Date
June 26, 2025, 11:12 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 48.558908] ================================================================== [ 48.565965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 48.573253] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 48.580631] [ 48.582114] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 48.582161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.582178] Hardware name: WinLink E850-96 board (DT) [ 48.582197] Call trace: [ 48.582211] show_stack+0x20/0x38 (C) [ 48.582244] dump_stack_lvl+0x8c/0xd0 [ 48.582280] print_report+0x118/0x608 [ 48.582310] kasan_report+0xdc/0x128 [ 48.582340] kasan_check_range+0x100/0x1a8 [ 48.582375] __kasan_check_write+0x20/0x30 [ 48.582408] kasan_atomics_helper+0x3ac/0x4858 [ 48.582438] kasan_atomics+0x198/0x2e0 [ 48.582465] kunit_try_run_case+0x170/0x3f0 [ 48.582501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.582542] kthread+0x328/0x630 [ 48.582577] ret_from_fork+0x10/0x20 [ 48.582609] [ 48.652331] Allocated by task 314: [ 48.655718] kasan_save_stack+0x3c/0x68 [ 48.659536] kasan_save_track+0x20/0x40 [ 48.663355] kasan_save_alloc_info+0x40/0x58 [ 48.667609] __kasan_kmalloc+0xd4/0xd8 [ 48.671341] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.675855] kasan_atomics+0xb8/0x2e0 [ 48.679501] kunit_try_run_case+0x170/0x3f0 [ 48.683668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.689136] kthread+0x328/0x630 [ 48.692348] ret_from_fork+0x10/0x20 [ 48.695907] [ 48.697382] The buggy address belongs to the object at ffff000800d61a00 [ 48.697382] which belongs to the cache kmalloc-64 of size 64 [ 48.709710] The buggy address is located 0 bytes to the right of [ 48.709710] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 48.722556] [ 48.724033] The buggy address belongs to the physical page: [ 48.729589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 48.737576] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.744083] page_type: f5(slab) [ 48.747219] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.754941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.762659] page dumped because: kasan: bad access detected [ 48.768215] [ 48.769690] Memory state around the buggy address: [ 48.774471] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.781673] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.788878] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.796079] ^ [ 48.800857] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.808062] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.815263] ================================================================== [ 50.141179] ================================================================== [ 50.148232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 50.155521] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 50.162899] [ 50.164381] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 50.164430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.164447] Hardware name: WinLink E850-96 board (DT) [ 50.164468] Call trace: [ 50.164479] show_stack+0x20/0x38 (C) [ 50.164513] dump_stack_lvl+0x8c/0xd0 [ 50.164550] print_report+0x118/0x608 [ 50.164581] kasan_report+0xdc/0x128 [ 50.164611] kasan_check_range+0x100/0x1a8 [ 50.164642] __kasan_check_write+0x20/0x30 [ 50.164675] kasan_atomics_helper+0x61c/0x4858 [ 50.164705] kasan_atomics+0x198/0x2e0 [ 50.164732] kunit_try_run_case+0x170/0x3f0 [ 50.164767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.164806] kthread+0x328/0x630 [ 50.164838] ret_from_fork+0x10/0x20 [ 50.164873] [ 50.234599] Allocated by task 314: [ 50.237984] kasan_save_stack+0x3c/0x68 [ 50.241804] kasan_save_track+0x20/0x40 [ 50.245623] kasan_save_alloc_info+0x40/0x58 [ 50.249877] __kasan_kmalloc+0xd4/0xd8 [ 50.253609] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.258123] kasan_atomics+0xb8/0x2e0 [ 50.261769] kunit_try_run_case+0x170/0x3f0 [ 50.265936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.271404] kthread+0x328/0x630 [ 50.274616] ret_from_fork+0x10/0x20 [ 50.278175] [ 50.279650] The buggy address belongs to the object at ffff000800d61a00 [ 50.279650] which belongs to the cache kmalloc-64 of size 64 [ 50.291977] The buggy address is located 0 bytes to the right of [ 50.291977] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 50.304824] [ 50.306301] The buggy address belongs to the physical page: [ 50.311855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 50.319841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.326351] page_type: f5(slab) [ 50.329487] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.337208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.344927] page dumped because: kasan: bad access detected [ 50.350483] [ 50.351958] Memory state around the buggy address: [ 50.356737] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.363941] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.371146] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.378347] ^ [ 50.383125] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.390330] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.397531] ================================================================== [ 53.038704] ================================================================== [ 53.045758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 53.053047] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 53.060425] [ 53.061906] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 53.061952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.061968] Hardware name: WinLink E850-96 board (DT) [ 53.061987] Call trace: [ 53.062002] show_stack+0x20/0x38 (C) [ 53.062035] dump_stack_lvl+0x8c/0xd0 [ 53.062071] print_report+0x118/0x608 [ 53.062102] kasan_report+0xdc/0x128 [ 53.062132] kasan_check_range+0x100/0x1a8 [ 53.062164] __kasan_check_write+0x20/0x30 [ 53.062199] kasan_atomics_helper+0xad4/0x4858 [ 53.062229] kasan_atomics+0x198/0x2e0 [ 53.062258] kunit_try_run_case+0x170/0x3f0 [ 53.062295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.062333] kthread+0x328/0x630 [ 53.062367] ret_from_fork+0x10/0x20 [ 53.062401] [ 53.132125] Allocated by task 314: [ 53.135512] kasan_save_stack+0x3c/0x68 [ 53.139330] kasan_save_track+0x20/0x40 [ 53.143149] kasan_save_alloc_info+0x40/0x58 [ 53.147403] __kasan_kmalloc+0xd4/0xd8 [ 53.151135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.155649] kasan_atomics+0xb8/0x2e0 [ 53.159295] kunit_try_run_case+0x170/0x3f0 [ 53.163461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.168930] kthread+0x328/0x630 [ 53.172142] ret_from_fork+0x10/0x20 [ 53.175701] [ 53.177176] The buggy address belongs to the object at ffff000800d61a00 [ 53.177176] which belongs to the cache kmalloc-64 of size 64 [ 53.189503] The buggy address is located 0 bytes to the right of [ 53.189503] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 53.202349] [ 53.203826] The buggy address belongs to the physical page: [ 53.209382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 53.217367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.223877] page_type: f5(slab) [ 53.227013] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.234735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.242453] page dumped because: kasan: bad access detected [ 53.248009] [ 53.249484] Memory state around the buggy address: [ 53.254264] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.261467] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.268672] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.275873] ^ [ 53.280651] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.287856] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.295057] ================================================================== [ 55.398906] ================================================================== [ 55.405965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 55.413341] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 55.420633] [ 55.422117] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 55.422165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.422181] Hardware name: WinLink E850-96 board (DT) [ 55.422198] Call trace: [ 55.422211] show_stack+0x20/0x38 (C) [ 55.422244] dump_stack_lvl+0x8c/0xd0 [ 55.422280] print_report+0x118/0x608 [ 55.422309] kasan_report+0xdc/0x128 [ 55.422340] __asan_report_load4_noabort+0x20/0x30 [ 55.422375] kasan_atomics_helper+0x3e04/0x4858 [ 55.422403] kasan_atomics+0x198/0x2e0 [ 55.422431] kunit_try_run_case+0x170/0x3f0 [ 55.422467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.422507] kthread+0x328/0x630 [ 55.422540] ret_from_fork+0x10/0x20 [ 55.422571] [ 55.489034] Allocated by task 314: [ 55.492420] kasan_save_stack+0x3c/0x68 [ 55.496239] kasan_save_track+0x20/0x40 [ 55.500058] kasan_save_alloc_info+0x40/0x58 [ 55.504312] __kasan_kmalloc+0xd4/0xd8 [ 55.508044] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.512558] kasan_atomics+0xb8/0x2e0 [ 55.516204] kunit_try_run_case+0x170/0x3f0 [ 55.520371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.525839] kthread+0x328/0x630 [ 55.529051] ret_from_fork+0x10/0x20 [ 55.532610] [ 55.534086] The buggy address belongs to the object at ffff000800d61a00 [ 55.534086] which belongs to the cache kmalloc-64 of size 64 [ 55.546412] The buggy address is located 0 bytes to the right of [ 55.546412] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 55.559259] [ 55.560735] The buggy address belongs to the physical page: [ 55.566291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 55.574276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.580786] page_type: f5(slab) [ 55.583922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.591643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.599362] page dumped because: kasan: bad access detected [ 55.604918] [ 55.606393] Memory state around the buggy address: [ 55.611172] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.618376] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.625581] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.632782] ^ [ 55.637560] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.644764] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.651966] ================================================================== [ 62.238031] ================================================================== [ 62.245099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 62.252475] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 62.259853] [ 62.261336] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 62.261386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.261401] Hardware name: WinLink E850-96 board (DT) [ 62.261420] Call trace: [ 62.261432] show_stack+0x20/0x38 (C) [ 62.261463] dump_stack_lvl+0x8c/0xd0 [ 62.261498] print_report+0x118/0x608 [ 62.261528] kasan_report+0xdc/0x128 [ 62.261557] kasan_check_range+0x100/0x1a8 [ 62.261589] __kasan_check_write+0x20/0x30 [ 62.261622] kasan_atomics_helper+0x16d0/0x4858 [ 62.261652] kasan_atomics+0x198/0x2e0 [ 62.261680] kunit_try_run_case+0x170/0x3f0 [ 62.261717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.261757] kthread+0x328/0x630 [ 62.261790] ret_from_fork+0x10/0x20 [ 62.261823] [ 62.331639] Allocated by task 314: [ 62.335026] kasan_save_stack+0x3c/0x68 [ 62.338844] kasan_save_track+0x20/0x40 [ 62.342663] kasan_save_alloc_info+0x40/0x58 [ 62.346917] __kasan_kmalloc+0xd4/0xd8 [ 62.350650] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.355163] kasan_atomics+0xb8/0x2e0 [ 62.358809] kunit_try_run_case+0x170/0x3f0 [ 62.362976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.368445] kthread+0x328/0x630 [ 62.371656] ret_from_fork+0x10/0x20 [ 62.375215] [ 62.376691] The buggy address belongs to the object at ffff000800d61a00 [ 62.376691] which belongs to the cache kmalloc-64 of size 64 [ 62.389018] The buggy address is located 0 bytes to the right of [ 62.389018] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 62.401864] [ 62.403342] The buggy address belongs to the physical page: [ 62.408896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 62.416882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.423392] page_type: f5(slab) [ 62.426527] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.434249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.441968] page dumped because: kasan: bad access detected [ 62.447523] [ 62.448999] Memory state around the buggy address: [ 62.453777] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.460982] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.468187] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.475387] ^ [ 62.480166] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.487370] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.494571] ================================================================== [ 63.026239] ================================================================== [ 63.033282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 63.040657] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 63.047948] [ 63.049432] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 63.049482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.049498] Hardware name: WinLink E850-96 board (DT) [ 63.049517] Call trace: [ 63.049530] show_stack+0x20/0x38 (C) [ 63.049562] dump_stack_lvl+0x8c/0xd0 [ 63.049598] print_report+0x118/0x608 [ 63.049628] kasan_report+0xdc/0x128 [ 63.049657] __asan_report_load8_noabort+0x20/0x30 [ 63.049692] kasan_atomics_helper+0x3e20/0x4858 [ 63.049722] kasan_atomics+0x198/0x2e0 [ 63.049752] kunit_try_run_case+0x170/0x3f0 [ 63.049788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.049828] kthread+0x328/0x630 [ 63.049861] ret_from_fork+0x10/0x20 [ 63.049896] [ 63.116350] Allocated by task 314: [ 63.119737] kasan_save_stack+0x3c/0x68 [ 63.123555] kasan_save_track+0x20/0x40 [ 63.127374] kasan_save_alloc_info+0x40/0x58 [ 63.131628] __kasan_kmalloc+0xd4/0xd8 [ 63.135360] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.139874] kasan_atomics+0xb8/0x2e0 [ 63.143520] kunit_try_run_case+0x170/0x3f0 [ 63.147686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.153155] kthread+0x328/0x630 [ 63.156367] ret_from_fork+0x10/0x20 [ 63.159926] [ 63.161401] The buggy address belongs to the object at ffff000800d61a00 [ 63.161401] which belongs to the cache kmalloc-64 of size 64 [ 63.173729] The buggy address is located 0 bytes to the right of [ 63.173729] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 63.186575] [ 63.188052] The buggy address belongs to the physical page: [ 63.193608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 63.201592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.208102] page_type: f5(slab) [ 63.211237] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.218960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.226678] page dumped because: kasan: bad access detected [ 63.232234] [ 63.233709] Memory state around the buggy address: [ 63.238489] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.245692] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.252897] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.260098] ^ [ 63.264876] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.272081] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.279282] ================================================================== [ 46.983525] ================================================================== [ 46.990471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 46.997756] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 47.005047] [ 47.006533] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 47.006594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.006611] Hardware name: WinLink E850-96 board (DT) [ 47.006633] Call trace: [ 47.006649] show_stack+0x20/0x38 (C) [ 47.006684] dump_stack_lvl+0x8c/0xd0 [ 47.006726] print_report+0x118/0x608 [ 47.006757] kasan_report+0xdc/0x128 [ 47.006788] kasan_check_range+0x100/0x1a8 [ 47.006824] __kasan_check_read+0x20/0x30 [ 47.006857] kasan_atomics_helper+0x1ec/0x4858 [ 47.006889] kasan_atomics+0x198/0x2e0 [ 47.006918] kunit_try_run_case+0x170/0x3f0 [ 47.006957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.006997] kthread+0x328/0x630 [ 47.007033] ret_from_fork+0x10/0x20 [ 47.007069] [ 47.076661] Allocated by task 314: [ 47.080049] kasan_save_stack+0x3c/0x68 [ 47.083865] kasan_save_track+0x20/0x40 [ 47.087685] kasan_save_alloc_info+0x40/0x58 [ 47.091938] __kasan_kmalloc+0xd4/0xd8 [ 47.095671] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.100184] kasan_atomics+0xb8/0x2e0 [ 47.103830] kunit_try_run_case+0x170/0x3f0 [ 47.107997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.113466] kthread+0x328/0x630 [ 47.116677] ret_from_fork+0x10/0x20 [ 47.120236] [ 47.121712] The buggy address belongs to the object at ffff000800d61a00 [ 47.121712] which belongs to the cache kmalloc-64 of size 64 [ 47.134042] The buggy address is located 0 bytes to the right of [ 47.134042] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 47.146885] [ 47.148363] The buggy address belongs to the physical page: [ 47.153921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 47.161905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.168413] page_type: f5(slab) [ 47.171552] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.179270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.186989] page dumped because: kasan: bad access detected [ 47.192545] [ 47.194020] Memory state around the buggy address: [ 47.198802] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.206003] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.213208] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.220408] ^ [ 47.225186] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.232391] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.239592] ================================================================== [ 47.510722] ================================================================== [ 47.517716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 47.525005] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 47.532297] [ 47.533781] CPU: 6 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 47.533839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.533855] Hardware name: WinLink E850-96 board (DT) [ 47.533879] Call trace: [ 47.533893] show_stack+0x20/0x38 (C) [ 47.533928] dump_stack_lvl+0x8c/0xd0 [ 47.533967] print_report+0x118/0x608 [ 47.533996] kasan_report+0xdc/0x128 [ 47.534028] kasan_check_range+0x100/0x1a8 [ 47.534064] __kasan_check_read+0x20/0x30 [ 47.534096] kasan_atomics_helper+0x2b0/0x4858 [ 47.534128] kasan_atomics+0x198/0x2e0 [ 47.534156] kunit_try_run_case+0x170/0x3f0 [ 47.534192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.534233] kthread+0x328/0x630 [ 47.534265] ret_from_fork+0x10/0x20 [ 47.534303] [ 47.603910] Allocated by task 314: [ 47.607299] kasan_save_stack+0x3c/0x68 [ 47.611115] kasan_save_track+0x20/0x40 [ 47.614933] kasan_save_alloc_info+0x40/0x58 [ 47.619187] __kasan_kmalloc+0xd4/0xd8 [ 47.622920] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.627433] kasan_atomics+0xb8/0x2e0 [ 47.631079] kunit_try_run_case+0x170/0x3f0 [ 47.635246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.640714] kthread+0x328/0x630 [ 47.643926] ret_from_fork+0x10/0x20 [ 47.647485] [ 47.648962] The buggy address belongs to the object at ffff000800d61a00 [ 47.648962] which belongs to the cache kmalloc-64 of size 64 [ 47.661289] The buggy address is located 0 bytes to the right of [ 47.661289] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 47.674134] [ 47.675613] The buggy address belongs to the physical page: [ 47.681169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 47.689154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.695662] page_type: f5(slab) [ 47.698800] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.706519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.714238] page dumped because: kasan: bad access detected [ 47.719793] [ 47.721268] Memory state around the buggy address: [ 47.726048] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.733252] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.740456] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.747657] ^ [ 47.752435] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.759640] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.766842] ================================================================== [ 53.562816] ================================================================== [ 53.569880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 53.577171] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 53.584549] [ 53.586032] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 53.586081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.586096] Hardware name: WinLink E850-96 board (DT) [ 53.586116] Call trace: [ 53.586128] show_stack+0x20/0x38 (C) [ 53.586159] dump_stack_lvl+0x8c/0xd0 [ 53.586197] print_report+0x118/0x608 [ 53.586227] kasan_report+0xdc/0x128 [ 53.586255] kasan_check_range+0x100/0x1a8 [ 53.586286] __kasan_check_write+0x20/0x30 [ 53.586319] kasan_atomics_helper+0xb70/0x4858 [ 53.586350] kasan_atomics+0x198/0x2e0 [ 53.586378] kunit_try_run_case+0x170/0x3f0 [ 53.586413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.586453] kthread+0x328/0x630 [ 53.586485] ret_from_fork+0x10/0x20 [ 53.586519] [ 53.656249] Allocated by task 314: [ 53.659636] kasan_save_stack+0x3c/0x68 [ 53.663454] kasan_save_track+0x20/0x40 [ 53.667273] kasan_save_alloc_info+0x40/0x58 [ 53.671527] __kasan_kmalloc+0xd4/0xd8 [ 53.675259] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.679773] kasan_atomics+0xb8/0x2e0 [ 53.683419] kunit_try_run_case+0x170/0x3f0 [ 53.687586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.693054] kthread+0x328/0x630 [ 53.696266] ret_from_fork+0x10/0x20 [ 53.699825] [ 53.701301] The buggy address belongs to the object at ffff000800d61a00 [ 53.701301] which belongs to the cache kmalloc-64 of size 64 [ 53.713627] The buggy address is located 0 bytes to the right of [ 53.713627] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 53.726473] [ 53.727951] The buggy address belongs to the physical page: [ 53.733506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 53.741491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.748001] page_type: f5(slab) [ 53.751136] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.758859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.766577] page dumped because: kasan: bad access detected [ 53.772133] [ 53.773608] Memory state around the buggy address: [ 53.778388] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.785591] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.792796] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.799997] ^ [ 53.804775] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.811980] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.819181] ================================================================== [ 51.195986] ================================================================== [ 51.203076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 51.210366] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 51.217744] [ 51.219227] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 51.219275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.219290] Hardware name: WinLink E850-96 board (DT) [ 51.219308] Call trace: [ 51.219320] show_stack+0x20/0x38 (C) [ 51.219350] dump_stack_lvl+0x8c/0xd0 [ 51.219387] print_report+0x118/0x608 [ 51.219418] kasan_report+0xdc/0x128 [ 51.219448] kasan_check_range+0x100/0x1a8 [ 51.219479] __kasan_check_write+0x20/0x30 [ 51.219513] kasan_atomics_helper+0x7cc/0x4858 [ 51.219543] kasan_atomics+0x198/0x2e0 [ 51.219571] kunit_try_run_case+0x170/0x3f0 [ 51.219607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.219646] kthread+0x328/0x630 [ 51.219679] ret_from_fork+0x10/0x20 [ 51.219709] [ 51.289444] Allocated by task 314: [ 51.292830] kasan_save_stack+0x3c/0x68 [ 51.296649] kasan_save_track+0x20/0x40 [ 51.300469] kasan_save_alloc_info+0x40/0x58 [ 51.304722] __kasan_kmalloc+0xd4/0xd8 [ 51.308454] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.312968] kasan_atomics+0xb8/0x2e0 [ 51.316614] kunit_try_run_case+0x170/0x3f0 [ 51.320781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.326249] kthread+0x328/0x630 [ 51.329461] ret_from_fork+0x10/0x20 [ 51.333020] [ 51.334496] The buggy address belongs to the object at ffff000800d61a00 [ 51.334496] which belongs to the cache kmalloc-64 of size 64 [ 51.346822] The buggy address is located 0 bytes to the right of [ 51.346822] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 51.359669] [ 51.361146] The buggy address belongs to the physical page: [ 51.366702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 51.374686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.381196] page_type: f5(slab) [ 51.384330] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.392054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.399773] page dumped because: kasan: bad access detected [ 51.405328] [ 51.406804] Memory state around the buggy address: [ 51.411583] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.418787] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.425991] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.433192] ^ [ 51.437970] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.445175] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.452376] ================================================================== [ 55.135218] ================================================================== [ 55.142253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 55.149543] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 55.156921] [ 55.158406] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 55.158455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.158469] Hardware name: WinLink E850-96 board (DT) [ 55.158486] Call trace: [ 55.158498] show_stack+0x20/0x38 (C) [ 55.158530] dump_stack_lvl+0x8c/0xd0 [ 55.158565] print_report+0x118/0x608 [ 55.158597] kasan_report+0xdc/0x128 [ 55.158627] kasan_check_range+0x100/0x1a8 [ 55.158660] __kasan_check_write+0x20/0x30 [ 55.158693] kasan_atomics_helper+0xd3c/0x4858 [ 55.158725] kasan_atomics+0x198/0x2e0 [ 55.158755] kunit_try_run_case+0x170/0x3f0 [ 55.158789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.158828] kthread+0x328/0x630 [ 55.158858] ret_from_fork+0x10/0x20 [ 55.158891] [ 55.228621] Allocated by task 314: [ 55.232008] kasan_save_stack+0x3c/0x68 [ 55.235826] kasan_save_track+0x20/0x40 [ 55.239646] kasan_save_alloc_info+0x40/0x58 [ 55.243899] __kasan_kmalloc+0xd4/0xd8 [ 55.247631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.252145] kasan_atomics+0xb8/0x2e0 [ 55.255791] kunit_try_run_case+0x170/0x3f0 [ 55.259958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.265426] kthread+0x328/0x630 [ 55.268638] ret_from_fork+0x10/0x20 [ 55.272197] [ 55.273673] The buggy address belongs to the object at ffff000800d61a00 [ 55.273673] which belongs to the cache kmalloc-64 of size 64 [ 55.285999] The buggy address is located 0 bytes to the right of [ 55.285999] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 55.298846] [ 55.300322] The buggy address belongs to the physical page: [ 55.305878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 55.313863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.320373] page_type: f5(slab) [ 55.323507] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.331231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.338950] page dumped because: kasan: bad access detected [ 55.344505] [ 55.345981] Memory state around the buggy address: [ 55.350760] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.357964] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.365168] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.372369] ^ [ 55.377147] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.384352] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.391553] ================================================================== [ 59.081807] ================================================================== [ 59.088896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 59.096272] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 59.103650] [ 59.105136] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 59.105184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.105202] Hardware name: WinLink E850-96 board (DT) [ 59.105221] Call trace: [ 59.105233] show_stack+0x20/0x38 (C) [ 59.105264] dump_stack_lvl+0x8c/0xd0 [ 59.105297] print_report+0x118/0x608 [ 59.105329] kasan_report+0xdc/0x128 [ 59.105359] kasan_check_range+0x100/0x1a8 [ 59.105390] __kasan_check_write+0x20/0x30 [ 59.105423] kasan_atomics_helper+0x126c/0x4858 [ 59.105453] kasan_atomics+0x198/0x2e0 [ 59.105480] kunit_try_run_case+0x170/0x3f0 [ 59.105516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.105554] kthread+0x328/0x630 [ 59.105587] ret_from_fork+0x10/0x20 [ 59.105617] [ 59.175437] Allocated by task 314: [ 59.178824] kasan_save_stack+0x3c/0x68 [ 59.182642] kasan_save_track+0x20/0x40 [ 59.186461] kasan_save_alloc_info+0x40/0x58 [ 59.190715] __kasan_kmalloc+0xd4/0xd8 [ 59.194447] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.198961] kasan_atomics+0xb8/0x2e0 [ 59.202607] kunit_try_run_case+0x170/0x3f0 [ 59.206773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.212242] kthread+0x328/0x630 [ 59.215454] ret_from_fork+0x10/0x20 [ 59.219013] [ 59.220489] The buggy address belongs to the object at ffff000800d61a00 [ 59.220489] which belongs to the cache kmalloc-64 of size 64 [ 59.232815] The buggy address is located 0 bytes to the right of [ 59.232815] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 59.245662] [ 59.247139] The buggy address belongs to the physical page: [ 59.252693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 59.260679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.267189] page_type: f5(slab) [ 59.270324] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.278047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.285765] page dumped because: kasan: bad access detected [ 59.291321] [ 59.292796] Memory state around the buggy address: [ 59.297576] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.304779] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.311984] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.319185] ^ [ 59.323963] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.331168] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.338369] ================================================================== [ 49.350031] ================================================================== [ 49.357097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 49.364387] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 49.371765] [ 49.373248] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 49.373297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.373315] Hardware name: WinLink E850-96 board (DT) [ 49.373331] Call trace: [ 49.373344] show_stack+0x20/0x38 (C) [ 49.373374] dump_stack_lvl+0x8c/0xd0 [ 49.373412] print_report+0x118/0x608 [ 49.373442] kasan_report+0xdc/0x128 [ 49.373471] kasan_check_range+0x100/0x1a8 [ 49.373504] __kasan_check_write+0x20/0x30 [ 49.373537] kasan_atomics_helper+0x4e4/0x4858 [ 49.373568] kasan_atomics+0x198/0x2e0 [ 49.373596] kunit_try_run_case+0x170/0x3f0 [ 49.373632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.373672] kthread+0x328/0x630 [ 49.373706] ret_from_fork+0x10/0x20 [ 49.373739] [ 49.443465] Allocated by task 314: [ 49.446851] kasan_save_stack+0x3c/0x68 [ 49.450670] kasan_save_track+0x20/0x40 [ 49.454489] kasan_save_alloc_info+0x40/0x58 [ 49.458743] __kasan_kmalloc+0xd4/0xd8 [ 49.462475] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.466989] kasan_atomics+0xb8/0x2e0 [ 49.470635] kunit_try_run_case+0x170/0x3f0 [ 49.474801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.480270] kthread+0x328/0x630 [ 49.483482] ret_from_fork+0x10/0x20 [ 49.487041] [ 49.488516] The buggy address belongs to the object at ffff000800d61a00 [ 49.488516] which belongs to the cache kmalloc-64 of size 64 [ 49.500843] The buggy address is located 0 bytes to the right of [ 49.500843] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 49.513690] [ 49.515167] The buggy address belongs to the physical page: [ 49.520723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 49.528707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.535217] page_type: f5(slab) [ 49.538353] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.546075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.553794] page dumped because: kasan: bad access detected [ 49.559349] [ 49.560824] Memory state around the buggy address: [ 49.565603] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.572807] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.580012] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.587213] ^ [ 49.591991] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.599196] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.606397] ================================================================== [ 58.554061] ================================================================== [ 58.561125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 58.568502] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 58.575880] [ 58.577365] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 58.577415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.577431] Hardware name: WinLink E850-96 board (DT) [ 58.577454] Call trace: [ 58.577466] show_stack+0x20/0x38 (C) [ 58.577498] dump_stack_lvl+0x8c/0xd0 [ 58.577534] print_report+0x118/0x608 [ 58.577566] kasan_report+0xdc/0x128 [ 58.577595] kasan_check_range+0x100/0x1a8 [ 58.577626] __kasan_check_write+0x20/0x30 [ 58.577660] kasan_atomics_helper+0x1190/0x4858 [ 58.577691] kasan_atomics+0x198/0x2e0 [ 58.577718] kunit_try_run_case+0x170/0x3f0 [ 58.577754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.577793] kthread+0x328/0x630 [ 58.577826] ret_from_fork+0x10/0x20 [ 58.577859] [ 58.647667] Allocated by task 314: [ 58.651055] kasan_save_stack+0x3c/0x68 [ 58.654872] kasan_save_track+0x20/0x40 [ 58.658692] kasan_save_alloc_info+0x40/0x58 [ 58.662945] __kasan_kmalloc+0xd4/0xd8 [ 58.666677] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.671191] kasan_atomics+0xb8/0x2e0 [ 58.674837] kunit_try_run_case+0x170/0x3f0 [ 58.679004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.684472] kthread+0x328/0x630 [ 58.687684] ret_from_fork+0x10/0x20 [ 58.691243] [ 58.692719] The buggy address belongs to the object at ffff000800d61a00 [ 58.692719] which belongs to the cache kmalloc-64 of size 64 [ 58.705045] The buggy address is located 0 bytes to the right of [ 58.705045] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 58.717892] [ 58.719369] The buggy address belongs to the physical page: [ 58.724924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 58.732909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.739419] page_type: f5(slab) [ 58.742554] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.750277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.757995] page dumped because: kasan: bad access detected [ 58.763551] [ 58.765026] Memory state around the buggy address: [ 58.769805] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.777010] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.784214] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.791415] ^ [ 58.796193] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.803398] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.810599] ================================================================== [ 52.511241] ================================================================== [ 52.518335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 52.525624] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 52.533002] [ 52.534485] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 52.534531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.534547] Hardware name: WinLink E850-96 board (DT) [ 52.534565] Call trace: [ 52.534578] show_stack+0x20/0x38 (C) [ 52.534609] dump_stack_lvl+0x8c/0xd0 [ 52.534644] print_report+0x118/0x608 [ 52.534673] kasan_report+0xdc/0x128 [ 52.534701] kasan_check_range+0x100/0x1a8 [ 52.534733] __kasan_check_write+0x20/0x30 [ 52.534765] kasan_atomics_helper+0xa04/0x4858 [ 52.534796] kasan_atomics+0x198/0x2e0 [ 52.534823] kunit_try_run_case+0x170/0x3f0 [ 52.534857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.534896] kthread+0x328/0x630 [ 52.534931] ret_from_fork+0x10/0x20 [ 52.534962] [ 52.604702] Allocated by task 314: [ 52.608088] kasan_save_stack+0x3c/0x68 [ 52.611907] kasan_save_track+0x20/0x40 [ 52.615727] kasan_save_alloc_info+0x40/0x58 [ 52.619980] __kasan_kmalloc+0xd4/0xd8 [ 52.623713] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.628226] kasan_atomics+0xb8/0x2e0 [ 52.631872] kunit_try_run_case+0x170/0x3f0 [ 52.636039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.641508] kthread+0x328/0x630 [ 52.644719] ret_from_fork+0x10/0x20 [ 52.648278] [ 52.649754] The buggy address belongs to the object at ffff000800d61a00 [ 52.649754] which belongs to the cache kmalloc-64 of size 64 [ 52.662080] The buggy address is located 0 bytes to the right of [ 52.662080] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 52.674927] [ 52.676403] The buggy address belongs to the physical page: [ 52.681959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 52.689944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.696454] page_type: f5(slab) [ 52.699589] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.707312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.715031] page dumped because: kasan: bad access detected [ 52.720586] [ 52.722061] Memory state around the buggy address: [ 52.726841] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.734045] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.741249] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.748450] ^ [ 52.753228] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.760433] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.767634] ================================================================== [ 49.877481] ================================================================== [ 49.884520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 49.891810] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 49.899188] [ 49.900670] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 49.900718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.900735] Hardware name: WinLink E850-96 board (DT) [ 49.900753] Call trace: [ 49.900767] show_stack+0x20/0x38 (C) [ 49.900799] dump_stack_lvl+0x8c/0xd0 [ 49.900835] print_report+0x118/0x608 [ 49.900865] kasan_report+0xdc/0x128 [ 49.900896] kasan_check_range+0x100/0x1a8 [ 49.900927] __kasan_check_write+0x20/0x30 [ 49.900961] kasan_atomics_helper+0x5b4/0x4858 [ 49.900992] kasan_atomics+0x198/0x2e0 [ 49.901020] kunit_try_run_case+0x170/0x3f0 [ 49.901054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.901094] kthread+0x328/0x630 [ 49.901127] ret_from_fork+0x10/0x20 [ 49.901161] [ 49.970888] Allocated by task 314: [ 49.974275] kasan_save_stack+0x3c/0x68 [ 49.978092] kasan_save_track+0x20/0x40 [ 49.981912] kasan_save_alloc_info+0x40/0x58 [ 49.986165] __kasan_kmalloc+0xd4/0xd8 [ 49.989898] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.994412] kasan_atomics+0xb8/0x2e0 [ 49.998058] kunit_try_run_case+0x170/0x3f0 [ 50.002224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.007693] kthread+0x328/0x630 [ 50.010905] ret_from_fork+0x10/0x20 [ 50.014463] [ 50.015939] The buggy address belongs to the object at ffff000800d61a00 [ 50.015939] which belongs to the cache kmalloc-64 of size 64 [ 50.028266] The buggy address is located 0 bytes to the right of [ 50.028266] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 50.041112] [ 50.042590] The buggy address belongs to the physical page: [ 50.048144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 50.056130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.062640] page_type: f5(slab) [ 50.065775] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.073497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.081216] page dumped because: kasan: bad access detected [ 50.086771] [ 50.088247] Memory state around the buggy address: [ 50.093027] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.100230] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.107435] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.114636] ^ [ 50.119414] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.126619] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.133819] ================================================================== [ 50.404900] ================================================================== [ 50.411941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 50.419232] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 50.426610] [ 50.428096] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 50.428144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.428161] Hardware name: WinLink E850-96 board (DT) [ 50.428178] Call trace: [ 50.428191] show_stack+0x20/0x38 (C) [ 50.428224] dump_stack_lvl+0x8c/0xd0 [ 50.428261] print_report+0x118/0x608 [ 50.428290] kasan_report+0xdc/0x128 [ 50.428319] kasan_check_range+0x100/0x1a8 [ 50.428350] __kasan_check_write+0x20/0x30 [ 50.428383] kasan_atomics_helper+0x684/0x4858 [ 50.428415] kasan_atomics+0x198/0x2e0 [ 50.428443] kunit_try_run_case+0x170/0x3f0 [ 50.428478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.428518] kthread+0x328/0x630 [ 50.428550] ret_from_fork+0x10/0x20 [ 50.428581] [ 50.498310] Allocated by task 314: [ 50.501696] kasan_save_stack+0x3c/0x68 [ 50.505515] kasan_save_track+0x20/0x40 [ 50.509335] kasan_save_alloc_info+0x40/0x58 [ 50.513588] __kasan_kmalloc+0xd4/0xd8 [ 50.517320] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.521834] kasan_atomics+0xb8/0x2e0 [ 50.525480] kunit_try_run_case+0x170/0x3f0 [ 50.529647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.535115] kthread+0x328/0x630 [ 50.538327] ret_from_fork+0x10/0x20 [ 50.541886] [ 50.543362] The buggy address belongs to the object at ffff000800d61a00 [ 50.543362] which belongs to the cache kmalloc-64 of size 64 [ 50.555688] The buggy address is located 0 bytes to the right of [ 50.555688] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 50.568535] [ 50.570012] The buggy address belongs to the physical page: [ 50.575568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 50.583552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.590063] page_type: f5(slab) [ 50.593199] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.600920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.608639] page dumped because: kasan: bad access detected [ 50.614194] [ 50.615670] Memory state around the buggy address: [ 50.620448] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.627653] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.634858] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.642058] ^ [ 50.646836] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.654041] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.661242] ================================================================== [ 54.350621] ================================================================== [ 54.357716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 54.365093] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 54.372384] [ 54.373868] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 54.373914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.373932] Hardware name: WinLink E850-96 board (DT) [ 54.373950] Call trace: [ 54.373963] show_stack+0x20/0x38 (C) [ 54.373992] dump_stack_lvl+0x8c/0xd0 [ 54.374027] print_report+0x118/0x608 [ 54.374055] kasan_report+0xdc/0x128 [ 54.374086] __asan_report_load4_noabort+0x20/0x30 [ 54.374121] kasan_atomics_helper+0x3de4/0x4858 [ 54.374150] kasan_atomics+0x198/0x2e0 [ 54.374178] kunit_try_run_case+0x170/0x3f0 [ 54.374212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.374251] kthread+0x328/0x630 [ 54.374286] ret_from_fork+0x10/0x20 [ 54.374317] [ 54.440786] Allocated by task 314: [ 54.444173] kasan_save_stack+0x3c/0x68 [ 54.447990] kasan_save_track+0x20/0x40 [ 54.451810] kasan_save_alloc_info+0x40/0x58 [ 54.456064] __kasan_kmalloc+0xd4/0xd8 [ 54.459796] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.464310] kasan_atomics+0xb8/0x2e0 [ 54.467956] kunit_try_run_case+0x170/0x3f0 [ 54.472122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.477591] kthread+0x328/0x630 [ 54.480803] ret_from_fork+0x10/0x20 [ 54.484362] [ 54.485837] The buggy address belongs to the object at ffff000800d61a00 [ 54.485837] which belongs to the cache kmalloc-64 of size 64 [ 54.498164] The buggy address is located 0 bytes to the right of [ 54.498164] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 54.511010] [ 54.512486] The buggy address belongs to the physical page: [ 54.518042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 54.526028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.532538] page_type: f5(slab) [ 54.535674] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.543396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.551114] page dumped because: kasan: bad access detected [ 54.556669] [ 54.558145] Memory state around the buggy address: [ 54.562924] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.570128] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.577333] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.584534] ^ [ 54.589312] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.596517] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.603718] ================================================================== [ 56.183271] ================================================================== [ 56.190328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 56.197617] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 56.204996] [ 56.206478] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 56.206524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.206539] Hardware name: WinLink E850-96 board (DT) [ 56.206560] Call trace: [ 56.206573] show_stack+0x20/0x38 (C) [ 56.206606] dump_stack_lvl+0x8c/0xd0 [ 56.206642] print_report+0x118/0x608 [ 56.206671] kasan_report+0xdc/0x128 [ 56.206701] kasan_check_range+0x100/0x1a8 [ 56.206733] __kasan_check_write+0x20/0x30 [ 56.206767] kasan_atomics_helper+0xe44/0x4858 [ 56.206797] kasan_atomics+0x198/0x2e0 [ 56.206825] kunit_try_run_case+0x170/0x3f0 [ 56.206861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.206902] kthread+0x328/0x630 [ 56.206936] ret_from_fork+0x10/0x20 [ 56.206968] [ 56.276696] Allocated by task 314: [ 56.280081] kasan_save_stack+0x3c/0x68 [ 56.283900] kasan_save_track+0x20/0x40 [ 56.287720] kasan_save_alloc_info+0x40/0x58 [ 56.291973] __kasan_kmalloc+0xd4/0xd8 [ 56.295706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.300220] kasan_atomics+0xb8/0x2e0 [ 56.303866] kunit_try_run_case+0x170/0x3f0 [ 56.308032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.313501] kthread+0x328/0x630 [ 56.316713] ret_from_fork+0x10/0x20 [ 56.320272] [ 56.321747] The buggy address belongs to the object at ffff000800d61a00 [ 56.321747] which belongs to the cache kmalloc-64 of size 64 [ 56.334074] The buggy address is located 0 bytes to the right of [ 56.334074] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 56.346920] [ 56.348396] The buggy address belongs to the physical page: [ 56.353954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 56.361938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.368448] page_type: f5(slab) [ 56.371581] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.379306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.387024] page dumped because: kasan: bad access detected [ 56.392580] [ 56.394055] Memory state around the buggy address: [ 56.398835] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.406038] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.413243] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.420444] ^ [ 56.425222] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.432426] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.439628] ================================================================== [ 59.873515] ================================================================== [ 59.880551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 59.887927] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 59.895218] [ 59.896700] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 59.896747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.896763] Hardware name: WinLink E850-96 board (DT) [ 59.896782] Call trace: [ 59.896794] show_stack+0x20/0x38 (C) [ 59.896827] dump_stack_lvl+0x8c/0xd0 [ 59.896863] print_report+0x118/0x608 [ 59.896895] kasan_report+0xdc/0x128 [ 59.896924] __asan_report_load8_noabort+0x20/0x30 [ 59.896959] kasan_atomics_helper+0x3f04/0x4858 [ 59.896990] kasan_atomics+0x198/0x2e0 [ 59.897019] kunit_try_run_case+0x170/0x3f0 [ 59.897054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.897091] kthread+0x328/0x630 [ 59.897121] ret_from_fork+0x10/0x20 [ 59.897153] [ 59.963620] Allocated by task 314: [ 59.967007] kasan_save_stack+0x3c/0x68 [ 59.970824] kasan_save_track+0x20/0x40 [ 59.974644] kasan_save_alloc_info+0x40/0x58 [ 59.978897] __kasan_kmalloc+0xd4/0xd8 [ 59.982630] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.987144] kasan_atomics+0xb8/0x2e0 [ 59.990789] kunit_try_run_case+0x170/0x3f0 [ 59.994956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.000424] kthread+0x328/0x630 [ 60.003636] ret_from_fork+0x10/0x20 [ 60.007195] [ 60.008671] The buggy address belongs to the object at ffff000800d61a00 [ 60.008671] which belongs to the cache kmalloc-64 of size 64 [ 60.020998] The buggy address is located 0 bytes to the right of [ 60.020998] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 60.033844] [ 60.035322] The buggy address belongs to the physical page: [ 60.040876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 60.048862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.055371] page_type: f5(slab) [ 60.058507] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.066229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.073948] page dumped because: kasan: bad access detected [ 60.079503] [ 60.080979] Memory state around the buggy address: [ 60.085759] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.092962] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.100167] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.107367] ^ [ 60.112146] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.119350] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.126551] ================================================================== [ 60.397753] ================================================================== [ 60.404848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 60.412224] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 60.419602] [ 60.421086] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 60.421133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.421149] Hardware name: WinLink E850-96 board (DT) [ 60.421168] Call trace: [ 60.421181] show_stack+0x20/0x38 (C) [ 60.421213] dump_stack_lvl+0x8c/0xd0 [ 60.421247] print_report+0x118/0x608 [ 60.421276] kasan_report+0xdc/0x128 [ 60.421307] kasan_check_range+0x100/0x1a8 [ 60.421339] __kasan_check_write+0x20/0x30 [ 60.421372] kasan_atomics_helper+0x147c/0x4858 [ 60.421403] kasan_atomics+0x198/0x2e0 [ 60.421431] kunit_try_run_case+0x170/0x3f0 [ 60.421465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.421504] kthread+0x328/0x630 [ 60.421537] ret_from_fork+0x10/0x20 [ 60.421572] [ 60.491389] Allocated by task 314: [ 60.494775] kasan_save_stack+0x3c/0x68 [ 60.498594] kasan_save_track+0x20/0x40 [ 60.502414] kasan_save_alloc_info+0x40/0x58 [ 60.506667] __kasan_kmalloc+0xd4/0xd8 [ 60.510400] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.514913] kasan_atomics+0xb8/0x2e0 [ 60.518559] kunit_try_run_case+0x170/0x3f0 [ 60.522726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.528194] kthread+0x328/0x630 [ 60.531406] ret_from_fork+0x10/0x20 [ 60.534965] [ 60.536440] The buggy address belongs to the object at ffff000800d61a00 [ 60.536440] which belongs to the cache kmalloc-64 of size 64 [ 60.548767] The buggy address is located 0 bytes to the right of [ 60.548767] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 60.561614] [ 60.563091] The buggy address belongs to the physical page: [ 60.568646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 60.576631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.583142] page_type: f5(slab) [ 60.586277] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.593999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.601718] page dumped because: kasan: bad access detected [ 60.607273] [ 60.608748] Memory state around the buggy address: [ 60.613527] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.620732] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.627937] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.635137] ^ [ 60.639915] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.647121] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.654321] ================================================================== [ 61.189469] ================================================================== [ 61.196503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 61.203879] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 61.211257] [ 61.212740] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 61.212787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.212803] Hardware name: WinLink E850-96 board (DT) [ 61.212819] Call trace: [ 61.212832] show_stack+0x20/0x38 (C) [ 61.212861] dump_stack_lvl+0x8c/0xd0 [ 61.212896] print_report+0x118/0x608 [ 61.212927] kasan_report+0xdc/0x128 [ 61.212959] kasan_check_range+0x100/0x1a8 [ 61.212992] __kasan_check_write+0x20/0x30 [ 61.213025] kasan_atomics_helper+0x15b4/0x4858 [ 61.213056] kasan_atomics+0x198/0x2e0 [ 61.213084] kunit_try_run_case+0x170/0x3f0 [ 61.213118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.213156] kthread+0x328/0x630 [ 61.213189] ret_from_fork+0x10/0x20 [ 61.213223] [ 61.283044] Allocated by task 314: [ 61.286430] kasan_save_stack+0x3c/0x68 [ 61.290249] kasan_save_track+0x20/0x40 [ 61.294069] kasan_save_alloc_info+0x40/0x58 [ 61.298322] __kasan_kmalloc+0xd4/0xd8 [ 61.302054] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.306568] kasan_atomics+0xb8/0x2e0 [ 61.310214] kunit_try_run_case+0x170/0x3f0 [ 61.314380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.319849] kthread+0x328/0x630 [ 61.323061] ret_from_fork+0x10/0x20 [ 61.326620] [ 61.328096] The buggy address belongs to the object at ffff000800d61a00 [ 61.328096] which belongs to the cache kmalloc-64 of size 64 [ 61.340422] The buggy address is located 0 bytes to the right of [ 61.340422] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 61.353269] [ 61.354745] The buggy address belongs to the physical page: [ 61.360301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 61.368287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.374796] page_type: f5(slab) [ 61.377931] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.385654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.393373] page dumped because: kasan: bad access detected [ 61.398928] [ 61.400403] Memory state around the buggy address: [ 61.405182] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.412387] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.419592] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.426792] ^ [ 61.431570] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.438775] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.445976] ================================================================== [ 60.661664] ================================================================== [ 60.668732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 60.676109] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 60.683487] [ 60.684970] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 60.685018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.685036] Hardware name: WinLink E850-96 board (DT) [ 60.685054] Call trace: [ 60.685067] show_stack+0x20/0x38 (C) [ 60.685098] dump_stack_lvl+0x8c/0xd0 [ 60.685136] print_report+0x118/0x608 [ 60.685168] kasan_report+0xdc/0x128 [ 60.685197] kasan_check_range+0x100/0x1a8 [ 60.685229] __kasan_check_write+0x20/0x30 [ 60.685262] kasan_atomics_helper+0x14e4/0x4858 [ 60.685293] kasan_atomics+0x198/0x2e0 [ 60.685323] kunit_try_run_case+0x170/0x3f0 [ 60.685356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.685394] kthread+0x328/0x630 [ 60.685428] ret_from_fork+0x10/0x20 [ 60.685461] [ 60.755274] Allocated by task 314: [ 60.758661] kasan_save_stack+0x3c/0x68 [ 60.762479] kasan_save_track+0x20/0x40 [ 60.766298] kasan_save_alloc_info+0x40/0x58 [ 60.770552] __kasan_kmalloc+0xd4/0xd8 [ 60.774285] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.778798] kasan_atomics+0xb8/0x2e0 [ 60.782444] kunit_try_run_case+0x170/0x3f0 [ 60.786611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.792080] kthread+0x328/0x630 [ 60.795291] ret_from_fork+0x10/0x20 [ 60.798850] [ 60.800326] The buggy address belongs to the object at ffff000800d61a00 [ 60.800326] which belongs to the cache kmalloc-64 of size 64 [ 60.812652] The buggy address is located 0 bytes to the right of [ 60.812652] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 60.825499] [ 60.826976] The buggy address belongs to the physical page: [ 60.832531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 60.840516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.847027] page_type: f5(slab) [ 60.850161] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.857884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.865603] page dumped because: kasan: bad access detected [ 60.871158] [ 60.872634] Memory state around the buggy address: [ 60.877412] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.884617] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.891822] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.899023] ^ [ 60.903800] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.911005] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.918206] ================================================================== [ 49.613718] ================================================================== [ 49.620808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 49.628098] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 49.635476] [ 49.636959] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 49.637009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.637026] Hardware name: WinLink E850-96 board (DT) [ 49.637046] Call trace: [ 49.637058] show_stack+0x20/0x38 (C) [ 49.637088] dump_stack_lvl+0x8c/0xd0 [ 49.637125] print_report+0x118/0x608 [ 49.637155] kasan_report+0xdc/0x128 [ 49.637184] kasan_check_range+0x100/0x1a8 [ 49.637215] __kasan_check_write+0x20/0x30 [ 49.637251] kasan_atomics_helper+0x54c/0x4858 [ 49.637283] kasan_atomics+0x198/0x2e0 [ 49.637310] kunit_try_run_case+0x170/0x3f0 [ 49.637344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.637383] kthread+0x328/0x630 [ 49.637416] ret_from_fork+0x10/0x20 [ 49.637450] [ 49.707176] Allocated by task 314: [ 49.710562] kasan_save_stack+0x3c/0x68 [ 49.714381] kasan_save_track+0x20/0x40 [ 49.718201] kasan_save_alloc_info+0x40/0x58 [ 49.722454] __kasan_kmalloc+0xd4/0xd8 [ 49.726187] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.730700] kasan_atomics+0xb8/0x2e0 [ 49.734346] kunit_try_run_case+0x170/0x3f0 [ 49.738513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.743982] kthread+0x328/0x630 [ 49.747193] ret_from_fork+0x10/0x20 [ 49.750752] [ 49.752228] The buggy address belongs to the object at ffff000800d61a00 [ 49.752228] which belongs to the cache kmalloc-64 of size 64 [ 49.764554] The buggy address is located 0 bytes to the right of [ 49.764554] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 49.777401] [ 49.778878] The buggy address belongs to the physical page: [ 49.784433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 49.792418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.798928] page_type: f5(slab) [ 49.802063] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.809786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.817505] page dumped because: kasan: bad access detected [ 49.823060] [ 49.824536] Memory state around the buggy address: [ 49.829314] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.836519] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.843724] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.850924] ^ [ 49.855702] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.862907] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.870108] ================================================================== [ 57.498666] ================================================================== [ 57.505759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 57.513049] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 57.520427] [ 57.521909] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 57.521958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.521972] Hardware name: WinLink E850-96 board (DT) [ 57.521991] Call trace: [ 57.522002] show_stack+0x20/0x38 (C) [ 57.522033] dump_stack_lvl+0x8c/0xd0 [ 57.522067] print_report+0x118/0x608 [ 57.522096] kasan_report+0xdc/0x128 [ 57.522126] kasan_check_range+0x100/0x1a8 [ 57.522157] __kasan_check_write+0x20/0x30 [ 57.522190] kasan_atomics_helper+0xff0/0x4858 [ 57.522222] kasan_atomics+0x198/0x2e0 [ 57.522250] kunit_try_run_case+0x170/0x3f0 [ 57.522284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.522324] kthread+0x328/0x630 [ 57.522356] ret_from_fork+0x10/0x20 [ 57.522389] [ 57.592127] Allocated by task 314: [ 57.595513] kasan_save_stack+0x3c/0x68 [ 57.599332] kasan_save_track+0x20/0x40 [ 57.603152] kasan_save_alloc_info+0x40/0x58 [ 57.607405] __kasan_kmalloc+0xd4/0xd8 [ 57.611138] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.615651] kasan_atomics+0xb8/0x2e0 [ 57.619297] kunit_try_run_case+0x170/0x3f0 [ 57.623464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.628933] kthread+0x328/0x630 [ 57.632144] ret_from_fork+0x10/0x20 [ 57.635703] [ 57.637179] The buggy address belongs to the object at ffff000800d61a00 [ 57.637179] which belongs to the cache kmalloc-64 of size 64 [ 57.649505] The buggy address is located 0 bytes to the right of [ 57.649505] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 57.662352] [ 57.663828] The buggy address belongs to the physical page: [ 57.669384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 57.677369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.683880] page_type: f5(slab) [ 57.687014] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.694737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.702456] page dumped because: kasan: bad access detected [ 57.708011] [ 57.709487] Memory state around the buggy address: [ 57.714266] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.721470] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.728674] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.735875] ^ [ 57.740653] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.747858] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.755059] ================================================================== [ 50.932298] ================================================================== [ 50.939364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 50.946655] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 50.954033] [ 50.955515] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 50.955561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.955579] Hardware name: WinLink E850-96 board (DT) [ 50.955597] Call trace: [ 50.955609] show_stack+0x20/0x38 (C) [ 50.955642] dump_stack_lvl+0x8c/0xd0 [ 50.955676] print_report+0x118/0x608 [ 50.955708] kasan_report+0xdc/0x128 [ 50.955737] kasan_check_range+0x100/0x1a8 [ 50.955768] __kasan_check_write+0x20/0x30 [ 50.955800] kasan_atomics_helper+0x760/0x4858 [ 50.955831] kasan_atomics+0x198/0x2e0 [ 50.955860] kunit_try_run_case+0x170/0x3f0 [ 50.955894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.955934] kthread+0x328/0x630 [ 50.955967] ret_from_fork+0x10/0x20 [ 50.955997] [ 51.025733] Allocated by task 314: [ 51.029120] kasan_save_stack+0x3c/0x68 [ 51.032938] kasan_save_track+0x20/0x40 [ 51.036757] kasan_save_alloc_info+0x40/0x58 [ 51.041010] __kasan_kmalloc+0xd4/0xd8 [ 51.044743] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.049257] kasan_atomics+0xb8/0x2e0 [ 51.052903] kunit_try_run_case+0x170/0x3f0 [ 51.057069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.062538] kthread+0x328/0x630 [ 51.065750] ret_from_fork+0x10/0x20 [ 51.069309] [ 51.070785] The buggy address belongs to the object at ffff000800d61a00 [ 51.070785] which belongs to the cache kmalloc-64 of size 64 [ 51.083111] The buggy address is located 0 bytes to the right of [ 51.083111] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 51.095958] [ 51.097435] The buggy address belongs to the physical page: [ 51.102991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 51.110977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.117485] page_type: f5(slab) [ 51.120620] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.128342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.136061] page dumped because: kasan: bad access detected [ 51.141617] [ 51.143092] Memory state around the buggy address: [ 51.147872] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.155076] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.162280] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.169481] ^ [ 51.174259] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.181464] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.188664] ================================================================== [ 57.762432] ================================================================== [ 57.769470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 57.776847] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 57.784225] [ 57.785707] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 57.785756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.785772] Hardware name: WinLink E850-96 board (DT) [ 57.785790] Call trace: [ 57.785804] show_stack+0x20/0x38 (C) [ 57.785836] dump_stack_lvl+0x8c/0xd0 [ 57.785873] print_report+0x118/0x608 [ 57.785903] kasan_report+0xdc/0x128 [ 57.785932] kasan_check_range+0x100/0x1a8 [ 57.785965] __kasan_check_write+0x20/0x30 [ 57.785998] kasan_atomics_helper+0x1058/0x4858 [ 57.786028] kasan_atomics+0x198/0x2e0 [ 57.786056] kunit_try_run_case+0x170/0x3f0 [ 57.786091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.786131] kthread+0x328/0x630 [ 57.786164] ret_from_fork+0x10/0x20 [ 57.786197] [ 57.856012] Allocated by task 314: [ 57.859401] kasan_save_stack+0x3c/0x68 [ 57.863217] kasan_save_track+0x20/0x40 [ 57.867037] kasan_save_alloc_info+0x40/0x58 [ 57.871290] __kasan_kmalloc+0xd4/0xd8 [ 57.875023] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.879537] kasan_atomics+0xb8/0x2e0 [ 57.883182] kunit_try_run_case+0x170/0x3f0 [ 57.887349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.892817] kthread+0x328/0x630 [ 57.896029] ret_from_fork+0x10/0x20 [ 57.899588] [ 57.901063] The buggy address belongs to the object at ffff000800d61a00 [ 57.901063] which belongs to the cache kmalloc-64 of size 64 [ 57.913392] The buggy address is located 0 bytes to the right of [ 57.913392] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 57.926237] [ 57.927713] The buggy address belongs to the physical page: [ 57.933269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 57.941255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.947764] page_type: f5(slab) [ 57.950897] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.958622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.966341] page dumped because: kasan: bad access detected [ 57.971896] [ 57.973372] Memory state around the buggy address: [ 57.978152] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.985355] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.992559] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.999760] ^ [ 58.004538] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.011743] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.018944] ================================================================== [ 56.707562] ================================================================== [ 56.714628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 56.721915] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 56.729293] [ 56.730777] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 56.730823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.730839] Hardware name: WinLink E850-96 board (DT) [ 56.730856] Call trace: [ 56.730870] show_stack+0x20/0x38 (C) [ 56.730902] dump_stack_lvl+0x8c/0xd0 [ 56.730936] print_report+0x118/0x608 [ 56.730967] kasan_report+0xdc/0x128 [ 56.730996] kasan_check_range+0x100/0x1a8 [ 56.731027] __kasan_check_write+0x20/0x30 [ 56.731059] kasan_atomics_helper+0xeb8/0x4858 [ 56.731087] kasan_atomics+0x198/0x2e0 [ 56.731118] kunit_try_run_case+0x170/0x3f0 [ 56.731151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.731190] kthread+0x328/0x630 [ 56.731222] ret_from_fork+0x10/0x20 [ 56.731256] [ 56.800994] Allocated by task 314: [ 56.804379] kasan_save_stack+0x3c/0x68 [ 56.808198] kasan_save_track+0x20/0x40 [ 56.812018] kasan_save_alloc_info+0x40/0x58 [ 56.816271] __kasan_kmalloc+0xd4/0xd8 [ 56.820004] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.824517] kasan_atomics+0xb8/0x2e0 [ 56.828163] kunit_try_run_case+0x170/0x3f0 [ 56.832330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.837798] kthread+0x328/0x630 [ 56.841010] ret_from_fork+0x10/0x20 [ 56.844569] [ 56.846045] The buggy address belongs to the object at ffff000800d61a00 [ 56.846045] which belongs to the cache kmalloc-64 of size 64 [ 56.858371] The buggy address is located 0 bytes to the right of [ 56.858371] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 56.871218] [ 56.872694] The buggy address belongs to the physical page: [ 56.878251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 56.886236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.892746] page_type: f5(slab) [ 56.895882] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.903603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.911322] page dumped because: kasan: bad access detected [ 56.916877] [ 56.918353] Memory state around the buggy address: [ 56.923132] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.930336] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.937541] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.944741] ^ [ 56.949519] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.956724] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.963925] ================================================================== [ 59.345744] ================================================================== [ 59.352780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 59.360157] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 59.367535] [ 59.369018] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 59.369067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.369083] Hardware name: WinLink E850-96 board (DT) [ 59.369100] Call trace: [ 59.369113] show_stack+0x20/0x38 (C) [ 59.369144] dump_stack_lvl+0x8c/0xd0 [ 59.369182] print_report+0x118/0x608 [ 59.369211] kasan_report+0xdc/0x128 [ 59.369241] kasan_check_range+0x100/0x1a8 [ 59.369272] __kasan_check_write+0x20/0x30 [ 59.369304] kasan_atomics_helper+0x12d8/0x4858 [ 59.369334] kasan_atomics+0x198/0x2e0 [ 59.369361] kunit_try_run_case+0x170/0x3f0 [ 59.369395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.369435] kthread+0x328/0x630 [ 59.369470] ret_from_fork+0x10/0x20 [ 59.369501] [ 59.439322] Allocated by task 314: [ 59.442708] kasan_save_stack+0x3c/0x68 [ 59.446527] kasan_save_track+0x20/0x40 [ 59.450346] kasan_save_alloc_info+0x40/0x58 [ 59.454599] __kasan_kmalloc+0xd4/0xd8 [ 59.458332] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.462846] kasan_atomics+0xb8/0x2e0 [ 59.466492] kunit_try_run_case+0x170/0x3f0 [ 59.470658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.476127] kthread+0x328/0x630 [ 59.479339] ret_from_fork+0x10/0x20 [ 59.482898] [ 59.484373] The buggy address belongs to the object at ffff000800d61a00 [ 59.484373] which belongs to the cache kmalloc-64 of size 64 [ 59.496700] The buggy address is located 0 bytes to the right of [ 59.496700] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 59.509547] [ 59.511024] The buggy address belongs to the physical page: [ 59.516578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 59.524564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.531074] page_type: f5(slab) [ 59.534209] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.541931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.549650] page dumped because: kasan: bad access detected [ 59.555205] [ 59.556681] Memory state around the buggy address: [ 59.561461] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.568664] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.575869] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.583070] ^ [ 59.587848] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.595053] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.602254] ================================================================== [ 63.286642] ================================================================== [ 63.293694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 63.301070] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 63.308448] [ 63.309931] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 63.309978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.309993] Hardware name: WinLink E850-96 board (DT) [ 63.310013] Call trace: [ 63.310025] show_stack+0x20/0x38 (C) [ 63.310057] dump_stack_lvl+0x8c/0xd0 [ 63.310092] print_report+0x118/0x608 [ 63.310123] kasan_report+0xdc/0x128 [ 63.310153] kasan_check_range+0x100/0x1a8 [ 63.310183] __kasan_check_write+0x20/0x30 [ 63.310217] kasan_atomics_helper+0x17ec/0x4858 [ 63.310248] kasan_atomics+0x198/0x2e0 [ 63.310275] kunit_try_run_case+0x170/0x3f0 [ 63.310311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.310349] kthread+0x328/0x630 [ 63.310383] ret_from_fork+0x10/0x20 [ 63.310416] [ 63.380235] Allocated by task 314: [ 63.383621] kasan_save_stack+0x3c/0x68 [ 63.387440] kasan_save_track+0x20/0x40 [ 63.391259] kasan_save_alloc_info+0x40/0x58 [ 63.395512] __kasan_kmalloc+0xd4/0xd8 [ 63.399245] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.403759] kasan_atomics+0xb8/0x2e0 [ 63.407405] kunit_try_run_case+0x170/0x3f0 [ 63.411571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.417040] kthread+0x328/0x630 [ 63.420252] ret_from_fork+0x10/0x20 [ 63.423811] [ 63.425286] The buggy address belongs to the object at ffff000800d61a00 [ 63.425286] which belongs to the cache kmalloc-64 of size 64 [ 63.437614] The buggy address is located 0 bytes to the right of [ 63.437614] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 63.450460] [ 63.451937] The buggy address belongs to the physical page: [ 63.457493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 63.465477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.471987] page_type: f5(slab) [ 63.475121] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.482845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.490563] page dumped because: kasan: bad access detected [ 63.496119] [ 63.497594] Memory state around the buggy address: [ 63.502374] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.509577] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.516782] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.523983] ^ [ 63.528761] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.535966] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.543167] ================================================================== [ 51.723445] ================================================================== [ 51.730501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 51.737875] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 51.745167] [ 51.746650] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 51.746697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.746715] Hardware name: WinLink E850-96 board (DT) [ 51.746735] Call trace: [ 51.746747] show_stack+0x20/0x38 (C) [ 51.746778] dump_stack_lvl+0x8c/0xd0 [ 51.746813] print_report+0x118/0x608 [ 51.746846] kasan_report+0xdc/0x128 [ 51.746876] __asan_report_load4_noabort+0x20/0x30 [ 51.746911] kasan_atomics_helper+0x42d8/0x4858 [ 51.746942] kasan_atomics+0x198/0x2e0 [ 51.746969] kunit_try_run_case+0x170/0x3f0 [ 51.747003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.747044] kthread+0x328/0x630 [ 51.747077] ret_from_fork+0x10/0x20 [ 51.747113] [ 51.813568] Allocated by task 314: [ 51.816954] kasan_save_stack+0x3c/0x68 [ 51.820773] kasan_save_track+0x20/0x40 [ 51.824593] kasan_save_alloc_info+0x40/0x58 [ 51.828846] __kasan_kmalloc+0xd4/0xd8 [ 51.832578] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.837092] kasan_atomics+0xb8/0x2e0 [ 51.840738] kunit_try_run_case+0x170/0x3f0 [ 51.844905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.850374] kthread+0x328/0x630 [ 51.853585] ret_from_fork+0x10/0x20 [ 51.857144] [ 51.858620] The buggy address belongs to the object at ffff000800d61a00 [ 51.858620] which belongs to the cache kmalloc-64 of size 64 [ 51.870947] The buggy address is located 0 bytes to the right of [ 51.870947] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 51.883793] [ 51.885269] The buggy address belongs to the physical page: [ 51.890826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 51.898810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.905321] page_type: f5(slab) [ 51.908455] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.916178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.923896] page dumped because: kasan: bad access detected [ 51.929452] [ 51.930928] Memory state around the buggy address: [ 51.935706] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.942911] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.950115] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.957316] ^ [ 51.962094] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.969299] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.976500] ================================================================== [ 47.247062] ================================================================== [ 47.254004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 47.261293] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 47.268672] [ 47.270155] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 47.270213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.270232] Hardware name: WinLink E850-96 board (DT) [ 47.270254] Call trace: [ 47.270268] show_stack+0x20/0x38 (C) [ 47.270308] dump_stack_lvl+0x8c/0xd0 [ 47.270346] print_report+0x118/0x608 [ 47.270376] kasan_report+0xdc/0x128 [ 47.270406] kasan_check_range+0x100/0x1a8 [ 47.270440] __kasan_check_write+0x20/0x30 [ 47.270475] kasan_atomics_helper+0x24c/0x4858 [ 47.270506] kasan_atomics+0x198/0x2e0 [ 47.270535] kunit_try_run_case+0x170/0x3f0 [ 47.270576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.270614] kthread+0x328/0x630 [ 47.270648] ret_from_fork+0x10/0x20 [ 47.270684] [ 47.340371] Allocated by task 314: [ 47.343759] kasan_save_stack+0x3c/0x68 [ 47.347577] kasan_save_track+0x20/0x40 [ 47.351396] kasan_save_alloc_info+0x40/0x58 [ 47.355649] __kasan_kmalloc+0xd4/0xd8 [ 47.359382] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.363896] kasan_atomics+0xb8/0x2e0 [ 47.367541] kunit_try_run_case+0x170/0x3f0 [ 47.371708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.377177] kthread+0x328/0x630 [ 47.380388] ret_from_fork+0x10/0x20 [ 47.383947] [ 47.385423] The buggy address belongs to the object at ffff000800d61a00 [ 47.385423] which belongs to the cache kmalloc-64 of size 64 [ 47.397751] The buggy address is located 0 bytes to the right of [ 47.397751] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 47.410596] [ 47.412074] The buggy address belongs to the physical page: [ 47.417631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 47.425616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.432124] page_type: f5(slab) [ 47.435261] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.442981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.450700] page dumped because: kasan: bad access detected [ 47.456257] [ 47.457731] Memory state around the buggy address: [ 47.462513] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.469714] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.476918] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.484120] ^ [ 47.488898] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.496102] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.503303] ================================================================== [ 55.659284] ================================================================== [ 55.666377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 55.673667] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 55.680958] [ 55.682441] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 55.682490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.682506] Hardware name: WinLink E850-96 board (DT) [ 55.682526] Call trace: [ 55.682540] show_stack+0x20/0x38 (C) [ 55.682570] dump_stack_lvl+0x8c/0xd0 [ 55.682606] print_report+0x118/0x608 [ 55.682637] kasan_report+0xdc/0x128 [ 55.682667] kasan_check_range+0x100/0x1a8 [ 55.682700] __kasan_check_read+0x20/0x30 [ 55.682734] kasan_atomics_helper+0xdd4/0x4858 [ 55.682764] kasan_atomics+0x198/0x2e0 [ 55.682792] kunit_try_run_case+0x170/0x3f0 [ 55.682827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.682865] kthread+0x328/0x630 [ 55.682898] ret_from_fork+0x10/0x20 [ 55.682931] [ 55.752572] Allocated by task 314: [ 55.755959] kasan_save_stack+0x3c/0x68 [ 55.759776] kasan_save_track+0x20/0x40 [ 55.763596] kasan_save_alloc_info+0x40/0x58 [ 55.767849] __kasan_kmalloc+0xd4/0xd8 [ 55.771582] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.776096] kasan_atomics+0xb8/0x2e0 [ 55.779741] kunit_try_run_case+0x170/0x3f0 [ 55.783908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.789377] kthread+0x328/0x630 [ 55.792589] ret_from_fork+0x10/0x20 [ 55.796147] [ 55.797623] The buggy address belongs to the object at ffff000800d61a00 [ 55.797623] which belongs to the cache kmalloc-64 of size 64 [ 55.809951] The buggy address is located 0 bytes to the right of [ 55.809951] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 55.822796] [ 55.824272] The buggy address belongs to the physical page: [ 55.829828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 55.837814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.844324] page_type: f5(slab) [ 55.847459] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.855181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.862900] page dumped because: kasan: bad access detected [ 55.868455] [ 55.869931] Memory state around the buggy address: [ 55.874710] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.881914] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.889119] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.896320] ^ [ 55.901098] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.908302] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.915503] ================================================================== [ 56.447004] ================================================================== [ 56.454040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 56.461416] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 56.468794] [ 56.470277] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 56.470324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.470342] Hardware name: WinLink E850-96 board (DT) [ 56.470361] Call trace: [ 56.470374] show_stack+0x20/0x38 (C) [ 56.470405] dump_stack_lvl+0x8c/0xd0 [ 56.470438] print_report+0x118/0x608 [ 56.470468] kasan_report+0xdc/0x128 [ 56.470497] __asan_report_store8_noabort+0x20/0x30 [ 56.470533] kasan_atomics_helper+0x3e5c/0x4858 [ 56.470565] kasan_atomics+0x198/0x2e0 [ 56.470592] kunit_try_run_case+0x170/0x3f0 [ 56.470627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.470666] kthread+0x328/0x630 [ 56.470699] ret_from_fork+0x10/0x20 [ 56.470732] [ 56.537282] Allocated by task 314: [ 56.540669] kasan_save_stack+0x3c/0x68 [ 56.544487] kasan_save_track+0x20/0x40 [ 56.548306] kasan_save_alloc_info+0x40/0x58 [ 56.552560] __kasan_kmalloc+0xd4/0xd8 [ 56.556292] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.560806] kasan_atomics+0xb8/0x2e0 [ 56.564452] kunit_try_run_case+0x170/0x3f0 [ 56.568619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.574087] kthread+0x328/0x630 [ 56.577299] ret_from_fork+0x10/0x20 [ 56.580858] [ 56.582334] The buggy address belongs to the object at ffff000800d61a00 [ 56.582334] which belongs to the cache kmalloc-64 of size 64 [ 56.594660] The buggy address is located 0 bytes to the right of [ 56.594660] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 56.607506] [ 56.608983] The buggy address belongs to the physical page: [ 56.614540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 56.622524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.629034] page_type: f5(slab) [ 56.632171] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.639892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.647611] page dumped because: kasan: bad access detected [ 56.653166] [ 56.654641] Memory state around the buggy address: [ 56.659420] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.666625] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.673829] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.681030] ^ [ 56.685808] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.693013] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.700214] ================================================================== [ 58.290202] ================================================================== [ 58.297240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 58.304617] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 58.311995] [ 58.313480] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 58.313531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.313548] Hardware name: WinLink E850-96 board (DT) [ 58.313564] Call trace: [ 58.313580] show_stack+0x20/0x38 (C) [ 58.313611] dump_stack_lvl+0x8c/0xd0 [ 58.313646] print_report+0x118/0x608 [ 58.313676] kasan_report+0xdc/0x128 [ 58.313705] kasan_check_range+0x100/0x1a8 [ 58.313736] __kasan_check_write+0x20/0x30 [ 58.313769] kasan_atomics_helper+0x1128/0x4858 [ 58.313801] kasan_atomics+0x198/0x2e0 [ 58.313829] kunit_try_run_case+0x170/0x3f0 [ 58.313864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.313901] kthread+0x328/0x630 [ 58.313933] ret_from_fork+0x10/0x20 [ 58.313963] [ 58.383782] Allocated by task 314: [ 58.387170] kasan_save_stack+0x3c/0x68 [ 58.390987] kasan_save_track+0x20/0x40 [ 58.394806] kasan_save_alloc_info+0x40/0x58 [ 58.399060] __kasan_kmalloc+0xd4/0xd8 [ 58.402793] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.407306] kasan_atomics+0xb8/0x2e0 [ 58.410952] kunit_try_run_case+0x170/0x3f0 [ 58.415119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.420587] kthread+0x328/0x630 [ 58.423799] ret_from_fork+0x10/0x20 [ 58.427358] [ 58.428834] The buggy address belongs to the object at ffff000800d61a00 [ 58.428834] which belongs to the cache kmalloc-64 of size 64 [ 58.441160] The buggy address is located 0 bytes to the right of [ 58.441160] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 58.454007] [ 58.455484] The buggy address belongs to the physical page: [ 58.461039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 58.469024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.475534] page_type: f5(slab) [ 58.478669] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.486392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.494110] page dumped because: kasan: bad access detected [ 58.499666] [ 58.501141] Memory state around the buggy address: [ 58.505920] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.513125] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.520329] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.527530] ^ [ 58.532308] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.539513] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.546714] ================================================================== [ 61.977594] ================================================================== [ 61.984685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 61.992063] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 61.999353] [ 62.000835] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 62.000883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.000899] Hardware name: WinLink E850-96 board (DT) [ 62.000918] Call trace: [ 62.000932] show_stack+0x20/0x38 (C) [ 62.000964] dump_stack_lvl+0x8c/0xd0 [ 62.000997] print_report+0x118/0x608 [ 62.001025] kasan_report+0xdc/0x128 [ 62.001056] __asan_report_load8_noabort+0x20/0x30 [ 62.001092] kasan_atomics_helper+0x3df4/0x4858 [ 62.001121] kasan_atomics+0x198/0x2e0 [ 62.001149] kunit_try_run_case+0x170/0x3f0 [ 62.001184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.001222] kthread+0x328/0x630 [ 62.001255] ret_from_fork+0x10/0x20 [ 62.001289] [ 62.067754] Allocated by task 314: [ 62.071141] kasan_save_stack+0x3c/0x68 [ 62.074959] kasan_save_track+0x20/0x40 [ 62.078779] kasan_save_alloc_info+0x40/0x58 [ 62.083032] __kasan_kmalloc+0xd4/0xd8 [ 62.086765] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.091279] kasan_atomics+0xb8/0x2e0 [ 62.094924] kunit_try_run_case+0x170/0x3f0 [ 62.099091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.104560] kthread+0x328/0x630 [ 62.107772] ret_from_fork+0x10/0x20 [ 62.111330] [ 62.112806] The buggy address belongs to the object at ffff000800d61a00 [ 62.112806] which belongs to the cache kmalloc-64 of size 64 [ 62.125133] The buggy address is located 0 bytes to the right of [ 62.125133] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 62.137979] [ 62.139457] The buggy address belongs to the physical page: [ 62.145012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 62.152998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.159507] page_type: f5(slab) [ 62.162642] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.170364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.178083] page dumped because: kasan: bad access detected [ 62.183638] [ 62.185114] Memory state around the buggy address: [ 62.189893] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.197097] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.204302] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.211503] ^ [ 62.216281] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.223485] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.230687] ================================================================== [ 53.826560] ================================================================== [ 53.833592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 53.840969] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 53.848260] [ 53.849744] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 53.849793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.849810] Hardware name: WinLink E850-96 board (DT) [ 53.849829] Call trace: [ 53.849843] show_stack+0x20/0x38 (C) [ 53.849874] dump_stack_lvl+0x8c/0xd0 [ 53.849910] print_report+0x118/0x608 [ 53.849940] kasan_report+0xdc/0x128 [ 53.849972] __asan_report_load4_noabort+0x20/0x30 [ 53.850006] kasan_atomics_helper+0x3dbc/0x4858 [ 53.850037] kasan_atomics+0x198/0x2e0 [ 53.850064] kunit_try_run_case+0x170/0x3f0 [ 53.850103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.850144] kthread+0x328/0x630 [ 53.850176] ret_from_fork+0x10/0x20 [ 53.850211] [ 53.916662] Allocated by task 314: [ 53.920049] kasan_save_stack+0x3c/0x68 [ 53.923867] kasan_save_track+0x20/0x40 [ 53.927686] kasan_save_alloc_info+0x40/0x58 [ 53.931939] __kasan_kmalloc+0xd4/0xd8 [ 53.935672] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.940186] kasan_atomics+0xb8/0x2e0 [ 53.943831] kunit_try_run_case+0x170/0x3f0 [ 53.947998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.953467] kthread+0x328/0x630 [ 53.956679] ret_from_fork+0x10/0x20 [ 53.960238] [ 53.961713] The buggy address belongs to the object at ffff000800d61a00 [ 53.961713] which belongs to the cache kmalloc-64 of size 64 [ 53.974040] The buggy address is located 0 bytes to the right of [ 53.974040] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 53.986886] [ 53.988364] The buggy address belongs to the physical page: [ 53.993920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 54.001904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.008414] page_type: f5(slab) [ 54.011547] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.019271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.026990] page dumped because: kasan: bad access detected [ 54.032545] [ 54.034021] Memory state around the buggy address: [ 54.038799] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.046004] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.053209] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.060410] ^ [ 54.065188] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.072393] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.079594] ================================================================== [ 62.762334] ================================================================== [ 62.769395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 62.776773] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 62.784150] [ 62.785634] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 62.785681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.785696] Hardware name: WinLink E850-96 board (DT) [ 62.785712] Call trace: [ 62.785725] show_stack+0x20/0x38 (C) [ 62.785756] dump_stack_lvl+0x8c/0xd0 [ 62.785793] print_report+0x118/0x608 [ 62.785824] kasan_report+0xdc/0x128 [ 62.785853] kasan_check_range+0x100/0x1a8 [ 62.785884] __kasan_check_write+0x20/0x30 [ 62.785919] kasan_atomics_helper+0x175c/0x4858 [ 62.785949] kasan_atomics+0x198/0x2e0 [ 62.785976] kunit_try_run_case+0x170/0x3f0 [ 62.786013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.786052] kthread+0x328/0x630 [ 62.786085] ret_from_fork+0x10/0x20 [ 62.786118] [ 62.855937] Allocated by task 314: [ 62.859323] kasan_save_stack+0x3c/0x68 [ 62.863142] kasan_save_track+0x20/0x40 [ 62.866962] kasan_save_alloc_info+0x40/0x58 [ 62.871215] __kasan_kmalloc+0xd4/0xd8 [ 62.874947] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.879461] kasan_atomics+0xb8/0x2e0 [ 62.883107] kunit_try_run_case+0x170/0x3f0 [ 62.887273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.892742] kthread+0x328/0x630 [ 62.895954] ret_from_fork+0x10/0x20 [ 62.899513] [ 62.900988] The buggy address belongs to the object at ffff000800d61a00 [ 62.900988] which belongs to the cache kmalloc-64 of size 64 [ 62.913315] The buggy address is located 0 bytes to the right of [ 62.913315] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 62.926162] [ 62.927641] The buggy address belongs to the physical page: [ 62.933195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 62.941180] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.947689] page_type: f5(slab) [ 62.950825] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.958547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.966266] page dumped because: kasan: bad access detected [ 62.971821] [ 62.973297] Memory state around the buggy address: [ 62.978075] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.985280] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.992484] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.999685] ^ [ 63.004464] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.011668] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.018869] ================================================================== [ 51.983854] ================================================================== [ 51.990912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 51.998201] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 52.005579] [ 52.007063] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 52.007109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.007127] Hardware name: WinLink E850-96 board (DT) [ 52.007145] Call trace: [ 52.007158] show_stack+0x20/0x38 (C) [ 52.007190] dump_stack_lvl+0x8c/0xd0 [ 52.007224] print_report+0x118/0x608 [ 52.007255] kasan_report+0xdc/0x128 [ 52.007286] kasan_check_range+0x100/0x1a8 [ 52.007317] __kasan_check_write+0x20/0x30 [ 52.007348] kasan_atomics_helper+0x934/0x4858 [ 52.007379] kasan_atomics+0x198/0x2e0 [ 52.007404] kunit_try_run_case+0x170/0x3f0 [ 52.007440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.007478] kthread+0x328/0x630 [ 52.007509] ret_from_fork+0x10/0x20 [ 52.007542] [ 52.077280] Allocated by task 314: [ 52.080667] kasan_save_stack+0x3c/0x68 [ 52.084485] kasan_save_track+0x20/0x40 [ 52.088304] kasan_save_alloc_info+0x40/0x58 [ 52.092557] __kasan_kmalloc+0xd4/0xd8 [ 52.096290] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.100804] kasan_atomics+0xb8/0x2e0 [ 52.104450] kunit_try_run_case+0x170/0x3f0 [ 52.108616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.114085] kthread+0x328/0x630 [ 52.117297] ret_from_fork+0x10/0x20 [ 52.120856] [ 52.122331] The buggy address belongs to the object at ffff000800d61a00 [ 52.122331] which belongs to the cache kmalloc-64 of size 64 [ 52.134658] The buggy address is located 0 bytes to the right of [ 52.134658] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 52.147504] [ 52.148982] The buggy address belongs to the physical page: [ 52.154538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 52.162522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.169031] page_type: f5(slab) [ 52.172167] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.179889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.187608] page dumped because: kasan: bad access detected [ 52.193163] [ 52.194639] Memory state around the buggy address: [ 52.199417] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.206622] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.213827] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.221028] ^ [ 52.225806] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.233010] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.240211] ================================================================== [ 57.234982] ================================================================== [ 57.242047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 57.249338] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 57.256716] [ 57.258199] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 57.258249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.258265] Hardware name: WinLink E850-96 board (DT) [ 57.258285] Call trace: [ 57.258297] show_stack+0x20/0x38 (C) [ 57.258330] dump_stack_lvl+0x8c/0xd0 [ 57.258365] print_report+0x118/0x608 [ 57.258396] kasan_report+0xdc/0x128 [ 57.258425] kasan_check_range+0x100/0x1a8 [ 57.258457] __kasan_check_write+0x20/0x30 [ 57.258489] kasan_atomics_helper+0xf88/0x4858 [ 57.258519] kasan_atomics+0x198/0x2e0 [ 57.258547] kunit_try_run_case+0x170/0x3f0 [ 57.258581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.258621] kthread+0x328/0x630 [ 57.258652] ret_from_fork+0x10/0x20 [ 57.258684] [ 57.328416] Allocated by task 314: [ 57.331802] kasan_save_stack+0x3c/0x68 [ 57.335621] kasan_save_track+0x20/0x40 [ 57.339441] kasan_save_alloc_info+0x40/0x58 [ 57.343694] __kasan_kmalloc+0xd4/0xd8 [ 57.347426] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.351940] kasan_atomics+0xb8/0x2e0 [ 57.355586] kunit_try_run_case+0x170/0x3f0 [ 57.359753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.365221] kthread+0x328/0x630 [ 57.368433] ret_from_fork+0x10/0x20 [ 57.371992] [ 57.373467] The buggy address belongs to the object at ffff000800d61a00 [ 57.373467] which belongs to the cache kmalloc-64 of size 64 [ 57.385794] The buggy address is located 0 bytes to the right of [ 57.385794] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 57.398641] [ 57.400117] The buggy address belongs to the physical page: [ 57.405673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 57.413659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.420168] page_type: f5(slab) [ 57.423303] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.431026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.438744] page dumped because: kasan: bad access detected [ 57.444300] [ 57.445775] Memory state around the buggy address: [ 57.450555] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.457759] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.464963] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.472164] ^ [ 57.476942] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.484147] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.491348] ================================================================== [ 58.026301] ================================================================== [ 58.033355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 58.040732] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 58.048110] [ 58.049593] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 58.049643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.049660] Hardware name: WinLink E850-96 board (DT) [ 58.049680] Call trace: [ 58.049692] show_stack+0x20/0x38 (C) [ 58.049724] dump_stack_lvl+0x8c/0xd0 [ 58.049760] print_report+0x118/0x608 [ 58.049789] kasan_report+0xdc/0x128 [ 58.049818] kasan_check_range+0x100/0x1a8 [ 58.049850] __kasan_check_write+0x20/0x30 [ 58.049882] kasan_atomics_helper+0x10c0/0x4858 [ 58.049914] kasan_atomics+0x198/0x2e0 [ 58.049942] kunit_try_run_case+0x170/0x3f0 [ 58.049976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.050015] kthread+0x328/0x630 [ 58.050045] ret_from_fork+0x10/0x20 [ 58.050078] [ 58.119897] Allocated by task 314: [ 58.123284] kasan_save_stack+0x3c/0x68 [ 58.127102] kasan_save_track+0x20/0x40 [ 58.130921] kasan_save_alloc_info+0x40/0x58 [ 58.135175] __kasan_kmalloc+0xd4/0xd8 [ 58.138908] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.143421] kasan_atomics+0xb8/0x2e0 [ 58.147067] kunit_try_run_case+0x170/0x3f0 [ 58.151234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.156702] kthread+0x328/0x630 [ 58.159914] ret_from_fork+0x10/0x20 [ 58.163473] [ 58.164949] The buggy address belongs to the object at ffff000800d61a00 [ 58.164949] which belongs to the cache kmalloc-64 of size 64 [ 58.177275] The buggy address is located 0 bytes to the right of [ 58.177275] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 58.190122] [ 58.191600] The buggy address belongs to the physical page: [ 58.197155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 58.205139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.211649] page_type: f5(slab) [ 58.214786] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.222507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.230226] page dumped because: kasan: bad access detected [ 58.235781] [ 58.237257] Memory state around the buggy address: [ 58.242036] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.249240] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.256444] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.263645] ^ [ 58.268423] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.275628] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.282829] ================================================================== [ 51.459752] ================================================================== [ 51.466788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 51.474077] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 51.481455] [ 51.482939] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 51.482986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.483002] Hardware name: WinLink E850-96 board (DT) [ 51.483022] Call trace: [ 51.483036] show_stack+0x20/0x38 (C) [ 51.483067] dump_stack_lvl+0x8c/0xd0 [ 51.483103] print_report+0x118/0x608 [ 51.483133] kasan_report+0xdc/0x128 [ 51.483162] kasan_check_range+0x100/0x1a8 [ 51.483194] __kasan_check_write+0x20/0x30 [ 51.483229] kasan_atomics_helper+0x894/0x4858 [ 51.483259] kasan_atomics+0x198/0x2e0 [ 51.483288] kunit_try_run_case+0x170/0x3f0 [ 51.483323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.483362] kthread+0x328/0x630 [ 51.483394] ret_from_fork+0x10/0x20 [ 51.483427] [ 51.553155] Allocated by task 314: [ 51.556543] kasan_save_stack+0x3c/0x68 [ 51.560360] kasan_save_track+0x20/0x40 [ 51.564180] kasan_save_alloc_info+0x40/0x58 [ 51.568433] __kasan_kmalloc+0xd4/0xd8 [ 51.572166] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.576680] kasan_atomics+0xb8/0x2e0 [ 51.580325] kunit_try_run_case+0x170/0x3f0 [ 51.584492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.589961] kthread+0x328/0x630 [ 51.593172] ret_from_fork+0x10/0x20 [ 51.596732] [ 51.598207] The buggy address belongs to the object at ffff000800d61a00 [ 51.598207] which belongs to the cache kmalloc-64 of size 64 [ 51.610533] The buggy address is located 0 bytes to the right of [ 51.610533] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 51.623380] [ 51.624856] The buggy address belongs to the physical page: [ 51.630414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 51.638398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.644908] page_type: f5(slab) [ 51.648044] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.655765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.663484] page dumped because: kasan: bad access detected [ 51.669039] [ 51.670515] Memory state around the buggy address: [ 51.675295] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.682498] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.689703] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.696904] ^ [ 51.701681] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.708887] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.716087] ================================================================== [ 55.922850] ================================================================== [ 55.929914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 55.937291] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 55.944583] [ 55.946066] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 55.946115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.946131] Hardware name: WinLink E850-96 board (DT) [ 55.946151] Call trace: [ 55.946162] show_stack+0x20/0x38 (C) [ 55.946193] dump_stack_lvl+0x8c/0xd0 [ 55.946227] print_report+0x118/0x608 [ 55.946259] kasan_report+0xdc/0x128 [ 55.946289] __asan_report_load8_noabort+0x20/0x30 [ 55.946326] kasan_atomics_helper+0x3f58/0x4858 [ 55.946356] kasan_atomics+0x198/0x2e0 [ 55.946384] kunit_try_run_case+0x170/0x3f0 [ 55.946418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.946457] kthread+0x328/0x630 [ 55.946491] ret_from_fork+0x10/0x20 [ 55.946524] [ 56.012984] Allocated by task 314: [ 56.016371] kasan_save_stack+0x3c/0x68 [ 56.020189] kasan_save_track+0x20/0x40 [ 56.024009] kasan_save_alloc_info+0x40/0x58 [ 56.028262] __kasan_kmalloc+0xd4/0xd8 [ 56.031995] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.036509] kasan_atomics+0xb8/0x2e0 [ 56.040154] kunit_try_run_case+0x170/0x3f0 [ 56.044321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.049790] kthread+0x328/0x630 [ 56.053001] ret_from_fork+0x10/0x20 [ 56.056560] [ 56.058036] The buggy address belongs to the object at ffff000800d61a00 [ 56.058036] which belongs to the cache kmalloc-64 of size 64 [ 56.070362] The buggy address is located 0 bytes to the right of [ 56.070362] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 56.083209] [ 56.084685] The buggy address belongs to the physical page: [ 56.090243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 56.098226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.104737] page_type: f5(slab) [ 56.107871] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.115594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.123313] page dumped because: kasan: bad access detected [ 56.128868] [ 56.130344] Memory state around the buggy address: [ 56.135122] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.142327] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.149532] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.156732] ^ [ 56.161510] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.168715] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.175916] ================================================================== [ 62.501926] ================================================================== [ 62.508985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 62.516359] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 62.523651] [ 62.525133] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 62.525181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.525199] Hardware name: WinLink E850-96 board (DT) [ 62.525216] Call trace: [ 62.525229] show_stack+0x20/0x38 (C) [ 62.525260] dump_stack_lvl+0x8c/0xd0 [ 62.525294] print_report+0x118/0x608 [ 62.525325] kasan_report+0xdc/0x128 [ 62.525354] __asan_report_load8_noabort+0x20/0x30 [ 62.525390] kasan_atomics_helper+0x3e10/0x4858 [ 62.525422] kasan_atomics+0x198/0x2e0 [ 62.525448] kunit_try_run_case+0x170/0x3f0 [ 62.525485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.525524] kthread+0x328/0x630 [ 62.525556] ret_from_fork+0x10/0x20 [ 62.525588] [ 62.592052] Allocated by task 314: [ 62.595438] kasan_save_stack+0x3c/0x68 [ 62.599257] kasan_save_track+0x20/0x40 [ 62.603077] kasan_save_alloc_info+0x40/0x58 [ 62.607330] __kasan_kmalloc+0xd4/0xd8 [ 62.611063] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.615576] kasan_atomics+0xb8/0x2e0 [ 62.619222] kunit_try_run_case+0x170/0x3f0 [ 62.623389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.628858] kthread+0x328/0x630 [ 62.632069] ret_from_fork+0x10/0x20 [ 62.635628] [ 62.637104] The buggy address belongs to the object at ffff000800d61a00 [ 62.637104] which belongs to the cache kmalloc-64 of size 64 [ 62.649430] The buggy address is located 0 bytes to the right of [ 62.649430] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 62.662277] [ 62.663754] The buggy address belongs to the physical page: [ 62.669310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 62.677295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.683804] page_type: f5(slab) [ 62.686939] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.694662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.702381] page dumped because: kasan: bad access detected [ 62.707936] [ 62.709412] Memory state around the buggy address: [ 62.714190] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.721395] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.728599] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.735800] ^ [ 62.740578] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.747783] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.754984] ================================================================== [ 60.925555] ================================================================== [ 60.932617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 60.939994] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 60.947372] [ 60.948855] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 60.948902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.948918] Hardware name: WinLink E850-96 board (DT) [ 60.948937] Call trace: [ 60.948949] show_stack+0x20/0x38 (C) [ 60.948983] dump_stack_lvl+0x8c/0xd0 [ 60.949018] print_report+0x118/0x608 [ 60.949050] kasan_report+0xdc/0x128 [ 60.949079] kasan_check_range+0x100/0x1a8 [ 60.949111] __kasan_check_write+0x20/0x30 [ 60.949143] kasan_atomics_helper+0x154c/0x4858 [ 60.949174] kasan_atomics+0x198/0x2e0 [ 60.949202] kunit_try_run_case+0x170/0x3f0 [ 60.949237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.949275] kthread+0x328/0x630 [ 60.949310] ret_from_fork+0x10/0x20 [ 60.949344] [ 61.019159] Allocated by task 314: [ 61.022545] kasan_save_stack+0x3c/0x68 [ 61.026364] kasan_save_track+0x20/0x40 [ 61.030183] kasan_save_alloc_info+0x40/0x58 [ 61.034437] __kasan_kmalloc+0xd4/0xd8 [ 61.038169] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.042683] kasan_atomics+0xb8/0x2e0 [ 61.046329] kunit_try_run_case+0x170/0x3f0 [ 61.050496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.055964] kthread+0x328/0x630 [ 61.059176] ret_from_fork+0x10/0x20 [ 61.062735] [ 61.064211] The buggy address belongs to the object at ffff000800d61a00 [ 61.064211] which belongs to the cache kmalloc-64 of size 64 [ 61.076537] The buggy address is located 0 bytes to the right of [ 61.076537] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 61.089384] [ 61.090862] The buggy address belongs to the physical page: [ 61.096416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 61.104401] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.110911] page_type: f5(slab) [ 61.114045] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.121769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.129488] page dumped because: kasan: bad access detected [ 61.135043] [ 61.136519] Memory state around the buggy address: [ 61.141297] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.148502] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.155706] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.162907] ^ [ 61.167685] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.174890] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.182091] ================================================================== [ 58.817946] ================================================================== [ 58.825010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 58.832387] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 58.839765] [ 58.841247] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 58.841296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.841312] Hardware name: WinLink E850-96 board (DT) [ 58.841331] Call trace: [ 58.841344] show_stack+0x20/0x38 (C) [ 58.841375] dump_stack_lvl+0x8c/0xd0 [ 58.841411] print_report+0x118/0x608 [ 58.841442] kasan_report+0xdc/0x128 [ 58.841471] kasan_check_range+0x100/0x1a8 [ 58.841502] __kasan_check_write+0x20/0x30 [ 58.841535] kasan_atomics_helper+0x11f8/0x4858 [ 58.841565] kasan_atomics+0x198/0x2e0 [ 58.841593] kunit_try_run_case+0x170/0x3f0 [ 58.841628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.841668] kthread+0x328/0x630 [ 58.841701] ret_from_fork+0x10/0x20 [ 58.841733] [ 58.911552] Allocated by task 314: [ 58.914939] kasan_save_stack+0x3c/0x68 [ 58.918757] kasan_save_track+0x20/0x40 [ 58.922576] kasan_save_alloc_info+0x40/0x58 [ 58.926830] __kasan_kmalloc+0xd4/0xd8 [ 58.930563] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.935076] kasan_atomics+0xb8/0x2e0 [ 58.938722] kunit_try_run_case+0x170/0x3f0 [ 58.942888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.948357] kthread+0x328/0x630 [ 58.951569] ret_from_fork+0x10/0x20 [ 58.955128] [ 58.956603] The buggy address belongs to the object at ffff000800d61a00 [ 58.956603] which belongs to the cache kmalloc-64 of size 64 [ 58.968930] The buggy address is located 0 bytes to the right of [ 58.968930] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 58.981777] [ 58.983254] The buggy address belongs to the physical page: [ 58.988808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 58.996794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.003304] page_type: f5(slab) [ 59.006439] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.014162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.021881] page dumped because: kasan: bad access detected [ 59.027435] [ 59.028911] Memory state around the buggy address: [ 59.033690] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.040895] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.048099] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.055300] ^ [ 59.060078] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.067283] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.074484] ================================================================== [ 46.722987] ================================================================== [ 46.729883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 46.737256] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 46.744634] [ 46.746121] CPU: 7 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 46.746179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.746198] Hardware name: WinLink E850-96 board (DT) [ 46.746219] Call trace: [ 46.746236] show_stack+0x20/0x38 (C) [ 46.746271] dump_stack_lvl+0x8c/0xd0 [ 46.746309] print_report+0x118/0x608 [ 46.746343] kasan_report+0xdc/0x128 [ 46.746374] __asan_report_store4_noabort+0x20/0x30 [ 46.746415] kasan_atomics_helper+0x3f7c/0x4858 [ 46.746445] kasan_atomics+0x198/0x2e0 [ 46.746474] kunit_try_run_case+0x170/0x3f0 [ 46.746509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.746547] kthread+0x328/0x630 [ 46.746581] ret_from_fork+0x10/0x20 [ 46.746618] [ 46.813122] Allocated by task 314: [ 46.816511] kasan_save_stack+0x3c/0x68 [ 46.820327] kasan_save_track+0x20/0x40 [ 46.824146] kasan_save_alloc_info+0x40/0x58 [ 46.828400] __kasan_kmalloc+0xd4/0xd8 [ 46.832133] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.836647] kasan_atomics+0xb8/0x2e0 [ 46.840292] kunit_try_run_case+0x170/0x3f0 [ 46.844459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.849928] kthread+0x328/0x630 [ 46.853139] ret_from_fork+0x10/0x20 [ 46.856698] [ 46.858175] The buggy address belongs to the object at ffff000800d61a00 [ 46.858175] which belongs to the cache kmalloc-64 of size 64 [ 46.870502] The buggy address is located 0 bytes to the right of [ 46.870502] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 46.883347] [ 46.884826] The buggy address belongs to the physical page: [ 46.890383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 46.898367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.904875] page_type: f5(slab) [ 46.908011] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.915732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.923451] page dumped because: kasan: bad access detected [ 46.929008] [ 46.930482] Memory state around the buggy address: [ 46.935263] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.942465] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.949670] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.956871] ^ [ 46.961648] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.968853] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.976054] ================================================================== [ 50.668589] ================================================================== [ 50.675653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 50.682943] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 50.690322] [ 50.691804] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 50.691854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.691871] Hardware name: WinLink E850-96 board (DT) [ 50.691892] Call trace: [ 50.691904] show_stack+0x20/0x38 (C) [ 50.691936] dump_stack_lvl+0x8c/0xd0 [ 50.691970] print_report+0x118/0x608 [ 50.692000] kasan_report+0xdc/0x128 [ 50.692030] kasan_check_range+0x100/0x1a8 [ 50.692063] __kasan_check_write+0x20/0x30 [ 50.692098] kasan_atomics_helper+0x6ec/0x4858 [ 50.692129] kasan_atomics+0x198/0x2e0 [ 50.692155] kunit_try_run_case+0x170/0x3f0 [ 50.692191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.692229] kthread+0x328/0x630 [ 50.692261] ret_from_fork+0x10/0x20 [ 50.692293] [ 50.762021] Allocated by task 314: [ 50.765408] kasan_save_stack+0x3c/0x68 [ 50.769226] kasan_save_track+0x20/0x40 [ 50.773046] kasan_save_alloc_info+0x40/0x58 [ 50.777299] __kasan_kmalloc+0xd4/0xd8 [ 50.781032] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.785546] kasan_atomics+0xb8/0x2e0 [ 50.789192] kunit_try_run_case+0x170/0x3f0 [ 50.793358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.798827] kthread+0x328/0x630 [ 50.802038] ret_from_fork+0x10/0x20 [ 50.805598] [ 50.807073] The buggy address belongs to the object at ffff000800d61a00 [ 50.807073] which belongs to the cache kmalloc-64 of size 64 [ 50.819400] The buggy address is located 0 bytes to the right of [ 50.819400] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 50.832246] [ 50.833724] The buggy address belongs to the physical page: [ 50.839280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 50.847265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.853774] page_type: f5(slab) [ 50.856909] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.864631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.872350] page dumped because: kasan: bad access detected [ 50.877905] [ 50.879381] Memory state around the buggy address: [ 50.884161] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.891364] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.898569] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.905770] ^ [ 50.910548] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.917752] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.924953] ================================================================== [ 46.455310] ================================================================== [ 46.469469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 46.476845] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 46.484134] [ 46.485623] CPU: 7 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 46.485679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.485697] Hardware name: WinLink E850-96 board (DT) [ 46.485720] Call trace: [ 46.485734] show_stack+0x20/0x38 (C) [ 46.485773] dump_stack_lvl+0x8c/0xd0 [ 46.485812] print_report+0x118/0x608 [ 46.485846] kasan_report+0xdc/0x128 [ 46.485877] __asan_report_load4_noabort+0x20/0x30 [ 46.485913] kasan_atomics_helper+0x40a8/0x4858 [ 46.485943] kasan_atomics+0x198/0x2e0 [ 46.485971] kunit_try_run_case+0x170/0x3f0 [ 46.486009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.486049] kthread+0x328/0x630 [ 46.486086] ret_from_fork+0x10/0x20 [ 46.486126] [ 46.552537] Allocated by task 314: [ 46.555925] kasan_save_stack+0x3c/0x68 [ 46.559741] kasan_save_track+0x20/0x40 [ 46.563560] kasan_save_alloc_info+0x40/0x58 [ 46.567814] __kasan_kmalloc+0xd4/0xd8 [ 46.571546] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.576060] kasan_atomics+0xb8/0x2e0 [ 46.579706] kunit_try_run_case+0x170/0x3f0 [ 46.583873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.589341] kthread+0x328/0x630 [ 46.592553] ret_from_fork+0x10/0x20 [ 46.596112] [ 46.597589] The buggy address belongs to the object at ffff000800d61a00 [ 46.597589] which belongs to the cache kmalloc-64 of size 64 [ 46.609918] The buggy address is located 0 bytes to the right of [ 46.609918] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 46.622761] [ 46.624240] The buggy address belongs to the physical page: [ 46.629798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 46.637780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.644290] page_type: f5(slab) [ 46.647429] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.655146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.662865] page dumped because: kasan: bad access detected [ 46.668420] [ 46.669896] Memory state around the buggy address: [ 46.674675] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.681879] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.689084] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.696284] ^ [ 46.701063] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.708267] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.715469] ================================================================== [ 53.302428] ================================================================== [ 53.309468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 53.316845] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 53.324136] [ 53.325619] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 53.325667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.325684] Hardware name: WinLink E850-96 board (DT) [ 53.325704] Call trace: [ 53.325717] show_stack+0x20/0x38 (C) [ 53.325749] dump_stack_lvl+0x8c/0xd0 [ 53.325784] print_report+0x118/0x608 [ 53.325812] kasan_report+0xdc/0x128 [ 53.325841] __asan_report_load4_noabort+0x20/0x30 [ 53.325876] kasan_atomics_helper+0x3dcc/0x4858 [ 53.325906] kasan_atomics+0x198/0x2e0 [ 53.325935] kunit_try_run_case+0x170/0x3f0 [ 53.325972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.326012] kthread+0x328/0x630 [ 53.326044] ret_from_fork+0x10/0x20 [ 53.326078] [ 53.392538] Allocated by task 314: [ 53.395925] kasan_save_stack+0x3c/0x68 [ 53.399742] kasan_save_track+0x20/0x40 [ 53.403562] kasan_save_alloc_info+0x40/0x58 [ 53.407815] __kasan_kmalloc+0xd4/0xd8 [ 53.411548] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.416062] kasan_atomics+0xb8/0x2e0 [ 53.419707] kunit_try_run_case+0x170/0x3f0 [ 53.423874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.429343] kthread+0x328/0x630 [ 53.432554] ret_from_fork+0x10/0x20 [ 53.436114] [ 53.437589] The buggy address belongs to the object at ffff000800d61a00 [ 53.437589] which belongs to the cache kmalloc-64 of size 64 [ 53.449916] The buggy address is located 0 bytes to the right of [ 53.449916] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 53.462763] [ 53.464238] The buggy address belongs to the physical page: [ 53.469794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 53.477780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.484290] page_type: f5(slab) [ 53.487423] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.495147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.502866] page dumped because: kasan: bad access detected [ 53.508422] [ 53.509897] Memory state around the buggy address: [ 53.514677] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.521880] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.529085] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.536286] ^ [ 53.541064] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.548269] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.555470] ================================================================== [ 54.874779] ================================================================== [ 54.881840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 54.889217] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 54.896508] [ 54.897992] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 54.898038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.898055] Hardware name: WinLink E850-96 board (DT) [ 54.898074] Call trace: [ 54.898089] show_stack+0x20/0x38 (C) [ 54.898121] dump_stack_lvl+0x8c/0xd0 [ 54.898157] print_report+0x118/0x608 [ 54.898189] kasan_report+0xdc/0x128 [ 54.898217] __asan_report_load4_noabort+0x20/0x30 [ 54.898253] kasan_atomics_helper+0x3dd8/0x4858 [ 54.898284] kasan_atomics+0x198/0x2e0 [ 54.898311] kunit_try_run_case+0x170/0x3f0 [ 54.898347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.898387] kthread+0x328/0x630 [ 54.898421] ret_from_fork+0x10/0x20 [ 54.898457] [ 54.964910] Allocated by task 314: [ 54.968296] kasan_save_stack+0x3c/0x68 [ 54.972114] kasan_save_track+0x20/0x40 [ 54.975934] kasan_save_alloc_info+0x40/0x58 [ 54.980188] __kasan_kmalloc+0xd4/0xd8 [ 54.983920] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.988434] kasan_atomics+0xb8/0x2e0 [ 54.992080] kunit_try_run_case+0x170/0x3f0 [ 54.996246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.001715] kthread+0x328/0x630 [ 55.004927] ret_from_fork+0x10/0x20 [ 55.008486] [ 55.009961] The buggy address belongs to the object at ffff000800d61a00 [ 55.009961] which belongs to the cache kmalloc-64 of size 64 [ 55.022288] The buggy address is located 0 bytes to the right of [ 55.022288] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 55.035135] [ 55.036612] The buggy address belongs to the physical page: [ 55.042167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 55.050152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.056662] page_type: f5(slab) [ 55.059797] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.067520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.075238] page dumped because: kasan: bad access detected [ 55.080794] [ 55.082269] Memory state around the buggy address: [ 55.087048] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.094252] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.101457] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.108658] ^ [ 55.113436] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.120640] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.127842] ================================================================== [ 56.971275] ================================================================== [ 56.978337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 56.985626] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 56.993005] [ 56.994487] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 56.994537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.994553] Hardware name: WinLink E850-96 board (DT) [ 56.994573] Call trace: [ 56.994585] show_stack+0x20/0x38 (C) [ 56.994618] dump_stack_lvl+0x8c/0xd0 [ 56.994652] print_report+0x118/0x608 [ 56.994682] kasan_report+0xdc/0x128 [ 56.994714] kasan_check_range+0x100/0x1a8 [ 56.994747] __kasan_check_write+0x20/0x30 [ 56.994780] kasan_atomics_helper+0xf20/0x4858 [ 56.994811] kasan_atomics+0x198/0x2e0 [ 56.994838] kunit_try_run_case+0x170/0x3f0 [ 56.994872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.994911] kthread+0x328/0x630 [ 56.994945] ret_from_fork+0x10/0x20 [ 56.994978] [ 57.064705] Allocated by task 314: [ 57.068091] kasan_save_stack+0x3c/0x68 [ 57.071910] kasan_save_track+0x20/0x40 [ 57.075729] kasan_save_alloc_info+0x40/0x58 [ 57.079983] __kasan_kmalloc+0xd4/0xd8 [ 57.083715] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.088229] kasan_atomics+0xb8/0x2e0 [ 57.091875] kunit_try_run_case+0x170/0x3f0 [ 57.096041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.101509] kthread+0x328/0x630 [ 57.104722] ret_from_fork+0x10/0x20 [ 57.108281] [ 57.109756] The buggy address belongs to the object at ffff000800d61a00 [ 57.109756] which belongs to the cache kmalloc-64 of size 64 [ 57.122083] The buggy address is located 0 bytes to the right of [ 57.122083] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 57.134930] [ 57.136406] The buggy address belongs to the physical page: [ 57.141963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 57.149947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.156457] page_type: f5(slab) [ 57.159592] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.167314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.175033] page dumped because: kasan: bad access detected [ 57.180588] [ 57.182064] Memory state around the buggy address: [ 57.186842] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.194047] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.201252] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.208453] ^ [ 57.213231] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.220436] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.227637] ================================================================== [ 52.247594] ================================================================== [ 52.254624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 52.261913] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 52.269291] [ 52.270774] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 52.270823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.270840] Hardware name: WinLink E850-96 board (DT) [ 52.270861] Call trace: [ 52.270873] show_stack+0x20/0x38 (C) [ 52.270904] dump_stack_lvl+0x8c/0xd0 [ 52.270941] print_report+0x118/0x608 [ 52.270972] kasan_report+0xdc/0x128 [ 52.271001] kasan_check_range+0x100/0x1a8 [ 52.271033] __kasan_check_write+0x20/0x30 [ 52.271065] kasan_atomics_helper+0x99c/0x4858 [ 52.271097] kasan_atomics+0x198/0x2e0 [ 52.271125] kunit_try_run_case+0x170/0x3f0 [ 52.271159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.271199] kthread+0x328/0x630 [ 52.271232] ret_from_fork+0x10/0x20 [ 52.271264] [ 52.340991] Allocated by task 314: [ 52.344378] kasan_save_stack+0x3c/0x68 [ 52.348196] kasan_save_track+0x20/0x40 [ 52.352015] kasan_save_alloc_info+0x40/0x58 [ 52.356269] __kasan_kmalloc+0xd4/0xd8 [ 52.360001] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.364515] kasan_atomics+0xb8/0x2e0 [ 52.368161] kunit_try_run_case+0x170/0x3f0 [ 52.372328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.377796] kthread+0x328/0x630 [ 52.381008] ret_from_fork+0x10/0x20 [ 52.384567] [ 52.386042] The buggy address belongs to the object at ffff000800d61a00 [ 52.386042] which belongs to the cache kmalloc-64 of size 64 [ 52.398369] The buggy address is located 0 bytes to the right of [ 52.398369] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 52.411216] [ 52.412692] The buggy address belongs to the physical page: [ 52.418249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 52.426233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.432743] page_type: f5(slab) [ 52.435878] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.443600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.451319] page dumped because: kasan: bad access detected [ 52.456874] [ 52.458350] Memory state around the buggy address: [ 52.463130] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.470334] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.477538] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.484739] ^ [ 52.489517] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.496722] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.503923] ================================================================== [ 61.713767] ================================================================== [ 61.720800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 61.728177] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 61.735555] [ 61.737037] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 61.737083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.737101] Hardware name: WinLink E850-96 board (DT) [ 61.737118] Call trace: [ 61.737132] show_stack+0x20/0x38 (C) [ 61.737163] dump_stack_lvl+0x8c/0xd0 [ 61.737198] print_report+0x118/0x608 [ 61.737228] kasan_report+0xdc/0x128 [ 61.737257] kasan_check_range+0x100/0x1a8 [ 61.737288] __kasan_check_write+0x20/0x30 [ 61.737319] kasan_atomics_helper+0x1644/0x4858 [ 61.737351] kasan_atomics+0x198/0x2e0 [ 61.737379] kunit_try_run_case+0x170/0x3f0 [ 61.737417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.737454] kthread+0x328/0x630 [ 61.737487] ret_from_fork+0x10/0x20 [ 61.737519] [ 61.807342] Allocated by task 314: [ 61.810729] kasan_save_stack+0x3c/0x68 [ 61.814547] kasan_save_track+0x20/0x40 [ 61.818366] kasan_save_alloc_info+0x40/0x58 [ 61.822620] __kasan_kmalloc+0xd4/0xd8 [ 61.826352] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.830866] kasan_atomics+0xb8/0x2e0 [ 61.834512] kunit_try_run_case+0x170/0x3f0 [ 61.838678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.844147] kthread+0x328/0x630 [ 61.847359] ret_from_fork+0x10/0x20 [ 61.850918] [ 61.852394] The buggy address belongs to the object at ffff000800d61a00 [ 61.852394] which belongs to the cache kmalloc-64 of size 64 [ 61.864721] The buggy address is located 0 bytes to the right of [ 61.864721] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 61.877567] [ 61.879042] The buggy address belongs to the physical page: [ 61.884598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 61.892584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.899094] page_type: f5(slab) [ 61.902230] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.909951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.917670] page dumped because: kasan: bad access detected [ 61.923225] [ 61.924701] Memory state around the buggy address: [ 61.929481] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.936684] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.943889] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.951090] ^ [ 61.955868] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.963074] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.970274] ================================================================== [ 52.774976] ================================================================== [ 52.782045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 52.789335] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 52.796713] [ 52.798198] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 52.798247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.798262] Hardware name: WinLink E850-96 board (DT) [ 52.798282] Call trace: [ 52.798294] show_stack+0x20/0x38 (C) [ 52.798324] dump_stack_lvl+0x8c/0xd0 [ 52.798360] print_report+0x118/0x608 [ 52.798390] kasan_report+0xdc/0x128 [ 52.798420] kasan_check_range+0x100/0x1a8 [ 52.798452] __kasan_check_write+0x20/0x30 [ 52.798485] kasan_atomics_helper+0xa6c/0x4858 [ 52.798515] kasan_atomics+0x198/0x2e0 [ 52.798543] kunit_try_run_case+0x170/0x3f0 [ 52.798578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.798617] kthread+0x328/0x630 [ 52.798651] ret_from_fork+0x10/0x20 [ 52.798682] [ 52.868414] Allocated by task 314: [ 52.871799] kasan_save_stack+0x3c/0x68 [ 52.875619] kasan_save_track+0x20/0x40 [ 52.879438] kasan_save_alloc_info+0x40/0x58 [ 52.883691] __kasan_kmalloc+0xd4/0xd8 [ 52.887424] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.891937] kasan_atomics+0xb8/0x2e0 [ 52.895584] kunit_try_run_case+0x170/0x3f0 [ 52.899750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.905219] kthread+0x328/0x630 [ 52.908431] ret_from_fork+0x10/0x20 [ 52.911989] [ 52.913465] The buggy address belongs to the object at ffff000800d61a00 [ 52.913465] which belongs to the cache kmalloc-64 of size 64 [ 52.925793] The buggy address is located 0 bytes to the right of [ 52.925793] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 52.938638] [ 52.940114] The buggy address belongs to the physical page: [ 52.945670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 52.953656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.960166] page_type: f5(slab) [ 52.963301] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.971023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.978742] page dumped because: kasan: bad access detected [ 52.984297] [ 52.985773] Memory state around the buggy address: [ 52.990553] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.997756] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.004961] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.012162] ^ [ 53.016940] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.024144] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.031346] ================================================================== [ 61.453332] ================================================================== [ 61.460388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 61.467764] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 61.475055] [ 61.476538] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 61.476585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.476600] Hardware name: WinLink E850-96 board (DT) [ 61.476619] Call trace: [ 61.476632] show_stack+0x20/0x38 (C) [ 61.476663] dump_stack_lvl+0x8c/0xd0 [ 61.476699] print_report+0x118/0x608 [ 61.476730] kasan_report+0xdc/0x128 [ 61.476760] __asan_report_load8_noabort+0x20/0x30 [ 61.476793] kasan_atomics_helper+0x3db0/0x4858 [ 61.476824] kasan_atomics+0x198/0x2e0 [ 61.476851] kunit_try_run_case+0x170/0x3f0 [ 61.476887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.476924] kthread+0x328/0x630 [ 61.476957] ret_from_fork+0x10/0x20 [ 61.476990] [ 61.543457] Allocated by task 314: [ 61.546842] kasan_save_stack+0x3c/0x68 [ 61.550662] kasan_save_track+0x20/0x40 [ 61.554481] kasan_save_alloc_info+0x40/0x58 [ 61.558735] __kasan_kmalloc+0xd4/0xd8 [ 61.562467] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.566981] kasan_atomics+0xb8/0x2e0 [ 61.570627] kunit_try_run_case+0x170/0x3f0 [ 61.574793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.580262] kthread+0x328/0x630 [ 61.583474] ret_from_fork+0x10/0x20 [ 61.587033] [ 61.588508] The buggy address belongs to the object at ffff000800d61a00 [ 61.588508] which belongs to the cache kmalloc-64 of size 64 [ 61.600835] The buggy address is located 0 bytes to the right of [ 61.600835] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 61.613681] [ 61.615158] The buggy address belongs to the physical page: [ 61.620714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 61.628700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.635209] page_type: f5(slab) [ 61.638344] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.646067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.653786] page dumped because: kasan: bad access detected [ 61.659341] [ 61.660816] Memory state around the buggy address: [ 61.665596] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.672799] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.680004] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.687205] ^ [ 61.691983] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.699187] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.706389] ================================================================== [ 48.822647] ================================================================== [ 48.829674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 48.836964] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 48.844342] [ 48.845825] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 48.845876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.845893] Hardware name: WinLink E850-96 board (DT) [ 48.845912] Call trace: [ 48.845924] show_stack+0x20/0x38 (C) [ 48.845953] dump_stack_lvl+0x8c/0xd0 [ 48.845988] print_report+0x118/0x608 [ 48.846017] kasan_report+0xdc/0x128 [ 48.846048] kasan_check_range+0x100/0x1a8 [ 48.846080] __kasan_check_write+0x20/0x30 [ 48.846112] kasan_atomics_helper+0x414/0x4858 [ 48.846141] kasan_atomics+0x198/0x2e0 [ 48.846170] kunit_try_run_case+0x170/0x3f0 [ 48.846205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.846245] kthread+0x328/0x630 [ 48.846278] ret_from_fork+0x10/0x20 [ 48.846310] [ 48.916042] Allocated by task 314: [ 48.919428] kasan_save_stack+0x3c/0x68 [ 48.923247] kasan_save_track+0x20/0x40 [ 48.927067] kasan_save_alloc_info+0x40/0x58 [ 48.931320] __kasan_kmalloc+0xd4/0xd8 [ 48.935053] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.939566] kasan_atomics+0xb8/0x2e0 [ 48.943212] kunit_try_run_case+0x170/0x3f0 [ 48.947379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.952847] kthread+0x328/0x630 [ 48.956059] ret_from_fork+0x10/0x20 [ 48.959618] [ 48.961094] The buggy address belongs to the object at ffff000800d61a00 [ 48.961094] which belongs to the cache kmalloc-64 of size 64 [ 48.973420] The buggy address is located 0 bytes to the right of [ 48.973420] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 48.986267] [ 48.987745] The buggy address belongs to the physical page: [ 48.993301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 49.001284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.007794] page_type: f5(slab) [ 49.010929] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.018652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.026370] page dumped because: kasan: bad access detected [ 49.031926] [ 49.033402] Memory state around the buggy address: [ 49.038182] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.045385] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.052590] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.059790] ^ [ 49.064568] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.071773] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.078974] ================================================================== [ 48.034698] ================================================================== [ 48.041667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 48.048955] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 48.056333] [ 48.057818] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 48.057870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.057887] Hardware name: WinLink E850-96 board (DT) [ 48.057908] Call trace: [ 48.057924] show_stack+0x20/0x38 (C) [ 48.057959] dump_stack_lvl+0x8c/0xd0 [ 48.057997] print_report+0x118/0x608 [ 48.058029] kasan_report+0xdc/0x128 [ 48.058058] kasan_check_range+0x100/0x1a8 [ 48.058093] __kasan_check_write+0x20/0x30 [ 48.058127] kasan_atomics_helper+0x32c/0x4858 [ 48.058156] kasan_atomics+0x198/0x2e0 [ 48.058185] kunit_try_run_case+0x170/0x3f0 [ 48.058223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.058261] kthread+0x328/0x630 [ 48.058296] ret_from_fork+0x10/0x20 [ 48.058330] [ 48.128034] Allocated by task 314: [ 48.131421] kasan_save_stack+0x3c/0x68 [ 48.135238] kasan_save_track+0x20/0x40 [ 48.139058] kasan_save_alloc_info+0x40/0x58 [ 48.143311] __kasan_kmalloc+0xd4/0xd8 [ 48.147044] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.151558] kasan_atomics+0xb8/0x2e0 [ 48.155203] kunit_try_run_case+0x170/0x3f0 [ 48.159370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.164839] kthread+0x328/0x630 [ 48.168050] ret_from_fork+0x10/0x20 [ 48.171609] [ 48.173086] The buggy address belongs to the object at ffff000800d61a00 [ 48.173086] which belongs to the cache kmalloc-64 of size 64 [ 48.185413] The buggy address is located 0 bytes to the right of [ 48.185413] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 48.198258] [ 48.199734] The buggy address belongs to the physical page: [ 48.205294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 48.213278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.219786] page_type: f5(slab) [ 48.222922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.230643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.238361] page dumped because: kasan: bad access detected [ 48.243917] [ 48.245393] Memory state around the buggy address: [ 48.250174] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.257376] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.264580] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.271781] ^ [ 48.276559] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.283764] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.290965] ================================================================== [ 48.298373] ================================================================== [ 48.305378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 48.312753] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 48.320131] [ 48.321617] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 48.321667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.321684] Hardware name: WinLink E850-96 board (DT) [ 48.321704] Call trace: [ 48.321714] show_stack+0x20/0x38 (C) [ 48.321749] dump_stack_lvl+0x8c/0xd0 [ 48.321787] print_report+0x118/0x608 [ 48.321819] kasan_report+0xdc/0x128 [ 48.321848] __asan_report_store4_noabort+0x20/0x30 [ 48.321884] kasan_atomics_helper+0x3f94/0x4858 [ 48.321915] kasan_atomics+0x198/0x2e0 [ 48.321943] kunit_try_run_case+0x170/0x3f0 [ 48.321981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.322021] kthread+0x328/0x630 [ 48.322055] ret_from_fork+0x10/0x20 [ 48.322088] [ 48.388620] Allocated by task 314: [ 48.392008] kasan_save_stack+0x3c/0x68 [ 48.395825] kasan_save_track+0x20/0x40 [ 48.399644] kasan_save_alloc_info+0x40/0x58 [ 48.403897] __kasan_kmalloc+0xd4/0xd8 [ 48.407630] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.412144] kasan_atomics+0xb8/0x2e0 [ 48.415789] kunit_try_run_case+0x170/0x3f0 [ 48.419956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.425425] kthread+0x328/0x630 [ 48.428637] ret_from_fork+0x10/0x20 [ 48.432196] [ 48.433671] The buggy address belongs to the object at ffff000800d61a00 [ 48.433671] which belongs to the cache kmalloc-64 of size 64 [ 48.445999] The buggy address is located 0 bytes to the right of [ 48.445999] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 48.458844] [ 48.460322] The buggy address belongs to the physical page: [ 48.465878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 48.473865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.480372] page_type: f5(slab) [ 48.483508] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.491229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.498948] page dumped because: kasan: bad access detected [ 48.504503] [ 48.505979] Memory state around the buggy address: [ 48.510759] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.517962] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.525166] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.532368] ^ [ 48.537146] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.544351] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.551551] ================================================================== [ 49.086332] ================================================================== [ 49.093385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 49.100676] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 49.108054] [ 49.109539] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 49.109587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.109604] Hardware name: WinLink E850-96 board (DT) [ 49.109624] Call trace: [ 49.109637] show_stack+0x20/0x38 (C) [ 49.109669] dump_stack_lvl+0x8c/0xd0 [ 49.109705] print_report+0x118/0x608 [ 49.109735] kasan_report+0xdc/0x128 [ 49.109765] kasan_check_range+0x100/0x1a8 [ 49.109798] __kasan_check_write+0x20/0x30 [ 49.109834] kasan_atomics_helper+0x47c/0x4858 [ 49.109865] kasan_atomics+0x198/0x2e0 [ 49.109893] kunit_try_run_case+0x170/0x3f0 [ 49.109927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.109966] kthread+0x328/0x630 [ 49.110000] ret_from_fork+0x10/0x20 [ 49.110032] [ 49.179754] Allocated by task 314: [ 49.183140] kasan_save_stack+0x3c/0x68 [ 49.186958] kasan_save_track+0x20/0x40 [ 49.190778] kasan_save_alloc_info+0x40/0x58 [ 49.195031] __kasan_kmalloc+0xd4/0xd8 [ 49.198764] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.203278] kasan_atomics+0xb8/0x2e0 [ 49.206924] kunit_try_run_case+0x170/0x3f0 [ 49.211090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.216559] kthread+0x328/0x630 [ 49.219771] ret_from_fork+0x10/0x20 [ 49.223330] [ 49.224805] The buggy address belongs to the object at ffff000800d61a00 [ 49.224805] which belongs to the cache kmalloc-64 of size 64 [ 49.237132] The buggy address is located 0 bytes to the right of [ 49.237132] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 49.249978] [ 49.251457] The buggy address belongs to the physical page: [ 49.257012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 49.264996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.271506] page_type: f5(slab) [ 49.274641] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.282364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.290082] page dumped because: kasan: bad access detected [ 49.295638] [ 49.297113] Memory state around the buggy address: [ 49.301893] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.309096] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.316301] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.323502] ^ [ 49.328280] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.335484] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.342685] ================================================================== [ 54.086917] ================================================================== [ 54.094005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 54.101295] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 54.108673] [ 54.110156] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 54.110206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.110223] Hardware name: WinLink E850-96 board (DT) [ 54.110241] Call trace: [ 54.110254] show_stack+0x20/0x38 (C) [ 54.110286] dump_stack_lvl+0x8c/0xd0 [ 54.110320] print_report+0x118/0x608 [ 54.110351] kasan_report+0xdc/0x128 [ 54.110380] kasan_check_range+0x100/0x1a8 [ 54.110413] __kasan_check_write+0x20/0x30 [ 54.110447] kasan_atomics_helper+0xc08/0x4858 [ 54.110477] kasan_atomics+0x198/0x2e0 [ 54.110504] kunit_try_run_case+0x170/0x3f0 [ 54.110539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.110578] kthread+0x328/0x630 [ 54.110612] ret_from_fork+0x10/0x20 [ 54.110645] [ 54.180373] Allocated by task 314: [ 54.183760] kasan_save_stack+0x3c/0x68 [ 54.187578] kasan_save_track+0x20/0x40 [ 54.191397] kasan_save_alloc_info+0x40/0x58 [ 54.195651] __kasan_kmalloc+0xd4/0xd8 [ 54.199383] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.203897] kasan_atomics+0xb8/0x2e0 [ 54.207543] kunit_try_run_case+0x170/0x3f0 [ 54.211709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.217178] kthread+0x328/0x630 [ 54.220390] ret_from_fork+0x10/0x20 [ 54.223949] [ 54.225425] The buggy address belongs to the object at ffff000800d61a00 [ 54.225425] which belongs to the cache kmalloc-64 of size 64 [ 54.237751] The buggy address is located 0 bytes to the right of [ 54.237751] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 54.250598] [ 54.252074] The buggy address belongs to the physical page: [ 54.257629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 54.265615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.272125] page_type: f5(slab) [ 54.275260] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.282983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.290701] page dumped because: kasan: bad access detected [ 54.296257] [ 54.297732] Memory state around the buggy address: [ 54.302510] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.309715] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.316920] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.324121] ^ [ 54.328899] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.336104] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.343305] ================================================================== [ 60.133902] ================================================================== [ 60.140962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 60.148339] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 60.155717] [ 60.157200] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 60.157246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.157262] Hardware name: WinLink E850-96 board (DT) [ 60.157278] Call trace: [ 60.157292] show_stack+0x20/0x38 (C) [ 60.157322] dump_stack_lvl+0x8c/0xd0 [ 60.157359] print_report+0x118/0x608 [ 60.157389] kasan_report+0xdc/0x128 [ 60.157417] kasan_check_range+0x100/0x1a8 [ 60.157448] __kasan_check_write+0x20/0x30 [ 60.157481] kasan_atomics_helper+0x1414/0x4858 [ 60.157512] kasan_atomics+0x198/0x2e0 [ 60.157540] kunit_try_run_case+0x170/0x3f0 [ 60.157575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.157614] kthread+0x328/0x630 [ 60.157646] ret_from_fork+0x10/0x20 [ 60.157679] [ 60.227504] Allocated by task 314: [ 60.230892] kasan_save_stack+0x3c/0x68 [ 60.234709] kasan_save_track+0x20/0x40 [ 60.238529] kasan_save_alloc_info+0x40/0x58 [ 60.242782] __kasan_kmalloc+0xd4/0xd8 [ 60.246515] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.251029] kasan_atomics+0xb8/0x2e0 [ 60.254674] kunit_try_run_case+0x170/0x3f0 [ 60.258841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.264310] kthread+0x328/0x630 [ 60.267521] ret_from_fork+0x10/0x20 [ 60.271080] [ 60.272556] The buggy address belongs to the object at ffff000800d61a00 [ 60.272556] which belongs to the cache kmalloc-64 of size 64 [ 60.284883] The buggy address is located 0 bytes to the right of [ 60.284883] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 60.297729] [ 60.299205] The buggy address belongs to the physical page: [ 60.304762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 60.312746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.319257] page_type: f5(slab) [ 60.322390] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.330114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.337833] page dumped because: kasan: bad access detected [ 60.343388] [ 60.344864] Memory state around the buggy address: [ 60.349643] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.356847] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.364052] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.371253] ^ [ 60.376030] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.383235] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.390436] ================================================================== [ 54.611094] ================================================================== [ 54.618129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 54.625419] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 54.632797] [ 54.634280] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 54.634330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.634347] Hardware name: WinLink E850-96 board (DT) [ 54.634365] Call trace: [ 54.634378] show_stack+0x20/0x38 (C) [ 54.634408] dump_stack_lvl+0x8c/0xd0 [ 54.634443] print_report+0x118/0x608 [ 54.634475] kasan_report+0xdc/0x128 [ 54.634504] kasan_check_range+0x100/0x1a8 [ 54.634537] __kasan_check_write+0x20/0x30 [ 54.634570] kasan_atomics_helper+0xca0/0x4858 [ 54.634600] kasan_atomics+0x198/0x2e0 [ 54.634628] kunit_try_run_case+0x170/0x3f0 [ 54.634663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.634701] kthread+0x328/0x630 [ 54.634735] ret_from_fork+0x10/0x20 [ 54.634767] [ 54.704497] Allocated by task 314: [ 54.707884] kasan_save_stack+0x3c/0x68 [ 54.711702] kasan_save_track+0x20/0x40 [ 54.715521] kasan_save_alloc_info+0x40/0x58 [ 54.719775] __kasan_kmalloc+0xd4/0xd8 [ 54.723507] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.728021] kasan_atomics+0xb8/0x2e0 [ 54.731667] kunit_try_run_case+0x170/0x3f0 [ 54.735833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.741302] kthread+0x328/0x630 [ 54.744514] ret_from_fork+0x10/0x20 [ 54.748073] [ 54.749549] The buggy address belongs to the object at ffff000800d61a00 [ 54.749549] which belongs to the cache kmalloc-64 of size 64 [ 54.761875] The buggy address is located 0 bytes to the right of [ 54.761875] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 54.774722] [ 54.776199] The buggy address belongs to the physical page: [ 54.781754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 54.789739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.796249] page_type: f5(slab) [ 54.799384] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.807107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.814826] page dumped because: kasan: bad access detected [ 54.820381] [ 54.821856] Memory state around the buggy address: [ 54.826636] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.833840] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.841044] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.848245] ^ [ 54.853023] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.860228] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.867429] ================================================================== [ 47.774266] ================================================================== [ 47.781255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 47.788629] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 47.795921] [ 47.797407] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 47.797461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.797479] Hardware name: WinLink E850-96 board (DT) [ 47.797500] Call trace: [ 47.797514] show_stack+0x20/0x38 (C) [ 47.797550] dump_stack_lvl+0x8c/0xd0 [ 47.797587] print_report+0x118/0x608 [ 47.797619] kasan_report+0xdc/0x128 [ 47.797647] __asan_report_load4_noabort+0x20/0x30 [ 47.797686] kasan_atomics_helper+0x40fc/0x4858 [ 47.797715] kasan_atomics+0x198/0x2e0 [ 47.797743] kunit_try_run_case+0x170/0x3f0 [ 47.797782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.797822] kthread+0x328/0x630 [ 47.797857] ret_from_fork+0x10/0x20 [ 47.797891] [ 47.864323] Allocated by task 314: [ 47.867709] kasan_save_stack+0x3c/0x68 [ 47.871527] kasan_save_track+0x20/0x40 [ 47.875347] kasan_save_alloc_info+0x40/0x58 [ 47.879600] __kasan_kmalloc+0xd4/0xd8 [ 47.883332] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.887846] kasan_atomics+0xb8/0x2e0 [ 47.891492] kunit_try_run_case+0x170/0x3f0 [ 47.895658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.901127] kthread+0x328/0x630 [ 47.904339] ret_from_fork+0x10/0x20 [ 47.907898] [ 47.909375] The buggy address belongs to the object at ffff000800d61a00 [ 47.909375] which belongs to the cache kmalloc-64 of size 64 [ 47.921702] The buggy address is located 0 bytes to the right of [ 47.921702] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 47.934547] [ 47.936025] The buggy address belongs to the physical page: [ 47.941579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 47.949566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.956075] page_type: f5(slab) [ 47.959212] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.966931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.974651] page dumped because: kasan: bad access detected [ 47.980206] [ 47.981681] Memory state around the buggy address: [ 47.986461] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.993665] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.000869] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.008070] ^ [ 48.012848] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.020053] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.027254] ================================================================== [ 59.609607] ================================================================== [ 59.616664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 59.624042] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314 [ 59.631420] [ 59.632904] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 59.632953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.632969] Hardware name: WinLink E850-96 board (DT) [ 59.632989] Call trace: [ 59.633001] show_stack+0x20/0x38 (C) [ 59.633032] dump_stack_lvl+0x8c/0xd0 [ 59.633068] print_report+0x118/0x608 [ 59.633099] kasan_report+0xdc/0x128 [ 59.633130] kasan_check_range+0x100/0x1a8 [ 59.633161] __kasan_check_write+0x20/0x30 [ 59.633195] kasan_atomics_helper+0x1384/0x4858 [ 59.633225] kasan_atomics+0x198/0x2e0 [ 59.633252] kunit_try_run_case+0x170/0x3f0 [ 59.633289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.633331] kthread+0x328/0x630 [ 59.633363] ret_from_fork+0x10/0x20 [ 59.633398] [ 59.703207] Allocated by task 314: [ 59.706594] kasan_save_stack+0x3c/0x68 [ 59.710411] kasan_save_track+0x20/0x40 [ 59.714231] kasan_save_alloc_info+0x40/0x58 [ 59.718485] __kasan_kmalloc+0xd4/0xd8 [ 59.722217] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.726731] kasan_atomics+0xb8/0x2e0 [ 59.730377] kunit_try_run_case+0x170/0x3f0 [ 59.734543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.740012] kthread+0x328/0x630 [ 59.743224] ret_from_fork+0x10/0x20 [ 59.746783] [ 59.748258] The buggy address belongs to the object at ffff000800d61a00 [ 59.748258] which belongs to the cache kmalloc-64 of size 64 [ 59.760585] The buggy address is located 0 bytes to the right of [ 59.760585] allocated 48-byte region [ffff000800d61a00, ffff000800d61a30) [ 59.773431] [ 59.774909] The buggy address belongs to the physical page: [ 59.780465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61 [ 59.788449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.794959] page_type: f5(slab) [ 59.798095] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.805816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.813535] page dumped because: kasan: bad access detected [ 59.819090] [ 59.820566] Memory state around the buggy address: [ 59.825346] ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.832549] ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.839754] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.846954] ^ [ 59.851733] ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.858938] ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.866139] ==================================================================
[ 20.741104] ================================================================== [ 20.741157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.741209] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.741396] [ 20.741533] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.741824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.741869] Hardware name: linux,dummy-virt (DT) [ 20.741928] Call trace: [ 20.741954] show_stack+0x20/0x38 (C) [ 20.742350] dump_stack_lvl+0x8c/0xd0 [ 20.742427] print_report+0x118/0x608 [ 20.742476] kasan_report+0xdc/0x128 [ 20.742521] kasan_check_range+0x100/0x1a8 [ 20.742780] __kasan_check_read+0x20/0x30 [ 20.742914] kasan_atomics_helper+0xdd4/0x4858 [ 20.742971] kasan_atomics+0x198/0x2e0 [ 20.743265] kunit_try_run_case+0x170/0x3f0 [ 20.743357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.743426] kthread+0x328/0x630 [ 20.743698] ret_from_fork+0x10/0x20 [ 20.743779] [ 20.743823] Allocated by task 267: [ 20.743864] kasan_save_stack+0x3c/0x68 [ 20.744032] kasan_save_track+0x20/0x40 [ 20.744108] kasan_save_alloc_info+0x40/0x58 [ 20.744253] __kasan_kmalloc+0xd4/0xd8 [ 20.744296] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.744337] kasan_atomics+0xb8/0x2e0 [ 20.744381] kunit_try_run_case+0x170/0x3f0 [ 20.744658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.744757] kthread+0x328/0x630 [ 20.745509] ret_from_fork+0x10/0x20 [ 20.745602] [ 20.745657] The buggy address belongs to the object at fff00000c7a67680 [ 20.745657] which belongs to the cache kmalloc-64 of size 64 [ 20.745745] The buggy address is located 0 bytes to the right of [ 20.745745] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.745974] [ 20.746179] The buggy address belongs to the physical page: [ 20.746240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.746384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.746485] page_type: f5(slab) [ 20.746765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.746882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.746986] page dumped because: kasan: bad access detected [ 20.747064] [ 20.747470] Memory state around the buggy address: [ 20.747546] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.747602] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.747925] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.747975] ^ [ 20.748013] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.748100] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.748154] ================================================================== [ 20.777770] ================================================================== [ 20.778088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 20.778161] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.778214] [ 20.778491] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.778635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.778667] Hardware name: linux,dummy-virt (DT) [ 20.778707] Call trace: [ 20.778732] show_stack+0x20/0x38 (C) [ 20.779056] dump_stack_lvl+0x8c/0xd0 [ 20.779138] print_report+0x118/0x608 [ 20.779304] kasan_report+0xdc/0x128 [ 20.779371] kasan_check_range+0x100/0x1a8 [ 20.779434] __kasan_check_write+0x20/0x30 [ 20.779485] kasan_atomics_helper+0xf20/0x4858 [ 20.779533] kasan_atomics+0x198/0x2e0 [ 20.779580] kunit_try_run_case+0x170/0x3f0 [ 20.779631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.779688] kthread+0x328/0x630 [ 20.779740] ret_from_fork+0x10/0x20 [ 20.779789] [ 20.779818] Allocated by task 267: [ 20.779850] kasan_save_stack+0x3c/0x68 [ 20.779904] kasan_save_track+0x20/0x40 [ 20.779952] kasan_save_alloc_info+0x40/0x58 [ 20.779999] __kasan_kmalloc+0xd4/0xd8 [ 20.780038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.780078] kasan_atomics+0xb8/0x2e0 [ 20.780114] kunit_try_run_case+0x170/0x3f0 [ 20.780155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.780202] kthread+0x328/0x630 [ 20.780241] ret_from_fork+0x10/0x20 [ 20.780279] [ 20.780301] The buggy address belongs to the object at fff00000c7a67680 [ 20.780301] which belongs to the cache kmalloc-64 of size 64 [ 20.780362] The buggy address is located 0 bytes to the right of [ 20.780362] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.780428] [ 20.780459] The buggy address belongs to the physical page: [ 20.780492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.780545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.780595] page_type: f5(slab) [ 20.780636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.780692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.780738] page dumped because: kasan: bad access detected [ 20.780782] [ 20.780811] Memory state around the buggy address: [ 20.780845] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.781612] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.781681] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.781727] ^ [ 20.781763] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.781811] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.782632] ================================================================== [ 20.904915] ================================================================== [ 20.904966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 20.905015] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.905067] [ 20.905096] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.905339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.905377] Hardware name: linux,dummy-virt (DT) [ 20.905411] Call trace: [ 20.905435] show_stack+0x20/0x38 (C) [ 20.905486] dump_stack_lvl+0x8c/0xd0 [ 20.905533] print_report+0x118/0x608 [ 20.905704] kasan_report+0xdc/0x128 [ 20.905760] kasan_check_range+0x100/0x1a8 [ 20.905808] __kasan_check_write+0x20/0x30 [ 20.906038] kasan_atomics_helper+0x175c/0x4858 [ 20.906182] kasan_atomics+0x198/0x2e0 [ 20.906365] kunit_try_run_case+0x170/0x3f0 [ 20.906488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.906546] kthread+0x328/0x630 [ 20.906591] ret_from_fork+0x10/0x20 [ 20.906639] [ 20.906661] Allocated by task 267: [ 20.906689] kasan_save_stack+0x3c/0x68 [ 20.906920] kasan_save_track+0x20/0x40 [ 20.907070] kasan_save_alloc_info+0x40/0x58 [ 20.907114] __kasan_kmalloc+0xd4/0xd8 [ 20.907160] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.907212] kasan_atomics+0xb8/0x2e0 [ 20.907250] kunit_try_run_case+0x170/0x3f0 [ 20.907291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.907338] kthread+0x328/0x630 [ 20.907376] ret_from_fork+0x10/0x20 [ 20.907413] [ 20.907434] The buggy address belongs to the object at fff00000c7a67680 [ 20.907434] which belongs to the cache kmalloc-64 of size 64 [ 20.907495] The buggy address is located 0 bytes to the right of [ 20.907495] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.907564] [ 20.907586] The buggy address belongs to the physical page: [ 20.907618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.907682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.907733] page_type: f5(slab) [ 20.907784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.907840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.908276] page dumped because: kasan: bad access detected [ 20.908413] [ 20.908435] Memory state around the buggy address: [ 20.908469] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.908722] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.908795] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.908837] ^ [ 20.908883] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.908931] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.908973] ================================================================== [ 20.884633] ================================================================== [ 20.884681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 20.884728] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.884945] [ 20.885001] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.885088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.885117] Hardware name: linux,dummy-virt (DT) [ 20.885150] Call trace: [ 20.885173] show_stack+0x20/0x38 (C) [ 20.885375] dump_stack_lvl+0x8c/0xd0 [ 20.885428] print_report+0x118/0x608 [ 20.885474] kasan_report+0xdc/0x128 [ 20.885629] kasan_check_range+0x100/0x1a8 [ 20.885731] __kasan_check_write+0x20/0x30 [ 20.885782] kasan_atomics_helper+0x1644/0x4858 [ 20.885964] kasan_atomics+0x198/0x2e0 [ 20.886039] kunit_try_run_case+0x170/0x3f0 [ 20.886091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.886153] kthread+0x328/0x630 [ 20.886355] ret_from_fork+0x10/0x20 [ 20.886561] [ 20.886647] Allocated by task 267: [ 20.886743] kasan_save_stack+0x3c/0x68 [ 20.886818] kasan_save_track+0x20/0x40 [ 20.886886] kasan_save_alloc_info+0x40/0x58 [ 20.886928] __kasan_kmalloc+0xd4/0xd8 [ 20.886965] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.887013] kasan_atomics+0xb8/0x2e0 [ 20.887049] kunit_try_run_case+0x170/0x3f0 [ 20.887091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.887137] kthread+0x328/0x630 [ 20.887179] ret_from_fork+0x10/0x20 [ 20.887217] [ 20.887248] The buggy address belongs to the object at fff00000c7a67680 [ 20.887248] which belongs to the cache kmalloc-64 of size 64 [ 20.887317] The buggy address is located 0 bytes to the right of [ 20.887317] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.887393] [ 20.887423] The buggy address belongs to the physical page: [ 20.887457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.887511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.887560] page_type: f5(slab) [ 20.887599] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.887800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.887921] page dumped because: kasan: bad access detected [ 20.888070] [ 20.888093] Memory state around the buggy address: [ 20.888129] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.888193] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.888240] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.888284] ^ [ 20.888319] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.888387] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.888430] ================================================================== [ 20.662827] ================================================================== [ 20.662944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 20.663108] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.663197] [ 20.663469] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.663589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.663739] dump_stack_lvl+0x8c/0xd0 [ 20.666233] __kasan_kmalloc+0xd4/0xd8 [ 20.666443] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.666519] kasan_atomics+0xb8/0x2e0 [ 20.666884] kunit_try_run_case+0x170/0x3f0 [ 20.666965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.667138] kthread+0x328/0x630 [ 20.667325] ret_from_fork+0x10/0x20 [ 20.667430] [ 20.667534] The buggy address belongs to the object at fff00000c7a67680 [ 20.667534] which belongs to the cache kmalloc-64 of size 64 [ 20.667839] The buggy address is located 0 bytes to the right of [ 20.667839] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.668272] [ 20.668603] The buggy address belongs to the physical page: [ 20.668653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.668713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.668765] page_type: f5(slab) [ 20.668807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.669128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.669669] [ 20.670068] ^ [ 20.672488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.674708] [ 20.674885] kasan_save_stack+0x3c/0x68 [ 20.675428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.675469] kasan_atomics+0xb8/0x2e0 [ 20.675506] kunit_try_run_case+0x170/0x3f0 [ 20.675547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.675806] The buggy address is located 0 bytes to the right of [ 20.675806] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.677355] page dumped because: kasan: bad access detected [ 20.678144] ^ [ 20.679645] ================================================================== [ 20.717248] ================================================================== [ 20.717332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.717387] Read of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.717539] [ 20.717590] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.717872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.718261] Hardware name: linux,dummy-virt (DT) [ 20.718419] Call trace: [ 20.718468] show_stack+0x20/0x38 (C) [ 20.718553] dump_stack_lvl+0x8c/0xd0 [ 20.718607] print_report+0x118/0x608 [ 20.718715] kasan_report+0xdc/0x128 [ 20.718760] __asan_report_load4_noabort+0x20/0x30 [ 20.718814] kasan_atomics_helper+0x3dd8/0x4858 [ 20.719038] kasan_atomics+0x198/0x2e0 [ 20.719099] kunit_try_run_case+0x170/0x3f0 [ 20.719167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.719557] kthread+0x328/0x630 [ 20.719699] ret_from_fork+0x10/0x20 [ 20.719815] [ 20.719844] Allocated by task 267: [ 20.719890] kasan_save_stack+0x3c/0x68 [ 20.720154] kasan_save_track+0x20/0x40 [ 20.720367] kasan_save_alloc_info+0x40/0x58 [ 20.720417] __kasan_kmalloc+0xd4/0xd8 [ 20.720455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.720494] kasan_atomics+0xb8/0x2e0 [ 20.720531] kunit_try_run_case+0x170/0x3f0 [ 20.720573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.720620] kthread+0x328/0x630 [ 20.720914] ret_from_fork+0x10/0x20 [ 20.721036] [ 20.721202] The buggy address belongs to the object at fff00000c7a67680 [ 20.721202] which belongs to the cache kmalloc-64 of size 64 [ 20.721498] The buggy address is located 0 bytes to the right of [ 20.721498] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.721594] [ 20.722025] The buggy address belongs to the physical page: [ 20.722088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.722354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.722698] page_type: f5(slab) [ 20.722768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.723228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.723301] page dumped because: kasan: bad access detected [ 20.723620] [ 20.723678] Memory state around the buggy address: [ 20.723765] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.724073] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.724149] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.724370] ^ [ 20.724577] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.724631] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.724830] ================================================================== [ 20.850515] ================================================================== [ 20.850560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 20.850847] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.850926] [ 20.851067] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.851177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.851209] Hardware name: linux,dummy-virt (DT) [ 20.851243] Call trace: [ 20.851272] show_stack+0x20/0x38 (C) [ 20.851324] dump_stack_lvl+0x8c/0xd0 [ 20.851390] print_report+0x118/0x608 [ 20.851488] kasan_report+0xdc/0x128 [ 20.851553] __asan_report_load8_noabort+0x20/0x30 [ 20.851606] kasan_atomics_helper+0x3f04/0x4858 [ 20.851654] kasan_atomics+0x198/0x2e0 [ 20.851701] kunit_try_run_case+0x170/0x3f0 [ 20.851789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.851867] kthread+0x328/0x630 [ 20.852009] ret_from_fork+0x10/0x20 [ 20.852289] [ 20.852312] Allocated by task 267: [ 20.852438] kasan_save_stack+0x3c/0x68 [ 20.852599] kasan_save_track+0x20/0x40 [ 20.852647] kasan_save_alloc_info+0x40/0x58 [ 20.852688] __kasan_kmalloc+0xd4/0xd8 [ 20.852731] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.852776] kasan_atomics+0xb8/0x2e0 [ 20.852812] kunit_try_run_case+0x170/0x3f0 [ 20.852868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.853059] kthread+0x328/0x630 [ 20.853099] ret_from_fork+0x10/0x20 [ 20.853137] [ 20.853159] The buggy address belongs to the object at fff00000c7a67680 [ 20.853159] which belongs to the cache kmalloc-64 of size 64 [ 20.853220] The buggy address is located 0 bytes to the right of [ 20.853220] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.853289] [ 20.853310] The buggy address belongs to the physical page: [ 20.853453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.853609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.853704] page_type: f5(slab) [ 20.853871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.854131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.854374] page dumped because: kasan: bad access detected [ 20.854593] [ 20.854661] Memory state around the buggy address: [ 20.854696] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.854746] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.854936] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.855138] ^ [ 20.855229] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.855330] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.855463] ================================================================== [ 20.900699] ================================================================== [ 20.900749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 20.900798] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.900851] [ 20.900895] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.900980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.901127] Hardware name: linux,dummy-virt (DT) [ 20.901167] Call trace: [ 20.901191] show_stack+0x20/0x38 (C) [ 20.901497] dump_stack_lvl+0x8c/0xd0 [ 20.901567] print_report+0x118/0x608 [ 20.901617] kasan_report+0xdc/0x128 [ 20.901663] __asan_report_load8_noabort+0x20/0x30 [ 20.901815] kasan_atomics_helper+0x3e10/0x4858 [ 20.902037] kasan_atomics+0x198/0x2e0 [ 20.902100] kunit_try_run_case+0x170/0x3f0 [ 20.902151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.902208] kthread+0x328/0x630 [ 20.902305] ret_from_fork+0x10/0x20 [ 20.902438] [ 20.902486] Allocated by task 267: [ 20.902562] kasan_save_stack+0x3c/0x68 [ 20.902604] kasan_save_track+0x20/0x40 [ 20.902641] kasan_save_alloc_info+0x40/0x58 [ 20.902682] __kasan_kmalloc+0xd4/0xd8 [ 20.902717] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.902792] kasan_atomics+0xb8/0x2e0 [ 20.902828] kunit_try_run_case+0x170/0x3f0 [ 20.902881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.903055] kthread+0x328/0x630 [ 20.903257] ret_from_fork+0x10/0x20 [ 20.903314] [ 20.903336] The buggy address belongs to the object at fff00000c7a67680 [ 20.903336] which belongs to the cache kmalloc-64 of size 64 [ 20.903397] The buggy address is located 0 bytes to the right of [ 20.903397] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.903465] [ 20.903487] The buggy address belongs to the physical page: [ 20.903519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.903694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.903762] page_type: f5(slab) [ 20.903819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.903900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.903949] page dumped because: kasan: bad access detected [ 20.903982] [ 20.904005] Memory state around the buggy address: [ 20.904060] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.904110] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.904270] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.904452] ^ [ 20.904538] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.904585] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.904641] ================================================================== [ 20.869635] ================================================================== [ 20.869687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 20.869763] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.869872] [ 20.869920] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.870008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.870038] Hardware name: linux,dummy-virt (DT) [ 20.870071] Call trace: [ 20.870095] show_stack+0x20/0x38 (C) [ 20.870182] dump_stack_lvl+0x8c/0xd0 [ 20.870339] print_report+0x118/0x608 [ 20.870413] kasan_report+0xdc/0x128 [ 20.870539] kasan_check_range+0x100/0x1a8 [ 20.870635] __kasan_check_write+0x20/0x30 [ 20.870757] kasan_atomics_helper+0x154c/0x4858 [ 20.870832] kasan_atomics+0x198/0x2e0 [ 20.870931] kunit_try_run_case+0x170/0x3f0 [ 20.870987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.871071] kthread+0x328/0x630 [ 20.871119] ret_from_fork+0x10/0x20 [ 20.871179] [ 20.871227] Allocated by task 267: [ 20.871264] kasan_save_stack+0x3c/0x68 [ 20.871424] kasan_save_track+0x20/0x40 [ 20.871465] kasan_save_alloc_info+0x40/0x58 [ 20.871504] __kasan_kmalloc+0xd4/0xd8 [ 20.871663] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.871710] kasan_atomics+0xb8/0x2e0 [ 20.871804] kunit_try_run_case+0x170/0x3f0 [ 20.871846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.872073] kthread+0x328/0x630 [ 20.872315] ret_from_fork+0x10/0x20 [ 20.872515] [ 20.872623] The buggy address belongs to the object at fff00000c7a67680 [ 20.872623] which belongs to the cache kmalloc-64 of size 64 [ 20.872687] The buggy address is located 0 bytes to the right of [ 20.872687] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.872826] [ 20.872871] The buggy address belongs to the physical page: [ 20.872905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.873020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.873211] page_type: f5(slab) [ 20.873337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.873446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.873493] page dumped because: kasan: bad access detected [ 20.873703] [ 20.873725] Memory state around the buggy address: [ 20.873758] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.873807] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.873863] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.873908] ^ [ 20.873942] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.874098] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.874224] ================================================================== [ 20.783333] ================================================================== [ 20.783385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 20.783790] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.783968] [ 20.784022] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.784117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.784148] Hardware name: linux,dummy-virt (DT) [ 20.784298] Call trace: [ 20.784522] show_stack+0x20/0x38 (C) [ 20.784878] dump_stack_lvl+0x8c/0xd0 [ 20.785032] print_report+0x118/0x608 [ 20.785174] kasan_report+0xdc/0x128 [ 20.785227] kasan_check_range+0x100/0x1a8 [ 20.785697] __kasan_check_write+0x20/0x30 [ 20.785764] kasan_atomics_helper+0xf88/0x4858 [ 20.785945] kasan_atomics+0x198/0x2e0 [ 20.786060] kunit_try_run_case+0x170/0x3f0 [ 20.786117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.786443] kthread+0x328/0x630 [ 20.786567] ret_from_fork+0x10/0x20 [ 20.787118] [ 20.787204] Allocated by task 267: [ 20.787391] kasan_save_stack+0x3c/0x68 [ 20.787492] kasan_save_track+0x20/0x40 [ 20.787538] kasan_save_alloc_info+0x40/0x58 [ 20.787948] __kasan_kmalloc+0xd4/0xd8 [ 20.788049] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.788354] kasan_atomics+0xb8/0x2e0 [ 20.788469] kunit_try_run_case+0x170/0x3f0 [ 20.788595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.788759] kthread+0x328/0x630 [ 20.788917] ret_from_fork+0x10/0x20 [ 20.788982] [ 20.789006] The buggy address belongs to the object at fff00000c7a67680 [ 20.789006] which belongs to the cache kmalloc-64 of size 64 [ 20.789076] The buggy address is located 0 bytes to the right of [ 20.789076] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.789450] [ 20.789507] The buggy address belongs to the physical page: [ 20.789576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.790025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.790120] page_type: f5(slab) [ 20.790163] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.790486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.790659] page dumped because: kasan: bad access detected [ 20.790836] [ 20.790932] Memory state around the buggy address: [ 20.791053] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.791103] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.791405] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.791893] ^ [ 20.791961] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.792125] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.792170] ================================================================== [ 20.889069] ================================================================== [ 20.889120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 20.889382] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.889437] [ 20.889587] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.889712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.889814] Hardware name: linux,dummy-virt (DT) [ 20.889848] Call trace: [ 20.889935] show_stack+0x20/0x38 (C) [ 20.890037] dump_stack_lvl+0x8c/0xd0 [ 20.890121] print_report+0x118/0x608 [ 20.890217] kasan_report+0xdc/0x128 [ 20.890432] __asan_report_load8_noabort+0x20/0x30 [ 20.890484] kasan_atomics_helper+0x3df4/0x4858 [ 20.890533] kasan_atomics+0x198/0x2e0 [ 20.890596] kunit_try_run_case+0x170/0x3f0 [ 20.890673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.890826] kthread+0x328/0x630 [ 20.891086] ret_from_fork+0x10/0x20 [ 20.891290] [ 20.891312] Allocated by task 267: [ 20.891343] kasan_save_stack+0x3c/0x68 [ 20.891532] kasan_save_track+0x20/0x40 [ 20.891675] kasan_save_alloc_info+0x40/0x58 [ 20.891719] __kasan_kmalloc+0xd4/0xd8 [ 20.891775] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.891954] kasan_atomics+0xb8/0x2e0 [ 20.892048] kunit_try_run_case+0x170/0x3f0 [ 20.892150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.892199] kthread+0x328/0x630 [ 20.892236] ret_from_fork+0x10/0x20 [ 20.892506] [ 20.892532] The buggy address belongs to the object at fff00000c7a67680 [ 20.892532] which belongs to the cache kmalloc-64 of size 64 [ 20.892594] The buggy address is located 0 bytes to the right of [ 20.892594] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.892682] [ 20.892750] The buggy address belongs to the physical page: [ 20.892911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.892973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.893039] page_type: f5(slab) [ 20.893081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.893139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.893190] page dumped because: kasan: bad access detected [ 20.893239] [ 20.893260] Memory state around the buggy address: [ 20.893293] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.893342] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.893400] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.893454] ^ [ 20.893489] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.893546] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.893600] ================================================================== [ 20.879413] ================================================================== [ 20.879462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 20.879510] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.879564] [ 20.879593] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.879733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.879840] Hardware name: linux,dummy-virt (DT) [ 20.879897] Call trace: [ 20.879922] show_stack+0x20/0x38 (C) [ 20.879987] dump_stack_lvl+0x8c/0xd0 [ 20.880073] print_report+0x118/0x608 [ 20.880142] kasan_report+0xdc/0x128 [ 20.880238] __asan_report_load8_noabort+0x20/0x30 [ 20.880525] kasan_atomics_helper+0x3db0/0x4858 [ 20.880705] kasan_atomics+0x198/0x2e0 [ 20.880789] kunit_try_run_case+0x170/0x3f0 [ 20.880939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.881033] kthread+0x328/0x630 [ 20.881162] ret_from_fork+0x10/0x20 [ 20.881271] [ 20.881393] Allocated by task 267: [ 20.881461] kasan_save_stack+0x3c/0x68 [ 20.881564] kasan_save_track+0x20/0x40 [ 20.881763] kasan_save_alloc_info+0x40/0x58 [ 20.881825] __kasan_kmalloc+0xd4/0xd8 [ 20.881870] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.882086] kasan_atomics+0xb8/0x2e0 [ 20.882121] kunit_try_run_case+0x170/0x3f0 [ 20.882164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.882331] kthread+0x328/0x630 [ 20.882619] ret_from_fork+0x10/0x20 [ 20.882705] [ 20.882781] The buggy address belongs to the object at fff00000c7a67680 [ 20.882781] which belongs to the cache kmalloc-64 of size 64 [ 20.883314] The buggy address is located 0 bytes to the right of [ 20.883314] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.883429] [ 20.883513] The buggy address belongs to the physical page: [ 20.883693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.883778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.883830] page_type: f5(slab) [ 20.883878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.883935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.883982] page dumped because: kasan: bad access detected [ 20.884016] [ 20.884037] Memory state around the buggy address: [ 20.884082] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.884182] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.884229] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.884273] ^ [ 20.884309] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.884365] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.884408] ================================================================== [ 20.828476] ================================================================== [ 20.828527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.828584] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.828784] [ 20.828818] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.829224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.829443] Hardware name: linux,dummy-virt (DT) [ 20.829490] Call trace: [ 20.829514] show_stack+0x20/0x38 (C) [ 20.829566] dump_stack_lvl+0x8c/0xd0 [ 20.829617] print_report+0x118/0x608 [ 20.829662] kasan_report+0xdc/0x128 [ 20.830138] kasan_check_range+0x100/0x1a8 [ 20.830252] __kasan_check_write+0x20/0x30 [ 20.830302] kasan_atomics_helper+0x11f8/0x4858 [ 20.830350] kasan_atomics+0x198/0x2e0 [ 20.830396] kunit_try_run_case+0x170/0x3f0 [ 20.830446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.830502] kthread+0x328/0x630 [ 20.830549] ret_from_fork+0x10/0x20 [ 20.830597] [ 20.830618] Allocated by task 267: [ 20.830647] kasan_save_stack+0x3c/0x68 [ 20.830688] kasan_save_track+0x20/0x40 [ 20.830725] kasan_save_alloc_info+0x40/0x58 [ 20.830777] __kasan_kmalloc+0xd4/0xd8 [ 20.830814] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.830866] kasan_atomics+0xb8/0x2e0 [ 20.830901] kunit_try_run_case+0x170/0x3f0 [ 20.830983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.831064] kthread+0x328/0x630 [ 20.831290] ret_from_fork+0x10/0x20 [ 20.831392] [ 20.831417] The buggy address belongs to the object at fff00000c7a67680 [ 20.831417] which belongs to the cache kmalloc-64 of size 64 [ 20.831507] The buggy address is located 0 bytes to the right of [ 20.831507] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.831607] [ 20.831695] The buggy address belongs to the physical page: [ 20.831730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.831833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.831905] page_type: f5(slab) [ 20.832023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.832137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.832325] page dumped because: kasan: bad access detected [ 20.832361] [ 20.832382] Memory state around the buggy address: [ 20.832673] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.832735] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.832783] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.832827] ^ [ 20.832902] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.832989] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.833134] ================================================================== [ 20.909623] ================================================================== [ 20.909676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 20.909779] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.909832] [ 20.909877] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.910056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.910184] Hardware name: linux,dummy-virt (DT) [ 20.910219] Call trace: [ 20.910241] show_stack+0x20/0x38 (C) [ 20.910294] dump_stack_lvl+0x8c/0xd0 [ 20.910342] print_report+0x118/0x608 [ 20.910391] kasan_report+0xdc/0x128 [ 20.910438] __asan_report_load8_noabort+0x20/0x30 [ 20.910488] kasan_atomics_helper+0x3e20/0x4858 [ 20.910651] kasan_atomics+0x198/0x2e0 [ 20.910707] kunit_try_run_case+0x170/0x3f0 [ 20.910759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.910851] kthread+0x328/0x630 [ 20.911038] ret_from_fork+0x10/0x20 [ 20.911127] [ 20.911254] Allocated by task 267: [ 20.911290] kasan_save_stack+0x3c/0x68 [ 20.911332] kasan_save_track+0x20/0x40 [ 20.911370] kasan_save_alloc_info+0x40/0x58 [ 20.911411] __kasan_kmalloc+0xd4/0xd8 [ 20.911448] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.911487] kasan_atomics+0xb8/0x2e0 [ 20.911523] kunit_try_run_case+0x170/0x3f0 [ 20.911582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.911739] kthread+0x328/0x630 [ 20.911951] ret_from_fork+0x10/0x20 [ 20.911998] [ 20.912019] The buggy address belongs to the object at fff00000c7a67680 [ 20.912019] which belongs to the cache kmalloc-64 of size 64 [ 20.912080] The buggy address is located 0 bytes to the right of [ 20.912080] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.912149] [ 20.912171] The buggy address belongs to the physical page: [ 20.912204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.912258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.912310] page_type: f5(slab) [ 20.912349] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.912405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.912451] page dumped because: kasan: bad access detected [ 20.912486] [ 20.912507] Memory state around the buggy address: [ 20.912540] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.912588] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.912636] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.912679] ^ [ 20.912713] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.912761] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.912804] ================================================================== [ 20.893817] ================================================================== [ 20.893880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 20.893954] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.894251] [ 20.894291] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.894378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.894431] Hardware name: linux,dummy-virt (DT) [ 20.894463] Call trace: [ 20.894487] show_stack+0x20/0x38 (C) [ 20.894552] dump_stack_lvl+0x8c/0xd0 [ 20.894604] print_report+0x118/0x608 [ 20.894651] kasan_report+0xdc/0x128 [ 20.894696] kasan_check_range+0x100/0x1a8 [ 20.894943] __kasan_check_write+0x20/0x30 [ 20.895002] kasan_atomics_helper+0x16d0/0x4858 [ 20.895087] kasan_atomics+0x198/0x2e0 [ 20.895165] kunit_try_run_case+0x170/0x3f0 [ 20.895325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.895556] kthread+0x328/0x630 [ 20.895611] ret_from_fork+0x10/0x20 [ 20.895716] [ 20.895764] Allocated by task 267: [ 20.895954] kasan_save_stack+0x3c/0x68 [ 20.896076] kasan_save_track+0x20/0x40 [ 20.896117] kasan_save_alloc_info+0x40/0x58 [ 20.896157] __kasan_kmalloc+0xd4/0xd8 [ 20.896333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.896373] kasan_atomics+0xb8/0x2e0 [ 20.896410] kunit_try_run_case+0x170/0x3f0 [ 20.896450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.896704] kthread+0x328/0x630 [ 20.896839] ret_from_fork+0x10/0x20 [ 20.896997] [ 20.897114] The buggy address belongs to the object at fff00000c7a67680 [ 20.897114] which belongs to the cache kmalloc-64 of size 64 [ 20.897253] The buggy address is located 0 bytes to the right of [ 20.897253] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.897694] [ 20.897793] The buggy address belongs to the physical page: [ 20.897944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.898050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.898342] page_type: f5(slab) [ 20.898387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.898540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.898745] page dumped because: kasan: bad access detected [ 20.898897] [ 20.898918] Memory state around the buggy address: [ 20.898951] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.899006] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.899400] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.899536] ^ [ 20.899573] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.899721] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.900023] ================================================================== [ 20.732369] ================================================================== [ 20.732422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.732475] Read of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.732537] [ 20.732567] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.732651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.732690] Hardware name: linux,dummy-virt (DT) [ 20.732724] Call trace: [ 20.732747] show_stack+0x20/0x38 (C) [ 20.732805] dump_stack_lvl+0x8c/0xd0 [ 20.732867] print_report+0x118/0x608 [ 20.732913] kasan_report+0xdc/0x128 [ 20.732960] __asan_report_load4_noabort+0x20/0x30 [ 20.733011] kasan_atomics_helper+0x3e04/0x4858 [ 20.733059] kasan_atomics+0x198/0x2e0 [ 20.733105] kunit_try_run_case+0x170/0x3f0 [ 20.733904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.734012] kthread+0x328/0x630 [ 20.734064] ret_from_fork+0x10/0x20 [ 20.734325] [ 20.734361] Allocated by task 267: [ 20.734411] kasan_save_stack+0x3c/0x68 [ 20.734521] kasan_save_track+0x20/0x40 [ 20.734578] kasan_save_alloc_info+0x40/0x58 [ 20.734619] __kasan_kmalloc+0xd4/0xd8 [ 20.734658] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.734960] kasan_atomics+0xb8/0x2e0 [ 20.735042] kunit_try_run_case+0x170/0x3f0 [ 20.735087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.735403] kthread+0x328/0x630 [ 20.735531] ret_from_fork+0x10/0x20 [ 20.735575] [ 20.735597] The buggy address belongs to the object at fff00000c7a67680 [ 20.735597] which belongs to the cache kmalloc-64 of size 64 [ 20.735684] The buggy address is located 0 bytes to the right of [ 20.735684] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.735989] [ 20.736086] The buggy address belongs to the physical page: [ 20.736405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.736594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.736662] page_type: f5(slab) [ 20.736879] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.736951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.737148] page dumped because: kasan: bad access detected [ 20.737274] [ 20.737437] Memory state around the buggy address: [ 20.737684] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.737740] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.737804] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.738116] ^ [ 20.738185] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.738507] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.738582] ================================================================== [ 20.865579] ================================================================== [ 20.865637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 20.865688] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.865741] [ 20.865770] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.865876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.865915] Hardware name: linux,dummy-virt (DT) [ 20.865948] Call trace: [ 20.865983] show_stack+0x20/0x38 (C) [ 20.866033] dump_stack_lvl+0x8c/0xd0 [ 20.866089] print_report+0x118/0x608 [ 20.866137] kasan_report+0xdc/0x128 [ 20.866181] kasan_check_range+0x100/0x1a8 [ 20.866231] __kasan_check_write+0x20/0x30 [ 20.866278] kasan_atomics_helper+0x14e4/0x4858 [ 20.866326] kasan_atomics+0x198/0x2e0 [ 20.866371] kunit_try_run_case+0x170/0x3f0 [ 20.866419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.866483] kthread+0x328/0x630 [ 20.866529] ret_from_fork+0x10/0x20 [ 20.866583] [ 20.866609] Allocated by task 267: [ 20.866644] kasan_save_stack+0x3c/0x68 [ 20.866684] kasan_save_track+0x20/0x40 [ 20.866724] kasan_save_alloc_info+0x40/0x58 [ 20.866763] __kasan_kmalloc+0xd4/0xd8 [ 20.866800] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.866839] kasan_atomics+0xb8/0x2e0 [ 20.866886] kunit_try_run_case+0x170/0x3f0 [ 20.866925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.866973] kthread+0x328/0x630 [ 20.867010] ret_from_fork+0x10/0x20 [ 20.867048] [ 20.867068] The buggy address belongs to the object at fff00000c7a67680 [ 20.867068] which belongs to the cache kmalloc-64 of size 64 [ 20.867131] The buggy address is located 0 bytes to the right of [ 20.867131] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.867204] [ 20.867249] The buggy address belongs to the physical page: [ 20.867592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.867662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.867817] page_type: f5(slab) [ 20.867878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.868019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.868181] page dumped because: kasan: bad access detected [ 20.868347] [ 20.868436] Memory state around the buggy address: [ 20.868578] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.868644] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.868804] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.868878] ^ [ 20.868913] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.868962] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.869003] ================================================================== [ 20.834095] ================================================================== [ 20.834210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 20.834264] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.834316] [ 20.834437] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.834577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.834623] Hardware name: linux,dummy-virt (DT) [ 20.835018] Call trace: [ 20.835085] show_stack+0x20/0x38 (C) [ 20.835219] dump_stack_lvl+0x8c/0xd0 [ 20.835370] print_report+0x118/0x608 [ 20.835435] kasan_report+0xdc/0x128 [ 20.835509] kasan_check_range+0x100/0x1a8 [ 20.835628] __kasan_check_write+0x20/0x30 [ 20.835695] kasan_atomics_helper+0x126c/0x4858 [ 20.835750] kasan_atomics+0x198/0x2e0 [ 20.835802] kunit_try_run_case+0x170/0x3f0 [ 20.835864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.835928] kthread+0x328/0x630 [ 20.836005] ret_from_fork+0x10/0x20 [ 20.836065] [ 20.836087] Allocated by task 267: [ 20.836117] kasan_save_stack+0x3c/0x68 [ 20.836185] kasan_save_track+0x20/0x40 [ 20.836224] kasan_save_alloc_info+0x40/0x58 [ 20.836266] __kasan_kmalloc+0xd4/0xd8 [ 20.836617] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.836731] kasan_atomics+0xb8/0x2e0 [ 20.836847] kunit_try_run_case+0x170/0x3f0 [ 20.836980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.837214] kthread+0x328/0x630 [ 20.837331] ret_from_fork+0x10/0x20 [ 20.837375] [ 20.837399] The buggy address belongs to the object at fff00000c7a67680 [ 20.837399] which belongs to the cache kmalloc-64 of size 64 [ 20.837538] The buggy address is located 0 bytes to the right of [ 20.837538] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.837627] [ 20.837725] The buggy address belongs to the physical page: [ 20.837800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.837976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.838160] page_type: f5(slab) [ 20.838261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.838317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.838363] page dumped because: kasan: bad access detected [ 20.838704] [ 20.838770] Memory state around the buggy address: [ 20.838892] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.839037] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.839293] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.839363] ^ [ 20.839616] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.839778] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.839821] ================================================================== [ 20.793650] ================================================================== [ 20.794129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 20.794209] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.794262] [ 20.794296] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.794472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.794506] Hardware name: linux,dummy-virt (DT) [ 20.794540] Call trace: [ 20.794565] show_stack+0x20/0x38 (C) [ 20.794661] dump_stack_lvl+0x8c/0xd0 [ 20.794735] print_report+0x118/0x608 [ 20.794782] kasan_report+0xdc/0x128 [ 20.794838] kasan_check_range+0x100/0x1a8 [ 20.794898] __kasan_check_write+0x20/0x30 [ 20.794948] kasan_atomics_helper+0xff0/0x4858 [ 20.795012] kasan_atomics+0x198/0x2e0 [ 20.795064] kunit_try_run_case+0x170/0x3f0 [ 20.795116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.795179] kthread+0x328/0x630 [ 20.795225] ret_from_fork+0x10/0x20 [ 20.795275] [ 20.795304] Allocated by task 267: [ 20.795334] kasan_save_stack+0x3c/0x68 [ 20.795375] kasan_save_track+0x20/0x40 [ 20.795412] kasan_save_alloc_info+0x40/0x58 [ 20.795453] __kasan_kmalloc+0xd4/0xd8 [ 20.795489] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.795531] kasan_atomics+0xb8/0x2e0 [ 20.795575] kunit_try_run_case+0x170/0x3f0 [ 20.795616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.795663] kthread+0x328/0x630 [ 20.795710] ret_from_fork+0x10/0x20 [ 20.795749] [ 20.795771] The buggy address belongs to the object at fff00000c7a67680 [ 20.795771] which belongs to the cache kmalloc-64 of size 64 [ 20.795831] The buggy address is located 0 bytes to the right of [ 20.795831] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.796555] [ 20.796601] The buggy address belongs to the physical page: [ 20.796653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.796953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.797026] page_type: f5(slab) [ 20.797069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.797403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.797743] page dumped because: kasan: bad access detected [ 20.797786] [ 20.797831] Memory state around the buggy address: [ 20.798177] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.798397] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.798592] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.798747] ^ [ 20.798792] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.798840] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.799174] ================================================================== [ 20.840435] ================================================================== [ 20.840484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 20.840532] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.840584] [ 20.840614] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.840698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.840755] Hardware name: linux,dummy-virt (DT) [ 20.840789] Call trace: [ 20.840839] show_stack+0x20/0x38 (C) [ 20.840906] dump_stack_lvl+0x8c/0xd0 [ 20.840991] print_report+0x118/0x608 [ 20.841084] kasan_report+0xdc/0x128 [ 20.841159] kasan_check_range+0x100/0x1a8 [ 20.841460] __kasan_check_write+0x20/0x30 [ 20.841531] kasan_atomics_helper+0x12d8/0x4858 [ 20.841831] kasan_atomics+0x198/0x2e0 [ 20.842020] kunit_try_run_case+0x170/0x3f0 [ 20.842072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.842128] kthread+0x328/0x630 [ 20.842199] ret_from_fork+0x10/0x20 [ 20.842605] [ 20.842632] Allocated by task 267: [ 20.842680] kasan_save_stack+0x3c/0x68 [ 20.842742] kasan_save_track+0x20/0x40 [ 20.842893] kasan_save_alloc_info+0x40/0x58 [ 20.842983] __kasan_kmalloc+0xd4/0xd8 [ 20.843024] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.843064] kasan_atomics+0xb8/0x2e0 [ 20.843142] kunit_try_run_case+0x170/0x3f0 [ 20.843306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.843391] kthread+0x328/0x630 [ 20.843525] ret_from_fork+0x10/0x20 [ 20.843592] [ 20.843670] The buggy address belongs to the object at fff00000c7a67680 [ 20.843670] which belongs to the cache kmalloc-64 of size 64 [ 20.843821] The buggy address is located 0 bytes to the right of [ 20.843821] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.843901] [ 20.843924] The buggy address belongs to the physical page: [ 20.843958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.844077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.844149] page_type: f5(slab) [ 20.844189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.844247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.844293] page dumped because: kasan: bad access detected [ 20.844347] [ 20.844368] Memory state around the buggy address: [ 20.844402] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.844450] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.844496] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.844539] ^ [ 20.844655] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.844700] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.844743] ================================================================== [ 20.874949] ================================================================== [ 20.875010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 20.875060] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.875257] [ 20.875345] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.875488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.875646] Hardware name: linux,dummy-virt (DT) [ 20.875682] Call trace: [ 20.875707] show_stack+0x20/0x38 (C) [ 20.875759] dump_stack_lvl+0x8c/0xd0 [ 20.876517] print_report+0x118/0x608 [ 20.876578] kasan_report+0xdc/0x128 [ 20.876625] kasan_check_range+0x100/0x1a8 [ 20.876674] __kasan_check_write+0x20/0x30 [ 20.876722] kasan_atomics_helper+0x15b4/0x4858 [ 20.876772] kasan_atomics+0x198/0x2e0 [ 20.876817] kunit_try_run_case+0x170/0x3f0 [ 20.876878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.876934] kthread+0x328/0x630 [ 20.876980] ret_from_fork+0x10/0x20 [ 20.877030] [ 20.877050] Allocated by task 267: [ 20.877081] kasan_save_stack+0x3c/0x68 [ 20.877121] kasan_save_track+0x20/0x40 [ 20.877160] kasan_save_alloc_info+0x40/0x58 [ 20.877199] __kasan_kmalloc+0xd4/0xd8 [ 20.877237] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.877276] kasan_atomics+0xb8/0x2e0 [ 20.877313] kunit_try_run_case+0x170/0x3f0 [ 20.877353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.877400] kthread+0x328/0x630 [ 20.877437] ret_from_fork+0x10/0x20 [ 20.877476] [ 20.877496] The buggy address belongs to the object at fff00000c7a67680 [ 20.877496] which belongs to the cache kmalloc-64 of size 64 [ 20.877558] The buggy address is located 0 bytes to the right of [ 20.877558] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.877626] [ 20.877647] The buggy address belongs to the physical page: [ 20.877680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.877734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.877784] page_type: f5(slab) [ 20.877824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.877946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.878013] page dumped because: kasan: bad access detected [ 20.878061] [ 20.878099] Memory state around the buggy address: [ 20.878132] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.878235] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.878322] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.878373] ^ [ 20.878579] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.878683] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.878808] ================================================================== [ 20.861059] ================================================================== [ 20.861113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 20.861161] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.861214] [ 20.861411] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.861614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.861689] Hardware name: linux,dummy-virt (DT) [ 20.861793] Call trace: [ 20.861818] show_stack+0x20/0x38 (C) [ 20.861912] dump_stack_lvl+0x8c/0xd0 [ 20.862007] print_report+0x118/0x608 [ 20.862082] kasan_report+0xdc/0x128 [ 20.862163] kasan_check_range+0x100/0x1a8 [ 20.862229] __kasan_check_write+0x20/0x30 [ 20.862301] kasan_atomics_helper+0x147c/0x4858 [ 20.862376] kasan_atomics+0x198/0x2e0 [ 20.862432] kunit_try_run_case+0x170/0x3f0 [ 20.862482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.862537] kthread+0x328/0x630 [ 20.862584] ret_from_fork+0x10/0x20 [ 20.862979] [ 20.863026] Allocated by task 267: [ 20.863060] kasan_save_stack+0x3c/0x68 [ 20.863172] kasan_save_track+0x20/0x40 [ 20.863248] kasan_save_alloc_info+0x40/0x58 [ 20.863289] __kasan_kmalloc+0xd4/0xd8 [ 20.863327] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.863366] kasan_atomics+0xb8/0x2e0 [ 20.863404] kunit_try_run_case+0x170/0x3f0 [ 20.863465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.863554] kthread+0x328/0x630 [ 20.863596] ret_from_fork+0x10/0x20 [ 20.863636] [ 20.863657] The buggy address belongs to the object at fff00000c7a67680 [ 20.863657] which belongs to the cache kmalloc-64 of size 64 [ 20.863775] The buggy address is located 0 bytes to the right of [ 20.863775] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.863924] [ 20.864003] The buggy address belongs to the physical page: [ 20.864066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.864121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.864236] page_type: f5(slab) [ 20.864372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.864477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.864524] page dumped because: kasan: bad access detected [ 20.864559] [ 20.864752] Memory state around the buggy address: [ 20.864787] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.864835] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.864895] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.865039] ^ [ 20.865169] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.865289] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.865347] ================================================================== [ 20.749598] ================================================================== [ 20.749654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.749803] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.749873] [ 20.750155] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.750270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.750385] Hardware name: linux,dummy-virt (DT) [ 20.750441] Call trace: [ 20.750467] show_stack+0x20/0x38 (C) [ 20.750583] dump_stack_lvl+0x8c/0xd0 [ 20.750659] print_report+0x118/0x608 [ 20.750771] kasan_report+0xdc/0x128 [ 20.750822] __asan_report_load8_noabort+0x20/0x30 [ 20.750885] kasan_atomics_helper+0x3f58/0x4858 [ 20.751291] kasan_atomics+0x198/0x2e0 [ 20.751413] kunit_try_run_case+0x170/0x3f0 [ 20.751477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.751652] kthread+0x328/0x630 [ 20.751715] ret_from_fork+0x10/0x20 [ 20.751847] [ 20.751882] Allocated by task 267: [ 20.751990] kasan_save_stack+0x3c/0x68 [ 20.752160] kasan_save_track+0x20/0x40 [ 20.752340] kasan_save_alloc_info+0x40/0x58 [ 20.752414] __kasan_kmalloc+0xd4/0xd8 [ 20.752452] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.752522] kasan_atomics+0xb8/0x2e0 [ 20.752560] kunit_try_run_case+0x170/0x3f0 [ 20.752602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.752649] kthread+0x328/0x630 [ 20.752688] ret_from_fork+0x10/0x20 [ 20.752741] [ 20.752769] The buggy address belongs to the object at fff00000c7a67680 [ 20.752769] which belongs to the cache kmalloc-64 of size 64 [ 20.752838] The buggy address is located 0 bytes to the right of [ 20.752838] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.752930] [ 20.752969] The buggy address belongs to the physical page: [ 20.753019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.753075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.753126] page_type: f5(slab) [ 20.753180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.753237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.753283] page dumped because: kasan: bad access detected [ 20.753326] [ 20.753345] Memory state around the buggy address: [ 20.753378] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.753436] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.753482] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.753525] ^ [ 20.753561] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.753616] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.753669] ================================================================== [ 20.913252] ================================================================== [ 20.913332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 20.913387] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.913439] [ 20.913524] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.913634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.913691] Hardware name: linux,dummy-virt (DT) [ 20.913725] Call trace: [ 20.913776] show_stack+0x20/0x38 (C) [ 20.913824] dump_stack_lvl+0x8c/0xd0 [ 20.913943] print_report+0x118/0x608 [ 20.913990] kasan_report+0xdc/0x128 [ 20.914038] kasan_check_range+0x100/0x1a8 [ 20.914086] __kasan_check_write+0x20/0x30 [ 20.914134] kasan_atomics_helper+0x17ec/0x4858 [ 20.914182] kasan_atomics+0x198/0x2e0 [ 20.914226] kunit_try_run_case+0x170/0x3f0 [ 20.914415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.914531] kthread+0x328/0x630 [ 20.914617] ret_from_fork+0x10/0x20 [ 20.914731] [ 20.914760] Allocated by task 267: [ 20.914947] kasan_save_stack+0x3c/0x68 [ 20.914994] kasan_save_track+0x20/0x40 [ 20.915057] kasan_save_alloc_info+0x40/0x58 [ 20.915291] __kasan_kmalloc+0xd4/0xd8 [ 20.915396] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.915578] kasan_atomics+0xb8/0x2e0 [ 20.915616] kunit_try_run_case+0x170/0x3f0 [ 20.915711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.915824] kthread+0x328/0x630 [ 20.915909] ret_from_fork+0x10/0x20 [ 20.916008] [ 20.916068] The buggy address belongs to the object at fff00000c7a67680 [ 20.916068] which belongs to the cache kmalloc-64 of size 64 [ 20.916137] The buggy address is located 0 bytes to the right of [ 20.916137] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.916211] [ 20.916235] The buggy address belongs to the physical page: [ 20.916267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.916506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.916557] page_type: f5(slab) [ 20.916596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.916937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.917172] page dumped because: kasan: bad access detected [ 20.917437] [ 20.917483] Memory state around the buggy address: [ 20.917682] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.917747] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.917928] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.918046] ^ [ 20.918125] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.918172] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.918215] ================================================================== [ 20.800436] ================================================================== [ 20.800558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 20.800651] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.800761] [ 20.800840] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.800951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.801257] Hardware name: linux,dummy-virt (DT) [ 20.801314] Call trace: [ 20.801340] show_stack+0x20/0x38 (C) [ 20.801394] dump_stack_lvl+0x8c/0xd0 [ 20.801708] print_report+0x118/0x608 [ 20.801788] kasan_report+0xdc/0x128 [ 20.801931] kasan_check_range+0x100/0x1a8 [ 20.802005] __kasan_check_write+0x20/0x30 [ 20.802129] kasan_atomics_helper+0x1058/0x4858 [ 20.802192] kasan_atomics+0x198/0x2e0 [ 20.802240] kunit_try_run_case+0x170/0x3f0 [ 20.802597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.802687] kthread+0x328/0x630 [ 20.803000] ret_from_fork+0x10/0x20 [ 20.803080] [ 20.803167] Allocated by task 267: [ 20.803228] kasan_save_stack+0x3c/0x68 [ 20.803271] kasan_save_track+0x20/0x40 [ 20.803372] kasan_save_alloc_info+0x40/0x58 [ 20.803416] __kasan_kmalloc+0xd4/0xd8 [ 20.803471] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.803518] kasan_atomics+0xb8/0x2e0 [ 20.803557] kunit_try_run_case+0x170/0x3f0 [ 20.803616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.803913] kthread+0x328/0x630 [ 20.803999] ret_from_fork+0x10/0x20 [ 20.804339] [ 20.804388] The buggy address belongs to the object at fff00000c7a67680 [ 20.804388] which belongs to the cache kmalloc-64 of size 64 [ 20.804540] The buggy address is located 0 bytes to the right of [ 20.804540] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.804634] [ 20.805037] The buggy address belongs to the physical page: [ 20.805115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.805520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.805681] page_type: f5(slab) [ 20.805738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.806197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.806484] page dumped because: kasan: bad access detected [ 20.807104] [ 20.807236] Memory state around the buggy address: [ 20.807324] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.807401] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.807746] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.808157] ^ [ 20.808237] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.808310] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.808465] ================================================================== [ 20.755257] ================================================================== [ 20.755410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 20.755518] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.755839] [ 20.755941] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.756032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.756294] Hardware name: linux,dummy-virt (DT) [ 20.756378] Call trace: [ 20.756427] show_stack+0x20/0x38 (C) [ 20.756707] dump_stack_lvl+0x8c/0xd0 [ 20.756799] print_report+0x118/0x608 [ 20.756990] kasan_report+0xdc/0x128 [ 20.757112] kasan_check_range+0x100/0x1a8 [ 20.757202] __kasan_check_write+0x20/0x30 [ 20.757377] kasan_atomics_helper+0xe44/0x4858 [ 20.757430] kasan_atomics+0x198/0x2e0 [ 20.757713] kunit_try_run_case+0x170/0x3f0 [ 20.757893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.758102] kthread+0x328/0x630 [ 20.758290] ret_from_fork+0x10/0x20 [ 20.758418] [ 20.758489] Allocated by task 267: [ 20.758569] kasan_save_stack+0x3c/0x68 [ 20.758742] kasan_save_track+0x20/0x40 [ 20.758804] kasan_save_alloc_info+0x40/0x58 [ 20.759102] __kasan_kmalloc+0xd4/0xd8 [ 20.759191] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.759474] kasan_atomics+0xb8/0x2e0 [ 20.759563] kunit_try_run_case+0x170/0x3f0 [ 20.759624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.759792] kthread+0x328/0x630 [ 20.759960] ret_from_fork+0x10/0x20 [ 20.760069] [ 20.760163] The buggy address belongs to the object at fff00000c7a67680 [ 20.760163] which belongs to the cache kmalloc-64 of size 64 [ 20.760276] The buggy address is located 0 bytes to the right of [ 20.760276] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.760438] [ 20.760474] The buggy address belongs to the physical page: [ 20.760507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.761020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.761118] page_type: f5(slab) [ 20.761447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.761575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.761634] page dumped because: kasan: bad access detected [ 20.761670] [ 20.761690] Memory state around the buggy address: [ 20.762120] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.762484] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.762550] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.762593] ^ [ 20.762657] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.762870] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.763037] ================================================================== [ 20.823129] ================================================================== [ 20.823332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.823439] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.823592] [ 20.823640] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.823730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.824431] Hardware name: linux,dummy-virt (DT) [ 20.824613] Call trace: [ 20.824670] show_stack+0x20/0x38 (C) [ 20.824789] dump_stack_lvl+0x8c/0xd0 [ 20.824994] print_report+0x118/0x608 [ 20.825085] kasan_report+0xdc/0x128 [ 20.825144] kasan_check_range+0x100/0x1a8 [ 20.825193] __kasan_check_write+0x20/0x30 [ 20.825243] kasan_atomics_helper+0x1190/0x4858 [ 20.825292] kasan_atomics+0x198/0x2e0 [ 20.825338] kunit_try_run_case+0x170/0x3f0 [ 20.826056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.826130] kthread+0x328/0x630 [ 20.826180] ret_from_fork+0x10/0x20 [ 20.826231] [ 20.826252] Allocated by task 267: [ 20.826283] kasan_save_stack+0x3c/0x68 [ 20.826324] kasan_save_track+0x20/0x40 [ 20.826363] kasan_save_alloc_info+0x40/0x58 [ 20.826402] __kasan_kmalloc+0xd4/0xd8 [ 20.826440] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.826479] kasan_atomics+0xb8/0x2e0 [ 20.826516] kunit_try_run_case+0x170/0x3f0 [ 20.826556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.826604] kthread+0x328/0x630 [ 20.826641] ret_from_fork+0x10/0x20 [ 20.826677] [ 20.826699] The buggy address belongs to the object at fff00000c7a67680 [ 20.826699] which belongs to the cache kmalloc-64 of size 64 [ 20.826760] The buggy address is located 0 bytes to the right of [ 20.826760] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.826828] [ 20.826851] The buggy address belongs to the physical page: [ 20.826896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.826951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.827001] page_type: f5(slab) [ 20.827042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.827099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.827151] page dumped because: kasan: bad access detected [ 20.827186] [ 20.827262] Memory state around the buggy address: [ 20.827433] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.827494] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.827541] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.827584] ^ [ 20.827689] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.827736] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.827809] ================================================================== [ 20.769952] ================================================================== [ 20.770229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.770305] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.770421] [ 20.770481] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.770600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.770634] Hardware name: linux,dummy-virt (DT) [ 20.770668] Call trace: [ 20.770691] show_stack+0x20/0x38 (C) [ 20.770756] dump_stack_lvl+0x8c/0xd0 [ 20.770919] print_report+0x118/0x608 [ 20.770982] kasan_report+0xdc/0x128 [ 20.771156] kasan_check_range+0x100/0x1a8 [ 20.771339] __kasan_check_write+0x20/0x30 [ 20.771506] kasan_atomics_helper+0xeb8/0x4858 [ 20.771617] kasan_atomics+0x198/0x2e0 [ 20.771669] kunit_try_run_case+0x170/0x3f0 [ 20.771768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.771829] kthread+0x328/0x630 [ 20.771946] ret_from_fork+0x10/0x20 [ 20.772147] [ 20.772178] Allocated by task 267: [ 20.772210] kasan_save_stack+0x3c/0x68 [ 20.772253] kasan_save_track+0x20/0x40 [ 20.772300] kasan_save_alloc_info+0x40/0x58 [ 20.772632] __kasan_kmalloc+0xd4/0xd8 [ 20.772718] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.772978] kasan_atomics+0xb8/0x2e0 [ 20.773037] kunit_try_run_case+0x170/0x3f0 [ 20.773392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.773487] kthread+0x328/0x630 [ 20.773909] ret_from_fork+0x10/0x20 [ 20.774253] [ 20.774353] The buggy address belongs to the object at fff00000c7a67680 [ 20.774353] which belongs to the cache kmalloc-64 of size 64 [ 20.774478] The buggy address is located 0 bytes to the right of [ 20.774478] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.774665] [ 20.774818] The buggy address belongs to the physical page: [ 20.774979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.775039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.775329] page_type: f5(slab) [ 20.775420] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.775759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.775863] page dumped because: kasan: bad access detected [ 20.775927] [ 20.775948] Memory state around the buggy address: [ 20.775983] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.776038] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.776087] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.776239] ^ [ 20.776484] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.776552] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.776597] ================================================================== [ 20.764696] ================================================================== [ 20.764750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 20.764885] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.764968] [ 20.765070] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.765176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.765206] Hardware name: linux,dummy-virt (DT) [ 20.765240] Call trace: [ 20.765264] show_stack+0x20/0x38 (C) [ 20.765569] dump_stack_lvl+0x8c/0xd0 [ 20.765648] print_report+0x118/0x608 [ 20.765821] kasan_report+0xdc/0x128 [ 20.765895] __asan_report_store8_noabort+0x20/0x30 [ 20.765948] kasan_atomics_helper+0x3e5c/0x4858 [ 20.765998] kasan_atomics+0x198/0x2e0 [ 20.766045] kunit_try_run_case+0x170/0x3f0 [ 20.766097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.766154] kthread+0x328/0x630 [ 20.766204] ret_from_fork+0x10/0x20 [ 20.766255] [ 20.766293] Allocated by task 267: [ 20.766332] kasan_save_stack+0x3c/0x68 [ 20.766383] kasan_save_track+0x20/0x40 [ 20.766421] kasan_save_alloc_info+0x40/0x58 [ 20.766468] __kasan_kmalloc+0xd4/0xd8 [ 20.766515] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.766554] kasan_atomics+0xb8/0x2e0 [ 20.766591] kunit_try_run_case+0x170/0x3f0 [ 20.766632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.766683] kthread+0x328/0x630 [ 20.766729] ret_from_fork+0x10/0x20 [ 20.766768] [ 20.766790] The buggy address belongs to the object at fff00000c7a67680 [ 20.766790] which belongs to the cache kmalloc-64 of size 64 [ 20.766861] The buggy address is located 0 bytes to the right of [ 20.766861] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.766929] [ 20.766950] The buggy address belongs to the physical page: [ 20.766982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.767038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.767547] page_type: f5(slab) [ 20.767608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.767675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.768031] page dumped because: kasan: bad access detected [ 20.768083] [ 20.768103] Memory state around the buggy address: [ 20.768358] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.768424] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.768731] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.769039] ^ [ 20.769114] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.769283] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.769375] ================================================================== [ 20.813194] ================================================================== [ 20.813579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.813668] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.813808] [ 20.813840] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.813939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.813970] Hardware name: linux,dummy-virt (DT) [ 20.814003] Call trace: [ 20.814028] show_stack+0x20/0x38 (C) [ 20.814080] dump_stack_lvl+0x8c/0xd0 [ 20.814372] print_report+0x118/0x608 [ 20.814612] kasan_report+0xdc/0x128 [ 20.814821] kasan_check_range+0x100/0x1a8 [ 20.814953] __kasan_check_write+0x20/0x30 [ 20.815006] kasan_atomics_helper+0x1128/0x4858 [ 20.815057] kasan_atomics+0x198/0x2e0 [ 20.815387] kunit_try_run_case+0x170/0x3f0 [ 20.815485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.815552] kthread+0x328/0x630 [ 20.815895] ret_from_fork+0x10/0x20 [ 20.816127] [ 20.816198] Allocated by task 267: [ 20.816364] kasan_save_stack+0x3c/0x68 [ 20.816421] kasan_save_track+0x20/0x40 [ 20.816465] kasan_save_alloc_info+0x40/0x58 [ 20.816507] __kasan_kmalloc+0xd4/0xd8 [ 20.816543] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.816586] kasan_atomics+0xb8/0x2e0 [ 20.816622] kunit_try_run_case+0x170/0x3f0 [ 20.816993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.817471] kthread+0x328/0x630 [ 20.817602] ret_from_fork+0x10/0x20 [ 20.817801] [ 20.817981] The buggy address belongs to the object at fff00000c7a67680 [ 20.817981] which belongs to the cache kmalloc-64 of size 64 [ 20.818045] The buggy address is located 0 bytes to the right of [ 20.818045] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.818308] [ 20.818410] The buggy address belongs to the physical page: [ 20.818550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.818903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.818971] page_type: f5(slab) [ 20.819013] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.819725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.819805] page dumped because: kasan: bad access detected [ 20.819962] [ 20.820030] Memory state around the buggy address: [ 20.820232] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.820459] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.820532] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.820698] ^ [ 20.820787] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.821106] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.821188] ================================================================== [ 20.655762] ================================================================== [ 20.655816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.655880] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.655935] [ 20.655987] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.656077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.656108] Hardware name: linux,dummy-virt (DT) [ 20.656142] Call trace: [ 20.656167] show_stack+0x20/0x38 (C) [ 20.656217] dump_stack_lvl+0x8c/0xd0 [ 20.656265] print_report+0x118/0x608 [ 20.656313] kasan_report+0xdc/0x128 [ 20.656359] kasan_check_range+0x100/0x1a8 [ 20.656408] __kasan_check_write+0x20/0x30 [ 20.656456] kasan_atomics_helper+0xa6c/0x4858 [ 20.656505] kasan_atomics+0x198/0x2e0 [ 20.656551] kunit_try_run_case+0x170/0x3f0 [ 20.656601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.656667] kthread+0x328/0x630 [ 20.656725] ret_from_fork+0x10/0x20 [ 20.656775] [ 20.656804] Allocated by task 267: [ 20.656835] kasan_save_stack+0x3c/0x68 [ 20.657531] kasan_save_track+0x20/0x40 [ 20.657603] kasan_save_alloc_info+0x40/0x58 [ 20.657692] __kasan_kmalloc+0xd4/0xd8 [ 20.657801] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.658014] kasan_atomics+0xb8/0x2e0 [ 20.658057] kunit_try_run_case+0x170/0x3f0 [ 20.658121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.658435] kthread+0x328/0x630 [ 20.658592] ret_from_fork+0x10/0x20 [ 20.658707] [ 20.658762] The buggy address belongs to the object at fff00000c7a67680 [ 20.658762] which belongs to the cache kmalloc-64 of size 64 [ 20.658941] The buggy address is located 0 bytes to the right of [ 20.658941] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.659060] [ 20.659136] The buggy address belongs to the physical page: [ 20.659182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.659273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.659643] page_type: f5(slab) [ 20.659761] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.659924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.659981] page dumped because: kasan: bad access detected [ 20.660017] [ 20.660181] Memory state around the buggy address: [ 20.660222] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.660286] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.660425] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.660472] ^ [ 20.660918] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.661024] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.661356] ================================================================== [ 20.845786] ================================================================== [ 20.845841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 20.845910] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.845962] [ 20.845994] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.846224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.846272] Hardware name: linux,dummy-virt (DT) [ 20.846307] Call trace: [ 20.846330] show_stack+0x20/0x38 (C) [ 20.846382] dump_stack_lvl+0x8c/0xd0 [ 20.846475] print_report+0x118/0x608 [ 20.846558] kasan_report+0xdc/0x128 [ 20.846606] kasan_check_range+0x100/0x1a8 [ 20.846653] __kasan_check_write+0x20/0x30 [ 20.846702] kasan_atomics_helper+0x1384/0x4858 [ 20.846749] kasan_atomics+0x198/0x2e0 [ 20.846794] kunit_try_run_case+0x170/0x3f0 [ 20.846844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.846912] kthread+0x328/0x630 [ 20.847026] ret_from_fork+0x10/0x20 [ 20.847081] [ 20.847162] Allocated by task 267: [ 20.847241] kasan_save_stack+0x3c/0x68 [ 20.847325] kasan_save_track+0x20/0x40 [ 20.847383] kasan_save_alloc_info+0x40/0x58 [ 20.847435] __kasan_kmalloc+0xd4/0xd8 [ 20.847541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.847582] kasan_atomics+0xb8/0x2e0 [ 20.847622] kunit_try_run_case+0x170/0x3f0 [ 20.847665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.847710] kthread+0x328/0x630 [ 20.847747] ret_from_fork+0x10/0x20 [ 20.847786] [ 20.847809] The buggy address belongs to the object at fff00000c7a67680 [ 20.847809] which belongs to the cache kmalloc-64 of size 64 [ 20.847973] The buggy address is located 0 bytes to the right of [ 20.847973] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.848065] [ 20.848086] The buggy address belongs to the physical page: [ 20.848303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.848426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.848481] page_type: f5(slab) [ 20.848522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.849314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.849623] page dumped because: kasan: bad access detected [ 20.849709] [ 20.849733] Memory state around the buggy address: [ 20.849769] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.850032] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.850173] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.850231] ^ [ 20.850265] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.850323] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.850366] ================================================================== [ 20.809103] ================================================================== [ 20.809155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 20.809613] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.809753] [ 20.809785] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.809884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.809914] Hardware name: linux,dummy-virt (DT) [ 20.809947] Call trace: [ 20.809972] show_stack+0x20/0x38 (C) [ 20.810025] dump_stack_lvl+0x8c/0xd0 [ 20.810092] print_report+0x118/0x608 [ 20.810140] kasan_report+0xdc/0x128 [ 20.810185] kasan_check_range+0x100/0x1a8 [ 20.810243] __kasan_check_write+0x20/0x30 [ 20.810298] kasan_atomics_helper+0x10c0/0x4858 [ 20.810348] kasan_atomics+0x198/0x2e0 [ 20.810395] kunit_try_run_case+0x170/0x3f0 [ 20.810444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.810499] kthread+0x328/0x630 [ 20.810551] ret_from_fork+0x10/0x20 [ 20.810610] [ 20.810638] Allocated by task 267: [ 20.810674] kasan_save_stack+0x3c/0x68 [ 20.810714] kasan_save_track+0x20/0x40 [ 20.810762] kasan_save_alloc_info+0x40/0x58 [ 20.810803] __kasan_kmalloc+0xd4/0xd8 [ 20.810840] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.810888] kasan_atomics+0xb8/0x2e0 [ 20.810926] kunit_try_run_case+0x170/0x3f0 [ 20.810966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.811011] kthread+0x328/0x630 [ 20.811055] ret_from_fork+0x10/0x20 [ 20.811102] [ 20.811123] The buggy address belongs to the object at fff00000c7a67680 [ 20.811123] which belongs to the cache kmalloc-64 of size 64 [ 20.811190] The buggy address is located 0 bytes to the right of [ 20.811190] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.811258] [ 20.811287] The buggy address belongs to the physical page: [ 20.811319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.811372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.811421] page_type: f5(slab) [ 20.811461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.811517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.811563] page dumped because: kasan: bad access detected [ 20.811598] [ 20.811619] Memory state around the buggy address: [ 20.811652] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.811698] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.811745] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.811789] ^ [ 20.811822] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.812340] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.812820] ================================================================== [ 20.709381] ================================================================== [ 20.711171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 20.711981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.712720] kasan_check_range+0x100/0x1a8 [ 20.713402] kthread+0x328/0x630 [ 20.714063] [ 20.714084] The buggy address belongs to the object at fff00000c7a67680 [ 20.714084] which belongs to the cache kmalloc-64 of size 64 [ 20.714154] The buggy address is located 0 bytes to the right of [ 20.714154] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.714222] [ 20.714265] The buggy address belongs to the physical page: [ 20.714299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.714354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.714414] page_type: f5(slab) [ 20.714453] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.714509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.714555] page dumped because: kasan: bad access detected [ 20.714599] [ 20.714641] Memory state around the buggy address: [ 20.714673] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.714729] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.714773] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.714832] ^ [ 20.714877] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.715443] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.715848] ================================================================== [ 20.856211] ================================================================== [ 20.856264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 20.856315] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.856368] [ 20.856399] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.856484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.856513] Hardware name: linux,dummy-virt (DT) [ 20.856546] Call trace: [ 20.856590] show_stack+0x20/0x38 (C) [ 20.856642] dump_stack_lvl+0x8c/0xd0 [ 20.856693] print_report+0x118/0x608 [ 20.856738] kasan_report+0xdc/0x128 [ 20.856785] kasan_check_range+0x100/0x1a8 [ 20.856840] __kasan_check_write+0x20/0x30 [ 20.856909] kasan_atomics_helper+0x1414/0x4858 [ 20.856958] kasan_atomics+0x198/0x2e0 [ 20.857004] kunit_try_run_case+0x170/0x3f0 [ 20.857080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.857303] kthread+0x328/0x630 [ 20.857409] ret_from_fork+0x10/0x20 [ 20.857573] [ 20.857601] Allocated by task 267: [ 20.857646] kasan_save_stack+0x3c/0x68 [ 20.857689] kasan_save_track+0x20/0x40 [ 20.857726] kasan_save_alloc_info+0x40/0x58 [ 20.857767] __kasan_kmalloc+0xd4/0xd8 [ 20.857826] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.857879] kasan_atomics+0xb8/0x2e0 [ 20.858030] kunit_try_run_case+0x170/0x3f0 [ 20.858123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.858198] kthread+0x328/0x630 [ 20.858254] ret_from_fork+0x10/0x20 [ 20.858308] [ 20.858365] The buggy address belongs to the object at fff00000c7a67680 [ 20.858365] which belongs to the cache kmalloc-64 of size 64 [ 20.858521] The buggy address is located 0 bytes to the right of [ 20.858521] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.858591] [ 20.858786] The buggy address belongs to the physical page: [ 20.858825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.858894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.858945] page_type: f5(slab) [ 20.858985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.859222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.859323] page dumped because: kasan: bad access detected [ 20.859398] [ 20.859426] Memory state around the buggy address: [ 20.859463] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.859511] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.859716] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.859881] ^ [ 20.859993] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.860140] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.860245] ================================================================== [ 20.726151] ================================================================== [ 20.726211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.726266] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.726593] [ 20.726664] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.726946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.727176] Hardware name: linux,dummy-virt (DT) [ 20.727305] Call trace: [ 20.727335] show_stack+0x20/0x38 (C) [ 20.727390] dump_stack_lvl+0x8c/0xd0 [ 20.727444] print_report+0x118/0x608 [ 20.727708] kasan_report+0xdc/0x128 [ 20.727785] kasan_check_range+0x100/0x1a8 [ 20.727964] __kasan_check_write+0x20/0x30 [ 20.728148] kasan_atomics_helper+0xd3c/0x4858 [ 20.728282] kasan_atomics+0x198/0x2e0 [ 20.728413] kunit_try_run_case+0x170/0x3f0 [ 20.728548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.728673] kthread+0x328/0x630 [ 20.728831] ret_from_fork+0x10/0x20 [ 20.729187] [ 20.729270] Allocated by task 267: [ 20.729825] kasan_save_stack+0x3c/0x68 [ 20.729907] kasan_save_track+0x20/0x40 [ 20.730242] kasan_save_alloc_info+0x40/0x58 [ 20.730397] __kasan_kmalloc+0xd4/0xd8 [ 20.730458] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.730758] kasan_atomics+0xb8/0x2e0 [ 20.730885] kunit_try_run_case+0x170/0x3f0 [ 20.731044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.731123] kthread+0x328/0x630 [ 20.731169] ret_from_fork+0x10/0x20 [ 20.731208] [ 20.731231] The buggy address belongs to the object at fff00000c7a67680 [ 20.731231] which belongs to the cache kmalloc-64 of size 64 [ 20.731303] The buggy address is located 0 bytes to the right of [ 20.731303] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.731382] [ 20.731418] The buggy address belongs to the physical page: [ 20.731458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.731527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.731589] page_type: f5(slab) [ 20.731631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.731696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.731749] page dumped because: kasan: bad access detected [ 20.731794] [ 20.731814] Memory state around the buggy address: [ 20.731849] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.731906] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.731953] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.731997] ^ [ 20.732040] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.732105] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.732169] ================================================================== [ 20.638755] ================================================================== [ 20.639085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.639181] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.639341] [ 20.639424] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.639728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.639810] Hardware name: linux,dummy-virt (DT) [ 20.639846] Call trace: [ 20.640214] show_stack+0x20/0x38 (C) [ 20.640389] dump_stack_lvl+0x8c/0xd0 [ 20.640533] print_report+0x118/0x608 [ 20.640584] kasan_report+0xdc/0x128 [ 20.640632] kasan_check_range+0x100/0x1a8 [ 20.641088] __kasan_check_write+0x20/0x30 [ 20.641229] kasan_atomics_helper+0x99c/0x4858 [ 20.641499] kasan_atomics+0x198/0x2e0 [ 20.642208] ret_from_fork+0x10/0x20 [ 20.642379] [ 20.642848] kasan_save_track+0x20/0x40 [ 20.644324] [ 20.644545] The buggy address is located 0 bytes to the right of [ 20.644545] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.645105] page dumped because: kasan: bad access detected [ 20.645275] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.646786] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267 [ 20.648392] kasan_atomics+0x198/0x2e0 [ 20.649407] [ 20.649474] Allocated by task 267: [ 20.649552] kasan_save_stack+0x3c/0x68 [ 20.649597] kasan_save_track+0x20/0x40 [ 20.649905] kasan_save_alloc_info+0x40/0x58 [ 20.649996] __kasan_kmalloc+0xd4/0xd8 [ 20.650133] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.650228] kasan_atomics+0xb8/0x2e0 [ 20.650506] kunit_try_run_case+0x170/0x3f0 [ 20.650594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.650809] kthread+0x328/0x630 [ 20.650851] ret_from_fork+0x10/0x20 [ 20.651179] [ 20.651231] The buggy address belongs to the object at fff00000c7a67680 [ 20.651231] which belongs to the cache kmalloc-64 of size 64 [ 20.651331] The buggy address is located 0 bytes to the right of [ 20.651331] allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0) [ 20.651807] [ 20.651907] The buggy address belongs to the physical page: [ 20.651964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67 [ 20.652102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.652325] page_type: f5(slab) [ 20.652433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.652768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.652937] page dumped because: kasan: bad access detected [ 20.653107] [ 20.653247] Memory state around the buggy address: [ 20.653586] fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.653663] fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.653845] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.653988] ^ [ 20.654144] fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.654237] fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.654551] ==================================================================
[ 13.335959] ================================================================== [ 13.336300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.336651] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.337309] [ 13.337427] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.337476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.337490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.337513] Call Trace: [ 13.337532] <TASK> [ 13.337553] dump_stack_lvl+0x73/0xb0 [ 13.337581] print_report+0xd1/0x650 [ 13.337605] ? __virt_addr_valid+0x1db/0x2d0 [ 13.337628] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.337650] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.337674] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.337697] kasan_report+0x141/0x180 [ 13.337720] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.337748] __asan_report_load4_noabort+0x18/0x20 [ 13.337770] kasan_atomics_helper+0x4b88/0x5450 [ 13.337794] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.337817] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.337840] ? kasan_atomics+0x152/0x310 [ 13.337864] kasan_atomics+0x1dc/0x310 [ 13.337884] ? __pfx_kasan_atomics+0x10/0x10 [ 13.337905] ? __pfx_read_tsc+0x10/0x10 [ 13.337939] ? ktime_get_ts64+0x86/0x230 [ 13.337965] kunit_try_run_case+0x1a5/0x480 [ 13.337991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.338014] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.338040] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.338064] ? __kthread_parkme+0x82/0x180 [ 13.338087] ? preempt_count_sub+0x50/0x80 [ 13.338113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.338138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.338161] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.338186] kthread+0x337/0x6f0 [ 13.338204] ? trace_preempt_on+0x20/0xc0 [ 13.338229] ? __pfx_kthread+0x10/0x10 [ 13.338248] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.338270] ? calculate_sigpending+0x7b/0xa0 [ 13.338293] ? __pfx_kthread+0x10/0x10 [ 13.338312] ret_from_fork+0x41/0x80 [ 13.338333] ? __pfx_kthread+0x10/0x10 [ 13.338351] ret_from_fork_asm+0x1a/0x30 [ 13.338383] </TASK> [ 13.338395] [ 13.346126] Allocated by task 284: [ 13.346293] kasan_save_stack+0x45/0x70 [ 13.346438] kasan_save_track+0x18/0x40 [ 13.346570] kasan_save_alloc_info+0x3b/0x50 [ 13.346710] __kasan_kmalloc+0xb7/0xc0 [ 13.346892] __kmalloc_cache_noprof+0x189/0x420 [ 13.347110] kasan_atomics+0x95/0x310 [ 13.347293] kunit_try_run_case+0x1a5/0x480 [ 13.347494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.347923] kthread+0x337/0x6f0 [ 13.348051] ret_from_fork+0x41/0x80 [ 13.348179] ret_from_fork_asm+0x1a/0x30 [ 13.348320] [ 13.348391] The buggy address belongs to the object at ffff888102a0bf80 [ 13.348391] which belongs to the cache kmalloc-64 of size 64 [ 13.349280] The buggy address is located 0 bytes to the right of [ 13.349280] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.349869] [ 13.349988] The buggy address belongs to the physical page: [ 13.350240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.350622] flags: 0x200000000000000(node=0|zone=2) [ 13.350841] page_type: f5(slab) [ 13.350978] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.351257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.351616] page dumped because: kasan: bad access detected [ 13.351932] [ 13.352050] Memory state around the buggy address: [ 13.352287] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.352666] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.353052] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.353367] ^ [ 13.353586] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.353903] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.354195] ================================================================== [ 13.739806] ================================================================== [ 13.740118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 13.740444] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.740902] [ 13.741006] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.741054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.741067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.741100] Call Trace: [ 13.741119] <TASK> [ 13.741138] dump_stack_lvl+0x73/0xb0 [ 13.741175] print_report+0xd1/0x650 [ 13.741198] ? __virt_addr_valid+0x1db/0x2d0 [ 13.741221] ? kasan_atomics_helper+0xde0/0x5450 [ 13.741245] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.741269] ? kasan_atomics_helper+0xde0/0x5450 [ 13.741301] kasan_report+0x141/0x180 [ 13.741325] ? kasan_atomics_helper+0xde0/0x5450 [ 13.741363] kasan_check_range+0x10c/0x1c0 [ 13.741384] __kasan_check_write+0x18/0x20 [ 13.741404] kasan_atomics_helper+0xde0/0x5450 [ 13.741428] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.741460] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.741482] ? kasan_atomics+0x152/0x310 [ 13.741507] kasan_atomics+0x1dc/0x310 [ 13.741538] ? __pfx_kasan_atomics+0x10/0x10 [ 13.741559] ? __pfx_read_tsc+0x10/0x10 [ 13.741580] ? ktime_get_ts64+0x86/0x230 [ 13.741606] kunit_try_run_case+0x1a5/0x480 [ 13.741640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.741663] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.741688] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.741723] ? __kthread_parkme+0x82/0x180 [ 13.741746] ? preempt_count_sub+0x50/0x80 [ 13.741772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.741805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.741829] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.741853] kthread+0x337/0x6f0 [ 13.741881] ? trace_preempt_on+0x20/0xc0 [ 13.741905] ? __pfx_kthread+0x10/0x10 [ 13.741933] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.741956] ? calculate_sigpending+0x7b/0xa0 [ 13.741986] ? __pfx_kthread+0x10/0x10 [ 13.742005] ret_from_fork+0x41/0x80 [ 13.742028] ? __pfx_kthread+0x10/0x10 [ 13.742058] ret_from_fork_asm+0x1a/0x30 [ 13.742090] </TASK> [ 13.742100] [ 13.750013] Allocated by task 284: [ 13.750178] kasan_save_stack+0x45/0x70 [ 13.750324] kasan_save_track+0x18/0x40 [ 13.750459] kasan_save_alloc_info+0x3b/0x50 [ 13.750604] __kasan_kmalloc+0xb7/0xc0 [ 13.750735] __kmalloc_cache_noprof+0x189/0x420 [ 13.750888] kasan_atomics+0x95/0x310 [ 13.751153] kunit_try_run_case+0x1a5/0x480 [ 13.751373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.751692] kthread+0x337/0x6f0 [ 13.751858] ret_from_fork+0x41/0x80 [ 13.752043] ret_from_fork_asm+0x1a/0x30 [ 13.752183] [ 13.752259] The buggy address belongs to the object at ffff888102a0bf80 [ 13.752259] which belongs to the cache kmalloc-64 of size 64 [ 13.752614] The buggy address is located 0 bytes to the right of [ 13.752614] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.753685] [ 13.753783] The buggy address belongs to the physical page: [ 13.754069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.754428] flags: 0x200000000000000(node=0|zone=2) [ 13.754681] page_type: f5(slab) [ 13.754886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.755221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.755448] page dumped because: kasan: bad access detected [ 13.755635] [ 13.755727] Memory state around the buggy address: [ 13.755984] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.756492] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.756775] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.757104] ^ [ 13.757330] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.757713] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.758009] ================================================================== [ 13.682429] ================================================================== [ 13.683070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 13.683361] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.683715] [ 13.683817] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.683862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.683875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.683896] Call Trace: [ 13.683913] <TASK> [ 13.683941] dump_stack_lvl+0x73/0xb0 [ 13.683965] print_report+0xd1/0x650 [ 13.683987] ? __virt_addr_valid+0x1db/0x2d0 [ 13.684022] ? kasan_atomics_helper+0xc70/0x5450 [ 13.684043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.684066] ? kasan_atomics_helper+0xc70/0x5450 [ 13.684089] kasan_report+0x141/0x180 [ 13.684113] ? kasan_atomics_helper+0xc70/0x5450 [ 13.684140] kasan_check_range+0x10c/0x1c0 [ 13.684161] __kasan_check_write+0x18/0x20 [ 13.684191] kasan_atomics_helper+0xc70/0x5450 [ 13.684215] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.684238] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.684275] ? kasan_atomics+0x152/0x310 [ 13.684300] kasan_atomics+0x1dc/0x310 [ 13.684319] ? __pfx_kasan_atomics+0x10/0x10 [ 13.684341] ? __pfx_read_tsc+0x10/0x10 [ 13.684361] ? ktime_get_ts64+0x86/0x230 [ 13.684388] kunit_try_run_case+0x1a5/0x480 [ 13.684413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.684435] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.684460] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.684484] ? __kthread_parkme+0x82/0x180 [ 13.684507] ? preempt_count_sub+0x50/0x80 [ 13.684543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.684574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.684609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.684633] kthread+0x337/0x6f0 [ 13.684650] ? trace_preempt_on+0x20/0xc0 [ 13.684674] ? __pfx_kthread+0x10/0x10 [ 13.684693] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.684716] ? calculate_sigpending+0x7b/0xa0 [ 13.684738] ? __pfx_kthread+0x10/0x10 [ 13.684757] ret_from_fork+0x41/0x80 [ 13.684778] ? __pfx_kthread+0x10/0x10 [ 13.684797] ret_from_fork_asm+0x1a/0x30 [ 13.684828] </TASK> [ 13.684839] [ 13.692421] Allocated by task 284: [ 13.692566] kasan_save_stack+0x45/0x70 [ 13.692727] kasan_save_track+0x18/0x40 [ 13.692964] kasan_save_alloc_info+0x3b/0x50 [ 13.693171] __kasan_kmalloc+0xb7/0xc0 [ 13.693358] __kmalloc_cache_noprof+0x189/0x420 [ 13.693570] kasan_atomics+0x95/0x310 [ 13.693700] kunit_try_run_case+0x1a5/0x480 [ 13.693850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.694088] kthread+0x337/0x6f0 [ 13.694254] ret_from_fork+0x41/0x80 [ 13.694613] ret_from_fork_asm+0x1a/0x30 [ 13.694786] [ 13.694861] The buggy address belongs to the object at ffff888102a0bf80 [ 13.694861] which belongs to the cache kmalloc-64 of size 64 [ 13.695320] The buggy address is located 0 bytes to the right of [ 13.695320] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.695687] [ 13.695782] The buggy address belongs to the physical page: [ 13.696047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.696427] flags: 0x200000000000000(node=0|zone=2) [ 13.696791] page_type: f5(slab) [ 13.696974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.697314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.697717] page dumped because: kasan: bad access detected [ 13.697942] [ 13.698011] Memory state around the buggy address: [ 13.698169] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.698386] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.698861] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.699216] ^ [ 13.699458] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.699773] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.700072] ================================================================== [ 13.880331] ================================================================== [ 13.880661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 13.880900] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.881258] [ 13.881376] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.881433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.881446] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.881470] Call Trace: [ 13.881502] <TASK> [ 13.881523] dump_stack_lvl+0x73/0xb0 [ 13.881550] print_report+0xd1/0x650 [ 13.881575] ? __virt_addr_valid+0x1db/0x2d0 [ 13.881598] ? kasan_atomics_helper+0x1148/0x5450 [ 13.881620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.881643] ? kasan_atomics_helper+0x1148/0x5450 [ 13.881666] kasan_report+0x141/0x180 [ 13.881689] ? kasan_atomics_helper+0x1148/0x5450 [ 13.881716] kasan_check_range+0x10c/0x1c0 [ 13.881737] __kasan_check_write+0x18/0x20 [ 13.881757] kasan_atomics_helper+0x1148/0x5450 [ 13.881782] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.881805] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.881828] ? kasan_atomics+0x152/0x310 [ 13.881852] kasan_atomics+0x1dc/0x310 [ 13.881873] ? __pfx_kasan_atomics+0x10/0x10 [ 13.881894] ? __pfx_read_tsc+0x10/0x10 [ 13.881935] ? ktime_get_ts64+0x86/0x230 [ 13.881963] kunit_try_run_case+0x1a5/0x480 [ 13.881989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.882022] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.882048] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.882073] ? __kthread_parkme+0x82/0x180 [ 13.882096] ? preempt_count_sub+0x50/0x80 [ 13.882122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.882145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.882170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.882194] kthread+0x337/0x6f0 [ 13.882212] ? trace_preempt_on+0x20/0xc0 [ 13.882236] ? __pfx_kthread+0x10/0x10 [ 13.882258] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.882280] ? calculate_sigpending+0x7b/0xa0 [ 13.882302] ? __pfx_kthread+0x10/0x10 [ 13.882322] ret_from_fork+0x41/0x80 [ 13.882343] ? __pfx_kthread+0x10/0x10 [ 13.882361] ret_from_fork_asm+0x1a/0x30 [ 13.882394] </TASK> [ 13.882406] [ 13.890116] Allocated by task 284: [ 13.890267] kasan_save_stack+0x45/0x70 [ 13.890418] kasan_save_track+0x18/0x40 [ 13.890555] kasan_save_alloc_info+0x3b/0x50 [ 13.890967] __kasan_kmalloc+0xb7/0xc0 [ 13.891159] __kmalloc_cache_noprof+0x189/0x420 [ 13.891399] kasan_atomics+0x95/0x310 [ 13.891592] kunit_try_run_case+0x1a5/0x480 [ 13.891809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.892068] kthread+0x337/0x6f0 [ 13.892196] ret_from_fork+0x41/0x80 [ 13.892346] ret_from_fork_asm+0x1a/0x30 [ 13.892547] [ 13.892680] The buggy address belongs to the object at ffff888102a0bf80 [ 13.892680] which belongs to the cache kmalloc-64 of size 64 [ 13.893223] The buggy address is located 0 bytes to the right of [ 13.893223] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.893747] [ 13.893869] The buggy address belongs to the physical page: [ 13.894100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.894434] flags: 0x200000000000000(node=0|zone=2) [ 13.894705] page_type: f5(slab) [ 13.894875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.895224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.895539] page dumped because: kasan: bad access detected [ 13.895766] [ 13.895873] Memory state around the buggy address: [ 13.896105] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.896358] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.896579] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.896930] ^ [ 13.897152] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.897452] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.897887] ================================================================== [ 14.254602] ================================================================== [ 14.254855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.255849] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.256180] [ 14.256284] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.256333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.256346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.256370] Call Trace: [ 14.256391] <TASK> [ 14.256411] dump_stack_lvl+0x73/0xb0 [ 14.256439] print_report+0xd1/0x650 [ 14.256465] ? __virt_addr_valid+0x1db/0x2d0 [ 14.256487] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.256511] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.256535] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.256557] kasan_report+0x141/0x180 [ 14.256581] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.256609] kasan_check_range+0x10c/0x1c0 [ 14.256629] __kasan_check_write+0x18/0x20 [ 14.256660] kasan_atomics_helper+0x19e3/0x5450 [ 14.256684] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.256707] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.256729] ? kasan_atomics+0x152/0x310 [ 14.256754] kasan_atomics+0x1dc/0x310 [ 14.256774] ? __pfx_kasan_atomics+0x10/0x10 [ 14.256794] ? __pfx_read_tsc+0x10/0x10 [ 14.256816] ? ktime_get_ts64+0x86/0x230 [ 14.256842] kunit_try_run_case+0x1a5/0x480 [ 14.256868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.256890] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.256927] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.256951] ? __kthread_parkme+0x82/0x180 [ 14.256974] ? preempt_count_sub+0x50/0x80 [ 14.257000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.257024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.257048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.257071] kthread+0x337/0x6f0 [ 14.257089] ? trace_preempt_on+0x20/0xc0 [ 14.257112] ? __pfx_kthread+0x10/0x10 [ 14.257131] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.257153] ? calculate_sigpending+0x7b/0xa0 [ 14.257176] ? __pfx_kthread+0x10/0x10 [ 14.257194] ret_from_fork+0x41/0x80 [ 14.257215] ? __pfx_kthread+0x10/0x10 [ 14.257233] ret_from_fork_asm+0x1a/0x30 [ 14.257265] </TASK> [ 14.257276] [ 14.264701] Allocated by task 284: [ 14.264892] kasan_save_stack+0x45/0x70 [ 14.265111] kasan_save_track+0x18/0x40 [ 14.265303] kasan_save_alloc_info+0x3b/0x50 [ 14.265511] __kasan_kmalloc+0xb7/0xc0 [ 14.265860] __kmalloc_cache_noprof+0x189/0x420 [ 14.266029] kasan_atomics+0x95/0x310 [ 14.266162] kunit_try_run_case+0x1a5/0x480 [ 14.266311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.266553] kthread+0x337/0x6f0 [ 14.266719] ret_from_fork+0x41/0x80 [ 14.266902] ret_from_fork_asm+0x1a/0x30 [ 14.267108] [ 14.267208] The buggy address belongs to the object at ffff888102a0bf80 [ 14.267208] which belongs to the cache kmalloc-64 of size 64 [ 14.267693] The buggy address is located 0 bytes to the right of [ 14.267693] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.268074] [ 14.268149] The buggy address belongs to the physical page: [ 14.268389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.268741] flags: 0x200000000000000(node=0|zone=2) [ 14.269102] page_type: f5(slab) [ 14.269328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.269660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.269890] page dumped because: kasan: bad access detected [ 14.270071] [ 14.270140] Memory state around the buggy address: [ 14.270468] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.271082] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.271403] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.271724] ^ [ 14.271932] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.272149] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.272448] ================================================================== [ 13.434010] ================================================================== [ 13.434379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 13.434930] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.435266] [ 13.435355] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.435401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.435414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.435437] Call Trace: [ 13.435456] <TASK> [ 13.435473] dump_stack_lvl+0x73/0xb0 [ 13.435498] print_report+0xd1/0x650 [ 13.435522] ? __virt_addr_valid+0x1db/0x2d0 [ 13.435545] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.435567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.435590] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.435613] kasan_report+0x141/0x180 [ 13.435637] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.435664] __asan_report_store4_noabort+0x1b/0x30 [ 13.435687] kasan_atomics_helper+0x4b3a/0x5450 [ 13.435712] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.435737] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.435764] ? kasan_atomics+0x152/0x310 [ 13.435790] kasan_atomics+0x1dc/0x310 [ 13.435809] ? __pfx_kasan_atomics+0x10/0x10 [ 13.435832] ? __pfx_read_tsc+0x10/0x10 [ 13.435852] ? ktime_get_ts64+0x86/0x230 [ 13.435879] kunit_try_run_case+0x1a5/0x480 [ 13.435905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.435941] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.435967] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.435991] ? __kthread_parkme+0x82/0x180 [ 13.436014] ? preempt_count_sub+0x50/0x80 [ 13.436041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.436078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.436102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.436127] kthread+0x337/0x6f0 [ 13.436144] ? trace_preempt_on+0x20/0xc0 [ 13.436169] ? __pfx_kthread+0x10/0x10 [ 13.436188] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.436210] ? calculate_sigpending+0x7b/0xa0 [ 13.436232] ? __pfx_kthread+0x10/0x10 [ 13.436258] ret_from_fork+0x41/0x80 [ 13.436279] ? __pfx_kthread+0x10/0x10 [ 13.436298] ret_from_fork_asm+0x1a/0x30 [ 13.436331] </TASK> [ 13.436343] [ 13.443996] Allocated by task 284: [ 13.444188] kasan_save_stack+0x45/0x70 [ 13.444349] kasan_save_track+0x18/0x40 [ 13.444487] kasan_save_alloc_info+0x3b/0x50 [ 13.444674] __kasan_kmalloc+0xb7/0xc0 [ 13.444862] __kmalloc_cache_noprof+0x189/0x420 [ 13.445099] kasan_atomics+0x95/0x310 [ 13.445326] kunit_try_run_case+0x1a5/0x480 [ 13.445552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.445733] kthread+0x337/0x6f0 [ 13.445852] ret_from_fork+0x41/0x80 [ 13.445994] ret_from_fork_asm+0x1a/0x30 [ 13.446137] [ 13.446208] The buggy address belongs to the object at ffff888102a0bf80 [ 13.446208] which belongs to the cache kmalloc-64 of size 64 [ 13.446563] The buggy address is located 0 bytes to the right of [ 13.446563] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.446937] [ 13.447034] The buggy address belongs to the physical page: [ 13.447286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.447636] flags: 0x200000000000000(node=0|zone=2) [ 13.447886] page_type: f5(slab) [ 13.448066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.448409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.448985] page dumped because: kasan: bad access detected [ 13.449234] [ 13.449330] Memory state around the buggy address: [ 13.449554] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.450072] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.450287] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.450498] ^ [ 13.450651] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.450863] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.451515] ================================================================== [ 13.980213] ================================================================== [ 13.980562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 13.980993] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.981296] [ 13.981410] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.981457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.981470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.981492] Call Trace: [ 13.981523] <TASK> [ 13.981542] dump_stack_lvl+0x73/0xb0 [ 13.981568] print_report+0xd1/0x650 [ 13.981604] ? __virt_addr_valid+0x1db/0x2d0 [ 13.981626] ? kasan_atomics_helper+0x49ce/0x5450 [ 13.981648] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.981685] ? kasan_atomics_helper+0x49ce/0x5450 [ 13.981707] kasan_report+0x141/0x180 [ 13.981731] ? kasan_atomics_helper+0x49ce/0x5450 [ 13.981769] __asan_report_load4_noabort+0x18/0x20 [ 13.981790] kasan_atomics_helper+0x49ce/0x5450 [ 13.981814] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.981837] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.981860] ? kasan_atomics+0x152/0x310 [ 13.981883] kasan_atomics+0x1dc/0x310 [ 13.981903] ? __pfx_kasan_atomics+0x10/0x10 [ 13.981934] ? __pfx_read_tsc+0x10/0x10 [ 13.981955] ? ktime_get_ts64+0x86/0x230 [ 13.981982] kunit_try_run_case+0x1a5/0x480 [ 13.982007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.982030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.982054] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.982079] ? __kthread_parkme+0x82/0x180 [ 13.982101] ? preempt_count_sub+0x50/0x80 [ 13.982127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.982151] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.982175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.982198] kthread+0x337/0x6f0 [ 13.982216] ? trace_preempt_on+0x20/0xc0 [ 13.982240] ? __pfx_kthread+0x10/0x10 [ 13.982258] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.982280] ? calculate_sigpending+0x7b/0xa0 [ 13.982304] ? __pfx_kthread+0x10/0x10 [ 13.982323] ret_from_fork+0x41/0x80 [ 13.982353] ? __pfx_kthread+0x10/0x10 [ 13.982372] ret_from_fork_asm+0x1a/0x30 [ 13.982406] </TASK> [ 13.982427] [ 13.991721] Allocated by task 284: [ 13.992045] kasan_save_stack+0x45/0x70 [ 13.992339] kasan_save_track+0x18/0x40 [ 13.992645] kasan_save_alloc_info+0x3b/0x50 [ 13.992949] __kasan_kmalloc+0xb7/0xc0 [ 13.993102] __kmalloc_cache_noprof+0x189/0x420 [ 13.993433] kasan_atomics+0x95/0x310 [ 13.993745] kunit_try_run_case+0x1a5/0x480 [ 13.993927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.994304] kthread+0x337/0x6f0 [ 13.994580] ret_from_fork+0x41/0x80 [ 13.994821] ret_from_fork_asm+0x1a/0x30 [ 13.995058] [ 13.995146] The buggy address belongs to the object at ffff888102a0bf80 [ 13.995146] which belongs to the cache kmalloc-64 of size 64 [ 13.995928] The buggy address is located 0 bytes to the right of [ 13.995928] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.996575] [ 13.996674] The buggy address belongs to the physical page: [ 13.997004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.997433] flags: 0x200000000000000(node=0|zone=2) [ 13.997791] page_type: f5(slab) [ 13.997988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.998437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.998857] page dumped because: kasan: bad access detected [ 13.999184] [ 13.999272] Memory state around the buggy address: [ 13.999551] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.999879] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.000211] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.000507] ^ [ 14.000962] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.001249] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.001730] ================================================================== [ 14.350598] ================================================================== [ 14.351294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 14.351894] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.352489] [ 14.352628] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.352676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.352690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.352714] Call Trace: [ 14.352736] <TASK> [ 14.352769] dump_stack_lvl+0x73/0xb0 [ 14.352797] print_report+0xd1/0x650 [ 14.352834] ? __virt_addr_valid+0x1db/0x2d0 [ 14.352858] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.352880] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.352904] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.352936] kasan_report+0x141/0x180 [ 14.352959] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.352987] __asan_report_load8_noabort+0x18/0x20 [ 14.353009] kasan_atomics_helper+0x4f30/0x5450 [ 14.353033] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.353056] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.353078] ? kasan_atomics+0x152/0x310 [ 14.353103] kasan_atomics+0x1dc/0x310 [ 14.353122] ? __pfx_kasan_atomics+0x10/0x10 [ 14.353143] ? __pfx_read_tsc+0x10/0x10 [ 14.353165] ? ktime_get_ts64+0x86/0x230 [ 14.353191] kunit_try_run_case+0x1a5/0x480 [ 14.353217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.353240] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.353265] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.353289] ? __kthread_parkme+0x82/0x180 [ 14.353312] ? preempt_count_sub+0x50/0x80 [ 14.353338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.353362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.353386] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.353411] kthread+0x337/0x6f0 [ 14.353428] ? trace_preempt_on+0x20/0xc0 [ 14.353453] ? __pfx_kthread+0x10/0x10 [ 14.353472] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.353494] ? calculate_sigpending+0x7b/0xa0 [ 14.353516] ? __pfx_kthread+0x10/0x10 [ 14.353535] ret_from_fork+0x41/0x80 [ 14.353575] ? __pfx_kthread+0x10/0x10 [ 14.353594] ret_from_fork_asm+0x1a/0x30 [ 14.353625] </TASK> [ 14.353637] [ 14.365647] Allocated by task 284: [ 14.366010] kasan_save_stack+0x45/0x70 [ 14.366397] kasan_save_track+0x18/0x40 [ 14.366775] kasan_save_alloc_info+0x3b/0x50 [ 14.367032] __kasan_kmalloc+0xb7/0xc0 [ 14.367167] __kmalloc_cache_noprof+0x189/0x420 [ 14.367321] kasan_atomics+0x95/0x310 [ 14.367451] kunit_try_run_case+0x1a5/0x480 [ 14.367705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.368191] kthread+0x337/0x6f0 [ 14.368502] ret_from_fork+0x41/0x80 [ 14.368871] ret_from_fork_asm+0x1a/0x30 [ 14.369242] [ 14.369410] The buggy address belongs to the object at ffff888102a0bf80 [ 14.369410] which belongs to the cache kmalloc-64 of size 64 [ 14.370483] The buggy address is located 0 bytes to the right of [ 14.370483] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.371037] [ 14.371114] The buggy address belongs to the physical page: [ 14.371289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.371531] flags: 0x200000000000000(node=0|zone=2) [ 14.372056] page_type: f5(slab) [ 14.372372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.372737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.373382] page dumped because: kasan: bad access detected [ 14.373789] [ 14.373861] Memory state around the buggy address: [ 14.374029] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.374248] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.374464] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.374977] ^ [ 14.375407] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.376044] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.376676] ================================================================== [ 13.940427] ================================================================== [ 13.941521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 13.942407] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.942861] [ 13.942983] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.943044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.943057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.943080] Call Trace: [ 13.943111] <TASK> [ 13.943131] dump_stack_lvl+0x73/0xb0 [ 13.943158] print_report+0xd1/0x650 [ 13.943182] ? __virt_addr_valid+0x1db/0x2d0 [ 13.943205] ? kasan_atomics_helper+0x49e8/0x5450 [ 13.943228] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.943250] ? kasan_atomics_helper+0x49e8/0x5450 [ 13.943273] kasan_report+0x141/0x180 [ 13.943297] ? kasan_atomics_helper+0x49e8/0x5450 [ 13.943324] __asan_report_load4_noabort+0x18/0x20 [ 13.943348] kasan_atomics_helper+0x49e8/0x5450 [ 13.943382] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.943405] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.943428] ? kasan_atomics+0x152/0x310 [ 13.943463] kasan_atomics+0x1dc/0x310 [ 13.943483] ? __pfx_kasan_atomics+0x10/0x10 [ 13.943504] ? __pfx_read_tsc+0x10/0x10 [ 13.943525] ? ktime_get_ts64+0x86/0x230 [ 13.943551] kunit_try_run_case+0x1a5/0x480 [ 13.943577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.943599] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.943632] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.943656] ? __kthread_parkme+0x82/0x180 [ 13.943679] ? preempt_count_sub+0x50/0x80 [ 13.943705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.943729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.943753] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.943776] kthread+0x337/0x6f0 [ 13.943794] ? trace_preempt_on+0x20/0xc0 [ 13.943819] ? __pfx_kthread+0x10/0x10 [ 13.943837] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.943859] ? calculate_sigpending+0x7b/0xa0 [ 13.943881] ? __pfx_kthread+0x10/0x10 [ 13.943901] ret_from_fork+0x41/0x80 [ 13.943932] ? __pfx_kthread+0x10/0x10 [ 13.943950] ret_from_fork_asm+0x1a/0x30 [ 13.943982] </TASK> [ 13.943994] [ 13.952332] Allocated by task 284: [ 13.952477] kasan_save_stack+0x45/0x70 [ 13.952629] kasan_save_track+0x18/0x40 [ 13.952806] kasan_save_alloc_info+0x3b/0x50 [ 13.953046] __kasan_kmalloc+0xb7/0xc0 [ 13.953269] __kmalloc_cache_noprof+0x189/0x420 [ 13.953500] kasan_atomics+0x95/0x310 [ 13.953797] kunit_try_run_case+0x1a5/0x480 [ 13.953954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.954128] kthread+0x337/0x6f0 [ 13.954305] ret_from_fork+0x41/0x80 [ 13.954491] ret_from_fork_asm+0x1a/0x30 [ 13.954853] [ 13.954978] The buggy address belongs to the object at ffff888102a0bf80 [ 13.954978] which belongs to the cache kmalloc-64 of size 64 [ 13.955498] The buggy address is located 0 bytes to the right of [ 13.955498] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.956066] [ 13.956142] The buggy address belongs to the physical page: [ 13.956401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.956814] flags: 0x200000000000000(node=0|zone=2) [ 13.957058] page_type: f5(slab) [ 13.957241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.957578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.957903] page dumped because: kasan: bad access detected [ 13.958157] [ 13.958254] Memory state around the buggy address: [ 13.958480] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.958847] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.959158] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.959419] ^ [ 13.959577] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.959790] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.960030] ================================================================== [ 13.795456] ================================================================== [ 13.796011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 13.796361] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.796687] [ 13.796813] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.796858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.796879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.796901] Call Trace: [ 13.796938] <TASK> [ 13.796958] dump_stack_lvl+0x73/0xb0 [ 13.796983] print_report+0xd1/0x650 [ 13.797018] ? __virt_addr_valid+0x1db/0x2d0 [ 13.797040] ? kasan_atomics_helper+0xfa9/0x5450 [ 13.797062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.797085] ? kasan_atomics_helper+0xfa9/0x5450 [ 13.797108] kasan_report+0x141/0x180 [ 13.797131] ? kasan_atomics_helper+0xfa9/0x5450 [ 13.797167] kasan_check_range+0x10c/0x1c0 [ 13.797188] __kasan_check_write+0x18/0x20 [ 13.797210] kasan_atomics_helper+0xfa9/0x5450 [ 13.797244] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.797267] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.797290] ? kasan_atomics+0x152/0x310 [ 13.797313] kasan_atomics+0x1dc/0x310 [ 13.797333] ? __pfx_kasan_atomics+0x10/0x10 [ 13.797355] ? __pfx_read_tsc+0x10/0x10 [ 13.797376] ? ktime_get_ts64+0x86/0x230 [ 13.797402] kunit_try_run_case+0x1a5/0x480 [ 13.797428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.797450] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.797475] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.797499] ? __kthread_parkme+0x82/0x180 [ 13.797522] ? preempt_count_sub+0x50/0x80 [ 13.797548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.797584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.797609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.797634] kthread+0x337/0x6f0 [ 13.797652] ? trace_preempt_on+0x20/0xc0 [ 13.797676] ? __pfx_kthread+0x10/0x10 [ 13.797695] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.797718] ? calculate_sigpending+0x7b/0xa0 [ 13.797741] ? __pfx_kthread+0x10/0x10 [ 13.797760] ret_from_fork+0x41/0x80 [ 13.797782] ? __pfx_kthread+0x10/0x10 [ 13.797800] ret_from_fork_asm+0x1a/0x30 [ 13.797831] </TASK> [ 13.797843] [ 13.805571] Allocated by task 284: [ 13.805760] kasan_save_stack+0x45/0x70 [ 13.805950] kasan_save_track+0x18/0x40 [ 13.806161] kasan_save_alloc_info+0x3b/0x50 [ 13.806351] __kasan_kmalloc+0xb7/0xc0 [ 13.806541] __kmalloc_cache_noprof+0x189/0x420 [ 13.806800] kasan_atomics+0x95/0x310 [ 13.806949] kunit_try_run_case+0x1a5/0x480 [ 13.807097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.807275] kthread+0x337/0x6f0 [ 13.807394] ret_from_fork+0x41/0x80 [ 13.807525] ret_from_fork_asm+0x1a/0x30 [ 13.807684] [ 13.807757] The buggy address belongs to the object at ffff888102a0bf80 [ 13.807757] which belongs to the cache kmalloc-64 of size 64 [ 13.808304] The buggy address is located 0 bytes to the right of [ 13.808304] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.808867] [ 13.808973] The buggy address belongs to the physical page: [ 13.809228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.809536] flags: 0x200000000000000(node=0|zone=2) [ 13.809744] page_type: f5(slab) [ 13.809896] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.810169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.810398] page dumped because: kasan: bad access detected [ 13.810591] [ 13.810661] Memory state around the buggy address: [ 13.810818] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.811150] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.811499] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.811868] ^ [ 13.812121] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.812469] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.812822] ================================================================== [ 14.194111] ================================================================== [ 14.194389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.194969] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.195249] [ 14.195379] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.195427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.195439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.195472] Call Trace: [ 14.195494] <TASK> [ 14.195514] dump_stack_lvl+0x73/0xb0 [ 14.195550] print_report+0xd1/0x650 [ 14.195585] ? __virt_addr_valid+0x1db/0x2d0 [ 14.195609] ? kasan_atomics_helper+0x1818/0x5450 [ 14.195631] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.195655] ? kasan_atomics_helper+0x1818/0x5450 [ 14.195687] kasan_report+0x141/0x180 [ 14.195710] ? kasan_atomics_helper+0x1818/0x5450 [ 14.195748] kasan_check_range+0x10c/0x1c0 [ 14.195770] __kasan_check_write+0x18/0x20 [ 14.195790] kasan_atomics_helper+0x1818/0x5450 [ 14.195813] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.195837] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.195859] ? kasan_atomics+0x152/0x310 [ 14.195883] kasan_atomics+0x1dc/0x310 [ 14.195903] ? __pfx_kasan_atomics+0x10/0x10 [ 14.195933] ? __pfx_read_tsc+0x10/0x10 [ 14.195954] ? ktime_get_ts64+0x86/0x230 [ 14.195981] kunit_try_run_case+0x1a5/0x480 [ 14.196007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.196030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.196055] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.196079] ? __kthread_parkme+0x82/0x180 [ 14.196102] ? preempt_count_sub+0x50/0x80 [ 14.196129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.196152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.196176] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.196199] kthread+0x337/0x6f0 [ 14.196216] ? trace_preempt_on+0x20/0xc0 [ 14.196241] ? __pfx_kthread+0x10/0x10 [ 14.196266] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.196289] ? calculate_sigpending+0x7b/0xa0 [ 14.196312] ? __pfx_kthread+0x10/0x10 [ 14.196340] ret_from_fork+0x41/0x80 [ 14.196361] ? __pfx_kthread+0x10/0x10 [ 14.196379] ret_from_fork_asm+0x1a/0x30 [ 14.196422] </TASK> [ 14.196433] [ 14.204157] Allocated by task 284: [ 14.204381] kasan_save_stack+0x45/0x70 [ 14.204610] kasan_save_track+0x18/0x40 [ 14.204843] kasan_save_alloc_info+0x3b/0x50 [ 14.205053] __kasan_kmalloc+0xb7/0xc0 [ 14.205210] __kmalloc_cache_noprof+0x189/0x420 [ 14.205385] kasan_atomics+0x95/0x310 [ 14.205578] kunit_try_run_case+0x1a5/0x480 [ 14.205797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.206028] kthread+0x337/0x6f0 [ 14.206217] ret_from_fork+0x41/0x80 [ 14.206367] ret_from_fork_asm+0x1a/0x30 [ 14.206507] [ 14.206594] The buggy address belongs to the object at ffff888102a0bf80 [ 14.206594] which belongs to the cache kmalloc-64 of size 64 [ 14.207151] The buggy address is located 0 bytes to the right of [ 14.207151] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.207760] [ 14.207852] The buggy address belongs to the physical page: [ 14.208118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.208458] flags: 0x200000000000000(node=0|zone=2) [ 14.208732] page_type: f5(slab) [ 14.208861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.209105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.209337] page dumped because: kasan: bad access detected [ 14.209508] [ 14.209583] Memory state around the buggy address: [ 14.209845] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.210267] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.210673] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.211004] ^ [ 14.211163] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.211379] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.211635] ================================================================== [ 14.469936] ================================================================== [ 14.470302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 14.470663] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.471106] [ 14.471253] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.471311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.471324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.471348] Call Trace: [ 14.471405] <TASK> [ 14.471426] dump_stack_lvl+0x73/0xb0 [ 14.471453] print_report+0xd1/0x650 [ 14.471488] ? __virt_addr_valid+0x1db/0x2d0 [ 14.471510] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.471533] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.471557] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.471580] kasan_report+0x141/0x180 [ 14.471630] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.471675] kasan_check_range+0x10c/0x1c0 [ 14.471707] __kasan_check_write+0x18/0x20 [ 14.471727] kasan_atomics_helper+0x1f43/0x5450 [ 14.471752] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.471775] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.471799] ? kasan_atomics+0x152/0x310 [ 14.471822] kasan_atomics+0x1dc/0x310 [ 14.471865] ? __pfx_kasan_atomics+0x10/0x10 [ 14.471887] ? __pfx_read_tsc+0x10/0x10 [ 14.471940] ? ktime_get_ts64+0x86/0x230 [ 14.471968] kunit_try_run_case+0x1a5/0x480 [ 14.472022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.472046] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.472071] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.472095] ? __kthread_parkme+0x82/0x180 [ 14.472119] ? preempt_count_sub+0x50/0x80 [ 14.472145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.472169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.472220] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.472251] kthread+0x337/0x6f0 [ 14.472308] ? trace_preempt_on+0x20/0xc0 [ 14.472346] ? __pfx_kthread+0x10/0x10 [ 14.472378] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.472422] ? calculate_sigpending+0x7b/0xa0 [ 14.472444] ? __pfx_kthread+0x10/0x10 [ 14.472463] ret_from_fork+0x41/0x80 [ 14.472494] ? __pfx_kthread+0x10/0x10 [ 14.472512] ret_from_fork_asm+0x1a/0x30 [ 14.472545] </TASK> [ 14.472556] [ 14.481340] Allocated by task 284: [ 14.481640] kasan_save_stack+0x45/0x70 [ 14.481809] kasan_save_track+0x18/0x40 [ 14.482012] kasan_save_alloc_info+0x3b/0x50 [ 14.482200] __kasan_kmalloc+0xb7/0xc0 [ 14.482333] __kmalloc_cache_noprof+0x189/0x420 [ 14.482481] kasan_atomics+0x95/0x310 [ 14.482723] kunit_try_run_case+0x1a5/0x480 [ 14.482964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.483215] kthread+0x337/0x6f0 [ 14.483388] ret_from_fork+0x41/0x80 [ 14.483602] ret_from_fork_asm+0x1a/0x30 [ 14.483841] [ 14.483953] The buggy address belongs to the object at ffff888102a0bf80 [ 14.483953] which belongs to the cache kmalloc-64 of size 64 [ 14.484546] The buggy address is located 0 bytes to the right of [ 14.484546] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.485126] [ 14.485224] The buggy address belongs to the physical page: [ 14.485473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.485884] flags: 0x200000000000000(node=0|zone=2) [ 14.486128] page_type: f5(slab) [ 14.486470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.486757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.486989] page dumped because: kasan: bad access detected [ 14.487154] [ 14.487221] Memory state around the buggy address: [ 14.487374] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.487692] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.488019] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.488460] ^ [ 14.488937] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.489358] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.489734] ================================================================== [ 13.274328] ================================================================== [ 13.275577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.276487] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.276735] [ 13.276832] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.276884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.276897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.276929] Call Trace: [ 13.276943] <TASK> [ 13.276964] dump_stack_lvl+0x73/0xb0 [ 13.276993] print_report+0xd1/0x650 [ 13.277017] ? __virt_addr_valid+0x1db/0x2d0 [ 13.277039] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.277062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.277088] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.277111] kasan_report+0x141/0x180 [ 13.277135] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.277162] __asan_report_load4_noabort+0x18/0x20 [ 13.277183] kasan_atomics_helper+0x4bbc/0x5450 [ 13.277206] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.277229] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.277251] ? kasan_atomics+0x152/0x310 [ 13.277275] kasan_atomics+0x1dc/0x310 [ 13.277294] ? __pfx_kasan_atomics+0x10/0x10 [ 13.277315] ? __pfx_read_tsc+0x10/0x10 [ 13.277335] ? ktime_get_ts64+0x86/0x230 [ 13.277360] kunit_try_run_case+0x1a5/0x480 [ 13.277386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.277408] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.277432] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.277455] ? __kthread_parkme+0x82/0x180 [ 13.277478] ? preempt_count_sub+0x50/0x80 [ 13.277503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.277527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.277550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.277573] kthread+0x337/0x6f0 [ 13.277590] ? trace_preempt_on+0x20/0xc0 [ 13.277614] ? __pfx_kthread+0x10/0x10 [ 13.277631] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.277653] ? calculate_sigpending+0x7b/0xa0 [ 13.277675] ? __pfx_kthread+0x10/0x10 [ 13.277693] ret_from_fork+0x41/0x80 [ 13.277714] ? __pfx_kthread+0x10/0x10 [ 13.277731] ret_from_fork_asm+0x1a/0x30 [ 13.277762] </TASK> [ 13.277773] [ 13.294584] Allocated by task 284: [ 13.295032] kasan_save_stack+0x45/0x70 [ 13.295487] kasan_save_track+0x18/0x40 [ 13.295989] kasan_save_alloc_info+0x3b/0x50 [ 13.296408] __kasan_kmalloc+0xb7/0xc0 [ 13.296846] __kmalloc_cache_noprof+0x189/0x420 [ 13.297369] kasan_atomics+0x95/0x310 [ 13.297813] kunit_try_run_case+0x1a5/0x480 [ 13.298318] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.298833] kthread+0x337/0x6f0 [ 13.299214] ret_from_fork+0x41/0x80 [ 13.299597] ret_from_fork_asm+0x1a/0x30 [ 13.300043] [ 13.300169] The buggy address belongs to the object at ffff888102a0bf80 [ 13.300169] which belongs to the cache kmalloc-64 of size 64 [ 13.301274] The buggy address is located 0 bytes to the right of [ 13.301274] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.302259] [ 13.302423] The buggy address belongs to the physical page: [ 13.302998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.303500] flags: 0x200000000000000(node=0|zone=2) [ 13.304064] page_type: f5(slab) [ 13.304253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.304476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.304701] page dumped because: kasan: bad access detected [ 13.304868] [ 13.304951] Memory state around the buggy address: [ 13.305189] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.305885] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.306114] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.306319] ^ [ 13.306470] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.307092] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.307955] ================================================================== [ 14.293104] ================================================================== [ 14.293845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 14.294479] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.295194] [ 14.295434] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.295484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.295497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.295521] Call Trace: [ 14.295541] <TASK> [ 14.295624] dump_stack_lvl+0x73/0xb0 [ 14.295653] print_report+0xd1/0x650 [ 14.295691] ? __virt_addr_valid+0x1db/0x2d0 [ 14.295714] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.295737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.295761] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.295783] kasan_report+0x141/0x180 [ 14.295806] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.295833] kasan_check_range+0x10c/0x1c0 [ 14.295854] __kasan_check_write+0x18/0x20 [ 14.295874] kasan_atomics_helper+0x1b22/0x5450 [ 14.295898] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.295929] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.295952] ? kasan_atomics+0x152/0x310 [ 14.295977] kasan_atomics+0x1dc/0x310 [ 14.295996] ? __pfx_kasan_atomics+0x10/0x10 [ 14.296017] ? __pfx_read_tsc+0x10/0x10 [ 14.296038] ? ktime_get_ts64+0x86/0x230 [ 14.296064] kunit_try_run_case+0x1a5/0x480 [ 14.296092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.296116] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.296141] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.296165] ? __kthread_parkme+0x82/0x180 [ 14.296189] ? preempt_count_sub+0x50/0x80 [ 14.296215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.296239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.296268] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.296292] kthread+0x337/0x6f0 [ 14.296309] ? trace_preempt_on+0x20/0xc0 [ 14.296334] ? __pfx_kthread+0x10/0x10 [ 14.296352] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.296375] ? calculate_sigpending+0x7b/0xa0 [ 14.296398] ? __pfx_kthread+0x10/0x10 [ 14.296417] ret_from_fork+0x41/0x80 [ 14.296438] ? __pfx_kthread+0x10/0x10 [ 14.296456] ret_from_fork_asm+0x1a/0x30 [ 14.296488] </TASK> [ 14.296500] [ 14.309074] Allocated by task 284: [ 14.309437] kasan_save_stack+0x45/0x70 [ 14.309846] kasan_save_track+0x18/0x40 [ 14.310225] kasan_save_alloc_info+0x3b/0x50 [ 14.310595] __kasan_kmalloc+0xb7/0xc0 [ 14.310731] __kmalloc_cache_noprof+0x189/0x420 [ 14.310885] kasan_atomics+0x95/0x310 [ 14.311026] kunit_try_run_case+0x1a5/0x480 [ 14.311174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.311350] kthread+0x337/0x6f0 [ 14.311471] ret_from_fork+0x41/0x80 [ 14.311760] ret_from_fork_asm+0x1a/0x30 [ 14.312135] [ 14.312300] The buggy address belongs to the object at ffff888102a0bf80 [ 14.312300] which belongs to the cache kmalloc-64 of size 64 [ 14.313357] The buggy address is located 0 bytes to the right of [ 14.313357] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.314440] [ 14.314640] The buggy address belongs to the physical page: [ 14.315142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.315843] flags: 0x200000000000000(node=0|zone=2) [ 14.316316] page_type: f5(slab) [ 14.316653] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.317302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.317860] page dumped because: kasan: bad access detected [ 14.318042] [ 14.318112] Memory state around the buggy address: [ 14.318270] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.318487] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.319072] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.319703] ^ [ 14.320133] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.320769] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.321375] ================================================================== [ 13.662746] ================================================================== [ 13.663288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 13.663535] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.663761] [ 13.663959] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.664015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.664027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.664049] Call Trace: [ 13.664077] <TASK> [ 13.664096] dump_stack_lvl+0x73/0xb0 [ 13.664121] print_report+0xd1/0x650 [ 13.664144] ? __virt_addr_valid+0x1db/0x2d0 [ 13.664167] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.664189] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.664212] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.664234] kasan_report+0x141/0x180 [ 13.664262] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.664289] kasan_check_range+0x10c/0x1c0 [ 13.664310] __kasan_check_write+0x18/0x20 [ 13.664330] kasan_atomics_helper+0xb6a/0x5450 [ 13.664354] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.664377] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.664399] ? kasan_atomics+0x152/0x310 [ 13.664422] kasan_atomics+0x1dc/0x310 [ 13.664442] ? __pfx_kasan_atomics+0x10/0x10 [ 13.664473] ? __pfx_read_tsc+0x10/0x10 [ 13.664494] ? ktime_get_ts64+0x86/0x230 [ 13.664520] kunit_try_run_case+0x1a5/0x480 [ 13.664557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.664579] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.664604] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.664627] ? __kthread_parkme+0x82/0x180 [ 13.664650] ? preempt_count_sub+0x50/0x80 [ 13.664677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.664701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.664724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.664748] kthread+0x337/0x6f0 [ 13.664765] ? trace_preempt_on+0x20/0xc0 [ 13.664791] ? __pfx_kthread+0x10/0x10 [ 13.664809] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.664831] ? calculate_sigpending+0x7b/0xa0 [ 13.664854] ? __pfx_kthread+0x10/0x10 [ 13.664873] ret_from_fork+0x41/0x80 [ 13.664894] ? __pfx_kthread+0x10/0x10 [ 13.664912] ret_from_fork_asm+0x1a/0x30 [ 13.664952] </TASK> [ 13.664963] [ 13.673292] Allocated by task 284: [ 13.673497] kasan_save_stack+0x45/0x70 [ 13.673742] kasan_save_track+0x18/0x40 [ 13.673945] kasan_save_alloc_info+0x3b/0x50 [ 13.674150] __kasan_kmalloc+0xb7/0xc0 [ 13.674284] __kmalloc_cache_noprof+0x189/0x420 [ 13.674437] kasan_atomics+0x95/0x310 [ 13.674567] kunit_try_run_case+0x1a5/0x480 [ 13.674850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.675123] kthread+0x337/0x6f0 [ 13.675258] ret_from_fork+0x41/0x80 [ 13.675390] ret_from_fork_asm+0x1a/0x30 [ 13.675530] [ 13.675601] The buggy address belongs to the object at ffff888102a0bf80 [ 13.675601] which belongs to the cache kmalloc-64 of size 64 [ 13.676416] The buggy address is located 0 bytes to the right of [ 13.676416] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.677009] [ 13.677174] The buggy address belongs to the physical page: [ 13.677430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.677857] flags: 0x200000000000000(node=0|zone=2) [ 13.678046] page_type: f5(slab) [ 13.678173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.678402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.678625] page dumped because: kasan: bad access detected [ 13.678804] [ 13.678896] Memory state around the buggy address: [ 13.679341] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.679841] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.680109] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.680327] ^ [ 13.680483] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.681057] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.681373] ================================================================== [ 14.510866] ================================================================== [ 14.512383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 14.512859] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.513094] [ 14.513186] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.513235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.513248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.513272] Call Trace: [ 14.513293] <TASK> [ 14.513314] dump_stack_lvl+0x73/0xb0 [ 14.513341] print_report+0xd1/0x650 [ 14.513366] ? __virt_addr_valid+0x1db/0x2d0 [ 14.513389] ? kasan_atomics_helper+0x2006/0x5450 [ 14.513413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.513438] ? kasan_atomics_helper+0x2006/0x5450 [ 14.513461] kasan_report+0x141/0x180 [ 14.513485] ? kasan_atomics_helper+0x2006/0x5450 [ 14.513512] kasan_check_range+0x10c/0x1c0 [ 14.513536] __kasan_check_write+0x18/0x20 [ 14.513557] kasan_atomics_helper+0x2006/0x5450 [ 14.513581] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.513604] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.513628] ? kasan_atomics+0x152/0x310 [ 14.513653] kasan_atomics+0x1dc/0x310 [ 14.513673] ? __pfx_kasan_atomics+0x10/0x10 [ 14.513695] ? __pfx_read_tsc+0x10/0x10 [ 14.513716] ? ktime_get_ts64+0x86/0x230 [ 14.513742] kunit_try_run_case+0x1a5/0x480 [ 14.513768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.513792] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.513817] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.513842] ? __kthread_parkme+0x82/0x180 [ 14.513865] ? preempt_count_sub+0x50/0x80 [ 14.513891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.513926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.513950] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.513974] kthread+0x337/0x6f0 [ 14.513993] ? trace_preempt_on+0x20/0xc0 [ 14.514017] ? __pfx_kthread+0x10/0x10 [ 14.514071] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.514095] ? calculate_sigpending+0x7b/0xa0 [ 14.514118] ? __pfx_kthread+0x10/0x10 [ 14.514149] ret_from_fork+0x41/0x80 [ 14.514170] ? __pfx_kthread+0x10/0x10 [ 14.514189] ret_from_fork_asm+0x1a/0x30 [ 14.514247] </TASK> [ 14.514259] [ 14.522654] Allocated by task 284: [ 14.522908] kasan_save_stack+0x45/0x70 [ 14.523134] kasan_save_track+0x18/0x40 [ 14.523340] kasan_save_alloc_info+0x3b/0x50 [ 14.523550] __kasan_kmalloc+0xb7/0xc0 [ 14.523802] __kmalloc_cache_noprof+0x189/0x420 [ 14.524027] kasan_atomics+0x95/0x310 [ 14.524293] kunit_try_run_case+0x1a5/0x480 [ 14.524476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.524800] kthread+0x337/0x6f0 [ 14.524993] ret_from_fork+0x41/0x80 [ 14.525154] ret_from_fork_asm+0x1a/0x30 [ 14.525388] [ 14.525526] The buggy address belongs to the object at ffff888102a0bf80 [ 14.525526] which belongs to the cache kmalloc-64 of size 64 [ 14.526166] The buggy address is located 0 bytes to the right of [ 14.526166] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.526714] [ 14.526813] The buggy address belongs to the physical page: [ 14.527092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.527454] flags: 0x200000000000000(node=0|zone=2) [ 14.527912] page_type: f5(slab) [ 14.528059] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.528299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.528616] page dumped because: kasan: bad access detected [ 14.528869] [ 14.529016] Memory state around the buggy address: [ 14.529243] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.529611] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.529930] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.530254] ^ [ 14.530484] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.530900] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.531236] ================================================================== [ 13.397663] ================================================================== [ 13.398465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 13.398724] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.399178] [ 13.399331] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.399378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.399392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.399414] Call Trace: [ 13.399434] <TASK> [ 13.399453] dump_stack_lvl+0x73/0xb0 [ 13.399478] print_report+0xd1/0x650 [ 13.399501] ? __virt_addr_valid+0x1db/0x2d0 [ 13.399524] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.399547] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.399570] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.399593] kasan_report+0x141/0x180 [ 13.399617] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.399644] __asan_report_load4_noabort+0x18/0x20 [ 13.399666] kasan_atomics_helper+0x4b54/0x5450 [ 13.399690] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.399713] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.399736] ? kasan_atomics+0x152/0x310 [ 13.399760] kasan_atomics+0x1dc/0x310 [ 13.399780] ? __pfx_kasan_atomics+0x10/0x10 [ 13.399802] ? __pfx_read_tsc+0x10/0x10 [ 13.399823] ? ktime_get_ts64+0x86/0x230 [ 13.399850] kunit_try_run_case+0x1a5/0x480 [ 13.399876] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.399899] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.399936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.399961] ? __kthread_parkme+0x82/0x180 [ 13.399984] ? preempt_count_sub+0x50/0x80 [ 13.400011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.400036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.400060] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.400083] kthread+0x337/0x6f0 [ 13.400101] ? trace_preempt_on+0x20/0xc0 [ 13.400126] ? __pfx_kthread+0x10/0x10 [ 13.400145] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.400167] ? calculate_sigpending+0x7b/0xa0 [ 13.400189] ? __pfx_kthread+0x10/0x10 [ 13.400209] ret_from_fork+0x41/0x80 [ 13.400230] ? __pfx_kthread+0x10/0x10 [ 13.400254] ret_from_fork_asm+0x1a/0x30 [ 13.400286] </TASK> [ 13.400297] [ 13.407735] Allocated by task 284: [ 13.407872] kasan_save_stack+0x45/0x70 [ 13.408030] kasan_save_track+0x18/0x40 [ 13.408227] kasan_save_alloc_info+0x3b/0x50 [ 13.408441] __kasan_kmalloc+0xb7/0xc0 [ 13.408669] __kmalloc_cache_noprof+0x189/0x420 [ 13.408887] kasan_atomics+0x95/0x310 [ 13.409082] kunit_try_run_case+0x1a5/0x480 [ 13.409301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.409526] kthread+0x337/0x6f0 [ 13.409715] ret_from_fork+0x41/0x80 [ 13.409861] ret_from_fork_asm+0x1a/0x30 [ 13.410074] [ 13.410168] The buggy address belongs to the object at ffff888102a0bf80 [ 13.410168] which belongs to the cache kmalloc-64 of size 64 [ 13.410660] The buggy address is located 0 bytes to the right of [ 13.410660] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.411132] [ 13.411228] The buggy address belongs to the physical page: [ 13.411449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.411792] flags: 0x200000000000000(node=0|zone=2) [ 13.411989] page_type: f5(slab) [ 13.412162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.412478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.412797] page dumped because: kasan: bad access detected [ 13.413078] [ 13.413173] Memory state around the buggy address: [ 13.413380] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.413683] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.414047] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.414259] ^ [ 13.414413] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.414626] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.414837] ================================================================== [ 14.148968] ================================================================== [ 14.149756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.150579] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.151256] [ 14.151459] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.151521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.151533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.151576] Call Trace: [ 14.151597] <TASK> [ 14.151618] dump_stack_lvl+0x73/0xb0 [ 14.151647] print_report+0xd1/0x650 [ 14.151672] ? __virt_addr_valid+0x1db/0x2d0 [ 14.151694] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.151718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.151741] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.151763] kasan_report+0x141/0x180 [ 14.151787] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.151814] kasan_check_range+0x10c/0x1c0 [ 14.151835] __kasan_check_write+0x18/0x20 [ 14.151856] kasan_atomics_helper+0x16e7/0x5450 [ 14.151880] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.151903] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.151938] ? kasan_atomics+0x152/0x310 [ 14.151963] kasan_atomics+0x1dc/0x310 [ 14.151993] ? __pfx_kasan_atomics+0x10/0x10 [ 14.152015] ? __pfx_read_tsc+0x10/0x10 [ 14.152036] ? ktime_get_ts64+0x86/0x230 [ 14.152073] kunit_try_run_case+0x1a5/0x480 [ 14.152101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.152125] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.152150] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.152175] ? __kthread_parkme+0x82/0x180 [ 14.152198] ? preempt_count_sub+0x50/0x80 [ 14.152225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.152256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.152280] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.152304] kthread+0x337/0x6f0 [ 14.152321] ? trace_preempt_on+0x20/0xc0 [ 14.152346] ? __pfx_kthread+0x10/0x10 [ 14.152365] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.152387] ? calculate_sigpending+0x7b/0xa0 [ 14.152410] ? __pfx_kthread+0x10/0x10 [ 14.152429] ret_from_fork+0x41/0x80 [ 14.152450] ? __pfx_kthread+0x10/0x10 [ 14.152469] ret_from_fork_asm+0x1a/0x30 [ 14.152501] </TASK> [ 14.152514] [ 14.165557] Allocated by task 284: [ 14.165984] kasan_save_stack+0x45/0x70 [ 14.166145] kasan_save_track+0x18/0x40 [ 14.166376] kasan_save_alloc_info+0x3b/0x50 [ 14.166800] __kasan_kmalloc+0xb7/0xc0 [ 14.167158] __kmalloc_cache_noprof+0x189/0x420 [ 14.167540] kasan_atomics+0x95/0x310 [ 14.167673] kunit_try_run_case+0x1a5/0x480 [ 14.167821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.168006] kthread+0x337/0x6f0 [ 14.168127] ret_from_fork+0x41/0x80 [ 14.168264] ret_from_fork_asm+0x1a/0x30 [ 14.168405] [ 14.168479] The buggy address belongs to the object at ffff888102a0bf80 [ 14.168479] which belongs to the cache kmalloc-64 of size 64 [ 14.169455] The buggy address is located 0 bytes to the right of [ 14.169455] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.170760] [ 14.170932] The buggy address belongs to the physical page: [ 14.171429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.171980] flags: 0x200000000000000(node=0|zone=2) [ 14.172149] page_type: f5(slab) [ 14.172283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.172516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.172790] page dumped because: kasan: bad access detected [ 14.173152] [ 14.173246] Memory state around the buggy address: [ 14.173471] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.173748] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.174054] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.174325] ^ [ 14.174547] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.174881] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.175182] ================================================================== [ 13.832016] ================================================================== [ 13.832407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 13.833651] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.834524] [ 13.834907] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.835048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.835062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.835155] Call Trace: [ 13.835177] <TASK> [ 13.835199] dump_stack_lvl+0x73/0xb0 [ 13.835241] print_report+0xd1/0x650 [ 13.835272] ? __virt_addr_valid+0x1db/0x2d0 [ 13.835295] ? kasan_atomics_helper+0x1079/0x5450 [ 13.835318] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.835342] ? kasan_atomics_helper+0x1079/0x5450 [ 13.835366] kasan_report+0x141/0x180 [ 13.835390] ? kasan_atomics_helper+0x1079/0x5450 [ 13.835417] kasan_check_range+0x10c/0x1c0 [ 13.835439] __kasan_check_write+0x18/0x20 [ 13.835459] kasan_atomics_helper+0x1079/0x5450 [ 13.835483] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.835506] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.835529] ? kasan_atomics+0x152/0x310 [ 13.835608] kasan_atomics+0x1dc/0x310 [ 13.835632] ? __pfx_kasan_atomics+0x10/0x10 [ 13.835654] ? __pfx_read_tsc+0x10/0x10 [ 13.835674] ? ktime_get_ts64+0x86/0x230 [ 13.835700] kunit_try_run_case+0x1a5/0x480 [ 13.835728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.835751] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.835776] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.835800] ? __kthread_parkme+0x82/0x180 [ 13.835824] ? preempt_count_sub+0x50/0x80 [ 13.835851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.835875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.835899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.835933] kthread+0x337/0x6f0 [ 13.835951] ? trace_preempt_on+0x20/0xc0 [ 13.835976] ? __pfx_kthread+0x10/0x10 [ 13.835995] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.836017] ? calculate_sigpending+0x7b/0xa0 [ 13.836039] ? __pfx_kthread+0x10/0x10 [ 13.836058] ret_from_fork+0x41/0x80 [ 13.836079] ? __pfx_kthread+0x10/0x10 [ 13.836098] ret_from_fork_asm+0x1a/0x30 [ 13.836130] </TASK> [ 13.836143] [ 13.847287] Allocated by task 284: [ 13.847482] kasan_save_stack+0x45/0x70 [ 13.848119] kasan_save_track+0x18/0x40 [ 13.848386] kasan_save_alloc_info+0x3b/0x50 [ 13.848775] __kasan_kmalloc+0xb7/0xc0 [ 13.849099] __kmalloc_cache_noprof+0x189/0x420 [ 13.849509] kasan_atomics+0x95/0x310 [ 13.849835] kunit_try_run_case+0x1a5/0x480 [ 13.850046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.850280] kthread+0x337/0x6f0 [ 13.850433] ret_from_fork+0x41/0x80 [ 13.850609] ret_from_fork_asm+0x1a/0x30 [ 13.850793] [ 13.850880] The buggy address belongs to the object at ffff888102a0bf80 [ 13.850880] which belongs to the cache kmalloc-64 of size 64 [ 13.852283] The buggy address is located 0 bytes to the right of [ 13.852283] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.853245] [ 13.853488] The buggy address belongs to the physical page: [ 13.853996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.854349] flags: 0x200000000000000(node=0|zone=2) [ 13.854569] page_type: f5(slab) [ 13.854728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.855049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.855355] page dumped because: kasan: bad access detected [ 13.855968] [ 13.856186] Memory state around the buggy address: [ 13.856690] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.857152] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.857844] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.858290] ^ [ 13.858805] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.859404] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.859878] ================================================================== [ 13.588179] ================================================================== [ 13.588478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 13.588868] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.589178] [ 13.589314] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.589360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.589373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.589396] Call Trace: [ 13.589409] <TASK> [ 13.589436] dump_stack_lvl+0x73/0xb0 [ 13.589462] print_report+0xd1/0x650 [ 13.589486] ? __virt_addr_valid+0x1db/0x2d0 [ 13.589521] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.589543] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.589595] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.589618] kasan_report+0x141/0x180 [ 13.589642] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.589679] kasan_check_range+0x10c/0x1c0 [ 13.589700] __kasan_check_write+0x18/0x20 [ 13.589720] kasan_atomics_helper+0x8f9/0x5450 [ 13.589752] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.589776] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.589799] ? kasan_atomics+0x152/0x310 [ 13.589832] kasan_atomics+0x1dc/0x310 [ 13.589851] ? __pfx_kasan_atomics+0x10/0x10 [ 13.589873] ? __pfx_read_tsc+0x10/0x10 [ 13.589894] ? ktime_get_ts64+0x86/0x230 [ 13.589928] kunit_try_run_case+0x1a5/0x480 [ 13.589954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.589977] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.590002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.590026] ? __kthread_parkme+0x82/0x180 [ 13.590058] ? preempt_count_sub+0x50/0x80 [ 13.590084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.590108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.590142] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.590165] kthread+0x337/0x6f0 [ 13.590184] ? trace_preempt_on+0x20/0xc0 [ 13.590208] ? __pfx_kthread+0x10/0x10 [ 13.590227] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.590250] ? calculate_sigpending+0x7b/0xa0 [ 13.590272] ? __pfx_kthread+0x10/0x10 [ 13.590291] ret_from_fork+0x41/0x80 [ 13.590312] ? __pfx_kthread+0x10/0x10 [ 13.590330] ret_from_fork_asm+0x1a/0x30 [ 13.590363] </TASK> [ 13.590374] [ 13.597937] Allocated by task 284: [ 13.598073] kasan_save_stack+0x45/0x70 [ 13.598297] kasan_save_track+0x18/0x40 [ 13.598489] kasan_save_alloc_info+0x3b/0x50 [ 13.598699] __kasan_kmalloc+0xb7/0xc0 [ 13.598835] __kmalloc_cache_noprof+0x189/0x420 [ 13.598996] kasan_atomics+0x95/0x310 [ 13.599146] kunit_try_run_case+0x1a5/0x480 [ 13.599354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.599652] kthread+0x337/0x6f0 [ 13.599818] ret_from_fork+0x41/0x80 [ 13.600020] ret_from_fork_asm+0x1a/0x30 [ 13.600236] [ 13.600335] The buggy address belongs to the object at ffff888102a0bf80 [ 13.600335] which belongs to the cache kmalloc-64 of size 64 [ 13.600855] The buggy address is located 0 bytes to the right of [ 13.600855] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.601333] [ 13.601407] The buggy address belongs to the physical page: [ 13.601609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.601895] flags: 0x200000000000000(node=0|zone=2) [ 13.602148] page_type: f5(slab) [ 13.602320] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.602681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.603028] page dumped because: kasan: bad access detected [ 13.603238] [ 13.603307] Memory state around the buggy address: [ 13.603467] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.603810] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.604164] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.604535] ^ [ 13.604755] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.605089] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.605391] ================================================================== [ 13.310641] ================================================================== [ 13.311426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.312469] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.313334] [ 13.313666] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.313720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.313733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.313754] Call Trace: [ 13.313768] <TASK> [ 13.313786] dump_stack_lvl+0x73/0xb0 [ 13.313817] print_report+0xd1/0x650 [ 13.313841] ? __virt_addr_valid+0x1db/0x2d0 [ 13.313864] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.313885] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.313908] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.313942] kasan_report+0x141/0x180 [ 13.313965] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.313991] __asan_report_store4_noabort+0x1b/0x30 [ 13.314014] kasan_atomics_helper+0x4ba2/0x5450 [ 13.314038] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.314061] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.314083] ? kasan_atomics+0x152/0x310 [ 13.314106] kasan_atomics+0x1dc/0x310 [ 13.314124] ? __pfx_kasan_atomics+0x10/0x10 [ 13.314145] ? __pfx_read_tsc+0x10/0x10 [ 13.314166] ? ktime_get_ts64+0x86/0x230 [ 13.314191] kunit_try_run_case+0x1a5/0x480 [ 13.314217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.314238] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.314263] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.314287] ? __kthread_parkme+0x82/0x180 [ 13.314309] ? preempt_count_sub+0x50/0x80 [ 13.314334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.314357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.314381] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.314404] kthread+0x337/0x6f0 [ 13.314421] ? trace_preempt_on+0x20/0xc0 [ 13.314445] ? __pfx_kthread+0x10/0x10 [ 13.314462] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.314484] ? calculate_sigpending+0x7b/0xa0 [ 13.314505] ? __pfx_kthread+0x10/0x10 [ 13.314523] ret_from_fork+0x41/0x80 [ 13.314544] ? __pfx_kthread+0x10/0x10 [ 13.314698] ret_from_fork_asm+0x1a/0x30 [ 13.314739] </TASK> [ 13.314752] [ 13.327330] Allocated by task 284: [ 13.327548] kasan_save_stack+0x45/0x70 [ 13.327765] kasan_save_track+0x18/0x40 [ 13.327963] kasan_save_alloc_info+0x3b/0x50 [ 13.328140] __kasan_kmalloc+0xb7/0xc0 [ 13.328290] __kmalloc_cache_noprof+0x189/0x420 [ 13.328503] kasan_atomics+0x95/0x310 [ 13.328771] kunit_try_run_case+0x1a5/0x480 [ 13.328928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.329103] kthread+0x337/0x6f0 [ 13.329271] ret_from_fork+0x41/0x80 [ 13.329460] ret_from_fork_asm+0x1a/0x30 [ 13.329819] [ 13.329933] The buggy address belongs to the object at ffff888102a0bf80 [ 13.329933] which belongs to the cache kmalloc-64 of size 64 [ 13.330398] The buggy address is located 0 bytes to the right of [ 13.330398] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.331093] [ 13.331171] The buggy address belongs to the physical page: [ 13.331404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.331726] flags: 0x200000000000000(node=0|zone=2) [ 13.332002] page_type: f5(slab) [ 13.332176] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.332433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.332660] page dumped because: kasan: bad access detected [ 13.332897] [ 13.332998] Memory state around the buggy address: [ 13.333225] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.333539] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.334022] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.334236] ^ [ 13.334403] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.334870] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.335140] ================================================================== [ 14.212446] ================================================================== [ 14.212867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.213544] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.213931] [ 14.214060] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.214107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.214130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.214153] Call Trace: [ 14.214174] <TASK> [ 14.214205] dump_stack_lvl+0x73/0xb0 [ 14.214231] print_report+0xd1/0x650 [ 14.214255] ? __virt_addr_valid+0x1db/0x2d0 [ 14.214279] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.214301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.214325] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.214347] kasan_report+0x141/0x180 [ 14.214372] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.214402] kasan_check_range+0x10c/0x1c0 [ 14.214423] __kasan_check_write+0x18/0x20 [ 14.214445] kasan_atomics_helper+0x18b1/0x5450 [ 14.214468] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.214491] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.214514] ? kasan_atomics+0x152/0x310 [ 14.214540] kasan_atomics+0x1dc/0x310 [ 14.214589] ? __pfx_kasan_atomics+0x10/0x10 [ 14.214611] ? __pfx_read_tsc+0x10/0x10 [ 14.214633] ? ktime_get_ts64+0x86/0x230 [ 14.214671] kunit_try_run_case+0x1a5/0x480 [ 14.214697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.214720] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.214754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.214777] ? __kthread_parkme+0x82/0x180 [ 14.214801] ? preempt_count_sub+0x50/0x80 [ 14.214837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.214861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.214886] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.214926] kthread+0x337/0x6f0 [ 14.214945] ? trace_preempt_on+0x20/0xc0 [ 14.214970] ? __pfx_kthread+0x10/0x10 [ 14.214998] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.215020] ? calculate_sigpending+0x7b/0xa0 [ 14.215043] ? __pfx_kthread+0x10/0x10 [ 14.215063] ret_from_fork+0x41/0x80 [ 14.215093] ? __pfx_kthread+0x10/0x10 [ 14.215112] ret_from_fork_asm+0x1a/0x30 [ 14.215144] </TASK> [ 14.215155] [ 14.222824] Allocated by task 284: [ 14.222983] kasan_save_stack+0x45/0x70 [ 14.223138] kasan_save_track+0x18/0x40 [ 14.223274] kasan_save_alloc_info+0x3b/0x50 [ 14.223420] __kasan_kmalloc+0xb7/0xc0 [ 14.223574] __kmalloc_cache_noprof+0x189/0x420 [ 14.223734] kasan_atomics+0x95/0x310 [ 14.223927] kunit_try_run_case+0x1a5/0x480 [ 14.224174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.224461] kthread+0x337/0x6f0 [ 14.224687] ret_from_fork+0x41/0x80 [ 14.224908] ret_from_fork_asm+0x1a/0x30 [ 14.225112] [ 14.225207] The buggy address belongs to the object at ffff888102a0bf80 [ 14.225207] which belongs to the cache kmalloc-64 of size 64 [ 14.225673] The buggy address is located 0 bytes to the right of [ 14.225673] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.226049] [ 14.226148] The buggy address belongs to the physical page: [ 14.226405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.226778] flags: 0x200000000000000(node=0|zone=2) [ 14.227026] page_type: f5(slab) [ 14.227201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.227535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.227828] page dumped because: kasan: bad access detected [ 14.228126] [ 14.228219] Memory state around the buggy address: [ 14.228447] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.228781] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.229097] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.229399] ^ [ 14.229634] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.229962] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.230272] ================================================================== [ 14.611996] ================================================================== [ 14.612339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 14.612863] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.613250] [ 14.613419] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.613468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.613481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.613504] Call Trace: [ 14.613525] <TASK> [ 14.613576] dump_stack_lvl+0x73/0xb0 [ 14.613614] print_report+0xd1/0x650 [ 14.613638] ? __virt_addr_valid+0x1db/0x2d0 [ 14.613672] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.613695] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.613719] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.613768] kasan_report+0x141/0x180 [ 14.613793] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.613821] __asan_report_load8_noabort+0x18/0x20 [ 14.613854] kasan_atomics_helper+0x4fa5/0x5450 [ 14.613878] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.613935] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.613958] ? kasan_atomics+0x152/0x310 [ 14.613993] kasan_atomics+0x1dc/0x310 [ 14.614014] ? __pfx_kasan_atomics+0x10/0x10 [ 14.614035] ? __pfx_read_tsc+0x10/0x10 [ 14.614083] ? ktime_get_ts64+0x86/0x230 [ 14.614110] kunit_try_run_case+0x1a5/0x480 [ 14.614165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.614188] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.614213] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.614237] ? __kthread_parkme+0x82/0x180 [ 14.614260] ? preempt_count_sub+0x50/0x80 [ 14.614287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.614337] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.614362] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.614413] kthread+0x337/0x6f0 [ 14.614431] ? trace_preempt_on+0x20/0xc0 [ 14.614455] ? __pfx_kthread+0x10/0x10 [ 14.614474] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.614496] ? calculate_sigpending+0x7b/0xa0 [ 14.614519] ? __pfx_kthread+0x10/0x10 [ 14.614538] ret_from_fork+0x41/0x80 [ 14.614577] ? __pfx_kthread+0x10/0x10 [ 14.614604] ret_from_fork_asm+0x1a/0x30 [ 14.614637] </TASK> [ 14.614675] [ 14.622946] Allocated by task 284: [ 14.623142] kasan_save_stack+0x45/0x70 [ 14.623372] kasan_save_track+0x18/0x40 [ 14.623569] kasan_save_alloc_info+0x3b/0x50 [ 14.623786] __kasan_kmalloc+0xb7/0xc0 [ 14.623982] __kmalloc_cache_noprof+0x189/0x420 [ 14.624259] kasan_atomics+0x95/0x310 [ 14.624456] kunit_try_run_case+0x1a5/0x480 [ 14.624794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.626297] kthread+0x337/0x6f0 [ 14.627849] ret_from_fork+0x41/0x80 [ 14.628124] ret_from_fork_asm+0x1a/0x30 [ 14.628275] [ 14.628351] The buggy address belongs to the object at ffff888102a0bf80 [ 14.628351] which belongs to the cache kmalloc-64 of size 64 [ 14.629146] The buggy address is located 0 bytes to the right of [ 14.629146] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.630331] [ 14.630494] The buggy address belongs to the physical page: [ 14.631141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.631781] flags: 0x200000000000000(node=0|zone=2) [ 14.631957] page_type: f5(slab) [ 14.632083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.632322] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.632548] page dumped because: kasan: bad access detected [ 14.633158] [ 14.633315] Memory state around the buggy address: [ 14.633816] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.634467] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.635212] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.635874] ^ [ 14.636343] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.637100] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.637845] ================================================================== [ 14.658675] ================================================================== [ 14.659042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 14.659370] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.659930] [ 14.660043] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.660091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.660104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.660137] Call Trace: [ 14.660157] <TASK> [ 14.660179] dump_stack_lvl+0x73/0xb0 [ 14.660217] print_report+0xd1/0x650 [ 14.660241] ? __virt_addr_valid+0x1db/0x2d0 [ 14.660273] ? kasan_atomics_helper+0x5115/0x5450 [ 14.660299] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.660323] ? kasan_atomics_helper+0x5115/0x5450 [ 14.660347] kasan_report+0x141/0x180 [ 14.660371] ? kasan_atomics_helper+0x5115/0x5450 [ 14.660400] __asan_report_load8_noabort+0x18/0x20 [ 14.660423] kasan_atomics_helper+0x5115/0x5450 [ 14.660447] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.660470] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.660504] ? kasan_atomics+0x152/0x310 [ 14.660528] kasan_atomics+0x1dc/0x310 [ 14.660548] ? __pfx_kasan_atomics+0x10/0x10 [ 14.660581] ? __pfx_read_tsc+0x10/0x10 [ 14.660602] ? ktime_get_ts64+0x86/0x230 [ 14.660630] kunit_try_run_case+0x1a5/0x480 [ 14.660655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.660678] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.660704] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.660740] ? __kthread_parkme+0x82/0x180 [ 14.660763] ? preempt_count_sub+0x50/0x80 [ 14.660790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.660814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.660839] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.660863] kthread+0x337/0x6f0 [ 14.660880] ? trace_preempt_on+0x20/0xc0 [ 14.660905] ? __pfx_kthread+0x10/0x10 [ 14.660933] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.660964] ? calculate_sigpending+0x7b/0xa0 [ 14.660987] ? __pfx_kthread+0x10/0x10 [ 14.661006] ret_from_fork+0x41/0x80 [ 14.661038] ? __pfx_kthread+0x10/0x10 [ 14.661057] ret_from_fork_asm+0x1a/0x30 [ 14.661088] </TASK> [ 14.661100] [ 14.668188] Allocated by task 284: [ 14.668413] kasan_save_stack+0x45/0x70 [ 14.668612] kasan_save_track+0x18/0x40 [ 14.668891] kasan_save_alloc_info+0x3b/0x50 [ 14.669083] __kasan_kmalloc+0xb7/0xc0 [ 14.669213] __kmalloc_cache_noprof+0x189/0x420 [ 14.669362] kasan_atomics+0x95/0x310 [ 14.669545] kunit_try_run_case+0x1a5/0x480 [ 14.669756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.670033] kthread+0x337/0x6f0 [ 14.670172] ret_from_fork+0x41/0x80 [ 14.670334] ret_from_fork_asm+0x1a/0x30 [ 14.670540] [ 14.670649] The buggy address belongs to the object at ffff888102a0bf80 [ 14.670649] which belongs to the cache kmalloc-64 of size 64 [ 14.671004] The buggy address is located 0 bytes to the right of [ 14.671004] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.671455] [ 14.671553] The buggy address belongs to the physical page: [ 14.671804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.672168] flags: 0x200000000000000(node=0|zone=2) [ 14.672392] page_type: f5(slab) [ 14.672519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.673150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.673505] page dumped because: kasan: bad access detected [ 14.673761] [ 14.673870] Memory state around the buggy address: [ 14.674045] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.674265] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.674655] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.674980] ^ [ 14.675235] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.675532] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.675858] ================================================================== [ 14.406508] ================================================================== [ 14.407203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 14.407930] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.408610] [ 14.408790] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.408849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.408861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.408895] Call Trace: [ 14.408925] <TASK> [ 14.408946] dump_stack_lvl+0x73/0xb0 [ 14.408973] print_report+0xd1/0x650 [ 14.408997] ? __virt_addr_valid+0x1db/0x2d0 [ 14.409029] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.409052] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.409075] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.409109] kasan_report+0x141/0x180 [ 14.409133] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.409160] kasan_check_range+0x10c/0x1c0 [ 14.409181] __kasan_check_write+0x18/0x20 [ 14.409202] kasan_atomics_helper+0x1d7a/0x5450 [ 14.409225] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.409249] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.409272] ? kasan_atomics+0x152/0x310 [ 14.409296] kasan_atomics+0x1dc/0x310 [ 14.409315] ? __pfx_kasan_atomics+0x10/0x10 [ 14.409337] ? __pfx_read_tsc+0x10/0x10 [ 14.409358] ? ktime_get_ts64+0x86/0x230 [ 14.409384] kunit_try_run_case+0x1a5/0x480 [ 14.409411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.409433] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.409458] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.409481] ? __kthread_parkme+0x82/0x180 [ 14.409504] ? preempt_count_sub+0x50/0x80 [ 14.409530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.409574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.409598] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.409622] kthread+0x337/0x6f0 [ 14.409640] ? trace_preempt_on+0x20/0xc0 [ 14.409664] ? __pfx_kthread+0x10/0x10 [ 14.409684] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.409706] ? calculate_sigpending+0x7b/0xa0 [ 14.409729] ? __pfx_kthread+0x10/0x10 [ 14.409747] ret_from_fork+0x41/0x80 [ 14.409769] ? __pfx_kthread+0x10/0x10 [ 14.409788] ret_from_fork_asm+0x1a/0x30 [ 14.409822] </TASK> [ 14.409833] [ 14.421788] Allocated by task 284: [ 14.421956] kasan_save_stack+0x45/0x70 [ 14.422194] kasan_save_track+0x18/0x40 [ 14.422409] kasan_save_alloc_info+0x3b/0x50 [ 14.422616] __kasan_kmalloc+0xb7/0xc0 [ 14.422853] __kmalloc_cache_noprof+0x189/0x420 [ 14.423224] kasan_atomics+0x95/0x310 [ 14.423413] kunit_try_run_case+0x1a5/0x480 [ 14.423594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.423902] kthread+0x337/0x6f0 [ 14.424079] ret_from_fork+0x41/0x80 [ 14.424214] ret_from_fork_asm+0x1a/0x30 [ 14.424360] [ 14.424431] The buggy address belongs to the object at ffff888102a0bf80 [ 14.424431] which belongs to the cache kmalloc-64 of size 64 [ 14.424982] The buggy address is located 0 bytes to the right of [ 14.424982] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.425650] [ 14.425743] The buggy address belongs to the physical page: [ 14.425925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.426230] flags: 0x200000000000000(node=0|zone=2) [ 14.426480] page_type: f5(slab) [ 14.426754] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.427117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.427416] page dumped because: kasan: bad access detected [ 14.427725] [ 14.427807] Memory state around the buggy address: [ 14.428041] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.428352] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.428674] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.428888] ^ [ 14.429054] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.429369] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.429681] ================================================================== [ 13.379109] ================================================================== [ 13.379447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.380281] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.380604] [ 13.380699] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.380749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.380761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.380785] Call Trace: [ 13.380804] <TASK> [ 13.380824] dump_stack_lvl+0x73/0xb0 [ 13.380853] print_report+0xd1/0x650 [ 13.380878] ? __virt_addr_valid+0x1db/0x2d0 [ 13.380902] ? kasan_atomics_helper+0x3df/0x5450 [ 13.380950] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.380976] ? kasan_atomics_helper+0x3df/0x5450 [ 13.380998] kasan_report+0x141/0x180 [ 13.381022] ? kasan_atomics_helper+0x3df/0x5450 [ 13.381049] kasan_check_range+0x10c/0x1c0 [ 13.381070] __kasan_check_read+0x15/0x20 [ 13.381090] kasan_atomics_helper+0x3df/0x5450 [ 13.381114] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.381137] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.381160] ? kasan_atomics+0x152/0x310 [ 13.381184] kasan_atomics+0x1dc/0x310 [ 13.381204] ? __pfx_kasan_atomics+0x10/0x10 [ 13.381225] ? __pfx_read_tsc+0x10/0x10 [ 13.381247] ? ktime_get_ts64+0x86/0x230 [ 13.381272] kunit_try_run_case+0x1a5/0x480 [ 13.381298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.381321] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.381346] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.381370] ? __kthread_parkme+0x82/0x180 [ 13.381393] ? preempt_count_sub+0x50/0x80 [ 13.381419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.381443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.381467] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.381491] kthread+0x337/0x6f0 [ 13.381509] ? trace_preempt_on+0x20/0xc0 [ 13.381533] ? __pfx_kthread+0x10/0x10 [ 13.381553] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.381575] ? calculate_sigpending+0x7b/0xa0 [ 13.381598] ? __pfx_kthread+0x10/0x10 [ 13.381618] ret_from_fork+0x41/0x80 [ 13.381640] ? __pfx_kthread+0x10/0x10 [ 13.381659] ret_from_fork_asm+0x1a/0x30 [ 13.381691] </TASK> [ 13.381703] [ 13.389191] Allocated by task 284: [ 13.389330] kasan_save_stack+0x45/0x70 [ 13.389535] kasan_save_track+0x18/0x40 [ 13.389860] kasan_save_alloc_info+0x3b/0x50 [ 13.390017] __kasan_kmalloc+0xb7/0xc0 [ 13.390150] __kmalloc_cache_noprof+0x189/0x420 [ 13.390409] kasan_atomics+0x95/0x310 [ 13.390627] kunit_try_run_case+0x1a5/0x480 [ 13.390835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.391097] kthread+0x337/0x6f0 [ 13.391267] ret_from_fork+0x41/0x80 [ 13.391398] ret_from_fork_asm+0x1a/0x30 [ 13.391538] [ 13.391613] The buggy address belongs to the object at ffff888102a0bf80 [ 13.391613] which belongs to the cache kmalloc-64 of size 64 [ 13.392356] The buggy address is located 0 bytes to the right of [ 13.392356] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.392757] [ 13.392830] The buggy address belongs to the physical page: [ 13.393012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.393529] flags: 0x200000000000000(node=0|zone=2) [ 13.393779] page_type: f5(slab) [ 13.393963] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.394309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.394747] page dumped because: kasan: bad access detected [ 13.394978] [ 13.395063] Memory state around the buggy address: [ 13.395258] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.395475] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.395864] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.396300] ^ [ 13.396482] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.396771] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.397062] ================================================================== [ 13.452532] ================================================================== [ 13.453208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 13.453528] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.453876] [ 13.454000] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.454047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.454060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.454083] Call Trace: [ 13.454102] <TASK> [ 13.454119] dump_stack_lvl+0x73/0xb0 [ 13.454147] print_report+0xd1/0x650 [ 13.454171] ? __virt_addr_valid+0x1db/0x2d0 [ 13.454193] ? kasan_atomics_helper+0x565/0x5450 [ 13.454215] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.454238] ? kasan_atomics_helper+0x565/0x5450 [ 13.454261] kasan_report+0x141/0x180 [ 13.454284] ? kasan_atomics_helper+0x565/0x5450 [ 13.454312] kasan_check_range+0x10c/0x1c0 [ 13.454332] __kasan_check_write+0x18/0x20 [ 13.454353] kasan_atomics_helper+0x565/0x5450 [ 13.454376] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.454399] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.454423] ? kasan_atomics+0x152/0x310 [ 13.454446] kasan_atomics+0x1dc/0x310 [ 13.454466] ? __pfx_kasan_atomics+0x10/0x10 [ 13.454487] ? __pfx_read_tsc+0x10/0x10 [ 13.454508] ? ktime_get_ts64+0x86/0x230 [ 13.454534] kunit_try_run_case+0x1a5/0x480 [ 13.454559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.454582] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.454608] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.454632] ? __kthread_parkme+0x82/0x180 [ 13.454655] ? preempt_count_sub+0x50/0x80 [ 13.454682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.454707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.454731] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.454755] kthread+0x337/0x6f0 [ 13.454773] ? trace_preempt_on+0x20/0xc0 [ 13.454797] ? __pfx_kthread+0x10/0x10 [ 13.454816] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.454837] ? calculate_sigpending+0x7b/0xa0 [ 13.454860] ? __pfx_kthread+0x10/0x10 [ 13.454879] ret_from_fork+0x41/0x80 [ 13.454899] ? __pfx_kthread+0x10/0x10 [ 13.454929] ret_from_fork_asm+0x1a/0x30 [ 13.454961] </TASK> [ 13.454972] [ 13.467705] Allocated by task 284: [ 13.467863] kasan_save_stack+0x45/0x70 [ 13.468092] kasan_save_track+0x18/0x40 [ 13.468298] kasan_save_alloc_info+0x3b/0x50 [ 13.468511] __kasan_kmalloc+0xb7/0xc0 [ 13.468701] __kmalloc_cache_noprof+0x189/0x420 [ 13.468910] kasan_atomics+0x95/0x310 [ 13.469100] kunit_try_run_case+0x1a5/0x480 [ 13.469291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.469467] kthread+0x337/0x6f0 [ 13.469600] ret_from_fork+0x41/0x80 [ 13.469782] ret_from_fork_asm+0x1a/0x30 [ 13.469988] [ 13.470077] The buggy address belongs to the object at ffff888102a0bf80 [ 13.470077] which belongs to the cache kmalloc-64 of size 64 [ 13.470437] The buggy address is located 0 bytes to the right of [ 13.470437] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.471380] [ 13.471459] The buggy address belongs to the physical page: [ 13.471634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.471960] flags: 0x200000000000000(node=0|zone=2) [ 13.472195] page_type: f5(slab) [ 13.472381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.472843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.473162] page dumped because: kasan: bad access detected [ 13.473343] [ 13.473413] Memory state around the buggy address: [ 13.473570] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.473896] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.474231] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.474478] ^ [ 13.474735] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.475024] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.475281] ================================================================== [ 14.230953] ================================================================== [ 14.231309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.231803] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.232167] [ 14.232316] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.232364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.232376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.232398] Call Trace: [ 14.232419] <TASK> [ 14.232439] dump_stack_lvl+0x73/0xb0 [ 14.232467] print_report+0xd1/0x650 [ 14.232490] ? __virt_addr_valid+0x1db/0x2d0 [ 14.232514] ? kasan_atomics_helper+0x194a/0x5450 [ 14.232536] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.232581] ? kasan_atomics_helper+0x194a/0x5450 [ 14.232605] kasan_report+0x141/0x180 [ 14.232638] ? kasan_atomics_helper+0x194a/0x5450 [ 14.232665] kasan_check_range+0x10c/0x1c0 [ 14.232686] __kasan_check_write+0x18/0x20 [ 14.232717] kasan_atomics_helper+0x194a/0x5450 [ 14.232741] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.232765] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.232787] ? kasan_atomics+0x152/0x310 [ 14.232820] kasan_atomics+0x1dc/0x310 [ 14.232840] ? __pfx_kasan_atomics+0x10/0x10 [ 14.232861] ? __pfx_read_tsc+0x10/0x10 [ 14.232892] ? ktime_get_ts64+0x86/0x230 [ 14.232927] kunit_try_run_case+0x1a5/0x480 [ 14.232954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.232985] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.233010] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.233034] ? __kthread_parkme+0x82/0x180 [ 14.233068] ? preempt_count_sub+0x50/0x80 [ 14.233095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.233119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.233151] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.233175] kthread+0x337/0x6f0 [ 14.233192] ? trace_preempt_on+0x20/0xc0 [ 14.233227] ? __pfx_kthread+0x10/0x10 [ 14.233245] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.233267] ? calculate_sigpending+0x7b/0xa0 [ 14.233290] ? __pfx_kthread+0x10/0x10 [ 14.233309] ret_from_fork+0x41/0x80 [ 14.233330] ? __pfx_kthread+0x10/0x10 [ 14.233348] ret_from_fork_asm+0x1a/0x30 [ 14.233381] </TASK> [ 14.233391] [ 14.240986] Allocated by task 284: [ 14.241192] kasan_save_stack+0x45/0x70 [ 14.241398] kasan_save_track+0x18/0x40 [ 14.241996] kasan_save_alloc_info+0x3b/0x50 [ 14.242228] __kasan_kmalloc+0xb7/0xc0 [ 14.242419] __kmalloc_cache_noprof+0x189/0x420 [ 14.243423] kasan_atomics+0x95/0x310 [ 14.243654] kunit_try_run_case+0x1a5/0x480 [ 14.243866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.244134] kthread+0x337/0x6f0 [ 14.244319] ret_from_fork+0x41/0x80 [ 14.244502] ret_from_fork_asm+0x1a/0x30 [ 14.245150] [ 14.245389] The buggy address belongs to the object at ffff888102a0bf80 [ 14.245389] which belongs to the cache kmalloc-64 of size 64 [ 14.246324] The buggy address is located 0 bytes to the right of [ 14.246324] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.247341] [ 14.247626] The buggy address belongs to the physical page: [ 14.248257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.248873] flags: 0x200000000000000(node=0|zone=2) [ 14.249222] page_type: f5(slab) [ 14.249651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.250347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.251001] page dumped because: kasan: bad access detected [ 14.251263] [ 14.251356] Memory state around the buggy address: [ 14.251829] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.252279] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.252788] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.253157] ^ [ 14.253336] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.253560] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.253816] ================================================================== [ 14.490503] ================================================================== [ 14.491317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 14.491715] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.492104] [ 14.492199] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.492274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.492287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.492311] Call Trace: [ 14.492331] <TASK> [ 14.492353] dump_stack_lvl+0x73/0xb0 [ 14.492379] print_report+0xd1/0x650 [ 14.492404] ? __virt_addr_valid+0x1db/0x2d0 [ 14.492427] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.492449] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.492473] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.492497] kasan_report+0x141/0x180 [ 14.492520] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.492548] __asan_report_load8_noabort+0x18/0x20 [ 14.492584] kasan_atomics_helper+0x4f71/0x5450 [ 14.492608] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.492632] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.492656] ? kasan_atomics+0x152/0x310 [ 14.492680] kasan_atomics+0x1dc/0x310 [ 14.492699] ? __pfx_kasan_atomics+0x10/0x10 [ 14.492730] ? __pfx_read_tsc+0x10/0x10 [ 14.492752] ? ktime_get_ts64+0x86/0x230 [ 14.492814] kunit_try_run_case+0x1a5/0x480 [ 14.492842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.492865] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.492901] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.492936] ? __kthread_parkme+0x82/0x180 [ 14.492959] ? preempt_count_sub+0x50/0x80 [ 14.492987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.493013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.493037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.493061] kthread+0x337/0x6f0 [ 14.493079] ? trace_preempt_on+0x20/0xc0 [ 14.493104] ? __pfx_kthread+0x10/0x10 [ 14.493123] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.493145] ? calculate_sigpending+0x7b/0xa0 [ 14.493195] ? __pfx_kthread+0x10/0x10 [ 14.493215] ret_from_fork+0x41/0x80 [ 14.493237] ? __pfx_kthread+0x10/0x10 [ 14.493256] ret_from_fork_asm+0x1a/0x30 [ 14.493299] </TASK> [ 14.493310] [ 14.502022] Allocated by task 284: [ 14.502222] kasan_save_stack+0x45/0x70 [ 14.502433] kasan_save_track+0x18/0x40 [ 14.502702] kasan_save_alloc_info+0x3b/0x50 [ 14.502922] __kasan_kmalloc+0xb7/0xc0 [ 14.503065] __kmalloc_cache_noprof+0x189/0x420 [ 14.503320] kasan_atomics+0x95/0x310 [ 14.503507] kunit_try_run_case+0x1a5/0x480 [ 14.503734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.504010] kthread+0x337/0x6f0 [ 14.504193] ret_from_fork+0x41/0x80 [ 14.504422] ret_from_fork_asm+0x1a/0x30 [ 14.504643] [ 14.504763] The buggy address belongs to the object at ffff888102a0bf80 [ 14.504763] which belongs to the cache kmalloc-64 of size 64 [ 14.505332] The buggy address is located 0 bytes to the right of [ 14.505332] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.505957] [ 14.506134] The buggy address belongs to the physical page: [ 14.506484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.506951] flags: 0x200000000000000(node=0|zone=2) [ 14.507185] page_type: f5(slab) [ 14.507354] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.507682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.507901] page dumped because: kasan: bad access detected [ 14.508075] [ 14.508141] Memory state around the buggy address: [ 14.508302] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.508783] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.509145] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.509518] ^ [ 14.509766] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.510092] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.510333] ================================================================== [ 14.080453] ================================================================== [ 14.081428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.081846] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.082201] [ 14.082321] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.082370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.082383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.082406] Call Trace: [ 14.082427] <TASK> [ 14.082448] dump_stack_lvl+0x73/0xb0 [ 14.082475] print_report+0xd1/0x650 [ 14.082500] ? __virt_addr_valid+0x1db/0x2d0 [ 14.082523] ? kasan_atomics_helper+0x151d/0x5450 [ 14.082545] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.082568] ? kasan_atomics_helper+0x151d/0x5450 [ 14.082591] kasan_report+0x141/0x180 [ 14.082615] ? kasan_atomics_helper+0x151d/0x5450 [ 14.082642] kasan_check_range+0x10c/0x1c0 [ 14.082664] __kasan_check_write+0x18/0x20 [ 14.082685] kasan_atomics_helper+0x151d/0x5450 [ 14.082709] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.082732] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.082758] ? kasan_atomics+0x152/0x310 [ 14.082781] kasan_atomics+0x1dc/0x310 [ 14.082801] ? __pfx_kasan_atomics+0x10/0x10 [ 14.082823] ? __pfx_read_tsc+0x10/0x10 [ 14.082844] ? ktime_get_ts64+0x86/0x230 [ 14.082895] kunit_try_run_case+0x1a5/0x480 [ 14.082932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.082956] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.082981] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.083005] ? __kthread_parkme+0x82/0x180 [ 14.083027] ? preempt_count_sub+0x50/0x80 [ 14.083054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.083078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.083102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.083126] kthread+0x337/0x6f0 [ 14.083143] ? trace_preempt_on+0x20/0xc0 [ 14.083167] ? __pfx_kthread+0x10/0x10 [ 14.083185] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.083208] ? calculate_sigpending+0x7b/0xa0 [ 14.083230] ? __pfx_kthread+0x10/0x10 [ 14.083249] ret_from_fork+0x41/0x80 [ 14.083270] ? __pfx_kthread+0x10/0x10 [ 14.083289] ret_from_fork_asm+0x1a/0x30 [ 14.083321] </TASK> [ 14.083332] [ 14.091260] Allocated by task 284: [ 14.091451] kasan_save_stack+0x45/0x70 [ 14.091650] kasan_save_track+0x18/0x40 [ 14.091835] kasan_save_alloc_info+0x3b/0x50 [ 14.092049] __kasan_kmalloc+0xb7/0xc0 [ 14.092336] __kmalloc_cache_noprof+0x189/0x420 [ 14.092505] kasan_atomics+0x95/0x310 [ 14.092820] kunit_try_run_case+0x1a5/0x480 [ 14.093070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.093249] kthread+0x337/0x6f0 [ 14.093399] ret_from_fork+0x41/0x80 [ 14.093639] ret_from_fork_asm+0x1a/0x30 [ 14.093830] [ 14.093942] The buggy address belongs to the object at ffff888102a0bf80 [ 14.093942] which belongs to the cache kmalloc-64 of size 64 [ 14.094426] The buggy address is located 0 bytes to the right of [ 14.094426] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.094956] [ 14.095057] The buggy address belongs to the physical page: [ 14.095314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.095692] flags: 0x200000000000000(node=0|zone=2) [ 14.095886] page_type: f5(slab) [ 14.096061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.096396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.096739] page dumped because: kasan: bad access detected [ 14.096972] [ 14.097063] Memory state around the buggy address: [ 14.097273] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.097609] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.097895] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.098208] ^ [ 14.098408] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.098744] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.099052] ================================================================== [ 13.776985] ================================================================== [ 13.777324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 13.777679] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.778120] [ 13.778259] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.778315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.778327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.778349] Call Trace: [ 13.778366] <TASK> [ 13.778385] dump_stack_lvl+0x73/0xb0 [ 13.778410] print_report+0xd1/0x650 [ 13.778433] ? __virt_addr_valid+0x1db/0x2d0 [ 13.778456] ? kasan_atomics_helper+0xf10/0x5450 [ 13.778478] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.778501] ? kasan_atomics_helper+0xf10/0x5450 [ 13.778523] kasan_report+0x141/0x180 [ 13.778547] ? kasan_atomics_helper+0xf10/0x5450 [ 13.778586] kasan_check_range+0x10c/0x1c0 [ 13.778607] __kasan_check_write+0x18/0x20 [ 13.778628] kasan_atomics_helper+0xf10/0x5450 [ 13.778651] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.778675] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.778698] ? kasan_atomics+0x152/0x310 [ 13.778721] kasan_atomics+0x1dc/0x310 [ 13.778741] ? __pfx_kasan_atomics+0x10/0x10 [ 13.778762] ? __pfx_read_tsc+0x10/0x10 [ 13.778783] ? ktime_get_ts64+0x86/0x230 [ 13.778809] kunit_try_run_case+0x1a5/0x480 [ 13.778834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.778857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.778882] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.778907] ? __kthread_parkme+0x82/0x180 [ 13.778949] ? preempt_count_sub+0x50/0x80 [ 13.778975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.778999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.779033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.779057] kthread+0x337/0x6f0 [ 13.779075] ? trace_preempt_on+0x20/0xc0 [ 13.779099] ? __pfx_kthread+0x10/0x10 [ 13.779119] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.779141] ? calculate_sigpending+0x7b/0xa0 [ 13.779164] ? __pfx_kthread+0x10/0x10 [ 13.779183] ret_from_fork+0x41/0x80 [ 13.779205] ? __pfx_kthread+0x10/0x10 [ 13.779223] ret_from_fork_asm+0x1a/0x30 [ 13.779255] </TASK> [ 13.779266] [ 13.787072] Allocated by task 284: [ 13.787275] kasan_save_stack+0x45/0x70 [ 13.787459] kasan_save_track+0x18/0x40 [ 13.787663] kasan_save_alloc_info+0x3b/0x50 [ 13.787879] __kasan_kmalloc+0xb7/0xc0 [ 13.788064] __kmalloc_cache_noprof+0x189/0x420 [ 13.788277] kasan_atomics+0x95/0x310 [ 13.788458] kunit_try_run_case+0x1a5/0x480 [ 13.788673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.788890] kthread+0x337/0x6f0 [ 13.789021] ret_from_fork+0x41/0x80 [ 13.789162] ret_from_fork_asm+0x1a/0x30 [ 13.789379] [ 13.789473] The buggy address belongs to the object at ffff888102a0bf80 [ 13.789473] which belongs to the cache kmalloc-64 of size 64 [ 13.790132] The buggy address is located 0 bytes to the right of [ 13.790132] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.790711] [ 13.790789] The buggy address belongs to the physical page: [ 13.791032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.791268] flags: 0x200000000000000(node=0|zone=2) [ 13.791430] page_type: f5(slab) [ 13.791551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.791936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.792280] page dumped because: kasan: bad access detected [ 13.792529] [ 13.792620] Memory state around the buggy address: [ 13.792857] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.793086] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.793308] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.793609] ^ [ 13.793868] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.794217] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.794536] ================================================================== [ 14.430318] ================================================================== [ 14.430617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 14.431098] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.431412] [ 14.431528] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.431593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.431607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.431632] Call Trace: [ 14.431664] <TASK> [ 14.431685] dump_stack_lvl+0x73/0xb0 [ 14.431711] print_report+0xd1/0x650 [ 14.431735] ? __virt_addr_valid+0x1db/0x2d0 [ 14.431758] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.431780] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.431804] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.431827] kasan_report+0x141/0x180 [ 14.431850] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.431885] kasan_check_range+0x10c/0x1c0 [ 14.431906] __kasan_check_write+0x18/0x20 [ 14.431943] kasan_atomics_helper+0x1e12/0x5450 [ 14.431968] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.431991] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.432014] ? kasan_atomics+0x152/0x310 [ 14.432038] kasan_atomics+0x1dc/0x310 [ 14.432067] ? __pfx_kasan_atomics+0x10/0x10 [ 14.432088] ? __pfx_read_tsc+0x10/0x10 [ 14.432110] ? ktime_get_ts64+0x86/0x230 [ 14.432146] kunit_try_run_case+0x1a5/0x480 [ 14.432172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.432195] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.432229] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.432259] ? __kthread_parkme+0x82/0x180 [ 14.432283] ? preempt_count_sub+0x50/0x80 [ 14.432318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.432342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.432365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.432397] kthread+0x337/0x6f0 [ 14.432414] ? trace_preempt_on+0x20/0xc0 [ 14.432439] ? __pfx_kthread+0x10/0x10 [ 14.432458] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.432491] ? calculate_sigpending+0x7b/0xa0 [ 14.432514] ? __pfx_kthread+0x10/0x10 [ 14.432534] ret_from_fork+0x41/0x80 [ 14.432554] ? __pfx_kthread+0x10/0x10 [ 14.432574] ret_from_fork_asm+0x1a/0x30 [ 14.432615] </TASK> [ 14.432627] [ 14.440350] Allocated by task 284: [ 14.440541] kasan_save_stack+0x45/0x70 [ 14.440792] kasan_save_track+0x18/0x40 [ 14.441034] kasan_save_alloc_info+0x3b/0x50 [ 14.441226] __kasan_kmalloc+0xb7/0xc0 [ 14.441426] __kmalloc_cache_noprof+0x189/0x420 [ 14.441732] kasan_atomics+0x95/0x310 [ 14.441951] kunit_try_run_case+0x1a5/0x480 [ 14.442164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.442364] kthread+0x337/0x6f0 [ 14.442490] ret_from_fork+0x41/0x80 [ 14.442774] ret_from_fork_asm+0x1a/0x30 [ 14.442995] [ 14.443124] The buggy address belongs to the object at ffff888102a0bf80 [ 14.443124] which belongs to the cache kmalloc-64 of size 64 [ 14.443739] The buggy address is located 0 bytes to the right of [ 14.443739] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.444347] [ 14.444446] The buggy address belongs to the physical page: [ 14.444740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.445119] flags: 0x200000000000000(node=0|zone=2) [ 14.445282] page_type: f5(slab) [ 14.445405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.445739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.446152] page dumped because: kasan: bad access detected [ 14.446493] [ 14.446667] Memory state around the buggy address: [ 14.446961] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.447273] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.447482] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.447826] ^ [ 14.448095] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.448541] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.448948] ================================================================== [ 13.512615] ================================================================== [ 13.513127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 13.513456] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.513746] [ 13.513859] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.513905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.513929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.513951] Call Trace: [ 13.513970] <TASK> [ 13.513989] dump_stack_lvl+0x73/0xb0 [ 13.514014] print_report+0xd1/0x650 [ 13.514037] ? __virt_addr_valid+0x1db/0x2d0 [ 13.514060] ? kasan_atomics_helper+0x72f/0x5450 [ 13.514082] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.514105] ? kasan_atomics_helper+0x72f/0x5450 [ 13.514128] kasan_report+0x141/0x180 [ 13.514151] ? kasan_atomics_helper+0x72f/0x5450 [ 13.514178] kasan_check_range+0x10c/0x1c0 [ 13.514199] __kasan_check_write+0x18/0x20 [ 13.514220] kasan_atomics_helper+0x72f/0x5450 [ 13.514243] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.514266] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.514289] ? kasan_atomics+0x152/0x310 [ 13.514312] kasan_atomics+0x1dc/0x310 [ 13.514332] ? __pfx_kasan_atomics+0x10/0x10 [ 13.514353] ? __pfx_read_tsc+0x10/0x10 [ 13.514374] ? ktime_get_ts64+0x86/0x230 [ 13.514399] kunit_try_run_case+0x1a5/0x480 [ 13.514425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.514448] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.514473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.514498] ? __kthread_parkme+0x82/0x180 [ 13.514521] ? preempt_count_sub+0x50/0x80 [ 13.514547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.514572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.514596] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.514620] kthread+0x337/0x6f0 [ 13.514637] ? trace_preempt_on+0x20/0xc0 [ 13.514661] ? __pfx_kthread+0x10/0x10 [ 13.514680] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.514703] ? calculate_sigpending+0x7b/0xa0 [ 13.514725] ? __pfx_kthread+0x10/0x10 [ 13.514744] ret_from_fork+0x41/0x80 [ 13.514765] ? __pfx_kthread+0x10/0x10 [ 13.514784] ret_from_fork_asm+0x1a/0x30 [ 13.514826] </TASK> [ 13.514837] [ 13.526527] Allocated by task 284: [ 13.526736] kasan_save_stack+0x45/0x70 [ 13.526899] kasan_save_track+0x18/0x40 [ 13.527765] kasan_save_alloc_info+0x3b/0x50 [ 13.528303] __kasan_kmalloc+0xb7/0xc0 [ 13.528778] __kmalloc_cache_noprof+0x189/0x420 [ 13.529338] kasan_atomics+0x95/0x310 [ 13.529822] kunit_try_run_case+0x1a5/0x480 [ 13.530414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.530960] kthread+0x337/0x6f0 [ 13.531576] ret_from_fork+0x41/0x80 [ 13.532051] ret_from_fork_asm+0x1a/0x30 [ 13.532687] [ 13.532773] The buggy address belongs to the object at ffff888102a0bf80 [ 13.532773] which belongs to the cache kmalloc-64 of size 64 [ 13.534199] The buggy address is located 0 bytes to the right of [ 13.534199] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.534964] [ 13.535342] The buggy address belongs to the physical page: [ 13.536102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.536974] flags: 0x200000000000000(node=0|zone=2) [ 13.537153] page_type: f5(slab) [ 13.537282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.537527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.537764] page dumped because: kasan: bad access detected [ 13.537948] [ 13.538021] Memory state around the buggy address: [ 13.538181] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.538400] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.538617] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.538829] ^ [ 13.539230] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.540084] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.540855] ================================================================== [ 14.062425] ================================================================== [ 14.062857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.063117] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.063344] [ 14.063434] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.063480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.063494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.063516] Call Trace: [ 14.063538] <TASK> [ 14.063558] dump_stack_lvl+0x73/0xb0 [ 14.063583] print_report+0xd1/0x650 [ 14.063606] ? __virt_addr_valid+0x1db/0x2d0 [ 14.063630] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.063652] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.063676] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.063699] kasan_report+0x141/0x180 [ 14.063722] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.063750] __asan_report_store8_noabort+0x1b/0x30 [ 14.063772] kasan_atomics_helper+0x50d4/0x5450 [ 14.063796] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.063819] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.063842] ? kasan_atomics+0x152/0x310 [ 14.063866] kasan_atomics+0x1dc/0x310 [ 14.063886] ? __pfx_kasan_atomics+0x10/0x10 [ 14.063907] ? __pfx_read_tsc+0x10/0x10 [ 14.063940] ? ktime_get_ts64+0x86/0x230 [ 14.063966] kunit_try_run_case+0x1a5/0x480 [ 14.063992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.064015] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.064040] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.064065] ? __kthread_parkme+0x82/0x180 [ 14.064088] ? preempt_count_sub+0x50/0x80 [ 14.064114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.064139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.064163] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.064187] kthread+0x337/0x6f0 [ 14.064206] ? trace_preempt_on+0x20/0xc0 [ 14.064232] ? __pfx_kthread+0x10/0x10 [ 14.064255] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.064277] ? calculate_sigpending+0x7b/0xa0 [ 14.064300] ? __pfx_kthread+0x10/0x10 [ 14.064319] ret_from_fork+0x41/0x80 [ 14.064340] ? __pfx_kthread+0x10/0x10 [ 14.064358] ret_from_fork_asm+0x1a/0x30 [ 14.064390] </TASK> [ 14.064401] [ 14.072033] Allocated by task 284: [ 14.072359] kasan_save_stack+0x45/0x70 [ 14.072573] kasan_save_track+0x18/0x40 [ 14.072771] kasan_save_alloc_info+0x3b/0x50 [ 14.072989] __kasan_kmalloc+0xb7/0xc0 [ 14.073180] __kmalloc_cache_noprof+0x189/0x420 [ 14.073369] kasan_atomics+0x95/0x310 [ 14.073534] kunit_try_run_case+0x1a5/0x480 [ 14.073717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.073885] kthread+0x337/0x6f0 [ 14.074012] ret_from_fork+0x41/0x80 [ 14.074139] ret_from_fork_asm+0x1a/0x30 [ 14.074277] [ 14.074376] The buggy address belongs to the object at ffff888102a0bf80 [ 14.074376] which belongs to the cache kmalloc-64 of size 64 [ 14.075344] The buggy address is located 0 bytes to the right of [ 14.075344] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.075818] [ 14.075911] The buggy address belongs to the physical page: [ 14.076116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.076357] flags: 0x200000000000000(node=0|zone=2) [ 14.076524] page_type: f5(slab) [ 14.076765] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.077116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.077448] page dumped because: kasan: bad access detected [ 14.077774] [ 14.077842] Memory state around the buggy address: [ 14.078050] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.078368] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.078687] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.078970] ^ [ 14.079150] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.079357] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.079562] ================================================================== [ 14.099951] ================================================================== [ 14.100316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.100696] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.101172] [ 14.101266] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.101313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.101326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.101350] Call Trace: [ 14.101369] <TASK> [ 14.101389] dump_stack_lvl+0x73/0xb0 [ 14.101414] print_report+0xd1/0x650 [ 14.101439] ? __virt_addr_valid+0x1db/0x2d0 [ 14.101461] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.101483] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.101507] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.101530] kasan_report+0x141/0x180 [ 14.101553] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.101593] kasan_check_range+0x10c/0x1c0 [ 14.101614] __kasan_check_write+0x18/0x20 [ 14.101664] kasan_atomics_helper+0x15b6/0x5450 [ 14.101688] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.101711] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.101752] ? kasan_atomics+0x152/0x310 [ 14.101777] kasan_atomics+0x1dc/0x310 [ 14.101797] ? __pfx_kasan_atomics+0x10/0x10 [ 14.101835] ? __pfx_read_tsc+0x10/0x10 [ 14.101856] ? ktime_get_ts64+0x86/0x230 [ 14.101882] kunit_try_run_case+0x1a5/0x480 [ 14.101937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.101960] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.101985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.102011] ? __kthread_parkme+0x82/0x180 [ 14.102034] ? preempt_count_sub+0x50/0x80 [ 14.102079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.102104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.102127] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.102152] kthread+0x337/0x6f0 [ 14.102169] ? trace_preempt_on+0x20/0xc0 [ 14.102194] ? __pfx_kthread+0x10/0x10 [ 14.102230] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.102254] ? calculate_sigpending+0x7b/0xa0 [ 14.102277] ? __pfx_kthread+0x10/0x10 [ 14.102296] ret_from_fork+0x41/0x80 [ 14.102317] ? __pfx_kthread+0x10/0x10 [ 14.102336] ret_from_fork_asm+0x1a/0x30 [ 14.102367] </TASK> [ 14.102378] [ 14.110389] Allocated by task 284: [ 14.110578] kasan_save_stack+0x45/0x70 [ 14.110773] kasan_save_track+0x18/0x40 [ 14.110996] kasan_save_alloc_info+0x3b/0x50 [ 14.111222] __kasan_kmalloc+0xb7/0xc0 [ 14.111405] __kmalloc_cache_noprof+0x189/0x420 [ 14.111607] kasan_atomics+0x95/0x310 [ 14.111757] kunit_try_run_case+0x1a5/0x480 [ 14.111902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.112139] kthread+0x337/0x6f0 [ 14.112331] ret_from_fork+0x41/0x80 [ 14.112533] ret_from_fork_asm+0x1a/0x30 [ 14.112773] [ 14.112913] The buggy address belongs to the object at ffff888102a0bf80 [ 14.112913] which belongs to the cache kmalloc-64 of size 64 [ 14.114239] The buggy address is located 0 bytes to the right of [ 14.114239] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.114690] [ 14.114767] The buggy address belongs to the physical page: [ 14.115024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.115969] flags: 0x200000000000000(node=0|zone=2) [ 14.116222] page_type: f5(slab) [ 14.116396] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.117623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.117935] page dumped because: kasan: bad access detected [ 14.118116] [ 14.118188] Memory state around the buggy address: [ 14.118352] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.118579] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.118799] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.119022] ^ [ 14.119179] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.119398] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.119615] ================================================================== [ 13.355459] ================================================================== [ 13.355826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.356257] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.356638] [ 13.356763] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.356810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.356824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.356864] Call Trace: [ 13.356877] <TASK> [ 13.356895] dump_stack_lvl+0x73/0xb0 [ 13.356947] print_report+0xd1/0x650 [ 13.356985] ? __virt_addr_valid+0x1db/0x2d0 [ 13.357034] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.357056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.357080] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.357103] kasan_report+0x141/0x180 [ 13.357125] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.357153] __asan_report_store4_noabort+0x1b/0x30 [ 13.357175] kasan_atomics_helper+0x4b6e/0x5450 [ 13.357199] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.357222] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.357247] ? kasan_atomics+0x152/0x310 [ 13.357271] kasan_atomics+0x1dc/0x310 [ 13.357291] ? __pfx_kasan_atomics+0x10/0x10 [ 13.357313] ? __pfx_read_tsc+0x10/0x10 [ 13.357334] ? ktime_get_ts64+0x86/0x230 [ 13.357360] kunit_try_run_case+0x1a5/0x480 [ 13.357386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.357408] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.357433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.357457] ? __kthread_parkme+0x82/0x180 [ 13.357480] ? preempt_count_sub+0x50/0x80 [ 13.357507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.357531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.357556] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.357579] kthread+0x337/0x6f0 [ 13.357597] ? trace_preempt_on+0x20/0xc0 [ 13.357621] ? __pfx_kthread+0x10/0x10 [ 13.357640] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.357662] ? calculate_sigpending+0x7b/0xa0 [ 13.357684] ? __pfx_kthread+0x10/0x10 [ 13.357703] ret_from_fork+0x41/0x80 [ 13.357742] ? __pfx_kthread+0x10/0x10 [ 13.357774] ret_from_fork_asm+0x1a/0x30 [ 13.357819] </TASK> [ 13.357831] [ 13.367128] Allocated by task 284: [ 13.367332] kasan_save_stack+0x45/0x70 [ 13.367807] kasan_save_track+0x18/0x40 [ 13.368035] kasan_save_alloc_info+0x3b/0x50 [ 13.368369] __kasan_kmalloc+0xb7/0xc0 [ 13.368600] __kmalloc_cache_noprof+0x189/0x420 [ 13.368948] kasan_atomics+0x95/0x310 [ 13.369165] kunit_try_run_case+0x1a5/0x480 [ 13.369468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.369836] kthread+0x337/0x6f0 [ 13.369986] ret_from_fork+0x41/0x80 [ 13.370196] ret_from_fork_asm+0x1a/0x30 [ 13.370558] [ 13.370697] The buggy address belongs to the object at ffff888102a0bf80 [ 13.370697] which belongs to the cache kmalloc-64 of size 64 [ 13.371361] The buggy address is located 0 bytes to the right of [ 13.371361] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.372048] [ 13.372297] The buggy address belongs to the physical page: [ 13.372574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.373053] flags: 0x200000000000000(node=0|zone=2) [ 13.373370] page_type: f5(slab) [ 13.373626] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.373982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.374442] page dumped because: kasan: bad access detected [ 13.374893] [ 13.375029] Memory state around the buggy address: [ 13.375363] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.375710] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.376158] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.376550] ^ [ 13.376795] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.377236] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.377648] ================================================================== [ 14.377878] ================================================================== [ 14.378690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 14.379638] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.379967] [ 14.380183] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.380232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.380251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.380275] Call Trace: [ 14.380295] <TASK> [ 14.380316] dump_stack_lvl+0x73/0xb0 [ 14.380344] print_report+0xd1/0x650 [ 14.380368] ? __virt_addr_valid+0x1db/0x2d0 [ 14.380392] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.380414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.380438] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.380461] kasan_report+0x141/0x180 [ 14.380485] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.380513] kasan_check_range+0x10c/0x1c0 [ 14.380534] __kasan_check_write+0x18/0x20 [ 14.380577] kasan_atomics_helper+0x1ce1/0x5450 [ 14.380604] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.380629] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.380653] ? kasan_atomics+0x152/0x310 [ 14.380678] kasan_atomics+0x1dc/0x310 [ 14.380697] ? __pfx_kasan_atomics+0x10/0x10 [ 14.380745] ? __pfx_read_tsc+0x10/0x10 [ 14.380769] ? ktime_get_ts64+0x86/0x230 [ 14.380796] kunit_try_run_case+0x1a5/0x480 [ 14.380833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.380858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.380885] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.380908] ? __kthread_parkme+0x82/0x180 [ 14.380941] ? preempt_count_sub+0x50/0x80 [ 14.380976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.381000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.381034] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.381058] kthread+0x337/0x6f0 [ 14.381075] ? trace_preempt_on+0x20/0xc0 [ 14.381100] ? __pfx_kthread+0x10/0x10 [ 14.381119] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.381141] ? calculate_sigpending+0x7b/0xa0 [ 14.381163] ? __pfx_kthread+0x10/0x10 [ 14.381182] ret_from_fork+0x41/0x80 [ 14.381203] ? __pfx_kthread+0x10/0x10 [ 14.381222] ret_from_fork_asm+0x1a/0x30 [ 14.381254] </TASK> [ 14.381266] [ 14.393007] Allocated by task 284: [ 14.393364] kasan_save_stack+0x45/0x70 [ 14.393761] kasan_save_track+0x18/0x40 [ 14.394139] kasan_save_alloc_info+0x3b/0x50 [ 14.394545] __kasan_kmalloc+0xb7/0xc0 [ 14.394929] __kmalloc_cache_noprof+0x189/0x420 [ 14.395348] kasan_atomics+0x95/0x310 [ 14.395727] kunit_try_run_case+0x1a5/0x480 [ 14.396128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.396636] kthread+0x337/0x6f0 [ 14.396956] ret_from_fork+0x41/0x80 [ 14.397311] ret_from_fork_asm+0x1a/0x30 [ 14.397712] [ 14.397876] The buggy address belongs to the object at ffff888102a0bf80 [ 14.397876] which belongs to the cache kmalloc-64 of size 64 [ 14.398346] The buggy address is located 0 bytes to the right of [ 14.398346] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.399118] [ 14.399279] The buggy address belongs to the physical page: [ 14.399802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.400502] flags: 0x200000000000000(node=0|zone=2) [ 14.400972] page_type: f5(slab) [ 14.401291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.401524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.402220] page dumped because: kasan: bad access detected [ 14.402739] [ 14.402904] Memory state around the buggy address: [ 14.403295] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.403513] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.404142] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.404796] ^ [ 14.405082] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.405302] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.405517] ================================================================== [ 14.638907] ================================================================== [ 14.639581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 14.640253] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.640653] [ 14.640746] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.640795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.640808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.640831] Call Trace: [ 14.640851] <TASK> [ 14.640872] dump_stack_lvl+0x73/0xb0 [ 14.640900] print_report+0xd1/0x650 [ 14.640936] ? __virt_addr_valid+0x1db/0x2d0 [ 14.640959] ? kasan_atomics_helper+0x224c/0x5450 [ 14.640981] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.641005] ? kasan_atomics_helper+0x224c/0x5450 [ 14.641029] kasan_report+0x141/0x180 [ 14.641053] ? kasan_atomics_helper+0x224c/0x5450 [ 14.641081] kasan_check_range+0x10c/0x1c0 [ 14.641102] __kasan_check_write+0x18/0x20 [ 14.641123] kasan_atomics_helper+0x224c/0x5450 [ 14.641147] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.641170] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.641193] ? kasan_atomics+0x152/0x310 [ 14.641217] kasan_atomics+0x1dc/0x310 [ 14.641237] ? __pfx_kasan_atomics+0x10/0x10 [ 14.641258] ? __pfx_read_tsc+0x10/0x10 [ 14.641280] ? ktime_get_ts64+0x86/0x230 [ 14.641306] kunit_try_run_case+0x1a5/0x480 [ 14.641332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.641355] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.641381] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.641405] ? __kthread_parkme+0x82/0x180 [ 14.641429] ? preempt_count_sub+0x50/0x80 [ 14.641455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.641479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.641503] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.641527] kthread+0x337/0x6f0 [ 14.641545] ? trace_preempt_on+0x20/0xc0 [ 14.641569] ? __pfx_kthread+0x10/0x10 [ 14.641588] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.641610] ? calculate_sigpending+0x7b/0xa0 [ 14.641633] ? __pfx_kthread+0x10/0x10 [ 14.641652] ret_from_fork+0x41/0x80 [ 14.641710] ? __pfx_kthread+0x10/0x10 [ 14.641729] ret_from_fork_asm+0x1a/0x30 [ 14.641785] </TASK> [ 14.641797] [ 14.650053] Allocated by task 284: [ 14.650200] kasan_save_stack+0x45/0x70 [ 14.650353] kasan_save_track+0x18/0x40 [ 14.650506] kasan_save_alloc_info+0x3b/0x50 [ 14.650901] __kasan_kmalloc+0xb7/0xc0 [ 14.651148] __kmalloc_cache_noprof+0x189/0x420 [ 14.651405] kasan_atomics+0x95/0x310 [ 14.651577] kunit_try_run_case+0x1a5/0x480 [ 14.651722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.652001] kthread+0x337/0x6f0 [ 14.652213] ret_from_fork+0x41/0x80 [ 14.652402] ret_from_fork_asm+0x1a/0x30 [ 14.652617] [ 14.652693] The buggy address belongs to the object at ffff888102a0bf80 [ 14.652693] which belongs to the cache kmalloc-64 of size 64 [ 14.653051] The buggy address is located 0 bytes to the right of [ 14.653051] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.653595] [ 14.653708] The buggy address belongs to the physical page: [ 14.654035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.654487] flags: 0x200000000000000(node=0|zone=2) [ 14.654970] page_type: f5(slab) [ 14.655155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.655394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.655798] page dumped because: kasan: bad access detected [ 14.656099] [ 14.656206] Memory state around the buggy address: [ 14.656400] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.656718] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.657047] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.657332] ^ [ 14.657484] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.657691] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.658022] ================================================================== [ 14.273277] ================================================================== [ 14.273569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.273954] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.274245] [ 14.274362] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.274411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.274424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.274447] Call Trace: [ 14.274467] <TASK> [ 14.274487] dump_stack_lvl+0x73/0xb0 [ 14.274514] print_report+0xd1/0x650 [ 14.274539] ? __virt_addr_valid+0x1db/0x2d0 [ 14.274564] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.274589] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.274615] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.274638] kasan_report+0x141/0x180 [ 14.274663] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.274690] kasan_check_range+0x10c/0x1c0 [ 14.274711] __kasan_check_write+0x18/0x20 [ 14.274732] kasan_atomics_helper+0x1a7f/0x5450 [ 14.274756] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.274779] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.274802] ? kasan_atomics+0x152/0x310 [ 14.274827] kasan_atomics+0x1dc/0x310 [ 14.274847] ? __pfx_kasan_atomics+0x10/0x10 [ 14.274868] ? __pfx_read_tsc+0x10/0x10 [ 14.274890] ? ktime_get_ts64+0x86/0x230 [ 14.274927] kunit_try_run_case+0x1a5/0x480 [ 14.274953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.274976] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.275001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.275025] ? __kthread_parkme+0x82/0x180 [ 14.275048] ? preempt_count_sub+0x50/0x80 [ 14.275074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.275098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.275122] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.275147] kthread+0x337/0x6f0 [ 14.275164] ? trace_preempt_on+0x20/0xc0 [ 14.275189] ? __pfx_kthread+0x10/0x10 [ 14.275209] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.275234] ? calculate_sigpending+0x7b/0xa0 [ 14.275261] ? __pfx_kthread+0x10/0x10 [ 14.275282] ret_from_fork+0x41/0x80 [ 14.275305] ? __pfx_kthread+0x10/0x10 [ 14.275324] ret_from_fork_asm+0x1a/0x30 [ 14.275357] </TASK> [ 14.275370] [ 14.282986] Allocated by task 284: [ 14.283173] kasan_save_stack+0x45/0x70 [ 14.283325] kasan_save_track+0x18/0x40 [ 14.283520] kasan_save_alloc_info+0x3b/0x50 [ 14.283933] __kasan_kmalloc+0xb7/0xc0 [ 14.284123] __kmalloc_cache_noprof+0x189/0x420 [ 14.284328] kasan_atomics+0x95/0x310 [ 14.284493] kunit_try_run_case+0x1a5/0x480 [ 14.285299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.285870] kthread+0x337/0x6f0 [ 14.286017] ret_from_fork+0x41/0x80 [ 14.286148] ret_from_fork_asm+0x1a/0x30 [ 14.286306] [ 14.286404] The buggy address belongs to the object at ffff888102a0bf80 [ 14.286404] which belongs to the cache kmalloc-64 of size 64 [ 14.287680] The buggy address is located 0 bytes to the right of [ 14.287680] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.288081] [ 14.288162] The buggy address belongs to the physical page: [ 14.288350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.288610] flags: 0x200000000000000(node=0|zone=2) [ 14.288780] page_type: f5(slab) [ 14.288908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.289150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.289379] page dumped because: kasan: bad access detected [ 14.289550] [ 14.289620] Memory state around the buggy address: [ 14.289779] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.290077] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.290399] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.290854] ^ [ 14.291146] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.291532] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.291964] ================================================================== [ 14.591248] ================================================================== [ 14.591731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 14.592288] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.592517] [ 14.592658] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.592705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.592718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.592740] Call Trace: [ 14.592761] <TASK> [ 14.592781] dump_stack_lvl+0x73/0xb0 [ 14.592845] print_report+0xd1/0x650 [ 14.592870] ? __virt_addr_valid+0x1db/0x2d0 [ 14.592892] ? kasan_atomics_helper+0x218a/0x5450 [ 14.592935] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.592960] ? kasan_atomics_helper+0x218a/0x5450 [ 14.592982] kasan_report+0x141/0x180 [ 14.593005] ? kasan_atomics_helper+0x218a/0x5450 [ 14.593033] kasan_check_range+0x10c/0x1c0 [ 14.593054] __kasan_check_write+0x18/0x20 [ 14.593102] kasan_atomics_helper+0x218a/0x5450 [ 14.593128] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.593151] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.593185] ? kasan_atomics+0x152/0x310 [ 14.593208] kasan_atomics+0x1dc/0x310 [ 14.593253] ? __pfx_kasan_atomics+0x10/0x10 [ 14.593275] ? __pfx_read_tsc+0x10/0x10 [ 14.593296] ? ktime_get_ts64+0x86/0x230 [ 14.593333] kunit_try_run_case+0x1a5/0x480 [ 14.593359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.593408] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.593433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.593457] ? __kthread_parkme+0x82/0x180 [ 14.593490] ? preempt_count_sub+0x50/0x80 [ 14.593517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.593575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.593599] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.593635] kthread+0x337/0x6f0 [ 14.593653] ? trace_preempt_on+0x20/0xc0 [ 14.593677] ? __pfx_kthread+0x10/0x10 [ 14.593729] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.593753] ? calculate_sigpending+0x7b/0xa0 [ 14.593776] ? __pfx_kthread+0x10/0x10 [ 14.593805] ret_from_fork+0x41/0x80 [ 14.593827] ? __pfx_kthread+0x10/0x10 [ 14.593868] ret_from_fork_asm+0x1a/0x30 [ 14.593900] </TASK> [ 14.593912] [ 14.602432] Allocated by task 284: [ 14.602615] kasan_save_stack+0x45/0x70 [ 14.602825] kasan_save_track+0x18/0x40 [ 14.603047] kasan_save_alloc_info+0x3b/0x50 [ 14.603275] __kasan_kmalloc+0xb7/0xc0 [ 14.603451] __kmalloc_cache_noprof+0x189/0x420 [ 14.603724] kasan_atomics+0x95/0x310 [ 14.603913] kunit_try_run_case+0x1a5/0x480 [ 14.604161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.604435] kthread+0x337/0x6f0 [ 14.604648] ret_from_fork+0x41/0x80 [ 14.604828] ret_from_fork_asm+0x1a/0x30 [ 14.605030] [ 14.605155] The buggy address belongs to the object at ffff888102a0bf80 [ 14.605155] which belongs to the cache kmalloc-64 of size 64 [ 14.605714] The buggy address is located 0 bytes to the right of [ 14.605714] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.606276] [ 14.606411] The buggy address belongs to the physical page: [ 14.606781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.607118] flags: 0x200000000000000(node=0|zone=2) [ 14.607453] page_type: f5(slab) [ 14.607643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.607911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.608256] page dumped because: kasan: bad access detected [ 14.608542] [ 14.608633] Memory state around the buggy address: [ 14.608962] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.609173] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.609487] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.610211] ^ [ 14.610449] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.610735] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.611099] ================================================================== [ 13.898642] ================================================================== [ 13.899280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 13.899522] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.899739] [ 13.899856] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.899901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.899934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.899956] Call Trace: [ 13.899974] <TASK> [ 13.899991] dump_stack_lvl+0x73/0xb0 [ 13.900015] print_report+0xd1/0x650 [ 13.900038] ? __virt_addr_valid+0x1db/0x2d0 [ 13.900061] ? kasan_atomics_helper+0x4a02/0x5450 [ 13.900083] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.900107] ? kasan_atomics_helper+0x4a02/0x5450 [ 13.900129] kasan_report+0x141/0x180 [ 13.900152] ? kasan_atomics_helper+0x4a02/0x5450 [ 13.900179] __asan_report_load4_noabort+0x18/0x20 [ 13.900201] kasan_atomics_helper+0x4a02/0x5450 [ 13.900224] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.900255] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.900278] ? kasan_atomics+0x152/0x310 [ 13.900302] kasan_atomics+0x1dc/0x310 [ 13.900324] ? __pfx_kasan_atomics+0x10/0x10 [ 13.900346] ? __pfx_read_tsc+0x10/0x10 [ 13.900366] ? ktime_get_ts64+0x86/0x230 [ 13.900392] kunit_try_run_case+0x1a5/0x480 [ 13.900417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.900440] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.900464] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.900497] ? __kthread_parkme+0x82/0x180 [ 13.900521] ? preempt_count_sub+0x50/0x80 [ 13.900547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.900572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.900595] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.900620] kthread+0x337/0x6f0 [ 13.900638] ? trace_preempt_on+0x20/0xc0 [ 13.900663] ? __pfx_kthread+0x10/0x10 [ 13.900692] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.900715] ? calculate_sigpending+0x7b/0xa0 [ 13.900737] ? __pfx_kthread+0x10/0x10 [ 13.900767] ret_from_fork+0x41/0x80 [ 13.900789] ? __pfx_kthread+0x10/0x10 [ 13.900807] ret_from_fork_asm+0x1a/0x30 [ 13.900839] </TASK> [ 13.900849] [ 13.908495] Allocated by task 284: [ 13.908699] kasan_save_stack+0x45/0x70 [ 13.908843] kasan_save_track+0x18/0x40 [ 13.909031] kasan_save_alloc_info+0x3b/0x50 [ 13.909238] __kasan_kmalloc+0xb7/0xc0 [ 13.909420] __kmalloc_cache_noprof+0x189/0x420 [ 13.909643] kasan_atomics+0x95/0x310 [ 13.909791] kunit_try_run_case+0x1a5/0x480 [ 13.909945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.910115] kthread+0x337/0x6f0 [ 13.910229] ret_from_fork+0x41/0x80 [ 13.910357] ret_from_fork_asm+0x1a/0x30 [ 13.910490] [ 13.910559] The buggy address belongs to the object at ffff888102a0bf80 [ 13.910559] which belongs to the cache kmalloc-64 of size 64 [ 13.910899] The buggy address is located 0 bytes to the right of [ 13.910899] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.911438] [ 13.911531] The buggy address belongs to the physical page: [ 13.912038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.912409] flags: 0x200000000000000(node=0|zone=2) [ 13.912649] page_type: f5(slab) [ 13.912818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.913246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.913517] page dumped because: kasan: bad access detected [ 13.913905] [ 13.913982] Memory state around the buggy address: [ 13.914133] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.914340] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.914546] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.914861] ^ [ 13.915093] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.915447] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.915953] ================================================================== [ 14.120200] ================================================================== [ 14.120587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.121308] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.121961] [ 14.122140] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.122188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.122200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.122224] Call Trace: [ 14.122244] <TASK> [ 14.122267] dump_stack_lvl+0x73/0xb0 [ 14.122295] print_report+0xd1/0x650 [ 14.122319] ? __virt_addr_valid+0x1db/0x2d0 [ 14.122343] ? kasan_atomics_helper+0x164f/0x5450 [ 14.122366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.122390] ? kasan_atomics_helper+0x164f/0x5450 [ 14.122414] kasan_report+0x141/0x180 [ 14.122438] ? kasan_atomics_helper+0x164f/0x5450 [ 14.122466] kasan_check_range+0x10c/0x1c0 [ 14.122487] __kasan_check_write+0x18/0x20 [ 14.122508] kasan_atomics_helper+0x164f/0x5450 [ 14.122532] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.122587] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.122610] ? kasan_atomics+0x152/0x310 [ 14.122634] kasan_atomics+0x1dc/0x310 [ 14.122666] ? __pfx_kasan_atomics+0x10/0x10 [ 14.122688] ? __pfx_read_tsc+0x10/0x10 [ 14.122709] ? ktime_get_ts64+0x86/0x230 [ 14.122735] kunit_try_run_case+0x1a5/0x480 [ 14.122761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.122784] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.122809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.122834] ? __kthread_parkme+0x82/0x180 [ 14.122857] ? preempt_count_sub+0x50/0x80 [ 14.122883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.122908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.122940] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.122964] kthread+0x337/0x6f0 [ 14.122981] ? trace_preempt_on+0x20/0xc0 [ 14.123006] ? __pfx_kthread+0x10/0x10 [ 14.123025] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.123047] ? calculate_sigpending+0x7b/0xa0 [ 14.123070] ? __pfx_kthread+0x10/0x10 [ 14.123089] ret_from_fork+0x41/0x80 [ 14.123110] ? __pfx_kthread+0x10/0x10 [ 14.123129] ret_from_fork_asm+0x1a/0x30 [ 14.123161] </TASK> [ 14.123172] [ 14.135945] Allocated by task 284: [ 14.136326] kasan_save_stack+0x45/0x70 [ 14.136740] kasan_save_track+0x18/0x40 [ 14.137054] kasan_save_alloc_info+0x3b/0x50 [ 14.137203] __kasan_kmalloc+0xb7/0xc0 [ 14.137337] __kmalloc_cache_noprof+0x189/0x420 [ 14.137492] kasan_atomics+0x95/0x310 [ 14.137815] kunit_try_run_case+0x1a5/0x480 [ 14.138228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.138720] kthread+0x337/0x6f0 [ 14.139047] ret_from_fork+0x41/0x80 [ 14.139399] ret_from_fork_asm+0x1a/0x30 [ 14.139790] [ 14.139957] The buggy address belongs to the object at ffff888102a0bf80 [ 14.139957] which belongs to the cache kmalloc-64 of size 64 [ 14.141012] The buggy address is located 0 bytes to the right of [ 14.141012] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.141383] [ 14.141458] The buggy address belongs to the physical page: [ 14.141825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.142525] flags: 0x200000000000000(node=0|zone=2) [ 14.143009] page_type: f5(slab) [ 14.143309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.143991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.144672] page dumped because: kasan: bad access detected [ 14.145161] [ 14.145309] Memory state around the buggy address: [ 14.145672] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.145892] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.146121] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.146334] ^ [ 14.146493] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.147094] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.147737] ================================================================== [ 14.322398] ================================================================== [ 14.323112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 14.323464] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.324028] [ 14.324231] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.324290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.324303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.324326] Call Trace: [ 14.324347] <TASK> [ 14.324368] dump_stack_lvl+0x73/0xb0 [ 14.324396] print_report+0xd1/0x650 [ 14.324432] ? __virt_addr_valid+0x1db/0x2d0 [ 14.324456] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.324478] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.324513] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.324536] kasan_report+0x141/0x180 [ 14.324579] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.324606] kasan_check_range+0x10c/0x1c0 [ 14.324627] __kasan_check_write+0x18/0x20 [ 14.324648] kasan_atomics_helper+0x1c18/0x5450 [ 14.324671] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.324694] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.324717] ? kasan_atomics+0x152/0x310 [ 14.324742] kasan_atomics+0x1dc/0x310 [ 14.324761] ? __pfx_kasan_atomics+0x10/0x10 [ 14.324782] ? __pfx_read_tsc+0x10/0x10 [ 14.324804] ? ktime_get_ts64+0x86/0x230 [ 14.324831] kunit_try_run_case+0x1a5/0x480 [ 14.324858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.324882] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.324906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.324940] ? __kthread_parkme+0x82/0x180 [ 14.324964] ? preempt_count_sub+0x50/0x80 [ 14.324990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.325013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.325036] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.325060] kthread+0x337/0x6f0 [ 14.325077] ? trace_preempt_on+0x20/0xc0 [ 14.325102] ? __pfx_kthread+0x10/0x10 [ 14.325121] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.325143] ? calculate_sigpending+0x7b/0xa0 [ 14.325166] ? __pfx_kthread+0x10/0x10 [ 14.325185] ret_from_fork+0x41/0x80 [ 14.325208] ? __pfx_kthread+0x10/0x10 [ 14.325226] ret_from_fork_asm+0x1a/0x30 [ 14.325259] </TASK> [ 14.325271] [ 14.336508] Allocated by task 284: [ 14.336652] kasan_save_stack+0x45/0x70 [ 14.336802] kasan_save_track+0x18/0x40 [ 14.336993] kasan_save_alloc_info+0x3b/0x50 [ 14.337358] __kasan_kmalloc+0xb7/0xc0 [ 14.337726] __kmalloc_cache_noprof+0x189/0x420 [ 14.338175] kasan_atomics+0x95/0x310 [ 14.338546] kunit_try_run_case+0x1a5/0x480 [ 14.338963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.339442] kthread+0x337/0x6f0 [ 14.339774] ret_from_fork+0x41/0x80 [ 14.340117] ret_from_fork_asm+0x1a/0x30 [ 14.340497] [ 14.340694] The buggy address belongs to the object at ffff888102a0bf80 [ 14.340694] which belongs to the cache kmalloc-64 of size 64 [ 14.341835] The buggy address is located 0 bytes to the right of [ 14.341835] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.342943] [ 14.343111] The buggy address belongs to the physical page: [ 14.343633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.344320] flags: 0x200000000000000(node=0|zone=2) [ 14.344780] page_type: f5(slab) [ 14.345094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.345718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.345960] page dumped because: kasan: bad access detected [ 14.346132] [ 14.346200] Memory state around the buggy address: [ 14.346360] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.346637] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.347261] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.347890] ^ [ 14.348331] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.348964] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.349594] ================================================================== [ 13.415795] ================================================================== [ 13.416807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 13.417100] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.417415] [ 13.417528] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.417575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.417587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.417609] Call Trace: [ 13.417628] <TASK> [ 13.417647] dump_stack_lvl+0x73/0xb0 [ 13.417672] print_report+0xd1/0x650 [ 13.417696] ? __virt_addr_valid+0x1db/0x2d0 [ 13.417718] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.417740] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.417763] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.417786] kasan_report+0x141/0x180 [ 13.417809] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.417836] kasan_check_range+0x10c/0x1c0 [ 13.417856] __kasan_check_write+0x18/0x20 [ 13.417878] kasan_atomics_helper+0x4a0/0x5450 [ 13.417902] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.417937] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.417959] ? kasan_atomics+0x152/0x310 [ 13.417983] kasan_atomics+0x1dc/0x310 [ 13.418003] ? __pfx_kasan_atomics+0x10/0x10 [ 13.418024] ? __pfx_read_tsc+0x10/0x10 [ 13.418045] ? ktime_get_ts64+0x86/0x230 [ 13.418072] kunit_try_run_case+0x1a5/0x480 [ 13.418098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.418121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.418146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.418171] ? __kthread_parkme+0x82/0x180 [ 13.418194] ? preempt_count_sub+0x50/0x80 [ 13.418221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.418246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.418270] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.418294] kthread+0x337/0x6f0 [ 13.418312] ? trace_preempt_on+0x20/0xc0 [ 13.418337] ? __pfx_kthread+0x10/0x10 [ 13.418355] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.418377] ? calculate_sigpending+0x7b/0xa0 [ 13.418400] ? __pfx_kthread+0x10/0x10 [ 13.418420] ret_from_fork+0x41/0x80 [ 13.418441] ? __pfx_kthread+0x10/0x10 [ 13.418459] ret_from_fork_asm+0x1a/0x30 [ 13.418492] </TASK> [ 13.418504] [ 13.425840] Allocated by task 284: [ 13.426037] kasan_save_stack+0x45/0x70 [ 13.426240] kasan_save_track+0x18/0x40 [ 13.426408] kasan_save_alloc_info+0x3b/0x50 [ 13.426556] __kasan_kmalloc+0xb7/0xc0 [ 13.426742] __kmalloc_cache_noprof+0x189/0x420 [ 13.426975] kasan_atomics+0x95/0x310 [ 13.427140] kunit_try_run_case+0x1a5/0x480 [ 13.427287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.427509] kthread+0x337/0x6f0 [ 13.427798] ret_from_fork+0x41/0x80 [ 13.427991] ret_from_fork_asm+0x1a/0x30 [ 13.428164] [ 13.428269] The buggy address belongs to the object at ffff888102a0bf80 [ 13.428269] which belongs to the cache kmalloc-64 of size 64 [ 13.428807] The buggy address is located 0 bytes to the right of [ 13.428807] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.429297] [ 13.429371] The buggy address belongs to the physical page: [ 13.429544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.429908] flags: 0x200000000000000(node=0|zone=2) [ 13.430162] page_type: f5(slab) [ 13.430310] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.430593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.430954] page dumped because: kasan: bad access detected [ 13.431174] [ 13.431268] Memory state around the buggy address: [ 13.431463] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.431763] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.432022] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.432237] ^ [ 13.432397] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.432642] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.432963] ================================================================== [ 14.175868] ================================================================== [ 14.176202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.176568] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.176904] [ 14.177029] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.177088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.177101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.177135] Call Trace: [ 14.177155] <TASK> [ 14.177175] dump_stack_lvl+0x73/0xb0 [ 14.177200] print_report+0xd1/0x650 [ 14.177225] ? __virt_addr_valid+0x1db/0x2d0 [ 14.177248] ? kasan_atomics_helper+0x177f/0x5450 [ 14.177281] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.177305] ? kasan_atomics_helper+0x177f/0x5450 [ 14.177328] kasan_report+0x141/0x180 [ 14.177362] ? kasan_atomics_helper+0x177f/0x5450 [ 14.177389] kasan_check_range+0x10c/0x1c0 [ 14.177410] __kasan_check_write+0x18/0x20 [ 14.177430] kasan_atomics_helper+0x177f/0x5450 [ 14.177454] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.177478] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.177500] ? kasan_atomics+0x152/0x310 [ 14.177524] kasan_atomics+0x1dc/0x310 [ 14.177544] ? __pfx_kasan_atomics+0x10/0x10 [ 14.177576] ? __pfx_read_tsc+0x10/0x10 [ 14.177597] ? ktime_get_ts64+0x86/0x230 [ 14.177623] kunit_try_run_case+0x1a5/0x480 [ 14.177650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.177674] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.177700] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.177724] ? __kthread_parkme+0x82/0x180 [ 14.177756] ? preempt_count_sub+0x50/0x80 [ 14.177783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.177807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.177842] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.177866] kthread+0x337/0x6f0 [ 14.177884] ? trace_preempt_on+0x20/0xc0 [ 14.177909] ? __pfx_kthread+0x10/0x10 [ 14.177936] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.177959] ? calculate_sigpending+0x7b/0xa0 [ 14.177981] ? __pfx_kthread+0x10/0x10 [ 14.178001] ret_from_fork+0x41/0x80 [ 14.178022] ? __pfx_kthread+0x10/0x10 [ 14.178041] ret_from_fork_asm+0x1a/0x30 [ 14.178073] </TASK> [ 14.178085] [ 14.185930] Allocated by task 284: [ 14.186118] kasan_save_stack+0x45/0x70 [ 14.186334] kasan_save_track+0x18/0x40 [ 14.186513] kasan_save_alloc_info+0x3b/0x50 [ 14.186746] __kasan_kmalloc+0xb7/0xc0 [ 14.186940] __kmalloc_cache_noprof+0x189/0x420 [ 14.187151] kasan_atomics+0x95/0x310 [ 14.187282] kunit_try_run_case+0x1a5/0x480 [ 14.187429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.187737] kthread+0x337/0x6f0 [ 14.187905] ret_from_fork+0x41/0x80 [ 14.188101] ret_from_fork_asm+0x1a/0x30 [ 14.188301] [ 14.188396] The buggy address belongs to the object at ffff888102a0bf80 [ 14.188396] which belongs to the cache kmalloc-64 of size 64 [ 14.188884] The buggy address is located 0 bytes to the right of [ 14.188884] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.189429] [ 14.189544] The buggy address belongs to the physical page: [ 14.189789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.190169] flags: 0x200000000000000(node=0|zone=2) [ 14.190339] page_type: f5(slab) [ 14.190466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.190704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.191020] page dumped because: kasan: bad access detected [ 14.191324] [ 14.191430] Memory state around the buggy address: [ 14.191676] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.192019] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.192357] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.192577] ^ [ 14.192802] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.193152] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.193467] ================================================================== [ 13.960665] ================================================================== [ 13.961622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 13.962021] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.962338] [ 13.962429] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.962475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.962487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.962510] Call Trace: [ 13.962529] <TASK> [ 13.962548] dump_stack_lvl+0x73/0xb0 [ 13.962575] print_report+0xd1/0x650 [ 13.962597] ? __virt_addr_valid+0x1db/0x2d0 [ 13.962621] ? kasan_atomics_helper+0x12e6/0x5450 [ 13.962642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.962666] ? kasan_atomics_helper+0x12e6/0x5450 [ 13.962690] kasan_report+0x141/0x180 [ 13.962717] ? kasan_atomics_helper+0x12e6/0x5450 [ 13.962757] kasan_check_range+0x10c/0x1c0 [ 13.962779] __kasan_check_write+0x18/0x20 [ 13.962800] kasan_atomics_helper+0x12e6/0x5450 [ 13.962835] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.962860] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.962883] ? kasan_atomics+0x152/0x310 [ 13.962908] kasan_atomics+0x1dc/0x310 [ 13.962937] ? __pfx_kasan_atomics+0x10/0x10 [ 13.962959] ? __pfx_read_tsc+0x10/0x10 [ 13.962979] ? ktime_get_ts64+0x86/0x230 [ 13.963006] kunit_try_run_case+0x1a5/0x480 [ 13.963031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.963054] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.963079] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.963103] ? __kthread_parkme+0x82/0x180 [ 13.963126] ? preempt_count_sub+0x50/0x80 [ 13.963153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.963177] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.963209] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.963233] kthread+0x337/0x6f0 [ 13.963251] ? trace_preempt_on+0x20/0xc0 [ 13.963286] ? __pfx_kthread+0x10/0x10 [ 13.963304] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.963335] ? calculate_sigpending+0x7b/0xa0 [ 13.963357] ? __pfx_kthread+0x10/0x10 [ 13.963377] ret_from_fork+0x41/0x80 [ 13.963398] ? __pfx_kthread+0x10/0x10 [ 13.963426] ret_from_fork_asm+0x1a/0x30 [ 13.963458] </TASK> [ 13.963469] [ 13.971716] Allocated by task 284: [ 13.971905] kasan_save_stack+0x45/0x70 [ 13.972127] kasan_save_track+0x18/0x40 [ 13.972325] kasan_save_alloc_info+0x3b/0x50 [ 13.972539] __kasan_kmalloc+0xb7/0xc0 [ 13.972784] __kmalloc_cache_noprof+0x189/0x420 [ 13.973016] kasan_atomics+0x95/0x310 [ 13.973182] kunit_try_run_case+0x1a5/0x480 [ 13.973330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.973505] kthread+0x337/0x6f0 [ 13.973624] ret_from_fork+0x41/0x80 [ 13.973755] ret_from_fork_asm+0x1a/0x30 [ 13.973895] [ 13.974001] The buggy address belongs to the object at ffff888102a0bf80 [ 13.974001] which belongs to the cache kmalloc-64 of size 64 [ 13.974551] The buggy address is located 0 bytes to the right of [ 13.974551] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.975313] [ 13.975400] The buggy address belongs to the physical page: [ 13.975577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.975968] flags: 0x200000000000000(node=0|zone=2) [ 13.976192] page_type: f5(slab) [ 13.976358] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.976593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.976830] page dumped because: kasan: bad access detected [ 13.977089] [ 13.977195] Memory state around the buggy address: [ 13.977436] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.977833] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.978181] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.978521] ^ [ 13.978761] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.979020] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.979308] ================================================================== [ 14.532054] ================================================================== [ 14.532351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 14.532753] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.533090] [ 14.533195] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.533254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.533267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.533302] Call Trace: [ 14.533350] <TASK> [ 14.533372] dump_stack_lvl+0x73/0xb0 [ 14.533426] print_report+0xd1/0x650 [ 14.533476] ? __virt_addr_valid+0x1db/0x2d0 [ 14.533513] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.533548] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.533595] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.533636] kasan_report+0x141/0x180 [ 14.533687] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.533715] __asan_report_load8_noabort+0x18/0x20 [ 14.533737] kasan_atomics_helper+0x4f98/0x5450 [ 14.533771] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.533795] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.533817] ? kasan_atomics+0x152/0x310 [ 14.533842] kasan_atomics+0x1dc/0x310 [ 14.533862] ? __pfx_kasan_atomics+0x10/0x10 [ 14.533884] ? __pfx_read_tsc+0x10/0x10 [ 14.533906] ? ktime_get_ts64+0x86/0x230 [ 14.533942] kunit_try_run_case+0x1a5/0x480 [ 14.533968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.533992] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.534017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.534042] ? __kthread_parkme+0x82/0x180 [ 14.534064] ? preempt_count_sub+0x50/0x80 [ 14.534091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.534141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.534166] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.534216] kthread+0x337/0x6f0 [ 14.534235] ? trace_preempt_on+0x20/0xc0 [ 14.534285] ? __pfx_kthread+0x10/0x10 [ 14.534304] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.534343] ? calculate_sigpending+0x7b/0xa0 [ 14.534376] ? __pfx_kthread+0x10/0x10 [ 14.534396] ret_from_fork+0x41/0x80 [ 14.534418] ? __pfx_kthread+0x10/0x10 [ 14.534437] ret_from_fork_asm+0x1a/0x30 [ 14.534470] </TASK> [ 14.534482] [ 14.542461] Allocated by task 284: [ 14.542720] kasan_save_stack+0x45/0x70 [ 14.542968] kasan_save_track+0x18/0x40 [ 14.543194] kasan_save_alloc_info+0x3b/0x50 [ 14.543380] __kasan_kmalloc+0xb7/0xc0 [ 14.543511] __kmalloc_cache_noprof+0x189/0x420 [ 14.543932] kasan_atomics+0x95/0x310 [ 14.544116] kunit_try_run_case+0x1a5/0x480 [ 14.544346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.544518] kthread+0x337/0x6f0 [ 14.544634] ret_from_fork+0x41/0x80 [ 14.544866] ret_from_fork_asm+0x1a/0x30 [ 14.545021] [ 14.545139] The buggy address belongs to the object at ffff888102a0bf80 [ 14.545139] which belongs to the cache kmalloc-64 of size 64 [ 14.545736] The buggy address is located 0 bytes to the right of [ 14.545736] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.546285] [ 14.546433] The buggy address belongs to the physical page: [ 14.546740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.547105] flags: 0x200000000000000(node=0|zone=2) [ 14.547370] page_type: f5(slab) [ 14.547579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.548028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.548266] page dumped because: kasan: bad access detected [ 14.548496] [ 14.548696] Memory state around the buggy address: [ 14.548987] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.549330] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.549684] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.550025] ^ [ 14.550269] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.550634] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.551074] ================================================================== [ 13.475945] ================================================================== [ 13.476578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 13.477176] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.477410] [ 13.477525] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.477586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.477599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.477622] Call Trace: [ 13.477641] <TASK> [ 13.477660] dump_stack_lvl+0x73/0xb0 [ 13.477687] print_report+0xd1/0x650 [ 13.477711] ? __virt_addr_valid+0x1db/0x2d0 [ 13.477734] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.477757] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.477780] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.477803] kasan_report+0x141/0x180 [ 13.477826] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.477854] kasan_check_range+0x10c/0x1c0 [ 13.477874] __kasan_check_write+0x18/0x20 [ 13.477895] kasan_atomics_helper+0x5fe/0x5450 [ 13.477931] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.477955] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.477977] ? kasan_atomics+0x152/0x310 [ 13.478001] kasan_atomics+0x1dc/0x310 [ 13.478020] ? __pfx_kasan_atomics+0x10/0x10 [ 13.478041] ? __pfx_read_tsc+0x10/0x10 [ 13.478062] ? ktime_get_ts64+0x86/0x230 [ 13.478088] kunit_try_run_case+0x1a5/0x480 [ 13.478114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.478137] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.478162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.478186] ? __kthread_parkme+0x82/0x180 [ 13.478209] ? preempt_count_sub+0x50/0x80 [ 13.478236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.478259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.478284] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.478307] kthread+0x337/0x6f0 [ 13.478325] ? trace_preempt_on+0x20/0xc0 [ 13.478350] ? __pfx_kthread+0x10/0x10 [ 13.478368] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.478390] ? calculate_sigpending+0x7b/0xa0 [ 13.478413] ? __pfx_kthread+0x10/0x10 [ 13.478432] ret_from_fork+0x41/0x80 [ 13.478453] ? __pfx_kthread+0x10/0x10 [ 13.478471] ret_from_fork_asm+0x1a/0x30 [ 13.478504] </TASK> [ 13.478515] [ 13.485925] Allocated by task 284: [ 13.486102] kasan_save_stack+0x45/0x70 [ 13.486249] kasan_save_track+0x18/0x40 [ 13.486383] kasan_save_alloc_info+0x3b/0x50 [ 13.486527] __kasan_kmalloc+0xb7/0xc0 [ 13.486658] __kmalloc_cache_noprof+0x189/0x420 [ 13.486889] kasan_atomics+0x95/0x310 [ 13.487083] kunit_try_run_case+0x1a5/0x480 [ 13.487289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.487548] kthread+0x337/0x6f0 [ 13.487818] ret_from_fork+0x41/0x80 [ 13.488016] ret_from_fork_asm+0x1a/0x30 [ 13.488201] [ 13.488290] The buggy address belongs to the object at ffff888102a0bf80 [ 13.488290] which belongs to the cache kmalloc-64 of size 64 [ 13.488747] The buggy address is located 0 bytes to the right of [ 13.488747] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.489270] [ 13.489379] The buggy address belongs to the physical page: [ 13.489588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.489958] flags: 0x200000000000000(node=0|zone=2) [ 13.490174] page_type: f5(slab) [ 13.490318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.490652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.490963] page dumped because: kasan: bad access detected [ 13.491181] [ 13.491268] Memory state around the buggy address: [ 13.491460] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.491782] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.492065] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.492310] ^ [ 13.492465] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.492680] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.492893] ================================================================== [ 13.720544] ================================================================== [ 13.721048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 13.721399] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.721873] [ 13.722001] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.722048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.722061] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.722085] Call Trace: [ 13.722105] <TASK> [ 13.722125] dump_stack_lvl+0x73/0xb0 [ 13.722151] print_report+0xd1/0x650 [ 13.722175] ? __virt_addr_valid+0x1db/0x2d0 [ 13.722198] ? kasan_atomics_helper+0xd47/0x5450 [ 13.722220] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.722256] ? kasan_atomics_helper+0xd47/0x5450 [ 13.722279] kasan_report+0x141/0x180 [ 13.722302] ? kasan_atomics_helper+0xd47/0x5450 [ 13.722340] kasan_check_range+0x10c/0x1c0 [ 13.722361] __kasan_check_write+0x18/0x20 [ 13.722382] kasan_atomics_helper+0xd47/0x5450 [ 13.722414] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.722437] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.722460] ? kasan_atomics+0x152/0x310 [ 13.722494] kasan_atomics+0x1dc/0x310 [ 13.722514] ? __pfx_kasan_atomics+0x10/0x10 [ 13.722535] ? __pfx_read_tsc+0x10/0x10 [ 13.722556] ? ktime_get_ts64+0x86/0x230 [ 13.722590] kunit_try_run_case+0x1a5/0x480 [ 13.722615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.722658] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.722683] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.722707] ? __kthread_parkme+0x82/0x180 [ 13.722730] ? preempt_count_sub+0x50/0x80 [ 13.722764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.722789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.722812] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.722847] kthread+0x337/0x6f0 [ 13.722864] ? trace_preempt_on+0x20/0xc0 [ 13.722888] ? __pfx_kthread+0x10/0x10 [ 13.722906] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.722938] ? calculate_sigpending+0x7b/0xa0 [ 13.722961] ? __pfx_kthread+0x10/0x10 [ 13.722980] ret_from_fork+0x41/0x80 [ 13.723001] ? __pfx_kthread+0x10/0x10 [ 13.723019] ret_from_fork_asm+0x1a/0x30 [ 13.723051] </TASK> [ 13.723064] [ 13.731055] Allocated by task 284: [ 13.731247] kasan_save_stack+0x45/0x70 [ 13.731480] kasan_save_track+0x18/0x40 [ 13.731669] kasan_save_alloc_info+0x3b/0x50 [ 13.731939] __kasan_kmalloc+0xb7/0xc0 [ 13.732162] __kmalloc_cache_noprof+0x189/0x420 [ 13.732355] kasan_atomics+0x95/0x310 [ 13.732485] kunit_try_run_case+0x1a5/0x480 [ 13.732632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.732806] kthread+0x337/0x6f0 [ 13.732935] ret_from_fork+0x41/0x80 [ 13.733067] ret_from_fork_asm+0x1a/0x30 [ 13.733207] [ 13.733295] The buggy address belongs to the object at ffff888102a0bf80 [ 13.733295] which belongs to the cache kmalloc-64 of size 64 [ 13.733975] The buggy address is located 0 bytes to the right of [ 13.733975] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.734508] [ 13.734581] The buggy address belongs to the physical page: [ 13.734756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.735012] flags: 0x200000000000000(node=0|zone=2) [ 13.735177] page_type: f5(slab) [ 13.735302] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.735680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.736030] page dumped because: kasan: bad access detected [ 13.736312] [ 13.736418] Memory state around the buggy address: [ 13.736719] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.737084] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.737458] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.738074] ^ [ 13.738270] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.738486] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.739062] ================================================================== [ 14.571624] ================================================================== [ 14.572015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 14.572610] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.572956] [ 14.573113] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.573160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.573172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.573195] Call Trace: [ 14.573215] <TASK> [ 14.573234] dump_stack_lvl+0x73/0xb0 [ 14.573261] print_report+0xd1/0x650 [ 14.573284] ? __virt_addr_valid+0x1db/0x2d0 [ 14.573308] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.573330] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.573355] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.573378] kasan_report+0x141/0x180 [ 14.573400] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.573428] __asan_report_load8_noabort+0x18/0x20 [ 14.573450] kasan_atomics_helper+0x4fb2/0x5450 [ 14.573474] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.573497] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.573520] ? kasan_atomics+0x152/0x310 [ 14.573545] kasan_atomics+0x1dc/0x310 [ 14.573566] ? __pfx_kasan_atomics+0x10/0x10 [ 14.573587] ? __pfx_read_tsc+0x10/0x10 [ 14.573609] ? ktime_get_ts64+0x86/0x230 [ 14.573635] kunit_try_run_case+0x1a5/0x480 [ 14.573662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.573685] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.573710] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.573734] ? __kthread_parkme+0x82/0x180 [ 14.573757] ? preempt_count_sub+0x50/0x80 [ 14.573784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.573808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.573832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.573855] kthread+0x337/0x6f0 [ 14.573883] ? trace_preempt_on+0x20/0xc0 [ 14.573908] ? __pfx_kthread+0x10/0x10 [ 14.573945] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.573967] ? calculate_sigpending+0x7b/0xa0 [ 14.573990] ? __pfx_kthread+0x10/0x10 [ 14.574009] ret_from_fork+0x41/0x80 [ 14.574031] ? __pfx_kthread+0x10/0x10 [ 14.574050] ret_from_fork_asm+0x1a/0x30 [ 14.574082] </TASK> [ 14.574094] [ 14.582274] Allocated by task 284: [ 14.582470] kasan_save_stack+0x45/0x70 [ 14.582713] kasan_save_track+0x18/0x40 [ 14.582868] kasan_save_alloc_info+0x3b/0x50 [ 14.583098] __kasan_kmalloc+0xb7/0xc0 [ 14.583309] __kmalloc_cache_noprof+0x189/0x420 [ 14.583525] kasan_atomics+0x95/0x310 [ 14.583819] kunit_try_run_case+0x1a5/0x480 [ 14.584074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.584313] kthread+0x337/0x6f0 [ 14.584486] ret_from_fork+0x41/0x80 [ 14.584710] ret_from_fork_asm+0x1a/0x30 [ 14.584927] [ 14.585024] The buggy address belongs to the object at ffff888102a0bf80 [ 14.585024] which belongs to the cache kmalloc-64 of size 64 [ 14.585550] The buggy address is located 0 bytes to the right of [ 14.585550] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.586150] [ 14.586266] The buggy address belongs to the physical page: [ 14.586515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.586950] flags: 0x200000000000000(node=0|zone=2) [ 14.587200] page_type: f5(slab) [ 14.587378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.587735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.588112] page dumped because: kasan: bad access detected [ 14.588397] [ 14.588482] Memory state around the buggy address: [ 14.588749] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.589120] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.589465] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.589755] ^ [ 14.589907] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.590185] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.590492] ================================================================== [ 13.569894] ================================================================== [ 13.570269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 13.570948] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.571271] [ 13.571406] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.571454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.571467] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.571490] Call Trace: [ 13.571511] <TASK> [ 13.571540] dump_stack_lvl+0x73/0xb0 [ 13.571594] print_report+0xd1/0x650 [ 13.571627] ? __virt_addr_valid+0x1db/0x2d0 [ 13.571651] ? kasan_atomics_helper+0x860/0x5450 [ 13.571673] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.571707] ? kasan_atomics_helper+0x860/0x5450 [ 13.571729] kasan_report+0x141/0x180 [ 13.571752] ? kasan_atomics_helper+0x860/0x5450 [ 13.571780] kasan_check_range+0x10c/0x1c0 [ 13.571801] __kasan_check_write+0x18/0x20 [ 13.571821] kasan_atomics_helper+0x860/0x5450 [ 13.571844] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.571867] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.571890] ? kasan_atomics+0x152/0x310 [ 13.571914] kasan_atomics+0x1dc/0x310 [ 13.571942] ? __pfx_kasan_atomics+0x10/0x10 [ 13.571965] ? __pfx_read_tsc+0x10/0x10 [ 13.571986] ? ktime_get_ts64+0x86/0x230 [ 13.572012] kunit_try_run_case+0x1a5/0x480 [ 13.572038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.572061] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.572086] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.572109] ? __kthread_parkme+0x82/0x180 [ 13.572142] ? preempt_count_sub+0x50/0x80 [ 13.572168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.572203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.572227] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.572255] kthread+0x337/0x6f0 [ 13.572272] ? trace_preempt_on+0x20/0xc0 [ 13.572297] ? __pfx_kthread+0x10/0x10 [ 13.572315] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.572337] ? calculate_sigpending+0x7b/0xa0 [ 13.572359] ? __pfx_kthread+0x10/0x10 [ 13.572378] ret_from_fork+0x41/0x80 [ 13.572398] ? __pfx_kthread+0x10/0x10 [ 13.572417] ret_from_fork_asm+0x1a/0x30 [ 13.572449] </TASK> [ 13.572460] [ 13.579991] Allocated by task 284: [ 13.580183] kasan_save_stack+0x45/0x70 [ 13.580397] kasan_save_track+0x18/0x40 [ 13.580603] kasan_save_alloc_info+0x3b/0x50 [ 13.580749] __kasan_kmalloc+0xb7/0xc0 [ 13.580911] __kmalloc_cache_noprof+0x189/0x420 [ 13.581137] kasan_atomics+0x95/0x310 [ 13.581348] kunit_try_run_case+0x1a5/0x480 [ 13.581602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.581819] kthread+0x337/0x6f0 [ 13.581994] ret_from_fork+0x41/0x80 [ 13.582203] ret_from_fork_asm+0x1a/0x30 [ 13.582413] [ 13.582490] The buggy address belongs to the object at ffff888102a0bf80 [ 13.582490] which belongs to the cache kmalloc-64 of size 64 [ 13.582990] The buggy address is located 0 bytes to the right of [ 13.582990] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.583385] [ 13.583496] The buggy address belongs to the physical page: [ 13.583822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.584195] flags: 0x200000000000000(node=0|zone=2) [ 13.584433] page_type: f5(slab) [ 13.584628] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.584886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.585231] page dumped because: kasan: bad access detected [ 13.585470] [ 13.585581] Memory state around the buggy address: [ 13.585804] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.586121] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.586387] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.586624] ^ [ 13.586871] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.587195] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.587508] ================================================================== [ 13.625508] ================================================================== [ 13.626107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 13.626457] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.626790] [ 13.626904] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.626971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.626983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.627017] Call Trace: [ 13.627036] <TASK> [ 13.627054] dump_stack_lvl+0x73/0xb0 [ 13.627079] print_report+0xd1/0x650 [ 13.627102] ? __virt_addr_valid+0x1db/0x2d0 [ 13.627124] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.627157] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.627182] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.627217] kasan_report+0x141/0x180 [ 13.627240] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.627267] kasan_check_range+0x10c/0x1c0 [ 13.627289] __kasan_check_write+0x18/0x20 [ 13.627318] kasan_atomics_helper+0xa2b/0x5450 [ 13.627342] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.627367] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.627401] ? kasan_atomics+0x152/0x310 [ 13.627426] kasan_atomics+0x1dc/0x310 [ 13.627447] ? __pfx_kasan_atomics+0x10/0x10 [ 13.627468] ? __pfx_read_tsc+0x10/0x10 [ 13.627488] ? ktime_get_ts64+0x86/0x230 [ 13.627523] kunit_try_run_case+0x1a5/0x480 [ 13.627548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.627571] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.627605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.627629] ? __kthread_parkme+0x82/0x180 [ 13.627662] ? preempt_count_sub+0x50/0x80 [ 13.627688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.627713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.627737] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.627761] kthread+0x337/0x6f0 [ 13.627778] ? trace_preempt_on+0x20/0xc0 [ 13.627802] ? __pfx_kthread+0x10/0x10 [ 13.627822] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.627844] ? calculate_sigpending+0x7b/0xa0 [ 13.627866] ? __pfx_kthread+0x10/0x10 [ 13.627885] ret_from_fork+0x41/0x80 [ 13.627906] ? __pfx_kthread+0x10/0x10 [ 13.627934] ret_from_fork_asm+0x1a/0x30 [ 13.627966] </TASK> [ 13.627976] [ 13.635532] Allocated by task 284: [ 13.635672] kasan_save_stack+0x45/0x70 [ 13.635877] kasan_save_track+0x18/0x40 [ 13.636088] kasan_save_alloc_info+0x3b/0x50 [ 13.636318] __kasan_kmalloc+0xb7/0xc0 [ 13.636510] __kmalloc_cache_noprof+0x189/0x420 [ 13.636847] kasan_atomics+0x95/0x310 [ 13.637020] kunit_try_run_case+0x1a5/0x480 [ 13.637209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.637386] kthread+0x337/0x6f0 [ 13.637591] ret_from_fork+0x41/0x80 [ 13.637775] ret_from_fork_asm+0x1a/0x30 [ 13.637985] [ 13.638099] The buggy address belongs to the object at ffff888102a0bf80 [ 13.638099] which belongs to the cache kmalloc-64 of size 64 [ 13.638613] The buggy address is located 0 bytes to the right of [ 13.638613] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.639150] [ 13.639259] The buggy address belongs to the physical page: [ 13.639508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.639944] flags: 0x200000000000000(node=0|zone=2) [ 13.640170] page_type: f5(slab) [ 13.640350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.640713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.641074] page dumped because: kasan: bad access detected [ 13.641266] [ 13.641335] Memory state around the buggy address: [ 13.641493] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.641708] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.642002] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.642621] ^ [ 13.642802] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.643086] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.643401] ================================================================== [ 13.758537] ================================================================== [ 13.759077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 13.759388] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.759791] [ 13.759895] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.759955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.759968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.759990] Call Trace: [ 13.760006] <TASK> [ 13.760022] dump_stack_lvl+0x73/0xb0 [ 13.760047] print_report+0xd1/0x650 [ 13.760080] ? __virt_addr_valid+0x1db/0x2d0 [ 13.760102] ? kasan_atomics_helper+0xe78/0x5450 [ 13.760124] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.760158] ? kasan_atomics_helper+0xe78/0x5450 [ 13.760181] kasan_report+0x141/0x180 [ 13.760204] ? kasan_atomics_helper+0xe78/0x5450 [ 13.760231] kasan_check_range+0x10c/0x1c0 [ 13.760256] __kasan_check_write+0x18/0x20 [ 13.760276] kasan_atomics_helper+0xe78/0x5450 [ 13.760300] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.760323] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.760346] ? kasan_atomics+0x152/0x310 [ 13.760371] kasan_atomics+0x1dc/0x310 [ 13.760390] ? __pfx_kasan_atomics+0x10/0x10 [ 13.760411] ? __pfx_read_tsc+0x10/0x10 [ 13.760432] ? ktime_get_ts64+0x86/0x230 [ 13.760457] kunit_try_run_case+0x1a5/0x480 [ 13.760484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.760507] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.760531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.760555] ? __kthread_parkme+0x82/0x180 [ 13.760578] ? preempt_count_sub+0x50/0x80 [ 13.760605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.760630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.760654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.760678] kthread+0x337/0x6f0 [ 13.760696] ? trace_preempt_on+0x20/0xc0 [ 13.760720] ? __pfx_kthread+0x10/0x10 [ 13.760739] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.760761] ? calculate_sigpending+0x7b/0xa0 [ 13.760784] ? __pfx_kthread+0x10/0x10 [ 13.760804] ret_from_fork+0x41/0x80 [ 13.760825] ? __pfx_kthread+0x10/0x10 [ 13.760843] ret_from_fork_asm+0x1a/0x30 [ 13.760874] </TASK> [ 13.760885] [ 13.768335] Allocated by task 284: [ 13.768539] kasan_save_stack+0x45/0x70 [ 13.768889] kasan_save_track+0x18/0x40 [ 13.769103] kasan_save_alloc_info+0x3b/0x50 [ 13.769275] __kasan_kmalloc+0xb7/0xc0 [ 13.769408] __kmalloc_cache_noprof+0x189/0x420 [ 13.769602] kasan_atomics+0x95/0x310 [ 13.769789] kunit_try_run_case+0x1a5/0x480 [ 13.770004] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.770253] kthread+0x337/0x6f0 [ 13.770400] ret_from_fork+0x41/0x80 [ 13.770532] ret_from_fork_asm+0x1a/0x30 [ 13.770962] [ 13.771042] The buggy address belongs to the object at ffff888102a0bf80 [ 13.771042] which belongs to the cache kmalloc-64 of size 64 [ 13.771406] The buggy address is located 0 bytes to the right of [ 13.771406] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.771805] [ 13.771904] The buggy address belongs to the physical page: [ 13.772200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.772753] flags: 0x200000000000000(node=0|zone=2) [ 13.772934] page_type: f5(slab) [ 13.773058] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.773288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.773513] page dumped because: kasan: bad access detected [ 13.773682] [ 13.773750] Memory state around the buggy address: [ 13.773906] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.774246] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.774574] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.774893] ^ [ 13.775129] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.775449] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.776056] ================================================================== [ 13.541902] ================================================================== [ 13.542743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 13.543610] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.544383] [ 13.544649] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.544700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.544713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.544770] Call Trace: [ 13.544791] <TASK> [ 13.544811] dump_stack_lvl+0x73/0xb0 [ 13.544839] print_report+0xd1/0x650 [ 13.544865] ? __virt_addr_valid+0x1db/0x2d0 [ 13.544888] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.544911] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.544946] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.544969] kasan_report+0x141/0x180 [ 13.544991] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.545019] kasan_check_range+0x10c/0x1c0 [ 13.545040] __kasan_check_write+0x18/0x20 [ 13.545060] kasan_atomics_helper+0x7c7/0x5450 [ 13.545084] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.545107] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.545130] ? kasan_atomics+0x152/0x310 [ 13.545154] kasan_atomics+0x1dc/0x310 [ 13.545174] ? __pfx_kasan_atomics+0x10/0x10 [ 13.545195] ? __pfx_read_tsc+0x10/0x10 [ 13.545216] ? ktime_get_ts64+0x86/0x230 [ 13.545242] kunit_try_run_case+0x1a5/0x480 [ 13.545286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.545309] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.545334] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.545358] ? __kthread_parkme+0x82/0x180 [ 13.545380] ? preempt_count_sub+0x50/0x80 [ 13.545406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.545431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.545454] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.545477] kthread+0x337/0x6f0 [ 13.545495] ? trace_preempt_on+0x20/0xc0 [ 13.545519] ? __pfx_kthread+0x10/0x10 [ 13.545538] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.545578] ? calculate_sigpending+0x7b/0xa0 [ 13.545601] ? __pfx_kthread+0x10/0x10 [ 13.545620] ret_from_fork+0x41/0x80 [ 13.545642] ? __pfx_kthread+0x10/0x10 [ 13.545660] ret_from_fork_asm+0x1a/0x30 [ 13.545691] </TASK> [ 13.545703] [ 13.557581] Allocated by task 284: [ 13.558001] kasan_save_stack+0x45/0x70 [ 13.558334] kasan_save_track+0x18/0x40 [ 13.558526] kasan_save_alloc_info+0x3b/0x50 [ 13.558978] __kasan_kmalloc+0xb7/0xc0 [ 13.559288] __kmalloc_cache_noprof+0x189/0x420 [ 13.559731] kasan_atomics+0x95/0x310 [ 13.560105] kunit_try_run_case+0x1a5/0x480 [ 13.560517] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.560980] kthread+0x337/0x6f0 [ 13.561270] ret_from_fork+0x41/0x80 [ 13.561680] ret_from_fork_asm+0x1a/0x30 [ 13.562000] [ 13.562228] The buggy address belongs to the object at ffff888102a0bf80 [ 13.562228] which belongs to the cache kmalloc-64 of size 64 [ 13.562945] The buggy address is located 0 bytes to the right of [ 13.562945] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.563459] [ 13.563839] The buggy address belongs to the physical page: [ 13.564231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.565402] flags: 0x200000000000000(node=0|zone=2) [ 13.565679] page_type: f5(slab) [ 13.565872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.566207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.566498] page dumped because: kasan: bad access detected [ 13.566773] [ 13.566872] Memory state around the buggy address: [ 13.567120] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.567402] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.567769] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.568059] ^ [ 13.568293] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.568636] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.568909] ================================================================== [ 13.644233] ================================================================== [ 13.644589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 13.644905] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.645269] [ 13.645378] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.645425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.645437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.645459] Call Trace: [ 13.645476] <TASK> [ 13.645494] dump_stack_lvl+0x73/0xb0 [ 13.645520] print_report+0xd1/0x650 [ 13.645543] ? __virt_addr_valid+0x1db/0x2d0 [ 13.645574] ? kasan_atomics_helper+0xac7/0x5450 [ 13.645596] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.645619] ? kasan_atomics_helper+0xac7/0x5450 [ 13.645652] kasan_report+0x141/0x180 [ 13.645675] ? kasan_atomics_helper+0xac7/0x5450 [ 13.645702] kasan_check_range+0x10c/0x1c0 [ 13.645734] __kasan_check_write+0x18/0x20 [ 13.645754] kasan_atomics_helper+0xac7/0x5450 [ 13.645777] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.645800] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.645832] ? kasan_atomics+0x152/0x310 [ 13.645855] kasan_atomics+0x1dc/0x310 [ 13.645874] ? __pfx_kasan_atomics+0x10/0x10 [ 13.645906] ? __pfx_read_tsc+0x10/0x10 [ 13.645934] ? ktime_get_ts64+0x86/0x230 [ 13.645961] kunit_try_run_case+0x1a5/0x480 [ 13.645987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.646018] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.646043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.646067] ? __kthread_parkme+0x82/0x180 [ 13.646100] ? preempt_count_sub+0x50/0x80 [ 13.646126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.646150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.646184] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.646208] kthread+0x337/0x6f0 [ 13.646226] ? trace_preempt_on+0x20/0xc0 [ 13.646260] ? __pfx_kthread+0x10/0x10 [ 13.646280] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.646303] ? calculate_sigpending+0x7b/0xa0 [ 13.646335] ? __pfx_kthread+0x10/0x10 [ 13.646354] ret_from_fork+0x41/0x80 [ 13.646375] ? __pfx_kthread+0x10/0x10 [ 13.646404] ret_from_fork_asm+0x1a/0x30 [ 13.646435] </TASK> [ 13.646446] [ 13.654302] Allocated by task 284: [ 13.654501] kasan_save_stack+0x45/0x70 [ 13.654794] kasan_save_track+0x18/0x40 [ 13.654966] kasan_save_alloc_info+0x3b/0x50 [ 13.655189] __kasan_kmalloc+0xb7/0xc0 [ 13.655339] __kmalloc_cache_noprof+0x189/0x420 [ 13.655578] kasan_atomics+0x95/0x310 [ 13.655722] kunit_try_run_case+0x1a5/0x480 [ 13.655946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.656167] kthread+0x337/0x6f0 [ 13.656350] ret_from_fork+0x41/0x80 [ 13.656528] ret_from_fork_asm+0x1a/0x30 [ 13.656711] [ 13.656787] The buggy address belongs to the object at ffff888102a0bf80 [ 13.656787] which belongs to the cache kmalloc-64 of size 64 [ 13.657169] The buggy address is located 0 bytes to the right of [ 13.657169] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.657549] [ 13.657643] The buggy address belongs to the physical page: [ 13.658012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.658378] flags: 0x200000000000000(node=0|zone=2) [ 13.658630] page_type: f5(slab) [ 13.658800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.659347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.659573] page dumped because: kasan: bad access detected [ 13.659742] [ 13.659809] Memory state around the buggy address: [ 13.659972] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.660186] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.660852] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.661181] ^ [ 13.661429] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.661751] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.662090] ================================================================== [ 13.606113] ================================================================== [ 13.607057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 13.607421] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.607775] [ 13.607892] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.607948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.607961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.607985] Call Trace: [ 13.608004] <TASK> [ 13.608024] dump_stack_lvl+0x73/0xb0 [ 13.608050] print_report+0xd1/0x650 [ 13.608074] ? __virt_addr_valid+0x1db/0x2d0 [ 13.608097] ? kasan_atomics_helper+0x992/0x5450 [ 13.608119] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.608142] ? kasan_atomics_helper+0x992/0x5450 [ 13.608165] kasan_report+0x141/0x180 [ 13.608199] ? kasan_atomics_helper+0x992/0x5450 [ 13.608226] kasan_check_range+0x10c/0x1c0 [ 13.608253] __kasan_check_write+0x18/0x20 [ 13.608284] kasan_atomics_helper+0x992/0x5450 [ 13.608308] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.608331] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.608354] ? kasan_atomics+0x152/0x310 [ 13.608379] kasan_atomics+0x1dc/0x310 [ 13.608398] ? __pfx_kasan_atomics+0x10/0x10 [ 13.608420] ? __pfx_read_tsc+0x10/0x10 [ 13.608442] ? ktime_get_ts64+0x86/0x230 [ 13.608467] kunit_try_run_case+0x1a5/0x480 [ 13.608494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.608516] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.608541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.608584] ? __kthread_parkme+0x82/0x180 [ 13.608607] ? preempt_count_sub+0x50/0x80 [ 13.608634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.608658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.608682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.608706] kthread+0x337/0x6f0 [ 13.608724] ? trace_preempt_on+0x20/0xc0 [ 13.608748] ? __pfx_kthread+0x10/0x10 [ 13.608767] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.608789] ? calculate_sigpending+0x7b/0xa0 [ 13.608812] ? __pfx_kthread+0x10/0x10 [ 13.608830] ret_from_fork+0x41/0x80 [ 13.608852] ? __pfx_kthread+0x10/0x10 [ 13.608871] ret_from_fork_asm+0x1a/0x30 [ 13.608902] </TASK> [ 13.608912] [ 13.616994] Allocated by task 284: [ 13.617198] kasan_save_stack+0x45/0x70 [ 13.617409] kasan_save_track+0x18/0x40 [ 13.617591] kasan_save_alloc_info+0x3b/0x50 [ 13.617785] __kasan_kmalloc+0xb7/0xc0 [ 13.617969] __kmalloc_cache_noprof+0x189/0x420 [ 13.618196] kasan_atomics+0x95/0x310 [ 13.618392] kunit_try_run_case+0x1a5/0x480 [ 13.618617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.618862] kthread+0x337/0x6f0 [ 13.619011] ret_from_fork+0x41/0x80 [ 13.619144] ret_from_fork_asm+0x1a/0x30 [ 13.619285] [ 13.619356] The buggy address belongs to the object at ffff888102a0bf80 [ 13.619356] which belongs to the cache kmalloc-64 of size 64 [ 13.620078] The buggy address is located 0 bytes to the right of [ 13.620078] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.620455] [ 13.620528] The buggy address belongs to the physical page: [ 13.620839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.621236] flags: 0x200000000000000(node=0|zone=2) [ 13.621506] page_type: f5(slab) [ 13.621713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.622064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.622292] page dumped because: kasan: bad access detected [ 13.622567] [ 13.622659] Memory state around the buggy address: [ 13.622883] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.623168] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.623384] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.624071] ^ [ 13.624239] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.624613] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.624868] ================================================================== [ 13.701779] ================================================================== [ 13.702120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 13.702407] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.702767] [ 13.702880] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.702936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.702949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.702970] Call Trace: [ 13.702989] <TASK> [ 13.703007] dump_stack_lvl+0x73/0xb0 [ 13.703033] print_report+0xd1/0x650 [ 13.703056] ? __virt_addr_valid+0x1db/0x2d0 [ 13.703079] ? kasan_atomics_helper+0x4a84/0x5450 [ 13.703118] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.703151] ? kasan_atomics_helper+0x4a84/0x5450 [ 13.703174] kasan_report+0x141/0x180 [ 13.703197] ? kasan_atomics_helper+0x4a84/0x5450 [ 13.703235] __asan_report_load4_noabort+0x18/0x20 [ 13.703257] kasan_atomics_helper+0x4a84/0x5450 [ 13.703281] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.703304] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.703327] ? kasan_atomics+0x152/0x310 [ 13.703351] kasan_atomics+0x1dc/0x310 [ 13.703370] ? __pfx_kasan_atomics+0x10/0x10 [ 13.703392] ? __pfx_read_tsc+0x10/0x10 [ 13.703413] ? ktime_get_ts64+0x86/0x230 [ 13.703438] kunit_try_run_case+0x1a5/0x480 [ 13.703473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.703496] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.703521] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.703575] ? __kthread_parkme+0x82/0x180 [ 13.703599] ? preempt_count_sub+0x50/0x80 [ 13.703625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.703658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.703682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.703706] kthread+0x337/0x6f0 [ 13.703724] ? trace_preempt_on+0x20/0xc0 [ 13.703747] ? __pfx_kthread+0x10/0x10 [ 13.703767] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.703789] ? calculate_sigpending+0x7b/0xa0 [ 13.703820] ? __pfx_kthread+0x10/0x10 [ 13.703839] ret_from_fork+0x41/0x80 [ 13.703860] ? __pfx_kthread+0x10/0x10 [ 13.703879] ret_from_fork_asm+0x1a/0x30 [ 13.703929] </TASK> [ 13.703940] [ 13.711622] Allocated by task 284: [ 13.711832] kasan_save_stack+0x45/0x70 [ 13.712068] kasan_save_track+0x18/0x40 [ 13.712244] kasan_save_alloc_info+0x3b/0x50 [ 13.712463] __kasan_kmalloc+0xb7/0xc0 [ 13.712712] __kmalloc_cache_noprof+0x189/0x420 [ 13.712941] kasan_atomics+0x95/0x310 [ 13.713073] kunit_try_run_case+0x1a5/0x480 [ 13.713219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.713445] kthread+0x337/0x6f0 [ 13.713626] ret_from_fork+0x41/0x80 [ 13.713807] ret_from_fork_asm+0x1a/0x30 [ 13.714211] [ 13.714288] The buggy address belongs to the object at ffff888102a0bf80 [ 13.714288] which belongs to the cache kmalloc-64 of size 64 [ 13.714710] The buggy address is located 0 bytes to the right of [ 13.714710] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.715405] [ 13.715512] The buggy address belongs to the physical page: [ 13.715725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.716111] flags: 0x200000000000000(node=0|zone=2) [ 13.716356] page_type: f5(slab) [ 13.716527] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.716886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.717219] page dumped because: kasan: bad access detected [ 13.717404] [ 13.717473] Memory state around the buggy address: [ 13.717630] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.717847] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.718315] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.718735] ^ [ 13.718966] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.719243] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.719457] ================================================================== [ 13.813537] ================================================================== [ 13.814076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 13.814434] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.814777] [ 13.814904] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.814967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.814980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.815014] Call Trace: [ 13.815034] <TASK> [ 13.815054] dump_stack_lvl+0x73/0xb0 [ 13.815089] print_report+0xd1/0x650 [ 13.815112] ? __virt_addr_valid+0x1db/0x2d0 [ 13.815134] ? kasan_atomics_helper+0x4a36/0x5450 [ 13.815168] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.815192] ? kasan_atomics_helper+0x4a36/0x5450 [ 13.815216] kasan_report+0x141/0x180 [ 13.815248] ? kasan_atomics_helper+0x4a36/0x5450 [ 13.815276] __asan_report_load4_noabort+0x18/0x20 [ 13.815297] kasan_atomics_helper+0x4a36/0x5450 [ 13.815331] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.815355] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.815377] ? kasan_atomics+0x152/0x310 [ 13.815410] kasan_atomics+0x1dc/0x310 [ 13.815431] ? __pfx_kasan_atomics+0x10/0x10 [ 13.815453] ? __pfx_read_tsc+0x10/0x10 [ 13.815485] ? ktime_get_ts64+0x86/0x230 [ 13.815512] kunit_try_run_case+0x1a5/0x480 [ 13.815545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.815588] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.815623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.815648] ? __kthread_parkme+0x82/0x180 [ 13.815670] ? preempt_count_sub+0x50/0x80 [ 13.815697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.815722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.815746] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.815769] kthread+0x337/0x6f0 [ 13.815787] ? trace_preempt_on+0x20/0xc0 [ 13.815811] ? __pfx_kthread+0x10/0x10 [ 13.815830] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.815852] ? calculate_sigpending+0x7b/0xa0 [ 13.815874] ? __pfx_kthread+0x10/0x10 [ 13.815894] ret_from_fork+0x41/0x80 [ 13.815923] ? __pfx_kthread+0x10/0x10 [ 13.815942] ret_from_fork_asm+0x1a/0x30 [ 13.815974] </TASK> [ 13.815985] [ 13.823482] Allocated by task 284: [ 13.823673] kasan_save_stack+0x45/0x70 [ 13.823827] kasan_save_track+0x18/0x40 [ 13.823974] kasan_save_alloc_info+0x3b/0x50 [ 13.824131] __kasan_kmalloc+0xb7/0xc0 [ 13.824358] __kmalloc_cache_noprof+0x189/0x420 [ 13.824638] kasan_atomics+0x95/0x310 [ 13.824859] kunit_try_run_case+0x1a5/0x480 [ 13.825107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.825365] kthread+0x337/0x6f0 [ 13.825527] ret_from_fork+0x41/0x80 [ 13.825706] ret_from_fork_asm+0x1a/0x30 [ 13.825941] [ 13.826037] The buggy address belongs to the object at ffff888102a0bf80 [ 13.826037] which belongs to the cache kmalloc-64 of size 64 [ 13.826574] The buggy address is located 0 bytes to the right of [ 13.826574] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.827098] [ 13.827199] The buggy address belongs to the physical page: [ 13.827432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.827801] flags: 0x200000000000000(node=0|zone=2) [ 13.828049] page_type: f5(slab) [ 13.828220] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.828546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.828931] page dumped because: kasan: bad access detected [ 13.829139] [ 13.829212] Memory state around the buggy address: [ 13.829370] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.829732] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.830025] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.830238] ^ [ 13.830448] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.830791] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.831142] ================================================================== [ 13.861294] ================================================================== [ 13.861833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 13.862521] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.862828] [ 13.862953] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.863004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.863019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.863043] Call Trace: [ 13.863065] <TASK> [ 13.863087] dump_stack_lvl+0x73/0xb0 [ 13.863116] print_report+0xd1/0x650 [ 13.863140] ? __virt_addr_valid+0x1db/0x2d0 [ 13.863164] ? kasan_atomics_helper+0x4a1c/0x5450 [ 13.863187] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.863210] ? kasan_atomics_helper+0x4a1c/0x5450 [ 13.863233] kasan_report+0x141/0x180 [ 13.863256] ? kasan_atomics_helper+0x4a1c/0x5450 [ 13.863283] __asan_report_load4_noabort+0x18/0x20 [ 13.863305] kasan_atomics_helper+0x4a1c/0x5450 [ 13.863329] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.863353] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.863376] ? kasan_atomics+0x152/0x310 [ 13.863400] kasan_atomics+0x1dc/0x310 [ 13.863420] ? __pfx_kasan_atomics+0x10/0x10 [ 13.863441] ? __pfx_read_tsc+0x10/0x10 [ 13.863463] ? ktime_get_ts64+0x86/0x230 [ 13.863489] kunit_try_run_case+0x1a5/0x480 [ 13.863516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.863539] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.863565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.863590] ? __kthread_parkme+0x82/0x180 [ 13.863613] ? preempt_count_sub+0x50/0x80 [ 13.863639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.863663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.863688] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.863711] kthread+0x337/0x6f0 [ 13.863730] ? trace_preempt_on+0x20/0xc0 [ 13.863754] ? __pfx_kthread+0x10/0x10 [ 13.863773] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.863795] ? calculate_sigpending+0x7b/0xa0 [ 13.863831] ? __pfx_kthread+0x10/0x10 [ 13.863850] ret_from_fork+0x41/0x80 [ 13.863871] ? __pfx_kthread+0x10/0x10 [ 13.863890] ret_from_fork_asm+0x1a/0x30 [ 13.863944] </TASK> [ 13.863955] [ 13.871420] Allocated by task 284: [ 13.871700] kasan_save_stack+0x45/0x70 [ 13.871908] kasan_save_track+0x18/0x40 [ 13.872105] kasan_save_alloc_info+0x3b/0x50 [ 13.872321] __kasan_kmalloc+0xb7/0xc0 [ 13.872509] __kmalloc_cache_noprof+0x189/0x420 [ 13.872816] kasan_atomics+0x95/0x310 [ 13.873005] kunit_try_run_case+0x1a5/0x480 [ 13.873203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.873439] kthread+0x337/0x6f0 [ 13.873623] ret_from_fork+0x41/0x80 [ 13.873802] ret_from_fork_asm+0x1a/0x30 [ 13.873977] [ 13.874101] The buggy address belongs to the object at ffff888102a0bf80 [ 13.874101] which belongs to the cache kmalloc-64 of size 64 [ 13.874583] The buggy address is located 0 bytes to the right of [ 13.874583] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.875116] [ 13.875214] The buggy address belongs to the physical page: [ 13.875412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.875795] flags: 0x200000000000000(node=0|zone=2) [ 13.876046] page_type: f5(slab) [ 13.876223] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.876556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.876823] page dumped because: kasan: bad access detected [ 13.877019] [ 13.877113] Memory state around the buggy address: [ 13.877380] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.877849] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.878167] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.878419] ^ [ 13.878682] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.879019] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.879328] ================================================================== [ 13.916796] ================================================================== [ 13.917075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 13.917314] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.917560] [ 13.917674] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.917720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.917732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.917755] Call Trace: [ 13.917775] <TASK> [ 13.917795] dump_stack_lvl+0x73/0xb0 [ 13.917821] print_report+0xd1/0x650 [ 13.917844] ? __virt_addr_valid+0x1db/0x2d0 [ 13.917866] ? kasan_atomics_helper+0x1217/0x5450 [ 13.917888] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.917912] ? kasan_atomics_helper+0x1217/0x5450 [ 13.918132] kasan_report+0x141/0x180 [ 13.918157] ? kasan_atomics_helper+0x1217/0x5450 [ 13.918198] kasan_check_range+0x10c/0x1c0 [ 13.918219] __kasan_check_write+0x18/0x20 [ 13.918240] kasan_atomics_helper+0x1217/0x5450 [ 13.918263] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.918288] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.918311] ? kasan_atomics+0x152/0x310 [ 13.918335] kasan_atomics+0x1dc/0x310 [ 13.918355] ? __pfx_kasan_atomics+0x10/0x10 [ 13.918376] ? __pfx_read_tsc+0x10/0x10 [ 13.918397] ? ktime_get_ts64+0x86/0x230 [ 13.918423] kunit_try_run_case+0x1a5/0x480 [ 13.918449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.918471] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.918496] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.918520] ? __kthread_parkme+0x82/0x180 [ 13.918542] ? preempt_count_sub+0x50/0x80 [ 13.918578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.918602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.918626] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.918650] kthread+0x337/0x6f0 [ 13.918667] ? trace_preempt_on+0x20/0xc0 [ 13.918691] ? __pfx_kthread+0x10/0x10 [ 13.918710] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.918732] ? calculate_sigpending+0x7b/0xa0 [ 13.918754] ? __pfx_kthread+0x10/0x10 [ 13.918774] ret_from_fork+0x41/0x80 [ 13.918795] ? __pfx_kthread+0x10/0x10 [ 13.918823] ret_from_fork_asm+0x1a/0x30 [ 13.918855] </TASK> [ 13.918866] [ 13.927675] Allocated by task 284: [ 13.928021] kasan_save_stack+0x45/0x70 [ 13.928312] kasan_save_track+0x18/0x40 [ 13.928622] kasan_save_alloc_info+0x3b/0x50 [ 13.928781] __kasan_kmalloc+0xb7/0xc0 [ 13.929020] __kmalloc_cache_noprof+0x189/0x420 [ 13.929464] kasan_atomics+0x95/0x310 [ 13.929871] kunit_try_run_case+0x1a5/0x480 [ 13.930078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.930538] kthread+0x337/0x6f0 [ 13.930883] ret_from_fork+0x41/0x80 [ 13.931208] ret_from_fork_asm+0x1a/0x30 [ 13.931351] [ 13.931423] The buggy address belongs to the object at ffff888102a0bf80 [ 13.931423] which belongs to the cache kmalloc-64 of size 64 [ 13.932280] The buggy address is located 0 bytes to the right of [ 13.932280] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.933365] [ 13.933534] The buggy address belongs to the physical page: [ 13.934048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.934488] flags: 0x200000000000000(node=0|zone=2) [ 13.934690] page_type: f5(slab) [ 13.935019] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.935482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.935869] page dumped because: kasan: bad access detected [ 13.936268] [ 13.936339] Memory state around the buggy address: [ 13.936497] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.936866] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.937330] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.937545] ^ [ 13.938011] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.938633] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.939267] ================================================================== [ 14.002978] ================================================================== [ 14.003307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.003780] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.004087] [ 14.004211] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.004266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.004279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.004302] Call Trace: [ 14.004323] <TASK> [ 14.004343] dump_stack_lvl+0x73/0xb0 [ 14.004370] print_report+0xd1/0x650 [ 14.004395] ? __virt_addr_valid+0x1db/0x2d0 [ 14.004420] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.004442] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.004466] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.004489] kasan_report+0x141/0x180 [ 14.004512] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.004540] kasan_check_range+0x10c/0x1c0 [ 14.004561] __kasan_check_read+0x15/0x20 [ 14.004581] kasan_atomics_helper+0x13b5/0x5450 [ 14.004605] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.004628] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.004651] ? kasan_atomics+0x152/0x310 [ 14.004675] kasan_atomics+0x1dc/0x310 [ 14.004695] ? __pfx_kasan_atomics+0x10/0x10 [ 14.004716] ? __pfx_read_tsc+0x10/0x10 [ 14.004737] ? ktime_get_ts64+0x86/0x230 [ 14.005182] kunit_try_run_case+0x1a5/0x480 [ 14.005218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.005242] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.005268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.005292] ? __kthread_parkme+0x82/0x180 [ 14.005316] ? preempt_count_sub+0x50/0x80 [ 14.005342] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.005366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.005391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.005414] kthread+0x337/0x6f0 [ 14.005432] ? trace_preempt_on+0x20/0xc0 [ 14.005456] ? __pfx_kthread+0x10/0x10 [ 14.005474] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.005496] ? calculate_sigpending+0x7b/0xa0 [ 14.005519] ? __pfx_kthread+0x10/0x10 [ 14.005538] ret_from_fork+0x41/0x80 [ 14.005574] ? __pfx_kthread+0x10/0x10 [ 14.005593] ret_from_fork_asm+0x1a/0x30 [ 14.005625] </TASK> [ 14.005637] [ 14.015319] Allocated by task 284: [ 14.015589] kasan_save_stack+0x45/0x70 [ 14.015864] kasan_save_track+0x18/0x40 [ 14.016074] kasan_save_alloc_info+0x3b/0x50 [ 14.016368] __kasan_kmalloc+0xb7/0xc0 [ 14.016561] __kmalloc_cache_noprof+0x189/0x420 [ 14.016903] kasan_atomics+0x95/0x310 [ 14.017178] kunit_try_run_case+0x1a5/0x480 [ 14.017374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.017750] kthread+0x337/0x6f0 [ 14.017897] ret_from_fork+0x41/0x80 [ 14.018105] ret_from_fork_asm+0x1a/0x30 [ 14.018447] [ 14.018552] The buggy address belongs to the object at ffff888102a0bf80 [ 14.018552] which belongs to the cache kmalloc-64 of size 64 [ 14.019167] The buggy address is located 0 bytes to the right of [ 14.019167] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.019846] [ 14.020048] The buggy address belongs to the physical page: [ 14.020303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.020784] flags: 0x200000000000000(node=0|zone=2) [ 14.021092] page_type: f5(slab) [ 14.021241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.021658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.022061] page dumped because: kasan: bad access detected [ 14.022324] [ 14.022413] Memory state around the buggy address: [ 14.022641] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.023197] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.023604] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.023880] ^ [ 14.024265] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.024685] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.025007] ================================================================== [ 14.026072] ================================================================== [ 14.026392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.026888] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.027137] [ 14.027254] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.027301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.027314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.027339] Call Trace: [ 14.027359] <TASK> [ 14.027379] dump_stack_lvl+0x73/0xb0 [ 14.027406] print_report+0xd1/0x650 [ 14.027430] ? __virt_addr_valid+0x1db/0x2d0 [ 14.027453] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.027476] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.027500] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.027522] kasan_report+0x141/0x180 [ 14.027546] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.027573] __asan_report_load8_noabort+0x18/0x20 [ 14.027594] kasan_atomics_helper+0x4eae/0x5450 [ 14.027620] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.027642] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.027666] ? kasan_atomics+0x152/0x310 [ 14.027690] kasan_atomics+0x1dc/0x310 [ 14.027710] ? __pfx_kasan_atomics+0x10/0x10 [ 14.027742] ? __pfx_read_tsc+0x10/0x10 [ 14.027764] ? ktime_get_ts64+0x86/0x230 [ 14.027790] kunit_try_run_case+0x1a5/0x480 [ 14.027816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.027839] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.027864] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.027891] ? __kthread_parkme+0x82/0x180 [ 14.027926] ? preempt_count_sub+0x50/0x80 [ 14.027953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.027977] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.028001] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.028026] kthread+0x337/0x6f0 [ 14.028043] ? trace_preempt_on+0x20/0xc0 [ 14.028067] ? __pfx_kthread+0x10/0x10 [ 14.028086] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.028109] ? calculate_sigpending+0x7b/0xa0 [ 14.028131] ? __pfx_kthread+0x10/0x10 [ 14.028151] ret_from_fork+0x41/0x80 [ 14.028172] ? __pfx_kthread+0x10/0x10 [ 14.028191] ret_from_fork_asm+0x1a/0x30 [ 14.028223] </TASK> [ 14.028235] [ 14.035225] Allocated by task 284: [ 14.035360] kasan_save_stack+0x45/0x70 [ 14.035600] kasan_save_track+0x18/0x40 [ 14.035792] kasan_save_alloc_info+0x3b/0x50 [ 14.036030] __kasan_kmalloc+0xb7/0xc0 [ 14.036222] __kmalloc_cache_noprof+0x189/0x420 [ 14.036457] kasan_atomics+0x95/0x310 [ 14.036633] kunit_try_run_case+0x1a5/0x480 [ 14.036836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.037061] kthread+0x337/0x6f0 [ 14.037207] ret_from_fork+0x41/0x80 [ 14.037383] ret_from_fork_asm+0x1a/0x30 [ 14.037538] [ 14.037633] The buggy address belongs to the object at ffff888102a0bf80 [ 14.037633] which belongs to the cache kmalloc-64 of size 64 [ 14.038122] The buggy address is located 0 bytes to the right of [ 14.038122] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.038506] [ 14.038601] The buggy address belongs to the physical page: [ 14.038853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.039217] flags: 0x200000000000000(node=0|zone=2) [ 14.039528] page_type: f5(slab) [ 14.039688] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.040079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.040372] page dumped because: kasan: bad access detected [ 14.040564] [ 14.040634] Memory state around the buggy address: [ 14.040791] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.041306] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.041635] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.041905] ^ [ 14.042152] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.042414] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.042749] ================================================================== [ 14.449628] ================================================================== [ 14.450116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 14.450364] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.450862] [ 14.451022] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.451084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.451097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.451121] Call Trace: [ 14.451142] <TASK> [ 14.451163] dump_stack_lvl+0x73/0xb0 [ 14.451189] print_report+0xd1/0x650 [ 14.451213] ? __virt_addr_valid+0x1db/0x2d0 [ 14.451237] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.451259] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.451283] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.451306] kasan_report+0x141/0x180 [ 14.451330] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.451357] kasan_check_range+0x10c/0x1c0 [ 14.451379] __kasan_check_write+0x18/0x20 [ 14.451399] kasan_atomics_helper+0x1eaa/0x5450 [ 14.451423] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.451449] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.451472] ? kasan_atomics+0x152/0x310 [ 14.451497] kasan_atomics+0x1dc/0x310 [ 14.451517] ? __pfx_kasan_atomics+0x10/0x10 [ 14.451539] ? __pfx_read_tsc+0x10/0x10 [ 14.451560] ? ktime_get_ts64+0x86/0x230 [ 14.451587] kunit_try_run_case+0x1a5/0x480 [ 14.451613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.451636] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.451662] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.451718] ? __kthread_parkme+0x82/0x180 [ 14.451741] ? preempt_count_sub+0x50/0x80 [ 14.451767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.451803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.451827] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.451851] kthread+0x337/0x6f0 [ 14.451868] ? trace_preempt_on+0x20/0xc0 [ 14.451895] ? __pfx_kthread+0x10/0x10 [ 14.451913] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.451945] ? calculate_sigpending+0x7b/0xa0 [ 14.451967] ? __pfx_kthread+0x10/0x10 [ 14.451987] ret_from_fork+0x41/0x80 [ 14.452007] ? __pfx_kthread+0x10/0x10 [ 14.452026] ret_from_fork_asm+0x1a/0x30 [ 14.452057] </TASK> [ 14.452069] [ 14.460480] Allocated by task 284: [ 14.460622] kasan_save_stack+0x45/0x70 [ 14.460771] kasan_save_track+0x18/0x40 [ 14.460903] kasan_save_alloc_info+0x3b/0x50 [ 14.461117] __kasan_kmalloc+0xb7/0xc0 [ 14.461306] __kmalloc_cache_noprof+0x189/0x420 [ 14.461583] kasan_atomics+0x95/0x310 [ 14.461842] kunit_try_run_case+0x1a5/0x480 [ 14.462162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.462509] kthread+0x337/0x6f0 [ 14.462816] ret_from_fork+0x41/0x80 [ 14.463011] ret_from_fork_asm+0x1a/0x30 [ 14.463228] [ 14.463350] The buggy address belongs to the object at ffff888102a0bf80 [ 14.463350] which belongs to the cache kmalloc-64 of size 64 [ 14.463928] The buggy address is located 0 bytes to the right of [ 14.463928] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.464405] [ 14.464508] The buggy address belongs to the physical page: [ 14.464895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.465147] flags: 0x200000000000000(node=0|zone=2) [ 14.465308] page_type: f5(slab) [ 14.465431] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.466050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.466410] page dumped because: kasan: bad access detected [ 14.466891] [ 14.467036] Memory state around the buggy address: [ 14.467278] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.467620] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.467877] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.468238] ^ [ 14.468482] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.468828] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.469155] ================================================================== [ 14.551972] ================================================================== [ 14.552327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 14.552739] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.553122] [ 14.553279] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.553340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.553354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.553379] Call Trace: [ 14.553401] <TASK> [ 14.553421] dump_stack_lvl+0x73/0xb0 [ 14.553449] print_report+0xd1/0x650 [ 14.553473] ? __virt_addr_valid+0x1db/0x2d0 [ 14.553497] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.553519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.553543] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.553566] kasan_report+0x141/0x180 [ 14.553601] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.553628] kasan_check_range+0x10c/0x1c0 [ 14.553649] __kasan_check_write+0x18/0x20 [ 14.553670] kasan_atomics_helper+0x20c8/0x5450 [ 14.553693] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.553717] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.553770] ? kasan_atomics+0x152/0x310 [ 14.553795] kasan_atomics+0x1dc/0x310 [ 14.553815] ? __pfx_kasan_atomics+0x10/0x10 [ 14.553848] ? __pfx_read_tsc+0x10/0x10 [ 14.553868] ? ktime_get_ts64+0x86/0x230 [ 14.553895] kunit_try_run_case+0x1a5/0x480 [ 14.553957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.553980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.554016] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.554041] ? __kthread_parkme+0x82/0x180 [ 14.554089] ? preempt_count_sub+0x50/0x80 [ 14.554116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.554141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.554175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.554199] kthread+0x337/0x6f0 [ 14.554241] ? trace_preempt_on+0x20/0xc0 [ 14.554267] ? __pfx_kthread+0x10/0x10 [ 14.554285] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.554318] ? calculate_sigpending+0x7b/0xa0 [ 14.554341] ? __pfx_kthread+0x10/0x10 [ 14.554385] ret_from_fork+0x41/0x80 [ 14.554407] ? __pfx_kthread+0x10/0x10 [ 14.554453] ret_from_fork_asm+0x1a/0x30 [ 14.554515] </TASK> [ 14.554541] [ 14.562790] Allocated by task 284: [ 14.562947] kasan_save_stack+0x45/0x70 [ 14.563144] kasan_save_track+0x18/0x40 [ 14.563385] kasan_save_alloc_info+0x3b/0x50 [ 14.563621] __kasan_kmalloc+0xb7/0xc0 [ 14.563857] __kmalloc_cache_noprof+0x189/0x420 [ 14.564109] kasan_atomics+0x95/0x310 [ 14.564316] kunit_try_run_case+0x1a5/0x480 [ 14.564556] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.564845] kthread+0x337/0x6f0 [ 14.565035] ret_from_fork+0x41/0x80 [ 14.565228] ret_from_fork_asm+0x1a/0x30 [ 14.565456] [ 14.565576] The buggy address belongs to the object at ffff888102a0bf80 [ 14.565576] which belongs to the cache kmalloc-64 of size 64 [ 14.566063] The buggy address is located 0 bytes to the right of [ 14.566063] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.566649] [ 14.566748] The buggy address belongs to the physical page: [ 14.566939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.567338] flags: 0x200000000000000(node=0|zone=2) [ 14.567618] page_type: f5(slab) [ 14.567821] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.568195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.568496] page dumped because: kasan: bad access detected [ 14.568889] [ 14.569007] Memory state around the buggy address: [ 14.569200] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.569595] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.569842] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.570123] ^ [ 14.570277] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.570486] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.571045] ================================================================== [ 14.043342] ================================================================== [ 14.044044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.044376] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 14.044618] [ 14.044709] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 14.044756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.044772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.044795] Call Trace: [ 14.044817] <TASK> [ 14.044837] dump_stack_lvl+0x73/0xb0 [ 14.044862] print_report+0xd1/0x650 [ 14.044887] ? __virt_addr_valid+0x1db/0x2d0 [ 14.044910] ? kasan_atomics_helper+0x1467/0x5450 [ 14.045343] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.045368] ? kasan_atomics_helper+0x1467/0x5450 [ 14.045392] kasan_report+0x141/0x180 [ 14.045418] ? kasan_atomics_helper+0x1467/0x5450 [ 14.045446] kasan_check_range+0x10c/0x1c0 [ 14.045468] __kasan_check_write+0x18/0x20 [ 14.045488] kasan_atomics_helper+0x1467/0x5450 [ 14.045512] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.045535] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.045558] ? kasan_atomics+0x152/0x310 [ 14.045582] kasan_atomics+0x1dc/0x310 [ 14.045602] ? __pfx_kasan_atomics+0x10/0x10 [ 14.045624] ? __pfx_read_tsc+0x10/0x10 [ 14.045645] ? ktime_get_ts64+0x86/0x230 [ 14.045672] kunit_try_run_case+0x1a5/0x480 [ 14.045698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.045721] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.045746] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.045770] ? __kthread_parkme+0x82/0x180 [ 14.045793] ? preempt_count_sub+0x50/0x80 [ 14.045819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.045843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.045867] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.045891] kthread+0x337/0x6f0 [ 14.045908] ? trace_preempt_on+0x20/0xc0 [ 14.046097] ? __pfx_kthread+0x10/0x10 [ 14.046116] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.046138] ? calculate_sigpending+0x7b/0xa0 [ 14.046161] ? __pfx_kthread+0x10/0x10 [ 14.046181] ret_from_fork+0x41/0x80 [ 14.046202] ? __pfx_kthread+0x10/0x10 [ 14.046221] ret_from_fork_asm+0x1a/0x30 [ 14.046253] </TASK> [ 14.046266] [ 14.053870] Allocated by task 284: [ 14.054173] kasan_save_stack+0x45/0x70 [ 14.054350] kasan_save_track+0x18/0x40 [ 14.054489] kasan_save_alloc_info+0x3b/0x50 [ 14.054827] __kasan_kmalloc+0xb7/0xc0 [ 14.055024] __kmalloc_cache_noprof+0x189/0x420 [ 14.055178] kasan_atomics+0x95/0x310 [ 14.055309] kunit_try_run_case+0x1a5/0x480 [ 14.055478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.055737] kthread+0x337/0x6f0 [ 14.055981] ret_from_fork+0x41/0x80 [ 14.056277] ret_from_fork_asm+0x1a/0x30 [ 14.056580] [ 14.056668] The buggy address belongs to the object at ffff888102a0bf80 [ 14.056668] which belongs to the cache kmalloc-64 of size 64 [ 14.057125] The buggy address is located 0 bytes to the right of [ 14.057125] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 14.057491] [ 14.057564] The buggy address belongs to the physical page: [ 14.057739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 14.058105] flags: 0x200000000000000(node=0|zone=2) [ 14.058345] page_type: f5(slab) [ 14.058520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.058861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.059342] page dumped because: kasan: bad access detected [ 14.059545] [ 14.059614] Memory state around the buggy address: [ 14.059771] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.060148] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.060472] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.060904] ^ [ 14.061178] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.061405] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 14.061652] ================================================================== [ 13.493982] ================================================================== [ 13.494346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 13.495173] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284 [ 13.495495] [ 13.495596] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.495640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.495653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.495676] Call Trace: [ 13.495693] <TASK> [ 13.495711] dump_stack_lvl+0x73/0xb0 [ 13.495737] print_report+0xd1/0x650 [ 13.495760] ? __virt_addr_valid+0x1db/0x2d0 [ 13.495783] ? kasan_atomics_helper+0x697/0x5450 [ 13.495804] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.495828] ? kasan_atomics_helper+0x697/0x5450 [ 13.495850] kasan_report+0x141/0x180 [ 13.495873] ? kasan_atomics_helper+0x697/0x5450 [ 13.495900] kasan_check_range+0x10c/0x1c0 [ 13.495934] __kasan_check_write+0x18/0x20 [ 13.495955] kasan_atomics_helper+0x697/0x5450 [ 13.495979] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.496002] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.496024] ? kasan_atomics+0x152/0x310 [ 13.496048] kasan_atomics+0x1dc/0x310 [ 13.496068] ? __pfx_kasan_atomics+0x10/0x10 [ 13.496089] ? __pfx_read_tsc+0x10/0x10 [ 13.496109] ? ktime_get_ts64+0x86/0x230 [ 13.496136] kunit_try_run_case+0x1a5/0x480 [ 13.496161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.496184] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.496209] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.496235] ? __kthread_parkme+0x82/0x180 [ 13.496264] ? preempt_count_sub+0x50/0x80 [ 13.496290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.496314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.496338] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.496361] kthread+0x337/0x6f0 [ 13.496379] ? trace_preempt_on+0x20/0xc0 [ 13.496403] ? __pfx_kthread+0x10/0x10 [ 13.496422] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.496444] ? calculate_sigpending+0x7b/0xa0 [ 13.496467] ? __pfx_kthread+0x10/0x10 [ 13.496486] ret_from_fork+0x41/0x80 [ 13.496507] ? __pfx_kthread+0x10/0x10 [ 13.496526] ret_from_fork_asm+0x1a/0x30 [ 13.496558] </TASK> [ 13.496568] [ 13.503793] Allocated by task 284: [ 13.503942] kasan_save_stack+0x45/0x70 [ 13.504146] kasan_save_track+0x18/0x40 [ 13.504328] kasan_save_alloc_info+0x3b/0x50 [ 13.504505] __kasan_kmalloc+0xb7/0xc0 [ 13.504757] __kmalloc_cache_noprof+0x189/0x420 [ 13.504974] kasan_atomics+0x95/0x310 [ 13.505110] kunit_try_run_case+0x1a5/0x480 [ 13.505258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.505432] kthread+0x337/0x6f0 [ 13.505551] ret_from_fork+0x41/0x80 [ 13.505734] ret_from_fork_asm+0x1a/0x30 [ 13.505938] [ 13.506033] The buggy address belongs to the object at ffff888102a0bf80 [ 13.506033] which belongs to the cache kmalloc-64 of size 64 [ 13.506824] The buggy address is located 0 bytes to the right of [ 13.506824] allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0) [ 13.507229] [ 13.507302] The buggy address belongs to the physical page: [ 13.507769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b [ 13.508140] flags: 0x200000000000000(node=0|zone=2) [ 13.508358] page_type: f5(slab) [ 13.508510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.508949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.509180] page dumped because: kasan: bad access detected [ 13.509436] [ 13.509530] Memory state around the buggy address: [ 13.509949] ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.510220] ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.510511] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.510778] ^ [ 13.510944] ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.511264] ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 13.511612] ==================================================================