 [ 16.644999] ? __pfx_kthread+0x10/0x10 [ 16.645034] ret_from_fork_asm+0x1a/0x30 [ 16.645090] </TASK> [ 16.645114] [ 16.665102] Allocated by task 285: [ 16.665499] kasan_save_stack+0x45/0x70 [ 16.665905] kasan_save_track+0x18/0x40 [ 16.666300] kasan_save_alloc_info+0x3b/0x50 [ 16.666528] __kasan_kmalloc+0xb7/0xc0 [ 16.666851] __kmalloc_cache_noprof+0x189/0x420 [ 16.667139] kasan_atomics+0x95/0x310 [ 16.667524] kunit_try_run_case+0x1a5/0x480 [ 16.667849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.668433] kthread+0x337/0x6f0 [ 16.668682] ret_from_fork+0x41/0x80 [ 16.668870] ret_from_fork_asm+0x1a/0x30 [ 16.669210] [ 16.669752] The buggy address belongs to the object at ffff8881033b5600 [ 16.669752] which belongs to the cache kmalloc-64 of size 64 [ 16.670327] The buggy address is located 0 bytes to the right of [ 16.670327] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.672023] [ 16.672172] The buggy address belongs to the physical page: [ 16.672404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.673236] flags: 0x200000000000000(node=0|zone=2) [ 16.673498] page_type: f5(slab) [ 16.673663] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.674492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.674982] page dumped because: kasan: bad access detected [ 16.675183] [ 16.675278] Memory state around the buggy address: [ 16.675450] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.676308] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.676752] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.677930] ^ [ 16.678256] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.678695] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.679385] ================================================================== [ 17.658810] ================================================================== [ 17.659172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 17.659789] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.660172] [ 17.660759] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.660846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.660875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.660918] Call Trace: [ 17.660979] <TASK> [ 17.661005] dump_stack_lvl+0x73/0xb0 [ 17.661057] print_report+0xd1/0x650 [ 17.661086] ? __virt_addr_valid+0x1db/0x2d0 [ 17.661125] ? kasan_atomics_helper+0x1818/0x5450 [ 17.661153] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.661178] ? kasan_atomics_helper+0x1818/0x5450 [ 17.661201] kasan_report+0x141/0x180 [ 17.661225] ? kasan_atomics_helper+0x1818/0x5450 [ 17.661252] kasan_check_range+0x10c/0x1c0 [ 17.661274] __kasan_check_write+0x18/0x20 [ 17.661295] kasan_atomics_helper+0x1818/0x5450 [ 17.661319] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.661343] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.661366] ? ret_from_fork_asm+0x1a/0x30 [ 17.661390] ? kasan_atomics+0x152/0x310 [ 17.661413] kasan_atomics+0x1dc/0x310 [ 17.661434] ? __pfx_kasan_atomics+0x10/0x10 [ 17.661456] ? __pfx_read_tsc+0x10/0x10 [ 17.661477] ? ktime_get_ts64+0x86/0x230 [ 17.661504] kunit_try_run_case+0x1a5/0x480 [ 17.661532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.661571] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.661615] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.661657] ? __kthread_parkme+0x82/0x180 [ 17.661700] ? preempt_count_sub+0x50/0x80 [ 17.661753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.661788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.661814] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.661840] kthread+0x337/0x6f0 [ 17.661860] ? trace_preempt_on+0x20/0xc0 [ 17.661886] ? __pfx_kthread+0x10/0x10 [ 17.661907] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.661930] ? calculate_sigpending+0x7b/0xa0 [ 17.661954] ? __pfx_kthread+0x10/0x10 [ 17.661974] ret_from_fork+0x41/0x80 [ 17.661997] ? __pfx_kthread+0x10/0x10 [ 17.662017] ret_from_fork_asm+0x1a/0x30 [ 17.662048] </TASK> [ 17.662064] [ 17.673733] Allocated by task 285: [ 17.674052] kasan_save_stack+0x45/0x70 [ 17.674289] kasan_save_track+0x18/0x40 [ 17.674434] kasan_save_alloc_info+0x3b/0x50 [ 17.674603] __kasan_kmalloc+0xb7/0xc0 [ 17.674757] __kmalloc_cache_noprof+0x189/0x420 [ 17.674953] kasan_atomics+0x95/0x310 [ 17.675142] kunit_try_run_case+0x1a5/0x480 [ 17.675501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.676017] kthread+0x337/0x6f0 [ 17.676309] ret_from_fork+0x41/0x80 [ 17.676633] ret_from_fork_asm+0x1a/0x30 [ 17.677163] [ 17.677695] The buggy address belongs to the object at ffff8881033b5600 [ 17.677695] which belongs to the cache kmalloc-64 of size 64 [ 17.679194] The buggy address is located 0 bytes to the right of [ 17.679194] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.679921] [ 17.680036] The buggy address belongs to the physical page: [ 17.680215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.680460] flags: 0x200000000000000(node=0|zone=2) [ 17.681449] page_type: f5(slab) [ 17.681687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.681923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.682633] page dumped because: kasan: bad access detected [ 17.683074] [ 17.683411] Memory state around the buggy address: [ 17.684010] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.684367] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.684605] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.685139] ^ [ 17.685331] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.685543] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.685769] ================================================================== [ 16.436875] ================================================================== [ 16.437201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 16.437370] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.437672] [ 16.437895] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.437953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.437968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.438221] Call Trace: [ 16.438250] <TASK> [ 16.438274] dump_stack_lvl+0x73/0xb0 [ 16.438310] print_report+0xd1/0x650 [ 16.438336] ? __virt_addr_valid+0x1db/0x2d0 [ 16.438361] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.438384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.438408] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.438431] kasan_report+0x141/0x180 [ 16.438455] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.438482] __asan_report_store4_noabort+0x1b/0x30 [ 16.438504] kasan_atomics_helper+0x4b6e/0x5450 [ 16.438528] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.438553] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.438596] ? ret_from_fork_asm+0x1a/0x30 [ 16.438621] ? kasan_atomics+0x152/0x310 [ 16.438646] kasan_atomics+0x1dc/0x310 [ 16.438668] ? __pfx_kasan_atomics+0x10/0x10 [ 16.438691] ? __pfx_read_tsc+0x10/0x10 [ 16.438712] ? ktime_get_ts64+0x86/0x230 [ 16.438741] kunit_try_run_case+0x1a5/0x480 [ 16.438768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.438792] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.438818] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.438843] ? __kthread_parkme+0x82/0x180 [ 16.438868] ? preempt_count_sub+0x50/0x80 [ 16.438895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.438921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.438946] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.438971] kthread+0x337/0x6f0 [ 16.438990] ? trace_preempt_on+0x20/0xc0 [ 16.439016] ? __pfx_kthread+0x10/0x10 [ 16.439036] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.439059] ? calculate_sigpending+0x7b/0xa0 [ 16.439084] ? __pfx_kthread+0x10/0x10 [ 16.439105] ret_from_fork+0x41/0x80 [ 16.439128] ? __pfx_kthread+0x10/0x10 [ 16.439159] ret_from_fork_asm+0x1a/0x30 [ 16.439194] </TASK> [ 16.439218] [ 16.447795] Allocated by task 285: [ 16.447964] kasan_save_stack+0x45/0x70 [ 16.448112] kasan_save_track+0x18/0x40 [ 16.448245] kasan_save_alloc_info+0x3b/0x50 [ 16.448377] __kasan_kmalloc+0xb7/0xc0 [ 16.448508] __kmalloc_cache_noprof+0x189/0x420 [ 16.449700] kasan_atomics+0x95/0x310 [ 16.449829] kunit_try_run_case+0x1a5/0x480 [ 16.450028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.450336] kthread+0x337/0x6f0 [ 16.450463] ret_from_fork+0x41/0x80 [ 16.450607] ret_from_fork_asm+0x1a/0x30 [ 16.451257] [ 16.451358] The buggy address belongs to the object at ffff8881033b5600 [ 16.451358] which belongs to the cache kmalloc-64 of size 64 [ 16.451757] The buggy address is located 0 bytes to the right of [ 16.451757] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.453172] [ 16.453268] The buggy address belongs to the physical page: [ 16.453423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.453660] flags: 0x200000000000000(node=0|zone=2) [ 16.453952] page_type: f5(slab) [ 16.454053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.454772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.454986] page dumped because: kasan: bad access detected [ 16.455165] [ 16.455249] Memory state around the buggy address: [ 16.455411] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.455630] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.456763] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.457190] ^ [ 16.457382] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.457632] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.457870] ================================================================== [ 16.484996] ================================================================== [ 16.485536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 16.485938] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.486580] [ 16.486800] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.486867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.486884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.486911] Call Trace: [ 16.486937] <TASK> [ 16.487107] dump_stack_lvl+0x73/0xb0 [ 16.487166] print_report+0xd1/0x650 [ 16.487198] ? __virt_addr_valid+0x1db/0x2d0 [ 16.487228] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.487255] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.487281] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.487306] kasan_report+0x141/0x180 [ 16.487333] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.487364] __asan_report_load4_noabort+0x18/0x20 [ 16.487387] kasan_atomics_helper+0x4b54/0x5450 [ 16.487412] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.487437] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.487461] ? ret_from_fork_asm+0x1a/0x30 [ 16.487484] ? kasan_atomics+0x152/0x310 [ 16.487509] kasan_atomics+0x1dc/0x310 [ 16.487530] ? __pfx_kasan_atomics+0x10/0x10 [ 16.487553] ? __pfx_read_tsc+0x10/0x10 [ 16.487590] ? ktime_get_ts64+0x86/0x230 [ 16.487620] kunit_try_run_case+0x1a5/0x480 [ 16.487649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.487673] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.487699] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.487723] ? __kthread_parkme+0x82/0x180 [ 16.487746] ? preempt_count_sub+0x50/0x80 [ 16.487773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.487798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.487822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.487847] kthread+0x337/0x6f0 [ 16.487866] ? trace_preempt_on+0x20/0xc0 [ 16.487892] ? __pfx_kthread+0x10/0x10 [ 16.487912] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.487935] ? calculate_sigpending+0x7b/0xa0 [ 16.487959] ? __pfx_kthread+0x10/0x10 [ 16.487979] ret_from_fork+0x41/0x80 [ 16.488002] ? __pfx_kthread+0x10/0x10 [ 16.488021] ret_from_fork_asm+0x1a/0x30 [ 16.488056] </TASK> [ 16.488071] [ 16.497986] Allocated by task 285: [ 16.498125] kasan_save_stack+0x45/0x70 [ 16.498611] kasan_save_track+0x18/0x40 [ 16.499045] kasan_save_alloc_info+0x3b/0x50 [ 16.499336] __kasan_kmalloc+0xb7/0xc0 [ 16.499599] __kmalloc_cache_noprof+0x189/0x420 [ 16.500541] kasan_atomics+0x95/0x310 [ 16.500957] kunit_try_run_case+0x1a5/0x480 [ 16.501260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.501389] kthread+0x337/0x6f0 [ 16.501996] ret_from_fork+0x41/0x80 [ 16.502144] ret_from_fork_asm+0x1a/0x30 [ 16.502264] [ 16.502345] The buggy address belongs to the object at ffff8881033b5600 [ 16.502345] which belongs to the cache kmalloc-64 of size 64 [ 16.504026] The buggy address is located 0 bytes to the right of [ 16.504026] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.504340] [ 16.504443] The buggy address belongs to the physical page: [ 16.504709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.505374] flags: 0x200000000000000(node=0|zone=2) [ 16.505577] page_type: f5(slab) [ 16.505860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.506397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.507038] page dumped because: kasan: bad access detected [ 16.507183] [ 16.507319] Memory state around the buggy address: [ 16.507649] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.508120] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.508874] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.509288] ^ [ 16.509701] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.509968] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.510554] ================================================================== [ 17.006616] ================================================================== [ 17.007606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 17.008179] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.008720] [ 17.008964] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.009117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.009148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.009194] Call Trace: [ 17.009238] <TASK> [ 17.009276] dump_stack_lvl+0x73/0xb0 [ 17.009346] print_report+0xd1/0x650 [ 17.009399] ? __virt_addr_valid+0x1db/0x2d0 [ 17.009447] ? kasan_atomics_helper+0xd47/0x5450 [ 17.009496] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.009546] ? kasan_atomics_helper+0xd47/0x5450 [ 17.009599] kasan_report+0x141/0x180 [ 17.009643] ? kasan_atomics_helper+0xd47/0x5450 [ 17.009687] kasan_check_range+0x10c/0x1c0 [ 17.009727] __kasan_check_write+0x18/0x20 [ 17.009766] kasan_atomics_helper+0xd47/0x5450 [ 17.009841] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.009925] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.009975] ? ret_from_fork_asm+0x1a/0x30 [ 17.010060] ? kasan_atomics+0x152/0x310 [ 17.010119] kasan_atomics+0x1dc/0x310 [ 17.010161] ? __pfx_kasan_atomics+0x10/0x10 [ 17.010209] ? __pfx_read_tsc+0x10/0x10 [ 17.010248] ? ktime_get_ts64+0x86/0x230 [ 17.010301] kunit_try_run_case+0x1a5/0x480 [ 17.010380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.010441] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.010494] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.010545] ? __kthread_parkme+0x82/0x180 [ 17.010603] ? preempt_count_sub+0x50/0x80 [ 17.010657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.010724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.010771] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.010842] kthread+0x337/0x6f0 [ 17.010892] ? trace_preempt_on+0x20/0xc0 [ 17.010943] ? __pfx_kthread+0x10/0x10 [ 17.010985] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.011032] ? calculate_sigpending+0x7b/0xa0 [ 17.011076] ? __pfx_kthread+0x10/0x10 [ 17.011118] ret_from_fork+0x41/0x80 [ 17.011171] ? __pfx_kthread+0x10/0x10 [ 17.011199] ret_from_fork_asm+0x1a/0x30 [ 17.011230] </TASK> [ 17.011247] [ 17.021801] Allocated by task 285: [ 17.022018] kasan_save_stack+0x45/0x70 [ 17.022379] kasan_save_track+0x18/0x40 [ 17.022594] kasan_save_alloc_info+0x3b/0x50 [ 17.022941] __kasan_kmalloc+0xb7/0xc0 [ 17.023247] __kmalloc_cache_noprof+0x189/0x420 [ 17.023521] kasan_atomics+0x95/0x310 [ 17.023746] kunit_try_run_case+0x1a5/0x480 [ 17.024188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.024617] kthread+0x337/0x6f0 [ 17.024851] ret_from_fork+0x41/0x80 [ 17.025034] ret_from_fork_asm+0x1a/0x30 [ 17.025219] [ 17.025330] The buggy address belongs to the object at ffff8881033b5600 [ 17.025330] which belongs to the cache kmalloc-64 of size 64 [ 17.025878] The buggy address is located 0 bytes to the right of [ 17.025878] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.026692] [ 17.026938] The buggy address belongs to the physical page: [ 17.027412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.028131] flags: 0x200000000000000(node=0|zone=2) [ 17.028422] page_type: f5(slab) [ 17.028727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.029197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.029668] page dumped because: kasan: bad access detected [ 17.029989] [ 17.030108] Memory state around the buggy address: [ 17.030468] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.030727] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.030976] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.031233] ^ [ 17.031434] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.032005] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.032547] ================================================================== [ 18.259807] ================================================================== [ 18.260505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 18.261211] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 18.261439] [ 18.261554] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.261618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.261635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.261664] Call Trace: [ 18.261878] <TASK> [ 18.261922] dump_stack_lvl+0x73/0xb0 [ 18.261987] print_report+0xd1/0x650 [ 18.262016] ? __virt_addr_valid+0x1db/0x2d0 [ 18.262041] ? kasan_atomics_helper+0x5115/0x5450 [ 18.262064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.262089] ? kasan_atomics_helper+0x5115/0x5450 [ 18.262114] kasan_report+0x141/0x180 [ 18.262138] ? kasan_atomics_helper+0x5115/0x5450 [ 18.262166] __asan_report_load8_noabort+0x18/0x20 [ 18.262189] kasan_atomics_helper+0x5115/0x5450 [ 18.262215] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.262238] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.262261] ? ret_from_fork_asm+0x1a/0x30 [ 18.262284] ? kasan_atomics+0x152/0x310 [ 18.262307] kasan_atomics+0x1dc/0x310 [ 18.262328] ? __pfx_kasan_atomics+0x10/0x10 [ 18.262350] ? __pfx_read_tsc+0x10/0x10 [ 18.262373] ? ktime_get_ts64+0x86/0x230 [ 18.262401] kunit_try_run_case+0x1a5/0x480 [ 18.262428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.262453] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.262478] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.262503] ? __kthread_parkme+0x82/0x180 [ 18.262527] ? preempt_count_sub+0x50/0x80 [ 18.262554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.262613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.262660] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.262701] kthread+0x337/0x6f0 [ 18.262738] ? trace_preempt_on+0x20/0xc0 [ 18.262786] ? __pfx_kthread+0x10/0x10 [ 18.262862] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.262900] ? calculate_sigpending+0x7b/0xa0 [ 18.262944] ? __pfx_kthread+0x10/0x10 [ 18.262985] ret_from_fork+0x41/0x80 [ 18.263033] ? __pfx_kthread+0x10/0x10 [ 18.263077] ret_from_fork_asm+0x1a/0x30 [ 18.263143] </TASK> [ 18.263174] [ 18.275082] Allocated by task 285: [ 18.275285] kasan_save_stack+0x45/0x70 [ 18.275441] kasan_save_track+0x18/0x40 [ 18.275589] kasan_save_alloc_info+0x3b/0x50 [ 18.275751] __kasan_kmalloc+0xb7/0xc0 [ 18.275925] __kmalloc_cache_noprof+0x189/0x420 [ 18.276286] kasan_atomics+0x95/0x310 [ 18.276590] kunit_try_run_case+0x1a5/0x480 [ 18.276993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.277217] kthread+0x337/0x6f0 [ 18.277390] ret_from_fork+0x41/0x80 [ 18.277575] ret_from_fork_asm+0x1a/0x30 [ 18.277878] [ 18.278060] The buggy address belongs to the object at ffff8881033b5600 [ 18.278060] which belongs to the cache kmalloc-64 of size 64 [ 18.279779] The buggy address is located 0 bytes to the right of [ 18.279779] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 18.280230] [ 18.280498] The buggy address belongs to the physical page: [ 18.280690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 18.281492] flags: 0x200000000000000(node=0|zone=2) [ 18.281922] page_type: f5(slab) [ 18.282308] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.282648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.283226] page dumped because: kasan: bad access detected [ 18.283748] [ 18.283911] Memory state around the buggy address: [ 18.284316] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.284743] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.285327] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.285769] ^ [ 18.286213] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.286534] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.287239] ================================================================== [ 16.715929] ================================================================== [ 16.717206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 16.717724] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.718639] [ 16.719178] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.719270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.719296] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.719339] Call Trace: [ 16.719601] <TASK> [ 16.719647] dump_stack_lvl+0x73/0xb0 [ 16.719706] print_report+0xd1/0x650 [ 16.719736] ? __virt_addr_valid+0x1db/0x2d0 [ 16.719760] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.719784] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.719808] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.719831] kasan_report+0x141/0x180 [ 16.719855] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.719883] kasan_check_range+0x10c/0x1c0 [ 16.719903] __kasan_check_write+0x18/0x20 [ 16.719925] kasan_atomics_helper+0x7c7/0x5450 [ 16.719950] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.719973] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.719996] ? ret_from_fork_asm+0x1a/0x30 [ 16.720019] ? kasan_atomics+0x152/0x310 [ 16.720043] kasan_atomics+0x1dc/0x310 [ 16.720063] ? __pfx_kasan_atomics+0x10/0x10 [ 16.720085] ? __pfx_read_tsc+0x10/0x10 [ 16.720107] ? ktime_get_ts64+0x86/0x230 [ 16.720133] kunit_try_run_case+0x1a5/0x480 [ 16.720160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.720183] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.720208] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.720232] ? __kthread_parkme+0x82/0x180 [ 16.720256] ? preempt_count_sub+0x50/0x80 [ 16.720282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.720307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.720331] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.720355] kthread+0x337/0x6f0 [ 16.720373] ? trace_preempt_on+0x20/0xc0 [ 16.720399] ? __pfx_kthread+0x10/0x10 [ 16.720418] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.720440] ? calculate_sigpending+0x7b/0xa0 [ 16.720463] ? __pfx_kthread+0x10/0x10 [ 16.720483] ret_from_fork+0x41/0x80 [ 16.720506] ? __pfx_kthread+0x10/0x10 [ 16.720525] ret_from_fork_asm+0x1a/0x30 [ 16.720556] </TASK> [ 16.720588] [ 16.732006] Allocated by task 285: [ 16.732191] kasan_save_stack+0x45/0x70 [ 16.732368] kasan_save_track+0x18/0x40 [ 16.732518] kasan_save_alloc_info+0x3b/0x50 [ 16.734062] __kasan_kmalloc+0xb7/0xc0 [ 16.734266] __kmalloc_cache_noprof+0x189/0x420 [ 16.734434] kasan_atomics+0x95/0x310 [ 16.734586] kunit_try_run_case+0x1a5/0x480 [ 16.735392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.735635] kthread+0x337/0x6f0 [ 16.735999] ret_from_fork+0x41/0x80 [ 16.736733] ret_from_fork_asm+0x1a/0x30 [ 16.737234] [ 16.737339] The buggy address belongs to the object at ffff8881033b5600 [ 16.737339] which belongs to the cache kmalloc-64 of size 64 [ 16.738980] The buggy address is located 0 bytes to the right of [ 16.738980] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.739536] [ 16.739870] The buggy address belongs to the physical page: [ 16.740143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.740641] flags: 0x200000000000000(node=0|zone=2) [ 16.741416] page_type: f5(slab) [ 16.741725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.742345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.743255] page dumped because: kasan: bad access detected [ 16.743491] [ 16.743607] Memory state around the buggy address: [ 16.744105] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.744354] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.744603] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.745150] ^ [ 16.745346] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.745587] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.747496] ================================================================== [ 16.611402] ================================================================== [ 16.611811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 16.612259] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.612848] [ 16.613097] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.613228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.613258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.613302] Call Trace: [ 16.613344] <TASK> [ 16.613386] dump_stack_lvl+0x73/0xb0 [ 16.613447] print_report+0xd1/0x650 [ 16.613499] ? __virt_addr_valid+0x1db/0x2d0 [ 16.613543] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.613644] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.613697] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.613734] kasan_report+0x141/0x180 [ 16.613779] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.613837] kasan_check_range+0x10c/0x1c0 [ 16.613883] __kasan_check_write+0x18/0x20 [ 16.613921] kasan_atomics_helper+0x5fe/0x5450 [ 16.613962] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.613993] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.614017] ? ret_from_fork_asm+0x1a/0x30 [ 16.614040] ? kasan_atomics+0x152/0x310 [ 16.614064] kasan_atomics+0x1dc/0x310 [ 16.614084] ? __pfx_kasan_atomics+0x10/0x10 [ 16.614106] ? __pfx_read_tsc+0x10/0x10 [ 16.614127] ? ktime_get_ts64+0x86/0x230 [ 16.614156] kunit_try_run_case+0x1a5/0x480 [ 16.614183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.614206] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.614232] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.614257] ? __kthread_parkme+0x82/0x180 [ 16.614282] ? preempt_count_sub+0x50/0x80 [ 16.614308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.614333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.614356] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.614380] kthread+0x337/0x6f0 [ 16.614399] ? trace_preempt_on+0x20/0xc0 [ 16.614424] ? __pfx_kthread+0x10/0x10 [ 16.614443] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.614465] ? calculate_sigpending+0x7b/0xa0 [ 16.614488] ? __pfx_kthread+0x10/0x10 [ 16.614508] ret_from_fork+0x41/0x80 [ 16.614530] ? __pfx_kthread+0x10/0x10 [ 16.614548] ret_from_fork_asm+0x1a/0x30 [ 16.614604] </TASK> [ 16.614630] [ 16.626170] Allocated by task 285: [ 16.626369] kasan_save_stack+0x45/0x70 [ 16.626773] kasan_save_track+0x18/0x40 [ 16.627093] kasan_save_alloc_info+0x3b/0x50 [ 16.627463] __kasan_kmalloc+0xb7/0xc0 [ 16.627859] __kmalloc_cache_noprof+0x189/0x420 [ 16.628266] kasan_atomics+0x95/0x310 [ 16.628552] kunit_try_run_case+0x1a5/0x480 [ 16.628967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.629378] kthread+0x337/0x6f0 [ 16.629702] ret_from_fork+0x41/0x80 [ 16.629951] ret_from_fork_asm+0x1a/0x30 [ 16.630115] [ 16.630323] The buggy address belongs to the object at ffff8881033b5600 [ 16.630323] which belongs to the cache kmalloc-64 of size 64 [ 16.631236] The buggy address is located 0 bytes to the right of [ 16.631236] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.632315] [ 16.632476] The buggy address belongs to the physical page: [ 16.632944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.633254] flags: 0x200000000000000(node=0|zone=2) [ 16.633547] page_type: f5(slab) [ 16.633738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.634167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.634499] page dumped because: kasan: bad access detected [ 16.634859] [ 16.634960] Memory state around the buggy address: [ 16.635216] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.635727] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.636158] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.636518] ^ [ 16.636781] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.637391] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.638199] ================================================================== [ 16.877521] ================================================================== [ 16.878299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 16.879242] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.880014] [ 16.880623] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.880855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.880898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.880942] Call Trace: [ 16.880987] <TASK> [ 16.881183] dump_stack_lvl+0x73/0xb0 [ 16.881235] print_report+0xd1/0x650 [ 16.881264] ? __virt_addr_valid+0x1db/0x2d0 [ 16.881296] ? kasan_atomics_helper+0xac7/0x5450 [ 16.881331] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.881367] ? kasan_atomics_helper+0xac7/0x5450 [ 16.881390] kasan_report+0x141/0x180 [ 16.881415] ? kasan_atomics_helper+0xac7/0x5450 [ 16.881441] kasan_check_range+0x10c/0x1c0 [ 16.881463] __kasan_check_write+0x18/0x20 [ 16.881484] kasan_atomics_helper+0xac7/0x5450 [ 16.881508] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.881532] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.881555] ? ret_from_fork_asm+0x1a/0x30 [ 16.881605] ? kasan_atomics+0x152/0x310 [ 16.881648] kasan_atomics+0x1dc/0x310 [ 16.881682] ? __pfx_kasan_atomics+0x10/0x10 [ 16.881707] ? __pfx_read_tsc+0x10/0x10 [ 16.881729] ? ktime_get_ts64+0x86/0x230 [ 16.881757] kunit_try_run_case+0x1a5/0x480 [ 16.881786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.881809] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.881835] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.881860] ? __kthread_parkme+0x82/0x180 [ 16.881884] ? preempt_count_sub+0x50/0x80 [ 16.881911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.881937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.881962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.881986] kthread+0x337/0x6f0 [ 16.882005] ? trace_preempt_on+0x20/0xc0 [ 16.882031] ? __pfx_kthread+0x10/0x10 [ 16.882051] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.882075] ? calculate_sigpending+0x7b/0xa0 [ 16.882098] ? __pfx_kthread+0x10/0x10 [ 16.882117] ret_from_fork+0x41/0x80 [ 16.882140] ? __pfx_kthread+0x10/0x10 [ 16.882159] ret_from_fork_asm+0x1a/0x30 [ 16.882189] </TASK> [ 16.882205] [ 16.897283] Allocated by task 285: [ 16.897522] kasan_save_stack+0x45/0x70 [ 16.898210] kasan_save_track+0x18/0x40 [ 16.898605] kasan_save_alloc_info+0x3b/0x50 [ 16.899554] __kasan_kmalloc+0xb7/0xc0 [ 16.900002] __kmalloc_cache_noprof+0x189/0x420 [ 16.900370] kasan_atomics+0x95/0x310 [ 16.900554] kunit_try_run_case+0x1a5/0x480 [ 16.901207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.901668] kthread+0x337/0x6f0 [ 16.901997] ret_from_fork+0x41/0x80 [ 16.902419] ret_from_fork_asm+0x1a/0x30 [ 16.903772] [ 16.904029] The buggy address belongs to the object at ffff8881033b5600 [ 16.904029] which belongs to the cache kmalloc-64 of size 64 [ 16.904984] The buggy address is located 0 bytes to the right of [ 16.904984] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.905804] [ 16.906861] The buggy address belongs to the physical page: [ 16.907193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.907652] flags: 0x200000000000000(node=0|zone=2) [ 16.907835] page_type: f5(slab) [ 16.907978] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.908216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.908442] page dumped because: kasan: bad access detected [ 16.909148] [ 16.909833] Memory state around the buggy address: [ 16.910197] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.913534] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.914518] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.915608] ^ [ 16.916246] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.916481] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.916753] ================================================================== [ 17.758440] ================================================================== [ 17.759248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 17.759764] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.760657] [ 17.761107] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.761197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.761219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.761245] Call Trace: [ 17.761270] <TASK> [ 17.761296] dump_stack_lvl+0x73/0xb0 [ 17.761346] print_report+0xd1/0x650 [ 17.761373] ? __virt_addr_valid+0x1db/0x2d0 [ 17.761399] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.761422] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.761446] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.761468] kasan_report+0x141/0x180 [ 17.761492] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.761518] kasan_check_range+0x10c/0x1c0 [ 17.761539] __kasan_check_write+0x18/0x20 [ 17.761578] kasan_atomics_helper+0x19e3/0x5450 [ 17.761619] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.761660] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.761700] ? ret_from_fork_asm+0x1a/0x30 [ 17.761741] ? kasan_atomics+0x152/0x310 [ 17.761781] kasan_atomics+0x1dc/0x310 [ 17.761803] ? __pfx_kasan_atomics+0x10/0x10 [ 17.761824] ? __pfx_read_tsc+0x10/0x10 [ 17.761846] ? ktime_get_ts64+0x86/0x230 [ 17.761874] kunit_try_run_case+0x1a5/0x480 [ 17.761901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.761924] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.761951] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.761974] ? __kthread_parkme+0x82/0x180 [ 17.761997] ? preempt_count_sub+0x50/0x80 [ 17.762023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.762048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.762071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.762095] kthread+0x337/0x6f0 [ 17.762112] ? trace_preempt_on+0x20/0xc0 [ 17.762138] ? __pfx_kthread+0x10/0x10 [ 17.762157] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.762179] ? calculate_sigpending+0x7b/0xa0 [ 17.762201] ? __pfx_kthread+0x10/0x10 [ 17.762221] ret_from_fork+0x41/0x80 [ 17.762242] ? __pfx_kthread+0x10/0x10 [ 17.762261] ret_from_fork_asm+0x1a/0x30 [ 17.762290] </TASK> [ 17.762303] [ 17.771648] Allocated by task 285: [ 17.771857] kasan_save_stack+0x45/0x70 [ 17.772186] kasan_save_track+0x18/0x40 [ 17.772374] kasan_save_alloc_info+0x3b/0x50 [ 17.772577] __kasan_kmalloc+0xb7/0xc0 [ 17.772855] __kmalloc_cache_noprof+0x189/0x420 [ 17.773258] kasan_atomics+0x95/0x310 [ 17.773578] kunit_try_run_case+0x1a5/0x480 [ 17.773929] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.774241] kthread+0x337/0x6f0 [ 17.774397] ret_from_fork+0x41/0x80 [ 17.774694] ret_from_fork_asm+0x1a/0x30 [ 17.775030] [ 17.775211] The buggy address belongs to the object at ffff8881033b5600 [ 17.775211] which belongs to the cache kmalloc-64 of size 64 [ 17.775987] The buggy address is located 0 bytes to the right of [ 17.775987] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.776600] [ 17.776803] The buggy address belongs to the physical page: [ 17.777169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.777616] flags: 0x200000000000000(node=0|zone=2) [ 17.777909] page_type: f5(slab) [ 17.778128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.778576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.778927] page dumped because: kasan: bad access detected [ 17.779323] [ 17.779493] Memory state around the buggy address: [ 17.779708] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.780213] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.780627] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.781117] ^ [ 17.781415] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.781908] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.782272] ================================================================== [ 18.170980] ================================================================== [ 18.171324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 18.171948] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 18.172355] [ 18.172576] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.172701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.172732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.172779] Call Trace: [ 18.172822] <TASK> [ 18.172864] dump_stack_lvl+0x73/0xb0 [ 18.172954] print_report+0xd1/0x650 [ 18.172999] ? __virt_addr_valid+0x1db/0x2d0 [ 18.173048] ? kasan_atomics_helper+0x218a/0x5450 [ 18.173097] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.173147] ? kasan_atomics_helper+0x218a/0x5450 [ 18.173195] kasan_report+0x141/0x180 [ 18.173245] ? kasan_atomics_helper+0x218a/0x5450 [ 18.173305] kasan_check_range+0x10c/0x1c0 [ 18.173351] __kasan_check_write+0x18/0x20 [ 18.173395] kasan_atomics_helper+0x218a/0x5450 [ 18.173450] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.173492] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.173529] ? ret_from_fork_asm+0x1a/0x30 [ 18.173582] ? kasan_atomics+0x152/0x310 [ 18.173629] kasan_atomics+0x1dc/0x310 [ 18.173703] ? __pfx_kasan_atomics+0x10/0x10 [ 18.173743] ? __pfx_read_tsc+0x10/0x10 [ 18.173798] ? ktime_get_ts64+0x86/0x230 [ 18.173849] kunit_try_run_case+0x1a5/0x480 [ 18.173898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.173942] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.173993] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.174025] ? __kthread_parkme+0x82/0x180 [ 18.174049] ? preempt_count_sub+0x50/0x80 [ 18.174075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.174099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.174122] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.174146] kthread+0x337/0x6f0 [ 18.174164] ? trace_preempt_on+0x20/0xc0 [ 18.174188] ? __pfx_kthread+0x10/0x10 [ 18.174207] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.174228] ? calculate_sigpending+0x7b/0xa0 [ 18.174251] ? __pfx_kthread+0x10/0x10 [ 18.174270] ret_from_fork+0x41/0x80 [ 18.174291] ? __pfx_kthread+0x10/0x10 [ 18.174309] ret_from_fork_asm+0x1a/0x30 [ 18.174337] </TASK> [ 18.174351] [ 18.185017] Allocated by task 285: [ 18.185161] kasan_save_stack+0x45/0x70 [ 18.185339] kasan_save_track+0x18/0x40 [ 18.185722] kasan_save_alloc_info+0x3b/0x50 [ 18.186090] __kasan_kmalloc+0xb7/0xc0 [ 18.186454] __kmalloc_cache_noprof+0x189/0x420 [ 18.186920] kasan_atomics+0x95/0x310 [ 18.187275] kunit_try_run_case+0x1a5/0x480 [ 18.187713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.188191] kthread+0x337/0x6f0 [ 18.188502] ret_from_fork+0x41/0x80 [ 18.188865] ret_from_fork_asm+0x1a/0x30 [ 18.189225] [ 18.189428] The buggy address belongs to the object at ffff8881033b5600 [ 18.189428] which belongs to the cache kmalloc-64 of size 64 [ 18.190168] The buggy address is located 0 bytes to the right of [ 18.190168] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 18.190849] [ 18.191061] The buggy address belongs to the physical page: [ 18.191324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 18.191834] flags: 0x200000000000000(node=0|zone=2) [ 18.192217] page_type: f5(slab) [ 18.192513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.192978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.193380] page dumped because: kasan: bad access detected [ 18.193628] [ 18.193769] Memory state around the buggy address: [ 18.194133] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.194626] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.195037] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.195507] ^ [ 18.195806] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.196252] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.196754] ================================================================== [ 17.600392] ================================================================== [ 17.600923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 17.601967] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.602217] [ 17.602327] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.602384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.602399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.602423] Call Trace: [ 17.602450] <TASK> [ 17.602473] dump_stack_lvl+0x73/0xb0 [ 17.602510] print_report+0xd1/0x650 [ 17.602536] ? __virt_addr_valid+0x1db/0x2d0 [ 17.602575] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.602602] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.602626] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.602653] kasan_report+0x141/0x180 [ 17.602690] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.602717] kasan_check_range+0x10c/0x1c0 [ 17.602739] __kasan_check_write+0x18/0x20 [ 17.602760] kasan_atomics_helper+0x16e7/0x5450 [ 17.602783] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.602807] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.602830] ? ret_from_fork_asm+0x1a/0x30 [ 17.602853] ? kasan_atomics+0x152/0x310 [ 17.602877] kasan_atomics+0x1dc/0x310 [ 17.602897] ? __pfx_kasan_atomics+0x10/0x10 [ 17.602919] ? __pfx_read_tsc+0x10/0x10 [ 17.602941] ? ktime_get_ts64+0x86/0x230 [ 17.602969] kunit_try_run_case+0x1a5/0x480 [ 17.602997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.603021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.603048] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.603072] ? __kthread_parkme+0x82/0x180 [ 17.603096] ? preempt_count_sub+0x50/0x80 [ 17.603124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.603175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.603211] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.603236] kthread+0x337/0x6f0 [ 17.603256] ? trace_preempt_on+0x20/0xc0 [ 17.603282] ? __pfx_kthread+0x10/0x10 [ 17.603301] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.603324] ? calculate_sigpending+0x7b/0xa0 [ 17.603347] ? __pfx_kthread+0x10/0x10 [ 17.603367] ret_from_fork+0x41/0x80 [ 17.603389] ? __pfx_kthread+0x10/0x10 [ 17.603409] ret_from_fork_asm+0x1a/0x30 [ 17.603439] </TASK> [ 17.603453] [ 17.615305] Allocated by task 285: [ 17.615471] kasan_save_stack+0x45/0x70 [ 17.615680] kasan_save_track+0x18/0x40 [ 17.615824] kasan_save_alloc_info+0x3b/0x50 [ 17.615981] __kasan_kmalloc+0xb7/0xc0 [ 17.616123] __kmalloc_cache_noprof+0x189/0x420 [ 17.616282] kasan_atomics+0x95/0x310 [ 17.616424] kunit_try_run_case+0x1a5/0x480 [ 17.617220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.617742] kthread+0x337/0x6f0 [ 17.617925] ret_from_fork+0x41/0x80 [ 17.618592] ret_from_fork_asm+0x1a/0x30 [ 17.619111] [ 17.619251] The buggy address belongs to the object at ffff8881033b5600 [ 17.619251] which belongs to the cache kmalloc-64 of size 64 [ 17.619618] The buggy address is located 0 bytes to the right of [ 17.619618] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.620338] [ 17.620472] The buggy address belongs to the physical page: [ 17.621115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.621596] flags: 0x200000000000000(node=0|zone=2) [ 17.622000] page_type: f5(slab) [ 17.622269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.622664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.623169] page dumped because: kasan: bad access detected [ 17.623839] [ 17.624083] Memory state around the buggy address: [ 17.624435] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.625181] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.625643] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.626130] ^ [ 17.626490] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.627178] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.627467] ================================================================== [ 17.119936] ================================================================== [ 17.120529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 17.121174] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.121663] [ 17.121815] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.121911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.121950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.122006] Call Trace: [ 17.122049] <TASK> [ 17.122088] dump_stack_lvl+0x73/0xb0 [ 17.122154] print_report+0xd1/0x650 [ 17.122210] ? __virt_addr_valid+0x1db/0x2d0 [ 17.122272] ? kasan_atomics_helper+0xfa9/0x5450 [ 17.122319] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.122366] ? kasan_atomics_helper+0xfa9/0x5450 [ 17.122419] kasan_report+0x141/0x180 [ 17.122470] ? kasan_atomics_helper+0xfa9/0x5450 [ 17.122542] kasan_check_range+0x10c/0x1c0 [ 17.122599] __kasan_check_write+0x18/0x20 [ 17.122652] kasan_atomics_helper+0xfa9/0x5450 [ 17.122717] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.122769] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.122812] ? ret_from_fork_asm+0x1a/0x30 [ 17.122858] ? kasan_atomics+0x152/0x310 [ 17.122915] kasan_atomics+0x1dc/0x310 [ 17.122976] ? __pfx_kasan_atomics+0x10/0x10 [ 17.123024] ? __pfx_read_tsc+0x10/0x10 [ 17.123083] ? ktime_get_ts64+0x86/0x230 [ 17.123159] kunit_try_run_case+0x1a5/0x480 [ 17.123235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.123285] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.123338] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.123400] ? __kthread_parkme+0x82/0x180 [ 17.123461] ? preempt_count_sub+0x50/0x80 [ 17.123518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.123589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.123655] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.123709] kthread+0x337/0x6f0 [ 17.123751] ? trace_preempt_on+0x20/0xc0 [ 17.123806] ? __pfx_kthread+0x10/0x10 [ 17.123849] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.123913] ? calculate_sigpending+0x7b/0xa0 [ 17.123956] ? __pfx_kthread+0x10/0x10 [ 17.123990] ret_from_fork+0x41/0x80 [ 17.124029] ? __pfx_kthread+0x10/0x10 [ 17.124069] ret_from_fork_asm+0x1a/0x30 [ 17.124131] </TASK> [ 17.124159] [ 17.133808] Allocated by task 285: [ 17.133995] kasan_save_stack+0x45/0x70 [ 17.134345] kasan_save_track+0x18/0x40 [ 17.134675] kasan_save_alloc_info+0x3b/0x50 [ 17.135024] __kasan_kmalloc+0xb7/0xc0 [ 17.135351] __kmalloc_cache_noprof+0x189/0x420 [ 17.135720] kasan_atomics+0x95/0x310 [ 17.136032] kunit_try_run_case+0x1a5/0x480 [ 17.136373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.136791] kthread+0x337/0x6f0 [ 17.137071] ret_from_fork+0x41/0x80 [ 17.137358] ret_from_fork_asm+0x1a/0x30 [ 17.137592] [ 17.137780] The buggy address belongs to the object at ffff8881033b5600 [ 17.137780] which belongs to the cache kmalloc-64 of size 64 [ 17.138360] The buggy address is located 0 bytes to the right of [ 17.138360] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.139055] [ 17.139234] The buggy address belongs to the physical page: [ 17.139569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.140326] flags: 0x200000000000000(node=0|zone=2) [ 17.140643] page_type: f5(slab) [ 17.140857] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.141128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.141382] page dumped because: kasan: bad access detected [ 17.141593] [ 17.141746] Memory state around the buggy address: [ 17.142150] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.142661] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.143164] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.143464] ^ [ 17.144001] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.144268] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.144508] ================================================================== [ 16.781527] ================================================================== [ 16.782193] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 16.782504] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.783166] [ 16.783376] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.783485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.783512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.783551] Call Trace: [ 16.783640] <TASK> [ 16.783702] dump_stack_lvl+0x73/0xb0 [ 16.783776] print_report+0xd1/0x650 [ 16.783832] ? __virt_addr_valid+0x1db/0x2d0 [ 16.783882] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.783923] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.783968] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.784045] kasan_report+0x141/0x180 [ 16.784107] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.784188] kasan_check_range+0x10c/0x1c0 [ 16.784254] __kasan_check_write+0x18/0x20 [ 16.784293] kasan_atomics_helper+0x8f9/0x5450 [ 16.784340] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.784388] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.784436] ? ret_from_fork_asm+0x1a/0x30 [ 16.784485] ? kasan_atomics+0x152/0x310 [ 16.784532] kasan_atomics+0x1dc/0x310 [ 16.784584] ? __pfx_kasan_atomics+0x10/0x10 [ 16.784675] ? __pfx_read_tsc+0x10/0x10 [ 16.784717] ? ktime_get_ts64+0x86/0x230 [ 16.784781] kunit_try_run_case+0x1a5/0x480 [ 16.784831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.784874] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.784914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.784953] ? __kthread_parkme+0x82/0x180 [ 16.785000] ? preempt_count_sub+0x50/0x80 [ 16.785049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.785101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.785149] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.785197] kthread+0x337/0x6f0 [ 16.785237] ? trace_preempt_on+0x20/0xc0 [ 16.785286] ? __pfx_kthread+0x10/0x10 [ 16.785324] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.785368] ? calculate_sigpending+0x7b/0xa0 [ 16.785418] ? __pfx_kthread+0x10/0x10 [ 16.785459] ret_from_fork+0x41/0x80 [ 16.785500] ? __pfx_kthread+0x10/0x10 [ 16.785527] ret_from_fork_asm+0x1a/0x30 [ 16.785577] </TASK> [ 16.785597] [ 16.796044] Allocated by task 285: [ 16.796256] kasan_save_stack+0x45/0x70 [ 16.796486] kasan_save_track+0x18/0x40 [ 16.797436] kasan_save_alloc_info+0x3b/0x50 [ 16.798032] __kasan_kmalloc+0xb7/0xc0 [ 16.798386] __kmalloc_cache_noprof+0x189/0x420 [ 16.798801] kasan_atomics+0x95/0x310 [ 16.799148] kunit_try_run_case+0x1a5/0x480 [ 16.799525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.800260] kthread+0x337/0x6f0 [ 16.801109] ret_from_fork+0x41/0x80 [ 16.801410] ret_from_fork_asm+0x1a/0x30 [ 16.801811] [ 16.801943] The buggy address belongs to the object at ffff8881033b5600 [ 16.801943] which belongs to the cache kmalloc-64 of size 64 [ 16.802366] The buggy address is located 0 bytes to the right of [ 16.802366] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.803366] [ 16.803865] The buggy address belongs to the physical page: [ 16.804304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.805330] flags: 0x200000000000000(node=0|zone=2) [ 16.806000] page_type: f5(slab) [ 16.806321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.807166] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.807936] page dumped because: kasan: bad access detected [ 16.808395] [ 16.808578] Memory state around the buggy address: [ 16.809384] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.810020] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.810287] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.811254] ^ [ 16.811521] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.811966] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.812430] ================================================================== [ 17.207507] ================================================================== [ 17.208152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 17.208596] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.209052] [ 17.209269] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.209369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.209398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.209443] Call Trace: [ 17.209486] <TASK> [ 17.209527] dump_stack_lvl+0x73/0xb0 [ 17.209624] print_report+0xd1/0x650 [ 17.209695] ? __virt_addr_valid+0x1db/0x2d0 [ 17.209742] ? kasan_atomics_helper+0x4a1c/0x5450 [ 17.209788] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.209836] ? kasan_atomics_helper+0x4a1c/0x5450 [ 17.209873] kasan_report+0x141/0x180 [ 17.209915] ? kasan_atomics_helper+0x4a1c/0x5450 [ 17.209983] __asan_report_load4_noabort+0x18/0x20 [ 17.210027] kasan_atomics_helper+0x4a1c/0x5450 [ 17.210071] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.210113] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.210167] ? ret_from_fork_asm+0x1a/0x30 [ 17.210204] ? kasan_atomics+0x152/0x310 [ 17.210247] kasan_atomics+0x1dc/0x310 [ 17.210285] ? __pfx_kasan_atomics+0x10/0x10 [ 17.210326] ? __pfx_read_tsc+0x10/0x10 [ 17.210367] ? ktime_get_ts64+0x86/0x230 [ 17.210410] kunit_try_run_case+0x1a5/0x480 [ 17.210440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.210463] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.210489] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.210512] ? __kthread_parkme+0x82/0x180 [ 17.210535] ? preempt_count_sub+0x50/0x80 [ 17.210571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.210599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.210623] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.210646] kthread+0x337/0x6f0 [ 17.210688] ? trace_preempt_on+0x20/0xc0 [ 17.210716] ? __pfx_kthread+0x10/0x10 [ 17.210734] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.210756] ? calculate_sigpending+0x7b/0xa0 [ 17.210780] ? __pfx_kthread+0x10/0x10 [ 17.210799] ret_from_fork+0x41/0x80 [ 17.210820] ? __pfx_kthread+0x10/0x10 [ 17.210840] ret_from_fork_asm+0x1a/0x30 [ 17.210869] </TASK> [ 17.210884] [ 17.222342] Allocated by task 285: [ 17.222672] kasan_save_stack+0x45/0x70 [ 17.223444] kasan_save_track+0x18/0x40 [ 17.223964] kasan_save_alloc_info+0x3b/0x50 [ 17.224190] __kasan_kmalloc+0xb7/0xc0 [ 17.224343] __kmalloc_cache_noprof+0x189/0x420 [ 17.224501] kasan_atomics+0x95/0x310 [ 17.224686] kunit_try_run_case+0x1a5/0x480 [ 17.224850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.225023] kthread+0x337/0x6f0 [ 17.225157] ret_from_fork+0x41/0x80 [ 17.225292] ret_from_fork_asm+0x1a/0x30 [ 17.225432] [ 17.225514] The buggy address belongs to the object at ffff8881033b5600 [ 17.225514] which belongs to the cache kmalloc-64 of size 64 [ 17.227028] The buggy address is located 0 bytes to the right of [ 17.227028] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.228387] [ 17.228573] The buggy address belongs to the physical page: [ 17.228770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.229337] flags: 0x200000000000000(node=0|zone=2) [ 17.229687] page_type: f5(slab) [ 17.229905] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.230201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.230501] page dumped because: kasan: bad access detected [ 17.230765] [ 17.230905] Memory state around the buggy address: [ 17.231143] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.231648] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.231939] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.232404] ^ [ 17.232740] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.233185] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.233444] ================================================================== [ 17.344765] ================================================================== [ 17.345837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 17.346101] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.346316] [ 17.346423] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.346482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.346498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.346522] Call Trace: [ 17.346549] <TASK> [ 17.346592] dump_stack_lvl+0x73/0xb0 [ 17.346644] print_report+0xd1/0x650 [ 17.346721] ? __virt_addr_valid+0x1db/0x2d0 [ 17.346767] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.346810] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.346858] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.346907] kasan_report+0x141/0x180 [ 17.346957] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.347016] kasan_check_range+0x10c/0x1c0 [ 17.347065] __kasan_check_write+0x18/0x20 [ 17.347107] kasan_atomics_helper+0x12e6/0x5450 [ 17.347185] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.347232] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.347280] ? ret_from_fork_asm+0x1a/0x30 [ 17.347331] ? kasan_atomics+0x152/0x310 [ 17.347385] kasan_atomics+0x1dc/0x310 [ 17.347432] ? __pfx_kasan_atomics+0x10/0x10 [ 17.347479] ? __pfx_read_tsc+0x10/0x10 [ 17.347526] ? ktime_get_ts64+0x86/0x230 [ 17.347595] kunit_try_run_case+0x1a5/0x480 [ 17.347684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.347739] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.347784] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.347829] ? __kthread_parkme+0x82/0x180 [ 17.347877] ? preempt_count_sub+0x50/0x80 [ 17.347930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.347981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.348026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.348089] kthread+0x337/0x6f0 [ 17.348128] ? trace_preempt_on+0x20/0xc0 [ 17.348176] ? __pfx_kthread+0x10/0x10 [ 17.348217] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.348263] ? calculate_sigpending+0x7b/0xa0 [ 17.348297] ? __pfx_kthread+0x10/0x10 [ 17.348317] ret_from_fork+0x41/0x80 [ 17.348340] ? __pfx_kthread+0x10/0x10 [ 17.348359] ret_from_fork_asm+0x1a/0x30 [ 17.348390] </TASK> [ 17.348405] [ 17.358007] Allocated by task 285: [ 17.358225] kasan_save_stack+0x45/0x70 [ 17.358450] kasan_save_track+0x18/0x40 [ 17.358803] kasan_save_alloc_info+0x3b/0x50 [ 17.359169] __kasan_kmalloc+0xb7/0xc0 [ 17.359478] __kmalloc_cache_noprof+0x189/0x420 [ 17.359809] kasan_atomics+0x95/0x310 [ 17.359993] kunit_try_run_case+0x1a5/0x480 [ 17.360193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.360412] kthread+0x337/0x6f0 [ 17.360676] ret_from_fork+0x41/0x80 [ 17.360991] ret_from_fork_asm+0x1a/0x30 [ 17.361327] [ 17.361502] The buggy address belongs to the object at ffff8881033b5600 [ 17.361502] which belongs to the cache kmalloc-64 of size 64 [ 17.362286] The buggy address is located 0 bytes to the right of [ 17.362286] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.362788] [ 17.362919] The buggy address belongs to the physical page: [ 17.363139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.363761] flags: 0x200000000000000(node=0|zone=2) [ 17.364156] page_type: f5(slab) [ 17.364440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.364992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.365452] page dumped because: kasan: bad access detected [ 17.365864] [ 17.366052] Memory state around the buggy address: [ 17.366370] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.366950] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.367249] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.367698] ^ [ 17.368021] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.368300] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.369477] ================================================================== [ 17.370567] ================================================================== [ 17.371180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 17.371459] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.372625] [ 17.373069] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.373171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.373199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.373226] Call Trace: [ 17.373253] <TASK> [ 17.373277] dump_stack_lvl+0x73/0xb0 [ 17.373317] print_report+0xd1/0x650 [ 17.373344] ? __virt_addr_valid+0x1db/0x2d0 [ 17.373369] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.373394] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.373418] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.373443] kasan_report+0x141/0x180 [ 17.373467] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.373495] __asan_report_load4_noabort+0x18/0x20 [ 17.373518] kasan_atomics_helper+0x49ce/0x5450 [ 17.373544] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.373587] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.373613] ? ret_from_fork_asm+0x1a/0x30 [ 17.373638] ? kasan_atomics+0x152/0x310 [ 17.373673] kasan_atomics+0x1dc/0x310 [ 17.373701] ? __pfx_kasan_atomics+0x10/0x10 [ 17.373724] ? __pfx_read_tsc+0x10/0x10 [ 17.373746] ? ktime_get_ts64+0x86/0x230 [ 17.373774] kunit_try_run_case+0x1a5/0x480 [ 17.373803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.373829] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.373856] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.373880] ? __kthread_parkme+0x82/0x180 [ 17.373905] ? preempt_count_sub+0x50/0x80 [ 17.373932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.373958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.373983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.374008] kthread+0x337/0x6f0 [ 17.374027] ? trace_preempt_on+0x20/0xc0 [ 17.374053] ? __pfx_kthread+0x10/0x10 [ 17.374072] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.374094] ? calculate_sigpending+0x7b/0xa0 [ 17.374118] ? __pfx_kthread+0x10/0x10 [ 17.374138] ret_from_fork+0x41/0x80 [ 17.374161] ? __pfx_kthread+0x10/0x10 [ 17.374181] ret_from_fork_asm+0x1a/0x30 [ 17.374211] </TASK> [ 17.374226] [ 17.387318] Allocated by task 285: [ 17.387589] kasan_save_stack+0x45/0x70 [ 17.388653] kasan_save_track+0x18/0x40 [ 17.388899] kasan_save_alloc_info+0x3b/0x50 [ 17.389059] __kasan_kmalloc+0xb7/0xc0 [ 17.389435] __kmalloc_cache_noprof+0x189/0x420 [ 17.390053] kasan_atomics+0x95/0x310 [ 17.390232] kunit_try_run_case+0x1a5/0x480 [ 17.390799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.391141] kthread+0x337/0x6f0 [ 17.391594] ret_from_fork+0x41/0x80 [ 17.391761] ret_from_fork_asm+0x1a/0x30 [ 17.392443] [ 17.392628] The buggy address belongs to the object at ffff8881033b5600 [ 17.392628] which belongs to the cache kmalloc-64 of size 64 [ 17.393239] The buggy address is located 0 bytes to the right of [ 17.393239] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.393974] [ 17.394167] The buggy address belongs to the physical page: [ 17.394537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.395223] flags: 0x200000000000000(node=0|zone=2) [ 17.395477] page_type: f5(slab) [ 17.396264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.396598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.397131] page dumped because: kasan: bad access detected [ 17.397329] [ 17.397472] Memory state around the buggy address: [ 17.398235] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.398482] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.399258] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.400184] ^ [ 17.400445] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.400906] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.401426] ================================================================== [ 16.415418] ================================================================== [ 16.415751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 16.416377] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.416555] [ 16.416853] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.417045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.417063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.417209] Call Trace: [ 16.417231] <TASK> [ 16.417254] dump_stack_lvl+0x73/0xb0 [ 16.417293] print_report+0xd1/0x650 [ 16.417320] ? __virt_addr_valid+0x1db/0x2d0 [ 16.417343] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.417366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.417390] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.417413] kasan_report+0x141/0x180 [ 16.417437] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.417464] __asan_report_load4_noabort+0x18/0x20 [ 16.417487] kasan_atomics_helper+0x4b88/0x5450 [ 16.417511] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.417534] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.417555] ? ret_from_fork_asm+0x1a/0x30 [ 16.417622] ? kasan_atomics+0x152/0x310 [ 16.417668] kasan_atomics+0x1dc/0x310 [ 16.417707] ? __pfx_kasan_atomics+0x10/0x10 [ 16.417730] ? __pfx_read_tsc+0x10/0x10 [ 16.417753] ? ktime_get_ts64+0x86/0x230 [ 16.417929] kunit_try_run_case+0x1a5/0x480 [ 16.417962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.418007] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.418036] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.418063] ? __kthread_parkme+0x82/0x180 [ 16.418088] ? preempt_count_sub+0x50/0x80 [ 16.418117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.418145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.418170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.418197] kthread+0x337/0x6f0 [ 16.418217] ? trace_preempt_on+0x20/0xc0 [ 16.418244] ? __pfx_kthread+0x10/0x10 [ 16.418265] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.418288] ? calculate_sigpending+0x7b/0xa0 [ 16.418313] ? __pfx_kthread+0x10/0x10 [ 16.418334] ret_from_fork+0x41/0x80 [ 16.418358] ? __pfx_kthread+0x10/0x10 [ 16.418378] ret_from_fork_asm+0x1a/0x30 [ 16.418412] </TASK> [ 16.418429] [ 16.426724] Allocated by task 285: [ 16.426919] kasan_save_stack+0x45/0x70 [ 16.427188] kasan_save_track+0x18/0x40 [ 16.427295] kasan_save_alloc_info+0x3b/0x50 [ 16.427391] __kasan_kmalloc+0xb7/0xc0 [ 16.427481] __kmalloc_cache_noprof+0x189/0x420 [ 16.427883] kasan_atomics+0x95/0x310 [ 16.428146] kunit_try_run_case+0x1a5/0x480 [ 16.428424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.428758] kthread+0x337/0x6f0 [ 16.428887] ret_from_fork+0x41/0x80 [ 16.428979] ret_from_fork_asm+0x1a/0x30 [ 16.429240] [ 16.429360] The buggy address belongs to the object at ffff8881033b5600 [ 16.429360] which belongs to the cache kmalloc-64 of size 64 [ 16.430143] The buggy address is located 0 bytes to the right of [ 16.430143] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.430717] [ 16.430836] The buggy address belongs to the physical page: [ 16.431203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.431595] flags: 0x200000000000000(node=0|zone=2) [ 16.431839] page_type: f5(slab) [ 16.432068] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.432456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.432679] page dumped because: kasan: bad access detected [ 16.433024] [ 16.433149] Memory state around the buggy address: [ 16.433449] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.433988] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.434342] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.434553] ^ [ 16.434891] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.435171] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.435440] ================================================================== [ 17.403024] ================================================================== [ 17.403307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 17.403541] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.404664] [ 17.405161] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.405375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.405401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.405439] Call Trace: [ 17.405468] <TASK> [ 17.405493] dump_stack_lvl+0x73/0xb0 [ 17.405535] print_report+0xd1/0x650 [ 17.405579] ? __virt_addr_valid+0x1db/0x2d0 [ 17.405607] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.405632] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.405660] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.405710] kasan_report+0x141/0x180 [ 17.405736] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.405763] kasan_check_range+0x10c/0x1c0 [ 17.405785] __kasan_check_read+0x15/0x20 [ 17.405806] kasan_atomics_helper+0x13b5/0x5450 [ 17.405830] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.405853] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.405876] ? ret_from_fork_asm+0x1a/0x30 [ 17.405900] ? kasan_atomics+0x152/0x310 [ 17.405924] kasan_atomics+0x1dc/0x310 [ 17.405944] ? __pfx_kasan_atomics+0x10/0x10 [ 17.405966] ? __pfx_read_tsc+0x10/0x10 [ 17.405988] ? ktime_get_ts64+0x86/0x230 [ 17.406016] kunit_try_run_case+0x1a5/0x480 [ 17.406043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.406067] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.406093] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.406117] ? __kthread_parkme+0x82/0x180 [ 17.406140] ? preempt_count_sub+0x50/0x80 [ 17.406167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.406192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.406215] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.406240] kthread+0x337/0x6f0 [ 17.406259] ? trace_preempt_on+0x20/0xc0 [ 17.406284] ? __pfx_kthread+0x10/0x10 [ 17.406302] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.406325] ? calculate_sigpending+0x7b/0xa0 [ 17.406347] ? __pfx_kthread+0x10/0x10 [ 17.406366] ret_from_fork+0x41/0x80 [ 17.406388] ? __pfx_kthread+0x10/0x10 [ 17.406407] ret_from_fork_asm+0x1a/0x30 [ 17.406436] </TASK> [ 17.406449] [ 17.418063] Allocated by task 285: [ 17.418403] kasan_save_stack+0x45/0x70 [ 17.418817] kasan_save_track+0x18/0x40 [ 17.419150] kasan_save_alloc_info+0x3b/0x50 [ 17.419436] __kasan_kmalloc+0xb7/0xc0 [ 17.419831] __kmalloc_cache_noprof+0x189/0x420 [ 17.420035] kasan_atomics+0x95/0x310 [ 17.420366] kunit_try_run_case+0x1a5/0x480 [ 17.420688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.420972] kthread+0x337/0x6f0 [ 17.421147] ret_from_fork+0x41/0x80 [ 17.421330] ret_from_fork_asm+0x1a/0x30 [ 17.421650] [ 17.421832] The buggy address belongs to the object at ffff8881033b5600 [ 17.421832] which belongs to the cache kmalloc-64 of size 64 [ 17.422695] The buggy address is located 0 bytes to the right of [ 17.422695] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.423518] [ 17.423724] The buggy address belongs to the physical page: [ 17.424236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.424646] flags: 0x200000000000000(node=0|zone=2) [ 17.425068] page_type: f5(slab) [ 17.425377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.425742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.426192] page dumped because: kasan: bad access detected [ 17.426510] [ 17.426706] Memory state around the buggy address: [ 17.426925] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.427210] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.427517] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.428025] ^ [ 17.428465] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.428998] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.429478] ================================================================== [ 16.680770] ================================================================== [ 16.681181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 16.681438] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.681682] [ 16.681826] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.681928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.681954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.681993] Call Trace: [ 16.682032] <TASK> [ 16.682068] dump_stack_lvl+0x73/0xb0 [ 16.682126] print_report+0xd1/0x650 [ 16.682168] ? __virt_addr_valid+0x1db/0x2d0 [ 16.682206] ? kasan_atomics_helper+0x72f/0x5450 [ 16.682243] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.682280] ? kasan_atomics_helper+0x72f/0x5450 [ 16.682319] kasan_report+0x141/0x180 [ 16.682365] ? kasan_atomics_helper+0x72f/0x5450 [ 16.682417] kasan_check_range+0x10c/0x1c0 [ 16.682460] __kasan_check_write+0x18/0x20 [ 16.682490] kasan_atomics_helper+0x72f/0x5450 [ 16.682516] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.682542] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.682969] ? ret_from_fork_asm+0x1a/0x30 [ 16.683034] ? kasan_atomics+0x152/0x310 [ 16.683587] kasan_atomics+0x1dc/0x310 [ 16.683631] ? __pfx_kasan_atomics+0x10/0x10 [ 16.683692] ? __pfx_read_tsc+0x10/0x10 [ 16.683717] ? ktime_get_ts64+0x86/0x230 [ 16.683746] kunit_try_run_case+0x1a5/0x480 [ 16.683775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.683799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.683826] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.683852] ? __kthread_parkme+0x82/0x180 [ 16.683875] ? preempt_count_sub+0x50/0x80 [ 16.683902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.683928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.683953] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.683977] kthread+0x337/0x6f0 [ 16.683998] ? trace_preempt_on+0x20/0xc0 [ 16.684024] ? __pfx_kthread+0x10/0x10 [ 16.684044] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.684066] ? calculate_sigpending+0x7b/0xa0 [ 16.684090] ? __pfx_kthread+0x10/0x10 [ 16.684109] ret_from_fork+0x41/0x80 [ 16.684132] ? __pfx_kthread+0x10/0x10 [ 16.684152] ret_from_fork_asm+0x1a/0x30 [ 16.684183] </TASK> [ 16.684199] [ 16.698016] Allocated by task 285: [ 16.699032] kasan_save_stack+0x45/0x70 [ 16.699332] kasan_save_track+0x18/0x40 [ 16.699682] kasan_save_alloc_info+0x3b/0x50 [ 16.699990] __kasan_kmalloc+0xb7/0xc0 [ 16.700229] __kmalloc_cache_noprof+0x189/0x420 [ 16.701422] kasan_atomics+0x95/0x310 [ 16.701764] kunit_try_run_case+0x1a5/0x480 [ 16.702023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.702584] kthread+0x337/0x6f0 [ 16.703205] ret_from_fork+0x41/0x80 [ 16.703502] ret_from_fork_asm+0x1a/0x30 [ 16.703716] [ 16.704197] The buggy address belongs to the object at ffff8881033b5600 [ 16.704197] which belongs to the cache kmalloc-64 of size 64 [ 16.705159] The buggy address is located 0 bytes to the right of [ 16.705159] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.705682] [ 16.706401] The buggy address belongs to the physical page: [ 16.706640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.707878] flags: 0x200000000000000(node=0|zone=2) [ 16.708164] page_type: f5(slab) [ 16.708338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.709234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.710054] page dumped because: kasan: bad access detected [ 16.710788] [ 16.710980] Memory state around the buggy address: [ 16.711592] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.712083] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.712419] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.713246] ^ [ 16.713473] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.714280] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.714608] ================================================================== [ 18.088551] ================================================================== [ 18.089041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 18.089476] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 18.090001] [ 18.090157] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.090262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.090298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.090349] Call Trace: [ 18.090395] <TASK> [ 18.090440] dump_stack_lvl+0x73/0xb0 [ 18.090511] print_report+0xd1/0x650 [ 18.090584] ? __virt_addr_valid+0x1db/0x2d0 [ 18.090642] ? kasan_atomics_helper+0x4f98/0x5450 [ 18.090697] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.090754] ? kasan_atomics_helper+0x4f98/0x5450 [ 18.090808] kasan_report+0x141/0x180 [ 18.090865] ? kasan_atomics_helper+0x4f98/0x5450 [ 18.090930] __asan_report_load8_noabort+0x18/0x20 [ 18.090984] kasan_atomics_helper+0x4f98/0x5450 [ 18.091041] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.091097] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.091163] ? ret_from_fork_asm+0x1a/0x30 [ 18.091218] ? kasan_atomics+0x152/0x310 [ 18.091278] kasan_atomics+0x1dc/0x310 [ 18.091327] ? __pfx_kasan_atomics+0x10/0x10 [ 18.091382] ? __pfx_read_tsc+0x10/0x10 [ 18.091428] ? ktime_get_ts64+0x86/0x230 [ 18.091488] kunit_try_run_case+0x1a5/0x480 [ 18.091548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.091603] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.091642] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.091678] ? __kthread_parkme+0x82/0x180 [ 18.091714] ? preempt_count_sub+0x50/0x80 [ 18.091756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.091793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.091831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.091866] kthread+0x337/0x6f0 [ 18.091894] ? trace_preempt_on+0x20/0xc0 [ 18.091931] ? __pfx_kthread+0x10/0x10 [ 18.091961] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.091995] ? calculate_sigpending+0x7b/0xa0 [ 18.092030] ? __pfx_kthread+0x10/0x10 [ 18.092061] ret_from_fork+0x41/0x80 [ 18.092096] ? __pfx_kthread+0x10/0x10 [ 18.092273] ret_from_fork_asm+0x1a/0x30 [ 18.092333] </TASK> [ 18.092360] [ 18.102815] Allocated by task 285: [ 18.103026] kasan_save_stack+0x45/0x70 [ 18.103346] kasan_save_track+0x18/0x40 [ 18.103638] kasan_save_alloc_info+0x3b/0x50 [ 18.103910] __kasan_kmalloc+0xb7/0xc0 [ 18.104184] __kmalloc_cache_noprof+0x189/0x420 [ 18.104508] kasan_atomics+0x95/0x310 [ 18.104927] kunit_try_run_case+0x1a5/0x480 [ 18.105166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.105421] kthread+0x337/0x6f0 [ 18.105586] ret_from_fork+0x41/0x80 [ 18.105800] ret_from_fork_asm+0x1a/0x30 [ 18.106060] [ 18.106167] The buggy address belongs to the object at ffff8881033b5600 [ 18.106167] which belongs to the cache kmalloc-64 of size 64 [ 18.106538] The buggy address is located 0 bytes to the right of [ 18.106538] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 18.107583] [ 18.107795] The buggy address belongs to the physical page: [ 18.108215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 18.108827] flags: 0x200000000000000(node=0|zone=2) [ 18.109070] page_type: f5(slab) [ 18.109309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.109942] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.110326] page dumped because: kasan: bad access detected [ 18.110637] [ 18.110875] Memory state around the buggy address: [ 18.111197] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.111631] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.112082] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.112542] ^ [ 18.112842] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.113508] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.113834] ================================================================== [ 17.895280] ================================================================== [ 17.895726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 17.896898] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.897323] [ 17.897685] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.897770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.897788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.897813] Call Trace: [ 17.897838] <TASK> [ 17.897861] dump_stack_lvl+0x73/0xb0 [ 17.897897] print_report+0xd1/0x650 [ 17.897923] ? __virt_addr_valid+0x1db/0x2d0 [ 17.897947] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.897969] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.897994] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.898017] kasan_report+0x141/0x180 [ 17.898040] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.898066] kasan_check_range+0x10c/0x1c0 [ 17.898086] __kasan_check_write+0x18/0x20 [ 17.898105] kasan_atomics_helper+0x1ce1/0x5450 [ 17.898128] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.898151] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.898172] ? ret_from_fork_asm+0x1a/0x30 [ 17.898194] ? kasan_atomics+0x152/0x310 [ 17.898217] kasan_atomics+0x1dc/0x310 [ 17.898236] ? __pfx_kasan_atomics+0x10/0x10 [ 17.898257] ? __pfx_read_tsc+0x10/0x10 [ 17.898278] ? ktime_get_ts64+0x86/0x230 [ 17.898304] kunit_try_run_case+0x1a5/0x480 [ 17.898330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.898352] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.898377] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.898399] ? __kthread_parkme+0x82/0x180 [ 17.898422] ? preempt_count_sub+0x50/0x80 [ 17.898448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.898473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.898495] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.898518] kthread+0x337/0x6f0 [ 17.898536] ? trace_preempt_on+0x20/0xc0 [ 17.898581] ? __pfx_kthread+0x10/0x10 [ 17.898604] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.898627] ? calculate_sigpending+0x7b/0xa0 [ 17.898651] ? __pfx_kthread+0x10/0x10 [ 17.898683] ret_from_fork+0x41/0x80 [ 17.898707] ? __pfx_kthread+0x10/0x10 [ 17.898726] ret_from_fork_asm+0x1a/0x30 [ 17.898755] </TASK> [ 17.898769] [ 17.911649] Allocated by task 285: [ 17.912063] kasan_save_stack+0x45/0x70 [ 17.912529] kasan_save_track+0x18/0x40 [ 17.912722] kasan_save_alloc_info+0x3b/0x50 [ 17.913231] __kasan_kmalloc+0xb7/0xc0 [ 17.913763] __kmalloc_cache_noprof+0x189/0x420 [ 17.914065] kasan_atomics+0x95/0x310 [ 17.914453] kunit_try_run_case+0x1a5/0x480 [ 17.914915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.915248] kthread+0x337/0x6f0 [ 17.915644] ret_from_fork+0x41/0x80 [ 17.915879] ret_from_fork_asm+0x1a/0x30 [ 17.916055] [ 17.916171] The buggy address belongs to the object at ffff8881033b5600 [ 17.916171] which belongs to the cache kmalloc-64 of size 64 [ 17.916583] The buggy address is located 0 bytes to the right of [ 17.916583] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.917485] [ 17.917723] The buggy address belongs to the physical page: [ 17.918166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.918590] flags: 0x200000000000000(node=0|zone=2) [ 17.918900] page_type: f5(slab) [ 17.919111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.919545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.919993] page dumped because: kasan: bad access detected [ 17.920332] [ 17.920506] Memory state around the buggy address: [ 17.920802] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.921206] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.921548] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.922067] ^ [ 17.922269] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.922765] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.923194] ================================================================== [ 18.037813] ================================================================== [ 18.038226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 18.038507] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 18.038987] [ 18.039188] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.039299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.039332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.039381] Call Trace: [ 18.039426] <TASK> [ 18.039465] dump_stack_lvl+0x73/0xb0 [ 18.039525] print_report+0xd1/0x650 [ 18.039585] ? __virt_addr_valid+0x1db/0x2d0 [ 18.039628] ? kasan_atomics_helper+0x4f71/0x5450 [ 18.039666] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.039734] ? kasan_atomics_helper+0x4f71/0x5450 [ 18.039780] kasan_report+0x141/0x180 [ 18.039819] ? kasan_atomics_helper+0x4f71/0x5450 [ 18.039869] __asan_report_load8_noabort+0x18/0x20 [ 18.039912] kasan_atomics_helper+0x4f71/0x5450 [ 18.039958] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.040006] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.040047] ? ret_from_fork_asm+0x1a/0x30 [ 18.040088] ? kasan_atomics+0x152/0x310 [ 18.040132] kasan_atomics+0x1dc/0x310 [ 18.040173] ? __pfx_kasan_atomics+0x10/0x10 [ 18.040220] ? __pfx_read_tsc+0x10/0x10 [ 18.040264] ? ktime_get_ts64+0x86/0x230 [ 18.040318] kunit_try_run_case+0x1a5/0x480 [ 18.040375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.040424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.040468] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.040514] ? __kthread_parkme+0x82/0x180 [ 18.040555] ? preempt_count_sub+0x50/0x80 [ 18.040624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.040668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.040709] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.040756] kthread+0x337/0x6f0 [ 18.040791] ? trace_preempt_on+0x20/0xc0 [ 18.040833] ? __pfx_kthread+0x10/0x10 [ 18.040868] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.040909] ? calculate_sigpending+0x7b/0xa0 [ 18.040954] ? __pfx_kthread+0x10/0x10 [ 18.040995] ret_from_fork+0x41/0x80 [ 18.041038] ? __pfx_kthread+0x10/0x10 [ 18.041064] ret_from_fork_asm+0x1a/0x30 [ 18.041096] </TASK> [ 18.041111] [ 18.050583] Allocated by task 285: [ 18.050879] kasan_save_stack+0x45/0x70 [ 18.051191] kasan_save_track+0x18/0x40 [ 18.051491] kasan_save_alloc_info+0x3b/0x50 [ 18.051888] __kasan_kmalloc+0xb7/0xc0 [ 18.052120] __kmalloc_cache_noprof+0x189/0x420 [ 18.052326] kasan_atomics+0x95/0x310 [ 18.052606] kunit_try_run_case+0x1a5/0x480 [ 18.052945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.053178] kthread+0x337/0x6f0 [ 18.053444] ret_from_fork+0x41/0x80 [ 18.053696] ret_from_fork_asm+0x1a/0x30 [ 18.053885] [ 18.054015] The buggy address belongs to the object at ffff8881033b5600 [ 18.054015] which belongs to the cache kmalloc-64 of size 64 [ 18.054588] The buggy address is located 0 bytes to the right of [ 18.054588] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 18.054993] [ 18.055116] The buggy address belongs to the physical page: [ 18.055352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 18.055704] flags: 0x200000000000000(node=0|zone=2) [ 18.056083] page_type: f5(slab) [ 18.056440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.057093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.057583] page dumped because: kasan: bad access detected [ 18.058062] [ 18.058173] Memory state around the buggy address: [ 18.058374] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.058677] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.059128] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.059657] ^ [ 18.059976] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.060239] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.060492] ================================================================== [ 17.462824] ================================================================== [ 17.463191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 17.463691] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.463925] [ 17.464077] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.464678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.464723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.464751] Call Trace: [ 17.464777] <TASK> [ 17.464801] dump_stack_lvl+0x73/0xb0 [ 17.464842] print_report+0xd1/0x650 [ 17.464867] ? __virt_addr_valid+0x1db/0x2d0 [ 17.464891] ? kasan_atomics_helper+0x1467/0x5450 [ 17.464915] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.464939] ? kasan_atomics_helper+0x1467/0x5450 [ 17.464961] kasan_report+0x141/0x180 [ 17.464985] ? kasan_atomics_helper+0x1467/0x5450 [ 17.465011] kasan_check_range+0x10c/0x1c0 [ 17.465033] __kasan_check_write+0x18/0x20 [ 17.465054] kasan_atomics_helper+0x1467/0x5450 [ 17.465078] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.465101] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.465123] ? ret_from_fork_asm+0x1a/0x30 [ 17.465145] ? kasan_atomics+0x152/0x310 [ 17.465168] kasan_atomics+0x1dc/0x310 [ 17.465188] ? __pfx_kasan_atomics+0x10/0x10 [ 17.465209] ? __pfx_read_tsc+0x10/0x10 [ 17.465230] ? ktime_get_ts64+0x86/0x230 [ 17.465257] kunit_try_run_case+0x1a5/0x480 [ 17.465283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.465306] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.465330] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.465354] ? __kthread_parkme+0x82/0x180 [ 17.465377] ? preempt_count_sub+0x50/0x80 [ 17.465403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.465427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.465451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.465474] kthread+0x337/0x6f0 [ 17.465492] ? trace_preempt_on+0x20/0xc0 [ 17.465517] ? __pfx_kthread+0x10/0x10 [ 17.465536] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.465569] ? calculate_sigpending+0x7b/0xa0 [ 17.465598] ? __pfx_kthread+0x10/0x10 [ 17.465618] ret_from_fork+0x41/0x80 [ 17.465640] ? __pfx_kthread+0x10/0x10 [ 17.465667] ret_from_fork_asm+0x1a/0x30 [ 17.465705] </TASK> [ 17.465719] [ 17.476310] Allocated by task 285: [ 17.476547] kasan_save_stack+0x45/0x70 [ 17.477018] kasan_save_track+0x18/0x40 [ 17.477397] kasan_save_alloc_info+0x3b/0x50 [ 17.477823] __kasan_kmalloc+0xb7/0xc0 [ 17.478174] __kmalloc_cache_noprof+0x189/0x420 [ 17.478590] kasan_atomics+0x95/0x310 [ 17.478972] kunit_try_run_case+0x1a5/0x480 [ 17.479396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.479812] kthread+0x337/0x6f0 [ 17.479974] ret_from_fork+0x41/0x80 [ 17.480299] ret_from_fork_asm+0x1a/0x30 [ 17.480589] [ 17.480796] The buggy address belongs to the object at ffff8881033b5600 [ 17.480796] which belongs to the cache kmalloc-64 of size 64 [ 17.481476] The buggy address is located 0 bytes to the right of [ 17.481476] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.482089] [ 17.482303] The buggy address belongs to the physical page: [ 17.482765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.483259] flags: 0x200000000000000(node=0|zone=2) [ 17.483505] page_type: f5(slab) [ 17.483854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.484261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.484740] page dumped because: kasan: bad access detected [ 17.485103] [ 17.485276] Memory state around the buggy address: [ 17.485586] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.486143] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.486465] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.486897] ^ [ 17.487317] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.487820] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.488246] ================================================================== [ 17.924225] ================================================================== [ 17.925035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 17.925610] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.926138] [ 17.926358] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.926457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.926483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.926525] Call Trace: [ 17.926578] <TASK> [ 17.926617] dump_stack_lvl+0x73/0xb0 [ 17.926713] print_report+0xd1/0x650 [ 17.926763] ? __virt_addr_valid+0x1db/0x2d0 [ 17.926808] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.926848] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.926894] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.926937] kasan_report+0x141/0x180 [ 17.926987] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.927032] kasan_check_range+0x10c/0x1c0 [ 17.927056] __kasan_check_write+0x18/0x20 [ 17.927078] kasan_atomics_helper+0x1d7a/0x5450 [ 17.927102] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.927127] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.927177] ? ret_from_fork_asm+0x1a/0x30 [ 17.927218] ? kasan_atomics+0x152/0x310 [ 17.927268] kasan_atomics+0x1dc/0x310 [ 17.927313] ? __pfx_kasan_atomics+0x10/0x10 [ 17.927351] ? __pfx_read_tsc+0x10/0x10 [ 17.927390] ? ktime_get_ts64+0x86/0x230 [ 17.927442] kunit_try_run_case+0x1a5/0x480 [ 17.927491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.927535] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.927593] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.927638] ? __kthread_parkme+0x82/0x180 [ 17.927720] ? preempt_count_sub+0x50/0x80 [ 17.927770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.927815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.927845] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.927870] kthread+0x337/0x6f0 [ 17.927890] ? trace_preempt_on+0x20/0xc0 [ 17.927917] ? __pfx_kthread+0x10/0x10 [ 17.927937] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.927961] ? calculate_sigpending+0x7b/0xa0 [ 17.927984] ? __pfx_kthread+0x10/0x10 [ 17.928004] ret_from_fork+0x41/0x80 [ 17.928027] ? __pfx_kthread+0x10/0x10 [ 17.928046] ret_from_fork_asm+0x1a/0x30 [ 17.928078] </TASK> [ 17.928093] [ 17.937292] Allocated by task 285: [ 17.937606] kasan_save_stack+0x45/0x70 [ 17.937974] kasan_save_track+0x18/0x40 [ 17.938228] kasan_save_alloc_info+0x3b/0x50 [ 17.938443] __kasan_kmalloc+0xb7/0xc0 [ 17.938633] __kmalloc_cache_noprof+0x189/0x420 [ 17.938858] kasan_atomics+0x95/0x310 [ 17.939126] kunit_try_run_case+0x1a5/0x480 [ 17.939487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.939929] kthread+0x337/0x6f0 [ 17.940216] ret_from_fork+0x41/0x80 [ 17.940486] ret_from_fork_asm+0x1a/0x30 [ 17.940807] [ 17.940974] The buggy address belongs to the object at ffff8881033b5600 [ 17.940974] which belongs to the cache kmalloc-64 of size 64 [ 17.941393] The buggy address is located 0 bytes to the right of [ 17.941393] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.942180] [ 17.942358] The buggy address belongs to the physical page: [ 17.942796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.943258] flags: 0x200000000000000(node=0|zone=2) [ 17.943567] page_type: f5(slab) [ 17.943841] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.944201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.944570] page dumped because: kasan: bad access detected [ 17.944813] [ 17.944930] Memory state around the buggy address: [ 17.945195] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.945710] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.946245] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.946865] ^ [ 17.947085] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.947355] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.947989] ================================================================== [ 16.843435] ================================================================== [ 16.844190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 16.845299] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.846071] [ 16.846273] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.846387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.846419] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.846469] Call Trace: [ 16.846522] <TASK> [ 16.846576] dump_stack_lvl+0x73/0xb0 [ 16.846887] print_report+0xd1/0x650 [ 16.846954] ? __virt_addr_valid+0x1db/0x2d0 [ 16.846991] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.847018] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.847046] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.847072] kasan_report+0x141/0x180 [ 16.847098] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.847128] kasan_check_range+0x10c/0x1c0 [ 16.847170] __kasan_check_write+0x18/0x20 [ 16.847194] kasan_atomics_helper+0xa2b/0x5450 [ 16.847221] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.847247] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.847272] ? ret_from_fork_asm+0x1a/0x30 [ 16.847297] ? kasan_atomics+0x152/0x310 [ 16.847324] kasan_atomics+0x1dc/0x310 [ 16.847346] ? __pfx_kasan_atomics+0x10/0x10 [ 16.847371] ? __pfx_read_tsc+0x10/0x10 [ 16.847395] ? ktime_get_ts64+0x86/0x230 [ 16.847427] kunit_try_run_case+0x1a5/0x480 [ 16.847456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.847482] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.847510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.847537] ? __kthread_parkme+0x82/0x180 [ 16.847582] ? preempt_count_sub+0x50/0x80 [ 16.847636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.847680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.847711] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.847739] kthread+0x337/0x6f0 [ 16.847761] ? trace_preempt_on+0x20/0xc0 [ 16.847789] ? __pfx_kthread+0x10/0x10 [ 16.847811] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.847835] ? calculate_sigpending+0x7b/0xa0 [ 16.847861] ? __pfx_kthread+0x10/0x10 [ 16.847882] ret_from_fork+0x41/0x80 [ 16.847906] ? __pfx_kthread+0x10/0x10 [ 16.847927] ret_from_fork_asm+0x1a/0x30 [ 16.847960] </TASK> [ 16.847976] [ 16.861526] Allocated by task 285: [ 16.862381] kasan_save_stack+0x45/0x70 [ 16.863029] kasan_save_track+0x18/0x40 [ 16.863338] kasan_save_alloc_info+0x3b/0x50 [ 16.863770] __kasan_kmalloc+0xb7/0xc0 [ 16.863960] __kmalloc_cache_noprof+0x189/0x420 [ 16.864159] kasan_atomics+0x95/0x310 [ 16.864328] kunit_try_run_case+0x1a5/0x480 [ 16.864516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.864929] kthread+0x337/0x6f0 [ 16.865227] ret_from_fork+0x41/0x80 [ 16.865639] ret_from_fork_asm+0x1a/0x30 [ 16.866497] [ 16.866811] The buggy address belongs to the object at ffff8881033b5600 [ 16.866811] which belongs to the cache kmalloc-64 of size 64 [ 16.867768] The buggy address is located 0 bytes to the right of [ 16.867768] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.868494] [ 16.868639] The buggy address belongs to the physical page: [ 16.869041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.869454] flags: 0x200000000000000(node=0|zone=2) [ 16.870040] page_type: f5(slab) [ 16.870894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.871758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.872086] page dumped because: kasan: bad access detected [ 16.872380] [ 16.872548] Memory state around the buggy address: [ 16.873058] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.873518] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.874052] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.874486] ^ [ 16.874996] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.876078] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.876601] ================================================================== [ 16.578022] ================================================================== [ 16.578583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 16.579006] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.580493] [ 16.580790] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.580891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.580918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.580956] Call Trace: [ 16.580997] <TASK> [ 16.581032] dump_stack_lvl+0x73/0xb0 [ 16.581094] print_report+0xd1/0x650 [ 16.581142] ? __virt_addr_valid+0x1db/0x2d0 [ 16.581186] ? kasan_atomics_helper+0x565/0x5450 [ 16.581386] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.581417] ? kasan_atomics_helper+0x565/0x5450 [ 16.581442] kasan_report+0x141/0x180 [ 16.581468] ? kasan_atomics_helper+0x565/0x5450 [ 16.581495] kasan_check_range+0x10c/0x1c0 [ 16.581518] __kasan_check_write+0x18/0x20 [ 16.581539] kasan_atomics_helper+0x565/0x5450 [ 16.581586] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.581634] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.581673] ? ret_from_fork_asm+0x1a/0x30 [ 16.581710] ? kasan_atomics+0x152/0x310 [ 16.581747] kasan_atomics+0x1dc/0x310 [ 16.581784] ? __pfx_kasan_atomics+0x10/0x10 [ 16.581815] ? __pfx_read_tsc+0x10/0x10 [ 16.581839] ? ktime_get_ts64+0x86/0x230 [ 16.581869] kunit_try_run_case+0x1a5/0x480 [ 16.581897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.581921] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.581947] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.581972] ? __kthread_parkme+0x82/0x180 [ 16.581998] ? preempt_count_sub+0x50/0x80 [ 16.582025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.582050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.582076] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.582100] kthread+0x337/0x6f0 [ 16.582119] ? trace_preempt_on+0x20/0xc0 [ 16.582145] ? __pfx_kthread+0x10/0x10 [ 16.582165] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.582188] ? calculate_sigpending+0x7b/0xa0 [ 16.582212] ? __pfx_kthread+0x10/0x10 [ 16.582232] ret_from_fork+0x41/0x80 [ 16.582254] ? __pfx_kthread+0x10/0x10 [ 16.582274] ret_from_fork_asm+0x1a/0x30 [ 16.582306] </TASK> [ 16.582321] [ 16.597310] Allocated by task 285: [ 16.597635] kasan_save_stack+0x45/0x70 [ 16.597961] kasan_save_track+0x18/0x40 [ 16.598144] kasan_save_alloc_info+0x3b/0x50 [ 16.598894] __kasan_kmalloc+0xb7/0xc0 [ 16.599099] __kmalloc_cache_noprof+0x189/0x420 [ 16.599293] kasan_atomics+0x95/0x310 [ 16.599434] kunit_try_run_case+0x1a5/0x480 [ 16.599596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.600667] kthread+0x337/0x6f0 [ 16.601218] ret_from_fork+0x41/0x80 [ 16.601379] ret_from_fork_asm+0x1a/0x30 [ 16.601876] [ 16.602057] The buggy address belongs to the object at ffff8881033b5600 [ 16.602057] which belongs to the cache kmalloc-64 of size 64 [ 16.603352] The buggy address is located 0 bytes to the right of [ 16.603352] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.604067] [ 16.604164] The buggy address belongs to the physical page: [ 16.604332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.604576] flags: 0x200000000000000(node=0|zone=2) [ 16.605061] page_type: f5(slab) [ 16.605211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.605421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.605672] page dumped because: kasan: bad access detected [ 16.605845] [ 16.605925] Memory state around the buggy address: [ 16.606080] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.606279] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.606480] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.608462] ^ [ 16.608663] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.608944] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.609823] ================================================================== [ 16.952801] ================================================================== [ 16.953348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 16.954674] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.955199] [ 16.955427] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.955512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.955533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.955586] Call Trace: [ 16.955620] <TASK> [ 16.955654] dump_stack_lvl+0x73/0xb0 [ 16.955718] print_report+0xd1/0x650 [ 16.955766] ? __virt_addr_valid+0x1db/0x2d0 [ 16.955815] ? kasan_atomics_helper+0xc70/0x5450 [ 16.955862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.955911] ? kasan_atomics_helper+0xc70/0x5450 [ 16.955952] kasan_report+0x141/0x180 [ 16.955978] ? kasan_atomics_helper+0xc70/0x5450 [ 16.956004] kasan_check_range+0x10c/0x1c0 [ 16.956026] __kasan_check_write+0x18/0x20 [ 16.956046] kasan_atomics_helper+0xc70/0x5450 [ 16.956070] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.956093] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.956116] ? ret_from_fork_asm+0x1a/0x30 [ 16.956138] ? kasan_atomics+0x152/0x310 [ 16.956161] kasan_atomics+0x1dc/0x310 [ 16.956181] ? __pfx_kasan_atomics+0x10/0x10 [ 16.956203] ? __pfx_read_tsc+0x10/0x10 [ 16.956224] ? ktime_get_ts64+0x86/0x230 [ 16.956251] kunit_try_run_case+0x1a5/0x480 [ 16.956278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.956301] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.956326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.956349] ? __kthread_parkme+0x82/0x180 [ 16.956372] ? preempt_count_sub+0x50/0x80 [ 16.956398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.956422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.956445] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.956469] kthread+0x337/0x6f0 [ 16.956486] ? trace_preempt_on+0x20/0xc0 [ 16.956511] ? __pfx_kthread+0x10/0x10 [ 16.956530] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.956551] ? calculate_sigpending+0x7b/0xa0 [ 16.956608] ? __pfx_kthread+0x10/0x10 [ 16.956629] ret_from_fork+0x41/0x80 [ 16.956665] ? __pfx_kthread+0x10/0x10 [ 16.956710] ret_from_fork_asm+0x1a/0x30 [ 16.956742] </TASK> [ 16.956756] [ 16.966291] Allocated by task 285: [ 16.966629] kasan_save_stack+0x45/0x70 [ 16.967074] kasan_save_track+0x18/0x40 [ 16.967417] kasan_save_alloc_info+0x3b/0x50 [ 16.967744] __kasan_kmalloc+0xb7/0xc0 [ 16.968013] __kmalloc_cache_noprof+0x189/0x420 [ 16.968205] kasan_atomics+0x95/0x310 [ 16.968378] kunit_try_run_case+0x1a5/0x480 [ 16.968605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.969054] kthread+0x337/0x6f0 [ 16.969318] ret_from_fork+0x41/0x80 [ 16.969608] ret_from_fork_asm+0x1a/0x30 [ 16.969943] [ 16.970109] The buggy address belongs to the object at ffff8881033b5600 [ 16.970109] which belongs to the cache kmalloc-64 of size 64 [ 16.970643] The buggy address is located 0 bytes to the right of [ 16.970643] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.971417] [ 16.971626] The buggy address belongs to the physical page: [ 16.971926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.972266] flags: 0x200000000000000(node=0|zone=2) [ 16.972654] page_type: f5(slab) [ 16.972972] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.973322] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.974536] page dumped because: kasan: bad access detected [ 16.975027] [ 16.975206] Memory state around the buggy address: [ 16.975577] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.976620] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.976965] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.977441] ^ [ 16.977678] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.977990] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.978277] ================================================================== [ 17.287841] ================================================================== [ 17.288423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 17.288872] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.289499] [ 17.289751] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.289833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.289854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.289889] Call Trace: [ 17.289927] <TASK> [ 17.289970] dump_stack_lvl+0x73/0xb0 [ 17.290028] print_report+0xd1/0x650 [ 17.290065] ? __virt_addr_valid+0x1db/0x2d0 [ 17.290098] ? kasan_atomics_helper+0x1217/0x5450 [ 17.290132] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.290168] ? kasan_atomics_helper+0x1217/0x5450 [ 17.290205] kasan_report+0x141/0x180 [ 17.290244] ? kasan_atomics_helper+0x1217/0x5450 [ 17.290293] kasan_check_range+0x10c/0x1c0 [ 17.290336] __kasan_check_write+0x18/0x20 [ 17.290423] kasan_atomics_helper+0x1217/0x5450 [ 17.290469] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.290512] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.290556] ? ret_from_fork_asm+0x1a/0x30 [ 17.290632] ? kasan_atomics+0x152/0x310 [ 17.290737] kasan_atomics+0x1dc/0x310 [ 17.290784] ? __pfx_kasan_atomics+0x10/0x10 [ 17.290829] ? __pfx_read_tsc+0x10/0x10 [ 17.290897] ? ktime_get_ts64+0x86/0x230 [ 17.290952] kunit_try_run_case+0x1a5/0x480 [ 17.291006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.291053] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.291139] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.291192] ? __kthread_parkme+0x82/0x180 [ 17.291241] ? preempt_count_sub+0x50/0x80 [ 17.291275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.291303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.291330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.291356] kthread+0x337/0x6f0 [ 17.291380] ? trace_preempt_on+0x20/0xc0 [ 17.291423] ? __pfx_kthread+0x10/0x10 [ 17.291458] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.291501] ? calculate_sigpending+0x7b/0xa0 [ 17.291595] ? __pfx_kthread+0x10/0x10 [ 17.291635] ret_from_fork+0x41/0x80 [ 17.291710] ? __pfx_kthread+0x10/0x10 [ 17.291752] ret_from_fork_asm+0x1a/0x30 [ 17.291843] </TASK> [ 17.291874] [ 17.302842] Allocated by task 285: [ 17.303071] kasan_save_stack+0x45/0x70 [ 17.303514] kasan_save_track+0x18/0x40 [ 17.303841] kasan_save_alloc_info+0x3b/0x50 [ 17.304137] __kasan_kmalloc+0xb7/0xc0 [ 17.304465] __kmalloc_cache_noprof+0x189/0x420 [ 17.305309] kasan_atomics+0x95/0x310 [ 17.305568] kunit_try_run_case+0x1a5/0x480 [ 17.305840] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.307158] kthread+0x337/0x6f0 [ 17.307379] ret_from_fork+0x41/0x80 [ 17.307648] ret_from_fork_asm+0x1a/0x30 [ 17.308255] [ 17.308379] The buggy address belongs to the object at ffff8881033b5600 [ 17.308379] which belongs to the cache kmalloc-64 of size 64 [ 17.309595] The buggy address is located 0 bytes to the right of [ 17.309595] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.310204] [ 17.310384] The buggy address belongs to the physical page: [ 17.310773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.311082] flags: 0x200000000000000(node=0|zone=2) [ 17.311455] page_type: f5(slab) [ 17.311823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.312312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.312680] page dumped because: kasan: bad access detected [ 17.313107] [ 17.313310] Memory state around the buggy address: [ 17.313556] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.313989] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.314377] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.314754] ^ [ 17.315049] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.315555] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.316231] ================================================================== [ 18.197969] ================================================================== [ 18.198301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 18.198593] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 18.199307] [ 18.199549] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.199647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.199693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.199726] Call Trace: [ 18.199764] <TASK> [ 18.199798] dump_stack_lvl+0x73/0xb0 [ 18.199849] print_report+0xd1/0x650 [ 18.199887] ? __virt_addr_valid+0x1db/0x2d0 [ 18.199921] ? kasan_atomics_helper+0x4fa5/0x5450 [ 18.199953] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.199987] ? kasan_atomics_helper+0x4fa5/0x5450 [ 18.200020] kasan_report+0x141/0x180 [ 18.200055] ? kasan_atomics_helper+0x4fa5/0x5450 [ 18.200095] __asan_report_load8_noabort+0x18/0x20 [ 18.200131] kasan_atomics_helper+0x4fa5/0x5450 [ 18.200175] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.200219] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.200262] ? ret_from_fork_asm+0x1a/0x30 [ 18.200306] ? kasan_atomics+0x152/0x310 [ 18.200376] kasan_atomics+0x1dc/0x310 [ 18.200414] ? __pfx_kasan_atomics+0x10/0x10 [ 18.200453] ? __pfx_read_tsc+0x10/0x10 [ 18.200495] ? ktime_get_ts64+0x86/0x230 [ 18.200552] kunit_try_run_case+0x1a5/0x480 [ 18.200641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.200715] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.200770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.200819] ? __kthread_parkme+0x82/0x180 [ 18.200867] ? preempt_count_sub+0x50/0x80 [ 18.200926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.200979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.201031] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.201078] kthread+0x337/0x6f0 [ 18.201109] ? trace_preempt_on+0x20/0xc0 [ 18.201151] ? __pfx_kthread+0x10/0x10 [ 18.201189] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.201229] ? calculate_sigpending+0x7b/0xa0 [ 18.201274] ? __pfx_kthread+0x10/0x10 [ 18.201311] ret_from_fork+0x41/0x80 [ 18.201348] ? __pfx_kthread+0x10/0x10 [ 18.201408] ret_from_fork_asm+0x1a/0x30 [ 18.201466] </TASK> [ 18.201493] [ 18.211082] Allocated by task 285: [ 18.212213] kasan_save_stack+0x45/0x70 [ 18.212413] kasan_save_track+0x18/0x40 [ 18.212987] kasan_save_alloc_info+0x3b/0x50 [ 18.213639] __kasan_kmalloc+0xb7/0xc0 [ 18.213908] __kmalloc_cache_noprof+0x189/0x420 [ 18.214075] kasan_atomics+0x95/0x310 [ 18.214212] kunit_try_run_case+0x1a5/0x480 [ 18.214371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.214547] kthread+0x337/0x6f0 [ 18.214703] ret_from_fork+0x41/0x80 [ 18.214876] ret_from_fork_asm+0x1a/0x30 [ 18.215182] [ 18.215359] The buggy address belongs to the object at ffff8881033b5600 [ 18.215359] which belongs to the cache kmalloc-64 of size 64 [ 18.216474] The buggy address is located 0 bytes to the right of [ 18.216474] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 18.217151] [ 18.217279] The buggy address belongs to the physical page: [ 18.217494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 18.218267] flags: 0x200000000000000(node=0|zone=2) [ 18.218663] page_type: f5(slab) [ 18.218959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.219331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.219612] page dumped because: kasan: bad access detected [ 18.219822] [ 18.219928] Memory state around the buggy address: [ 18.220280] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.220905] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.221424] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.222780] ^ [ 18.223043] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.223323] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.224157] ================================================================== [ 17.234796] ================================================================== [ 17.235398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 17.236288] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.236519] [ 17.236678] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.236740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.236756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.236780] Call Trace: [ 17.236805] <TASK> [ 17.236828] dump_stack_lvl+0x73/0xb0 [ 17.236864] print_report+0xd1/0x650 [ 17.236890] ? __virt_addr_valid+0x1db/0x2d0 [ 17.236914] ? kasan_atomics_helper+0x1148/0x5450 [ 17.236937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.236960] ? kasan_atomics_helper+0x1148/0x5450 [ 17.236983] kasan_report+0x141/0x180 [ 17.237006] ? kasan_atomics_helper+0x1148/0x5450 [ 17.237032] kasan_check_range+0x10c/0x1c0 [ 17.237052] __kasan_check_write+0x18/0x20 [ 17.237073] kasan_atomics_helper+0x1148/0x5450 [ 17.237097] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.237120] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.237142] ? ret_from_fork_asm+0x1a/0x30 [ 17.237165] ? kasan_atomics+0x152/0x310 [ 17.237188] kasan_atomics+0x1dc/0x310 [ 17.237208] ? __pfx_kasan_atomics+0x10/0x10 [ 17.237229] ? __pfx_read_tsc+0x10/0x10 [ 17.237249] ? ktime_get_ts64+0x86/0x230 [ 17.237276] kunit_try_run_case+0x1a5/0x480 [ 17.237302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.237325] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.237349] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.237373] ? __kthread_parkme+0x82/0x180 [ 17.237396] ? preempt_count_sub+0x50/0x80 [ 17.237423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.237447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.237471] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.237494] kthread+0x337/0x6f0 [ 17.237512] ? trace_preempt_on+0x20/0xc0 [ 17.237537] ? __pfx_kthread+0x10/0x10 [ 17.237555] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.237601] ? calculate_sigpending+0x7b/0xa0 [ 17.237640] ? __pfx_kthread+0x10/0x10 [ 17.237677] ret_from_fork+0x41/0x80 [ 17.237720] ? __pfx_kthread+0x10/0x10 [ 17.237785] ret_from_fork_asm+0x1a/0x30 [ 17.237841] </TASK> [ 17.237867] [ 17.247769] Allocated by task 285: [ 17.247972] kasan_save_stack+0x45/0x70 [ 17.248152] kasan_save_track+0x18/0x40 [ 17.248296] kasan_save_alloc_info+0x3b/0x50 [ 17.248450] __kasan_kmalloc+0xb7/0xc0 [ 17.249584] __kmalloc_cache_noprof+0x189/0x420 [ 17.250097] kasan_atomics+0x95/0x310 [ 17.250294] kunit_try_run_case+0x1a5/0x480 [ 17.250488] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.250751] kthread+0x337/0x6f0 [ 17.251618] ret_from_fork+0x41/0x80 [ 17.252272] ret_from_fork_asm+0x1a/0x30 [ 17.252592] [ 17.252901] The buggy address belongs to the object at ffff8881033b5600 [ 17.252901] which belongs to the cache kmalloc-64 of size 64 [ 17.253276] The buggy address is located 0 bytes to the right of [ 17.253276] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.253651] [ 17.253750] The buggy address belongs to the physical page: [ 17.253921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.254157] flags: 0x200000000000000(node=0|zone=2) [ 17.254324] page_type: f5(slab) [ 17.254457] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.255692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.255984] page dumped because: kasan: bad access detected [ 17.256196] [ 17.256639] Memory state around the buggy address: [ 17.257234] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.257716] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.257939] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.258144] ^ [ 17.258300] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.258502] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.258809] ================================================================== [ 17.982957] ================================================================== [ 17.983393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 17.983802] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.984174] [ 17.984305] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.984361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.984376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.984400] Call Trace: [ 17.984424] <TASK> [ 17.984446] dump_stack_lvl+0x73/0xb0 [ 17.984477] print_report+0xd1/0x650 [ 17.984502] ? __virt_addr_valid+0x1db/0x2d0 [ 17.984525] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.984547] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.985010] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.985060] kasan_report+0x141/0x180 [ 17.985335] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.985393] kasan_check_range+0x10c/0x1c0 [ 17.985428] __kasan_check_write+0x18/0x20 [ 17.985459] kasan_atomics_helper+0x1eaa/0x5450 [ 17.985495] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.985573] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.985623] ? ret_from_fork_asm+0x1a/0x30 [ 17.985656] ? kasan_atomics+0x152/0x310 [ 17.986066] kasan_atomics+0x1dc/0x310 [ 17.986091] ? __pfx_kasan_atomics+0x10/0x10 [ 17.986114] ? __pfx_read_tsc+0x10/0x10 [ 17.986138] ? ktime_get_ts64+0x86/0x230 [ 17.986166] kunit_try_run_case+0x1a5/0x480 [ 17.986194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.986218] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.986245] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.986269] ? __kthread_parkme+0x82/0x180 [ 17.986294] ? preempt_count_sub+0x50/0x80 [ 17.986321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.986345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.986369] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.986392] kthread+0x337/0x6f0 [ 17.986411] ? trace_preempt_on+0x20/0xc0 [ 17.986435] ? __pfx_kthread+0x10/0x10 [ 17.986454] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.986476] ? calculate_sigpending+0x7b/0xa0 [ 17.986499] ? __pfx_kthread+0x10/0x10 [ 17.986519] ret_from_fork+0x41/0x80 [ 17.986540] ? __pfx_kthread+0x10/0x10 [ 17.986577] ret_from_fork_asm+0x1a/0x30 [ 17.986612] </TASK> [ 17.986628] [ 17.998261] Allocated by task 285: [ 17.998641] kasan_save_stack+0x45/0x70 [ 17.999428] kasan_save_track+0x18/0x40 [ 17.999948] kasan_save_alloc_info+0x3b/0x50 [ 18.000134] __kasan_kmalloc+0xb7/0xc0 [ 18.000435] __kmalloc_cache_noprof+0x189/0x420 [ 18.000794] kasan_atomics+0x95/0x310 [ 18.001109] kunit_try_run_case+0x1a5/0x480 [ 18.001351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.001698] kthread+0x337/0x6f0 [ 18.002061] ret_from_fork+0x41/0x80 [ 18.002343] ret_from_fork_asm+0x1a/0x30 [ 18.002663] [ 18.002779] The buggy address belongs to the object at ffff8881033b5600 [ 18.002779] which belongs to the cache kmalloc-64 of size 64 [ 18.003518] The buggy address is located 0 bytes to the right of [ 18.003518] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 18.004579] [ 18.004723] The buggy address belongs to the physical page: [ 18.004937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 18.005490] flags: 0x200000000000000(node=0|zone=2) [ 18.005968] page_type: f5(slab) [ 18.006200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.006719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.007038] page dumped because: kasan: bad access detected [ 18.007384] [ 18.007499] Memory state around the buggy address: [ 18.007845] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.008430] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.008816] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.009494] ^ [ 18.009750] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.010097] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.010590] ================================================================== [ 16.458336] ================================================================== [ 16.458515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 16.459590] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.460002] [ 16.460095] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.460156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.460172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.460198] Call Trace: [ 16.460224] <TASK> [ 16.460313] dump_stack_lvl+0x73/0xb0 [ 16.460413] print_report+0xd1/0x650 [ 16.460447] ? __virt_addr_valid+0x1db/0x2d0 [ 16.460473] ? kasan_atomics_helper+0x3df/0x5450 [ 16.460498] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.460675] ? kasan_atomics_helper+0x3df/0x5450 [ 16.460709] kasan_report+0x141/0x180 [ 16.460735] ? kasan_atomics_helper+0x3df/0x5450 [ 16.460763] kasan_check_range+0x10c/0x1c0 [ 16.460786] __kasan_check_read+0x15/0x20 [ 16.460808] kasan_atomics_helper+0x3df/0x5450 [ 16.460833] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.460858] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.460881] ? ret_from_fork_asm+0x1a/0x30 [ 16.460905] ? kasan_atomics+0x152/0x310 [ 16.460931] kasan_atomics+0x1dc/0x310 [ 16.460952] ? __pfx_kasan_atomics+0x10/0x10 [ 16.460975] ? __pfx_read_tsc+0x10/0x10 [ 16.460998] ? ktime_get_ts64+0x86/0x230 [ 16.461027] kunit_try_run_case+0x1a5/0x480 [ 16.461053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.461079] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.461106] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.461131] ? __kthread_parkme+0x82/0x180 [ 16.461155] ? preempt_count_sub+0x50/0x80 [ 16.461183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.461208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.461234] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.461260] kthread+0x337/0x6f0 [ 16.461280] ? trace_preempt_on+0x20/0xc0 [ 16.461307] ? __pfx_kthread+0x10/0x10 [ 16.461328] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.461352] ? calculate_sigpending+0x7b/0xa0 [ 16.461376] ? __pfx_kthread+0x10/0x10 [ 16.461397] ret_from_fork+0x41/0x80 [ 16.461420] ? __pfx_kthread+0x10/0x10 [ 16.461440] ret_from_fork_asm+0x1a/0x30 [ 16.461472] </TASK> [ 16.461487] [ 16.473159] Allocated by task 285: [ 16.473386] kasan_save_stack+0x45/0x70 [ 16.473521] kasan_save_track+0x18/0x40 [ 16.474019] kasan_save_alloc_info+0x3b/0x50 [ 16.474210] __kasan_kmalloc+0xb7/0xc0 [ 16.474618] __kmalloc_cache_noprof+0x189/0x420 [ 16.474966] kasan_atomics+0x95/0x310 [ 16.475170] kunit_try_run_case+0x1a5/0x480 [ 16.475468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.475774] kthread+0x337/0x6f0 [ 16.475930] ret_from_fork+0x41/0x80 [ 16.476105] ret_from_fork_asm+0x1a/0x30 [ 16.476258] [ 16.476333] The buggy address belongs to the object at ffff8881033b5600 [ 16.476333] which belongs to the cache kmalloc-64 of size 64 [ 16.476783] The buggy address is located 0 bytes to the right of [ 16.476783] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.477219] [ 16.477354] The buggy address belongs to the physical page: [ 16.478440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.478975] flags: 0x200000000000000(node=0|zone=2) [ 16.479384] page_type: f5(slab) [ 16.479648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.480259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.480543] page dumped because: kasan: bad access detected [ 16.480680] [ 16.480744] Memory state around the buggy address: [ 16.480858] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.481003] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.481301] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.482741] ^ [ 16.482985] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.483160] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.484135] ================================================================== [ 18.225059] ================================================================== [ 18.225510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 18.226528] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 18.227527] [ 18.227773] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.228094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.228123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.228151] Call Trace: [ 18.228179] <TASK> [ 18.228206] dump_stack_lvl+0x73/0xb0 [ 18.228248] print_report+0xd1/0x650 [ 18.228277] ? __virt_addr_valid+0x1db/0x2d0 [ 18.228302] ? kasan_atomics_helper+0x224c/0x5450 [ 18.228327] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.228354] ? kasan_atomics_helper+0x224c/0x5450 [ 18.228379] kasan_report+0x141/0x180 [ 18.228404] ? kasan_atomics_helper+0x224c/0x5450 [ 18.228433] kasan_check_range+0x10c/0x1c0 [ 18.228456] __kasan_check_write+0x18/0x20 [ 18.228480] kasan_atomics_helper+0x224c/0x5450 [ 18.228506] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.228531] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.228553] ? ret_from_fork_asm+0x1a/0x30 [ 18.228599] ? kasan_atomics+0x152/0x310 [ 18.228624] kasan_atomics+0x1dc/0x310 [ 18.228645] ? __pfx_kasan_atomics+0x10/0x10 [ 18.228675] ? __pfx_read_tsc+0x10/0x10 [ 18.228704] ? ktime_get_ts64+0x86/0x230 [ 18.228732] kunit_try_run_case+0x1a5/0x480 [ 18.228759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.228783] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.228808] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.228831] ? __kthread_parkme+0x82/0x180 [ 18.228855] ? preempt_count_sub+0x50/0x80 [ 18.228881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.228906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.228931] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.228955] kthread+0x337/0x6f0 [ 18.228973] ? trace_preempt_on+0x20/0xc0 [ 18.228998] ? __pfx_kthread+0x10/0x10 [ 18.229017] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.229038] ? calculate_sigpending+0x7b/0xa0 [ 18.229062] ? __pfx_kthread+0x10/0x10 [ 18.229082] ret_from_fork+0x41/0x80 [ 18.229104] ? __pfx_kthread+0x10/0x10 [ 18.229123] ret_from_fork_asm+0x1a/0x30 [ 18.229152] </TASK> [ 18.229167] [ 18.243787] Allocated by task 285: [ 18.246094] kasan_save_stack+0x45/0x70 [ 18.246288] kasan_save_track+0x18/0x40 [ 18.246591] kasan_save_alloc_info+0x3b/0x50 [ 18.247751] __kasan_kmalloc+0xb7/0xc0 [ 18.248016] __kmalloc_cache_noprof+0x189/0x420 [ 18.248198] kasan_atomics+0x95/0x310 [ 18.248713] kunit_try_run_case+0x1a5/0x480 [ 18.249188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.249430] kthread+0x337/0x6f0 [ 18.249581] ret_from_fork+0x41/0x80 [ 18.250093] ret_from_fork_asm+0x1a/0x30 [ 18.250573] [ 18.250682] The buggy address belongs to the object at ffff8881033b5600 [ 18.250682] which belongs to the cache kmalloc-64 of size 64 [ 18.251442] The buggy address is located 0 bytes to the right of [ 18.251442] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 18.252154] [ 18.252389] The buggy address belongs to the physical page: [ 18.252864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 18.253413] flags: 0x200000000000000(node=0|zone=2) [ 18.253951] page_type: f5(slab) [ 18.254444] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.254704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.255226] page dumped because: kasan: bad access detected [ 18.255578] [ 18.255901] Memory state around the buggy address: [ 18.256136] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.256343] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.256545] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.257204] ^ [ 18.257419] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.258107] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.258516] ================================================================== [ 16.389460] ================================================================== [ 16.390055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 16.391253] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.391516] [ 16.391673] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.391733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.391748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.391772] Call Trace: [ 16.391796] <TASK> [ 16.391818] dump_stack_lvl+0x73/0xb0 [ 16.391852] print_report+0xd1/0x650 [ 16.391880] ? __virt_addr_valid+0x1db/0x2d0 [ 16.391906] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.391931] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.391954] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.391977] kasan_report+0x141/0x180 [ 16.392000] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.392027] __asan_report_store4_noabort+0x1b/0x30 [ 16.392049] kasan_atomics_helper+0x4ba2/0x5450 [ 16.392073] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.392096] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.392117] ? ret_from_fork_asm+0x1a/0x30 [ 16.392139] ? kasan_atomics+0x152/0x310 [ 16.392163] kasan_atomics+0x1dc/0x310 [ 16.392183] ? __pfx_kasan_atomics+0x10/0x10 [ 16.392204] ? __pfx_read_tsc+0x10/0x10 [ 16.392223] ? ktime_get_ts64+0x86/0x230 [ 16.392250] kunit_try_run_case+0x1a5/0x480 [ 16.392276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.392299] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.392325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.392348] ? __kthread_parkme+0x82/0x180 [ 16.392372] ? preempt_count_sub+0x50/0x80 [ 16.392399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.392425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.392451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.392477] kthread+0x337/0x6f0 [ 16.392496] ? trace_preempt_on+0x20/0xc0 [ 16.392522] ? __pfx_kthread+0x10/0x10 [ 16.392542] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.393302] ? calculate_sigpending+0x7b/0xa0 [ 16.393338] ? __pfx_kthread+0x10/0x10 [ 16.393361] ret_from_fork+0x41/0x80 [ 16.393385] ? __pfx_kthread+0x10/0x10 [ 16.393406] ret_from_fork_asm+0x1a/0x30 [ 16.393437] </TASK> [ 16.393452] [ 16.404485] Allocated by task 285: [ 16.404903] kasan_save_stack+0x45/0x70 [ 16.405323] kasan_save_track+0x18/0x40 [ 16.405476] kasan_save_alloc_info+0x3b/0x50 [ 16.405706] __kasan_kmalloc+0xb7/0xc0 [ 16.406057] __kmalloc_cache_noprof+0x189/0x420 [ 16.406329] kasan_atomics+0x95/0x310 [ 16.406570] kunit_try_run_case+0x1a5/0x480 [ 16.406729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.406887] kthread+0x337/0x6f0 [ 16.406995] ret_from_fork+0x41/0x80 [ 16.407278] ret_from_fork_asm+0x1a/0x30 [ 16.407716] [ 16.408187] The buggy address belongs to the object at ffff8881033b5600 [ 16.408187] which belongs to the cache kmalloc-64 of size 64 [ 16.408832] The buggy address is located 0 bytes to the right of [ 16.408832] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.409469] [ 16.409609] The buggy address belongs to the physical page: [ 16.409872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.410254] flags: 0x200000000000000(node=0|zone=2) [ 16.410740] page_type: f5(slab) [ 16.410904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.411292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.411887] page dumped because: kasan: bad access detected [ 16.412163] [ 16.412245] Memory state around the buggy address: [ 16.412553] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.412859] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.413216] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.413554] ^ [ 16.413750] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.414160] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.414466] ================================================================== [ 16.919006] ================================================================== [ 16.919670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 16.920481] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.921174] [ 16.921664] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.921941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.921971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.922157] Call Trace: [ 16.922192] <TASK> [ 16.922226] dump_stack_lvl+0x73/0xb0 [ 16.922272] print_report+0xd1/0x650 [ 16.922300] ? __virt_addr_valid+0x1db/0x2d0 [ 16.922326] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.922350] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.922374] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.922397] kasan_report+0x141/0x180 [ 16.922421] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.922448] kasan_check_range+0x10c/0x1c0 [ 16.922470] __kasan_check_write+0x18/0x20 [ 16.922491] kasan_atomics_helper+0xb6a/0x5450 [ 16.922515] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.922540] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.922580] ? ret_from_fork_asm+0x1a/0x30 [ 16.922615] ? kasan_atomics+0x152/0x310 [ 16.922654] kasan_atomics+0x1dc/0x310 [ 16.922690] ? __pfx_kasan_atomics+0x10/0x10 [ 16.922725] ? __pfx_read_tsc+0x10/0x10 [ 16.922788] ? ktime_get_ts64+0x86/0x230 [ 16.922833] kunit_try_run_case+0x1a5/0x480 [ 16.922879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.922917] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.922958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.922996] ? __kthread_parkme+0x82/0x180 [ 16.923032] ? preempt_count_sub+0x50/0x80 [ 16.923075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.923104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.923141] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.923173] kthread+0x337/0x6f0 [ 16.923193] ? trace_preempt_on+0x20/0xc0 [ 16.923222] ? __pfx_kthread+0x10/0x10 [ 16.923244] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.923267] ? calculate_sigpending+0x7b/0xa0 [ 16.923293] ? __pfx_kthread+0x10/0x10 [ 16.923315] ret_from_fork+0x41/0x80 [ 16.923339] ? __pfx_kthread+0x10/0x10 [ 16.923358] ret_from_fork_asm+0x1a/0x30 [ 16.923390] </TASK> [ 16.923404] [ 16.937736] Allocated by task 285: [ 16.938125] kasan_save_stack+0x45/0x70 [ 16.938523] kasan_save_track+0x18/0x40 [ 16.938776] kasan_save_alloc_info+0x3b/0x50 [ 16.938978] __kasan_kmalloc+0xb7/0xc0 [ 16.939259] __kmalloc_cache_noprof+0x189/0x420 [ 16.939636] kasan_atomics+0x95/0x310 [ 16.940040] kunit_try_run_case+0x1a5/0x480 [ 16.940366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.940898] kthread+0x337/0x6f0 [ 16.941066] ret_from_fork+0x41/0x80 [ 16.941240] ret_from_fork_asm+0x1a/0x30 [ 16.941607] [ 16.941802] The buggy address belongs to the object at ffff8881033b5600 [ 16.941802] which belongs to the cache kmalloc-64 of size 64 [ 16.942580] The buggy address is located 0 bytes to the right of [ 16.942580] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.943522] [ 16.943803] The buggy address belongs to the physical page: [ 16.944275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.944716] flags: 0x200000000000000(node=0|zone=2) [ 16.944884] page_type: f5(slab) [ 16.945022] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.945632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.946161] page dumped because: kasan: bad access detected [ 16.946515] [ 16.946644] Memory state around the buggy address: [ 16.946848] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.948049] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.948953] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.949425] ^ [ 16.949630] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.950101] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.951054] ================================================================== [ 17.489242] ================================================================== [ 17.490196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 17.490660] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.491186] [ 17.491440] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.491548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.491594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.491641] Call Trace: [ 17.491698] <TASK> [ 17.491752] dump_stack_lvl+0x73/0xb0 [ 17.491825] print_report+0xd1/0x650 [ 17.491881] ? __virt_addr_valid+0x1db/0x2d0 [ 17.491927] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.491988] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.492059] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.492105] kasan_report+0x141/0x180 [ 17.492135] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.492165] __asan_report_store8_noabort+0x1b/0x30 [ 17.492189] kasan_atomics_helper+0x50d4/0x5450 [ 17.492216] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.492253] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.492289] ? ret_from_fork_asm+0x1a/0x30 [ 17.492331] ? kasan_atomics+0x152/0x310 [ 17.492375] kasan_atomics+0x1dc/0x310 [ 17.492425] ? __pfx_kasan_atomics+0x10/0x10 [ 17.492480] ? __pfx_read_tsc+0x10/0x10 [ 17.492525] ? ktime_get_ts64+0x86/0x230 [ 17.492583] kunit_try_run_case+0x1a5/0x480 [ 17.492636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.492676] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.492730] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.492790] ? __kthread_parkme+0x82/0x180 [ 17.492836] ? preempt_count_sub+0x50/0x80 [ 17.492884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.492921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.492947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.492972] kthread+0x337/0x6f0 [ 17.492991] ? trace_preempt_on+0x20/0xc0 [ 17.493018] ? __pfx_kthread+0x10/0x10 [ 17.493037] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.493059] ? calculate_sigpending+0x7b/0xa0 [ 17.493083] ? __pfx_kthread+0x10/0x10 [ 17.493104] ret_from_fork+0x41/0x80 [ 17.493125] ? __pfx_kthread+0x10/0x10 [ 17.493145] ret_from_fork_asm+0x1a/0x30 [ 17.493176] </TASK> [ 17.493191] [ 17.502765] Allocated by task 285: [ 17.503090] kasan_save_stack+0x45/0x70 [ 17.503482] kasan_save_track+0x18/0x40 [ 17.503828] kasan_save_alloc_info+0x3b/0x50 [ 17.504029] __kasan_kmalloc+0xb7/0xc0 [ 17.504377] __kmalloc_cache_noprof+0x189/0x420 [ 17.504782] kasan_atomics+0x95/0x310 [ 17.505007] kunit_try_run_case+0x1a5/0x480 [ 17.505322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.505540] kthread+0x337/0x6f0 [ 17.505821] ret_from_fork+0x41/0x80 [ 17.506193] ret_from_fork_asm+0x1a/0x30 [ 17.506440] [ 17.506553] The buggy address belongs to the object at ffff8881033b5600 [ 17.506553] which belongs to the cache kmalloc-64 of size 64 [ 17.507361] The buggy address is located 0 bytes to the right of [ 17.507361] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.508301] [ 17.508504] The buggy address belongs to the physical page: [ 17.508811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.509264] flags: 0x200000000000000(node=0|zone=2) [ 17.509616] page_type: f5(slab) [ 17.509921] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.510279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.510676] page dumped because: kasan: bad access detected [ 17.511016] [ 17.511226] Memory state around the buggy address: [ 17.511507] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.512179] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.512528] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.513049] ^ [ 17.513295] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.513729] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.514048] ================================================================== [ 17.317141] ================================================================== [ 17.318047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 17.318491] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.319129] [ 17.319373] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.319473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.319501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.319547] Call Trace: [ 17.319605] <TASK> [ 17.319656] dump_stack_lvl+0x73/0xb0 [ 17.319736] print_report+0xd1/0x650 [ 17.319793] ? __virt_addr_valid+0x1db/0x2d0 [ 17.319842] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.319893] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.319938] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.319979] kasan_report+0x141/0x180 [ 17.320025] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.320085] __asan_report_load4_noabort+0x18/0x20 [ 17.320131] kasan_atomics_helper+0x49e8/0x5450 [ 17.320196] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.320238] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.320262] ? ret_from_fork_asm+0x1a/0x30 [ 17.320286] ? kasan_atomics+0x152/0x310 [ 17.320311] kasan_atomics+0x1dc/0x310 [ 17.320332] ? __pfx_kasan_atomics+0x10/0x10 [ 17.320355] ? __pfx_read_tsc+0x10/0x10 [ 17.320392] ? ktime_get_ts64+0x86/0x230 [ 17.320431] kunit_try_run_case+0x1a5/0x480 [ 17.320460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.320483] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.320510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.320533] ? __kthread_parkme+0x82/0x180 [ 17.320570] ? preempt_count_sub+0x50/0x80 [ 17.320604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.320629] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.320660] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.320706] kthread+0x337/0x6f0 [ 17.320727] ? trace_preempt_on+0x20/0xc0 [ 17.320753] ? __pfx_kthread+0x10/0x10 [ 17.320773] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.320795] ? calculate_sigpending+0x7b/0xa0 [ 17.320819] ? __pfx_kthread+0x10/0x10 [ 17.320838] ret_from_fork+0x41/0x80 [ 17.320860] ? __pfx_kthread+0x10/0x10 [ 17.320880] ret_from_fork_asm+0x1a/0x30 [ 17.320909] </TASK> [ 17.320923] [ 17.330188] Allocated by task 285: [ 17.330517] kasan_save_stack+0x45/0x70 [ 17.330867] kasan_save_track+0x18/0x40 [ 17.331278] kasan_save_alloc_info+0x3b/0x50 [ 17.331617] __kasan_kmalloc+0xb7/0xc0 [ 17.331961] __kmalloc_cache_noprof+0x189/0x420 [ 17.332330] kasan_atomics+0x95/0x310 [ 17.332649] kunit_try_run_case+0x1a5/0x480 [ 17.332863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.333081] kthread+0x337/0x6f0 [ 17.333247] ret_from_fork+0x41/0x80 [ 17.333425] ret_from_fork_asm+0x1a/0x30 [ 17.333754] [ 17.333947] The buggy address belongs to the object at ffff8881033b5600 [ 17.333947] which belongs to the cache kmalloc-64 of size 64 [ 17.334789] The buggy address is located 0 bytes to the right of [ 17.334789] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.335640] [ 17.335866] The buggy address belongs to the physical page: [ 17.336236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.336644] flags: 0x200000000000000(node=0|zone=2) [ 17.336926] page_type: f5(slab) [ 17.337239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.337533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.338119] page dumped because: kasan: bad access detected [ 17.338548] [ 17.338750] Memory state around the buggy address: [ 17.338995] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.339285] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.339860] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.340398] ^ [ 17.342452] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.343109] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.343736] ================================================================== [ 17.034123] ================================================================== [ 17.034833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 17.035393] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.036072] [ 17.036340] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.036445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.036477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.036526] Call Trace: [ 17.036579] <TASK> [ 17.036624] dump_stack_lvl+0x73/0xb0 [ 17.036691] print_report+0xd1/0x650 [ 17.036745] ? __virt_addr_valid+0x1db/0x2d0 [ 17.036795] ? kasan_atomics_helper+0xde0/0x5450 [ 17.036843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.036895] ? kasan_atomics_helper+0xde0/0x5450 [ 17.036944] kasan_report+0x141/0x180 [ 17.036996] ? kasan_atomics_helper+0xde0/0x5450 [ 17.037056] kasan_check_range+0x10c/0x1c0 [ 17.037103] __kasan_check_write+0x18/0x20 [ 17.037162] kasan_atomics_helper+0xde0/0x5450 [ 17.037205] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.037249] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.037291] ? ret_from_fork_asm+0x1a/0x30 [ 17.037375] ? kasan_atomics+0x152/0x310 [ 17.037458] kasan_atomics+0x1dc/0x310 [ 17.037515] ? __pfx_kasan_atomics+0x10/0x10 [ 17.037572] ? __pfx_read_tsc+0x10/0x10 [ 17.037612] ? ktime_get_ts64+0x86/0x230 [ 17.037665] kunit_try_run_case+0x1a5/0x480 [ 17.037715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.037762] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.037808] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.037883] ? __kthread_parkme+0x82/0x180 [ 17.037941] ? preempt_count_sub+0x50/0x80 [ 17.038000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.038051] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.038103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.038147] kthread+0x337/0x6f0 [ 17.038167] ? trace_preempt_on+0x20/0xc0 [ 17.038193] ? __pfx_kthread+0x10/0x10 [ 17.038213] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.038234] ? calculate_sigpending+0x7b/0xa0 [ 17.038257] ? __pfx_kthread+0x10/0x10 [ 17.038276] ret_from_fork+0x41/0x80 [ 17.038300] ? __pfx_kthread+0x10/0x10 [ 17.038318] ret_from_fork_asm+0x1a/0x30 [ 17.038347] </TASK> [ 17.038361] [ 17.049551] Allocated by task 285: [ 17.049742] kasan_save_stack+0x45/0x70 [ 17.050050] kasan_save_track+0x18/0x40 [ 17.050326] kasan_save_alloc_info+0x3b/0x50 [ 17.050642] __kasan_kmalloc+0xb7/0xc0 [ 17.050931] __kmalloc_cache_noprof+0x189/0x420 [ 17.051198] kasan_atomics+0x95/0x310 [ 17.051452] kunit_try_run_case+0x1a5/0x480 [ 17.052874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.053192] kthread+0x337/0x6f0 [ 17.053339] ret_from_fork+0x41/0x80 [ 17.053838] ret_from_fork_asm+0x1a/0x30 [ 17.054172] [ 17.054270] The buggy address belongs to the object at ffff8881033b5600 [ 17.054270] which belongs to the cache kmalloc-64 of size 64 [ 17.055457] The buggy address is located 0 bytes to the right of [ 17.055457] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.056268] [ 17.056614] The buggy address belongs to the physical page: [ 17.057061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.057681] flags: 0x200000000000000(node=0|zone=2) [ 17.058124] page_type: f5(slab) [ 17.058356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.058714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.059010] page dumped because: kasan: bad access detected [ 17.059281] [ 17.059447] Memory state around the buggy address: [ 17.060287] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.060568] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.060808] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.061250] ^ [ 17.061804] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.062225] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.062459] ================================================================== [ 17.517909] ================================================================== [ 17.518358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 17.519534] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.520596] [ 17.520973] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.521080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.521107] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.521164] Call Trace: [ 17.521190] <TASK> [ 17.521218] dump_stack_lvl+0x73/0xb0 [ 17.521263] print_report+0xd1/0x650 [ 17.521295] ? __virt_addr_valid+0x1db/0x2d0 [ 17.521335] ? kasan_atomics_helper+0x151d/0x5450 [ 17.521364] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.521388] ? kasan_atomics_helper+0x151d/0x5450 [ 17.521413] kasan_report+0x141/0x180 [ 17.521438] ? kasan_atomics_helper+0x151d/0x5450 [ 17.521465] kasan_check_range+0x10c/0x1c0 [ 17.521487] __kasan_check_write+0x18/0x20 [ 17.521508] kasan_atomics_helper+0x151d/0x5450 [ 17.521532] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.521556] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.521610] ? ret_from_fork_asm+0x1a/0x30 [ 17.521678] ? kasan_atomics+0x152/0x310 [ 17.521731] kasan_atomics+0x1dc/0x310 [ 17.521759] ? __pfx_kasan_atomics+0x10/0x10 [ 17.521783] ? __pfx_read_tsc+0x10/0x10 [ 17.521807] ? ktime_get_ts64+0x86/0x230 [ 17.521836] kunit_try_run_case+0x1a5/0x480 [ 17.521865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.521889] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.521914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.521938] ? __kthread_parkme+0x82/0x180 [ 17.521962] ? preempt_count_sub+0x50/0x80 [ 17.521988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.522012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.522036] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.522060] kthread+0x337/0x6f0 [ 17.522078] ? trace_preempt_on+0x20/0xc0 [ 17.522103] ? __pfx_kthread+0x10/0x10 [ 17.522122] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.522144] ? calculate_sigpending+0x7b/0xa0 [ 17.522167] ? __pfx_kthread+0x10/0x10 [ 17.522185] ret_from_fork+0x41/0x80 [ 17.522208] ? __pfx_kthread+0x10/0x10 [ 17.522226] ret_from_fork_asm+0x1a/0x30 [ 17.522256] </TASK> [ 17.522270] [ 17.531871] Allocated by task 285: [ 17.532180] kasan_save_stack+0x45/0x70 [ 17.532508] kasan_save_track+0x18/0x40 [ 17.532763] kasan_save_alloc_info+0x3b/0x50 [ 17.532963] __kasan_kmalloc+0xb7/0xc0 [ 17.533141] __kmalloc_cache_noprof+0x189/0x420 [ 17.533342] kasan_atomics+0x95/0x310 [ 17.533520] kunit_try_run_case+0x1a5/0x480 [ 17.533892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.534306] kthread+0x337/0x6f0 [ 17.534628] ret_from_fork+0x41/0x80 [ 17.534955] ret_from_fork_asm+0x1a/0x30 [ 17.535286] [ 17.535466] The buggy address belongs to the object at ffff8881033b5600 [ 17.535466] which belongs to the cache kmalloc-64 of size 64 [ 17.536284] The buggy address is located 0 bytes to the right of [ 17.536284] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.536949] [ 17.537072] The buggy address belongs to the physical page: [ 17.537470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.538054] flags: 0x200000000000000(node=0|zone=2) [ 17.538267] page_type: f5(slab) [ 17.538595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.538958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.539254] page dumped because: kasan: bad access detected [ 17.539472] [ 17.539589] Memory state around the buggy address: [ 17.539977] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.540481] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.541015] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.541519] ^ [ 17.541880] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.542222] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.542686] ================================================================== [ 17.172620] ================================================================== [ 17.172947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 17.173323] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.175154] [ 17.177646] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.178287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.178324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.178373] Call Trace: [ 17.178420] <TASK> [ 17.178460] dump_stack_lvl+0x73/0xb0 [ 17.178534] print_report+0xd1/0x650 [ 17.178599] ? __virt_addr_valid+0x1db/0x2d0 [ 17.178648] ? kasan_atomics_helper+0x1079/0x5450 [ 17.178701] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.178753] ? kasan_atomics_helper+0x1079/0x5450 [ 17.178805] kasan_report+0x141/0x180 [ 17.178857] ? kasan_atomics_helper+0x1079/0x5450 [ 17.178909] kasan_check_range+0x10c/0x1c0 [ 17.178950] __kasan_check_write+0x18/0x20 [ 17.178986] kasan_atomics_helper+0x1079/0x5450 [ 17.179025] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.179067] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.179111] ? ret_from_fork_asm+0x1a/0x30 [ 17.179166] ? kasan_atomics+0x152/0x310 [ 17.179219] kasan_atomics+0x1dc/0x310 [ 17.179264] ? __pfx_kasan_atomics+0x10/0x10 [ 17.179311] ? __pfx_read_tsc+0x10/0x10 [ 17.179357] ? ktime_get_ts64+0x86/0x230 [ 17.179410] kunit_try_run_case+0x1a5/0x480 [ 17.179465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.179511] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.180639] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.180725] ? __kthread_parkme+0x82/0x180 [ 17.180765] ? preempt_count_sub+0x50/0x80 [ 17.180809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.180882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.180921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.180957] kthread+0x337/0x6f0 [ 17.180985] ? trace_preempt_on+0x20/0xc0 [ 17.181022] ? __pfx_kthread+0x10/0x10 [ 17.181053] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.181114] ? calculate_sigpending+0x7b/0xa0 [ 17.181155] ? __pfx_kthread+0x10/0x10 [ 17.181188] ret_from_fork+0x41/0x80 [ 17.181223] ? __pfx_kthread+0x10/0x10 [ 17.181254] ret_from_fork_asm+0x1a/0x30 [ 17.181310] </TASK> [ 17.181336] [ 17.194125] Allocated by task 285: [ 17.194463] kasan_save_stack+0x45/0x70 [ 17.194921] kasan_save_track+0x18/0x40 [ 17.195209] kasan_save_alloc_info+0x3b/0x50 [ 17.195586] __kasan_kmalloc+0xb7/0xc0 [ 17.195888] __kmalloc_cache_noprof+0x189/0x420 [ 17.196189] kasan_atomics+0x95/0x310 [ 17.196423] kunit_try_run_case+0x1a5/0x480 [ 17.196806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.197119] kthread+0x337/0x6f0 [ 17.197396] ret_from_fork+0x41/0x80 [ 17.197587] ret_from_fork_asm+0x1a/0x30 [ 17.197805] [ 17.197921] The buggy address belongs to the object at ffff8881033b5600 [ 17.197921] which belongs to the cache kmalloc-64 of size 64 [ 17.198612] The buggy address is located 0 bytes to the right of [ 17.198612] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.199543] [ 17.199805] The buggy address belongs to the physical page: [ 17.200218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.200829] flags: 0x200000000000000(node=0|zone=2) [ 17.201225] page_type: f5(slab) [ 17.201488] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.201842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.202383] page dumped because: kasan: bad access detected [ 17.202847] [ 17.203024] Memory state around the buggy address: [ 17.203410] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.203817] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.204297] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.204743] ^ [ 17.205085] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.205527] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.205965] ================================================================== [ 17.430292] ================================================================== [ 17.431708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 17.432812] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.433074] [ 17.433209] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.433300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.433325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.433360] Call Trace: [ 17.433397] <TASK> [ 17.433433] dump_stack_lvl+0x73/0xb0 [ 17.433495] print_report+0xd1/0x650 [ 17.433543] ? __virt_addr_valid+0x1db/0x2d0 [ 17.433609] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.433646] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.433683] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.433712] kasan_report+0x141/0x180 [ 17.433736] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.433763] __asan_report_load8_noabort+0x18/0x20 [ 17.433797] kasan_atomics_helper+0x4eae/0x5450 [ 17.433830] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.433853] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.433877] ? ret_from_fork_asm+0x1a/0x30 [ 17.433900] ? kasan_atomics+0x152/0x310 [ 17.433924] kasan_atomics+0x1dc/0x310 [ 17.433944] ? __pfx_kasan_atomics+0x10/0x10 [ 17.433965] ? __pfx_read_tsc+0x10/0x10 [ 17.433987] ? ktime_get_ts64+0x86/0x230 [ 17.434014] kunit_try_run_case+0x1a5/0x480 [ 17.434041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.434064] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.434089] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.434112] ? __kthread_parkme+0x82/0x180 [ 17.434135] ? preempt_count_sub+0x50/0x80 [ 17.434162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.434187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.434211] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.434234] kthread+0x337/0x6f0 [ 17.434252] ? trace_preempt_on+0x20/0xc0 [ 17.434277] ? __pfx_kthread+0x10/0x10 [ 17.434295] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.434316] ? calculate_sigpending+0x7b/0xa0 [ 17.434339] ? __pfx_kthread+0x10/0x10 [ 17.434358] ret_from_fork+0x41/0x80 [ 17.434380] ? __pfx_kthread+0x10/0x10 [ 17.434398] ret_from_fork_asm+0x1a/0x30 [ 17.434428] </TASK> [ 17.434442] [ 17.448547] Allocated by task 285: [ 17.449423] kasan_save_stack+0x45/0x70 [ 17.449977] kasan_save_track+0x18/0x40 [ 17.450285] kasan_save_alloc_info+0x3b/0x50 [ 17.450451] __kasan_kmalloc+0xb7/0xc0 [ 17.450748] __kmalloc_cache_noprof+0x189/0x420 [ 17.451073] kasan_atomics+0x95/0x310 [ 17.451263] kunit_try_run_case+0x1a5/0x480 [ 17.451646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.452022] kthread+0x337/0x6f0 [ 17.452317] ret_from_fork+0x41/0x80 [ 17.452516] ret_from_fork_asm+0x1a/0x30 [ 17.452929] [ 17.453049] The buggy address belongs to the object at ffff8881033b5600 [ 17.453049] which belongs to the cache kmalloc-64 of size 64 [ 17.453610] The buggy address is located 0 bytes to the right of [ 17.453610] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.454319] [ 17.454442] The buggy address belongs to the physical page: [ 17.454881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.455281] flags: 0x200000000000000(node=0|zone=2) [ 17.455596] page_type: f5(slab) [ 17.455949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.456435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.457038] page dumped because: kasan: bad access detected [ 17.457258] [ 17.457373] Memory state around the buggy address: [ 17.457761] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.458498] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.458786] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.459143] ^ [ 17.459585] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.460066] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.460539] ================================================================== [ 17.544072] ================================================================== [ 17.544456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 17.545013] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.545330] [ 17.545567] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.545704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.545734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.545779] Call Trace: [ 17.545823] <TASK> [ 17.545857] dump_stack_lvl+0x73/0xb0 [ 17.545916] print_report+0xd1/0x650 [ 17.545962] ? __virt_addr_valid+0x1db/0x2d0 [ 17.546025] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.546071] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.546117] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.546161] kasan_report+0x141/0x180 [ 17.546210] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.546266] kasan_check_range+0x10c/0x1c0 [ 17.546313] __kasan_check_write+0x18/0x20 [ 17.546357] kasan_atomics_helper+0x15b6/0x5450 [ 17.546408] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.546458] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.546506] ? ret_from_fork_asm+0x1a/0x30 [ 17.546552] ? kasan_atomics+0x152/0x310 [ 17.546606] kasan_atomics+0x1dc/0x310 [ 17.546645] ? __pfx_kasan_atomics+0x10/0x10 [ 17.546714] ? __pfx_read_tsc+0x10/0x10 [ 17.546759] ? ktime_get_ts64+0x86/0x230 [ 17.546812] kunit_try_run_case+0x1a5/0x480 [ 17.546860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.546904] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.546954] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.547002] ? __kthread_parkme+0x82/0x180 [ 17.547048] ? preempt_count_sub+0x50/0x80 [ 17.547092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.547147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.547198] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.547247] kthread+0x337/0x6f0 [ 17.547288] ? trace_preempt_on+0x20/0xc0 [ 17.547343] ? __pfx_kthread+0x10/0x10 [ 17.547387] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.547433] ? calculate_sigpending+0x7b/0xa0 [ 17.547482] ? __pfx_kthread+0x10/0x10 [ 17.547524] ret_from_fork+0x41/0x80 [ 17.547581] ? __pfx_kthread+0x10/0x10 [ 17.547624] ret_from_fork_asm+0x1a/0x30 [ 17.547689] </TASK> [ 17.547715] [ 17.558590] Allocated by task 285: [ 17.559204] kasan_save_stack+0x45/0x70 [ 17.559429] kasan_save_track+0x18/0x40 [ 17.559588] kasan_save_alloc_info+0x3b/0x50 [ 17.560162] __kasan_kmalloc+0xb7/0xc0 [ 17.560572] __kmalloc_cache_noprof+0x189/0x420 [ 17.561126] kasan_atomics+0x95/0x310 [ 17.561320] kunit_try_run_case+0x1a5/0x480 [ 17.561624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.561995] kthread+0x337/0x6f0 [ 17.562298] ret_from_fork+0x41/0x80 [ 17.562514] ret_from_fork_asm+0x1a/0x30 [ 17.562924] [ 17.563061] The buggy address belongs to the object at ffff8881033b5600 [ 17.563061] which belongs to the cache kmalloc-64 of size 64 [ 17.563789] The buggy address is located 0 bytes to the right of [ 17.563789] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.564565] [ 17.564756] The buggy address belongs to the physical page: [ 17.565059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.565569] flags: 0x200000000000000(node=0|zone=2) [ 17.565975] page_type: f5(slab) [ 17.566271] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.566895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.567153] page dumped because: kasan: bad access detected [ 17.567327] [ 17.567408] Memory state around the buggy address: [ 17.567576] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.567813] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.568044] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.568247] ^ [ 17.568402] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.569536] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.570644] ================================================================== [ 17.840007] ================================================================== [ 17.840462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 17.841113] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.841411] [ 17.841649] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.841764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.841804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.841861] Call Trace: [ 17.841908] <TASK> [ 17.841947] dump_stack_lvl+0x73/0xb0 [ 17.842011] print_report+0xd1/0x650 [ 17.842069] ? __virt_addr_valid+0x1db/0x2d0 [ 17.842132] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.842176] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.842221] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.842273] kasan_report+0x141/0x180 [ 17.842335] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.842385] kasan_check_range+0x10c/0x1c0 [ 17.842410] __kasan_check_write+0x18/0x20 [ 17.842432] kasan_atomics_helper+0x1c18/0x5450 [ 17.842457] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.842481] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.842504] ? ret_from_fork_asm+0x1a/0x30 [ 17.842539] ? kasan_atomics+0x152/0x310 [ 17.842591] kasan_atomics+0x1dc/0x310 [ 17.842633] ? __pfx_kasan_atomics+0x10/0x10 [ 17.842672] ? __pfx_read_tsc+0x10/0x10 [ 17.842716] ? ktime_get_ts64+0x86/0x230 [ 17.842771] kunit_try_run_case+0x1a5/0x480 [ 17.842839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.842886] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.842937] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.842981] ? __kthread_parkme+0x82/0x180 [ 17.843034] ? preempt_count_sub+0x50/0x80 [ 17.843102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.843162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.843196] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.843223] kthread+0x337/0x6f0 [ 17.843244] ? trace_preempt_on+0x20/0xc0 [ 17.843272] ? __pfx_kthread+0x10/0x10 [ 17.843294] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.843316] ? calculate_sigpending+0x7b/0xa0 [ 17.843339] ? __pfx_kthread+0x10/0x10 [ 17.843359] ret_from_fork+0x41/0x80 [ 17.843380] ? __pfx_kthread+0x10/0x10 [ 17.843400] ret_from_fork_asm+0x1a/0x30 [ 17.843430] </TASK> [ 17.843444] [ 17.852992] Allocated by task 285: [ 17.853223] kasan_save_stack+0x45/0x70 [ 17.853430] kasan_save_track+0x18/0x40 [ 17.853657] kasan_save_alloc_info+0x3b/0x50 [ 17.853994] __kasan_kmalloc+0xb7/0xc0 [ 17.854406] __kmalloc_cache_noprof+0x189/0x420 [ 17.854793] kasan_atomics+0x95/0x310 [ 17.855089] kunit_try_run_case+0x1a5/0x480 [ 17.855321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.855538] kthread+0x337/0x6f0 [ 17.855701] ret_from_fork+0x41/0x80 [ 17.855874] ret_from_fork_asm+0x1a/0x30 [ 17.856054] [ 17.856163] The buggy address belongs to the object at ffff8881033b5600 [ 17.856163] which belongs to the cache kmalloc-64 of size 64 [ 17.857124] The buggy address is located 0 bytes to the right of [ 17.857124] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.858081] [ 17.858259] The buggy address belongs to the physical page: [ 17.858664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.859054] flags: 0x200000000000000(node=0|zone=2) [ 17.859388] page_type: f5(slab) [ 17.859710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.859987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.860251] page dumped because: kasan: bad access detected [ 17.860452] [ 17.860570] Memory state around the buggy address: [ 17.860904] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.861501] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.862184] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.862708] ^ [ 17.862955] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.863217] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.863457] ================================================================== [ 17.629300] ================================================================== [ 17.629862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 17.630052] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.630190] [ 17.630271] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.630326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.630341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.630366] Call Trace: [ 17.630393] <TASK> [ 17.630417] dump_stack_lvl+0x73/0xb0 [ 17.630450] print_report+0xd1/0x650 [ 17.630476] ? __virt_addr_valid+0x1db/0x2d0 [ 17.630499] ? kasan_atomics_helper+0x177f/0x5450 [ 17.630522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.630545] ? kasan_atomics_helper+0x177f/0x5450 [ 17.630583] kasan_report+0x141/0x180 [ 17.630609] ? kasan_atomics_helper+0x177f/0x5450 [ 17.630638] kasan_check_range+0x10c/0x1c0 [ 17.630667] __kasan_check_write+0x18/0x20 [ 17.630696] kasan_atomics_helper+0x177f/0x5450 [ 17.630722] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.630747] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.630770] ? ret_from_fork_asm+0x1a/0x30 [ 17.630794] ? kasan_atomics+0x152/0x310 [ 17.630819] kasan_atomics+0x1dc/0x310 [ 17.630840] ? __pfx_kasan_atomics+0x10/0x10 [ 17.630863] ? __pfx_read_tsc+0x10/0x10 [ 17.630885] ? ktime_get_ts64+0x86/0x230 [ 17.630914] kunit_try_run_case+0x1a5/0x480 [ 17.630942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.630966] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.630993] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.631017] ? __kthread_parkme+0x82/0x180 [ 17.631042] ? preempt_count_sub+0x50/0x80 [ 17.631069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.631096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.631120] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.631160] kthread+0x337/0x6f0 [ 17.631183] ? trace_preempt_on+0x20/0xc0 [ 17.631212] ? __pfx_kthread+0x10/0x10 [ 17.631233] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.631257] ? calculate_sigpending+0x7b/0xa0 [ 17.631283] ? __pfx_kthread+0x10/0x10 [ 17.631304] ret_from_fork+0x41/0x80 [ 17.631327] ? __pfx_kthread+0x10/0x10 [ 17.631347] ret_from_fork_asm+0x1a/0x30 [ 17.631379] </TASK> [ 17.631394] [ 17.644598] Allocated by task 285: [ 17.644934] kasan_save_stack+0x45/0x70 [ 17.645128] kasan_save_track+0x18/0x40 [ 17.645276] kasan_save_alloc_info+0x3b/0x50 [ 17.645433] __kasan_kmalloc+0xb7/0xc0 [ 17.645583] __kmalloc_cache_noprof+0x189/0x420 [ 17.646189] kasan_atomics+0x95/0x310 [ 17.646406] kunit_try_run_case+0x1a5/0x480 [ 17.646628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.647265] kthread+0x337/0x6f0 [ 17.647488] ret_from_fork+0x41/0x80 [ 17.648023] ret_from_fork_asm+0x1a/0x30 [ 17.648371] [ 17.648485] The buggy address belongs to the object at ffff8881033b5600 [ 17.648485] which belongs to the cache kmalloc-64 of size 64 [ 17.649302] The buggy address is located 0 bytes to the right of [ 17.649302] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.649733] [ 17.649863] The buggy address belongs to the physical page: [ 17.650297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.650983] flags: 0x200000000000000(node=0|zone=2) [ 17.651264] page_type: f5(slab) [ 17.651543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.652314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.652998] page dumped because: kasan: bad access detected [ 17.653368] [ 17.653476] Memory state around the buggy address: [ 17.653694] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.654225] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.654858] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.655516] ^ [ 17.655923] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.656219] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.657115] ================================================================== [ 18.115266] ================================================================== [ 18.115977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 18.116588] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 18.117157] [ 18.117401] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 18.117504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.117536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.117594] Call Trace: [ 18.117640] <TASK> [ 18.117683] dump_stack_lvl+0x73/0xb0 [ 18.117753] print_report+0xd1/0x650 [ 18.117806] ? __virt_addr_valid+0x1db/0x2d0 [ 18.117856] ? kasan_atomics_helper+0x20c8/0x5450 [ 18.117904] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.117954] ? kasan_atomics_helper+0x20c8/0x5450 [ 18.118009] kasan_report+0x141/0x180 [ 18.118053] ? kasan_atomics_helper+0x20c8/0x5450 [ 18.118104] kasan_check_range+0x10c/0x1c0 [ 18.118153] __kasan_check_write+0x18/0x20 [ 18.118199] kasan_atomics_helper+0x20c8/0x5450 [ 18.118266] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.118315] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.118367] ? ret_from_fork_asm+0x1a/0x30 [ 18.118425] ? kasan_atomics+0x152/0x310 [ 18.118478] kasan_atomics+0x1dc/0x310 [ 18.118523] ? __pfx_kasan_atomics+0x10/0x10 [ 18.118583] ? __pfx_read_tsc+0x10/0x10 [ 18.118632] ? ktime_get_ts64+0x86/0x230 [ 18.118685] kunit_try_run_case+0x1a5/0x480 [ 18.118740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.118779] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.118829] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.118879] ? __kthread_parkme+0x82/0x180 [ 18.118939] ? preempt_count_sub+0x50/0x80 [ 18.119011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.119067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.119124] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.119183] kthread+0x337/0x6f0 [ 18.119228] ? trace_preempt_on+0x20/0xc0 [ 18.119286] ? __pfx_kthread+0x10/0x10 [ 18.119331] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.119379] ? calculate_sigpending+0x7b/0xa0 [ 18.119429] ? __pfx_kthread+0x10/0x10 [ 18.119472] ret_from_fork+0x41/0x80 [ 18.119520] ? __pfx_kthread+0x10/0x10 [ 18.119574] ret_from_fork_asm+0x1a/0x30 [ 18.119642] </TASK> [ 18.119671] [ 18.130403] Allocated by task 285: [ 18.130688] kasan_save_stack+0x45/0x70 [ 18.131083] kasan_save_track+0x18/0x40 [ 18.131441] kasan_save_alloc_info+0x3b/0x50 [ 18.131801] __kasan_kmalloc+0xb7/0xc0 [ 18.132091] __kmalloc_cache_noprof+0x189/0x420 [ 18.132315] kasan_atomics+0x95/0x310 [ 18.132645] kunit_try_run_case+0x1a5/0x480 [ 18.132985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.133270] kthread+0x337/0x6f0 [ 18.133580] ret_from_fork+0x41/0x80 [ 18.133865] ret_from_fork_asm+0x1a/0x30 [ 18.134098] [ 18.134289] The buggy address belongs to the object at ffff8881033b5600 [ 18.134289] which belongs to the cache kmalloc-64 of size 64 [ 18.134910] The buggy address is located 0 bytes to the right of [ 18.134910] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 18.135331] [ 18.135457] The buggy address belongs to the physical page: [ 18.135870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 18.136424] flags: 0x200000000000000(node=0|zone=2) [ 18.136880] page_type: f5(slab) [ 18.137179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.137697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.138223] page dumped because: kasan: bad access detected [ 18.138629] [ 18.138800] Memory state around the buggy address: [ 18.139052] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.139497] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.139910] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.140177] ^ [ 18.140380] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.140749] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.141280] ================================================================== [ 16.748270] ================================================================== [ 16.748855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 16.750293] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.750598] [ 16.751255] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.751338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.751365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.751407] Call Trace: [ 16.751450] <TASK> [ 16.751491] dump_stack_lvl+0x73/0xb0 [ 16.751712] print_report+0xd1/0x650 [ 16.751762] ? __virt_addr_valid+0x1db/0x2d0 [ 16.751792] ? kasan_atomics_helper+0x860/0x5450 [ 16.751819] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.751846] ? kasan_atomics_helper+0x860/0x5450 [ 16.751872] kasan_report+0x141/0x180 [ 16.751898] ? kasan_atomics_helper+0x860/0x5450 [ 16.751928] kasan_check_range+0x10c/0x1c0 [ 16.751954] __kasan_check_write+0x18/0x20 [ 16.751977] kasan_atomics_helper+0x860/0x5450 [ 16.752004] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.752029] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.752054] ? ret_from_fork_asm+0x1a/0x30 [ 16.752080] ? kasan_atomics+0x152/0x310 [ 16.752105] kasan_atomics+0x1dc/0x310 [ 16.752128] ? __pfx_kasan_atomics+0x10/0x10 [ 16.752151] ? __pfx_read_tsc+0x10/0x10 [ 16.752175] ? ktime_get_ts64+0x86/0x230 [ 16.752203] kunit_try_run_case+0x1a5/0x480 [ 16.752231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.752256] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.752282] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.752307] ? __kthread_parkme+0x82/0x180 [ 16.752330] ? preempt_count_sub+0x50/0x80 [ 16.752358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.752383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.752407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.752432] kthread+0x337/0x6f0 [ 16.752451] ? trace_preempt_on+0x20/0xc0 [ 16.752476] ? __pfx_kthread+0x10/0x10 [ 16.752497] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.752519] ? calculate_sigpending+0x7b/0xa0 [ 16.752542] ? __pfx_kthread+0x10/0x10 [ 16.752691] ret_from_fork+0x41/0x80 [ 16.752723] ? __pfx_kthread+0x10/0x10 [ 16.752744] ret_from_fork_asm+0x1a/0x30 [ 16.752774] </TASK> [ 16.752790] [ 16.767505] Allocated by task 285: [ 16.767936] kasan_save_stack+0x45/0x70 [ 16.768359] kasan_save_track+0x18/0x40 [ 16.768709] kasan_save_alloc_info+0x3b/0x50 [ 16.769107] __kasan_kmalloc+0xb7/0xc0 [ 16.769387] __kmalloc_cache_noprof+0x189/0x420 [ 16.769659] kasan_atomics+0x95/0x310 [ 16.770001] kunit_try_run_case+0x1a5/0x480 [ 16.770409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.771079] kthread+0x337/0x6f0 [ 16.771474] ret_from_fork+0x41/0x80 [ 16.771864] ret_from_fork_asm+0x1a/0x30 [ 16.772091] [ 16.772245] The buggy address belongs to the object at ffff8881033b5600 [ 16.772245] which belongs to the cache kmalloc-64 of size 64 [ 16.773156] The buggy address is located 0 bytes to the right of [ 16.773156] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.773862] [ 16.774048] The buggy address belongs to the physical page: [ 16.774419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.774928] flags: 0x200000000000000(node=0|zone=2) [ 16.775313] page_type: f5(slab) [ 16.775578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.776229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.776977] page dumped because: kasan: bad access detected [ 16.777365] [ 16.777621] Memory state around the buggy address: [ 16.777971] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.778531] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.779034] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.779414] ^ [ 16.779754] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.780181] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.780434] ================================================================== [ 17.259414] ================================================================== [ 17.261108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 17.261641] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.262882] [ 17.263034] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.263096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.263111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.263156] Call Trace: [ 17.263199] <TASK> [ 17.263242] dump_stack_lvl+0x73/0xb0 [ 17.263458] print_report+0xd1/0x650 [ 17.263499] ? __virt_addr_valid+0x1db/0x2d0 [ 17.263527] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.263552] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.263600] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.263627] kasan_report+0x141/0x180 [ 17.263659] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.263716] __asan_report_load4_noabort+0x18/0x20 [ 17.263743] kasan_atomics_helper+0x4a02/0x5450 [ 17.263771] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.263797] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.263823] ? ret_from_fork_asm+0x1a/0x30 [ 17.263848] ? kasan_atomics+0x152/0x310 [ 17.263874] kasan_atomics+0x1dc/0x310 [ 17.263897] ? __pfx_kasan_atomics+0x10/0x10 [ 17.263921] ? __pfx_read_tsc+0x10/0x10 [ 17.263945] ? ktime_get_ts64+0x86/0x230 [ 17.263975] kunit_try_run_case+0x1a5/0x480 [ 17.264001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.264025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.264049] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.264072] ? __kthread_parkme+0x82/0x180 [ 17.264095] ? preempt_count_sub+0x50/0x80 [ 17.264121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.264146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.264169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.264193] kthread+0x337/0x6f0 [ 17.264211] ? trace_preempt_on+0x20/0xc0 [ 17.264236] ? __pfx_kthread+0x10/0x10 [ 17.264254] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.264276] ? calculate_sigpending+0x7b/0xa0 [ 17.264298] ? __pfx_kthread+0x10/0x10 [ 17.264317] ret_from_fork+0x41/0x80 [ 17.264340] ? __pfx_kthread+0x10/0x10 [ 17.264359] ret_from_fork_asm+0x1a/0x30 [ 17.264388] </TASK> [ 17.264401] [ 17.275067] Allocated by task 285: [ 17.275411] kasan_save_stack+0x45/0x70 [ 17.276063] kasan_save_track+0x18/0x40 [ 17.276303] kasan_save_alloc_info+0x3b/0x50 [ 17.276565] __kasan_kmalloc+0xb7/0xc0 [ 17.276801] __kmalloc_cache_noprof+0x189/0x420 [ 17.277144] kasan_atomics+0x95/0x310 [ 17.277425] kunit_try_run_case+0x1a5/0x480 [ 17.277845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.278136] kthread+0x337/0x6f0 [ 17.278305] ret_from_fork+0x41/0x80 [ 17.278591] ret_from_fork_asm+0x1a/0x30 [ 17.279006] [ 17.279235] The buggy address belongs to the object at ffff8881033b5600 [ 17.279235] which belongs to the cache kmalloc-64 of size 64 [ 17.280048] The buggy address is located 0 bytes to the right of [ 17.280048] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.280779] [ 17.280989] The buggy address belongs to the physical page: [ 17.281321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.281834] flags: 0x200000000000000(node=0|zone=2) [ 17.282106] page_type: f5(slab) [ 17.282401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.282905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.283356] page dumped because: kasan: bad access detected [ 17.283623] [ 17.283784] Memory state around the buggy address: [ 17.284091] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.284367] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.284708] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.285048] ^ [ 17.285253] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.285500] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.286039] ================================================================== [ 17.571604] ================================================================== [ 17.572122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 17.572713] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.573197] [ 17.573431] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.573588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.573616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.573657] Call Trace: [ 17.573720] <TASK> [ 17.573784] dump_stack_lvl+0x73/0xb0 [ 17.573871] print_report+0xd1/0x650 [ 17.573935] ? __virt_addr_valid+0x1db/0x2d0 [ 17.573985] ? kasan_atomics_helper+0x164f/0x5450 [ 17.574033] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.574083] ? kasan_atomics_helper+0x164f/0x5450 [ 17.574128] kasan_report+0x141/0x180 [ 17.574185] ? kasan_atomics_helper+0x164f/0x5450 [ 17.574258] kasan_check_range+0x10c/0x1c0 [ 17.574319] __kasan_check_write+0x18/0x20 [ 17.574356] kasan_atomics_helper+0x164f/0x5450 [ 17.574427] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.574494] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.574550] ? ret_from_fork_asm+0x1a/0x30 [ 17.574612] ? kasan_atomics+0x152/0x310 [ 17.574671] kasan_atomics+0x1dc/0x310 [ 17.574728] ? __pfx_kasan_atomics+0x10/0x10 [ 17.574775] ? __pfx_read_tsc+0x10/0x10 [ 17.574827] ? ktime_get_ts64+0x86/0x230 [ 17.574894] kunit_try_run_case+0x1a5/0x480 [ 17.574966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.575015] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.575067] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.575093] ? __kthread_parkme+0x82/0x180 [ 17.575118] ? preempt_count_sub+0x50/0x80 [ 17.575161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.575188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.575213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.575239] kthread+0x337/0x6f0 [ 17.575257] ? trace_preempt_on+0x20/0xc0 [ 17.575283] ? __pfx_kthread+0x10/0x10 [ 17.575302] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.575325] ? calculate_sigpending+0x7b/0xa0 [ 17.575349] ? __pfx_kthread+0x10/0x10 [ 17.575368] ret_from_fork+0x41/0x80 [ 17.575390] ? __pfx_kthread+0x10/0x10 [ 17.575409] ret_from_fork_asm+0x1a/0x30 [ 17.575440] </TASK> [ 17.575455] [ 17.586642] Allocated by task 285: [ 17.587313] kasan_save_stack+0x45/0x70 [ 17.587519] kasan_save_track+0x18/0x40 [ 17.588128] kasan_save_alloc_info+0x3b/0x50 [ 17.588592] __kasan_kmalloc+0xb7/0xc0 [ 17.589076] __kmalloc_cache_noprof+0x189/0x420 [ 17.589505] kasan_atomics+0x95/0x310 [ 17.589773] kunit_try_run_case+0x1a5/0x480 [ 17.590079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.590376] kthread+0x337/0x6f0 [ 17.590645] ret_from_fork+0x41/0x80 [ 17.590963] ret_from_fork_asm+0x1a/0x30 [ 17.591323] [ 17.591455] The buggy address belongs to the object at ffff8881033b5600 [ 17.591455] which belongs to the cache kmalloc-64 of size 64 [ 17.592080] The buggy address is located 0 bytes to the right of [ 17.592080] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.592686] [ 17.592869] The buggy address belongs to the physical page: [ 17.593412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.593853] flags: 0x200000000000000(node=0|zone=2) [ 17.594080] page_type: f5(slab) [ 17.594368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.594748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.595294] page dumped because: kasan: bad access detected [ 17.595953] [ 17.596049] Memory state around the buggy address: [ 17.596218] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.596438] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.597469] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.597834] ^ [ 17.598190] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.598779] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.599221] ================================================================== [ 16.813208] ================================================================== [ 16.813811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 16.815282] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.816355] [ 16.816519] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.816611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.816847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.816897] Call Trace: [ 16.816954] <TASK> [ 16.817002] dump_stack_lvl+0x73/0xb0 [ 16.817069] print_report+0xd1/0x650 [ 16.817101] ? __virt_addr_valid+0x1db/0x2d0 [ 16.817129] ? kasan_atomics_helper+0x992/0x5450 [ 16.817155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.817182] ? kasan_atomics_helper+0x992/0x5450 [ 16.817208] kasan_report+0x141/0x180 [ 16.817234] ? kasan_atomics_helper+0x992/0x5450 [ 16.817263] kasan_check_range+0x10c/0x1c0 [ 16.817287] __kasan_check_write+0x18/0x20 [ 16.817310] kasan_atomics_helper+0x992/0x5450 [ 16.817336] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.817362] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.817387] ? ret_from_fork_asm+0x1a/0x30 [ 16.817412] ? kasan_atomics+0x152/0x310 [ 16.817438] kasan_atomics+0x1dc/0x310 [ 16.817462] ? __pfx_kasan_atomics+0x10/0x10 [ 16.817484] ? __pfx_read_tsc+0x10/0x10 [ 16.817506] ? ktime_get_ts64+0x86/0x230 [ 16.817534] kunit_try_run_case+0x1a5/0x480 [ 16.817574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.817604] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.817645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.817684] ? __kthread_parkme+0x82/0x180 [ 16.817721] ? preempt_count_sub+0x50/0x80 [ 16.817765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.817804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.817844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.817881] kthread+0x337/0x6f0 [ 16.817911] ? trace_preempt_on+0x20/0xc0 [ 16.817950] ? __pfx_kthread+0x10/0x10 [ 16.817982] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.818020] ? calculate_sigpending+0x7b/0xa0 [ 16.818057] ? __pfx_kthread+0x10/0x10 [ 16.818087] ret_from_fork+0x41/0x80 [ 16.818114] ? __pfx_kthread+0x10/0x10 [ 16.818134] ret_from_fork_asm+0x1a/0x30 [ 16.818167] </TASK> [ 16.818182] [ 16.828645] Allocated by task 285: [ 16.828991] kasan_save_stack+0x45/0x70 [ 16.829211] kasan_save_track+0x18/0x40 [ 16.829491] kasan_save_alloc_info+0x3b/0x50 [ 16.829812] __kasan_kmalloc+0xb7/0xc0 [ 16.830044] __kmalloc_cache_noprof+0x189/0x420 [ 16.830247] kasan_atomics+0x95/0x310 [ 16.830425] kunit_try_run_case+0x1a5/0x480 [ 16.830756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.831271] kthread+0x337/0x6f0 [ 16.831616] ret_from_fork+0x41/0x80 [ 16.832033] ret_from_fork_asm+0x1a/0x30 [ 16.832237] [ 16.832352] The buggy address belongs to the object at ffff8881033b5600 [ 16.832352] which belongs to the cache kmalloc-64 of size 64 [ 16.832807] The buggy address is located 0 bytes to the right of [ 16.832807] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.833217] [ 16.833331] The buggy address belongs to the physical page: [ 16.833731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.834626] flags: 0x200000000000000(node=0|zone=2) [ 16.835029] page_type: f5(slab) [ 16.835318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.835861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.836390] page dumped because: kasan: bad access detected [ 16.837492] [ 16.837834] Memory state around the buggy address: [ 16.838201] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.838947] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.839252] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.839496] ^ [ 16.840474] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.841597] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.842334] ================================================================== [ 16.368973] ================================================================== [ 16.369470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 16.370270] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.370817] [ 16.370922] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.370981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.370995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.371018] Call Trace: [ 16.371034] <TASK> [ 16.371054] dump_stack_lvl+0x73/0xb0 [ 16.371090] print_report+0xd1/0x650 [ 16.371118] ? __virt_addr_valid+0x1db/0x2d0 [ 16.371154] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.371180] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.371308] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.371338] kasan_report+0x141/0x180 [ 16.371366] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.371392] __asan_report_load4_noabort+0x18/0x20 [ 16.371413] kasan_atomics_helper+0x4bbc/0x5450 [ 16.371436] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.371459] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.371480] ? ret_from_fork_asm+0x1a/0x30 [ 16.371503] ? kasan_atomics+0x152/0x310 [ 16.371525] kasan_atomics+0x1dc/0x310 [ 16.371544] ? __pfx_kasan_atomics+0x10/0x10 [ 16.371580] ? __pfx_read_tsc+0x10/0x10 [ 16.371615] ? ktime_get_ts64+0x86/0x230 [ 16.371646] kunit_try_run_case+0x1a5/0x480 [ 16.371703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.371726] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.371751] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.371775] ? __kthread_parkme+0x82/0x180 [ 16.371799] ? preempt_count_sub+0x50/0x80 [ 16.371825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.371848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.371871] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.371894] kthread+0x337/0x6f0 [ 16.371910] ? trace_preempt_on+0x20/0xc0 [ 16.371936] ? __pfx_kthread+0x10/0x10 [ 16.371954] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.371975] ? calculate_sigpending+0x7b/0xa0 [ 16.371996] ? __pfx_kthread+0x10/0x10 [ 16.372015] ret_from_fork+0x41/0x80 [ 16.372034] ? __pfx_kthread+0x10/0x10 [ 16.372052] ret_from_fork_asm+0x1a/0x30 [ 16.372080] </TASK> [ 16.372093] [ 16.381181] Allocated by task 285: [ 16.381292] kasan_save_stack+0x45/0x70 [ 16.381405] kasan_save_track+0x18/0x40 [ 16.381492] kasan_save_alloc_info+0x3b/0x50 [ 16.381606] __kasan_kmalloc+0xb7/0xc0 [ 16.381695] __kmalloc_cache_noprof+0x189/0x420 [ 16.381790] kasan_atomics+0x95/0x310 [ 16.381872] kunit_try_run_case+0x1a5/0x480 [ 16.381965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.382072] kthread+0x337/0x6f0 [ 16.382147] ret_from_fork+0x41/0x80 [ 16.382236] ret_from_fork_asm+0x1a/0x30 [ 16.382324] [ 16.382376] The buggy address belongs to the object at ffff8881033b5600 [ 16.382376] which belongs to the cache kmalloc-64 of size 64 [ 16.382852] The buggy address is located 0 bytes to the right of [ 16.382852] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.383178] [ 16.383242] The buggy address belongs to the physical page: [ 16.384504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.385081] flags: 0x200000000000000(node=0|zone=2) [ 16.385837] page_type: f5(slab) [ 16.386024] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.386254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.386390] page dumped because: kasan: bad access detected [ 16.386496] [ 16.386545] Memory state around the buggy address: [ 16.387106] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.387442] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.387759] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.388224] ^ [ 16.388334] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.388466] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.388749] ================================================================== [ 16.542173] ================================================================== [ 16.542970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 16.543602] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 16.544175] [ 16.544446] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.544599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.544634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.544692] Call Trace: [ 16.544734] <TASK> [ 16.544775] dump_stack_lvl+0x73/0xb0 [ 16.544848] print_report+0xd1/0x650 [ 16.544928] ? __virt_addr_valid+0x1db/0x2d0 [ 16.545144] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.545224] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.545273] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.545302] kasan_report+0x141/0x180 [ 16.545330] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.545359] __asan_report_store4_noabort+0x1b/0x30 [ 16.545381] kasan_atomics_helper+0x4b3a/0x5450 [ 16.545412] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.545451] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.545481] ? ret_from_fork_asm+0x1a/0x30 [ 16.545506] ? kasan_atomics+0x152/0x310 [ 16.545531] kasan_atomics+0x1dc/0x310 [ 16.545552] ? __pfx_kasan_atomics+0x10/0x10 [ 16.545596] ? __pfx_read_tsc+0x10/0x10 [ 16.545634] ? ktime_get_ts64+0x86/0x230 [ 16.545680] kunit_try_run_case+0x1a5/0x480 [ 16.545724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.545764] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.545795] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.545821] ? __kthread_parkme+0x82/0x180 [ 16.545847] ? preempt_count_sub+0x50/0x80 [ 16.545875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.545901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.545927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.545952] kthread+0x337/0x6f0 [ 16.545970] ? trace_preempt_on+0x20/0xc0 [ 16.545998] ? __pfx_kthread+0x10/0x10 [ 16.546019] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.546042] ? calculate_sigpending+0x7b/0xa0 [ 16.546066] ? __pfx_kthread+0x10/0x10 [ 16.546085] ret_from_fork+0x41/0x80 [ 16.546108] ? __pfx_kthread+0x10/0x10 [ 16.546129] ret_from_fork_asm+0x1a/0x30 [ 16.546160] </TASK> [ 16.546177] [ 16.560178] Allocated by task 285: [ 16.560789] kasan_save_stack+0x45/0x70 [ 16.561635] kasan_save_track+0x18/0x40 [ 16.562298] kasan_save_alloc_info+0x3b/0x50 [ 16.562555] __kasan_kmalloc+0xb7/0xc0 [ 16.562826] __kmalloc_cache_noprof+0x189/0x420 [ 16.563218] kasan_atomics+0x95/0x310 [ 16.563810] kunit_try_run_case+0x1a5/0x480 [ 16.564188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.564510] kthread+0x337/0x6f0 [ 16.564981] ret_from_fork+0x41/0x80 [ 16.565331] ret_from_fork_asm+0x1a/0x30 [ 16.566095] [ 16.566294] The buggy address belongs to the object at ffff8881033b5600 [ 16.566294] which belongs to the cache kmalloc-64 of size 64 [ 16.567232] The buggy address is located 0 bytes to the right of [ 16.567232] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 16.568227] [ 16.568457] The buggy address belongs to the physical page: [ 16.569301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 16.569897] flags: 0x200000000000000(node=0|zone=2) [ 16.570299] page_type: f5(slab) [ 16.570521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.571012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.571787] page dumped because: kasan: bad access detected [ 16.572429] [ 16.573051] Memory state around the buggy address: [ 16.573462] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.573953] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.574263] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.574885] ^ [ 16.575515] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.576046] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.577185] ================================================================== [ 17.812092] ================================================================== [ 17.812690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 17.813302] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285 [ 17.813856] [ 17.814083] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 17.814210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.814246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.814291] Call Trace: [ 17.814347] <TASK> [ 17.814385] dump_stack_lvl+0x73/0xb0 [ 17.814448] print_report+0xd1/0x650 [ 17.814502] ? __virt_addr_valid+0x1db/0x2d0 [ 17.814573] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.814617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.814661] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.814712] kasan_report+0x141/0x180 [ 17.814765] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.814834] kasan_check_range+0x10c/0x1c0 [ 17.814875] __kasan_check_write+0x18/0x20 [ 17.814903] kasan_atomics_helper+0x1b22/0x5450 [ 17.814928] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.814952] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.814974] ? ret_from_fork_asm+0x1a/0x30 [ 17.814997] ? kasan_atomics+0x152/0x310 [ 17.815027] kasan_atomics+0x1dc/0x310 [ 17.815063] ? __pfx_kasan_atomics+0x10/0x10 [ 17.815099] ? __pfx_read_tsc+0x10/0x10 [ 17.815141] ? ktime_get_ts64+0x86/0x230 [ 17.815193] kunit_try_run_case+0x1a5/0x480 [ 17.815246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.815299] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.815363] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.815410] ? __kthread_parkme+0x82/0x180 [ 17.815456] ? preempt_count_sub+0x50/0x80 [ 17.815510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.815575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.815626] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.815666] kthread+0x337/0x6f0 [ 17.815723] ? trace_preempt_on+0x20/0xc0 [ 17.815776] ? __pfx_kthread+0x10/0x10 [ 17.815818] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.815876] ? calculate_sigpending+0x7b/0xa0 [ 17.815923] ? __pfx_kthread+0x10/0x10 [ 17.815966] ret_from_fork+0x41/0x80 [ 17.816010] ? __pfx_kthread+0x10/0x10 [ 17.816050] ret_from_fork_asm+0x1a/0x30 [ 17.816111] </TASK> [ 17.816143] [ 17.826687] Allocated by task 285: [ 17.826937] kasan_save_stack+0x45/0x70 [ 17.827331] kasan_save_track+0x18/0x40 [ 17.827662] kasan_save_alloc_info+0x3b/0x50 [ 17.827996] __kasan_kmalloc+0xb7/0xc0 [ 17.828324] __kmalloc_cache_noprof+0x189/0x420 [ 17.828601] kasan_atomics+0x95/0x310 [ 17.828881] kunit_try_run_case+0x1a5/0x480 [ 17.829142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.829453] kthread+0x337/0x6f0 [ 17.829780] ret_from_fork+0x41/0x80 [ 17.830015] ret_from_fork_asm+0x1a/0x30 [ 17.830365] [ 17.830495] The buggy address belongs to the object at ffff8881033b5600 [ 17.830495] which belongs to the cache kmalloc-64 of size 64 [ 17.831328] The buggy address is located 0 bytes to the right of [ 17.831328] allocated 48-byte region [ffff8881033b5600, ffff8881033b5630) [ 17.832229] [ 17.832362] The buggy address belongs to the physical page: [ 17.832600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5 [ 17.833191] flags: 0x200000000000000(node=0|zone=2) [ 17.833661] page_type: f5(slab) [ 17.833977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.834547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.835171] page dumped because: kasan: bad access detected [ 17.835617] [ 17.835829] Memory state around the buggy address: [ 17.836227] ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.836631] ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.837194] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.837517] ^ [ 17.837717] ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.838045] ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.838442] ==================================================================