Date
June 23, 2025, 1:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.002152] ================================================================== [ 29.002713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 29.002982] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.003436] [ 29.003513] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.003704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.003744] Hardware name: linux,dummy-virt (DT) [ 29.003786] Call trace: [ 29.003837] show_stack+0x20/0x38 (C) [ 29.003960] dump_stack_lvl+0x8c/0xd0 [ 29.004099] print_report+0x118/0x608 [ 29.004220] kasan_report+0xdc/0x128 [ 29.004555] __asan_report_store8_noabort+0x20/0x30 [ 29.004846] kasan_atomics_helper+0x3e5c/0x4858 [ 29.005435] kasan_atomics+0x198/0x2e0 [ 29.005580] kunit_try_run_case+0x170/0x3f0 [ 29.005718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.005871] kthread+0x328/0x630 [ 29.005992] ret_from_fork+0x10/0x20 [ 29.006119] [ 29.006168] Allocated by task 267: [ 29.006284] kasan_save_stack+0x3c/0x68 [ 29.006495] kasan_save_track+0x20/0x40 [ 29.006638] kasan_save_alloc_info+0x40/0x58 [ 29.006757] __kasan_kmalloc+0xd4/0xd8 [ 29.006950] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.007092] kasan_atomics+0xb8/0x2e0 [ 29.007190] kunit_try_run_case+0x170/0x3f0 [ 29.007308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.007547] kthread+0x328/0x630 [ 29.007656] ret_from_fork+0x10/0x20 [ 29.007932] [ 29.008049] The buggy address belongs to the object at fff00000c7054a00 [ 29.008049] which belongs to the cache kmalloc-64 of size 64 [ 29.008222] The buggy address is located 0 bytes to the right of [ 29.008222] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.008376] [ 29.008445] The buggy address belongs to the physical page: [ 29.008520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.008688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.008808] page_type: f5(slab) [ 29.009070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.009419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.009528] page dumped because: kasan: bad access detected [ 29.009657] [ 29.009744] Memory state around the buggy address: [ 29.009882] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.010003] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.010134] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.010329] ^ [ 29.010452] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.010646] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.010754] ================================================================== [ 29.329988] ================================================================== [ 29.330127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 29.330306] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.330490] [ 29.330578] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.330799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.330870] Hardware name: linux,dummy-virt (DT) [ 29.331042] Call trace: [ 29.331106] show_stack+0x20/0x38 (C) [ 29.331273] dump_stack_lvl+0x8c/0xd0 [ 29.331626] print_report+0x118/0x608 [ 29.331815] kasan_report+0xdc/0x128 [ 29.332160] __asan_report_load8_noabort+0x20/0x30 [ 29.332295] kasan_atomics_helper+0x3df4/0x4858 [ 29.332440] kasan_atomics+0x198/0x2e0 [ 29.332660] kunit_try_run_case+0x170/0x3f0 [ 29.332873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.333282] kthread+0x328/0x630 [ 29.333750] ret_from_fork+0x10/0x20 [ 29.333907] [ 29.333965] Allocated by task 267: [ 29.334053] kasan_save_stack+0x3c/0x68 [ 29.334277] kasan_save_track+0x20/0x40 [ 29.334493] kasan_save_alloc_info+0x40/0x58 [ 29.334606] __kasan_kmalloc+0xd4/0xd8 [ 29.334706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.334807] kasan_atomics+0xb8/0x2e0 [ 29.334908] kunit_try_run_case+0x170/0x3f0 [ 29.335017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.335137] kthread+0x328/0x630 [ 29.335228] ret_from_fork+0x10/0x20 [ 29.335342] [ 29.335426] The buggy address belongs to the object at fff00000c7054a00 [ 29.335426] which belongs to the cache kmalloc-64 of size 64 [ 29.335743] The buggy address is located 0 bytes to the right of [ 29.335743] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.335924] [ 29.336014] The buggy address belongs to the physical page: [ 29.336134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.336432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.336574] page_type: f5(slab) [ 29.336777] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.336906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.337115] page dumped because: kasan: bad access detected [ 29.337271] [ 29.337404] Memory state around the buggy address: [ 29.337570] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.337687] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.337796] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.337906] ^ [ 29.338138] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.338248] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.338352] ================================================================== [ 29.177609] ================================================================== [ 29.177711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 29.177816] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.177932] [ 29.178004] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.178198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.178262] Hardware name: linux,dummy-virt (DT) [ 29.178338] Call trace: [ 29.178410] show_stack+0x20/0x38 (C) [ 29.178592] dump_stack_lvl+0x8c/0xd0 [ 29.178739] print_report+0x118/0x608 [ 29.178881] kasan_report+0xdc/0x128 [ 29.179018] kasan_check_range+0x100/0x1a8 [ 29.179165] __kasan_check_write+0x20/0x30 [ 29.179302] kasan_atomics_helper+0x12d8/0x4858 [ 29.179555] kasan_atomics+0x198/0x2e0 [ 29.179860] kunit_try_run_case+0x170/0x3f0 [ 29.180408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.180613] kthread+0x328/0x630 [ 29.180822] ret_from_fork+0x10/0x20 [ 29.181032] [ 29.181092] Allocated by task 267: [ 29.181655] kasan_save_stack+0x3c/0x68 [ 29.181831] kasan_save_track+0x20/0x40 [ 29.182213] kasan_save_alloc_info+0x40/0x58 [ 29.182603] __kasan_kmalloc+0xd4/0xd8 [ 29.182845] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.183073] kasan_atomics+0xb8/0x2e0 [ 29.183218] kunit_try_run_case+0x170/0x3f0 [ 29.183419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.183608] kthread+0x328/0x630 [ 29.183710] ret_from_fork+0x10/0x20 [ 29.183834] [ 29.183886] The buggy address belongs to the object at fff00000c7054a00 [ 29.183886] which belongs to the cache kmalloc-64 of size 64 [ 29.184030] The buggy address is located 0 bytes to the right of [ 29.184030] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.184774] [ 29.185151] The buggy address belongs to the physical page: [ 29.185436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.186160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.186929] page_type: f5(slab) [ 29.187107] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.187861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.188124] page dumped because: kasan: bad access detected [ 29.189514] [ 29.189991] Memory state around the buggy address: [ 29.190269] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.190625] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.191141] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.191265] ^ [ 29.191754] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.192085] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.192188] ================================================================== [ 29.075794] ================================================================== [ 29.075946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 29.076060] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.076245] [ 29.076411] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.076620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.077429] Hardware name: linux,dummy-virt (DT) [ 29.077542] Call trace: [ 29.077620] show_stack+0x20/0x38 (C) [ 29.078170] dump_stack_lvl+0x8c/0xd0 [ 29.078303] print_report+0x118/0x608 [ 29.078994] kasan_report+0xdc/0x128 [ 29.079551] kasan_check_range+0x100/0x1a8 [ 29.079726] __kasan_check_write+0x20/0x30 [ 29.079853] kasan_atomics_helper+0x10c0/0x4858 [ 29.080074] kasan_atomics+0x198/0x2e0 [ 29.080199] kunit_try_run_case+0x170/0x3f0 [ 29.080337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.080876] kthread+0x328/0x630 [ 29.081140] ret_from_fork+0x10/0x20 [ 29.081569] [ 29.081656] Allocated by task 267: [ 29.081915] kasan_save_stack+0x3c/0x68 [ 29.082148] kasan_save_track+0x20/0x40 [ 29.082268] kasan_save_alloc_info+0x40/0x58 [ 29.082367] __kasan_kmalloc+0xd4/0xd8 [ 29.082852] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.082967] kasan_atomics+0xb8/0x2e0 [ 29.083631] kunit_try_run_case+0x170/0x3f0 [ 29.084109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.084222] kthread+0x328/0x630 [ 29.084314] ret_from_fork+0x10/0x20 [ 29.085582] [ 29.085638] The buggy address belongs to the object at fff00000c7054a00 [ 29.085638] which belongs to the cache kmalloc-64 of size 64 [ 29.086438] The buggy address is located 0 bytes to the right of [ 29.086438] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.086596] [ 29.086655] The buggy address belongs to the physical page: [ 29.088476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.088608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.088723] page_type: f5(slab) [ 29.088826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.089523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.089634] page dumped because: kasan: bad access detected [ 29.089715] [ 29.089764] Memory state around the buggy address: [ 29.089849] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.091656] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.092640] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.092895] ^ [ 29.093380] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.094360] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.094951] ================================================================== [ 29.043788] ================================================================== [ 29.043891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 29.044011] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.044461] [ 29.044675] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.045005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.045079] Hardware name: linux,dummy-virt (DT) [ 29.045165] Call trace: [ 29.045235] show_stack+0x20/0x38 (C) [ 29.045458] dump_stack_lvl+0x8c/0xd0 [ 29.046089] print_report+0x118/0x608 [ 29.046230] kasan_report+0xdc/0x128 [ 29.046355] kasan_check_range+0x100/0x1a8 [ 29.046497] __kasan_check_write+0x20/0x30 [ 29.046689] kasan_atomics_helper+0xf88/0x4858 [ 29.047336] kasan_atomics+0x198/0x2e0 [ 29.047512] kunit_try_run_case+0x170/0x3f0 [ 29.047645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.047838] kthread+0x328/0x630 [ 29.048202] ret_from_fork+0x10/0x20 [ 29.048774] [ 29.048838] Allocated by task 267: [ 29.048902] kasan_save_stack+0x3c/0x68 [ 29.048959] kasan_save_track+0x20/0x40 [ 29.049005] kasan_save_alloc_info+0x40/0x58 [ 29.049364] __kasan_kmalloc+0xd4/0xd8 [ 29.049537] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.049670] kasan_atomics+0xb8/0x2e0 [ 29.049762] kunit_try_run_case+0x170/0x3f0 [ 29.049857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.050513] kthread+0x328/0x630 [ 29.050730] ret_from_fork+0x10/0x20 [ 29.051073] [ 29.051214] The buggy address belongs to the object at fff00000c7054a00 [ 29.051214] which belongs to the cache kmalloc-64 of size 64 [ 29.051692] The buggy address is located 0 bytes to the right of [ 29.051692] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.051808] [ 29.051835] The buggy address belongs to the physical page: [ 29.051874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.051939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.052000] page_type: f5(slab) [ 29.052050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.052113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.052164] page dumped because: kasan: bad access detected [ 29.052206] [ 29.052229] Memory state around the buggy address: [ 29.052269] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.052324] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.052378] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.052619] ^ [ 29.052718] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.052833] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.053030] ================================================================== [ 28.924935] ================================================================== [ 28.925042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 28.925167] Read of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 28.925753] [ 28.925842] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.926605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.926739] Hardware name: linux,dummy-virt (DT) [ 28.926974] Call trace: [ 28.927038] show_stack+0x20/0x38 (C) [ 28.927171] dump_stack_lvl+0x8c/0xd0 [ 28.927293] print_report+0x118/0x608 [ 28.927439] kasan_report+0xdc/0x128 [ 28.927709] __asan_report_load4_noabort+0x20/0x30 [ 28.927887] kasan_atomics_helper+0x3dd8/0x4858 [ 28.928038] kasan_atomics+0x198/0x2e0 [ 28.928161] kunit_try_run_case+0x170/0x3f0 [ 28.928506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.928647] kthread+0x328/0x630 [ 28.928808] ret_from_fork+0x10/0x20 [ 28.929171] [ 28.929337] Allocated by task 267: [ 28.929430] kasan_save_stack+0x3c/0x68 [ 28.929543] kasan_save_track+0x20/0x40 [ 28.929650] kasan_save_alloc_info+0x40/0x58 [ 28.929801] __kasan_kmalloc+0xd4/0xd8 [ 28.930069] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.930186] kasan_atomics+0xb8/0x2e0 [ 28.930298] kunit_try_run_case+0x170/0x3f0 [ 28.931518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.931648] kthread+0x328/0x630 [ 28.932235] ret_from_fork+0x10/0x20 [ 28.932620] [ 28.932675] The buggy address belongs to the object at fff00000c7054a00 [ 28.932675] which belongs to the cache kmalloc-64 of size 64 [ 28.932848] The buggy address is located 0 bytes to the right of [ 28.932848] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 28.933040] [ 28.933152] The buggy address belongs to the physical page: [ 28.933341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 28.933494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.933618] page_type: f5(slab) [ 28.933819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.933952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.934057] page dumped because: kasan: bad access detected [ 28.934136] [ 28.934182] Memory state around the buggy address: [ 28.934273] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.935058] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.935374] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.936114] ^ [ 28.936241] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.936358] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.936627] ================================================================== [ 29.226779] ================================================================== [ 29.227513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 29.227657] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.227789] [ 29.227998] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.228205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.228282] Hardware name: linux,dummy-virt (DT) [ 29.228361] Call trace: [ 29.228442] show_stack+0x20/0x38 (C) [ 29.228564] dump_stack_lvl+0x8c/0xd0 [ 29.228685] print_report+0x118/0x608 [ 29.228798] kasan_report+0xdc/0x128 [ 29.228913] __asan_report_load8_noabort+0x20/0x30 [ 29.229038] kasan_atomics_helper+0x3f04/0x4858 [ 29.229153] kasan_atomics+0x198/0x2e0 [ 29.229281] kunit_try_run_case+0x170/0x3f0 [ 29.229426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.229561] kthread+0x328/0x630 [ 29.229678] ret_from_fork+0x10/0x20 [ 29.229796] [ 29.229847] Allocated by task 267: [ 29.229914] kasan_save_stack+0x3c/0x68 [ 29.230009] kasan_save_track+0x20/0x40 [ 29.231071] kasan_save_alloc_info+0x40/0x58 [ 29.231253] __kasan_kmalloc+0xd4/0xd8 [ 29.231355] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.231608] kasan_atomics+0xb8/0x2e0 [ 29.231708] kunit_try_run_case+0x170/0x3f0 [ 29.232437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.232590] kthread+0x328/0x630 [ 29.232817] ret_from_fork+0x10/0x20 [ 29.233090] [ 29.233262] The buggy address belongs to the object at fff00000c7054a00 [ 29.233262] which belongs to the cache kmalloc-64 of size 64 [ 29.233547] The buggy address is located 0 bytes to the right of [ 29.233547] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.233730] [ 29.233788] The buggy address belongs to the physical page: [ 29.233833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.233901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.235284] page_type: f5(slab) [ 29.235521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.236217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.236356] page dumped because: kasan: bad access detected [ 29.236468] [ 29.236524] Memory state around the buggy address: [ 29.236612] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.236867] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.237020] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.237130] ^ [ 29.237232] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.237415] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.237671] ================================================================== [ 29.011936] ================================================================== [ 29.012054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 29.012165] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.012282] [ 29.012350] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.012563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.012635] Hardware name: linux,dummy-virt (DT) [ 29.012711] Call trace: [ 29.012763] show_stack+0x20/0x38 (C) [ 29.012879] dump_stack_lvl+0x8c/0xd0 [ 29.013001] print_report+0x118/0x608 [ 29.013113] kasan_report+0xdc/0x128 [ 29.013236] kasan_check_range+0x100/0x1a8 [ 29.013356] __kasan_check_write+0x20/0x30 [ 29.013499] kasan_atomics_helper+0xeb8/0x4858 [ 29.013640] kasan_atomics+0x198/0x2e0 [ 29.015006] kunit_try_run_case+0x170/0x3f0 [ 29.015233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.015406] kthread+0x328/0x630 [ 29.016223] ret_from_fork+0x10/0x20 [ 29.016638] [ 29.017349] Allocated by task 267: [ 29.017468] kasan_save_stack+0x3c/0x68 [ 29.017654] kasan_save_track+0x20/0x40 [ 29.017910] kasan_save_alloc_info+0x40/0x58 [ 29.018064] __kasan_kmalloc+0xd4/0xd8 [ 29.018167] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.018270] kasan_atomics+0xb8/0x2e0 [ 29.018360] kunit_try_run_case+0x170/0x3f0 [ 29.018483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.018597] kthread+0x328/0x630 [ 29.018695] ret_from_fork+0x10/0x20 [ 29.018787] [ 29.018837] The buggy address belongs to the object at fff00000c7054a00 [ 29.018837] which belongs to the cache kmalloc-64 of size 64 [ 29.018979] The buggy address is located 0 bytes to the right of [ 29.018979] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.021845] [ 29.022267] The buggy address belongs to the physical page: [ 29.023221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.023587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.023797] page_type: f5(slab) [ 29.024929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.025063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.026226] page dumped because: kasan: bad access detected [ 29.026318] [ 29.026368] Memory state around the buggy address: [ 29.027204] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.027648] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.027772] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.027863] ^ [ 29.027947] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.028054] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.029556] ================================================================== [ 29.277535] ================================================================== [ 29.277639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 29.278029] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.278403] [ 29.279011] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.279260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.279882] Hardware name: linux,dummy-virt (DT) [ 29.279969] Call trace: [ 29.280038] show_stack+0x20/0x38 (C) [ 29.280335] dump_stack_lvl+0x8c/0xd0 [ 29.280508] print_report+0x118/0x608 [ 29.280621] kasan_report+0xdc/0x128 [ 29.280745] kasan_check_range+0x100/0x1a8 [ 29.281022] __kasan_check_write+0x20/0x30 [ 29.281167] kasan_atomics_helper+0x154c/0x4858 [ 29.281309] kasan_atomics+0x198/0x2e0 [ 29.281444] kunit_try_run_case+0x170/0x3f0 [ 29.281566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.281757] kthread+0x328/0x630 [ 29.282088] ret_from_fork+0x10/0x20 [ 29.282218] [ 29.282268] Allocated by task 267: [ 29.282372] kasan_save_stack+0x3c/0x68 [ 29.282503] kasan_save_track+0x20/0x40 [ 29.282771] kasan_save_alloc_info+0x40/0x58 [ 29.282933] __kasan_kmalloc+0xd4/0xd8 [ 29.283051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.283156] kasan_atomics+0xb8/0x2e0 [ 29.283270] kunit_try_run_case+0x170/0x3f0 [ 29.283385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.283569] kthread+0x328/0x630 [ 29.283708] ret_from_fork+0x10/0x20 [ 29.284013] [ 29.284311] The buggy address belongs to the object at fff00000c7054a00 [ 29.284311] which belongs to the cache kmalloc-64 of size 64 [ 29.284484] The buggy address is located 0 bytes to the right of [ 29.284484] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.284714] [ 29.284773] The buggy address belongs to the physical page: [ 29.284867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.285168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.285522] page_type: f5(slab) [ 29.285681] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.285808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.285915] page dumped because: kasan: bad access detected [ 29.286036] [ 29.286083] Memory state around the buggy address: [ 29.286163] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.286384] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.286657] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.286848] ^ [ 29.286942] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.287063] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.287175] ================================================================== [ 29.112673] ================================================================== [ 29.112794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 29.113089] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.113263] [ 29.113473] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.114702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.114795] Hardware name: linux,dummy-virt (DT) [ 29.115145] Call trace: [ 29.115487] show_stack+0x20/0x38 (C) [ 29.115621] dump_stack_lvl+0x8c/0xd0 [ 29.116241] print_report+0x118/0x608 [ 29.116363] kasan_report+0xdc/0x128 [ 29.117345] kasan_check_range+0x100/0x1a8 [ 29.118414] __kasan_check_write+0x20/0x30 [ 29.119119] kasan_atomics_helper+0x1190/0x4858 [ 29.119845] kasan_atomics+0x198/0x2e0 [ 29.119969] kunit_try_run_case+0x170/0x3f0 [ 29.120105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.122047] kthread+0x328/0x630 [ 29.122363] ret_from_fork+0x10/0x20 [ 29.123337] [ 29.123410] Allocated by task 267: [ 29.123714] kasan_save_stack+0x3c/0x68 [ 29.124400] kasan_save_track+0x20/0x40 [ 29.124898] kasan_save_alloc_info+0x40/0x58 [ 29.125767] __kasan_kmalloc+0xd4/0xd8 [ 29.125874] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.127364] kasan_atomics+0xb8/0x2e0 [ 29.127563] kunit_try_run_case+0x170/0x3f0 [ 29.127952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.128458] kthread+0x328/0x630 [ 29.128575] ret_from_fork+0x10/0x20 [ 29.128762] [ 29.130531] The buggy address belongs to the object at fff00000c7054a00 [ 29.130531] which belongs to the cache kmalloc-64 of size 64 [ 29.130701] The buggy address is located 0 bytes to the right of [ 29.130701] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.130861] [ 29.130913] The buggy address belongs to the physical page: [ 29.130985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.131111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.131233] page_type: f5(slab) [ 29.133658] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.134116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.135015] page dumped because: kasan: bad access detected [ 29.135094] [ 29.135138] Memory state around the buggy address: [ 29.135215] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.135318] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.135441] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.135540] ^ [ 29.137907] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.138020] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.138117] ================================================================== [ 28.969553] ================================================================== [ 28.969655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 28.969767] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 28.969884] [ 28.970339] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.970573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.970646] Hardware name: linux,dummy-virt (DT) [ 28.970756] Call trace: [ 28.970840] show_stack+0x20/0x38 (C) [ 28.970999] dump_stack_lvl+0x8c/0xd0 [ 28.971163] print_report+0x118/0x608 [ 28.971375] kasan_report+0xdc/0x128 [ 28.971511] kasan_check_range+0x100/0x1a8 [ 28.971631] __kasan_check_read+0x20/0x30 [ 28.971779] kasan_atomics_helper+0xdd4/0x4858 [ 28.971907] kasan_atomics+0x198/0x2e0 [ 28.972019] kunit_try_run_case+0x170/0x3f0 [ 28.972188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.973095] kthread+0x328/0x630 [ 28.973462] ret_from_fork+0x10/0x20 [ 28.973629] [ 28.973685] Allocated by task 267: [ 28.973757] kasan_save_stack+0x3c/0x68 [ 28.973913] kasan_save_track+0x20/0x40 [ 28.974205] kasan_save_alloc_info+0x40/0x58 [ 28.974336] __kasan_kmalloc+0xd4/0xd8 [ 28.974450] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.974618] kasan_atomics+0xb8/0x2e0 [ 28.974735] kunit_try_run_case+0x170/0x3f0 [ 28.975253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.975572] kthread+0x328/0x630 [ 28.975704] ret_from_fork+0x10/0x20 [ 28.975860] [ 28.976105] The buggy address belongs to the object at fff00000c7054a00 [ 28.976105] which belongs to the cache kmalloc-64 of size 64 [ 28.976680] The buggy address is located 0 bytes to the right of [ 28.976680] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 28.977121] [ 28.977314] The buggy address belongs to the physical page: [ 28.977517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 28.977655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.977808] page_type: f5(slab) [ 28.977954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.978097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.978256] page dumped because: kasan: bad access detected [ 28.978441] [ 28.978501] Memory state around the buggy address: [ 28.978643] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.978771] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.979842] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.979974] ^ [ 28.980066] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.980176] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.980316] ================================================================== [ 29.288532] ================================================================== [ 29.288654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 29.288772] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.288893] [ 29.290161] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.290885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.290992] Hardware name: linux,dummy-virt (DT) [ 29.291077] Call trace: [ 29.291150] show_stack+0x20/0x38 (C) [ 29.291283] dump_stack_lvl+0x8c/0xd0 [ 29.291622] print_report+0x118/0x608 [ 29.291848] kasan_report+0xdc/0x128 [ 29.292095] kasan_check_range+0x100/0x1a8 [ 29.292241] __kasan_check_write+0x20/0x30 [ 29.292465] kasan_atomics_helper+0x15b4/0x4858 [ 29.292596] kasan_atomics+0x198/0x2e0 [ 29.292710] kunit_try_run_case+0x170/0x3f0 [ 29.292839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.292975] kthread+0x328/0x630 [ 29.293088] ret_from_fork+0x10/0x20 [ 29.293229] [ 29.293289] Allocated by task 267: [ 29.293365] kasan_save_stack+0x3c/0x68 [ 29.293883] kasan_save_track+0x20/0x40 [ 29.294320] kasan_save_alloc_info+0x40/0x58 [ 29.294627] __kasan_kmalloc+0xd4/0xd8 [ 29.295064] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.295175] kasan_atomics+0xb8/0x2e0 [ 29.295748] kunit_try_run_case+0x170/0x3f0 [ 29.295869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.296098] kthread+0x328/0x630 [ 29.296229] ret_from_fork+0x10/0x20 [ 29.296803] [ 29.296878] The buggy address belongs to the object at fff00000c7054a00 [ 29.296878] which belongs to the cache kmalloc-64 of size 64 [ 29.297039] The buggy address is located 0 bytes to the right of [ 29.297039] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.297327] [ 29.297519] The buggy address belongs to the physical page: [ 29.297604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.297732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.297855] page_type: f5(slab) [ 29.297951] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.298149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.298425] page dumped because: kasan: bad access detected [ 29.298565] [ 29.298617] Memory state around the buggy address: [ 29.298699] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.298879] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.299010] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.299118] ^ [ 29.299287] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.299413] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.299509] ================================================================== [ 29.389547] ================================================================== [ 29.389652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 29.389768] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.389894] [ 29.389993] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.390204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.390288] Hardware name: linux,dummy-virt (DT) [ 29.390377] Call trace: [ 29.390750] show_stack+0x20/0x38 (C) [ 29.390967] dump_stack_lvl+0x8c/0xd0 [ 29.391150] print_report+0x118/0x608 [ 29.391698] kasan_report+0xdc/0x128 [ 29.391983] kasan_check_range+0x100/0x1a8 [ 29.392202] __kasan_check_write+0x20/0x30 [ 29.392426] kasan_atomics_helper+0x17ec/0x4858 [ 29.392629] kasan_atomics+0x198/0x2e0 [ 29.392810] kunit_try_run_case+0x170/0x3f0 [ 29.393051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.393226] kthread+0x328/0x630 [ 29.393852] ret_from_fork+0x10/0x20 [ 29.394105] [ 29.394602] Allocated by task 267: [ 29.394685] kasan_save_stack+0x3c/0x68 [ 29.394741] kasan_save_track+0x20/0x40 [ 29.394789] kasan_save_alloc_info+0x40/0x58 [ 29.394919] __kasan_kmalloc+0xd4/0xd8 [ 29.395145] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.395303] kasan_atomics+0xb8/0x2e0 [ 29.395555] kunit_try_run_case+0x170/0x3f0 [ 29.395677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.395800] kthread+0x328/0x630 [ 29.396062] ret_from_fork+0x10/0x20 [ 29.396184] [ 29.396247] The buggy address belongs to the object at fff00000c7054a00 [ 29.396247] which belongs to the cache kmalloc-64 of size 64 [ 29.396409] The buggy address is located 0 bytes to the right of [ 29.396409] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.396695] [ 29.396829] The buggy address belongs to the physical page: [ 29.396918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.397072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.397359] page_type: f5(slab) [ 29.397562] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.397775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.397891] page dumped because: kasan: bad access detected [ 29.398037] [ 29.398102] Memory state around the buggy address: [ 29.398261] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.398407] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.398525] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.398625] ^ [ 29.398708] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.398896] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.399122] ================================================================== [ 29.250258] ================================================================== [ 29.250807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 29.250974] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.251103] [ 29.251272] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.251773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.251847] Hardware name: linux,dummy-virt (DT) [ 29.251966] Call trace: [ 29.252053] show_stack+0x20/0x38 (C) [ 29.252547] dump_stack_lvl+0x8c/0xd0 [ 29.252689] print_report+0x118/0x608 [ 29.252808] kasan_report+0xdc/0x128 [ 29.253240] kasan_check_range+0x100/0x1a8 [ 29.254070] __kasan_check_write+0x20/0x30 [ 29.254276] kasan_atomics_helper+0x147c/0x4858 [ 29.254467] kasan_atomics+0x198/0x2e0 [ 29.254739] kunit_try_run_case+0x170/0x3f0 [ 29.254878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.255019] kthread+0x328/0x630 [ 29.255138] ret_from_fork+0x10/0x20 [ 29.255273] [ 29.255322] Allocated by task 267: [ 29.255465] kasan_save_stack+0x3c/0x68 [ 29.255600] kasan_save_track+0x20/0x40 [ 29.255881] kasan_save_alloc_info+0x40/0x58 [ 29.256076] __kasan_kmalloc+0xd4/0xd8 [ 29.256171] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.256263] kasan_atomics+0xb8/0x2e0 [ 29.256353] kunit_try_run_case+0x170/0x3f0 [ 29.256504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.256788] kthread+0x328/0x630 [ 29.256888] ret_from_fork+0x10/0x20 [ 29.256987] [ 29.257068] The buggy address belongs to the object at fff00000c7054a00 [ 29.257068] which belongs to the cache kmalloc-64 of size 64 [ 29.257440] The buggy address is located 0 bytes to the right of [ 29.257440] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.257616] [ 29.257682] The buggy address belongs to the physical page: [ 29.257771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.257977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.259249] page_type: f5(slab) [ 29.259679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.259869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.259981] page dumped because: kasan: bad access detected [ 29.260317] [ 29.260721] Memory state around the buggy address: [ 29.260821] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.261204] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.261325] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.261446] ^ [ 29.261530] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.261637] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.261732] ================================================================== [ 29.375674] ================================================================== [ 29.375793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 29.376145] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.376271] [ 29.376364] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.376930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.377131] Hardware name: linux,dummy-virt (DT) [ 29.377289] Call trace: [ 29.377348] show_stack+0x20/0x38 (C) [ 29.377507] dump_stack_lvl+0x8c/0xd0 [ 29.378112] print_report+0x118/0x608 [ 29.378711] kasan_report+0xdc/0x128 [ 29.379227] __asan_report_load8_noabort+0x20/0x30 [ 29.379517] kasan_atomics_helper+0x3e20/0x4858 [ 29.379775] kasan_atomics+0x198/0x2e0 [ 29.380275] kunit_try_run_case+0x170/0x3f0 [ 29.380434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.381007] kthread+0x328/0x630 [ 29.381166] ret_from_fork+0x10/0x20 [ 29.381570] [ 29.381704] Allocated by task 267: [ 29.381783] kasan_save_stack+0x3c/0x68 [ 29.381891] kasan_save_track+0x20/0x40 [ 29.382190] kasan_save_alloc_info+0x40/0x58 [ 29.382350] __kasan_kmalloc+0xd4/0xd8 [ 29.382550] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.383473] kasan_atomics+0xb8/0x2e0 [ 29.383578] kunit_try_run_case+0x170/0x3f0 [ 29.383673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.383782] kthread+0x328/0x630 [ 29.383871] ret_from_fork+0x10/0x20 [ 29.383971] [ 29.384026] The buggy address belongs to the object at fff00000c7054a00 [ 29.384026] which belongs to the cache kmalloc-64 of size 64 [ 29.384962] The buggy address is located 0 bytes to the right of [ 29.384962] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.385140] [ 29.385214] The buggy address belongs to the physical page: [ 29.385304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.385474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.385616] page_type: f5(slab) [ 29.385761] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.386025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.386133] page dumped because: kasan: bad access detected [ 29.386213] [ 29.386261] Memory state around the buggy address: [ 29.386344] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.386488] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.387884] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.387973] ^ [ 29.388059] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.388357] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.388485] ================================================================== [ 28.981970] ================================================================== [ 28.982077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 28.982182] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 28.982302] [ 28.982384] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.982660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.982748] Hardware name: linux,dummy-virt (DT) [ 28.982844] Call trace: [ 28.983262] show_stack+0x20/0x38 (C) [ 28.983423] dump_stack_lvl+0x8c/0xd0 [ 28.983606] print_report+0x118/0x608 [ 28.983772] kasan_report+0xdc/0x128 [ 28.983918] __asan_report_load8_noabort+0x20/0x30 [ 28.984299] kasan_atomics_helper+0x3f58/0x4858 [ 28.984454] kasan_atomics+0x198/0x2e0 [ 28.984775] kunit_try_run_case+0x170/0x3f0 [ 28.984906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.985080] kthread+0x328/0x630 [ 28.985239] ret_from_fork+0x10/0x20 [ 28.985416] [ 28.985466] Allocated by task 267: [ 28.985557] kasan_save_stack+0x3c/0x68 [ 28.985672] kasan_save_track+0x20/0x40 [ 28.986227] kasan_save_alloc_info+0x40/0x58 [ 28.986348] __kasan_kmalloc+0xd4/0xd8 [ 28.986783] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.986969] kasan_atomics+0xb8/0x2e0 [ 28.987063] kunit_try_run_case+0x170/0x3f0 [ 28.987170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.987314] kthread+0x328/0x630 [ 28.987476] ret_from_fork+0x10/0x20 [ 28.987791] [ 28.987882] The buggy address belongs to the object at fff00000c7054a00 [ 28.987882] which belongs to the cache kmalloc-64 of size 64 [ 28.988063] The buggy address is located 0 bytes to the right of [ 28.988063] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 28.988231] [ 28.988294] The buggy address belongs to the physical page: [ 28.988421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 28.988552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.988879] page_type: f5(slab) [ 28.989087] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.989301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.989656] page dumped because: kasan: bad access detected [ 28.990212] [ 28.990266] Memory state around the buggy address: [ 28.990421] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.990678] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.990803] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.991310] ^ [ 28.991410] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.991529] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.991666] ================================================================== [ 29.065048] ================================================================== [ 29.065318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 29.065537] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.065698] [ 29.065771] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.066216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.067105] Hardware name: linux,dummy-virt (DT) [ 29.067347] Call trace: [ 29.067438] show_stack+0x20/0x38 (C) [ 29.067589] dump_stack_lvl+0x8c/0xd0 [ 29.067779] print_report+0x118/0x608 [ 29.068382] kasan_report+0xdc/0x128 [ 29.069004] kasan_check_range+0x100/0x1a8 [ 29.069307] __kasan_check_write+0x20/0x30 [ 29.069580] kasan_atomics_helper+0x1058/0x4858 [ 29.069852] kasan_atomics+0x198/0x2e0 [ 29.070041] kunit_try_run_case+0x170/0x3f0 [ 29.070207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.070347] kthread+0x328/0x630 [ 29.070591] ret_from_fork+0x10/0x20 [ 29.070789] [ 29.070875] Allocated by task 267: [ 29.070956] kasan_save_stack+0x3c/0x68 [ 29.071117] kasan_save_track+0x20/0x40 [ 29.071315] kasan_save_alloc_info+0x40/0x58 [ 29.071467] __kasan_kmalloc+0xd4/0xd8 [ 29.071568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.071660] kasan_atomics+0xb8/0x2e0 [ 29.071748] kunit_try_run_case+0x170/0x3f0 [ 29.071846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.071952] kthread+0x328/0x630 [ 29.072044] ret_from_fork+0x10/0x20 [ 29.072178] [ 29.072293] The buggy address belongs to the object at fff00000c7054a00 [ 29.072293] which belongs to the cache kmalloc-64 of size 64 [ 29.072614] The buggy address is located 0 bytes to the right of [ 29.072614] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.072776] [ 29.072871] The buggy address belongs to the physical page: [ 29.072958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.073155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.073326] page_type: f5(slab) [ 29.073440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.073692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.073805] page dumped because: kasan: bad access detected [ 29.073884] [ 29.073963] Memory state around the buggy address: [ 29.074154] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.074264] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.074540] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.074658] ^ [ 29.074773] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.074897] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.075069] ================================================================== [ 28.992348] ================================================================== [ 28.992710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 28.992881] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 28.993405] [ 28.993525] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.993734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.993806] Hardware name: linux,dummy-virt (DT) [ 28.993881] Call trace: [ 28.993949] show_stack+0x20/0x38 (C) [ 28.994199] dump_stack_lvl+0x8c/0xd0 [ 28.994615] print_report+0x118/0x608 [ 28.994849] kasan_report+0xdc/0x128 [ 28.994992] kasan_check_range+0x100/0x1a8 [ 28.995173] __kasan_check_write+0x20/0x30 [ 28.995338] kasan_atomics_helper+0xe44/0x4858 [ 28.995498] kasan_atomics+0x198/0x2e0 [ 28.995699] kunit_try_run_case+0x170/0x3f0 [ 28.995887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.996079] kthread+0x328/0x630 [ 28.996238] ret_from_fork+0x10/0x20 [ 28.996377] [ 28.996517] Allocated by task 267: [ 28.996619] kasan_save_stack+0x3c/0x68 [ 28.996738] kasan_save_track+0x20/0x40 [ 28.996895] kasan_save_alloc_info+0x40/0x58 [ 28.997123] __kasan_kmalloc+0xd4/0xd8 [ 28.997240] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.997378] kasan_atomics+0xb8/0x2e0 [ 28.997489] kunit_try_run_case+0x170/0x3f0 [ 28.997657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.997825] kthread+0x328/0x630 [ 28.997927] ret_from_fork+0x10/0x20 [ 28.998086] [ 28.998142] The buggy address belongs to the object at fff00000c7054a00 [ 28.998142] which belongs to the cache kmalloc-64 of size 64 [ 28.998291] The buggy address is located 0 bytes to the right of [ 28.998291] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 28.998603] [ 28.998680] The buggy address belongs to the physical page: [ 28.998846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 28.999021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.999325] page_type: f5(slab) [ 28.999452] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.999782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.000203] page dumped because: kasan: bad access detected [ 29.000288] [ 29.000757] Memory state around the buggy address: [ 29.000928] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.001049] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.001151] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.001291] ^ [ 29.001423] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.001533] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.001627] ================================================================== [ 29.053630] ================================================================== [ 29.053692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 29.053748] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.053810] [ 29.053846] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.053946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.053978] Hardware name: linux,dummy-virt (DT) [ 29.054018] Call trace: [ 29.054046] show_stack+0x20/0x38 (C) [ 29.054106] dump_stack_lvl+0x8c/0xd0 [ 29.054165] print_report+0x118/0x608 [ 29.054222] kasan_report+0xdc/0x128 [ 29.054275] kasan_check_range+0x100/0x1a8 [ 29.054335] __kasan_check_write+0x20/0x30 [ 29.054429] kasan_atomics_helper+0xff0/0x4858 [ 29.054555] kasan_atomics+0x198/0x2e0 [ 29.054661] kunit_try_run_case+0x170/0x3f0 [ 29.054843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.054995] kthread+0x328/0x630 [ 29.055118] ret_from_fork+0x10/0x20 [ 29.055259] [ 29.055320] Allocated by task 267: [ 29.055526] kasan_save_stack+0x3c/0x68 [ 29.055980] kasan_save_track+0x20/0x40 [ 29.056203] kasan_save_alloc_info+0x40/0x58 [ 29.056501] __kasan_kmalloc+0xd4/0xd8 [ 29.056629] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.056742] kasan_atomics+0xb8/0x2e0 [ 29.056983] kunit_try_run_case+0x170/0x3f0 [ 29.057323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.057532] kthread+0x328/0x630 [ 29.057649] ret_from_fork+0x10/0x20 [ 29.058084] [ 29.058374] The buggy address belongs to the object at fff00000c7054a00 [ 29.058374] which belongs to the cache kmalloc-64 of size 64 [ 29.058730] The buggy address is located 0 bytes to the right of [ 29.058730] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.059119] [ 29.059484] The buggy address belongs to the physical page: [ 29.059704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.060068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.060280] page_type: f5(slab) [ 29.060508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.060722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.061256] page dumped because: kasan: bad access detected [ 29.061461] [ 29.061595] Memory state around the buggy address: [ 29.061683] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.062447] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.062561] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.062665] ^ [ 29.063747] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.064207] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.064341] ================================================================== [ 28.835800] ================================================================== [ 28.835903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 28.836014] Write of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 28.836150] [ 28.836245] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.836557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.836754] Hardware name: linux,dummy-virt (DT) [ 28.836847] Call trace: [ 28.836910] show_stack+0x20/0x38 (C) [ 28.837035] dump_stack_lvl+0x8c/0xd0 [ 28.837156] print_report+0x118/0x608 [ 28.837289] kasan_report+0xdc/0x128 [ 28.837437] kasan_check_range+0x100/0x1a8 [ 28.837648] __kasan_check_write+0x20/0x30 [ 28.837799] kasan_atomics_helper+0xad4/0x4858 [ 28.838055] kasan_atomics+0x198/0x2e0 [ 28.838198] kunit_try_run_case+0x170/0x3f0 [ 28.838408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.838577] kthread+0x328/0x630 [ 28.838808] ret_from_fork+0x10/0x20 [ 28.839032] [ 28.839112] Allocated by task 267: [ 28.839198] kasan_save_stack+0x3c/0x68 [ 28.839314] kasan_save_track+0x20/0x40 [ 28.839464] kasan_save_alloc_info+0x40/0x58 [ 28.839689] __kasan_kmalloc+0xd4/0xd8 [ 28.839804] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.839928] kasan_atomics+0xb8/0x2e0 [ 28.840045] kunit_try_run_case+0x170/0x3f0 [ 28.840181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.840310] kthread+0x328/0x630 [ 28.840492] ret_from_fork+0x10/0x20 [ 28.840601] [ 28.840698] The buggy address belongs to the object at fff00000c7054a00 [ 28.840698] which belongs to the cache kmalloc-64 of size 64 [ 28.840923] The buggy address is located 0 bytes to the right of [ 28.840923] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 28.841103] [ 28.841160] The buggy address belongs to the physical page: [ 28.841373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 28.841967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.842237] page_type: f5(slab) [ 28.842642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.843025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.843132] page dumped because: kasan: bad access detected [ 28.843218] [ 28.843270] Memory state around the buggy address: [ 28.843777] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.844103] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.844214] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.845107] ^ [ 28.845704] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.845905] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.846007] ================================================================== [ 28.539928] ================================================================== [ 28.542253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 28.543002] [ 28.543117] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.543359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.543471] Hardware name: linux,dummy-virt (DT) [ 28.543561] Call trace: [ 28.544331] print_report+0x118/0x608 [ 28.545032] kasan_atomics_helper+0x40fc/0x4858 [ 28.545611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.546280] [ 28.546733] kasan_save_stack+0x3c/0x68 [ 28.547463] __kasan_kmalloc+0xd4/0xd8 [ 28.548872] ret_from_fork+0x10/0x20 [ 28.549702] [ 28.549864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 28.550892] page dumped because: kasan: bad access detected [ 28.553506] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.560650] [ 28.561271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.564354] kthread+0x328/0x630 [ 28.566209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.568055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.571374] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.575903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 28.576973] print_report+0x118/0x608 [ 28.583026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.585334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 28.587180] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.589500] ================================================================== [ 29.238506] ================================================================== [ 29.238701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 29.239133] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.239288] [ 29.239360] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.239574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.239674] Hardware name: linux,dummy-virt (DT) [ 29.239905] Call trace: [ 29.240056] show_stack+0x20/0x38 (C) [ 29.240193] dump_stack_lvl+0x8c/0xd0 [ 29.240327] print_report+0x118/0x608 [ 29.240479] kasan_report+0xdc/0x128 [ 29.241213] kasan_check_range+0x100/0x1a8 [ 29.241468] __kasan_check_write+0x20/0x30 [ 29.241606] kasan_atomics_helper+0x1414/0x4858 [ 29.241730] kasan_atomics+0x198/0x2e0 [ 29.241864] kunit_try_run_case+0x170/0x3f0 [ 29.242409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.242572] kthread+0x328/0x630 [ 29.242896] ret_from_fork+0x10/0x20 [ 29.243027] [ 29.243114] Allocated by task 267: [ 29.243190] kasan_save_stack+0x3c/0x68 [ 29.243301] kasan_save_track+0x20/0x40 [ 29.243624] kasan_save_alloc_info+0x40/0x58 [ 29.243762] __kasan_kmalloc+0xd4/0xd8 [ 29.244177] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.244417] kasan_atomics+0xb8/0x2e0 [ 29.244694] kunit_try_run_case+0x170/0x3f0 [ 29.244880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.245071] kthread+0x328/0x630 [ 29.245163] ret_from_fork+0x10/0x20 [ 29.245306] [ 29.245462] The buggy address belongs to the object at fff00000c7054a00 [ 29.245462] which belongs to the cache kmalloc-64 of size 64 [ 29.245609] The buggy address is located 0 bytes to the right of [ 29.245609] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.245776] [ 29.245892] The buggy address belongs to the physical page: [ 29.246009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.246324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.246515] page_type: f5(slab) [ 29.247125] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.247266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.247375] page dumped because: kasan: bad access detected [ 29.247472] [ 29.247528] Memory state around the buggy address: [ 29.247614] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.247721] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.247832] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.247931] ^ [ 29.249196] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.249535] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.249748] ================================================================== [ 28.937584] ================================================================== [ 28.937694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 28.937861] Write of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 28.938040] [ 28.938165] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.938430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.938507] Hardware name: linux,dummy-virt (DT) [ 28.938620] Call trace: [ 28.938680] show_stack+0x20/0x38 (C) [ 28.939457] dump_stack_lvl+0x8c/0xd0 [ 28.939610] print_report+0x118/0x608 [ 28.940078] kasan_report+0xdc/0x128 [ 28.940592] kasan_check_range+0x100/0x1a8 [ 28.940720] __kasan_check_write+0x20/0x30 [ 28.940847] kasan_atomics_helper+0xd3c/0x4858 [ 28.941652] kasan_atomics+0x198/0x2e0 [ 28.941809] kunit_try_run_case+0x170/0x3f0 [ 28.942062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.942215] kthread+0x328/0x630 [ 28.942413] ret_from_fork+0x10/0x20 [ 28.942575] [ 28.942638] Allocated by task 267: [ 28.942727] kasan_save_stack+0x3c/0x68 [ 28.942835] kasan_save_track+0x20/0x40 [ 28.942959] kasan_save_alloc_info+0x40/0x58 [ 28.943249] __kasan_kmalloc+0xd4/0xd8 [ 28.943357] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.943483] kasan_atomics+0xb8/0x2e0 [ 28.943589] kunit_try_run_case+0x170/0x3f0 [ 28.943714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.944058] kthread+0x328/0x630 [ 28.944941] ret_from_fork+0x10/0x20 [ 28.945059] [ 28.945125] The buggy address belongs to the object at fff00000c7054a00 [ 28.945125] which belongs to the cache kmalloc-64 of size 64 [ 28.945296] The buggy address is located 0 bytes to the right of [ 28.945296] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 28.945682] [ 28.945750] The buggy address belongs to the physical page: [ 28.945835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 28.945971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.946092] page_type: f5(slab) [ 28.946359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.946510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.947006] page dumped because: kasan: bad access detected [ 28.947456] [ 28.947519] Memory state around the buggy address: [ 28.947670] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.948023] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.948165] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.948283] ^ [ 28.948380] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.948717] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.948834] ================================================================== [ 28.847510] ================================================================== [ 28.847610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 28.847823] Read of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 28.848492] [ 28.848599] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.849398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.849489] Hardware name: linux,dummy-virt (DT) [ 28.849911] Call trace: [ 28.850384] show_stack+0x20/0x38 (C) [ 28.850537] dump_stack_lvl+0x8c/0xd0 [ 28.850673] print_report+0x118/0x608 [ 28.851103] kasan_report+0xdc/0x128 [ 28.851278] __asan_report_load4_noabort+0x20/0x30 [ 28.852027] kasan_atomics_helper+0x3dcc/0x4858 [ 28.852405] kasan_atomics+0x198/0x2e0 [ 28.852639] kunit_try_run_case+0x170/0x3f0 [ 28.852862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.853067] kthread+0x328/0x630 [ 28.853670] ret_from_fork+0x10/0x20 [ 28.854070] [ 28.854206] Allocated by task 267: [ 28.854781] kasan_save_stack+0x3c/0x68 [ 28.855111] kasan_save_track+0x20/0x40 [ 28.855237] kasan_save_alloc_info+0x40/0x58 [ 28.855682] __kasan_kmalloc+0xd4/0xd8 [ 28.856111] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.856534] kasan_atomics+0xb8/0x2e0 [ 28.856637] kunit_try_run_case+0x170/0x3f0 [ 28.857346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.857504] kthread+0x328/0x630 [ 28.857883] [ 28.859548] page_type: f5(slab) [ 28.860097] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.864454] kasan_atomics+0x198/0x2e0 [ 28.870039] The buggy address is located 0 bytes to the right of [ 28.870039] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 28.872943] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.874612] ================================================================== [ 28.951736] ================================================================== [ 28.951848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 28.952051] Read of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 28.952246] [ 28.952417] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.952943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.953145] Hardware name: linux,dummy-virt (DT) [ 28.953340] Call trace: [ 28.953502] show_stack+0x20/0x38 (C) [ 28.953709] dump_stack_lvl+0x8c/0xd0 [ 28.954061] print_report+0x118/0x608 [ 28.954254] kasan_report+0xdc/0x128 [ 28.954493] __asan_report_load4_noabort+0x20/0x30 [ 28.954819] kasan_atomics_helper+0x3e04/0x4858 [ 28.954963] kasan_atomics+0x198/0x2e0 [ 28.955097] kunit_try_run_case+0x170/0x3f0 [ 28.955528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.955905] kthread+0x328/0x630 [ 28.956029] ret_from_fork+0x10/0x20 [ 28.956534] [ 28.957296] Allocated by task 267: [ 28.957424] kasan_save_stack+0x3c/0x68 [ 28.957549] kasan_save_track+0x20/0x40 [ 28.957648] kasan_save_alloc_info+0x40/0x58 [ 28.958503] __kasan_kmalloc+0xd4/0xd8 [ 28.958670] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.958793] kasan_atomics+0xb8/0x2e0 [ 28.959038] kunit_try_run_case+0x170/0x3f0 [ 28.959174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.959530] kthread+0x328/0x630 [ 28.959933] ret_from_fork+0x10/0x20 [ 28.960045] [ 28.960097] The buggy address belongs to the object at fff00000c7054a00 [ 28.960097] which belongs to the cache kmalloc-64 of size 64 [ 28.960294] The buggy address is located 0 bytes to the right of [ 28.960294] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 28.960471] [ 28.960523] The buggy address belongs to the physical page: [ 28.960604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 28.961086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.961943] page_type: f5(slab) [ 28.962685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.963616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.963830] page dumped because: kasan: bad access detected [ 28.964677] [ 28.964792] Memory state around the buggy address: [ 28.964893] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.966031] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.966592] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.966992] ^ [ 28.967098] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.967222] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.967825] ================================================================== [ 29.339105] ================================================================== [ 29.339220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 29.339531] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.339659] [ 29.339730] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.339933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.340006] Hardware name: linux,dummy-virt (DT) [ 29.340077] Call trace: [ 29.340137] show_stack+0x20/0x38 (C) [ 29.340251] dump_stack_lvl+0x8c/0xd0 [ 29.340372] print_report+0x118/0x608 [ 29.340518] kasan_report+0xdc/0x128 [ 29.340852] kasan_check_range+0x100/0x1a8 [ 29.341216] __kasan_check_write+0x20/0x30 [ 29.341408] kasan_atomics_helper+0x16d0/0x4858 [ 29.341557] kasan_atomics+0x198/0x2e0 [ 29.341686] kunit_try_run_case+0x170/0x3f0 [ 29.341896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.342211] kthread+0x328/0x630 [ 29.342347] ret_from_fork+0x10/0x20 [ 29.342506] [ 29.342571] Allocated by task 267: [ 29.342720] kasan_save_stack+0x3c/0x68 [ 29.342969] kasan_save_track+0x20/0x40 [ 29.343153] kasan_save_alloc_info+0x40/0x58 [ 29.343521] __kasan_kmalloc+0xd4/0xd8 [ 29.343664] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.343799] kasan_atomics+0xb8/0x2e0 [ 29.343900] kunit_try_run_case+0x170/0x3f0 [ 29.344031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.344341] kthread+0x328/0x630 [ 29.344677] ret_from_fork+0x10/0x20 [ 29.345320] [ 29.345475] The buggy address belongs to the object at fff00000c7054a00 [ 29.345475] which belongs to the cache kmalloc-64 of size 64 [ 29.345705] The buggy address is located 0 bytes to the right of [ 29.345705] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.345867] [ 29.345966] The buggy address belongs to the physical page: [ 29.346058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.346212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.346330] page_type: f5(slab) [ 29.346444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.347250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.347797] page dumped because: kasan: bad access detected [ 29.347914] [ 29.348101] Memory state around the buggy address: [ 29.348223] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.348788] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.349065] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.349196] ^ [ 29.349286] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.349948] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.350061] ================================================================== [ 29.031479] ================================================================== [ 29.031628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 29.031786] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.031912] [ 29.031985] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.032187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.032429] Hardware name: linux,dummy-virt (DT) [ 29.032516] Call trace: [ 29.032572] show_stack+0x20/0x38 (C) [ 29.032690] dump_stack_lvl+0x8c/0xd0 [ 29.032809] print_report+0x118/0x608 [ 29.032920] kasan_report+0xdc/0x128 [ 29.033032] kasan_check_range+0x100/0x1a8 [ 29.033151] __kasan_check_write+0x20/0x30 [ 29.033282] kasan_atomics_helper+0xf20/0x4858 [ 29.033805] kasan_atomics+0x198/0x2e0 [ 29.033961] kunit_try_run_case+0x170/0x3f0 [ 29.034566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.034959] kthread+0x328/0x630 [ 29.035444] ret_from_fork+0x10/0x20 [ 29.035765] [ 29.035894] Allocated by task 267: [ 29.035995] kasan_save_stack+0x3c/0x68 [ 29.036097] kasan_save_track+0x20/0x40 [ 29.036472] kasan_save_alloc_info+0x40/0x58 [ 29.036613] __kasan_kmalloc+0xd4/0xd8 [ 29.036722] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.036994] kasan_atomics+0xb8/0x2e0 [ 29.037199] kunit_try_run_case+0x170/0x3f0 [ 29.037482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.037605] kthread+0x328/0x630 [ 29.038063] ret_from_fork+0x10/0x20 [ 29.038170] [ 29.038273] The buggy address belongs to the object at fff00000c7054a00 [ 29.038273] which belongs to the cache kmalloc-64 of size 64 [ 29.038439] The buggy address is located 0 bytes to the right of [ 29.038439] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.038640] [ 29.038689] The buggy address belongs to the physical page: [ 29.038768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.039551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.039683] page_type: f5(slab) [ 29.039780] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.040786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.041289] page dumped because: kasan: bad access detected [ 29.041444] [ 29.041605] Memory state around the buggy address: [ 29.041768] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.041882] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.041988] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.042083] ^ [ 29.042160] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.042266] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.042364] ================================================================== [ 28.656249] ================================================================== [ 28.656361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 28.656622] [ 28.656903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.657857] __kasan_check_write+0x20/0x30 [ 28.658426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.659858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.660690] The buggy address belongs to the physical page: [ 28.662442] page dumped because: kasan: bad access detected [ 28.663335] ^ [ 28.666229] [ 28.669189] [ 28.670488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.671997] page dumped because: kasan: bad access detected [ 28.673489] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.679339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.683209] kthread+0x328/0x630 [ 28.685766] kunit_try_run_case+0x170/0x3f0 [ 28.687793] [ 28.691095] [ 28.692220] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.707284] Write of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 28.713357] __kasan_kmalloc+0xd4/0xd8 [ 28.717545] [ 28.718673] page_type: f5(slab) [ 28.719755] [ 28.719821] Memory state around the buggy address: [ 28.720695] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.721911] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.725189] [ 28.725488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.727564] kunit_try_run_case+0x170/0x3f0 [ 28.730231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.731462] [ 28.732421] page_type: f5(slab) [ 28.732997] page dumped because: kasan: bad access detected [ 28.734108] ^ [ 28.734654] ================================================================== [ 29.262771] ================================================================== [ 29.262875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 29.262940] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.263223] [ 29.263306] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.263523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.263600] Hardware name: linux,dummy-virt (DT) [ 29.263679] Call trace: [ 29.263856] show_stack+0x20/0x38 (C) [ 29.264238] dump_stack_lvl+0x8c/0xd0 [ 29.264408] print_report+0x118/0x608 [ 29.264525] kasan_report+0xdc/0x128 [ 29.264638] kasan_check_range+0x100/0x1a8 [ 29.264755] __kasan_check_write+0x20/0x30 [ 29.264870] kasan_atomics_helper+0x14e4/0x4858 [ 29.264988] kasan_atomics+0x198/0x2e0 [ 29.265106] kunit_try_run_case+0x170/0x3f0 [ 29.265242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.265375] kthread+0x328/0x630 [ 29.265505] ret_from_fork+0x10/0x20 [ 29.268498] [ 29.268571] Allocated by task 267: [ 29.268659] kasan_save_stack+0x3c/0x68 [ 29.268771] kasan_save_track+0x20/0x40 [ 29.268883] kasan_save_alloc_info+0x40/0x58 [ 29.268998] __kasan_kmalloc+0xd4/0xd8 [ 29.269110] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.269231] kasan_atomics+0xb8/0x2e0 [ 29.269331] kunit_try_run_case+0x170/0x3f0 [ 29.269438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.269550] kthread+0x328/0x630 [ 29.271067] ret_from_fork+0x10/0x20 [ 29.271266] [ 29.271357] The buggy address belongs to the object at fff00000c7054a00 [ 29.271357] which belongs to the cache kmalloc-64 of size 64 [ 29.271612] The buggy address is located 0 bytes to the right of [ 29.271612] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.272354] [ 29.272459] The buggy address belongs to the physical page: [ 29.272537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.272666] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.272788] page_type: f5(slab) [ 29.273802] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.273964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.274085] page dumped because: kasan: bad access detected [ 29.274731] [ 29.274881] Memory state around the buggy address: [ 29.274971] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.275473] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.275983] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.276608] ^ [ 29.276713] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.276990] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.277087] ================================================================== [ 28.771457] ================================================================== [ 28.771573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 28.772536] dump_stack_lvl+0x8c/0xd0 [ 28.776123] kasan_save_track+0x20/0x40 [ 28.776552] __kasan_kmalloc+0xd4/0xd8 [ 28.779551] [ 28.781229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.784717] ================================================================== [ 29.299839] ================================================================== [ 29.299976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 29.300130] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.300257] [ 29.300344] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.300579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.300698] Hardware name: linux,dummy-virt (DT) [ 29.300859] Call trace: [ 29.300922] show_stack+0x20/0x38 (C) [ 29.301188] dump_stack_lvl+0x8c/0xd0 [ 29.301331] print_report+0x118/0x608 [ 29.301474] kasan_report+0xdc/0x128 [ 29.301637] __asan_report_load8_noabort+0x20/0x30 [ 29.301815] kasan_atomics_helper+0x3db0/0x4858 [ 29.301949] kasan_atomics+0x198/0x2e0 [ 29.302072] kunit_try_run_case+0x170/0x3f0 [ 29.302194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.302330] kthread+0x328/0x630 [ 29.302469] ret_from_fork+0x10/0x20 [ 29.302613] [ 29.302678] Allocated by task 267: [ 29.302780] kasan_save_stack+0x3c/0x68 [ 29.302927] kasan_save_track+0x20/0x40 [ 29.303023] kasan_save_alloc_info+0x40/0x58 [ 29.303250] __kasan_kmalloc+0xd4/0xd8 [ 29.303367] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.303647] kasan_atomics+0xb8/0x2e0 [ 29.303747] kunit_try_run_case+0x170/0x3f0 [ 29.303855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.303966] kthread+0x328/0x630 [ 29.304054] ret_from_fork+0x10/0x20 [ 29.304146] [ 29.304205] The buggy address belongs to the object at fff00000c7054a00 [ 29.304205] which belongs to the cache kmalloc-64 of size 64 [ 29.304412] The buggy address is located 0 bytes to the right of [ 29.304412] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.304682] [ 29.304772] The buggy address belongs to the physical page: [ 29.304859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.304988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.305108] page_type: f5(slab) [ 29.305289] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.305437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.305545] page dumped because: kasan: bad access detected [ 29.305626] [ 29.305674] Memory state around the buggy address: [ 29.305777] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.306164] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.306576] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.306681] ^ [ 29.307513] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.307842] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.307948] ================================================================== [ 29.360075] ================================================================== [ 29.360338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 29.360643] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.360765] [ 29.360834] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.361030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.361095] Hardware name: linux,dummy-virt (DT) [ 29.361170] Call trace: [ 29.361237] show_stack+0x20/0x38 (C) [ 29.361358] dump_stack_lvl+0x8c/0xd0 [ 29.362708] print_report+0x118/0x608 [ 29.362846] kasan_report+0xdc/0x128 [ 29.362959] kasan_check_range+0x100/0x1a8 [ 29.363078] __kasan_check_write+0x20/0x30 [ 29.363204] kasan_atomics_helper+0x175c/0x4858 [ 29.364783] kasan_atomics+0x198/0x2e0 [ 29.365065] kunit_try_run_case+0x170/0x3f0 [ 29.365332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.365499] kthread+0x328/0x630 [ 29.365632] ret_from_fork+0x10/0x20 [ 29.366297] [ 29.366775] Allocated by task 267: [ 29.366856] kasan_save_stack+0x3c/0x68 [ 29.367061] kasan_save_track+0x20/0x40 [ 29.367295] kasan_save_alloc_info+0x40/0x58 [ 29.367510] __kasan_kmalloc+0xd4/0xd8 [ 29.367643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.367836] kasan_atomics+0xb8/0x2e0 [ 29.367944] kunit_try_run_case+0x170/0x3f0 [ 29.368526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.368721] kthread+0x328/0x630 [ 29.368854] ret_from_fork+0x10/0x20 [ 29.369333] [ 29.369409] The buggy address belongs to the object at fff00000c7054a00 [ 29.369409] which belongs to the cache kmalloc-64 of size 64 [ 29.369936] The buggy address is located 0 bytes to the right of [ 29.369936] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.370360] [ 29.370630] The buggy address belongs to the physical page: [ 29.370722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.370907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.371488] page_type: f5(slab) [ 29.371703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.371848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.372345] page dumped because: kasan: bad access detected [ 29.372499] [ 29.372612] Memory state around the buggy address: [ 29.372824] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.372954] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.373066] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.373625] ^ [ 29.373989] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.374271] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.374377] ================================================================== [ 29.096837] ================================================================== [ 29.097001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 29.097147] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.098583] [ 29.098680] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.098895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.098965] Hardware name: linux,dummy-virt (DT) [ 29.099044] Call trace: [ 29.099104] show_stack+0x20/0x38 (C) [ 29.099222] dump_stack_lvl+0x8c/0xd0 [ 29.099342] print_report+0x118/0x608 [ 29.101464] kasan_report+0xdc/0x128 [ 29.102719] kasan_check_range+0x100/0x1a8 [ 29.103339] __kasan_check_write+0x20/0x30 [ 29.103509] kasan_atomics_helper+0x1128/0x4858 [ 29.104339] kasan_atomics+0x198/0x2e0 [ 29.104618] kunit_try_run_case+0x170/0x3f0 [ 29.104987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.105161] kthread+0x328/0x630 [ 29.105511] ret_from_fork+0x10/0x20 [ 29.105659] [ 29.105812] Allocated by task 267: [ 29.105893] kasan_save_stack+0x3c/0x68 [ 29.105999] kasan_save_track+0x20/0x40 [ 29.106090] kasan_save_alloc_info+0x40/0x58 [ 29.106186] __kasan_kmalloc+0xd4/0xd8 [ 29.106272] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.106368] kasan_atomics+0xb8/0x2e0 [ 29.106477] kunit_try_run_case+0x170/0x3f0 [ 29.106589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.106929] kthread+0x328/0x630 [ 29.107119] ret_from_fork+0x10/0x20 [ 29.107211] [ 29.107659] The buggy address belongs to the object at fff00000c7054a00 [ 29.107659] which belongs to the cache kmalloc-64 of size 64 [ 29.108130] The buggy address is located 0 bytes to the right of [ 29.108130] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.108332] [ 29.108420] The buggy address belongs to the physical page: [ 29.108504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.108831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.108962] page_type: f5(slab) [ 29.109065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.109485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.109831] page dumped because: kasan: bad access detected [ 29.109921] [ 29.109975] Memory state around the buggy address: [ 29.110058] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.110528] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.110744] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.110874] ^ [ 29.110969] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.111135] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.111250] ================================================================== [ 29.309344] ================================================================== [ 29.309464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 29.309571] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.309688] [ 29.309757] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.311252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.311369] Hardware name: linux,dummy-virt (DT) [ 29.311627] Call trace: [ 29.311692] show_stack+0x20/0x38 (C) [ 29.311828] dump_stack_lvl+0x8c/0xd0 [ 29.312861] print_report+0x118/0x608 [ 29.313099] kasan_report+0xdc/0x128 [ 29.313228] kasan_check_range+0x100/0x1a8 [ 29.313814] __kasan_check_write+0x20/0x30 [ 29.314504] kasan_atomics_helper+0x1644/0x4858 [ 29.314649] kasan_atomics+0x198/0x2e0 [ 29.314787] kunit_try_run_case+0x170/0x3f0 [ 29.315415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.315639] kthread+0x328/0x630 [ 29.315765] ret_from_fork+0x10/0x20 [ 29.315892] [ 29.315954] Allocated by task 267: [ 29.316027] kasan_save_stack+0x3c/0x68 [ 29.317168] kasan_save_track+0x20/0x40 [ 29.318244] kasan_save_alloc_info+0x40/0x58 [ 29.318432] __kasan_kmalloc+0xd4/0xd8 [ 29.318986] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.319610] kasan_atomics+0xb8/0x2e0 [ 29.319718] kunit_try_run_case+0x170/0x3f0 [ 29.319991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.320600] kthread+0x328/0x630 [ 29.321154] ret_from_fork+0x10/0x20 [ 29.321884] [ 29.322326] The buggy address belongs to the object at fff00000c7054a00 [ 29.322326] which belongs to the cache kmalloc-64 of size 64 [ 29.322789] The buggy address is located 0 bytes to the right of [ 29.322789] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.322955] [ 29.323009] The buggy address belongs to the physical page: [ 29.323754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.324233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.324573] page_type: f5(slab) [ 29.324752] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.324940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.325125] page dumped because: kasan: bad access detected [ 29.325631] [ 29.325816] Memory state around the buggy address: [ 29.326065] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.326179] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.326289] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.326406] ^ [ 29.327308] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.327684] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.327786] ================================================================== [ 29.194016] ================================================================== [ 29.194121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 29.194226] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.196445] [ 29.196651] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.197695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.197764] Hardware name: linux,dummy-virt (DT) [ 29.197842] Call trace: [ 29.197899] show_stack+0x20/0x38 (C) [ 29.198025] dump_stack_lvl+0x8c/0xd0 [ 29.198146] print_report+0x118/0x608 [ 29.198265] kasan_report+0xdc/0x128 [ 29.198376] kasan_check_range+0x100/0x1a8 [ 29.201731] __kasan_check_write+0x20/0x30 [ 29.202441] kasan_atomics_helper+0x1384/0x4858 [ 29.202571] kasan_atomics+0x198/0x2e0 [ 29.204079] kunit_try_run_case+0x170/0x3f0 [ 29.204222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.205421] kthread+0x328/0x630 [ 29.206019] ret_from_fork+0x10/0x20 [ 29.207002] [ 29.207065] Allocated by task 267: [ 29.207139] kasan_save_stack+0x3c/0x68 [ 29.207247] kasan_save_track+0x20/0x40 [ 29.208590] kasan_save_alloc_info+0x40/0x58 [ 29.209121] __kasan_kmalloc+0xd4/0xd8 [ 29.209228] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.209330] kasan_atomics+0xb8/0x2e0 [ 29.210956] kunit_try_run_case+0x170/0x3f0 [ 29.211561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.211672] kthread+0x328/0x630 [ 29.212965] ret_from_fork+0x10/0x20 [ 29.213449] [ 29.213931] The buggy address belongs to the object at fff00000c7054a00 [ 29.213931] which belongs to the cache kmalloc-64 of size 64 [ 29.214213] The buggy address is located 0 bytes to the right of [ 29.214213] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.215294] [ 29.215517] The buggy address belongs to the physical page: [ 29.216595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.216934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.218056] page_type: f5(slab) [ 29.218171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.219367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.220607] page dumped because: kasan: bad access detected [ 29.220932] [ 29.221306] Memory state around the buggy address: [ 29.221575] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.221730] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.222243] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.222834] ^ [ 29.223219] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.223484] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.223936] ================================================================== [ 29.351095] ================================================================== [ 29.351205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 29.351328] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.351485] [ 29.351560] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.351814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.351899] Hardware name: linux,dummy-virt (DT) [ 29.351981] Call trace: [ 29.352045] show_stack+0x20/0x38 (C) [ 29.352317] dump_stack_lvl+0x8c/0xd0 [ 29.352481] print_report+0x118/0x608 [ 29.352598] kasan_report+0xdc/0x128 [ 29.352716] __asan_report_load8_noabort+0x20/0x30 [ 29.352841] kasan_atomics_helper+0x3e10/0x4858 [ 29.352960] kasan_atomics+0x198/0x2e0 [ 29.353080] kunit_try_run_case+0x170/0x3f0 [ 29.353213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.353351] kthread+0x328/0x630 [ 29.353489] ret_from_fork+0x10/0x20 [ 29.353606] [ 29.353656] Allocated by task 267: [ 29.353723] kasan_save_stack+0x3c/0x68 [ 29.353819] kasan_save_track+0x20/0x40 [ 29.353907] kasan_save_alloc_info+0x40/0x58 [ 29.354004] __kasan_kmalloc+0xd4/0xd8 [ 29.354089] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.354184] kasan_atomics+0xb8/0x2e0 [ 29.354287] kunit_try_run_case+0x170/0x3f0 [ 29.354427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.354604] kthread+0x328/0x630 [ 29.354723] ret_from_fork+0x10/0x20 [ 29.354830] [ 29.354889] The buggy address belongs to the object at fff00000c7054a00 [ 29.354889] which belongs to the cache kmalloc-64 of size 64 [ 29.355040] The buggy address is located 0 bytes to the right of [ 29.355040] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.355221] [ 29.355279] The buggy address belongs to the physical page: [ 29.355404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.355828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.356625] page_type: f5(slab) [ 29.356999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.357511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.357633] page dumped because: kasan: bad access detected [ 29.357727] [ 29.357881] Memory state around the buggy address: [ 29.357967] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.358407] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.358759] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.358875] ^ [ 29.359370] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.359529] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.359664] ================================================================== [ 28.798183] ================================================================== [ 28.798340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 28.798650] Write of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 28.798785] [ 28.798870] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.799067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.799152] Hardware name: linux,dummy-virt (DT) [ 28.799379] Call trace: [ 28.799568] show_stack+0x20/0x38 (C) [ 28.799921] dump_stack_lvl+0x8c/0xd0 [ 28.800051] print_report+0x118/0x608 [ 28.800172] kasan_report+0xdc/0x128 [ 28.800291] kasan_check_range+0x100/0x1a8 [ 28.800785] __kasan_check_write+0x20/0x30 [ 28.801240] kasan_atomics_helper+0x99c/0x4858 [ 28.801468] kasan_atomics+0x198/0x2e0 [ 28.801608] kunit_try_run_case+0x170/0x3f0 [ 28.801736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.801935] kthread+0x328/0x630 [ 28.802058] ret_from_fork+0x10/0x20 [ 28.802286] [ 28.802581] Allocated by task 267: [ 28.802682] kasan_save_stack+0x3c/0x68 [ 28.803096] kasan_save_track+0x20/0x40 [ 28.803235] kasan_save_alloc_info+0x40/0x58 [ 28.803402] __kasan_kmalloc+0xd4/0xd8 [ 28.803641] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.803801] kasan_atomics+0xb8/0x2e0 [ 28.804061] kunit_try_run_case+0x170/0x3f0 [ 28.804173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.804336] kthread+0x328/0x630 [ 28.804469] ret_from_fork+0x10/0x20 [ 28.804613] [ 28.804834] The buggy address belongs to the object at fff00000c7054a00 [ 28.804834] which belongs to the cache kmalloc-64 of size 64 [ 28.805052] The buggy address is located 0 bytes to the right of [ 28.805052] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 28.805226] [ 28.806463] The buggy address belongs to the physical page: [ 28.806561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 28.806817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.807193] page_type: f5(slab) [ 28.807533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.807732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.807865] page dumped because: kasan: bad access detected [ 28.807951] [ 28.808184] Memory state around the buggy address: [ 28.808352] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.808620] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.808776] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.809018] ^ [ 28.809117] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.809237] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.809492] ================================================================== [ 29.161671] ================================================================== [ 29.161919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 29.162457] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.162616] [ 29.163296] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.163686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.163757] Hardware name: linux,dummy-virt (DT) [ 29.163934] Call trace: [ 29.163992] show_stack+0x20/0x38 (C) [ 29.164204] dump_stack_lvl+0x8c/0xd0 [ 29.164322] print_report+0x118/0x608 [ 29.164476] kasan_report+0xdc/0x128 [ 29.164968] kasan_check_range+0x100/0x1a8 [ 29.165363] __kasan_check_write+0x20/0x30 [ 29.165887] kasan_atomics_helper+0x126c/0x4858 [ 29.166015] kasan_atomics+0x198/0x2e0 [ 29.166129] kunit_try_run_case+0x170/0x3f0 [ 29.166250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.166380] kthread+0x328/0x630 [ 29.166521] ret_from_fork+0x10/0x20 [ 29.167263] [ 29.167347] Allocated by task 267: [ 29.167980] kasan_save_stack+0x3c/0x68 [ 29.168747] kasan_save_track+0x20/0x40 [ 29.168884] kasan_save_alloc_info+0x40/0x58 [ 29.169377] __kasan_kmalloc+0xd4/0xd8 [ 29.169512] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.169635] kasan_atomics+0xb8/0x2e0 [ 29.169738] kunit_try_run_case+0x170/0x3f0 [ 29.170366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.170705] kthread+0x328/0x630 [ 29.171024] ret_from_fork+0x10/0x20 [ 29.171359] [ 29.171437] The buggy address belongs to the object at fff00000c7054a00 [ 29.171437] which belongs to the cache kmalloc-64 of size 64 [ 29.171768] The buggy address is located 0 bytes to the right of [ 29.171768] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.172063] [ 29.172145] The buggy address belongs to the physical page: [ 29.173248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.173501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.173877] page_type: f5(slab) [ 29.174276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.174527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.174909] page dumped because: kasan: bad access detected [ 29.175023] [ 29.175080] Memory state around the buggy address: [ 29.175178] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.175307] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.175658] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.175780] ^ [ 29.175973] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.176076] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.176789] ================================================================== [ 28.827050] ================================================================== [ 28.827199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 28.827348] Write of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 28.827650] [ 28.827812] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.828016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.828086] Hardware name: linux,dummy-virt (DT) [ 28.828167] Call trace: [ 28.828224] show_stack+0x20/0x38 (C) [ 28.828344] dump_stack_lvl+0x8c/0xd0 [ 28.828490] print_report+0x118/0x608 [ 28.828607] kasan_report+0xdc/0x128 [ 28.828719] kasan_check_range+0x100/0x1a8 [ 28.828839] __kasan_check_write+0x20/0x30 [ 28.828962] kasan_atomics_helper+0xa6c/0x4858 [ 28.829083] kasan_atomics+0x198/0x2e0 [ 28.829208] kunit_try_run_case+0x170/0x3f0 [ 28.829342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.829527] kthread+0x328/0x630 [ 28.829824] ret_from_fork+0x10/0x20 [ 28.829980] [ 28.830040] Allocated by task 267: [ 28.830130] kasan_save_stack+0x3c/0x68 [ 28.830245] kasan_save_track+0x20/0x40 [ 28.830357] kasan_save_alloc_info+0x40/0x58 [ 28.830490] __kasan_kmalloc+0xd4/0xd8 [ 28.830676] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.830834] kasan_atomics+0xb8/0x2e0 [ 28.830951] kunit_try_run_case+0x170/0x3f0 [ 28.831094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.831493] kthread+0x328/0x630 [ 28.831598] ret_from_fork+0x10/0x20 [ 28.831706] [ 28.831761] The buggy address belongs to the object at fff00000c7054a00 [ 28.831761] which belongs to the cache kmalloc-64 of size 64 [ 28.831898] The buggy address is located 0 bytes to the right of [ 28.831898] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 28.832169] [ 28.832240] The buggy address belongs to the physical page: [ 28.832321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 28.832480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.832690] page_type: f5(slab) [ 28.832814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.832940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.833071] page dumped because: kasan: bad access detected [ 28.833219] [ 28.833283] Memory state around the buggy address: [ 28.833449] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.833578] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.833699] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.833860] ^ [ 28.833983] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.834194] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.834463] ================================================================== [ 28.811775] ================================================================== [ 28.811883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 28.812000] Write of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 28.812132] [ 28.812216] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.813477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.813820] Hardware name: linux,dummy-virt (DT) [ 28.814232] Call trace: [ 28.814629] show_stack+0x20/0x38 (C) [ 28.815139] dump_stack_lvl+0x8c/0xd0 [ 28.815244] print_report+0x118/0x608 [ 28.815364] kasan_report+0xdc/0x128 [ 28.816913] kasan_check_range+0x100/0x1a8 [ 28.817048] __kasan_check_write+0x20/0x30 [ 28.817212] kasan_atomics_helper+0xa04/0x4858 [ 28.817604] kasan_atomics+0x198/0x2e0 [ 28.817730] kunit_try_run_case+0x170/0x3f0 [ 28.817856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.817998] kthread+0x328/0x630 [ 28.818114] ret_from_fork+0x10/0x20 [ 28.818277] [ 28.818426] Allocated by task 267: [ 28.818519] kasan_save_stack+0x3c/0x68 [ 28.818700] kasan_save_track+0x20/0x40 [ 28.819165] kasan_save_alloc_info+0x40/0x58 [ 28.819439] __kasan_kmalloc+0xd4/0xd8 [ 28.819713] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.820059] kasan_atomics+0xb8/0x2e0 [ 28.820177] kunit_try_run_case+0x170/0x3f0 [ 28.820291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.820434] kthread+0x328/0x630 [ 28.820537] ret_from_fork+0x10/0x20 [ 28.821251] [ 28.821530] The buggy address belongs to the object at fff00000c7054a00 [ 28.821530] which belongs to the cache kmalloc-64 of size 64 [ 28.821762] The buggy address is located 0 bytes to the right of [ 28.821762] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 28.822070] [ 28.822125] The buggy address belongs to the physical page: [ 28.822205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 28.822404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.822818] page_type: f5(slab) [ 28.822985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.823367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.823588] page dumped because: kasan: bad access detected [ 28.823712] [ 28.823785] Memory state around the buggy address: [ 28.823872] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.824037] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.824333] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.824449] ^ [ 28.824581] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.824995] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.825261] ================================================================== [ 29.143304] ================================================================== [ 29.143446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 29.143570] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267 [ 29.143689] [ 29.143770] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 29.143968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.146471] Hardware name: linux,dummy-virt (DT) [ 29.146768] Call trace: [ 29.146889] show_stack+0x20/0x38 (C) [ 29.147227] dump_stack_lvl+0x8c/0xd0 [ 29.147492] print_report+0x118/0x608 [ 29.147713] kasan_report+0xdc/0x128 [ 29.147827] kasan_check_range+0x100/0x1a8 [ 29.149213] __kasan_check_write+0x20/0x30 [ 29.149379] kasan_atomics_helper+0x11f8/0x4858 [ 29.149793] kasan_atomics+0x198/0x2e0 [ 29.149931] kunit_try_run_case+0x170/0x3f0 [ 29.150557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.150831] kthread+0x328/0x630 [ 29.151662] ret_from_fork+0x10/0x20 [ 29.152231] [ 29.152401] Allocated by task 267: [ 29.152479] kasan_save_stack+0x3c/0x68 [ 29.152941] kasan_save_track+0x20/0x40 [ 29.153261] kasan_save_alloc_info+0x40/0x58 [ 29.153372] __kasan_kmalloc+0xd4/0xd8 [ 29.153606] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.153941] kasan_atomics+0xb8/0x2e0 [ 29.154527] kunit_try_run_case+0x170/0x3f0 [ 29.154959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.155474] kthread+0x328/0x630 [ 29.155834] ret_from_fork+0x10/0x20 [ 29.156016] [ 29.156491] The buggy address belongs to the object at fff00000c7054a00 [ 29.156491] which belongs to the cache kmalloc-64 of size 64 [ 29.156877] The buggy address is located 0 bytes to the right of [ 29.156877] allocated 48-byte region [fff00000c7054a00, fff00000c7054a30) [ 29.157139] [ 29.157207] The buggy address belongs to the physical page: [ 29.157815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054 [ 29.157966] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.158087] page_type: f5(slab) [ 29.158279] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.158425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.158661] page dumped because: kasan: bad access detected [ 29.158746] [ 29.158804] Memory state around the buggy address: [ 29.159157] fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.159367] fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.159505] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.159722] ^ [ 29.159817] fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.160278] fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.160762] ==================================================================
[ 22.641999] ================================================================== [ 22.642758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 22.643566] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.644109] [ 22.644397] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.644523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.644560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.644636] Call Trace: [ 22.644694] <TASK> [ 22.644745] dump_stack_lvl+0x73/0xb0 [ 22.644831] print_report+0xd1/0x650 [ 22.644909] ? __virt_addr_valid+0x1db/0x2d0 [ 22.644987] ? kasan_atomics_helper+0x49ce/0x5450 [ 22.645067] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.645148] ? kasan_atomics_helper+0x49ce/0x5450 [ 22.645267] kasan_report+0x141/0x180 [ 22.645349] ? kasan_atomics_helper+0x49ce/0x5450 [ 22.645437] __asan_report_load4_noabort+0x18/0x20 [ 22.645509] kasan_atomics_helper+0x49ce/0x5450 [ 22.645591] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.645689] ? ret_from_fork_asm+0x1a/0x30 [ 22.645792] kasan_atomics+0x1dc/0x310 [ 22.645863] ? __pfx_kasan_atomics+0x10/0x10 [ 22.645939] ? __pfx_read_tsc+0x10/0x10 [ 22.646010] ? ktime_get_ts64+0x86/0x230 [ 22.646098] kunit_try_run_case+0x1a5/0x480 [ 22.646186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.646306] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.646387] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.646435] ? __kthread_parkme+0x82/0x180 [ 22.646470] ? preempt_count_sub+0x50/0x80 [ 22.646510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.646548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.646584] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.646648] kthread+0x337/0x6f0 [ 22.646676] ? trace_preempt_on+0x20/0xc0 [ 22.646714] ? __pfx_kthread+0x10/0x10 [ 22.646741] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.646775] ? calculate_sigpending+0x7b/0xa0 [ 22.646810] ? __pfx_kthread+0x10/0x10 [ 22.646838] ret_from_fork+0x41/0x80 [ 22.646870] ? __pfx_kthread+0x10/0x10 [ 22.646897] ret_from_fork_asm+0x1a/0x30 [ 22.646941] </TASK> [ 22.646956] [ 22.663000] Allocated by task 286: [ 22.663445] kasan_save_stack+0x45/0x70 [ 22.663861] kasan_save_track+0x18/0x40 [ 22.664271] kasan_save_alloc_info+0x3b/0x50 [ 22.664682] __kasan_kmalloc+0xb7/0xc0 [ 22.665043] __kmalloc_cache_noprof+0x189/0x420 [ 22.665529] kasan_atomics+0x95/0x310 [ 22.665914] kunit_try_run_case+0x1a5/0x480 [ 22.666364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.666836] kthread+0x337/0x6f0 [ 22.667188] ret_from_fork+0x41/0x80 [ 22.667576] ret_from_fork_asm+0x1a/0x30 [ 22.668034] [ 22.668321] The buggy address belongs to the object at ffff888102a2c100 [ 22.668321] which belongs to the cache kmalloc-64 of size 64 [ 22.669183] The buggy address is located 0 bytes to the right of [ 22.669183] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.670099] [ 22.670392] The buggy address belongs to the physical page: [ 22.670870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.671557] flags: 0x200000000000000(node=0|zone=2) [ 22.671992] page_type: f5(slab) [ 22.672392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.672917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.673652] page dumped because: kasan: bad access detected [ 22.674037] [ 22.674273] Memory state around the buggy address: [ 22.674728] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.675410] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.675977] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.676567] ^ [ 22.677034] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.677694] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.678260] ================================================================== [ 21.482593] ================================================================== [ 21.483687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 21.484633] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.485414] [ 21.485967] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.486088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.486127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.486183] Call Trace: [ 21.486232] <TASK> [ 21.486280] dump_stack_lvl+0x73/0xb0 [ 21.486359] print_report+0xd1/0x650 [ 21.486522] ? __virt_addr_valid+0x1db/0x2d0 [ 21.486619] ? kasan_atomics_helper+0x4b3a/0x5450 [ 21.486860] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.486999] ? kasan_atomics_helper+0x4b3a/0x5450 [ 21.487106] kasan_report+0x141/0x180 [ 21.487186] ? kasan_atomics_helper+0x4b3a/0x5450 [ 21.487276] __asan_report_store4_noabort+0x1b/0x30 [ 21.487331] kasan_atomics_helper+0x4b3a/0x5450 [ 21.487369] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.487405] ? ret_from_fork_asm+0x1a/0x30 [ 21.487444] kasan_atomics+0x1dc/0x310 [ 21.487473] ? __pfx_kasan_atomics+0x10/0x10 [ 21.487502] ? __pfx_read_tsc+0x10/0x10 [ 21.487534] ? ktime_get_ts64+0x86/0x230 [ 21.487570] kunit_try_run_case+0x1a5/0x480 [ 21.487677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.487770] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.487857] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.487948] ? __kthread_parkme+0x82/0x180 [ 21.487990] ? preempt_count_sub+0x50/0x80 [ 21.488085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.488139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.488200] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.488273] kthread+0x337/0x6f0 [ 21.488302] ? trace_preempt_on+0x20/0xc0 [ 21.488340] ? __pfx_kthread+0x10/0x10 [ 21.488368] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.488401] ? calculate_sigpending+0x7b/0xa0 [ 21.488433] ? __pfx_kthread+0x10/0x10 [ 21.488460] ret_from_fork+0x41/0x80 [ 21.488492] ? __pfx_kthread+0x10/0x10 [ 21.488517] ret_from_fork_asm+0x1a/0x30 [ 21.488560] </TASK> [ 21.488576] [ 21.510166] Allocated by task 286: [ 21.510852] kasan_save_stack+0x45/0x70 [ 21.511367] kasan_save_track+0x18/0x40 [ 21.512064] kasan_save_alloc_info+0x3b/0x50 [ 21.512774] __kasan_kmalloc+0xb7/0xc0 [ 21.513224] __kmalloc_cache_noprof+0x189/0x420 [ 21.514164] kasan_atomics+0x95/0x310 [ 21.514654] kunit_try_run_case+0x1a5/0x480 [ 21.515239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.515991] kthread+0x337/0x6f0 [ 21.516485] ret_from_fork+0x41/0x80 [ 21.517344] ret_from_fork_asm+0x1a/0x30 [ 21.518062] [ 21.518430] The buggy address belongs to the object at ffff888102a2c100 [ 21.518430] which belongs to the cache kmalloc-64 of size 64 [ 21.520096] The buggy address is located 0 bytes to the right of [ 21.520096] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.521587] [ 21.521962] The buggy address belongs to the physical page: [ 21.522653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.523219] flags: 0x200000000000000(node=0|zone=2) [ 21.524136] page_type: f5(slab) [ 21.524801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.525619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.526173] page dumped because: kasan: bad access detected [ 21.526563] [ 21.526812] Memory state around the buggy address: [ 21.527214] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.527907] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.529053] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.529624] ^ [ 21.530699] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.531427] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.531780] ================================================================== [ 23.414128] ================================================================== [ 23.415440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 23.416104] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.417229] [ 23.417577] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.417718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.417768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.417825] Call Trace: [ 23.417876] <TASK> [ 23.417923] dump_stack_lvl+0x73/0xb0 [ 23.418003] print_report+0xd1/0x650 [ 23.418083] ? __virt_addr_valid+0x1db/0x2d0 [ 23.418160] ? kasan_atomics_helper+0x1d7a/0x5450 [ 23.418257] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.418340] ? kasan_atomics_helper+0x1d7a/0x5450 [ 23.418416] kasan_report+0x141/0x180 [ 23.418464] ? kasan_atomics_helper+0x1d7a/0x5450 [ 23.418505] kasan_check_range+0x10c/0x1c0 [ 23.418534] __kasan_check_write+0x18/0x20 [ 23.418566] kasan_atomics_helper+0x1d7a/0x5450 [ 23.418626] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.418666] ? ret_from_fork_asm+0x1a/0x30 [ 23.418706] kasan_atomics+0x1dc/0x310 [ 23.418736] ? __pfx_kasan_atomics+0x10/0x10 [ 23.418765] ? __pfx_read_tsc+0x10/0x10 [ 23.418793] ? ktime_get_ts64+0x86/0x230 [ 23.418828] kunit_try_run_case+0x1a5/0x480 [ 23.418866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.418901] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.418936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.418971] ? __kthread_parkme+0x82/0x180 [ 23.419003] ? preempt_count_sub+0x50/0x80 [ 23.419040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.419075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.419110] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.419143] kthread+0x337/0x6f0 [ 23.419168] ? trace_preempt_on+0x20/0xc0 [ 23.419202] ? __pfx_kthread+0x10/0x10 [ 23.419259] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.419296] ? calculate_sigpending+0x7b/0xa0 [ 23.419329] ? __pfx_kthread+0x10/0x10 [ 23.419355] ret_from_fork+0x41/0x80 [ 23.419388] ? __pfx_kthread+0x10/0x10 [ 23.419413] ret_from_fork_asm+0x1a/0x30 [ 23.419455] </TASK> [ 23.419470] [ 23.436653] Allocated by task 286: [ 23.437356] kasan_save_stack+0x45/0x70 [ 23.438107] kasan_save_track+0x18/0x40 [ 23.438530] kasan_save_alloc_info+0x3b/0x50 [ 23.438979] __kasan_kmalloc+0xb7/0xc0 [ 23.439528] __kmalloc_cache_noprof+0x189/0x420 [ 23.439922] kasan_atomics+0x95/0x310 [ 23.440353] kunit_try_run_case+0x1a5/0x480 [ 23.440797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.441381] kthread+0x337/0x6f0 [ 23.441884] ret_from_fork+0x41/0x80 [ 23.442364] ret_from_fork_asm+0x1a/0x30 [ 23.442844] [ 23.443042] The buggy address belongs to the object at ffff888102a2c100 [ 23.443042] which belongs to the cache kmalloc-64 of size 64 [ 23.444141] The buggy address is located 0 bytes to the right of [ 23.444141] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.445115] [ 23.445503] The buggy address belongs to the physical page: [ 23.446089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.446780] flags: 0x200000000000000(node=0|zone=2) [ 23.447374] page_type: f5(slab) [ 23.447827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.448660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.449371] page dumped because: kasan: bad access detected [ 23.449798] [ 23.450020] Memory state around the buggy address: [ 23.450631] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.451358] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.451921] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.452682] ^ [ 23.453081] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.453795] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.454462] ================================================================== [ 21.871434] ================================================================== [ 21.872088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 21.872778] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.873401] [ 21.873693] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.873819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.873859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.873916] Call Trace: [ 21.873958] <TASK> [ 21.874006] dump_stack_lvl+0x73/0xb0 [ 21.874088] print_report+0xd1/0x650 [ 21.874167] ? __virt_addr_valid+0x1db/0x2d0 [ 21.874298] ? kasan_atomics_helper+0x992/0x5450 [ 21.874381] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.874457] ? kasan_atomics_helper+0x992/0x5450 [ 21.874537] kasan_report+0x141/0x180 [ 21.874631] ? kasan_atomics_helper+0x992/0x5450 [ 21.874724] kasan_check_range+0x10c/0x1c0 [ 21.874797] __kasan_check_write+0x18/0x20 [ 21.874854] kasan_atomics_helper+0x992/0x5450 [ 21.874908] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.874981] ? ret_from_fork_asm+0x1a/0x30 [ 21.875071] kasan_atomics+0x1dc/0x310 [ 21.875149] ? __pfx_kasan_atomics+0x10/0x10 [ 21.875279] ? __pfx_read_tsc+0x10/0x10 [ 21.875356] ? ktime_get_ts64+0x86/0x230 [ 21.875446] kunit_try_run_case+0x1a5/0x480 [ 21.875531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.875624] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.875707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.875748] ? __kthread_parkme+0x82/0x180 [ 21.875786] ? preempt_count_sub+0x50/0x80 [ 21.875826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.875865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.875902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.875940] kthread+0x337/0x6f0 [ 21.875966] ? trace_preempt_on+0x20/0xc0 [ 21.876003] ? __pfx_kthread+0x10/0x10 [ 21.876031] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.876065] ? calculate_sigpending+0x7b/0xa0 [ 21.876099] ? __pfx_kthread+0x10/0x10 [ 21.876126] ret_from_fork+0x41/0x80 [ 21.876158] ? __pfx_kthread+0x10/0x10 [ 21.876186] ret_from_fork_asm+0x1a/0x30 [ 21.876273] </TASK> [ 21.876293] [ 21.892358] Allocated by task 286: [ 21.892806] kasan_save_stack+0x45/0x70 [ 21.893270] kasan_save_track+0x18/0x40 [ 21.894240] kasan_save_alloc_info+0x3b/0x50 [ 21.894862] __kasan_kmalloc+0xb7/0xc0 [ 21.895473] __kmalloc_cache_noprof+0x189/0x420 [ 21.895934] kasan_atomics+0x95/0x310 [ 21.896289] kunit_try_run_case+0x1a5/0x480 [ 21.896727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.897240] kthread+0x337/0x6f0 [ 21.897659] ret_from_fork+0x41/0x80 [ 21.898107] ret_from_fork_asm+0x1a/0x30 [ 21.898616] [ 21.898827] The buggy address belongs to the object at ffff888102a2c100 [ 21.898827] which belongs to the cache kmalloc-64 of size 64 [ 21.899836] The buggy address is located 0 bytes to the right of [ 21.899836] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.900912] [ 21.901149] The buggy address belongs to the physical page: [ 21.901736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.902489] flags: 0x200000000000000(node=0|zone=2) [ 21.902994] page_type: f5(slab) [ 21.903393] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.904120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.904822] page dumped because: kasan: bad access detected [ 21.905394] [ 21.905594] Memory state around the buggy address: [ 21.906135] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.906785] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.907402] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.908014] ^ [ 21.908523] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.909128] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.909791] ================================================================== [ 22.848236] ================================================================== [ 22.849631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 22.850435] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.851015] [ 22.851288] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.851417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.851457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.851515] Call Trace: [ 22.851570] <TASK> [ 22.851635] dump_stack_lvl+0x73/0xb0 [ 22.851715] print_report+0xd1/0x650 [ 22.851792] ? __virt_addr_valid+0x1db/0x2d0 [ 22.851870] ? kasan_atomics_helper+0x151d/0x5450 [ 22.851945] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.852018] ? kasan_atomics_helper+0x151d/0x5450 [ 22.852093] kasan_report+0x141/0x180 [ 22.852168] ? kasan_atomics_helper+0x151d/0x5450 [ 22.852288] kasan_check_range+0x10c/0x1c0 [ 22.852333] __kasan_check_write+0x18/0x20 [ 22.852369] kasan_atomics_helper+0x151d/0x5450 [ 22.852405] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.852438] ? ret_from_fork_asm+0x1a/0x30 [ 22.852477] kasan_atomics+0x1dc/0x310 [ 22.852506] ? __pfx_kasan_atomics+0x10/0x10 [ 22.852540] ? __pfx_read_tsc+0x10/0x10 [ 22.852569] ? ktime_get_ts64+0x86/0x230 [ 22.852628] kunit_try_run_case+0x1a5/0x480 [ 22.852669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.852705] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.852740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.852774] ? __kthread_parkme+0x82/0x180 [ 22.852806] ? preempt_count_sub+0x50/0x80 [ 22.852842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.852878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.852912] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.852947] kthread+0x337/0x6f0 [ 22.852971] ? trace_preempt_on+0x20/0xc0 [ 22.853006] ? __pfx_kthread+0x10/0x10 [ 22.853032] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.853064] ? calculate_sigpending+0x7b/0xa0 [ 22.853094] ? __pfx_kthread+0x10/0x10 [ 22.853120] ret_from_fork+0x41/0x80 [ 22.853153] ? __pfx_kthread+0x10/0x10 [ 22.853178] ret_from_fork_asm+0x1a/0x30 [ 22.853262] </TASK> [ 22.853282] [ 22.870839] Allocated by task 286: [ 22.871465] kasan_save_stack+0x45/0x70 [ 22.872087] kasan_save_track+0x18/0x40 [ 22.872869] kasan_save_alloc_info+0x3b/0x50 [ 22.873479] __kasan_kmalloc+0xb7/0xc0 [ 22.874108] __kmalloc_cache_noprof+0x189/0x420 [ 22.874699] kasan_atomics+0x95/0x310 [ 22.875333] kunit_try_run_case+0x1a5/0x480 [ 22.875845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.876594] kthread+0x337/0x6f0 [ 22.876986] ret_from_fork+0x41/0x80 [ 22.877338] ret_from_fork_asm+0x1a/0x30 [ 22.877853] [ 22.878128] The buggy address belongs to the object at ffff888102a2c100 [ 22.878128] which belongs to the cache kmalloc-64 of size 64 [ 22.879080] The buggy address is located 0 bytes to the right of [ 22.879080] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.880081] [ 22.880326] The buggy address belongs to the physical page: [ 22.880837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.881516] flags: 0x200000000000000(node=0|zone=2) [ 22.881944] page_type: f5(slab) [ 22.882351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.883035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.883855] page dumped because: kasan: bad access detected [ 22.884358] [ 22.884631] Memory state around the buggy address: [ 22.885069] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.885581] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.886645] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.887105] ^ [ 22.887640] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.888256] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.888760] ================================================================== [ 22.153647] ================================================================== [ 22.154864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 22.155701] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.157093] [ 22.157571] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.157716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.157766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.157923] Call Trace: [ 22.157982] <TASK> [ 22.158023] dump_stack_lvl+0x73/0xb0 [ 22.158064] print_report+0xd1/0x650 [ 22.158099] ? __virt_addr_valid+0x1db/0x2d0 [ 22.158132] ? kasan_atomics_helper+0xde0/0x5450 [ 22.158166] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.158199] ? kasan_atomics_helper+0xde0/0x5450 [ 22.158264] kasan_report+0x141/0x180 [ 22.158302] ? kasan_atomics_helper+0xde0/0x5450 [ 22.158343] kasan_check_range+0x10c/0x1c0 [ 22.158373] __kasan_check_write+0x18/0x20 [ 22.158404] kasan_atomics_helper+0xde0/0x5450 [ 22.158440] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.158473] ? ret_from_fork_asm+0x1a/0x30 [ 22.158513] kasan_atomics+0x1dc/0x310 [ 22.158542] ? __pfx_kasan_atomics+0x10/0x10 [ 22.158571] ? __pfx_read_tsc+0x10/0x10 [ 22.158599] ? ktime_get_ts64+0x86/0x230 [ 22.158661] kunit_try_run_case+0x1a5/0x480 [ 22.158698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.158732] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.158767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.158803] ? __kthread_parkme+0x82/0x180 [ 22.158834] ? preempt_count_sub+0x50/0x80 [ 22.158870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.158905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.158940] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.158976] kthread+0x337/0x6f0 [ 22.159000] ? trace_preempt_on+0x20/0xc0 [ 22.159035] ? __pfx_kthread+0x10/0x10 [ 22.159060] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.159092] ? calculate_sigpending+0x7b/0xa0 [ 22.159123] ? __pfx_kthread+0x10/0x10 [ 22.159149] ret_from_fork+0x41/0x80 [ 22.159181] ? __pfx_kthread+0x10/0x10 [ 22.159208] ret_from_fork_asm+0x1a/0x30 [ 22.159277] </TASK> [ 22.159294] [ 22.177061] Allocated by task 286: [ 22.177475] kasan_save_stack+0x45/0x70 [ 22.177894] kasan_save_track+0x18/0x40 [ 22.178210] kasan_save_alloc_info+0x3b/0x50 [ 22.178600] __kasan_kmalloc+0xb7/0xc0 [ 22.179048] __kmalloc_cache_noprof+0x189/0x420 [ 22.179513] kasan_atomics+0x95/0x310 [ 22.179957] kunit_try_run_case+0x1a5/0x480 [ 22.180379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.180812] kthread+0x337/0x6f0 [ 22.181176] ret_from_fork+0x41/0x80 [ 22.181636] ret_from_fork_asm+0x1a/0x30 [ 22.182075] [ 22.182361] The buggy address belongs to the object at ffff888102a2c100 [ 22.182361] which belongs to the cache kmalloc-64 of size 64 [ 22.183310] The buggy address is located 0 bytes to the right of [ 22.183310] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.184282] [ 22.184487] The buggy address belongs to the physical page: [ 22.184992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.185664] flags: 0x200000000000000(node=0|zone=2) [ 22.186059] page_type: f5(slab) [ 22.186368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.186824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.187298] page dumped because: kasan: bad access detected [ 22.187667] [ 22.187854] Memory state around the buggy address: [ 22.188252] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.188743] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.189188] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.189926] ^ [ 22.190441] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.191434] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.192058] ================================================================== [ 23.827649] ================================================================== [ 23.828172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 23.828926] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.829640] [ 23.830488] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.831168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.831266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.831329] Call Trace: [ 23.831376] <TASK> [ 23.831419] dump_stack_lvl+0x73/0xb0 [ 23.831521] print_report+0xd1/0x650 [ 23.831644] ? __virt_addr_valid+0x1db/0x2d0 [ 23.831694] ? kasan_atomics_helper+0x4fa5/0x5450 [ 23.831733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.831771] ? kasan_atomics_helper+0x4fa5/0x5450 [ 23.831808] kasan_report+0x141/0x180 [ 23.831844] ? kasan_atomics_helper+0x4fa5/0x5450 [ 23.831884] __asan_report_load8_noabort+0x18/0x20 [ 23.831916] kasan_atomics_helper+0x4fa5/0x5450 [ 23.831952] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.831986] ? ret_from_fork_asm+0x1a/0x30 [ 23.832027] kasan_atomics+0x1dc/0x310 [ 23.832056] ? __pfx_kasan_atomics+0x10/0x10 [ 23.832087] ? __pfx_read_tsc+0x10/0x10 [ 23.832117] ? ktime_get_ts64+0x86/0x230 [ 23.832155] kunit_try_run_case+0x1a5/0x480 [ 23.832193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.832265] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.832307] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.832346] ? __kthread_parkme+0x82/0x180 [ 23.832379] ? preempt_count_sub+0x50/0x80 [ 23.832416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.832454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.832490] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.832525] kthread+0x337/0x6f0 [ 23.832551] ? trace_preempt_on+0x20/0xc0 [ 23.832587] ? __pfx_kthread+0x10/0x10 [ 23.832639] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.832677] ? calculate_sigpending+0x7b/0xa0 [ 23.832710] ? __pfx_kthread+0x10/0x10 [ 23.832737] ret_from_fork+0x41/0x80 [ 23.832770] ? __pfx_kthread+0x10/0x10 [ 23.832797] ret_from_fork_asm+0x1a/0x30 [ 23.832839] </TASK> [ 23.832854] [ 23.848901] Allocated by task 286: [ 23.849704] kasan_save_stack+0x45/0x70 [ 23.850675] kasan_save_track+0x18/0x40 [ 23.851362] kasan_save_alloc_info+0x3b/0x50 [ 23.851823] __kasan_kmalloc+0xb7/0xc0 [ 23.852231] __kmalloc_cache_noprof+0x189/0x420 [ 23.852650] kasan_atomics+0x95/0x310 [ 23.853041] kunit_try_run_case+0x1a5/0x480 [ 23.853481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.854021] kthread+0x337/0x6f0 [ 23.854362] ret_from_fork+0x41/0x80 [ 23.854799] ret_from_fork_asm+0x1a/0x30 [ 23.855176] [ 23.855408] The buggy address belongs to the object at ffff888102a2c100 [ 23.855408] which belongs to the cache kmalloc-64 of size 64 [ 23.856342] The buggy address is located 0 bytes to the right of [ 23.856342] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.858068] [ 23.858268] The buggy address belongs to the physical page: [ 23.859149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.859974] flags: 0x200000000000000(node=0|zone=2) [ 23.860739] page_type: f5(slab) [ 23.861014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.861869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.862419] page dumped because: kasan: bad access detected [ 23.862908] [ 23.863132] Memory state around the buggy address: [ 23.863517] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.864250] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.864850] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.865489] ^ [ 23.865985] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.866643] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.867282] ================================================================== [ 23.787159] ================================================================== [ 23.787759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 23.788475] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.789082] [ 23.789358] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.789485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.789562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.789642] Call Trace: [ 23.789693] <TASK> [ 23.789786] dump_stack_lvl+0x73/0xb0 [ 23.789870] print_report+0xd1/0x650 [ 23.789945] ? __virt_addr_valid+0x1db/0x2d0 [ 23.790018] ? kasan_atomics_helper+0x218a/0x5450 [ 23.790091] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.790240] ? kasan_atomics_helper+0x218a/0x5450 [ 23.790329] kasan_report+0x141/0x180 [ 23.790404] ? kasan_atomics_helper+0x218a/0x5450 [ 23.790453] kasan_check_range+0x10c/0x1c0 [ 23.790529] __kasan_check_write+0x18/0x20 [ 23.790620] kasan_atomics_helper+0x218a/0x5450 [ 23.790744] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.790826] ? ret_from_fork_asm+0x1a/0x30 [ 23.790919] kasan_atomics+0x1dc/0x310 [ 23.791036] ? __pfx_kasan_atomics+0x10/0x10 [ 23.791115] ? __pfx_read_tsc+0x10/0x10 [ 23.791184] ? ktime_get_ts64+0x86/0x230 [ 23.791279] kunit_try_run_case+0x1a5/0x480 [ 23.791320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.791357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.791395] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.791433] ? __kthread_parkme+0x82/0x180 [ 23.791465] ? preempt_count_sub+0x50/0x80 [ 23.791501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.791538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.791574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.791641] kthread+0x337/0x6f0 [ 23.791687] ? trace_preempt_on+0x20/0xc0 [ 23.791723] ? __pfx_kthread+0x10/0x10 [ 23.791748] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.791780] ? calculate_sigpending+0x7b/0xa0 [ 23.791810] ? __pfx_kthread+0x10/0x10 [ 23.791835] ret_from_fork+0x41/0x80 [ 23.791866] ? __pfx_kthread+0x10/0x10 [ 23.791890] ret_from_fork_asm+0x1a/0x30 [ 23.791931] </TASK> [ 23.791945] [ 23.807817] Allocated by task 286: [ 23.808318] kasan_save_stack+0x45/0x70 [ 23.808865] kasan_save_track+0x18/0x40 [ 23.809288] kasan_save_alloc_info+0x3b/0x50 [ 23.809634] __kasan_kmalloc+0xb7/0xc0 [ 23.810041] __kmalloc_cache_noprof+0x189/0x420 [ 23.810636] kasan_atomics+0x95/0x310 [ 23.811111] kunit_try_run_case+0x1a5/0x480 [ 23.811735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.812391] kthread+0x337/0x6f0 [ 23.812756] ret_from_fork+0x41/0x80 [ 23.813056] ret_from_fork_asm+0x1a/0x30 [ 23.813538] [ 23.813804] The buggy address belongs to the object at ffff888102a2c100 [ 23.813804] which belongs to the cache kmalloc-64 of size 64 [ 23.814985] The buggy address is located 0 bytes to the right of [ 23.814985] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.816737] [ 23.817020] The buggy address belongs to the physical page: [ 23.818022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.818794] flags: 0x200000000000000(node=0|zone=2) [ 23.819325] page_type: f5(slab) [ 23.820036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.820775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.821517] page dumped because: kasan: bad access detected [ 23.821876] [ 23.822108] Memory state around the buggy address: [ 23.822912] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.823554] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.824127] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.824777] ^ [ 23.825288] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.825896] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.826538] ================================================================== [ 23.085594] ================================================================== [ 23.086859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 23.087929] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.088502] [ 23.088756] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.088880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.088920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.088976] Call Trace: [ 23.089032] <TASK> [ 23.089075] dump_stack_lvl+0x73/0xb0 [ 23.089154] print_report+0xd1/0x650 [ 23.089223] ? __virt_addr_valid+0x1db/0x2d0 [ 23.089275] ? kasan_atomics_helper+0x18b1/0x5450 [ 23.089337] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.089415] ? kasan_atomics_helper+0x18b1/0x5450 [ 23.089496] kasan_report+0x141/0x180 [ 23.089574] ? kasan_atomics_helper+0x18b1/0x5450 [ 23.089769] kasan_check_range+0x10c/0x1c0 [ 23.089846] __kasan_check_write+0x18/0x20 [ 23.089911] kasan_atomics_helper+0x18b1/0x5450 [ 23.089952] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.089987] ? ret_from_fork_asm+0x1a/0x30 [ 23.090027] kasan_atomics+0x1dc/0x310 [ 23.090057] ? __pfx_kasan_atomics+0x10/0x10 [ 23.090089] ? __pfx_read_tsc+0x10/0x10 [ 23.090117] ? ktime_get_ts64+0x86/0x230 [ 23.090156] kunit_try_run_case+0x1a5/0x480 [ 23.090193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.090267] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.090308] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.090343] ? __kthread_parkme+0x82/0x180 [ 23.090377] ? preempt_count_sub+0x50/0x80 [ 23.090414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.090450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.090483] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.090519] kthread+0x337/0x6f0 [ 23.090543] ? trace_preempt_on+0x20/0xc0 [ 23.090577] ? __pfx_kthread+0x10/0x10 [ 23.090624] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.090665] ? calculate_sigpending+0x7b/0xa0 [ 23.090697] ? __pfx_kthread+0x10/0x10 [ 23.090725] ret_from_fork+0x41/0x80 [ 23.090757] ? __pfx_kthread+0x10/0x10 [ 23.090784] ret_from_fork_asm+0x1a/0x30 [ 23.090826] </TASK> [ 23.090841] [ 23.107098] Allocated by task 286: [ 23.107559] kasan_save_stack+0x45/0x70 [ 23.108030] kasan_save_track+0x18/0x40 [ 23.108573] kasan_save_alloc_info+0x3b/0x50 [ 23.109111] __kasan_kmalloc+0xb7/0xc0 [ 23.109590] __kmalloc_cache_noprof+0x189/0x420 [ 23.110131] kasan_atomics+0x95/0x310 [ 23.110689] kunit_try_run_case+0x1a5/0x480 [ 23.111159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.111784] kthread+0x337/0x6f0 [ 23.112143] ret_from_fork+0x41/0x80 [ 23.112676] ret_from_fork_asm+0x1a/0x30 [ 23.113205] [ 23.113515] The buggy address belongs to the object at ffff888102a2c100 [ 23.113515] which belongs to the cache kmalloc-64 of size 64 [ 23.114568] The buggy address is located 0 bytes to the right of [ 23.114568] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.115767] [ 23.116028] The buggy address belongs to the physical page: [ 23.116652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.117513] flags: 0x200000000000000(node=0|zone=2) [ 23.118046] page_type: f5(slab) [ 23.118579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.119319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.120014] page dumped because: kasan: bad access detected [ 23.120635] [ 23.120869] Memory state around the buggy address: [ 23.121397] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.122005] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.122656] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.123383] ^ [ 23.123914] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.124436] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.125265] ================================================================== [ 22.024893] ================================================================== [ 22.025802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 22.026630] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.027188] [ 22.027447] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.027572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.027632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.027694] Call Trace: [ 22.027747] <TASK> [ 22.027791] dump_stack_lvl+0x73/0xb0 [ 22.027871] print_report+0xd1/0x650 [ 22.027949] ? __virt_addr_valid+0x1db/0x2d0 [ 22.028026] ? kasan_atomics_helper+0xc70/0x5450 [ 22.028102] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.028181] ? kasan_atomics_helper+0xc70/0x5450 [ 22.028263] kasan_report+0x141/0x180 [ 22.028346] ? kasan_atomics_helper+0xc70/0x5450 [ 22.028437] kasan_check_range+0x10c/0x1c0 [ 22.028518] __kasan_check_write+0x18/0x20 [ 22.028588] kasan_atomics_helper+0xc70/0x5450 [ 22.028688] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.028768] ? ret_from_fork_asm+0x1a/0x30 [ 22.028856] kasan_atomics+0x1dc/0x310 [ 22.028927] ? __pfx_kasan_atomics+0x10/0x10 [ 22.029000] ? __pfx_read_tsc+0x10/0x10 [ 22.029064] ? ktime_get_ts64+0x86/0x230 [ 22.029145] kunit_try_run_case+0x1a5/0x480 [ 22.029231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.029305] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.029386] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.029463] ? __kthread_parkme+0x82/0x180 [ 22.029533] ? preempt_count_sub+0x50/0x80 [ 22.029630] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.029711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.029800] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.029876] kthread+0x337/0x6f0 [ 22.029936] ? trace_preempt_on+0x20/0xc0 [ 22.030012] ? __pfx_kthread+0x10/0x10 [ 22.030077] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.030149] ? calculate_sigpending+0x7b/0xa0 [ 22.030221] ? __pfx_kthread+0x10/0x10 [ 22.030285] ret_from_fork+0x41/0x80 [ 22.030338] ? __pfx_kthread+0x10/0x10 [ 22.030395] ret_from_fork_asm+0x1a/0x30 [ 22.030486] </TASK> [ 22.030528] [ 22.044184] Allocated by task 286: [ 22.044545] kasan_save_stack+0x45/0x70 [ 22.044982] kasan_save_track+0x18/0x40 [ 22.045503] kasan_save_alloc_info+0x3b/0x50 [ 22.045978] __kasan_kmalloc+0xb7/0xc0 [ 22.046502] __kmalloc_cache_noprof+0x189/0x420 [ 22.046929] kasan_atomics+0x95/0x310 [ 22.047299] kunit_try_run_case+0x1a5/0x480 [ 22.047736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.048195] kthread+0x337/0x6f0 [ 22.048575] ret_from_fork+0x41/0x80 [ 22.048943] ret_from_fork_asm+0x1a/0x30 [ 22.049266] [ 22.049570] The buggy address belongs to the object at ffff888102a2c100 [ 22.049570] which belongs to the cache kmalloc-64 of size 64 [ 22.050554] The buggy address is located 0 bytes to the right of [ 22.050554] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.051287] [ 22.051470] The buggy address belongs to the physical page: [ 22.051957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.052733] flags: 0x200000000000000(node=0|zone=2) [ 22.053477] page_type: f5(slab) [ 22.053802] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.054282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.055046] page dumped because: kasan: bad access detected [ 22.055814] [ 22.056147] Memory state around the buggy address: [ 22.056708] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.059521] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.059988] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.061333] ^ [ 22.062747] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.063921] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.065137] ================================================================== [ 21.243970] ================================================================== [ 21.244922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 21.245547] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.246081] [ 21.246335] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.246454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.246492] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.246543] Call Trace: [ 21.246579] <TASK> [ 21.246635] dump_stack_lvl+0x73/0xb0 [ 21.246797] print_report+0xd1/0x650 [ 21.246882] ? __virt_addr_valid+0x1db/0x2d0 [ 21.246953] ? kasan_atomics_helper+0x4b88/0x5450 [ 21.247023] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.247095] ? kasan_atomics_helper+0x4b88/0x5450 [ 21.247164] kasan_report+0x141/0x180 [ 21.247235] ? kasan_atomics_helper+0x4b88/0x5450 [ 21.247324] __asan_report_load4_noabort+0x18/0x20 [ 21.247390] kasan_atomics_helper+0x4b88/0x5450 [ 21.247446] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.247519] ? ret_from_fork_asm+0x1a/0x30 [ 21.247625] kasan_atomics+0x1dc/0x310 [ 21.247699] ? __pfx_kasan_atomics+0x10/0x10 [ 21.247775] ? __pfx_read_tsc+0x10/0x10 [ 21.247843] ? ktime_get_ts64+0x86/0x230 [ 21.247924] kunit_try_run_case+0x1a5/0x480 [ 21.248005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.248075] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.248154] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.248233] ? __kthread_parkme+0x82/0x180 [ 21.248404] ? preempt_count_sub+0x50/0x80 [ 21.248496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.248571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.248746] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.248824] kthread+0x337/0x6f0 [ 21.248884] ? trace_preempt_on+0x20/0xc0 [ 21.248960] ? __pfx_kthread+0x10/0x10 [ 21.249020] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.249088] ? calculate_sigpending+0x7b/0xa0 [ 21.249152] ? __pfx_kthread+0x10/0x10 [ 21.249183] ret_from_fork+0x41/0x80 [ 21.249223] ? __pfx_kthread+0x10/0x10 [ 21.249275] ret_from_fork_asm+0x1a/0x30 [ 21.249317] </TASK> [ 21.249332] [ 21.272192] Allocated by task 286: [ 21.272854] kasan_save_stack+0x45/0x70 [ 21.273332] kasan_save_track+0x18/0x40 [ 21.273857] kasan_save_alloc_info+0x3b/0x50 [ 21.274289] __kasan_kmalloc+0xb7/0xc0 [ 21.274700] __kmalloc_cache_noprof+0x189/0x420 [ 21.275140] kasan_atomics+0x95/0x310 [ 21.275482] kunit_try_run_case+0x1a5/0x480 [ 21.276184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.276656] kthread+0x337/0x6f0 [ 21.277021] ret_from_fork+0x41/0x80 [ 21.277429] ret_from_fork_asm+0x1a/0x30 [ 21.277958] [ 21.278198] The buggy address belongs to the object at ffff888102a2c100 [ 21.278198] which belongs to the cache kmalloc-64 of size 64 [ 21.279244] The buggy address is located 0 bytes to the right of [ 21.279244] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.280537] [ 21.280906] The buggy address belongs to the physical page: [ 21.281459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.282707] flags: 0x200000000000000(node=0|zone=2) [ 21.283187] page_type: f5(slab) [ 21.283738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.284455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.285261] page dumped because: kasan: bad access detected [ 21.285933] [ 21.286155] Memory state around the buggy address: [ 21.287014] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.287666] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.288256] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.288939] ^ [ 21.289483] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.290257] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.291193] ================================================================== [ 23.208878] ================================================================== [ 23.209471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 23.210257] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.211498] [ 23.211885] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.212008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.212049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.212131] Call Trace: [ 23.212212] <TASK> [ 23.212259] dump_stack_lvl+0x73/0xb0 [ 23.212355] print_report+0xd1/0x650 [ 23.212406] ? __virt_addr_valid+0x1db/0x2d0 [ 23.212441] ? kasan_atomics_helper+0x1a7f/0x5450 [ 23.212474] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.212509] ? kasan_atomics_helper+0x1a7f/0x5450 [ 23.212543] kasan_report+0x141/0x180 [ 23.212579] ? kasan_atomics_helper+0x1a7f/0x5450 [ 23.212646] kasan_check_range+0x10c/0x1c0 [ 23.212681] __kasan_check_write+0x18/0x20 [ 23.212711] kasan_atomics_helper+0x1a7f/0x5450 [ 23.212746] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.212780] ? ret_from_fork_asm+0x1a/0x30 [ 23.212819] kasan_atomics+0x1dc/0x310 [ 23.212848] ? __pfx_kasan_atomics+0x10/0x10 [ 23.212880] ? __pfx_read_tsc+0x10/0x10 [ 23.212908] ? ktime_get_ts64+0x86/0x230 [ 23.212945] kunit_try_run_case+0x1a5/0x480 [ 23.212981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.213016] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.213052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.213086] ? __kthread_parkme+0x82/0x180 [ 23.213118] ? preempt_count_sub+0x50/0x80 [ 23.213154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.213191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.213260] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.213304] kthread+0x337/0x6f0 [ 23.213331] ? trace_preempt_on+0x20/0xc0 [ 23.213368] ? __pfx_kthread+0x10/0x10 [ 23.213393] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.213427] ? calculate_sigpending+0x7b/0xa0 [ 23.213458] ? __pfx_kthread+0x10/0x10 [ 23.213484] ret_from_fork+0x41/0x80 [ 23.213515] ? __pfx_kthread+0x10/0x10 [ 23.213541] ret_from_fork_asm+0x1a/0x30 [ 23.213584] </TASK> [ 23.213616] [ 23.230536] Allocated by task 286: [ 23.230857] kasan_save_stack+0x45/0x70 [ 23.231298] kasan_save_track+0x18/0x40 [ 23.231804] kasan_save_alloc_info+0x3b/0x50 [ 23.232223] __kasan_kmalloc+0xb7/0xc0 [ 23.232557] __kmalloc_cache_noprof+0x189/0x420 [ 23.233105] kasan_atomics+0x95/0x310 [ 23.233620] kunit_try_run_case+0x1a5/0x480 [ 23.234029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.234474] kthread+0x337/0x6f0 [ 23.235537] ret_from_fork+0x41/0x80 [ 23.236290] ret_from_fork_asm+0x1a/0x30 [ 23.236747] [ 23.236960] The buggy address belongs to the object at ffff888102a2c100 [ 23.236960] which belongs to the cache kmalloc-64 of size 64 [ 23.238261] The buggy address is located 0 bytes to the right of [ 23.238261] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.239531] [ 23.239734] The buggy address belongs to the physical page: [ 23.240548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.241222] flags: 0x200000000000000(node=0|zone=2) [ 23.241653] page_type: f5(slab) [ 23.242000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.242682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.243155] page dumped because: kasan: bad access detected [ 23.243676] [ 23.243903] Memory state around the buggy address: [ 23.244312] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.245169] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.246077] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.246652] ^ [ 23.247285] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.248236] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.249040] ================================================================== [ 21.731354] ================================================================== [ 21.732007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 21.732753] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.733553] [ 21.733834] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.734024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.734070] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.734130] Call Trace: [ 21.734187] <TASK> [ 21.734274] dump_stack_lvl+0x73/0xb0 [ 21.734362] print_report+0xd1/0x650 [ 21.734446] ? __virt_addr_valid+0x1db/0x2d0 [ 21.734529] ? kasan_atomics_helper+0x7c7/0x5450 [ 21.734625] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.734710] ? kasan_atomics_helper+0x7c7/0x5450 [ 21.734811] kasan_report+0x141/0x180 [ 21.734923] ? kasan_atomics_helper+0x7c7/0x5450 [ 21.735011] kasan_check_range+0x10c/0x1c0 [ 21.735085] __kasan_check_write+0x18/0x20 [ 21.735155] kasan_atomics_helper+0x7c7/0x5450 [ 21.735272] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.735355] ? ret_from_fork_asm+0x1a/0x30 [ 21.735444] kasan_atomics+0x1dc/0x310 [ 21.735516] ? __pfx_kasan_atomics+0x10/0x10 [ 21.735589] ? __pfx_read_tsc+0x10/0x10 [ 21.735710] ? ktime_get_ts64+0x86/0x230 [ 21.735796] kunit_try_run_case+0x1a5/0x480 [ 21.735883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.735927] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.735964] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.736000] ? __kthread_parkme+0x82/0x180 [ 21.736031] ? preempt_count_sub+0x50/0x80 [ 21.736068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.736105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.736139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.736175] kthread+0x337/0x6f0 [ 21.736198] ? trace_preempt_on+0x20/0xc0 [ 21.736275] ? __pfx_kthread+0x10/0x10 [ 21.736305] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.736338] ? calculate_sigpending+0x7b/0xa0 [ 21.736370] ? __pfx_kthread+0x10/0x10 [ 21.736395] ret_from_fork+0x41/0x80 [ 21.736428] ? __pfx_kthread+0x10/0x10 [ 21.736454] ret_from_fork_asm+0x1a/0x30 [ 21.736498] </TASK> [ 21.736513] [ 21.758400] Allocated by task 286: [ 21.759344] kasan_save_stack+0x45/0x70 [ 21.759952] kasan_save_track+0x18/0x40 [ 21.760485] kasan_save_alloc_info+0x3b/0x50 [ 21.761164] __kasan_kmalloc+0xb7/0xc0 [ 21.761804] __kmalloc_cache_noprof+0x189/0x420 [ 21.762395] kasan_atomics+0x95/0x310 [ 21.762986] kunit_try_run_case+0x1a5/0x480 [ 21.763477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.764509] kthread+0x337/0x6f0 [ 21.764967] ret_from_fork+0x41/0x80 [ 21.765321] ret_from_fork_asm+0x1a/0x30 [ 21.765799] [ 21.766048] The buggy address belongs to the object at ffff888102a2c100 [ 21.766048] which belongs to the cache kmalloc-64 of size 64 [ 21.767347] The buggy address is located 0 bytes to the right of [ 21.767347] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.768631] [ 21.768957] The buggy address belongs to the physical page: [ 21.769340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.770538] flags: 0x200000000000000(node=0|zone=2) [ 21.771040] page_type: f5(slab) [ 21.771388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.772010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.772593] page dumped because: kasan: bad access detected [ 21.773718] [ 21.773960] Memory state around the buggy address: [ 21.774789] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.775094] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.776100] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.777188] ^ [ 21.777545] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.778063] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.779279] ================================================================== [ 22.435406] ================================================================== [ 22.436042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 22.436748] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.437539] [ 22.437832] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.437955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.437996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.438053] Call Trace: [ 22.438159] <TASK> [ 22.438254] dump_stack_lvl+0x73/0xb0 [ 22.438398] print_report+0xd1/0x650 [ 22.438485] ? __virt_addr_valid+0x1db/0x2d0 [ 22.438563] ? kasan_atomics_helper+0x1148/0x5450 [ 22.438657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.438708] ? kasan_atomics_helper+0x1148/0x5450 [ 22.438747] kasan_report+0x141/0x180 [ 22.438786] ? kasan_atomics_helper+0x1148/0x5450 [ 22.438827] kasan_check_range+0x10c/0x1c0 [ 22.438860] __kasan_check_write+0x18/0x20 [ 22.438890] kasan_atomics_helper+0x1148/0x5450 [ 22.438924] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.438960] ? ret_from_fork_asm+0x1a/0x30 [ 22.439001] kasan_atomics+0x1dc/0x310 [ 22.439031] ? __pfx_kasan_atomics+0x10/0x10 [ 22.439063] ? __pfx_read_tsc+0x10/0x10 [ 22.439092] ? ktime_get_ts64+0x86/0x230 [ 22.439129] kunit_try_run_case+0x1a5/0x480 [ 22.439169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.439205] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.439283] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.439321] ? __kthread_parkme+0x82/0x180 [ 22.439355] ? preempt_count_sub+0x50/0x80 [ 22.439393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.439431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.439467] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.439503] kthread+0x337/0x6f0 [ 22.439529] ? trace_preempt_on+0x20/0xc0 [ 22.439565] ? __pfx_kthread+0x10/0x10 [ 22.439593] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.439653] ? calculate_sigpending+0x7b/0xa0 [ 22.439689] ? __pfx_kthread+0x10/0x10 [ 22.439716] ret_from_fork+0x41/0x80 [ 22.439748] ? __pfx_kthread+0x10/0x10 [ 22.439775] ret_from_fork_asm+0x1a/0x30 [ 22.439819] </TASK> [ 22.439833] [ 22.457433] Allocated by task 286: [ 22.458157] kasan_save_stack+0x45/0x70 [ 22.458869] kasan_save_track+0x18/0x40 [ 22.459184] kasan_save_alloc_info+0x3b/0x50 [ 22.459639] __kasan_kmalloc+0xb7/0xc0 [ 22.460107] __kmalloc_cache_noprof+0x189/0x420 [ 22.460792] kasan_atomics+0x95/0x310 [ 22.461222] kunit_try_run_case+0x1a5/0x480 [ 22.461663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.462224] kthread+0x337/0x6f0 [ 22.462576] ret_from_fork+0x41/0x80 [ 22.463007] ret_from_fork_asm+0x1a/0x30 [ 22.463450] [ 22.463669] The buggy address belongs to the object at ffff888102a2c100 [ 22.463669] which belongs to the cache kmalloc-64 of size 64 [ 22.464662] The buggy address is located 0 bytes to the right of [ 22.464662] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.465429] [ 22.465686] The buggy address belongs to the physical page: [ 22.466193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.466931] flags: 0x200000000000000(node=0|zone=2) [ 22.467524] page_type: f5(slab) [ 22.467908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.468926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.469439] page dumped because: kasan: bad access detected [ 22.470010] [ 22.470169] Memory state around the buggy address: [ 22.470470] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.471153] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.471577] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.473171] ^ [ 22.473658] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.474197] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.475166] ================================================================== [ 23.495194] ================================================================== [ 23.496005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 23.497777] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.498585] [ 23.498850] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.498964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.498985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.499015] Call Trace: [ 23.499038] <TASK> [ 23.499059] dump_stack_lvl+0x73/0xb0 [ 23.499136] print_report+0xd1/0x650 [ 23.499230] ? __virt_addr_valid+0x1db/0x2d0 [ 23.499309] ? kasan_atomics_helper+0x1eaa/0x5450 [ 23.499379] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.499458] ? kasan_atomics_helper+0x1eaa/0x5450 [ 23.499524] kasan_report+0x141/0x180 [ 23.499562] ? kasan_atomics_helper+0x1eaa/0x5450 [ 23.499625] kasan_check_range+0x10c/0x1c0 [ 23.499662] __kasan_check_write+0x18/0x20 [ 23.499694] kasan_atomics_helper+0x1eaa/0x5450 [ 23.499729] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.499764] ? ret_from_fork_asm+0x1a/0x30 [ 23.499804] kasan_atomics+0x1dc/0x310 [ 23.499832] ? __pfx_kasan_atomics+0x10/0x10 [ 23.499863] ? __pfx_read_tsc+0x10/0x10 [ 23.499893] ? ktime_get_ts64+0x86/0x230 [ 23.499930] kunit_try_run_case+0x1a5/0x480 [ 23.499967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.500001] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.500037] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.500071] ? __kthread_parkme+0x82/0x180 [ 23.500102] ? preempt_count_sub+0x50/0x80 [ 23.500138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.500174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.500210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.500272] kthread+0x337/0x6f0 [ 23.500299] ? trace_preempt_on+0x20/0xc0 [ 23.500334] ? __pfx_kthread+0x10/0x10 [ 23.500361] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.500394] ? calculate_sigpending+0x7b/0xa0 [ 23.500426] ? __pfx_kthread+0x10/0x10 [ 23.500452] ret_from_fork+0x41/0x80 [ 23.500483] ? __pfx_kthread+0x10/0x10 [ 23.500507] ret_from_fork_asm+0x1a/0x30 [ 23.500549] </TASK> [ 23.500564] [ 23.520389] Allocated by task 286: [ 23.521206] kasan_save_stack+0x45/0x70 [ 23.521845] kasan_save_track+0x18/0x40 [ 23.522281] kasan_save_alloc_info+0x3b/0x50 [ 23.522913] __kasan_kmalloc+0xb7/0xc0 [ 23.523428] __kmalloc_cache_noprof+0x189/0x420 [ 23.523881] kasan_atomics+0x95/0x310 [ 23.524047] kunit_try_run_case+0x1a5/0x480 [ 23.524233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.524796] kthread+0x337/0x6f0 [ 23.525164] ret_from_fork+0x41/0x80 [ 23.525722] ret_from_fork_asm+0x1a/0x30 [ 23.526153] [ 23.526668] The buggy address belongs to the object at ffff888102a2c100 [ 23.526668] which belongs to the cache kmalloc-64 of size 64 [ 23.528245] The buggy address is located 0 bytes to the right of [ 23.528245] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.529496] [ 23.530030] The buggy address belongs to the physical page: [ 23.530442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.531448] flags: 0x200000000000000(node=0|zone=2) [ 23.532091] page_type: f5(slab) [ 23.532424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.533018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.533700] page dumped because: kasan: bad access detected [ 23.534143] [ 23.534341] Memory state around the buggy address: [ 23.534896] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.536056] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.536781] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.537745] ^ [ 23.538136] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.538800] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.539364] ================================================================== [ 22.559416] ================================================================== [ 22.561115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 22.562351] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.563560] [ 22.564093] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.564296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.564339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.564407] Call Trace: [ 22.564455] <TASK> [ 22.564496] dump_stack_lvl+0x73/0xb0 [ 22.564544] print_report+0xd1/0x650 [ 22.564581] ? __virt_addr_valid+0x1db/0x2d0 [ 22.564636] ? kasan_atomics_helper+0x49e8/0x5450 [ 22.564674] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.564709] ? kasan_atomics_helper+0x49e8/0x5450 [ 22.564744] kasan_report+0x141/0x180 [ 22.564778] ? kasan_atomics_helper+0x49e8/0x5450 [ 22.564818] __asan_report_load4_noabort+0x18/0x20 [ 22.564850] kasan_atomics_helper+0x49e8/0x5450 [ 22.564885] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.564919] ? ret_from_fork_asm+0x1a/0x30 [ 22.564956] kasan_atomics+0x1dc/0x310 [ 22.564985] ? __pfx_kasan_atomics+0x10/0x10 [ 22.565015] ? __pfx_read_tsc+0x10/0x10 [ 22.565044] ? ktime_get_ts64+0x86/0x230 [ 22.565079] kunit_try_run_case+0x1a5/0x480 [ 22.565116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.565149] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.565185] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.565234] ? __kthread_parkme+0x82/0x180 [ 22.565284] ? preempt_count_sub+0x50/0x80 [ 22.565321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.565358] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.565392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.565428] kthread+0x337/0x6f0 [ 22.565451] ? trace_preempt_on+0x20/0xc0 [ 22.565485] ? __pfx_kthread+0x10/0x10 [ 22.565510] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.565542] ? calculate_sigpending+0x7b/0xa0 [ 22.565572] ? __pfx_kthread+0x10/0x10 [ 22.565598] ret_from_fork+0x41/0x80 [ 22.565652] ? __pfx_kthread+0x10/0x10 [ 22.565679] ret_from_fork_asm+0x1a/0x30 [ 22.565722] </TASK> [ 22.565737] [ 22.583088] Allocated by task 286: [ 22.583962] kasan_save_stack+0x45/0x70 [ 22.584492] kasan_save_track+0x18/0x40 [ 22.584902] kasan_save_alloc_info+0x3b/0x50 [ 22.585566] __kasan_kmalloc+0xb7/0xc0 [ 22.585908] __kmalloc_cache_noprof+0x189/0x420 [ 22.586592] kasan_atomics+0x95/0x310 [ 22.587011] kunit_try_run_case+0x1a5/0x480 [ 22.587616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.588282] kthread+0x337/0x6f0 [ 22.588621] ret_from_fork+0x41/0x80 [ 22.589135] ret_from_fork_asm+0x1a/0x30 [ 22.589763] [ 22.589950] The buggy address belongs to the object at ffff888102a2c100 [ 22.589950] which belongs to the cache kmalloc-64 of size 64 [ 22.591185] The buggy address is located 0 bytes to the right of [ 22.591185] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.592455] [ 22.592713] The buggy address belongs to the physical page: [ 22.593432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.594255] flags: 0x200000000000000(node=0|zone=2) [ 22.594797] page_type: f5(slab) [ 22.595169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.596123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.596925] page dumped because: kasan: bad access detected [ 22.597518] [ 22.597782] Memory state around the buggy address: [ 22.598283] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.598874] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.599520] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.600139] ^ [ 22.600630] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.601178] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.601862] ================================================================== [ 22.927432] ================================================================== [ 22.928128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 22.928836] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.929371] [ 22.929585] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.929776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.929817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.929873] Call Trace: [ 22.929921] <TASK> [ 22.929964] dump_stack_lvl+0x73/0xb0 [ 22.930041] print_report+0xd1/0x650 [ 22.930120] ? __virt_addr_valid+0x1db/0x2d0 [ 22.930198] ? kasan_atomics_helper+0x164f/0x5450 [ 22.930320] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.930384] ? kasan_atomics_helper+0x164f/0x5450 [ 22.930446] kasan_report+0x141/0x180 [ 22.930524] ? kasan_atomics_helper+0x164f/0x5450 [ 22.930634] kasan_check_range+0x10c/0x1c0 [ 22.930715] __kasan_check_write+0x18/0x20 [ 22.930792] kasan_atomics_helper+0x164f/0x5450 [ 22.930873] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.930954] ? ret_from_fork_asm+0x1a/0x30 [ 22.931049] kasan_atomics+0x1dc/0x310 [ 22.931121] ? __pfx_kasan_atomics+0x10/0x10 [ 22.931201] ? __pfx_read_tsc+0x10/0x10 [ 22.931311] ? ktime_get_ts64+0x86/0x230 [ 22.931394] kunit_try_run_case+0x1a5/0x480 [ 22.931474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.931545] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.931639] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.931720] ? __kthread_parkme+0x82/0x180 [ 22.931792] ? preempt_count_sub+0x50/0x80 [ 22.931872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.931950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.932026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.932092] kthread+0x337/0x6f0 [ 22.932121] ? trace_preempt_on+0x20/0xc0 [ 22.932156] ? __pfx_kthread+0x10/0x10 [ 22.932183] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.932267] ? calculate_sigpending+0x7b/0xa0 [ 22.932307] ? __pfx_kthread+0x10/0x10 [ 22.932335] ret_from_fork+0x41/0x80 [ 22.932367] ? __pfx_kthread+0x10/0x10 [ 22.932393] ret_from_fork_asm+0x1a/0x30 [ 22.932435] </TASK> [ 22.932448] [ 22.946471] Allocated by task 286: [ 22.946853] kasan_save_stack+0x45/0x70 [ 22.947261] kasan_save_track+0x18/0x40 [ 22.947665] kasan_save_alloc_info+0x3b/0x50 [ 22.948020] __kasan_kmalloc+0xb7/0xc0 [ 22.948389] __kmalloc_cache_noprof+0x189/0x420 [ 22.948756] kasan_atomics+0x95/0x310 [ 22.949108] kunit_try_run_case+0x1a5/0x480 [ 22.949620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.950168] kthread+0x337/0x6f0 [ 22.950590] ret_from_fork+0x41/0x80 [ 22.951026] ret_from_fork_asm+0x1a/0x30 [ 22.951496] [ 22.951753] The buggy address belongs to the object at ffff888102a2c100 [ 22.951753] which belongs to the cache kmalloc-64 of size 64 [ 22.952512] The buggy address is located 0 bytes to the right of [ 22.952512] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.953596] [ 22.953849] The buggy address belongs to the physical page: [ 22.954341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.954984] flags: 0x200000000000000(node=0|zone=2) [ 22.955493] page_type: f5(slab) [ 22.955837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.956371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.956963] page dumped because: kasan: bad access detected [ 22.957535] [ 22.957793] Memory state around the buggy address: [ 22.958294] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.958921] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.959582] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.960113] ^ [ 22.960491] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.961113] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.961800] ================================================================== [ 22.963929] ================================================================== [ 22.965896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 22.966658] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.967995] [ 22.968482] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.968632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.968674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.968730] Call Trace: [ 22.968778] <TASK> [ 22.968821] dump_stack_lvl+0x73/0xb0 [ 22.968897] print_report+0xd1/0x650 [ 22.968972] ? __virt_addr_valid+0x1db/0x2d0 [ 22.969047] ? kasan_atomics_helper+0x16e7/0x5450 [ 22.969122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.969218] ? kasan_atomics_helper+0x16e7/0x5450 [ 22.969286] kasan_report+0x141/0x180 [ 22.969326] ? kasan_atomics_helper+0x16e7/0x5450 [ 22.969368] kasan_check_range+0x10c/0x1c0 [ 22.969401] __kasan_check_write+0x18/0x20 [ 22.969432] kasan_atomics_helper+0x16e7/0x5450 [ 22.969467] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.969503] ? ret_from_fork_asm+0x1a/0x30 [ 22.969542] kasan_atomics+0x1dc/0x310 [ 22.969571] ? __pfx_kasan_atomics+0x10/0x10 [ 22.969623] ? __pfx_read_tsc+0x10/0x10 [ 22.969657] ? ktime_get_ts64+0x86/0x230 [ 22.969694] kunit_try_run_case+0x1a5/0x480 [ 22.969731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.969775] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.969811] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.969847] ? __kthread_parkme+0x82/0x180 [ 22.969877] ? preempt_count_sub+0x50/0x80 [ 22.969913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.969949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.969983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.970017] kthread+0x337/0x6f0 [ 22.970040] ? trace_preempt_on+0x20/0xc0 [ 22.970075] ? __pfx_kthread+0x10/0x10 [ 22.970099] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.970131] ? calculate_sigpending+0x7b/0xa0 [ 22.970163] ? __pfx_kthread+0x10/0x10 [ 22.970188] ret_from_fork+0x41/0x80 [ 22.970256] ? __pfx_kthread+0x10/0x10 [ 22.970290] ret_from_fork_asm+0x1a/0x30 [ 22.970333] </TASK> [ 22.970348] [ 22.984563] Allocated by task 286: [ 22.984958] kasan_save_stack+0x45/0x70 [ 22.985446] kasan_save_track+0x18/0x40 [ 22.985882] kasan_save_alloc_info+0x3b/0x50 [ 22.986297] __kasan_kmalloc+0xb7/0xc0 [ 22.986689] __kmalloc_cache_noprof+0x189/0x420 [ 22.987113] kasan_atomics+0x95/0x310 [ 22.987720] kunit_try_run_case+0x1a5/0x480 [ 22.988111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.988635] kthread+0x337/0x6f0 [ 22.988916] ret_from_fork+0x41/0x80 [ 22.989214] ret_from_fork_asm+0x1a/0x30 [ 22.989637] [ 22.989883] The buggy address belongs to the object at ffff888102a2c100 [ 22.989883] which belongs to the cache kmalloc-64 of size 64 [ 22.990974] The buggy address is located 0 bytes to the right of [ 22.990974] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.991884] [ 22.992068] The buggy address belongs to the physical page: [ 22.992508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.993436] flags: 0x200000000000000(node=0|zone=2) [ 22.993891] page_type: f5(slab) [ 22.994257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.994872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.995367] page dumped because: kasan: bad access detected [ 22.996188] [ 22.996394] Memory state around the buggy address: [ 22.996750] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.997197] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.999106] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.000722] ^ [ 23.001624] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.002091] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.002590] ================================================================== [ 21.158094] ================================================================== [ 21.159779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 21.160481] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.161170] [ 21.161925] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.162105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.162147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.162205] Call Trace: [ 21.162246] <TASK> [ 21.162290] dump_stack_lvl+0x73/0xb0 [ 21.162363] print_report+0xd1/0x650 [ 21.162435] ? __virt_addr_valid+0x1db/0x2d0 [ 21.162508] ? kasan_atomics_helper+0x4bbc/0x5450 [ 21.162571] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.162714] ? kasan_atomics_helper+0x4bbc/0x5450 [ 21.162757] kasan_report+0x141/0x180 [ 21.162792] ? kasan_atomics_helper+0x4bbc/0x5450 [ 21.162834] __asan_report_load4_noabort+0x18/0x20 [ 21.162865] kasan_atomics_helper+0x4bbc/0x5450 [ 21.162901] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.162935] ? ret_from_fork_asm+0x1a/0x30 [ 21.162977] kasan_atomics+0x1dc/0x310 [ 21.163005] ? __pfx_kasan_atomics+0x10/0x10 [ 21.163037] ? __pfx_read_tsc+0x10/0x10 [ 21.163067] ? ktime_get_ts64+0x86/0x230 [ 21.163103] kunit_try_run_case+0x1a5/0x480 [ 21.163141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.163175] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.163213] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.163277] ? __kthread_parkme+0x82/0x180 [ 21.163314] ? preempt_count_sub+0x50/0x80 [ 21.163351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.163387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.163422] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.163456] kthread+0x337/0x6f0 [ 21.163481] ? trace_preempt_on+0x20/0xc0 [ 21.163515] ? __pfx_kthread+0x10/0x10 [ 21.163542] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.163574] ? calculate_sigpending+0x7b/0xa0 [ 21.163649] ? __pfx_kthread+0x10/0x10 [ 21.163722] ret_from_fork+0x41/0x80 [ 21.163797] ? __pfx_kthread+0x10/0x10 [ 21.163829] ret_from_fork_asm+0x1a/0x30 [ 21.163871] </TASK> [ 21.163887] [ 21.181217] Allocated by task 286: [ 21.181782] kasan_save_stack+0x45/0x70 [ 21.182193] kasan_save_track+0x18/0x40 [ 21.182584] kasan_save_alloc_info+0x3b/0x50 [ 21.183162] __kasan_kmalloc+0xb7/0xc0 [ 21.183764] __kmalloc_cache_noprof+0x189/0x420 [ 21.184105] kasan_atomics+0x95/0x310 [ 21.184550] kunit_try_run_case+0x1a5/0x480 [ 21.185126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.185888] kthread+0x337/0x6f0 [ 21.186256] ret_from_fork+0x41/0x80 [ 21.186814] ret_from_fork_asm+0x1a/0x30 [ 21.187194] [ 21.187430] The buggy address belongs to the object at ffff888102a2c100 [ 21.187430] which belongs to the cache kmalloc-64 of size 64 [ 21.188592] The buggy address is located 0 bytes to the right of [ 21.188592] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.189782] [ 21.190014] The buggy address belongs to the physical page: [ 21.190553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.191368] flags: 0x200000000000000(node=0|zone=2) [ 21.191919] page_type: f5(slab) [ 21.192283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.192919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.193516] page dumped because: kasan: bad access detected [ 21.194039] [ 21.194316] Memory state around the buggy address: [ 21.194897] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.195504] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.196140] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.196966] ^ [ 21.197398] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.197950] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.198543] ================================================================== [ 21.434171] ================================================================== [ 21.434923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 21.435569] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.436906] [ 21.437153] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.437280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.437320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.437377] Call Trace: [ 21.437425] <TASK> [ 21.437473] dump_stack_lvl+0x73/0xb0 [ 21.437547] print_report+0xd1/0x650 [ 21.437637] ? __virt_addr_valid+0x1db/0x2d0 [ 21.437720] ? kasan_atomics_helper+0x4a0/0x5450 [ 21.437879] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.437966] ? kasan_atomics_helper+0x4a0/0x5450 [ 21.438042] kasan_report+0x141/0x180 [ 21.438122] ? kasan_atomics_helper+0x4a0/0x5450 [ 21.438204] kasan_check_range+0x10c/0x1c0 [ 21.438239] __kasan_check_write+0x18/0x20 [ 21.438272] kasan_atomics_helper+0x4a0/0x5450 [ 21.438307] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.438342] ? ret_from_fork_asm+0x1a/0x30 [ 21.438416] kasan_atomics+0x1dc/0x310 [ 21.438450] ? __pfx_kasan_atomics+0x10/0x10 [ 21.438483] ? __pfx_read_tsc+0x10/0x10 [ 21.438514] ? ktime_get_ts64+0x86/0x230 [ 21.438553] kunit_try_run_case+0x1a5/0x480 [ 21.438591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.438675] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.438745] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.438783] ? __kthread_parkme+0x82/0x180 [ 21.438818] ? preempt_count_sub+0x50/0x80 [ 21.438855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.438894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.438930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.438966] kthread+0x337/0x6f0 [ 21.438990] ? trace_preempt_on+0x20/0xc0 [ 21.439027] ? __pfx_kthread+0x10/0x10 [ 21.439055] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.439088] ? calculate_sigpending+0x7b/0xa0 [ 21.439120] ? __pfx_kthread+0x10/0x10 [ 21.439148] ret_from_fork+0x41/0x80 [ 21.439180] ? __pfx_kthread+0x10/0x10 [ 21.439207] ret_from_fork_asm+0x1a/0x30 [ 21.439279] </TASK> [ 21.439295] [ 21.460441] Allocated by task 286: [ 21.461300] kasan_save_stack+0x45/0x70 [ 21.461666] kasan_save_track+0x18/0x40 [ 21.462010] kasan_save_alloc_info+0x3b/0x50 [ 21.462420] __kasan_kmalloc+0xb7/0xc0 [ 21.463034] __kmalloc_cache_noprof+0x189/0x420 [ 21.464300] kasan_atomics+0x95/0x310 [ 21.465004] kunit_try_run_case+0x1a5/0x480 [ 21.465768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.466012] kthread+0x337/0x6f0 [ 21.466159] ret_from_fork+0x41/0x80 [ 21.466442] ret_from_fork_asm+0x1a/0x30 [ 21.467458] [ 21.467797] The buggy address belongs to the object at ffff888102a2c100 [ 21.467797] which belongs to the cache kmalloc-64 of size 64 [ 21.468808] The buggy address is located 0 bytes to the right of [ 21.468808] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.470523] [ 21.470828] The buggy address belongs to the physical page: [ 21.471567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.472423] flags: 0x200000000000000(node=0|zone=2) [ 21.473136] page_type: f5(slab) [ 21.473721] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.474575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.475252] page dumped because: kasan: bad access detected [ 21.475735] [ 21.475954] Memory state around the buggy address: [ 21.476377] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.477838] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.478443] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.479455] ^ [ 21.480015] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.480704] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.481569] ================================================================== [ 21.987941] ================================================================== [ 21.988492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 21.989002] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.989542] [ 21.989846] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.990002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.990044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.990098] Call Trace: [ 21.990143] <TASK> [ 21.990183] dump_stack_lvl+0x73/0xb0 [ 21.990310] print_report+0xd1/0x650 [ 21.990386] ? __virt_addr_valid+0x1db/0x2d0 [ 21.990464] ? kasan_atomics_helper+0xb6a/0x5450 [ 21.990541] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.990641] ? kasan_atomics_helper+0xb6a/0x5450 [ 21.990718] kasan_report+0x141/0x180 [ 21.990800] ? kasan_atomics_helper+0xb6a/0x5450 [ 21.990891] kasan_check_range+0x10c/0x1c0 [ 21.990969] __kasan_check_write+0x18/0x20 [ 21.991040] kasan_atomics_helper+0xb6a/0x5450 [ 21.991118] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.991187] ? ret_from_fork_asm+0x1a/0x30 [ 21.991323] kasan_atomics+0x1dc/0x310 [ 21.991398] ? __pfx_kasan_atomics+0x10/0x10 [ 21.991467] ? __pfx_read_tsc+0x10/0x10 [ 21.991533] ? ktime_get_ts64+0x86/0x230 [ 21.991631] kunit_try_run_case+0x1a5/0x480 [ 21.991703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.991775] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.991854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.991934] ? __kthread_parkme+0x82/0x180 [ 21.992010] ? preempt_count_sub+0x50/0x80 [ 21.992092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.992172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.992301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.992384] kthread+0x337/0x6f0 [ 21.992453] ? trace_preempt_on+0x20/0xc0 [ 21.992535] ? __pfx_kthread+0x10/0x10 [ 21.992617] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.992690] ? calculate_sigpending+0x7b/0xa0 [ 21.992761] ? __pfx_kthread+0x10/0x10 [ 21.992828] ret_from_fork+0x41/0x80 [ 21.992898] ? __pfx_kthread+0x10/0x10 [ 21.992962] ret_from_fork_asm+0x1a/0x30 [ 21.993051] </TASK> [ 21.993087] [ 22.007812] Allocated by task 286: [ 22.008173] kasan_save_stack+0x45/0x70 [ 22.008589] kasan_save_track+0x18/0x40 [ 22.009092] kasan_save_alloc_info+0x3b/0x50 [ 22.009501] __kasan_kmalloc+0xb7/0xc0 [ 22.009850] __kmalloc_cache_noprof+0x189/0x420 [ 22.010196] kasan_atomics+0x95/0x310 [ 22.010503] kunit_try_run_case+0x1a5/0x480 [ 22.010970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.011499] kthread+0x337/0x6f0 [ 22.011895] ret_from_fork+0x41/0x80 [ 22.012335] ret_from_fork_asm+0x1a/0x30 [ 22.012800] [ 22.013018] The buggy address belongs to the object at ffff888102a2c100 [ 22.013018] which belongs to the cache kmalloc-64 of size 64 [ 22.014178] The buggy address is located 0 bytes to the right of [ 22.014178] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.014921] [ 22.015104] The buggy address belongs to the physical page: [ 22.015908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.016834] flags: 0x200000000000000(node=0|zone=2) [ 22.017249] page_type: f5(slab) [ 22.017616] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.018229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.018869] page dumped because: kasan: bad access detected [ 22.019329] [ 22.019553] Memory state around the buggy address: [ 22.019986] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.020577] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.021042] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.021653] ^ [ 22.022131] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.022891] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.023328] ================================================================== [ 23.250358] ================================================================== [ 23.250855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 23.251394] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.252054] [ 23.252341] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.252467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.252509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.252562] Call Trace: [ 23.252631] <TASK> [ 23.252677] dump_stack_lvl+0x73/0xb0 [ 23.252757] print_report+0xd1/0x650 [ 23.252837] ? __virt_addr_valid+0x1db/0x2d0 [ 23.252913] ? kasan_atomics_helper+0x1b22/0x5450 [ 23.252993] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.253071] ? kasan_atomics_helper+0x1b22/0x5450 [ 23.253151] kasan_report+0x141/0x180 [ 23.253230] ? kasan_atomics_helper+0x1b22/0x5450 [ 23.253319] kasan_check_range+0x10c/0x1c0 [ 23.253392] __kasan_check_write+0x18/0x20 [ 23.253467] kasan_atomics_helper+0x1b22/0x5450 [ 23.253546] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.253670] ? ret_from_fork_asm+0x1a/0x30 [ 23.253742] kasan_atomics+0x1dc/0x310 [ 23.253787] ? __pfx_kasan_atomics+0x10/0x10 [ 23.253819] ? __pfx_read_tsc+0x10/0x10 [ 23.253849] ? ktime_get_ts64+0x86/0x230 [ 23.253888] kunit_try_run_case+0x1a5/0x480 [ 23.253927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.253962] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.254000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.254036] ? __kthread_parkme+0x82/0x180 [ 23.254069] ? preempt_count_sub+0x50/0x80 [ 23.254106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.254143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.254177] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.254236] kthread+0x337/0x6f0 [ 23.254281] ? trace_preempt_on+0x20/0xc0 [ 23.254319] ? __pfx_kthread+0x10/0x10 [ 23.254345] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.254380] ? calculate_sigpending+0x7b/0xa0 [ 23.254413] ? __pfx_kthread+0x10/0x10 [ 23.254441] ret_from_fork+0x41/0x80 [ 23.254471] ? __pfx_kthread+0x10/0x10 [ 23.254498] ret_from_fork_asm+0x1a/0x30 [ 23.254542] </TASK> [ 23.254557] [ 23.272800] Allocated by task 286: [ 23.273352] kasan_save_stack+0x45/0x70 [ 23.274139] kasan_save_track+0x18/0x40 [ 23.274694] kasan_save_alloc_info+0x3b/0x50 [ 23.275068] __kasan_kmalloc+0xb7/0xc0 [ 23.275514] __kmalloc_cache_noprof+0x189/0x420 [ 23.275913] kasan_atomics+0x95/0x310 [ 23.276316] kunit_try_run_case+0x1a5/0x480 [ 23.276803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.277327] kthread+0x337/0x6f0 [ 23.277706] ret_from_fork+0x41/0x80 [ 23.278034] ret_from_fork_asm+0x1a/0x30 [ 23.278500] [ 23.279171] The buggy address belongs to the object at ffff888102a2c100 [ 23.279171] which belongs to the cache kmalloc-64 of size 64 [ 23.279933] The buggy address is located 0 bytes to the right of [ 23.279933] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.281058] [ 23.281392] The buggy address belongs to the physical page: [ 23.281914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.282796] flags: 0x200000000000000(node=0|zone=2) [ 23.283269] page_type: f5(slab) [ 23.283554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.284213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.285002] page dumped because: kasan: bad access detected [ 23.285640] [ 23.285833] Memory state around the buggy address: [ 23.286162] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.286778] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.287418] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.288019] ^ [ 23.288490] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.289070] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.290079] ================================================================== [ 23.623867] ================================================================== [ 23.624566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 23.625171] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.625897] [ 23.626120] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.626286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.626328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.626384] Call Trace: [ 23.626455] <TASK> [ 23.626505] dump_stack_lvl+0x73/0xb0 [ 23.626625] print_report+0xd1/0x650 [ 23.626703] ? __virt_addr_valid+0x1db/0x2d0 [ 23.626776] ? kasan_atomics_helper+0x2006/0x5450 [ 23.626847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.626927] ? kasan_atomics_helper+0x2006/0x5450 [ 23.627008] kasan_report+0x141/0x180 [ 23.627086] ? kasan_atomics_helper+0x2006/0x5450 [ 23.627257] kasan_check_range+0x10c/0x1c0 [ 23.627342] __kasan_check_write+0x18/0x20 [ 23.627435] kasan_atomics_helper+0x2006/0x5450 [ 23.627549] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.627644] ? ret_from_fork_asm+0x1a/0x30 [ 23.627704] kasan_atomics+0x1dc/0x310 [ 23.627735] ? __pfx_kasan_atomics+0x10/0x10 [ 23.627803] ? __pfx_read_tsc+0x10/0x10 [ 23.627872] ? ktime_get_ts64+0x86/0x230 [ 23.627981] kunit_try_run_case+0x1a5/0x480 [ 23.628093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.628172] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.628303] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.628412] ? __kthread_parkme+0x82/0x180 [ 23.628484] ? preempt_count_sub+0x50/0x80 [ 23.628529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.628567] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.628625] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.628665] kthread+0x337/0x6f0 [ 23.628690] ? trace_preempt_on+0x20/0xc0 [ 23.628726] ? __pfx_kthread+0x10/0x10 [ 23.628752] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.628783] ? calculate_sigpending+0x7b/0xa0 [ 23.628813] ? __pfx_kthread+0x10/0x10 [ 23.628838] ret_from_fork+0x41/0x80 [ 23.628870] ? __pfx_kthread+0x10/0x10 [ 23.628894] ret_from_fork_asm+0x1a/0x30 [ 23.628936] </TASK> [ 23.628951] [ 23.643462] Allocated by task 286: [ 23.643849] kasan_save_stack+0x45/0x70 [ 23.644380] kasan_save_track+0x18/0x40 [ 23.644860] kasan_save_alloc_info+0x3b/0x50 [ 23.645336] __kasan_kmalloc+0xb7/0xc0 [ 23.645787] __kmalloc_cache_noprof+0x189/0x420 [ 23.646325] kasan_atomics+0x95/0x310 [ 23.646745] kunit_try_run_case+0x1a5/0x480 [ 23.647269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.647769] kthread+0x337/0x6f0 [ 23.648172] ret_from_fork+0x41/0x80 [ 23.648522] ret_from_fork_asm+0x1a/0x30 [ 23.648955] [ 23.649185] The buggy address belongs to the object at ffff888102a2c100 [ 23.649185] which belongs to the cache kmalloc-64 of size 64 [ 23.650178] The buggy address is located 0 bytes to the right of [ 23.650178] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.652418] [ 23.652702] The buggy address belongs to the physical page: [ 23.653230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.653974] flags: 0x200000000000000(node=0|zone=2) [ 23.654394] page_type: f5(slab) [ 23.655502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.656150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.656825] page dumped because: kasan: bad access detected [ 23.657380] [ 23.657653] Memory state around the buggy address: [ 23.658052] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.658783] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.659357] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.659978] ^ [ 23.660520] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.661090] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.661778] ================================================================== [ 23.745248] ================================================================== [ 23.746199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 23.746865] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.747468] [ 23.747743] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.747864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.747902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.747962] Call Trace: [ 23.748014] <TASK> [ 23.748101] dump_stack_lvl+0x73/0xb0 [ 23.748182] print_report+0xd1/0x650 [ 23.748266] ? __virt_addr_valid+0x1db/0x2d0 [ 23.748343] ? kasan_atomics_helper+0x4fb2/0x5450 [ 23.748450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.748540] ? kasan_atomics_helper+0x4fb2/0x5450 [ 23.748635] kasan_report+0x141/0x180 [ 23.748754] ? kasan_atomics_helper+0x4fb2/0x5450 [ 23.748850] __asan_report_load8_noabort+0x18/0x20 [ 23.748931] kasan_atomics_helper+0x4fb2/0x5450 [ 23.749051] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.749133] ? ret_from_fork_asm+0x1a/0x30 [ 23.749222] kasan_atomics+0x1dc/0x310 [ 23.749298] ? __pfx_kasan_atomics+0x10/0x10 [ 23.749372] ? __pfx_read_tsc+0x10/0x10 [ 23.749434] ? ktime_get_ts64+0x86/0x230 [ 23.749476] kunit_try_run_case+0x1a5/0x480 [ 23.749518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.749554] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.749592] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.749659] ? __kthread_parkme+0x82/0x180 [ 23.749694] ? preempt_count_sub+0x50/0x80 [ 23.749733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.749779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.749815] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.749853] kthread+0x337/0x6f0 [ 23.749878] ? trace_preempt_on+0x20/0xc0 [ 23.749915] ? __pfx_kthread+0x10/0x10 [ 23.749942] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.749975] ? calculate_sigpending+0x7b/0xa0 [ 23.750007] ? __pfx_kthread+0x10/0x10 [ 23.750034] ret_from_fork+0x41/0x80 [ 23.750066] ? __pfx_kthread+0x10/0x10 [ 23.750092] ret_from_fork_asm+0x1a/0x30 [ 23.750135] </TASK> [ 23.750150] [ 23.767923] Allocated by task 286: [ 23.768328] kasan_save_stack+0x45/0x70 [ 23.768870] kasan_save_track+0x18/0x40 [ 23.769382] kasan_save_alloc_info+0x3b/0x50 [ 23.769865] __kasan_kmalloc+0xb7/0xc0 [ 23.770173] __kmalloc_cache_noprof+0x189/0x420 [ 23.770901] kasan_atomics+0x95/0x310 [ 23.771510] kunit_try_run_case+0x1a5/0x480 [ 23.771995] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.772587] kthread+0x337/0x6f0 [ 23.773016] ret_from_fork+0x41/0x80 [ 23.773553] ret_from_fork_asm+0x1a/0x30 [ 23.774089] [ 23.774332] The buggy address belongs to the object at ffff888102a2c100 [ 23.774332] which belongs to the cache kmalloc-64 of size 64 [ 23.775321] The buggy address is located 0 bytes to the right of [ 23.775321] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.776387] [ 23.776641] The buggy address belongs to the physical page: [ 23.777268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.777887] flags: 0x200000000000000(node=0|zone=2) [ 23.778481] page_type: f5(slab) [ 23.778868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.779702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.780377] page dumped because: kasan: bad access detected [ 23.780942] [ 23.781118] Memory state around the buggy address: [ 23.781692] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.782412] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.783131] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.783799] ^ [ 23.784518] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.785265] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.785833] ================================================================== [ 21.633371] ================================================================== [ 21.633879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 21.635301] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.636040] [ 21.636282] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.636412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.636453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.636509] Call Trace: [ 21.636565] <TASK> [ 21.636627] dump_stack_lvl+0x73/0xb0 [ 21.636707] print_report+0xd1/0x650 [ 21.636784] ? __virt_addr_valid+0x1db/0x2d0 [ 21.636856] ? kasan_atomics_helper+0x697/0x5450 [ 21.636929] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.637006] ? kasan_atomics_helper+0x697/0x5450 [ 21.637089] kasan_report+0x141/0x180 [ 21.637171] ? kasan_atomics_helper+0x697/0x5450 [ 21.637226] kasan_check_range+0x10c/0x1c0 [ 21.637281] __kasan_check_write+0x18/0x20 [ 21.637316] kasan_atomics_helper+0x697/0x5450 [ 21.637353] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.637388] ? ret_from_fork_asm+0x1a/0x30 [ 21.637429] kasan_atomics+0x1dc/0x310 [ 21.637459] ? __pfx_kasan_atomics+0x10/0x10 [ 21.637494] ? __pfx_read_tsc+0x10/0x10 [ 21.637525] ? ktime_get_ts64+0x86/0x230 [ 21.637562] kunit_try_run_case+0x1a5/0x480 [ 21.637620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.637699] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.637760] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.637799] ? __kthread_parkme+0x82/0x180 [ 21.637831] ? preempt_count_sub+0x50/0x80 [ 21.637872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.637909] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.637945] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.637981] kthread+0x337/0x6f0 [ 21.638007] ? trace_preempt_on+0x20/0xc0 [ 21.638043] ? __pfx_kthread+0x10/0x10 [ 21.638070] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.638102] ? calculate_sigpending+0x7b/0xa0 [ 21.638134] ? __pfx_kthread+0x10/0x10 [ 21.638161] ret_from_fork+0x41/0x80 [ 21.638194] ? __pfx_kthread+0x10/0x10 [ 21.638256] ret_from_fork_asm+0x1a/0x30 [ 21.638307] </TASK> [ 21.638323] [ 21.660664] Allocated by task 286: [ 21.661066] kasan_save_stack+0x45/0x70 [ 21.661924] kasan_save_track+0x18/0x40 [ 21.662465] kasan_save_alloc_info+0x3b/0x50 [ 21.663182] __kasan_kmalloc+0xb7/0xc0 [ 21.663533] __kmalloc_cache_noprof+0x189/0x420 [ 21.664243] kasan_atomics+0x95/0x310 [ 21.664559] kunit_try_run_case+0x1a5/0x480 [ 21.665176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.666127] kthread+0x337/0x6f0 [ 21.666812] ret_from_fork+0x41/0x80 [ 21.667299] ret_from_fork_asm+0x1a/0x30 [ 21.667878] [ 21.668066] The buggy address belongs to the object at ffff888102a2c100 [ 21.668066] which belongs to the cache kmalloc-64 of size 64 [ 21.669471] The buggy address is located 0 bytes to the right of [ 21.669471] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.670719] [ 21.671820] The buggy address belongs to the physical page: [ 21.672221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.673257] flags: 0x200000000000000(node=0|zone=2) [ 21.673734] page_type: f5(slab) [ 21.674124] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.675129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.676530] page dumped because: kasan: bad access detected [ 21.676906] [ 21.677204] Memory state around the buggy address: [ 21.678142] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.678907] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.679434] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.679962] ^ [ 21.680323] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.680813] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.682312] ================================================================== [ 22.314972] ================================================================== [ 22.315722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 22.316295] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.316981] [ 22.317324] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.317447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.317483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.317538] Call Trace: [ 22.317590] <TASK> [ 22.317654] dump_stack_lvl+0x73/0xb0 [ 22.317791] print_report+0xd1/0x650 [ 22.317907] ? __virt_addr_valid+0x1db/0x2d0 [ 22.318017] ? kasan_atomics_helper+0x4a36/0x5450 [ 22.318123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.318249] ? kasan_atomics_helper+0x4a36/0x5450 [ 22.318331] kasan_report+0x141/0x180 [ 22.318408] ? kasan_atomics_helper+0x4a36/0x5450 [ 22.318493] __asan_report_load4_noabort+0x18/0x20 [ 22.318564] kasan_atomics_helper+0x4a36/0x5450 [ 22.318660] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.318739] ? ret_from_fork_asm+0x1a/0x30 [ 22.318867] kasan_atomics+0x1dc/0x310 [ 22.318950] ? __pfx_kasan_atomics+0x10/0x10 [ 22.319067] ? __pfx_read_tsc+0x10/0x10 [ 22.319135] ? ktime_get_ts64+0x86/0x230 [ 22.319258] kunit_try_run_case+0x1a5/0x480 [ 22.319330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.319369] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.319405] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.319442] ? __kthread_parkme+0x82/0x180 [ 22.319473] ? preempt_count_sub+0x50/0x80 [ 22.319509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.319545] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.319578] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.319641] kthread+0x337/0x6f0 [ 22.319669] ? trace_preempt_on+0x20/0xc0 [ 22.319705] ? __pfx_kthread+0x10/0x10 [ 22.319730] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.319762] ? calculate_sigpending+0x7b/0xa0 [ 22.319792] ? __pfx_kthread+0x10/0x10 [ 22.319818] ret_from_fork+0x41/0x80 [ 22.319852] ? __pfx_kthread+0x10/0x10 [ 22.319878] ret_from_fork_asm+0x1a/0x30 [ 22.319921] </TASK> [ 22.319935] [ 22.334566] Allocated by task 286: [ 22.335001] kasan_save_stack+0x45/0x70 [ 22.335468] kasan_save_track+0x18/0x40 [ 22.335918] kasan_save_alloc_info+0x3b/0x50 [ 22.336454] __kasan_kmalloc+0xb7/0xc0 [ 22.336872] __kmalloc_cache_noprof+0x189/0x420 [ 22.337392] kasan_atomics+0x95/0x310 [ 22.337815] kunit_try_run_case+0x1a5/0x480 [ 22.338334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.338901] kthread+0x337/0x6f0 [ 22.339272] ret_from_fork+0x41/0x80 [ 22.339578] ret_from_fork_asm+0x1a/0x30 [ 22.340041] [ 22.340351] The buggy address belongs to the object at ffff888102a2c100 [ 22.340351] which belongs to the cache kmalloc-64 of size 64 [ 22.341467] The buggy address is located 0 bytes to the right of [ 22.341467] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.342380] [ 22.342648] The buggy address belongs to the physical page: [ 22.343244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.343869] flags: 0x200000000000000(node=0|zone=2) [ 22.344402] page_type: f5(slab) [ 22.344855] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.345580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.346314] page dumped because: kasan: bad access detected [ 22.346805] [ 22.347040] Memory state around the buggy address: [ 22.347570] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.348282] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.348961] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.349687] ^ [ 22.350095] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.350617] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.351336] ================================================================== [ 22.679320] ================================================================== [ 22.679915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 22.680443] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.681100] [ 22.681401] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.681519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.681557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.681631] Call Trace: [ 22.681684] <TASK> [ 22.681726] dump_stack_lvl+0x73/0xb0 [ 22.681815] print_report+0xd1/0x650 [ 22.681895] ? __virt_addr_valid+0x1db/0x2d0 [ 22.681972] ? kasan_atomics_helper+0x13b5/0x5450 [ 22.682050] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.682131] ? kasan_atomics_helper+0x13b5/0x5450 [ 22.682249] kasan_report+0x141/0x180 [ 22.682338] ? kasan_atomics_helper+0x13b5/0x5450 [ 22.682433] kasan_check_range+0x10c/0x1c0 [ 22.682506] __kasan_check_read+0x15/0x20 [ 22.682564] kasan_atomics_helper+0x13b5/0x5450 [ 22.682642] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.682714] ? ret_from_fork_asm+0x1a/0x30 [ 22.682801] kasan_atomics+0x1dc/0x310 [ 22.682879] ? __pfx_kasan_atomics+0x10/0x10 [ 22.682955] ? __pfx_read_tsc+0x10/0x10 [ 22.683021] ? ktime_get_ts64+0x86/0x230 [ 22.683102] kunit_try_run_case+0x1a5/0x480 [ 22.683180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.683308] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.683391] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.683475] ? __kthread_parkme+0x82/0x180 [ 22.683553] ? preempt_count_sub+0x50/0x80 [ 22.683651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.683734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.683813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.683894] kthread+0x337/0x6f0 [ 22.683956] ? trace_preempt_on+0x20/0xc0 [ 22.684033] ? __pfx_kthread+0x10/0x10 [ 22.684097] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.684168] ? calculate_sigpending+0x7b/0xa0 [ 22.684269] ? __pfx_kthread+0x10/0x10 [ 22.684303] ret_from_fork+0x41/0x80 [ 22.684338] ? __pfx_kthread+0x10/0x10 [ 22.684365] ret_from_fork_asm+0x1a/0x30 [ 22.684408] </TASK> [ 22.684424] [ 22.702357] Allocated by task 286: [ 22.702800] kasan_save_stack+0x45/0x70 [ 22.703344] kasan_save_track+0x18/0x40 [ 22.703834] kasan_save_alloc_info+0x3b/0x50 [ 22.704367] __kasan_kmalloc+0xb7/0xc0 [ 22.704843] __kmalloc_cache_noprof+0x189/0x420 [ 22.705424] kasan_atomics+0x95/0x310 [ 22.705946] kunit_try_run_case+0x1a5/0x480 [ 22.706490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.707112] kthread+0x337/0x6f0 [ 22.707529] ret_from_fork+0x41/0x80 [ 22.708011] ret_from_fork_asm+0x1a/0x30 [ 22.708571] [ 22.709665] The buggy address belongs to the object at ffff888102a2c100 [ 22.709665] which belongs to the cache kmalloc-64 of size 64 [ 22.710998] The buggy address is located 0 bytes to the right of [ 22.710998] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.712085] [ 22.712314] The buggy address belongs to the physical page: [ 22.712815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.713923] flags: 0x200000000000000(node=0|zone=2) [ 22.714425] page_type: f5(slab) [ 22.714860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.715493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.716109] page dumped because: kasan: bad access detected [ 22.716662] [ 22.716912] Memory state around the buggy address: [ 22.717385] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.718002] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.718595] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.719164] ^ [ 22.719568] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.720272] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.720857] ================================================================== [ 23.540391] ================================================================== [ 23.541903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 23.542164] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.543673] [ 23.544167] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.544295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.544336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.544392] Call Trace: [ 23.544442] <TASK> [ 23.544484] dump_stack_lvl+0x73/0xb0 [ 23.544566] print_report+0xd1/0x650 [ 23.544659] ? __virt_addr_valid+0x1db/0x2d0 [ 23.544698] ? kasan_atomics_helper+0x1f43/0x5450 [ 23.544755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.544793] ? kasan_atomics_helper+0x1f43/0x5450 [ 23.544828] kasan_report+0x141/0x180 [ 23.544862] ? kasan_atomics_helper+0x1f43/0x5450 [ 23.544902] kasan_check_range+0x10c/0x1c0 [ 23.544933] __kasan_check_write+0x18/0x20 [ 23.544962] kasan_atomics_helper+0x1f43/0x5450 [ 23.544998] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.545031] ? ret_from_fork_asm+0x1a/0x30 [ 23.545069] kasan_atomics+0x1dc/0x310 [ 23.545099] ? __pfx_kasan_atomics+0x10/0x10 [ 23.545129] ? __pfx_read_tsc+0x10/0x10 [ 23.545157] ? ktime_get_ts64+0x86/0x230 [ 23.545193] kunit_try_run_case+0x1a5/0x480 [ 23.545268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.545309] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.545346] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.545380] ? __kthread_parkme+0x82/0x180 [ 23.545411] ? preempt_count_sub+0x50/0x80 [ 23.545446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.545482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.545517] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.545551] kthread+0x337/0x6f0 [ 23.545575] ? trace_preempt_on+0x20/0xc0 [ 23.545633] ? __pfx_kthread+0x10/0x10 [ 23.545663] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.545694] ? calculate_sigpending+0x7b/0xa0 [ 23.545726] ? __pfx_kthread+0x10/0x10 [ 23.545762] ret_from_fork+0x41/0x80 [ 23.545797] ? __pfx_kthread+0x10/0x10 [ 23.545823] ret_from_fork_asm+0x1a/0x30 [ 23.545867] </TASK> [ 23.545882] [ 23.564413] Allocated by task 286: [ 23.565164] kasan_save_stack+0x45/0x70 [ 23.565841] kasan_save_track+0x18/0x40 [ 23.566235] kasan_save_alloc_info+0x3b/0x50 [ 23.566591] __kasan_kmalloc+0xb7/0xc0 [ 23.566959] __kmalloc_cache_noprof+0x189/0x420 [ 23.567348] kasan_atomics+0x95/0x310 [ 23.567813] kunit_try_run_case+0x1a5/0x480 [ 23.568281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.568681] kthread+0x337/0x6f0 [ 23.569034] ret_from_fork+0x41/0x80 [ 23.569667] ret_from_fork_asm+0x1a/0x30 [ 23.570108] [ 23.570390] The buggy address belongs to the object at ffff888102a2c100 [ 23.570390] which belongs to the cache kmalloc-64 of size 64 [ 23.571468] The buggy address is located 0 bytes to the right of [ 23.571468] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.572626] [ 23.572923] The buggy address belongs to the physical page: [ 23.573517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.574275] flags: 0x200000000000000(node=0|zone=2) [ 23.574850] page_type: f5(slab) [ 23.575299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.576080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.576772] page dumped because: kasan: bad access detected [ 23.577395] [ 23.577689] Memory state around the buggy address: [ 23.578203] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.578900] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.579664] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.580173] ^ [ 23.580746] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.581348] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.582051] ================================================================== [ 23.329918] ================================================================== [ 23.331198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 23.333090] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.334192] [ 23.334514] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.334654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.334693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.334820] Call Trace: [ 23.334875] <TASK> [ 23.334918] dump_stack_lvl+0x73/0xb0 [ 23.334997] print_report+0xd1/0x650 [ 23.335131] ? __virt_addr_valid+0x1db/0x2d0 [ 23.335209] ? kasan_atomics_helper+0x4f30/0x5450 [ 23.335286] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.335366] ? kasan_atomics_helper+0x4f30/0x5450 [ 23.335440] kasan_report+0x141/0x180 [ 23.335556] ? kasan_atomics_helper+0x4f30/0x5450 [ 23.335691] __asan_report_load8_noabort+0x18/0x20 [ 23.335765] kasan_atomics_helper+0x4f30/0x5450 [ 23.335844] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.335914] ? ret_from_fork_asm+0x1a/0x30 [ 23.335958] kasan_atomics+0x1dc/0x310 [ 23.335989] ? __pfx_kasan_atomics+0x10/0x10 [ 23.336022] ? __pfx_read_tsc+0x10/0x10 [ 23.336051] ? ktime_get_ts64+0x86/0x230 [ 23.336088] kunit_try_run_case+0x1a5/0x480 [ 23.336128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.336164] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.336200] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.336278] ? __kthread_parkme+0x82/0x180 [ 23.336315] ? preempt_count_sub+0x50/0x80 [ 23.336353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.336389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.336425] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.336459] kthread+0x337/0x6f0 [ 23.336484] ? trace_preempt_on+0x20/0xc0 [ 23.336519] ? __pfx_kthread+0x10/0x10 [ 23.336545] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.336576] ? calculate_sigpending+0x7b/0xa0 [ 23.336631] ? __pfx_kthread+0x10/0x10 [ 23.336662] ret_from_fork+0x41/0x80 [ 23.336693] ? __pfx_kthread+0x10/0x10 [ 23.336719] ret_from_fork_asm+0x1a/0x30 [ 23.336762] </TASK> [ 23.336776] [ 23.354093] Allocated by task 286: [ 23.354495] kasan_save_stack+0x45/0x70 [ 23.354872] kasan_save_track+0x18/0x40 [ 23.355286] kasan_save_alloc_info+0x3b/0x50 [ 23.355875] __kasan_kmalloc+0xb7/0xc0 [ 23.356407] __kmalloc_cache_noprof+0x189/0x420 [ 23.356767] kasan_atomics+0x95/0x310 [ 23.357073] kunit_try_run_case+0x1a5/0x480 [ 23.357817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.358475] kthread+0x337/0x6f0 [ 23.358964] ret_from_fork+0x41/0x80 [ 23.359436] ret_from_fork_asm+0x1a/0x30 [ 23.359991] [ 23.360342] The buggy address belongs to the object at ffff888102a2c100 [ 23.360342] which belongs to the cache kmalloc-64 of size 64 [ 23.361324] The buggy address is located 0 bytes to the right of [ 23.361324] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.362617] [ 23.362835] The buggy address belongs to the physical page: [ 23.363565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.364339] flags: 0x200000000000000(node=0|zone=2) [ 23.364821] page_type: f5(slab) [ 23.365492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.366140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.366978] page dumped because: kasan: bad access detected [ 23.367560] [ 23.367801] Memory state around the buggy address: [ 23.368571] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.369262] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.369862] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.370496] ^ [ 23.370957] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.371669] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.372274] ================================================================== [ 22.521045] ================================================================== [ 22.521823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 22.522534] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.523172] [ 22.523417] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.523545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.523676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.523761] Call Trace: [ 22.523816] <TASK> [ 22.523860] dump_stack_lvl+0x73/0xb0 [ 22.524062] print_report+0xd1/0x650 [ 22.524177] ? __virt_addr_valid+0x1db/0x2d0 [ 22.524297] ? kasan_atomics_helper+0x1217/0x5450 [ 22.524371] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.524426] ? kasan_atomics_helper+0x1217/0x5450 [ 22.524484] kasan_report+0x141/0x180 [ 22.524562] ? kasan_atomics_helper+0x1217/0x5450 [ 22.524748] kasan_check_range+0x10c/0x1c0 [ 22.524830] __kasan_check_write+0x18/0x20 [ 22.524955] kasan_atomics_helper+0x1217/0x5450 [ 22.525074] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.525151] ? ret_from_fork_asm+0x1a/0x30 [ 22.525198] kasan_atomics+0x1dc/0x310 [ 22.525271] ? __pfx_kasan_atomics+0x10/0x10 [ 22.525308] ? __pfx_read_tsc+0x10/0x10 [ 22.525337] ? ktime_get_ts64+0x86/0x230 [ 22.525376] kunit_try_run_case+0x1a5/0x480 [ 22.525413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.525447] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.525484] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.525519] ? __kthread_parkme+0x82/0x180 [ 22.525551] ? preempt_count_sub+0x50/0x80 [ 22.525587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.525650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.525689] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.525726] kthread+0x337/0x6f0 [ 22.525763] ? trace_preempt_on+0x20/0xc0 [ 22.525800] ? __pfx_kthread+0x10/0x10 [ 22.525825] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.525857] ? calculate_sigpending+0x7b/0xa0 [ 22.525888] ? __pfx_kthread+0x10/0x10 [ 22.525913] ret_from_fork+0x41/0x80 [ 22.525945] ? __pfx_kthread+0x10/0x10 [ 22.525969] ret_from_fork_asm+0x1a/0x30 [ 22.526011] </TASK> [ 22.526025] [ 22.542124] Allocated by task 286: [ 22.542560] kasan_save_stack+0x45/0x70 [ 22.543019] kasan_save_track+0x18/0x40 [ 22.543484] kasan_save_alloc_info+0x3b/0x50 [ 22.543864] __kasan_kmalloc+0xb7/0xc0 [ 22.544174] __kmalloc_cache_noprof+0x189/0x420 [ 22.544675] kasan_atomics+0x95/0x310 [ 22.545087] kunit_try_run_case+0x1a5/0x480 [ 22.545573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.546125] kthread+0x337/0x6f0 [ 22.546526] ret_from_fork+0x41/0x80 [ 22.546901] ret_from_fork_asm+0x1a/0x30 [ 22.547367] [ 22.547593] The buggy address belongs to the object at ffff888102a2c100 [ 22.547593] which belongs to the cache kmalloc-64 of size 64 [ 22.548543] The buggy address is located 0 bytes to the right of [ 22.548543] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.549424] [ 22.549627] The buggy address belongs to the physical page: [ 22.550157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.550927] flags: 0x200000000000000(node=0|zone=2) [ 22.551430] page_type: f5(slab) [ 22.551778] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.552410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.553076] page dumped because: kasan: bad access detected [ 22.553554] [ 22.553802] Memory state around the buggy address: [ 22.554277] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.554800] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.555378] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.555907] ^ [ 22.556335] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.557640] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.558457] ================================================================== [ 23.456030] ================================================================== [ 23.457301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 23.458148] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.459000] [ 23.459549] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.459699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.459738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.459818] Call Trace: [ 23.459898] <TASK> [ 23.459944] dump_stack_lvl+0x73/0xb0 [ 23.460001] print_report+0xd1/0x650 [ 23.460042] ? __virt_addr_valid+0x1db/0x2d0 [ 23.460076] ? kasan_atomics_helper+0x1e12/0x5450 [ 23.460112] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.460147] ? kasan_atomics_helper+0x1e12/0x5450 [ 23.460181] kasan_report+0x141/0x180 [ 23.460227] ? kasan_atomics_helper+0x1e12/0x5450 [ 23.460291] kasan_check_range+0x10c/0x1c0 [ 23.460323] __kasan_check_write+0x18/0x20 [ 23.460354] kasan_atomics_helper+0x1e12/0x5450 [ 23.460390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.460424] ? ret_from_fork_asm+0x1a/0x30 [ 23.460464] kasan_atomics+0x1dc/0x310 [ 23.460493] ? __pfx_kasan_atomics+0x10/0x10 [ 23.460524] ? __pfx_read_tsc+0x10/0x10 [ 23.460554] ? ktime_get_ts64+0x86/0x230 [ 23.460592] kunit_try_run_case+0x1a5/0x480 [ 23.460656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.460694] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.460731] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.460767] ? __kthread_parkme+0x82/0x180 [ 23.460801] ? preempt_count_sub+0x50/0x80 [ 23.460838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.460874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.460911] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.460947] kthread+0x337/0x6f0 [ 23.460972] ? trace_preempt_on+0x20/0xc0 [ 23.461007] ? __pfx_kthread+0x10/0x10 [ 23.461035] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.461068] ? calculate_sigpending+0x7b/0xa0 [ 23.461100] ? __pfx_kthread+0x10/0x10 [ 23.461128] ret_from_fork+0x41/0x80 [ 23.461160] ? __pfx_kthread+0x10/0x10 [ 23.461186] ret_from_fork_asm+0x1a/0x30 [ 23.461259] </TASK> [ 23.461278] [ 23.476989] Allocated by task 286: [ 23.477445] kasan_save_stack+0x45/0x70 [ 23.477945] kasan_save_track+0x18/0x40 [ 23.478434] kasan_save_alloc_info+0x3b/0x50 [ 23.478880] __kasan_kmalloc+0xb7/0xc0 [ 23.479279] __kmalloc_cache_noprof+0x189/0x420 [ 23.479643] kasan_atomics+0x95/0x310 [ 23.480065] kunit_try_run_case+0x1a5/0x480 [ 23.480628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.481193] kthread+0x337/0x6f0 [ 23.481630] ret_from_fork+0x41/0x80 [ 23.482084] ret_from_fork_asm+0x1a/0x30 [ 23.482480] [ 23.482685] The buggy address belongs to the object at ffff888102a2c100 [ 23.482685] which belongs to the cache kmalloc-64 of size 64 [ 23.483792] The buggy address is located 0 bytes to the right of [ 23.483792] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.484744] [ 23.484934] The buggy address belongs to the physical page: [ 23.485379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.486132] flags: 0x200000000000000(node=0|zone=2) [ 23.486641] page_type: f5(slab) [ 23.487039] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.487732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.488188] page dumped because: kasan: bad access detected [ 23.488684] [ 23.488946] Memory state around the buggy address: [ 23.489502] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.490162] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.490845] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.491442] ^ [ 23.491885] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.493155] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.493893] ================================================================== [ 21.780563] ================================================================== [ 21.781528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 21.782163] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.782772] [ 21.783045] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.783172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.783248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.783313] Call Trace: [ 21.783366] <TASK> [ 21.783415] dump_stack_lvl+0x73/0xb0 [ 21.783500] print_report+0xd1/0x650 [ 21.783583] ? __virt_addr_valid+0x1db/0x2d0 [ 21.783789] ? kasan_atomics_helper+0x860/0x5450 [ 21.783868] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.783948] ? kasan_atomics_helper+0x860/0x5450 [ 21.784024] kasan_report+0x141/0x180 [ 21.784107] ? kasan_atomics_helper+0x860/0x5450 [ 21.784196] kasan_check_range+0x10c/0x1c0 [ 21.784319] __kasan_check_write+0x18/0x20 [ 21.784392] kasan_atomics_helper+0x860/0x5450 [ 21.784473] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.784554] ? ret_from_fork_asm+0x1a/0x30 [ 21.784770] kasan_atomics+0x1dc/0x310 [ 21.784831] ? __pfx_kasan_atomics+0x10/0x10 [ 21.784866] ? __pfx_read_tsc+0x10/0x10 [ 21.784897] ? ktime_get_ts64+0x86/0x230 [ 21.784936] kunit_try_run_case+0x1a5/0x480 [ 21.784976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.785011] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.785049] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.785086] ? __kthread_parkme+0x82/0x180 [ 21.785120] ? preempt_count_sub+0x50/0x80 [ 21.785158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.785195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.785271] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.785311] kthread+0x337/0x6f0 [ 21.785339] ? trace_preempt_on+0x20/0xc0 [ 21.785376] ? __pfx_kthread+0x10/0x10 [ 21.785403] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.785436] ? calculate_sigpending+0x7b/0xa0 [ 21.785468] ? __pfx_kthread+0x10/0x10 [ 21.785496] ret_from_fork+0x41/0x80 [ 21.785527] ? __pfx_kthread+0x10/0x10 [ 21.785552] ret_from_fork_asm+0x1a/0x30 [ 21.785598] </TASK> [ 21.785675] [ 21.806077] Allocated by task 286: [ 21.806591] kasan_save_stack+0x45/0x70 [ 21.807324] kasan_save_track+0x18/0x40 [ 21.808007] kasan_save_alloc_info+0x3b/0x50 [ 21.808565] __kasan_kmalloc+0xb7/0xc0 [ 21.808950] __kmalloc_cache_noprof+0x189/0x420 [ 21.809797] kasan_atomics+0x95/0x310 [ 21.810287] kunit_try_run_case+0x1a5/0x480 [ 21.811113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.811714] kthread+0x337/0x6f0 [ 21.812248] ret_from_fork+0x41/0x80 [ 21.812807] ret_from_fork_asm+0x1a/0x30 [ 21.813291] [ 21.813729] The buggy address belongs to the object at ffff888102a2c100 [ 21.813729] which belongs to the cache kmalloc-64 of size 64 [ 21.815015] The buggy address is located 0 bytes to the right of [ 21.815015] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.816520] [ 21.816947] The buggy address belongs to the physical page: [ 21.817500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.818189] flags: 0x200000000000000(node=0|zone=2) [ 21.818724] page_type: f5(slab) [ 21.819151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.819819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.820459] page dumped because: kasan: bad access detected [ 21.821336] [ 21.821968] Memory state around the buggy address: [ 21.822691] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.823425] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.824277] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.825174] ^ [ 21.825731] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.826926] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.827506] ================================================================== [ 21.911322] ================================================================== [ 21.912016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 21.912717] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.913404] [ 21.913736] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.913870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.913911] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.913967] Call Trace: [ 21.914017] <TASK> [ 21.914065] dump_stack_lvl+0x73/0xb0 [ 21.914154] print_report+0xd1/0x650 [ 21.914286] ? __virt_addr_valid+0x1db/0x2d0 [ 21.914361] ? kasan_atomics_helper+0xa2b/0x5450 [ 21.914432] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.914506] ? kasan_atomics_helper+0xa2b/0x5450 [ 21.914582] kasan_report+0x141/0x180 [ 21.914682] ? kasan_atomics_helper+0xa2b/0x5450 [ 21.914795] kasan_check_range+0x10c/0x1c0 [ 21.914898] __kasan_check_write+0x18/0x20 [ 21.914971] kasan_atomics_helper+0xa2b/0x5450 [ 21.915074] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.915183] ? ret_from_fork_asm+0x1a/0x30 [ 21.915296] kasan_atomics+0x1dc/0x310 [ 21.915330] ? __pfx_kasan_atomics+0x10/0x10 [ 21.915362] ? __pfx_read_tsc+0x10/0x10 [ 21.915390] ? ktime_get_ts64+0x86/0x230 [ 21.915428] kunit_try_run_case+0x1a5/0x480 [ 21.915464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.915499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.915535] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.915571] ? __kthread_parkme+0x82/0x180 [ 21.915630] ? preempt_count_sub+0x50/0x80 [ 21.915703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.915743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.915780] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.915815] kthread+0x337/0x6f0 [ 21.915839] ? trace_preempt_on+0x20/0xc0 [ 21.915875] ? __pfx_kthread+0x10/0x10 [ 21.915902] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.915934] ? calculate_sigpending+0x7b/0xa0 [ 21.915966] ? __pfx_kthread+0x10/0x10 [ 21.915992] ret_from_fork+0x41/0x80 [ 21.916022] ? __pfx_kthread+0x10/0x10 [ 21.916048] ret_from_fork_asm+0x1a/0x30 [ 21.916089] </TASK> [ 21.916104] [ 21.931146] Allocated by task 286: [ 21.931571] kasan_save_stack+0x45/0x70 [ 21.931979] kasan_save_track+0x18/0x40 [ 21.932490] kasan_save_alloc_info+0x3b/0x50 [ 21.932941] __kasan_kmalloc+0xb7/0xc0 [ 21.933392] __kmalloc_cache_noprof+0x189/0x420 [ 21.933873] kasan_atomics+0x95/0x310 [ 21.934378] kunit_try_run_case+0x1a5/0x480 [ 21.934766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.935152] kthread+0x337/0x6f0 [ 21.935481] ret_from_fork+0x41/0x80 [ 21.935899] ret_from_fork_asm+0x1a/0x30 [ 21.936412] [ 21.936666] The buggy address belongs to the object at ffff888102a2c100 [ 21.936666] which belongs to the cache kmalloc-64 of size 64 [ 21.937777] The buggy address is located 0 bytes to the right of [ 21.937777] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.938809] [ 21.938996] The buggy address belongs to the physical page: [ 21.939426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.940123] flags: 0x200000000000000(node=0|zone=2) [ 21.940618] page_type: f5(slab) [ 21.940986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.941692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.942431] page dumped because: kasan: bad access detected [ 21.942954] [ 21.943165] Memory state around the buggy address: [ 21.943695] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.944398] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.945030] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.945707] ^ [ 21.946190] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.946713] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.947441] ================================================================== [ 22.272966] ================================================================== [ 22.273656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 22.274171] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.274788] [ 22.275009] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.275128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.275169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.275225] Call Trace: [ 22.275275] <TASK> [ 22.275434] dump_stack_lvl+0x73/0xb0 [ 22.275548] print_report+0xd1/0x650 [ 22.275640] ? __virt_addr_valid+0x1db/0x2d0 [ 22.275719] ? kasan_atomics_helper+0xfa9/0x5450 [ 22.275791] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.275865] ? kasan_atomics_helper+0xfa9/0x5450 [ 22.275940] kasan_report+0x141/0x180 [ 22.276017] ? kasan_atomics_helper+0xfa9/0x5450 [ 22.276101] kasan_check_range+0x10c/0x1c0 [ 22.276175] __kasan_check_write+0x18/0x20 [ 22.276267] kasan_atomics_helper+0xfa9/0x5450 [ 22.276344] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.276420] ? ret_from_fork_asm+0x1a/0x30 [ 22.276504] kasan_atomics+0x1dc/0x310 [ 22.276570] ? __pfx_kasan_atomics+0x10/0x10 [ 22.276659] ? __pfx_read_tsc+0x10/0x10 [ 22.276711] ? ktime_get_ts64+0x86/0x230 [ 22.276781] kunit_try_run_case+0x1a5/0x480 [ 22.276861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.276940] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.277022] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.277104] ? __kthread_parkme+0x82/0x180 [ 22.277179] ? preempt_count_sub+0x50/0x80 [ 22.277261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.277345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.277424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.277551] kthread+0x337/0x6f0 [ 22.277632] ? trace_preempt_on+0x20/0xc0 [ 22.277714] ? __pfx_kthread+0x10/0x10 [ 22.277790] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.277863] ? calculate_sigpending+0x7b/0xa0 [ 22.277932] ? __pfx_kthread+0x10/0x10 [ 22.277997] ret_from_fork+0x41/0x80 [ 22.278069] ? __pfx_kthread+0x10/0x10 [ 22.278133] ret_from_fork_asm+0x1a/0x30 [ 22.278255] </TASK> [ 22.278283] [ 22.296031] Allocated by task 286: [ 22.296816] kasan_save_stack+0x45/0x70 [ 22.297587] kasan_save_track+0x18/0x40 [ 22.297944] kasan_save_alloc_info+0x3b/0x50 [ 22.298443] __kasan_kmalloc+0xb7/0xc0 [ 22.299023] __kmalloc_cache_noprof+0x189/0x420 [ 22.299400] kasan_atomics+0x95/0x310 [ 22.299833] kunit_try_run_case+0x1a5/0x480 [ 22.300257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.300729] kthread+0x337/0x6f0 [ 22.301075] ret_from_fork+0x41/0x80 [ 22.301630] ret_from_fork_asm+0x1a/0x30 [ 22.301961] [ 22.302150] The buggy address belongs to the object at ffff888102a2c100 [ 22.302150] which belongs to the cache kmalloc-64 of size 64 [ 22.303996] The buggy address is located 0 bytes to the right of [ 22.303996] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.305094] [ 22.305342] The buggy address belongs to the physical page: [ 22.305889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.306577] flags: 0x200000000000000(node=0|zone=2) [ 22.307032] page_type: f5(slab) [ 22.307486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.308262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.308849] page dumped because: kasan: bad access detected [ 22.309443] [ 22.309700] Memory state around the buggy address: [ 22.310169] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.310839] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.311465] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.312116] ^ [ 22.312642] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.313259] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.313926] ================================================================== [ 22.066500] ================================================================== [ 22.067858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 22.068482] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.069049] [ 22.069314] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.069435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.069476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.069533] Call Trace: [ 22.069581] <TASK> [ 22.069677] dump_stack_lvl+0x73/0xb0 [ 22.069768] print_report+0xd1/0x650 [ 22.069844] ? __virt_addr_valid+0x1db/0x2d0 [ 22.069916] ? kasan_atomics_helper+0x4a84/0x5450 [ 22.069989] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.070065] ? kasan_atomics_helper+0x4a84/0x5450 [ 22.070141] kasan_report+0x141/0x180 [ 22.070222] ? kasan_atomics_helper+0x4a84/0x5450 [ 22.070299] __asan_report_load4_noabort+0x18/0x20 [ 22.070337] kasan_atomics_helper+0x4a84/0x5450 [ 22.070374] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.070412] ? ret_from_fork_asm+0x1a/0x30 [ 22.070453] kasan_atomics+0x1dc/0x310 [ 22.070484] ? __pfx_kasan_atomics+0x10/0x10 [ 22.070517] ? __pfx_read_tsc+0x10/0x10 [ 22.070547] ? ktime_get_ts64+0x86/0x230 [ 22.070585] kunit_try_run_case+0x1a5/0x480 [ 22.070652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.070692] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.070728] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.070764] ? __kthread_parkme+0x82/0x180 [ 22.070796] ? preempt_count_sub+0x50/0x80 [ 22.070833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.070871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.070906] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.070940] kthread+0x337/0x6f0 [ 22.070966] ? trace_preempt_on+0x20/0xc0 [ 22.071001] ? __pfx_kthread+0x10/0x10 [ 22.071029] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.071061] ? calculate_sigpending+0x7b/0xa0 [ 22.071094] ? __pfx_kthread+0x10/0x10 [ 22.071121] ret_from_fork+0x41/0x80 [ 22.071153] ? __pfx_kthread+0x10/0x10 [ 22.071180] ret_from_fork_asm+0x1a/0x30 [ 22.071259] </TASK> [ 22.071278] [ 22.087050] Allocated by task 286: [ 22.087540] kasan_save_stack+0x45/0x70 [ 22.088062] kasan_save_track+0x18/0x40 [ 22.088626] kasan_save_alloc_info+0x3b/0x50 [ 22.089139] __kasan_kmalloc+0xb7/0xc0 [ 22.089707] __kmalloc_cache_noprof+0x189/0x420 [ 22.090266] kasan_atomics+0x95/0x310 [ 22.090777] kunit_try_run_case+0x1a5/0x480 [ 22.091333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.091929] kthread+0x337/0x6f0 [ 22.092393] ret_from_fork+0x41/0x80 [ 22.092752] ret_from_fork_asm+0x1a/0x30 [ 22.093188] [ 22.093435] The buggy address belongs to the object at ffff888102a2c100 [ 22.093435] which belongs to the cache kmalloc-64 of size 64 [ 22.094512] The buggy address is located 0 bytes to the right of [ 22.094512] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.095598] [ 22.095804] The buggy address belongs to the physical page: [ 22.096159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.097174] flags: 0x200000000000000(node=0|zone=2) [ 22.097820] page_type: f5(slab) [ 22.098348] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.099174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.099812] page dumped because: kasan: bad access detected [ 22.100175] [ 22.100400] Memory state around the buggy address: [ 22.100886] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.101644] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.102308] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.102766] ^ [ 22.103205] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.103951] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.105018] ================================================================== [ 22.352785] ================================================================== [ 22.353501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 22.354295] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.355055] [ 22.355461] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.355586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.356108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.356167] Call Trace: [ 22.356408] <TASK> [ 22.356462] dump_stack_lvl+0x73/0xb0 [ 22.356543] print_report+0xd1/0x650 [ 22.356634] ? __virt_addr_valid+0x1db/0x2d0 [ 22.356713] ? kasan_atomics_helper+0x1079/0x5450 [ 22.356776] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.356813] ? kasan_atomics_helper+0x1079/0x5450 [ 22.356847] kasan_report+0x141/0x180 [ 22.356883] ? kasan_atomics_helper+0x1079/0x5450 [ 22.356921] kasan_check_range+0x10c/0x1c0 [ 22.356950] __kasan_check_write+0x18/0x20 [ 22.356981] kasan_atomics_helper+0x1079/0x5450 [ 22.357016] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.357053] ? ret_from_fork_asm+0x1a/0x30 [ 22.357094] kasan_atomics+0x1dc/0x310 [ 22.357124] ? __pfx_kasan_atomics+0x10/0x10 [ 22.357154] ? __pfx_read_tsc+0x10/0x10 [ 22.357181] ? ktime_get_ts64+0x86/0x230 [ 22.357284] kunit_try_run_case+0x1a5/0x480 [ 22.357377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.357942] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.358029] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.358109] ? __kthread_parkme+0x82/0x180 [ 22.358184] ? preempt_count_sub+0x50/0x80 [ 22.358276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.358338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.358415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.358494] kthread+0x337/0x6f0 [ 22.358559] ? trace_preempt_on+0x20/0xc0 [ 22.358664] ? __pfx_kthread+0x10/0x10 [ 22.358733] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.358814] ? calculate_sigpending+0x7b/0xa0 [ 22.358887] ? __pfx_kthread+0x10/0x10 [ 22.358957] ret_from_fork+0x41/0x80 [ 22.359032] ? __pfx_kthread+0x10/0x10 [ 22.359103] ret_from_fork_asm+0x1a/0x30 [ 22.359198] </TASK> [ 22.359259] [ 22.374496] Allocated by task 286: [ 22.374853] kasan_save_stack+0x45/0x70 [ 22.375362] kasan_save_track+0x18/0x40 [ 22.375814] kasan_save_alloc_info+0x3b/0x50 [ 22.376348] __kasan_kmalloc+0xb7/0xc0 [ 22.376713] __kmalloc_cache_noprof+0x189/0x420 [ 22.377195] kasan_atomics+0x95/0x310 [ 22.377705] kunit_try_run_case+0x1a5/0x480 [ 22.378179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.378781] kthread+0x337/0x6f0 [ 22.379158] ret_from_fork+0x41/0x80 [ 22.379631] ret_from_fork_asm+0x1a/0x30 [ 22.380040] [ 22.380320] The buggy address belongs to the object at ffff888102a2c100 [ 22.380320] which belongs to the cache kmalloc-64 of size 64 [ 22.381332] The buggy address is located 0 bytes to the right of [ 22.381332] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.382375] [ 22.382584] The buggy address belongs to the physical page: [ 22.383091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.383814] flags: 0x200000000000000(node=0|zone=2) [ 22.384346] page_type: f5(slab) [ 22.384762] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.385474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.386150] page dumped because: kasan: bad access detected [ 22.387111] [ 22.387689] Memory state around the buggy address: [ 22.388843] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.389324] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.389996] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.390660] ^ [ 22.391032] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.391530] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.392004] ================================================================== [ 21.202075] ================================================================== [ 21.203104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 21.203873] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.204460] [ 21.204849] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.204966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.205001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.205051] Call Trace: [ 21.205086] <TASK> [ 21.205121] dump_stack_lvl+0x73/0xb0 [ 21.205191] print_report+0xd1/0x650 [ 21.205261] ? __virt_addr_valid+0x1db/0x2d0 [ 21.205400] ? kasan_atomics_helper+0x4ba2/0x5450 [ 21.205482] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.205559] ? kasan_atomics_helper+0x4ba2/0x5450 [ 21.205691] kasan_report+0x141/0x180 [ 21.205777] ? kasan_atomics_helper+0x4ba2/0x5450 [ 21.205870] __asan_report_store4_noabort+0x1b/0x30 [ 21.205939] kasan_atomics_helper+0x4ba2/0x5450 [ 21.205977] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.206011] ? ret_from_fork_asm+0x1a/0x30 [ 21.206051] kasan_atomics+0x1dc/0x310 [ 21.206079] ? __pfx_kasan_atomics+0x10/0x10 [ 21.206109] ? __pfx_read_tsc+0x10/0x10 [ 21.206136] ? ktime_get_ts64+0x86/0x230 [ 21.206170] kunit_try_run_case+0x1a5/0x480 [ 21.206206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.206316] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.206402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.206442] ? __kthread_parkme+0x82/0x180 [ 21.206473] ? preempt_count_sub+0x50/0x80 [ 21.206511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.206546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.206580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.206652] kthread+0x337/0x6f0 [ 21.206721] ? trace_preempt_on+0x20/0xc0 [ 21.206759] ? __pfx_kthread+0x10/0x10 [ 21.206783] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.206814] ? calculate_sigpending+0x7b/0xa0 [ 21.206843] ? __pfx_kthread+0x10/0x10 [ 21.206868] ret_from_fork+0x41/0x80 [ 21.206897] ? __pfx_kthread+0x10/0x10 [ 21.206921] ret_from_fork_asm+0x1a/0x30 [ 21.206959] </TASK> [ 21.206972] [ 21.224250] Allocated by task 286: [ 21.224991] kasan_save_stack+0x45/0x70 [ 21.225483] kasan_save_track+0x18/0x40 [ 21.226005] kasan_save_alloc_info+0x3b/0x50 [ 21.226448] __kasan_kmalloc+0xb7/0xc0 [ 21.227112] __kmalloc_cache_noprof+0x189/0x420 [ 21.227673] kasan_atomics+0x95/0x310 [ 21.228102] kunit_try_run_case+0x1a5/0x480 [ 21.228437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.228902] kthread+0x337/0x6f0 [ 21.229432] ret_from_fork+0x41/0x80 [ 21.230259] ret_from_fork_asm+0x1a/0x30 [ 21.230802] [ 21.231047] The buggy address belongs to the object at ffff888102a2c100 [ 21.231047] which belongs to the cache kmalloc-64 of size 64 [ 21.232154] The buggy address is located 0 bytes to the right of [ 21.232154] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.233165] [ 21.233499] The buggy address belongs to the physical page: [ 21.234010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.234666] flags: 0x200000000000000(node=0|zone=2) [ 21.235026] page_type: f5(slab) [ 21.235398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.236115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.236805] page dumped because: kasan: bad access detected [ 21.237158] [ 21.237432] Memory state around the buggy address: [ 21.237911] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.238853] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.239452] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.239906] ^ [ 21.240353] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.241425] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.242355] ================================================================== [ 23.868497] ================================================================== [ 23.869128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 23.869740] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.870509] [ 23.870782] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.870902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.870943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.870999] Call Trace: [ 23.871067] <TASK> [ 23.871116] dump_stack_lvl+0x73/0xb0 [ 23.871257] print_report+0xd1/0x650 [ 23.871340] ? __virt_addr_valid+0x1db/0x2d0 [ 23.871462] ? kasan_atomics_helper+0x224c/0x5450 [ 23.871540] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.871637] ? kasan_atomics_helper+0x224c/0x5450 [ 23.871742] kasan_report+0x141/0x180 [ 23.871849] ? kasan_atomics_helper+0x224c/0x5450 [ 23.871940] kasan_check_range+0x10c/0x1c0 [ 23.872016] __kasan_check_write+0x18/0x20 [ 23.872137] kasan_atomics_helper+0x224c/0x5450 [ 23.872262] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.872367] ? ret_from_fork_asm+0x1a/0x30 [ 23.872486] kasan_atomics+0x1dc/0x310 [ 23.872563] ? __pfx_kasan_atomics+0x10/0x10 [ 23.872635] ? __pfx_read_tsc+0x10/0x10 [ 23.872669] ? ktime_get_ts64+0x86/0x230 [ 23.872710] kunit_try_run_case+0x1a5/0x480 [ 23.872750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.872785] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.872820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.872856] ? __kthread_parkme+0x82/0x180 [ 23.872889] ? preempt_count_sub+0x50/0x80 [ 23.872926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.872963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.872998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.873032] kthread+0x337/0x6f0 [ 23.873057] ? trace_preempt_on+0x20/0xc0 [ 23.873092] ? __pfx_kthread+0x10/0x10 [ 23.873118] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.873149] ? calculate_sigpending+0x7b/0xa0 [ 23.873179] ? __pfx_kthread+0x10/0x10 [ 23.873204] ret_from_fork+0x41/0x80 [ 23.873275] ? __pfx_kthread+0x10/0x10 [ 23.873304] ret_from_fork_asm+0x1a/0x30 [ 23.873347] </TASK> [ 23.873362] [ 23.892175] Allocated by task 286: [ 23.892744] kasan_save_stack+0x45/0x70 [ 23.893073] kasan_save_track+0x18/0x40 [ 23.893740] kasan_save_alloc_info+0x3b/0x50 [ 23.894508] __kasan_kmalloc+0xb7/0xc0 [ 23.895129] __kmalloc_cache_noprof+0x189/0x420 [ 23.895826] kasan_atomics+0x95/0x310 [ 23.896186] kunit_try_run_case+0x1a5/0x480 [ 23.896595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.897079] kthread+0x337/0x6f0 [ 23.897446] ret_from_fork+0x41/0x80 [ 23.897850] ret_from_fork_asm+0x1a/0x30 [ 23.898311] [ 23.898531] The buggy address belongs to the object at ffff888102a2c100 [ 23.898531] which belongs to the cache kmalloc-64 of size 64 [ 23.899493] The buggy address is located 0 bytes to the right of [ 23.899493] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.900425] [ 23.900626] The buggy address belongs to the physical page: [ 23.901117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.901824] flags: 0x200000000000000(node=0|zone=2) [ 23.902176] page_type: f5(slab) [ 23.902585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.903298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.904021] page dumped because: kasan: bad access detected [ 23.904519] [ 23.904755] Memory state around the buggy address: [ 23.905291] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.905947] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.906632] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.907329] ^ [ 23.907812] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.908300] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.908974] ================================================================== [ 22.603174] ================================================================== [ 22.604209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 22.605066] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.605693] [ 22.605947] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.606042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.606062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.606092] Call Trace: [ 22.606116] <TASK> [ 22.606138] dump_stack_lvl+0x73/0xb0 [ 22.606176] print_report+0xd1/0x650 [ 22.606211] ? __virt_addr_valid+0x1db/0x2d0 [ 22.606246] ? kasan_atomics_helper+0x12e6/0x5450 [ 22.606283] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.606318] ? kasan_atomics_helper+0x12e6/0x5450 [ 22.606352] kasan_report+0x141/0x180 [ 22.606387] ? kasan_atomics_helper+0x12e6/0x5450 [ 22.606427] kasan_check_range+0x10c/0x1c0 [ 22.606457] __kasan_check_write+0x18/0x20 [ 22.606488] kasan_atomics_helper+0x12e6/0x5450 [ 22.606523] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.606557] ? ret_from_fork_asm+0x1a/0x30 [ 22.606598] kasan_atomics+0x1dc/0x310 [ 22.606711] ? __pfx_kasan_atomics+0x10/0x10 [ 22.606787] ? __pfx_read_tsc+0x10/0x10 [ 22.607059] ? ktime_get_ts64+0x86/0x230 [ 22.607179] kunit_try_run_case+0x1a5/0x480 [ 22.607265] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.607339] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.607415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.607511] ? __kthread_parkme+0x82/0x180 [ 22.607592] ? preempt_count_sub+0x50/0x80 [ 22.607738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.607867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.607980] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.608060] kthread+0x337/0x6f0 [ 22.608119] ? trace_preempt_on+0x20/0xc0 [ 22.608158] ? __pfx_kthread+0x10/0x10 [ 22.608186] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.608227] ? calculate_sigpending+0x7b/0xa0 [ 22.608285] ? __pfx_kthread+0x10/0x10 [ 22.608313] ret_from_fork+0x41/0x80 [ 22.608348] ? __pfx_kthread+0x10/0x10 [ 22.608374] ret_from_fork_asm+0x1a/0x30 [ 22.608417] </TASK> [ 22.608432] [ 22.623653] Allocated by task 286: [ 22.624025] kasan_save_stack+0x45/0x70 [ 22.624475] kasan_save_track+0x18/0x40 [ 22.624833] kasan_save_alloc_info+0x3b/0x50 [ 22.625317] __kasan_kmalloc+0xb7/0xc0 [ 22.625654] __kmalloc_cache_noprof+0x189/0x420 [ 22.626011] kasan_atomics+0x95/0x310 [ 22.626370] kunit_try_run_case+0x1a5/0x480 [ 22.626860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.627462] kthread+0x337/0x6f0 [ 22.627860] ret_from_fork+0x41/0x80 [ 22.629348] ret_from_fork_asm+0x1a/0x30 [ 22.629793] [ 22.630041] The buggy address belongs to the object at ffff888102a2c100 [ 22.630041] which belongs to the cache kmalloc-64 of size 64 [ 22.631824] The buggy address is located 0 bytes to the right of [ 22.631824] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.632692] [ 22.632927] The buggy address belongs to the physical page: [ 22.633396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.634034] flags: 0x200000000000000(node=0|zone=2) [ 22.634390] page_type: f5(slab) [ 22.634841] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.635517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.636095] page dumped because: kasan: bad access detected [ 22.636632] [ 22.636858] Memory state around the buggy address: [ 22.637359] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.637963] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.638478] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.639143] ^ [ 22.639569] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.640157] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.640809] ================================================================== [ 21.684024] ================================================================== [ 21.684694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 21.685504] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.686264] [ 21.686728] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.686934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.686977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.687037] Call Trace: [ 21.687078] <TASK> [ 21.687123] dump_stack_lvl+0x73/0xb0 [ 21.687204] print_report+0xd1/0x650 [ 21.687330] ? __virt_addr_valid+0x1db/0x2d0 [ 21.687441] ? kasan_atomics_helper+0x72f/0x5450 [ 21.687522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.687594] ? kasan_atomics_helper+0x72f/0x5450 [ 21.687697] kasan_report+0x141/0x180 [ 21.687782] ? kasan_atomics_helper+0x72f/0x5450 [ 21.687872] kasan_check_range+0x10c/0x1c0 [ 21.687967] __kasan_check_write+0x18/0x20 [ 21.688043] kasan_atomics_helper+0x72f/0x5450 [ 21.688114] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.688183] ? ret_from_fork_asm+0x1a/0x30 [ 21.688320] kasan_atomics+0x1dc/0x310 [ 21.688406] ? __pfx_kasan_atomics+0x10/0x10 [ 21.688482] ? __pfx_read_tsc+0x10/0x10 [ 21.688545] ? ktime_get_ts64+0x86/0x230 [ 21.688644] kunit_try_run_case+0x1a5/0x480 [ 21.688731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.688810] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.688892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.688976] ? __kthread_parkme+0x82/0x180 [ 21.689053] ? preempt_count_sub+0x50/0x80 [ 21.689100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.689139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.689176] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.689219] kthread+0x337/0x6f0 [ 21.689274] ? trace_preempt_on+0x20/0xc0 [ 21.689314] ? __pfx_kthread+0x10/0x10 [ 21.689343] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.689375] ? calculate_sigpending+0x7b/0xa0 [ 21.689411] ? __pfx_kthread+0x10/0x10 [ 21.689440] ret_from_fork+0x41/0x80 [ 21.689472] ? __pfx_kthread+0x10/0x10 [ 21.689499] ret_from_fork_asm+0x1a/0x30 [ 21.689540] </TASK> [ 21.689556] [ 21.709310] Allocated by task 286: [ 21.709948] kasan_save_stack+0x45/0x70 [ 21.710950] kasan_save_track+0x18/0x40 [ 21.712134] kasan_save_alloc_info+0x3b/0x50 [ 21.712869] __kasan_kmalloc+0xb7/0xc0 [ 21.713192] __kmalloc_cache_noprof+0x189/0x420 [ 21.714149] kasan_atomics+0x95/0x310 [ 21.714686] kunit_try_run_case+0x1a5/0x480 [ 21.715479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.715963] kthread+0x337/0x6f0 [ 21.716635] ret_from_fork+0x41/0x80 [ 21.717153] ret_from_fork_asm+0x1a/0x30 [ 21.717564] [ 21.718102] The buggy address belongs to the object at ffff888102a2c100 [ 21.718102] which belongs to the cache kmalloc-64 of size 64 [ 21.719157] The buggy address is located 0 bytes to the right of [ 21.719157] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.720124] [ 21.720418] The buggy address belongs to the physical page: [ 21.720942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.721973] flags: 0x200000000000000(node=0|zone=2) [ 21.722368] page_type: f5(slab) [ 21.723011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.723881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.724533] page dumped because: kasan: bad access detected [ 21.725289] [ 21.725508] Memory state around the buggy address: [ 21.726362] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.726978] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.727564] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.728336] ^ [ 21.728754] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.729556] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.730146] ================================================================== [ 21.948530] ================================================================== [ 21.949585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 21.950300] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.950968] [ 21.951311] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.951402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.951422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.951451] Call Trace: [ 21.951474] <TASK> [ 21.951511] dump_stack_lvl+0x73/0xb0 [ 21.951568] print_report+0xd1/0x650 [ 21.951654] ? __virt_addr_valid+0x1db/0x2d0 [ 21.951731] ? kasan_atomics_helper+0xac7/0x5450 [ 21.951806] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.951886] ? kasan_atomics_helper+0xac7/0x5450 [ 21.951965] kasan_report+0x141/0x180 [ 21.952044] ? kasan_atomics_helper+0xac7/0x5450 [ 21.952135] kasan_check_range+0x10c/0x1c0 [ 21.952251] __kasan_check_write+0x18/0x20 [ 21.952334] kasan_atomics_helper+0xac7/0x5450 [ 21.952414] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.952514] ? ret_from_fork_asm+0x1a/0x30 [ 21.952645] kasan_atomics+0x1dc/0x310 [ 21.952719] ? __pfx_kasan_atomics+0x10/0x10 [ 21.952793] ? __pfx_read_tsc+0x10/0x10 [ 21.952858] ? ktime_get_ts64+0x86/0x230 [ 21.952936] kunit_try_run_case+0x1a5/0x480 [ 21.953014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.953087] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.953162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.953283] ? __kthread_parkme+0x82/0x180 [ 21.953359] ? preempt_count_sub+0x50/0x80 [ 21.953440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.953516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.953584] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.953663] kthread+0x337/0x6f0 [ 21.953727] ? trace_preempt_on+0x20/0xc0 [ 21.953823] ? __pfx_kthread+0x10/0x10 [ 21.953941] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.954025] ? calculate_sigpending+0x7b/0xa0 [ 21.954101] ? __pfx_kthread+0x10/0x10 [ 21.954170] ret_from_fork+0x41/0x80 [ 21.954287] ? __pfx_kthread+0x10/0x10 [ 21.954359] ret_from_fork_asm+0x1a/0x30 [ 21.954469] </TASK> [ 21.954513] [ 21.969412] Allocated by task 286: [ 21.969707] kasan_save_stack+0x45/0x70 [ 21.970089] kasan_save_track+0x18/0x40 [ 21.970583] kasan_save_alloc_info+0x3b/0x50 [ 21.971122] __kasan_kmalloc+0xb7/0xc0 [ 21.971574] __kmalloc_cache_noprof+0x189/0x420 [ 21.972113] kasan_atomics+0x95/0x310 [ 21.972475] kunit_try_run_case+0x1a5/0x480 [ 21.972966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.973565] kthread+0x337/0x6f0 [ 21.973961] ret_from_fork+0x41/0x80 [ 21.974353] ret_from_fork_asm+0x1a/0x30 [ 21.974839] [ 21.975110] The buggy address belongs to the object at ffff888102a2c100 [ 21.975110] which belongs to the cache kmalloc-64 of size 64 [ 21.975894] The buggy address is located 0 bytes to the right of [ 21.975894] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.976664] [ 21.976940] The buggy address belongs to the physical page: [ 21.977503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.978271] flags: 0x200000000000000(node=0|zone=2) [ 21.978777] page_type: f5(slab) [ 21.979149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.979887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.980591] page dumped because: kasan: bad access detected [ 21.980972] [ 21.981150] Memory state around the buggy address: [ 21.981637] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.982382] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.983051] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.983765] ^ [ 21.984260] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.984921] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.985506] ================================================================== [ 22.393281] ================================================================== [ 22.393939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 22.394658] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.395163] [ 22.395421] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.395541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.395580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.395656] Call Trace: [ 22.395704] <TASK> [ 22.395745] dump_stack_lvl+0x73/0xb0 [ 22.395820] print_report+0xd1/0x650 [ 22.395891] ? __virt_addr_valid+0x1db/0x2d0 [ 22.395963] ? kasan_atomics_helper+0x4a1c/0x5450 [ 22.396041] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.396121] ? kasan_atomics_helper+0x4a1c/0x5450 [ 22.396199] kasan_report+0x141/0x180 [ 22.396324] ? kasan_atomics_helper+0x4a1c/0x5450 [ 22.396418] __asan_report_load4_noabort+0x18/0x20 [ 22.396496] kasan_atomics_helper+0x4a1c/0x5450 [ 22.396579] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.396680] ? ret_from_fork_asm+0x1a/0x30 [ 22.396776] kasan_atomics+0x1dc/0x310 [ 22.396850] ? __pfx_kasan_atomics+0x10/0x10 [ 22.396924] ? __pfx_read_tsc+0x10/0x10 [ 22.396996] ? ktime_get_ts64+0x86/0x230 [ 22.397082] kunit_try_run_case+0x1a5/0x480 [ 22.397167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.397287] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.397365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.397441] ? __kthread_parkme+0x82/0x180 [ 22.397513] ? preempt_count_sub+0x50/0x80 [ 22.397592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.397691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.397776] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.397855] kthread+0x337/0x6f0 [ 22.397923] ? trace_preempt_on+0x20/0xc0 [ 22.398006] ? __pfx_kthread+0x10/0x10 [ 22.398072] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.398118] ? calculate_sigpending+0x7b/0xa0 [ 22.398150] ? __pfx_kthread+0x10/0x10 [ 22.398179] ret_from_fork+0x41/0x80 [ 22.398239] ? __pfx_kthread+0x10/0x10 [ 22.398287] ret_from_fork_asm+0x1a/0x30 [ 22.398331] </TASK> [ 22.398348] [ 22.414970] Allocated by task 286: [ 22.415441] kasan_save_stack+0x45/0x70 [ 22.415950] kasan_save_track+0x18/0x40 [ 22.416544] kasan_save_alloc_info+0x3b/0x50 [ 22.417041] __kasan_kmalloc+0xb7/0xc0 [ 22.417512] __kmalloc_cache_noprof+0x189/0x420 [ 22.418087] kasan_atomics+0x95/0x310 [ 22.418632] kunit_try_run_case+0x1a5/0x480 [ 22.419112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.419783] kthread+0x337/0x6f0 [ 22.420068] ret_from_fork+0x41/0x80 [ 22.420788] ret_from_fork_asm+0x1a/0x30 [ 22.421496] [ 22.421766] The buggy address belongs to the object at ffff888102a2c100 [ 22.421766] which belongs to the cache kmalloc-64 of size 64 [ 22.422739] The buggy address is located 0 bytes to the right of [ 22.422739] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.424017] [ 22.424480] The buggy address belongs to the physical page: [ 22.425126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.425856] flags: 0x200000000000000(node=0|zone=2) [ 22.426261] page_type: f5(slab) [ 22.426853] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.427648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.428330] page dumped because: kasan: bad access detected [ 22.428843] [ 22.429079] Memory state around the buggy address: [ 22.429687] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.430301] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.430956] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.431524] ^ [ 22.432035] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.432885] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.433643] ================================================================== [ 22.804935] ================================================================== [ 22.806112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 22.806820] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.808078] [ 22.808440] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.808571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.808629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.808706] Call Trace: [ 22.808786] <TASK> [ 22.808835] dump_stack_lvl+0x73/0xb0 [ 22.808901] print_report+0xd1/0x650 [ 22.808940] ? __virt_addr_valid+0x1db/0x2d0 [ 22.808974] ? kasan_atomics_helper+0x50d4/0x5450 [ 22.809011] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.809047] ? kasan_atomics_helper+0x50d4/0x5450 [ 22.809081] kasan_report+0x141/0x180 [ 22.809117] ? kasan_atomics_helper+0x50d4/0x5450 [ 22.809157] __asan_report_store8_noabort+0x1b/0x30 [ 22.809192] kasan_atomics_helper+0x50d4/0x5450 [ 22.809269] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.809310] ? ret_from_fork_asm+0x1a/0x30 [ 22.809351] kasan_atomics+0x1dc/0x310 [ 22.809381] ? __pfx_kasan_atomics+0x10/0x10 [ 22.809412] ? __pfx_read_tsc+0x10/0x10 [ 22.809443] ? ktime_get_ts64+0x86/0x230 [ 22.809479] kunit_try_run_case+0x1a5/0x480 [ 22.809516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.809553] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.809590] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.809653] ? __kthread_parkme+0x82/0x180 [ 22.809688] ? preempt_count_sub+0x50/0x80 [ 22.809727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.809779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.809818] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.809855] kthread+0x337/0x6f0 [ 22.809881] ? trace_preempt_on+0x20/0xc0 [ 22.809917] ? __pfx_kthread+0x10/0x10 [ 22.809945] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.809978] ? calculate_sigpending+0x7b/0xa0 [ 22.810009] ? __pfx_kthread+0x10/0x10 [ 22.810036] ret_from_fork+0x41/0x80 [ 22.810069] ? __pfx_kthread+0x10/0x10 [ 22.810096] ret_from_fork_asm+0x1a/0x30 [ 22.810141] </TASK> [ 22.810156] [ 22.827777] Allocated by task 286: [ 22.828130] kasan_save_stack+0x45/0x70 [ 22.828710] kasan_save_track+0x18/0x40 [ 22.829103] kasan_save_alloc_info+0x3b/0x50 [ 22.829507] __kasan_kmalloc+0xb7/0xc0 [ 22.829846] __kmalloc_cache_noprof+0x189/0x420 [ 22.830186] kasan_atomics+0x95/0x310 [ 22.830723] kunit_try_run_case+0x1a5/0x480 [ 22.831199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.831729] kthread+0x337/0x6f0 [ 22.832225] ret_from_fork+0x41/0x80 [ 22.832666] ret_from_fork_asm+0x1a/0x30 [ 22.833084] [ 22.833391] The buggy address belongs to the object at ffff888102a2c100 [ 22.833391] which belongs to the cache kmalloc-64 of size 64 [ 22.834277] The buggy address is located 0 bytes to the right of [ 22.834277] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.836706] [ 22.836943] The buggy address belongs to the physical page: [ 22.837425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.838132] flags: 0x200000000000000(node=0|zone=2) [ 22.839005] page_type: f5(slab) [ 22.839598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.840336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.840962] page dumped because: kasan: bad access detected [ 22.841629] [ 22.841842] Memory state around the buggy address: [ 22.842276] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.843030] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.843591] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.844154] ^ [ 22.844561] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.845130] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.846157] ================================================================== [ 23.583416] ================================================================== [ 23.584064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 23.584810] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.585539] [ 23.585806] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.585911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.585943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.585990] Call Trace: [ 23.586032] <TASK> [ 23.586070] dump_stack_lvl+0x73/0xb0 [ 23.586183] print_report+0xd1/0x650 [ 23.586370] ? __virt_addr_valid+0x1db/0x2d0 [ 23.586492] ? kasan_atomics_helper+0x4f71/0x5450 [ 23.586576] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.586670] ? kasan_atomics_helper+0x4f71/0x5450 [ 23.586745] kasan_report+0x141/0x180 [ 23.586824] ? kasan_atomics_helper+0x4f71/0x5450 [ 23.586915] __asan_report_load8_noabort+0x18/0x20 [ 23.586994] kasan_atomics_helper+0x4f71/0x5450 [ 23.587041] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.587080] ? ret_from_fork_asm+0x1a/0x30 [ 23.587121] kasan_atomics+0x1dc/0x310 [ 23.587178] ? __pfx_kasan_atomics+0x10/0x10 [ 23.587389] ? __pfx_read_tsc+0x10/0x10 [ 23.587461] ? ktime_get_ts64+0x86/0x230 [ 23.587704] kunit_try_run_case+0x1a5/0x480 [ 23.587795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.587870] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.587949] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.588025] ? __kthread_parkme+0x82/0x180 [ 23.588077] ? preempt_count_sub+0x50/0x80 [ 23.588117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.588155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.588190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.588266] kthread+0x337/0x6f0 [ 23.588298] ? trace_preempt_on+0x20/0xc0 [ 23.588335] ? __pfx_kthread+0x10/0x10 [ 23.588362] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.588395] ? calculate_sigpending+0x7b/0xa0 [ 23.588429] ? __pfx_kthread+0x10/0x10 [ 23.588455] ret_from_fork+0x41/0x80 [ 23.588488] ? __pfx_kthread+0x10/0x10 [ 23.588514] ret_from_fork_asm+0x1a/0x30 [ 23.588557] </TASK> [ 23.588573] [ 23.604036] Allocated by task 286: [ 23.604376] kasan_save_stack+0x45/0x70 [ 23.604830] kasan_save_track+0x18/0x40 [ 23.605377] kasan_save_alloc_info+0x3b/0x50 [ 23.605870] __kasan_kmalloc+0xb7/0xc0 [ 23.606357] __kmalloc_cache_noprof+0x189/0x420 [ 23.606903] kasan_atomics+0x95/0x310 [ 23.607368] kunit_try_run_case+0x1a5/0x480 [ 23.607850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.608464] kthread+0x337/0x6f0 [ 23.608895] ret_from_fork+0x41/0x80 [ 23.609399] ret_from_fork_asm+0x1a/0x30 [ 23.609834] [ 23.610176] The buggy address belongs to the object at ffff888102a2c100 [ 23.610176] which belongs to the cache kmalloc-64 of size 64 [ 23.611349] The buggy address is located 0 bytes to the right of [ 23.611349] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.612626] [ 23.612911] The buggy address belongs to the physical page: [ 23.613473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.614295] flags: 0x200000000000000(node=0|zone=2) [ 23.614862] page_type: f5(slab) [ 23.615303] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.616003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.616772] page dumped because: kasan: bad access detected [ 23.617296] [ 23.617578] Memory state around the buggy address: [ 23.617995] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.618728] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.619432] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.620739] ^ [ 23.621268] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.621736] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.622422] ================================================================== [ 23.126894] ================================================================== [ 23.127554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 23.129055] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.129723] [ 23.130044] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.130293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.130337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.130396] Call Trace: [ 23.130446] <TASK> [ 23.130488] dump_stack_lvl+0x73/0xb0 [ 23.130619] print_report+0xd1/0x650 [ 23.130707] ? __virt_addr_valid+0x1db/0x2d0 [ 23.130785] ? kasan_atomics_helper+0x194a/0x5450 [ 23.130855] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.130894] ? kasan_atomics_helper+0x194a/0x5450 [ 23.130929] kasan_report+0x141/0x180 [ 23.130965] ? kasan_atomics_helper+0x194a/0x5450 [ 23.131006] kasan_check_range+0x10c/0x1c0 [ 23.131036] __kasan_check_write+0x18/0x20 [ 23.131067] kasan_atomics_helper+0x194a/0x5450 [ 23.131102] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.131135] ? ret_from_fork_asm+0x1a/0x30 [ 23.131174] kasan_atomics+0x1dc/0x310 [ 23.131203] ? __pfx_kasan_atomics+0x10/0x10 [ 23.131277] ? __pfx_read_tsc+0x10/0x10 [ 23.131309] ? ktime_get_ts64+0x86/0x230 [ 23.131347] kunit_try_run_case+0x1a5/0x480 [ 23.131385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.131419] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.131454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.131489] ? __kthread_parkme+0x82/0x180 [ 23.131519] ? preempt_count_sub+0x50/0x80 [ 23.131555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.131590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.131652] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.131689] kthread+0x337/0x6f0 [ 23.131713] ? trace_preempt_on+0x20/0xc0 [ 23.131748] ? __pfx_kthread+0x10/0x10 [ 23.131774] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.131807] ? calculate_sigpending+0x7b/0xa0 [ 23.131837] ? __pfx_kthread+0x10/0x10 [ 23.131863] ret_from_fork+0x41/0x80 [ 23.131895] ? __pfx_kthread+0x10/0x10 [ 23.131920] ret_from_fork_asm+0x1a/0x30 [ 23.131962] </TASK> [ 23.131976] [ 23.147304] Allocated by task 286: [ 23.147752] kasan_save_stack+0x45/0x70 [ 23.148182] kasan_save_track+0x18/0x40 [ 23.148699] kasan_save_alloc_info+0x3b/0x50 [ 23.149180] __kasan_kmalloc+0xb7/0xc0 [ 23.149542] __kmalloc_cache_noprof+0x189/0x420 [ 23.150044] kasan_atomics+0x95/0x310 [ 23.150548] kunit_try_run_case+0x1a5/0x480 [ 23.151031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.151614] kthread+0x337/0x6f0 [ 23.151988] ret_from_fork+0x41/0x80 [ 23.152347] ret_from_fork_asm+0x1a/0x30 [ 23.152701] [ 23.152864] The buggy address belongs to the object at ffff888102a2c100 [ 23.152864] which belongs to the cache kmalloc-64 of size 64 [ 23.153921] The buggy address is located 0 bytes to the right of [ 23.153921] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.154843] [ 23.155123] The buggy address belongs to the physical page: [ 23.155742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.156452] flags: 0x200000000000000(node=0|zone=2) [ 23.156938] page_type: f5(slab) [ 23.157363] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.158063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.158765] page dumped because: kasan: bad access detected [ 23.159301] [ 23.159554] Memory state around the buggy address: [ 23.159976] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.160476] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.161111] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.161843] ^ [ 23.162370] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.162930] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.164353] ================================================================== [ 22.233122] ================================================================== [ 22.234314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 22.235410] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.236116] [ 22.236417] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.236541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.236577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.236651] Call Trace: [ 22.236703] <TASK> [ 22.236746] dump_stack_lvl+0x73/0xb0 [ 22.236822] print_report+0xd1/0x650 [ 22.236894] ? __virt_addr_valid+0x1db/0x2d0 [ 22.236968] ? kasan_atomics_helper+0xf10/0x5450 [ 22.237038] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.237112] ? kasan_atomics_helper+0xf10/0x5450 [ 22.237186] kasan_report+0x141/0x180 [ 22.237310] ? kasan_atomics_helper+0xf10/0x5450 [ 22.237398] kasan_check_range+0x10c/0x1c0 [ 22.237470] __kasan_check_write+0x18/0x20 [ 22.237537] kasan_atomics_helper+0xf10/0x5450 [ 22.237630] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.237717] ? ret_from_fork_asm+0x1a/0x30 [ 22.237857] kasan_atomics+0x1dc/0x310 [ 22.237967] ? __pfx_kasan_atomics+0x10/0x10 [ 22.238102] ? __pfx_read_tsc+0x10/0x10 [ 22.238176] ? ktime_get_ts64+0x86/0x230 [ 22.238289] kunit_try_run_case+0x1a5/0x480 [ 22.238362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.238434] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.238580] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.238713] ? __kthread_parkme+0x82/0x180 [ 22.238797] ? preempt_count_sub+0x50/0x80 [ 22.238879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.238961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.239041] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.239121] kthread+0x337/0x6f0 [ 22.239188] ? trace_preempt_on+0x20/0xc0 [ 22.239283] ? __pfx_kthread+0x10/0x10 [ 22.239350] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.239422] ? calculate_sigpending+0x7b/0xa0 [ 22.239497] ? __pfx_kthread+0x10/0x10 [ 22.239565] ret_from_fork+0x41/0x80 [ 22.239717] ? __pfx_kthread+0x10/0x10 [ 22.239790] ret_from_fork_asm+0x1a/0x30 [ 22.239883] </TASK> [ 22.239921] [ 22.254838] Allocated by task 286: [ 22.255289] kasan_save_stack+0x45/0x70 [ 22.255703] kasan_save_track+0x18/0x40 [ 22.256150] kasan_save_alloc_info+0x3b/0x50 [ 22.256621] __kasan_kmalloc+0xb7/0xc0 [ 22.257010] __kmalloc_cache_noprof+0x189/0x420 [ 22.257571] kasan_atomics+0x95/0x310 [ 22.257938] kunit_try_run_case+0x1a5/0x480 [ 22.258442] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.259014] kthread+0x337/0x6f0 [ 22.259338] ret_from_fork+0x41/0x80 [ 22.259820] ret_from_fork_asm+0x1a/0x30 [ 22.260311] [ 22.260578] The buggy address belongs to the object at ffff888102a2c100 [ 22.260578] which belongs to the cache kmalloc-64 of size 64 [ 22.261548] The buggy address is located 0 bytes to the right of [ 22.261548] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.262696] [ 22.262931] The buggy address belongs to the physical page: [ 22.263501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.264269] flags: 0x200000000000000(node=0|zone=2) [ 22.264792] page_type: f5(slab) [ 22.265170] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.265949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.266634] page dumped because: kasan: bad access detected [ 22.267061] [ 22.267318] Memory state around the buggy address: [ 22.267821] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.268556] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.269156] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.269651] ^ [ 22.270085] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.270820] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.271537] ================================================================== [ 23.165242] ================================================================== [ 23.165803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 23.166790] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.167727] [ 23.168876] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.169055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.169097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.169154] Call Trace: [ 23.169201] <TASK> [ 23.169284] dump_stack_lvl+0x73/0xb0 [ 23.169361] print_report+0xd1/0x650 [ 23.169433] ? __virt_addr_valid+0x1db/0x2d0 [ 23.169505] ? kasan_atomics_helper+0x19e3/0x5450 [ 23.169577] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.169653] ? kasan_atomics_helper+0x19e3/0x5450 [ 23.169694] kasan_report+0x141/0x180 [ 23.169730] ? kasan_atomics_helper+0x19e3/0x5450 [ 23.169781] kasan_check_range+0x10c/0x1c0 [ 23.169813] __kasan_check_write+0x18/0x20 [ 23.169846] kasan_atomics_helper+0x19e3/0x5450 [ 23.169884] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.169919] ? ret_from_fork_asm+0x1a/0x30 [ 23.169958] kasan_atomics+0x1dc/0x310 [ 23.169987] ? __pfx_kasan_atomics+0x10/0x10 [ 23.170018] ? __pfx_read_tsc+0x10/0x10 [ 23.170047] ? ktime_get_ts64+0x86/0x230 [ 23.170081] kunit_try_run_case+0x1a5/0x480 [ 23.170120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.170154] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.170189] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.170258] ? __kthread_parkme+0x82/0x180 [ 23.170295] ? preempt_count_sub+0x50/0x80 [ 23.170335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.170370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.170405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.170440] kthread+0x337/0x6f0 [ 23.170465] ? trace_preempt_on+0x20/0xc0 [ 23.170499] ? __pfx_kthread+0x10/0x10 [ 23.170525] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.170557] ? calculate_sigpending+0x7b/0xa0 [ 23.170588] ? __pfx_kthread+0x10/0x10 [ 23.170637] ret_from_fork+0x41/0x80 [ 23.170671] ? __pfx_kthread+0x10/0x10 [ 23.170699] ret_from_fork_asm+0x1a/0x30 [ 23.170742] </TASK> [ 23.170757] [ 23.188635] Allocated by task 286: [ 23.189006] kasan_save_stack+0x45/0x70 [ 23.189539] kasan_save_track+0x18/0x40 [ 23.189882] kasan_save_alloc_info+0x3b/0x50 [ 23.190549] __kasan_kmalloc+0xb7/0xc0 [ 23.190995] __kmalloc_cache_noprof+0x189/0x420 [ 23.191659] kasan_atomics+0x95/0x310 [ 23.192127] kunit_try_run_case+0x1a5/0x480 [ 23.192669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.193302] kthread+0x337/0x6f0 [ 23.193693] ret_from_fork+0x41/0x80 [ 23.194195] ret_from_fork_asm+0x1a/0x30 [ 23.194712] [ 23.195036] The buggy address belongs to the object at ffff888102a2c100 [ 23.195036] which belongs to the cache kmalloc-64 of size 64 [ 23.196014] The buggy address is located 0 bytes to the right of [ 23.196014] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.197126] [ 23.197465] The buggy address belongs to the physical page: [ 23.197944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.198782] flags: 0x200000000000000(node=0|zone=2) [ 23.199319] page_type: f5(slab) [ 23.199721] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.200554] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.201293] page dumped because: kasan: bad access detected [ 23.201783] [ 23.202018] Memory state around the buggy address: [ 23.202687] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.203471] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.204110] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.204668] ^ [ 23.205330] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.205894] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.206642] ================================================================== [ 23.662890] ================================================================== [ 23.663397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 23.664104] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.664813] [ 23.665085] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.665277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.665323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.665380] Call Trace: [ 23.665434] <TASK> [ 23.665482] dump_stack_lvl+0x73/0xb0 [ 23.665559] print_report+0xd1/0x650 [ 23.665656] ? __virt_addr_valid+0x1db/0x2d0 [ 23.665734] ? kasan_atomics_helper+0x4f98/0x5450 [ 23.665836] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.665944] ? kasan_atomics_helper+0x4f98/0x5450 [ 23.666022] kasan_report+0x141/0x180 [ 23.666101] ? kasan_atomics_helper+0x4f98/0x5450 [ 23.666185] __asan_report_load8_noabort+0x18/0x20 [ 23.666313] kasan_atomics_helper+0x4f98/0x5450 [ 23.666444] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.666527] ? ret_from_fork_asm+0x1a/0x30 [ 23.666633] kasan_atomics+0x1dc/0x310 [ 23.666732] ? __pfx_kasan_atomics+0x10/0x10 [ 23.666834] ? __pfx_read_tsc+0x10/0x10 [ 23.666902] ? ktime_get_ts64+0x86/0x230 [ 23.666945] kunit_try_run_case+0x1a5/0x480 [ 23.666986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.667022] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.667060] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.667099] ? __kthread_parkme+0x82/0x180 [ 23.667132] ? preempt_count_sub+0x50/0x80 [ 23.667169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.667204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.667279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.667316] kthread+0x337/0x6f0 [ 23.667341] ? trace_preempt_on+0x20/0xc0 [ 23.667377] ? __pfx_kthread+0x10/0x10 [ 23.667404] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.667437] ? calculate_sigpending+0x7b/0xa0 [ 23.667468] ? __pfx_kthread+0x10/0x10 [ 23.667495] ret_from_fork+0x41/0x80 [ 23.667525] ? __pfx_kthread+0x10/0x10 [ 23.667551] ret_from_fork_asm+0x1a/0x30 [ 23.667592] </TASK> [ 23.667631] [ 23.683396] Allocated by task 286: [ 23.683802] kasan_save_stack+0x45/0x70 [ 23.684276] kasan_save_track+0x18/0x40 [ 23.684716] kasan_save_alloc_info+0x3b/0x50 [ 23.685161] __kasan_kmalloc+0xb7/0xc0 [ 23.685594] __kmalloc_cache_noprof+0x189/0x420 [ 23.686109] kasan_atomics+0x95/0x310 [ 23.686588] kunit_try_run_case+0x1a5/0x480 [ 23.687021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.687564] kthread+0x337/0x6f0 [ 23.687969] ret_from_fork+0x41/0x80 [ 23.688420] ret_from_fork_asm+0x1a/0x30 [ 23.688911] [ 23.689142] The buggy address belongs to the object at ffff888102a2c100 [ 23.689142] which belongs to the cache kmalloc-64 of size 64 [ 23.690153] The buggy address is located 0 bytes to the right of [ 23.690153] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.691147] [ 23.691402] The buggy address belongs to the physical page: [ 23.691876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.692671] flags: 0x200000000000000(node=0|zone=2) [ 23.693156] page_type: f5(slab) [ 23.693589] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.694266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.694748] page dumped because: kasan: bad access detected [ 23.695299] [ 23.695592] Memory state around the buggy address: [ 23.696114] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.696848] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.697549] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.698196] ^ [ 23.698888] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.700156] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.701170] ================================================================== [ 21.292555] ================================================================== [ 21.293358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 21.294290] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.295005] [ 21.295360] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.295502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.295545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.295724] Call Trace: [ 21.295848] <TASK> [ 21.295896] dump_stack_lvl+0x73/0xb0 [ 21.295974] print_report+0xd1/0x650 [ 21.296049] ? __virt_addr_valid+0x1db/0x2d0 [ 21.296126] ? kasan_atomics_helper+0x4b6e/0x5450 [ 21.296268] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.296354] ? kasan_atomics_helper+0x4b6e/0x5450 [ 21.296434] kasan_report+0x141/0x180 [ 21.296532] ? kasan_atomics_helper+0x4b6e/0x5450 [ 21.296670] __asan_report_store4_noabort+0x1b/0x30 [ 21.296785] kasan_atomics_helper+0x4b6e/0x5450 [ 21.296873] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.296960] ? ret_from_fork_asm+0x1a/0x30 [ 21.297038] kasan_atomics+0x1dc/0x310 [ 21.297070] ? __pfx_kasan_atomics+0x10/0x10 [ 21.297104] ? __pfx_read_tsc+0x10/0x10 [ 21.297135] ? ktime_get_ts64+0x86/0x230 [ 21.297172] kunit_try_run_case+0x1a5/0x480 [ 21.297231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.297288] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.297327] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.297364] ? __kthread_parkme+0x82/0x180 [ 21.297397] ? preempt_count_sub+0x50/0x80 [ 21.297437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.297474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.297509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.297544] kthread+0x337/0x6f0 [ 21.297570] ? trace_preempt_on+0x20/0xc0 [ 21.297652] ? __pfx_kthread+0x10/0x10 [ 21.297729] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.297775] ? calculate_sigpending+0x7b/0xa0 [ 21.297810] ? __pfx_kthread+0x10/0x10 [ 21.297838] ret_from_fork+0x41/0x80 [ 21.297870] ? __pfx_kthread+0x10/0x10 [ 21.297896] ret_from_fork_asm+0x1a/0x30 [ 21.297939] </TASK> [ 21.297954] [ 21.318040] Allocated by task 286: [ 21.318536] kasan_save_stack+0x45/0x70 [ 21.319483] kasan_save_track+0x18/0x40 [ 21.320079] kasan_save_alloc_info+0x3b/0x50 [ 21.320748] __kasan_kmalloc+0xb7/0xc0 [ 21.321203] __kmalloc_cache_noprof+0x189/0x420 [ 21.321868] kasan_atomics+0x95/0x310 [ 21.322309] kunit_try_run_case+0x1a5/0x480 [ 21.322992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.323591] kthread+0x337/0x6f0 [ 21.324184] ret_from_fork+0x41/0x80 [ 21.324515] ret_from_fork_asm+0x1a/0x30 [ 21.324951] [ 21.325238] The buggy address belongs to the object at ffff888102a2c100 [ 21.325238] which belongs to the cache kmalloc-64 of size 64 [ 21.326965] The buggy address is located 0 bytes to the right of [ 21.326965] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.328394] [ 21.328649] The buggy address belongs to the physical page: [ 21.329122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.329726] flags: 0x200000000000000(node=0|zone=2) [ 21.330138] page_type: f5(slab) [ 21.330519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.331555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.332306] page dumped because: kasan: bad access detected [ 21.332734] [ 21.332965] Memory state around the buggy address: [ 21.333417] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.334936] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.335937] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.337027] ^ [ 21.337996] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.339044] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.339528] ================================================================== [ 22.107356] ================================================================== [ 22.109029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 22.109784] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.110491] [ 22.110876] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.110981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.111018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.111072] Call Trace: [ 22.111117] <TASK> [ 22.111152] dump_stack_lvl+0x73/0xb0 [ 22.111222] print_report+0xd1/0x650 [ 22.111300] ? __virt_addr_valid+0x1db/0x2d0 [ 22.111374] ? kasan_atomics_helper+0xd47/0x5450 [ 22.111575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.111693] ? kasan_atomics_helper+0xd47/0x5450 [ 22.111769] kasan_report+0x141/0x180 [ 22.111848] ? kasan_atomics_helper+0xd47/0x5450 [ 22.111944] kasan_check_range+0x10c/0x1c0 [ 22.112079] __kasan_check_write+0x18/0x20 [ 22.112263] kasan_atomics_helper+0xd47/0x5450 [ 22.112353] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.112434] ? ret_from_fork_asm+0x1a/0x30 [ 22.112525] kasan_atomics+0x1dc/0x310 [ 22.112580] ? __pfx_kasan_atomics+0x10/0x10 [ 22.112640] ? __pfx_read_tsc+0x10/0x10 [ 22.112673] ? ktime_get_ts64+0x86/0x230 [ 22.112713] kunit_try_run_case+0x1a5/0x480 [ 22.112751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.112785] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.112820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.112855] ? __kthread_parkme+0x82/0x180 [ 22.112887] ? preempt_count_sub+0x50/0x80 [ 22.112923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.112958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.112993] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.113028] kthread+0x337/0x6f0 [ 22.113053] ? trace_preempt_on+0x20/0xc0 [ 22.113086] ? __pfx_kthread+0x10/0x10 [ 22.113112] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.113143] ? calculate_sigpending+0x7b/0xa0 [ 22.113175] ? __pfx_kthread+0x10/0x10 [ 22.113200] ret_from_fork+0x41/0x80 [ 22.113261] ? __pfx_kthread+0x10/0x10 [ 22.113291] ret_from_fork_asm+0x1a/0x30 [ 22.113333] </TASK> [ 22.113350] [ 22.129904] Allocated by task 286: [ 22.130416] kasan_save_stack+0x45/0x70 [ 22.130907] kasan_save_track+0x18/0x40 [ 22.131315] kasan_save_alloc_info+0x3b/0x50 [ 22.131839] __kasan_kmalloc+0xb7/0xc0 [ 22.132248] __kmalloc_cache_noprof+0x189/0x420 [ 22.132637] kasan_atomics+0x95/0x310 [ 22.133038] kunit_try_run_case+0x1a5/0x480 [ 22.133537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.133951] kthread+0x337/0x6f0 [ 22.134231] ret_from_fork+0x41/0x80 [ 22.134650] ret_from_fork_asm+0x1a/0x30 [ 22.135207] [ 22.135469] The buggy address belongs to the object at ffff888102a2c100 [ 22.135469] which belongs to the cache kmalloc-64 of size 64 [ 22.136718] The buggy address is located 0 bytes to the right of [ 22.136718] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.137790] [ 22.138099] The buggy address belongs to the physical page: [ 22.138836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.139665] flags: 0x200000000000000(node=0|zone=2) [ 22.140022] page_type: f5(slab) [ 22.140552] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.141371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.142096] page dumped because: kasan: bad access detected [ 22.142579] [ 22.144636] Memory state around the buggy address: [ 22.145276] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.147021] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.148977] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.150146] ^ [ 22.150823] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.151481] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.152284] ================================================================== [ 21.340597] ================================================================== [ 21.341407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 21.342157] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.343100] [ 21.343394] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.343518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.343559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.343635] Call Trace: [ 21.343692] <TASK> [ 21.343737] dump_stack_lvl+0x73/0xb0 [ 21.343816] print_report+0xd1/0x650 [ 21.343892] ? __virt_addr_valid+0x1db/0x2d0 [ 21.343967] ? kasan_atomics_helper+0x3df/0x5450 [ 21.344047] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.344126] ? kasan_atomics_helper+0x3df/0x5450 [ 21.344207] kasan_report+0x141/0x180 [ 21.344284] ? kasan_atomics_helper+0x3df/0x5450 [ 21.344369] kasan_check_range+0x10c/0x1c0 [ 21.344441] __kasan_check_read+0x15/0x20 [ 21.344509] kasan_atomics_helper+0x3df/0x5450 [ 21.344585] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.344721] ? ret_from_fork_asm+0x1a/0x30 [ 21.344812] kasan_atomics+0x1dc/0x310 [ 21.344890] ? __pfx_kasan_atomics+0x10/0x10 [ 21.344966] ? __pfx_read_tsc+0x10/0x10 [ 21.345036] ? ktime_get_ts64+0x86/0x230 [ 21.345111] kunit_try_run_case+0x1a5/0x480 [ 21.345153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.345191] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.345264] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.345303] ? __kthread_parkme+0x82/0x180 [ 21.345336] ? preempt_count_sub+0x50/0x80 [ 21.345374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.345410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.345446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.345481] kthread+0x337/0x6f0 [ 21.345506] ? trace_preempt_on+0x20/0xc0 [ 21.345542] ? __pfx_kthread+0x10/0x10 [ 21.345569] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.345620] ? calculate_sigpending+0x7b/0xa0 [ 21.345698] ? __pfx_kthread+0x10/0x10 [ 21.345782] ret_from_fork+0x41/0x80 [ 21.345862] ? __pfx_kthread+0x10/0x10 [ 21.345934] ret_from_fork_asm+0x1a/0x30 [ 21.346021] </TASK> [ 21.346039] [ 21.366715] Allocated by task 286: [ 21.367039] kasan_save_stack+0x45/0x70 [ 21.367783] kasan_save_track+0x18/0x40 [ 21.368491] kasan_save_alloc_info+0x3b/0x50 [ 21.369086] __kasan_kmalloc+0xb7/0xc0 [ 21.369396] __kmalloc_cache_noprof+0x189/0x420 [ 21.369874] kasan_atomics+0x95/0x310 [ 21.370176] kunit_try_run_case+0x1a5/0x480 [ 21.370516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.370927] kthread+0x337/0x6f0 [ 21.371194] ret_from_fork+0x41/0x80 [ 21.371481] ret_from_fork_asm+0x1a/0x30 [ 21.372498] [ 21.372708] The buggy address belongs to the object at ffff888102a2c100 [ 21.372708] which belongs to the cache kmalloc-64 of size 64 [ 21.373561] The buggy address is located 0 bytes to the right of [ 21.373561] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.374482] [ 21.374725] The buggy address belongs to the physical page: [ 21.375187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.376347] flags: 0x200000000000000(node=0|zone=2) [ 21.376924] page_type: f5(slab) [ 21.377253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.378066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.378787] page dumped because: kasan: bad access detected [ 21.379309] [ 21.379538] Memory state around the buggy address: [ 21.380010] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.381040] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.381805] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.382411] ^ [ 21.382837] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.383395] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.383850] ================================================================== [ 21.582454] ================================================================== [ 21.583244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 21.584499] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.585118] [ 21.585988] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.586121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.586159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.586217] Call Trace: [ 21.586269] <TASK> [ 21.586316] dump_stack_lvl+0x73/0xb0 [ 21.586393] print_report+0xd1/0x650 [ 21.586468] ? __virt_addr_valid+0x1db/0x2d0 [ 21.586543] ? kasan_atomics_helper+0x5fe/0x5450 [ 21.586635] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.586740] ? kasan_atomics_helper+0x5fe/0x5450 [ 21.586826] kasan_report+0x141/0x180 [ 21.586873] ? kasan_atomics_helper+0x5fe/0x5450 [ 21.586917] kasan_check_range+0x10c/0x1c0 [ 21.586950] __kasan_check_write+0x18/0x20 [ 21.586984] kasan_atomics_helper+0x5fe/0x5450 [ 21.587021] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.587057] ? ret_from_fork_asm+0x1a/0x30 [ 21.587099] kasan_atomics+0x1dc/0x310 [ 21.587129] ? __pfx_kasan_atomics+0x10/0x10 [ 21.587159] ? __pfx_read_tsc+0x10/0x10 [ 21.587189] ? ktime_get_ts64+0x86/0x230 [ 21.587226] kunit_try_run_case+0x1a5/0x480 [ 21.587266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.587301] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.587365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.587405] ? __kthread_parkme+0x82/0x180 [ 21.587439] ? preempt_count_sub+0x50/0x80 [ 21.587477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.587514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.587549] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.587584] kthread+0x337/0x6f0 [ 21.587653] ? trace_preempt_on+0x20/0xc0 [ 21.587729] ? __pfx_kthread+0x10/0x10 [ 21.587761] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.587794] ? calculate_sigpending+0x7b/0xa0 [ 21.587827] ? __pfx_kthread+0x10/0x10 [ 21.587854] ret_from_fork+0x41/0x80 [ 21.587886] ? __pfx_kthread+0x10/0x10 [ 21.587911] ret_from_fork_asm+0x1a/0x30 [ 21.587954] </TASK> [ 21.587969] [ 21.609691] Allocated by task 286: [ 21.610440] kasan_save_stack+0x45/0x70 [ 21.611120] kasan_save_track+0x18/0x40 [ 21.612065] kasan_save_alloc_info+0x3b/0x50 [ 21.613167] __kasan_kmalloc+0xb7/0xc0 [ 21.613874] __kmalloc_cache_noprof+0x189/0x420 [ 21.614267] kasan_atomics+0x95/0x310 [ 21.614566] kunit_try_run_case+0x1a5/0x480 [ 21.615566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.616403] kthread+0x337/0x6f0 [ 21.616737] ret_from_fork+0x41/0x80 [ 21.617326] ret_from_fork_asm+0x1a/0x30 [ 21.617700] [ 21.617963] The buggy address belongs to the object at ffff888102a2c100 [ 21.617963] which belongs to the cache kmalloc-64 of size 64 [ 21.618804] The buggy address is located 0 bytes to the right of [ 21.618804] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.619849] [ 21.620156] The buggy address belongs to the physical page: [ 21.620681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.621494] flags: 0x200000000000000(node=0|zone=2) [ 21.622472] page_type: f5(slab) [ 21.623174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.624488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.625131] page dumped because: kasan: bad access detected [ 21.625894] [ 21.626487] Memory state around the buggy address: [ 21.627057] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.627801] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.628561] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.629152] ^ [ 21.629700] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.630628] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.631649] ================================================================== [ 23.910056] ================================================================== [ 23.910716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 23.911323] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.911977] [ 23.912305] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.912479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.912521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.912579] Call Trace: [ 23.912678] <TASK> [ 23.912755] dump_stack_lvl+0x73/0xb0 [ 23.912863] print_report+0xd1/0x650 [ 23.912972] ? __virt_addr_valid+0x1db/0x2d0 [ 23.913050] ? kasan_atomics_helper+0x5115/0x5450 [ 23.913126] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.913201] ? kasan_atomics_helper+0x5115/0x5450 [ 23.913325] kasan_report+0x141/0x180 [ 23.913404] ? kasan_atomics_helper+0x5115/0x5450 [ 23.913492] __asan_report_load8_noabort+0x18/0x20 [ 23.913565] kasan_atomics_helper+0x5115/0x5450 [ 23.913660] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.913741] ? ret_from_fork_asm+0x1a/0x30 [ 23.913844] kasan_atomics+0x1dc/0x310 [ 23.913913] ? __pfx_kasan_atomics+0x10/0x10 [ 23.913985] ? __pfx_read_tsc+0x10/0x10 [ 23.914054] ? ktime_get_ts64+0x86/0x230 [ 23.914176] kunit_try_run_case+0x1a5/0x480 [ 23.914337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.914425] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.914508] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.914588] ? __kthread_parkme+0x82/0x180 [ 23.914680] ? preempt_count_sub+0x50/0x80 [ 23.914724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.914762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.914799] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.914836] kthread+0x337/0x6f0 [ 23.914861] ? trace_preempt_on+0x20/0xc0 [ 23.914898] ? __pfx_kthread+0x10/0x10 [ 23.914925] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.914958] ? calculate_sigpending+0x7b/0xa0 [ 23.914990] ? __pfx_kthread+0x10/0x10 [ 23.915019] ret_from_fork+0x41/0x80 [ 23.915050] ? __pfx_kthread+0x10/0x10 [ 23.915076] ret_from_fork_asm+0x1a/0x30 [ 23.915119] </TASK> [ 23.915135] [ 23.930392] Allocated by task 286: [ 23.930819] kasan_save_stack+0x45/0x70 [ 23.931348] kasan_save_track+0x18/0x40 [ 23.931739] kasan_save_alloc_info+0x3b/0x50 [ 23.932267] __kasan_kmalloc+0xb7/0xc0 [ 23.932703] __kmalloc_cache_noprof+0x189/0x420 [ 23.933175] kasan_atomics+0x95/0x310 [ 23.933628] kunit_try_run_case+0x1a5/0x480 [ 23.934094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.934711] kthread+0x337/0x6f0 [ 23.935097] ret_from_fork+0x41/0x80 [ 23.936031] ret_from_fork_asm+0x1a/0x30 [ 23.936954] [ 23.937197] The buggy address belongs to the object at ffff888102a2c100 [ 23.937197] which belongs to the cache kmalloc-64 of size 64 [ 23.937935] The buggy address is located 0 bytes to the right of [ 23.937935] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.939024] [ 23.939324] The buggy address belongs to the physical page: [ 23.939881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.940625] flags: 0x200000000000000(node=0|zone=2) [ 23.940978] page_type: f5(slab) [ 23.941307] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.941954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.942727] page dumped because: kasan: bad access detected [ 23.943338] [ 23.943623] Memory state around the buggy address: [ 23.944121] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.944679] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.945126] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.945851] ^ [ 23.946418] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.947108] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.947787] ================================================================== [ 23.373458] ================================================================== [ 23.374123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 23.374757] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.375270] [ 23.375545] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.375679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.375716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.375771] Call Trace: [ 23.375812] <TASK> [ 23.375850] dump_stack_lvl+0x73/0xb0 [ 23.375922] print_report+0xd1/0x650 [ 23.375999] ? __virt_addr_valid+0x1db/0x2d0 [ 23.376074] ? kasan_atomics_helper+0x1ce1/0x5450 [ 23.376148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.376268] ? kasan_atomics_helper+0x1ce1/0x5450 [ 23.376352] kasan_report+0x141/0x180 [ 23.376435] ? kasan_atomics_helper+0x1ce1/0x5450 [ 23.376528] kasan_check_range+0x10c/0x1c0 [ 23.376621] __kasan_check_write+0x18/0x20 [ 23.376697] kasan_atomics_helper+0x1ce1/0x5450 [ 23.376778] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.376858] ? ret_from_fork_asm+0x1a/0x30 [ 23.376951] kasan_atomics+0x1dc/0x310 [ 23.377022] ? __pfx_kasan_atomics+0x10/0x10 [ 23.377094] ? __pfx_read_tsc+0x10/0x10 [ 23.377162] ? ktime_get_ts64+0x86/0x230 [ 23.377285] kunit_try_run_case+0x1a5/0x480 [ 23.377375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.377449] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.377521] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.377562] ? __kthread_parkme+0x82/0x180 [ 23.377594] ? preempt_count_sub+0x50/0x80 [ 23.377660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.377699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.377735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.377784] kthread+0x337/0x6f0 [ 23.377809] ? trace_preempt_on+0x20/0xc0 [ 23.377845] ? __pfx_kthread+0x10/0x10 [ 23.377870] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.377901] ? calculate_sigpending+0x7b/0xa0 [ 23.377931] ? __pfx_kthread+0x10/0x10 [ 23.377956] ret_from_fork+0x41/0x80 [ 23.377988] ? __pfx_kthread+0x10/0x10 [ 23.378013] ret_from_fork_asm+0x1a/0x30 [ 23.378055] </TASK> [ 23.378069] [ 23.394648] Allocated by task 286: [ 23.395083] kasan_save_stack+0x45/0x70 [ 23.395567] kasan_save_track+0x18/0x40 [ 23.396017] kasan_save_alloc_info+0x3b/0x50 [ 23.396515] __kasan_kmalloc+0xb7/0xc0 [ 23.396932] __kmalloc_cache_noprof+0x189/0x420 [ 23.397426] kasan_atomics+0x95/0x310 [ 23.397932] kunit_try_run_case+0x1a5/0x480 [ 23.398528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.399060] kthread+0x337/0x6f0 [ 23.399446] ret_from_fork+0x41/0x80 [ 23.399903] ret_from_fork_asm+0x1a/0x30 [ 23.400394] [ 23.400664] The buggy address belongs to the object at ffff888102a2c100 [ 23.400664] which belongs to the cache kmalloc-64 of size 64 [ 23.401663] The buggy address is located 0 bytes to the right of [ 23.401663] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.402692] [ 23.402962] The buggy address belongs to the physical page: [ 23.403474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.404212] flags: 0x200000000000000(node=0|zone=2) [ 23.404569] page_type: f5(slab) [ 23.404881] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.405875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.407302] page dumped because: kasan: bad access detected [ 23.407961] [ 23.408144] Memory state around the buggy address: [ 23.408492] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.409006] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.410498] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.411319] ^ [ 23.411655] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.412203] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.412806] ================================================================== [ 22.193830] ================================================================== [ 22.194414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 22.195077] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.195828] [ 22.196081] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.196196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.196278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.196337] Call Trace: [ 22.196390] <TASK> [ 22.196437] dump_stack_lvl+0x73/0xb0 [ 22.196515] print_report+0xd1/0x650 [ 22.196595] ? __virt_addr_valid+0x1db/0x2d0 [ 22.196688] ? kasan_atomics_helper+0xe78/0x5450 [ 22.196760] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.196829] ? kasan_atomics_helper+0xe78/0x5450 [ 22.196918] kasan_report+0x141/0x180 [ 22.196989] ? kasan_atomics_helper+0xe78/0x5450 [ 22.197070] kasan_check_range+0x10c/0x1c0 [ 22.197138] __kasan_check_write+0x18/0x20 [ 22.197206] kasan_atomics_helper+0xe78/0x5450 [ 22.197367] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.197446] ? ret_from_fork_asm+0x1a/0x30 [ 22.197535] kasan_atomics+0x1dc/0x310 [ 22.197623] ? __pfx_kasan_atomics+0x10/0x10 [ 22.197699] ? __pfx_read_tsc+0x10/0x10 [ 22.197771] ? ktime_get_ts64+0x86/0x230 [ 22.197852] kunit_try_run_case+0x1a5/0x480 [ 22.197932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.198005] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.198081] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.198157] ? __kthread_parkme+0x82/0x180 [ 22.198313] ? preempt_count_sub+0x50/0x80 [ 22.198404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.198481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.198557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.198654] kthread+0x337/0x6f0 [ 22.198720] ? trace_preempt_on+0x20/0xc0 [ 22.198803] ? __pfx_kthread+0x10/0x10 [ 22.198910] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.198995] ? calculate_sigpending+0x7b/0xa0 [ 22.199072] ? __pfx_kthread+0x10/0x10 [ 22.199141] ret_from_fork+0x41/0x80 [ 22.199284] ? __pfx_kthread+0x10/0x10 [ 22.199365] ret_from_fork_asm+0x1a/0x30 [ 22.199466] </TASK> [ 22.199504] [ 22.214630] Allocated by task 286: [ 22.215025] kasan_save_stack+0x45/0x70 [ 22.215478] kasan_save_track+0x18/0x40 [ 22.215965] kasan_save_alloc_info+0x3b/0x50 [ 22.216459] __kasan_kmalloc+0xb7/0xc0 [ 22.216903] __kmalloc_cache_noprof+0x189/0x420 [ 22.217444] kasan_atomics+0x95/0x310 [ 22.217783] kunit_try_run_case+0x1a5/0x480 [ 22.218264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.218821] kthread+0x337/0x6f0 [ 22.219124] ret_from_fork+0x41/0x80 [ 22.219522] ret_from_fork_asm+0x1a/0x30 [ 22.220026] [ 22.220254] The buggy address belongs to the object at ffff888102a2c100 [ 22.220254] which belongs to the cache kmalloc-64 of size 64 [ 22.221170] The buggy address is located 0 bytes to the right of [ 22.221170] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.222205] [ 22.222436] The buggy address belongs to the physical page: [ 22.222972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.223757] flags: 0x200000000000000(node=0|zone=2) [ 22.224318] page_type: f5(slab) [ 22.224745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.225437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.226102] page dumped because: kasan: bad access detected [ 22.226634] [ 22.226864] Memory state around the buggy address: [ 22.227389] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.228054] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.228715] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.229379] ^ [ 22.229843] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.230477] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.231086] ================================================================== [ 22.762909] ================================================================== [ 22.764097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 22.764752] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.765316] [ 22.765617] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.765743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.765793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.765857] Call Trace: [ 22.765909] <TASK> [ 22.765960] dump_stack_lvl+0x73/0xb0 [ 22.766043] print_report+0xd1/0x650 [ 22.766121] ? __virt_addr_valid+0x1db/0x2d0 [ 22.766198] ? kasan_atomics_helper+0x1467/0x5450 [ 22.766278] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.766358] ? kasan_atomics_helper+0x1467/0x5450 [ 22.766434] kasan_report+0x141/0x180 [ 22.766515] ? kasan_atomics_helper+0x1467/0x5450 [ 22.766622] kasan_check_range+0x10c/0x1c0 [ 22.766701] __kasan_check_write+0x18/0x20 [ 22.766773] kasan_atomics_helper+0x1467/0x5450 [ 22.766855] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.766929] ? ret_from_fork_asm+0x1a/0x30 [ 22.766981] kasan_atomics+0x1dc/0x310 [ 22.767013] ? __pfx_kasan_atomics+0x10/0x10 [ 22.767046] ? __pfx_read_tsc+0x10/0x10 [ 22.767075] ? ktime_get_ts64+0x86/0x230 [ 22.767112] kunit_try_run_case+0x1a5/0x480 [ 22.767149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.767185] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.767251] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.767299] ? __kthread_parkme+0x82/0x180 [ 22.767334] ? preempt_count_sub+0x50/0x80 [ 22.767375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.767412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.767447] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.767484] kthread+0x337/0x6f0 [ 22.767509] ? trace_preempt_on+0x20/0xc0 [ 22.767546] ? __pfx_kthread+0x10/0x10 [ 22.767573] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.767628] ? calculate_sigpending+0x7b/0xa0 [ 22.767665] ? __pfx_kthread+0x10/0x10 [ 22.767693] ret_from_fork+0x41/0x80 [ 22.767724] ? __pfx_kthread+0x10/0x10 [ 22.767751] ret_from_fork_asm+0x1a/0x30 [ 22.767794] </TASK> [ 22.767809] [ 22.785122] Allocated by task 286: [ 22.785540] kasan_save_stack+0x45/0x70 [ 22.786313] kasan_save_track+0x18/0x40 [ 22.786983] kasan_save_alloc_info+0x3b/0x50 [ 22.787384] __kasan_kmalloc+0xb7/0xc0 [ 22.787811] __kmalloc_cache_noprof+0x189/0x420 [ 22.788281] kasan_atomics+0x95/0x310 [ 22.788737] kunit_try_run_case+0x1a5/0x480 [ 22.789185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.789787] kthread+0x337/0x6f0 [ 22.790069] ret_from_fork+0x41/0x80 [ 22.790369] ret_from_fork_asm+0x1a/0x30 [ 22.790995] [ 22.791286] The buggy address belongs to the object at ffff888102a2c100 [ 22.791286] which belongs to the cache kmalloc-64 of size 64 [ 22.792752] The buggy address is located 0 bytes to the right of [ 22.792752] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.794170] [ 22.794361] The buggy address belongs to the physical page: [ 22.795090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.796180] flags: 0x200000000000000(node=0|zone=2) [ 22.796581] page_type: f5(slab) [ 22.796872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.797595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.798552] page dumped because: kasan: bad access detected [ 22.798951] [ 22.799391] Memory state around the buggy address: [ 22.800023] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.800682] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.801275] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.801887] ^ [ 22.802396] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.803048] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.803662] ================================================================== [ 22.722175] ================================================================== [ 22.723171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 22.724745] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.725932] [ 22.726525] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.726628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.726650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.726681] Call Trace: [ 22.726707] <TASK> [ 22.726727] dump_stack_lvl+0x73/0xb0 [ 22.726766] print_report+0xd1/0x650 [ 22.726803] ? __virt_addr_valid+0x1db/0x2d0 [ 22.726838] ? kasan_atomics_helper+0x4eae/0x5450 [ 22.726872] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.726908] ? kasan_atomics_helper+0x4eae/0x5450 [ 22.726942] kasan_report+0x141/0x180 [ 22.726978] ? kasan_atomics_helper+0x4eae/0x5450 [ 22.727018] __asan_report_load8_noabort+0x18/0x20 [ 22.727051] kasan_atomics_helper+0x4eae/0x5450 [ 22.727087] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.727122] ? ret_from_fork_asm+0x1a/0x30 [ 22.727163] kasan_atomics+0x1dc/0x310 [ 22.727192] ? __pfx_kasan_atomics+0x10/0x10 [ 22.727259] ? __pfx_read_tsc+0x10/0x10 [ 22.727294] ? ktime_get_ts64+0x86/0x230 [ 22.727335] kunit_try_run_case+0x1a5/0x480 [ 22.727374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.727409] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.727446] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.727484] ? __kthread_parkme+0x82/0x180 [ 22.727517] ? preempt_count_sub+0x50/0x80 [ 22.727555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.727592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.727650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.727688] kthread+0x337/0x6f0 [ 22.727712] ? trace_preempt_on+0x20/0xc0 [ 22.727749] ? __pfx_kthread+0x10/0x10 [ 22.727776] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.727809] ? calculate_sigpending+0x7b/0xa0 [ 22.727841] ? __pfx_kthread+0x10/0x10 [ 22.727868] ret_from_fork+0x41/0x80 [ 22.727900] ? __pfx_kthread+0x10/0x10 [ 22.727925] ret_from_fork_asm+0x1a/0x30 [ 22.727968] </TASK> [ 22.727983] [ 22.744292] Allocated by task 286: [ 22.744622] kasan_save_stack+0x45/0x70 [ 22.744954] kasan_save_track+0x18/0x40 [ 22.745327] kasan_save_alloc_info+0x3b/0x50 [ 22.745801] __kasan_kmalloc+0xb7/0xc0 [ 22.746260] __kmalloc_cache_noprof+0x189/0x420 [ 22.746744] kasan_atomics+0x95/0x310 [ 22.747142] kunit_try_run_case+0x1a5/0x480 [ 22.747644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.748162] kthread+0x337/0x6f0 [ 22.748519] ret_from_fork+0x41/0x80 [ 22.748950] ret_from_fork_asm+0x1a/0x30 [ 22.749370] [ 22.749623] The buggy address belongs to the object at ffff888102a2c100 [ 22.749623] which belongs to the cache kmalloc-64 of size 64 [ 22.750379] The buggy address is located 0 bytes to the right of [ 22.750379] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.751411] [ 22.751648] The buggy address belongs to the physical page: [ 22.752096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.752704] flags: 0x200000000000000(node=0|zone=2) [ 22.753058] page_type: f5(slab) [ 22.753471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.754138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.754839] page dumped because: kasan: bad access detected [ 22.755367] [ 22.755627] Memory state around the buggy address: [ 22.756075] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.756598] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.757261] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.757928] ^ [ 22.759308] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.759939] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.761645] ================================================================== [ 22.890157] ================================================================== [ 22.890844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 22.891522] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.892147] [ 22.892382] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.892501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.892543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.892598] Call Trace: [ 22.892668] <TASK> [ 22.892709] dump_stack_lvl+0x73/0xb0 [ 22.892786] print_report+0xd1/0x650 [ 22.892868] ? __virt_addr_valid+0x1db/0x2d0 [ 22.892943] ? kasan_atomics_helper+0x15b6/0x5450 [ 22.893022] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.893100] ? kasan_atomics_helper+0x15b6/0x5450 [ 22.893173] kasan_report+0x141/0x180 [ 22.893251] ? kasan_atomics_helper+0x15b6/0x5450 [ 22.893343] kasan_check_range+0x10c/0x1c0 [ 22.893415] __kasan_check_write+0x18/0x20 [ 22.893485] kasan_atomics_helper+0x15b6/0x5450 [ 22.893566] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.893684] ? ret_from_fork_asm+0x1a/0x30 [ 22.893831] kasan_atomics+0x1dc/0x310 [ 22.893934] ? __pfx_kasan_atomics+0x10/0x10 [ 22.893992] ? __pfx_read_tsc+0x10/0x10 [ 22.894024] ? ktime_get_ts64+0x86/0x230 [ 22.894062] kunit_try_run_case+0x1a5/0x480 [ 22.894100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.894168] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.894261] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.894364] ? __kthread_parkme+0x82/0x180 [ 22.894469] ? preempt_count_sub+0x50/0x80 [ 22.894560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.894680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.894793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.894875] kthread+0x337/0x6f0 [ 22.894947] ? trace_preempt_on+0x20/0xc0 [ 22.894989] ? __pfx_kthread+0x10/0x10 [ 22.895035] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.895072] ? calculate_sigpending+0x7b/0xa0 [ 22.895119] ? __pfx_kthread+0x10/0x10 [ 22.895151] ret_from_fork+0x41/0x80 [ 22.895185] ? __pfx_kthread+0x10/0x10 [ 22.895251] ret_from_fork_asm+0x1a/0x30 [ 22.895316] </TASK> [ 22.895334] [ 22.910386] Allocated by task 286: [ 22.910784] kasan_save_stack+0x45/0x70 [ 22.911190] kasan_save_track+0x18/0x40 [ 22.911691] kasan_save_alloc_info+0x3b/0x50 [ 22.912122] __kasan_kmalloc+0xb7/0xc0 [ 22.912478] __kmalloc_cache_noprof+0x189/0x420 [ 22.912840] kasan_atomics+0x95/0x310 [ 22.913290] kunit_try_run_case+0x1a5/0x480 [ 22.913802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.914384] kthread+0x337/0x6f0 [ 22.914763] ret_from_fork+0x41/0x80 [ 22.915244] ret_from_fork_asm+0x1a/0x30 [ 22.915659] [ 22.915901] The buggy address belongs to the object at ffff888102a2c100 [ 22.915901] which belongs to the cache kmalloc-64 of size 64 [ 22.916675] The buggy address is located 0 bytes to the right of [ 22.916675] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.917820] [ 22.918059] The buggy address belongs to the physical page: [ 22.918523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.919022] flags: 0x200000000000000(node=0|zone=2) [ 22.919565] page_type: f5(slab) [ 22.919995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.920742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.921404] page dumped because: kasan: bad access detected [ 22.921928] [ 22.922155] Memory state around the buggy address: [ 22.922622] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.923109] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.923820] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.924480] ^ [ 22.925006] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.925668] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.926273] ================================================================== [ 21.384947] ================================================================== [ 21.385970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 21.386831] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.387530] [ 21.387936] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.388057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.388098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.388154] Call Trace: [ 21.388207] <TASK> [ 21.388252] dump_stack_lvl+0x73/0xb0 [ 21.388377] print_report+0xd1/0x650 [ 21.388457] ? __virt_addr_valid+0x1db/0x2d0 [ 21.388540] ? kasan_atomics_helper+0x4b54/0x5450 [ 21.388752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.388836] ? kasan_atomics_helper+0x4b54/0x5450 [ 21.388914] kasan_report+0x141/0x180 [ 21.388996] ? kasan_atomics_helper+0x4b54/0x5450 [ 21.389087] __asan_report_load4_noabort+0x18/0x20 [ 21.389163] kasan_atomics_helper+0x4b54/0x5450 [ 21.389242] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.389362] ? ret_from_fork_asm+0x1a/0x30 [ 21.389451] kasan_atomics+0x1dc/0x310 [ 21.389523] ? __pfx_kasan_atomics+0x10/0x10 [ 21.389632] ? __pfx_read_tsc+0x10/0x10 [ 21.389807] ? ktime_get_ts64+0x86/0x230 [ 21.389894] kunit_try_run_case+0x1a5/0x480 [ 21.389974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.390044] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.390119] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.390160] ? __kthread_parkme+0x82/0x180 [ 21.390192] ? preempt_count_sub+0x50/0x80 [ 21.390229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.390268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.390304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.390339] kthread+0x337/0x6f0 [ 21.390364] ? trace_preempt_on+0x20/0xc0 [ 21.390400] ? __pfx_kthread+0x10/0x10 [ 21.390425] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.390458] ? calculate_sigpending+0x7b/0xa0 [ 21.390489] ? __pfx_kthread+0x10/0x10 [ 21.390515] ret_from_fork+0x41/0x80 [ 21.390547] ? __pfx_kthread+0x10/0x10 [ 21.390573] ret_from_fork_asm+0x1a/0x30 [ 21.390686] </TASK> [ 21.390736] [ 21.412154] Allocated by task 286: [ 21.412540] kasan_save_stack+0x45/0x70 [ 21.413261] kasan_save_track+0x18/0x40 [ 21.413787] kasan_save_alloc_info+0x3b/0x50 [ 21.414272] __kasan_kmalloc+0xb7/0xc0 [ 21.414737] __kmalloc_cache_noprof+0x189/0x420 [ 21.415256] kasan_atomics+0x95/0x310 [ 21.415679] kunit_try_run_case+0x1a5/0x480 [ 21.416142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.416666] kthread+0x337/0x6f0 [ 21.417025] ret_from_fork+0x41/0x80 [ 21.417446] ret_from_fork_asm+0x1a/0x30 [ 21.417901] [ 21.418136] The buggy address belongs to the object at ffff888102a2c100 [ 21.418136] which belongs to the cache kmalloc-64 of size 64 [ 21.419581] The buggy address is located 0 bytes to the right of [ 21.419581] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.421647] [ 21.421840] The buggy address belongs to the physical page: [ 21.422438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.423666] flags: 0x200000000000000(node=0|zone=2) [ 21.424497] page_type: f5(slab) [ 21.424897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.425856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.426327] page dumped because: kasan: bad access detected [ 21.426870] [ 21.427401] Memory state around the buggy address: [ 21.428129] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.429247] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.430076] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.430726] ^ [ 21.431513] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.432182] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.432951] ================================================================== [ 23.004295] ================================================================== [ 23.004785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 23.005861] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.006508] [ 23.006765] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.006871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.006892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.006923] Call Trace: [ 23.006947] <TASK> [ 23.006969] dump_stack_lvl+0x73/0xb0 [ 23.007049] print_report+0xd1/0x650 [ 23.007202] ? __virt_addr_valid+0x1db/0x2d0 [ 23.007323] ? kasan_atomics_helper+0x177f/0x5450 [ 23.007397] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.007474] ? kasan_atomics_helper+0x177f/0x5450 [ 23.007547] kasan_report+0x141/0x180 [ 23.007644] ? kasan_atomics_helper+0x177f/0x5450 [ 23.007721] kasan_check_range+0x10c/0x1c0 [ 23.007754] __kasan_check_write+0x18/0x20 [ 23.007784] kasan_atomics_helper+0x177f/0x5450 [ 23.007819] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.007854] ? ret_from_fork_asm+0x1a/0x30 [ 23.007893] kasan_atomics+0x1dc/0x310 [ 23.007924] ? __pfx_kasan_atomics+0x10/0x10 [ 23.007954] ? __pfx_read_tsc+0x10/0x10 [ 23.007983] ? ktime_get_ts64+0x86/0x230 [ 23.008019] kunit_try_run_case+0x1a5/0x480 [ 23.008056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.008090] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.008127] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.008161] ? __kthread_parkme+0x82/0x180 [ 23.008193] ? preempt_count_sub+0x50/0x80 [ 23.008270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.008311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.008346] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.008381] kthread+0x337/0x6f0 [ 23.008406] ? trace_preempt_on+0x20/0xc0 [ 23.008441] ? __pfx_kthread+0x10/0x10 [ 23.008467] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.008499] ? calculate_sigpending+0x7b/0xa0 [ 23.008530] ? __pfx_kthread+0x10/0x10 [ 23.008555] ret_from_fork+0x41/0x80 [ 23.008587] ? __pfx_kthread+0x10/0x10 [ 23.008638] ret_from_fork_asm+0x1a/0x30 [ 23.008683] </TASK> [ 23.008698] [ 23.023988] Allocated by task 286: [ 23.024285] kasan_save_stack+0x45/0x70 [ 23.024597] kasan_save_track+0x18/0x40 [ 23.025026] kasan_save_alloc_info+0x3b/0x50 [ 23.025458] __kasan_kmalloc+0xb7/0xc0 [ 23.025887] __kmalloc_cache_noprof+0x189/0x420 [ 23.026344] kasan_atomics+0x95/0x310 [ 23.026842] kunit_try_run_case+0x1a5/0x480 [ 23.027358] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.027894] kthread+0x337/0x6f0 [ 23.028183] ret_from_fork+0x41/0x80 [ 23.028538] ret_from_fork_asm+0x1a/0x30 [ 23.028994] [ 23.029298] The buggy address belongs to the object at ffff888102a2c100 [ 23.029298] which belongs to the cache kmalloc-64 of size 64 [ 23.030400] The buggy address is located 0 bytes to the right of [ 23.030400] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.031293] [ 23.031478] The buggy address belongs to the physical page: [ 23.031949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.032680] flags: 0x200000000000000(node=0|zone=2) [ 23.033247] page_type: f5(slab) [ 23.033680] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.034284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.034814] page dumped because: kasan: bad access detected [ 23.035409] [ 23.035654] Memory state around the buggy address: [ 23.036148] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.036863] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.037418] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.038082] ^ [ 23.038645] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.039280] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.040004] ================================================================== [ 23.042937] ================================================================== [ 23.044277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 23.046053] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.047380] [ 23.047664] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.047795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.047837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.047940] Call Trace: [ 23.047995] <TASK> [ 23.048045] dump_stack_lvl+0x73/0xb0 [ 23.048125] print_report+0xd1/0x650 [ 23.048198] ? __virt_addr_valid+0x1db/0x2d0 [ 23.048272] ? kasan_atomics_helper+0x1818/0x5450 [ 23.048345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.048443] ? kasan_atomics_helper+0x1818/0x5450 [ 23.048500] kasan_report+0x141/0x180 [ 23.048538] ? kasan_atomics_helper+0x1818/0x5450 [ 23.048581] kasan_check_range+0x10c/0x1c0 [ 23.048636] __kasan_check_write+0x18/0x20 [ 23.048671] kasan_atomics_helper+0x1818/0x5450 [ 23.048706] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.048742] ? ret_from_fork_asm+0x1a/0x30 [ 23.048782] kasan_atomics+0x1dc/0x310 [ 23.048811] ? __pfx_kasan_atomics+0x10/0x10 [ 23.048841] ? __pfx_read_tsc+0x10/0x10 [ 23.048872] ? ktime_get_ts64+0x86/0x230 [ 23.048912] kunit_try_run_case+0x1a5/0x480 [ 23.048950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.048985] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.049023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.049060] ? __kthread_parkme+0x82/0x180 [ 23.049093] ? preempt_count_sub+0x50/0x80 [ 23.049133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.049169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.049209] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.049274] kthread+0x337/0x6f0 [ 23.049303] ? trace_preempt_on+0x20/0xc0 [ 23.049341] ? __pfx_kthread+0x10/0x10 [ 23.049367] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.049400] ? calculate_sigpending+0x7b/0xa0 [ 23.049433] ? __pfx_kthread+0x10/0x10 [ 23.049460] ret_from_fork+0x41/0x80 [ 23.049493] ? __pfx_kthread+0x10/0x10 [ 23.049520] ret_from_fork_asm+0x1a/0x30 [ 23.049562] </TASK> [ 23.049577] [ 23.066712] Allocated by task 286: [ 23.067143] kasan_save_stack+0x45/0x70 [ 23.067656] kasan_save_track+0x18/0x40 [ 23.068039] kasan_save_alloc_info+0x3b/0x50 [ 23.068714] __kasan_kmalloc+0xb7/0xc0 [ 23.069182] __kmalloc_cache_noprof+0x189/0x420 [ 23.069767] kasan_atomics+0x95/0x310 [ 23.070183] kunit_try_run_case+0x1a5/0x480 [ 23.070761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.071419] kthread+0x337/0x6f0 [ 23.071786] ret_from_fork+0x41/0x80 [ 23.072288] ret_from_fork_asm+0x1a/0x30 [ 23.072790] [ 23.073002] The buggy address belongs to the object at ffff888102a2c100 [ 23.073002] which belongs to the cache kmalloc-64 of size 64 [ 23.074129] The buggy address is located 0 bytes to the right of [ 23.074129] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.075341] [ 23.075580] The buggy address belongs to the physical page: [ 23.076082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.076757] flags: 0x200000000000000(node=0|zone=2) [ 23.077250] page_type: f5(slab) [ 23.077710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.078204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.078795] page dumped because: kasan: bad access detected [ 23.079366] [ 23.079597] Memory state around the buggy address: [ 23.080152] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.080906] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.081578] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.082166] ^ [ 23.082546] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.083882] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.084457] ================================================================== [ 23.703453] ================================================================== [ 23.704136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 23.704728] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.705398] [ 23.705681] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.705814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.705854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.705912] Call Trace: [ 23.705962] <TASK> [ 23.706006] dump_stack_lvl+0x73/0xb0 [ 23.706085] print_report+0xd1/0x650 [ 23.706197] ? __virt_addr_valid+0x1db/0x2d0 [ 23.706279] ? kasan_atomics_helper+0x20c8/0x5450 [ 23.706355] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.706432] ? kasan_atomics_helper+0x20c8/0x5450 [ 23.706502] kasan_report+0x141/0x180 [ 23.706583] ? kasan_atomics_helper+0x20c8/0x5450 [ 23.706720] kasan_check_range+0x10c/0x1c0 [ 23.706803] __kasan_check_write+0x18/0x20 [ 23.706879] kasan_atomics_helper+0x20c8/0x5450 [ 23.706959] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.707036] ? ret_from_fork_asm+0x1a/0x30 [ 23.707107] kasan_atomics+0x1dc/0x310 [ 23.707141] ? __pfx_kasan_atomics+0x10/0x10 [ 23.707173] ? __pfx_read_tsc+0x10/0x10 [ 23.707204] ? ktime_get_ts64+0x86/0x230 [ 23.707272] kunit_try_run_case+0x1a5/0x480 [ 23.707315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.707351] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.707388] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.707423] ? __kthread_parkme+0x82/0x180 [ 23.707454] ? preempt_count_sub+0x50/0x80 [ 23.707492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.707530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.707564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.707599] kthread+0x337/0x6f0 [ 23.707652] ? trace_preempt_on+0x20/0xc0 [ 23.707689] ? __pfx_kthread+0x10/0x10 [ 23.707715] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.707749] ? calculate_sigpending+0x7b/0xa0 [ 23.707781] ? __pfx_kthread+0x10/0x10 [ 23.707809] ret_from_fork+0x41/0x80 [ 23.707841] ? __pfx_kthread+0x10/0x10 [ 23.707869] ret_from_fork_asm+0x1a/0x30 [ 23.707911] </TASK> [ 23.707927] [ 23.725631] Allocated by task 286: [ 23.725936] kasan_save_stack+0x45/0x70 [ 23.726429] kasan_save_track+0x18/0x40 [ 23.726927] kasan_save_alloc_info+0x3b/0x50 [ 23.727468] __kasan_kmalloc+0xb7/0xc0 [ 23.727928] __kmalloc_cache_noprof+0x189/0x420 [ 23.728441] kasan_atomics+0x95/0x310 [ 23.728882] kunit_try_run_case+0x1a5/0x480 [ 23.729326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.729917] kthread+0x337/0x6f0 [ 23.731122] ret_from_fork+0x41/0x80 [ 23.731532] ret_from_fork_asm+0x1a/0x30 [ 23.732060] [ 23.732385] The buggy address belongs to the object at ffff888102a2c100 [ 23.732385] which belongs to the cache kmalloc-64 of size 64 [ 23.733345] The buggy address is located 0 bytes to the right of [ 23.733345] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.734525] [ 23.734921] The buggy address belongs to the physical page: [ 23.735534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.736330] flags: 0x200000000000000(node=0|zone=2) [ 23.736843] page_type: f5(slab) [ 23.737286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.738018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.738558] page dumped because: kasan: bad access detected [ 23.739168] [ 23.739486] Memory state around the buggy address: [ 23.740020] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.740744] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.741478] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.742102] ^ [ 23.742688] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.743274] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.743860] ================================================================== [ 23.291412] ================================================================== [ 23.292233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 23.292971] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 23.293688] [ 23.294009] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 23.294420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.294462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.294553] Call Trace: [ 23.294621] <TASK> [ 23.294665] dump_stack_lvl+0x73/0xb0 [ 23.294746] print_report+0xd1/0x650 [ 23.294865] ? __virt_addr_valid+0x1db/0x2d0 [ 23.294972] ? kasan_atomics_helper+0x1c18/0x5450 [ 23.295050] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.295129] ? kasan_atomics_helper+0x1c18/0x5450 [ 23.295206] kasan_report+0x141/0x180 [ 23.295288] ? kasan_atomics_helper+0x1c18/0x5450 [ 23.295377] kasan_check_range+0x10c/0x1c0 [ 23.295449] __kasan_check_write+0x18/0x20 [ 23.295518] kasan_atomics_helper+0x1c18/0x5450 [ 23.295594] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.295691] ? ret_from_fork_asm+0x1a/0x30 [ 23.295776] kasan_atomics+0x1dc/0x310 [ 23.295836] ? __pfx_kasan_atomics+0x10/0x10 [ 23.295871] ? __pfx_read_tsc+0x10/0x10 [ 23.295900] ? ktime_get_ts64+0x86/0x230 [ 23.295941] kunit_try_run_case+0x1a5/0x480 [ 23.295980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.296016] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.296054] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.296091] ? __kthread_parkme+0x82/0x180 [ 23.296124] ? preempt_count_sub+0x50/0x80 [ 23.296161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.296199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.296265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.296304] kthread+0x337/0x6f0 [ 23.296329] ? trace_preempt_on+0x20/0xc0 [ 23.296365] ? __pfx_kthread+0x10/0x10 [ 23.296390] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.296422] ? calculate_sigpending+0x7b/0xa0 [ 23.296454] ? __pfx_kthread+0x10/0x10 [ 23.296482] ret_from_fork+0x41/0x80 [ 23.296514] ? __pfx_kthread+0x10/0x10 [ 23.296541] ret_from_fork_asm+0x1a/0x30 [ 23.296582] </TASK> [ 23.296598] [ 23.312075] Allocated by task 286: [ 23.312517] kasan_save_stack+0x45/0x70 [ 23.312964] kasan_save_track+0x18/0x40 [ 23.313404] kasan_save_alloc_info+0x3b/0x50 [ 23.313920] __kasan_kmalloc+0xb7/0xc0 [ 23.314431] __kmalloc_cache_noprof+0x189/0x420 [ 23.314908] kasan_atomics+0x95/0x310 [ 23.315250] kunit_try_run_case+0x1a5/0x480 [ 23.315725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.316383] kthread+0x337/0x6f0 [ 23.316808] ret_from_fork+0x41/0x80 [ 23.317204] ret_from_fork_asm+0x1a/0x30 [ 23.317595] [ 23.317912] The buggy address belongs to the object at ffff888102a2c100 [ 23.317912] which belongs to the cache kmalloc-64 of size 64 [ 23.318778] The buggy address is located 0 bytes to the right of [ 23.318778] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 23.319876] [ 23.320128] The buggy address belongs to the physical page: [ 23.320705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 23.321419] flags: 0x200000000000000(node=0|zone=2) [ 23.321906] page_type: f5(slab) [ 23.322359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.323052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.323635] page dumped because: kasan: bad access detected [ 23.323997] [ 23.324179] Memory state around the buggy address: [ 23.324739] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.325454] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.326135] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.326828] ^ [ 23.327159] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.327817] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.328563] ================================================================== [ 22.477502] ================================================================== [ 22.479120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 22.480679] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 22.482289] [ 22.483126] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 22.483262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.483302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.483357] Call Trace: [ 22.483409] <TASK> [ 22.483448] dump_stack_lvl+0x73/0xb0 [ 22.483488] print_report+0xd1/0x650 [ 22.483568] ? __virt_addr_valid+0x1db/0x2d0 [ 22.483639] ? kasan_atomics_helper+0x4a02/0x5450 [ 22.483683] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.483719] ? kasan_atomics_helper+0x4a02/0x5450 [ 22.483752] kasan_report+0x141/0x180 [ 22.483788] ? kasan_atomics_helper+0x4a02/0x5450 [ 22.483830] __asan_report_load4_noabort+0x18/0x20 [ 22.483863] kasan_atomics_helper+0x4a02/0x5450 [ 22.483897] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.483931] ? ret_from_fork_asm+0x1a/0x30 [ 22.483970] kasan_atomics+0x1dc/0x310 [ 22.483999] ? __pfx_kasan_atomics+0x10/0x10 [ 22.484029] ? __pfx_read_tsc+0x10/0x10 [ 22.484057] ? ktime_get_ts64+0x86/0x230 [ 22.484093] kunit_try_run_case+0x1a5/0x480 [ 22.484129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.484163] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.484199] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.484261] ? __kthread_parkme+0x82/0x180 [ 22.484297] ? preempt_count_sub+0x50/0x80 [ 22.484334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.484370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.484404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.484440] kthread+0x337/0x6f0 [ 22.484464] ? trace_preempt_on+0x20/0xc0 [ 22.484499] ? __pfx_kthread+0x10/0x10 [ 22.484523] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.484556] ? calculate_sigpending+0x7b/0xa0 [ 22.484587] ? __pfx_kthread+0x10/0x10 [ 22.484636] ret_from_fork+0x41/0x80 [ 22.484672] ? __pfx_kthread+0x10/0x10 [ 22.484697] ret_from_fork_asm+0x1a/0x30 [ 22.484739] </TASK> [ 22.484754] [ 22.501856] Allocated by task 286: [ 22.502320] kasan_save_stack+0x45/0x70 [ 22.502843] kasan_save_track+0x18/0x40 [ 22.503410] kasan_save_alloc_info+0x3b/0x50 [ 22.503946] __kasan_kmalloc+0xb7/0xc0 [ 22.504465] __kmalloc_cache_noprof+0x189/0x420 [ 22.505047] kasan_atomics+0x95/0x310 [ 22.505518] kunit_try_run_case+0x1a5/0x480 [ 22.506007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.506501] kthread+0x337/0x6f0 [ 22.506972] ret_from_fork+0x41/0x80 [ 22.507424] ret_from_fork_asm+0x1a/0x30 [ 22.507888] [ 22.508123] The buggy address belongs to the object at ffff888102a2c100 [ 22.508123] which belongs to the cache kmalloc-64 of size 64 [ 22.508940] The buggy address is located 0 bytes to the right of [ 22.508940] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 22.509783] [ 22.510023] The buggy address belongs to the physical page: [ 22.510515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 22.511581] flags: 0x200000000000000(node=0|zone=2) [ 22.512249] page_type: f5(slab) [ 22.512673] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.513249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.513843] page dumped because: kasan: bad access detected [ 22.514660] [ 22.514981] Memory state around the buggy address: [ 22.515497] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.516137] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.516779] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.517368] ^ [ 22.517933] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.518647] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.519434] ================================================================== [ 21.828997] ================================================================== [ 21.829910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 21.831261] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.832413] [ 21.832657] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.832724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.832743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.832773] Call Trace: [ 21.832792] <TASK> [ 21.832809] dump_stack_lvl+0x73/0xb0 [ 21.832846] print_report+0xd1/0x650 [ 21.832883] ? __virt_addr_valid+0x1db/0x2d0 [ 21.832915] ? kasan_atomics_helper+0x8f9/0x5450 [ 21.832950] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.832984] ? kasan_atomics_helper+0x8f9/0x5450 [ 21.833020] kasan_report+0x141/0x180 [ 21.833056] ? kasan_atomics_helper+0x8f9/0x5450 [ 21.833097] kasan_check_range+0x10c/0x1c0 [ 21.833128] __kasan_check_write+0x18/0x20 [ 21.833159] kasan_atomics_helper+0x8f9/0x5450 [ 21.833195] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.833262] ? ret_from_fork_asm+0x1a/0x30 [ 21.833362] kasan_atomics+0x1dc/0x310 [ 21.833508] ? __pfx_kasan_atomics+0x10/0x10 [ 21.833592] ? __pfx_read_tsc+0x10/0x10 [ 21.833679] ? ktime_get_ts64+0x86/0x230 [ 21.833819] kunit_try_run_case+0x1a5/0x480 [ 21.833921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.833997] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.834079] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.834159] ? __kthread_parkme+0x82/0x180 [ 21.834256] ? preempt_count_sub+0x50/0x80 [ 21.834346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.834428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.834511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.834595] kthread+0x337/0x6f0 [ 21.834679] ? trace_preempt_on+0x20/0xc0 [ 21.834757] ? __pfx_kthread+0x10/0x10 [ 21.834824] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.834900] ? calculate_sigpending+0x7b/0xa0 [ 21.834974] ? __pfx_kthread+0x10/0x10 [ 21.835040] ret_from_fork+0x41/0x80 [ 21.835115] ? __pfx_kthread+0x10/0x10 [ 21.835149] ret_from_fork_asm+0x1a/0x30 [ 21.835193] </TASK> [ 21.835211] [ 21.850786] Allocated by task 286: [ 21.851158] kasan_save_stack+0x45/0x70 [ 21.851556] kasan_save_track+0x18/0x40 [ 21.851900] kasan_save_alloc_info+0x3b/0x50 [ 21.852409] __kasan_kmalloc+0xb7/0xc0 [ 21.853139] __kmalloc_cache_noprof+0x189/0x420 [ 21.854327] kasan_atomics+0x95/0x310 [ 21.855010] kunit_try_run_case+0x1a5/0x480 [ 21.855651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.856124] kthread+0x337/0x6f0 [ 21.856675] ret_from_fork+0x41/0x80 [ 21.857262] ret_from_fork_asm+0x1a/0x30 [ 21.857999] [ 21.858271] The buggy address belongs to the object at ffff888102a2c100 [ 21.858271] which belongs to the cache kmalloc-64 of size 64 [ 21.859468] The buggy address is located 0 bytes to the right of [ 21.859468] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.860726] [ 21.860894] The buggy address belongs to the physical page: [ 21.861427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.862529] flags: 0x200000000000000(node=0|zone=2) [ 21.862944] page_type: f5(slab) [ 21.863363] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.864053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.864989] page dumped because: kasan: bad access detected [ 21.865381] [ 21.865629] Memory state around the buggy address: [ 21.866261] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.866981] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.867803] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.868353] ^ [ 21.868788] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.869298] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.869904] ================================================================== [ 21.533244] ================================================================== [ 21.534206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 21.534817] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286 [ 21.535398] [ 21.535785] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.535917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.535958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.536017] Call Trace: [ 21.536071] <TASK> [ 21.536122] dump_stack_lvl+0x73/0xb0 [ 21.536204] print_report+0xd1/0x650 [ 21.536329] ? __virt_addr_valid+0x1db/0x2d0 [ 21.536410] ? kasan_atomics_helper+0x565/0x5450 [ 21.536486] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.536567] ? kasan_atomics_helper+0x565/0x5450 [ 21.536776] kasan_report+0x141/0x180 [ 21.536855] ? kasan_atomics_helper+0x565/0x5450 [ 21.536942] kasan_check_range+0x10c/0x1c0 [ 21.537022] __kasan_check_write+0x18/0x20 [ 21.537101] kasan_atomics_helper+0x565/0x5450 [ 21.537179] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.537284] ? ret_from_fork_asm+0x1a/0x30 [ 21.537332] kasan_atomics+0x1dc/0x310 [ 21.537363] ? __pfx_kasan_atomics+0x10/0x10 [ 21.537394] ? __pfx_read_tsc+0x10/0x10 [ 21.537423] ? ktime_get_ts64+0x86/0x230 [ 21.537462] kunit_try_run_case+0x1a5/0x480 [ 21.537500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.537537] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.537573] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.537673] ? __kthread_parkme+0x82/0x180 [ 21.537748] ? preempt_count_sub+0x50/0x80 [ 21.537803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.537841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.537876] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.537912] kthread+0x337/0x6f0 [ 21.537937] ? trace_preempt_on+0x20/0xc0 [ 21.537971] ? __pfx_kthread+0x10/0x10 [ 21.537996] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.538028] ? calculate_sigpending+0x7b/0xa0 [ 21.538058] ? __pfx_kthread+0x10/0x10 [ 21.538083] ret_from_fork+0x41/0x80 [ 21.538115] ? __pfx_kthread+0x10/0x10 [ 21.538140] ret_from_fork_asm+0x1a/0x30 [ 21.538182] </TASK> [ 21.538197] [ 21.559113] Allocated by task 286: [ 21.559896] kasan_save_stack+0x45/0x70 [ 21.560271] kasan_save_track+0x18/0x40 [ 21.560591] kasan_save_alloc_info+0x3b/0x50 [ 21.560966] __kasan_kmalloc+0xb7/0xc0 [ 21.561301] __kmalloc_cache_noprof+0x189/0x420 [ 21.562595] kasan_atomics+0x95/0x310 [ 21.563245] kunit_try_run_case+0x1a5/0x480 [ 21.564322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.564963] kthread+0x337/0x6f0 [ 21.565281] ret_from_fork+0x41/0x80 [ 21.565618] ret_from_fork_asm+0x1a/0x30 [ 21.565975] [ 21.566138] The buggy address belongs to the object at ffff888102a2c100 [ 21.566138] which belongs to the cache kmalloc-64 of size 64 [ 21.568319] The buggy address is located 0 bytes to the right of [ 21.568319] allocated 48-byte region [ffff888102a2c100, ffff888102a2c130) [ 21.569630] [ 21.569872] The buggy address belongs to the physical page: [ 21.570342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 21.571566] flags: 0x200000000000000(node=0|zone=2) [ 21.572143] page_type: f5(slab) [ 21.572452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.573723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.574383] page dumped because: kasan: bad access detected [ 21.574998] [ 21.575193] Memory state around the buggy address: [ 21.575561] ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.576220] ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.577123] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.578115] ^ [ 21.578847] ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.579470] ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.580744] ==================================================================