Date
June 17, 2025, 3:40 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 25.786671] ================================================================== [ 25.786811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 25.786917] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.787023] [ 25.787102] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.787300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.787361] Hardware name: linux,dummy-virt (DT) [ 25.787451] Call trace: [ 25.787744] show_stack+0x20/0x38 (C) [ 25.787890] dump_stack_lvl+0x8c/0xd0 [ 25.788001] print_report+0x118/0x608 [ 25.788314] kasan_report+0xdc/0x128 [ 25.788515] __asan_report_load8_noabort+0x20/0x30 [ 25.788648] kasan_atomics_helper+0x3e10/0x4858 [ 25.788814] kasan_atomics+0x198/0x2e0 [ 25.788935] kunit_try_run_case+0x170/0x3f0 [ 25.789112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.789516] kthread+0x328/0x630 [ 25.789988] ret_from_fork+0x10/0x20 [ 25.790187] [ 25.790279] Allocated by task 267: [ 25.790580] kasan_save_stack+0x3c/0x68 [ 25.790908] kasan_save_track+0x20/0x40 [ 25.791075] kasan_save_alloc_info+0x40/0x58 [ 25.791189] __kasan_kmalloc+0xd4/0xd8 [ 25.791491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.791782] kasan_atomics+0xb8/0x2e0 [ 25.791886] kunit_try_run_case+0x170/0x3f0 [ 25.791988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.792103] kthread+0x328/0x630 [ 25.792281] ret_from_fork+0x10/0x20 [ 25.792382] [ 25.792451] The buggy address belongs to the object at fff00000c78d8480 [ 25.792451] which belongs to the cache kmalloc-64 of size 64 [ 25.792602] The buggy address is located 0 bytes to the right of [ 25.792602] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.792775] [ 25.792836] The buggy address belongs to the physical page: [ 25.792925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.793066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.793200] page_type: f5(slab) [ 25.794217] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.794380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.795033] page dumped because: kasan: bad access detected [ 25.795140] [ 25.795190] Memory state around the buggy address: [ 25.795276] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.795755] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.795880] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.795987] ^ [ 25.796449] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.796979] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.797093] ================================================================== [ 25.410427] ================================================================== [ 25.410598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 25.410798] Read of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.410986] [ 25.411124] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.411414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.411523] Hardware name: linux,dummy-virt (DT) [ 25.411648] Call trace: [ 25.411712] show_stack+0x20/0x38 (C) [ 25.412359] dump_stack_lvl+0x8c/0xd0 [ 25.412975] print_report+0x118/0x608 [ 25.413360] kasan_report+0xdc/0x128 [ 25.413610] __asan_report_load4_noabort+0x20/0x30 [ 25.414032] kasan_atomics_helper+0x3e04/0x4858 [ 25.414372] kasan_atomics+0x198/0x2e0 [ 25.414794] kunit_try_run_case+0x170/0x3f0 [ 25.414962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.415106] kthread+0x328/0x630 [ 25.415263] ret_from_fork+0x10/0x20 [ 25.415551] [ 25.415611] Allocated by task 267: [ 25.415698] kasan_save_stack+0x3c/0x68 [ 25.415804] kasan_save_track+0x20/0x40 [ 25.415884] kasan_save_alloc_info+0x40/0x58 [ 25.415957] __kasan_kmalloc+0xd4/0xd8 [ 25.416032] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.416149] kasan_atomics+0xb8/0x2e0 [ 25.416244] kunit_try_run_case+0x170/0x3f0 [ 25.416352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.416470] kthread+0x328/0x630 [ 25.417363] ret_from_fork+0x10/0x20 [ 25.418542] [ 25.418820] The buggy address belongs to the object at fff00000c78d8480 [ 25.418820] which belongs to the cache kmalloc-64 of size 64 [ 25.419011] The buggy address is located 0 bytes to the right of [ 25.419011] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.419425] [ 25.419491] The buggy address belongs to the physical page: [ 25.419580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.419721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.420350] page_type: f5(slab) [ 25.420627] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.421056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.421158] page dumped because: kasan: bad access detected [ 25.421231] [ 25.421278] Memory state around the buggy address: [ 25.421351] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.421465] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.421558] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.421648] ^ [ 25.421742] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.424499] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.425034] ================================================================== [ 25.635606] ================================================================== [ 25.635761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 25.635900] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.636028] [ 25.636129] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.636350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.636425] Hardware name: linux,dummy-virt (DT) [ 25.636508] Call trace: [ 25.636574] show_stack+0x20/0x38 (C) [ 25.636697] dump_stack_lvl+0x8c/0xd0 [ 25.636838] print_report+0x118/0x608 [ 25.636961] kasan_report+0xdc/0x128 [ 25.637076] kasan_check_range+0x100/0x1a8 [ 25.637200] __kasan_check_write+0x20/0x30 [ 25.637311] kasan_atomics_helper+0x12d8/0x4858 [ 25.640581] kasan_atomics+0x198/0x2e0 [ 25.641449] kunit_try_run_case+0x170/0x3f0 [ 25.642178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.642433] kthread+0x328/0x630 [ 25.642890] ret_from_fork+0x10/0x20 [ 25.643535] [ 25.643597] Allocated by task 267: [ 25.643665] kasan_save_stack+0x3c/0x68 [ 25.643760] kasan_save_track+0x20/0x40 [ 25.643845] kasan_save_alloc_info+0x40/0x58 [ 25.643939] __kasan_kmalloc+0xd4/0xd8 [ 25.645281] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.645989] kasan_atomics+0xb8/0x2e0 [ 25.646162] kunit_try_run_case+0x170/0x3f0 [ 25.646491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.647235] kthread+0x328/0x630 [ 25.647720] ret_from_fork+0x10/0x20 [ 25.648214] [ 25.648277] The buggy address belongs to the object at fff00000c78d8480 [ 25.648277] which belongs to the cache kmalloc-64 of size 64 [ 25.648980] The buggy address is located 0 bytes to the right of [ 25.648980] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.649152] [ 25.649215] The buggy address belongs to the physical page: [ 25.649298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.649458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.649595] page_type: f5(slab) [ 25.650577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.651642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.651947] page dumped because: kasan: bad access detected [ 25.652592] [ 25.652952] Memory state around the buggy address: [ 25.653561] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.654397] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.654837] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.655034] ^ [ 25.655137] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.656090] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.656718] ================================================================== [ 25.524294] ================================================================== [ 25.524447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 25.524590] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.524723] [ 25.524830] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.525051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.525129] Hardware name: linux,dummy-virt (DT) [ 25.525212] Call trace: [ 25.525274] show_stack+0x20/0x38 (C) [ 25.526562] dump_stack_lvl+0x8c/0xd0 [ 25.527184] print_report+0x118/0x608 [ 25.527468] kasan_report+0xdc/0x128 [ 25.527722] kasan_check_range+0x100/0x1a8 [ 25.527997] __kasan_check_write+0x20/0x30 [ 25.528648] kasan_atomics_helper+0xff0/0x4858 [ 25.529373] kasan_atomics+0x198/0x2e0 [ 25.529516] kunit_try_run_case+0x170/0x3f0 [ 25.530261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.530570] kthread+0x328/0x630 [ 25.530721] ret_from_fork+0x10/0x20 [ 25.530994] [ 25.531115] Allocated by task 267: [ 25.531695] kasan_save_stack+0x3c/0x68 [ 25.531834] kasan_save_track+0x20/0x40 [ 25.531946] kasan_save_alloc_info+0x40/0x58 [ 25.532054] __kasan_kmalloc+0xd4/0xd8 [ 25.532654] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.532797] kasan_atomics+0xb8/0x2e0 [ 25.532886] kunit_try_run_case+0x170/0x3f0 [ 25.533005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.533128] kthread+0x328/0x630 [ 25.534106] ret_from_fork+0x10/0x20 [ 25.534478] [ 25.534679] The buggy address belongs to the object at fff00000c78d8480 [ 25.534679] which belongs to the cache kmalloc-64 of size 64 [ 25.535070] The buggy address is located 0 bytes to the right of [ 25.535070] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.535408] [ 25.535466] The buggy address belongs to the physical page: [ 25.535830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.536176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.536322] page_type: f5(slab) [ 25.536781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.537670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.537798] page dumped because: kasan: bad access detected [ 25.537871] [ 25.537912] Memory state around the buggy address: [ 25.537998] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.538109] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.539149] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.539302] ^ [ 25.539419] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.539831] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.539949] ================================================================== [ 25.274104] ================================================================== [ 25.274226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 25.274354] Write of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.274462] [ 25.274547] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.274758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.274823] Hardware name: linux,dummy-virt (DT) [ 25.274893] Call trace: [ 25.274951] show_stack+0x20/0x38 (C) [ 25.275071] dump_stack_lvl+0x8c/0xd0 [ 25.275173] print_report+0x118/0x608 [ 25.276076] kasan_report+0xdc/0x128 [ 25.276298] kasan_check_range+0x100/0x1a8 [ 25.276412] __kasan_check_write+0x20/0x30 [ 25.276529] kasan_atomics_helper+0xad4/0x4858 [ 25.276647] kasan_atomics+0x198/0x2e0 [ 25.276747] kunit_try_run_case+0x170/0x3f0 [ 25.277042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.277176] kthread+0x328/0x630 [ 25.277286] ret_from_fork+0x10/0x20 [ 25.277389] [ 25.277436] Allocated by task 267: [ 25.277518] kasan_save_stack+0x3c/0x68 [ 25.277621] kasan_save_track+0x20/0x40 [ 25.277805] kasan_save_alloc_info+0x40/0x58 [ 25.278077] __kasan_kmalloc+0xd4/0xd8 [ 25.279146] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.279272] kasan_atomics+0xb8/0x2e0 [ 25.279366] kunit_try_run_case+0x170/0x3f0 [ 25.279537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.279804] kthread+0x328/0x630 [ 25.279915] ret_from_fork+0x10/0x20 [ 25.280299] [ 25.280394] The buggy address belongs to the object at fff00000c78d8480 [ 25.280394] which belongs to the cache kmalloc-64 of size 64 [ 25.280860] The buggy address is located 0 bytes to the right of [ 25.280860] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.281665] [ 25.282019] The buggy address belongs to the physical page: [ 25.282239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.282477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.282617] page_type: f5(slab) [ 25.282723] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.282877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.282991] page dumped because: kasan: bad access detected [ 25.283076] [ 25.283125] Memory state around the buggy address: [ 25.283208] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.283306] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.283397] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.283470] ^ [ 25.285854] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.286335] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.286906] ================================================================== [ 25.619796] ================================================================== [ 25.619942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 25.620081] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.620230] [ 25.620329] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.620552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.620627] Hardware name: linux,dummy-virt (DT) [ 25.620708] Call trace: [ 25.621759] show_stack+0x20/0x38 (C) [ 25.622639] dump_stack_lvl+0x8c/0xd0 [ 25.623078] print_report+0x118/0x608 [ 25.623414] kasan_report+0xdc/0x128 [ 25.623967] kasan_check_range+0x100/0x1a8 [ 25.624133] __kasan_check_write+0x20/0x30 [ 25.624607] kasan_atomics_helper+0x126c/0x4858 [ 25.625230] kasan_atomics+0x198/0x2e0 [ 25.625381] kunit_try_run_case+0x170/0x3f0 [ 25.625518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.626337] kthread+0x328/0x630 [ 25.626555] ret_from_fork+0x10/0x20 [ 25.626839] [ 25.626897] Allocated by task 267: [ 25.626983] kasan_save_stack+0x3c/0x68 [ 25.627090] kasan_save_track+0x20/0x40 [ 25.627189] kasan_save_alloc_info+0x40/0x58 [ 25.627287] __kasan_kmalloc+0xd4/0xd8 [ 25.627419] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.627531] kasan_atomics+0xb8/0x2e0 [ 25.627626] kunit_try_run_case+0x170/0x3f0 [ 25.627740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.627873] kthread+0x328/0x630 [ 25.628007] ret_from_fork+0x10/0x20 [ 25.628134] [ 25.628196] The buggy address belongs to the object at fff00000c78d8480 [ 25.628196] which belongs to the cache kmalloc-64 of size 64 [ 25.628362] The buggy address is located 0 bytes to the right of [ 25.628362] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.628549] [ 25.628629] The buggy address belongs to the physical page: [ 25.628720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.628878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.629931] page_type: f5(slab) [ 25.630685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.630836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.631265] page dumped because: kasan: bad access detected [ 25.631365] [ 25.631425] Memory state around the buggy address: [ 25.632139] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.632437] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.632859] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.633242] ^ [ 25.633354] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.634148] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.634354] ================================================================== [ 25.583802] ================================================================== [ 25.583952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 25.584086] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.584235] [ 25.584329] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.584544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.585588] Hardware name: linux,dummy-virt (DT) [ 25.585798] Call trace: [ 25.585891] show_stack+0x20/0x38 (C) [ 25.586098] dump_stack_lvl+0x8c/0xd0 [ 25.586450] print_report+0x118/0x608 [ 25.586580] kasan_report+0xdc/0x128 [ 25.587556] kasan_check_range+0x100/0x1a8 [ 25.588052] __kasan_check_write+0x20/0x30 [ 25.588287] kasan_atomics_helper+0x1190/0x4858 [ 25.588439] kasan_atomics+0x198/0x2e0 [ 25.588567] kunit_try_run_case+0x170/0x3f0 [ 25.588953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.589161] kthread+0x328/0x630 [ 25.589637] ret_from_fork+0x10/0x20 [ 25.590242] [ 25.590317] Allocated by task 267: [ 25.590409] kasan_save_stack+0x3c/0x68 [ 25.590533] kasan_save_track+0x20/0x40 [ 25.590631] kasan_save_alloc_info+0x40/0x58 [ 25.591190] __kasan_kmalloc+0xd4/0xd8 [ 25.591443] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.591696] kasan_atomics+0xb8/0x2e0 [ 25.591803] kunit_try_run_case+0x170/0x3f0 [ 25.591911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.592739] kthread+0x328/0x630 [ 25.592933] ret_from_fork+0x10/0x20 [ 25.593171] [ 25.593260] The buggy address belongs to the object at fff00000c78d8480 [ 25.593260] which belongs to the cache kmalloc-64 of size 64 [ 25.593449] The buggy address is located 0 bytes to the right of [ 25.593449] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.593915] [ 25.593989] The buggy address belongs to the physical page: [ 25.594077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.594219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.594352] page_type: f5(slab) [ 25.594457] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.594592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.594710] page dumped because: kasan: bad access detected [ 25.594811] [ 25.597670] Memory state around the buggy address: [ 25.597912] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.598012] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.598099] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.598190] ^ [ 25.598283] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.599576] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.600136] ================================================================== [ 25.720554] ================================================================== [ 25.720702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 25.720844] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.720973] [ 25.721066] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.721275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.721591] Hardware name: linux,dummy-virt (DT) [ 25.721738] Call trace: [ 25.721808] show_stack+0x20/0x38 (C) [ 25.721993] dump_stack_lvl+0x8c/0xd0 [ 25.722337] print_report+0x118/0x608 [ 25.722525] kasan_report+0xdc/0x128 [ 25.722638] kasan_check_range+0x100/0x1a8 [ 25.722793] __kasan_check_write+0x20/0x30 [ 25.722979] kasan_atomics_helper+0x14e4/0x4858 [ 25.723130] kasan_atomics+0x198/0x2e0 [ 25.723674] kunit_try_run_case+0x170/0x3f0 [ 25.723868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.724100] kthread+0x328/0x630 [ 25.724303] ret_from_fork+0x10/0x20 [ 25.724906] [ 25.724975] Allocated by task 267: [ 25.725074] kasan_save_stack+0x3c/0x68 [ 25.725191] kasan_save_track+0x20/0x40 [ 25.725713] kasan_save_alloc_info+0x40/0x58 [ 25.725894] __kasan_kmalloc+0xd4/0xd8 [ 25.726003] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.726185] kasan_atomics+0xb8/0x2e0 [ 25.726458] kunit_try_run_case+0x170/0x3f0 [ 25.726614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.726755] kthread+0x328/0x630 [ 25.726845] ret_from_fork+0x10/0x20 [ 25.727015] [ 25.727090] The buggy address belongs to the object at fff00000c78d8480 [ 25.727090] which belongs to the cache kmalloc-64 of size 64 [ 25.727297] The buggy address is located 0 bytes to the right of [ 25.727297] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.727713] [ 25.727797] The buggy address belongs to the physical page: [ 25.727954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.728098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.728621] page_type: f5(slab) [ 25.728765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.729139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.729369] page dumped because: kasan: bad access detected [ 25.729549] [ 25.729582] Memory state around the buggy address: [ 25.729630] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.729694] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.729838] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.729932] ^ [ 25.730008] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.730086] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.730172] ================================================================== [ 25.817317] ================================================================== [ 25.817512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 25.817642] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.817774] [ 25.817865] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.818107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.818243] Hardware name: linux,dummy-virt (DT) [ 25.818367] Call trace: [ 25.818455] show_stack+0x20/0x38 (C) [ 25.818595] dump_stack_lvl+0x8c/0xd0 [ 25.818780] print_report+0x118/0x608 [ 25.818958] kasan_report+0xdc/0x128 [ 25.819137] kasan_check_range+0x100/0x1a8 [ 25.819537] __kasan_check_write+0x20/0x30 [ 25.819905] kasan_atomics_helper+0x17ec/0x4858 [ 25.820015] kasan_atomics+0x198/0x2e0 [ 25.820115] kunit_try_run_case+0x170/0x3f0 [ 25.820445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.820604] kthread+0x328/0x630 [ 25.820699] ret_from_fork+0x10/0x20 [ 25.820804] [ 25.820866] Allocated by task 267: [ 25.820939] kasan_save_stack+0x3c/0x68 [ 25.821042] kasan_save_track+0x20/0x40 [ 25.821268] kasan_save_alloc_info+0x40/0x58 [ 25.821516] __kasan_kmalloc+0xd4/0xd8 [ 25.821806] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.822120] kasan_atomics+0xb8/0x2e0 [ 25.822195] kunit_try_run_case+0x170/0x3f0 [ 25.822282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.822387] kthread+0x328/0x630 [ 25.822470] ret_from_fork+0x10/0x20 [ 25.822555] [ 25.822603] The buggy address belongs to the object at fff00000c78d8480 [ 25.822603] which belongs to the cache kmalloc-64 of size 64 [ 25.822724] The buggy address is located 0 bytes to the right of [ 25.822724] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.822880] [ 25.822935] The buggy address belongs to the physical page: [ 25.823006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.823122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.823235] page_type: f5(slab) [ 25.823456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.823943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.824511] page dumped because: kasan: bad access detected [ 25.824720] [ 25.824827] Memory state around the buggy address: [ 25.825355] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.825502] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.825712] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.826024] ^ [ 25.826121] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.826320] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.826572] ================================================================== [ 25.570662] ================================================================== [ 25.570795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 25.570925] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.571052] [ 25.571143] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.571362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.571437] Hardware name: linux,dummy-virt (DT) [ 25.571520] Call trace: [ 25.571588] show_stack+0x20/0x38 (C) [ 25.571708] dump_stack_lvl+0x8c/0xd0 [ 25.572050] print_report+0x118/0x608 [ 25.572178] kasan_report+0xdc/0x128 [ 25.572295] kasan_check_range+0x100/0x1a8 [ 25.572419] __kasan_check_write+0x20/0x30 [ 25.572544] kasan_atomics_helper+0x1128/0x4858 [ 25.572669] kasan_atomics+0x198/0x2e0 [ 25.572778] kunit_try_run_case+0x170/0x3f0 [ 25.572883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.573671] kthread+0x328/0x630 [ 25.573949] ret_from_fork+0x10/0x20 [ 25.574133] [ 25.574192] Allocated by task 267: [ 25.574335] kasan_save_stack+0x3c/0x68 [ 25.574862] kasan_save_track+0x20/0x40 [ 25.574992] kasan_save_alloc_info+0x40/0x58 [ 25.575098] __kasan_kmalloc+0xd4/0xd8 [ 25.575281] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.575836] kasan_atomics+0xb8/0x2e0 [ 25.576005] kunit_try_run_case+0x170/0x3f0 [ 25.576142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.576658] kthread+0x328/0x630 [ 25.576846] ret_from_fork+0x10/0x20 [ 25.577295] [ 25.577373] The buggy address belongs to the object at fff00000c78d8480 [ 25.577373] which belongs to the cache kmalloc-64 of size 64 [ 25.577542] The buggy address is located 0 bytes to the right of [ 25.577542] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.578344] [ 25.578411] The buggy address belongs to the physical page: [ 25.578492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.578612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.578718] page_type: f5(slab) [ 25.578812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.578937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.579864] page dumped because: kasan: bad access detected [ 25.579978] [ 25.580425] Memory state around the buggy address: [ 25.580706] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.581032] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.581154] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.581258] ^ [ 25.581353] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.582167] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.582346] ================================================================== [ 25.425891] ================================================================== [ 25.426089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 25.426210] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.426319] [ 25.426415] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.426720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.426801] Hardware name: linux,dummy-virt (DT) [ 25.426874] Call trace: [ 25.426934] show_stack+0x20/0x38 (C) [ 25.427047] dump_stack_lvl+0x8c/0xd0 [ 25.427160] print_report+0x118/0x608 [ 25.427265] kasan_report+0xdc/0x128 [ 25.427371] kasan_check_range+0x100/0x1a8 [ 25.427476] __kasan_check_read+0x20/0x30 [ 25.427587] kasan_atomics_helper+0xdd4/0x4858 [ 25.427697] kasan_atomics+0x198/0x2e0 [ 25.427819] kunit_try_run_case+0x170/0x3f0 [ 25.427963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.428102] kthread+0x328/0x630 [ 25.428233] ret_from_fork+0x10/0x20 [ 25.428346] [ 25.429637] Allocated by task 267: [ 25.429771] kasan_save_stack+0x3c/0x68 [ 25.429883] kasan_save_track+0x20/0x40 [ 25.429969] kasan_save_alloc_info+0x40/0x58 [ 25.430050] __kasan_kmalloc+0xd4/0xd8 [ 25.430135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.430229] kasan_atomics+0xb8/0x2e0 [ 25.430310] kunit_try_run_case+0x170/0x3f0 [ 25.430404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.430510] kthread+0x328/0x630 [ 25.430595] ret_from_fork+0x10/0x20 [ 25.430674] [ 25.430722] The buggy address belongs to the object at fff00000c78d8480 [ 25.430722] which belongs to the cache kmalloc-64 of size 64 [ 25.430884] The buggy address is located 0 bytes to the right of [ 25.430884] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.431033] [ 25.431083] The buggy address belongs to the physical page: [ 25.431153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.431266] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.431389] page_type: f5(slab) [ 25.431477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.431581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.431661] page dumped because: kasan: bad access detected [ 25.433295] [ 25.433372] Memory state around the buggy address: [ 25.433508] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.433697] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.434482] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.434678] ^ [ 25.434870] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.434986] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.435085] ================================================================== [ 25.218950] ================================================================== [ 25.219101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 25.219286] Read of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.219451] [ 25.219570] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.219939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.220015] Hardware name: linux,dummy-virt (DT) [ 25.220102] Call trace: [ 25.220172] show_stack+0x20/0x38 (C) [ 25.220302] dump_stack_lvl+0x8c/0xd0 [ 25.220422] print_report+0x118/0x608 [ 25.220557] kasan_report+0xdc/0x128 [ 25.220715] __asan_report_load4_noabort+0x20/0x30 [ 25.220856] kasan_atomics_helper+0x42d8/0x4858 [ 25.220969] kasan_atomics+0x198/0x2e0 [ 25.221262] kunit_try_run_case+0x170/0x3f0 [ 25.221434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.221639] kthread+0x328/0x630 [ 25.221827] ret_from_fork+0x10/0x20 [ 25.221940] [ 25.221978] Allocated by task 267: [ 25.222037] kasan_save_stack+0x3c/0x68 [ 25.222123] kasan_save_track+0x20/0x40 [ 25.222207] kasan_save_alloc_info+0x40/0x58 [ 25.222299] __kasan_kmalloc+0xd4/0xd8 [ 25.222388] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.222810] kthread+0x328/0x630 [ 25.223384] [ 25.223750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.223874] page_type: f5(slab) [ 25.224000] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.224132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.224529] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.225312] ================================================================== [ 25.742024] ================================================================== [ 25.742161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 25.742528] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.742716] [ 25.742835] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.743087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.743348] Hardware name: linux,dummy-virt (DT) [ 25.743441] Call trace: [ 25.743508] show_stack+0x20/0x38 (C) [ 25.743641] dump_stack_lvl+0x8c/0xd0 [ 25.743806] print_report+0x118/0x608 [ 25.743927] kasan_report+0xdc/0x128 [ 25.744086] kasan_check_range+0x100/0x1a8 [ 25.744286] __kasan_check_write+0x20/0x30 [ 25.744417] kasan_atomics_helper+0x15b4/0x4858 [ 25.744527] kasan_atomics+0x198/0x2e0 [ 25.744640] kunit_try_run_case+0x170/0x3f0 [ 25.744775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.744973] kthread+0x328/0x630 [ 25.745105] ret_from_fork+0x10/0x20 [ 25.745234] [ 25.745505] Allocated by task 267: [ 25.745603] kasan_save_stack+0x3c/0x68 [ 25.745883] kasan_save_track+0x20/0x40 [ 25.746248] kasan_save_alloc_info+0x40/0x58 [ 25.746453] __kasan_kmalloc+0xd4/0xd8 [ 25.746555] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.746670] kasan_atomics+0xb8/0x2e0 [ 25.746767] kunit_try_run_case+0x170/0x3f0 [ 25.746858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.746941] kthread+0x328/0x630 [ 25.747053] ret_from_fork+0x10/0x20 [ 25.747148] [ 25.747206] The buggy address belongs to the object at fff00000c78d8480 [ 25.747206] which belongs to the cache kmalloc-64 of size 64 [ 25.747365] The buggy address is located 0 bytes to the right of [ 25.747365] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.747536] [ 25.747590] The buggy address belongs to the physical page: [ 25.747677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.747813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.747939] page_type: f5(slab) [ 25.748102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.748589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.748900] page dumped because: kasan: bad access detected [ 25.749048] [ 25.749140] Memory state around the buggy address: [ 25.749229] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.749422] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.749538] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.749646] ^ [ 25.749755] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.749869] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.749970] ================================================================== [ 25.678980] ================================================================== [ 25.679105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 25.679453] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.679617] [ 25.679717] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.679941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.680012] Hardware name: linux,dummy-virt (DT) [ 25.680098] Call trace: [ 25.680212] show_stack+0x20/0x38 (C) [ 25.680344] dump_stack_lvl+0x8c/0xd0 [ 25.680467] print_report+0x118/0x608 [ 25.680579] kasan_report+0xdc/0x128 [ 25.680694] __asan_report_load8_noabort+0x20/0x30 [ 25.680822] kasan_atomics_helper+0x3f04/0x4858 [ 25.680942] kasan_atomics+0x198/0x2e0 [ 25.681557] kunit_try_run_case+0x170/0x3f0 [ 25.681924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.682151] kthread+0x328/0x630 [ 25.682274] ret_from_fork+0x10/0x20 [ 25.682407] [ 25.682459] Allocated by task 267: [ 25.682539] kasan_save_stack+0x3c/0x68 [ 25.682631] kasan_save_track+0x20/0x40 [ 25.682706] kasan_save_alloc_info+0x40/0x58 [ 25.682798] __kasan_kmalloc+0xd4/0xd8 [ 25.682881] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.682983] kasan_atomics+0xb8/0x2e0 [ 25.683081] kunit_try_run_case+0x170/0x3f0 [ 25.683181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.683302] kthread+0x328/0x630 [ 25.683394] ret_from_fork+0x10/0x20 [ 25.683485] [ 25.684892] The buggy address belongs to the object at fff00000c78d8480 [ 25.684892] which belongs to the cache kmalloc-64 of size 64 [ 25.686200] The buggy address is located 0 bytes to the right of [ 25.686200] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.687270] [ 25.687339] The buggy address belongs to the physical page: [ 25.687417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.687544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.687653] page_type: f5(slab) [ 25.690130] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.690344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.690519] page dumped because: kasan: bad access detected [ 25.690597] [ 25.690644] Memory state around the buggy address: [ 25.690724] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.690832] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.690929] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.691012] ^ [ 25.691085] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.691179] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.691271] ================================================================== [ 25.387910] ================================================================== [ 25.388115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 25.388303] Read of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.388740] [ 25.388979] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.389203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.389276] Hardware name: linux,dummy-virt (DT) [ 25.389769] Call trace: [ 25.389980] show_stack+0x20/0x38 (C) [ 25.390591] dump_stack_lvl+0x8c/0xd0 [ 25.390746] print_report+0x118/0x608 [ 25.390961] kasan_report+0xdc/0x128 [ 25.391296] __asan_report_load4_noabort+0x20/0x30 [ 25.391761] kasan_atomics_helper+0x3dd8/0x4858 [ 25.391902] kasan_atomics+0x198/0x2e0 [ 25.392402] kunit_try_run_case+0x170/0x3f0 [ 25.392788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.393231] kthread+0x328/0x630 [ 25.393465] ret_from_fork+0x10/0x20 [ 25.393720] [ 25.393862] Allocated by task 267: [ 25.394012] kasan_save_stack+0x3c/0x68 [ 25.394292] kasan_save_track+0x20/0x40 [ 25.394462] kasan_save_alloc_info+0x40/0x58 [ 25.394565] __kasan_kmalloc+0xd4/0xd8 [ 25.394782] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.395009] kasan_atomics+0xb8/0x2e0 [ 25.395308] kunit_try_run_case+0x170/0x3f0 [ 25.395856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.396000] kthread+0x328/0x630 [ 25.396101] ret_from_fork+0x10/0x20 [ 25.396213] [ 25.396273] The buggy address belongs to the object at fff00000c78d8480 [ 25.396273] which belongs to the cache kmalloc-64 of size 64 [ 25.396440] The buggy address is located 0 bytes to the right of [ 25.396440] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.397108] [ 25.397241] The buggy address belongs to the physical page: [ 25.397365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.397762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.398364] page_type: f5(slab) [ 25.398689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.398833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.398952] page dumped because: kasan: bad access detected [ 25.399045] [ 25.399082] Memory state around the buggy address: [ 25.399231] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.399344] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.399634] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.399942] ^ [ 25.400268] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.400441] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.400718] ================================================================== [ 25.289212] ================================================================== [ 25.290067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 25.290227] Read of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.291000] [ 25.291115] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.291674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.291751] Hardware name: linux,dummy-virt (DT) [ 25.291834] Call trace: [ 25.291889] show_stack+0x20/0x38 (C) [ 25.292009] dump_stack_lvl+0x8c/0xd0 [ 25.292130] print_report+0x118/0x608 [ 25.292230] kasan_report+0xdc/0x128 [ 25.292332] __asan_report_load4_noabort+0x20/0x30 [ 25.292446] kasan_atomics_helper+0x3dcc/0x4858 [ 25.292554] kasan_atomics+0x198/0x2e0 [ 25.293939] kunit_try_run_case+0x170/0x3f0 [ 25.294189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.294738] kthread+0x328/0x630 [ 25.294884] ret_from_fork+0x10/0x20 [ 25.295391] [ 25.295620] Allocated by task 267: [ 25.295753] kasan_save_stack+0x3c/0x68 [ 25.296188] kasan_save_track+0x20/0x40 [ 25.296334] kasan_save_alloc_info+0x40/0x58 [ 25.296452] __kasan_kmalloc+0xd4/0xd8 [ 25.297123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.297342] kasan_atomics+0xb8/0x2e0 [ 25.297640] kunit_try_run_case+0x170/0x3f0 [ 25.297783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.297905] kthread+0x328/0x630 [ 25.298753] ret_from_fork+0x10/0x20 [ 25.298980] [ 25.299046] The buggy address belongs to the object at fff00000c78d8480 [ 25.299046] which belongs to the cache kmalloc-64 of size 64 [ 25.299848] The buggy address is located 0 bytes to the right of [ 25.299848] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.300068] [ 25.300136] The buggy address belongs to the physical page: [ 25.300217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.300361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.300497] page_type: f5(slab) [ 25.301019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.302014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.302862] page dumped because: kasan: bad access detected [ 25.303109] [ 25.303195] Memory state around the buggy address: [ 25.303503] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.303694] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.304200] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.304591] ^ [ 25.304900] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.305451] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.305563] ================================================================== [ 25.548101] ================================================================== [ 25.548266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 25.548367] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.548428] [ 25.548480] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.548583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.548616] Hardware name: linux,dummy-virt (DT) [ 25.548660] Call trace: [ 25.548690] show_stack+0x20/0x38 (C) [ 25.548790] dump_stack_lvl+0x8c/0xd0 [ 25.548910] print_report+0x118/0x608 [ 25.549029] kasan_report+0xdc/0x128 [ 25.549510] kasan_check_range+0x100/0x1a8 [ 25.549693] __kasan_check_write+0x20/0x30 [ 25.549829] kasan_atomics_helper+0x1058/0x4858 [ 25.549926] kasan_atomics+0x198/0x2e0 [ 25.550052] kunit_try_run_case+0x170/0x3f0 [ 25.550173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.550556] kthread+0x328/0x630 [ 25.551131] ret_from_fork+0x10/0x20 [ 25.551643] [ 25.551846] Allocated by task 267: [ 25.551978] kasan_save_stack+0x3c/0x68 [ 25.552081] kasan_save_track+0x20/0x40 [ 25.552547] kasan_save_alloc_info+0x40/0x58 [ 25.552669] __kasan_kmalloc+0xd4/0xd8 [ 25.552780] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.553240] kasan_atomics+0xb8/0x2e0 [ 25.553506] kunit_try_run_case+0x170/0x3f0 [ 25.553761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.554149] kthread+0x328/0x630 [ 25.554457] ret_from_fork+0x10/0x20 [ 25.554541] [ 25.554591] The buggy address belongs to the object at fff00000c78d8480 [ 25.554591] which belongs to the cache kmalloc-64 of size 64 [ 25.554753] The buggy address is located 0 bytes to the right of [ 25.554753] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.555318] [ 25.555559] The buggy address belongs to the physical page: [ 25.555931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.556129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.556258] page_type: f5(slab) [ 25.556711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.556967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.557081] page dumped because: kasan: bad access detected [ 25.557164] [ 25.557216] Memory state around the buggy address: [ 25.557311] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.557432] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.557547] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.557654] ^ [ 25.558138] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.558357] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.558571] ================================================================== [ 25.439682] ================================================================== [ 25.439864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 25.440075] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.440276] [ 25.440369] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.440650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.440758] Hardware name: linux,dummy-virt (DT) [ 25.440834] Call trace: [ 25.440897] show_stack+0x20/0x38 (C) [ 25.441258] dump_stack_lvl+0x8c/0xd0 [ 25.441812] print_report+0x118/0x608 [ 25.442037] kasan_report+0xdc/0x128 [ 25.442179] __asan_report_load8_noabort+0x20/0x30 [ 25.442317] kasan_atomics_helper+0x3f58/0x4858 [ 25.442444] kasan_atomics+0x198/0x2e0 [ 25.442749] kunit_try_run_case+0x170/0x3f0 [ 25.442879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.443076] kthread+0x328/0x630 [ 25.443250] ret_from_fork+0x10/0x20 [ 25.443434] [ 25.443509] Allocated by task 267: [ 25.443601] kasan_save_stack+0x3c/0x68 [ 25.443713] kasan_save_track+0x20/0x40 [ 25.443853] kasan_save_alloc_info+0x40/0x58 [ 25.444016] __kasan_kmalloc+0xd4/0xd8 [ 25.444122] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.444237] kasan_atomics+0xb8/0x2e0 [ 25.444336] kunit_try_run_case+0x170/0x3f0 [ 25.444505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.444627] kthread+0x328/0x630 [ 25.444734] ret_from_fork+0x10/0x20 [ 25.444818] [ 25.444865] The buggy address belongs to the object at fff00000c78d8480 [ 25.444865] which belongs to the cache kmalloc-64 of size 64 [ 25.445009] The buggy address is located 0 bytes to the right of [ 25.445009] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.445186] [ 25.445593] The buggy address belongs to the physical page: [ 25.445725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.446001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.446267] page_type: f5(slab) [ 25.446370] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.446775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.446947] page dumped because: kasan: bad access detected [ 25.447073] [ 25.447119] Memory state around the buggy address: [ 25.447192] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.447279] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.447857] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.447970] ^ [ 25.448072] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.448201] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.448314] ================================================================== [ 25.807877] ================================================================== [ 25.808221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 25.808355] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.808490] [ 25.808578] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.808751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.808817] Hardware name: linux,dummy-virt (DT) [ 25.808901] Call trace: [ 25.808958] show_stack+0x20/0x38 (C) [ 25.809076] dump_stack_lvl+0x8c/0xd0 [ 25.809196] print_report+0x118/0x608 [ 25.809347] kasan_report+0xdc/0x128 [ 25.809520] __asan_report_load8_noabort+0x20/0x30 [ 25.809701] kasan_atomics_helper+0x3e20/0x4858 [ 25.809827] kasan_atomics+0x198/0x2e0 [ 25.809937] kunit_try_run_case+0x170/0x3f0 [ 25.810051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.810262] kthread+0x328/0x630 [ 25.810377] ret_from_fork+0x10/0x20 [ 25.810486] [ 25.810529] Allocated by task 267: [ 25.810595] kasan_save_stack+0x3c/0x68 [ 25.810688] kasan_save_track+0x20/0x40 [ 25.810770] kasan_save_alloc_info+0x40/0x58 [ 25.810858] __kasan_kmalloc+0xd4/0xd8 [ 25.810939] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.811035] kasan_atomics+0xb8/0x2e0 [ 25.811112] kunit_try_run_case+0x170/0x3f0 [ 25.811202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.811304] kthread+0x328/0x630 [ 25.811385] ret_from_fork+0x10/0x20 [ 25.811467] [ 25.811516] The buggy address belongs to the object at fff00000c78d8480 [ 25.811516] which belongs to the cache kmalloc-64 of size 64 [ 25.811650] The buggy address is located 0 bytes to the right of [ 25.811650] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.811812] [ 25.811870] The buggy address belongs to the physical page: [ 25.811946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.812071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.812199] page_type: f5(slab) [ 25.812288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.812419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.812516] page dumped because: kasan: bad access detected [ 25.812596] [ 25.812649] Memory state around the buggy address: [ 25.812725] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.815888] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.816015] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.816194] ^ [ 25.816334] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.816507] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.816634] ================================================================== [ 25.253324] ================================================================== [ 25.253632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 25.253816] Write of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.253917] [ 25.254001] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.254850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.254946] Hardware name: linux,dummy-virt (DT) [ 25.255043] Call trace: [ 25.255113] show_stack+0x20/0x38 (C) [ 25.255244] dump_stack_lvl+0x8c/0xd0 [ 25.255370] print_report+0x118/0x608 [ 25.255489] kasan_report+0xdc/0x128 [ 25.255612] kasan_check_range+0x100/0x1a8 [ 25.256826] __kasan_check_write+0x20/0x30 [ 25.257572] kasan_atomics_helper+0xa6c/0x4858 [ 25.257887] kasan_atomics+0x198/0x2e0 [ 25.257980] kunit_try_run_case+0x170/0x3f0 [ 25.258799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.259411] kthread+0x328/0x630 [ 25.260169] ret_from_fork+0x10/0x20 [ 25.260971] [ 25.261197] Allocated by task 267: [ 25.261623] kasan_save_stack+0x3c/0x68 [ 25.262125] kasan_save_track+0x20/0x40 [ 25.262217] kasan_save_alloc_info+0x40/0x58 [ 25.262544] __kasan_kmalloc+0xd4/0xd8 [ 25.262975] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.263539] kasan_atomics+0xb8/0x2e0 [ 25.264317] kunit_try_run_case+0x170/0x3f0 [ 25.264572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.264801] kthread+0x328/0x630 [ 25.265688] ret_from_fork+0x10/0x20 [ 25.266111] [ 25.266169] The buggy address belongs to the object at fff00000c78d8480 [ 25.266169] which belongs to the cache kmalloc-64 of size 64 [ 25.266525] The buggy address is located 0 bytes to the right of [ 25.266525] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.267176] [ 25.267324] The buggy address belongs to the physical page: [ 25.267635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.268031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.268239] page_type: f5(slab) [ 25.268564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.268987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.269132] page dumped because: kasan: bad access detected [ 25.269219] [ 25.269307] Memory state around the buggy address: [ 25.269412] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.269879] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.270248] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.271040] ^ [ 25.271490] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.272026] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.272432] ================================================================== [ 25.759505] ================================================================== [ 25.759668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 25.759791] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.759898] [ 25.759976] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.760162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.760238] Hardware name: linux,dummy-virt (DT) [ 25.760318] Call trace: [ 25.760415] show_stack+0x20/0x38 (C) [ 25.760529] dump_stack_lvl+0x8c/0xd0 [ 25.760705] print_report+0x118/0x608 [ 25.760824] kasan_report+0xdc/0x128 [ 25.760987] kasan_check_range+0x100/0x1a8 [ 25.761103] __kasan_check_write+0x20/0x30 [ 25.761300] kasan_atomics_helper+0x1644/0x4858 [ 25.761499] kasan_atomics+0x198/0x2e0 [ 25.761662] kunit_try_run_case+0x170/0x3f0 [ 25.761859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.762059] kthread+0x328/0x630 [ 25.762236] ret_from_fork+0x10/0x20 [ 25.762667] [ 25.762779] Allocated by task 267: [ 25.762885] kasan_save_stack+0x3c/0x68 [ 25.763005] kasan_save_track+0x20/0x40 [ 25.763222] kasan_save_alloc_info+0x40/0x58 [ 25.764110] __kasan_kmalloc+0xd4/0xd8 [ 25.766121] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.766289] kasan_atomics+0xb8/0x2e0 [ 25.766842] kunit_try_run_case+0x170/0x3f0 [ 25.766943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.767053] kthread+0x328/0x630 [ 25.767136] ret_from_fork+0x10/0x20 [ 25.767220] [ 25.767270] The buggy address belongs to the object at fff00000c78d8480 [ 25.767270] which belongs to the cache kmalloc-64 of size 64 [ 25.767400] The buggy address is located 0 bytes to the right of [ 25.767400] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.767537] [ 25.767588] The buggy address belongs to the physical page: [ 25.767660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.767801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.767950] page_type: f5(slab) [ 25.768050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.768188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.768342] page dumped because: kasan: bad access detected [ 25.768475] [ 25.768556] Memory state around the buggy address: [ 25.768693] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.768827] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.768941] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.769047] ^ [ 25.769357] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.769459] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.769547] ================================================================== [ 25.559407] ================================================================== [ 25.559721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 25.560405] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.560601] [ 25.560698] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.561026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.561109] Hardware name: linux,dummy-virt (DT) [ 25.561199] Call trace: [ 25.561262] show_stack+0x20/0x38 (C) [ 25.561397] dump_stack_lvl+0x8c/0xd0 [ 25.561643] print_report+0x118/0x608 [ 25.562004] kasan_report+0xdc/0x128 [ 25.562493] kasan_check_range+0x100/0x1a8 [ 25.562639] __kasan_check_write+0x20/0x30 [ 25.562815] kasan_atomics_helper+0x10c0/0x4858 [ 25.562989] kasan_atomics+0x198/0x2e0 [ 25.563114] kunit_try_run_case+0x170/0x3f0 [ 25.563270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.563664] kthread+0x328/0x630 [ 25.563961] ret_from_fork+0x10/0x20 [ 25.564180] [ 25.564245] Allocated by task 267: [ 25.564552] kasan_save_stack+0x3c/0x68 [ 25.564674] kasan_save_track+0x20/0x40 [ 25.564838] kasan_save_alloc_info+0x40/0x58 [ 25.564942] __kasan_kmalloc+0xd4/0xd8 [ 25.565086] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.565266] kasan_atomics+0xb8/0x2e0 [ 25.565385] kunit_try_run_case+0x170/0x3f0 [ 25.565491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.565594] kthread+0x328/0x630 [ 25.565710] ret_from_fork+0x10/0x20 [ 25.565811] [ 25.565864] The buggy address belongs to the object at fff00000c78d8480 [ 25.565864] which belongs to the cache kmalloc-64 of size 64 [ 25.566036] The buggy address is located 0 bytes to the right of [ 25.566036] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.566229] [ 25.566551] The buggy address belongs to the physical page: [ 25.566660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.566955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.567619] page_type: f5(slab) [ 25.567737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.567856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.567969] page dumped because: kasan: bad access detected [ 25.568059] [ 25.568124] Memory state around the buggy address: [ 25.568219] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.568333] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.568539] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.568692] ^ [ 25.569095] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.570178] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.570272] ================================================================== [ 25.402323] ================================================================== [ 25.402453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 25.402591] Write of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.402709] [ 25.403020] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.403238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.403306] Hardware name: linux,dummy-virt (DT) [ 25.403389] Call trace: [ 25.403496] show_stack+0x20/0x38 (C) [ 25.403629] dump_stack_lvl+0x8c/0xd0 [ 25.403752] print_report+0x118/0x608 [ 25.404161] kasan_report+0xdc/0x128 [ 25.404298] kasan_check_range+0x100/0x1a8 [ 25.404423] __kasan_check_write+0x20/0x30 [ 25.404555] kasan_atomics_helper+0xd3c/0x4858 [ 25.404681] kasan_atomics+0x198/0x2e0 [ 25.404802] kunit_try_run_case+0x170/0x3f0 [ 25.404935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.405067] kthread+0x328/0x630 [ 25.405172] ret_from_fork+0x10/0x20 [ 25.405303] [ 25.405360] Allocated by task 267: [ 25.405438] kasan_save_stack+0x3c/0x68 [ 25.405543] kasan_save_track+0x20/0x40 [ 25.405641] kasan_save_alloc_info+0x40/0x58 [ 25.405752] __kasan_kmalloc+0xd4/0xd8 [ 25.405847] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.405955] kasan_atomics+0xb8/0x2e0 [ 25.406048] kunit_try_run_case+0x170/0x3f0 [ 25.406152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.406267] kthread+0x328/0x630 [ 25.406357] ret_from_fork+0x10/0x20 [ 25.406450] [ 25.406501] The buggy address belongs to the object at fff00000c78d8480 [ 25.406501] which belongs to the cache kmalloc-64 of size 64 [ 25.406655] The buggy address is located 0 bytes to the right of [ 25.406655] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.406847] [ 25.406907] The buggy address belongs to the physical page: [ 25.407209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.407346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.407466] page_type: f5(slab) [ 25.408079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.408261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.408554] page dumped because: kasan: bad access detected [ 25.408639] [ 25.408702] Memory state around the buggy address: [ 25.408944] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.409112] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.409203] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.409294] ^ [ 25.409549] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.409652] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.409751] ================================================================== [ 25.798428] ================================================================== [ 25.798558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 25.798686] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.799441] [ 25.799925] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.800244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.800322] Hardware name: linux,dummy-virt (DT) [ 25.800609] Call trace: [ 25.800677] show_stack+0x20/0x38 (C) [ 25.801171] dump_stack_lvl+0x8c/0xd0 [ 25.801528] print_report+0x118/0x608 [ 25.801710] kasan_report+0xdc/0x128 [ 25.802042] kasan_check_range+0x100/0x1a8 [ 25.802218] __kasan_check_write+0x20/0x30 [ 25.802582] kasan_atomics_helper+0x175c/0x4858 [ 25.802949] kasan_atomics+0x198/0x2e0 [ 25.803227] kunit_try_run_case+0x170/0x3f0 [ 25.803408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.803634] kthread+0x328/0x630 [ 25.804165] ret_from_fork+0x10/0x20 [ 25.804506] [ 25.804564] Allocated by task 267: [ 25.804717] kasan_save_stack+0x3c/0x68 [ 25.805044] kasan_save_track+0x20/0x40 [ 25.805162] kasan_save_alloc_info+0x40/0x58 [ 25.805266] __kasan_kmalloc+0xd4/0xd8 [ 25.805371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.805470] kasan_atomics+0xb8/0x2e0 [ 25.805563] kunit_try_run_case+0x170/0x3f0 [ 25.805922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.806056] kthread+0x328/0x630 [ 25.806155] ret_from_fork+0x10/0x20 [ 25.806209] [ 25.806258] The buggy address belongs to the object at fff00000c78d8480 [ 25.806258] which belongs to the cache kmalloc-64 of size 64 [ 25.806344] The buggy address is located 0 bytes to the right of [ 25.806344] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.806417] [ 25.806446] The buggy address belongs to the physical page: [ 25.806485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.806549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.806612] page_type: f5(slab) [ 25.806662] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.806722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.806808] page dumped because: kasan: bad access detected [ 25.806864] [ 25.806890] Memory state around the buggy address: [ 25.806931] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.806983] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.807034] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.807080] ^ [ 25.807121] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.807171] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.807216] ================================================================== [ 25.750601] ================================================================== [ 25.750977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 25.751208] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.751397] [ 25.751537] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.751966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.752364] Hardware name: linux,dummy-virt (DT) [ 25.752431] Call trace: [ 25.752464] show_stack+0x20/0x38 (C) [ 25.752538] dump_stack_lvl+0x8c/0xd0 [ 25.752660] print_report+0x118/0x608 [ 25.752865] kasan_report+0xdc/0x128 [ 25.752977] __asan_report_load8_noabort+0x20/0x30 [ 25.753103] kasan_atomics_helper+0x3db0/0x4858 [ 25.753231] kasan_atomics+0x198/0x2e0 [ 25.753445] kunit_try_run_case+0x170/0x3f0 [ 25.753847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.754254] kthread+0x328/0x630 [ 25.754412] ret_from_fork+0x10/0x20 [ 25.754560] [ 25.754636] Allocated by task 267: [ 25.754714] kasan_save_stack+0x3c/0x68 [ 25.754872] kasan_save_track+0x20/0x40 [ 25.754978] kasan_save_alloc_info+0x40/0x58 [ 25.755104] __kasan_kmalloc+0xd4/0xd8 [ 25.755214] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.755362] kasan_atomics+0xb8/0x2e0 [ 25.755442] kunit_try_run_case+0x170/0x3f0 [ 25.755518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.755604] kthread+0x328/0x630 [ 25.755710] ret_from_fork+0x10/0x20 [ 25.755813] [ 25.756098] The buggy address belongs to the object at fff00000c78d8480 [ 25.756098] which belongs to the cache kmalloc-64 of size 64 [ 25.756279] The buggy address is located 0 bytes to the right of [ 25.756279] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.756453] [ 25.756529] The buggy address belongs to the physical page: [ 25.756652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.756869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.757047] page_type: f5(slab) [ 25.757151] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.757345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.757452] page dumped because: kasan: bad access detected [ 25.757536] [ 25.757594] Memory state around the buggy address: [ 25.757903] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.758032] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.758193] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.758289] ^ [ 25.758389] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.758646] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.758815] ================================================================== [ 25.696652] ================================================================== [ 25.697539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 25.697698] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.697845] [ 25.698282] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.698507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.698573] Hardware name: linux,dummy-virt (DT) [ 25.698640] Call trace: [ 25.698693] show_stack+0x20/0x38 (C) [ 25.698828] dump_stack_lvl+0x8c/0xd0 [ 25.698947] print_report+0x118/0x608 [ 25.699044] kasan_report+0xdc/0x128 [ 25.699129] kasan_check_range+0x100/0x1a8 [ 25.699200] __kasan_check_write+0x20/0x30 [ 25.699253] kasan_atomics_helper+0x1414/0x4858 [ 25.699309] kasan_atomics+0x198/0x2e0 [ 25.699358] kunit_try_run_case+0x170/0x3f0 [ 25.699417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.699478] kthread+0x328/0x630 [ 25.699530] ret_from_fork+0x10/0x20 [ 25.699589] [ 25.699613] Allocated by task 267: [ 25.699650] kasan_save_stack+0x3c/0x68 [ 25.699701] kasan_save_track+0x20/0x40 [ 25.701066] kasan_save_alloc_info+0x40/0x58 [ 25.701181] __kasan_kmalloc+0xd4/0xd8 [ 25.701265] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.701350] kasan_atomics+0xb8/0x2e0 [ 25.701427] kunit_try_run_case+0x170/0x3f0 [ 25.701519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.701627] kthread+0x328/0x630 [ 25.701699] ret_from_fork+0x10/0x20 [ 25.702892] [ 25.702953] The buggy address belongs to the object at fff00000c78d8480 [ 25.702953] which belongs to the cache kmalloc-64 of size 64 [ 25.704143] The buggy address is located 0 bytes to the right of [ 25.704143] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.705089] [ 25.705165] The buggy address belongs to the physical page: [ 25.705247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.705404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.705579] page_type: f5(slab) [ 25.705689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.706348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.706479] page dumped because: kasan: bad access detected [ 25.706564] [ 25.706620] Memory state around the buggy address: [ 25.706705] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.706841] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.706949] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.707386] ^ [ 25.707518] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.707626] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.707997] ================================================================== [ 25.730702] ================================================================== [ 25.730830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 25.730989] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.731363] [ 25.731523] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.732026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.732138] Hardware name: linux,dummy-virt (DT) [ 25.732270] Call trace: [ 25.732356] show_stack+0x20/0x38 (C) [ 25.732492] dump_stack_lvl+0x8c/0xd0 [ 25.732608] print_report+0x118/0x608 [ 25.732722] kasan_report+0xdc/0x128 [ 25.732999] kasan_check_range+0x100/0x1a8 [ 25.733423] __kasan_check_write+0x20/0x30 [ 25.733966] kasan_atomics_helper+0x154c/0x4858 [ 25.734189] kasan_atomics+0x198/0x2e0 [ 25.734379] kunit_try_run_case+0x170/0x3f0 [ 25.734587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.734907] kthread+0x328/0x630 [ 25.735155] ret_from_fork+0x10/0x20 [ 25.735356] [ 25.735597] Allocated by task 267: [ 25.735961] kasan_save_stack+0x3c/0x68 [ 25.736246] kasan_save_track+0x20/0x40 [ 25.736441] kasan_save_alloc_info+0x40/0x58 [ 25.736618] __kasan_kmalloc+0xd4/0xd8 [ 25.736716] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.737033] kasan_atomics+0xb8/0x2e0 [ 25.737357] kunit_try_run_case+0x170/0x3f0 [ 25.737436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.737490] kthread+0x328/0x630 [ 25.737547] ret_from_fork+0x10/0x20 [ 25.737647] [ 25.737754] The buggy address belongs to the object at fff00000c78d8480 [ 25.737754] which belongs to the cache kmalloc-64 of size 64 [ 25.737928] The buggy address is located 0 bytes to the right of [ 25.737928] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.738080] [ 25.738126] The buggy address belongs to the physical page: [ 25.738192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.738311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.738440] page_type: f5(slab) [ 25.738554] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.738771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.738960] page dumped because: kasan: bad access detected [ 25.739055] [ 25.739119] Memory state around the buggy address: [ 25.739261] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.739382] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.739501] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.739619] ^ [ 25.739755] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.739856] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.739987] ================================================================== [ 25.233100] ================================================================== [ 25.233285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 25.233444] Write of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.233578] [ 25.233678] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.233932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.234023] Hardware name: linux,dummy-virt (DT) [ 25.234141] Call trace: [ 25.234465] show_stack+0x20/0x38 (C) [ 25.234794] dump_stack_lvl+0x8c/0xd0 [ 25.235022] print_report+0x118/0x608 [ 25.235159] kasan_report+0xdc/0x128 [ 25.235464] kasan_check_range+0x100/0x1a8 [ 25.235583] __kasan_check_write+0x20/0x30 [ 25.235815] kasan_atomics_helper+0x99c/0x4858 [ 25.236078] kasan_atomics+0x198/0x2e0 [ 25.236281] kunit_try_run_case+0x170/0x3f0 [ 25.236442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.236671] kthread+0x328/0x630 [ 25.237039] ret_from_fork+0x10/0x20 [ 25.237300] [ 25.237440] Allocated by task 267: [ 25.237523] kasan_save_stack+0x3c/0x68 [ 25.237648] kasan_save_track+0x20/0x40 [ 25.237750] kasan_save_alloc_info+0x40/0x58 [ 25.237835] __kasan_kmalloc+0xd4/0xd8 [ 25.237904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.238265] kasan_atomics+0xb8/0x2e0 [ 25.238460] kunit_try_run_case+0x170/0x3f0 [ 25.238583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.238694] kthread+0x328/0x630 [ 25.239273] ret_from_fork+0x10/0x20 [ 25.239426] [ 25.239490] The buggy address belongs to the object at fff00000c78d8480 [ 25.239490] which belongs to the cache kmalloc-64 of size 64 [ 25.239853] The buggy address is located 0 bytes to the right of [ 25.239853] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.240021] [ 25.240174] The buggy address belongs to the physical page: [ 25.240271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.240513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.240717] page_type: f5(slab) [ 25.240923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.241453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.241678] page dumped because: kasan: bad access detected [ 25.241820] [ 25.241994] Memory state around the buggy address: [ 25.242093] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.242232] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.242466] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.242569] ^ [ 25.242642] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.242754] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.242855] ================================================================== [ 25.708811] ================================================================== [ 25.708958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 25.709088] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.709223] [ 25.709445] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.709798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.709953] Hardware name: linux,dummy-virt (DT) [ 25.710134] Call trace: [ 25.710232] show_stack+0x20/0x38 (C) [ 25.710379] dump_stack_lvl+0x8c/0xd0 [ 25.710499] print_report+0x118/0x608 [ 25.710593] kasan_report+0xdc/0x128 [ 25.710677] kasan_check_range+0x100/0x1a8 [ 25.710788] __kasan_check_write+0x20/0x30 [ 25.710905] kasan_atomics_helper+0x147c/0x4858 [ 25.711387] kasan_atomics+0x198/0x2e0 [ 25.711825] kunit_try_run_case+0x170/0x3f0 [ 25.712154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.712538] kthread+0x328/0x630 [ 25.712790] ret_from_fork+0x10/0x20 [ 25.713120] [ 25.713285] Allocated by task 267: [ 25.713356] kasan_save_stack+0x3c/0x68 [ 25.713460] kasan_save_track+0x20/0x40 [ 25.713553] kasan_save_alloc_info+0x40/0x58 [ 25.713663] __kasan_kmalloc+0xd4/0xd8 [ 25.713774] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.713958] kasan_atomics+0xb8/0x2e0 [ 25.714169] kunit_try_run_case+0x170/0x3f0 [ 25.714368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.714683] kthread+0x328/0x630 [ 25.715010] ret_from_fork+0x10/0x20 [ 25.715111] [ 25.715592] The buggy address belongs to the object at fff00000c78d8480 [ 25.715592] which belongs to the cache kmalloc-64 of size 64 [ 25.715788] The buggy address is located 0 bytes to the right of [ 25.715788] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.715968] [ 25.716026] The buggy address belongs to the physical page: [ 25.716123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.716265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.716393] page_type: f5(slab) [ 25.716492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.716618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.717336] page dumped because: kasan: bad access detected [ 25.717550] [ 25.717609] Memory state around the buggy address: [ 25.717911] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.718375] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.718627] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.718813] ^ [ 25.719230] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.719549] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.719666] ================================================================== [ 25.770693] ================================================================== [ 25.770838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 25.770958] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.771077] [ 25.771172] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.771371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.771439] Hardware name: linux,dummy-virt (DT) [ 25.771512] Call trace: [ 25.771567] show_stack+0x20/0x38 (C) [ 25.771676] dump_stack_lvl+0x8c/0xd0 [ 25.772217] print_report+0x118/0x608 [ 25.772400] kasan_report+0xdc/0x128 [ 25.772577] __asan_report_load8_noabort+0x20/0x30 [ 25.773133] kasan_atomics_helper+0x3df4/0x4858 [ 25.773327] kasan_atomics+0x198/0x2e0 [ 25.773426] kunit_try_run_case+0x170/0x3f0 [ 25.773521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.773663] kthread+0x328/0x630 [ 25.773787] ret_from_fork+0x10/0x20 [ 25.773930] [ 25.774004] Allocated by task 267: [ 25.774089] kasan_save_stack+0x3c/0x68 [ 25.774194] kasan_save_track+0x20/0x40 [ 25.774281] kasan_save_alloc_info+0x40/0x58 [ 25.774396] __kasan_kmalloc+0xd4/0xd8 [ 25.774529] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.774692] kasan_atomics+0xb8/0x2e0 [ 25.774798] kunit_try_run_case+0x170/0x3f0 [ 25.774905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.775024] kthread+0x328/0x630 [ 25.775118] ret_from_fork+0x10/0x20 [ 25.775228] [ 25.775298] The buggy address belongs to the object at fff00000c78d8480 [ 25.775298] which belongs to the cache kmalloc-64 of size 64 [ 25.775537] The buggy address is located 0 bytes to the right of [ 25.775537] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.775734] [ 25.775800] The buggy address belongs to the physical page: [ 25.775887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.776032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.776180] page_type: f5(slab) [ 25.776286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.776423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.776538] page dumped because: kasan: bad access detected [ 25.776623] [ 25.776675] Memory state around the buggy address: [ 25.776777] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.776902] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.777827] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.777953] ^ [ 25.778043] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.778162] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.778267] ================================================================== [ 25.007154] ================================================================== [ 25.008795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 25.008999] Read of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.009634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.009713] Hardware name: linux,dummy-virt (DT) [ 25.010037] dump_stack_lvl+0x8c/0xd0 [ 25.011369] kthread+0x328/0x630 [ 25.011546] [ 25.011763] kasan_save_track+0x20/0x40 [ 25.012002] __kasan_kmalloc+0xd4/0xd8 [ 25.012716] kthread+0x328/0x630 [ 25.013129] The buggy address is located 0 bytes to the right of [ 25.013129] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.013329] [ 25.013387] The buggy address belongs to the physical page: [ 25.013499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.013649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.013814] page_type: f5(slab) [ 25.013909] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.014118] page dumped because: kasan: bad access detected [ 25.014481] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.014583] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.014876] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.015087] ================================================================== [ 25.778975] ================================================================== [ 25.779161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 25.779285] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.779402] [ 25.779478] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.779694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.779843] Hardware name: linux,dummy-virt (DT) [ 25.779943] Call trace: [ 25.780008] show_stack+0x20/0x38 (C) [ 25.780137] dump_stack_lvl+0x8c/0xd0 [ 25.780254] print_report+0x118/0x608 [ 25.780383] kasan_report+0xdc/0x128 [ 25.780534] kasan_check_range+0x100/0x1a8 [ 25.780693] __kasan_check_write+0x20/0x30 [ 25.781051] kasan_atomics_helper+0x16d0/0x4858 [ 25.781219] kasan_atomics+0x198/0x2e0 [ 25.781424] kunit_try_run_case+0x170/0x3f0 [ 25.781562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.781738] kthread+0x328/0x630 [ 25.781877] ret_from_fork+0x10/0x20 [ 25.781995] [ 25.782040] Allocated by task 267: [ 25.782098] kasan_save_stack+0x3c/0x68 [ 25.782191] kasan_save_track+0x20/0x40 [ 25.782279] kasan_save_alloc_info+0x40/0x58 [ 25.782406] __kasan_kmalloc+0xd4/0xd8 [ 25.782522] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.782663] kasan_atomics+0xb8/0x2e0 [ 25.782794] kunit_try_run_case+0x170/0x3f0 [ 25.782932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.783107] kthread+0x328/0x630 [ 25.783198] ret_from_fork+0x10/0x20 [ 25.783324] [ 25.783392] The buggy address belongs to the object at fff00000c78d8480 [ 25.783392] which belongs to the cache kmalloc-64 of size 64 [ 25.783554] The buggy address is located 0 bytes to the right of [ 25.783554] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.783743] [ 25.783834] The buggy address belongs to the physical page: [ 25.783957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.784179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.784380] page_type: f5(slab) [ 25.784476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.784607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.784755] page dumped because: kasan: bad access detected [ 25.784840] [ 25.784929] Memory state around the buggy address: [ 25.785029] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.785144] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.785392] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.785535] ^ [ 25.785640] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.785774] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.785874] ================================================================== [ 25.506485] ================================================================== [ 25.507268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 25.507576] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.507746] [ 25.507846] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.508068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.508153] Hardware name: linux,dummy-virt (DT) [ 25.508238] Call trace: [ 25.508307] show_stack+0x20/0x38 (C) [ 25.508432] dump_stack_lvl+0x8c/0xd0 [ 25.508557] print_report+0x118/0x608 [ 25.508671] kasan_report+0xdc/0x128 [ 25.508802] kasan_check_range+0x100/0x1a8 [ 25.508923] __kasan_check_write+0x20/0x30 [ 25.509046] kasan_atomics_helper+0xf88/0x4858 [ 25.509169] kasan_atomics+0x198/0x2e0 [ 25.509280] kunit_try_run_case+0x170/0x3f0 [ 25.511334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.511659] kthread+0x328/0x630 [ 25.511965] ret_from_fork+0x10/0x20 [ 25.512234] [ 25.512292] Allocated by task 267: [ 25.512380] kasan_save_stack+0x3c/0x68 [ 25.512491] kasan_save_track+0x20/0x40 [ 25.513088] kasan_save_alloc_info+0x40/0x58 [ 25.513544] __kasan_kmalloc+0xd4/0xd8 [ 25.513698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.514407] kasan_atomics+0xb8/0x2e0 [ 25.514664] kunit_try_run_case+0x170/0x3f0 [ 25.515127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.515290] kthread+0x328/0x630 [ 25.515387] ret_from_fork+0x10/0x20 [ 25.515485] [ 25.515982] The buggy address belongs to the object at fff00000c78d8480 [ 25.515982] which belongs to the cache kmalloc-64 of size 64 [ 25.516188] The buggy address is located 0 bytes to the right of [ 25.516188] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.516991] [ 25.517522] The buggy address belongs to the physical page: [ 25.518054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.518198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.518499] page_type: f5(slab) [ 25.519492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.519670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.519798] page dumped because: kasan: bad access detected [ 25.520311] [ 25.520524] Memory state around the buggy address: [ 25.520792] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.521265] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.521387] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.521476] ^ [ 25.521843] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.522178] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.522631] ================================================================== [ 25.109620] ================================================================== [ 25.111781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 25.117113] [ 25.119092] kthread+0x328/0x630 [ 25.125096] ================================================================== [ 25.488830] ================================================================== [ 25.489313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 25.489947] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.490085] [ 25.490172] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.490372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.490777] Hardware name: linux,dummy-virt (DT) [ 25.491472] Call trace: [ 25.491567] show_stack+0x20/0x38 (C) [ 25.491976] dump_stack_lvl+0x8c/0xd0 [ 25.492337] print_report+0x118/0x608 [ 25.492907] kasan_report+0xdc/0x128 [ 25.493060] kasan_check_range+0x100/0x1a8 [ 25.493177] __kasan_check_write+0x20/0x30 [ 25.493605] kasan_atomics_helper+0xf20/0x4858 [ 25.493769] kasan_atomics+0x198/0x2e0 [ 25.493896] kunit_try_run_case+0x170/0x3f0 [ 25.494557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.494700] kthread+0x328/0x630 [ 25.494819] ret_from_fork+0x10/0x20 [ 25.494938] [ 25.495690] Allocated by task 267: [ 25.495969] kasan_save_stack+0x3c/0x68 [ 25.496264] kasan_save_track+0x20/0x40 [ 25.496378] kasan_save_alloc_info+0x40/0x58 [ 25.496481] __kasan_kmalloc+0xd4/0xd8 [ 25.497055] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.497461] kasan_atomics+0xb8/0x2e0 [ 25.497709] kunit_try_run_case+0x170/0x3f0 [ 25.497837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.497952] kthread+0x328/0x630 [ 25.498049] ret_from_fork+0x10/0x20 [ 25.498851] [ 25.498926] The buggy address belongs to the object at fff00000c78d8480 [ 25.498926] which belongs to the cache kmalloc-64 of size 64 [ 25.499079] The buggy address is located 0 bytes to the right of [ 25.499079] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.499644] [ 25.499767] The buggy address belongs to the physical page: [ 25.500267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.500427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.501410] page_type: f5(slab) [ 25.501768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.502315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.502426] page dumped because: kasan: bad access detected [ 25.502508] [ 25.502557] Memory state around the buggy address: [ 25.502653] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.502812] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.503791] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.504158] ^ [ 25.504279] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.504403] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.504918] ================================================================== [ 25.600851] ================================================================== [ 25.601963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 25.602232] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.602374] [ 25.602722] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.603229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.603587] Hardware name: linux,dummy-virt (DT) [ 25.603686] Call trace: [ 25.604181] show_stack+0x20/0x38 (C) [ 25.604338] dump_stack_lvl+0x8c/0xd0 [ 25.604507] print_report+0x118/0x608 [ 25.605052] kasan_report+0xdc/0x128 [ 25.605339] kasan_check_range+0x100/0x1a8 [ 25.605489] __kasan_check_write+0x20/0x30 [ 25.605617] kasan_atomics_helper+0x11f8/0x4858 [ 25.606261] kasan_atomics+0x198/0x2e0 [ 25.606399] kunit_try_run_case+0x170/0x3f0 [ 25.606503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.606623] kthread+0x328/0x630 [ 25.606744] ret_from_fork+0x10/0x20 [ 25.607767] [ 25.607936] Allocated by task 267: [ 25.608037] kasan_save_stack+0x3c/0x68 [ 25.608168] kasan_save_track+0x20/0x40 [ 25.608693] kasan_save_alloc_info+0x40/0x58 [ 25.609030] __kasan_kmalloc+0xd4/0xd8 [ 25.609424] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.609559] kasan_atomics+0xb8/0x2e0 [ 25.609660] kunit_try_run_case+0x170/0x3f0 [ 25.609758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.609853] kthread+0x328/0x630 [ 25.609932] ret_from_fork+0x10/0x20 [ 25.610019] [ 25.610077] The buggy address belongs to the object at fff00000c78d8480 [ 25.610077] which belongs to the cache kmalloc-64 of size 64 [ 25.610841] The buggy address is located 0 bytes to the right of [ 25.610841] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.611043] [ 25.611105] The buggy address belongs to the physical page: [ 25.611190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.612583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.612987] page_type: f5(slab) [ 25.613124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.613518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.613960] page dumped because: kasan: bad access detected [ 25.614081] [ 25.614423] Memory state around the buggy address: [ 25.614523] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.614653] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.615210] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.615581] ^ [ 25.615681] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.615806] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.615917] ================================================================== [ 25.661167] ================================================================== [ 25.661546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 25.661950] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.662054] [ 25.662939] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.663191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.663263] Hardware name: linux,dummy-virt (DT) [ 25.663344] Call trace: [ 25.663415] show_stack+0x20/0x38 (C) [ 25.663549] dump_stack_lvl+0x8c/0xd0 [ 25.663677] print_report+0x118/0x608 [ 25.664704] kasan_report+0xdc/0x128 [ 25.665624] kasan_check_range+0x100/0x1a8 [ 25.666501] __kasan_check_write+0x20/0x30 [ 25.666743] kasan_atomics_helper+0x1384/0x4858 [ 25.667070] kasan_atomics+0x198/0x2e0 [ 25.667349] kunit_try_run_case+0x170/0x3f0 [ 25.667750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.668161] kthread+0x328/0x630 [ 25.668771] ret_from_fork+0x10/0x20 [ 25.669322] [ 25.669456] Allocated by task 267: [ 25.669678] kasan_save_stack+0x3c/0x68 [ 25.670520] kasan_save_track+0x20/0x40 [ 25.670776] kasan_save_alloc_info+0x40/0x58 [ 25.670879] __kasan_kmalloc+0xd4/0xd8 [ 25.670974] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.671515] kasan_atomics+0xb8/0x2e0 [ 25.671620] kunit_try_run_case+0x170/0x3f0 [ 25.672780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.673450] kthread+0x328/0x630 [ 25.674046] ret_from_fork+0x10/0x20 [ 25.674180] [ 25.674239] The buggy address belongs to the object at fff00000c78d8480 [ 25.674239] which belongs to the cache kmalloc-64 of size 64 [ 25.674708] The buggy address is located 0 bytes to the right of [ 25.674708] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.676862] [ 25.676926] The buggy address belongs to the physical page: [ 25.677006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.677121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.677188] page_type: f5(slab) [ 25.677259] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.677393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.677530] page dumped because: kasan: bad access detected [ 25.677623] [ 25.677675] Memory state around the buggy address: [ 25.677779] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.677900] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.678012] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.678134] ^ [ 25.678228] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.678319] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.678395] ================================================================== [ 25.457211] ================================================================== [ 25.458437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 25.458643] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.458792] [ 25.458884] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.459053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.459109] Hardware name: linux,dummy-virt (DT) [ 25.459171] Call trace: [ 25.459220] show_stack+0x20/0x38 (C) [ 25.459342] dump_stack_lvl+0x8c/0xd0 [ 25.459496] print_report+0x118/0x608 [ 25.459671] kasan_report+0xdc/0x128 [ 25.459854] __asan_report_store8_noabort+0x20/0x30 [ 25.460046] kasan_atomics_helper+0x3e5c/0x4858 [ 25.460191] kasan_atomics+0x198/0x2e0 [ 25.460310] kunit_try_run_case+0x170/0x3f0 [ 25.460439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.460576] kthread+0x328/0x630 [ 25.460689] ret_from_fork+0x10/0x20 [ 25.460816] [ 25.460867] Allocated by task 267: [ 25.460941] kasan_save_stack+0x3c/0x68 [ 25.461067] kasan_save_track+0x20/0x40 [ 25.461616] kasan_save_alloc_info+0x40/0x58 [ 25.461811] __kasan_kmalloc+0xd4/0xd8 [ 25.461945] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.462059] kasan_atomics+0xb8/0x2e0 [ 25.462153] kunit_try_run_case+0x170/0x3f0 [ 25.462257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.462367] kthread+0x328/0x630 [ 25.462442] ret_from_fork+0x10/0x20 [ 25.463109] [ 25.463180] The buggy address belongs to the object at fff00000c78d8480 [ 25.463180] which belongs to the cache kmalloc-64 of size 64 [ 25.463339] The buggy address is located 0 bytes to the right of [ 25.463339] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.463514] [ 25.463568] The buggy address belongs to the physical page: [ 25.463667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.463889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.464087] page_type: f5(slab) [ 25.464221] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.464357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.464524] page dumped because: kasan: bad access detected [ 25.464650] [ 25.464725] Memory state around the buggy address: [ 25.464815] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.464934] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.465104] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.465203] ^ [ 25.465299] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.465610] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.465848] ================================================================== [ 25.245088] ================================================================== [ 25.245169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 25.245243] Write of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.245835] [ 25.245960] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.246188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.246268] Hardware name: linux,dummy-virt (DT) [ 25.246354] Call trace: [ 25.246441] show_stack+0x20/0x38 (C) [ 25.246579] dump_stack_lvl+0x8c/0xd0 [ 25.246705] print_report+0x118/0x608 [ 25.246844] kasan_report+0xdc/0x128 [ 25.246964] kasan_check_range+0x100/0x1a8 [ 25.247101] __kasan_check_write+0x20/0x30 [ 25.247250] kasan_atomics_helper+0xa04/0x4858 [ 25.247382] kasan_atomics+0x198/0x2e0 [ 25.247498] kunit_try_run_case+0x170/0x3f0 [ 25.247649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.248515] kthread+0x328/0x630 [ 25.248787] ret_from_fork+0x10/0x20 [ 25.248982] [ 25.249041] Allocated by task 267: [ 25.249353] kasan_save_stack+0x3c/0x68 [ 25.249455] kasan_save_track+0x20/0x40 [ 25.249567] kasan_save_alloc_info+0x40/0x58 [ 25.249710] __kasan_kmalloc+0xd4/0xd8 [ 25.249837] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.249947] kasan_atomics+0xb8/0x2e0 [ 25.250036] kunit_try_run_case+0x170/0x3f0 [ 25.250144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.250239] kthread+0x328/0x630 [ 25.250309] ret_from_fork+0x10/0x20 [ 25.250372] [ 25.250413] The buggy address belongs to the object at fff00000c78d8480 [ 25.250413] which belongs to the cache kmalloc-64 of size 64 [ 25.250547] The buggy address is located 0 bytes to the right of [ 25.250547] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.250720] [ 25.250787] The buggy address belongs to the physical page: [ 25.250867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.251108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.251251] page_type: f5(slab) [ 25.251344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.251461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.251575] page dumped because: kasan: bad access detected [ 25.251662] [ 25.251712] Memory state around the buggy address: [ 25.251814] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.251933] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.252045] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.252151] ^ [ 25.252237] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.252332] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.252439] ================================================================== [ 25.466707] ================================================================== [ 25.466849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 25.466975] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.467281] [ 25.467391] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.467626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.467703] Hardware name: linux,dummy-virt (DT) [ 25.467800] Call trace: [ 25.467868] show_stack+0x20/0x38 (C) [ 25.467988] dump_stack_lvl+0x8c/0xd0 [ 25.468121] print_report+0x118/0x608 [ 25.468243] kasan_report+0xdc/0x128 [ 25.468362] kasan_check_range+0x100/0x1a8 [ 25.468484] __kasan_check_write+0x20/0x30 [ 25.468609] kasan_atomics_helper+0xeb8/0x4858 [ 25.468743] kasan_atomics+0x198/0x2e0 [ 25.468863] kunit_try_run_case+0x170/0x3f0 [ 25.468994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.469134] kthread+0x328/0x630 [ 25.469249] ret_from_fork+0x10/0x20 [ 25.470276] [ 25.471037] Allocated by task 267: [ 25.472251] kasan_save_stack+0x3c/0x68 [ 25.472819] kasan_save_track+0x20/0x40 [ 25.473344] kasan_save_alloc_info+0x40/0x58 [ 25.473681] __kasan_kmalloc+0xd4/0xd8 [ 25.473779] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.473868] kasan_atomics+0xb8/0x2e0 [ 25.473950] kunit_try_run_case+0x170/0x3f0 [ 25.474053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.475724] kthread+0x328/0x630 [ 25.476347] ret_from_fork+0x10/0x20 [ 25.476492] [ 25.477199] The buggy address belongs to the object at fff00000c78d8480 [ 25.477199] which belongs to the cache kmalloc-64 of size 64 [ 25.477705] The buggy address is located 0 bytes to the right of [ 25.477705] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.479165] [ 25.479566] The buggy address belongs to the physical page: [ 25.480236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.481360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.481518] page_type: f5(slab) [ 25.481630] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.481753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.481841] page dumped because: kasan: bad access detected [ 25.481919] [ 25.481967] Memory state around the buggy address: [ 25.482066] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.482188] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.482299] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.483078] ^ [ 25.483665] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.484158] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.484348] ================================================================== [ 25.307044] ================================================================== [ 25.308381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 25.308608] Write of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.309083] [ 25.309295] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.310103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.310231] Hardware name: linux,dummy-virt (DT) [ 25.310324] Call trace: [ 25.310952] show_stack+0x20/0x38 (C) [ 25.311399] dump_stack_lvl+0x8c/0xd0 [ 25.311703] print_report+0x118/0x608 [ 25.312170] kasan_report+0xdc/0x128 [ 25.312506] kasan_check_range+0x100/0x1a8 [ 25.312627] __kasan_check_write+0x20/0x30 [ 25.313891] kasan_atomics_helper+0xb70/0x4858 [ 25.314211] kasan_atomics+0x198/0x2e0 [ 25.314963] kunit_try_run_case+0x170/0x3f0 [ 25.315308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.315523] kthread+0x328/0x630 [ 25.315641] ret_from_fork+0x10/0x20 [ 25.315780] [ 25.315839] Allocated by task 267: [ 25.315918] kasan_save_stack+0x3c/0x68 [ 25.316024] kasan_save_track+0x20/0x40 [ 25.316795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.322129] The buggy address belongs to the physical page: [ 25.325170] page dumped because: kasan: bad access detected [ 25.327156] ^ [ 25.329788] Read of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.330820] Call trace: [ 25.333049] kasan_atomics+0x198/0x2e0 [ 25.338130] kasan_atomics+0xb8/0x2e0 [ 25.340871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.343635] [ 25.344453] ^ [ 25.350445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.354779] kasan_save_stack+0x3c/0x68 [ 25.358305] [ 25.358869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.359956] [ 25.361015] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.363204] [ 25.366159] kthread+0x328/0x630 [ 25.368613] kthread+0x328/0x630 [ 25.369501] The buggy address is located 0 bytes to the right of [ 25.369501] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.373364] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.381609] kasan_save_track+0x20/0x40 [ 25.382954] kthread+0x328/0x630 [ 25.383048] ret_from_fork+0x10/0x20 [ 25.383236] [ 25.383326] The buggy address belongs to the object at fff00000c78d8480 [ 25.383326] which belongs to the cache kmalloc-64 of size 64 [ 25.383894] The buggy address is located 0 bytes to the right of [ 25.383894] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.384141] [ 25.384460] The buggy address belongs to the physical page: [ 25.384592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.384862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.385004] page_type: f5(slab) [ 25.385110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.385244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.385348] page dumped because: kasan: bad access detected [ 25.385438] [ 25.385495] Memory state around the buggy address: [ 25.385582] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.386130] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.386316] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.386549] ^ [ 25.386763] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.387055] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.387380] ================================================================== [ 25.449269] ================================================================== [ 25.449496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 25.449686] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267 [ 25.449852] [ 25.449935] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT [ 25.450151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.450217] Hardware name: linux,dummy-virt (DT) [ 25.450299] Call trace: [ 25.450363] show_stack+0x20/0x38 (C) [ 25.450488] dump_stack_lvl+0x8c/0xd0 [ 25.450917] print_report+0x118/0x608 [ 25.451092] kasan_report+0xdc/0x128 [ 25.451212] kasan_check_range+0x100/0x1a8 [ 25.451358] __kasan_check_write+0x20/0x30 [ 25.451504] kasan_atomics_helper+0xe44/0x4858 [ 25.451672] kasan_atomics+0x198/0x2e0 [ 25.451857] kunit_try_run_case+0x170/0x3f0 [ 25.452035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.452207] kthread+0x328/0x630 [ 25.452341] ret_from_fork+0x10/0x20 [ 25.452478] [ 25.452530] Allocated by task 267: [ 25.452605] kasan_save_stack+0x3c/0x68 [ 25.452718] kasan_save_track+0x20/0x40 [ 25.452822] kasan_save_alloc_info+0x40/0x58 [ 25.452920] __kasan_kmalloc+0xd4/0xd8 [ 25.453018] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.453137] kasan_atomics+0xb8/0x2e0 [ 25.453765] kunit_try_run_case+0x170/0x3f0 [ 25.453908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.454051] kthread+0x328/0x630 [ 25.454175] ret_from_fork+0x10/0x20 [ 25.454302] [ 25.454373] The buggy address belongs to the object at fff00000c78d8480 [ 25.454373] which belongs to the cache kmalloc-64 of size 64 [ 25.454598] The buggy address is located 0 bytes to the right of [ 25.454598] allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0) [ 25.454856] [ 25.454948] The buggy address belongs to the physical page: [ 25.455034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 25.455148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.455258] page_type: f5(slab) [ 25.455360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.455492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.455608] page dumped because: kasan: bad access detected [ 25.455698] [ 25.455767] Memory state around the buggy address: [ 25.455893] fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.456056] fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.456226] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.456346] ^ [ 25.456455] fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.456575] fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.456700] ==================================================================
[ 24.778703] ================================================================== [ 24.779439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 24.780276] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.780986] [ 24.781395] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.781533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.781578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.781640] Call Trace: [ 24.781824] <TASK> [ 24.781910] dump_stack_lvl+0x73/0xb0 [ 24.782003] print_report+0xd1/0x650 [ 24.782187] ? __virt_addr_valid+0x1db/0x2d0 [ 24.782313] ? kasan_atomics_helper+0x4a1c/0x5450 [ 24.782398] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.782481] ? kasan_atomics_helper+0x4a1c/0x5450 [ 24.782637] kasan_report+0x141/0x180 [ 24.782753] ? kasan_atomics_helper+0x4a1c/0x5450 [ 24.782822] __asan_report_load4_noabort+0x18/0x20 [ 24.782860] kasan_atomics_helper+0x4a1c/0x5450 [ 24.782897] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.782934] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.782971] ? kasan_atomics+0x152/0x310 [ 24.783006] kasan_atomics+0x1dc/0x310 [ 24.783059] ? __pfx_kasan_atomics+0x10/0x10 [ 24.783117] ? __pfx_read_tsc+0x10/0x10 [ 24.783155] ? ktime_get_ts64+0x86/0x230 [ 24.783196] kunit_try_run_case+0x1a5/0x480 [ 24.783236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.783271] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.783336] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.783378] ? __kthread_parkme+0x82/0x180 [ 24.783413] ? preempt_count_sub+0x50/0x80 [ 24.783450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.783487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.783523] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.783559] kthread+0x337/0x6f0 [ 24.783585] ? trace_preempt_on+0x20/0xc0 [ 24.783623] ? __pfx_kthread+0x10/0x10 [ 24.783651] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.783685] ? calculate_sigpending+0x7b/0xa0 [ 24.783717] ? __pfx_kthread+0x10/0x10 [ 24.783745] ret_from_fork+0x41/0x80 [ 24.783780] ? __pfx_kthread+0x10/0x10 [ 24.783809] ret_from_fork_asm+0x1a/0x30 [ 24.783856] </TASK> [ 24.783874] [ 24.798433] Allocated by task 285: [ 24.798931] kasan_save_stack+0x45/0x70 [ 24.799546] kasan_save_track+0x18/0x40 [ 24.799986] kasan_save_alloc_info+0x3b/0x50 [ 24.800520] __kasan_kmalloc+0xb7/0xc0 [ 24.800979] __kmalloc_cache_noprof+0x189/0x420 [ 24.801517] kasan_atomics+0x95/0x310 [ 24.801929] kunit_try_run_case+0x1a5/0x480 [ 24.802589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.802982] kthread+0x337/0x6f0 [ 24.803395] ret_from_fork+0x41/0x80 [ 24.803821] ret_from_fork_asm+0x1a/0x30 [ 24.804511] [ 24.804735] The buggy address belongs to the object at ffff888102ef1180 [ 24.804735] which belongs to the cache kmalloc-64 of size 64 [ 24.805584] The buggy address is located 0 bytes to the right of [ 24.805584] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.806735] [ 24.806984] The buggy address belongs to the physical page: [ 24.807637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.808415] flags: 0x200000000000000(node=0|zone=2) [ 24.808780] page_type: f5(slab) [ 24.809073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.809681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.810750] page dumped because: kasan: bad access detected [ 24.811490] [ 24.811757] Memory state around the buggy address: [ 24.812400] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.813074] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.813722] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.814172] ^ [ 24.814539] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.814977] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.815638] ================================================================== [ 25.316147] ================================================================== [ 25.316715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 25.317555] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.318192] [ 25.318407] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.318480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.318501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.318536] Call Trace: [ 25.318561] <TASK> [ 25.318589] dump_stack_lvl+0x73/0xb0 [ 25.318635] print_report+0xd1/0x650 [ 25.318675] ? __virt_addr_valid+0x1db/0x2d0 [ 25.318710] ? kasan_atomics_helper+0x15b6/0x5450 [ 25.318746] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.318784] ? kasan_atomics_helper+0x15b6/0x5450 [ 25.318819] kasan_report+0x141/0x180 [ 25.318856] ? kasan_atomics_helper+0x15b6/0x5450 [ 25.318900] kasan_check_range+0x10c/0x1c0 [ 25.318932] __kasan_check_write+0x18/0x20 [ 25.318964] kasan_atomics_helper+0x15b6/0x5450 [ 25.319000] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.319044] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.320276] ? kasan_atomics+0x152/0x310 [ 25.320373] kasan_atomics+0x1dc/0x310 [ 25.320447] ? __pfx_kasan_atomics+0x10/0x10 [ 25.320520] ? __pfx_read_tsc+0x10/0x10 [ 25.320599] ? ktime_get_ts64+0x86/0x230 [ 25.320680] kunit_try_run_case+0x1a5/0x480 [ 25.320762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.320839] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.320925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.321001] ? __kthread_parkme+0x82/0x180 [ 25.321081] ? preempt_count_sub+0x50/0x80 [ 25.321170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.321251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.321342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.321385] kthread+0x337/0x6f0 [ 25.321417] ? trace_preempt_on+0x20/0xc0 [ 25.321458] ? __pfx_kthread+0x10/0x10 [ 25.321489] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.321524] ? calculate_sigpending+0x7b/0xa0 [ 25.321562] ? __pfx_kthread+0x10/0x10 [ 25.321592] ret_from_fork+0x41/0x80 [ 25.321630] ? __pfx_kthread+0x10/0x10 [ 25.321662] ret_from_fork_asm+0x1a/0x30 [ 25.321709] </TASK> [ 25.321727] [ 25.343090] Allocated by task 285: [ 25.343553] kasan_save_stack+0x45/0x70 [ 25.344105] kasan_save_track+0x18/0x40 [ 25.344491] kasan_save_alloc_info+0x3b/0x50 [ 25.344952] __kasan_kmalloc+0xb7/0xc0 [ 25.345352] __kmalloc_cache_noprof+0x189/0x420 [ 25.345713] kasan_atomics+0x95/0x310 [ 25.346091] kunit_try_run_case+0x1a5/0x480 [ 25.346775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.347903] kthread+0x337/0x6f0 [ 25.348313] ret_from_fork+0x41/0x80 [ 25.348671] ret_from_fork_asm+0x1a/0x30 [ 25.349065] [ 25.350028] The buggy address belongs to the object at ffff888102ef1180 [ 25.350028] which belongs to the cache kmalloc-64 of size 64 [ 25.351305] The buggy address is located 0 bytes to the right of [ 25.351305] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.352808] [ 25.353058] The buggy address belongs to the physical page: [ 25.353545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.354137] flags: 0x200000000000000(node=0|zone=2) [ 25.355138] page_type: f5(slab) [ 25.355826] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.356708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.357639] page dumped because: kasan: bad access detected [ 25.358264] [ 25.358520] Memory state around the buggy address: [ 25.359141] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.359739] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.360760] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.361225] ^ [ 25.361567] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.362550] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.363083] ================================================================== [ 24.513148] ================================================================== [ 24.513860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 24.514509] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.515203] [ 24.515521] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.515691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.515735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.515827] Call Trace: [ 24.515894] <TASK> [ 24.515980] dump_stack_lvl+0x73/0xb0 [ 24.516121] print_report+0xd1/0x650 [ 24.516208] ? __virt_addr_valid+0x1db/0x2d0 [ 24.516286] ? kasan_atomics_helper+0xde0/0x5450 [ 24.516384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.516463] ? kasan_atomics_helper+0xde0/0x5450 [ 24.516539] kasan_report+0x141/0x180 [ 24.516619] ? kasan_atomics_helper+0xde0/0x5450 [ 24.516708] kasan_check_range+0x10c/0x1c0 [ 24.516783] __kasan_check_write+0x18/0x20 [ 24.516858] kasan_atomics_helper+0xde0/0x5450 [ 24.516901] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.516942] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.516981] ? kasan_atomics+0x152/0x310 [ 24.517018] kasan_atomics+0x1dc/0x310 [ 24.517091] ? __pfx_kasan_atomics+0x10/0x10 [ 24.517133] ? __pfx_read_tsc+0x10/0x10 [ 24.517172] ? ktime_get_ts64+0x86/0x230 [ 24.517215] kunit_try_run_case+0x1a5/0x480 [ 24.517258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.517321] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.517369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.517410] ? __kthread_parkme+0x82/0x180 [ 24.517447] ? preempt_count_sub+0x50/0x80 [ 24.517487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.517527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.517565] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.517603] kthread+0x337/0x6f0 [ 24.517631] ? trace_preempt_on+0x20/0xc0 [ 24.517671] ? __pfx_kthread+0x10/0x10 [ 24.517701] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.517738] ? calculate_sigpending+0x7b/0xa0 [ 24.517773] ? __pfx_kthread+0x10/0x10 [ 24.517803] ret_from_fork+0x41/0x80 [ 24.517839] ? __pfx_kthread+0x10/0x10 [ 24.517871] ret_from_fork_asm+0x1a/0x30 [ 24.517919] </TASK> [ 24.517939] [ 24.537090] Allocated by task 285: [ 24.537788] kasan_save_stack+0x45/0x70 [ 24.538459] kasan_save_track+0x18/0x40 [ 24.538788] kasan_save_alloc_info+0x3b/0x50 [ 24.539426] __kasan_kmalloc+0xb7/0xc0 [ 24.539753] __kmalloc_cache_noprof+0x189/0x420 [ 24.540250] kasan_atomics+0x95/0x310 [ 24.540621] kunit_try_run_case+0x1a5/0x480 [ 24.540984] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.541459] kthread+0x337/0x6f0 [ 24.541835] ret_from_fork+0x41/0x80 [ 24.542323] ret_from_fork_asm+0x1a/0x30 [ 24.542766] [ 24.543010] The buggy address belongs to the object at ffff888102ef1180 [ 24.543010] which belongs to the cache kmalloc-64 of size 64 [ 24.543969] The buggy address is located 0 bytes to the right of [ 24.543969] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.544962] [ 24.545264] The buggy address belongs to the physical page: [ 24.545783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.546500] flags: 0x200000000000000(node=0|zone=2) [ 24.546973] page_type: f5(slab) [ 24.547395] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.548106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.548643] page dumped because: kasan: bad access detected [ 24.549203] [ 24.549468] Memory state around the buggy address: [ 24.549904] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.550468] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.551132] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.551703] ^ [ 24.552166] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.552806] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.553483] ================================================================== [ 25.232919] ================================================================== [ 25.233575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 25.234237] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.234799] [ 25.235085] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.235221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.235262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.235347] Call Trace: [ 25.235408] <TASK> [ 25.235474] dump_stack_lvl+0x73/0xb0 [ 25.235601] print_report+0xd1/0x650 [ 25.235688] ? __virt_addr_valid+0x1db/0x2d0 [ 25.235781] ? kasan_atomics_helper+0x50d4/0x5450 [ 25.235873] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.235980] ? kasan_atomics_helper+0x50d4/0x5450 [ 25.236086] kasan_report+0x141/0x180 [ 25.236188] ? kasan_atomics_helper+0x50d4/0x5450 [ 25.236289] __asan_report_store8_noabort+0x1b/0x30 [ 25.236579] kasan_atomics_helper+0x50d4/0x5450 [ 25.236684] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.236751] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.236796] ? kasan_atomics+0x152/0x310 [ 25.236833] kasan_atomics+0x1dc/0x310 [ 25.236867] ? __pfx_kasan_atomics+0x10/0x10 [ 25.236901] ? __pfx_read_tsc+0x10/0x10 [ 25.236939] ? ktime_get_ts64+0x86/0x230 [ 25.236982] kunit_try_run_case+0x1a5/0x480 [ 25.237022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.237088] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.237136] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.237174] ? __kthread_parkme+0x82/0x180 [ 25.237211] ? preempt_count_sub+0x50/0x80 [ 25.237252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.237313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.237394] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.237480] kthread+0x337/0x6f0 [ 25.237546] ? trace_preempt_on+0x20/0xc0 [ 25.237630] ? __pfx_kthread+0x10/0x10 [ 25.237697] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.237776] ? calculate_sigpending+0x7b/0xa0 [ 25.237859] ? __pfx_kthread+0x10/0x10 [ 25.237929] ret_from_fork+0x41/0x80 [ 25.238004] ? __pfx_kthread+0x10/0x10 [ 25.238094] ret_from_fork_asm+0x1a/0x30 [ 25.238151] </TASK> [ 25.238170] [ 25.253078] Allocated by task 285: [ 25.253494] kasan_save_stack+0x45/0x70 [ 25.253900] kasan_save_track+0x18/0x40 [ 25.254310] kasan_save_alloc_info+0x3b/0x50 [ 25.254897] __kasan_kmalloc+0xb7/0xc0 [ 25.255382] __kmalloc_cache_noprof+0x189/0x420 [ 25.255734] kasan_atomics+0x95/0x310 [ 25.256073] kunit_try_run_case+0x1a5/0x480 [ 25.256543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.257056] kthread+0x337/0x6f0 [ 25.257485] ret_from_fork+0x41/0x80 [ 25.258116] ret_from_fork_asm+0x1a/0x30 [ 25.258471] [ 25.258660] The buggy address belongs to the object at ffff888102ef1180 [ 25.258660] which belongs to the cache kmalloc-64 of size 64 [ 25.259841] The buggy address is located 0 bytes to the right of [ 25.259841] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.261023] [ 25.261376] The buggy address belongs to the physical page: [ 25.261770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.262406] flags: 0x200000000000000(node=0|zone=2) [ 25.263061] page_type: f5(slab) [ 25.263428] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.263931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.264584] page dumped because: kasan: bad access detected [ 25.265126] [ 25.265466] Memory state around the buggy address: [ 25.265925] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.266759] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.267226] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.267863] ^ [ 25.269138] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.269785] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.270436] ================================================================== [ 25.364245] ================================================================== [ 25.366031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 25.366743] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.368184] [ 25.368675] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.368956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.368980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.369014] Call Trace: [ 25.369055] <TASK> [ 25.369101] dump_stack_lvl+0x73/0xb0 [ 25.369155] print_report+0xd1/0x650 [ 25.369197] ? __virt_addr_valid+0x1db/0x2d0 [ 25.369238] ? kasan_atomics_helper+0x164f/0x5450 [ 25.369275] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.369342] ? kasan_atomics_helper+0x164f/0x5450 [ 25.369380] kasan_report+0x141/0x180 [ 25.369420] ? kasan_atomics_helper+0x164f/0x5450 [ 25.369464] kasan_check_range+0x10c/0x1c0 [ 25.369498] __kasan_check_write+0x18/0x20 [ 25.369531] kasan_atomics_helper+0x164f/0x5450 [ 25.369569] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.369605] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.369644] ? kasan_atomics+0x152/0x310 [ 25.369682] kasan_atomics+0x1dc/0x310 [ 25.369716] ? __pfx_kasan_atomics+0x10/0x10 [ 25.369752] ? __pfx_read_tsc+0x10/0x10 [ 25.369791] ? ktime_get_ts64+0x86/0x230 [ 25.369836] kunit_try_run_case+0x1a5/0x480 [ 25.369879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.369918] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.369960] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.369998] ? __kthread_parkme+0x82/0x180 [ 25.370039] ? preempt_count_sub+0x50/0x80 [ 25.370105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.370148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.370188] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.370226] kthread+0x337/0x6f0 [ 25.370255] ? trace_preempt_on+0x20/0xc0 [ 25.370315] ? __pfx_kthread+0x10/0x10 [ 25.370348] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.370385] ? calculate_sigpending+0x7b/0xa0 [ 25.370425] ? __pfx_kthread+0x10/0x10 [ 25.370455] ret_from_fork+0x41/0x80 [ 25.370494] ? __pfx_kthread+0x10/0x10 [ 25.370524] ret_from_fork_asm+0x1a/0x30 [ 25.370575] </TASK> [ 25.370596] [ 25.392657] Allocated by task 285: [ 25.393123] kasan_save_stack+0x45/0x70 [ 25.393541] kasan_save_track+0x18/0x40 [ 25.393961] kasan_save_alloc_info+0x3b/0x50 [ 25.394800] __kasan_kmalloc+0xb7/0xc0 [ 25.395482] __kmalloc_cache_noprof+0x189/0x420 [ 25.395786] kasan_atomics+0x95/0x310 [ 25.396049] kunit_try_run_case+0x1a5/0x480 [ 25.397557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.397998] kthread+0x337/0x6f0 [ 25.398595] ret_from_fork+0x41/0x80 [ 25.398895] ret_from_fork_asm+0x1a/0x30 [ 25.399383] [ 25.399634] The buggy address belongs to the object at ffff888102ef1180 [ 25.399634] which belongs to the cache kmalloc-64 of size 64 [ 25.400600] The buggy address is located 0 bytes to the right of [ 25.400600] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.401579] [ 25.401769] The buggy address belongs to the physical page: [ 25.402941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.404022] flags: 0x200000000000000(node=0|zone=2) [ 25.404646] page_type: f5(slab) [ 25.404912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.405727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.406595] page dumped because: kasan: bad access detected [ 25.407012] [ 25.407442] Memory state around the buggy address: [ 25.408415] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.408912] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.409662] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.410198] ^ [ 25.410821] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.411923] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.412610] ================================================================== [ 24.190661] ================================================================== [ 24.191509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 24.192612] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.194612] [ 24.194858] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.194973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.195005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.195051] Call Trace: [ 24.195106] <TASK> [ 24.195144] dump_stack_lvl+0x73/0xb0 [ 24.195192] print_report+0xd1/0x650 [ 24.195235] ? __virt_addr_valid+0x1db/0x2d0 [ 24.195269] ? kasan_atomics_helper+0x992/0x5450 [ 24.195365] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.195451] ? kasan_atomics_helper+0x992/0x5450 [ 24.195527] kasan_report+0x141/0x180 [ 24.195607] ? kasan_atomics_helper+0x992/0x5450 [ 24.195699] kasan_check_range+0x10c/0x1c0 [ 24.195774] __kasan_check_write+0x18/0x20 [ 24.195845] kasan_atomics_helper+0x992/0x5450 [ 24.195940] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.196024] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.196092] ? kasan_atomics+0x152/0x310 [ 24.196168] kasan_atomics+0x1dc/0x310 [ 24.196207] ? __pfx_kasan_atomics+0x10/0x10 [ 24.196243] ? __pfx_read_tsc+0x10/0x10 [ 24.196279] ? ktime_get_ts64+0x86/0x230 [ 24.196349] kunit_try_run_case+0x1a5/0x480 [ 24.196391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.196426] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.196463] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.196499] ? __kthread_parkme+0x82/0x180 [ 24.196534] ? preempt_count_sub+0x50/0x80 [ 24.196572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.196610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.196646] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.196682] kthread+0x337/0x6f0 [ 24.196709] ? trace_preempt_on+0x20/0xc0 [ 24.196746] ? __pfx_kthread+0x10/0x10 [ 24.196774] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.196807] ? calculate_sigpending+0x7b/0xa0 [ 24.196841] ? __pfx_kthread+0x10/0x10 [ 24.196869] ret_from_fork+0x41/0x80 [ 24.196903] ? __pfx_kthread+0x10/0x10 [ 24.196932] ret_from_fork_asm+0x1a/0x30 [ 24.197022] </TASK> [ 24.197070] [ 24.218224] Allocated by task 285: [ 24.218828] kasan_save_stack+0x45/0x70 [ 24.219435] kasan_save_track+0x18/0x40 [ 24.219890] kasan_save_alloc_info+0x3b/0x50 [ 24.220433] __kasan_kmalloc+0xb7/0xc0 [ 24.220838] __kmalloc_cache_noprof+0x189/0x420 [ 24.221383] kasan_atomics+0x95/0x310 [ 24.221842] kunit_try_run_case+0x1a5/0x480 [ 24.222377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.222938] kthread+0x337/0x6f0 [ 24.223418] ret_from_fork+0x41/0x80 [ 24.223818] ret_from_fork_asm+0x1a/0x30 [ 24.224325] [ 24.224570] The buggy address belongs to the object at ffff888102ef1180 [ 24.224570] which belongs to the cache kmalloc-64 of size 64 [ 24.225429] The buggy address is located 0 bytes to the right of [ 24.225429] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.226495] [ 24.226750] The buggy address belongs to the physical page: [ 24.227370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.228029] flags: 0x200000000000000(node=0|zone=2) [ 24.228588] page_type: f5(slab) [ 24.228998] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.229714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.230446] page dumped because: kasan: bad access detected [ 24.230930] [ 24.231263] Memory state around the buggy address: [ 24.231722] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.232395] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.233154] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.233818] ^ [ 24.234348] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.234944] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.235601] ================================================================== [ 26.050821] ================================================================== [ 26.052134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 26.053014] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 26.054551] [ 26.054860] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 26.055015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.055077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.055138] Call Trace: [ 26.055171] <TASK> [ 26.055198] dump_stack_lvl+0x73/0xb0 [ 26.055246] print_report+0xd1/0x650 [ 26.055326] ? __virt_addr_valid+0x1db/0x2d0 [ 26.055387] ? kasan_atomics_helper+0x1f43/0x5450 [ 26.055426] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.055464] ? kasan_atomics_helper+0x1f43/0x5450 [ 26.055501] kasan_report+0x141/0x180 [ 26.055539] ? kasan_atomics_helper+0x1f43/0x5450 [ 26.055583] kasan_check_range+0x10c/0x1c0 [ 26.055616] __kasan_check_write+0x18/0x20 [ 26.055650] kasan_atomics_helper+0x1f43/0x5450 [ 26.055688] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.055725] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.055761] ? kasan_atomics+0x152/0x310 [ 26.055798] kasan_atomics+0x1dc/0x310 [ 26.055830] ? __pfx_kasan_atomics+0x10/0x10 [ 26.055863] ? __pfx_read_tsc+0x10/0x10 [ 26.055920] ? ktime_get_ts64+0x86/0x230 [ 26.055965] kunit_try_run_case+0x1a5/0x480 [ 26.056007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.056046] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.056087] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.056126] ? __kthread_parkme+0x82/0x180 [ 26.056162] ? preempt_count_sub+0x50/0x80 [ 26.056203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.056243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.056281] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.056396] kthread+0x337/0x6f0 [ 26.056469] ? trace_preempt_on+0x20/0xc0 [ 26.056556] ? __pfx_kthread+0x10/0x10 [ 26.056618] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.056656] ? calculate_sigpending+0x7b/0xa0 [ 26.056692] ? __pfx_kthread+0x10/0x10 [ 26.056720] ret_from_fork+0x41/0x80 [ 26.056756] ? __pfx_kthread+0x10/0x10 [ 26.056786] ret_from_fork_asm+0x1a/0x30 [ 26.056833] </TASK> [ 26.056852] [ 26.076512] Allocated by task 285: [ 26.076852] kasan_save_stack+0x45/0x70 [ 26.077952] kasan_save_track+0x18/0x40 [ 26.078259] kasan_save_alloc_info+0x3b/0x50 [ 26.078862] __kasan_kmalloc+0xb7/0xc0 [ 26.079239] __kmalloc_cache_noprof+0x189/0x420 [ 26.080079] kasan_atomics+0x95/0x310 [ 26.080528] kunit_try_run_case+0x1a5/0x480 [ 26.080938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.081807] kthread+0x337/0x6f0 [ 26.082605] ret_from_fork+0x41/0x80 [ 26.082919] ret_from_fork_asm+0x1a/0x30 [ 26.083675] [ 26.083869] The buggy address belongs to the object at ffff888102ef1180 [ 26.083869] which belongs to the cache kmalloc-64 of size 64 [ 26.085509] The buggy address is located 0 bytes to the right of [ 26.085509] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 26.086034] [ 26.086167] The buggy address belongs to the physical page: [ 26.086396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 26.086666] flags: 0x200000000000000(node=0|zone=2) [ 26.086861] page_type: f5(slab) [ 26.087011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.088673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.089357] page dumped because: kasan: bad access detected [ 26.089772] [ 26.090017] Memory state around the buggy address: [ 26.090545] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.091309] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.091826] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.092592] ^ [ 26.093154] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.093858] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.094887] ================================================================== [ 26.096164] ================================================================== [ 26.096684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 26.097360] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 26.098033] [ 26.098350] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 26.098488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.098591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.098663] Call Trace: [ 26.098721] <TASK> [ 26.098779] dump_stack_lvl+0x73/0xb0 [ 26.098933] print_report+0xd1/0x650 [ 26.099021] ? __virt_addr_valid+0x1db/0x2d0 [ 26.099103] ? kasan_atomics_helper+0x4f71/0x5450 [ 26.099240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.099350] ? kasan_atomics_helper+0x4f71/0x5450 [ 26.099432] kasan_report+0x141/0x180 [ 26.099513] ? kasan_atomics_helper+0x4f71/0x5450 [ 26.099672] __asan_report_load8_noabort+0x18/0x20 [ 26.099870] kasan_atomics_helper+0x4f71/0x5450 [ 26.099974] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.100054] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.100197] ? kasan_atomics+0x152/0x310 [ 26.100287] kasan_atomics+0x1dc/0x310 [ 26.100390] ? __pfx_kasan_atomics+0x10/0x10 [ 26.100466] ? __pfx_read_tsc+0x10/0x10 [ 26.100530] ? ktime_get_ts64+0x86/0x230 [ 26.100575] kunit_try_run_case+0x1a5/0x480 [ 26.100620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.100661] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.100707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.100746] ? __kthread_parkme+0x82/0x180 [ 26.100783] ? preempt_count_sub+0x50/0x80 [ 26.100823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.100864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.100903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.100942] kthread+0x337/0x6f0 [ 26.100971] ? trace_preempt_on+0x20/0xc0 [ 26.101011] ? __pfx_kthread+0x10/0x10 [ 26.101048] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.101133] ? calculate_sigpending+0x7b/0xa0 [ 26.101173] ? __pfx_kthread+0x10/0x10 [ 26.101205] ret_from_fork+0x41/0x80 [ 26.101243] ? __pfx_kthread+0x10/0x10 [ 26.101275] ret_from_fork_asm+0x1a/0x30 [ 26.101368] </TASK> [ 26.101397] [ 26.120637] Allocated by task 285: [ 26.120825] kasan_save_stack+0x45/0x70 [ 26.121020] kasan_save_track+0x18/0x40 [ 26.121885] kasan_save_alloc_info+0x3b/0x50 [ 26.122622] __kasan_kmalloc+0xb7/0xc0 [ 26.123389] __kmalloc_cache_noprof+0x189/0x420 [ 26.124235] kasan_atomics+0x95/0x310 [ 26.124522] kunit_try_run_case+0x1a5/0x480 [ 26.125035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.125704] kthread+0x337/0x6f0 [ 26.126080] ret_from_fork+0x41/0x80 [ 26.126676] ret_from_fork_asm+0x1a/0x30 [ 26.127516] [ 26.127706] The buggy address belongs to the object at ffff888102ef1180 [ 26.127706] which belongs to the cache kmalloc-64 of size 64 [ 26.129131] The buggy address is located 0 bytes to the right of [ 26.129131] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 26.130040] [ 26.130272] The buggy address belongs to the physical page: [ 26.130815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 26.131464] flags: 0x200000000000000(node=0|zone=2) [ 26.131828] page_type: f5(slab) [ 26.132277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.133007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.133702] page dumped because: kasan: bad access detected [ 26.134244] [ 26.134514] Memory state around the buggy address: [ 26.134862] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.135458] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.136181] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.136896] ^ [ 26.137435] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.137972] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.138640] ================================================================== [ 23.725707] ================================================================== [ 23.726151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 23.727041] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 23.728247] [ 23.728584] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.728848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.728873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.728930] Call Trace: [ 23.728971] <TASK> [ 23.728997] dump_stack_lvl+0x73/0xb0 [ 23.729050] print_report+0xd1/0x650 [ 23.729107] ? __virt_addr_valid+0x1db/0x2d0 [ 23.729146] ? kasan_atomics_helper+0x4b54/0x5450 [ 23.729392] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.729473] ? kasan_atomics_helper+0x4b54/0x5450 [ 23.729603] kasan_report+0x141/0x180 [ 23.729684] ? kasan_atomics_helper+0x4b54/0x5450 [ 23.729760] __asan_report_load4_noabort+0x18/0x20 [ 23.729799] kasan_atomics_helper+0x4b54/0x5450 [ 23.729838] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.729874] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.729912] ? kasan_atomics+0x152/0x310 [ 23.730004] kasan_atomics+0x1dc/0x310 [ 23.730082] ? __pfx_kasan_atomics+0x10/0x10 [ 23.730368] ? __pfx_read_tsc+0x10/0x10 [ 23.730453] ? ktime_get_ts64+0x86/0x230 [ 23.730540] kunit_try_run_case+0x1a5/0x480 [ 23.730621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.730661] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.730705] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.730744] ? __kthread_parkme+0x82/0x180 [ 23.730780] ? preempt_count_sub+0x50/0x80 [ 23.730819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.730859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.730896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.730935] kthread+0x337/0x6f0 [ 23.730963] ? trace_preempt_on+0x20/0xc0 [ 23.731000] ? __pfx_kthread+0x10/0x10 [ 23.731030] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.731098] ? calculate_sigpending+0x7b/0xa0 [ 23.731135] ? __pfx_kthread+0x10/0x10 [ 23.731164] ret_from_fork+0x41/0x80 [ 23.731202] ? __pfx_kthread+0x10/0x10 [ 23.731232] ret_from_fork_asm+0x1a/0x30 [ 23.731280] </TASK> [ 23.731323] [ 23.752125] Allocated by task 285: [ 23.752921] kasan_save_stack+0x45/0x70 [ 23.753647] kasan_save_track+0x18/0x40 [ 23.754030] kasan_save_alloc_info+0x3b/0x50 [ 23.754815] __kasan_kmalloc+0xb7/0xc0 [ 23.755416] __kmalloc_cache_noprof+0x189/0x420 [ 23.755872] kasan_atomics+0x95/0x310 [ 23.756511] kunit_try_run_case+0x1a5/0x480 [ 23.756849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.757703] kthread+0x337/0x6f0 [ 23.758077] ret_from_fork+0x41/0x80 [ 23.758473] ret_from_fork_asm+0x1a/0x30 [ 23.758843] [ 23.759085] The buggy address belongs to the object at ffff888102ef1180 [ 23.759085] which belongs to the cache kmalloc-64 of size 64 [ 23.759970] The buggy address is located 0 bytes to the right of [ 23.759970] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 23.761553] [ 23.762090] The buggy address belongs to the physical page: [ 23.762757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 23.763344] flags: 0x200000000000000(node=0|zone=2) [ 23.763555] page_type: f5(slab) [ 23.763707] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.763979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.765212] page dumped because: kasan: bad access detected [ 23.765795] [ 23.765976] Memory state around the buggy address: [ 23.766619] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.767395] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.768147] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.768939] ^ [ 23.769541] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.770057] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.770925] ================================================================== [ 24.897751] ================================================================== [ 24.899379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 24.901688] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.904027] [ 24.904283] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.904419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.904457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.904517] Call Trace: [ 24.904609] <TASK> [ 24.904676] dump_stack_lvl+0x73/0xb0 [ 24.904782] print_report+0xd1/0x650 [ 24.904869] ? __virt_addr_valid+0x1db/0x2d0 [ 24.904940] ? kasan_atomics_helper+0x1217/0x5450 [ 24.905018] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.905104] ? kasan_atomics_helper+0x1217/0x5450 [ 24.905188] kasan_report+0x141/0x180 [ 24.905273] ? kasan_atomics_helper+0x1217/0x5450 [ 24.905392] kasan_check_range+0x10c/0x1c0 [ 24.906088] __kasan_check_write+0x18/0x20 [ 24.906140] kasan_atomics_helper+0x1217/0x5450 [ 24.906183] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.906224] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.906264] ? kasan_atomics+0x152/0x310 [ 24.906326] kasan_atomics+0x1dc/0x310 [ 24.906362] ? __pfx_kasan_atomics+0x10/0x10 [ 24.906399] ? __pfx_read_tsc+0x10/0x10 [ 24.906437] ? ktime_get_ts64+0x86/0x230 [ 24.906480] kunit_try_run_case+0x1a5/0x480 [ 24.906523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.906561] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.906602] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.906641] ? __kthread_parkme+0x82/0x180 [ 24.906677] ? preempt_count_sub+0x50/0x80 [ 24.906719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.906761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.906802] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.906839] kthread+0x337/0x6f0 [ 24.906867] ? trace_preempt_on+0x20/0xc0 [ 24.906906] ? __pfx_kthread+0x10/0x10 [ 24.906936] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.906973] ? calculate_sigpending+0x7b/0xa0 [ 24.907009] ? __pfx_kthread+0x10/0x10 [ 24.907048] ret_from_fork+0x41/0x80 [ 24.907105] ? __pfx_kthread+0x10/0x10 [ 24.907139] ret_from_fork_asm+0x1a/0x30 [ 24.907188] </TASK> [ 24.907207] [ 24.926766] Allocated by task 285: [ 24.927223] kasan_save_stack+0x45/0x70 [ 24.927614] kasan_save_track+0x18/0x40 [ 24.929668] kasan_save_alloc_info+0x3b/0x50 [ 24.930591] __kasan_kmalloc+0xb7/0xc0 [ 24.930865] __kmalloc_cache_noprof+0x189/0x420 [ 24.931191] kasan_atomics+0x95/0x310 [ 24.933585] kunit_try_run_case+0x1a5/0x480 [ 24.935011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.936122] kthread+0x337/0x6f0 [ 24.936674] ret_from_fork+0x41/0x80 [ 24.937205] ret_from_fork_asm+0x1a/0x30 [ 24.937557] [ 24.938739] The buggy address belongs to the object at ffff888102ef1180 [ 24.938739] which belongs to the cache kmalloc-64 of size 64 [ 24.939793] The buggy address is located 0 bytes to the right of [ 24.939793] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.941975] [ 24.942659] The buggy address belongs to the physical page: [ 24.944499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.944998] flags: 0x200000000000000(node=0|zone=2) [ 24.946060] page_type: f5(slab) [ 24.946721] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.948397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.949366] page dumped because: kasan: bad access detected [ 24.950242] [ 24.950438] Memory state around the buggy address: [ 24.950825] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.952259] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.952915] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.953807] ^ [ 24.954099] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.954532] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.954925] ================================================================== [ 24.816916] ================================================================== [ 24.817736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 24.818782] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.819584] [ 24.819924] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.820067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.820132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.820219] Call Trace: [ 24.820277] <TASK> [ 24.820349] dump_stack_lvl+0x73/0xb0 [ 24.820441] print_report+0xd1/0x650 [ 24.820524] ? __virt_addr_valid+0x1db/0x2d0 [ 24.820599] ? kasan_atomics_helper+0x1148/0x5450 [ 24.820675] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.820751] ? kasan_atomics_helper+0x1148/0x5450 [ 24.820829] kasan_report+0x141/0x180 [ 24.820911] ? kasan_atomics_helper+0x1148/0x5450 [ 24.821002] kasan_check_range+0x10c/0x1c0 [ 24.821083] __kasan_check_write+0x18/0x20 [ 24.821160] kasan_atomics_helper+0x1148/0x5450 [ 24.821247] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.821390] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.821497] ? kasan_atomics+0x152/0x310 [ 24.821558] kasan_atomics+0x1dc/0x310 [ 24.821629] ? __pfx_kasan_atomics+0x10/0x10 [ 24.821705] ? __pfx_read_tsc+0x10/0x10 [ 24.821807] ? ktime_get_ts64+0x86/0x230 [ 24.821918] kunit_try_run_case+0x1a5/0x480 [ 24.822009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.822099] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.822191] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.822321] ? __kthread_parkme+0x82/0x180 [ 24.822406] ? preempt_count_sub+0x50/0x80 [ 24.822494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.822572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.822653] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.822739] kthread+0x337/0x6f0 [ 24.822806] ? trace_preempt_on+0x20/0xc0 [ 24.822888] ? __pfx_kthread+0x10/0x10 [ 24.822959] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.823030] ? calculate_sigpending+0x7b/0xa0 [ 24.823129] ? __pfx_kthread+0x10/0x10 [ 24.823227] ret_from_fork+0x41/0x80 [ 24.823326] ? __pfx_kthread+0x10/0x10 [ 24.823400] ret_from_fork_asm+0x1a/0x30 [ 24.823499] </TASK> [ 24.823538] [ 24.839096] Allocated by task 285: [ 24.839534] kasan_save_stack+0x45/0x70 [ 24.840033] kasan_save_track+0x18/0x40 [ 24.840456] kasan_save_alloc_info+0x3b/0x50 [ 24.840926] __kasan_kmalloc+0xb7/0xc0 [ 24.841475] __kmalloc_cache_noprof+0x189/0x420 [ 24.841832] kasan_atomics+0x95/0x310 [ 24.842180] kunit_try_run_case+0x1a5/0x480 [ 24.842700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.843358] kthread+0x337/0x6f0 [ 24.843724] ret_from_fork+0x41/0x80 [ 24.844172] ret_from_fork_asm+0x1a/0x30 [ 24.844633] [ 24.844887] The buggy address belongs to the object at ffff888102ef1180 [ 24.844887] which belongs to the cache kmalloc-64 of size 64 [ 24.845904] The buggy address is located 0 bytes to the right of [ 24.845904] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.846990] [ 24.847253] The buggy address belongs to the physical page: [ 24.847793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.848520] flags: 0x200000000000000(node=0|zone=2) [ 24.849023] page_type: f5(slab) [ 24.849475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.850179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.850842] page dumped because: kasan: bad access detected [ 24.851448] [ 24.851730] Memory state around the buggy address: [ 24.852204] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.852877] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.853548] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.854079] ^ [ 24.854443] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.854895] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.855356] ================================================================== [ 24.048542] ================================================================== [ 24.051260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 24.051831] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.052624] [ 24.052923] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.053060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.053103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.053165] Call Trace: [ 24.053223] <TASK> [ 24.053277] dump_stack_lvl+0x73/0xb0 [ 24.053389] print_report+0xd1/0x650 [ 24.053510] ? __virt_addr_valid+0x1db/0x2d0 [ 24.053594] ? kasan_atomics_helper+0x7c7/0x5450 [ 24.053672] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.053751] ? kasan_atomics_helper+0x7c7/0x5450 [ 24.053833] kasan_report+0x141/0x180 [ 24.053917] ? kasan_atomics_helper+0x7c7/0x5450 [ 24.054010] kasan_check_range+0x10c/0x1c0 [ 24.054109] __kasan_check_write+0x18/0x20 [ 24.054187] kasan_atomics_helper+0x7c7/0x5450 [ 24.054274] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.054382] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.054462] ? kasan_atomics+0x152/0x310 [ 24.054545] kasan_atomics+0x1dc/0x310 [ 24.054617] ? __pfx_kasan_atomics+0x10/0x10 [ 24.054695] ? __pfx_read_tsc+0x10/0x10 [ 24.054774] ? ktime_get_ts64+0x86/0x230 [ 24.054870] kunit_try_run_case+0x1a5/0x480 [ 24.054960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.055041] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.055129] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.055214] ? __kthread_parkme+0x82/0x180 [ 24.055312] ? preempt_count_sub+0x50/0x80 [ 24.055404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.055485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.055574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.055661] kthread+0x337/0x6f0 [ 24.055733] ? trace_preempt_on+0x20/0xc0 [ 24.055821] ? __pfx_kthread+0x10/0x10 [ 24.055902] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.055983] ? calculate_sigpending+0x7b/0xa0 [ 24.056086] ? __pfx_kthread+0x10/0x10 [ 24.056164] ret_from_fork+0x41/0x80 [ 24.056217] ? __pfx_kthread+0x10/0x10 [ 24.056249] ret_from_fork_asm+0x1a/0x30 [ 24.056321] </TASK> [ 24.056342] [ 24.070827] Allocated by task 285: [ 24.071377] kasan_save_stack+0x45/0x70 [ 24.071848] kasan_save_track+0x18/0x40 [ 24.072332] kasan_save_alloc_info+0x3b/0x50 [ 24.072723] __kasan_kmalloc+0xb7/0xc0 [ 24.073099] __kmalloc_cache_noprof+0x189/0x420 [ 24.073523] kasan_atomics+0x95/0x310 [ 24.073935] kunit_try_run_case+0x1a5/0x480 [ 24.074348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.074733] kthread+0x337/0x6f0 [ 24.075012] ret_from_fork+0x41/0x80 [ 24.075436] ret_from_fork_asm+0x1a/0x30 [ 24.075867] [ 24.076118] The buggy address belongs to the object at ffff888102ef1180 [ 24.076118] which belongs to the cache kmalloc-64 of size 64 [ 24.077419] The buggy address is located 0 bytes to the right of [ 24.077419] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.078153] [ 24.078419] The buggy address belongs to the physical page: [ 24.079099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.080595] flags: 0x200000000000000(node=0|zone=2) [ 24.081103] page_type: f5(slab) [ 24.081510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.082232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.084282] page dumped because: kasan: bad access detected [ 24.084858] [ 24.085669] Memory state around the buggy address: [ 24.086571] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.087158] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.087687] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.088824] ^ [ 24.089219] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.089773] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.090797] ================================================================== [ 25.604990] ================================================================== [ 25.605726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 25.606751] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.607658] [ 25.607989] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.608123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.608221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.608489] Call Trace: [ 25.608552] <TASK> [ 25.608612] dump_stack_lvl+0x73/0xb0 [ 25.609149] print_report+0xd1/0x650 [ 25.609248] ? __virt_addr_valid+0x1db/0x2d0 [ 25.609331] ? kasan_atomics_helper+0x194a/0x5450 [ 25.609374] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.609415] ? kasan_atomics_helper+0x194a/0x5450 [ 25.609453] kasan_report+0x141/0x180 [ 25.609493] ? kasan_atomics_helper+0x194a/0x5450 [ 25.609537] kasan_check_range+0x10c/0x1c0 [ 25.609573] __kasan_check_write+0x18/0x20 [ 25.609608] kasan_atomics_helper+0x194a/0x5450 [ 25.609646] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.609683] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.609721] ? kasan_atomics+0x152/0x310 [ 25.609758] kasan_atomics+0x1dc/0x310 [ 25.609789] ? __pfx_kasan_atomics+0x10/0x10 [ 25.609823] ? __pfx_read_tsc+0x10/0x10 [ 25.609860] ? ktime_get_ts64+0x86/0x230 [ 25.609901] kunit_try_run_case+0x1a5/0x480 [ 25.609942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.609981] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.610022] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.610141] ? __kthread_parkme+0x82/0x180 [ 25.610223] ? preempt_count_sub+0x50/0x80 [ 25.610327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.610390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.610431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.610469] kthread+0x337/0x6f0 [ 25.610496] ? trace_preempt_on+0x20/0xc0 [ 25.610533] ? __pfx_kthread+0x10/0x10 [ 25.610560] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.610594] ? calculate_sigpending+0x7b/0xa0 [ 25.610628] ? __pfx_kthread+0x10/0x10 [ 25.610656] ret_from_fork+0x41/0x80 [ 25.610690] ? __pfx_kthread+0x10/0x10 [ 25.610719] ret_from_fork_asm+0x1a/0x30 [ 25.610764] </TASK> [ 25.610782] [ 25.627612] Allocated by task 285: [ 25.628229] kasan_save_stack+0x45/0x70 [ 25.628788] kasan_save_track+0x18/0x40 [ 25.629360] kasan_save_alloc_info+0x3b/0x50 [ 25.629867] __kasan_kmalloc+0xb7/0xc0 [ 25.630289] __kmalloc_cache_noprof+0x189/0x420 [ 25.630927] kasan_atomics+0x95/0x310 [ 25.631455] kunit_try_run_case+0x1a5/0x480 [ 25.631951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.632589] kthread+0x337/0x6f0 [ 25.633019] ret_from_fork+0x41/0x80 [ 25.633517] ret_from_fork_asm+0x1a/0x30 [ 25.633977] [ 25.634261] The buggy address belongs to the object at ffff888102ef1180 [ 25.634261] which belongs to the cache kmalloc-64 of size 64 [ 25.635344] The buggy address is located 0 bytes to the right of [ 25.635344] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.636452] [ 25.636670] The buggy address belongs to the physical page: [ 25.637412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.638247] flags: 0x200000000000000(node=0|zone=2) [ 25.638852] page_type: f5(slab) [ 25.639392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.639968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.640867] page dumped because: kasan: bad access detected [ 25.641312] [ 25.641596] Memory state around the buggy address: [ 25.642118] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.642815] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.643506] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.644117] ^ [ 25.644700] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.645352] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.645991] ================================================================== [ 26.188787] ================================================================== [ 26.190650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 26.191285] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 26.192512] [ 26.192740] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 26.193216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.193239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.193272] Call Trace: [ 26.193322] <TASK> [ 26.193354] dump_stack_lvl+0x73/0xb0 [ 26.193399] print_report+0xd1/0x650 [ 26.193440] ? __virt_addr_valid+0x1db/0x2d0 [ 26.193480] ? kasan_atomics_helper+0x4f98/0x5450 [ 26.193517] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.193555] ? kasan_atomics_helper+0x4f98/0x5450 [ 26.193592] kasan_report+0x141/0x180 [ 26.193631] ? kasan_atomics_helper+0x4f98/0x5450 [ 26.193675] __asan_report_load8_noabort+0x18/0x20 [ 26.193709] kasan_atomics_helper+0x4f98/0x5450 [ 26.193748] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.193787] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.193824] ? kasan_atomics+0x152/0x310 [ 26.193861] kasan_atomics+0x1dc/0x310 [ 26.193893] ? __pfx_kasan_atomics+0x10/0x10 [ 26.193927] ? __pfx_read_tsc+0x10/0x10 [ 26.193962] ? ktime_get_ts64+0x86/0x230 [ 26.194004] kunit_try_run_case+0x1a5/0x480 [ 26.194058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.194113] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.194156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.194195] ? __kthread_parkme+0x82/0x180 [ 26.194232] ? preempt_count_sub+0x50/0x80 [ 26.194272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.194334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.194375] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.194414] kthread+0x337/0x6f0 [ 26.194442] ? trace_preempt_on+0x20/0xc0 [ 26.194482] ? __pfx_kthread+0x10/0x10 [ 26.194512] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.194546] ? calculate_sigpending+0x7b/0xa0 [ 26.194584] ? __pfx_kthread+0x10/0x10 [ 26.194613] ret_from_fork+0x41/0x80 [ 26.194650] ? __pfx_kthread+0x10/0x10 [ 26.194680] ret_from_fork_asm+0x1a/0x30 [ 26.194729] </TASK> [ 26.194747] [ 26.214274] Allocated by task 285: [ 26.215395] kasan_save_stack+0x45/0x70 [ 26.215995] kasan_save_track+0x18/0x40 [ 26.216520] kasan_save_alloc_info+0x3b/0x50 [ 26.217262] __kasan_kmalloc+0xb7/0xc0 [ 26.217861] __kmalloc_cache_noprof+0x189/0x420 [ 26.218445] kasan_atomics+0x95/0x310 [ 26.218902] kunit_try_run_case+0x1a5/0x480 [ 26.219637] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.220363] kthread+0x337/0x6f0 [ 26.220703] ret_from_fork+0x41/0x80 [ 26.221056] ret_from_fork_asm+0x1a/0x30 [ 26.221499] [ 26.221741] The buggy address belongs to the object at ffff888102ef1180 [ 26.221741] which belongs to the cache kmalloc-64 of size 64 [ 26.222886] The buggy address is located 0 bytes to the right of [ 26.222886] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 26.224318] [ 26.224564] The buggy address belongs to the physical page: [ 26.225609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 26.226524] flags: 0x200000000000000(node=0|zone=2) [ 26.226916] page_type: f5(slab) [ 26.227776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.228620] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.229263] page dumped because: kasan: bad access detected [ 26.229627] [ 26.230258] Memory state around the buggy address: [ 26.230743] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.231815] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.232813] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.233728] ^ [ 26.234139] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.235032] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.235837] ================================================================== [ 25.136420] ================================================================== [ 25.137482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 25.137988] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.138969] [ 25.139892] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.140234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.140278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.140660] Call Trace: [ 25.140721] <TASK> [ 25.140774] dump_stack_lvl+0x73/0xb0 [ 25.140865] print_report+0xd1/0x650 [ 25.140942] ? __virt_addr_valid+0x1db/0x2d0 [ 25.141091] ? kasan_atomics_helper+0x4eae/0x5450 [ 25.141199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.141276] ? kasan_atomics_helper+0x4eae/0x5450 [ 25.141372] kasan_report+0x141/0x180 [ 25.141451] ? kasan_atomics_helper+0x4eae/0x5450 [ 25.141532] __asan_report_load8_noabort+0x18/0x20 [ 25.141613] kasan_atomics_helper+0x4eae/0x5450 [ 25.141680] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.141750] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.141789] ? kasan_atomics+0x152/0x310 [ 25.141827] kasan_atomics+0x1dc/0x310 [ 25.141858] ? __pfx_kasan_atomics+0x10/0x10 [ 25.141893] ? __pfx_read_tsc+0x10/0x10 [ 25.141928] ? ktime_get_ts64+0x86/0x230 [ 25.142012] kunit_try_run_case+0x1a5/0x480 [ 25.142090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.142132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.142173] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.142209] ? __kthread_parkme+0x82/0x180 [ 25.142243] ? preempt_count_sub+0x50/0x80 [ 25.142281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.142347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.142385] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.142420] kthread+0x337/0x6f0 [ 25.142446] ? trace_preempt_on+0x20/0xc0 [ 25.142483] ? __pfx_kthread+0x10/0x10 [ 25.142513] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.142547] ? calculate_sigpending+0x7b/0xa0 [ 25.142581] ? __pfx_kthread+0x10/0x10 [ 25.142609] ret_from_fork+0x41/0x80 [ 25.142643] ? __pfx_kthread+0x10/0x10 [ 25.142670] ret_from_fork_asm+0x1a/0x30 [ 25.142716] </TASK> [ 25.142732] [ 25.158421] Allocated by task 285: [ 25.159101] kasan_save_stack+0x45/0x70 [ 25.159593] kasan_save_track+0x18/0x40 [ 25.160071] kasan_save_alloc_info+0x3b/0x50 [ 25.160561] __kasan_kmalloc+0xb7/0xc0 [ 25.160878] __kmalloc_cache_noprof+0x189/0x420 [ 25.161225] kasan_atomics+0x95/0x310 [ 25.161766] kunit_try_run_case+0x1a5/0x480 [ 25.162229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.162838] kthread+0x337/0x6f0 [ 25.163390] ret_from_fork+0x41/0x80 [ 25.163845] ret_from_fork_asm+0x1a/0x30 [ 25.164234] [ 25.164452] The buggy address belongs to the object at ffff888102ef1180 [ 25.164452] which belongs to the cache kmalloc-64 of size 64 [ 25.165352] The buggy address is located 0 bytes to the right of [ 25.165352] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.166959] [ 25.167331] The buggy address belongs to the physical page: [ 25.167724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.168331] flags: 0x200000000000000(node=0|zone=2) [ 25.168943] page_type: f5(slab) [ 25.169426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.170101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.170774] page dumped because: kasan: bad access detected [ 25.171904] [ 25.172109] Memory state around the buggy address: [ 25.172619] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.173155] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.173851] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.174554] ^ [ 25.175066] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.175704] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.176399] ================================================================== [ 25.647469] ================================================================== [ 25.648075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 25.648730] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.649496] [ 25.649768] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.649903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.649946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.650011] Call Trace: [ 25.650126] <TASK> [ 25.650183] dump_stack_lvl+0x73/0xb0 [ 25.650260] print_report+0xd1/0x650 [ 25.650350] ? __virt_addr_valid+0x1db/0x2d0 [ 25.650422] ? kasan_atomics_helper+0x19e3/0x5450 [ 25.650495] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.650562] ? kasan_atomics_helper+0x19e3/0x5450 [ 25.650628] kasan_report+0x141/0x180 [ 25.650732] ? kasan_atomics_helper+0x19e3/0x5450 [ 25.650855] kasan_check_range+0x10c/0x1c0 [ 25.650930] __kasan_check_write+0x18/0x20 [ 25.651084] kasan_atomics_helper+0x19e3/0x5450 [ 25.651178] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.651278] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.651397] ? kasan_atomics+0x152/0x310 [ 25.651483] kasan_atomics+0x1dc/0x310 [ 25.651542] ? __pfx_kasan_atomics+0x10/0x10 [ 25.651605] ? __pfx_read_tsc+0x10/0x10 [ 25.651681] ? ktime_get_ts64+0x86/0x230 [ 25.651799] kunit_try_run_case+0x1a5/0x480 [ 25.651928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.652011] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.652188] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.652272] ? __kthread_parkme+0x82/0x180 [ 25.652376] ? preempt_count_sub+0x50/0x80 [ 25.652466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.652606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.652693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.652778] kthread+0x337/0x6f0 [ 25.652849] ? trace_preempt_on+0x20/0xc0 [ 25.652933] ? __pfx_kthread+0x10/0x10 [ 25.653022] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.653157] ? calculate_sigpending+0x7b/0xa0 [ 25.653236] ? __pfx_kthread+0x10/0x10 [ 25.653324] ret_from_fork+0x41/0x80 [ 25.653401] ? __pfx_kthread+0x10/0x10 [ 25.653474] ret_from_fork_asm+0x1a/0x30 [ 25.653541] </TASK> [ 25.653561] [ 25.669343] Allocated by task 285: [ 25.669811] kasan_save_stack+0x45/0x70 [ 25.670897] kasan_save_track+0x18/0x40 [ 25.671908] kasan_save_alloc_info+0x3b/0x50 [ 25.672273] __kasan_kmalloc+0xb7/0xc0 [ 25.673032] __kmalloc_cache_noprof+0x189/0x420 [ 25.673545] kasan_atomics+0x95/0x310 [ 25.674006] kunit_try_run_case+0x1a5/0x480 [ 25.674605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.675362] kthread+0x337/0x6f0 [ 25.675727] ret_from_fork+0x41/0x80 [ 25.676318] ret_from_fork_asm+0x1a/0x30 [ 25.676682] [ 25.677003] The buggy address belongs to the object at ffff888102ef1180 [ 25.677003] which belongs to the cache kmalloc-64 of size 64 [ 25.678070] The buggy address is located 0 bytes to the right of [ 25.678070] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.679143] [ 25.679531] The buggy address belongs to the physical page: [ 25.680162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.680977] flags: 0x200000000000000(node=0|zone=2) [ 25.681533] page_type: f5(slab) [ 25.682000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.682629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.683402] page dumped because: kasan: bad access detected [ 25.683948] [ 25.684264] Memory state around the buggy address: [ 25.684768] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.685265] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.685920] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.686591] ^ [ 25.687063] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.687702] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.688520] ================================================================== [ 25.873273] ================================================================== [ 25.873830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 25.874634] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.875281] [ 25.875582] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.875723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.875768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.875829] Call Trace: [ 25.875860] <TASK> [ 25.875916] dump_stack_lvl+0x73/0xb0 [ 25.875964] print_report+0xd1/0x650 [ 25.876045] ? __virt_addr_valid+0x1db/0x2d0 [ 25.876406] ? kasan_atomics_helper+0x1ce1/0x5450 [ 25.876467] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.876507] ? kasan_atomics_helper+0x1ce1/0x5450 [ 25.876543] kasan_report+0x141/0x180 [ 25.876580] ? kasan_atomics_helper+0x1ce1/0x5450 [ 25.876624] kasan_check_range+0x10c/0x1c0 [ 25.876657] __kasan_check_write+0x18/0x20 [ 25.876690] kasan_atomics_helper+0x1ce1/0x5450 [ 25.876729] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.876767] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.876804] ? kasan_atomics+0x152/0x310 [ 25.876841] kasan_atomics+0x1dc/0x310 [ 25.876871] ? __pfx_kasan_atomics+0x10/0x10 [ 25.876902] ? __pfx_read_tsc+0x10/0x10 [ 25.876938] ? ktime_get_ts64+0x86/0x230 [ 25.876978] kunit_try_run_case+0x1a5/0x480 [ 25.877020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.877095] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.877140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.877177] ? __kthread_parkme+0x82/0x180 [ 25.877211] ? preempt_count_sub+0x50/0x80 [ 25.877249] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.877286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.877353] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.877392] kthread+0x337/0x6f0 [ 25.877419] ? trace_preempt_on+0x20/0xc0 [ 25.877460] ? __pfx_kthread+0x10/0x10 [ 25.877488] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.877522] ? calculate_sigpending+0x7b/0xa0 [ 25.877556] ? __pfx_kthread+0x10/0x10 [ 25.877584] ret_from_fork+0x41/0x80 [ 25.877619] ? __pfx_kthread+0x10/0x10 [ 25.877647] ret_from_fork_asm+0x1a/0x30 [ 25.877693] </TASK> [ 25.877710] [ 25.892468] Allocated by task 285: [ 25.892858] kasan_save_stack+0x45/0x70 [ 25.893366] kasan_save_track+0x18/0x40 [ 25.893799] kasan_save_alloc_info+0x3b/0x50 [ 25.894200] __kasan_kmalloc+0xb7/0xc0 [ 25.894539] __kmalloc_cache_noprof+0x189/0x420 [ 25.895026] kasan_atomics+0x95/0x310 [ 25.895524] kunit_try_run_case+0x1a5/0x480 [ 25.896013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.896609] kthread+0x337/0x6f0 [ 25.896955] ret_from_fork+0x41/0x80 [ 25.897332] ret_from_fork_asm+0x1a/0x30 [ 25.897732] [ 25.897967] The buggy address belongs to the object at ffff888102ef1180 [ 25.897967] which belongs to the cache kmalloc-64 of size 64 [ 25.899012] The buggy address is located 0 bytes to the right of [ 25.899012] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.900002] [ 25.900279] The buggy address belongs to the physical page: [ 25.900765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.901366] flags: 0x200000000000000(node=0|zone=2) [ 25.901734] page_type: f5(slab) [ 25.902073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.902729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.903501] page dumped because: kasan: bad access detected [ 25.904091] [ 25.904348] Memory state around the buggy address: [ 25.904823] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.905454] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.905902] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.906548] ^ [ 25.907071] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.907731] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.908433] ================================================================== [ 26.476909] ================================================================== [ 26.477552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 26.478364] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 26.479246] [ 26.479715] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 26.480016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.480055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.480103] Call Trace: [ 26.480131] <TASK> [ 26.480160] dump_stack_lvl+0x73/0xb0 [ 26.480205] print_report+0xd1/0x650 [ 26.480246] ? __virt_addr_valid+0x1db/0x2d0 [ 26.480284] ? kasan_atomics_helper+0x5115/0x5450 [ 26.480348] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.480387] ? kasan_atomics_helper+0x5115/0x5450 [ 26.480425] kasan_report+0x141/0x180 [ 26.480465] ? kasan_atomics_helper+0x5115/0x5450 [ 26.480510] __asan_report_load8_noabort+0x18/0x20 [ 26.480548] kasan_atomics_helper+0x5115/0x5450 [ 26.480586] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.480625] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.480663] ? kasan_atomics+0x152/0x310 [ 26.480702] kasan_atomics+0x1dc/0x310 [ 26.480738] ? __pfx_kasan_atomics+0x10/0x10 [ 26.480775] ? __pfx_read_tsc+0x10/0x10 [ 26.480814] ? ktime_get_ts64+0x86/0x230 [ 26.480855] kunit_try_run_case+0x1a5/0x480 [ 26.480898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.480937] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.480978] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.481018] ? __kthread_parkme+0x82/0x180 [ 26.481079] ? preempt_count_sub+0x50/0x80 [ 26.481125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.481165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.481206] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.481246] kthread+0x337/0x6f0 [ 26.481274] ? trace_preempt_on+0x20/0xc0 [ 26.481338] ? __pfx_kthread+0x10/0x10 [ 26.481369] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.481407] ? calculate_sigpending+0x7b/0xa0 [ 26.481444] ? __pfx_kthread+0x10/0x10 [ 26.481475] ret_from_fork+0x41/0x80 [ 26.481512] ? __pfx_kthread+0x10/0x10 [ 26.481545] ret_from_fork_asm+0x1a/0x30 [ 26.481597] </TASK> [ 26.481616] [ 26.501074] Allocated by task 285: [ 26.501681] kasan_save_stack+0x45/0x70 [ 26.502343] kasan_save_track+0x18/0x40 [ 26.502903] kasan_save_alloc_info+0x3b/0x50 [ 26.503519] __kasan_kmalloc+0xb7/0xc0 [ 26.503936] __kmalloc_cache_noprof+0x189/0x420 [ 26.504684] kasan_atomics+0x95/0x310 [ 26.505289] kunit_try_run_case+0x1a5/0x480 [ 26.505905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.506616] kthread+0x337/0x6f0 [ 26.507171] ret_from_fork+0x41/0x80 [ 26.507625] ret_from_fork_asm+0x1a/0x30 [ 26.508357] [ 26.508594] The buggy address belongs to the object at ffff888102ef1180 [ 26.508594] which belongs to the cache kmalloc-64 of size 64 [ 26.509886] The buggy address is located 0 bytes to the right of [ 26.509886] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 26.511380] [ 26.511629] The buggy address belongs to the physical page: [ 26.512158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 26.512771] flags: 0x200000000000000(node=0|zone=2) [ 26.513610] page_type: f5(slab) [ 26.513931] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.514900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.515609] page dumped because: kasan: bad access detected [ 26.516115] [ 26.516357] Memory state around the buggy address: [ 26.516823] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.517498] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.518248] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.518979] ^ [ 26.519480] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.520118] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.520770] ================================================================== [ 23.966199] ================================================================== [ 23.966804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 23.968397] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 23.969698] [ 23.970150] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.971063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.971098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.971133] Call Trace: [ 23.971160] <TASK> [ 23.971187] dump_stack_lvl+0x73/0xb0 [ 23.971240] print_report+0xd1/0x650 [ 23.971284] ? __virt_addr_valid+0x1db/0x2d0 [ 23.971348] ? kasan_atomics_helper+0x697/0x5450 [ 23.971388] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.971426] ? kasan_atomics_helper+0x697/0x5450 [ 23.971463] kasan_report+0x141/0x180 [ 23.971503] ? kasan_atomics_helper+0x697/0x5450 [ 23.971547] kasan_check_range+0x10c/0x1c0 [ 23.971581] __kasan_check_write+0x18/0x20 [ 23.971615] kasan_atomics_helper+0x697/0x5450 [ 23.971657] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.971696] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.971734] ? kasan_atomics+0x152/0x310 [ 23.971772] kasan_atomics+0x1dc/0x310 [ 23.971804] ? __pfx_kasan_atomics+0x10/0x10 [ 23.971839] ? __pfx_read_tsc+0x10/0x10 [ 23.971874] ? ktime_get_ts64+0x86/0x230 [ 23.971928] kunit_try_run_case+0x1a5/0x480 [ 23.971971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.972009] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.972080] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.972126] ? __kthread_parkme+0x82/0x180 [ 23.972165] ? preempt_count_sub+0x50/0x80 [ 23.972206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.972246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.972286] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.972349] kthread+0x337/0x6f0 [ 23.972379] ? trace_preempt_on+0x20/0xc0 [ 23.972418] ? __pfx_kthread+0x10/0x10 [ 23.972447] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.972483] ? calculate_sigpending+0x7b/0xa0 [ 23.972519] ? __pfx_kthread+0x10/0x10 [ 23.972549] ret_from_fork+0x41/0x80 [ 23.972584] ? __pfx_kthread+0x10/0x10 [ 23.972614] ret_from_fork_asm+0x1a/0x30 [ 23.972663] </TASK> [ 23.972682] [ 23.992563] Allocated by task 285: [ 23.993105] kasan_save_stack+0x45/0x70 [ 23.993486] kasan_save_track+0x18/0x40 [ 23.993798] kasan_save_alloc_info+0x3b/0x50 [ 23.994238] __kasan_kmalloc+0xb7/0xc0 [ 23.994717] __kmalloc_cache_noprof+0x189/0x420 [ 23.995315] kasan_atomics+0x95/0x310 [ 23.995779] kunit_try_run_case+0x1a5/0x480 [ 23.996320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.996829] kthread+0x337/0x6f0 [ 23.997339] ret_from_fork+0x41/0x80 [ 23.997678] ret_from_fork_asm+0x1a/0x30 [ 23.998193] [ 23.998487] The buggy address belongs to the object at ffff888102ef1180 [ 23.998487] which belongs to the cache kmalloc-64 of size 64 [ 23.999338] The buggy address is located 0 bytes to the right of [ 23.999338] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.000511] [ 24.000782] The buggy address belongs to the physical page: [ 24.001412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.001925] flags: 0x200000000000000(node=0|zone=2) [ 24.002528] page_type: f5(slab) [ 24.002973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.003683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.004329] page dumped because: kasan: bad access detected [ 24.004843] [ 24.005170] Memory state around the buggy address: [ 24.005548] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.006234] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.006978] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.007666] ^ [ 24.008104] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.008827] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.009480] ================================================================== [ 26.004550] ================================================================== [ 26.005601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 26.008400] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 26.009752] [ 26.010100] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 26.010240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.010283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.010381] Call Trace: [ 26.010482] <TASK> [ 26.010542] dump_stack_lvl+0x73/0xb0 [ 26.010636] print_report+0xd1/0x650 [ 26.010713] ? __virt_addr_valid+0x1db/0x2d0 [ 26.010750] ? kasan_atomics_helper+0x1eaa/0x5450 [ 26.010788] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.010827] ? kasan_atomics_helper+0x1eaa/0x5450 [ 26.010864] kasan_report+0x141/0x180 [ 26.010903] ? kasan_atomics_helper+0x1eaa/0x5450 [ 26.010949] kasan_check_range+0x10c/0x1c0 [ 26.010982] __kasan_check_write+0x18/0x20 [ 26.011016] kasan_atomics_helper+0x1eaa/0x5450 [ 26.011091] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.011136] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.011174] ? kasan_atomics+0x152/0x310 [ 26.011211] kasan_atomics+0x1dc/0x310 [ 26.011243] ? __pfx_kasan_atomics+0x10/0x10 [ 26.011279] ? __pfx_read_tsc+0x10/0x10 [ 26.011345] ? ktime_get_ts64+0x86/0x230 [ 26.011387] kunit_try_run_case+0x1a5/0x480 [ 26.011430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.011467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.011508] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.011546] ? __kthread_parkme+0x82/0x180 [ 26.011583] ? preempt_count_sub+0x50/0x80 [ 26.011622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.011661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.011698] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.011737] kthread+0x337/0x6f0 [ 26.011764] ? trace_preempt_on+0x20/0xc0 [ 26.011803] ? __pfx_kthread+0x10/0x10 [ 26.011833] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.011867] ? calculate_sigpending+0x7b/0xa0 [ 26.011917] ? __pfx_kthread+0x10/0x10 [ 26.011949] ret_from_fork+0x41/0x80 [ 26.011985] ? __pfx_kthread+0x10/0x10 [ 26.012015] ret_from_fork_asm+0x1a/0x30 [ 26.012088] </TASK> [ 26.012112] [ 26.031804] Allocated by task 285: [ 26.032274] kasan_save_stack+0x45/0x70 [ 26.032666] kasan_save_track+0x18/0x40 [ 26.033050] kasan_save_alloc_info+0x3b/0x50 [ 26.033543] __kasan_kmalloc+0xb7/0xc0 [ 26.033964] __kmalloc_cache_noprof+0x189/0x420 [ 26.034508] kasan_atomics+0x95/0x310 [ 26.034828] kunit_try_run_case+0x1a5/0x480 [ 26.035265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.035836] kthread+0x337/0x6f0 [ 26.036285] ret_from_fork+0x41/0x80 [ 26.036797] ret_from_fork_asm+0x1a/0x30 [ 26.037213] [ 26.037567] The buggy address belongs to the object at ffff888102ef1180 [ 26.037567] which belongs to the cache kmalloc-64 of size 64 [ 26.038623] The buggy address is located 0 bytes to the right of [ 26.038623] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 26.039734] [ 26.039958] The buggy address belongs to the physical page: [ 26.040692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 26.041534] flags: 0x200000000000000(node=0|zone=2) [ 26.042132] page_type: f5(slab) [ 26.042477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.043157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.043764] page dumped because: kasan: bad access detected [ 26.044420] [ 26.044698] Memory state around the buggy address: [ 26.045231] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.045885] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.046820] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.047529] ^ [ 26.048056] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.048698] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.049245] ================================================================== [ 23.913158] ================================================================== [ 23.914732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 23.915662] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 23.915932] [ 23.916063] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.916132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.916151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.916183] Call Trace: [ 23.916209] <TASK> [ 23.916234] dump_stack_lvl+0x73/0xb0 [ 23.916277] print_report+0xd1/0x650 [ 23.916343] ? __virt_addr_valid+0x1db/0x2d0 [ 23.916379] ? kasan_atomics_helper+0x5fe/0x5450 [ 23.916413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.916448] ? kasan_atomics_helper+0x5fe/0x5450 [ 23.916482] kasan_report+0x141/0x180 [ 23.916518] ? kasan_atomics_helper+0x5fe/0x5450 [ 23.916560] kasan_check_range+0x10c/0x1c0 [ 23.916593] __kasan_check_write+0x18/0x20 [ 23.916625] kasan_atomics_helper+0x5fe/0x5450 [ 23.916661] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.916696] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.916731] ? kasan_atomics+0x152/0x310 [ 23.916769] kasan_atomics+0x1dc/0x310 [ 23.916799] ? __pfx_kasan_atomics+0x10/0x10 [ 23.916831] ? __pfx_read_tsc+0x10/0x10 [ 23.916865] ? ktime_get_ts64+0x86/0x230 [ 23.916907] kunit_try_run_case+0x1a5/0x480 [ 23.916946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.916981] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.917019] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.917056] ? __kthread_parkme+0x82/0x180 [ 23.917090] ? preempt_count_sub+0x50/0x80 [ 23.917128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.917165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.917200] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.917236] kthread+0x337/0x6f0 [ 23.917261] ? trace_preempt_on+0x20/0xc0 [ 23.917710] ? __pfx_kthread+0x10/0x10 [ 23.918378] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.918424] ? calculate_sigpending+0x7b/0xa0 [ 23.918464] ? __pfx_kthread+0x10/0x10 [ 23.918493] ret_from_fork+0x41/0x80 [ 23.918532] ? __pfx_kthread+0x10/0x10 [ 23.918562] ret_from_fork_asm+0x1a/0x30 [ 23.918609] </TASK> [ 23.918629] [ 23.945322] Allocated by task 285: [ 23.945771] kasan_save_stack+0x45/0x70 [ 23.946622] kasan_save_track+0x18/0x40 [ 23.946938] kasan_save_alloc_info+0x3b/0x50 [ 23.947791] __kasan_kmalloc+0xb7/0xc0 [ 23.948217] __kmalloc_cache_noprof+0x189/0x420 [ 23.948693] kasan_atomics+0x95/0x310 [ 23.949049] kunit_try_run_case+0x1a5/0x480 [ 23.949894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.950746] kthread+0x337/0x6f0 [ 23.951082] ret_from_fork+0x41/0x80 [ 23.951663] ret_from_fork_asm+0x1a/0x30 [ 23.952350] [ 23.952538] The buggy address belongs to the object at ffff888102ef1180 [ 23.952538] which belongs to the cache kmalloc-64 of size 64 [ 23.953827] The buggy address is located 0 bytes to the right of [ 23.953827] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 23.955158] [ 23.955357] The buggy address belongs to the physical page: [ 23.955750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 23.956551] flags: 0x200000000000000(node=0|zone=2) [ 23.956911] page_type: f5(slab) [ 23.957270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.958303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.958891] page dumped because: kasan: bad access detected [ 23.959729] [ 23.960126] Memory state around the buggy address: [ 23.960800] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.961540] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.962100] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.962728] ^ [ 23.963259] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.963902] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.964551] ================================================================== [ 24.370710] ================================================================== [ 24.371724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 24.372686] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.373474] [ 24.373806] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.373969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.374013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.374097] Call Trace: [ 24.374157] <TASK> [ 24.374263] dump_stack_lvl+0x73/0xb0 [ 24.374442] print_report+0xd1/0x650 [ 24.374556] ? __virt_addr_valid+0x1db/0x2d0 [ 24.374635] ? kasan_atomics_helper+0xc70/0x5450 [ 24.374712] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.374790] ? kasan_atomics_helper+0xc70/0x5450 [ 24.374865] kasan_report+0x141/0x180 [ 24.374928] ? kasan_atomics_helper+0xc70/0x5450 [ 24.375010] kasan_check_range+0x10c/0x1c0 [ 24.375100] __kasan_check_write+0x18/0x20 [ 24.375239] kasan_atomics_helper+0xc70/0x5450 [ 24.375370] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.375487] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.375617] ? kasan_atomics+0x152/0x310 [ 24.375710] kasan_atomics+0x1dc/0x310 [ 24.375842] ? __pfx_kasan_atomics+0x10/0x10 [ 24.375963] ? __pfx_read_tsc+0x10/0x10 [ 24.376043] ? ktime_get_ts64+0x86/0x230 [ 24.376207] kunit_try_run_case+0x1a5/0x480 [ 24.376341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.376419] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.376562] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.376675] ? __kthread_parkme+0x82/0x180 [ 24.376758] ? preempt_count_sub+0x50/0x80 [ 24.376889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.376970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.377049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.377135] kthread+0x337/0x6f0 [ 24.377170] ? trace_preempt_on+0x20/0xc0 [ 24.377210] ? __pfx_kthread+0x10/0x10 [ 24.377239] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.377272] ? calculate_sigpending+0x7b/0xa0 [ 24.377332] ? __pfx_kthread+0x10/0x10 [ 24.377364] ret_from_fork+0x41/0x80 [ 24.377400] ? __pfx_kthread+0x10/0x10 [ 24.377430] ret_from_fork_asm+0x1a/0x30 [ 24.377477] </TASK> [ 24.377495] [ 24.392842] Allocated by task 285: [ 24.393315] kasan_save_stack+0x45/0x70 [ 24.393795] kasan_save_track+0x18/0x40 [ 24.394258] kasan_save_alloc_info+0x3b/0x50 [ 24.394610] __kasan_kmalloc+0xb7/0xc0 [ 24.395008] __kmalloc_cache_noprof+0x189/0x420 [ 24.395548] kasan_atomics+0x95/0x310 [ 24.400079] kunit_try_run_case+0x1a5/0x480 [ 24.401331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.403236] kthread+0x337/0x6f0 [ 24.403502] ret_from_fork+0x41/0x80 [ 24.403756] ret_from_fork_asm+0x1a/0x30 [ 24.404056] [ 24.404239] The buggy address belongs to the object at ffff888102ef1180 [ 24.404239] which belongs to the cache kmalloc-64 of size 64 [ 24.408341] The buggy address is located 0 bytes to the right of [ 24.408341] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.411812] [ 24.411946] The buggy address belongs to the physical page: [ 24.412865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.413960] flags: 0x200000000000000(node=0|zone=2) [ 24.414450] page_type: f5(slab) [ 24.414842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.415687] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.416591] page dumped because: kasan: bad access detected [ 24.417426] [ 24.417611] Memory state around the buggy address: [ 24.418248] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.418863] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.419818] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.420458] ^ [ 24.420922] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.421474] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.422203] ================================================================== [ 24.957064] ================================================================== [ 24.957928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 24.958744] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.960364] [ 24.960600] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.961052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.961093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.961129] Call Trace: [ 24.961159] <TASK> [ 24.961187] dump_stack_lvl+0x73/0xb0 [ 24.961236] print_report+0xd1/0x650 [ 24.961278] ? __virt_addr_valid+0x1db/0x2d0 [ 24.961343] ? kasan_atomics_helper+0x49e8/0x5450 [ 24.961381] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.961418] ? kasan_atomics_helper+0x49e8/0x5450 [ 24.961454] kasan_report+0x141/0x180 [ 24.961492] ? kasan_atomics_helper+0x49e8/0x5450 [ 24.961535] __asan_report_load4_noabort+0x18/0x20 [ 24.961570] kasan_atomics_helper+0x49e8/0x5450 [ 24.961607] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.961643] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.961681] ? kasan_atomics+0x152/0x310 [ 24.961717] kasan_atomics+0x1dc/0x310 [ 24.961749] ? __pfx_kasan_atomics+0x10/0x10 [ 24.961783] ? __pfx_read_tsc+0x10/0x10 [ 24.961817] ? ktime_get_ts64+0x86/0x230 [ 24.961859] kunit_try_run_case+0x1a5/0x480 [ 24.961901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.961938] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.961980] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.962019] ? __kthread_parkme+0x82/0x180 [ 24.962081] ? preempt_count_sub+0x50/0x80 [ 24.962125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.962165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.962205] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.962244] kthread+0x337/0x6f0 [ 24.962273] ? trace_preempt_on+0x20/0xc0 [ 24.962337] ? __pfx_kthread+0x10/0x10 [ 24.962370] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.962406] ? calculate_sigpending+0x7b/0xa0 [ 24.962443] ? __pfx_kthread+0x10/0x10 [ 24.962472] ret_from_fork+0x41/0x80 [ 24.962511] ? __pfx_kthread+0x10/0x10 [ 24.962540] ret_from_fork_asm+0x1a/0x30 [ 24.962591] </TASK> [ 24.962610] [ 24.980690] Allocated by task 285: [ 24.981022] kasan_save_stack+0x45/0x70 [ 24.981552] kasan_save_track+0x18/0x40 [ 24.981980] kasan_save_alloc_info+0x3b/0x50 [ 24.982598] __kasan_kmalloc+0xb7/0xc0 [ 24.983261] __kmalloc_cache_noprof+0x189/0x420 [ 24.983951] kasan_atomics+0x95/0x310 [ 24.984323] kunit_try_run_case+0x1a5/0x480 [ 24.984702] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.985541] kthread+0x337/0x6f0 [ 24.986008] ret_from_fork+0x41/0x80 [ 24.986604] ret_from_fork_asm+0x1a/0x30 [ 24.987018] [ 24.987395] The buggy address belongs to the object at ffff888102ef1180 [ 24.987395] which belongs to the cache kmalloc-64 of size 64 [ 24.988639] The buggy address is located 0 bytes to the right of [ 24.988639] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.989707] [ 24.990140] The buggy address belongs to the physical page: [ 24.990758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.991572] flags: 0x200000000000000(node=0|zone=2) [ 24.992163] page_type: f5(slab) [ 24.992635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.993455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.994194] page dumped because: kasan: bad access detected [ 24.994662] [ 24.994916] Memory state around the buggy address: [ 24.995444] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.996063] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.996745] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.997317] ^ [ 24.997921] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.998642] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.999382] ================================================================== [ 25.825372] ================================================================== [ 25.825924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 25.826794] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.827456] [ 25.827737] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.828133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.828200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.828265] Call Trace: [ 25.828334] <TASK> [ 25.828389] dump_stack_lvl+0x73/0xb0 [ 25.828479] print_report+0xd1/0x650 [ 25.828561] ? __virt_addr_valid+0x1db/0x2d0 [ 25.828635] ? kasan_atomics_helper+0x4f30/0x5450 [ 25.828708] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.828785] ? kasan_atomics_helper+0x4f30/0x5450 [ 25.828864] kasan_report+0x141/0x180 [ 25.829024] ? kasan_atomics_helper+0x4f30/0x5450 [ 25.829252] __asan_report_load8_noabort+0x18/0x20 [ 25.829350] kasan_atomics_helper+0x4f30/0x5450 [ 25.829419] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.829464] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.829505] ? kasan_atomics+0x152/0x310 [ 25.829543] kasan_atomics+0x1dc/0x310 [ 25.829576] ? __pfx_kasan_atomics+0x10/0x10 [ 25.829609] ? __pfx_read_tsc+0x10/0x10 [ 25.829644] ? ktime_get_ts64+0x86/0x230 [ 25.829686] kunit_try_run_case+0x1a5/0x480 [ 25.829727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.829765] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.829804] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.829844] ? __kthread_parkme+0x82/0x180 [ 25.829882] ? preempt_count_sub+0x50/0x80 [ 25.829922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.829962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.830001] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.830067] kthread+0x337/0x6f0 [ 25.830115] ? trace_preempt_on+0x20/0xc0 [ 25.830157] ? __pfx_kthread+0x10/0x10 [ 25.830189] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.830227] ? calculate_sigpending+0x7b/0xa0 [ 25.830268] ? __pfx_kthread+0x10/0x10 [ 25.830323] ret_from_fork+0x41/0x80 [ 25.830365] ? __pfx_kthread+0x10/0x10 [ 25.830397] ret_from_fork_asm+0x1a/0x30 [ 25.830446] </TASK> [ 25.830464] [ 25.850921] Allocated by task 285: [ 25.851959] kasan_save_stack+0x45/0x70 [ 25.852620] kasan_save_track+0x18/0x40 [ 25.853028] kasan_save_alloc_info+0x3b/0x50 [ 25.853715] __kasan_kmalloc+0xb7/0xc0 [ 25.854104] __kmalloc_cache_noprof+0x189/0x420 [ 25.854684] kasan_atomics+0x95/0x310 [ 25.855037] kunit_try_run_case+0x1a5/0x480 [ 25.855820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.856561] kthread+0x337/0x6f0 [ 25.857037] ret_from_fork+0x41/0x80 [ 25.857427] ret_from_fork_asm+0x1a/0x30 [ 25.858051] [ 25.858313] The buggy address belongs to the object at ffff888102ef1180 [ 25.858313] which belongs to the cache kmalloc-64 of size 64 [ 25.859170] The buggy address is located 0 bytes to the right of [ 25.859170] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.860519] [ 25.860898] The buggy address belongs to the physical page: [ 25.861448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.862582] flags: 0x200000000000000(node=0|zone=2) [ 25.862974] page_type: f5(slab) [ 25.863426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.864461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.865168] page dumped because: kasan: bad access detected [ 25.865684] [ 25.866311] Memory state around the buggy address: [ 25.866816] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.867590] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.868338] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.868994] ^ [ 25.869697] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.870264] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.870853] ================================================================== [ 25.460636] ================================================================== [ 25.461868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 25.463418] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.463819] [ 25.464097] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.464224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.465641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.465696] Call Trace: [ 25.465740] <TASK> [ 25.465783] dump_stack_lvl+0x73/0xb0 [ 25.465857] print_report+0xd1/0x650 [ 25.465919] ? __virt_addr_valid+0x1db/0x2d0 [ 25.465973] ? kasan_atomics_helper+0x177f/0x5450 [ 25.466029] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.466146] ? kasan_atomics_helper+0x177f/0x5450 [ 25.466219] kasan_report+0x141/0x180 [ 25.466281] ? kasan_atomics_helper+0x177f/0x5450 [ 25.466393] kasan_check_range+0x10c/0x1c0 [ 25.466452] __kasan_check_write+0x18/0x20 [ 25.466506] kasan_atomics_helper+0x177f/0x5450 [ 25.466568] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.466625] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.466684] ? kasan_atomics+0x152/0x310 [ 25.466744] kasan_atomics+0x1dc/0x310 [ 25.466793] ? __pfx_kasan_atomics+0x10/0x10 [ 25.466849] ? __pfx_read_tsc+0x10/0x10 [ 25.466911] ? ktime_get_ts64+0x86/0x230 [ 25.466974] kunit_try_run_case+0x1a5/0x480 [ 25.467071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.467140] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.467217] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.467286] ? __kthread_parkme+0x82/0x180 [ 25.467374] ? preempt_count_sub+0x50/0x80 [ 25.467445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.467521] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.467600] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.467672] kthread+0x337/0x6f0 [ 25.467733] ? trace_preempt_on+0x20/0xc0 [ 25.467816] ? __pfx_kthread+0x10/0x10 [ 25.467896] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.467965] ? calculate_sigpending+0x7b/0xa0 [ 25.468031] ? __pfx_kthread+0x10/0x10 [ 25.468143] ret_from_fork+0x41/0x80 [ 25.468218] ? __pfx_kthread+0x10/0x10 [ 25.468280] ret_from_fork_asm+0x1a/0x30 [ 25.468402] </TASK> [ 25.468442] [ 25.491223] Allocated by task 285: [ 25.492567] kasan_save_stack+0x45/0x70 [ 25.492935] kasan_save_track+0x18/0x40 [ 25.494468] kasan_save_alloc_info+0x3b/0x50 [ 25.495085] __kasan_kmalloc+0xb7/0xc0 [ 25.495550] __kmalloc_cache_noprof+0x189/0x420 [ 25.496070] kasan_atomics+0x95/0x310 [ 25.496802] kunit_try_run_case+0x1a5/0x480 [ 25.497732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.498260] kthread+0x337/0x6f0 [ 25.498651] ret_from_fork+0x41/0x80 [ 25.498973] ret_from_fork_asm+0x1a/0x30 [ 25.499822] [ 25.500482] The buggy address belongs to the object at ffff888102ef1180 [ 25.500482] which belongs to the cache kmalloc-64 of size 64 [ 25.501348] The buggy address is located 0 bytes to the right of [ 25.501348] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.502365] [ 25.502627] The buggy address belongs to the physical page: [ 25.503070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.504216] flags: 0x200000000000000(node=0|zone=2) [ 25.505379] page_type: f5(slab) [ 25.505742] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.506652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.507621] page dumped because: kasan: bad access detected [ 25.508089] [ 25.508262] Memory state around the buggy address: [ 25.508590] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.509888] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.510670] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.511418] ^ [ 25.511958] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.512835] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.513878] ================================================================== [ 24.327462] ================================================================== [ 24.328085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 24.328670] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.329986] [ 24.330364] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.330572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.330616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.330678] Call Trace: [ 24.330729] <TASK> [ 24.330782] dump_stack_lvl+0x73/0xb0 [ 24.330869] print_report+0xd1/0x650 [ 24.330951] ? __virt_addr_valid+0x1db/0x2d0 [ 24.331028] ? kasan_atomics_helper+0xb6a/0x5450 [ 24.331154] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.331235] ? kasan_atomics_helper+0xb6a/0x5450 [ 24.331331] kasan_report+0x141/0x180 [ 24.331399] ? kasan_atomics_helper+0xb6a/0x5450 [ 24.331444] kasan_check_range+0x10c/0x1c0 [ 24.331477] __kasan_check_write+0x18/0x20 [ 24.331508] kasan_atomics_helper+0xb6a/0x5450 [ 24.331543] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.331577] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.331615] ? kasan_atomics+0x152/0x310 [ 24.331648] kasan_atomics+0x1dc/0x310 [ 24.331677] ? __pfx_kasan_atomics+0x10/0x10 [ 24.331711] ? __pfx_read_tsc+0x10/0x10 [ 24.331745] ? ktime_get_ts64+0x86/0x230 [ 24.331785] kunit_try_run_case+0x1a5/0x480 [ 24.331825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.331862] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.331925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.331962] ? __kthread_parkme+0x82/0x180 [ 24.331997] ? preempt_count_sub+0x50/0x80 [ 24.332053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.332117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.332156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.332192] kthread+0x337/0x6f0 [ 24.332218] ? trace_preempt_on+0x20/0xc0 [ 24.332256] ? __pfx_kthread+0x10/0x10 [ 24.332282] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.332361] ? calculate_sigpending+0x7b/0xa0 [ 24.332416] ? __pfx_kthread+0x10/0x10 [ 24.332447] ret_from_fork+0x41/0x80 [ 24.332484] ? __pfx_kthread+0x10/0x10 [ 24.332511] ret_from_fork_asm+0x1a/0x30 [ 24.332560] </TASK> [ 24.332577] [ 24.349771] Allocated by task 285: [ 24.350270] kasan_save_stack+0x45/0x70 [ 24.350913] kasan_save_track+0x18/0x40 [ 24.351412] kasan_save_alloc_info+0x3b/0x50 [ 24.351922] __kasan_kmalloc+0xb7/0xc0 [ 24.352375] __kmalloc_cache_noprof+0x189/0x420 [ 24.352982] kasan_atomics+0x95/0x310 [ 24.353506] kunit_try_run_case+0x1a5/0x480 [ 24.353969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.354537] kthread+0x337/0x6f0 [ 24.354929] ret_from_fork+0x41/0x80 [ 24.355505] ret_from_fork_asm+0x1a/0x30 [ 24.355831] [ 24.356049] The buggy address belongs to the object at ffff888102ef1180 [ 24.356049] which belongs to the cache kmalloc-64 of size 64 [ 24.357228] The buggy address is located 0 bytes to the right of [ 24.357228] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.358399] [ 24.358726] The buggy address belongs to the physical page: [ 24.359379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.359994] flags: 0x200000000000000(node=0|zone=2) [ 24.360789] page_type: f5(slab) [ 24.361265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.362096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.362970] page dumped because: kasan: bad access detected [ 24.363550] [ 24.363757] Memory state around the buggy address: [ 24.364449] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.364901] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.365741] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.366565] ^ [ 24.367091] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.367797] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.368459] ================================================================== [ 23.528474] ================================================================== [ 23.529165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 23.529970] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 23.530725] [ 23.530931] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.531163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.531206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.531264] Call Trace: [ 23.531332] <TASK> [ 23.531384] dump_stack_lvl+0x73/0xb0 [ 23.531469] print_report+0xd1/0x650 [ 23.531610] ? __virt_addr_valid+0x1db/0x2d0 [ 23.531788] ? kasan_atomics_helper+0x4ba2/0x5450 [ 23.531867] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.531954] ? kasan_atomics_helper+0x4ba2/0x5450 [ 23.532029] kasan_report+0x141/0x180 [ 23.532271] ? kasan_atomics_helper+0x4ba2/0x5450 [ 23.532396] __asan_report_store4_noabort+0x1b/0x30 [ 23.532473] kasan_atomics_helper+0x4ba2/0x5450 [ 23.532551] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.532626] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.532759] ? kasan_atomics+0x152/0x310 [ 23.532869] kasan_atomics+0x1dc/0x310 [ 23.532942] ? __pfx_kasan_atomics+0x10/0x10 [ 23.533130] ? __pfx_read_tsc+0x10/0x10 [ 23.533207] ? ktime_get_ts64+0x86/0x230 [ 23.533275] kunit_try_run_case+0x1a5/0x480 [ 23.533348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.533386] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.533424] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.533461] ? __kthread_parkme+0x82/0x180 [ 23.533495] ? preempt_count_sub+0x50/0x80 [ 23.533533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.533569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.533602] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.533637] kthread+0x337/0x6f0 [ 23.533661] ? trace_preempt_on+0x20/0xc0 [ 23.533698] ? __pfx_kthread+0x10/0x10 [ 23.533724] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.533757] ? calculate_sigpending+0x7b/0xa0 [ 23.533792] ? __pfx_kthread+0x10/0x10 [ 23.533817] ret_from_fork+0x41/0x80 [ 23.533850] ? __pfx_kthread+0x10/0x10 [ 23.533877] ret_from_fork_asm+0x1a/0x30 [ 23.533921] </TASK> [ 23.533937] [ 23.553937] Allocated by task 285: [ 23.554574] kasan_save_stack+0x45/0x70 [ 23.554966] kasan_save_track+0x18/0x40 [ 23.555713] kasan_save_alloc_info+0x3b/0x50 [ 23.556371] __kasan_kmalloc+0xb7/0xc0 [ 23.556708] __kmalloc_cache_noprof+0x189/0x420 [ 23.557081] kasan_atomics+0x95/0x310 [ 23.557427] kunit_try_run_case+0x1a5/0x480 [ 23.557911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.558491] kthread+0x337/0x6f0 [ 23.558891] ret_from_fork+0x41/0x80 [ 23.559357] ret_from_fork_asm+0x1a/0x30 [ 23.559764] [ 23.560028] The buggy address belongs to the object at ffff888102ef1180 [ 23.560028] which belongs to the cache kmalloc-64 of size 64 [ 23.560933] The buggy address is located 0 bytes to the right of [ 23.560933] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 23.561911] [ 23.562786] The buggy address belongs to the physical page: [ 23.563391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 23.564114] flags: 0x200000000000000(node=0|zone=2) [ 23.564593] page_type: f5(slab) [ 23.564987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.567560] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.568401] page dumped because: kasan: bad access detected [ 23.568744] [ 23.568877] Memory state around the buggy address: [ 23.569256] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.570441] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.571007] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.571709] ^ [ 23.572287] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.572890] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.573610] ================================================================== [ 26.290162] ================================================================== [ 26.290735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 26.291776] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 26.292371] [ 26.292659] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 26.292866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.292914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.292978] Call Trace: [ 26.293090] <TASK> [ 26.293150] dump_stack_lvl+0x73/0xb0 [ 26.293239] print_report+0xd1/0x650 [ 26.293360] ? __virt_addr_valid+0x1db/0x2d0 [ 26.293441] ? kasan_atomics_helper+0x4fb2/0x5450 [ 26.293516] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.293650] ? kasan_atomics_helper+0x4fb2/0x5450 [ 26.293790] kasan_report+0x141/0x180 [ 26.293939] ? kasan_atomics_helper+0x4fb2/0x5450 [ 26.294039] __asan_report_load8_noabort+0x18/0x20 [ 26.294156] kasan_atomics_helper+0x4fb2/0x5450 [ 26.294246] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.294322] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.294368] ? kasan_atomics+0x152/0x310 [ 26.294406] kasan_atomics+0x1dc/0x310 [ 26.294436] ? __pfx_kasan_atomics+0x10/0x10 [ 26.294470] ? __pfx_read_tsc+0x10/0x10 [ 26.294505] ? ktime_get_ts64+0x86/0x230 [ 26.294545] kunit_try_run_case+0x1a5/0x480 [ 26.294585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.294622] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.294661] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.294698] ? __kthread_parkme+0x82/0x180 [ 26.294733] ? preempt_count_sub+0x50/0x80 [ 26.294770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.294809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.294845] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.294882] kthread+0x337/0x6f0 [ 26.294909] ? trace_preempt_on+0x20/0xc0 [ 26.294954] ? __pfx_kthread+0x10/0x10 [ 26.295023] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.295137] ? calculate_sigpending+0x7b/0xa0 [ 26.295221] ? __pfx_kthread+0x10/0x10 [ 26.295311] ret_from_fork+0x41/0x80 [ 26.295380] ? __pfx_kthread+0x10/0x10 [ 26.295452] ret_from_fork_asm+0x1a/0x30 [ 26.295550] </TASK> [ 26.295579] [ 26.311886] Allocated by task 285: [ 26.312503] kasan_save_stack+0x45/0x70 [ 26.313021] kasan_save_track+0x18/0x40 [ 26.313573] kasan_save_alloc_info+0x3b/0x50 [ 26.313939] __kasan_kmalloc+0xb7/0xc0 [ 26.314317] __kmalloc_cache_noprof+0x189/0x420 [ 26.314763] kasan_atomics+0x95/0x310 [ 26.315079] kunit_try_run_case+0x1a5/0x480 [ 26.315583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.316194] kthread+0x337/0x6f0 [ 26.316642] ret_from_fork+0x41/0x80 [ 26.317147] ret_from_fork_asm+0x1a/0x30 [ 26.317664] [ 26.317978] The buggy address belongs to the object at ffff888102ef1180 [ 26.317978] which belongs to the cache kmalloc-64 of size 64 [ 26.318961] The buggy address is located 0 bytes to the right of [ 26.318961] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 26.320130] [ 26.320517] The buggy address belongs to the physical page: [ 26.321093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 26.321889] flags: 0x200000000000000(node=0|zone=2) [ 26.322516] page_type: f5(slab) [ 26.322965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.323750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.325289] page dumped because: kasan: bad access detected [ 26.326245] [ 26.326426] Memory state around the buggy address: [ 26.327168] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.327727] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.328526] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.329500] ^ [ 26.330161] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.330819] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.331623] ================================================================== [ 25.177599] ================================================================== [ 25.178689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 25.179582] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.180110] [ 25.180435] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.180574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.180618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.180680] Call Trace: [ 25.180737] <TASK> [ 25.180785] dump_stack_lvl+0x73/0xb0 [ 25.180864] print_report+0xd1/0x650 [ 25.180938] ? __virt_addr_valid+0x1db/0x2d0 [ 25.181009] ? kasan_atomics_helper+0x1467/0x5450 [ 25.181090] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.181239] ? kasan_atomics_helper+0x1467/0x5450 [ 25.181346] kasan_report+0x141/0x180 [ 25.181432] ? kasan_atomics_helper+0x1467/0x5450 [ 25.181524] kasan_check_range+0x10c/0x1c0 [ 25.181654] __kasan_check_write+0x18/0x20 [ 25.181739] kasan_atomics_helper+0x1467/0x5450 [ 25.181841] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.181927] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.182058] ? kasan_atomics+0x152/0x310 [ 25.182160] kasan_atomics+0x1dc/0x310 [ 25.182252] ? __pfx_kasan_atomics+0x10/0x10 [ 25.182362] ? __pfx_read_tsc+0x10/0x10 [ 25.182482] ? ktime_get_ts64+0x86/0x230 [ 25.182575] kunit_try_run_case+0x1a5/0x480 [ 25.182665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.182743] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.182871] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.182967] ? __kthread_parkme+0x82/0x180 [ 25.183055] ? preempt_count_sub+0x50/0x80 [ 25.183150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.183272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.183386] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.183516] kthread+0x337/0x6f0 [ 25.183626] ? trace_preempt_on+0x20/0xc0 [ 25.183745] ? __pfx_kthread+0x10/0x10 [ 25.183814] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.183903] ? calculate_sigpending+0x7b/0xa0 [ 25.183988] ? __pfx_kthread+0x10/0x10 [ 25.184076] ret_from_fork+0x41/0x80 [ 25.184157] ? __pfx_kthread+0x10/0x10 [ 25.184225] ret_from_fork_asm+0x1a/0x30 [ 25.184346] </TASK> [ 25.184391] [ 25.210869] Allocated by task 285: [ 25.211063] kasan_save_stack+0x45/0x70 [ 25.211253] kasan_save_track+0x18/0x40 [ 25.212862] kasan_save_alloc_info+0x3b/0x50 [ 25.213702] __kasan_kmalloc+0xb7/0xc0 [ 25.214414] __kmalloc_cache_noprof+0x189/0x420 [ 25.214976] kasan_atomics+0x95/0x310 [ 25.215462] kunit_try_run_case+0x1a5/0x480 [ 25.216160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.216843] kthread+0x337/0x6f0 [ 25.217283] ret_from_fork+0x41/0x80 [ 25.217692] ret_from_fork_asm+0x1a/0x30 [ 25.218035] [ 25.218933] The buggy address belongs to the object at ffff888102ef1180 [ 25.218933] which belongs to the cache kmalloc-64 of size 64 [ 25.220338] The buggy address is located 0 bytes to the right of [ 25.220338] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.220902] [ 25.221010] The buggy address belongs to the physical page: [ 25.221881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.223226] flags: 0x200000000000000(node=0|zone=2) [ 25.223933] page_type: f5(slab) [ 25.224240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.224972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.225804] page dumped because: kasan: bad access detected [ 25.226808] [ 25.227028] Memory state around the buggy address: [ 25.227690] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.228582] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.229039] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.229710] ^ [ 25.230069] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.230734] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.231405] ================================================================== [ 26.378750] ================================================================== [ 26.379844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 26.381274] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 26.383004] [ 26.383492] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 26.383603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.383626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.383661] Call Trace: [ 26.383686] <TASK> [ 26.383742] dump_stack_lvl+0x73/0xb0 [ 26.383814] print_report+0xd1/0x650 [ 26.383859] ? __virt_addr_valid+0x1db/0x2d0 [ 26.383911] ? kasan_atomics_helper+0x4fa5/0x5450 [ 26.383949] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.383986] ? kasan_atomics_helper+0x4fa5/0x5450 [ 26.384022] kasan_report+0x141/0x180 [ 26.384356] ? kasan_atomics_helper+0x4fa5/0x5450 [ 26.384416] __asan_report_load8_noabort+0x18/0x20 [ 26.384456] kasan_atomics_helper+0x4fa5/0x5450 [ 26.384496] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.384533] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.384572] ? kasan_atomics+0x152/0x310 [ 26.384607] kasan_atomics+0x1dc/0x310 [ 26.384637] ? __pfx_kasan_atomics+0x10/0x10 [ 26.384668] ? __pfx_read_tsc+0x10/0x10 [ 26.384703] ? ktime_get_ts64+0x86/0x230 [ 26.384745] kunit_try_run_case+0x1a5/0x480 [ 26.384785] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.384820] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.384858] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.384896] ? __kthread_parkme+0x82/0x180 [ 26.384931] ? preempt_count_sub+0x50/0x80 [ 26.384970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.385009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.385088] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.385136] kthread+0x337/0x6f0 [ 26.385167] ? trace_preempt_on+0x20/0xc0 [ 26.385208] ? __pfx_kthread+0x10/0x10 [ 26.385236] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.385270] ? calculate_sigpending+0x7b/0xa0 [ 26.385330] ? __pfx_kthread+0x10/0x10 [ 26.385364] ret_from_fork+0x41/0x80 [ 26.385401] ? __pfx_kthread+0x10/0x10 [ 26.385428] ret_from_fork_asm+0x1a/0x30 [ 26.385476] </TASK> [ 26.385494] [ 26.404975] Allocated by task 285: [ 26.405997] kasan_save_stack+0x45/0x70 [ 26.406522] kasan_save_track+0x18/0x40 [ 26.407838] kasan_save_alloc_info+0x3b/0x50 [ 26.408381] __kasan_kmalloc+0xb7/0xc0 [ 26.408794] __kmalloc_cache_noprof+0x189/0x420 [ 26.409473] kasan_atomics+0x95/0x310 [ 26.410030] kunit_try_run_case+0x1a5/0x480 [ 26.410643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.411395] kthread+0x337/0x6f0 [ 26.412041] ret_from_fork+0x41/0x80 [ 26.412411] ret_from_fork_asm+0x1a/0x30 [ 26.413118] [ 26.413345] The buggy address belongs to the object at ffff888102ef1180 [ 26.413345] which belongs to the cache kmalloc-64 of size 64 [ 26.414786] The buggy address is located 0 bytes to the right of [ 26.414786] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 26.416018] [ 26.416481] The buggy address belongs to the physical page: [ 26.416827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 26.417827] flags: 0x200000000000000(node=0|zone=2) [ 26.418226] page_type: f5(slab) [ 26.418660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.419516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.420350] page dumped because: kasan: bad access detected [ 26.420715] [ 26.421260] Memory state around the buggy address: [ 26.421687] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.422611] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.423145] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.423902] ^ [ 26.424830] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.425668] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.426314] ================================================================== [ 24.092127] ================================================================== [ 24.093097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 24.094023] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.095359] [ 24.095645] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.095781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.095824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.095897] Call Trace: [ 24.096521] <TASK> [ 24.096584] dump_stack_lvl+0x73/0xb0 [ 24.096672] print_report+0xd1/0x650 [ 24.096733] ? __virt_addr_valid+0x1db/0x2d0 [ 24.096770] ? kasan_atomics_helper+0x860/0x5450 [ 24.096806] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.096841] ? kasan_atomics_helper+0x860/0x5450 [ 24.096877] kasan_report+0x141/0x180 [ 24.096912] ? kasan_atomics_helper+0x860/0x5450 [ 24.096955] kasan_check_range+0x10c/0x1c0 [ 24.096987] __kasan_check_write+0x18/0x20 [ 24.097018] kasan_atomics_helper+0x860/0x5450 [ 24.097093] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.097133] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.097169] ? kasan_atomics+0x152/0x310 [ 24.097204] kasan_atomics+0x1dc/0x310 [ 24.097235] ? __pfx_kasan_atomics+0x10/0x10 [ 24.097267] ? __pfx_read_tsc+0x10/0x10 [ 24.097327] ? ktime_get_ts64+0x86/0x230 [ 24.097374] kunit_try_run_case+0x1a5/0x480 [ 24.097413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.097448] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.097486] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.097523] ? __kthread_parkme+0x82/0x180 [ 24.097557] ? preempt_count_sub+0x50/0x80 [ 24.097595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.097632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.097668] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.097703] kthread+0x337/0x6f0 [ 24.097729] ? trace_preempt_on+0x20/0xc0 [ 24.097766] ? __pfx_kthread+0x10/0x10 [ 24.097794] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.097826] ? calculate_sigpending+0x7b/0xa0 [ 24.097862] ? __pfx_kthread+0x10/0x10 [ 24.097890] ret_from_fork+0x41/0x80 [ 24.097925] ? __pfx_kthread+0x10/0x10 [ 24.097955] ret_from_fork_asm+0x1a/0x30 [ 24.098000] </TASK> [ 24.098018] [ 24.112329] Allocated by task 285: [ 24.112765] kasan_save_stack+0x45/0x70 [ 24.113345] kasan_save_track+0x18/0x40 [ 24.113693] kasan_save_alloc_info+0x3b/0x50 [ 24.114092] __kasan_kmalloc+0xb7/0xc0 [ 24.114514] __kmalloc_cache_noprof+0x189/0x420 [ 24.114996] kasan_atomics+0x95/0x310 [ 24.115405] kunit_try_run_case+0x1a5/0x480 [ 24.115826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.116399] kthread+0x337/0x6f0 [ 24.116714] ret_from_fork+0x41/0x80 [ 24.117115] ret_from_fork_asm+0x1a/0x30 [ 24.117557] [ 24.117798] The buggy address belongs to the object at ffff888102ef1180 [ 24.117798] which belongs to the cache kmalloc-64 of size 64 [ 24.118709] The buggy address is located 0 bytes to the right of [ 24.118709] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.119847] [ 24.120107] The buggy address belongs to the physical page: [ 24.120573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.121172] flags: 0x200000000000000(node=0|zone=2) [ 24.121722] page_type: f5(slab) [ 24.122031] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.123497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.124406] page dumped because: kasan: bad access detected [ 24.124910] [ 24.125140] Memory state around the buggy address: [ 24.125623] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.126167] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.128276] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.129410] ^ [ 24.129605] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.129848] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.130461] ================================================================== [ 23.485997] ================================================================== [ 23.487153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 23.487949] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 23.488622] [ 23.488894] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.489108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.489172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.489239] Call Trace: [ 23.489285] <TASK> [ 23.489408] dump_stack_lvl+0x73/0xb0 [ 23.489544] print_report+0xd1/0x650 [ 23.489622] ? __virt_addr_valid+0x1db/0x2d0 [ 23.489750] ? kasan_atomics_helper+0x4bbc/0x5450 [ 23.489853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.489938] ? kasan_atomics_helper+0x4bbc/0x5450 [ 23.490067] kasan_report+0x141/0x180 [ 23.490176] ? kasan_atomics_helper+0x4bbc/0x5450 [ 23.490262] __asan_report_load4_noabort+0x18/0x20 [ 23.490340] kasan_atomics_helper+0x4bbc/0x5450 [ 23.490379] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.490416] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.490451] ? kasan_atomics+0x152/0x310 [ 23.490486] kasan_atomics+0x1dc/0x310 [ 23.490513] ? __pfx_kasan_atomics+0x10/0x10 [ 23.490544] ? __pfx_read_tsc+0x10/0x10 [ 23.490577] ? ktime_get_ts64+0x86/0x230 [ 23.490616] kunit_try_run_case+0x1a5/0x480 [ 23.490655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.490689] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.490727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.490762] ? __kthread_parkme+0x82/0x180 [ 23.490797] ? preempt_count_sub+0x50/0x80 [ 23.490835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.490871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.490907] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.490941] kthread+0x337/0x6f0 [ 23.490964] ? trace_preempt_on+0x20/0xc0 [ 23.491002] ? __pfx_kthread+0x10/0x10 [ 23.491027] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.491088] ? calculate_sigpending+0x7b/0xa0 [ 23.491124] ? __pfx_kthread+0x10/0x10 [ 23.491150] ret_from_fork+0x41/0x80 [ 23.491185] ? __pfx_kthread+0x10/0x10 [ 23.491212] ret_from_fork_asm+0x1a/0x30 [ 23.491258] </TASK> [ 23.491274] [ 23.508967] Allocated by task 285: [ 23.509511] kasan_save_stack+0x45/0x70 [ 23.510039] kasan_save_track+0x18/0x40 [ 23.510535] kasan_save_alloc_info+0x3b/0x50 [ 23.511008] __kasan_kmalloc+0xb7/0xc0 [ 23.511440] __kmalloc_cache_noprof+0x189/0x420 [ 23.511890] kasan_atomics+0x95/0x310 [ 23.512452] kunit_try_run_case+0x1a5/0x480 [ 23.512966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.513587] kthread+0x337/0x6f0 [ 23.513950] ret_from_fork+0x41/0x80 [ 23.514468] ret_from_fork_asm+0x1a/0x30 [ 23.515015] [ 23.515346] The buggy address belongs to the object at ffff888102ef1180 [ 23.515346] which belongs to the cache kmalloc-64 of size 64 [ 23.516493] The buggy address is located 0 bytes to the right of [ 23.516493] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 23.517388] [ 23.517633] The buggy address belongs to the physical page: [ 23.518023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 23.518831] flags: 0x200000000000000(node=0|zone=2) [ 23.519490] page_type: f5(slab) [ 23.519955] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.520684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.521140] page dumped because: kasan: bad access detected [ 23.521522] [ 23.521752] Memory state around the buggy address: [ 23.522402] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.523190] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.523921] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.524656] ^ [ 23.525146] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.526086] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.526549] ================================================================== [ 23.859474] ================================================================== [ 23.859936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 23.861584] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 23.862080] [ 23.862381] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.862500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.862534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.862588] Call Trace: [ 23.862636] <TASK> [ 23.862688] dump_stack_lvl+0x73/0xb0 [ 23.862770] print_report+0xd1/0x650 [ 23.862849] ? __virt_addr_valid+0x1db/0x2d0 [ 23.862926] ? kasan_atomics_helper+0x565/0x5450 [ 23.862999] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.863120] ? kasan_atomics_helper+0x565/0x5450 [ 23.863196] kasan_report+0x141/0x180 [ 23.863273] ? kasan_atomics_helper+0x565/0x5450 [ 23.863379] kasan_check_range+0x10c/0x1c0 [ 23.863450] __kasan_check_write+0x18/0x20 [ 23.863510] kasan_atomics_helper+0x565/0x5450 [ 23.863573] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.863640] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.863706] ? kasan_atomics+0x152/0x310 [ 23.863772] kasan_atomics+0x1dc/0x310 [ 23.863828] ? __pfx_kasan_atomics+0x10/0x10 [ 23.863903] ? __pfx_read_tsc+0x10/0x10 [ 23.863961] ? ktime_get_ts64+0x86/0x230 [ 23.864074] kunit_try_run_case+0x1a5/0x480 [ 23.864154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.864218] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.864311] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.864397] ? __kthread_parkme+0x82/0x180 [ 23.864475] ? preempt_count_sub+0x50/0x80 [ 23.864561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.864650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.864731] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.864810] kthread+0x337/0x6f0 [ 23.864874] ? trace_preempt_on+0x20/0xc0 [ 23.864951] ? __pfx_kthread+0x10/0x10 [ 23.865020] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.865145] ? calculate_sigpending+0x7b/0xa0 [ 23.865224] ? __pfx_kthread+0x10/0x10 [ 23.865326] ret_from_fork+0x41/0x80 [ 23.865412] ? __pfx_kthread+0x10/0x10 [ 23.865488] ret_from_fork_asm+0x1a/0x30 [ 23.865590] </TASK> [ 23.865633] [ 23.891242] Allocated by task 285: [ 23.891975] kasan_save_stack+0x45/0x70 [ 23.892645] kasan_save_track+0x18/0x40 [ 23.893182] kasan_save_alloc_info+0x3b/0x50 [ 23.893621] __kasan_kmalloc+0xb7/0xc0 [ 23.893972] __kmalloc_cache_noprof+0x189/0x420 [ 23.894773] kasan_atomics+0x95/0x310 [ 23.895159] kunit_try_run_case+0x1a5/0x480 [ 23.895905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.896799] kthread+0x337/0x6f0 [ 23.897175] ret_from_fork+0x41/0x80 [ 23.897823] ret_from_fork_asm+0x1a/0x30 [ 23.898233] [ 23.898460] The buggy address belongs to the object at ffff888102ef1180 [ 23.898460] which belongs to the cache kmalloc-64 of size 64 [ 23.899400] The buggy address is located 0 bytes to the right of [ 23.899400] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 23.901203] [ 23.901478] The buggy address belongs to the physical page: [ 23.902149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 23.902923] flags: 0x200000000000000(node=0|zone=2) [ 23.903587] page_type: f5(slab) [ 23.904142] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.904879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.905729] page dumped because: kasan: bad access detected [ 23.906239] [ 23.906558] Memory state around the buggy address: [ 23.906895] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.908017] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.908753] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.909551] ^ [ 23.909980] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.910840] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.911571] ================================================================== [ 24.857130] ================================================================== [ 24.858640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 24.859961] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.860521] [ 24.860764] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.860921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.860993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.861087] Call Trace: [ 24.861172] <TASK> [ 24.861244] dump_stack_lvl+0x73/0xb0 [ 24.861375] print_report+0xd1/0x650 [ 24.861464] ? __virt_addr_valid+0x1db/0x2d0 [ 24.861544] ? kasan_atomics_helper+0x4a02/0x5450 [ 24.861622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.861703] ? kasan_atomics_helper+0x4a02/0x5450 [ 24.861775] kasan_report+0x141/0x180 [ 24.861854] ? kasan_atomics_helper+0x4a02/0x5450 [ 24.861944] __asan_report_load4_noabort+0x18/0x20 [ 24.862020] kasan_atomics_helper+0x4a02/0x5450 [ 24.862103] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.862165] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.862237] ? kasan_atomics+0x152/0x310 [ 24.862339] kasan_atomics+0x1dc/0x310 [ 24.862421] ? __pfx_kasan_atomics+0x10/0x10 [ 24.862501] ? __pfx_read_tsc+0x10/0x10 [ 24.862578] ? ktime_get_ts64+0x86/0x230 [ 24.862666] kunit_try_run_case+0x1a5/0x480 [ 24.862754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.862832] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.862919] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.863022] ? __kthread_parkme+0x82/0x180 [ 24.863127] ? preempt_count_sub+0x50/0x80 [ 24.863213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.863311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.863397] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.863475] kthread+0x337/0x6f0 [ 24.863539] ? trace_preempt_on+0x20/0xc0 [ 24.863619] ? __pfx_kthread+0x10/0x10 [ 24.863688] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.863760] ? calculate_sigpending+0x7b/0xa0 [ 24.863837] ? __pfx_kthread+0x10/0x10 [ 24.863921] ret_from_fork+0x41/0x80 [ 24.863993] ? __pfx_kthread+0x10/0x10 [ 24.864086] ret_from_fork_asm+0x1a/0x30 [ 24.864193] </TASK> [ 24.864232] [ 24.880010] Allocated by task 285: [ 24.880580] kasan_save_stack+0x45/0x70 [ 24.881069] kasan_save_track+0x18/0x40 [ 24.881547] kasan_save_alloc_info+0x3b/0x50 [ 24.881998] __kasan_kmalloc+0xb7/0xc0 [ 24.882436] __kmalloc_cache_noprof+0x189/0x420 [ 24.883005] kasan_atomics+0x95/0x310 [ 24.883432] kunit_try_run_case+0x1a5/0x480 [ 24.883929] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.884745] kthread+0x337/0x6f0 [ 24.885147] ret_from_fork+0x41/0x80 [ 24.885524] ret_from_fork_asm+0x1a/0x30 [ 24.885860] [ 24.886059] The buggy address belongs to the object at ffff888102ef1180 [ 24.886059] which belongs to the cache kmalloc-64 of size 64 [ 24.886780] The buggy address is located 0 bytes to the right of [ 24.886780] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.887930] [ 24.888176] The buggy address belongs to the physical page: [ 24.888823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.889677] flags: 0x200000000000000(node=0|zone=2) [ 24.890200] page_type: f5(slab) [ 24.890546] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.891028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.891454] page dumped because: kasan: bad access detected [ 24.891778] [ 24.891964] Memory state around the buggy address: [ 24.892269] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.892703] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.893554] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.894033] ^ [ 24.894668] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.895488] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.896159] ================================================================== [ 25.515626] ================================================================== [ 25.517550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 25.518407] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.519037] [ 25.519478] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.519612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.519652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.519715] Call Trace: [ 25.519770] <TASK> [ 25.519825] dump_stack_lvl+0x73/0xb0 [ 25.520034] print_report+0xd1/0x650 [ 25.520153] ? __virt_addr_valid+0x1db/0x2d0 [ 25.520265] ? kasan_atomics_helper+0x1818/0x5450 [ 25.520385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.520467] ? kasan_atomics_helper+0x1818/0x5450 [ 25.520599] kasan_report+0x141/0x180 [ 25.520764] ? kasan_atomics_helper+0x1818/0x5450 [ 25.520891] kasan_check_range+0x10c/0x1c0 [ 25.520969] __kasan_check_write+0x18/0x20 [ 25.521048] kasan_atomics_helper+0x1818/0x5450 [ 25.521185] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.521358] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.521473] ? kasan_atomics+0x152/0x310 [ 25.521556] kasan_atomics+0x1dc/0x310 [ 25.521629] ? __pfx_kasan_atomics+0x10/0x10 [ 25.521685] ? __pfx_read_tsc+0x10/0x10 [ 25.521733] ? ktime_get_ts64+0x86/0x230 [ 25.521823] kunit_try_run_case+0x1a5/0x480 [ 25.521896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.521964] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.522008] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.522056] ? __kthread_parkme+0x82/0x180 [ 25.522120] ? preempt_count_sub+0x50/0x80 [ 25.522160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.522199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.522238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.522276] kthread+0x337/0x6f0 [ 25.522334] ? trace_preempt_on+0x20/0xc0 [ 25.522377] ? __pfx_kthread+0x10/0x10 [ 25.522407] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.522440] ? calculate_sigpending+0x7b/0xa0 [ 25.522475] ? __pfx_kthread+0x10/0x10 [ 25.522503] ret_from_fork+0x41/0x80 [ 25.522539] ? __pfx_kthread+0x10/0x10 [ 25.522567] ret_from_fork_asm+0x1a/0x30 [ 25.522614] </TASK> [ 25.522631] [ 25.539423] Allocated by task 285: [ 25.540054] kasan_save_stack+0x45/0x70 [ 25.540532] kasan_save_track+0x18/0x40 [ 25.540890] kasan_save_alloc_info+0x3b/0x50 [ 25.541232] __kasan_kmalloc+0xb7/0xc0 [ 25.541560] __kmalloc_cache_noprof+0x189/0x420 [ 25.541992] kasan_atomics+0x95/0x310 [ 25.542588] kunit_try_run_case+0x1a5/0x480 [ 25.543409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.544058] kthread+0x337/0x6f0 [ 25.544534] ret_from_fork+0x41/0x80 [ 25.544942] ret_from_fork_asm+0x1a/0x30 [ 25.545507] [ 25.545802] The buggy address belongs to the object at ffff888102ef1180 [ 25.545802] which belongs to the cache kmalloc-64 of size 64 [ 25.547106] The buggy address is located 0 bytes to the right of [ 25.547106] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.548268] [ 25.548810] The buggy address belongs to the physical page: [ 25.549527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.550043] flags: 0x200000000000000(node=0|zone=2) [ 25.552219] page_type: f5(slab) [ 25.552622] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.553227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.553838] page dumped because: kasan: bad access detected [ 25.554921] [ 25.555145] Memory state around the buggy address: [ 25.556037] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.556510] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.557352] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.558072] ^ [ 25.558566] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.559379] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.560004] ================================================================== [ 24.686585] ================================================================== [ 24.687639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 24.688481] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.689271] [ 24.689631] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.689768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.689811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.689941] Call Trace: [ 24.689999] <TASK> [ 24.690141] dump_stack_lvl+0x73/0xb0 [ 24.690236] print_report+0xd1/0x650 [ 24.690337] ? __virt_addr_valid+0x1db/0x2d0 [ 24.690416] ? kasan_atomics_helper+0x4a36/0x5450 [ 24.690560] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.690648] ? kasan_atomics_helper+0x4a36/0x5450 [ 24.690733] kasan_report+0x141/0x180 [ 24.690780] ? kasan_atomics_helper+0x4a36/0x5450 [ 24.690827] __asan_report_load4_noabort+0x18/0x20 [ 24.690865] kasan_atomics_helper+0x4a36/0x5450 [ 24.690905] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.690944] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.690983] ? kasan_atomics+0x152/0x310 [ 24.691020] kasan_atomics+0x1dc/0x310 [ 24.691092] ? __pfx_kasan_atomics+0x10/0x10 [ 24.691129] ? __pfx_read_tsc+0x10/0x10 [ 24.691167] ? ktime_get_ts64+0x86/0x230 [ 24.691208] kunit_try_run_case+0x1a5/0x480 [ 24.691250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.691306] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.691358] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.691396] ? __kthread_parkme+0x82/0x180 [ 24.691433] ? preempt_count_sub+0x50/0x80 [ 24.691473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.691515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.691552] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.691592] kthread+0x337/0x6f0 [ 24.691620] ? trace_preempt_on+0x20/0xc0 [ 24.691657] ? __pfx_kthread+0x10/0x10 [ 24.691687] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.691722] ? calculate_sigpending+0x7b/0xa0 [ 24.691760] ? __pfx_kthread+0x10/0x10 [ 24.691790] ret_from_fork+0x41/0x80 [ 24.691827] ? __pfx_kthread+0x10/0x10 [ 24.691860] ret_from_fork_asm+0x1a/0x30 [ 24.691923] </TASK> [ 24.691943] [ 24.711365] Allocated by task 285: [ 24.711912] kasan_save_stack+0x45/0x70 [ 24.712619] kasan_save_track+0x18/0x40 [ 24.713052] kasan_save_alloc_info+0x3b/0x50 [ 24.713784] __kasan_kmalloc+0xb7/0xc0 [ 24.714231] __kmalloc_cache_noprof+0x189/0x420 [ 24.714720] kasan_atomics+0x95/0x310 [ 24.715120] kunit_try_run_case+0x1a5/0x480 [ 24.715982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.716484] kthread+0x337/0x6f0 [ 24.717279] ret_from_fork+0x41/0x80 [ 24.717799] ret_from_fork_asm+0x1a/0x30 [ 24.718192] [ 24.718521] The buggy address belongs to the object at ffff888102ef1180 [ 24.718521] which belongs to the cache kmalloc-64 of size 64 [ 24.719369] The buggy address is located 0 bytes to the right of [ 24.719369] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.721092] [ 24.721266] The buggy address belongs to the physical page: [ 24.722000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.722656] flags: 0x200000000000000(node=0|zone=2) [ 24.723107] page_type: f5(slab) [ 24.723544] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.724174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.724838] page dumped because: kasan: bad access detected [ 24.725337] [ 24.725846] Memory state around the buggy address: [ 24.726393] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.726904] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.728028] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.728663] ^ [ 24.729176] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.730085] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.730657] ================================================================== [ 24.284787] ================================================================== [ 24.285803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 24.286615] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.287265] [ 24.287634] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.287771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.287817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.287894] Call Trace: [ 24.287995] <TASK> [ 24.288076] dump_stack_lvl+0x73/0xb0 [ 24.288245] print_report+0xd1/0x650 [ 24.288351] ? __virt_addr_valid+0x1db/0x2d0 [ 24.288429] ? kasan_atomics_helper+0xac7/0x5450 [ 24.288499] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.288540] ? kasan_atomics_helper+0xac7/0x5450 [ 24.288577] kasan_report+0x141/0x180 [ 24.288616] ? kasan_atomics_helper+0xac7/0x5450 [ 24.288657] kasan_check_range+0x10c/0x1c0 [ 24.288688] __kasan_check_write+0x18/0x20 [ 24.288721] kasan_atomics_helper+0xac7/0x5450 [ 24.288756] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.288791] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.288826] ? kasan_atomics+0x152/0x310 [ 24.288860] kasan_atomics+0x1dc/0x310 [ 24.288891] ? __pfx_kasan_atomics+0x10/0x10 [ 24.288921] ? __pfx_read_tsc+0x10/0x10 [ 24.288956] ? ktime_get_ts64+0x86/0x230 [ 24.288998] kunit_try_run_case+0x1a5/0x480 [ 24.289046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.289111] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.289153] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.289191] ? __kthread_parkme+0x82/0x180 [ 24.289225] ? preempt_count_sub+0x50/0x80 [ 24.289263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.289325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.289368] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.289405] kthread+0x337/0x6f0 [ 24.289431] ? trace_preempt_on+0x20/0xc0 [ 24.289467] ? __pfx_kthread+0x10/0x10 [ 24.289495] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.289529] ? calculate_sigpending+0x7b/0xa0 [ 24.289562] ? __pfx_kthread+0x10/0x10 [ 24.289589] ret_from_fork+0x41/0x80 [ 24.289623] ? __pfx_kthread+0x10/0x10 [ 24.289650] ret_from_fork_asm+0x1a/0x30 [ 24.289696] </TASK> [ 24.289713] [ 24.306704] Allocated by task 285: [ 24.307315] kasan_save_stack+0x45/0x70 [ 24.307763] kasan_save_track+0x18/0x40 [ 24.308323] kasan_save_alloc_info+0x3b/0x50 [ 24.308889] __kasan_kmalloc+0xb7/0xc0 [ 24.309413] __kmalloc_cache_noprof+0x189/0x420 [ 24.309760] kasan_atomics+0x95/0x310 [ 24.310356] kunit_try_run_case+0x1a5/0x480 [ 24.310823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.311480] kthread+0x337/0x6f0 [ 24.311921] ret_from_fork+0x41/0x80 [ 24.312427] ret_from_fork_asm+0x1a/0x30 [ 24.312958] [ 24.313349] The buggy address belongs to the object at ffff888102ef1180 [ 24.313349] which belongs to the cache kmalloc-64 of size 64 [ 24.314448] The buggy address is located 0 bytes to the right of [ 24.314448] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.315594] [ 24.315888] The buggy address belongs to the physical page: [ 24.316522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.317369] flags: 0x200000000000000(node=0|zone=2) [ 24.317897] page_type: f5(slab) [ 24.318373] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.319137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.319818] page dumped because: kasan: bad access detected [ 24.320361] [ 24.320550] Memory state around the buggy address: [ 24.321130] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.321876] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.322615] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.323415] ^ [ 24.323839] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.324406] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.325359] ================================================================== [ 25.561440] ================================================================== [ 25.561933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 25.563014] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.563955] [ 25.564407] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.564543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.564588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.564912] Call Trace: [ 25.564946] <TASK> [ 25.564975] dump_stack_lvl+0x73/0xb0 [ 25.565020] print_report+0xd1/0x650 [ 25.565092] ? __virt_addr_valid+0x1db/0x2d0 [ 25.565131] ? kasan_atomics_helper+0x18b1/0x5450 [ 25.565167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.565208] ? kasan_atomics_helper+0x18b1/0x5450 [ 25.565246] kasan_report+0x141/0x180 [ 25.565285] ? kasan_atomics_helper+0x18b1/0x5450 [ 25.565356] kasan_check_range+0x10c/0x1c0 [ 25.565392] __kasan_check_write+0x18/0x20 [ 25.565426] kasan_atomics_helper+0x18b1/0x5450 [ 25.565464] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.565504] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.565541] ? kasan_atomics+0x152/0x310 [ 25.565579] kasan_atomics+0x1dc/0x310 [ 25.565610] ? __pfx_kasan_atomics+0x10/0x10 [ 25.565645] ? __pfx_read_tsc+0x10/0x10 [ 25.565680] ? ktime_get_ts64+0x86/0x230 [ 25.565722] kunit_try_run_case+0x1a5/0x480 [ 25.565763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.565800] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.565839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.565877] ? __kthread_parkme+0x82/0x180 [ 25.565913] ? preempt_count_sub+0x50/0x80 [ 25.565953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.565991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.566029] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.566091] kthread+0x337/0x6f0 [ 25.566123] ? trace_preempt_on+0x20/0xc0 [ 25.566164] ? __pfx_kthread+0x10/0x10 [ 25.566193] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.566228] ? calculate_sigpending+0x7b/0xa0 [ 25.566264] ? __pfx_kthread+0x10/0x10 [ 25.566314] ret_from_fork+0x41/0x80 [ 25.566357] ? __pfx_kthread+0x10/0x10 [ 25.566389] ret_from_fork_asm+0x1a/0x30 [ 25.566437] </TASK> [ 25.566455] [ 25.584630] Allocated by task 285: [ 25.585098] kasan_save_stack+0x45/0x70 [ 25.585685] kasan_save_track+0x18/0x40 [ 25.586099] kasan_save_alloc_info+0x3b/0x50 [ 25.586740] __kasan_kmalloc+0xb7/0xc0 [ 25.587197] __kmalloc_cache_noprof+0x189/0x420 [ 25.587754] kasan_atomics+0x95/0x310 [ 25.588419] kunit_try_run_case+0x1a5/0x480 [ 25.589042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.589607] kthread+0x337/0x6f0 [ 25.589977] ret_from_fork+0x41/0x80 [ 25.590516] ret_from_fork_asm+0x1a/0x30 [ 25.590980] [ 25.591174] The buggy address belongs to the object at ffff888102ef1180 [ 25.591174] which belongs to the cache kmalloc-64 of size 64 [ 25.592220] The buggy address is located 0 bytes to the right of [ 25.592220] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.593418] [ 25.593617] The buggy address belongs to the physical page: [ 25.594227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.595072] flags: 0x200000000000000(node=0|zone=2) [ 25.595628] page_type: f5(slab) [ 25.596096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.596851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.597764] page dumped because: kasan: bad access detected [ 25.598484] [ 25.598780] Memory state around the buggy address: [ 25.599289] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.600024] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.600767] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.601594] ^ [ 25.602250] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.602886] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.603462] ================================================================== [ 26.427708] ================================================================== [ 26.429105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 26.429856] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 26.430476] [ 26.431160] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 26.431459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.431497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.431533] Call Trace: [ 26.431563] <TASK> [ 26.431590] dump_stack_lvl+0x73/0xb0 [ 26.431636] print_report+0xd1/0x650 [ 26.431678] ? __virt_addr_valid+0x1db/0x2d0 [ 26.431714] ? kasan_atomics_helper+0x224c/0x5450 [ 26.431751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.431788] ? kasan_atomics_helper+0x224c/0x5450 [ 26.431824] kasan_report+0x141/0x180 [ 26.431862] ? kasan_atomics_helper+0x224c/0x5450 [ 26.431917] kasan_check_range+0x10c/0x1c0 [ 26.431951] __kasan_check_write+0x18/0x20 [ 26.431985] kasan_atomics_helper+0x224c/0x5450 [ 26.432023] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.432087] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.432130] ? kasan_atomics+0x152/0x310 [ 26.432170] kasan_atomics+0x1dc/0x310 [ 26.432203] ? __pfx_kasan_atomics+0x10/0x10 [ 26.432238] ? __pfx_read_tsc+0x10/0x10 [ 26.432273] ? ktime_get_ts64+0x86/0x230 [ 26.432340] kunit_try_run_case+0x1a5/0x480 [ 26.432385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.432424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.432467] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.432507] ? __kthread_parkme+0x82/0x180 [ 26.432544] ? preempt_count_sub+0x50/0x80 [ 26.432584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.432625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.432663] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.432702] kthread+0x337/0x6f0 [ 26.432730] ? trace_preempt_on+0x20/0xc0 [ 26.432769] ? __pfx_kthread+0x10/0x10 [ 26.432798] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.432833] ? calculate_sigpending+0x7b/0xa0 [ 26.432869] ? __pfx_kthread+0x10/0x10 [ 26.432900] ret_from_fork+0x41/0x80 [ 26.432934] ? __pfx_kthread+0x10/0x10 [ 26.432965] ret_from_fork_asm+0x1a/0x30 [ 26.433013] </TASK> [ 26.433031] [ 26.453910] Allocated by task 285: [ 26.454777] kasan_save_stack+0x45/0x70 [ 26.455129] kasan_save_track+0x18/0x40 [ 26.455917] kasan_save_alloc_info+0x3b/0x50 [ 26.456470] __kasan_kmalloc+0xb7/0xc0 [ 26.457050] __kmalloc_cache_noprof+0x189/0x420 [ 26.457513] kasan_atomics+0x95/0x310 [ 26.457883] kunit_try_run_case+0x1a5/0x480 [ 26.458738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.459134] kthread+0x337/0x6f0 [ 26.459694] ret_from_fork+0x41/0x80 [ 26.460086] ret_from_fork_asm+0x1a/0x30 [ 26.460505] [ 26.460737] The buggy address belongs to the object at ffff888102ef1180 [ 26.460737] which belongs to the cache kmalloc-64 of size 64 [ 26.462070] The buggy address is located 0 bytes to the right of [ 26.462070] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 26.463216] [ 26.463485] The buggy address belongs to the physical page: [ 26.463910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 26.465030] flags: 0x200000000000000(node=0|zone=2) [ 26.465708] page_type: f5(slab) [ 26.466669] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.467203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.468009] page dumped because: kasan: bad access detected [ 26.468739] [ 26.469124] Memory state around the buggy address: [ 26.469631] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.470620] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.471149] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.472025] ^ [ 26.472765] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.473817] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.475076] ================================================================== [ 24.424360] ================================================================== [ 24.425093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 24.425787] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.426614] [ 24.426974] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.427142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.427202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.427308] Call Trace: [ 24.427370] <TASK> [ 24.427424] dump_stack_lvl+0x73/0xb0 [ 24.427519] print_report+0xd1/0x650 [ 24.427655] ? __virt_addr_valid+0x1db/0x2d0 [ 24.427767] ? kasan_atomics_helper+0x4a84/0x5450 [ 24.427847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.427925] ? kasan_atomics_helper+0x4a84/0x5450 [ 24.427964] kasan_report+0x141/0x180 [ 24.428002] ? kasan_atomics_helper+0x4a84/0x5450 [ 24.428059] __asan_report_load4_noabort+0x18/0x20 [ 24.428117] kasan_atomics_helper+0x4a84/0x5450 [ 24.428156] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.428194] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.428231] ? kasan_atomics+0x152/0x310 [ 24.428268] kasan_atomics+0x1dc/0x310 [ 24.428323] ? __pfx_kasan_atomics+0x10/0x10 [ 24.428361] ? __pfx_read_tsc+0x10/0x10 [ 24.428397] ? ktime_get_ts64+0x86/0x230 [ 24.428437] kunit_try_run_case+0x1a5/0x480 [ 24.428477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.428511] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.428550] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.428587] ? __kthread_parkme+0x82/0x180 [ 24.428622] ? preempt_count_sub+0x50/0x80 [ 24.428660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.428697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.428733] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.428770] kthread+0x337/0x6f0 [ 24.428796] ? trace_preempt_on+0x20/0xc0 [ 24.428835] ? __pfx_kthread+0x10/0x10 [ 24.428862] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.428895] ? calculate_sigpending+0x7b/0xa0 [ 24.428928] ? __pfx_kthread+0x10/0x10 [ 24.428954] ret_from_fork+0x41/0x80 [ 24.428989] ? __pfx_kthread+0x10/0x10 [ 24.429016] ret_from_fork_asm+0x1a/0x30 [ 24.429101] </TASK> [ 24.429121] [ 24.445959] Allocated by task 285: [ 24.446502] kasan_save_stack+0x45/0x70 [ 24.447058] kasan_save_track+0x18/0x40 [ 24.447559] kasan_save_alloc_info+0x3b/0x50 [ 24.448088] __kasan_kmalloc+0xb7/0xc0 [ 24.448531] __kmalloc_cache_noprof+0x189/0x420 [ 24.449112] kasan_atomics+0x95/0x310 [ 24.449524] kunit_try_run_case+0x1a5/0x480 [ 24.450061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.450855] kthread+0x337/0x6f0 [ 24.451515] ret_from_fork+0x41/0x80 [ 24.451844] ret_from_fork_asm+0x1a/0x30 [ 24.452495] [ 24.452836] The buggy address belongs to the object at ffff888102ef1180 [ 24.452836] which belongs to the cache kmalloc-64 of size 64 [ 24.454880] The buggy address is located 0 bytes to the right of [ 24.454880] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.456916] [ 24.457241] The buggy address belongs to the physical page: [ 24.457841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.458589] flags: 0x200000000000000(node=0|zone=2) [ 24.459097] page_type: f5(slab) [ 24.459543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.460326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.460998] page dumped because: kasan: bad access detected [ 24.461462] [ 24.461698] Memory state around the buggy address: [ 24.462098] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.462702] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.463489] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.464164] ^ [ 24.464622] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.465279] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.465893] ================================================================== [ 24.133450] ================================================================== [ 24.136105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 24.137933] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.138348] [ 24.138563] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.138686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.138726] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.138783] Call Trace: [ 24.138838] <TASK> [ 24.138888] dump_stack_lvl+0x73/0xb0 [ 24.138973] print_report+0xd1/0x650 [ 24.140163] ? __virt_addr_valid+0x1db/0x2d0 [ 24.140393] ? kasan_atomics_helper+0x8f9/0x5450 [ 24.140466] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.140538] ? kasan_atomics_helper+0x8f9/0x5450 [ 24.140611] kasan_report+0x141/0x180 [ 24.140974] ? kasan_atomics_helper+0x8f9/0x5450 [ 24.141102] kasan_check_range+0x10c/0x1c0 [ 24.141176] __kasan_check_write+0x18/0x20 [ 24.141235] kasan_atomics_helper+0x8f9/0x5450 [ 24.141326] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.141395] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.141462] ? kasan_atomics+0x152/0x310 [ 24.141531] kasan_atomics+0x1dc/0x310 [ 24.141588] ? __pfx_kasan_atomics+0x10/0x10 [ 24.141646] ? __pfx_read_tsc+0x10/0x10 [ 24.141709] ? ktime_get_ts64+0x86/0x230 [ 24.141780] kunit_try_run_case+0x1a5/0x480 [ 24.141853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.141923] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.141999] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.142122] ? __kthread_parkme+0x82/0x180 [ 24.142196] ? preempt_count_sub+0x50/0x80 [ 24.142268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.142431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.142512] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.142575] kthread+0x337/0x6f0 [ 24.142621] ? trace_preempt_on+0x20/0xc0 [ 24.142682] ? __pfx_kthread+0x10/0x10 [ 24.142732] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.142787] ? calculate_sigpending+0x7b/0xa0 [ 24.142845] ? __pfx_kthread+0x10/0x10 [ 24.142895] ret_from_fork+0x41/0x80 [ 24.142951] ? __pfx_kthread+0x10/0x10 [ 24.143002] ret_from_fork_asm+0x1a/0x30 [ 24.143104] </TASK> [ 24.143140] [ 24.166719] Allocated by task 285: [ 24.167199] kasan_save_stack+0x45/0x70 [ 24.167622] kasan_save_track+0x18/0x40 [ 24.168608] kasan_save_alloc_info+0x3b/0x50 [ 24.169089] __kasan_kmalloc+0xb7/0xc0 [ 24.169552] __kmalloc_cache_noprof+0x189/0x420 [ 24.169953] kasan_atomics+0x95/0x310 [ 24.170910] kunit_try_run_case+0x1a5/0x480 [ 24.171838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.172391] kthread+0x337/0x6f0 [ 24.172680] ret_from_fork+0x41/0x80 [ 24.172992] ret_from_fork_asm+0x1a/0x30 [ 24.173988] [ 24.174206] The buggy address belongs to the object at ffff888102ef1180 [ 24.174206] which belongs to the cache kmalloc-64 of size 64 [ 24.175941] The buggy address is located 0 bytes to the right of [ 24.175941] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.177479] [ 24.177664] The buggy address belongs to the physical page: [ 24.178496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.179508] flags: 0x200000000000000(node=0|zone=2) [ 24.180192] page_type: f5(slab) [ 24.180592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.181511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.182390] page dumped because: kasan: bad access detected [ 24.182819] [ 24.182984] Memory state around the buggy address: [ 24.184104] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.184717] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.185531] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.186331] ^ [ 24.186664] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.187275] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.188405] ================================================================== [ 25.274526] ================================================================== [ 25.275242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 25.276418] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.277695] [ 25.277992] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.278138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.278179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.278213] Call Trace: [ 25.278241] <TASK> [ 25.278270] dump_stack_lvl+0x73/0xb0 [ 25.278375] print_report+0xd1/0x650 [ 25.278426] ? __virt_addr_valid+0x1db/0x2d0 [ 25.278464] ? kasan_atomics_helper+0x151d/0x5450 [ 25.278501] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.278540] ? kasan_atomics_helper+0x151d/0x5450 [ 25.278576] kasan_report+0x141/0x180 [ 25.278613] ? kasan_atomics_helper+0x151d/0x5450 [ 25.278656] kasan_check_range+0x10c/0x1c0 [ 25.278690] __kasan_check_write+0x18/0x20 [ 25.278724] kasan_atomics_helper+0x151d/0x5450 [ 25.278763] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.278802] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.278839] ? kasan_atomics+0x152/0x310 [ 25.278877] kasan_atomics+0x1dc/0x310 [ 25.278908] ? __pfx_kasan_atomics+0x10/0x10 [ 25.278942] ? __pfx_read_tsc+0x10/0x10 [ 25.278976] ? ktime_get_ts64+0x86/0x230 [ 25.279018] kunit_try_run_case+0x1a5/0x480 [ 25.279186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.279307] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.279392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.279472] ? __kthread_parkme+0x82/0x180 [ 25.279548] ? preempt_count_sub+0x50/0x80 [ 25.279633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.279717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.279799] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.279895] kthread+0x337/0x6f0 [ 25.279964] ? trace_preempt_on+0x20/0xc0 [ 25.280024] ? __pfx_kthread+0x10/0x10 [ 25.280097] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.280136] ? calculate_sigpending+0x7b/0xa0 [ 25.280172] ? __pfx_kthread+0x10/0x10 [ 25.280200] ret_from_fork+0x41/0x80 [ 25.280236] ? __pfx_kthread+0x10/0x10 [ 25.280266] ret_from_fork_asm+0x1a/0x30 [ 25.280339] </TASK> [ 25.280359] [ 25.295521] Allocated by task 285: [ 25.295989] kasan_save_stack+0x45/0x70 [ 25.296578] kasan_save_track+0x18/0x40 [ 25.297080] kasan_save_alloc_info+0x3b/0x50 [ 25.297601] __kasan_kmalloc+0xb7/0xc0 [ 25.298093] __kmalloc_cache_noprof+0x189/0x420 [ 25.298605] kasan_atomics+0x95/0x310 [ 25.298952] kunit_try_run_case+0x1a5/0x480 [ 25.299464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.300100] kthread+0x337/0x6f0 [ 25.300457] ret_from_fork+0x41/0x80 [ 25.300792] ret_from_fork_asm+0x1a/0x30 [ 25.301173] [ 25.301402] The buggy address belongs to the object at ffff888102ef1180 [ 25.301402] which belongs to the cache kmalloc-64 of size 64 [ 25.302540] The buggy address is located 0 bytes to the right of [ 25.302540] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.303709] [ 25.303922] The buggy address belongs to the physical page: [ 25.304356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.304850] flags: 0x200000000000000(node=0|zone=2) [ 25.305247] page_type: f5(slab) [ 25.305620] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.306263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.306920] page dumped because: kasan: bad access detected [ 25.307524] [ 25.307793] Memory state around the buggy address: [ 25.308350] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.309073] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.309738] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.310813] ^ [ 25.311249] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.312875] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.313573] ================================================================== [ 25.094099] ================================================================== [ 25.095140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 25.096085] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.096658] [ 25.096976] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.097109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.097152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.097216] Call Trace: [ 25.097272] <TASK> [ 25.097349] dump_stack_lvl+0x73/0xb0 [ 25.097474] print_report+0xd1/0x650 [ 25.097565] ? __virt_addr_valid+0x1db/0x2d0 [ 25.097646] ? kasan_atomics_helper+0x13b5/0x5450 [ 25.097722] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.097799] ? kasan_atomics_helper+0x13b5/0x5450 [ 25.097875] kasan_report+0x141/0x180 [ 25.097955] ? kasan_atomics_helper+0x13b5/0x5450 [ 25.098048] kasan_check_range+0x10c/0x1c0 [ 25.098254] __kasan_check_read+0x15/0x20 [ 25.098353] kasan_atomics_helper+0x13b5/0x5450 [ 25.098412] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.098453] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.098496] ? kasan_atomics+0x152/0x310 [ 25.098533] kasan_atomics+0x1dc/0x310 [ 25.098566] ? __pfx_kasan_atomics+0x10/0x10 [ 25.098603] ? __pfx_read_tsc+0x10/0x10 [ 25.098642] ? ktime_get_ts64+0x86/0x230 [ 25.098686] kunit_try_run_case+0x1a5/0x480 [ 25.098729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.098766] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.098808] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.098847] ? __kthread_parkme+0x82/0x180 [ 25.098882] ? preempt_count_sub+0x50/0x80 [ 25.098921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.098959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.098997] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.099039] kthread+0x337/0x6f0 [ 25.099096] ? trace_preempt_on+0x20/0xc0 [ 25.099139] ? __pfx_kthread+0x10/0x10 [ 25.099169] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.099204] ? calculate_sigpending+0x7b/0xa0 [ 25.099241] ? __pfx_kthread+0x10/0x10 [ 25.099270] ret_from_fork+0x41/0x80 [ 25.099346] ? __pfx_kthread+0x10/0x10 [ 25.099417] ret_from_fork_asm+0x1a/0x30 [ 25.099517] </TASK> [ 25.099606] [ 25.117149] Allocated by task 285: [ 25.117684] kasan_save_stack+0x45/0x70 [ 25.118229] kasan_save_track+0x18/0x40 [ 25.118711] kasan_save_alloc_info+0x3b/0x50 [ 25.119245] __kasan_kmalloc+0xb7/0xc0 [ 25.119707] __kmalloc_cache_noprof+0x189/0x420 [ 25.120242] kasan_atomics+0x95/0x310 [ 25.120730] kunit_try_run_case+0x1a5/0x480 [ 25.121266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.121806] kthread+0x337/0x6f0 [ 25.122240] ret_from_fork+0x41/0x80 [ 25.122672] ret_from_fork_asm+0x1a/0x30 [ 25.123216] [ 25.123494] The buggy address belongs to the object at ffff888102ef1180 [ 25.123494] which belongs to the cache kmalloc-64 of size 64 [ 25.124535] The buggy address is located 0 bytes to the right of [ 25.124535] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.125636] [ 25.125895] The buggy address belongs to the physical page: [ 25.126282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.127115] flags: 0x200000000000000(node=0|zone=2) [ 25.127668] page_type: f5(slab) [ 25.128027] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.128803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.129540] page dumped because: kasan: bad access detected [ 25.130121] [ 25.130417] Memory state around the buggy address: [ 25.130830] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.131352] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.132188] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.132876] ^ [ 25.133443] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.133946] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.134539] ================================================================== [ 25.413778] ================================================================== [ 25.414814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 25.415923] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.416994] [ 25.417493] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.417610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.417632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.417665] Call Trace: [ 25.417694] <TASK> [ 25.417723] dump_stack_lvl+0x73/0xb0 [ 25.417772] print_report+0xd1/0x650 [ 25.417815] ? __virt_addr_valid+0x1db/0x2d0 [ 25.417851] ? kasan_atomics_helper+0x16e7/0x5450 [ 25.417887] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.417924] ? kasan_atomics_helper+0x16e7/0x5450 [ 25.417962] kasan_report+0x141/0x180 [ 25.418003] ? kasan_atomics_helper+0x16e7/0x5450 [ 25.418062] kasan_check_range+0x10c/0x1c0 [ 25.418118] __kasan_check_write+0x18/0x20 [ 25.418152] kasan_atomics_helper+0x16e7/0x5450 [ 25.418192] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.418231] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.418270] ? kasan_atomics+0x152/0x310 [ 25.418358] kasan_atomics+0x1dc/0x310 [ 25.418450] ? __pfx_kasan_atomics+0x10/0x10 [ 25.418549] ? __pfx_read_tsc+0x10/0x10 [ 25.418635] ? ktime_get_ts64+0x86/0x230 [ 25.418731] kunit_try_run_case+0x1a5/0x480 [ 25.418821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.418885] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.418932] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.418971] ? __kthread_parkme+0x82/0x180 [ 25.419007] ? preempt_count_sub+0x50/0x80 [ 25.419088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.419136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.419177] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.419214] kthread+0x337/0x6f0 [ 25.419241] ? trace_preempt_on+0x20/0xc0 [ 25.419280] ? __pfx_kthread+0x10/0x10 [ 25.419335] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.419372] ? calculate_sigpending+0x7b/0xa0 [ 25.419408] ? __pfx_kthread+0x10/0x10 [ 25.419439] ret_from_fork+0x41/0x80 [ 25.419474] ? __pfx_kthread+0x10/0x10 [ 25.419505] ret_from_fork_asm+0x1a/0x30 [ 25.419553] </TASK> [ 25.419570] [ 25.440630] Allocated by task 285: [ 25.441475] kasan_save_stack+0x45/0x70 [ 25.441860] kasan_save_track+0x18/0x40 [ 25.442706] kasan_save_alloc_info+0x3b/0x50 [ 25.443027] __kasan_kmalloc+0xb7/0xc0 [ 25.443725] __kmalloc_cache_noprof+0x189/0x420 [ 25.444159] kasan_atomics+0x95/0x310 [ 25.444925] kunit_try_run_case+0x1a5/0x480 [ 25.445527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.446206] kthread+0x337/0x6f0 [ 25.446511] ret_from_fork+0x41/0x80 [ 25.446827] ret_from_fork_asm+0x1a/0x30 [ 25.447226] [ 25.447409] The buggy address belongs to the object at ffff888102ef1180 [ 25.447409] which belongs to the cache kmalloc-64 of size 64 [ 25.448551] The buggy address is located 0 bytes to the right of [ 25.448551] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.449410] [ 25.449662] The buggy address belongs to the physical page: [ 25.450192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.451520] flags: 0x200000000000000(node=0|zone=2) [ 25.452376] page_type: f5(slab) [ 25.452648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.453433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.454112] page dumped because: kasan: bad access detected [ 25.454668] [ 25.454915] Memory state around the buggy address: [ 25.455417] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.456122] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.456755] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.457449] ^ [ 25.457917] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.458615] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.459250] ================================================================== [ 23.677708] ================================================================== [ 23.678744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 23.680202] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 23.681143] [ 23.681398] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.681520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.681542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.681572] Call Trace: [ 23.681597] <TASK> [ 23.681622] dump_stack_lvl+0x73/0xb0 [ 23.681665] print_report+0xd1/0x650 [ 23.681706] ? __virt_addr_valid+0x1db/0x2d0 [ 23.681740] ? kasan_atomics_helper+0x3df/0x5450 [ 23.681774] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.681809] ? kasan_atomics_helper+0x3df/0x5450 [ 23.681843] kasan_report+0x141/0x180 [ 23.681879] ? kasan_atomics_helper+0x3df/0x5450 [ 23.681919] kasan_check_range+0x10c/0x1c0 [ 23.681949] __kasan_check_read+0x15/0x20 [ 23.681983] kasan_atomics_helper+0x3df/0x5450 [ 23.682022] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.682089] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.682128] ? kasan_atomics+0x152/0x310 [ 23.682164] kasan_atomics+0x1dc/0x310 [ 23.682194] ? __pfx_kasan_atomics+0x10/0x10 [ 23.682225] ? __pfx_read_tsc+0x10/0x10 [ 23.682260] ? ktime_get_ts64+0x86/0x230 [ 23.682330] kunit_try_run_case+0x1a5/0x480 [ 23.682423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.682502] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.682588] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.682667] ? __kthread_parkme+0x82/0x180 [ 23.682745] ? preempt_count_sub+0x50/0x80 [ 23.682829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.682911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.682997] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.683078] kthread+0x337/0x6f0 [ 23.683159] ? trace_preempt_on+0x20/0xc0 [ 23.683210] ? __pfx_kthread+0x10/0x10 [ 23.683240] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.683274] ? calculate_sigpending+0x7b/0xa0 [ 23.683336] ? __pfx_kthread+0x10/0x10 [ 23.683366] ret_from_fork+0x41/0x80 [ 23.683403] ? __pfx_kthread+0x10/0x10 [ 23.683433] ret_from_fork_asm+0x1a/0x30 [ 23.683480] </TASK> [ 23.683498] [ 23.703865] Allocated by task 285: [ 23.704717] kasan_save_stack+0x45/0x70 [ 23.705165] kasan_save_track+0x18/0x40 [ 23.705539] kasan_save_alloc_info+0x3b/0x50 [ 23.705969] __kasan_kmalloc+0xb7/0xc0 [ 23.706373] __kmalloc_cache_noprof+0x189/0x420 [ 23.706804] kasan_atomics+0x95/0x310 [ 23.707137] kunit_try_run_case+0x1a5/0x480 [ 23.708156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.708637] kthread+0x337/0x6f0 [ 23.709287] ret_from_fork+0x41/0x80 [ 23.709818] ret_from_fork_asm+0x1a/0x30 [ 23.710479] [ 23.710706] The buggy address belongs to the object at ffff888102ef1180 [ 23.710706] which belongs to the cache kmalloc-64 of size 64 [ 23.711999] The buggy address is located 0 bytes to the right of [ 23.711999] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 23.713020] [ 23.713717] The buggy address belongs to the physical page: [ 23.714208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 23.714804] flags: 0x200000000000000(node=0|zone=2) [ 23.715460] page_type: f5(slab) [ 23.715638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.715915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.716951] page dumped because: kasan: bad access detected [ 23.717891] [ 23.718125] Memory state around the buggy address: [ 23.718605] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.719119] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.720221] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.720794] ^ [ 23.721601] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.722281] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.723109] ================================================================== [ 24.010883] ================================================================== [ 24.011386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 24.011958] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.012869] [ 24.013246] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.013398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.013443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.013506] Call Trace: [ 24.013561] <TASK> [ 24.013616] dump_stack_lvl+0x73/0xb0 [ 24.013704] print_report+0xd1/0x650 [ 24.013794] ? __virt_addr_valid+0x1db/0x2d0 [ 24.013874] ? kasan_atomics_helper+0x72f/0x5450 [ 24.013950] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.014027] ? kasan_atomics_helper+0x72f/0x5450 [ 24.014850] kasan_report+0x141/0x180 [ 24.014934] ? kasan_atomics_helper+0x72f/0x5450 [ 24.015095] kasan_check_range+0x10c/0x1c0 [ 24.015141] __kasan_check_write+0x18/0x20 [ 24.015176] kasan_atomics_helper+0x72f/0x5450 [ 24.015214] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.015252] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.015311] ? kasan_atomics+0x152/0x310 [ 24.015357] kasan_atomics+0x1dc/0x310 [ 24.015392] ? __pfx_kasan_atomics+0x10/0x10 [ 24.015427] ? __pfx_read_tsc+0x10/0x10 [ 24.015461] ? ktime_get_ts64+0x86/0x230 [ 24.015503] kunit_try_run_case+0x1a5/0x480 [ 24.015544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.015579] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.015618] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.015655] ? __kthread_parkme+0x82/0x180 [ 24.015689] ? preempt_count_sub+0x50/0x80 [ 24.015728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.015766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.015803] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.015839] kthread+0x337/0x6f0 [ 24.015866] ? trace_preempt_on+0x20/0xc0 [ 24.015917] ? __pfx_kthread+0x10/0x10 [ 24.015944] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.015978] ? calculate_sigpending+0x7b/0xa0 [ 24.016012] ? __pfx_kthread+0x10/0x10 [ 24.016051] ret_from_fork+0x41/0x80 [ 24.016106] ? __pfx_kthread+0x10/0x10 [ 24.016138] ret_from_fork_asm+0x1a/0x30 [ 24.016183] </TASK> [ 24.016202] [ 24.030569] Allocated by task 285: [ 24.031023] kasan_save_stack+0x45/0x70 [ 24.031560] kasan_save_track+0x18/0x40 [ 24.031905] kasan_save_alloc_info+0x3b/0x50 [ 24.032247] __kasan_kmalloc+0xb7/0xc0 [ 24.032772] __kmalloc_cache_noprof+0x189/0x420 [ 24.033397] kasan_atomics+0x95/0x310 [ 24.033823] kunit_try_run_case+0x1a5/0x480 [ 24.034421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.034830] kthread+0x337/0x6f0 [ 24.035125] ret_from_fork+0x41/0x80 [ 24.035571] ret_from_fork_asm+0x1a/0x30 [ 24.036030] [ 24.036325] The buggy address belongs to the object at ffff888102ef1180 [ 24.036325] which belongs to the cache kmalloc-64 of size 64 [ 24.037060] The buggy address is located 0 bytes to the right of [ 24.037060] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.037792] [ 24.037993] The buggy address belongs to the physical page: [ 24.038462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.039236] flags: 0x200000000000000(node=0|zone=2) [ 24.039759] page_type: f5(slab) [ 24.040135] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.040867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.041814] page dumped because: kasan: bad access detected [ 24.042386] [ 24.042621] Memory state around the buggy address: [ 24.043078] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.043671] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.044342] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.044893] ^ [ 24.045396] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.045896] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.046665] ================================================================== [ 25.690208] ================================================================== [ 25.690671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 25.691534] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.692073] [ 25.692442] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.692582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.692626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.692688] Call Trace: [ 25.692754] <TASK> [ 25.692816] dump_stack_lvl+0x73/0xb0 [ 25.692941] print_report+0xd1/0x650 [ 25.693100] ? __virt_addr_valid+0x1db/0x2d0 [ 25.693191] ? kasan_atomics_helper+0x1a7f/0x5450 [ 25.693330] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.693415] ? kasan_atomics_helper+0x1a7f/0x5450 [ 25.693466] kasan_report+0x141/0x180 [ 25.693510] ? kasan_atomics_helper+0x1a7f/0x5450 [ 25.693553] kasan_check_range+0x10c/0x1c0 [ 25.693622] __kasan_check_write+0x18/0x20 [ 25.693701] kasan_atomics_helper+0x1a7f/0x5450 [ 25.693814] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.693925] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.694013] ? kasan_atomics+0x152/0x310 [ 25.694185] kasan_atomics+0x1dc/0x310 [ 25.694265] ? __pfx_kasan_atomics+0x10/0x10 [ 25.694357] ? __pfx_read_tsc+0x10/0x10 [ 25.694402] ? ktime_get_ts64+0x86/0x230 [ 25.694445] kunit_try_run_case+0x1a5/0x480 [ 25.694487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.694524] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.694565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.694603] ? __kthread_parkme+0x82/0x180 [ 25.694637] ? preempt_count_sub+0x50/0x80 [ 25.694675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.694714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.694749] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.694785] kthread+0x337/0x6f0 [ 25.694811] ? trace_preempt_on+0x20/0xc0 [ 25.694849] ? __pfx_kthread+0x10/0x10 [ 25.694877] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.694910] ? calculate_sigpending+0x7b/0xa0 [ 25.694945] ? __pfx_kthread+0x10/0x10 [ 25.694972] ret_from_fork+0x41/0x80 [ 25.695006] ? __pfx_kthread+0x10/0x10 [ 25.695054] ret_from_fork_asm+0x1a/0x30 [ 25.695126] </TASK> [ 25.695145] [ 25.715604] Allocated by task 285: [ 25.716074] kasan_save_stack+0x45/0x70 [ 25.716964] kasan_save_track+0x18/0x40 [ 25.717406] kasan_save_alloc_info+0x3b/0x50 [ 25.717756] __kasan_kmalloc+0xb7/0xc0 [ 25.718496] __kmalloc_cache_noprof+0x189/0x420 [ 25.718863] kasan_atomics+0x95/0x310 [ 25.719272] kunit_try_run_case+0x1a5/0x480 [ 25.719715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.720221] kthread+0x337/0x6f0 [ 25.720786] ret_from_fork+0x41/0x80 [ 25.721166] ret_from_fork_asm+0x1a/0x30 [ 25.721577] [ 25.721806] The buggy address belongs to the object at ffff888102ef1180 [ 25.721806] which belongs to the cache kmalloc-64 of size 64 [ 25.723112] The buggy address is located 0 bytes to the right of [ 25.723112] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.723973] [ 25.724177] The buggy address belongs to the physical page: [ 25.725458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.725961] flags: 0x200000000000000(node=0|zone=2) [ 25.726996] page_type: f5(slab) [ 25.727342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.727863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.728311] page dumped because: kasan: bad access detected [ 25.728622] [ 25.728775] Memory state around the buggy address: [ 25.729075] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.729844] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.731859] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.732801] ^ [ 25.734075] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.734643] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.735040] ================================================================== [ 23.817217] ================================================================== [ 23.818658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 23.819278] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 23.820346] [ 23.820622] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.820766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.820811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.820875] Call Trace: [ 23.820934] <TASK> [ 23.820990] dump_stack_lvl+0x73/0xb0 [ 23.821128] print_report+0xd1/0x650 [ 23.821209] ? __virt_addr_valid+0x1db/0x2d0 [ 23.821284] ? kasan_atomics_helper+0x4b3a/0x5450 [ 23.821380] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.821459] ? kasan_atomics_helper+0x4b3a/0x5450 [ 23.821538] kasan_report+0x141/0x180 [ 23.821595] ? kasan_atomics_helper+0x4b3a/0x5450 [ 23.821640] __asan_report_store4_noabort+0x1b/0x30 [ 23.821674] kasan_atomics_helper+0x4b3a/0x5450 [ 23.821711] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.821746] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.821782] ? kasan_atomics+0x152/0x310 [ 23.821819] kasan_atomics+0x1dc/0x310 [ 23.821849] ? __pfx_kasan_atomics+0x10/0x10 [ 23.821881] ? __pfx_read_tsc+0x10/0x10 [ 23.821916] ? ktime_get_ts64+0x86/0x230 [ 23.821958] kunit_try_run_case+0x1a5/0x480 [ 23.821998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.822051] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.822132] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.822171] ? __kthread_parkme+0x82/0x180 [ 23.822206] ? preempt_count_sub+0x50/0x80 [ 23.822245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.822282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.822351] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.822389] kthread+0x337/0x6f0 [ 23.822415] ? trace_preempt_on+0x20/0xc0 [ 23.822454] ? __pfx_kthread+0x10/0x10 [ 23.822482] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.822515] ? calculate_sigpending+0x7b/0xa0 [ 23.822549] ? __pfx_kthread+0x10/0x10 [ 23.822576] ret_from_fork+0x41/0x80 [ 23.822610] ? __pfx_kthread+0x10/0x10 [ 23.822637] ret_from_fork_asm+0x1a/0x30 [ 23.822682] </TASK> [ 23.822698] [ 23.841622] Allocated by task 285: [ 23.842106] kasan_save_stack+0x45/0x70 [ 23.842605] kasan_save_track+0x18/0x40 [ 23.843005] kasan_save_alloc_info+0x3b/0x50 [ 23.843485] __kasan_kmalloc+0xb7/0xc0 [ 23.843837] __kmalloc_cache_noprof+0x189/0x420 [ 23.844376] kasan_atomics+0x95/0x310 [ 23.844762] kunit_try_run_case+0x1a5/0x480 [ 23.845259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.845769] kthread+0x337/0x6f0 [ 23.846183] ret_from_fork+0x41/0x80 [ 23.846568] ret_from_fork_asm+0x1a/0x30 [ 23.847012] [ 23.847309] The buggy address belongs to the object at ffff888102ef1180 [ 23.847309] which belongs to the cache kmalloc-64 of size 64 [ 23.848262] The buggy address is located 0 bytes to the right of [ 23.848262] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 23.849201] [ 23.849435] The buggy address belongs to the physical page: [ 23.849905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 23.850612] flags: 0x200000000000000(node=0|zone=2) [ 23.851160] page_type: f5(slab) [ 23.851571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.852206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.852833] page dumped because: kasan: bad access detected [ 23.853384] [ 23.853605] Memory state around the buggy address: [ 23.854014] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.854572] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.855236] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.855857] ^ [ 23.856379] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.856884] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.857563] ================================================================== [ 26.139906] ================================================================== [ 26.140675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 26.141242] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 26.141930] [ 26.142252] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 26.142403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.142443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.142505] Call Trace: [ 26.142558] <TASK> [ 26.142601] dump_stack_lvl+0x73/0xb0 [ 26.142649] print_report+0xd1/0x650 [ 26.142692] ? __virt_addr_valid+0x1db/0x2d0 [ 26.142748] ? kasan_atomics_helper+0x2006/0x5450 [ 26.142830] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.142911] ? kasan_atomics_helper+0x2006/0x5450 [ 26.142996] kasan_report+0x141/0x180 [ 26.143167] ? kasan_atomics_helper+0x2006/0x5450 [ 26.143268] kasan_check_range+0x10c/0x1c0 [ 26.143364] __kasan_check_write+0x18/0x20 [ 26.143439] kasan_atomics_helper+0x2006/0x5450 [ 26.143521] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.143599] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.143681] ? kasan_atomics+0x152/0x310 [ 26.143802] kasan_atomics+0x1dc/0x310 [ 26.143896] ? __pfx_kasan_atomics+0x10/0x10 [ 26.144012] ? __pfx_read_tsc+0x10/0x10 [ 26.144129] ? ktime_get_ts64+0x86/0x230 [ 26.144220] kunit_try_run_case+0x1a5/0x480 [ 26.144327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.144403] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.144451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.144492] ? __kthread_parkme+0x82/0x180 [ 26.144529] ? preempt_count_sub+0x50/0x80 [ 26.144571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.144613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.144653] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.144693] kthread+0x337/0x6f0 [ 26.144724] ? trace_preempt_on+0x20/0xc0 [ 26.144764] ? __pfx_kthread+0x10/0x10 [ 26.144794] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.144830] ? calculate_sigpending+0x7b/0xa0 [ 26.144866] ? __pfx_kthread+0x10/0x10 [ 26.144896] ret_from_fork+0x41/0x80 [ 26.144933] ? __pfx_kthread+0x10/0x10 [ 26.144965] ret_from_fork_asm+0x1a/0x30 [ 26.145015] </TASK> [ 26.145052] [ 26.165979] Allocated by task 285: [ 26.166419] kasan_save_stack+0x45/0x70 [ 26.166984] kasan_save_track+0x18/0x40 [ 26.167544] kasan_save_alloc_info+0x3b/0x50 [ 26.168151] __kasan_kmalloc+0xb7/0xc0 [ 26.168721] __kmalloc_cache_noprof+0x189/0x420 [ 26.169433] kasan_atomics+0x95/0x310 [ 26.169957] kunit_try_run_case+0x1a5/0x480 [ 26.170873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.171412] kthread+0x337/0x6f0 [ 26.171951] ret_from_fork+0x41/0x80 [ 26.172462] ret_from_fork_asm+0x1a/0x30 [ 26.173042] [ 26.173516] The buggy address belongs to the object at ffff888102ef1180 [ 26.173516] which belongs to the cache kmalloc-64 of size 64 [ 26.174940] The buggy address is located 0 bytes to the right of [ 26.174940] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 26.176239] [ 26.176491] The buggy address belongs to the physical page: [ 26.177410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 26.178272] flags: 0x200000000000000(node=0|zone=2) [ 26.178968] page_type: f5(slab) [ 26.179312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.179997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.180632] page dumped because: kasan: bad access detected [ 26.181095] [ 26.181335] Memory state around the buggy address: [ 26.181761] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.182797] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.183606] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.184349] ^ [ 26.184667] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.185912] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.187207] ================================================================== [ 26.333266] ================================================================== [ 26.333822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 26.335033] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 26.336455] [ 26.336743] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 26.336834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.336856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.336890] Call Trace: [ 26.336931] <TASK> [ 26.336985] dump_stack_lvl+0x73/0xb0 [ 26.337035] print_report+0xd1/0x650 [ 26.337104] ? __virt_addr_valid+0x1db/0x2d0 [ 26.337141] ? kasan_atomics_helper+0x218a/0x5450 [ 26.337176] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.337213] ? kasan_atomics_helper+0x218a/0x5450 [ 26.337251] kasan_report+0x141/0x180 [ 26.337288] ? kasan_atomics_helper+0x218a/0x5450 [ 26.337411] kasan_check_range+0x10c/0x1c0 [ 26.337463] __kasan_check_write+0x18/0x20 [ 26.337504] kasan_atomics_helper+0x218a/0x5450 [ 26.337544] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.337582] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.337620] ? kasan_atomics+0x152/0x310 [ 26.337656] kasan_atomics+0x1dc/0x310 [ 26.337688] ? __pfx_kasan_atomics+0x10/0x10 [ 26.337721] ? __pfx_read_tsc+0x10/0x10 [ 26.337757] ? ktime_get_ts64+0x86/0x230 [ 26.337799] kunit_try_run_case+0x1a5/0x480 [ 26.337842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.337879] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.337918] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.337958] ? __kthread_parkme+0x82/0x180 [ 26.337994] ? preempt_count_sub+0x50/0x80 [ 26.338037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.338102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.338143] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.338182] kthread+0x337/0x6f0 [ 26.338210] ? trace_preempt_on+0x20/0xc0 [ 26.338249] ? __pfx_kthread+0x10/0x10 [ 26.338279] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.338531] ? calculate_sigpending+0x7b/0xa0 [ 26.338575] ? __pfx_kthread+0x10/0x10 [ 26.338608] ret_from_fork+0x41/0x80 [ 26.338648] ? __pfx_kthread+0x10/0x10 [ 26.338680] ret_from_fork_asm+0x1a/0x30 [ 26.338730] </TASK> [ 26.338750] [ 26.359754] Allocated by task 285: [ 26.360167] kasan_save_stack+0x45/0x70 [ 26.360691] kasan_save_track+0x18/0x40 [ 26.361109] kasan_save_alloc_info+0x3b/0x50 [ 26.361610] __kasan_kmalloc+0xb7/0xc0 [ 26.362001] __kmalloc_cache_noprof+0x189/0x420 [ 26.362520] kasan_atomics+0x95/0x310 [ 26.362902] kunit_try_run_case+0x1a5/0x480 [ 26.363394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.364002] kthread+0x337/0x6f0 [ 26.364532] ret_from_fork+0x41/0x80 [ 26.364873] ret_from_fork_asm+0x1a/0x30 [ 26.365451] [ 26.365659] The buggy address belongs to the object at ffff888102ef1180 [ 26.365659] which belongs to the cache kmalloc-64 of size 64 [ 26.366664] The buggy address is located 0 bytes to the right of [ 26.366664] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 26.367868] [ 26.368189] The buggy address belongs to the physical page: [ 26.368623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 26.369423] flags: 0x200000000000000(node=0|zone=2) [ 26.369901] page_type: f5(slab) [ 26.370508] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.371121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.371705] page dumped because: kasan: bad access detected [ 26.372210] [ 26.372447] Memory state around the buggy address: [ 26.372856] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.374030] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.374566] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.375766] ^ [ 26.376163] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.376847] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.377528] ================================================================== [ 23.630040] ================================================================== [ 23.630658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 23.631038] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 23.631994] [ 23.632169] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.632269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.632313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.632358] Call Trace: [ 23.632396] <TASK> [ 23.632431] dump_stack_lvl+0x73/0xb0 [ 23.632489] print_report+0xd1/0x650 [ 23.632541] ? __virt_addr_valid+0x1db/0x2d0 [ 23.632590] ? kasan_atomics_helper+0x4b6e/0x5450 [ 23.632640] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.632688] ? kasan_atomics_helper+0x4b6e/0x5450 [ 23.632736] kasan_report+0x141/0x180 [ 23.632787] ? kasan_atomics_helper+0x4b6e/0x5450 [ 23.632847] __asan_report_store4_noabort+0x1b/0x30 [ 23.632893] kasan_atomics_helper+0x4b6e/0x5450 [ 23.632944] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.632994] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.633042] ? kasan_atomics+0x152/0x310 [ 23.633097] kasan_atomics+0x1dc/0x310 [ 23.633182] ? __pfx_kasan_atomics+0x10/0x10 [ 23.633260] ? __pfx_read_tsc+0x10/0x10 [ 23.633356] ? ktime_get_ts64+0x86/0x230 [ 23.633446] kunit_try_run_case+0x1a5/0x480 [ 23.633865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.633954] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.634042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.634119] ? __kthread_parkme+0x82/0x180 [ 23.634195] ? preempt_count_sub+0x50/0x80 [ 23.634275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.634378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.635035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.635128] kthread+0x337/0x6f0 [ 23.635188] ? trace_preempt_on+0x20/0xc0 [ 23.635260] ? __pfx_kthread+0x10/0x10 [ 23.635320] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.635371] ? calculate_sigpending+0x7b/0xa0 [ 23.635421] ? __pfx_kthread+0x10/0x10 [ 23.635467] ret_from_fork+0x41/0x80 [ 23.635507] ? __pfx_kthread+0x10/0x10 [ 23.635539] ret_from_fork_asm+0x1a/0x30 [ 23.635588] </TASK> [ 23.635604] [ 23.654613] Allocated by task 285: [ 23.655054] kasan_save_stack+0x45/0x70 [ 23.655734] kasan_save_track+0x18/0x40 [ 23.655990] kasan_save_alloc_info+0x3b/0x50 [ 23.656279] __kasan_kmalloc+0xb7/0xc0 [ 23.656570] __kmalloc_cache_noprof+0x189/0x420 [ 23.656887] kasan_atomics+0x95/0x310 [ 23.657162] kunit_try_run_case+0x1a5/0x480 [ 23.659580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.660191] kthread+0x337/0x6f0 [ 23.660850] ret_from_fork+0x41/0x80 [ 23.661670] ret_from_fork_asm+0x1a/0x30 [ 23.662519] [ 23.662776] The buggy address belongs to the object at ffff888102ef1180 [ 23.662776] which belongs to the cache kmalloc-64 of size 64 [ 23.663939] The buggy address is located 0 bytes to the right of [ 23.663939] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 23.666063] [ 23.666237] The buggy address belongs to the physical page: [ 23.666783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 23.667522] flags: 0x200000000000000(node=0|zone=2) [ 23.668042] page_type: f5(slab) [ 23.668392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.669320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.669962] page dumped because: kasan: bad access detected [ 23.670969] [ 23.671257] Memory state around the buggy address: [ 23.671688] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.672105] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.673427] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.674354] ^ [ 23.674833] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.675585] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.676173] ================================================================== [ 25.954288] ================================================================== [ 25.954874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 25.955633] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.956205] [ 25.956467] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.956602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.956647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.956711] Call Trace: [ 25.956766] <TASK> [ 25.956817] dump_stack_lvl+0x73/0xb0 [ 25.956905] print_report+0xd1/0x650 [ 25.956983] ? __virt_addr_valid+0x1db/0x2d0 [ 25.957104] ? kasan_atomics_helper+0x1e12/0x5450 [ 25.957188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.957270] ? kasan_atomics_helper+0x1e12/0x5450 [ 25.957373] kasan_report+0x141/0x180 [ 25.957462] ? kasan_atomics_helper+0x1e12/0x5450 [ 25.957558] kasan_check_range+0x10c/0x1c0 [ 25.957641] __kasan_check_write+0x18/0x20 [ 25.957716] kasan_atomics_helper+0x1e12/0x5450 [ 25.957802] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.957883] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.957967] ? kasan_atomics+0x152/0x310 [ 25.958089] kasan_atomics+0x1dc/0x310 [ 25.958171] ? __pfx_kasan_atomics+0x10/0x10 [ 25.958247] ? __pfx_read_tsc+0x10/0x10 [ 25.958347] ? ktime_get_ts64+0x86/0x230 [ 25.958433] kunit_try_run_case+0x1a5/0x480 [ 25.958518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.958583] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.958628] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.958669] ? __kthread_parkme+0x82/0x180 [ 25.958706] ? preempt_count_sub+0x50/0x80 [ 25.958748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.958786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.958826] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.958866] kthread+0x337/0x6f0 [ 25.958896] ? trace_preempt_on+0x20/0xc0 [ 25.958935] ? __pfx_kthread+0x10/0x10 [ 25.958964] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.958999] ? calculate_sigpending+0x7b/0xa0 [ 25.959058] ? __pfx_kthread+0x10/0x10 [ 25.959116] ret_from_fork+0x41/0x80 [ 25.959156] ? __pfx_kthread+0x10/0x10 [ 25.959190] ret_from_fork_asm+0x1a/0x30 [ 25.959240] </TASK> [ 25.959260] [ 25.979622] Allocated by task 285: [ 25.979959] kasan_save_stack+0x45/0x70 [ 25.980966] kasan_save_track+0x18/0x40 [ 25.981314] kasan_save_alloc_info+0x3b/0x50 [ 25.982044] __kasan_kmalloc+0xb7/0xc0 [ 25.982721] __kmalloc_cache_noprof+0x189/0x420 [ 25.983122] kasan_atomics+0x95/0x310 [ 25.983447] kunit_try_run_case+0x1a5/0x480 [ 25.984342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.984947] kthread+0x337/0x6f0 [ 25.985518] ret_from_fork+0x41/0x80 [ 25.985857] ret_from_fork_asm+0x1a/0x30 [ 25.986795] [ 25.987071] The buggy address belongs to the object at ffff888102ef1180 [ 25.987071] which belongs to the cache kmalloc-64 of size 64 [ 25.987954] The buggy address is located 0 bytes to the right of [ 25.987954] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.989703] [ 25.989888] The buggy address belongs to the physical page: [ 25.990709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.991167] flags: 0x200000000000000(node=0|zone=2) [ 25.992569] page_type: f5(slab) [ 25.993154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.993627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.994038] page dumped because: kasan: bad access detected [ 25.994820] [ 25.995471] Memory state around the buggy address: [ 25.995942] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.997503] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.997889] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.998995] ^ [ 26.001073] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.001379] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.001623] ================================================================== [ 24.554913] ================================================================== [ 24.556625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 24.557415] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.558546] [ 24.558984] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.559093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.559137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.559393] Call Trace: [ 24.559430] <TASK> [ 24.559460] dump_stack_lvl+0x73/0xb0 [ 24.559506] print_report+0xd1/0x650 [ 24.559546] ? __virt_addr_valid+0x1db/0x2d0 [ 24.559584] ? kasan_atomics_helper+0xe78/0x5450 [ 24.559619] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.559655] ? kasan_atomics_helper+0xe78/0x5450 [ 24.559692] kasan_report+0x141/0x180 [ 24.559729] ? kasan_atomics_helper+0xe78/0x5450 [ 24.559769] kasan_check_range+0x10c/0x1c0 [ 24.559802] __kasan_check_write+0x18/0x20 [ 24.559834] kasan_atomics_helper+0xe78/0x5450 [ 24.559873] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.559921] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.559957] ? kasan_atomics+0x152/0x310 [ 24.559992] kasan_atomics+0x1dc/0x310 [ 24.560023] ? __pfx_kasan_atomics+0x10/0x10 [ 24.560086] ? __pfx_read_tsc+0x10/0x10 [ 24.560125] ? ktime_get_ts64+0x86/0x230 [ 24.560166] kunit_try_run_case+0x1a5/0x480 [ 24.560209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.560248] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.560288] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.560354] ? __kthread_parkme+0x82/0x180 [ 24.560391] ? preempt_count_sub+0x50/0x80 [ 24.560430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.560470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.560507] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.560545] kthread+0x337/0x6f0 [ 24.560573] ? trace_preempt_on+0x20/0xc0 [ 24.560612] ? __pfx_kthread+0x10/0x10 [ 24.560642] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.560678] ? calculate_sigpending+0x7b/0xa0 [ 24.560715] ? __pfx_kthread+0x10/0x10 [ 24.560746] ret_from_fork+0x41/0x80 [ 24.560781] ? __pfx_kthread+0x10/0x10 [ 24.560812] ret_from_fork_asm+0x1a/0x30 [ 24.560860] </TASK> [ 24.560878] [ 24.576562] Allocated by task 285: [ 24.577080] kasan_save_stack+0x45/0x70 [ 24.577620] kasan_save_track+0x18/0x40 [ 24.578008] kasan_save_alloc_info+0x3b/0x50 [ 24.578416] __kasan_kmalloc+0xb7/0xc0 [ 24.578899] __kmalloc_cache_noprof+0x189/0x420 [ 24.579447] kasan_atomics+0x95/0x310 [ 24.579862] kunit_try_run_case+0x1a5/0x480 [ 24.580394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.580915] kthread+0x337/0x6f0 [ 24.581379] ret_from_fork+0x41/0x80 [ 24.581726] ret_from_fork_asm+0x1a/0x30 [ 24.582258] [ 24.582516] The buggy address belongs to the object at ffff888102ef1180 [ 24.582516] which belongs to the cache kmalloc-64 of size 64 [ 24.583509] The buggy address is located 0 bytes to the right of [ 24.583509] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.584307] [ 24.584567] The buggy address belongs to the physical page: [ 24.585192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.585977] flags: 0x200000000000000(node=0|zone=2) [ 24.586581] page_type: f5(slab) [ 24.586986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.587628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.588166] page dumped because: kasan: bad access detected [ 24.588710] [ 24.588989] Memory state around the buggy address: [ 24.589509] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.590237] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.590883] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.591466] ^ [ 24.591959] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.592620] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.593214] ================================================================== [ 24.237341] ================================================================== [ 24.237772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 24.238580] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.239262] [ 24.239566] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.239751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.239813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.239918] Call Trace: [ 24.239978] <TASK> [ 24.240071] dump_stack_lvl+0x73/0xb0 [ 24.240155] print_report+0xd1/0x650 [ 24.240216] ? __virt_addr_valid+0x1db/0x2d0 [ 24.240310] ? kasan_atomics_helper+0xa2b/0x5450 [ 24.240415] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.240527] ? kasan_atomics_helper+0xa2b/0x5450 [ 24.240608] kasan_report+0x141/0x180 [ 24.240689] ? kasan_atomics_helper+0xa2b/0x5450 [ 24.240799] kasan_check_range+0x10c/0x1c0 [ 24.240910] __kasan_check_write+0x18/0x20 [ 24.240966] kasan_atomics_helper+0xa2b/0x5450 [ 24.241007] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.241094] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.241138] ? kasan_atomics+0x152/0x310 [ 24.241176] kasan_atomics+0x1dc/0x310 [ 24.241206] ? __pfx_kasan_atomics+0x10/0x10 [ 24.241241] ? __pfx_read_tsc+0x10/0x10 [ 24.241275] ? ktime_get_ts64+0x86/0x230 [ 24.241345] kunit_try_run_case+0x1a5/0x480 [ 24.241387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.241422] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.241460] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.241497] ? __kthread_parkme+0x82/0x180 [ 24.241530] ? preempt_count_sub+0x50/0x80 [ 24.241568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.241603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.241639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.241675] kthread+0x337/0x6f0 [ 24.241700] ? trace_preempt_on+0x20/0xc0 [ 24.241735] ? __pfx_kthread+0x10/0x10 [ 24.241762] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.241795] ? calculate_sigpending+0x7b/0xa0 [ 24.241827] ? __pfx_kthread+0x10/0x10 [ 24.241855] ret_from_fork+0x41/0x80 [ 24.241889] ? __pfx_kthread+0x10/0x10 [ 24.241917] ret_from_fork_asm+0x1a/0x30 [ 24.241965] </TASK> [ 24.241981] [ 24.263578] Allocated by task 285: [ 24.263954] kasan_save_stack+0x45/0x70 [ 24.264407] kasan_save_track+0x18/0x40 [ 24.264794] kasan_save_alloc_info+0x3b/0x50 [ 24.265687] __kasan_kmalloc+0xb7/0xc0 [ 24.265993] __kmalloc_cache_noprof+0x189/0x420 [ 24.266822] kasan_atomics+0x95/0x310 [ 24.267494] kunit_try_run_case+0x1a5/0x480 [ 24.268098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.269191] kthread+0x337/0x6f0 [ 24.269536] ret_from_fork+0x41/0x80 [ 24.270046] ret_from_fork_asm+0x1a/0x30 [ 24.270502] [ 24.270739] The buggy address belongs to the object at ffff888102ef1180 [ 24.270739] which belongs to the cache kmalloc-64 of size 64 [ 24.272131] The buggy address is located 0 bytes to the right of [ 24.272131] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.273112] [ 24.273527] The buggy address belongs to the physical page: [ 24.274030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.274856] flags: 0x200000000000000(node=0|zone=2) [ 24.275421] page_type: f5(slab) [ 24.275888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.276700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.277419] page dumped because: kasan: bad access detected [ 24.277892] [ 24.278178] Memory state around the buggy address: [ 24.278696] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.279488] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.280165] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.280814] ^ [ 24.281531] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.282362] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.282894] ================================================================== [ 24.732721] ================================================================== [ 24.733624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 24.734323] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.735332] [ 24.735594] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.735996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.736025] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.736081] Call Trace: [ 24.736113] <TASK> [ 24.736142] dump_stack_lvl+0x73/0xb0 [ 24.736191] print_report+0xd1/0x650 [ 24.736232] ? __virt_addr_valid+0x1db/0x2d0 [ 24.736267] ? kasan_atomics_helper+0x1079/0x5450 [ 24.736329] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.736371] ? kasan_atomics_helper+0x1079/0x5450 [ 24.736408] kasan_report+0x141/0x180 [ 24.736446] ? kasan_atomics_helper+0x1079/0x5450 [ 24.736489] kasan_check_range+0x10c/0x1c0 [ 24.736522] __kasan_check_write+0x18/0x20 [ 24.736557] kasan_atomics_helper+0x1079/0x5450 [ 24.736639] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.736714] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.736785] ? kasan_atomics+0x152/0x310 [ 24.736825] kasan_atomics+0x1dc/0x310 [ 24.736857] ? __pfx_kasan_atomics+0x10/0x10 [ 24.736891] ? __pfx_read_tsc+0x10/0x10 [ 24.736928] ? ktime_get_ts64+0x86/0x230 [ 24.736971] kunit_try_run_case+0x1a5/0x480 [ 24.737012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.737060] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.737121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.737162] ? __kthread_parkme+0x82/0x180 [ 24.737200] ? preempt_count_sub+0x50/0x80 [ 24.737239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.737279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.737343] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.737384] kthread+0x337/0x6f0 [ 24.737412] ? trace_preempt_on+0x20/0xc0 [ 24.737453] ? __pfx_kthread+0x10/0x10 [ 24.737482] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.737517] ? calculate_sigpending+0x7b/0xa0 [ 24.737552] ? __pfx_kthread+0x10/0x10 [ 24.737583] ret_from_fork+0x41/0x80 [ 24.737618] ? __pfx_kthread+0x10/0x10 [ 24.737649] ret_from_fork_asm+0x1a/0x30 [ 24.737697] </TASK> [ 24.737715] [ 24.757166] Allocated by task 285: [ 24.758132] kasan_save_stack+0x45/0x70 [ 24.758757] kasan_save_track+0x18/0x40 [ 24.759403] kasan_save_alloc_info+0x3b/0x50 [ 24.760001] __kasan_kmalloc+0xb7/0xc0 [ 24.760704] __kmalloc_cache_noprof+0x189/0x420 [ 24.761381] kasan_atomics+0x95/0x310 [ 24.761701] kunit_try_run_case+0x1a5/0x480 [ 24.762078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.762511] kthread+0x337/0x6f0 [ 24.762790] ret_from_fork+0x41/0x80 [ 24.764134] ret_from_fork_asm+0x1a/0x30 [ 24.764728] [ 24.765111] The buggy address belongs to the object at ffff888102ef1180 [ 24.765111] which belongs to the cache kmalloc-64 of size 64 [ 24.766389] The buggy address is located 0 bytes to the right of [ 24.766389] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.767349] [ 24.767600] The buggy address belongs to the physical page: [ 24.768260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.768878] flags: 0x200000000000000(node=0|zone=2) [ 24.769800] page_type: f5(slab) [ 24.770215] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.771055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.771870] page dumped because: kasan: bad access detected [ 24.772621] [ 24.772861] Memory state around the buggy address: [ 24.773307] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.773834] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.774515] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.775515] ^ [ 24.775950] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.776638] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.777263] ================================================================== [ 24.468175] ================================================================== [ 24.469489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 24.470232] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.470706] [ 24.470993] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.471134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.471174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.471211] Call Trace: [ 24.471239] <TASK> [ 24.471265] dump_stack_lvl+0x73/0xb0 [ 24.471361] print_report+0xd1/0x650 [ 24.471414] ? __virt_addr_valid+0x1db/0x2d0 [ 24.471451] ? kasan_atomics_helper+0xd47/0x5450 [ 24.471488] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.471524] ? kasan_atomics_helper+0xd47/0x5450 [ 24.471560] kasan_report+0x141/0x180 [ 24.471597] ? kasan_atomics_helper+0xd47/0x5450 [ 24.471638] kasan_check_range+0x10c/0x1c0 [ 24.471671] __kasan_check_write+0x18/0x20 [ 24.471703] kasan_atomics_helper+0xd47/0x5450 [ 24.471740] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.471778] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.471815] ? kasan_atomics+0x152/0x310 [ 24.471853] kasan_atomics+0x1dc/0x310 [ 24.471902] ? __pfx_kasan_atomics+0x10/0x10 [ 24.471941] ? __pfx_read_tsc+0x10/0x10 [ 24.471978] ? ktime_get_ts64+0x86/0x230 [ 24.472021] kunit_try_run_case+0x1a5/0x480 [ 24.472091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.472133] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.472175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.472215] ? __kthread_parkme+0x82/0x180 [ 24.472252] ? preempt_count_sub+0x50/0x80 [ 24.472357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.472462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.472542] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.472621] kthread+0x337/0x6f0 [ 24.472689] ? trace_preempt_on+0x20/0xc0 [ 24.472770] ? __pfx_kthread+0x10/0x10 [ 24.472839] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.472914] ? calculate_sigpending+0x7b/0xa0 [ 24.472991] ? __pfx_kthread+0x10/0x10 [ 24.473082] ret_from_fork+0x41/0x80 [ 24.473173] ? __pfx_kthread+0x10/0x10 [ 24.473218] ret_from_fork_asm+0x1a/0x30 [ 24.473268] </TASK> [ 24.473287] [ 24.493527] Allocated by task 285: [ 24.493720] kasan_save_stack+0x45/0x70 [ 24.493912] kasan_save_track+0x18/0x40 [ 24.494223] kasan_save_alloc_info+0x3b/0x50 [ 24.495031] __kasan_kmalloc+0xb7/0xc0 [ 24.495847] __kmalloc_cache_noprof+0x189/0x420 [ 24.496445] kasan_atomics+0x95/0x310 [ 24.496835] kunit_try_run_case+0x1a5/0x480 [ 24.497286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.497878] kthread+0x337/0x6f0 [ 24.498267] ret_from_fork+0x41/0x80 [ 24.498845] ret_from_fork_asm+0x1a/0x30 [ 24.499430] [ 24.499662] The buggy address belongs to the object at ffff888102ef1180 [ 24.499662] which belongs to the cache kmalloc-64 of size 64 [ 24.500899] The buggy address is located 0 bytes to the right of [ 24.500899] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.502363] [ 24.503013] The buggy address belongs to the physical page: [ 24.503598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.504353] flags: 0x200000000000000(node=0|zone=2) [ 24.504755] page_type: f5(slab) [ 24.505123] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.505746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.506424] page dumped because: kasan: bad access detected [ 24.506942] [ 24.507173] Memory state around the buggy address: [ 24.507576] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.508222] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.509136] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.509669] ^ [ 24.510130] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.510725] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.511181] ================================================================== [ 23.772522] ================================================================== [ 23.773795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 23.774740] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 23.775988] [ 23.776268] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.776409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.776453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.776728] Call Trace: [ 23.776788] <TASK> [ 23.776843] dump_stack_lvl+0x73/0xb0 [ 23.776927] print_report+0xd1/0x650 [ 23.776971] ? __virt_addr_valid+0x1db/0x2d0 [ 23.777009] ? kasan_atomics_helper+0x4a0/0x5450 [ 23.777056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.777112] ? kasan_atomics_helper+0x4a0/0x5450 [ 23.777149] kasan_report+0x141/0x180 [ 23.777186] ? kasan_atomics_helper+0x4a0/0x5450 [ 23.777229] kasan_check_range+0x10c/0x1c0 [ 23.777264] __kasan_check_write+0x18/0x20 [ 23.777320] kasan_atomics_helper+0x4a0/0x5450 [ 23.777361] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.777399] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.777437] ? kasan_atomics+0x152/0x310 [ 23.777474] kasan_atomics+0x1dc/0x310 [ 23.777505] ? __pfx_kasan_atomics+0x10/0x10 [ 23.777539] ? __pfx_read_tsc+0x10/0x10 [ 23.777576] ? ktime_get_ts64+0x86/0x230 [ 23.777618] kunit_try_run_case+0x1a5/0x480 [ 23.777661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.777697] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.777770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.777812] ? __kthread_parkme+0x82/0x180 [ 23.777848] ? preempt_count_sub+0x50/0x80 [ 23.777889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.777929] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.777968] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.778007] kthread+0x337/0x6f0 [ 23.778039] ? trace_preempt_on+0x20/0xc0 [ 23.778103] ? __pfx_kthread+0x10/0x10 [ 23.778135] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.778173] ? calculate_sigpending+0x7b/0xa0 [ 23.778210] ? __pfx_kthread+0x10/0x10 [ 23.778239] ret_from_fork+0x41/0x80 [ 23.778284] ? __pfx_kthread+0x10/0x10 [ 23.778348] ret_from_fork_asm+0x1a/0x30 [ 23.778414] </TASK> [ 23.778436] [ 23.798080] Allocated by task 285: [ 23.798521] kasan_save_stack+0x45/0x70 [ 23.799013] kasan_save_track+0x18/0x40 [ 23.799447] kasan_save_alloc_info+0x3b/0x50 [ 23.799947] __kasan_kmalloc+0xb7/0xc0 [ 23.800398] __kmalloc_cache_noprof+0x189/0x420 [ 23.800841] kasan_atomics+0x95/0x310 [ 23.801443] kunit_try_run_case+0x1a5/0x480 [ 23.801898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.802458] kthread+0x337/0x6f0 [ 23.802984] ret_from_fork+0x41/0x80 [ 23.803375] ret_from_fork_asm+0x1a/0x30 [ 23.803853] [ 23.804085] The buggy address belongs to the object at ffff888102ef1180 [ 23.804085] which belongs to the cache kmalloc-64 of size 64 [ 23.804928] The buggy address is located 0 bytes to the right of [ 23.804928] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 23.805954] [ 23.806153] The buggy address belongs to the physical page: [ 23.806776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 23.807554] flags: 0x200000000000000(node=0|zone=2) [ 23.808100] page_type: f5(slab) [ 23.808490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.809010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.809727] page dumped because: kasan: bad access detected [ 23.810314] [ 23.810586] Memory state around the buggy address: [ 23.811001] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.811603] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.812204] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.812906] ^ [ 23.813548] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.814219] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.815798] ================================================================== [ 26.236927] ================================================================== [ 26.237499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 26.238592] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 26.239945] [ 26.240562] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 26.241140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.241163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.241197] Call Trace: [ 26.241225] <TASK> [ 26.241250] dump_stack_lvl+0x73/0xb0 [ 26.241321] print_report+0xd1/0x650 [ 26.241368] ? __virt_addr_valid+0x1db/0x2d0 [ 26.241404] ? kasan_atomics_helper+0x20c8/0x5450 [ 26.241439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.241478] ? kasan_atomics_helper+0x20c8/0x5450 [ 26.241514] kasan_report+0x141/0x180 [ 26.241551] ? kasan_atomics_helper+0x20c8/0x5450 [ 26.241592] kasan_check_range+0x10c/0x1c0 [ 26.241625] __kasan_check_write+0x18/0x20 [ 26.241658] kasan_atomics_helper+0x20c8/0x5450 [ 26.241695] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.241732] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.241768] ? kasan_atomics+0x152/0x310 [ 26.241804] kasan_atomics+0x1dc/0x310 [ 26.241835] ? __pfx_kasan_atomics+0x10/0x10 [ 26.241869] ? __pfx_read_tsc+0x10/0x10 [ 26.241903] ? ktime_get_ts64+0x86/0x230 [ 26.241944] kunit_try_run_case+0x1a5/0x480 [ 26.241985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.242025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.242095] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.242139] ? __kthread_parkme+0x82/0x180 [ 26.242177] ? preempt_count_sub+0x50/0x80 [ 26.242217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.242258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.242317] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.242360] kthread+0x337/0x6f0 [ 26.242390] ? trace_preempt_on+0x20/0xc0 [ 26.242429] ? __pfx_kthread+0x10/0x10 [ 26.242461] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.242497] ? calculate_sigpending+0x7b/0xa0 [ 26.242532] ? __pfx_kthread+0x10/0x10 [ 26.242564] ret_from_fork+0x41/0x80 [ 26.242600] ? __pfx_kthread+0x10/0x10 [ 26.242631] ret_from_fork_asm+0x1a/0x30 [ 26.242680] </TASK> [ 26.242698] [ 26.264691] Allocated by task 285: [ 26.264984] kasan_save_stack+0x45/0x70 [ 26.267713] kasan_save_track+0x18/0x40 [ 26.268719] kasan_save_alloc_info+0x3b/0x50 [ 26.269795] __kasan_kmalloc+0xb7/0xc0 [ 26.271213] __kmalloc_cache_noprof+0x189/0x420 [ 26.272280] kasan_atomics+0x95/0x310 [ 26.273518] kunit_try_run_case+0x1a5/0x480 [ 26.274201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.274716] kthread+0x337/0x6f0 [ 26.275120] ret_from_fork+0x41/0x80 [ 26.275545] ret_from_fork_asm+0x1a/0x30 [ 26.275947] [ 26.276386] The buggy address belongs to the object at ffff888102ef1180 [ 26.276386] which belongs to the cache kmalloc-64 of size 64 [ 26.277254] The buggy address is located 0 bytes to the right of [ 26.277254] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 26.278434] [ 26.278706] The buggy address belongs to the physical page: [ 26.279320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 26.280073] flags: 0x200000000000000(node=0|zone=2) [ 26.280645] page_type: f5(slab) [ 26.281026] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.281863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.282541] page dumped because: kasan: bad access detected [ 26.283095] [ 26.283418] Memory state around the buggy address: [ 26.283794] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.284537] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.285265] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.285836] ^ [ 26.286397] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.287123] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.287803] ================================================================== [ 24.595920] ================================================================== [ 24.596667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 24.597557] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.598316] [ 24.598629] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.598767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.598808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.598871] Call Trace: [ 24.598947] <TASK> [ 24.599026] dump_stack_lvl+0x73/0xb0 [ 24.599156] print_report+0xd1/0x650 [ 24.599237] ? __virt_addr_valid+0x1db/0x2d0 [ 24.599332] ? kasan_atomics_helper+0xf10/0x5450 [ 24.599411] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.599478] ? kasan_atomics_helper+0xf10/0x5450 [ 24.599538] kasan_report+0x141/0x180 [ 24.599619] ? kasan_atomics_helper+0xf10/0x5450 [ 24.599710] kasan_check_range+0x10c/0x1c0 [ 24.599789] __kasan_check_write+0x18/0x20 [ 24.599864] kasan_atomics_helper+0xf10/0x5450 [ 24.599960] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.600084] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.600177] ? kasan_atomics+0x152/0x310 [ 24.600263] kasan_atomics+0x1dc/0x310 [ 24.600374] ? __pfx_kasan_atomics+0x10/0x10 [ 24.600479] ? __pfx_read_tsc+0x10/0x10 [ 24.600561] ? ktime_get_ts64+0x86/0x230 [ 24.600647] kunit_try_run_case+0x1a5/0x480 [ 24.600735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.600813] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.600899] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.600978] ? __kthread_parkme+0x82/0x180 [ 24.601093] ? preempt_count_sub+0x50/0x80 [ 24.601143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.601184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.601221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.601259] kthread+0x337/0x6f0 [ 24.601286] ? trace_preempt_on+0x20/0xc0 [ 24.601354] ? __pfx_kthread+0x10/0x10 [ 24.601383] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.601417] ? calculate_sigpending+0x7b/0xa0 [ 24.601451] ? __pfx_kthread+0x10/0x10 [ 24.601478] ret_from_fork+0x41/0x80 [ 24.601513] ? __pfx_kthread+0x10/0x10 [ 24.601542] ret_from_fork_asm+0x1a/0x30 [ 24.601587] </TASK> [ 24.601605] [ 24.616896] Allocated by task 285: [ 24.617456] kasan_save_stack+0x45/0x70 [ 24.617987] kasan_save_track+0x18/0x40 [ 24.618508] kasan_save_alloc_info+0x3b/0x50 [ 24.618960] __kasan_kmalloc+0xb7/0xc0 [ 24.619446] __kmalloc_cache_noprof+0x189/0x420 [ 24.619986] kasan_atomics+0x95/0x310 [ 24.620462] kunit_try_run_case+0x1a5/0x480 [ 24.620953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.621539] kthread+0x337/0x6f0 [ 24.621956] ret_from_fork+0x41/0x80 [ 24.622480] ret_from_fork_asm+0x1a/0x30 [ 24.622799] [ 24.623103] The buggy address belongs to the object at ffff888102ef1180 [ 24.623103] which belongs to the cache kmalloc-64 of size 64 [ 24.623949] The buggy address is located 0 bytes to the right of [ 24.623949] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.624728] [ 24.624981] The buggy address belongs to the physical page: [ 24.625618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.626411] flags: 0x200000000000000(node=0|zone=2) [ 24.626918] page_type: f5(slab) [ 24.627374] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.628029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.628752] page dumped because: kasan: bad access detected [ 24.629218] [ 24.629454] Memory state around the buggy address: [ 24.629974] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.630753] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.631471] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.631927] ^ [ 24.632459] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.633205] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.633868] ================================================================== [ 23.577536] ================================================================== [ 23.578112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 23.578826] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 23.579218] [ 23.579410] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.579517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.579544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.579587] Call Trace: [ 23.579613] <TASK> [ 23.579653] dump_stack_lvl+0x73/0xb0 [ 23.579714] print_report+0xd1/0x650 [ 23.579772] ? __virt_addr_valid+0x1db/0x2d0 [ 23.579822] ? kasan_atomics_helper+0x4b88/0x5450 [ 23.579870] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.579939] ? kasan_atomics_helper+0x4b88/0x5450 [ 23.579990] kasan_report+0x141/0x180 [ 23.580041] ? kasan_atomics_helper+0x4b88/0x5450 [ 23.580106] __asan_report_load4_noabort+0x18/0x20 [ 23.580156] kasan_atomics_helper+0x4b88/0x5450 [ 23.580211] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.580265] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.580336] ? kasan_atomics+0x152/0x310 [ 23.580392] kasan_atomics+0x1dc/0x310 [ 23.580437] ? __pfx_kasan_atomics+0x10/0x10 [ 23.580485] ? __pfx_read_tsc+0x10/0x10 [ 23.580533] ? ktime_get_ts64+0x86/0x230 [ 23.580592] kunit_try_run_case+0x1a5/0x480 [ 23.580651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.580700] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.580758] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.580812] ? __kthread_parkme+0x82/0x180 [ 23.580866] ? preempt_count_sub+0x50/0x80 [ 23.580925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.580984] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.581038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.581090] kthread+0x337/0x6f0 [ 23.581132] ? trace_preempt_on+0x20/0xc0 [ 23.581186] ? __pfx_kthread+0x10/0x10 [ 23.581237] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.581478] ? calculate_sigpending+0x7b/0xa0 [ 23.581559] ? __pfx_kthread+0x10/0x10 [ 23.581623] ret_from_fork+0x41/0x80 [ 23.581665] ? __pfx_kthread+0x10/0x10 [ 23.581696] ret_from_fork_asm+0x1a/0x30 [ 23.581744] </TASK> [ 23.581763] [ 23.606772] Allocated by task 285: [ 23.607389] kasan_save_stack+0x45/0x70 [ 23.609261] kasan_save_track+0x18/0x40 [ 23.609716] kasan_save_alloc_info+0x3b/0x50 [ 23.610158] __kasan_kmalloc+0xb7/0xc0 [ 23.610573] __kmalloc_cache_noprof+0x189/0x420 [ 23.611032] kasan_atomics+0x95/0x310 [ 23.611279] kunit_try_run_case+0x1a5/0x480 [ 23.613473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.614170] kthread+0x337/0x6f0 [ 23.614941] ret_from_fork+0x41/0x80 [ 23.615401] ret_from_fork_asm+0x1a/0x30 [ 23.615979] [ 23.616128] The buggy address belongs to the object at ffff888102ef1180 [ 23.616128] which belongs to the cache kmalloc-64 of size 64 [ 23.616759] The buggy address is located 0 bytes to the right of [ 23.616759] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 23.617346] [ 23.617487] The buggy address belongs to the physical page: [ 23.617771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 23.619227] flags: 0x200000000000000(node=0|zone=2) [ 23.619839] page_type: f5(slab) [ 23.620336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.621419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.622114] page dumped because: kasan: bad access detected [ 23.622721] [ 23.623146] Memory state around the buggy address: [ 23.623554] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.624563] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.625088] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.625800] ^ [ 23.626368] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.627155] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.628231] ================================================================== [ 25.910246] ================================================================== [ 25.910875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 25.911751] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.913237] [ 25.913493] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.913605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.913649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.913712] Call Trace: [ 25.913767] <TASK> [ 25.913825] dump_stack_lvl+0x73/0xb0 [ 25.913910] print_report+0xd1/0x650 [ 25.913992] ? __virt_addr_valid+0x1db/0x2d0 [ 25.914072] ? kasan_atomics_helper+0x1d7a/0x5450 [ 25.914144] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.914224] ? kasan_atomics_helper+0x1d7a/0x5450 [ 25.914358] kasan_report+0x141/0x180 [ 25.914482] ? kasan_atomics_helper+0x1d7a/0x5450 [ 25.914582] kasan_check_range+0x10c/0x1c0 [ 25.914660] __kasan_check_write+0x18/0x20 [ 25.914771] kasan_atomics_helper+0x1d7a/0x5450 [ 25.914863] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.914949] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.915030] ? kasan_atomics+0x152/0x310 [ 25.915199] kasan_atomics+0x1dc/0x310 [ 25.915281] ? __pfx_kasan_atomics+0x10/0x10 [ 25.915381] ? __pfx_read_tsc+0x10/0x10 [ 25.915500] ? ktime_get_ts64+0x86/0x230 [ 25.915598] kunit_try_run_case+0x1a5/0x480 [ 25.915691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.915772] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.915913] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.916003] ? __kthread_parkme+0x82/0x180 [ 25.916130] ? preempt_count_sub+0x50/0x80 [ 25.916262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.916367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.916492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.916575] kthread+0x337/0x6f0 [ 25.916626] ? trace_preempt_on+0x20/0xc0 [ 25.916697] ? __pfx_kthread+0x10/0x10 [ 25.916767] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.916888] ? calculate_sigpending+0x7b/0xa0 [ 25.916977] ? __pfx_kthread+0x10/0x10 [ 25.917091] ret_from_fork+0x41/0x80 [ 25.917174] ? __pfx_kthread+0x10/0x10 [ 25.917242] ret_from_fork_asm+0x1a/0x30 [ 25.917364] </TASK> [ 25.917447] [ 25.933116] Allocated by task 285: [ 25.933640] kasan_save_stack+0x45/0x70 [ 25.934187] kasan_save_track+0x18/0x40 [ 25.934668] kasan_save_alloc_info+0x3b/0x50 [ 25.935150] __kasan_kmalloc+0xb7/0xc0 [ 25.935644] __kmalloc_cache_noprof+0x189/0x420 [ 25.936162] kasan_atomics+0x95/0x310 [ 25.936648] kunit_try_run_case+0x1a5/0x480 [ 25.937143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.937690] kthread+0x337/0x6f0 [ 25.938103] ret_from_fork+0x41/0x80 [ 25.938590] ret_from_fork_asm+0x1a/0x30 [ 25.939011] [ 25.939550] The buggy address belongs to the object at ffff888102ef1180 [ 25.939550] which belongs to the cache kmalloc-64 of size 64 [ 25.941248] The buggy address is located 0 bytes to the right of [ 25.941248] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.944258] [ 25.944827] The buggy address belongs to the physical page: [ 25.945599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.946227] flags: 0x200000000000000(node=0|zone=2) [ 25.946654] page_type: f5(slab) [ 25.947008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.947698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.948375] page dumped because: kasan: bad access detected [ 25.948813] [ 25.949079] Memory state around the buggy address: [ 25.949554] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.950175] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.950740] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.951356] ^ [ 25.951790] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.952363] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.953001] ================================================================== [ 25.781226] ================================================================== [ 25.781890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 25.783280] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.784413] [ 25.784654] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.784797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.784841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.784903] Call Trace: [ 25.784963] <TASK> [ 25.785019] dump_stack_lvl+0x73/0xb0 [ 25.785431] print_report+0xd1/0x650 [ 25.785519] ? __virt_addr_valid+0x1db/0x2d0 [ 25.785599] ? kasan_atomics_helper+0x1c18/0x5450 [ 25.785655] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.785699] ? kasan_atomics_helper+0x1c18/0x5450 [ 25.785737] kasan_report+0x141/0x180 [ 25.785775] ? kasan_atomics_helper+0x1c18/0x5450 [ 25.785819] kasan_check_range+0x10c/0x1c0 [ 25.785853] __kasan_check_write+0x18/0x20 [ 25.785888] kasan_atomics_helper+0x1c18/0x5450 [ 25.785927] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.785965] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.786002] ? kasan_atomics+0x152/0x310 [ 25.786066] kasan_atomics+0x1dc/0x310 [ 25.786121] ? __pfx_kasan_atomics+0x10/0x10 [ 25.786156] ? __pfx_read_tsc+0x10/0x10 [ 25.786194] ? ktime_get_ts64+0x86/0x230 [ 25.786236] kunit_try_run_case+0x1a5/0x480 [ 25.786279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.786344] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.786387] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.786427] ? __kthread_parkme+0x82/0x180 [ 25.786464] ? preempt_count_sub+0x50/0x80 [ 25.786506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.786545] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.786587] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.786624] kthread+0x337/0x6f0 [ 25.786653] ? trace_preempt_on+0x20/0xc0 [ 25.786694] ? __pfx_kthread+0x10/0x10 [ 25.786724] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.786762] ? calculate_sigpending+0x7b/0xa0 [ 25.786801] ? __pfx_kthread+0x10/0x10 [ 25.786832] ret_from_fork+0x41/0x80 [ 25.786869] ? __pfx_kthread+0x10/0x10 [ 25.786899] ret_from_fork_asm+0x1a/0x30 [ 25.786946] </TASK> [ 25.786965] [ 25.804736] Allocated by task 285: [ 25.805132] kasan_save_stack+0x45/0x70 [ 25.805836] kasan_save_track+0x18/0x40 [ 25.806449] kasan_save_alloc_info+0x3b/0x50 [ 25.807004] __kasan_kmalloc+0xb7/0xc0 [ 25.807584] __kmalloc_cache_noprof+0x189/0x420 [ 25.808120] kasan_atomics+0x95/0x310 [ 25.808728] kunit_try_run_case+0x1a5/0x480 [ 25.809205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.809610] kthread+0x337/0x6f0 [ 25.809968] ret_from_fork+0x41/0x80 [ 25.810770] ret_from_fork_asm+0x1a/0x30 [ 25.811334] [ 25.811568] The buggy address belongs to the object at ffff888102ef1180 [ 25.811568] which belongs to the cache kmalloc-64 of size 64 [ 25.812827] The buggy address is located 0 bytes to the right of [ 25.812827] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.813798] [ 25.814074] The buggy address belongs to the physical page: [ 25.814842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.815718] flags: 0x200000000000000(node=0|zone=2) [ 25.816283] page_type: f5(slab) [ 25.816817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.817769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.818458] page dumped because: kasan: bad access detected [ 25.819001] [ 25.819277] Memory state around the buggy address: [ 25.820003] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.820683] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.821404] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.822086] ^ [ 25.822646] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.823342] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.824001] ================================================================== [ 24.635556] ================================================================== [ 24.636283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 24.637110] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 24.637847] [ 24.638190] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 24.638364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.638408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.638466] Call Trace: [ 24.638546] <TASK> [ 24.638627] dump_stack_lvl+0x73/0xb0 [ 24.638720] print_report+0xd1/0x650 [ 24.638806] ? __virt_addr_valid+0x1db/0x2d0 [ 24.638887] ? kasan_atomics_helper+0xfa9/0x5450 [ 24.638964] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.639100] ? kasan_atomics_helper+0xfa9/0x5450 [ 24.639216] kasan_report+0x141/0x180 [ 24.639317] ? kasan_atomics_helper+0xfa9/0x5450 [ 24.639413] kasan_check_range+0x10c/0x1c0 [ 24.639517] __kasan_check_write+0x18/0x20 [ 24.639618] kasan_atomics_helper+0xfa9/0x5450 [ 24.639694] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.639750] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.639790] ? kasan_atomics+0x152/0x310 [ 24.639863] kasan_atomics+0x1dc/0x310 [ 24.639926] ? __pfx_kasan_atomics+0x10/0x10 [ 24.639995] ? __pfx_read_tsc+0x10/0x10 [ 24.640133] ? ktime_get_ts64+0x86/0x230 [ 24.640251] kunit_try_run_case+0x1a5/0x480 [ 24.640356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.640437] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.640572] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.640680] ? __kthread_parkme+0x82/0x180 [ 24.640781] ? preempt_count_sub+0x50/0x80 [ 24.640900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.641016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.641143] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.641224] kthread+0x337/0x6f0 [ 24.641310] ? trace_preempt_on+0x20/0xc0 [ 24.641398] ? __pfx_kthread+0x10/0x10 [ 24.641490] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.641598] ? calculate_sigpending+0x7b/0xa0 [ 24.641678] ? __pfx_kthread+0x10/0x10 [ 24.641747] ret_from_fork+0x41/0x80 [ 24.641819] ? __pfx_kthread+0x10/0x10 [ 24.641865] ret_from_fork_asm+0x1a/0x30 [ 24.641915] </TASK> [ 24.641932] [ 24.659378] Allocated by task 285: [ 24.659833] kasan_save_stack+0x45/0x70 [ 24.660959] kasan_save_track+0x18/0x40 [ 24.661264] kasan_save_alloc_info+0x3b/0x50 [ 24.661741] __kasan_kmalloc+0xb7/0xc0 [ 24.662130] __kmalloc_cache_noprof+0x189/0x420 [ 24.662603] kasan_atomics+0x95/0x310 [ 24.664014] kunit_try_run_case+0x1a5/0x480 [ 24.664708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.665063] kthread+0x337/0x6f0 [ 24.665320] ret_from_fork+0x41/0x80 [ 24.665593] ret_from_fork_asm+0x1a/0x30 [ 24.665890] [ 24.666051] The buggy address belongs to the object at ffff888102ef1180 [ 24.666051] which belongs to the cache kmalloc-64 of size 64 [ 24.669183] The buggy address is located 0 bytes to the right of [ 24.669183] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 24.672408] [ 24.673272] The buggy address belongs to the physical page: [ 24.674502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 24.676231] flags: 0x200000000000000(node=0|zone=2) [ 24.677791] page_type: f5(slab) [ 24.678263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.679121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.679997] page dumped because: kasan: bad access detected [ 24.680600] [ 24.680842] Memory state around the buggy address: [ 24.681395] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.682093] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.682757] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.683461] ^ [ 24.683845] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.684563] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.685200] ================================================================== [ 25.047873] ================================================================== [ 25.048694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 25.049471] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.050229] [ 25.050582] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.050804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.050847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.050909] Call Trace: [ 25.050966] <TASK> [ 25.051024] dump_stack_lvl+0x73/0xb0 [ 25.051316] print_report+0xd1/0x650 [ 25.051406] ? __virt_addr_valid+0x1db/0x2d0 [ 25.051488] ? kasan_atomics_helper+0x49ce/0x5450 [ 25.051624] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.051739] ? kasan_atomics_helper+0x49ce/0x5450 [ 25.051821] kasan_report+0x141/0x180 [ 25.051923] ? kasan_atomics_helper+0x49ce/0x5450 [ 25.052111] __asan_report_load4_noabort+0x18/0x20 [ 25.052242] kasan_atomics_helper+0x49ce/0x5450 [ 25.052329] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.052373] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.052419] ? kasan_atomics+0x152/0x310 [ 25.052456] kasan_atomics+0x1dc/0x310 [ 25.052487] ? __pfx_kasan_atomics+0x10/0x10 [ 25.052523] ? __pfx_read_tsc+0x10/0x10 [ 25.052557] ? ktime_get_ts64+0x86/0x230 [ 25.052597] kunit_try_run_case+0x1a5/0x480 [ 25.052637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.052674] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.052713] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.052751] ? __kthread_parkme+0x82/0x180 [ 25.052785] ? preempt_count_sub+0x50/0x80 [ 25.052824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.052861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.052898] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.052936] kthread+0x337/0x6f0 [ 25.052961] ? trace_preempt_on+0x20/0xc0 [ 25.052999] ? __pfx_kthread+0x10/0x10 [ 25.053026] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.053106] ? calculate_sigpending+0x7b/0xa0 [ 25.053145] ? __pfx_kthread+0x10/0x10 [ 25.053174] ret_from_fork+0x41/0x80 [ 25.053210] ? __pfx_kthread+0x10/0x10 [ 25.053238] ret_from_fork_asm+0x1a/0x30 [ 25.053287] </TASK> [ 25.053333] [ 25.073762] Allocated by task 285: [ 25.074715] kasan_save_stack+0x45/0x70 [ 25.075106] kasan_save_track+0x18/0x40 [ 25.075528] kasan_save_alloc_info+0x3b/0x50 [ 25.076199] __kasan_kmalloc+0xb7/0xc0 [ 25.076618] __kmalloc_cache_noprof+0x189/0x420 [ 25.077057] kasan_atomics+0x95/0x310 [ 25.077442] kunit_try_run_case+0x1a5/0x480 [ 25.077885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.078845] kthread+0x337/0x6f0 [ 25.079100] ret_from_fork+0x41/0x80 [ 25.079854] ret_from_fork_asm+0x1a/0x30 [ 25.080437] [ 25.080624] The buggy address belongs to the object at ffff888102ef1180 [ 25.080624] which belongs to the cache kmalloc-64 of size 64 [ 25.082149] The buggy address is located 0 bytes to the right of [ 25.082149] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.083730] [ 25.083953] The buggy address belongs to the physical page: [ 25.084591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.085457] flags: 0x200000000000000(node=0|zone=2) [ 25.085927] page_type: f5(slab) [ 25.086353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.087094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.087745] page dumped because: kasan: bad access detected [ 25.088378] [ 25.088625] Memory state around the buggy address: [ 25.089137] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.089710] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.090430] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.091084] ^ [ 25.091565] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.092202] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.092840] ================================================================== [ 25.001338] ================================================================== [ 25.001923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 25.002783] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.003491] [ 25.003993] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.004168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.004206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.004257] Call Trace: [ 25.004319] <TASK> [ 25.004369] dump_stack_lvl+0x73/0xb0 [ 25.004484] print_report+0xd1/0x650 [ 25.004559] ? __virt_addr_valid+0x1db/0x2d0 [ 25.004641] ? kasan_atomics_helper+0x12e6/0x5450 [ 25.004735] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.004824] ? kasan_atomics_helper+0x12e6/0x5450 [ 25.004883] kasan_report+0x141/0x180 [ 25.004924] ? kasan_atomics_helper+0x12e6/0x5450 [ 25.005100] kasan_check_range+0x10c/0x1c0 [ 25.005201] __kasan_check_write+0x18/0x20 [ 25.005315] kasan_atomics_helper+0x12e6/0x5450 [ 25.005415] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.005497] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.005580] ? kasan_atomics+0x152/0x310 [ 25.005663] kasan_atomics+0x1dc/0x310 [ 25.005737] ? __pfx_kasan_atomics+0x10/0x10 [ 25.005815] ? __pfx_read_tsc+0x10/0x10 [ 25.006161] ? ktime_get_ts64+0x86/0x230 [ 25.006211] kunit_try_run_case+0x1a5/0x480 [ 25.006257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.006326] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.006374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.006413] ? __kthread_parkme+0x82/0x180 [ 25.006448] ? preempt_count_sub+0x50/0x80 [ 25.006490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.006530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.006569] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.006609] kthread+0x337/0x6f0 [ 25.006639] ? trace_preempt_on+0x20/0xc0 [ 25.006680] ? __pfx_kthread+0x10/0x10 [ 25.006709] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.006745] ? calculate_sigpending+0x7b/0xa0 [ 25.006782] ? __pfx_kthread+0x10/0x10 [ 25.006811] ret_from_fork+0x41/0x80 [ 25.006847] ? __pfx_kthread+0x10/0x10 [ 25.006876] ret_from_fork_asm+0x1a/0x30 [ 25.006926] </TASK> [ 25.006944] [ 25.028094] Allocated by task 285: [ 25.028608] kasan_save_stack+0x45/0x70 [ 25.028982] kasan_save_track+0x18/0x40 [ 25.029638] kasan_save_alloc_info+0x3b/0x50 [ 25.030272] __kasan_kmalloc+0xb7/0xc0 [ 25.030779] __kmalloc_cache_noprof+0x189/0x420 [ 25.031254] kasan_atomics+0x95/0x310 [ 25.031931] kunit_try_run_case+0x1a5/0x480 [ 25.032402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.033177] kthread+0x337/0x6f0 [ 25.033589] ret_from_fork+0x41/0x80 [ 25.033932] ret_from_fork_asm+0x1a/0x30 [ 25.034539] [ 25.034796] The buggy address belongs to the object at ffff888102ef1180 [ 25.034796] which belongs to the cache kmalloc-64 of size 64 [ 25.036363] The buggy address is located 0 bytes to the right of [ 25.036363] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.037502] [ 25.037705] The buggy address belongs to the physical page: [ 25.038340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.038950] flags: 0x200000000000000(node=0|zone=2) [ 25.039565] page_type: f5(slab) [ 25.039894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.040719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.041425] page dumped because: kasan: bad access detected [ 25.041997] [ 25.042372] Memory state around the buggy address: [ 25.042843] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.043597] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.044191] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.044725] ^ [ 25.045171] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.045763] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.046373] ================================================================== [ 25.738584] ================================================================== [ 25.739873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 25.740640] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285 [ 25.741827] [ 25.742182] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 25.742403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.742448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.742510] Call Trace: [ 25.742566] <TASK> [ 25.742617] dump_stack_lvl+0x73/0xb0 [ 25.742668] print_report+0xd1/0x650 [ 25.742709] ? __virt_addr_valid+0x1db/0x2d0 [ 25.742745] ? kasan_atomics_helper+0x1b22/0x5450 [ 25.742782] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.742823] ? kasan_atomics_helper+0x1b22/0x5450 [ 25.742861] kasan_report+0x141/0x180 [ 25.742899] ? kasan_atomics_helper+0x1b22/0x5450 [ 25.742943] kasan_check_range+0x10c/0x1c0 [ 25.742977] __kasan_check_write+0x18/0x20 [ 25.743010] kasan_atomics_helper+0x1b22/0x5450 [ 25.743063] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.743119] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.743156] ? kasan_atomics+0x152/0x310 [ 25.743194] kasan_atomics+0x1dc/0x310 [ 25.743225] ? __pfx_kasan_atomics+0x10/0x10 [ 25.743259] ? __pfx_read_tsc+0x10/0x10 [ 25.743323] ? ktime_get_ts64+0x86/0x230 [ 25.743374] kunit_try_run_case+0x1a5/0x480 [ 25.743417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.743454] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.743495] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.743535] ? __kthread_parkme+0x82/0x180 [ 25.743572] ? preempt_count_sub+0x50/0x80 [ 25.743613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.743651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.743692] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.743731] kthread+0x337/0x6f0 [ 25.743759] ? trace_preempt_on+0x20/0xc0 [ 25.743797] ? __pfx_kthread+0x10/0x10 [ 25.743827] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.743862] ? calculate_sigpending+0x7b/0xa0 [ 25.743912] ? __pfx_kthread+0x10/0x10 [ 25.743942] ret_from_fork+0x41/0x80 [ 25.743979] ? __pfx_kthread+0x10/0x10 [ 25.744010] ret_from_fork_asm+0x1a/0x30 [ 25.744094] </TASK> [ 25.744117] [ 25.759717] Allocated by task 285: [ 25.760208] kasan_save_stack+0x45/0x70 [ 25.760800] kasan_save_track+0x18/0x40 [ 25.761356] kasan_save_alloc_info+0x3b/0x50 [ 25.761803] __kasan_kmalloc+0xb7/0xc0 [ 25.762403] __kmalloc_cache_noprof+0x189/0x420 [ 25.762877] kasan_atomics+0x95/0x310 [ 25.763187] kunit_try_run_case+0x1a5/0x480 [ 25.763544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.764375] kthread+0x337/0x6f0 [ 25.764827] ret_from_fork+0x41/0x80 [ 25.765436] ret_from_fork_asm+0x1a/0x30 [ 25.766022] [ 25.766232] The buggy address belongs to the object at ffff888102ef1180 [ 25.766232] which belongs to the cache kmalloc-64 of size 64 [ 25.767216] The buggy address is located 0 bytes to the right of [ 25.767216] allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0) [ 25.768417] [ 25.768746] The buggy address belongs to the physical page: [ 25.769376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1 [ 25.770083] flags: 0x200000000000000(node=0|zone=2) [ 25.770660] page_type: f5(slab) [ 25.771083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.771777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.772590] page dumped because: kasan: bad access detected [ 25.773099] [ 25.773431] Memory state around the buggy address: [ 25.774362] ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.774948] ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.776025] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.777740] ^ [ 25.778372] ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.779043] ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.779748] ==================================================================