Date
June 24, 2025, 12:47 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 28.251859] ================================================================== [ 28.251986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 28.252253] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.252587] [ 28.253789] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.254103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.254176] Hardware name: linux,dummy-virt (DT) [ 28.254361] Call trace: [ 28.254452] show_stack+0x20/0x38 (C) [ 28.254592] dump_stack_lvl+0x8c/0xd0 [ 28.255303] print_report+0x118/0x608 [ 28.255887] kasan_report+0xdc/0x128 [ 28.256148] kasan_check_range+0x100/0x1a8 [ 28.256690] __kasan_check_read+0x20/0x30 [ 28.257050] kasan_atomics_helper+0xdd4/0x4858 [ 28.257560] kasan_atomics+0x198/0x2e0 [ 28.257678] kunit_try_run_case+0x170/0x3f0 [ 28.258015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.258816] kthread+0x328/0x630 [ 28.259540] ret_from_fork+0x10/0x20 [ 28.260143] [ 28.260610] Allocated by task 267: [ 28.260965] kasan_save_stack+0x3c/0x68 [ 28.261296] kasan_save_track+0x20/0x40 [ 28.261595] kasan_save_alloc_info+0x40/0x58 [ 28.261830] __kasan_kmalloc+0xd4/0xd8 [ 28.261939] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.262270] kasan_atomics+0xb8/0x2e0 [ 28.262627] kunit_try_run_case+0x170/0x3f0 [ 28.263030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.263162] kthread+0x328/0x630 [ 28.263258] ret_from_fork+0x10/0x20 [ 28.264335] [ 28.264417] The buggy address belongs to the object at fff00000c5a80800 [ 28.264417] which belongs to the cache kmalloc-64 of size 64 [ 28.265213] The buggy address is located 0 bytes to the right of [ 28.265213] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.265507] [ 28.265566] The buggy address belongs to the physical page: [ 28.265640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.265798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.265916] page_type: f5(slab) [ 28.266916] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.267113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.267415] page dumped because: kasan: bad access detected [ 28.267939] [ 28.267993] Memory state around the buggy address: [ 28.268280] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.268472] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.268607] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.269323] ^ [ 28.269736] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.269986] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.270208] ================================================================== [ 28.224714] ================================================================== [ 28.224817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 28.224925] Write of size 4 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.225049] [ 28.225114] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.225312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.225401] Hardware name: linux,dummy-virt (DT) [ 28.225485] Call trace: [ 28.225550] show_stack+0x20/0x38 (C) [ 28.225669] dump_stack_lvl+0x8c/0xd0 [ 28.225795] print_report+0x118/0x608 [ 28.225911] kasan_report+0xdc/0x128 [ 28.226024] kasan_check_range+0x100/0x1a8 [ 28.226144] __kasan_check_write+0x20/0x30 [ 28.226266] kasan_atomics_helper+0xd3c/0x4858 [ 28.228523] kasan_atomics+0x198/0x2e0 [ 28.228799] kunit_try_run_case+0x170/0x3f0 [ 28.229019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.229181] kthread+0x328/0x630 [ 28.229706] ret_from_fork+0x10/0x20 [ 28.229979] [ 28.230423] Allocated by task 267: [ 28.230561] kasan_save_stack+0x3c/0x68 [ 28.230794] kasan_save_track+0x20/0x40 [ 28.231278] kasan_save_alloc_info+0x40/0x58 [ 28.231548] __kasan_kmalloc+0xd4/0xd8 [ 28.231780] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.232310] kasan_atomics+0xb8/0x2e0 [ 28.232499] kunit_try_run_case+0x170/0x3f0 [ 28.232694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.233240] kthread+0x328/0x630 [ 28.233395] ret_from_fork+0x10/0x20 [ 28.233572] [ 28.233678] The buggy address belongs to the object at fff00000c5a80800 [ 28.233678] which belongs to the cache kmalloc-64 of size 64 [ 28.234222] The buggy address is located 0 bytes to the right of [ 28.234222] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.234576] [ 28.234887] The buggy address belongs to the physical page: [ 28.234981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.235192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.235799] page_type: f5(slab) [ 28.235914] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.236043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.236661] page dumped because: kasan: bad access detected [ 28.237011] [ 28.237074] Memory state around the buggy address: [ 28.237366] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.237588] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.237800] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.237987] ^ [ 28.238537] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.238732] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.238927] ================================================================== [ 28.435801] ================================================================== [ 28.436063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 28.436443] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.437058] [ 28.437161] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.437369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.437555] Hardware name: linux,dummy-virt (DT) [ 28.437737] Call trace: [ 28.437797] show_stack+0x20/0x38 (C) [ 28.437928] dump_stack_lvl+0x8c/0xd0 [ 28.438135] print_report+0x118/0x608 [ 28.438260] kasan_report+0xdc/0x128 [ 28.438394] kasan_check_range+0x100/0x1a8 [ 28.438520] __kasan_check_write+0x20/0x30 [ 28.439574] kasan_atomics_helper+0x126c/0x4858 [ 28.440464] kasan_atomics+0x198/0x2e0 [ 28.440615] kunit_try_run_case+0x170/0x3f0 [ 28.440767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.440941] kthread+0x328/0x630 [ 28.441273] ret_from_fork+0x10/0x20 [ 28.441552] [ 28.441674] Allocated by task 267: [ 28.442012] kasan_save_stack+0x3c/0x68 [ 28.442442] kasan_save_track+0x20/0x40 [ 28.442562] kasan_save_alloc_info+0x40/0x58 [ 28.442876] __kasan_kmalloc+0xd4/0xd8 [ 28.442988] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.443149] kasan_atomics+0xb8/0x2e0 [ 28.443367] kunit_try_run_case+0x170/0x3f0 [ 28.443503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.443621] kthread+0x328/0x630 [ 28.443717] ret_from_fork+0x10/0x20 [ 28.443835] [ 28.443889] The buggy address belongs to the object at fff00000c5a80800 [ 28.443889] which belongs to the cache kmalloc-64 of size 64 [ 28.444040] The buggy address is located 0 bytes to the right of [ 28.444040] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.444208] [ 28.444672] The buggy address belongs to the physical page: [ 28.444760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.444914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.445038] page_type: f5(slab) [ 28.447102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.447247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.447358] page dumped because: kasan: bad access detected [ 28.447461] [ 28.447806] Memory state around the buggy address: [ 28.448016] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.448360] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.449138] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.449405] ^ [ 28.449738] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.450117] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.450533] ================================================================== [ 28.451597] ================================================================== [ 28.452552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 28.453042] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.453171] [ 28.453248] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.455162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.455250] Hardware name: linux,dummy-virt (DT) [ 28.455334] Call trace: [ 28.455412] show_stack+0x20/0x38 (C) [ 28.455565] dump_stack_lvl+0x8c/0xd0 [ 28.455711] print_report+0x118/0x608 [ 28.455848] kasan_report+0xdc/0x128 [ 28.455968] kasan_check_range+0x100/0x1a8 [ 28.456103] __kasan_check_write+0x20/0x30 [ 28.456644] kasan_atomics_helper+0x12d8/0x4858 [ 28.456890] kasan_atomics+0x198/0x2e0 [ 28.457059] kunit_try_run_case+0x170/0x3f0 [ 28.457248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.457653] kthread+0x328/0x630 [ 28.457883] ret_from_fork+0x10/0x20 [ 28.458604] [ 28.458684] Allocated by task 267: [ 28.458767] kasan_save_stack+0x3c/0x68 [ 28.458906] kasan_save_track+0x20/0x40 [ 28.458999] kasan_save_alloc_info+0x40/0x58 [ 28.459099] __kasan_kmalloc+0xd4/0xd8 [ 28.459197] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.459912] kasan_atomics+0xb8/0x2e0 [ 28.460194] kunit_try_run_case+0x170/0x3f0 [ 28.460318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.460466] kthread+0x328/0x630 [ 28.460629] ret_from_fork+0x10/0x20 [ 28.460920] [ 28.461058] The buggy address belongs to the object at fff00000c5a80800 [ 28.461058] which belongs to the cache kmalloc-64 of size 64 [ 28.461215] The buggy address is located 0 bytes to the right of [ 28.461215] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.461458] [ 28.461523] The buggy address belongs to the physical page: [ 28.461614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.461761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.461927] page_type: f5(slab) [ 28.462186] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.462558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.462985] page dumped because: kasan: bad access detected [ 28.463403] [ 28.463479] Memory state around the buggy address: [ 28.463566] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.463702] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.464053] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.464231] ^ [ 28.464346] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.465171] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.466075] ================================================================== [ 28.477280] ================================================================== [ 28.477464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 28.477632] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.477870] [ 28.478114] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.478438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.478942] Hardware name: linux,dummy-virt (DT) [ 28.479040] Call trace: [ 28.479103] show_stack+0x20/0x38 (C) [ 28.479286] dump_stack_lvl+0x8c/0xd0 [ 28.480349] print_report+0x118/0x608 [ 28.480885] kasan_report+0xdc/0x128 [ 28.481333] __asan_report_load8_noabort+0x20/0x30 [ 28.481489] kasan_atomics_helper+0x3f04/0x4858 [ 28.481616] kasan_atomics+0x198/0x2e0 [ 28.481754] kunit_try_run_case+0x170/0x3f0 [ 28.481890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.482030] kthread+0x328/0x630 [ 28.485777] ret_from_fork+0x10/0x20 [ 28.486163] [ 28.486556] Allocated by task 267: [ 28.486843] kasan_save_stack+0x3c/0x68 [ 28.486953] kasan_save_track+0x20/0x40 [ 28.487768] kasan_save_alloc_info+0x40/0x58 [ 28.487903] __kasan_kmalloc+0xd4/0xd8 [ 28.488535] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.489078] kasan_atomics+0xb8/0x2e0 [ 28.489723] kunit_try_run_case+0x170/0x3f0 [ 28.490483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.491236] kthread+0x328/0x630 [ 28.491342] ret_from_fork+0x10/0x20 [ 28.491463] [ 28.493097] The buggy address belongs to the object at fff00000c5a80800 [ 28.493097] which belongs to the cache kmalloc-64 of size 64 [ 28.493668] The buggy address is located 0 bytes to the right of [ 28.493668] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.494305] [ 28.495105] The buggy address belongs to the physical page: [ 28.495444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.495716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.496180] page_type: f5(slab) [ 28.496297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.497188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.497661] page dumped because: kasan: bad access detected [ 28.497752] [ 28.497861] Memory state around the buggy address: [ 28.497952] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.498079] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.498196] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.499032] ^ [ 28.499271] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.499526] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.499633] ================================================================== [ 28.424839] ================================================================== [ 28.424954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 28.425084] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.425336] [ 28.425498] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.425771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.425851] Hardware name: linux,dummy-virt (DT) [ 28.425946] Call trace: [ 28.426005] show_stack+0x20/0x38 (C) [ 28.426130] dump_stack_lvl+0x8c/0xd0 [ 28.426251] print_report+0x118/0x608 [ 28.426368] kasan_report+0xdc/0x128 [ 28.426522] kasan_check_range+0x100/0x1a8 [ 28.426643] __kasan_check_write+0x20/0x30 [ 28.426770] kasan_atomics_helper+0x11f8/0x4858 [ 28.426888] kasan_atomics+0x198/0x2e0 [ 28.427005] kunit_try_run_case+0x170/0x3f0 [ 28.427129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.427265] kthread+0x328/0x630 [ 28.427845] ret_from_fork+0x10/0x20 [ 28.428076] [ 28.428219] Allocated by task 267: [ 28.428341] kasan_save_stack+0x3c/0x68 [ 28.428480] kasan_save_track+0x20/0x40 [ 28.428589] kasan_save_alloc_info+0x40/0x58 [ 28.428697] __kasan_kmalloc+0xd4/0xd8 [ 28.428794] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.429819] kasan_atomics+0xb8/0x2e0 [ 28.429924] kunit_try_run_case+0x170/0x3f0 [ 28.430030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.430188] kthread+0x328/0x630 [ 28.430286] ret_from_fork+0x10/0x20 [ 28.430628] [ 28.430744] The buggy address belongs to the object at fff00000c5a80800 [ 28.430744] which belongs to the cache kmalloc-64 of size 64 [ 28.430912] The buggy address is located 0 bytes to the right of [ 28.430912] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.431195] [ 28.431277] The buggy address belongs to the physical page: [ 28.431430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.431593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.431912] page_type: f5(slab) [ 28.432011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.432253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.432369] page dumped because: kasan: bad access detected [ 28.432491] [ 28.432554] Memory state around the buggy address: [ 28.432854] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.432994] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.433198] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.434121] ^ [ 28.434234] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.434888] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.435076] ================================================================== [ 28.282212] ================================================================== [ 28.282335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 28.282485] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.283035] [ 28.283110] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.283314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.283401] Hardware name: linux,dummy-virt (DT) [ 28.283483] Call trace: [ 28.283537] show_stack+0x20/0x38 (C) [ 28.283656] dump_stack_lvl+0x8c/0xd0 [ 28.283780] print_report+0x118/0x608 [ 28.283894] kasan_report+0xdc/0x128 [ 28.284011] kasan_check_range+0x100/0x1a8 [ 28.284154] __kasan_check_write+0x20/0x30 [ 28.284534] kasan_atomics_helper+0xe44/0x4858 [ 28.285154] kasan_atomics+0x198/0x2e0 [ 28.285476] kunit_try_run_case+0x170/0x3f0 [ 28.285624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.285765] kthread+0x328/0x630 [ 28.285913] ret_from_fork+0x10/0x20 [ 28.286246] [ 28.286337] Allocated by task 267: [ 28.286433] kasan_save_stack+0x3c/0x68 [ 28.286640] kasan_save_track+0x20/0x40 [ 28.286900] kasan_save_alloc_info+0x40/0x58 [ 28.287071] __kasan_kmalloc+0xd4/0xd8 [ 28.287213] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.287333] kasan_atomics+0xb8/0x2e0 [ 28.287493] kunit_try_run_case+0x170/0x3f0 [ 28.287883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.288026] kthread+0x328/0x630 [ 28.288356] ret_from_fork+0x10/0x20 [ 28.288489] [ 28.288538] The buggy address belongs to the object at fff00000c5a80800 [ 28.288538] which belongs to the cache kmalloc-64 of size 64 [ 28.288735] The buggy address is located 0 bytes to the right of [ 28.288735] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.289159] [ 28.289216] The buggy address belongs to the physical page: [ 28.289291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.289762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.289895] page_type: f5(slab) [ 28.290299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.290855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.291012] page dumped because: kasan: bad access detected [ 28.291124] [ 28.291331] Memory state around the buggy address: [ 28.291436] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.291599] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.291721] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.291950] ^ [ 28.292041] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.292161] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.292671] ================================================================== [ 28.412045] ================================================================== [ 28.412468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 28.412583] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.412752] [ 28.412821] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.413148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.413519] Hardware name: linux,dummy-virt (DT) [ 28.413744] Call trace: [ 28.413871] show_stack+0x20/0x38 (C) [ 28.414064] dump_stack_lvl+0x8c/0xd0 [ 28.414441] print_report+0x118/0x608 [ 28.414641] kasan_report+0xdc/0x128 [ 28.414898] kasan_check_range+0x100/0x1a8 [ 28.415092] __kasan_check_write+0x20/0x30 [ 28.415248] kasan_atomics_helper+0x1190/0x4858 [ 28.415459] kasan_atomics+0x198/0x2e0 [ 28.415606] kunit_try_run_case+0x170/0x3f0 [ 28.415762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.416735] kthread+0x328/0x630 [ 28.416960] ret_from_fork+0x10/0x20 [ 28.417083] [ 28.417145] Allocated by task 267: [ 28.417367] kasan_save_stack+0x3c/0x68 [ 28.417505] kasan_save_track+0x20/0x40 [ 28.417646] kasan_save_alloc_info+0x40/0x58 [ 28.417789] __kasan_kmalloc+0xd4/0xd8 [ 28.417963] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.418069] kasan_atomics+0xb8/0x2e0 [ 28.418236] kunit_try_run_case+0x170/0x3f0 [ 28.418343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.418513] kthread+0x328/0x630 [ 28.418749] ret_from_fork+0x10/0x20 [ 28.418855] [ 28.418992] The buggy address belongs to the object at fff00000c5a80800 [ 28.418992] which belongs to the cache kmalloc-64 of size 64 [ 28.419137] The buggy address is located 0 bytes to the right of [ 28.419137] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.419308] [ 28.419429] The buggy address belongs to the physical page: [ 28.419522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.419671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.419882] page_type: f5(slab) [ 28.419976] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.420653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.421235] page dumped because: kasan: bad access detected [ 28.421435] [ 28.421709] Memory state around the buggy address: [ 28.421829] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.421968] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.422097] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.422212] ^ [ 28.422309] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.422434] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.422947] ================================================================== [ 28.654639] ================================================================== [ 28.654811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 28.654925] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.655049] [ 28.655113] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.655311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.655394] Hardware name: linux,dummy-virt (DT) [ 28.655478] Call trace: [ 28.655531] show_stack+0x20/0x38 (C) [ 28.655653] dump_stack_lvl+0x8c/0xd0 [ 28.655773] print_report+0x118/0x608 [ 28.655893] kasan_report+0xdc/0x128 [ 28.656012] __asan_report_load8_noabort+0x20/0x30 [ 28.656231] kasan_atomics_helper+0x3e20/0x4858 [ 28.656494] kasan_atomics+0x198/0x2e0 [ 28.656669] kunit_try_run_case+0x170/0x3f0 [ 28.656823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.656979] kthread+0x328/0x630 [ 28.657169] ret_from_fork+0x10/0x20 [ 28.657306] [ 28.657358] Allocated by task 267: [ 28.657453] kasan_save_stack+0x3c/0x68 [ 28.657554] kasan_save_track+0x20/0x40 [ 28.657673] kasan_save_alloc_info+0x40/0x58 [ 28.657897] __kasan_kmalloc+0xd4/0xd8 [ 28.658023] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.658191] kasan_atomics+0xb8/0x2e0 [ 28.658403] kunit_try_run_case+0x170/0x3f0 [ 28.658608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.658857] kthread+0x328/0x630 [ 28.659034] ret_from_fork+0x10/0x20 [ 28.659191] [ 28.659496] The buggy address belongs to the object at fff00000c5a80800 [ 28.659496] which belongs to the cache kmalloc-64 of size 64 [ 28.659708] The buggy address is located 0 bytes to the right of [ 28.659708] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.659882] [ 28.659999] The buggy address belongs to the physical page: [ 28.660200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.660900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.661100] page_type: f5(slab) [ 28.661201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.662176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.662412] page dumped because: kasan: bad access detected [ 28.663315] [ 28.663418] Memory state around the buggy address: [ 28.663500] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.663691] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.663904] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.664061] ^ [ 28.664714] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.665300] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.665457] ================================================================== [ 28.400398] ================================================================== [ 28.400539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 28.400676] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.400807] [ 28.400877] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.401084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.401926] Hardware name: linux,dummy-virt (DT) [ 28.402027] Call trace: [ 28.402087] show_stack+0x20/0x38 (C) [ 28.402217] dump_stack_lvl+0x8c/0xd0 [ 28.402401] print_report+0x118/0x608 [ 28.402698] kasan_report+0xdc/0x128 [ 28.402826] kasan_check_range+0x100/0x1a8 [ 28.403448] __kasan_check_write+0x20/0x30 [ 28.403723] kasan_atomics_helper+0x1128/0x4858 [ 28.403891] kasan_atomics+0x198/0x2e0 [ 28.404022] kunit_try_run_case+0x170/0x3f0 [ 28.404626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.404826] kthread+0x328/0x630 [ 28.404986] ret_from_fork+0x10/0x20 [ 28.405109] [ 28.405173] Allocated by task 267: [ 28.405406] kasan_save_stack+0x3c/0x68 [ 28.405520] kasan_save_track+0x20/0x40 [ 28.405625] kasan_save_alloc_info+0x40/0x58 [ 28.405795] __kasan_kmalloc+0xd4/0xd8 [ 28.405928] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.406488] kasan_atomics+0xb8/0x2e0 [ 28.406715] kunit_try_run_case+0x170/0x3f0 [ 28.406859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.407210] kthread+0x328/0x630 [ 28.407368] ret_from_fork+0x10/0x20 [ 28.407486] [ 28.407537] The buggy address belongs to the object at fff00000c5a80800 [ 28.407537] which belongs to the cache kmalloc-64 of size 64 [ 28.407677] The buggy address is located 0 bytes to the right of [ 28.407677] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.407839] [ 28.407952] The buggy address belongs to the physical page: [ 28.408189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.408317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.408483] page_type: f5(slab) [ 28.409218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.409752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.409925] page dumped because: kasan: bad access detected [ 28.410105] [ 28.410163] Memory state around the buggy address: [ 28.410268] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.410405] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.410571] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.410681] ^ [ 28.411089] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.411221] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.411358] ================================================================== [ 27.993091] ================================================================== [ 27.994248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 27.995661] Call trace: [ 28.000332] kthread+0x328/0x630 [ 28.002599] kunit_try_run_case+0x170/0x3f0 [ 28.002915] kthread+0x328/0x630 [ 28.003648] [ 28.003720] The buggy address belongs to the physical page: [ 28.003807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.003955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.004098] page_type: f5(slab) [ 28.004242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.004414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.004545] page dumped because: kasan: bad access detected [ 28.004646] [ 28.004760] Memory state around the buggy address: [ 28.004898] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.005161] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.005349] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.005625] ^ [ 28.005727] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.005856] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.005984] ================================================================== [ 28.466557] ================================================================== [ 28.466642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 28.466740] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.466884] [ 28.467106] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.467501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.467892] Hardware name: linux,dummy-virt (DT) [ 28.468204] Call trace: [ 28.468317] show_stack+0x20/0x38 (C) [ 28.468512] dump_stack_lvl+0x8c/0xd0 [ 28.468884] print_report+0x118/0x608 [ 28.469044] kasan_report+0xdc/0x128 [ 28.469174] kasan_check_range+0x100/0x1a8 [ 28.469337] __kasan_check_write+0x20/0x30 [ 28.469638] kasan_atomics_helper+0x1384/0x4858 [ 28.469814] kasan_atomics+0x198/0x2e0 [ 28.469938] kunit_try_run_case+0x170/0x3f0 [ 28.470063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.470212] kthread+0x328/0x630 [ 28.470462] ret_from_fork+0x10/0x20 [ 28.470612] [ 28.470678] Allocated by task 267: [ 28.470809] kasan_save_stack+0x3c/0x68 [ 28.470933] kasan_save_track+0x20/0x40 [ 28.471041] kasan_save_alloc_info+0x40/0x58 [ 28.471355] __kasan_kmalloc+0xd4/0xd8 [ 28.471481] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.471649] kasan_atomics+0xb8/0x2e0 [ 28.471750] kunit_try_run_case+0x170/0x3f0 [ 28.471865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.472017] kthread+0x328/0x630 [ 28.472193] ret_from_fork+0x10/0x20 [ 28.472300] [ 28.472357] The buggy address belongs to the object at fff00000c5a80800 [ 28.472357] which belongs to the cache kmalloc-64 of size 64 [ 28.472552] The buggy address is located 0 bytes to the right of [ 28.472552] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.472816] [ 28.472879] The buggy address belongs to the physical page: [ 28.472989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.473331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.473507] page_type: f5(slab) [ 28.473612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.473798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.473943] page dumped because: kasan: bad access detected [ 28.474068] [ 28.474126] Memory state around the buggy address: [ 28.474205] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.474328] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.474512] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.474747] ^ [ 28.474953] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.475443] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.475551] ================================================================== [ 28.543622] ================================================================== [ 28.543776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 28.543889] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.544161] [ 28.544290] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.544647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.545010] Hardware name: linux,dummy-virt (DT) [ 28.545133] Call trace: [ 28.545201] show_stack+0x20/0x38 (C) [ 28.545436] dump_stack_lvl+0x8c/0xd0 [ 28.545760] print_report+0x118/0x608 [ 28.545893] kasan_report+0xdc/0x128 [ 28.546059] kasan_check_range+0x100/0x1a8 [ 28.546331] __kasan_check_write+0x20/0x30 [ 28.546732] kasan_atomics_helper+0x154c/0x4858 [ 28.546866] kasan_atomics+0x198/0x2e0 [ 28.547056] kunit_try_run_case+0x170/0x3f0 [ 28.547194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.547485] kthread+0x328/0x630 [ 28.547630] ret_from_fork+0x10/0x20 [ 28.548173] [ 28.548274] Allocated by task 267: [ 28.548358] kasan_save_stack+0x3c/0x68 [ 28.548524] kasan_save_track+0x20/0x40 [ 28.548723] kasan_save_alloc_info+0x40/0x58 [ 28.548928] __kasan_kmalloc+0xd4/0xd8 [ 28.549031] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.549178] kasan_atomics+0xb8/0x2e0 [ 28.549457] kunit_try_run_case+0x170/0x3f0 [ 28.549571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.549915] kthread+0x328/0x630 [ 28.550049] ret_from_fork+0x10/0x20 [ 28.550148] [ 28.550208] The buggy address belongs to the object at fff00000c5a80800 [ 28.550208] which belongs to the cache kmalloc-64 of size 64 [ 28.550540] The buggy address is located 0 bytes to the right of [ 28.550540] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.551539] [ 28.551907] The buggy address belongs to the physical page: [ 28.552208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.552720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.553152] page_type: f5(slab) [ 28.553620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.553761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.553913] page dumped because: kasan: bad access detected [ 28.554000] [ 28.554050] Memory state around the buggy address: [ 28.554129] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.554511] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.555179] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.556120] ^ [ 28.556635] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.556774] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.557016] ================================================================== [ 28.528519] ================================================================== [ 28.529904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 28.530443] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.530972] [ 28.531512] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.532628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.532678] Hardware name: linux,dummy-virt (DT) [ 28.532756] Call trace: [ 28.532830] show_stack+0x20/0x38 (C) [ 28.532978] dump_stack_lvl+0x8c/0xd0 [ 28.533253] print_report+0x118/0x608 [ 28.533830] kasan_report+0xdc/0x128 [ 28.534316] kasan_check_range+0x100/0x1a8 [ 28.534622] __kasan_check_write+0x20/0x30 [ 28.534770] kasan_atomics_helper+0x14e4/0x4858 [ 28.535142] kasan_atomics+0x198/0x2e0 [ 28.535276] kunit_try_run_case+0x170/0x3f0 [ 28.535626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.535773] kthread+0x328/0x630 [ 28.535950] ret_from_fork+0x10/0x20 [ 28.536237] [ 28.536298] Allocated by task 267: [ 28.536406] kasan_save_stack+0x3c/0x68 [ 28.537063] kasan_save_track+0x20/0x40 [ 28.537602] kasan_save_alloc_info+0x40/0x58 [ 28.537982] __kasan_kmalloc+0xd4/0xd8 [ 28.538245] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.538374] kasan_atomics+0xb8/0x2e0 [ 28.538507] kunit_try_run_case+0x170/0x3f0 [ 28.538813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.539212] kthread+0x328/0x630 [ 28.539709] ret_from_fork+0x10/0x20 [ 28.540200] [ 28.540261] The buggy address belongs to the object at fff00000c5a80800 [ 28.540261] which belongs to the cache kmalloc-64 of size 64 [ 28.540492] The buggy address is located 0 bytes to the right of [ 28.540492] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.540842] [ 28.540895] The buggy address belongs to the physical page: [ 28.540999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.541149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.541313] page_type: f5(slab) [ 28.541528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.541921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.542059] page dumped because: kasan: bad access detected [ 28.542141] [ 28.542219] Memory state around the buggy address: [ 28.542304] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.542447] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.542581] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.542700] ^ [ 28.542799] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.542931] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.543073] ================================================================== [ 28.667452] ================================================================== [ 28.667632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 28.667744] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.668597] [ 28.668922] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.669135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.669208] Hardware name: linux,dummy-virt (DT) [ 28.669294] Call trace: [ 28.669601] show_stack+0x20/0x38 (C) [ 28.669864] dump_stack_lvl+0x8c/0xd0 [ 28.670108] print_report+0x118/0x608 [ 28.670534] kasan_report+0xdc/0x128 [ 28.671002] kasan_check_range+0x100/0x1a8 [ 28.671343] __kasan_check_write+0x20/0x30 [ 28.671491] kasan_atomics_helper+0x17ec/0x4858 [ 28.672071] kasan_atomics+0x198/0x2e0 [ 28.672592] kunit_try_run_case+0x170/0x3f0 [ 28.672756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.672896] kthread+0x328/0x630 [ 28.673011] ret_from_fork+0x10/0x20 [ 28.673133] [ 28.673185] Allocated by task 267: [ 28.673645] kasan_save_stack+0x3c/0x68 [ 28.674167] kasan_save_track+0x20/0x40 [ 28.674868] kasan_save_alloc_info+0x40/0x58 [ 28.675631] __kasan_kmalloc+0xd4/0xd8 [ 28.675798] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.676466] kasan_atomics+0xb8/0x2e0 [ 28.676683] kunit_try_run_case+0x170/0x3f0 [ 28.676783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.676896] kthread+0x328/0x630 [ 28.676993] ret_from_fork+0x10/0x20 [ 28.677089] [ 28.677139] The buggy address belongs to the object at fff00000c5a80800 [ 28.677139] which belongs to the cache kmalloc-64 of size 64 [ 28.677281] The buggy address is located 0 bytes to the right of [ 28.677281] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.679451] [ 28.679536] The buggy address belongs to the physical page: [ 28.679625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.679773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.679914] page_type: f5(slab) [ 28.680023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.680167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.681176] page dumped because: kasan: bad access detected [ 28.681351] [ 28.681565] Memory state around the buggy address: [ 28.682010] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.682129] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.682252] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.683683] ^ [ 28.684116] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.684253] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.684369] ================================================================== [ 28.311889] ================================================================== [ 28.311991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 28.312105] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.314590] [ 28.314669] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.314902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.314955] Hardware name: linux,dummy-virt (DT) [ 28.314995] Call trace: [ 28.315023] show_stack+0x20/0x38 (C) [ 28.315087] dump_stack_lvl+0x8c/0xd0 [ 28.315148] print_report+0x118/0x608 [ 28.315207] kasan_report+0xdc/0x128 [ 28.315263] kasan_check_range+0x100/0x1a8 [ 28.315326] __kasan_check_write+0x20/0x30 [ 28.315415] kasan_atomics_helper+0xeb8/0x4858 [ 28.315479] kasan_atomics+0x198/0x2e0 [ 28.315540] kunit_try_run_case+0x170/0x3f0 [ 28.315602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.315673] kthread+0x328/0x630 [ 28.315730] ret_from_fork+0x10/0x20 [ 28.315793] [ 28.315817] Allocated by task 267: [ 28.315851] kasan_save_stack+0x3c/0x68 [ 28.315904] kasan_save_track+0x20/0x40 [ 28.315949] kasan_save_alloc_info+0x40/0x58 [ 28.315996] __kasan_kmalloc+0xd4/0xd8 [ 28.316042] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.316122] kasan_atomics+0xb8/0x2e0 [ 28.316332] kunit_try_run_case+0x170/0x3f0 [ 28.316474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.316592] kthread+0x328/0x630 [ 28.316689] ret_from_fork+0x10/0x20 [ 28.316802] [ 28.316854] The buggy address belongs to the object at fff00000c5a80800 [ 28.316854] which belongs to the cache kmalloc-64 of size 64 [ 28.316993] The buggy address is located 0 bytes to the right of [ 28.316993] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.317167] [ 28.317244] The buggy address belongs to the physical page: [ 28.317339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.317488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.317619] page_type: f5(slab) [ 28.317733] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.317870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.317988] page dumped because: kasan: bad access detected [ 28.318073] [ 28.318121] Memory state around the buggy address: [ 28.318200] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.318311] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.319314] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.319444] ^ [ 28.319550] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.319685] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.319807] ================================================================== [ 28.337147] ================================================================== [ 28.337501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 28.337627] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.337750] [ 28.337842] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.338058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.338129] Hardware name: linux,dummy-virt (DT) [ 28.338211] Call trace: [ 28.338265] show_stack+0x20/0x38 (C) [ 28.338406] dump_stack_lvl+0x8c/0xd0 [ 28.338563] print_report+0x118/0x608 [ 28.338713] kasan_report+0xdc/0x128 [ 28.338887] kasan_check_range+0x100/0x1a8 [ 28.339022] __kasan_check_write+0x20/0x30 [ 28.339159] kasan_atomics_helper+0xf88/0x4858 [ 28.339290] kasan_atomics+0x198/0x2e0 [ 28.339448] kunit_try_run_case+0x170/0x3f0 [ 28.339692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.340201] kthread+0x328/0x630 [ 28.340479] ret_from_fork+0x10/0x20 [ 28.340630] [ 28.340845] Allocated by task 267: [ 28.341032] kasan_save_stack+0x3c/0x68 [ 28.341299] kasan_save_track+0x20/0x40 [ 28.341426] kasan_save_alloc_info+0x40/0x58 [ 28.341548] __kasan_kmalloc+0xd4/0xd8 [ 28.341643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.341745] kasan_atomics+0xb8/0x2e0 [ 28.344192] kunit_try_run_case+0x170/0x3f0 [ 28.344327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.344548] kthread+0x328/0x630 [ 28.344719] ret_from_fork+0x10/0x20 [ 28.344832] [ 28.344883] The buggy address belongs to the object at fff00000c5a80800 [ 28.344883] which belongs to the cache kmalloc-64 of size 64 [ 28.346397] The buggy address is located 0 bytes to the right of [ 28.346397] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.346690] [ 28.347582] The buggy address belongs to the physical page: [ 28.348315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.349131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.349294] page_type: f5(slab) [ 28.350890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.351501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.351617] page dumped because: kasan: bad access detected [ 28.351727] [ 28.351810] Memory state around the buggy address: [ 28.351894] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.352013] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.352127] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.352454] ^ [ 28.352634] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.352752] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.353025] ================================================================== [ 28.293466] ================================================================== [ 28.293566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 28.293685] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.293809] [ 28.293877] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.294072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.294151] Hardware name: linux,dummy-virt (DT) [ 28.294236] Call trace: [ 28.294295] show_stack+0x20/0x38 (C) [ 28.294439] dump_stack_lvl+0x8c/0xd0 [ 28.294566] print_report+0x118/0x608 [ 28.294680] kasan_report+0xdc/0x128 [ 28.294814] __asan_report_store8_noabort+0x20/0x30 [ 28.295301] kasan_atomics_helper+0x3e5c/0x4858 [ 28.296153] kasan_atomics+0x198/0x2e0 [ 28.296350] kunit_try_run_case+0x170/0x3f0 [ 28.296770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.296957] kthread+0x328/0x630 [ 28.297288] ret_from_fork+0x10/0x20 [ 28.297787] [ 28.297847] Allocated by task 267: [ 28.298060] kasan_save_stack+0x3c/0x68 [ 28.299039] kasan_save_track+0x20/0x40 [ 28.299418] kasan_save_alloc_info+0x40/0x58 [ 28.299667] __kasan_kmalloc+0xd4/0xd8 [ 28.299772] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.300314] kasan_atomics+0xb8/0x2e0 [ 28.300479] kunit_try_run_case+0x170/0x3f0 [ 28.300645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.300770] kthread+0x328/0x630 [ 28.300872] ret_from_fork+0x10/0x20 [ 28.301599] [ 28.301678] The buggy address belongs to the object at fff00000c5a80800 [ 28.301678] which belongs to the cache kmalloc-64 of size 64 [ 28.301828] The buggy address is located 0 bytes to the right of [ 28.301828] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.302261] [ 28.302480] The buggy address belongs to the physical page: [ 28.303084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.303227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.303445] page_type: f5(slab) [ 28.303641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.304219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.304338] page dumped because: kasan: bad access detected [ 28.304455] [ 28.305458] Memory state around the buggy address: [ 28.306052] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.306169] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.306282] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.306400] ^ [ 28.306489] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.306601] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.309237] ================================================================== [ 28.514710] ================================================================== [ 28.514812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 28.514929] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.515296] [ 28.515435] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.515670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.515758] Hardware name: linux,dummy-virt (DT) [ 28.515853] Call trace: [ 28.515922] show_stack+0x20/0x38 (C) [ 28.516069] dump_stack_lvl+0x8c/0xd0 [ 28.516263] print_report+0x118/0x608 [ 28.516520] kasan_report+0xdc/0x128 [ 28.516737] kasan_check_range+0x100/0x1a8 [ 28.517082] __kasan_check_write+0x20/0x30 [ 28.517304] kasan_atomics_helper+0x147c/0x4858 [ 28.517494] kasan_atomics+0x198/0x2e0 [ 28.517804] kunit_try_run_case+0x170/0x3f0 [ 28.517956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.518116] kthread+0x328/0x630 [ 28.518279] ret_from_fork+0x10/0x20 [ 28.518443] [ 28.518528] Allocated by task 267: [ 28.518761] kasan_save_stack+0x3c/0x68 [ 28.519687] kasan_save_track+0x20/0x40 [ 28.520026] kasan_save_alloc_info+0x40/0x58 [ 28.520232] __kasan_kmalloc+0xd4/0xd8 [ 28.520352] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.520567] kasan_atomics+0xb8/0x2e0 [ 28.520683] kunit_try_run_case+0x170/0x3f0 [ 28.520804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.521010] kthread+0x328/0x630 [ 28.521415] ret_from_fork+0x10/0x20 [ 28.521541] [ 28.521602] The buggy address belongs to the object at fff00000c5a80800 [ 28.521602] which belongs to the cache kmalloc-64 of size 64 [ 28.521790] The buggy address is located 0 bytes to the right of [ 28.521790] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.521964] [ 28.522017] The buggy address belongs to the physical page: [ 28.522094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.522218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.522352] page_type: f5(slab) [ 28.522468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.522605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.522714] page dumped because: kasan: bad access detected [ 28.522793] [ 28.523051] Memory state around the buggy address: [ 28.523151] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.523478] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.524078] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.526408] ^ [ 28.526584] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.526717] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.526833] ================================================================== [ 28.064456] ================================================================== [ 28.064595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 28.065292] Write of size 4 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.065571] [ 28.065651] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.065874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.065948] Hardware name: linux,dummy-virt (DT) [ 28.066030] Call trace: [ 28.066087] show_stack+0x20/0x38 (C) [ 28.066211] dump_stack_lvl+0x8c/0xd0 [ 28.067031] print_report+0x118/0x608 [ 28.067789] kasan_report+0xdc/0x128 [ 28.068056] kasan_check_range+0x100/0x1a8 [ 28.069515] __kasan_check_write+0x20/0x30 [ 28.069825] kasan_atomics_helper+0xa6c/0x4858 [ 28.070169] kasan_atomics+0x198/0x2e0 [ 28.070294] kunit_try_run_case+0x170/0x3f0 [ 28.070438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.070580] kthread+0x328/0x630 [ 28.071610] ret_from_fork+0x10/0x20 [ 28.071874] [ 28.072051] Allocated by task 267: [ 28.072733] kasan_save_stack+0x3c/0x68 [ 28.072873] kasan_save_track+0x20/0x40 [ 28.072972] kasan_save_alloc_info+0x40/0x58 [ 28.073078] __kasan_kmalloc+0xd4/0xd8 [ 28.073887] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.073976] kasan_atomics+0xb8/0x2e0 [ 28.074073] kunit_try_run_case+0x170/0x3f0 [ 28.074321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.074994] kthread+0x328/0x630 [ 28.075123] ret_from_fork+0x10/0x20 [ 28.075349] [ 28.075422] The buggy address belongs to the object at fff00000c5a80800 [ 28.075422] which belongs to the cache kmalloc-64 of size 64 [ 28.075574] The buggy address is located 0 bytes to the right of [ 28.075574] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.076005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.076203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.076906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.077040] page dumped because: kasan: bad access detected [ 28.077966] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.078080] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.078338] ^ [ 28.078711] ================================================================== [ 28.270765] ================================================================== [ 28.270861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 28.270973] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.271095] [ 28.271160] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.271357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.271450] Hardware name: linux,dummy-virt (DT) [ 28.272188] Call trace: [ 28.272278] show_stack+0x20/0x38 (C) [ 28.272443] dump_stack_lvl+0x8c/0xd0 [ 28.272684] print_report+0x118/0x608 [ 28.273022] kasan_report+0xdc/0x128 [ 28.273415] __asan_report_load8_noabort+0x20/0x30 [ 28.273715] kasan_atomics_helper+0x3f58/0x4858 [ 28.274067] kasan_atomics+0x198/0x2e0 [ 28.274193] kunit_try_run_case+0x170/0x3f0 [ 28.274317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.274478] kthread+0x328/0x630 [ 28.274596] ret_from_fork+0x10/0x20 [ 28.274758] [ 28.274867] Allocated by task 267: [ 28.274942] kasan_save_stack+0x3c/0x68 [ 28.275047] kasan_save_track+0x20/0x40 [ 28.275159] kasan_save_alloc_info+0x40/0x58 [ 28.275832] __kasan_kmalloc+0xd4/0xd8 [ 28.275960] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.276083] kasan_atomics+0xb8/0x2e0 [ 28.276763] kunit_try_run_case+0x170/0x3f0 [ 28.276973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.277301] kthread+0x328/0x630 [ 28.277436] ret_from_fork+0x10/0x20 [ 28.277831] [ 28.277945] The buggy address belongs to the object at fff00000c5a80800 [ 28.277945] which belongs to the cache kmalloc-64 of size 64 [ 28.278313] The buggy address is located 0 bytes to the right of [ 28.278313] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.278507] [ 28.278560] The buggy address belongs to the physical page: [ 28.278636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.278823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.278950] page_type: f5(slab) [ 28.279046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.279268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.279400] page dumped because: kasan: bad access detected [ 28.279512] [ 28.279660] Memory state around the buggy address: [ 28.279815] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.280072] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.280209] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.280330] ^ [ 28.280461] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.281398] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.281503] ================================================================== [ 28.604784] ================================================================== [ 28.604882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 28.604990] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.605113] [ 28.605182] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.605401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.605475] Hardware name: linux,dummy-virt (DT) [ 28.605556] Call trace: [ 28.605608] show_stack+0x20/0x38 (C) [ 28.605734] dump_stack_lvl+0x8c/0xd0 [ 28.605856] print_report+0x118/0x608 [ 28.605971] kasan_report+0xdc/0x128 [ 28.606096] __asan_report_load8_noabort+0x20/0x30 [ 28.606239] kasan_atomics_helper+0x3df4/0x4858 [ 28.606366] kasan_atomics+0x198/0x2e0 [ 28.606771] kunit_try_run_case+0x170/0x3f0 [ 28.607315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.607534] kthread+0x328/0x630 [ 28.607682] ret_from_fork+0x10/0x20 [ 28.607809] [ 28.608182] Allocated by task 267: [ 28.608318] kasan_save_stack+0x3c/0x68 [ 28.608463] kasan_save_track+0x20/0x40 [ 28.608581] kasan_save_alloc_info+0x40/0x58 [ 28.608695] __kasan_kmalloc+0xd4/0xd8 [ 28.608799] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.609038] kasan_atomics+0xb8/0x2e0 [ 28.609208] kunit_try_run_case+0x170/0x3f0 [ 28.609936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.610457] kthread+0x328/0x630 [ 28.610562] ret_from_fork+0x10/0x20 [ 28.610659] [ 28.611464] The buggy address belongs to the object at fff00000c5a80800 [ 28.611464] which belongs to the cache kmalloc-64 of size 64 [ 28.611635] The buggy address is located 0 bytes to the right of [ 28.611635] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.611824] [ 28.611887] The buggy address belongs to the physical page: [ 28.611973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.612823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.613603] page_type: f5(slab) [ 28.614037] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.614233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.614576] page dumped because: kasan: bad access detected [ 28.614766] [ 28.614873] Memory state around the buggy address: [ 28.614969] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.615147] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.615367] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.615500] ^ [ 28.615645] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.615777] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.616030] ================================================================== [ 28.353551] ================================================================== [ 28.353682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 28.354401] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.354725] [ 28.354942] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.355271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.355430] Hardware name: linux,dummy-virt (DT) [ 28.355527] Call trace: [ 28.355589] show_stack+0x20/0x38 (C) [ 28.355717] dump_stack_lvl+0x8c/0xd0 [ 28.355860] print_report+0x118/0x608 [ 28.355983] kasan_report+0xdc/0x128 [ 28.356121] kasan_check_range+0x100/0x1a8 [ 28.356278] __kasan_check_write+0x20/0x30 [ 28.356773] kasan_atomics_helper+0xff0/0x4858 [ 28.356908] kasan_atomics+0x198/0x2e0 [ 28.357250] kunit_try_run_case+0x170/0x3f0 [ 28.357534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.357955] kthread+0x328/0x630 [ 28.358160] ret_from_fork+0x10/0x20 [ 28.358351] [ 28.358443] Allocated by task 267: [ 28.358942] kasan_save_stack+0x3c/0x68 [ 28.359053] kasan_save_track+0x20/0x40 [ 28.359151] kasan_save_alloc_info+0x40/0x58 [ 28.359255] __kasan_kmalloc+0xd4/0xd8 [ 28.359350] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.359744] kasan_atomics+0xb8/0x2e0 [ 28.360063] kunit_try_run_case+0x170/0x3f0 [ 28.360235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.360633] kthread+0x328/0x630 [ 28.360751] ret_from_fork+0x10/0x20 [ 28.361071] [ 28.361136] The buggy address belongs to the object at fff00000c5a80800 [ 28.361136] which belongs to the cache kmalloc-64 of size 64 [ 28.361291] The buggy address is located 0 bytes to the right of [ 28.361291] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.361547] [ 28.361819] The buggy address belongs to the physical page: [ 28.362236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.362578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.363191] page_type: f5(slab) [ 28.363717] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.363860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.364986] page dumped because: kasan: bad access detected [ 28.365085] [ 28.365138] Memory state around the buggy address: [ 28.365225] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.365353] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.365492] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.365592] ^ [ 28.365678] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.365787] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.368985] ================================================================== [ 27.796762] ================================================================== [ 27.796883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 27.797005] Write of size 4 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 27.797133] [ 27.797420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.797494] Hardware name: linux,dummy-virt (DT) [ 27.797572] Call trace: [ 27.797718] show_stack+0x20/0x38 (C) [ 27.798358] __kasan_check_write+0x20/0x30 [ 27.798513] kasan_atomics_helper+0x32c/0x4858 [ 27.799482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.803354] kthread+0x328/0x630 [ 27.804240] [ 27.804598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 27.805855] page dumped because: kasan: bad access detected [ 27.807400] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.808556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 27.809339] Hardware name: linux,dummy-virt (DT) [ 27.810937] kunit_try_run_case+0x170/0x3f0 [ 27.813591] ret_from_fork+0x10/0x20 [ 27.815613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 27.818365] ================================================================== [ 28.501947] ================================================================== [ 28.502073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 28.502261] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.502676] [ 28.502762] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.503101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.503176] Hardware name: linux,dummy-virt (DT) [ 28.503256] Call trace: [ 28.503312] show_stack+0x20/0x38 (C) [ 28.503457] dump_stack_lvl+0x8c/0xd0 [ 28.503580] print_report+0x118/0x608 [ 28.503694] kasan_report+0xdc/0x128 [ 28.503810] kasan_check_range+0x100/0x1a8 [ 28.503927] __kasan_check_write+0x20/0x30 [ 28.504050] kasan_atomics_helper+0x1414/0x4858 [ 28.504186] kasan_atomics+0x198/0x2e0 [ 28.504305] kunit_try_run_case+0x170/0x3f0 [ 28.505235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.505437] kthread+0x328/0x630 [ 28.505916] ret_from_fork+0x10/0x20 [ 28.506369] [ 28.506486] Allocated by task 267: [ 28.506568] kasan_save_stack+0x3c/0x68 [ 28.506679] kasan_save_track+0x20/0x40 [ 28.506883] kasan_save_alloc_info+0x40/0x58 [ 28.507083] __kasan_kmalloc+0xd4/0xd8 [ 28.507193] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.507860] kasan_atomics+0xb8/0x2e0 [ 28.508423] kunit_try_run_case+0x170/0x3f0 [ 28.508603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.509224] kthread+0x328/0x630 [ 28.509434] ret_from_fork+0x10/0x20 [ 28.509551] [ 28.509605] The buggy address belongs to the object at fff00000c5a80800 [ 28.509605] which belongs to the cache kmalloc-64 of size 64 [ 28.510283] The buggy address is located 0 bytes to the right of [ 28.510283] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.510907] [ 28.511061] The buggy address belongs to the physical page: [ 28.511156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.511289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.511741] page_type: f5(slab) [ 28.511899] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.512191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.512424] page dumped because: kasan: bad access detected [ 28.513082] [ 28.513149] Memory state around the buggy address: [ 28.513239] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.513367] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.513506] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.513700] ^ [ 28.513788] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.513914] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.514205] ================================================================== [ 28.210741] ================================================================== [ 28.210851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 28.211145] Read of size 4 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.211342] [ 28.211464] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.211738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.211855] Hardware name: linux,dummy-virt (DT) [ 28.211935] Call trace: [ 28.211987] show_stack+0x20/0x38 (C) [ 28.212164] dump_stack_lvl+0x8c/0xd0 [ 28.212315] print_report+0x118/0x608 [ 28.212991] kasan_report+0xdc/0x128 [ 28.213225] __asan_report_load4_noabort+0x20/0x30 [ 28.213468] kasan_atomics_helper+0x3dd8/0x4858 [ 28.213623] kasan_atomics+0x198/0x2e0 [ 28.213945] kunit_try_run_case+0x170/0x3f0 [ 28.214197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.214352] kthread+0x328/0x630 [ 28.214711] ret_from_fork+0x10/0x20 [ 28.214878] [ 28.214999] Allocated by task 267: [ 28.215084] kasan_save_stack+0x3c/0x68 [ 28.215191] kasan_save_track+0x20/0x40 [ 28.215354] kasan_save_alloc_info+0x40/0x58 [ 28.215682] __kasan_kmalloc+0xd4/0xd8 [ 28.215908] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.216014] kasan_atomics+0xb8/0x2e0 [ 28.216162] kunit_try_run_case+0x170/0x3f0 [ 28.216292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.216756] kthread+0x328/0x630 [ 28.217066] ret_from_fork+0x10/0x20 [ 28.217264] [ 28.217363] The buggy address belongs to the object at fff00000c5a80800 [ 28.217363] which belongs to the cache kmalloc-64 of size 64 [ 28.217909] The buggy address is located 0 bytes to the right of [ 28.217909] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.218206] [ 28.218326] The buggy address belongs to the physical page: [ 28.218560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.218706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.218836] page_type: f5(slab) [ 28.218967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.219167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.219469] page dumped because: kasan: bad access detected [ 28.219568] [ 28.219643] Memory state around the buggy address: [ 28.219727] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.219844] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.220013] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.220205] ^ [ 28.220959] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.221275] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.222619] ================================================================== [ 28.383341] ================================================================== [ 28.383629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 28.383804] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.384068] [ 28.384253] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.384828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.385051] Hardware name: linux,dummy-virt (DT) [ 28.385136] Call trace: [ 28.385195] show_stack+0x20/0x38 (C) [ 28.385313] dump_stack_lvl+0x8c/0xd0 [ 28.385466] print_report+0x118/0x608 [ 28.385610] kasan_report+0xdc/0x128 [ 28.386316] kasan_check_range+0x100/0x1a8 [ 28.386478] __kasan_check_write+0x20/0x30 [ 28.386725] kasan_atomics_helper+0x10c0/0x4858 [ 28.386871] kasan_atomics+0x198/0x2e0 [ 28.387027] kunit_try_run_case+0x170/0x3f0 [ 28.387173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.387424] kthread+0x328/0x630 [ 28.387563] ret_from_fork+0x10/0x20 [ 28.388231] [ 28.388290] Allocated by task 267: [ 28.388481] kasan_save_stack+0x3c/0x68 [ 28.388592] kasan_save_track+0x20/0x40 [ 28.388732] kasan_save_alloc_info+0x40/0x58 [ 28.388839] __kasan_kmalloc+0xd4/0xd8 [ 28.389003] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.389681] kasan_atomics+0xb8/0x2e0 [ 28.389847] kunit_try_run_case+0x170/0x3f0 [ 28.390065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.390283] kthread+0x328/0x630 [ 28.390421] ret_from_fork+0x10/0x20 [ 28.390775] [ 28.390890] The buggy address belongs to the object at fff00000c5a80800 [ 28.390890] which belongs to the cache kmalloc-64 of size 64 [ 28.391040] The buggy address is located 0 bytes to the right of [ 28.391040] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.391783] [ 28.392247] The buggy address belongs to the physical page: [ 28.392573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.393085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.393262] page_type: f5(slab) [ 28.393356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.394409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.394558] page dumped because: kasan: bad access detected [ 28.394658] [ 28.395261] Memory state around the buggy address: [ 28.395393] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.396006] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.397292] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.397461] ^ [ 28.398105] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.398283] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.398565] ================================================================== [ 28.641929] ================================================================== [ 28.643875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 28.644007] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.644312] [ 28.644444] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.644849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.645185] Hardware name: linux,dummy-virt (DT) [ 28.645309] Call trace: [ 28.645633] show_stack+0x20/0x38 (C) [ 28.645976] dump_stack_lvl+0x8c/0xd0 [ 28.646105] print_report+0x118/0x608 [ 28.646259] kasan_report+0xdc/0x128 [ 28.646626] kasan_check_range+0x100/0x1a8 [ 28.646956] __kasan_check_write+0x20/0x30 [ 28.647088] kasan_atomics_helper+0x175c/0x4858 [ 28.647244] kasan_atomics+0x198/0x2e0 [ 28.647483] kunit_try_run_case+0x170/0x3f0 [ 28.647698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.647868] kthread+0x328/0x630 [ 28.648012] ret_from_fork+0x10/0x20 [ 28.648290] [ 28.648438] Allocated by task 267: [ 28.648535] kasan_save_stack+0x3c/0x68 [ 28.648694] kasan_save_track+0x20/0x40 [ 28.648813] kasan_save_alloc_info+0x40/0x58 [ 28.648981] __kasan_kmalloc+0xd4/0xd8 [ 28.649179] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.649392] kasan_atomics+0xb8/0x2e0 [ 28.649583] kunit_try_run_case+0x170/0x3f0 [ 28.649781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.649975] kthread+0x328/0x630 [ 28.650162] ret_from_fork+0x10/0x20 [ 28.650287] [ 28.650441] The buggy address belongs to the object at fff00000c5a80800 [ 28.650441] which belongs to the cache kmalloc-64 of size 64 [ 28.650643] The buggy address is located 0 bytes to the right of [ 28.650643] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.650863] [ 28.650935] The buggy address belongs to the physical page: [ 28.651026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.651159] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.651334] page_type: f5(slab) [ 28.651558] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.651773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.651895] page dumped because: kasan: bad access detected [ 28.652139] [ 28.652195] Memory state around the buggy address: [ 28.652275] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.652410] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.652538] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.652642] ^ [ 28.652731] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.653528] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.653647] ================================================================== [ 28.239506] ================================================================== [ 28.239607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 28.239756] Read of size 4 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.239933] [ 28.240070] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.240585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.240667] Hardware name: linux,dummy-virt (DT) [ 28.240757] Call trace: [ 28.240931] show_stack+0x20/0x38 (C) [ 28.241521] dump_stack_lvl+0x8c/0xd0 [ 28.241838] print_report+0x118/0x608 [ 28.241976] kasan_report+0xdc/0x128 [ 28.242143] __asan_report_load4_noabort+0x20/0x30 [ 28.242445] kasan_atomics_helper+0x3e04/0x4858 [ 28.242809] kasan_atomics+0x198/0x2e0 [ 28.242938] kunit_try_run_case+0x170/0x3f0 [ 28.243091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.243289] kthread+0x328/0x630 [ 28.243435] ret_from_fork+0x10/0x20 [ 28.243653] [ 28.244047] Allocated by task 267: [ 28.244355] kasan_save_stack+0x3c/0x68 [ 28.244589] kasan_save_track+0x20/0x40 [ 28.244702] kasan_save_alloc_info+0x40/0x58 [ 28.245120] __kasan_kmalloc+0xd4/0xd8 [ 28.245326] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.246008] kasan_atomics+0xb8/0x2e0 [ 28.246196] kunit_try_run_case+0x170/0x3f0 [ 28.246352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.246496] kthread+0x328/0x630 [ 28.246592] ret_from_fork+0x10/0x20 [ 28.246925] [ 28.246999] The buggy address belongs to the object at fff00000c5a80800 [ 28.246999] which belongs to the cache kmalloc-64 of size 64 [ 28.247210] The buggy address is located 0 bytes to the right of [ 28.247210] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.247371] [ 28.247444] The buggy address belongs to the physical page: [ 28.247517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.247672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.247794] page_type: f5(slab) [ 28.247891] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.248028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.248419] page dumped because: kasan: bad access detected [ 28.248545] [ 28.248604] Memory state around the buggy address: [ 28.248804] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.249309] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.249511] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.249755] ^ [ 28.249872] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.249998] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.250525] ================================================================== [ 28.616699] ================================================================== [ 28.616853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 28.616986] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.617460] [ 28.617549] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.617907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.618117] Hardware name: linux,dummy-virt (DT) [ 28.618262] Call trace: [ 28.618324] show_stack+0x20/0x38 (C) [ 28.618464] dump_stack_lvl+0x8c/0xd0 [ 28.618590] print_report+0x118/0x608 [ 28.618707] kasan_report+0xdc/0x128 [ 28.618818] kasan_check_range+0x100/0x1a8 [ 28.618939] __kasan_check_write+0x20/0x30 [ 28.619057] kasan_atomics_helper+0x16d0/0x4858 [ 28.619193] kasan_atomics+0x198/0x2e0 [ 28.619313] kunit_try_run_case+0x170/0x3f0 [ 28.619464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.619615] kthread+0x328/0x630 [ 28.619730] ret_from_fork+0x10/0x20 [ 28.619851] [ 28.619901] Allocated by task 267: [ 28.619972] kasan_save_stack+0x3c/0x68 [ 28.620093] kasan_save_track+0x20/0x40 [ 28.620217] kasan_save_alloc_info+0x40/0x58 [ 28.620419] __kasan_kmalloc+0xd4/0xd8 [ 28.620600] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.620721] kasan_atomics+0xb8/0x2e0 [ 28.620838] kunit_try_run_case+0x170/0x3f0 [ 28.620958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.621140] kthread+0x328/0x630 [ 28.621290] ret_from_fork+0x10/0x20 [ 28.621402] [ 28.621462] The buggy address belongs to the object at fff00000c5a80800 [ 28.621462] which belongs to the cache kmalloc-64 of size 64 [ 28.623106] The buggy address is located 0 bytes to the right of [ 28.623106] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.624615] [ 28.624682] The buggy address belongs to the physical page: [ 28.624768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.625447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.625619] page_type: f5(slab) [ 28.625744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.625886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.626006] page dumped because: kasan: bad access detected [ 28.626609] [ 28.626680] Memory state around the buggy address: [ 28.626872] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.627011] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.627187] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.627483] ^ [ 28.627577] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.627689] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.627790] ================================================================== [ 28.036813] ================================================================== [ 28.036955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 28.037106] Write of size 4 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.037253] [ 28.037322] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.037599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.037688] Hardware name: linux,dummy-virt (DT) [ 28.037921] Call trace: [ 28.037985] show_stack+0x20/0x38 (C) [ 28.038115] dump_stack_lvl+0x8c/0xd0 [ 28.038340] print_report+0x118/0x608 [ 28.038539] kasan_report+0xdc/0x128 [ 28.038794] kasan_check_range+0x100/0x1a8 [ 28.039143] __kasan_check_write+0x20/0x30 [ 28.039451] kasan_atomics_helper+0x99c/0x4858 [ 28.039604] kasan_atomics+0x198/0x2e0 [ 28.039720] kunit_try_run_case+0x170/0x3f0 [ 28.039861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.040212] kthread+0x328/0x630 [ 28.040823] ret_from_fork+0x10/0x20 [ 28.041004] [ 28.041067] Allocated by task 267: [ 28.041472] kasan_save_stack+0x3c/0x68 [ 28.041611] kasan_save_track+0x20/0x40 [ 28.041782] kasan_save_alloc_info+0x40/0x58 [ 28.041889] __kasan_kmalloc+0xd4/0xd8 [ 28.041989] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.042124] kasan_atomics+0xb8/0x2e0 [ 28.042424] kunit_try_run_case+0x170/0x3f0 [ 28.043139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.043453] kthread+0x328/0x630 [ 28.043612] ret_from_fork+0x10/0x20 [ 28.043835] [ 28.043892] The buggy address belongs to the object at fff00000c5a80800 [ 28.043892] which belongs to the cache kmalloc-64 of size 64 [ 28.044182] The buggy address is located 0 bytes to the right of [ 28.044182] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.044474] [ 28.044555] The buggy address belongs to the physical page: [ 28.044673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.045404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.046926] ================================================================== [ 28.558038] ================================================================== [ 28.558142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 28.558441] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.558805] [ 28.558991] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.559461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.559550] Hardware name: linux,dummy-virt (DT) [ 28.559646] Call trace: [ 28.560017] show_stack+0x20/0x38 (C) [ 28.560169] dump_stack_lvl+0x8c/0xd0 [ 28.560669] print_report+0x118/0x608 [ 28.560793] kasan_report+0xdc/0x128 [ 28.561306] kasan_check_range+0x100/0x1a8 [ 28.561814] __kasan_check_write+0x20/0x30 [ 28.562722] kasan_atomics_helper+0x15b4/0x4858 [ 28.562873] kasan_atomics+0x198/0x2e0 [ 28.563070] kunit_try_run_case+0x170/0x3f0 [ 28.563202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.563481] kthread+0x328/0x630 [ 28.563626] ret_from_fork+0x10/0x20 [ 28.564039] [ 28.564238] Allocated by task 267: [ 28.564699] kasan_save_stack+0x3c/0x68 [ 28.564951] kasan_save_track+0x20/0x40 [ 28.565091] kasan_save_alloc_info+0x40/0x58 [ 28.565196] __kasan_kmalloc+0xd4/0xd8 [ 28.565568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.565693] kasan_atomics+0xb8/0x2e0 [ 28.565844] kunit_try_run_case+0x170/0x3f0 [ 28.565986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.566106] kthread+0x328/0x630 [ 28.566629] ret_from_fork+0x10/0x20 [ 28.566833] [ 28.566884] The buggy address belongs to the object at fff00000c5a80800 [ 28.566884] which belongs to the cache kmalloc-64 of size 64 [ 28.567704] The buggy address is located 0 bytes to the right of [ 28.567704] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.567891] [ 28.567948] The buggy address belongs to the physical page: [ 28.568782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.568983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.569188] page_type: f5(slab) [ 28.569688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.569830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.569938] page dumped because: kasan: bad access detected [ 28.570021] [ 28.570074] Memory state around the buggy address: [ 28.570152] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.571267] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.571555] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.571683] ^ [ 28.571771] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.571885] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.572148] ================================================================== [ 28.588891] ================================================================== [ 28.588995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 28.589104] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.589227] [ 28.589306] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.589882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.590088] Hardware name: linux,dummy-virt (DT) [ 28.590174] Call trace: [ 28.590230] show_stack+0x20/0x38 (C) [ 28.590650] dump_stack_lvl+0x8c/0xd0 [ 28.590801] print_report+0x118/0x608 [ 28.590924] kasan_report+0xdc/0x128 [ 28.591457] kasan_check_range+0x100/0x1a8 [ 28.592103] __kasan_check_write+0x20/0x30 [ 28.592309] kasan_atomics_helper+0x1644/0x4858 [ 28.592476] kasan_atomics+0x198/0x2e0 [ 28.592674] kunit_try_run_case+0x170/0x3f0 [ 28.592809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.593153] kthread+0x328/0x630 [ 28.593308] ret_from_fork+0x10/0x20 [ 28.594139] [ 28.594205] Allocated by task 267: [ 28.594308] kasan_save_stack+0x3c/0x68 [ 28.594966] kasan_save_track+0x20/0x40 [ 28.595234] kasan_save_alloc_info+0x40/0x58 [ 28.595483] __kasan_kmalloc+0xd4/0xd8 [ 28.595587] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.595930] kasan_atomics+0xb8/0x2e0 [ 28.596925] kunit_try_run_case+0x170/0x3f0 [ 28.597245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.597401] kthread+0x328/0x630 [ 28.597906] ret_from_fork+0x10/0x20 [ 28.598068] [ 28.598162] The buggy address belongs to the object at fff00000c5a80800 [ 28.598162] which belongs to the cache kmalloc-64 of size 64 [ 28.598308] The buggy address is located 0 bytes to the right of [ 28.598308] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.598487] [ 28.598729] The buggy address belongs to the physical page: [ 28.599217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.599441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.599649] page_type: f5(slab) [ 28.599786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.600244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.600471] page dumped because: kasan: bad access detected [ 28.601291] [ 28.601465] Memory state around the buggy address: [ 28.601583] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.602359] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.602757] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.603348] ^ [ 28.603501] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.604171] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.604270] ================================================================== [ 28.572512] ================================================================== [ 28.572620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 28.572747] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.572898] [ 28.573008] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.573233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.573861] Hardware name: linux,dummy-virt (DT) [ 28.574748] Call trace: [ 28.574818] show_stack+0x20/0x38 (C) [ 28.575573] dump_stack_lvl+0x8c/0xd0 [ 28.575705] print_report+0x118/0x608 [ 28.575826] kasan_report+0xdc/0x128 [ 28.575941] __asan_report_load8_noabort+0x20/0x30 [ 28.576070] kasan_atomics_helper+0x3db0/0x4858 [ 28.576210] kasan_atomics+0x198/0x2e0 [ 28.576330] kunit_try_run_case+0x170/0x3f0 [ 28.576488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.576632] kthread+0x328/0x630 [ 28.576747] ret_from_fork+0x10/0x20 [ 28.576866] [ 28.576916] Allocated by task 267: [ 28.576984] kasan_save_stack+0x3c/0x68 [ 28.580121] kasan_save_track+0x20/0x40 [ 28.580250] kasan_save_alloc_info+0x40/0x58 [ 28.580427] __kasan_kmalloc+0xd4/0xd8 [ 28.580552] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.580674] kasan_atomics+0xb8/0x2e0 [ 28.580784] kunit_try_run_case+0x170/0x3f0 [ 28.580945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.581330] kthread+0x328/0x630 [ 28.581446] ret_from_fork+0x10/0x20 [ 28.582128] [ 28.583014] The buggy address belongs to the object at fff00000c5a80800 [ 28.583014] which belongs to the cache kmalloc-64 of size 64 [ 28.583433] The buggy address is located 0 bytes to the right of [ 28.583433] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.584808] [ 28.584900] The buggy address belongs to the physical page: [ 28.584982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.585289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.585430] page_type: f5(slab) [ 28.585529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.585673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.585907] page dumped because: kasan: bad access detected [ 28.585990] [ 28.586066] Memory state around the buggy address: [ 28.586252] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.586481] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.586618] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.586741] ^ [ 28.587361] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.587944] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.588058] ================================================================== [ 28.370357] ================================================================== [ 28.371643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 28.372138] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.372504] [ 28.376200] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.376459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.376542] Hardware name: linux,dummy-virt (DT) [ 28.376617] Call trace: [ 28.376647] show_stack+0x20/0x38 (C) [ 28.376711] dump_stack_lvl+0x8c/0xd0 [ 28.376773] print_report+0x118/0x608 [ 28.376832] kasan_report+0xdc/0x128 [ 28.376892] kasan_check_range+0x100/0x1a8 [ 28.376953] __kasan_check_write+0x20/0x30 [ 28.377012] kasan_atomics_helper+0x1058/0x4858 [ 28.377072] kasan_atomics+0x198/0x2e0 [ 28.377127] kunit_try_run_case+0x170/0x3f0 [ 28.377192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.377263] kthread+0x328/0x630 [ 28.377319] ret_from_fork+0x10/0x20 [ 28.377404] [ 28.377432] Allocated by task 267: [ 28.377467] kasan_save_stack+0x3c/0x68 [ 28.377522] kasan_save_track+0x20/0x40 [ 28.377569] kasan_save_alloc_info+0x40/0x58 [ 28.377620] __kasan_kmalloc+0xd4/0xd8 [ 28.377663] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.377713] kasan_atomics+0xb8/0x2e0 [ 28.377756] kunit_try_run_case+0x170/0x3f0 [ 28.377810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.377871] kthread+0x328/0x630 [ 28.377920] ret_from_fork+0x10/0x20 [ 28.377969] [ 28.377995] The buggy address belongs to the object at fff00000c5a80800 [ 28.377995] which belongs to the cache kmalloc-64 of size 64 [ 28.378067] The buggy address is located 0 bytes to the right of [ 28.378067] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.378146] [ 28.378171] The buggy address belongs to the physical page: [ 28.378209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.378271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.378331] page_type: f5(slab) [ 28.378422] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.378657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.379183] page dumped because: kasan: bad access detected [ 28.379294] [ 28.379346] Memory state around the buggy address: [ 28.379436] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.379931] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.380051] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.380158] ^ [ 28.380242] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.380355] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.382004] ================================================================== [ 28.007217] ================================================================== [ 28.007407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 28.013522] kthread+0x328/0x630 [ 28.014651] [ 28.015453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.022334] show_stack+0x20/0x38 (C) [ 28.024375] dump_stack_lvl+0x8c/0xd0 [ 28.024582] print_report+0x118/0x608 [ 28.025598] kasan_report+0xdc/0x128 [ 28.025770] kasan_check_range+0x100/0x1a8 [ 28.025909] __kasan_check_write+0x20/0x30 [ 28.026088] kasan_atomics_helper+0x934/0x4858 [ 28.026179] kasan_atomics+0x198/0x2e0 [ 28.026310] kunit_try_run_case+0x170/0x3f0 [ 28.026469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.026609] kthread+0x328/0x630 [ 28.026740] ret_from_fork+0x10/0x20 [ 28.026884] [ 28.026937] Allocated by task 267: [ 28.027010] kasan_save_stack+0x3c/0x68 [ 28.027158] kasan_save_track+0x20/0x40 [ 28.027400] kasan_save_alloc_info+0x40/0x58 [ 28.028525] __kasan_kmalloc+0xd4/0xd8 [ 28.028632] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.029584] kasan_atomics+0xb8/0x2e0 [ 28.029890] kunit_try_run_case+0x170/0x3f0 [ 28.031013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.032190] kthread+0x328/0x630 [ 28.032481] ret_from_fork+0x10/0x20 [ 28.032598] [ 28.032666] The buggy address belongs to the object at fff00000c5a80800 [ 28.032666] which belongs to the cache kmalloc-64 of size 64 [ 28.033459] The buggy address is located 0 bytes to the right of [ 28.033459] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.033651] [ 28.033720] The buggy address belongs to the physical page: [ 28.033794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.033933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.034061] page_type: f5(slab) [ 28.034169] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.034321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.034483] page dumped because: kasan: bad access detected [ 28.034578] [ 28.034634] Memory state around the buggy address: [ 28.034714] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.034833] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.034951] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.035065] ^ [ 28.035155] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.035270] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.035373] ================================================================== [ 28.320590] ================================================================== [ 28.320691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 28.320795] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.320925] [ 28.321002] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.321221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.321454] Hardware name: linux,dummy-virt (DT) [ 28.323935] Call trace: [ 28.324500] show_stack+0x20/0x38 (C) [ 28.325021] dump_stack_lvl+0x8c/0xd0 [ 28.325347] print_report+0x118/0x608 [ 28.325771] kasan_report+0xdc/0x128 [ 28.325997] kasan_check_range+0x100/0x1a8 [ 28.326135] __kasan_check_write+0x20/0x30 [ 28.326344] kasan_atomics_helper+0xf20/0x4858 [ 28.326977] kasan_atomics+0x198/0x2e0 [ 28.327374] kunit_try_run_case+0x170/0x3f0 [ 28.328058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.328288] kthread+0x328/0x630 [ 28.328428] ret_from_fork+0x10/0x20 [ 28.328559] [ 28.328610] Allocated by task 267: [ 28.328712] kasan_save_stack+0x3c/0x68 [ 28.328989] kasan_save_track+0x20/0x40 [ 28.329101] kasan_save_alloc_info+0x40/0x58 [ 28.329445] __kasan_kmalloc+0xd4/0xd8 [ 28.329595] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.329704] kasan_atomics+0xb8/0x2e0 [ 28.331475] kunit_try_run_case+0x170/0x3f0 [ 28.331611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.331751] kthread+0x328/0x630 [ 28.331868] ret_from_fork+0x10/0x20 [ 28.331982] [ 28.332045] The buggy address belongs to the object at fff00000c5a80800 [ 28.332045] which belongs to the cache kmalloc-64 of size 64 [ 28.332222] The buggy address is located 0 bytes to the right of [ 28.332222] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.332405] [ 28.332473] The buggy address belongs to the physical page: [ 28.332578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.332766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.333071] page_type: f5(slab) [ 28.333234] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.333457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.333848] page dumped because: kasan: bad access detected [ 28.334159] [ 28.334216] Memory state around the buggy address: [ 28.334312] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.334628] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.334770] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.335012] ^ [ 28.335347] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.335495] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.335608] ================================================================== [ 28.628460] ================================================================== [ 28.628965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 28.629082] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267 [ 28.629209] [ 28.629309] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT [ 28.629586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.629849] Hardware name: linux,dummy-virt (DT) [ 28.629959] Call trace: [ 28.630019] show_stack+0x20/0x38 (C) [ 28.630141] dump_stack_lvl+0x8c/0xd0 [ 28.630266] print_report+0x118/0x608 [ 28.630402] kasan_report+0xdc/0x128 [ 28.631486] __asan_report_load8_noabort+0x20/0x30 [ 28.631675] kasan_atomics_helper+0x3e10/0x4858 [ 28.631777] kasan_atomics+0x198/0x2e0 [ 28.631840] kunit_try_run_case+0x170/0x3f0 [ 28.631903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.631975] kthread+0x328/0x630 [ 28.632034] ret_from_fork+0x10/0x20 [ 28.632106] [ 28.633237] Allocated by task 267: [ 28.633321] kasan_save_stack+0x3c/0x68 [ 28.633457] kasan_save_track+0x20/0x40 [ 28.633567] kasan_save_alloc_info+0x40/0x58 [ 28.633676] __kasan_kmalloc+0xd4/0xd8 [ 28.633804] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.633867] kasan_atomics+0xb8/0x2e0 [ 28.633944] kunit_try_run_case+0x170/0x3f0 [ 28.634117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.634272] kthread+0x328/0x630 [ 28.634590] ret_from_fork+0x10/0x20 [ 28.634760] [ 28.634819] The buggy address belongs to the object at fff00000c5a80800 [ 28.634819] which belongs to the cache kmalloc-64 of size 64 [ 28.635225] The buggy address is located 0 bytes to the right of [ 28.635225] allocated 48-byte region [fff00000c5a80800, fff00000c5a80830) [ 28.635899] [ 28.635978] The buggy address belongs to the physical page: [ 28.636256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 28.636427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.637325] page_type: f5(slab) [ 28.637468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.637911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.638084] page dumped because: kasan: bad access detected [ 28.638693] [ 28.638772] Memory state around the buggy address: [ 28.639135] fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.639490] fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.639615] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.639948] ^ [ 28.640371] fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.640639] fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.640757] ==================================================================
[ 14.714213] ================================================================== [ 14.715001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.715908] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.716909] [ 14.717100] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.717175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.717189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.717214] Call Trace: [ 14.717241] <TASK> [ 14.717267] dump_stack_lvl+0x73/0xb0 [ 14.717486] print_report+0xd1/0x650 [ 14.717551] ? __virt_addr_valid+0x1db/0x2d0 [ 14.717593] ? kasan_atomics_helper+0x3df/0x5450 [ 14.717658] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.717684] ? kasan_atomics_helper+0x3df/0x5450 [ 14.717706] kasan_report+0x141/0x180 [ 14.717729] ? kasan_atomics_helper+0x3df/0x5450 [ 14.717754] kasan_check_range+0x10c/0x1c0 [ 14.717775] __kasan_check_read+0x15/0x20 [ 14.717794] kasan_atomics_helper+0x3df/0x5450 [ 14.717816] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.717838] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.717859] ? kasan_atomics+0x152/0x310 [ 14.717882] kasan_atomics+0x1dc/0x310 [ 14.717900] ? __pfx_kasan_atomics+0x10/0x10 [ 14.717921] ? __pfx_read_tsc+0x10/0x10 [ 14.717942] ? ktime_get_ts64+0x86/0x230 [ 14.717984] kunit_try_run_case+0x1a5/0x480 [ 14.718011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.718033] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.718058] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.718082] ? __kthread_parkme+0x82/0x180 [ 14.718106] ? preempt_count_sub+0x50/0x80 [ 14.718130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.718153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.718177] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.718200] kthread+0x337/0x6f0 [ 14.718217] ? trace_preempt_on+0x20/0xc0 [ 14.718242] ? __pfx_kthread+0x10/0x10 [ 14.718261] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.718287] ? calculate_sigpending+0x7b/0xa0 [ 14.718374] ? __pfx_kthread+0x10/0x10 [ 14.718405] ret_from_fork+0x41/0x80 [ 14.718428] ? __pfx_kthread+0x10/0x10 [ 14.718447] ret_from_fork_asm+0x1a/0x30 [ 14.718479] </TASK> [ 14.718493] [ 14.729736] Allocated by task 285: [ 14.729976] kasan_save_stack+0x45/0x70 [ 14.730341] kasan_save_track+0x18/0x40 [ 14.730614] kasan_save_alloc_info+0x3b/0x50 [ 14.731066] __kasan_kmalloc+0xb7/0xc0 [ 14.732091] __kmalloc_cache_noprof+0x189/0x420 [ 14.732582] kasan_atomics+0x95/0x310 [ 14.732921] kunit_try_run_case+0x1a5/0x480 [ 14.733204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.733784] kthread+0x337/0x6f0 [ 14.733990] ret_from_fork+0x41/0x80 [ 14.734258] ret_from_fork_asm+0x1a/0x30 [ 14.734772] [ 14.734944] The buggy address belongs to the object at ffff8881029ef680 [ 14.734944] which belongs to the cache kmalloc-64 of size 64 [ 14.735678] The buggy address is located 0 bytes to the right of [ 14.735678] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 14.736663] [ 14.736989] The buggy address belongs to the physical page: [ 14.737352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 14.737866] flags: 0x200000000000000(node=0|zone=2) [ 14.738405] page_type: f5(slab) [ 14.738682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.738903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.739460] page dumped because: kasan: bad access detected [ 14.739849] [ 14.740026] Memory state around the buggy address: [ 14.740309] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.740923] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.741489] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.741909] ^ [ 14.742186] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.742569] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.743002] ================================================================== [ 15.661509] ================================================================== [ 15.662445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.663087] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.663390] [ 15.663528] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.663635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.663665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.663705] Call Trace: [ 15.663743] <TASK> [ 15.663775] dump_stack_lvl+0x73/0xb0 [ 15.663819] print_report+0xd1/0x650 [ 15.663852] ? __virt_addr_valid+0x1db/0x2d0 [ 15.663884] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.663906] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.663934] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.663964] kasan_report+0x141/0x180 [ 15.663987] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.664012] __asan_report_store8_noabort+0x1b/0x30 [ 15.664033] kasan_atomics_helper+0x50d4/0x5450 [ 15.664055] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.664076] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.664098] ? kasan_atomics+0x152/0x310 [ 15.664121] kasan_atomics+0x1dc/0x310 [ 15.664140] ? __pfx_kasan_atomics+0x10/0x10 [ 15.664160] ? __pfx_read_tsc+0x10/0x10 [ 15.664180] ? ktime_get_ts64+0x86/0x230 [ 15.664205] kunit_try_run_case+0x1a5/0x480 [ 15.664230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.664250] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.664274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.664296] ? __kthread_parkme+0x82/0x180 [ 15.664317] ? preempt_count_sub+0x50/0x80 [ 15.664341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.664363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.664385] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.664407] kthread+0x337/0x6f0 [ 15.664424] ? trace_preempt_on+0x20/0xc0 [ 15.664447] ? __pfx_kthread+0x10/0x10 [ 15.664465] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.664485] ? calculate_sigpending+0x7b/0xa0 [ 15.664506] ? __pfx_kthread+0x10/0x10 [ 15.664527] ret_from_fork+0x41/0x80 [ 15.664798] ? __pfx_kthread+0x10/0x10 [ 15.664860] ret_from_fork_asm+0x1a/0x30 [ 15.664925] </TASK> [ 15.664952] [ 15.676703] Allocated by task 285: [ 15.677273] kasan_save_stack+0x45/0x70 [ 15.677542] kasan_save_track+0x18/0x40 [ 15.677739] kasan_save_alloc_info+0x3b/0x50 [ 15.678044] __kasan_kmalloc+0xb7/0xc0 [ 15.678275] __kmalloc_cache_noprof+0x189/0x420 [ 15.678526] kasan_atomics+0x95/0x310 [ 15.679157] kunit_try_run_case+0x1a5/0x480 [ 15.679340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.680002] kthread+0x337/0x6f0 [ 15.680370] ret_from_fork+0x41/0x80 [ 15.680597] ret_from_fork_asm+0x1a/0x30 [ 15.681010] [ 15.681191] The buggy address belongs to the object at ffff8881029ef680 [ 15.681191] which belongs to the cache kmalloc-64 of size 64 [ 15.682071] The buggy address is located 0 bytes to the right of [ 15.682071] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.682853] [ 15.682968] The buggy address belongs to the physical page: [ 15.683164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.683839] flags: 0x200000000000000(node=0|zone=2) [ 15.684061] page_type: f5(slab) [ 15.684245] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.684562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.684867] page dumped because: kasan: bad access detected [ 15.685095] [ 15.685195] Memory state around the buggy address: [ 15.685401] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.685753] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.686006] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.686238] ^ [ 15.686466] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.686901] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.687136] ================================================================== [ 16.052747] ================================================================== [ 16.053319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.053732] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.054243] [ 16.054495] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.054601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.054644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.054688] Call Trace: [ 16.054738] <TASK> [ 16.054782] dump_stack_lvl+0x73/0xb0 [ 16.054869] print_report+0xd1/0x650 [ 16.054922] ? __virt_addr_valid+0x1db/0x2d0 [ 16.054967] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.055013] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.055059] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.055101] kasan_report+0x141/0x180 [ 16.055138] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.055182] kasan_check_range+0x10c/0x1c0 [ 16.055224] __kasan_check_write+0x18/0x20 [ 16.055261] kasan_atomics_helper+0x1d7a/0x5450 [ 16.055316] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.055376] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.055418] ? kasan_atomics+0x152/0x310 [ 16.055466] kasan_atomics+0x1dc/0x310 [ 16.055514] ? __pfx_kasan_atomics+0x10/0x10 [ 16.055582] ? __pfx_read_tsc+0x10/0x10 [ 16.055640] ? ktime_get_ts64+0x86/0x230 [ 16.055690] kunit_try_run_case+0x1a5/0x480 [ 16.055739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.055779] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.055829] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.055870] ? __kthread_parkme+0x82/0x180 [ 16.055911] ? preempt_count_sub+0x50/0x80 [ 16.055960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.056005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.056050] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.056089] kthread+0x337/0x6f0 [ 16.056118] ? trace_preempt_on+0x20/0xc0 [ 16.056161] ? __pfx_kthread+0x10/0x10 [ 16.056199] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.056243] ? calculate_sigpending+0x7b/0xa0 [ 16.056287] ? __pfx_kthread+0x10/0x10 [ 16.056326] ret_from_fork+0x41/0x80 [ 16.056368] ? __pfx_kthread+0x10/0x10 [ 16.056407] ret_from_fork_asm+0x1a/0x30 [ 16.056465] </TASK> [ 16.056483] [ 16.065023] Allocated by task 285: [ 16.065361] kasan_save_stack+0x45/0x70 [ 16.065774] kasan_save_track+0x18/0x40 [ 16.065990] kasan_save_alloc_info+0x3b/0x50 [ 16.066266] __kasan_kmalloc+0xb7/0xc0 [ 16.066501] __kmalloc_cache_noprof+0x189/0x420 [ 16.066803] kasan_atomics+0x95/0x310 [ 16.066963] kunit_try_run_case+0x1a5/0x480 [ 16.067142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.067397] kthread+0x337/0x6f0 [ 16.067656] ret_from_fork+0x41/0x80 [ 16.068004] ret_from_fork_asm+0x1a/0x30 [ 16.068400] [ 16.068593] The buggy address belongs to the object at ffff8881029ef680 [ 16.068593] which belongs to the cache kmalloc-64 of size 64 [ 16.069010] The buggy address is located 0 bytes to the right of [ 16.069010] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.069537] [ 16.069717] The buggy address belongs to the physical page: [ 16.070150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.070412] flags: 0x200000000000000(node=0|zone=2) [ 16.070679] page_type: f5(slab) [ 16.070968] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.071561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.071748] page dumped because: kasan: bad access detected [ 16.071882] [ 16.071982] Memory state around the buggy address: [ 16.072318] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.072796] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.073136] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.073447] ^ [ 16.073892] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.074190] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.074437] ================================================================== [ 16.181781] ================================================================== [ 16.182096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.183180] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.184485] [ 16.184894] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.185005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.185029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.185077] Call Trace: [ 16.185123] <TASK> [ 16.185162] dump_stack_lvl+0x73/0xb0 [ 16.185229] print_report+0xd1/0x650 [ 16.185276] ? __virt_addr_valid+0x1db/0x2d0 [ 16.185308] ? kasan_atomics_helper+0x2006/0x5450 [ 16.185330] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.185352] ? kasan_atomics_helper+0x2006/0x5450 [ 16.185373] kasan_report+0x141/0x180 [ 16.185395] ? kasan_atomics_helper+0x2006/0x5450 [ 16.185421] kasan_check_range+0x10c/0x1c0 [ 16.185448] __kasan_check_write+0x18/0x20 [ 16.185479] kasan_atomics_helper+0x2006/0x5450 [ 16.185501] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.185523] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.185568] ? kasan_atomics+0x152/0x310 [ 16.185592] kasan_atomics+0x1dc/0x310 [ 16.185610] ? __pfx_kasan_atomics+0x10/0x10 [ 16.185649] ? __pfx_read_tsc+0x10/0x10 [ 16.185671] ? ktime_get_ts64+0x86/0x230 [ 16.185696] kunit_try_run_case+0x1a5/0x480 [ 16.185722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.185743] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.185765] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.185788] ? __kthread_parkme+0x82/0x180 [ 16.185810] ? preempt_count_sub+0x50/0x80 [ 16.185834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.185856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.185878] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.185900] kthread+0x337/0x6f0 [ 16.185918] ? trace_preempt_on+0x20/0xc0 [ 16.185951] ? __pfx_kthread+0x10/0x10 [ 16.185975] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.185997] ? calculate_sigpending+0x7b/0xa0 [ 16.186020] ? __pfx_kthread+0x10/0x10 [ 16.186039] ret_from_fork+0x41/0x80 [ 16.186061] ? __pfx_kthread+0x10/0x10 [ 16.186080] ret_from_fork_asm+0x1a/0x30 [ 16.186112] </TASK> [ 16.186126] [ 16.194144] Allocated by task 285: [ 16.194481] kasan_save_stack+0x45/0x70 [ 16.194839] kasan_save_track+0x18/0x40 [ 16.195055] kasan_save_alloc_info+0x3b/0x50 [ 16.195236] __kasan_kmalloc+0xb7/0xc0 [ 16.195512] __kmalloc_cache_noprof+0x189/0x420 [ 16.195826] kasan_atomics+0x95/0x310 [ 16.196095] kunit_try_run_case+0x1a5/0x480 [ 16.196331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.196566] kthread+0x337/0x6f0 [ 16.196830] ret_from_fork+0x41/0x80 [ 16.197024] ret_from_fork_asm+0x1a/0x30 [ 16.197231] [ 16.197376] The buggy address belongs to the object at ffff8881029ef680 [ 16.197376] which belongs to the cache kmalloc-64 of size 64 [ 16.198019] The buggy address is located 0 bytes to the right of [ 16.198019] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.198432] [ 16.198603] The buggy address belongs to the physical page: [ 16.198959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.199294] flags: 0x200000000000000(node=0|zone=2) [ 16.199550] page_type: f5(slab) [ 16.199819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.200076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.200327] page dumped because: kasan: bad access detected [ 16.200519] [ 16.200693] Memory state around the buggy address: [ 16.201014] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.201454] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.201948] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.202615] ^ [ 16.202967] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.203420] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.203996] ================================================================== [ 15.900607] ================================================================== [ 15.900936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.901506] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.901862] [ 15.902076] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.902176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.902202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.902242] Call Trace: [ 15.902289] <TASK> [ 15.902331] dump_stack_lvl+0x73/0xb0 [ 15.902375] print_report+0xd1/0x650 [ 15.902400] ? __virt_addr_valid+0x1db/0x2d0 [ 15.902431] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.902452] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.902479] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.902516] kasan_report+0x141/0x180 [ 15.902596] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.902658] kasan_check_range+0x10c/0x1c0 [ 15.902699] __kasan_check_write+0x18/0x20 [ 15.902735] kasan_atomics_helper+0x19e3/0x5450 [ 15.902778] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.902824] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.902863] ? kasan_atomics+0x152/0x310 [ 15.902911] kasan_atomics+0x1dc/0x310 [ 15.902952] ? __pfx_kasan_atomics+0x10/0x10 [ 15.902999] ? __pfx_read_tsc+0x10/0x10 [ 15.903036] ? ktime_get_ts64+0x86/0x230 [ 15.903082] kunit_try_run_case+0x1a5/0x480 [ 15.903130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.903172] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.903221] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.903270] ? __kthread_parkme+0x82/0x180 [ 15.903312] ? preempt_count_sub+0x50/0x80 [ 15.903365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.903411] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.903451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.903474] kthread+0x337/0x6f0 [ 15.903493] ? trace_preempt_on+0x20/0xc0 [ 15.903516] ? __pfx_kthread+0x10/0x10 [ 15.903533] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.903577] ? calculate_sigpending+0x7b/0xa0 [ 15.903599] ? __pfx_kthread+0x10/0x10 [ 15.903617] ret_from_fork+0x41/0x80 [ 15.903655] ? __pfx_kthread+0x10/0x10 [ 15.903674] ret_from_fork_asm+0x1a/0x30 [ 15.903705] </TASK> [ 15.903719] [ 15.911938] Allocated by task 285: [ 15.912150] kasan_save_stack+0x45/0x70 [ 15.912370] kasan_save_track+0x18/0x40 [ 15.912702] kasan_save_alloc_info+0x3b/0x50 [ 15.913002] __kasan_kmalloc+0xb7/0xc0 [ 15.913289] __kmalloc_cache_noprof+0x189/0x420 [ 15.913650] kasan_atomics+0x95/0x310 [ 15.913972] kunit_try_run_case+0x1a5/0x480 [ 15.914279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.914595] kthread+0x337/0x6f0 [ 15.914853] ret_from_fork+0x41/0x80 [ 15.915106] ret_from_fork_asm+0x1a/0x30 [ 15.915378] [ 15.915488] The buggy address belongs to the object at ffff8881029ef680 [ 15.915488] which belongs to the cache kmalloc-64 of size 64 [ 15.915879] The buggy address is located 0 bytes to the right of [ 15.915879] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.916266] [ 15.916379] The buggy address belongs to the physical page: [ 15.916631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.916899] flags: 0x200000000000000(node=0|zone=2) [ 15.917256] page_type: f5(slab) [ 15.917573] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.918115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.918668] page dumped because: kasan: bad access detected [ 15.919040] [ 15.919195] Memory state around the buggy address: [ 15.919518] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.920014] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.920479] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.920979] ^ [ 15.921325] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.921671] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.921917] ================================================================== [ 16.228099] ================================================================== [ 16.228438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.228745] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.228993] [ 16.229133] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.229230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.229256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.229301] Call Trace: [ 16.229345] <TASK> [ 16.229387] dump_stack_lvl+0x73/0xb0 [ 16.229440] print_report+0xd1/0x650 [ 16.229490] ? __virt_addr_valid+0x1db/0x2d0 [ 16.229535] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.229581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.229649] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.229689] kasan_report+0x141/0x180 [ 16.229726] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.229770] kasan_check_range+0x10c/0x1c0 [ 16.229809] __kasan_check_write+0x18/0x20 [ 16.229845] kasan_atomics_helper+0x20c8/0x5450 [ 16.229892] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.229936] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.229992] ? kasan_atomics+0x152/0x310 [ 16.230045] kasan_atomics+0x1dc/0x310 [ 16.230092] ? __pfx_kasan_atomics+0x10/0x10 [ 16.230138] ? __pfx_read_tsc+0x10/0x10 [ 16.230180] ? ktime_get_ts64+0x86/0x230 [ 16.230234] kunit_try_run_case+0x1a5/0x480 [ 16.230289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.230336] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.230387] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.230438] ? __kthread_parkme+0x82/0x180 [ 16.230487] ? preempt_count_sub+0x50/0x80 [ 16.230539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.230588] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.230654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.230707] kthread+0x337/0x6f0 [ 16.230752] ? trace_preempt_on+0x20/0xc0 [ 16.230803] ? __pfx_kthread+0x10/0x10 [ 16.230846] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.230894] ? calculate_sigpending+0x7b/0xa0 [ 16.230944] ? __pfx_kthread+0x10/0x10 [ 16.230987] ret_from_fork+0x41/0x80 [ 16.231031] ? __pfx_kthread+0x10/0x10 [ 16.231074] ret_from_fork_asm+0x1a/0x30 [ 16.231142] </TASK> [ 16.231171] [ 16.239971] Allocated by task 285: [ 16.240192] kasan_save_stack+0x45/0x70 [ 16.240487] kasan_save_track+0x18/0x40 [ 16.240810] kasan_save_alloc_info+0x3b/0x50 [ 16.241119] __kasan_kmalloc+0xb7/0xc0 [ 16.241380] __kmalloc_cache_noprof+0x189/0x420 [ 16.241749] kasan_atomics+0x95/0x310 [ 16.242028] kunit_try_run_case+0x1a5/0x480 [ 16.242266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.242528] kthread+0x337/0x6f0 [ 16.242809] ret_from_fork+0x41/0x80 [ 16.243047] ret_from_fork_asm+0x1a/0x30 [ 16.243241] [ 16.243346] The buggy address belongs to the object at ffff8881029ef680 [ 16.243346] which belongs to the cache kmalloc-64 of size 64 [ 16.244063] The buggy address is located 0 bytes to the right of [ 16.244063] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.244491] [ 16.244655] The buggy address belongs to the physical page: [ 16.245033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.245430] flags: 0x200000000000000(node=0|zone=2) [ 16.245873] page_type: f5(slab) [ 16.246041] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.246304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.246558] page dumped because: kasan: bad access detected [ 16.246938] [ 16.247096] Memory state around the buggy address: [ 16.247502] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.248000] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.248471] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.249004] ^ [ 16.249215] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.249518] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.249851] ================================================================== [ 15.156507] ================================================================== [ 15.156889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.157448] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.157897] [ 15.158105] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.158230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.158264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.158340] Call Trace: [ 15.158383] <TASK> [ 15.158419] dump_stack_lvl+0x73/0xb0 [ 15.158468] print_report+0xd1/0x650 [ 15.158503] ? __virt_addr_valid+0x1db/0x2d0 [ 15.158532] ? kasan_atomics_helper+0xc70/0x5450 [ 15.158582] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.158613] ? kasan_atomics_helper+0xc70/0x5450 [ 15.158661] kasan_report+0x141/0x180 [ 15.158693] ? kasan_atomics_helper+0xc70/0x5450 [ 15.158729] kasan_check_range+0x10c/0x1c0 [ 15.158759] __kasan_check_write+0x18/0x20 [ 15.158788] kasan_atomics_helper+0xc70/0x5450 [ 15.158832] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.158871] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.158924] ? kasan_atomics+0x152/0x310 [ 15.158974] kasan_atomics+0x1dc/0x310 [ 15.159018] ? __pfx_kasan_atomics+0x10/0x10 [ 15.159060] ? __pfx_read_tsc+0x10/0x10 [ 15.159100] ? ktime_get_ts64+0x86/0x230 [ 15.159150] kunit_try_run_case+0x1a5/0x480 [ 15.159201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.159245] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.159305] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.159354] ? __kthread_parkme+0x82/0x180 [ 15.159391] ? preempt_count_sub+0x50/0x80 [ 15.159430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.159472] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.159564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.159657] kthread+0x337/0x6f0 [ 15.159695] ? trace_preempt_on+0x20/0xc0 [ 15.159748] ? __pfx_kthread+0x10/0x10 [ 15.159784] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.159831] ? calculate_sigpending+0x7b/0xa0 [ 15.159877] ? __pfx_kthread+0x10/0x10 [ 15.159911] ret_from_fork+0x41/0x80 [ 15.159934] ? __pfx_kthread+0x10/0x10 [ 15.159953] ret_from_fork_asm+0x1a/0x30 [ 15.159984] </TASK> [ 15.159997] [ 15.169251] Allocated by task 285: [ 15.169485] kasan_save_stack+0x45/0x70 [ 15.169872] kasan_save_track+0x18/0x40 [ 15.170247] kasan_save_alloc_info+0x3b/0x50 [ 15.170696] __kasan_kmalloc+0xb7/0xc0 [ 15.170987] __kmalloc_cache_noprof+0x189/0x420 [ 15.171334] kasan_atomics+0x95/0x310 [ 15.171666] kunit_try_run_case+0x1a5/0x480 [ 15.171951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.172356] kthread+0x337/0x6f0 [ 15.172617] ret_from_fork+0x41/0x80 [ 15.172908] ret_from_fork_asm+0x1a/0x30 [ 15.173258] [ 15.173401] The buggy address belongs to the object at ffff8881029ef680 [ 15.173401] which belongs to the cache kmalloc-64 of size 64 [ 15.174073] The buggy address is located 0 bytes to the right of [ 15.174073] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.174503] [ 15.174664] The buggy address belongs to the physical page: [ 15.175121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.175869] flags: 0x200000000000000(node=0|zone=2) [ 15.176249] page_type: f5(slab) [ 15.176531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.177145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.177748] page dumped because: kasan: bad access detected [ 15.178001] [ 15.178180] Memory state around the buggy address: [ 15.178490] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.178753] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.178991] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.179372] ^ [ 15.179727] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.180198] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.180762] ================================================================== [ 15.182576] ================================================================== [ 15.183027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.183649] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.184191] [ 15.184442] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.184610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.184657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.184701] Call Trace: [ 15.184772] <TASK> [ 15.184826] dump_stack_lvl+0x73/0xb0 [ 15.184889] print_report+0xd1/0x650 [ 15.184918] ? __virt_addr_valid+0x1db/0x2d0 [ 15.184941] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.184962] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.184992] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.185028] kasan_report+0x141/0x180 [ 15.185069] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.185137] __asan_report_load4_noabort+0x18/0x20 [ 15.185180] kasan_atomics_helper+0x4a84/0x5450 [ 15.185227] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.185270] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.185313] ? kasan_atomics+0x152/0x310 [ 15.185379] kasan_atomics+0x1dc/0x310 [ 15.185422] ? __pfx_kasan_atomics+0x10/0x10 [ 15.185461] ? __pfx_read_tsc+0x10/0x10 [ 15.185497] ? ktime_get_ts64+0x86/0x230 [ 15.185533] kunit_try_run_case+0x1a5/0x480 [ 15.185581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.185603] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.185645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.185670] ? __kthread_parkme+0x82/0x180 [ 15.185693] ? preempt_count_sub+0x50/0x80 [ 15.185718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.185740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.185763] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.185785] kthread+0x337/0x6f0 [ 15.185803] ? trace_preempt_on+0x20/0xc0 [ 15.185827] ? __pfx_kthread+0x10/0x10 [ 15.185845] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.185866] ? calculate_sigpending+0x7b/0xa0 [ 15.185888] ? __pfx_kthread+0x10/0x10 [ 15.185906] ret_from_fork+0x41/0x80 [ 15.185927] ? __pfx_kthread+0x10/0x10 [ 15.185955] ret_from_fork_asm+0x1a/0x30 [ 15.185989] </TASK> [ 15.186005] [ 15.195887] Allocated by task 285: [ 15.196371] kasan_save_stack+0x45/0x70 [ 15.197223] kasan_save_track+0x18/0x40 [ 15.197652] kasan_save_alloc_info+0x3b/0x50 [ 15.198010] __kasan_kmalloc+0xb7/0xc0 [ 15.198248] __kmalloc_cache_noprof+0x189/0x420 [ 15.198571] kasan_atomics+0x95/0x310 [ 15.198840] kunit_try_run_case+0x1a5/0x480 [ 15.199133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.199338] kthread+0x337/0x6f0 [ 15.199791] ret_from_fork+0x41/0x80 [ 15.200056] ret_from_fork_asm+0x1a/0x30 [ 15.200340] [ 15.200488] The buggy address belongs to the object at ffff8881029ef680 [ 15.200488] which belongs to the cache kmalloc-64 of size 64 [ 15.201212] The buggy address is located 0 bytes to the right of [ 15.201212] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.202189] [ 15.202320] The buggy address belongs to the physical page: [ 15.202668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.203022] flags: 0x200000000000000(node=0|zone=2) [ 15.203256] page_type: f5(slab) [ 15.203521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.203857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.204100] page dumped because: kasan: bad access detected [ 15.204288] [ 15.204431] Memory state around the buggy address: [ 15.204868] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.205429] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.205996] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.206323] ^ [ 15.206737] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.207043] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.207280] ================================================================== [ 15.506105] ================================================================== [ 15.506923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.507402] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.507660] [ 15.507880] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.507986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.508012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.508059] Call Trace: [ 15.508104] <TASK> [ 15.508142] dump_stack_lvl+0x73/0xb0 [ 15.508199] print_report+0xd1/0x650 [ 15.508240] ? __virt_addr_valid+0x1db/0x2d0 [ 15.508297] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.508360] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.508405] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.508462] kasan_report+0x141/0x180 [ 15.508511] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.508564] __asan_report_load4_noabort+0x18/0x20 [ 15.508601] kasan_atomics_helper+0x49e8/0x5450 [ 15.508659] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.508709] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.508752] ? kasan_atomics+0x152/0x310 [ 15.508812] kasan_atomics+0x1dc/0x310 [ 15.508852] ? __pfx_kasan_atomics+0x10/0x10 [ 15.508885] ? __pfx_read_tsc+0x10/0x10 [ 15.508918] ? ktime_get_ts64+0x86/0x230 [ 15.508968] kunit_try_run_case+0x1a5/0x480 [ 15.509022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.509068] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.509126] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.509173] ? __kthread_parkme+0x82/0x180 [ 15.509223] ? preempt_count_sub+0x50/0x80 [ 15.509274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.509333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.509374] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.509402] kthread+0x337/0x6f0 [ 15.509420] ? trace_preempt_on+0x20/0xc0 [ 15.509444] ? __pfx_kthread+0x10/0x10 [ 15.509462] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.509482] ? calculate_sigpending+0x7b/0xa0 [ 15.509503] ? __pfx_kthread+0x10/0x10 [ 15.509521] ret_from_fork+0x41/0x80 [ 15.509544] ? __pfx_kthread+0x10/0x10 [ 15.509572] ret_from_fork_asm+0x1a/0x30 [ 15.509602] </TASK> [ 15.509615] [ 15.518620] Allocated by task 285: [ 15.518988] kasan_save_stack+0x45/0x70 [ 15.519225] kasan_save_track+0x18/0x40 [ 15.519401] kasan_save_alloc_info+0x3b/0x50 [ 15.519573] __kasan_kmalloc+0xb7/0xc0 [ 15.519867] __kmalloc_cache_noprof+0x189/0x420 [ 15.520221] kasan_atomics+0x95/0x310 [ 15.520602] kunit_try_run_case+0x1a5/0x480 [ 15.520951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.521308] kthread+0x337/0x6f0 [ 15.521477] ret_from_fork+0x41/0x80 [ 15.522027] ret_from_fork_asm+0x1a/0x30 [ 15.523234] [ 15.523341] The buggy address belongs to the object at ffff8881029ef680 [ 15.523341] which belongs to the cache kmalloc-64 of size 64 [ 15.524007] The buggy address is located 0 bytes to the right of [ 15.524007] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.524635] [ 15.524767] The buggy address belongs to the physical page: [ 15.525074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.525464] flags: 0x200000000000000(node=0|zone=2) [ 15.525680] page_type: f5(slab) [ 15.525854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.526185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.526791] page dumped because: kasan: bad access detected [ 15.527319] [ 15.527421] Memory state around the buggy address: [ 15.527653] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.528117] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.528429] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.528901] ^ [ 15.529172] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.529408] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.529782] ================================================================== [ 15.374941] ================================================================== [ 15.375818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.376357] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.376779] [ 15.376949] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.377049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.377074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.377116] Call Trace: [ 15.377181] <TASK> [ 15.377220] dump_stack_lvl+0x73/0xb0 [ 15.377281] print_report+0xd1/0x650 [ 15.377331] ? __virt_addr_valid+0x1db/0x2d0 [ 15.377374] ? kasan_atomics_helper+0x1079/0x5450 [ 15.377435] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.377483] ? kasan_atomics_helper+0x1079/0x5450 [ 15.377535] kasan_report+0x141/0x180 [ 15.377615] ? kasan_atomics_helper+0x1079/0x5450 [ 15.377686] kasan_check_range+0x10c/0x1c0 [ 15.377733] __kasan_check_write+0x18/0x20 [ 15.377769] kasan_atomics_helper+0x1079/0x5450 [ 15.377803] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.377833] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.377862] ? kasan_atomics+0x152/0x310 [ 15.377893] kasan_atomics+0x1dc/0x310 [ 15.377918] ? __pfx_kasan_atomics+0x10/0x10 [ 15.377940] ? __pfx_read_tsc+0x10/0x10 [ 15.377971] ? ktime_get_ts64+0x86/0x230 [ 15.377998] kunit_try_run_case+0x1a5/0x480 [ 15.378025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.378049] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.378075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.378098] ? __kthread_parkme+0x82/0x180 [ 15.378121] ? preempt_count_sub+0x50/0x80 [ 15.378147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.378171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.378195] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.378217] kthread+0x337/0x6f0 [ 15.378235] ? trace_preempt_on+0x20/0xc0 [ 15.378258] ? __pfx_kthread+0x10/0x10 [ 15.378277] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.378298] ? calculate_sigpending+0x7b/0xa0 [ 15.378319] ? __pfx_kthread+0x10/0x10 [ 15.378337] ret_from_fork+0x41/0x80 [ 15.378357] ? __pfx_kthread+0x10/0x10 [ 15.378374] ret_from_fork_asm+0x1a/0x30 [ 15.378404] </TASK> [ 15.378419] [ 15.387764] Allocated by task 285: [ 15.388171] kasan_save_stack+0x45/0x70 [ 15.388435] kasan_save_track+0x18/0x40 [ 15.388829] kasan_save_alloc_info+0x3b/0x50 [ 15.389015] __kasan_kmalloc+0xb7/0xc0 [ 15.389305] __kmalloc_cache_noprof+0x189/0x420 [ 15.389716] kasan_atomics+0x95/0x310 [ 15.390088] kunit_try_run_case+0x1a5/0x480 [ 15.390288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.390637] kthread+0x337/0x6f0 [ 15.390911] ret_from_fork+0x41/0x80 [ 15.391230] ret_from_fork_asm+0x1a/0x30 [ 15.391634] [ 15.391798] The buggy address belongs to the object at ffff8881029ef680 [ 15.391798] which belongs to the cache kmalloc-64 of size 64 [ 15.392255] The buggy address is located 0 bytes to the right of [ 15.392255] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.392460] [ 15.392515] The buggy address belongs to the physical page: [ 15.392761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.393295] flags: 0x200000000000000(node=0|zone=2) [ 15.393601] page_type: f5(slab) [ 15.393796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.394141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.394537] page dumped because: kasan: bad access detected [ 15.395078] [ 15.395511] Memory state around the buggy address: [ 15.395956] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.396455] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.396999] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.397433] ^ [ 15.398080] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.398393] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.399216] ================================================================== [ 15.765573] ================================================================== [ 15.766163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.766745] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.769008] [ 15.769235] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.769324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.769344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.769381] Call Trace: [ 15.769420] <TASK> [ 15.769455] dump_stack_lvl+0x73/0xb0 [ 15.769506] print_report+0xd1/0x650 [ 15.769539] ? __virt_addr_valid+0x1db/0x2d0 [ 15.769572] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.769601] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.769648] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.769685] kasan_report+0x141/0x180 [ 15.769724] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.769775] kasan_check_range+0x10c/0x1c0 [ 15.769811] __kasan_check_write+0x18/0x20 [ 15.769838] kasan_atomics_helper+0x16e7/0x5450 [ 15.769868] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.769894] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.769915] ? kasan_atomics+0x152/0x310 [ 15.769939] kasan_atomics+0x1dc/0x310 [ 15.769986] ? __pfx_kasan_atomics+0x10/0x10 [ 15.770033] ? __pfx_read_tsc+0x10/0x10 [ 15.770085] ? ktime_get_ts64+0x86/0x230 [ 15.770134] kunit_try_run_case+0x1a5/0x480 [ 15.770183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.770226] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.770259] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.770282] ? __kthread_parkme+0x82/0x180 [ 15.770305] ? preempt_count_sub+0x50/0x80 [ 15.770330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.770353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.770376] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.770399] kthread+0x337/0x6f0 [ 15.770416] ? trace_preempt_on+0x20/0xc0 [ 15.770440] ? __pfx_kthread+0x10/0x10 [ 15.770458] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.770479] ? calculate_sigpending+0x7b/0xa0 [ 15.770501] ? __pfx_kthread+0x10/0x10 [ 15.770519] ret_from_fork+0x41/0x80 [ 15.770568] ? __pfx_kthread+0x10/0x10 [ 15.770591] ret_from_fork_asm+0x1a/0x30 [ 15.770637] </TASK> [ 15.770654] [ 15.780295] Allocated by task 285: [ 15.780687] kasan_save_stack+0x45/0x70 [ 15.781103] kasan_save_track+0x18/0x40 [ 15.781338] kasan_save_alloc_info+0x3b/0x50 [ 15.781729] __kasan_kmalloc+0xb7/0xc0 [ 15.781983] __kmalloc_cache_noprof+0x189/0x420 [ 15.782266] kasan_atomics+0x95/0x310 [ 15.782655] kunit_try_run_case+0x1a5/0x480 [ 15.782960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.783286] kthread+0x337/0x6f0 [ 15.783605] ret_from_fork+0x41/0x80 [ 15.783913] ret_from_fork_asm+0x1a/0x30 [ 15.784204] [ 15.784336] The buggy address belongs to the object at ffff8881029ef680 [ 15.784336] which belongs to the cache kmalloc-64 of size 64 [ 15.785057] The buggy address is located 0 bytes to the right of [ 15.785057] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.785513] [ 15.785759] The buggy address belongs to the physical page: [ 15.786084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.786664] flags: 0x200000000000000(node=0|zone=2) [ 15.787040] page_type: f5(slab) [ 15.787217] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.787469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.788046] page dumped because: kasan: bad access detected [ 15.788435] [ 15.788680] Memory state around the buggy address: [ 15.789049] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.789583] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.789914] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.790432] ^ [ 15.790742] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.790998] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.791229] ================================================================== [ 14.590229] ================================================================== [ 14.591025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.591959] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.592295] [ 14.592448] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.592599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.592641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.592800] Call Trace: [ 14.593007] <TASK> [ 14.593057] dump_stack_lvl+0x73/0xb0 [ 14.593131] print_report+0xd1/0x650 [ 14.593158] ? __virt_addr_valid+0x1db/0x2d0 [ 14.593182] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.593203] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.593226] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.593247] kasan_report+0x141/0x180 [ 14.593267] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.593535] __asan_report_load4_noabort+0x18/0x20 [ 14.593588] kasan_atomics_helper+0x4bbc/0x5450 [ 14.593612] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.593653] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.593677] ? kasan_atomics+0x152/0x310 [ 14.593699] kasan_atomics+0x1dc/0x310 [ 14.593717] ? __pfx_kasan_atomics+0x10/0x10 [ 14.593737] ? __pfx_read_tsc+0x10/0x10 [ 14.593757] ? ktime_get_ts64+0x86/0x230 [ 14.593783] kunit_try_run_case+0x1a5/0x480 [ 14.593808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.593829] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.593854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.593876] ? __kthread_parkme+0x82/0x180 [ 14.593899] ? preempt_count_sub+0x50/0x80 [ 14.593938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.593973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.593996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.594019] kthread+0x337/0x6f0 [ 14.594036] ? trace_preempt_on+0x20/0xc0 [ 14.594061] ? __pfx_kthread+0x10/0x10 [ 14.594079] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.594099] ? calculate_sigpending+0x7b/0xa0 [ 14.594121] ? __pfx_kthread+0x10/0x10 [ 14.594138] ret_from_fork+0x41/0x80 [ 14.594157] ? __pfx_kthread+0x10/0x10 [ 14.594175] ret_from_fork_asm+0x1a/0x30 [ 14.594206] </TASK> [ 14.594219] [ 14.608950] Allocated by task 285: [ 14.609235] kasan_save_stack+0x45/0x70 [ 14.609437] kasan_save_track+0x18/0x40 [ 14.609893] kasan_save_alloc_info+0x3b/0x50 [ 14.610161] __kasan_kmalloc+0xb7/0xc0 [ 14.610537] __kmalloc_cache_noprof+0x189/0x420 [ 14.610848] kasan_atomics+0x95/0x310 [ 14.611177] kunit_try_run_case+0x1a5/0x480 [ 14.611439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.611876] kthread+0x337/0x6f0 [ 14.612159] ret_from_fork+0x41/0x80 [ 14.612341] ret_from_fork_asm+0x1a/0x30 [ 14.612962] [ 14.613098] The buggy address belongs to the object at ffff8881029ef680 [ 14.613098] which belongs to the cache kmalloc-64 of size 64 [ 14.614275] The buggy address is located 0 bytes to the right of [ 14.614275] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 14.615725] [ 14.615850] The buggy address belongs to the physical page: [ 14.616081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 14.616499] flags: 0x200000000000000(node=0|zone=2) [ 14.616940] page_type: f5(slab) [ 14.617182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.617489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.618021] page dumped because: kasan: bad access detected [ 14.618218] [ 14.619004] Memory state around the buggy address: [ 14.619511] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.619893] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.620182] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.620610] ^ [ 14.621209] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.622024] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.622406] ================================================================== [ 16.309049] ================================================================== [ 16.309756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.310790] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.311228] [ 16.311469] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.311598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.311644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.311692] Call Trace: [ 16.311737] <TASK> [ 16.311780] dump_stack_lvl+0x73/0xb0 [ 16.311837] print_report+0xd1/0x650 [ 16.311879] ? __virt_addr_valid+0x1db/0x2d0 [ 16.311920] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.311990] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.312054] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.312098] kasan_report+0x141/0x180 [ 16.312178] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.312252] __asan_report_load8_noabort+0x18/0x20 [ 16.312296] kasan_atomics_helper+0x4fa5/0x5450 [ 16.312346] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.312370] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.312405] ? kasan_atomics+0x152/0x310 [ 16.312431] kasan_atomics+0x1dc/0x310 [ 16.312450] ? __pfx_kasan_atomics+0x10/0x10 [ 16.312472] ? __pfx_read_tsc+0x10/0x10 [ 16.312492] ? ktime_get_ts64+0x86/0x230 [ 16.312518] kunit_try_run_case+0x1a5/0x480 [ 16.312547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.312578] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.312602] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.312642] ? __kthread_parkme+0x82/0x180 [ 16.312667] ? preempt_count_sub+0x50/0x80 [ 16.312692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.312715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.312739] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.312761] kthread+0x337/0x6f0 [ 16.312778] ? trace_preempt_on+0x20/0xc0 [ 16.312801] ? __pfx_kthread+0x10/0x10 [ 16.312819] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.312840] ? calculate_sigpending+0x7b/0xa0 [ 16.312861] ? __pfx_kthread+0x10/0x10 [ 16.312879] ret_from_fork+0x41/0x80 [ 16.312898] ? __pfx_kthread+0x10/0x10 [ 16.312916] ret_from_fork_asm+0x1a/0x30 [ 16.312946] </TASK> [ 16.312961] [ 16.322039] Allocated by task 285: [ 16.322271] kasan_save_stack+0x45/0x70 [ 16.322489] kasan_save_track+0x18/0x40 [ 16.322885] kasan_save_alloc_info+0x3b/0x50 [ 16.323229] __kasan_kmalloc+0xb7/0xc0 [ 16.323533] __kmalloc_cache_noprof+0x189/0x420 [ 16.323891] kasan_atomics+0x95/0x310 [ 16.324140] kunit_try_run_case+0x1a5/0x480 [ 16.324328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.324698] kthread+0x337/0x6f0 [ 16.324983] ret_from_fork+0x41/0x80 [ 16.325294] ret_from_fork_asm+0x1a/0x30 [ 16.325570] [ 16.325737] The buggy address belongs to the object at ffff8881029ef680 [ 16.325737] which belongs to the cache kmalloc-64 of size 64 [ 16.326483] The buggy address is located 0 bytes to the right of [ 16.326483] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.326952] [ 16.327093] The buggy address belongs to the physical page: [ 16.327333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.327649] flags: 0x200000000000000(node=0|zone=2) [ 16.327888] page_type: f5(slab) [ 16.328076] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.328580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.329081] page dumped because: kasan: bad access detected [ 16.329475] [ 16.329656] Memory state around the buggy address: [ 16.330033] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.330699] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.331109] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.331342] ^ [ 16.331526] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.331997] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.332474] ================================================================== [ 14.650404] ================================================================== [ 14.651006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.651550] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.653524] [ 14.654072] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.654156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.654170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.654195] Call Trace: [ 14.654219] <TASK> [ 14.654244] dump_stack_lvl+0x73/0xb0 [ 14.654289] print_report+0xd1/0x650 [ 14.654363] ? __virt_addr_valid+0x1db/0x2d0 [ 14.654400] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.654425] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.654447] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.654469] kasan_report+0x141/0x180 [ 14.654491] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.654704] __asan_report_load4_noabort+0x18/0x20 [ 14.654731] kasan_atomics_helper+0x4b88/0x5450 [ 14.654777] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.654801] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.654825] ? kasan_atomics+0x152/0x310 [ 14.654850] kasan_atomics+0x1dc/0x310 [ 14.654871] ? __pfx_kasan_atomics+0x10/0x10 [ 14.654892] ? __pfx_read_tsc+0x10/0x10 [ 14.654914] ? ktime_get_ts64+0x86/0x230 [ 14.654940] kunit_try_run_case+0x1a5/0x480 [ 14.654967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.654989] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.655015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.655037] ? __kthread_parkme+0x82/0x180 [ 14.655059] ? preempt_count_sub+0x50/0x80 [ 14.655084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.655107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.655130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.655152] kthread+0x337/0x6f0 [ 14.655170] ? trace_preempt_on+0x20/0xc0 [ 14.655193] ? __pfx_kthread+0x10/0x10 [ 14.655211] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.655232] ? calculate_sigpending+0x7b/0xa0 [ 14.655254] ? __pfx_kthread+0x10/0x10 [ 14.655272] ret_from_fork+0x41/0x80 [ 14.655304] ? __pfx_kthread+0x10/0x10 [ 14.655335] ret_from_fork_asm+0x1a/0x30 [ 14.655377] </TASK> [ 14.655393] [ 14.667840] Allocated by task 285: [ 14.669015] kasan_save_stack+0x45/0x70 [ 14.669226] kasan_save_track+0x18/0x40 [ 14.669584] kasan_save_alloc_info+0x3b/0x50 [ 14.669845] __kasan_kmalloc+0xb7/0xc0 [ 14.670088] __kmalloc_cache_noprof+0x189/0x420 [ 14.670422] kasan_atomics+0x95/0x310 [ 14.670638] kunit_try_run_case+0x1a5/0x480 [ 14.671025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.671377] kthread+0x337/0x6f0 [ 14.671905] ret_from_fork+0x41/0x80 [ 14.672652] ret_from_fork_asm+0x1a/0x30 [ 14.673058] [ 14.673225] The buggy address belongs to the object at ffff8881029ef680 [ 14.673225] which belongs to the cache kmalloc-64 of size 64 [ 14.673812] The buggy address is located 0 bytes to the right of [ 14.673812] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 14.674844] [ 14.674999] The buggy address belongs to the physical page: [ 14.675272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 14.675836] flags: 0x200000000000000(node=0|zone=2) [ 14.676182] page_type: f5(slab) [ 14.676468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.677124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.677738] page dumped because: kasan: bad access detected [ 14.678576] [ 14.678696] Memory state around the buggy address: [ 14.679263] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.679539] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.679999] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.680291] ^ [ 14.680513] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.680898] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.681400] ================================================================== [ 15.558187] ================================================================== [ 15.559096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.559993] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.560724] [ 15.560913] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.561006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.561030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.561066] Call Trace: [ 15.561108] <TASK> [ 15.561147] dump_stack_lvl+0x73/0xb0 [ 15.561217] print_report+0xd1/0x650 [ 15.561243] ? __virt_addr_valid+0x1db/0x2d0 [ 15.561272] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.561294] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.561321] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.561357] kasan_report+0x141/0x180 [ 15.561381] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.561407] __asan_report_load4_noabort+0x18/0x20 [ 15.561427] kasan_atomics_helper+0x49ce/0x5450 [ 15.561450] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.561472] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.561494] ? kasan_atomics+0x152/0x310 [ 15.561517] kasan_atomics+0x1dc/0x310 [ 15.561546] ? __pfx_kasan_atomics+0x10/0x10 [ 15.561582] ? __pfx_read_tsc+0x10/0x10 [ 15.561613] ? ktime_get_ts64+0x86/0x230 [ 15.561675] kunit_try_run_case+0x1a5/0x480 [ 15.561723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.561769] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.561817] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.561846] ? __kthread_parkme+0x82/0x180 [ 15.561869] ? preempt_count_sub+0x50/0x80 [ 15.561895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.561918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.561942] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.561978] kthread+0x337/0x6f0 [ 15.561997] ? trace_preempt_on+0x20/0xc0 [ 15.562023] ? __pfx_kthread+0x10/0x10 [ 15.562041] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.562064] ? calculate_sigpending+0x7b/0xa0 [ 15.562085] ? __pfx_kthread+0x10/0x10 [ 15.562105] ret_from_fork+0x41/0x80 [ 15.562125] ? __pfx_kthread+0x10/0x10 [ 15.562143] ret_from_fork_asm+0x1a/0x30 [ 15.562174] </TASK> [ 15.562187] [ 15.573462] Allocated by task 285: [ 15.573897] kasan_save_stack+0x45/0x70 [ 15.574357] kasan_save_track+0x18/0x40 [ 15.574615] kasan_save_alloc_info+0x3b/0x50 [ 15.575037] __kasan_kmalloc+0xb7/0xc0 [ 15.575353] __kmalloc_cache_noprof+0x189/0x420 [ 15.575664] kasan_atomics+0x95/0x310 [ 15.576008] kunit_try_run_case+0x1a5/0x480 [ 15.576228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.576523] kthread+0x337/0x6f0 [ 15.576828] ret_from_fork+0x41/0x80 [ 15.577021] ret_from_fork_asm+0x1a/0x30 [ 15.577367] [ 15.577557] The buggy address belongs to the object at ffff8881029ef680 [ 15.577557] which belongs to the cache kmalloc-64 of size 64 [ 15.578004] The buggy address is located 0 bytes to the right of [ 15.578004] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.578845] [ 15.579029] The buggy address belongs to the physical page: [ 15.579273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.579546] flags: 0x200000000000000(node=0|zone=2) [ 15.579977] page_type: f5(slab) [ 15.580381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.581033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.581461] page dumped because: kasan: bad access detected [ 15.581890] [ 15.582008] Memory state around the buggy address: [ 15.582204] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.582771] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.583286] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.583764] ^ [ 15.584053] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.584544] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.584883] ================================================================== [ 14.874804] ================================================================== [ 14.875866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.876256] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.877127] [ 14.877290] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.877732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.877764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.877791] Call Trace: [ 14.877818] <TASK> [ 14.877844] dump_stack_lvl+0x73/0xb0 [ 14.877885] print_report+0xd1/0x650 [ 14.877909] ? __virt_addr_valid+0x1db/0x2d0 [ 14.877933] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.877969] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.877993] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.878016] kasan_report+0x141/0x180 [ 14.878039] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.878066] kasan_check_range+0x10c/0x1c0 [ 14.878086] __kasan_check_write+0x18/0x20 [ 14.878105] kasan_atomics_helper+0x5fe/0x5450 [ 14.878128] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.878150] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.878171] ? kasan_atomics+0x152/0x310 [ 14.878193] kasan_atomics+0x1dc/0x310 [ 14.878212] ? __pfx_kasan_atomics+0x10/0x10 [ 14.878232] ? __pfx_read_tsc+0x10/0x10 [ 14.878251] ? ktime_get_ts64+0x86/0x230 [ 14.878275] kunit_try_run_case+0x1a5/0x480 [ 14.878311] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.878343] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.878381] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.878408] ? __kthread_parkme+0x82/0x180 [ 14.878430] ? preempt_count_sub+0x50/0x80 [ 14.878454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.878476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.878498] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.878520] kthread+0x337/0x6f0 [ 14.878537] ? trace_preempt_on+0x20/0xc0 [ 14.878567] ? __pfx_kthread+0x10/0x10 [ 14.878585] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.878605] ? calculate_sigpending+0x7b/0xa0 [ 14.878644] ? __pfx_kthread+0x10/0x10 [ 14.878665] ret_from_fork+0x41/0x80 [ 14.878684] ? __pfx_kthread+0x10/0x10 [ 14.878703] ret_from_fork_asm+0x1a/0x30 [ 14.878733] </TASK> [ 14.878746] [ 14.888395] Allocated by task 285: [ 14.888816] kasan_save_stack+0x45/0x70 [ 14.889235] kasan_save_track+0x18/0x40 [ 14.889589] kasan_save_alloc_info+0x3b/0x50 [ 14.889871] __kasan_kmalloc+0xb7/0xc0 [ 14.890118] __kmalloc_cache_noprof+0x189/0x420 [ 14.890414] kasan_atomics+0x95/0x310 [ 14.890846] kunit_try_run_case+0x1a5/0x480 [ 14.891200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.891650] kthread+0x337/0x6f0 [ 14.891886] ret_from_fork+0x41/0x80 [ 14.892054] ret_from_fork_asm+0x1a/0x30 [ 14.892205] [ 14.892411] The buggy address belongs to the object at ffff8881029ef680 [ 14.892411] which belongs to the cache kmalloc-64 of size 64 [ 14.893414] The buggy address is located 0 bytes to the right of [ 14.893414] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 14.894707] [ 14.894948] The buggy address belongs to the physical page: [ 14.895388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 14.896201] flags: 0x200000000000000(node=0|zone=2) [ 14.896680] page_type: f5(slab) [ 14.896863] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.897266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.897766] page dumped because: kasan: bad access detected [ 14.898140] [ 14.898330] Memory state around the buggy address: [ 14.898670] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.899042] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.899222] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.899665] ^ [ 14.900055] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.900345] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.900877] ================================================================== [ 16.204980] ================================================================== [ 16.205438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.206020] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.206280] [ 16.206475] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.206569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.206596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.206656] Call Trace: [ 16.206705] <TASK> [ 16.206749] dump_stack_lvl+0x73/0xb0 [ 16.206810] print_report+0xd1/0x650 [ 16.206863] ? __virt_addr_valid+0x1db/0x2d0 [ 16.206912] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.206960] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.207008] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.207055] kasan_report+0x141/0x180 [ 16.207102] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.207158] __asan_report_load8_noabort+0x18/0x20 [ 16.207204] kasan_atomics_helper+0x4f98/0x5450 [ 16.207252] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.207287] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.207317] ? kasan_atomics+0x152/0x310 [ 16.207350] kasan_atomics+0x1dc/0x310 [ 16.207378] ? __pfx_kasan_atomics+0x10/0x10 [ 16.207409] ? __pfx_read_tsc+0x10/0x10 [ 16.207451] ? ktime_get_ts64+0x86/0x230 [ 16.207490] kunit_try_run_case+0x1a5/0x480 [ 16.207532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.207569] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.207613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.207676] ? __kthread_parkme+0x82/0x180 [ 16.207723] ? preempt_count_sub+0x50/0x80 [ 16.207776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.207825] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.207872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.207921] kthread+0x337/0x6f0 [ 16.207959] ? trace_preempt_on+0x20/0xc0 [ 16.208008] ? __pfx_kthread+0x10/0x10 [ 16.208042] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.208088] ? calculate_sigpending+0x7b/0xa0 [ 16.208133] ? __pfx_kthread+0x10/0x10 [ 16.208174] ret_from_fork+0x41/0x80 [ 16.208216] ? __pfx_kthread+0x10/0x10 [ 16.208258] ret_from_fork_asm+0x1a/0x30 [ 16.208325] </TASK> [ 16.208352] [ 16.216660] Allocated by task 285: [ 16.216991] kasan_save_stack+0x45/0x70 [ 16.217441] kasan_save_track+0x18/0x40 [ 16.217809] kasan_save_alloc_info+0x3b/0x50 [ 16.218145] __kasan_kmalloc+0xb7/0xc0 [ 16.218444] __kmalloc_cache_noprof+0x189/0x420 [ 16.218902] kasan_atomics+0x95/0x310 [ 16.219178] kunit_try_run_case+0x1a5/0x480 [ 16.219367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.219572] kthread+0x337/0x6f0 [ 16.219921] ret_from_fork+0x41/0x80 [ 16.220200] ret_from_fork_asm+0x1a/0x30 [ 16.220472] [ 16.220651] The buggy address belongs to the object at ffff8881029ef680 [ 16.220651] which belongs to the cache kmalloc-64 of size 64 [ 16.221110] The buggy address is located 0 bytes to the right of [ 16.221110] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.221718] [ 16.221868] The buggy address belongs to the physical page: [ 16.222247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.222767] flags: 0x200000000000000(node=0|zone=2) [ 16.223116] page_type: f5(slab) [ 16.223289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.223539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.224056] page dumped because: kasan: bad access detected [ 16.224440] [ 16.224600] Memory state around the buggy address: [ 16.224897] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.225179] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.225524] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.225810] ^ [ 16.226017] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.226490] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.227160] ================================================================== [ 15.973687] ================================================================== [ 15.974301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.974718] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.975022] [ 15.975153] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.975227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.975243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.975276] Call Trace: [ 15.975311] <TASK> [ 15.975343] dump_stack_lvl+0x73/0xb0 [ 15.975378] print_report+0xd1/0x650 [ 15.975407] ? __virt_addr_valid+0x1db/0x2d0 [ 15.975435] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.975463] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.975491] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.975513] kasan_report+0x141/0x180 [ 15.975534] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.975576] kasan_check_range+0x10c/0x1c0 [ 15.975613] __kasan_check_write+0x18/0x20 [ 15.975660] kasan_atomics_helper+0x1c18/0x5450 [ 15.975695] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.975731] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.975772] ? kasan_atomics+0x152/0x310 [ 15.975813] kasan_atomics+0x1dc/0x310 [ 15.975851] ? __pfx_kasan_atomics+0x10/0x10 [ 15.975894] ? __pfx_read_tsc+0x10/0x10 [ 15.975933] ? ktime_get_ts64+0x86/0x230 [ 15.975982] kunit_try_run_case+0x1a5/0x480 [ 15.976031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.976071] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.976112] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.976157] ? __kthread_parkme+0x82/0x180 [ 15.976201] ? preempt_count_sub+0x50/0x80 [ 15.976254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.976301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.976349] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.976416] kthread+0x337/0x6f0 [ 15.976462] ? trace_preempt_on+0x20/0xc0 [ 15.976521] ? __pfx_kthread+0x10/0x10 [ 15.976572] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.976615] ? calculate_sigpending+0x7b/0xa0 [ 15.976675] ? __pfx_kthread+0x10/0x10 [ 15.976718] ret_from_fork+0x41/0x80 [ 15.976761] ? __pfx_kthread+0x10/0x10 [ 15.976802] ret_from_fork_asm+0x1a/0x30 [ 15.976864] </TASK> [ 15.976892] [ 15.987362] Allocated by task 285: [ 15.987870] kasan_save_stack+0x45/0x70 [ 15.988431] kasan_save_track+0x18/0x40 [ 15.988775] kasan_save_alloc_info+0x3b/0x50 [ 15.989101] __kasan_kmalloc+0xb7/0xc0 [ 15.989389] __kmalloc_cache_noprof+0x189/0x420 [ 15.989836] kasan_atomics+0x95/0x310 [ 15.990208] kunit_try_run_case+0x1a5/0x480 [ 15.990578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.990921] kthread+0x337/0x6f0 [ 15.991280] ret_from_fork+0x41/0x80 [ 15.991648] ret_from_fork_asm+0x1a/0x30 [ 15.992023] [ 15.992171] The buggy address belongs to the object at ffff8881029ef680 [ 15.992171] which belongs to the cache kmalloc-64 of size 64 [ 15.992980] The buggy address is located 0 bytes to the right of [ 15.992980] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.993582] [ 15.993710] The buggy address belongs to the physical page: [ 15.993906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.994500] flags: 0x200000000000000(node=0|zone=2) [ 15.995055] page_type: f5(slab) [ 15.995580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.995978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.996328] page dumped because: kasan: bad access detected [ 15.996766] [ 15.996969] Memory state around the buggy address: [ 15.997348] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.998018] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.998504] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.998830] ^ [ 15.999082] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.999364] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.999718] ================================================================== [ 16.360148] ================================================================== [ 16.361514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.362267] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.362549] [ 16.362784] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.362909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.362943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.362992] Call Trace: [ 16.363045] <TASK> [ 16.363095] dump_stack_lvl+0x73/0xb0 [ 16.363169] print_report+0xd1/0x650 [ 16.363228] ? __virt_addr_valid+0x1db/0x2d0 [ 16.363280] ? kasan_atomics_helper+0x5115/0x5450 [ 16.363318] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.363355] ? kasan_atomics_helper+0x5115/0x5450 [ 16.363394] kasan_report+0x141/0x180 [ 16.363434] ? kasan_atomics_helper+0x5115/0x5450 [ 16.363489] __asan_report_load8_noabort+0x18/0x20 [ 16.363531] kasan_atomics_helper+0x5115/0x5450 [ 16.363575] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.363634] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.363683] ? kasan_atomics+0x152/0x310 [ 16.363731] kasan_atomics+0x1dc/0x310 [ 16.363775] ? __pfx_kasan_atomics+0x10/0x10 [ 16.363820] ? __pfx_read_tsc+0x10/0x10 [ 16.363862] ? ktime_get_ts64+0x86/0x230 [ 16.363915] kunit_try_run_case+0x1a5/0x480 [ 16.364011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.364059] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.364107] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.364155] ? __kthread_parkme+0x82/0x180 [ 16.364201] ? preempt_count_sub+0x50/0x80 [ 16.364254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.364300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.364342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.364379] kthread+0x337/0x6f0 [ 16.364407] ? trace_preempt_on+0x20/0xc0 [ 16.364447] ? __pfx_kthread+0x10/0x10 [ 16.364482] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.364547] ? calculate_sigpending+0x7b/0xa0 [ 16.364586] ? __pfx_kthread+0x10/0x10 [ 16.364646] ret_from_fork+0x41/0x80 [ 16.364705] ? __pfx_kthread+0x10/0x10 [ 16.364742] ret_from_fork_asm+0x1a/0x30 [ 16.364818] </TASK> [ 16.364845] [ 16.376539] Allocated by task 285: [ 16.376936] kasan_save_stack+0x45/0x70 [ 16.377336] kasan_save_track+0x18/0x40 [ 16.377531] kasan_save_alloc_info+0x3b/0x50 [ 16.377950] __kasan_kmalloc+0xb7/0xc0 [ 16.378174] __kmalloc_cache_noprof+0x189/0x420 [ 16.378494] kasan_atomics+0x95/0x310 [ 16.378784] kunit_try_run_case+0x1a5/0x480 [ 16.379003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.379344] kthread+0x337/0x6f0 [ 16.379599] ret_from_fork+0x41/0x80 [ 16.379854] ret_from_fork_asm+0x1a/0x30 [ 16.380140] [ 16.380308] The buggy address belongs to the object at ffff8881029ef680 [ 16.380308] which belongs to the cache kmalloc-64 of size 64 [ 16.380842] The buggy address is located 0 bytes to the right of [ 16.380842] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.381709] [ 16.381835] The buggy address belongs to the physical page: [ 16.382200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.382814] flags: 0x200000000000000(node=0|zone=2) [ 16.383029] page_type: f5(slab) [ 16.383203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.383698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.384381] page dumped because: kasan: bad access detected [ 16.384661] [ 16.384842] Memory state around the buggy address: [ 16.385159] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.385548] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.385919] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.386247] ^ [ 16.386557] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.386903] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.387289] ================================================================== [ 15.610533] ================================================================== [ 15.611493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.612246] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.612789] [ 15.612994] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.613090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.613117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.613161] Call Trace: [ 15.613209] <TASK> [ 15.613251] dump_stack_lvl+0x73/0xb0 [ 15.613327] print_report+0xd1/0x650 [ 15.613372] ? __virt_addr_valid+0x1db/0x2d0 [ 15.613412] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.613456] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.613515] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.613576] kasan_report+0x141/0x180 [ 15.613633] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.613686] __asan_report_load8_noabort+0x18/0x20 [ 15.613727] kasan_atomics_helper+0x4eae/0x5450 [ 15.613776] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.613826] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.613872] ? kasan_atomics+0x152/0x310 [ 15.613971] kasan_atomics+0x1dc/0x310 [ 15.614019] ? __pfx_kasan_atomics+0x10/0x10 [ 15.614069] ? __pfx_read_tsc+0x10/0x10 [ 15.614113] ? ktime_get_ts64+0x86/0x230 [ 15.614167] kunit_try_run_case+0x1a5/0x480 [ 15.614221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.614268] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.614319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.614371] ? __kthread_parkme+0x82/0x180 [ 15.614419] ? preempt_count_sub+0x50/0x80 [ 15.614474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.614525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.614572] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.614634] kthread+0x337/0x6f0 [ 15.614676] ? trace_preempt_on+0x20/0xc0 [ 15.614730] ? __pfx_kthread+0x10/0x10 [ 15.614773] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.614819] ? calculate_sigpending+0x7b/0xa0 [ 15.614866] ? __pfx_kthread+0x10/0x10 [ 15.614908] ret_from_fork+0x41/0x80 [ 15.614953] ? __pfx_kthread+0x10/0x10 [ 15.614995] ret_from_fork_asm+0x1a/0x30 [ 15.615060] </TASK> [ 15.615087] [ 15.624263] Allocated by task 285: [ 15.624619] kasan_save_stack+0x45/0x70 [ 15.624911] kasan_save_track+0x18/0x40 [ 15.625088] kasan_save_alloc_info+0x3b/0x50 [ 15.625267] __kasan_kmalloc+0xb7/0xc0 [ 15.625433] __kmalloc_cache_noprof+0x189/0x420 [ 15.625643] kasan_atomics+0x95/0x310 [ 15.625808] kunit_try_run_case+0x1a5/0x480 [ 15.625936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.626066] kthread+0x337/0x6f0 [ 15.626143] ret_from_fork+0x41/0x80 [ 15.626225] ret_from_fork_asm+0x1a/0x30 [ 15.626310] [ 15.626359] The buggy address belongs to the object at ffff8881029ef680 [ 15.626359] which belongs to the cache kmalloc-64 of size 64 [ 15.626549] The buggy address is located 0 bytes to the right of [ 15.626549] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.627267] [ 15.627469] The buggy address belongs to the physical page: [ 15.628011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.628654] flags: 0x200000000000000(node=0|zone=2) [ 15.629071] page_type: f5(slab) [ 15.629366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.629975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.630567] page dumped because: kasan: bad access detected [ 15.631011] [ 15.631196] Memory state around the buggy address: [ 15.631587] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.631913] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.632119] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.632608] ^ [ 15.632888] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.633231] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.633602] ================================================================== [ 14.840534] ================================================================== [ 14.841249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.841901] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.842359] [ 14.842918] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.843005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.843030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.843071] Call Trace: [ 14.843132] <TASK> [ 14.843161] dump_stack_lvl+0x73/0xb0 [ 14.843204] print_report+0xd1/0x650 [ 14.843229] ? __virt_addr_valid+0x1db/0x2d0 [ 14.843256] ? kasan_atomics_helper+0x565/0x5450 [ 14.843402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.843447] ? kasan_atomics_helper+0x565/0x5450 [ 14.843482] kasan_report+0x141/0x180 [ 14.843514] ? kasan_atomics_helper+0x565/0x5450 [ 14.843542] kasan_check_range+0x10c/0x1c0 [ 14.843571] __kasan_check_write+0x18/0x20 [ 14.843591] kasan_atomics_helper+0x565/0x5450 [ 14.843615] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.843657] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.843680] ? kasan_atomics+0x152/0x310 [ 14.843703] kasan_atomics+0x1dc/0x310 [ 14.843723] ? __pfx_kasan_atomics+0x10/0x10 [ 14.843743] ? __pfx_read_tsc+0x10/0x10 [ 14.843764] ? ktime_get_ts64+0x86/0x230 [ 14.843789] kunit_try_run_case+0x1a5/0x480 [ 14.843815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.843836] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.843861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.843883] ? __kthread_parkme+0x82/0x180 [ 14.843907] ? preempt_count_sub+0x50/0x80 [ 14.843946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.843969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.843991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.844013] kthread+0x337/0x6f0 [ 14.844031] ? trace_preempt_on+0x20/0xc0 [ 14.844055] ? __pfx_kthread+0x10/0x10 [ 14.844073] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.844095] ? calculate_sigpending+0x7b/0xa0 [ 14.844116] ? __pfx_kthread+0x10/0x10 [ 14.844134] ret_from_fork+0x41/0x80 [ 14.844154] ? __pfx_kthread+0x10/0x10 [ 14.844173] ret_from_fork_asm+0x1a/0x30 [ 14.844204] </TASK> [ 14.844219] [ 14.857031] Allocated by task 285: [ 14.857812] kasan_save_stack+0x45/0x70 [ 14.858209] kasan_save_track+0x18/0x40 [ 14.859270] kasan_save_alloc_info+0x3b/0x50 [ 14.860178] __kasan_kmalloc+0xb7/0xc0 [ 14.860398] __kmalloc_cache_noprof+0x189/0x420 [ 14.860718] kasan_atomics+0x95/0x310 [ 14.860960] kunit_try_run_case+0x1a5/0x480 [ 14.861250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.861929] kthread+0x337/0x6f0 [ 14.862240] ret_from_fork+0x41/0x80 [ 14.862619] ret_from_fork_asm+0x1a/0x30 [ 14.862848] [ 14.862932] The buggy address belongs to the object at ffff8881029ef680 [ 14.862932] which belongs to the cache kmalloc-64 of size 64 [ 14.863213] The buggy address is located 0 bytes to the right of [ 14.863213] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 14.864990] [ 14.865150] The buggy address belongs to the physical page: [ 14.865373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 14.866144] flags: 0x200000000000000(node=0|zone=2) [ 14.866425] page_type: f5(slab) [ 14.866774] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.867973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.868512] page dumped because: kasan: bad access detected [ 14.868883] [ 14.869379] Memory state around the buggy address: [ 14.870197] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.870725] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.871441] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.871889] ^ [ 14.872107] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.873245] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.873927] ================================================================== [ 15.586222] ================================================================== [ 15.587025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.587330] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.587927] [ 15.588136] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.588234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.588260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.588302] Call Trace: [ 15.588347] <TASK> [ 15.588413] dump_stack_lvl+0x73/0xb0 [ 15.588471] print_report+0xd1/0x650 [ 15.588515] ? __virt_addr_valid+0x1db/0x2d0 [ 15.588567] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.588607] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.588684] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.588730] kasan_report+0x141/0x180 [ 15.588773] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.588822] kasan_check_range+0x10c/0x1c0 [ 15.588860] __kasan_check_read+0x15/0x20 [ 15.588900] kasan_atomics_helper+0x13b5/0x5450 [ 15.588965] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.589009] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.589053] ? kasan_atomics+0x152/0x310 [ 15.589100] kasan_atomics+0x1dc/0x310 [ 15.589155] ? __pfx_kasan_atomics+0x10/0x10 [ 15.589201] ? __pfx_read_tsc+0x10/0x10 [ 15.589239] ? ktime_get_ts64+0x86/0x230 [ 15.589282] kunit_try_run_case+0x1a5/0x480 [ 15.589316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.589346] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.589377] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.589407] ? __kthread_parkme+0x82/0x180 [ 15.589443] ? preempt_count_sub+0x50/0x80 [ 15.589485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.589530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.589570] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.589647] kthread+0x337/0x6f0 [ 15.589684] ? trace_preempt_on+0x20/0xc0 [ 15.589730] ? __pfx_kthread+0x10/0x10 [ 15.589765] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.589809] ? calculate_sigpending+0x7b/0xa0 [ 15.589871] ? __pfx_kthread+0x10/0x10 [ 15.589909] ret_from_fork+0x41/0x80 [ 15.589960] ? __pfx_kthread+0x10/0x10 [ 15.589999] ret_from_fork_asm+0x1a/0x30 [ 15.590042] </TASK> [ 15.590057] [ 15.599298] Allocated by task 285: [ 15.599539] kasan_save_stack+0x45/0x70 [ 15.599854] kasan_save_track+0x18/0x40 [ 15.600163] kasan_save_alloc_info+0x3b/0x50 [ 15.600485] __kasan_kmalloc+0xb7/0xc0 [ 15.600902] __kmalloc_cache_noprof+0x189/0x420 [ 15.601240] kasan_atomics+0x95/0x310 [ 15.601453] kunit_try_run_case+0x1a5/0x480 [ 15.601647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.601856] kthread+0x337/0x6f0 [ 15.602022] ret_from_fork+0x41/0x80 [ 15.602196] ret_from_fork_asm+0x1a/0x30 [ 15.602419] [ 15.602569] The buggy address belongs to the object at ffff8881029ef680 [ 15.602569] which belongs to the cache kmalloc-64 of size 64 [ 15.603569] The buggy address is located 0 bytes to the right of [ 15.603569] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.604408] [ 15.604573] The buggy address belongs to the physical page: [ 15.604964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.605355] flags: 0x200000000000000(node=0|zone=2) [ 15.605778] page_type: f5(slab) [ 15.605988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.606375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.606892] page dumped because: kasan: bad access detected [ 15.607117] [ 15.607222] Memory state around the buggy address: [ 15.607417] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.607817] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.608300] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.608849] ^ [ 15.609124] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.609443] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.609699] ================================================================== [ 14.927809] ================================================================== [ 14.928403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.929069] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.929642] [ 14.929912] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.930045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.930073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.930121] Call Trace: [ 14.930168] <TASK> [ 14.930210] dump_stack_lvl+0x73/0xb0 [ 14.930274] print_report+0xd1/0x650 [ 14.930353] ? __virt_addr_valid+0x1db/0x2d0 [ 14.930404] ? kasan_atomics_helper+0x72f/0x5450 [ 14.930450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.930498] ? kasan_atomics_helper+0x72f/0x5450 [ 14.930568] kasan_report+0x141/0x180 [ 14.930620] ? kasan_atomics_helper+0x72f/0x5450 [ 14.930690] kasan_check_range+0x10c/0x1c0 [ 14.930727] __kasan_check_write+0x18/0x20 [ 14.930763] kasan_atomics_helper+0x72f/0x5450 [ 14.930807] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.930847] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.930933] ? kasan_atomics+0x152/0x310 [ 14.930998] kasan_atomics+0x1dc/0x310 [ 14.931059] ? __pfx_kasan_atomics+0x10/0x10 [ 14.931098] ? __pfx_read_tsc+0x10/0x10 [ 14.931145] ? ktime_get_ts64+0x86/0x230 [ 14.931188] kunit_try_run_case+0x1a5/0x480 [ 14.931235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.931270] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.931313] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.931361] ? __kthread_parkme+0x82/0x180 [ 14.931401] ? preempt_count_sub+0x50/0x80 [ 14.931446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.931493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.931553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.931604] kthread+0x337/0x6f0 [ 14.931657] ? trace_preempt_on+0x20/0xc0 [ 14.931704] ? __pfx_kthread+0x10/0x10 [ 14.931744] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.931787] ? calculate_sigpending+0x7b/0xa0 [ 14.931831] ? __pfx_kthread+0x10/0x10 [ 14.931872] ret_from_fork+0x41/0x80 [ 14.931913] ? __pfx_kthread+0x10/0x10 [ 14.931954] ret_from_fork_asm+0x1a/0x30 [ 14.932017] </TASK> [ 14.932044] [ 14.941256] Allocated by task 285: [ 14.941656] kasan_save_stack+0x45/0x70 [ 14.942048] kasan_save_track+0x18/0x40 [ 14.942422] kasan_save_alloc_info+0x3b/0x50 [ 14.942885] __kasan_kmalloc+0xb7/0xc0 [ 14.943054] __kmalloc_cache_noprof+0x189/0x420 [ 14.943221] kasan_atomics+0x95/0x310 [ 14.943386] kunit_try_run_case+0x1a5/0x480 [ 14.943603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.944992] kthread+0x337/0x6f0 [ 14.945290] ret_from_fork+0x41/0x80 [ 14.947247] ret_from_fork_asm+0x1a/0x30 [ 14.947898] [ 14.948115] The buggy address belongs to the object at ffff8881029ef680 [ 14.948115] which belongs to the cache kmalloc-64 of size 64 [ 14.950141] The buggy address is located 0 bytes to the right of [ 14.950141] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 14.950926] [ 14.951036] The buggy address belongs to the physical page: [ 14.951218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 14.951718] flags: 0x200000000000000(node=0|zone=2) [ 14.951937] page_type: f5(slab) [ 14.952193] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.952770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.953195] page dumped because: kasan: bad access detected [ 14.953758] [ 14.953997] Memory state around the buggy address: [ 14.954423] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.954980] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.955718] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.956169] ^ [ 14.956541] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.957138] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.957687] ================================================================== [ 15.871268] ================================================================== [ 15.871825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.872329] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.874795] [ 15.874982] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.875837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.875890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.875927] Call Trace: [ 15.875980] <TASK> [ 15.876016] dump_stack_lvl+0x73/0xb0 [ 15.876080] print_report+0xd1/0x650 [ 15.876105] ? __virt_addr_valid+0x1db/0x2d0 [ 15.876128] ? kasan_atomics_helper+0x194a/0x5450 [ 15.876148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.876171] ? kasan_atomics_helper+0x194a/0x5450 [ 15.876192] kasan_report+0x141/0x180 [ 15.876213] ? kasan_atomics_helper+0x194a/0x5450 [ 15.876238] kasan_check_range+0x10c/0x1c0 [ 15.876261] __kasan_check_write+0x18/0x20 [ 15.876280] kasan_atomics_helper+0x194a/0x5450 [ 15.876302] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.876323] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.876344] ? kasan_atomics+0x152/0x310 [ 15.876368] kasan_atomics+0x1dc/0x310 [ 15.876387] ? __pfx_kasan_atomics+0x10/0x10 [ 15.876408] ? __pfx_read_tsc+0x10/0x10 [ 15.876427] ? ktime_get_ts64+0x86/0x230 [ 15.876452] kunit_try_run_case+0x1a5/0x480 [ 15.876475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.876496] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.876520] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.876547] ? __kthread_parkme+0x82/0x180 [ 15.876579] ? preempt_count_sub+0x50/0x80 [ 15.876617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.876669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.876703] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.876736] kthread+0x337/0x6f0 [ 15.876766] ? trace_preempt_on+0x20/0xc0 [ 15.876807] ? __pfx_kthread+0x10/0x10 [ 15.876843] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.876894] ? calculate_sigpending+0x7b/0xa0 [ 15.876941] ? __pfx_kthread+0x10/0x10 [ 15.876979] ret_from_fork+0x41/0x80 [ 15.877020] ? __pfx_kthread+0x10/0x10 [ 15.877059] ret_from_fork_asm+0x1a/0x30 [ 15.877124] </TASK> [ 15.877152] [ 15.886349] Allocated by task 285: [ 15.886683] kasan_save_stack+0x45/0x70 [ 15.887068] kasan_save_track+0x18/0x40 [ 15.887433] kasan_save_alloc_info+0x3b/0x50 [ 15.887852] __kasan_kmalloc+0xb7/0xc0 [ 15.888204] __kmalloc_cache_noprof+0x189/0x420 [ 15.888580] kasan_atomics+0x95/0x310 [ 15.888936] kunit_try_run_case+0x1a5/0x480 [ 15.889296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.889804] kthread+0x337/0x6f0 [ 15.889955] ret_from_fork+0x41/0x80 [ 15.890240] ret_from_fork_asm+0x1a/0x30 [ 15.890685] [ 15.891074] The buggy address belongs to the object at ffff8881029ef680 [ 15.891074] which belongs to the cache kmalloc-64 of size 64 [ 15.891900] The buggy address is located 0 bytes to the right of [ 15.891900] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.892656] [ 15.893104] The buggy address belongs to the physical page: [ 15.893406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.894010] flags: 0x200000000000000(node=0|zone=2) [ 15.894188] page_type: f5(slab) [ 15.894788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.895211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.895520] page dumped because: kasan: bad access detected [ 15.896035] [ 15.896149] Memory state around the buggy address: [ 15.896503] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.896786] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.897361] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.898027] ^ [ 15.898353] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.898579] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.899022] ================================================================== [ 14.776698] ================================================================== [ 14.777259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.777822] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.778489] [ 14.778770] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.778873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.778913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.778960] Call Trace: [ 14.779017] <TASK> [ 14.779057] dump_stack_lvl+0x73/0xb0 [ 14.779117] print_report+0xd1/0x650 [ 14.779165] ? __virt_addr_valid+0x1db/0x2d0 [ 14.779209] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.779254] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.779419] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.779460] kasan_report+0x141/0x180 [ 14.779487] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.779514] kasan_check_range+0x10c/0x1c0 [ 14.779536] __kasan_check_write+0x18/0x20 [ 14.779556] kasan_atomics_helper+0x4a0/0x5450 [ 14.779579] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.779601] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.779656] ? kasan_atomics+0x152/0x310 [ 14.779682] kasan_atomics+0x1dc/0x310 [ 14.779702] ? __pfx_kasan_atomics+0x10/0x10 [ 14.779724] ? __pfx_read_tsc+0x10/0x10 [ 14.779745] ? ktime_get_ts64+0x86/0x230 [ 14.779770] kunit_try_run_case+0x1a5/0x480 [ 14.779797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.779818] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.779843] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.779866] ? __kthread_parkme+0x82/0x180 [ 14.779890] ? preempt_count_sub+0x50/0x80 [ 14.779915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.779938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.779960] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.779985] kthread+0x337/0x6f0 [ 14.780002] ? trace_preempt_on+0x20/0xc0 [ 14.780026] ? __pfx_kthread+0x10/0x10 [ 14.780045] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.780066] ? calculate_sigpending+0x7b/0xa0 [ 14.780088] ? __pfx_kthread+0x10/0x10 [ 14.780107] ret_from_fork+0x41/0x80 [ 14.780127] ? __pfx_kthread+0x10/0x10 [ 14.780145] ret_from_fork_asm+0x1a/0x30 [ 14.780177] </TASK> [ 14.780191] [ 14.792881] Allocated by task 285: [ 14.793266] kasan_save_stack+0x45/0x70 [ 14.793799] kasan_save_track+0x18/0x40 [ 14.794164] kasan_save_alloc_info+0x3b/0x50 [ 14.794679] __kasan_kmalloc+0xb7/0xc0 [ 14.795024] __kmalloc_cache_noprof+0x189/0x420 [ 14.795905] kasan_atomics+0x95/0x310 [ 14.796279] kunit_try_run_case+0x1a5/0x480 [ 14.796571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.797024] kthread+0x337/0x6f0 [ 14.797334] ret_from_fork+0x41/0x80 [ 14.797648] ret_from_fork_asm+0x1a/0x30 [ 14.797807] [ 14.797961] The buggy address belongs to the object at ffff8881029ef680 [ 14.797961] which belongs to the cache kmalloc-64 of size 64 [ 14.798603] The buggy address is located 0 bytes to the right of [ 14.798603] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 14.799695] [ 14.799990] The buggy address belongs to the physical page: [ 14.800293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 14.800956] flags: 0x200000000000000(node=0|zone=2) [ 14.801230] page_type: f5(slab) [ 14.801497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.802803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.803056] page dumped because: kasan: bad access detected [ 14.803442] [ 14.804048] Memory state around the buggy address: [ 14.804327] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.804572] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.805020] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.805448] ^ [ 14.805935] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.806474] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.806749] ================================================================== [ 14.901987] ================================================================== [ 14.902476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.902881] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.903393] [ 14.903656] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.903767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.903795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.903838] Call Trace: [ 14.903885] <TASK> [ 14.903969] dump_stack_lvl+0x73/0xb0 [ 14.904038] print_report+0xd1/0x650 [ 14.904079] ? __virt_addr_valid+0x1db/0x2d0 [ 14.904124] ? kasan_atomics_helper+0x697/0x5450 [ 14.904156] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.904187] ? kasan_atomics_helper+0x697/0x5450 [ 14.904219] kasan_report+0x141/0x180 [ 14.904298] ? kasan_atomics_helper+0x697/0x5450 [ 14.904344] kasan_check_range+0x10c/0x1c0 [ 14.904381] __kasan_check_write+0x18/0x20 [ 14.904419] kasan_atomics_helper+0x697/0x5450 [ 14.904496] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.904534] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.904592] ? kasan_atomics+0x152/0x310 [ 14.904645] kasan_atomics+0x1dc/0x310 [ 14.904677] ? __pfx_kasan_atomics+0x10/0x10 [ 14.904708] ? __pfx_read_tsc+0x10/0x10 [ 14.904736] ? ktime_get_ts64+0x86/0x230 [ 14.904773] kunit_try_run_case+0x1a5/0x480 [ 14.904810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.904840] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.904872] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.904902] ? __kthread_parkme+0x82/0x180 [ 14.904932] ? preempt_count_sub+0x50/0x80 [ 14.904965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.904998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.905031] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.905063] kthread+0x337/0x6f0 [ 14.905090] ? trace_preempt_on+0x20/0xc0 [ 14.905134] ? __pfx_kthread+0x10/0x10 [ 14.905169] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.905207] ? calculate_sigpending+0x7b/0xa0 [ 14.905248] ? __pfx_kthread+0x10/0x10 [ 14.905307] ret_from_fork+0x41/0x80 [ 14.905344] ? __pfx_kthread+0x10/0x10 [ 14.905377] ret_from_fork_asm+0x1a/0x30 [ 14.905434] </TASK> [ 14.905460] [ 14.916541] Allocated by task 285: [ 14.916916] kasan_save_stack+0x45/0x70 [ 14.917270] kasan_save_track+0x18/0x40 [ 14.917552] kasan_save_alloc_info+0x3b/0x50 [ 14.917980] __kasan_kmalloc+0xb7/0xc0 [ 14.918293] __kmalloc_cache_noprof+0x189/0x420 [ 14.918751] kasan_atomics+0x95/0x310 [ 14.918987] kunit_try_run_case+0x1a5/0x480 [ 14.919344] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.919525] kthread+0x337/0x6f0 [ 14.919669] ret_from_fork+0x41/0x80 [ 14.919783] ret_from_fork_asm+0x1a/0x30 [ 14.919902] [ 14.919974] The buggy address belongs to the object at ffff8881029ef680 [ 14.919974] which belongs to the cache kmalloc-64 of size 64 [ 14.920443] The buggy address is located 0 bytes to the right of [ 14.920443] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 14.921330] [ 14.921517] The buggy address belongs to the physical page: [ 14.921962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 14.922439] flags: 0x200000000000000(node=0|zone=2) [ 14.922941] page_type: f5(slab) [ 14.923187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.923725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.924153] page dumped because: kasan: bad access detected [ 14.924659] [ 14.924822] Memory state around the buggy address: [ 14.925182] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.925585] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.926111] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.926589] ^ [ 14.926754] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.926920] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.927081] ================================================================== [ 15.348687] ================================================================== [ 15.349256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.349692] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.350308] [ 15.350453] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.350565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.350587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.350636] Call Trace: [ 15.350677] <TASK> [ 15.350712] dump_stack_lvl+0x73/0xb0 [ 15.350761] print_report+0xd1/0x650 [ 15.350797] ? __virt_addr_valid+0x1db/0x2d0 [ 15.350831] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.350882] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.350918] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.350950] kasan_report+0x141/0x180 [ 15.350982] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.351022] __asan_report_load4_noabort+0x18/0x20 [ 15.351056] kasan_atomics_helper+0x4a36/0x5450 [ 15.351088] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.351121] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.351154] ? kasan_atomics+0x152/0x310 [ 15.351189] kasan_atomics+0x1dc/0x310 [ 15.351222] ? __pfx_kasan_atomics+0x10/0x10 [ 15.351257] ? __pfx_read_tsc+0x10/0x10 [ 15.351316] ? ktime_get_ts64+0x86/0x230 [ 15.351358] kunit_try_run_case+0x1a5/0x480 [ 15.351401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.351442] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.351513] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.351593] ? __kthread_parkme+0x82/0x180 [ 15.351650] ? preempt_count_sub+0x50/0x80 [ 15.351701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.351758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.351819] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.351856] kthread+0x337/0x6f0 [ 15.351905] ? trace_preempt_on+0x20/0xc0 [ 15.351947] ? __pfx_kthread+0x10/0x10 [ 15.351990] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.352022] ? calculate_sigpending+0x7b/0xa0 [ 15.352270] ? __pfx_kthread+0x10/0x10 [ 15.352301] ret_from_fork+0x41/0x80 [ 15.352324] ? __pfx_kthread+0x10/0x10 [ 15.352343] ret_from_fork_asm+0x1a/0x30 [ 15.352375] </TASK> [ 15.352389] [ 15.362246] Allocated by task 285: [ 15.362657] kasan_save_stack+0x45/0x70 [ 15.363004] kasan_save_track+0x18/0x40 [ 15.363303] kasan_save_alloc_info+0x3b/0x50 [ 15.363729] __kasan_kmalloc+0xb7/0xc0 [ 15.364106] __kmalloc_cache_noprof+0x189/0x420 [ 15.364392] kasan_atomics+0x95/0x310 [ 15.364598] kunit_try_run_case+0x1a5/0x480 [ 15.364800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.365011] kthread+0x337/0x6f0 [ 15.365152] ret_from_fork+0x41/0x80 [ 15.365464] ret_from_fork_asm+0x1a/0x30 [ 15.365824] [ 15.365995] The buggy address belongs to the object at ffff8881029ef680 [ 15.365995] which belongs to the cache kmalloc-64 of size 64 [ 15.366897] The buggy address is located 0 bytes to the right of [ 15.366897] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.367733] [ 15.367948] The buggy address belongs to the physical page: [ 15.368295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.368778] flags: 0x200000000000000(node=0|zone=2) [ 15.369108] page_type: f5(slab) [ 15.369443] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.369954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.370338] page dumped because: kasan: bad access detected [ 15.370649] [ 15.370861] Memory state around the buggy address: [ 15.371225] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.371658] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.371962] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.372410] ^ [ 15.372771] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.373160] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.373563] ================================================================== [ 15.531562] ================================================================== [ 15.532087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.532607] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.532997] [ 15.533213] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.533312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.533337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.533378] Call Trace: [ 15.533433] <TASK> [ 15.533474] dump_stack_lvl+0x73/0xb0 [ 15.533547] print_report+0xd1/0x650 [ 15.533587] ? __virt_addr_valid+0x1db/0x2d0 [ 15.533642] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.533692] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.533738] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.533794] kasan_report+0x141/0x180 [ 15.533835] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.533884] kasan_check_range+0x10c/0x1c0 [ 15.533984] __kasan_check_write+0x18/0x20 [ 15.534028] kasan_atomics_helper+0x12e6/0x5450 [ 15.534095] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.534139] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.534185] ? kasan_atomics+0x152/0x310 [ 15.534239] kasan_atomics+0x1dc/0x310 [ 15.534284] ? __pfx_kasan_atomics+0x10/0x10 [ 15.534330] ? __pfx_read_tsc+0x10/0x10 [ 15.534378] ? ktime_get_ts64+0x86/0x230 [ 15.534430] kunit_try_run_case+0x1a5/0x480 [ 15.534501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.534546] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.534591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.534655] ? __kthread_parkme+0x82/0x180 [ 15.534705] ? preempt_count_sub+0x50/0x80 [ 15.534750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.534795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.534843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.534899] kthread+0x337/0x6f0 [ 15.534951] ? trace_preempt_on+0x20/0xc0 [ 15.534999] ? __pfx_kthread+0x10/0x10 [ 15.535038] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.535092] ? calculate_sigpending+0x7b/0xa0 [ 15.535140] ? __pfx_kthread+0x10/0x10 [ 15.535193] ret_from_fork+0x41/0x80 [ 15.535231] ? __pfx_kthread+0x10/0x10 [ 15.535261] ret_from_fork_asm+0x1a/0x30 [ 15.535293] </TASK> [ 15.535308] [ 15.544453] Allocated by task 285: [ 15.544803] kasan_save_stack+0x45/0x70 [ 15.545194] kasan_save_track+0x18/0x40 [ 15.545455] kasan_save_alloc_info+0x3b/0x50 [ 15.545917] __kasan_kmalloc+0xb7/0xc0 [ 15.546139] __kmalloc_cache_noprof+0x189/0x420 [ 15.546328] kasan_atomics+0x95/0x310 [ 15.546491] kunit_try_run_case+0x1a5/0x480 [ 15.546681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.547068] kthread+0x337/0x6f0 [ 15.547330] ret_from_fork+0x41/0x80 [ 15.547616] ret_from_fork_asm+0x1a/0x30 [ 15.547948] [ 15.548107] The buggy address belongs to the object at ffff8881029ef680 [ 15.548107] which belongs to the cache kmalloc-64 of size 64 [ 15.548938] The buggy address is located 0 bytes to the right of [ 15.548938] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.549545] [ 15.549745] The buggy address belongs to the physical page: [ 15.550036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.550428] flags: 0x200000000000000(node=0|zone=2) [ 15.550807] page_type: f5(slab) [ 15.551056] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.551453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.553263] page dumped because: kasan: bad access detected [ 15.553719] [ 15.553831] Memory state around the buggy address: [ 15.554081] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.554419] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.554768] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.555773] ^ [ 15.555957] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.556504] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.556825] ================================================================== [ 15.739247] ================================================================== [ 15.739912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.740505] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.741035] [ 15.741283] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.741423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.741453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.741495] Call Trace: [ 15.741540] <TASK> [ 15.741598] dump_stack_lvl+0x73/0xb0 [ 15.741673] print_report+0xd1/0x650 [ 15.741745] ? __virt_addr_valid+0x1db/0x2d0 [ 15.741788] ? kasan_atomics_helper+0x164f/0x5450 [ 15.741845] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.741909] ? kasan_atomics_helper+0x164f/0x5450 [ 15.741976] kasan_report+0x141/0x180 [ 15.742027] ? kasan_atomics_helper+0x164f/0x5450 [ 15.742088] kasan_check_range+0x10c/0x1c0 [ 15.742136] __kasan_check_write+0x18/0x20 [ 15.742179] kasan_atomics_helper+0x164f/0x5450 [ 15.742228] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.742276] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.742323] ? kasan_atomics+0x152/0x310 [ 15.742372] kasan_atomics+0x1dc/0x310 [ 15.742414] ? __pfx_kasan_atomics+0x10/0x10 [ 15.742458] ? __pfx_read_tsc+0x10/0x10 [ 15.742500] ? ktime_get_ts64+0x86/0x230 [ 15.742550] kunit_try_run_case+0x1a5/0x480 [ 15.742601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.742656] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.742704] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.742749] ? __kthread_parkme+0x82/0x180 [ 15.742797] ? preempt_count_sub+0x50/0x80 [ 15.742850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.742893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.742932] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.742975] kthread+0x337/0x6f0 [ 15.743012] ? trace_preempt_on+0x20/0xc0 [ 15.743057] ? __pfx_kthread+0x10/0x10 [ 15.743097] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.743141] ? calculate_sigpending+0x7b/0xa0 [ 15.743186] ? __pfx_kthread+0x10/0x10 [ 15.743227] ret_from_fork+0x41/0x80 [ 15.743268] ? __pfx_kthread+0x10/0x10 [ 15.743307] ret_from_fork_asm+0x1a/0x30 [ 15.743372] </TASK> [ 15.743401] [ 15.753356] Allocated by task 285: [ 15.753808] kasan_save_stack+0x45/0x70 [ 15.754248] kasan_save_track+0x18/0x40 [ 15.754474] kasan_save_alloc_info+0x3b/0x50 [ 15.754877] __kasan_kmalloc+0xb7/0xc0 [ 15.755135] __kmalloc_cache_noprof+0x189/0x420 [ 15.755467] kasan_atomics+0x95/0x310 [ 15.755829] kunit_try_run_case+0x1a5/0x480 [ 15.756118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.756310] kthread+0x337/0x6f0 [ 15.756466] ret_from_fork+0x41/0x80 [ 15.756637] ret_from_fork_asm+0x1a/0x30 [ 15.756815] [ 15.756920] The buggy address belongs to the object at ffff8881029ef680 [ 15.756920] which belongs to the cache kmalloc-64 of size 64 [ 15.757428] The buggy address is located 0 bytes to the right of [ 15.757428] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.758265] [ 15.758439] The buggy address belongs to the physical page: [ 15.758999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.759534] flags: 0x200000000000000(node=0|zone=2) [ 15.759967] page_type: f5(slab) [ 15.760211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.760643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.761019] page dumped because: kasan: bad access detected [ 15.761263] [ 15.761466] Memory state around the buggy address: [ 15.761923] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.762336] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.762803] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.763064] ^ [ 15.763253] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.763485] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.763972] ================================================================== [ 14.623820] ================================================================== [ 14.624207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.625513] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.625827] [ 14.625975] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.626065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.626090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.626128] Call Trace: [ 14.626169] <TASK> [ 14.626208] dump_stack_lvl+0x73/0xb0 [ 14.626272] print_report+0xd1/0x650 [ 14.626313] ? __virt_addr_valid+0x1db/0x2d0 [ 14.626346] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.626387] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.626423] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.626460] kasan_report+0x141/0x180 [ 14.626496] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.626540] __asan_report_store4_noabort+0x1b/0x30 [ 14.626576] kasan_atomics_helper+0x4ba2/0x5450 [ 14.626618] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.626674] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.626712] ? kasan_atomics+0x152/0x310 [ 14.626755] kasan_atomics+0x1dc/0x310 [ 14.626790] ? __pfx_kasan_atomics+0x10/0x10 [ 14.626833] ? __pfx_read_tsc+0x10/0x10 [ 14.626872] ? ktime_get_ts64+0x86/0x230 [ 14.626920] kunit_try_run_case+0x1a5/0x480 [ 14.626960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.626983] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.627006] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.627029] ? __kthread_parkme+0x82/0x180 [ 14.627050] ? preempt_count_sub+0x50/0x80 [ 14.627075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.627097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.627119] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.627140] kthread+0x337/0x6f0 [ 14.627157] ? trace_preempt_on+0x20/0xc0 [ 14.627180] ? __pfx_kthread+0x10/0x10 [ 14.627198] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.627218] ? calculate_sigpending+0x7b/0xa0 [ 14.627238] ? __pfx_kthread+0x10/0x10 [ 14.627255] ret_from_fork+0x41/0x80 [ 14.627274] ? __pfx_kthread+0x10/0x10 [ 14.627291] ret_from_fork_asm+0x1a/0x30 [ 14.627320] </TASK> [ 14.627332] [ 14.637586] Allocated by task 285: [ 14.637912] kasan_save_stack+0x45/0x70 [ 14.638150] kasan_save_track+0x18/0x40 [ 14.638423] kasan_save_alloc_info+0x3b/0x50 [ 14.638755] __kasan_kmalloc+0xb7/0xc0 [ 14.639041] __kmalloc_cache_noprof+0x189/0x420 [ 14.639361] kasan_atomics+0x95/0x310 [ 14.639618] kunit_try_run_case+0x1a5/0x480 [ 14.639922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.640130] kthread+0x337/0x6f0 [ 14.640283] ret_from_fork+0x41/0x80 [ 14.640547] ret_from_fork_asm+0x1a/0x30 [ 14.641678] [ 14.641898] The buggy address belongs to the object at ffff8881029ef680 [ 14.641898] which belongs to the cache kmalloc-64 of size 64 [ 14.642920] The buggy address is located 0 bytes to the right of [ 14.642920] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 14.643306] [ 14.643417] The buggy address belongs to the physical page: [ 14.643613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 14.644149] flags: 0x200000000000000(node=0|zone=2) [ 14.644473] page_type: f5(slab) [ 14.644803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.645297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.645800] page dumped because: kasan: bad access detected [ 14.646062] [ 14.646161] Memory state around the buggy address: [ 14.646345] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.646577] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.646847] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.647406] ^ [ 14.647880] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.648346] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.648799] ================================================================== [ 15.238450] ================================================================== [ 15.238872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.239131] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.239863] [ 15.240012] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.240095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.240119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.240161] Call Trace: [ 15.240203] <TASK> [ 15.240242] dump_stack_lvl+0x73/0xb0 [ 15.240300] print_report+0xd1/0x650 [ 15.240341] ? __virt_addr_valid+0x1db/0x2d0 [ 15.240382] ? kasan_atomics_helper+0xde0/0x5450 [ 15.240423] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.240464] ? kasan_atomics_helper+0xde0/0x5450 [ 15.240507] kasan_report+0x141/0x180 [ 15.240943] ? kasan_atomics_helper+0xde0/0x5450 [ 15.240998] kasan_check_range+0x10c/0x1c0 [ 15.241022] __kasan_check_write+0x18/0x20 [ 15.241043] kasan_atomics_helper+0xde0/0x5450 [ 15.241065] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.241087] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.241109] ? kasan_atomics+0x152/0x310 [ 15.241131] kasan_atomics+0x1dc/0x310 [ 15.241150] ? __pfx_kasan_atomics+0x10/0x10 [ 15.241171] ? __pfx_read_tsc+0x10/0x10 [ 15.241191] ? ktime_get_ts64+0x86/0x230 [ 15.241216] kunit_try_run_case+0x1a5/0x480 [ 15.241242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.241263] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.241287] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.241309] ? __kthread_parkme+0x82/0x180 [ 15.241331] ? preempt_count_sub+0x50/0x80 [ 15.241356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.241379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.241401] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.241423] kthread+0x337/0x6f0 [ 15.241440] ? trace_preempt_on+0x20/0xc0 [ 15.241463] ? __pfx_kthread+0x10/0x10 [ 15.241481] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.241502] ? calculate_sigpending+0x7b/0xa0 [ 15.241523] ? __pfx_kthread+0x10/0x10 [ 15.241545] ret_from_fork+0x41/0x80 [ 15.241574] ? __pfx_kthread+0x10/0x10 [ 15.241592] ret_from_fork_asm+0x1a/0x30 [ 15.241637] </TASK> [ 15.241656] [ 15.253504] Allocated by task 285: [ 15.253857] kasan_save_stack+0x45/0x70 [ 15.254173] kasan_save_track+0x18/0x40 [ 15.254433] kasan_save_alloc_info+0x3b/0x50 [ 15.255079] __kasan_kmalloc+0xb7/0xc0 [ 15.255246] __kmalloc_cache_noprof+0x189/0x420 [ 15.255465] kasan_atomics+0x95/0x310 [ 15.256077] kunit_try_run_case+0x1a5/0x480 [ 15.256506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.256881] kthread+0x337/0x6f0 [ 15.257027] ret_from_fork+0x41/0x80 [ 15.257398] ret_from_fork_asm+0x1a/0x30 [ 15.257824] [ 15.257971] The buggy address belongs to the object at ffff8881029ef680 [ 15.257971] which belongs to the cache kmalloc-64 of size 64 [ 15.258558] The buggy address is located 0 bytes to the right of [ 15.258558] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.259335] [ 15.259697] The buggy address belongs to the physical page: [ 15.260113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.260649] flags: 0x200000000000000(node=0|zone=2) [ 15.261059] page_type: f5(slab) [ 15.261299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.261634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.262214] page dumped because: kasan: bad access detected [ 15.262708] [ 15.262927] Memory state around the buggy address: [ 15.263107] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.263524] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.264059] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.264620] ^ [ 15.264982] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.265410] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.265885] ================================================================== [ 15.823720] ================================================================== [ 15.824161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.824671] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.825044] [ 15.825239] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.825338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.825363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.825407] Call Trace: [ 15.825453] <TASK> [ 15.825495] dump_stack_lvl+0x73/0xb0 [ 15.825570] print_report+0xd1/0x650 [ 15.825619] ? __virt_addr_valid+0x1db/0x2d0 [ 15.825674] ? kasan_atomics_helper+0x1818/0x5450 [ 15.825718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.825761] ? kasan_atomics_helper+0x1818/0x5450 [ 15.825798] kasan_report+0x141/0x180 [ 15.825842] ? kasan_atomics_helper+0x1818/0x5450 [ 15.825895] kasan_check_range+0x10c/0x1c0 [ 15.825940] __kasan_check_write+0x18/0x20 [ 15.825993] kasan_atomics_helper+0x1818/0x5450 [ 15.826035] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.826088] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.826112] ? kasan_atomics+0x152/0x310 [ 15.826142] kasan_atomics+0x1dc/0x310 [ 15.826167] ? __pfx_kasan_atomics+0x10/0x10 [ 15.826188] ? __pfx_read_tsc+0x10/0x10 [ 15.826209] ? ktime_get_ts64+0x86/0x230 [ 15.826235] kunit_try_run_case+0x1a5/0x480 [ 15.826260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.826281] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.826307] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.826330] ? __kthread_parkme+0x82/0x180 [ 15.826352] ? preempt_count_sub+0x50/0x80 [ 15.826377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.826400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.826423] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.826445] kthread+0x337/0x6f0 [ 15.826463] ? trace_preempt_on+0x20/0xc0 [ 15.826487] ? __pfx_kthread+0x10/0x10 [ 15.826506] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.826527] ? calculate_sigpending+0x7b/0xa0 [ 15.826567] ? __pfx_kthread+0x10/0x10 [ 15.826588] ret_from_fork+0x41/0x80 [ 15.826609] ? __pfx_kthread+0x10/0x10 [ 15.826646] ret_from_fork_asm+0x1a/0x30 [ 15.826681] </TASK> [ 15.826695] [ 15.836535] Allocated by task 285: [ 15.836938] kasan_save_stack+0x45/0x70 [ 15.837302] kasan_save_track+0x18/0x40 [ 15.837665] kasan_save_alloc_info+0x3b/0x50 [ 15.838057] __kasan_kmalloc+0xb7/0xc0 [ 15.838376] __kmalloc_cache_noprof+0x189/0x420 [ 15.838665] kasan_atomics+0x95/0x310 [ 15.838851] kunit_try_run_case+0x1a5/0x480 [ 15.839211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.839663] kthread+0x337/0x6f0 [ 15.839851] ret_from_fork+0x41/0x80 [ 15.840030] ret_from_fork_asm+0x1a/0x30 [ 15.840213] [ 15.840337] The buggy address belongs to the object at ffff8881029ef680 [ 15.840337] which belongs to the cache kmalloc-64 of size 64 [ 15.841024] The buggy address is located 0 bytes to the right of [ 15.841024] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.841504] [ 15.841615] The buggy address belongs to the physical page: [ 15.842850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.843272] flags: 0x200000000000000(node=0|zone=2) [ 15.843586] page_type: f5(slab) [ 15.844026] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.844482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.844747] page dumped because: kasan: bad access detected [ 15.845091] [ 15.845282] Memory state around the buggy address: [ 15.845733] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.846095] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.846436] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.846879] ^ [ 15.847082] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.847357] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.847784] ================================================================== [ 15.848817] ================================================================== [ 15.849259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.849806] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.850079] [ 15.850257] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.850353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.850377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.850417] Call Trace: [ 15.850460] <TASK> [ 15.850500] dump_stack_lvl+0x73/0xb0 [ 15.850593] print_report+0xd1/0x650 [ 15.850655] ? __virt_addr_valid+0x1db/0x2d0 [ 15.850695] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.850735] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.850775] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.850819] kasan_report+0x141/0x180 [ 15.850865] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.850920] kasan_check_range+0x10c/0x1c0 [ 15.850960] __kasan_check_write+0x18/0x20 [ 15.850996] kasan_atomics_helper+0x18b1/0x5450 [ 15.851036] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.851083] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.851130] ? kasan_atomics+0x152/0x310 [ 15.851178] kasan_atomics+0x1dc/0x310 [ 15.851222] ? __pfx_kasan_atomics+0x10/0x10 [ 15.851268] ? __pfx_read_tsc+0x10/0x10 [ 15.851311] ? ktime_get_ts64+0x86/0x230 [ 15.851363] kunit_try_run_case+0x1a5/0x480 [ 15.851413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.851459] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.851507] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.851552] ? __kthread_parkme+0x82/0x180 [ 15.851585] ? preempt_count_sub+0x50/0x80 [ 15.851611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.851651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.851676] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.851698] kthread+0x337/0x6f0 [ 15.851716] ? trace_preempt_on+0x20/0xc0 [ 15.851740] ? __pfx_kthread+0x10/0x10 [ 15.851759] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.851779] ? calculate_sigpending+0x7b/0xa0 [ 15.851801] ? __pfx_kthread+0x10/0x10 [ 15.851820] ret_from_fork+0x41/0x80 [ 15.851840] ? __pfx_kthread+0x10/0x10 [ 15.851858] ret_from_fork_asm+0x1a/0x30 [ 15.851889] </TASK> [ 15.851903] [ 15.860716] Allocated by task 285: [ 15.861022] kasan_save_stack+0x45/0x70 [ 15.861245] kasan_save_track+0x18/0x40 [ 15.861418] kasan_save_alloc_info+0x3b/0x50 [ 15.861589] __kasan_kmalloc+0xb7/0xc0 [ 15.861790] __kmalloc_cache_noprof+0x189/0x420 [ 15.862117] kasan_atomics+0x95/0x310 [ 15.862411] kunit_try_run_case+0x1a5/0x480 [ 15.862860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.863257] kthread+0x337/0x6f0 [ 15.863509] ret_from_fork+0x41/0x80 [ 15.863815] ret_from_fork_asm+0x1a/0x30 [ 15.864079] [ 15.864187] The buggy address belongs to the object at ffff8881029ef680 [ 15.864187] which belongs to the cache kmalloc-64 of size 64 [ 15.864563] The buggy address is located 0 bytes to the right of [ 15.864563] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.865489] [ 15.865677] The buggy address belongs to the physical page: [ 15.865935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.866262] flags: 0x200000000000000(node=0|zone=2) [ 15.866485] page_type: f5(slab) [ 15.866673] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.866925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.867390] page dumped because: kasan: bad access detected [ 15.867721] [ 15.867875] Memory state around the buggy address: [ 15.868220] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.868871] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.869326] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.869548] ^ [ 15.869882] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.870165] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.870407] ================================================================== [ 16.283902] ================================================================== [ 16.284246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.284851] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.285514] [ 16.285794] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.285863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.285884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.285923] Call Trace: [ 16.285974] <TASK> [ 16.286041] dump_stack_lvl+0x73/0xb0 [ 16.286107] print_report+0xd1/0x650 [ 16.286151] ? __virt_addr_valid+0x1db/0x2d0 [ 16.286194] ? kasan_atomics_helper+0x218a/0x5450 [ 16.286236] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.286274] ? kasan_atomics_helper+0x218a/0x5450 [ 16.286298] kasan_report+0x141/0x180 [ 16.286321] ? kasan_atomics_helper+0x218a/0x5450 [ 16.286348] kasan_check_range+0x10c/0x1c0 [ 16.286369] __kasan_check_write+0x18/0x20 [ 16.286390] kasan_atomics_helper+0x218a/0x5450 [ 16.286415] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.286438] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.286461] ? kasan_atomics+0x152/0x310 [ 16.286485] kasan_atomics+0x1dc/0x310 [ 16.286505] ? __pfx_kasan_atomics+0x10/0x10 [ 16.286527] ? __pfx_read_tsc+0x10/0x10 [ 16.286571] ? ktime_get_ts64+0x86/0x230 [ 16.286599] kunit_try_run_case+0x1a5/0x480 [ 16.286643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.286668] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.286693] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.286716] ? __kthread_parkme+0x82/0x180 [ 16.286739] ? preempt_count_sub+0x50/0x80 [ 16.286764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.286788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.286811] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.286833] kthread+0x337/0x6f0 [ 16.286852] ? trace_preempt_on+0x20/0xc0 [ 16.286876] ? __pfx_kthread+0x10/0x10 [ 16.286895] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.286917] ? calculate_sigpending+0x7b/0xa0 [ 16.286939] ? __pfx_kthread+0x10/0x10 [ 16.286958] ret_from_fork+0x41/0x80 [ 16.286980] ? __pfx_kthread+0x10/0x10 [ 16.286998] ret_from_fork_asm+0x1a/0x30 [ 16.287029] </TASK> [ 16.287043] [ 16.295579] Allocated by task 285: [ 16.296022] kasan_save_stack+0x45/0x70 [ 16.296365] kasan_save_track+0x18/0x40 [ 16.296938] kasan_save_alloc_info+0x3b/0x50 [ 16.297291] __kasan_kmalloc+0xb7/0xc0 [ 16.298324] __kmalloc_cache_noprof+0x189/0x420 [ 16.298780] kasan_atomics+0x95/0x310 [ 16.299093] kunit_try_run_case+0x1a5/0x480 [ 16.299426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.299836] kthread+0x337/0x6f0 [ 16.300057] ret_from_fork+0x41/0x80 [ 16.300237] ret_from_fork_asm+0x1a/0x30 [ 16.300432] [ 16.300559] The buggy address belongs to the object at ffff8881029ef680 [ 16.300559] which belongs to the cache kmalloc-64 of size 64 [ 16.301587] The buggy address is located 0 bytes to the right of [ 16.301587] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.302471] [ 16.302854] The buggy address belongs to the physical page: [ 16.303280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.303684] flags: 0x200000000000000(node=0|zone=2) [ 16.303993] page_type: f5(slab) [ 16.304274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.304547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.304971] page dumped because: kasan: bad access detected [ 16.305210] [ 16.305357] Memory state around the buggy address: [ 16.305669] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.305934] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.306194] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.306437] ^ [ 16.306819] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.307384] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.307945] ================================================================== [ 15.453040] ================================================================== [ 15.454503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.454954] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.455317] [ 15.455521] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.455651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.455680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.455721] Call Trace: [ 15.455766] <TASK> [ 15.455806] dump_stack_lvl+0x73/0xb0 [ 15.455870] print_report+0xd1/0x650 [ 15.455919] ? __virt_addr_valid+0x1db/0x2d0 [ 15.455976] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.456012] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.456051] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.456093] kasan_report+0x141/0x180 [ 15.456134] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.456187] __asan_report_load4_noabort+0x18/0x20 [ 15.456228] kasan_atomics_helper+0x4a02/0x5450 [ 15.456278] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.456322] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.456383] ? kasan_atomics+0x152/0x310 [ 15.456436] kasan_atomics+0x1dc/0x310 [ 15.456462] ? __pfx_kasan_atomics+0x10/0x10 [ 15.456485] ? __pfx_read_tsc+0x10/0x10 [ 15.456506] ? ktime_get_ts64+0x86/0x230 [ 15.456534] kunit_try_run_case+0x1a5/0x480 [ 15.456571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.456592] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.456617] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.456657] ? __kthread_parkme+0x82/0x180 [ 15.456680] ? preempt_count_sub+0x50/0x80 [ 15.456704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.456727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.456749] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.456771] kthread+0x337/0x6f0 [ 15.456788] ? trace_preempt_on+0x20/0xc0 [ 15.456811] ? __pfx_kthread+0x10/0x10 [ 15.456828] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.456849] ? calculate_sigpending+0x7b/0xa0 [ 15.456870] ? __pfx_kthread+0x10/0x10 [ 15.456888] ret_from_fork+0x41/0x80 [ 15.456907] ? __pfx_kthread+0x10/0x10 [ 15.456925] ret_from_fork_asm+0x1a/0x30 [ 15.456954] </TASK> [ 15.456968] [ 15.466876] Allocated by task 285: [ 15.467069] kasan_save_stack+0x45/0x70 [ 15.467407] kasan_save_track+0x18/0x40 [ 15.467770] kasan_save_alloc_info+0x3b/0x50 [ 15.467998] __kasan_kmalloc+0xb7/0xc0 [ 15.468284] __kmalloc_cache_noprof+0x189/0x420 [ 15.469720] kasan_atomics+0x95/0x310 [ 15.470213] kunit_try_run_case+0x1a5/0x480 [ 15.470345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.470454] kthread+0x337/0x6f0 [ 15.470530] ret_from_fork+0x41/0x80 [ 15.470693] ret_from_fork_asm+0x1a/0x30 [ 15.470861] [ 15.471048] The buggy address belongs to the object at ffff8881029ef680 [ 15.471048] which belongs to the cache kmalloc-64 of size 64 [ 15.472182] The buggy address is located 0 bytes to the right of [ 15.472182] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.472848] [ 15.472967] The buggy address belongs to the physical page: [ 15.473481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.473852] flags: 0x200000000000000(node=0|zone=2) [ 15.474099] page_type: f5(slab) [ 15.474372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.474715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.474964] page dumped because: kasan: bad access detected [ 15.475408] [ 15.475570] Memory state around the buggy address: [ 15.476229] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.476451] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.477495] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.477843] ^ [ 15.478190] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.478709] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.479073] ================================================================== [ 15.946730] ================================================================== [ 15.947246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.947748] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.948006] [ 15.948148] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.948248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.948272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.948311] Call Trace: [ 15.948353] <TASK> [ 15.948392] dump_stack_lvl+0x73/0xb0 [ 15.948449] print_report+0xd1/0x650 [ 15.948496] ? __virt_addr_valid+0x1db/0x2d0 [ 15.948568] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.948616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.948680] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.948730] kasan_report+0x141/0x180 [ 15.948774] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.948839] kasan_check_range+0x10c/0x1c0 [ 15.948871] __kasan_check_write+0x18/0x20 [ 15.948909] kasan_atomics_helper+0x1b22/0x5450 [ 15.948952] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.948995] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.949028] ? kasan_atomics+0x152/0x310 [ 15.949061] kasan_atomics+0x1dc/0x310 [ 15.949092] ? __pfx_kasan_atomics+0x10/0x10 [ 15.949133] ? __pfx_read_tsc+0x10/0x10 [ 15.949173] ? ktime_get_ts64+0x86/0x230 [ 15.949227] kunit_try_run_case+0x1a5/0x480 [ 15.949277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.949318] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.949364] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.949406] ? __kthread_parkme+0x82/0x180 [ 15.949451] ? preempt_count_sub+0x50/0x80 [ 15.949502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.949569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.949606] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.949657] kthread+0x337/0x6f0 [ 15.949685] ? trace_preempt_on+0x20/0xc0 [ 15.949740] ? __pfx_kthread+0x10/0x10 [ 15.949769] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.949799] ? calculate_sigpending+0x7b/0xa0 [ 15.949830] ? __pfx_kthread+0x10/0x10 [ 15.949856] ret_from_fork+0x41/0x80 [ 15.949887] ? __pfx_kthread+0x10/0x10 [ 15.949913] ret_from_fork_asm+0x1a/0x30 [ 15.949969] </TASK> [ 15.949989] [ 15.958492] Allocated by task 285: [ 15.958846] kasan_save_stack+0x45/0x70 [ 15.959204] kasan_save_track+0x18/0x40 [ 15.959529] kasan_save_alloc_info+0x3b/0x50 [ 15.959854] __kasan_kmalloc+0xb7/0xc0 [ 15.960146] __kmalloc_cache_noprof+0x189/0x420 [ 15.960453] kasan_atomics+0x95/0x310 [ 15.960770] kunit_try_run_case+0x1a5/0x480 [ 15.961073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.961437] kthread+0x337/0x6f0 [ 15.961605] ret_from_fork+0x41/0x80 [ 15.961786] ret_from_fork_asm+0x1a/0x30 [ 15.961966] [ 15.962116] The buggy address belongs to the object at ffff8881029ef680 [ 15.962116] which belongs to the cache kmalloc-64 of size 64 [ 15.962857] The buggy address is located 0 bytes to the right of [ 15.962857] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.963238] [ 15.963350] The buggy address belongs to the physical page: [ 15.963570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.964135] flags: 0x200000000000000(node=0|zone=2) [ 15.964507] page_type: f5(slab) [ 15.964809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.965285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.965760] page dumped because: kasan: bad access detected [ 15.966128] [ 15.966249] Memory state around the buggy address: [ 15.966479] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.966924] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.967417] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.970007] ^ [ 15.970453] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.971028] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.971460] ================================================================== [ 16.130367] ================================================================== [ 16.131005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.131474] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.132160] [ 16.132744] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.132878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.132907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.132949] Call Trace: [ 16.132994] <TASK> [ 16.133039] dump_stack_lvl+0x73/0xb0 [ 16.133109] print_report+0xd1/0x650 [ 16.133162] ? __virt_addr_valid+0x1db/0x2d0 [ 16.133210] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.133255] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.133295] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.133322] kasan_report+0x141/0x180 [ 16.133345] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.133371] kasan_check_range+0x10c/0x1c0 [ 16.133392] __kasan_check_write+0x18/0x20 [ 16.133412] kasan_atomics_helper+0x1f43/0x5450 [ 16.133435] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.133456] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.133479] ? kasan_atomics+0x152/0x310 [ 16.133502] kasan_atomics+0x1dc/0x310 [ 16.133522] ? __pfx_kasan_atomics+0x10/0x10 [ 16.133548] ? __pfx_read_tsc+0x10/0x10 [ 16.133576] ? ktime_get_ts64+0x86/0x230 [ 16.133602] kunit_try_run_case+0x1a5/0x480 [ 16.133645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.133670] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.133695] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.133718] ? __kthread_parkme+0x82/0x180 [ 16.133741] ? preempt_count_sub+0x50/0x80 [ 16.133766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.133789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.133812] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.133834] kthread+0x337/0x6f0 [ 16.133852] ? trace_preempt_on+0x20/0xc0 [ 16.133876] ? __pfx_kthread+0x10/0x10 [ 16.133894] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.133915] ? calculate_sigpending+0x7b/0xa0 [ 16.133984] ? __pfx_kthread+0x10/0x10 [ 16.134003] ret_from_fork+0x41/0x80 [ 16.134025] ? __pfx_kthread+0x10/0x10 [ 16.134044] ret_from_fork_asm+0x1a/0x30 [ 16.134074] </TASK> [ 16.134087] [ 16.145437] Allocated by task 285: [ 16.145696] kasan_save_stack+0x45/0x70 [ 16.146443] kasan_save_track+0x18/0x40 [ 16.146817] kasan_save_alloc_info+0x3b/0x50 [ 16.147240] __kasan_kmalloc+0xb7/0xc0 [ 16.147547] __kmalloc_cache_noprof+0x189/0x420 [ 16.147821] kasan_atomics+0x95/0x310 [ 16.148024] kunit_try_run_case+0x1a5/0x480 [ 16.148188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.148558] kthread+0x337/0x6f0 [ 16.148758] ret_from_fork+0x41/0x80 [ 16.149067] ret_from_fork_asm+0x1a/0x30 [ 16.149254] [ 16.149699] The buggy address belongs to the object at ffff8881029ef680 [ 16.149699] which belongs to the cache kmalloc-64 of size 64 [ 16.150434] The buggy address is located 0 bytes to the right of [ 16.150434] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.151285] [ 16.151440] The buggy address belongs to the physical page: [ 16.151730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.152308] flags: 0x200000000000000(node=0|zone=2) [ 16.152720] page_type: f5(slab) [ 16.152907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.153270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.153755] page dumped because: kasan: bad access detected [ 16.153998] [ 16.154162] Memory state around the buggy address: [ 16.154499] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.154825] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.155083] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.155603] ^ [ 16.155862] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.156103] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.156545] ================================================================== [ 14.743595] ================================================================== [ 14.744047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.744432] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.744850] [ 14.745082] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.745199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.745229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.745272] Call Trace: [ 14.745319] <TASK> [ 14.745361] dump_stack_lvl+0x73/0xb0 [ 14.745416] print_report+0xd1/0x650 [ 14.745500] ? __virt_addr_valid+0x1db/0x2d0 [ 14.745552] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.745593] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.745682] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.745742] kasan_report+0x141/0x180 [ 14.745800] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.745875] __asan_report_load4_noabort+0x18/0x20 [ 14.745916] kasan_atomics_helper+0x4b54/0x5450 [ 14.745969] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.746014] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.746073] ? kasan_atomics+0x152/0x310 [ 14.746136] kasan_atomics+0x1dc/0x310 [ 14.746173] ? __pfx_kasan_atomics+0x10/0x10 [ 14.746213] ? __pfx_read_tsc+0x10/0x10 [ 14.746251] ? ktime_get_ts64+0x86/0x230 [ 14.746319] kunit_try_run_case+0x1a5/0x480 [ 14.746367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.746404] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.746451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.746497] ? __kthread_parkme+0x82/0x180 [ 14.746564] ? preempt_count_sub+0x50/0x80 [ 14.746613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.746673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.746722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.746768] kthread+0x337/0x6f0 [ 14.746842] ? trace_preempt_on+0x20/0xc0 [ 14.746887] ? __pfx_kthread+0x10/0x10 [ 14.746943] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.746991] ? calculate_sigpending+0x7b/0xa0 [ 14.747038] ? __pfx_kthread+0x10/0x10 [ 14.747081] ret_from_fork+0x41/0x80 [ 14.747126] ? __pfx_kthread+0x10/0x10 [ 14.747166] ret_from_fork_asm+0x1a/0x30 [ 14.747233] </TASK> [ 14.747259] [ 14.760078] Allocated by task 285: [ 14.760681] kasan_save_stack+0x45/0x70 [ 14.761106] kasan_save_track+0x18/0x40 [ 14.761418] kasan_save_alloc_info+0x3b/0x50 [ 14.761603] __kasan_kmalloc+0xb7/0xc0 [ 14.761918] __kmalloc_cache_noprof+0x189/0x420 [ 14.762131] kasan_atomics+0x95/0x310 [ 14.762353] kunit_try_run_case+0x1a5/0x480 [ 14.763383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.764118] kthread+0x337/0x6f0 [ 14.764544] ret_from_fork+0x41/0x80 [ 14.764762] ret_from_fork_asm+0x1a/0x30 [ 14.764947] [ 14.765049] The buggy address belongs to the object at ffff8881029ef680 [ 14.765049] which belongs to the cache kmalloc-64 of size 64 [ 14.765893] The buggy address is located 0 bytes to the right of [ 14.765893] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 14.766367] [ 14.766545] The buggy address belongs to the physical page: [ 14.766818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 14.767250] flags: 0x200000000000000(node=0|zone=2) [ 14.768429] page_type: f5(slab) [ 14.768885] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.769507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.770183] page dumped because: kasan: bad access detected [ 14.770600] [ 14.770780] Memory state around the buggy address: [ 14.771080] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.771360] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.771787] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.772846] ^ [ 14.773034] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.774453] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.774987] ================================================================== [ 15.321926] ================================================================== [ 15.322427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.323185] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.323467] [ 15.323744] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.324110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.324162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.324200] Call Trace: [ 15.324249] <TASK> [ 15.324282] dump_stack_lvl+0x73/0xb0 [ 15.324320] print_report+0xd1/0x650 [ 15.324345] ? __virt_addr_valid+0x1db/0x2d0 [ 15.324367] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.324389] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.324412] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.324433] kasan_report+0x141/0x180 [ 15.324455] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.324480] kasan_check_range+0x10c/0x1c0 [ 15.324500] __kasan_check_write+0x18/0x20 [ 15.324519] kasan_atomics_helper+0xfa9/0x5450 [ 15.324544] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.324575] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.324596] ? kasan_atomics+0x152/0x310 [ 15.324618] kasan_atomics+0x1dc/0x310 [ 15.324656] ? __pfx_kasan_atomics+0x10/0x10 [ 15.324677] ? __pfx_read_tsc+0x10/0x10 [ 15.324696] ? ktime_get_ts64+0x86/0x230 [ 15.324721] kunit_try_run_case+0x1a5/0x480 [ 15.324746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.324767] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.324790] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.324813] ? __kthread_parkme+0x82/0x180 [ 15.324835] ? preempt_count_sub+0x50/0x80 [ 15.324859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.324881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.324903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.324925] kthread+0x337/0x6f0 [ 15.324942] ? trace_preempt_on+0x20/0xc0 [ 15.324965] ? __pfx_kthread+0x10/0x10 [ 15.324983] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.325004] ? calculate_sigpending+0x7b/0xa0 [ 15.325025] ? __pfx_kthread+0x10/0x10 [ 15.325043] ret_from_fork+0x41/0x80 [ 15.325063] ? __pfx_kthread+0x10/0x10 [ 15.325081] ret_from_fork_asm+0x1a/0x30 [ 15.325112] </TASK> [ 15.325126] [ 15.334976] Allocated by task 285: [ 15.335319] kasan_save_stack+0x45/0x70 [ 15.335749] kasan_save_track+0x18/0x40 [ 15.336046] kasan_save_alloc_info+0x3b/0x50 [ 15.336356] __kasan_kmalloc+0xb7/0xc0 [ 15.336710] __kmalloc_cache_noprof+0x189/0x420 [ 15.337081] kasan_atomics+0x95/0x310 [ 15.337306] kunit_try_run_case+0x1a5/0x480 [ 15.337713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.338146] kthread+0x337/0x6f0 [ 15.338443] ret_from_fork+0x41/0x80 [ 15.338745] ret_from_fork_asm+0x1a/0x30 [ 15.338935] [ 15.339080] The buggy address belongs to the object at ffff8881029ef680 [ 15.339080] which belongs to the cache kmalloc-64 of size 64 [ 15.340033] The buggy address is located 0 bytes to the right of [ 15.340033] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.340950] [ 15.341179] The buggy address belongs to the physical page: [ 15.341408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.342035] flags: 0x200000000000000(node=0|zone=2) [ 15.342444] page_type: f5(slab) [ 15.342792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.343180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.343482] page dumped because: kasan: bad access detected [ 15.344130] [ 15.344231] Memory state around the buggy address: [ 15.344441] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.344965] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.345413] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.345809] ^ [ 15.346134] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.346688] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.347071] ================================================================== [ 15.792984] ================================================================== [ 15.793588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.794065] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.794465] [ 15.794728] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.794863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.794895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.794937] Call Trace: [ 15.794982] <TASK> [ 15.795023] dump_stack_lvl+0x73/0xb0 [ 15.795082] print_report+0xd1/0x650 [ 15.795161] ? __virt_addr_valid+0x1db/0x2d0 [ 15.795209] ? kasan_atomics_helper+0x177f/0x5450 [ 15.795248] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.795292] ? kasan_atomics_helper+0x177f/0x5450 [ 15.795336] kasan_report+0x141/0x180 [ 15.795410] ? kasan_atomics_helper+0x177f/0x5450 [ 15.795459] kasan_check_range+0x10c/0x1c0 [ 15.795501] __kasan_check_write+0x18/0x20 [ 15.795540] kasan_atomics_helper+0x177f/0x5450 [ 15.795579] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.795666] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.795712] ? kasan_atomics+0x152/0x310 [ 15.795757] kasan_atomics+0x1dc/0x310 [ 15.795822] ? __pfx_kasan_atomics+0x10/0x10 [ 15.795867] ? __pfx_read_tsc+0x10/0x10 [ 15.795907] ? ktime_get_ts64+0x86/0x230 [ 15.795945] kunit_try_run_case+0x1a5/0x480 [ 15.795975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.795997] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.796021] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.796047] ? __kthread_parkme+0x82/0x180 [ 15.796082] ? preempt_count_sub+0x50/0x80 [ 15.796127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.796200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.796246] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.796290] kthread+0x337/0x6f0 [ 15.796326] ? trace_preempt_on+0x20/0xc0 [ 15.796395] ? __pfx_kthread+0x10/0x10 [ 15.796436] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.796476] ? calculate_sigpending+0x7b/0xa0 [ 15.796512] ? __pfx_kthread+0x10/0x10 [ 15.796548] ret_from_fork+0x41/0x80 [ 15.796581] ? __pfx_kthread+0x10/0x10 [ 15.796600] ret_from_fork_asm+0x1a/0x30 [ 15.796646] </TASK> [ 15.796664] [ 15.808612] Allocated by task 285: [ 15.808898] kasan_save_stack+0x45/0x70 [ 15.809432] kasan_save_track+0x18/0x40 [ 15.809614] kasan_save_alloc_info+0x3b/0x50 [ 15.809906] __kasan_kmalloc+0xb7/0xc0 [ 15.810298] __kmalloc_cache_noprof+0x189/0x420 [ 15.810975] kasan_atomics+0x95/0x310 [ 15.811195] kunit_try_run_case+0x1a5/0x480 [ 15.811355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.811820] kthread+0x337/0x6f0 [ 15.812290] ret_from_fork+0x41/0x80 [ 15.812594] ret_from_fork_asm+0x1a/0x30 [ 15.812942] [ 15.813254] The buggy address belongs to the object at ffff8881029ef680 [ 15.813254] which belongs to the cache kmalloc-64 of size 64 [ 15.814086] The buggy address is located 0 bytes to the right of [ 15.814086] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.814989] [ 15.815450] The buggy address belongs to the physical page: [ 15.815868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.816338] flags: 0x200000000000000(node=0|zone=2) [ 15.816960] page_type: f5(slab) [ 15.817229] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.817801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.818168] page dumped because: kasan: bad access detected [ 15.818461] [ 15.818578] Memory state around the buggy address: [ 15.819172] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.819773] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.820203] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.820571] ^ [ 15.821043] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.821602] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.822053] ================================================================== [ 15.126960] ================================================================== [ 15.127826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.129210] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.129999] [ 15.130152] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.130218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.130240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.130281] Call Trace: [ 15.130322] <TASK> [ 15.130361] dump_stack_lvl+0x73/0xb0 [ 15.130579] print_report+0xd1/0x650 [ 15.130608] ? __virt_addr_valid+0x1db/0x2d0 [ 15.130650] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.130674] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.130697] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.130719] kasan_report+0x141/0x180 [ 15.130742] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.130768] kasan_check_range+0x10c/0x1c0 [ 15.130788] __kasan_check_write+0x18/0x20 [ 15.130808] kasan_atomics_helper+0xb6a/0x5450 [ 15.130830] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.130853] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.130875] ? kasan_atomics+0x152/0x310 [ 15.130897] kasan_atomics+0x1dc/0x310 [ 15.130916] ? __pfx_kasan_atomics+0x10/0x10 [ 15.130937] ? __pfx_read_tsc+0x10/0x10 [ 15.130957] ? ktime_get_ts64+0x86/0x230 [ 15.130982] kunit_try_run_case+0x1a5/0x480 [ 15.131007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.131029] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.131053] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.131075] ? __kthread_parkme+0x82/0x180 [ 15.131099] ? preempt_count_sub+0x50/0x80 [ 15.131123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.131146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.131169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.131191] kthread+0x337/0x6f0 [ 15.131209] ? trace_preempt_on+0x20/0xc0 [ 15.131232] ? __pfx_kthread+0x10/0x10 [ 15.131251] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.131272] ? calculate_sigpending+0x7b/0xa0 [ 15.131294] ? __pfx_kthread+0x10/0x10 [ 15.131312] ret_from_fork+0x41/0x80 [ 15.131333] ? __pfx_kthread+0x10/0x10 [ 15.131351] ret_from_fork_asm+0x1a/0x30 [ 15.131381] </TASK> [ 15.131395] [ 15.142762] Allocated by task 285: [ 15.143163] kasan_save_stack+0x45/0x70 [ 15.143586] kasan_save_track+0x18/0x40 [ 15.143957] kasan_save_alloc_info+0x3b/0x50 [ 15.144283] __kasan_kmalloc+0xb7/0xc0 [ 15.144497] __kmalloc_cache_noprof+0x189/0x420 [ 15.144927] kasan_atomics+0x95/0x310 [ 15.145199] kunit_try_run_case+0x1a5/0x480 [ 15.145566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.145790] kthread+0x337/0x6f0 [ 15.145953] ret_from_fork+0x41/0x80 [ 15.146256] ret_from_fork_asm+0x1a/0x30 [ 15.146696] [ 15.146906] The buggy address belongs to the object at ffff8881029ef680 [ 15.146906] which belongs to the cache kmalloc-64 of size 64 [ 15.147762] The buggy address is located 0 bytes to the right of [ 15.147762] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.148515] [ 15.148673] The buggy address belongs to the physical page: [ 15.148874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.149464] flags: 0x200000000000000(node=0|zone=2) [ 15.149873] page_type: f5(slab) [ 15.150176] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.150614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.151166] page dumped because: kasan: bad access detected [ 15.151359] [ 15.151561] Memory state around the buggy address: [ 15.151956] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.152453] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.152894] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.153274] ^ [ 15.153752] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.154285] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.154738] ================================================================== [ 16.075527] ================================================================== [ 16.076105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.078055] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.078573] [ 16.078789] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.078894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.078922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.078971] Call Trace: [ 16.079016] <TASK> [ 16.079060] dump_stack_lvl+0x73/0xb0 [ 16.079127] print_report+0xd1/0x650 [ 16.079176] ? __virt_addr_valid+0x1db/0x2d0 [ 16.079223] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.079270] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.079316] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.079343] kasan_report+0x141/0x180 [ 16.079366] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.079392] kasan_check_range+0x10c/0x1c0 [ 16.079412] __kasan_check_write+0x18/0x20 [ 16.079432] kasan_atomics_helper+0x1e12/0x5450 [ 16.079454] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.079476] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.079498] ? kasan_atomics+0x152/0x310 [ 16.079520] kasan_atomics+0x1dc/0x310 [ 16.079539] ? __pfx_kasan_atomics+0x10/0x10 [ 16.079594] ? __pfx_read_tsc+0x10/0x10 [ 16.079655] ? ktime_get_ts64+0x86/0x230 [ 16.079697] kunit_try_run_case+0x1a5/0x480 [ 16.079741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.079782] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.080178] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.081055] ? __kthread_parkme+0x82/0x180 [ 16.081130] ? preempt_count_sub+0x50/0x80 [ 16.081179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.081209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.081236] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.081259] kthread+0x337/0x6f0 [ 16.081277] ? trace_preempt_on+0x20/0xc0 [ 16.081301] ? __pfx_kthread+0x10/0x10 [ 16.081320] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.081342] ? calculate_sigpending+0x7b/0xa0 [ 16.081364] ? __pfx_kthread+0x10/0x10 [ 16.081383] ret_from_fork+0x41/0x80 [ 16.081404] ? __pfx_kthread+0x10/0x10 [ 16.081425] ret_from_fork_asm+0x1a/0x30 [ 16.081456] </TASK> [ 16.081470] [ 16.091580] Allocated by task 285: [ 16.091911] kasan_save_stack+0x45/0x70 [ 16.092281] kasan_save_track+0x18/0x40 [ 16.092643] kasan_save_alloc_info+0x3b/0x50 [ 16.092997] __kasan_kmalloc+0xb7/0xc0 [ 16.093293] __kmalloc_cache_noprof+0x189/0x420 [ 16.093692] kasan_atomics+0x95/0x310 [ 16.094019] kunit_try_run_case+0x1a5/0x480 [ 16.094348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.094766] kthread+0x337/0x6f0 [ 16.095031] ret_from_fork+0x41/0x80 [ 16.095334] ret_from_fork_asm+0x1a/0x30 [ 16.095682] [ 16.095849] The buggy address belongs to the object at ffff8881029ef680 [ 16.095849] which belongs to the cache kmalloc-64 of size 64 [ 16.096666] The buggy address is located 0 bytes to the right of [ 16.096666] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.097202] [ 16.097357] The buggy address belongs to the physical page: [ 16.097631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.098184] flags: 0x200000000000000(node=0|zone=2) [ 16.098527] page_type: f5(slab) [ 16.098818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.099334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.099687] page dumped because: kasan: bad access detected [ 16.099882] [ 16.099984] Memory state around the buggy address: [ 16.100177] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.100721] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.101228] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.101744] ^ [ 16.102066] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.102365] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.102645] ================================================================== [ 15.074686] ================================================================== [ 15.075075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.075483] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.076088] [ 15.076317] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.076480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.076502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.076740] Call Trace: [ 15.076776] <TASK> [ 15.076815] dump_stack_lvl+0x73/0xb0 [ 15.076883] print_report+0xd1/0x650 [ 15.076927] ? __virt_addr_valid+0x1db/0x2d0 [ 15.076961] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.076994] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.077026] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.077059] kasan_report+0x141/0x180 [ 15.077096] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.077144] kasan_check_range+0x10c/0x1c0 [ 15.077205] __kasan_check_write+0x18/0x20 [ 15.077247] kasan_atomics_helper+0xa2b/0x5450 [ 15.077316] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.077358] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.077382] ? kasan_atomics+0x152/0x310 [ 15.077406] kasan_atomics+0x1dc/0x310 [ 15.077426] ? __pfx_kasan_atomics+0x10/0x10 [ 15.077455] ? __pfx_read_tsc+0x10/0x10 [ 15.077488] ? ktime_get_ts64+0x86/0x230 [ 15.077534] kunit_try_run_case+0x1a5/0x480 [ 15.077641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.077683] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.077731] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.077776] ? __kthread_parkme+0x82/0x180 [ 15.077835] ? preempt_count_sub+0x50/0x80 [ 15.077884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.077930] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.077983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.078024] kthread+0x337/0x6f0 [ 15.078044] ? trace_preempt_on+0x20/0xc0 [ 15.078070] ? __pfx_kthread+0x10/0x10 [ 15.078089] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.078112] ? calculate_sigpending+0x7b/0xa0 [ 15.078134] ? __pfx_kthread+0x10/0x10 [ 15.078153] ret_from_fork+0x41/0x80 [ 15.078176] ? __pfx_kthread+0x10/0x10 [ 15.078194] ret_from_fork_asm+0x1a/0x30 [ 15.078225] </TASK> [ 15.078239] [ 15.086987] Allocated by task 285: [ 15.087215] kasan_save_stack+0x45/0x70 [ 15.087417] kasan_save_track+0x18/0x40 [ 15.087768] kasan_save_alloc_info+0x3b/0x50 [ 15.088099] __kasan_kmalloc+0xb7/0xc0 [ 15.088404] __kmalloc_cache_noprof+0x189/0x420 [ 15.088795] kasan_atomics+0x95/0x310 [ 15.089101] kunit_try_run_case+0x1a5/0x480 [ 15.089425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.089863] kthread+0x337/0x6f0 [ 15.090068] ret_from_fork+0x41/0x80 [ 15.090322] ret_from_fork_asm+0x1a/0x30 [ 15.090507] [ 15.090714] The buggy address belongs to the object at ffff8881029ef680 [ 15.090714] which belongs to the cache kmalloc-64 of size 64 [ 15.091464] The buggy address is located 0 bytes to the right of [ 15.091464] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.091875] [ 15.091987] The buggy address belongs to the physical page: [ 15.092184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.092660] flags: 0x200000000000000(node=0|zone=2) [ 15.093040] page_type: f5(slab) [ 15.093318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.093860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.094305] page dumped because: kasan: bad access detected [ 15.094716] [ 15.094821] Memory state around the buggy address: [ 15.095004] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.095242] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.095781] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.097426] ^ [ 15.097931] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.098316] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.098946] ================================================================== [ 16.000938] ================================================================== [ 16.001266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.001789] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.002157] [ 16.002356] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.002462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.002489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.002530] Call Trace: [ 16.002573] <TASK> [ 16.002611] dump_stack_lvl+0x73/0xb0 [ 16.003483] print_report+0xd1/0x650 [ 16.003524] ? __virt_addr_valid+0x1db/0x2d0 [ 16.003560] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.003634] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.003673] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.003708] kasan_report+0x141/0x180 [ 16.003741] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.003768] __asan_report_load8_noabort+0x18/0x20 [ 16.003788] kasan_atomics_helper+0x4f30/0x5450 [ 16.003811] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.003834] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.003857] ? kasan_atomics+0x152/0x310 [ 16.003881] kasan_atomics+0x1dc/0x310 [ 16.003900] ? __pfx_kasan_atomics+0x10/0x10 [ 16.003958] ? __pfx_read_tsc+0x10/0x10 [ 16.003983] ? ktime_get_ts64+0x86/0x230 [ 16.004008] kunit_try_run_case+0x1a5/0x480 [ 16.004035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.004056] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.004080] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.004103] ? __kthread_parkme+0x82/0x180 [ 16.004126] ? preempt_count_sub+0x50/0x80 [ 16.004151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.004173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.004196] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.004218] kthread+0x337/0x6f0 [ 16.004235] ? trace_preempt_on+0x20/0xc0 [ 16.004260] ? __pfx_kthread+0x10/0x10 [ 16.004278] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.004299] ? calculate_sigpending+0x7b/0xa0 [ 16.004320] ? __pfx_kthread+0x10/0x10 [ 16.004339] ret_from_fork+0x41/0x80 [ 16.004359] ? __pfx_kthread+0x10/0x10 [ 16.004377] ret_from_fork_asm+0x1a/0x30 [ 16.004409] </TASK> [ 16.004422] [ 16.015043] Allocated by task 285: [ 16.015291] kasan_save_stack+0x45/0x70 [ 16.015654] kasan_save_track+0x18/0x40 [ 16.015888] kasan_save_alloc_info+0x3b/0x50 [ 16.016056] __kasan_kmalloc+0xb7/0xc0 [ 16.016223] __kmalloc_cache_noprof+0x189/0x420 [ 16.016409] kasan_atomics+0x95/0x310 [ 16.016573] kunit_try_run_case+0x1a5/0x480 [ 16.016798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.017180] kthread+0x337/0x6f0 [ 16.017449] ret_from_fork+0x41/0x80 [ 16.017787] ret_from_fork_asm+0x1a/0x30 [ 16.018143] [ 16.018309] The buggy address belongs to the object at ffff8881029ef680 [ 16.018309] which belongs to the cache kmalloc-64 of size 64 [ 16.019147] The buggy address is located 0 bytes to the right of [ 16.019147] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.020006] [ 16.020158] The buggy address belongs to the physical page: [ 16.020456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.020780] flags: 0x200000000000000(node=0|zone=2) [ 16.020993] page_type: f5(slab) [ 16.021280] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.021888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.022412] page dumped because: kasan: bad access detected [ 16.022870] [ 16.023043] Memory state around the buggy address: [ 16.023238] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.023800] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.024394] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.024991] ^ [ 16.025417] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.025833] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.025984] ================================================================== [ 15.922887] ================================================================== [ 15.923554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.924114] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.924602] [ 15.924796] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.924898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.924926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.924971] Call Trace: [ 15.925016] <TASK> [ 15.925060] dump_stack_lvl+0x73/0xb0 [ 15.925121] print_report+0xd1/0x650 [ 15.925171] ? __virt_addr_valid+0x1db/0x2d0 [ 15.925220] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.925260] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.925300] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.925340] kasan_report+0x141/0x180 [ 15.925376] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.925421] kasan_check_range+0x10c/0x1c0 [ 15.925458] __kasan_check_write+0x18/0x20 [ 15.925494] kasan_atomics_helper+0x1a7f/0x5450 [ 15.925531] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.925610] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.925668] ? kasan_atomics+0x152/0x310 [ 15.925720] kasan_atomics+0x1dc/0x310 [ 15.925763] ? __pfx_kasan_atomics+0x10/0x10 [ 15.925807] ? __pfx_read_tsc+0x10/0x10 [ 15.925850] ? ktime_get_ts64+0x86/0x230 [ 15.925901] kunit_try_run_case+0x1a5/0x480 [ 15.925959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.926008] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.926060] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.926111] ? __kthread_parkme+0x82/0x180 [ 15.926160] ? preempt_count_sub+0x50/0x80 [ 15.926204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.926243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.926285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.926327] kthread+0x337/0x6f0 [ 15.926364] ? trace_preempt_on+0x20/0xc0 [ 15.926412] ? __pfx_kthread+0x10/0x10 [ 15.926451] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.926496] ? calculate_sigpending+0x7b/0xa0 [ 15.926571] ? __pfx_kthread+0x10/0x10 [ 15.926616] ret_from_fork+0x41/0x80 [ 15.926675] ? __pfx_kthread+0x10/0x10 [ 15.926715] ret_from_fork_asm+0x1a/0x30 [ 15.926781] </TASK> [ 15.926809] [ 15.935713] Allocated by task 285: [ 15.935941] kasan_save_stack+0x45/0x70 [ 15.936233] kasan_save_track+0x18/0x40 [ 15.936477] kasan_save_alloc_info+0x3b/0x50 [ 15.936823] __kasan_kmalloc+0xb7/0xc0 [ 15.937088] __kmalloc_cache_noprof+0x189/0x420 [ 15.937377] kasan_atomics+0x95/0x310 [ 15.937677] kunit_try_run_case+0x1a5/0x480 [ 15.937900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.938133] kthread+0x337/0x6f0 [ 15.938437] ret_from_fork+0x41/0x80 [ 15.938762] ret_from_fork_asm+0x1a/0x30 [ 15.939004] [ 15.939105] The buggy address belongs to the object at ffff8881029ef680 [ 15.939105] which belongs to the cache kmalloc-64 of size 64 [ 15.939468] The buggy address is located 0 bytes to the right of [ 15.939468] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.940287] [ 15.940458] The buggy address belongs to the physical page: [ 15.940766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.941067] flags: 0x200000000000000(node=0|zone=2) [ 15.941273] page_type: f5(slab) [ 15.941448] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.941743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.941999] page dumped because: kasan: bad access detected [ 15.942197] [ 15.942304] Memory state around the buggy address: [ 15.942661] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.943170] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.943697] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.944154] ^ [ 15.944507] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.944993] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.945464] ================================================================== [ 15.294323] ================================================================== [ 15.294840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.295186] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.295662] [ 15.295909] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.296010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.296032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.296074] Call Trace: [ 15.296154] <TASK> [ 15.296198] dump_stack_lvl+0x73/0xb0 [ 15.296260] print_report+0xd1/0x650 [ 15.296306] ? __virt_addr_valid+0x1db/0x2d0 [ 15.296379] ? kasan_atomics_helper+0xf10/0x5450 [ 15.296422] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.296468] ? kasan_atomics_helper+0xf10/0x5450 [ 15.296511] kasan_report+0x141/0x180 [ 15.296580] ? kasan_atomics_helper+0xf10/0x5450 [ 15.296644] kasan_check_range+0x10c/0x1c0 [ 15.296691] __kasan_check_write+0x18/0x20 [ 15.296726] kasan_atomics_helper+0xf10/0x5450 [ 15.296773] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.296848] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.296894] ? kasan_atomics+0x152/0x310 [ 15.296941] kasan_atomics+0x1dc/0x310 [ 15.296971] ? __pfx_kasan_atomics+0x10/0x10 [ 15.297006] ? __pfx_read_tsc+0x10/0x10 [ 15.297043] ? ktime_get_ts64+0x86/0x230 [ 15.297116] kunit_try_run_case+0x1a5/0x480 [ 15.297184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.297222] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.297265] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.297307] ? __kthread_parkme+0x82/0x180 [ 15.297351] ? preempt_count_sub+0x50/0x80 [ 15.297402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.297441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.297466] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.297488] kthread+0x337/0x6f0 [ 15.297506] ? trace_preempt_on+0x20/0xc0 [ 15.297530] ? __pfx_kthread+0x10/0x10 [ 15.297573] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.297594] ? calculate_sigpending+0x7b/0xa0 [ 15.297615] ? __pfx_kthread+0x10/0x10 [ 15.297654] ret_from_fork+0x41/0x80 [ 15.297675] ? __pfx_kthread+0x10/0x10 [ 15.297694] ret_from_fork_asm+0x1a/0x30 [ 15.297724] </TASK> [ 15.297738] [ 15.307221] Allocated by task 285: [ 15.307610] kasan_save_stack+0x45/0x70 [ 15.307922] kasan_save_track+0x18/0x40 [ 15.308253] kasan_save_alloc_info+0x3b/0x50 [ 15.308511] __kasan_kmalloc+0xb7/0xc0 [ 15.309043] __kmalloc_cache_noprof+0x189/0x420 [ 15.309491] kasan_atomics+0x95/0x310 [ 15.309869] kunit_try_run_case+0x1a5/0x480 [ 15.310079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.310355] kthread+0x337/0x6f0 [ 15.311246] ret_from_fork+0x41/0x80 [ 15.311467] ret_from_fork_asm+0x1a/0x30 [ 15.311652] [ 15.312434] The buggy address belongs to the object at ffff8881029ef680 [ 15.312434] which belongs to the cache kmalloc-64 of size 64 [ 15.313130] The buggy address is located 0 bytes to the right of [ 15.313130] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.314268] [ 15.314397] The buggy address belongs to the physical page: [ 15.314741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.315056] flags: 0x200000000000000(node=0|zone=2) [ 15.315303] page_type: f5(slab) [ 15.315560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.316424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.316792] page dumped because: kasan: bad access detected [ 15.317170] [ 15.317276] Memory state around the buggy address: [ 15.317637] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.317904] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.318452] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.318884] ^ [ 15.319281] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.319578] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.319869] ================================================================== [ 16.334983] ================================================================== [ 16.335747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.336063] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.336321] [ 16.336461] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.336569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.336595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.336654] Call Trace: [ 16.336702] <TASK> [ 16.336743] dump_stack_lvl+0x73/0xb0 [ 16.336794] print_report+0xd1/0x650 [ 16.336833] ? __virt_addr_valid+0x1db/0x2d0 [ 16.336866] ? kasan_atomics_helper+0x224c/0x5450 [ 16.336904] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.336946] ? kasan_atomics_helper+0x224c/0x5450 [ 16.337013] kasan_report+0x141/0x180 [ 16.337057] ? kasan_atomics_helper+0x224c/0x5450 [ 16.337121] kasan_check_range+0x10c/0x1c0 [ 16.337173] __kasan_check_write+0x18/0x20 [ 16.337223] kasan_atomics_helper+0x224c/0x5450 [ 16.337265] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.337306] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.337350] ? kasan_atomics+0x152/0x310 [ 16.337409] kasan_atomics+0x1dc/0x310 [ 16.337460] ? __pfx_kasan_atomics+0x10/0x10 [ 16.337512] ? __pfx_read_tsc+0x10/0x10 [ 16.337548] ? ktime_get_ts64+0x86/0x230 [ 16.337589] kunit_try_run_case+0x1a5/0x480 [ 16.337648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.337687] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.337735] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.337783] ? __kthread_parkme+0x82/0x180 [ 16.337829] ? preempt_count_sub+0x50/0x80 [ 16.337882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.337933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.337994] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.338043] kthread+0x337/0x6f0 [ 16.338083] ? trace_preempt_on+0x20/0xc0 [ 16.338134] ? __pfx_kthread+0x10/0x10 [ 16.338177] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.338225] ? calculate_sigpending+0x7b/0xa0 [ 16.338264] ? __pfx_kthread+0x10/0x10 [ 16.338300] ret_from_fork+0x41/0x80 [ 16.338342] ? __pfx_kthread+0x10/0x10 [ 16.338403] ret_from_fork_asm+0x1a/0x30 [ 16.338471] </TASK> [ 16.338496] [ 16.348468] Allocated by task 285: [ 16.348732] kasan_save_stack+0x45/0x70 [ 16.349092] kasan_save_track+0x18/0x40 [ 16.349293] kasan_save_alloc_info+0x3b/0x50 [ 16.349490] __kasan_kmalloc+0xb7/0xc0 [ 16.349692] __kmalloc_cache_noprof+0x189/0x420 [ 16.349977] kasan_atomics+0x95/0x310 [ 16.350247] kunit_try_run_case+0x1a5/0x480 [ 16.350573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.351124] kthread+0x337/0x6f0 [ 16.351388] ret_from_fork+0x41/0x80 [ 16.351703] ret_from_fork_asm+0x1a/0x30 [ 16.351948] [ 16.352055] The buggy address belongs to the object at ffff8881029ef680 [ 16.352055] which belongs to the cache kmalloc-64 of size 64 [ 16.352812] The buggy address is located 0 bytes to the right of [ 16.352812] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.353454] [ 16.353650] The buggy address belongs to the physical page: [ 16.354031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.354468] flags: 0x200000000000000(node=0|zone=2) [ 16.354795] page_type: f5(slab) [ 16.355101] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.355388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.355764] page dumped because: kasan: bad access detected [ 16.356080] [ 16.356231] Memory state around the buggy address: [ 16.356596] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.356972] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.357234] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.357468] ^ [ 16.357790] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.358313] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.358865] ================================================================== [ 16.104253] ================================================================== [ 16.104887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.105433] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.105952] [ 16.106165] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.106273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.106300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.106397] Call Trace: [ 16.106446] <TASK> [ 16.106487] dump_stack_lvl+0x73/0xb0 [ 16.106591] print_report+0xd1/0x650 [ 16.106655] ? __virt_addr_valid+0x1db/0x2d0 [ 16.106718] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.106764] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.106808] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.106856] kasan_report+0x141/0x180 [ 16.106905] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.106963] kasan_check_range+0x10c/0x1c0 [ 16.107004] __kasan_check_write+0x18/0x20 [ 16.107043] kasan_atomics_helper+0x1eaa/0x5450 [ 16.107107] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.107151] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.107193] ? kasan_atomics+0x152/0x310 [ 16.107242] kasan_atomics+0x1dc/0x310 [ 16.107269] ? __pfx_kasan_atomics+0x10/0x10 [ 16.107301] ? __pfx_read_tsc+0x10/0x10 [ 16.107337] ? ktime_get_ts64+0x86/0x230 [ 16.107385] kunit_try_run_case+0x1a5/0x480 [ 16.107452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.107496] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.107573] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.107658] ? __kthread_parkme+0x82/0x180 [ 16.107705] ? preempt_count_sub+0x50/0x80 [ 16.107755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.107800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.107841] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.107864] kthread+0x337/0x6f0 [ 16.107882] ? trace_preempt_on+0x20/0xc0 [ 16.107906] ? __pfx_kthread+0x10/0x10 [ 16.107924] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.107946] ? calculate_sigpending+0x7b/0xa0 [ 16.107966] ? __pfx_kthread+0x10/0x10 [ 16.107984] ret_from_fork+0x41/0x80 [ 16.108005] ? __pfx_kthread+0x10/0x10 [ 16.108022] ret_from_fork_asm+0x1a/0x30 [ 16.108051] </TASK> [ 16.108065] [ 16.117387] Allocated by task 285: [ 16.117699] kasan_save_stack+0x45/0x70 [ 16.118100] kasan_save_track+0x18/0x40 [ 16.118356] kasan_save_alloc_info+0x3b/0x50 [ 16.118671] __kasan_kmalloc+0xb7/0xc0 [ 16.118954] __kmalloc_cache_noprof+0x189/0x420 [ 16.119281] kasan_atomics+0x95/0x310 [ 16.119612] kunit_try_run_case+0x1a5/0x480 [ 16.119894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.120178] kthread+0x337/0x6f0 [ 16.120458] ret_from_fork+0x41/0x80 [ 16.120706] ret_from_fork_asm+0x1a/0x30 [ 16.121011] [ 16.121191] The buggy address belongs to the object at ffff8881029ef680 [ 16.121191] which belongs to the cache kmalloc-64 of size 64 [ 16.121769] The buggy address is located 0 bytes to the right of [ 16.121769] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.122402] [ 16.122571] The buggy address belongs to the physical page: [ 16.122827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.123138] flags: 0x200000000000000(node=0|zone=2) [ 16.123381] page_type: f5(slab) [ 16.123699] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.124253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.124743] page dumped because: kasan: bad access detected [ 16.125105] [ 16.125265] Memory state around the buggy address: [ 16.125633] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.126112] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.126607] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.127020] ^ [ 16.127298] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.127535] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.128009] ================================================================== [ 15.634840] ================================================================== [ 15.635499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.636147] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.636500] [ 15.636725] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.636830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.636855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.636894] Call Trace: [ 15.636937] <TASK> [ 15.636976] dump_stack_lvl+0x73/0xb0 [ 15.637036] print_report+0xd1/0x650 [ 15.637086] ? __virt_addr_valid+0x1db/0x2d0 [ 15.637131] ? kasan_atomics_helper+0x1467/0x5450 [ 15.637177] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.637222] ? kasan_atomics_helper+0x1467/0x5450 [ 15.637268] kasan_report+0x141/0x180 [ 15.637304] ? kasan_atomics_helper+0x1467/0x5450 [ 15.637339] kasan_check_range+0x10c/0x1c0 [ 15.637360] __kasan_check_write+0x18/0x20 [ 15.637379] kasan_atomics_helper+0x1467/0x5450 [ 15.637401] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.637423] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.637445] ? kasan_atomics+0x152/0x310 [ 15.637467] kasan_atomics+0x1dc/0x310 [ 15.637486] ? __pfx_kasan_atomics+0x10/0x10 [ 15.637507] ? __pfx_read_tsc+0x10/0x10 [ 15.637527] ? ktime_get_ts64+0x86/0x230 [ 15.637581] kunit_try_run_case+0x1a5/0x480 [ 15.637608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.637645] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.637671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.637694] ? __kthread_parkme+0x82/0x180 [ 15.637715] ? preempt_count_sub+0x50/0x80 [ 15.637740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.637762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.637785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.637808] kthread+0x337/0x6f0 [ 15.637825] ? trace_preempt_on+0x20/0xc0 [ 15.637849] ? __pfx_kthread+0x10/0x10 [ 15.637866] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.637887] ? calculate_sigpending+0x7b/0xa0 [ 15.637909] ? __pfx_kthread+0x10/0x10 [ 15.637929] ret_from_fork+0x41/0x80 [ 15.637961] ? __pfx_kthread+0x10/0x10 [ 15.637984] ret_from_fork_asm+0x1a/0x30 [ 15.638016] </TASK> [ 15.638030] [ 15.648381] Allocated by task 285: [ 15.648828] kasan_save_stack+0x45/0x70 [ 15.649061] kasan_save_track+0x18/0x40 [ 15.649325] kasan_save_alloc_info+0x3b/0x50 [ 15.649771] __kasan_kmalloc+0xb7/0xc0 [ 15.650015] __kmalloc_cache_noprof+0x189/0x420 [ 15.650330] kasan_atomics+0x95/0x310 [ 15.650572] kunit_try_run_case+0x1a5/0x480 [ 15.650893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.651344] kthread+0x337/0x6f0 [ 15.651603] ret_from_fork+0x41/0x80 [ 15.651882] ret_from_fork_asm+0x1a/0x30 [ 15.652112] [ 15.652321] The buggy address belongs to the object at ffff8881029ef680 [ 15.652321] which belongs to the cache kmalloc-64 of size 64 [ 15.652964] The buggy address is located 0 bytes to the right of [ 15.652964] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.653817] [ 15.653987] The buggy address belongs to the physical page: [ 15.654391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.654938] flags: 0x200000000000000(node=0|zone=2) [ 15.655246] page_type: f5(slab) [ 15.655529] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.655917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.656367] page dumped because: kasan: bad access detected [ 15.656679] [ 15.656784] Memory state around the buggy address: [ 15.657184] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.657634] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.657886] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.658370] ^ [ 15.658764] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.659575] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.659817] ================================================================== [ 15.713052] ================================================================== [ 15.713757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.714356] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.714954] [ 15.715145] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.715233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.715258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.715306] Call Trace: [ 15.715352] <TASK> [ 15.715393] dump_stack_lvl+0x73/0xb0 [ 15.715456] print_report+0xd1/0x650 [ 15.715506] ? __virt_addr_valid+0x1db/0x2d0 [ 15.715550] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.715595] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.715656] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.715705] kasan_report+0x141/0x180 [ 15.715754] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.715799] kasan_check_range+0x10c/0x1c0 [ 15.715841] __kasan_check_write+0x18/0x20 [ 15.715884] kasan_atomics_helper+0x15b6/0x5450 [ 15.715933] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.715982] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.716030] ? kasan_atomics+0x152/0x310 [ 15.716082] kasan_atomics+0x1dc/0x310 [ 15.716126] ? __pfx_kasan_atomics+0x10/0x10 [ 15.716171] ? __pfx_read_tsc+0x10/0x10 [ 15.716206] ? ktime_get_ts64+0x86/0x230 [ 15.716247] kunit_try_run_case+0x1a5/0x480 [ 15.716332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.716392] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.716439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.716488] ? __kthread_parkme+0x82/0x180 [ 15.716534] ? preempt_count_sub+0x50/0x80 [ 15.716584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.716675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.716724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.716769] kthread+0x337/0x6f0 [ 15.716801] ? trace_preempt_on+0x20/0xc0 [ 15.716840] ? __pfx_kthread+0x10/0x10 [ 15.716872] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.716914] ? calculate_sigpending+0x7b/0xa0 [ 15.716957] ? __pfx_kthread+0x10/0x10 [ 15.716998] ret_from_fork+0x41/0x80 [ 15.717039] ? __pfx_kthread+0x10/0x10 [ 15.717079] ret_from_fork_asm+0x1a/0x30 [ 15.717146] </TASK> [ 15.717173] [ 15.727391] Allocated by task 285: [ 15.727827] kasan_save_stack+0x45/0x70 [ 15.728167] kasan_save_track+0x18/0x40 [ 15.728475] kasan_save_alloc_info+0x3b/0x50 [ 15.728920] __kasan_kmalloc+0xb7/0xc0 [ 15.729164] __kmalloc_cache_noprof+0x189/0x420 [ 15.729357] kasan_atomics+0x95/0x310 [ 15.729522] kunit_try_run_case+0x1a5/0x480 [ 15.729709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.729917] kthread+0x337/0x6f0 [ 15.730087] ret_from_fork+0x41/0x80 [ 15.730262] ret_from_fork_asm+0x1a/0x30 [ 15.730438] [ 15.730561] The buggy address belongs to the object at ffff8881029ef680 [ 15.730561] which belongs to the cache kmalloc-64 of size 64 [ 15.731369] The buggy address is located 0 bytes to the right of [ 15.731369] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.732151] [ 15.732317] The buggy address belongs to the physical page: [ 15.732708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.733235] flags: 0x200000000000000(node=0|zone=2) [ 15.733672] page_type: f5(slab) [ 15.734092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.734657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.734983] page dumped because: kasan: bad access detected [ 15.735179] [ 15.735282] Memory state around the buggy address: [ 15.735471] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.735966] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.736508] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.737070] ^ [ 15.737433] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.737987] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.738219] ================================================================== [ 16.157681] ================================================================== [ 16.158037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.159082] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.159427] [ 16.159619] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.159731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.159754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.159796] Call Trace: [ 16.159839] <TASK> [ 16.159879] dump_stack_lvl+0x73/0xb0 [ 16.159943] print_report+0xd1/0x650 [ 16.159992] ? __virt_addr_valid+0x1db/0x2d0 [ 16.160036] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.160073] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.160112] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.160154] kasan_report+0x141/0x180 [ 16.160200] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.160254] __asan_report_load8_noabort+0x18/0x20 [ 16.160301] kasan_atomics_helper+0x4f71/0x5450 [ 16.160352] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.160399] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.160446] ? kasan_atomics+0x152/0x310 [ 16.160497] kasan_atomics+0x1dc/0x310 [ 16.160534] ? __pfx_kasan_atomics+0x10/0x10 [ 16.160581] ? __pfx_read_tsc+0x10/0x10 [ 16.160619] ? ktime_get_ts64+0x86/0x230 [ 16.160684] kunit_try_run_case+0x1a5/0x480 [ 16.160733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.160777] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.160823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.160863] ? __kthread_parkme+0x82/0x180 [ 16.160900] ? preempt_count_sub+0x50/0x80 [ 16.160945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.160992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.161042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.161091] kthread+0x337/0x6f0 [ 16.161115] ? trace_preempt_on+0x20/0xc0 [ 16.161140] ? __pfx_kthread+0x10/0x10 [ 16.161158] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.161180] ? calculate_sigpending+0x7b/0xa0 [ 16.161204] ? __pfx_kthread+0x10/0x10 [ 16.161223] ret_from_fork+0x41/0x80 [ 16.161243] ? __pfx_kthread+0x10/0x10 [ 16.161262] ret_from_fork_asm+0x1a/0x30 [ 16.161293] </TASK> [ 16.161307] [ 16.169446] Allocated by task 285: [ 16.169778] kasan_save_stack+0x45/0x70 [ 16.170124] kasan_save_track+0x18/0x40 [ 16.170398] kasan_save_alloc_info+0x3b/0x50 [ 16.170818] __kasan_kmalloc+0xb7/0xc0 [ 16.171116] __kmalloc_cache_noprof+0x189/0x420 [ 16.171411] kasan_atomics+0x95/0x310 [ 16.171704] kunit_try_run_case+0x1a5/0x480 [ 16.171923] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.172199] kthread+0x337/0x6f0 [ 16.172423] ret_from_fork+0x41/0x80 [ 16.172657] ret_from_fork_asm+0x1a/0x30 [ 16.172955] [ 16.173095] The buggy address belongs to the object at ffff8881029ef680 [ 16.173095] which belongs to the cache kmalloc-64 of size 64 [ 16.173541] The buggy address is located 0 bytes to the right of [ 16.173541] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.174250] [ 16.174353] The buggy address belongs to the physical page: [ 16.174688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.175016] flags: 0x200000000000000(node=0|zone=2) [ 16.175220] page_type: f5(slab) [ 16.175393] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.175657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.175901] page dumped because: kasan: bad access detected [ 16.176094] [ 16.176193] Memory state around the buggy address: [ 16.176525] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.177175] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.177673] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.178307] ^ [ 16.178676] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.179151] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.179599] ================================================================== [ 15.100349] ================================================================== [ 15.100828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.101546] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.102052] [ 15.102742] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.102863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.102923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.102967] Call Trace: [ 15.103014] <TASK> [ 15.103056] dump_stack_lvl+0x73/0xb0 [ 15.103126] print_report+0xd1/0x650 [ 15.103186] ? __virt_addr_valid+0x1db/0x2d0 [ 15.103246] ? kasan_atomics_helper+0xac7/0x5450 [ 15.103296] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.103340] ? kasan_atomics_helper+0xac7/0x5450 [ 15.103378] kasan_report+0x141/0x180 [ 15.103403] ? kasan_atomics_helper+0xac7/0x5450 [ 15.103429] kasan_check_range+0x10c/0x1c0 [ 15.103450] __kasan_check_write+0x18/0x20 [ 15.103470] kasan_atomics_helper+0xac7/0x5450 [ 15.103492] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.103514] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.103544] ? kasan_atomics+0x152/0x310 [ 15.103578] kasan_atomics+0x1dc/0x310 [ 15.103599] ? __pfx_kasan_atomics+0x10/0x10 [ 15.103619] ? __pfx_read_tsc+0x10/0x10 [ 15.103658] ? ktime_get_ts64+0x86/0x230 [ 15.103684] kunit_try_run_case+0x1a5/0x480 [ 15.103709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.103730] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.103754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.103776] ? __kthread_parkme+0x82/0x180 [ 15.103799] ? preempt_count_sub+0x50/0x80 [ 15.103824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.103846] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.103868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.103890] kthread+0x337/0x6f0 [ 15.103944] ? trace_preempt_on+0x20/0xc0 [ 15.103971] ? __pfx_kthread+0x10/0x10 [ 15.103989] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.104011] ? calculate_sigpending+0x7b/0xa0 [ 15.104034] ? __pfx_kthread+0x10/0x10 [ 15.104052] ret_from_fork+0x41/0x80 [ 15.104072] ? __pfx_kthread+0x10/0x10 [ 15.104089] ret_from_fork_asm+0x1a/0x30 [ 15.104119] </TASK> [ 15.104133] [ 15.113644] Allocated by task 285: [ 15.114019] kasan_save_stack+0x45/0x70 [ 15.114256] kasan_save_track+0x18/0x40 [ 15.114548] kasan_save_alloc_info+0x3b/0x50 [ 15.115045] __kasan_kmalloc+0xb7/0xc0 [ 15.115335] __kmalloc_cache_noprof+0x189/0x420 [ 15.115911] kasan_atomics+0x95/0x310 [ 15.117084] kunit_try_run_case+0x1a5/0x480 [ 15.117516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.118131] kthread+0x337/0x6f0 [ 15.118445] ret_from_fork+0x41/0x80 [ 15.118757] ret_from_fork_asm+0x1a/0x30 [ 15.118953] [ 15.119126] The buggy address belongs to the object at ffff8881029ef680 [ 15.119126] which belongs to the cache kmalloc-64 of size 64 [ 15.119585] The buggy address is located 0 bytes to the right of [ 15.119585] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.120228] [ 15.120401] The buggy address belongs to the physical page: [ 15.120857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.121181] flags: 0x200000000000000(node=0|zone=2) [ 15.121523] page_type: f5(slab) [ 15.121840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.122115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.122668] page dumped because: kasan: bad access detected [ 15.122969] [ 15.123100] Memory state around the buggy address: [ 15.123412] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.123777] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.124045] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.124433] ^ [ 15.124841] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.125221] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.125519] ================================================================== [ 14.682146] ================================================================== [ 14.683379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.683926] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.684250] [ 14.684495] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.684591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.684617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.684672] Call Trace: [ 14.684716] <TASK> [ 14.684756] dump_stack_lvl+0x73/0xb0 [ 14.684843] print_report+0xd1/0x650 [ 14.684887] ? __virt_addr_valid+0x1db/0x2d0 [ 14.684930] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.684973] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.685030] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.685074] kasan_report+0x141/0x180 [ 14.685118] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.685170] __asan_report_store4_noabort+0x1b/0x30 [ 14.685215] kasan_atomics_helper+0x4b6e/0x5450 [ 14.685256] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.685525] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.685598] ? kasan_atomics+0x152/0x310 [ 14.685717] kasan_atomics+0x1dc/0x310 [ 14.685745] ? __pfx_kasan_atomics+0x10/0x10 [ 14.685767] ? __pfx_read_tsc+0x10/0x10 [ 14.685788] ? ktime_get_ts64+0x86/0x230 [ 14.685813] kunit_try_run_case+0x1a5/0x480 [ 14.685840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.685862] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.685887] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.685911] ? __kthread_parkme+0x82/0x180 [ 14.685933] ? preempt_count_sub+0x50/0x80 [ 14.685972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.685996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.686020] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.686043] kthread+0x337/0x6f0 [ 14.686062] ? trace_preempt_on+0x20/0xc0 [ 14.686086] ? __pfx_kthread+0x10/0x10 [ 14.686105] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.686126] ? calculate_sigpending+0x7b/0xa0 [ 14.686148] ? __pfx_kthread+0x10/0x10 [ 14.686168] ret_from_fork+0x41/0x80 [ 14.686189] ? __pfx_kthread+0x10/0x10 [ 14.686210] ret_from_fork_asm+0x1a/0x30 [ 14.686241] </TASK> [ 14.686254] [ 14.699037] Allocated by task 285: [ 14.699283] kasan_save_stack+0x45/0x70 [ 14.699510] kasan_save_track+0x18/0x40 [ 14.700289] kasan_save_alloc_info+0x3b/0x50 [ 14.700518] __kasan_kmalloc+0xb7/0xc0 [ 14.700704] __kmalloc_cache_noprof+0x189/0x420 [ 14.701423] kasan_atomics+0x95/0x310 [ 14.701832] kunit_try_run_case+0x1a5/0x480 [ 14.702184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.702584] kthread+0x337/0x6f0 [ 14.702754] ret_from_fork+0x41/0x80 [ 14.703413] ret_from_fork_asm+0x1a/0x30 [ 14.703788] [ 14.703928] The buggy address belongs to the object at ffff8881029ef680 [ 14.703928] which belongs to the cache kmalloc-64 of size 64 [ 14.705197] The buggy address is located 0 bytes to the right of [ 14.705197] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 14.705580] [ 14.705681] The buggy address belongs to the physical page: [ 14.705822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 14.706929] flags: 0x200000000000000(node=0|zone=2) [ 14.707213] page_type: f5(slab) [ 14.707986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.708217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.709082] page dumped because: kasan: bad access detected [ 14.709485] [ 14.709642] Memory state around the buggy address: [ 14.709888] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.710679] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.711711] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.711980] ^ [ 14.712169] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.713025] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.713361] ================================================================== [ 14.958411] ================================================================== [ 14.958753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.959349] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.959992] [ 14.960190] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.960295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.960322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.960370] Call Trace: [ 14.960418] <TASK> [ 14.960460] dump_stack_lvl+0x73/0xb0 [ 14.960518] print_report+0xd1/0x650 [ 14.960573] ? __virt_addr_valid+0x1db/0x2d0 [ 14.960609] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.960661] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.960698] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.960728] kasan_report+0x141/0x180 [ 14.960761] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.960799] kasan_check_range+0x10c/0x1c0 [ 14.960834] __kasan_check_write+0x18/0x20 [ 14.960909] kasan_atomics_helper+0x7c7/0x5450 [ 14.960966] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.961032] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.961107] ? kasan_atomics+0x152/0x310 [ 14.961163] kasan_atomics+0x1dc/0x310 [ 14.961207] ? __pfx_kasan_atomics+0x10/0x10 [ 14.961252] ? __pfx_read_tsc+0x10/0x10 [ 14.961294] ? ktime_get_ts64+0x86/0x230 [ 14.961345] kunit_try_run_case+0x1a5/0x480 [ 14.961397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.961436] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.961484] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.961550] ? __kthread_parkme+0x82/0x180 [ 14.961591] ? preempt_count_sub+0x50/0x80 [ 14.961664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.961729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.961779] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.961817] kthread+0x337/0x6f0 [ 14.961849] ? trace_preempt_on+0x20/0xc0 [ 14.961894] ? __pfx_kthread+0x10/0x10 [ 14.961964] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.962021] ? calculate_sigpending+0x7b/0xa0 [ 14.962069] ? __pfx_kthread+0x10/0x10 [ 14.962113] ret_from_fork+0x41/0x80 [ 14.962159] ? __pfx_kthread+0x10/0x10 [ 14.962199] ret_from_fork_asm+0x1a/0x30 [ 14.962256] </TASK> [ 14.962280] [ 14.975294] Allocated by task 285: [ 14.975662] kasan_save_stack+0x45/0x70 [ 14.976053] kasan_save_track+0x18/0x40 [ 14.976393] kasan_save_alloc_info+0x3b/0x50 [ 14.976904] __kasan_kmalloc+0xb7/0xc0 [ 14.977249] __kmalloc_cache_noprof+0x189/0x420 [ 14.977721] kasan_atomics+0x95/0x310 [ 14.977893] kunit_try_run_case+0x1a5/0x480 [ 14.978232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.978689] kthread+0x337/0x6f0 [ 14.979008] ret_from_fork+0x41/0x80 [ 14.979280] ret_from_fork_asm+0x1a/0x30 [ 14.979755] [ 14.979856] The buggy address belongs to the object at ffff8881029ef680 [ 14.979856] which belongs to the cache kmalloc-64 of size 64 [ 14.980611] The buggy address is located 0 bytes to the right of [ 14.980611] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 14.981741] [ 14.981896] The buggy address belongs to the physical page: [ 14.982191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 14.983109] flags: 0x200000000000000(node=0|zone=2) [ 14.983448] page_type: f5(slab) [ 14.983834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.984219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.984586] page dumped because: kasan: bad access detected [ 14.985064] [ 14.985239] Memory state around the buggy address: [ 14.985738] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.986103] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.986775] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.987257] ^ [ 14.988240] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.988488] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.989187] ================================================================== [ 15.480595] ================================================================== [ 15.480866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.481461] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.482223] [ 15.482473] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.482590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.482616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.482674] Call Trace: [ 15.482749] <TASK> [ 15.482804] dump_stack_lvl+0x73/0xb0 [ 15.482862] print_report+0xd1/0x650 [ 15.482888] ? __virt_addr_valid+0x1db/0x2d0 [ 15.482911] ? kasan_atomics_helper+0x1217/0x5450 [ 15.482932] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.482955] ? kasan_atomics_helper+0x1217/0x5450 [ 15.482976] kasan_report+0x141/0x180 [ 15.483008] ? kasan_atomics_helper+0x1217/0x5450 [ 15.483042] kasan_check_range+0x10c/0x1c0 [ 15.483062] __kasan_check_write+0x18/0x20 [ 15.483081] kasan_atomics_helper+0x1217/0x5450 [ 15.483103] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.483124] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.483146] ? kasan_atomics+0x152/0x310 [ 15.483168] kasan_atomics+0x1dc/0x310 [ 15.483186] ? __pfx_kasan_atomics+0x10/0x10 [ 15.483206] ? __pfx_read_tsc+0x10/0x10 [ 15.483226] ? ktime_get_ts64+0x86/0x230 [ 15.483251] kunit_try_run_case+0x1a5/0x480 [ 15.483275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.483296] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.483319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.483340] ? __kthread_parkme+0x82/0x180 [ 15.483362] ? preempt_count_sub+0x50/0x80 [ 15.483385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.483407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.483429] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.483450] kthread+0x337/0x6f0 [ 15.483466] ? trace_preempt_on+0x20/0xc0 [ 15.483489] ? __pfx_kthread+0x10/0x10 [ 15.483506] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.483527] ? calculate_sigpending+0x7b/0xa0 [ 15.483567] ? __pfx_kthread+0x10/0x10 [ 15.483586] ret_from_fork+0x41/0x80 [ 15.483606] ? __pfx_kthread+0x10/0x10 [ 15.483640] ret_from_fork_asm+0x1a/0x30 [ 15.483672] </TASK> [ 15.483686] [ 15.493100] Allocated by task 285: [ 15.493486] kasan_save_stack+0x45/0x70 [ 15.493878] kasan_save_track+0x18/0x40 [ 15.494277] kasan_save_alloc_info+0x3b/0x50 [ 15.494712] __kasan_kmalloc+0xb7/0xc0 [ 15.495015] __kmalloc_cache_noprof+0x189/0x420 [ 15.495395] kasan_atomics+0x95/0x310 [ 15.495746] kunit_try_run_case+0x1a5/0x480 [ 15.496108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.496573] kthread+0x337/0x6f0 [ 15.496883] ret_from_fork+0x41/0x80 [ 15.497188] ret_from_fork_asm+0x1a/0x30 [ 15.497363] [ 15.497470] The buggy address belongs to the object at ffff8881029ef680 [ 15.497470] which belongs to the cache kmalloc-64 of size 64 [ 15.498224] The buggy address is located 0 bytes to the right of [ 15.498224] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.499140] [ 15.499302] The buggy address belongs to the physical page: [ 15.499737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.500088] flags: 0x200000000000000(node=0|zone=2) [ 15.500445] page_type: f5(slab) [ 15.500807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.501184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.501747] page dumped because: kasan: bad access detected [ 15.502043] [ 15.502205] Memory state around the buggy address: [ 15.502473] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.502936] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.503189] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.503754] ^ [ 15.504233] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.504546] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.504871] ================================================================== [ 16.026697] ================================================================== [ 16.027215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.027616] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.028102] [ 16.028327] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.028449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.028477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.028523] Call Trace: [ 16.028599] <TASK> [ 16.028658] dump_stack_lvl+0x73/0xb0 [ 16.028735] print_report+0xd1/0x650 [ 16.028795] ? __virt_addr_valid+0x1db/0x2d0 [ 16.028838] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.028889] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.028928] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.028971] kasan_report+0x141/0x180 [ 16.029016] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.029070] kasan_check_range+0x10c/0x1c0 [ 16.029114] __kasan_check_write+0x18/0x20 [ 16.029156] kasan_atomics_helper+0x1ce1/0x5450 [ 16.029203] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.029245] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.029288] ? kasan_atomics+0x152/0x310 [ 16.029339] kasan_atomics+0x1dc/0x310 [ 16.029381] ? __pfx_kasan_atomics+0x10/0x10 [ 16.029423] ? __pfx_read_tsc+0x10/0x10 [ 16.029456] ? ktime_get_ts64+0x86/0x230 [ 16.029503] kunit_try_run_case+0x1a5/0x480 [ 16.029588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.029640] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.029686] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.029737] ? __kthread_parkme+0x82/0x180 [ 16.029781] ? preempt_count_sub+0x50/0x80 [ 16.029848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.029898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.029952] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.030004] kthread+0x337/0x6f0 [ 16.030046] ? trace_preempt_on+0x20/0xc0 [ 16.030097] ? __pfx_kthread+0x10/0x10 [ 16.030139] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.030184] ? calculate_sigpending+0x7b/0xa0 [ 16.030231] ? __pfx_kthread+0x10/0x10 [ 16.030252] ret_from_fork+0x41/0x80 [ 16.030274] ? __pfx_kthread+0x10/0x10 [ 16.030292] ret_from_fork_asm+0x1a/0x30 [ 16.030322] </TASK> [ 16.030335] [ 16.039719] Allocated by task 285: [ 16.039951] kasan_save_stack+0x45/0x70 [ 16.040172] kasan_save_track+0x18/0x40 [ 16.040343] kasan_save_alloc_info+0x3b/0x50 [ 16.040537] __kasan_kmalloc+0xb7/0xc0 [ 16.040856] __kmalloc_cache_noprof+0x189/0x420 [ 16.041277] kasan_atomics+0x95/0x310 [ 16.041584] kunit_try_run_case+0x1a5/0x480 [ 16.041914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.042173] kthread+0x337/0x6f0 [ 16.042332] ret_from_fork+0x41/0x80 [ 16.042502] ret_from_fork_asm+0x1a/0x30 [ 16.042815] [ 16.042982] The buggy address belongs to the object at ffff8881029ef680 [ 16.042982] which belongs to the cache kmalloc-64 of size 64 [ 16.043837] The buggy address is located 0 bytes to the right of [ 16.043837] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.044642] [ 16.044825] The buggy address belongs to the physical page: [ 16.045104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.045423] flags: 0x200000000000000(node=0|zone=2) [ 16.045779] page_type: f5(slab) [ 16.045969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.046278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.048293] page dumped because: kasan: bad access detected [ 16.048521] [ 16.048707] Memory state around the buggy address: [ 16.049064] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.049444] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.050118] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.050397] ^ [ 16.050598] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.051144] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.051584] ================================================================== [ 15.266941] ================================================================== [ 15.267204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.268091] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.268485] [ 15.268748] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.268924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.268955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.269002] Call Trace: [ 15.269045] <TASK> [ 15.269089] dump_stack_lvl+0x73/0xb0 [ 15.269153] print_report+0xd1/0x650 [ 15.269194] ? __virt_addr_valid+0x1db/0x2d0 [ 15.269219] ? kasan_atomics_helper+0xe78/0x5450 [ 15.269240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.269261] ? kasan_atomics_helper+0xe78/0x5450 [ 15.269282] kasan_report+0x141/0x180 [ 15.269304] ? kasan_atomics_helper+0xe78/0x5450 [ 15.269329] kasan_check_range+0x10c/0x1c0 [ 15.269349] __kasan_check_write+0x18/0x20 [ 15.269369] kasan_atomics_helper+0xe78/0x5450 [ 15.269390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.269412] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.269433] ? kasan_atomics+0x152/0x310 [ 15.269455] kasan_atomics+0x1dc/0x310 [ 15.269474] ? __pfx_kasan_atomics+0x10/0x10 [ 15.269495] ? __pfx_read_tsc+0x10/0x10 [ 15.269515] ? ktime_get_ts64+0x86/0x230 [ 15.269571] kunit_try_run_case+0x1a5/0x480 [ 15.269602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.269641] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.269668] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.269691] ? __kthread_parkme+0x82/0x180 [ 15.269714] ? preempt_count_sub+0x50/0x80 [ 15.269739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.269762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.269786] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.269808] kthread+0x337/0x6f0 [ 15.269826] ? trace_preempt_on+0x20/0xc0 [ 15.269850] ? __pfx_kthread+0x10/0x10 [ 15.269868] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.269890] ? calculate_sigpending+0x7b/0xa0 [ 15.269913] ? __pfx_kthread+0x10/0x10 [ 15.269932] ret_from_fork+0x41/0x80 [ 15.269964] ? __pfx_kthread+0x10/0x10 [ 15.269984] ret_from_fork_asm+0x1a/0x30 [ 15.270016] </TASK> [ 15.270030] [ 15.281047] Allocated by task 285: [ 15.281415] kasan_save_stack+0x45/0x70 [ 15.281834] kasan_save_track+0x18/0x40 [ 15.282174] kasan_save_alloc_info+0x3b/0x50 [ 15.282502] __kasan_kmalloc+0xb7/0xc0 [ 15.282861] __kmalloc_cache_noprof+0x189/0x420 [ 15.283062] kasan_atomics+0x95/0x310 [ 15.283230] kunit_try_run_case+0x1a5/0x480 [ 15.283600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.284053] kthread+0x337/0x6f0 [ 15.284338] ret_from_fork+0x41/0x80 [ 15.284663] ret_from_fork_asm+0x1a/0x30 [ 15.284999] [ 15.285171] The buggy address belongs to the object at ffff8881029ef680 [ 15.285171] which belongs to the cache kmalloc-64 of size 64 [ 15.285564] The buggy address is located 0 bytes to the right of [ 15.285564] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.286425] [ 15.286648] The buggy address belongs to the physical page: [ 15.286929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.287519] flags: 0x200000000000000(node=0|zone=2) [ 15.287970] page_type: f5(slab) [ 15.288164] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.288854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.289277] page dumped because: kasan: bad access detected [ 15.289784] [ 15.289957] Memory state around the buggy address: [ 15.290333] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.291085] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.291639] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.291937] ^ [ 15.292272] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.292741] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.293159] ================================================================== [ 15.400453] ================================================================== [ 15.401034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.401606] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.402069] [ 15.402293] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.402403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.402432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.402473] Call Trace: [ 15.402521] <TASK> [ 15.402690] dump_stack_lvl+0x73/0xb0 [ 15.402778] print_report+0xd1/0x650 [ 15.402828] ? __virt_addr_valid+0x1db/0x2d0 [ 15.402873] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.402914] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.402938] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.402961] kasan_report+0x141/0x180 [ 15.402984] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.403009] __asan_report_load4_noabort+0x18/0x20 [ 15.403029] kasan_atomics_helper+0x4a1c/0x5450 [ 15.403051] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.403073] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.403093] ? kasan_atomics+0x152/0x310 [ 15.403118] kasan_atomics+0x1dc/0x310 [ 15.403137] ? __pfx_kasan_atomics+0x10/0x10 [ 15.403158] ? __pfx_read_tsc+0x10/0x10 [ 15.403178] ? ktime_get_ts64+0x86/0x230 [ 15.403203] kunit_try_run_case+0x1a5/0x480 [ 15.403227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.403248] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.403271] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.403292] ? __kthread_parkme+0x82/0x180 [ 15.403314] ? preempt_count_sub+0x50/0x80 [ 15.403338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.403360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.403382] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.403404] kthread+0x337/0x6f0 [ 15.403420] ? trace_preempt_on+0x20/0xc0 [ 15.403443] ? __pfx_kthread+0x10/0x10 [ 15.403461] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.403482] ? calculate_sigpending+0x7b/0xa0 [ 15.403503] ? __pfx_kthread+0x10/0x10 [ 15.403521] ret_from_fork+0x41/0x80 [ 15.403565] ? __pfx_kthread+0x10/0x10 [ 15.403587] ret_from_fork_asm+0x1a/0x30 [ 15.403618] </TASK> [ 15.403647] [ 15.413040] Allocated by task 285: [ 15.413429] kasan_save_stack+0x45/0x70 [ 15.413792] kasan_save_track+0x18/0x40 [ 15.414042] kasan_save_alloc_info+0x3b/0x50 [ 15.414322] __kasan_kmalloc+0xb7/0xc0 [ 15.414684] __kmalloc_cache_noprof+0x189/0x420 [ 15.414885] kasan_atomics+0x95/0x310 [ 15.415183] kunit_try_run_case+0x1a5/0x480 [ 15.415524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.415763] kthread+0x337/0x6f0 [ 15.416032] ret_from_fork+0x41/0x80 [ 15.416299] ret_from_fork_asm+0x1a/0x30 [ 15.416567] [ 15.416727] The buggy address belongs to the object at ffff8881029ef680 [ 15.416727] which belongs to the cache kmalloc-64 of size 64 [ 15.417199] The buggy address is located 0 bytes to the right of [ 15.417199] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.417564] [ 15.417745] The buggy address belongs to the physical page: [ 15.418240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.418833] flags: 0x200000000000000(node=0|zone=2) [ 15.419236] page_type: f5(slab) [ 15.419486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.419856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.420102] page dumped because: kasan: bad access detected [ 15.420332] [ 15.420477] Memory state around the buggy address: [ 15.420881] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.421501] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.422026] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.422299] ^ [ 15.422497] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.423155] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.423642] ================================================================== [ 15.424936] ================================================================== [ 15.425380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.425690] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.425950] [ 15.426100] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.426214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.426237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.426281] Call Trace: [ 15.426321] <TASK> [ 15.426362] dump_stack_lvl+0x73/0xb0 [ 15.426412] print_report+0xd1/0x650 [ 15.426446] ? __virt_addr_valid+0x1db/0x2d0 [ 15.426480] ? kasan_atomics_helper+0x1148/0x5450 [ 15.426510] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.426542] ? kasan_atomics_helper+0x1148/0x5450 [ 15.426575] kasan_report+0x141/0x180 [ 15.426609] ? kasan_atomics_helper+0x1148/0x5450 [ 15.426676] kasan_check_range+0x10c/0x1c0 [ 15.426715] __kasan_check_write+0x18/0x20 [ 15.426758] kasan_atomics_helper+0x1148/0x5450 [ 15.426803] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.426851] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.426899] ? kasan_atomics+0x152/0x310 [ 15.426952] kasan_atomics+0x1dc/0x310 [ 15.426993] ? __pfx_kasan_atomics+0x10/0x10 [ 15.427038] ? __pfx_read_tsc+0x10/0x10 [ 15.427078] ? ktime_get_ts64+0x86/0x230 [ 15.427130] kunit_try_run_case+0x1a5/0x480 [ 15.427182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.427225] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.427274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.427314] ? __kthread_parkme+0x82/0x180 [ 15.427344] ? preempt_count_sub+0x50/0x80 [ 15.427377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.427408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.427440] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.427471] kthread+0x337/0x6f0 [ 15.427496] ? trace_preempt_on+0x20/0xc0 [ 15.427529] ? __pfx_kthread+0x10/0x10 [ 15.427558] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.427589] ? calculate_sigpending+0x7b/0xa0 [ 15.427637] ? __pfx_kthread+0x10/0x10 [ 15.427674] ret_from_fork+0x41/0x80 [ 15.427712] ? __pfx_kthread+0x10/0x10 [ 15.427743] ret_from_fork_asm+0x1a/0x30 [ 15.427808] </TASK> [ 15.427832] [ 15.440105] Allocated by task 285: [ 15.440373] kasan_save_stack+0x45/0x70 [ 15.441312] kasan_save_track+0x18/0x40 [ 15.442075] kasan_save_alloc_info+0x3b/0x50 [ 15.442464] __kasan_kmalloc+0xb7/0xc0 [ 15.442832] __kmalloc_cache_noprof+0x189/0x420 [ 15.443220] kasan_atomics+0x95/0x310 [ 15.443504] kunit_try_run_case+0x1a5/0x480 [ 15.443700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.444004] kthread+0x337/0x6f0 [ 15.444167] ret_from_fork+0x41/0x80 [ 15.444480] ret_from_fork_asm+0x1a/0x30 [ 15.444714] [ 15.444817] The buggy address belongs to the object at ffff8881029ef680 [ 15.444817] which belongs to the cache kmalloc-64 of size 64 [ 15.445455] The buggy address is located 0 bytes to the right of [ 15.445455] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.446179] [ 15.446400] The buggy address belongs to the physical page: [ 15.446804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.447104] flags: 0x200000000000000(node=0|zone=2) [ 15.447467] page_type: f5(slab) [ 15.447762] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.448131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.448575] page dumped because: kasan: bad access detected [ 15.448804] [ 15.448973] Memory state around the buggy address: [ 15.449210] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.449683] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.450067] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.450434] ^ [ 15.450638] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.451156] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.451718] ================================================================== [ 14.807241] ================================================================== [ 14.808404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.809169] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.810075] [ 14.810314] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.810528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.810555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.810595] Call Trace: [ 14.810657] <TASK> [ 14.810702] dump_stack_lvl+0x73/0xb0 [ 14.810770] print_report+0xd1/0x650 [ 14.810818] ? __virt_addr_valid+0x1db/0x2d0 [ 14.810863] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.810909] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.810949] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.810981] kasan_report+0x141/0x180 [ 14.811005] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.811031] __asan_report_store4_noabort+0x1b/0x30 [ 14.811053] kasan_atomics_helper+0x4b3a/0x5450 [ 14.811076] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.811098] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.811121] ? kasan_atomics+0x152/0x310 [ 14.811143] kasan_atomics+0x1dc/0x310 [ 14.811163] ? __pfx_kasan_atomics+0x10/0x10 [ 14.811183] ? __pfx_read_tsc+0x10/0x10 [ 14.811202] ? ktime_get_ts64+0x86/0x230 [ 14.811227] kunit_try_run_case+0x1a5/0x480 [ 14.811251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.811271] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.811318] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.811340] ? __kthread_parkme+0x82/0x180 [ 14.811361] ? preempt_count_sub+0x50/0x80 [ 14.811386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.811408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.811432] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.811453] kthread+0x337/0x6f0 [ 14.811470] ? trace_preempt_on+0x20/0xc0 [ 14.811493] ? __pfx_kthread+0x10/0x10 [ 14.811511] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.811531] ? calculate_sigpending+0x7b/0xa0 [ 14.811593] ? __pfx_kthread+0x10/0x10 [ 14.811638] ret_from_fork+0x41/0x80 [ 14.811678] ? __pfx_kthread+0x10/0x10 [ 14.811718] ret_from_fork_asm+0x1a/0x30 [ 14.811752] </TASK> [ 14.811766] [ 14.823503] Allocated by task 285: [ 14.823969] kasan_save_stack+0x45/0x70 [ 14.824764] kasan_save_track+0x18/0x40 [ 14.825512] kasan_save_alloc_info+0x3b/0x50 [ 14.825706] __kasan_kmalloc+0xb7/0xc0 [ 14.826146] __kmalloc_cache_noprof+0x189/0x420 [ 14.826774] kasan_atomics+0x95/0x310 [ 14.827089] kunit_try_run_case+0x1a5/0x480 [ 14.827579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.827968] kthread+0x337/0x6f0 [ 14.828274] ret_from_fork+0x41/0x80 [ 14.828645] ret_from_fork_asm+0x1a/0x30 [ 14.828953] [ 14.829125] The buggy address belongs to the object at ffff8881029ef680 [ 14.829125] which belongs to the cache kmalloc-64 of size 64 [ 14.830270] The buggy address is located 0 bytes to the right of [ 14.830270] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 14.830896] [ 14.831071] The buggy address belongs to the physical page: [ 14.831349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 14.831843] flags: 0x200000000000000(node=0|zone=2) [ 14.832063] page_type: f5(slab) [ 14.832231] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.833068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.833734] page dumped because: kasan: bad access detected [ 14.834716] [ 14.834828] Memory state around the buggy address: [ 14.834999] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.835960] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.836370] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.837569] ^ [ 14.838031] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.838500] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.839494] ================================================================== [ 15.016374] ================================================================== [ 15.016924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.018250] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.018988] [ 15.019270] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.019634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.019659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.019688] Call Trace: [ 15.019715] <TASK> [ 15.019743] dump_stack_lvl+0x73/0xb0 [ 15.019783] print_report+0xd1/0x650 [ 15.019807] ? __virt_addr_valid+0x1db/0x2d0 [ 15.019830] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.019851] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.019874] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.019895] kasan_report+0x141/0x180 [ 15.019917] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.019944] kasan_check_range+0x10c/0x1c0 [ 15.019965] __kasan_check_write+0x18/0x20 [ 15.019984] kasan_atomics_helper+0x8f9/0x5450 [ 15.020006] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.020028] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.020050] ? kasan_atomics+0x152/0x310 [ 15.020072] kasan_atomics+0x1dc/0x310 [ 15.020091] ? __pfx_kasan_atomics+0x10/0x10 [ 15.020112] ? __pfx_read_tsc+0x10/0x10 [ 15.020131] ? ktime_get_ts64+0x86/0x230 [ 15.020156] kunit_try_run_case+0x1a5/0x480 [ 15.020181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.020203] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.020227] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.020250] ? __kthread_parkme+0x82/0x180 [ 15.020272] ? preempt_count_sub+0x50/0x80 [ 15.020336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.020377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.020411] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.020444] kthread+0x337/0x6f0 [ 15.020470] ? trace_preempt_on+0x20/0xc0 [ 15.020500] ? __pfx_kthread+0x10/0x10 [ 15.020526] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.020567] ? calculate_sigpending+0x7b/0xa0 [ 15.020597] ? __pfx_kthread+0x10/0x10 [ 15.020637] ret_from_fork+0x41/0x80 [ 15.020669] ? __pfx_kthread+0x10/0x10 [ 15.020697] ret_from_fork_asm+0x1a/0x30 [ 15.020738] </TASK> [ 15.020756] [ 15.030266] Allocated by task 285: [ 15.030740] kasan_save_stack+0x45/0x70 [ 15.031693] kasan_save_track+0x18/0x40 [ 15.032054] kasan_save_alloc_info+0x3b/0x50 [ 15.032515] __kasan_kmalloc+0xb7/0xc0 [ 15.032904] __kmalloc_cache_noprof+0x189/0x420 [ 15.033437] kasan_atomics+0x95/0x310 [ 15.033800] kunit_try_run_case+0x1a5/0x480 [ 15.034129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.034452] kthread+0x337/0x6f0 [ 15.034672] ret_from_fork+0x41/0x80 [ 15.035323] ret_from_fork_asm+0x1a/0x30 [ 15.035650] [ 15.035772] The buggy address belongs to the object at ffff8881029ef680 [ 15.035772] which belongs to the cache kmalloc-64 of size 64 [ 15.036344] The buggy address is located 0 bytes to the right of [ 15.036344] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.037401] [ 15.037572] The buggy address belongs to the physical page: [ 15.037956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.038541] flags: 0x200000000000000(node=0|zone=2) [ 15.038903] page_type: f5(slab) [ 15.039508] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.039983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.040609] page dumped because: kasan: bad access detected [ 15.040918] [ 15.041038] Memory state around the buggy address: [ 15.041215] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.042047] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.043076] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.043319] ^ [ 15.043742] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.044162] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.044479] ================================================================== [ 15.046098] ================================================================== [ 15.046403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.046779] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.047090] [ 15.047396] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.047505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.047531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.047600] Call Trace: [ 15.047659] <TASK> [ 15.047701] dump_stack_lvl+0x73/0xb0 [ 15.047762] print_report+0xd1/0x650 [ 15.047812] ? __virt_addr_valid+0x1db/0x2d0 [ 15.047859] ? kasan_atomics_helper+0x992/0x5450 [ 15.047901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.047938] ? kasan_atomics_helper+0x992/0x5450 [ 15.047979] kasan_report+0x141/0x180 [ 15.048021] ? kasan_atomics_helper+0x992/0x5450 [ 15.048076] kasan_check_range+0x10c/0x1c0 [ 15.048120] __kasan_check_write+0x18/0x20 [ 15.048163] kasan_atomics_helper+0x992/0x5450 [ 15.048212] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.048259] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.048411] ? kasan_atomics+0x152/0x310 [ 15.048442] kasan_atomics+0x1dc/0x310 [ 15.048463] ? __pfx_kasan_atomics+0x10/0x10 [ 15.048486] ? __pfx_read_tsc+0x10/0x10 [ 15.048506] ? ktime_get_ts64+0x86/0x230 [ 15.048531] kunit_try_run_case+0x1a5/0x480 [ 15.048568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.048590] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.048615] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.048657] ? __kthread_parkme+0x82/0x180 [ 15.048680] ? preempt_count_sub+0x50/0x80 [ 15.048705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.048728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.048751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.048773] kthread+0x337/0x6f0 [ 15.048792] ? trace_preempt_on+0x20/0xc0 [ 15.048816] ? __pfx_kthread+0x10/0x10 [ 15.048835] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.048856] ? calculate_sigpending+0x7b/0xa0 [ 15.048878] ? __pfx_kthread+0x10/0x10 [ 15.048897] ret_from_fork+0x41/0x80 [ 15.048917] ? __pfx_kthread+0x10/0x10 [ 15.048936] ret_from_fork_asm+0x1a/0x30 [ 15.048966] </TASK> [ 15.048980] [ 15.059779] Allocated by task 285: [ 15.060055] kasan_save_stack+0x45/0x70 [ 15.060335] kasan_save_track+0x18/0x40 [ 15.060542] kasan_save_alloc_info+0x3b/0x50 [ 15.060852] __kasan_kmalloc+0xb7/0xc0 [ 15.061174] __kmalloc_cache_noprof+0x189/0x420 [ 15.061534] kasan_atomics+0x95/0x310 [ 15.061752] kunit_try_run_case+0x1a5/0x480 [ 15.061937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.062162] kthread+0x337/0x6f0 [ 15.062319] ret_from_fork+0x41/0x80 [ 15.062485] ret_from_fork_asm+0x1a/0x30 [ 15.062781] [ 15.062932] The buggy address belongs to the object at ffff8881029ef680 [ 15.062932] which belongs to the cache kmalloc-64 of size 64 [ 15.063799] The buggy address is located 0 bytes to the right of [ 15.063799] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.064964] [ 15.065156] The buggy address belongs to the physical page: [ 15.065649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.066060] flags: 0x200000000000000(node=0|zone=2) [ 15.066215] page_type: f5(slab) [ 15.066447] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.067112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.067525] page dumped because: kasan: bad access detected [ 15.067877] [ 15.068170] Memory state around the buggy address: [ 15.068783] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.069123] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.070327] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.071040] ^ [ 15.072311] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.072690] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.073049] ================================================================== [ 15.688056] ================================================================== [ 15.688695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.689409] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.690110] [ 15.690361] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.690476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.690525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.690601] Call Trace: [ 15.690681] <TASK> [ 15.690736] dump_stack_lvl+0x73/0xb0 [ 15.690805] print_report+0xd1/0x650 [ 15.690850] ? __virt_addr_valid+0x1db/0x2d0 [ 15.690894] ? kasan_atomics_helper+0x151d/0x5450 [ 15.690971] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.691031] ? kasan_atomics_helper+0x151d/0x5450 [ 15.691056] kasan_report+0x141/0x180 [ 15.691091] ? kasan_atomics_helper+0x151d/0x5450 [ 15.691126] kasan_check_range+0x10c/0x1c0 [ 15.691148] __kasan_check_write+0x18/0x20 [ 15.691169] kasan_atomics_helper+0x151d/0x5450 [ 15.691191] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.691213] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.691234] ? kasan_atomics+0x152/0x310 [ 15.691257] kasan_atomics+0x1dc/0x310 [ 15.691276] ? __pfx_kasan_atomics+0x10/0x10 [ 15.691297] ? __pfx_read_tsc+0x10/0x10 [ 15.691317] ? ktime_get_ts64+0x86/0x230 [ 15.691342] kunit_try_run_case+0x1a5/0x480 [ 15.691366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.691387] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.691411] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.691434] ? __kthread_parkme+0x82/0x180 [ 15.691457] ? preempt_count_sub+0x50/0x80 [ 15.691482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.691504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.691527] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.691573] kthread+0x337/0x6f0 [ 15.691592] ? trace_preempt_on+0x20/0xc0 [ 15.691616] ? __pfx_kthread+0x10/0x10 [ 15.691655] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.691677] ? calculate_sigpending+0x7b/0xa0 [ 15.691699] ? __pfx_kthread+0x10/0x10 [ 15.691718] ret_from_fork+0x41/0x80 [ 15.691738] ? __pfx_kthread+0x10/0x10 [ 15.691756] ret_from_fork_asm+0x1a/0x30 [ 15.691788] </TASK> [ 15.691802] [ 15.701078] Allocated by task 285: [ 15.701437] kasan_save_stack+0x45/0x70 [ 15.701866] kasan_save_track+0x18/0x40 [ 15.702062] kasan_save_alloc_info+0x3b/0x50 [ 15.702315] __kasan_kmalloc+0xb7/0xc0 [ 15.702589] __kmalloc_cache_noprof+0x189/0x420 [ 15.702936] kasan_atomics+0x95/0x310 [ 15.703206] kunit_try_run_case+0x1a5/0x480 [ 15.703523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.703902] kthread+0x337/0x6f0 [ 15.704118] ret_from_fork+0x41/0x80 [ 15.704283] ret_from_fork_asm+0x1a/0x30 [ 15.704456] [ 15.704558] The buggy address belongs to the object at ffff8881029ef680 [ 15.704558] which belongs to the cache kmalloc-64 of size 64 [ 15.705357] The buggy address is located 0 bytes to the right of [ 15.705357] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.706415] [ 15.706612] The buggy address belongs to the physical page: [ 15.706994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.707438] flags: 0x200000000000000(node=0|zone=2) [ 15.707801] page_type: f5(slab) [ 15.708061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.708513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.708964] page dumped because: kasan: bad access detected [ 15.709152] [ 15.709251] Memory state around the buggy address: [ 15.709439] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.709820] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.710329] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.710978] ^ [ 15.711371] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.711877] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.712119] ================================================================== [ 15.208524] ================================================================== [ 15.209096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.209743] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 15.210296] [ 15.210505] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 15.210653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.210681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.210728] Call Trace: [ 15.210777] <TASK> [ 15.210819] dump_stack_lvl+0x73/0xb0 [ 15.210882] print_report+0xd1/0x650 [ 15.210932] ? __virt_addr_valid+0x1db/0x2d0 [ 15.210972] ? kasan_atomics_helper+0xd47/0x5450 [ 15.211013] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.211058] ? kasan_atomics_helper+0xd47/0x5450 [ 15.211104] kasan_report+0x141/0x180 [ 15.211149] ? kasan_atomics_helper+0xd47/0x5450 [ 15.211193] kasan_check_range+0x10c/0x1c0 [ 15.211217] __kasan_check_write+0x18/0x20 [ 15.211237] kasan_atomics_helper+0xd47/0x5450 [ 15.211260] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.211283] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.211305] ? kasan_atomics+0x152/0x310 [ 15.211328] kasan_atomics+0x1dc/0x310 [ 15.211348] ? __pfx_kasan_atomics+0x10/0x10 [ 15.211369] ? __pfx_read_tsc+0x10/0x10 [ 15.211389] ? ktime_get_ts64+0x86/0x230 [ 15.211416] kunit_try_run_case+0x1a5/0x480 [ 15.211442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.211463] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.211486] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.211508] ? __kthread_parkme+0x82/0x180 [ 15.211529] ? preempt_count_sub+0x50/0x80 [ 15.211580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.211633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.211674] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.211730] kthread+0x337/0x6f0 [ 15.211768] ? trace_preempt_on+0x20/0xc0 [ 15.211818] ? __pfx_kthread+0x10/0x10 [ 15.211856] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.211900] ? calculate_sigpending+0x7b/0xa0 [ 15.211944] ? __pfx_kthread+0x10/0x10 [ 15.211985] ret_from_fork+0x41/0x80 [ 15.212029] ? __pfx_kthread+0x10/0x10 [ 15.212070] ret_from_fork_asm+0x1a/0x30 [ 15.212115] </TASK> [ 15.212130] [ 15.224459] Allocated by task 285: [ 15.224899] kasan_save_stack+0x45/0x70 [ 15.225079] kasan_save_track+0x18/0x40 [ 15.225348] kasan_save_alloc_info+0x3b/0x50 [ 15.225619] __kasan_kmalloc+0xb7/0xc0 [ 15.225909] __kmalloc_cache_noprof+0x189/0x420 [ 15.226169] kasan_atomics+0x95/0x310 [ 15.226382] kunit_try_run_case+0x1a5/0x480 [ 15.227123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.227335] kthread+0x337/0x6f0 [ 15.227571] ret_from_fork+0x41/0x80 [ 15.228088] ret_from_fork_asm+0x1a/0x30 [ 15.228457] [ 15.228552] The buggy address belongs to the object at ffff8881029ef680 [ 15.228552] which belongs to the cache kmalloc-64 of size 64 [ 15.229349] The buggy address is located 0 bytes to the right of [ 15.229349] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.230043] [ 15.230384] The buggy address belongs to the physical page: [ 15.230578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.231231] flags: 0x200000000000000(node=0|zone=2) [ 15.231774] page_type: f5(slab) [ 15.231947] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.232455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.232962] page dumped because: kasan: bad access detected [ 15.233228] [ 15.233347] Memory state around the buggy address: [ 15.233597] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.234370] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.235133] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.235454] ^ [ 15.235763] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.236133] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.236502] ================================================================== [ 14.989954] ================================================================== [ 14.990521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.991208] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 14.991542] [ 14.991778] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.991880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.991908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.991975] Call Trace: [ 14.992021] <TASK> [ 14.992060] dump_stack_lvl+0x73/0xb0 [ 14.992122] print_report+0xd1/0x650 [ 14.992170] ? __virt_addr_valid+0x1db/0x2d0 [ 14.992219] ? kasan_atomics_helper+0x860/0x5450 [ 14.992263] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.992311] ? kasan_atomics_helper+0x860/0x5450 [ 14.992355] kasan_report+0x141/0x180 [ 14.992396] ? kasan_atomics_helper+0x860/0x5450 [ 14.992448] kasan_check_range+0x10c/0x1c0 [ 14.992643] __kasan_check_write+0x18/0x20 [ 14.992697] kasan_atomics_helper+0x860/0x5450 [ 14.992740] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.992782] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.992826] ? kasan_atomics+0x152/0x310 [ 14.992878] kasan_atomics+0x1dc/0x310 [ 14.992914] ? __pfx_kasan_atomics+0x10/0x10 [ 14.992937] ? __pfx_read_tsc+0x10/0x10 [ 14.992957] ? ktime_get_ts64+0x86/0x230 [ 14.992982] kunit_try_run_case+0x1a5/0x480 [ 14.993007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.993028] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.993051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.993073] ? __kthread_parkme+0x82/0x180 [ 14.993095] ? preempt_count_sub+0x50/0x80 [ 14.993120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.993142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.993164] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.993185] kthread+0x337/0x6f0 [ 14.993202] ? trace_preempt_on+0x20/0xc0 [ 14.993225] ? __pfx_kthread+0x10/0x10 [ 14.993243] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.993263] ? calculate_sigpending+0x7b/0xa0 [ 14.993286] ? __pfx_kthread+0x10/0x10 [ 14.993314] ret_from_fork+0x41/0x80 [ 14.993343] ? __pfx_kthread+0x10/0x10 [ 14.993369] ret_from_fork_asm+0x1a/0x30 [ 14.993415] </TASK> [ 14.993431] [ 15.002160] Allocated by task 285: [ 15.002332] kasan_save_stack+0x45/0x70 [ 15.002506] kasan_save_track+0x18/0x40 [ 15.002811] kasan_save_alloc_info+0x3b/0x50 [ 15.003134] __kasan_kmalloc+0xb7/0xc0 [ 15.003427] __kmalloc_cache_noprof+0x189/0x420 [ 15.004513] kasan_atomics+0x95/0x310 [ 15.004879] kunit_try_run_case+0x1a5/0x480 [ 15.005064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.005288] kthread+0x337/0x6f0 [ 15.005744] ret_from_fork+0x41/0x80 [ 15.005931] ret_from_fork_asm+0x1a/0x30 [ 15.006122] [ 15.006227] The buggy address belongs to the object at ffff8881029ef680 [ 15.006227] which belongs to the cache kmalloc-64 of size 64 [ 15.007745] The buggy address is located 0 bytes to the right of [ 15.007745] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 15.009229] [ 15.009494] The buggy address belongs to the physical page: [ 15.010083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 15.010522] flags: 0x200000000000000(node=0|zone=2) [ 15.010842] page_type: f5(slab) [ 15.010970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.011144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.011313] page dumped because: kasan: bad access detected [ 15.011445] [ 15.011513] Memory state around the buggy address: [ 15.012327] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.013137] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.013823] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.014406] ^ [ 15.014614] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.015316] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.015865] ================================================================== [ 16.250835] ================================================================== [ 16.252940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.253503] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285 [ 16.253897] [ 16.254099] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 16.254203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.254232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.254277] Call Trace: [ 16.254319] <TASK> [ 16.254364] dump_stack_lvl+0x73/0xb0 [ 16.254423] print_report+0xd1/0x650 [ 16.254475] ? __virt_addr_valid+0x1db/0x2d0 [ 16.254526] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.254575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.256662] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.256758] kasan_report+0x141/0x180 [ 16.256813] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.256871] __asan_report_load8_noabort+0x18/0x20 [ 16.256915] kasan_atomics_helper+0x4fb2/0x5450 [ 16.256965] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.257011] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.257058] ? kasan_atomics+0x152/0x310 [ 16.257109] kasan_atomics+0x1dc/0x310 [ 16.257148] ? __pfx_kasan_atomics+0x10/0x10 [ 16.257187] ? __pfx_read_tsc+0x10/0x10 [ 16.257228] ? ktime_get_ts64+0x86/0x230 [ 16.257279] kunit_try_run_case+0x1a5/0x480 [ 16.257333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.257377] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.257426] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.257473] ? __kthread_parkme+0x82/0x180 [ 16.257520] ? preempt_count_sub+0x50/0x80 [ 16.257581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.257614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.257660] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.257692] kthread+0x337/0x6f0 [ 16.257717] ? trace_preempt_on+0x20/0xc0 [ 16.257749] ? __pfx_kthread+0x10/0x10 [ 16.257775] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.257804] ? calculate_sigpending+0x7b/0xa0 [ 16.257835] ? __pfx_kthread+0x10/0x10 [ 16.257869] ret_from_fork+0x41/0x80 [ 16.257911] ? __pfx_kthread+0x10/0x10 [ 16.257961] ret_from_fork_asm+0x1a/0x30 [ 16.258031] </TASK> [ 16.258059] [ 16.269931] Allocated by task 285: [ 16.270341] kasan_save_stack+0x45/0x70 [ 16.270867] kasan_save_track+0x18/0x40 [ 16.271227] kasan_save_alloc_info+0x3b/0x50 [ 16.271598] __kasan_kmalloc+0xb7/0xc0 [ 16.271959] __kmalloc_cache_noprof+0x189/0x420 [ 16.272293] kasan_atomics+0x95/0x310 [ 16.272643] kunit_try_run_case+0x1a5/0x480 [ 16.272979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.273255] kthread+0x337/0x6f0 [ 16.273416] ret_from_fork+0x41/0x80 [ 16.273702] ret_from_fork_asm+0x1a/0x30 [ 16.273995] [ 16.274226] The buggy address belongs to the object at ffff8881029ef680 [ 16.274226] which belongs to the cache kmalloc-64 of size 64 [ 16.275055] The buggy address is located 0 bytes to the right of [ 16.275055] allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0) [ 16.275798] [ 16.275984] The buggy address belongs to the physical page: [ 16.276352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef [ 16.276742] flags: 0x200000000000000(node=0|zone=2) [ 16.276949] page_type: f5(slab) [ 16.277118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.277405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.278020] page dumped because: kasan: bad access detected [ 16.278424] [ 16.278671] Memory state around the buggy address: [ 16.279047] ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.279603] ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.280069] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.280326] ^ [ 16.280571] ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.281189] ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.281766] ==================================================================