Date
July 3, 2025, 3:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.231733] ================================================================== [ 18.231811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 18.231872] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.231931] [ 18.231976] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.232058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.232092] Hardware name: linux,dummy-virt (DT) [ 18.232125] Call trace: [ 18.232154] show_stack+0x20/0x38 (C) [ 18.232421] dump_stack_lvl+0x8c/0xd0 [ 18.232525] print_report+0x118/0x608 [ 18.232580] kasan_report+0xdc/0x128 [ 18.232634] kasan_check_range+0x100/0x1a8 [ 18.232687] __kasan_check_write+0x20/0x30 [ 18.232801] kasan_atomics_helper+0x147c/0x4858 [ 18.232861] kasan_atomics+0x198/0x2e0 [ 18.232916] kunit_try_run_case+0x170/0x3f0 [ 18.232979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.233041] kthread+0x328/0x630 [ 18.233095] ret_from_fork+0x10/0x20 [ 18.233149] [ 18.233180] Allocated by task 268: [ 18.233221] kasan_save_stack+0x3c/0x68 [ 18.233263] kasan_save_track+0x20/0x40 [ 18.233300] kasan_save_alloc_info+0x40/0x58 [ 18.233341] __kasan_kmalloc+0xd4/0xd8 [ 18.233492] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.233561] kasan_atomics+0xb8/0x2e0 [ 18.233697] kunit_try_run_case+0x170/0x3f0 [ 18.233763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.233827] kthread+0x328/0x630 [ 18.233872] ret_from_fork+0x10/0x20 [ 18.233917] [ 18.233967] The buggy address belongs to the object at fff00000c77e9a80 [ 18.233967] which belongs to the cache kmalloc-64 of size 64 [ 18.234083] The buggy address is located 0 bytes to the right of [ 18.234083] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.234221] [ 18.234278] The buggy address belongs to the physical page: [ 18.234321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.234385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.234454] page_type: f5(slab) [ 18.234501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.234556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.234599] page dumped because: kasan: bad access detected [ 18.234632] [ 18.235059] Memory state around the buggy address: [ 18.235170] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.235419] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.235555] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.235781] ^ [ 18.235835] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.236191] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.236334] ================================================================== [ 18.109560] ================================================================== [ 18.109720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 18.109774] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.109825] [ 18.109893] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.109992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.110020] Hardware name: linux,dummy-virt (DT) [ 18.110063] Call trace: [ 18.110093] show_stack+0x20/0x38 (C) [ 18.110404] dump_stack_lvl+0x8c/0xd0 [ 18.110467] print_report+0x118/0x608 [ 18.110748] kasan_report+0xdc/0x128 [ 18.111025] kasan_check_range+0x100/0x1a8 [ 18.111219] __kasan_check_read+0x20/0x30 [ 18.111307] kasan_atomics_helper+0xdd4/0x4858 [ 18.111356] kasan_atomics+0x198/0x2e0 [ 18.111654] kunit_try_run_case+0x170/0x3f0 [ 18.111786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.112167] kthread+0x328/0x630 [ 18.112264] ret_from_fork+0x10/0x20 [ 18.112340] [ 18.112407] Allocated by task 268: [ 18.112487] kasan_save_stack+0x3c/0x68 [ 18.112554] kasan_save_track+0x20/0x40 [ 18.112751] kasan_save_alloc_info+0x40/0x58 [ 18.112936] __kasan_kmalloc+0xd4/0xd8 [ 18.113008] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.113650] kasan_atomics+0xb8/0x2e0 [ 18.113889] kunit_try_run_case+0x170/0x3f0 [ 18.113974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.114043] kthread+0x328/0x630 [ 18.114092] ret_from_fork+0x10/0x20 [ 18.114440] [ 18.114674] The buggy address belongs to the object at fff00000c77e9a80 [ 18.114674] which belongs to the cache kmalloc-64 of size 64 [ 18.115112] The buggy address is located 0 bytes to the right of [ 18.115112] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.115228] [ 18.115266] The buggy address belongs to the physical page: [ 18.115301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.115357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.115406] page_type: f5(slab) [ 18.115445] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.115498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.115540] page dumped because: kasan: bad access detected [ 18.115574] [ 18.115931] Memory state around the buggy address: [ 18.116003] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.116284] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.116366] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.116407] ^ [ 18.116444] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.116489] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.116530] ================================================================== [ 18.021372] ================================================================== [ 18.021800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 18.021925] Write of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.022082] [ 18.022117] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.022217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.022278] Hardware name: linux,dummy-virt (DT) [ 18.022404] Call trace: [ 18.022433] show_stack+0x20/0x38 (C) [ 18.022508] dump_stack_lvl+0x8c/0xd0 [ 18.022558] print_report+0x118/0x608 [ 18.022604] kasan_report+0xdc/0x128 [ 18.022649] kasan_check_range+0x100/0x1a8 [ 18.022888] __kasan_check_write+0x20/0x30 [ 18.023062] kasan_atomics_helper+0x99c/0x4858 [ 18.023174] kasan_atomics+0x198/0x2e0 [ 18.023337] kunit_try_run_case+0x170/0x3f0 [ 18.023578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.023660] kthread+0x328/0x630 [ 18.023819] ret_from_fork+0x10/0x20 [ 18.023876] [ 18.023913] Allocated by task 268: [ 18.024084] kasan_save_stack+0x3c/0x68 [ 18.024303] kasan_save_track+0x20/0x40 [ 18.024349] kasan_save_alloc_info+0x40/0x58 [ 18.024440] __kasan_kmalloc+0xd4/0xd8 [ 18.024541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.024726] kasan_atomics+0xb8/0x2e0 [ 18.024854] kunit_try_run_case+0x170/0x3f0 [ 18.025113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.025273] kthread+0x328/0x630 [ 18.025360] ret_from_fork+0x10/0x20 [ 18.025575] [ 18.025622] The buggy address belongs to the object at fff00000c77e9a80 [ 18.025622] which belongs to the cache kmalloc-64 of size 64 [ 18.025827] The buggy address is located 0 bytes to the right of [ 18.025827] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.025995] [ 18.026085] The buggy address belongs to the physical page: [ 18.026406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.026763] page dumped because: kasan: bad access detected [ 18.027585] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.028427] Hardware name: linux,dummy-virt (DT) [ 18.029024] ret_from_fork+0x10/0x20 [ 18.029071] [ 18.029091] Allocated by task 268: [ 18.029121] kasan_save_stack+0x3c/0x68 [ 18.029161] kasan_save_track+0x20/0x40 [ 18.029199] kasan_save_alloc_info+0x40/0x58 [ 18.029240] __kasan_kmalloc+0xd4/0xd8 [ 18.029277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.029341] kasan_atomics+0xb8/0x2e0 [ 18.029380] kunit_try_run_case+0x170/0x3f0 [ 18.029420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.029673] kthread+0x328/0x630 [ 18.030328] ret_from_fork+0x10/0x20 [ 18.030380] [ 18.030402] The buggy address belongs to the object at fff00000c77e9a80 [ 18.030402] which belongs to the cache kmalloc-64 of size 64 [ 18.030467] The buggy address is located 0 bytes to the right of [ 18.030467] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.030532] [ 18.030553] The buggy address belongs to the physical page: [ 18.030585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.030638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.030685] page_type: f5(slab) [ 18.030722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.030774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.030816] page dumped because: kasan: bad access detected [ 18.030849] [ 18.030869] Memory state around the buggy address: [ 18.030902] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.030958] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.031003] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.031042] ^ [ 18.031074] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.031116] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.031156] ================================================================== [ 18.172601] ================================================================== [ 18.172654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 18.172796] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.172882] [ 18.173060] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.173148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.173177] Hardware name: linux,dummy-virt (DT) [ 18.173458] Call trace: [ 18.173494] show_stack+0x20/0x38 (C) [ 18.174032] dump_stack_lvl+0x8c/0xd0 [ 18.174124] print_report+0x118/0x608 [ 18.174279] kasan_report+0xdc/0x128 [ 18.174344] kasan_check_range+0x100/0x1a8 [ 18.174807] __kasan_check_write+0x20/0x30 [ 18.175073] kasan_atomics_helper+0x1058/0x4858 [ 18.175244] kasan_atomics+0x198/0x2e0 [ 18.175384] kunit_try_run_case+0x170/0x3f0 [ 18.175503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.175587] kthread+0x328/0x630 [ 18.175694] ret_from_fork+0x10/0x20 [ 18.175745] [ 18.175795] Allocated by task 268: [ 18.175853] kasan_save_stack+0x3c/0x68 [ 18.176208] kasan_save_track+0x20/0x40 [ 18.176565] kasan_save_alloc_info+0x40/0x58 [ 18.176656] __kasan_kmalloc+0xd4/0xd8 [ 18.176748] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.176824] kasan_atomics+0xb8/0x2e0 [ 18.176900] kunit_try_run_case+0x170/0x3f0 [ 18.177045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.177098] kthread+0x328/0x630 [ 18.177165] ret_from_fork+0x10/0x20 [ 18.177505] [ 18.177605] The buggy address belongs to the object at fff00000c77e9a80 [ 18.177605] which belongs to the cache kmalloc-64 of size 64 [ 18.178025] The buggy address is located 0 bytes to the right of [ 18.178025] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.178105] [ 18.178359] The buggy address belongs to the physical page: [ 18.178525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.179063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.179157] page_type: f5(slab) [ 18.179216] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.179276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.179429] page dumped because: kasan: bad access detected [ 18.179673] [ 18.179713] Memory state around the buggy address: [ 18.179978] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.180126] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.180331] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.180689] ^ [ 18.180811] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.181102] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.181355] ================================================================== [ 18.102499] ================================================================== [ 18.102553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 18.102794] Read of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.103064] [ 18.103116] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.103423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.103481] Hardware name: linux,dummy-virt (DT) [ 18.103517] Call trace: [ 18.103568] show_stack+0x20/0x38 (C) [ 18.103621] dump_stack_lvl+0x8c/0xd0 [ 18.103752] print_report+0x118/0x608 [ 18.103810] kasan_report+0xdc/0x128 [ 18.103855] __asan_report_load4_noabort+0x20/0x30 [ 18.104071] kasan_atomics_helper+0x3e04/0x4858 [ 18.104232] kasan_atomics+0x198/0x2e0 [ 18.104290] kunit_try_run_case+0x170/0x3f0 [ 18.104586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.104675] kthread+0x328/0x630 [ 18.104766] ret_from_fork+0x10/0x20 [ 18.104820] [ 18.104858] Allocated by task 268: [ 18.104892] kasan_save_stack+0x3c/0x68 [ 18.104993] kasan_save_track+0x20/0x40 [ 18.105045] kasan_save_alloc_info+0x40/0x58 [ 18.105084] __kasan_kmalloc+0xd4/0xd8 [ 18.105268] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.105326] kasan_atomics+0xb8/0x2e0 [ 18.105467] kunit_try_run_case+0x170/0x3f0 [ 18.105521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.105762] kthread+0x328/0x630 [ 18.105823] ret_from_fork+0x10/0x20 [ 18.106155] [ 18.106299] The buggy address belongs to the object at fff00000c77e9a80 [ 18.106299] which belongs to the cache kmalloc-64 of size 64 [ 18.106416] The buggy address is located 0 bytes to the right of [ 18.106416] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.106536] [ 18.106585] The buggy address belongs to the physical page: [ 18.106739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.106960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.107017] page_type: f5(slab) [ 18.107080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.107384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.107540] page dumped because: kasan: bad access detected [ 18.107586] [ 18.107615] Memory state around the buggy address: [ 18.107665] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.108094] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.108173] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.108456] ^ [ 18.108558] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.108662] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.108723] ================================================================== [ 18.125279] ================================================================== [ 18.125340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 18.125455] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.125529] [ 18.125572] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.125780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.125988] Hardware name: linux,dummy-virt (DT) [ 18.126109] Call trace: [ 18.126368] show_stack+0x20/0x38 (C) [ 18.126523] dump_stack_lvl+0x8c/0xd0 [ 18.126578] print_report+0x118/0x608 [ 18.126624] kasan_report+0xdc/0x128 [ 18.126669] kasan_check_range+0x100/0x1a8 [ 18.126750] __kasan_check_write+0x20/0x30 [ 18.127068] kasan_atomics_helper+0xe44/0x4858 [ 18.127373] kasan_atomics+0x198/0x2e0 [ 18.127573] kunit_try_run_case+0x170/0x3f0 [ 18.127686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.127858] kthread+0x328/0x630 [ 18.127971] ret_from_fork+0x10/0x20 [ 18.128071] [ 18.128386] Allocated by task 268: [ 18.128431] kasan_save_stack+0x3c/0x68 [ 18.128613] kasan_save_track+0x20/0x40 [ 18.128691] kasan_save_alloc_info+0x40/0x58 [ 18.129027] __kasan_kmalloc+0xd4/0xd8 [ 18.129114] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.129282] kasan_atomics+0xb8/0x2e0 [ 18.129353] kunit_try_run_case+0x170/0x3f0 [ 18.129471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.129533] kthread+0x328/0x630 [ 18.129588] ret_from_fork+0x10/0x20 [ 18.129773] [ 18.129807] The buggy address belongs to the object at fff00000c77e9a80 [ 18.129807] which belongs to the cache kmalloc-64 of size 64 [ 18.129869] The buggy address is located 0 bytes to the right of [ 18.129869] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.129943] [ 18.129977] The buggy address belongs to the physical page: [ 18.130010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.130078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.130174] page_type: f5(slab) [ 18.130487] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.130559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.130603] page dumped because: kasan: bad access detected [ 18.131019] [ 18.131113] Memory state around the buggy address: [ 18.131553] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.131668] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.131831] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.131899] ^ [ 18.131934] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.132187] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.132359] ================================================================== [ 18.133032] ================================================================== [ 18.133295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 18.133538] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.133740] [ 18.133795] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.133894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.133924] Hardware name: linux,dummy-virt (DT) [ 18.133967] Call trace: [ 18.133991] show_stack+0x20/0x38 (C) [ 18.134041] dump_stack_lvl+0x8c/0xd0 [ 18.134090] print_report+0x118/0x608 [ 18.134135] kasan_report+0xdc/0x128 [ 18.134189] __asan_report_store8_noabort+0x20/0x30 [ 18.134240] kasan_atomics_helper+0x3e5c/0x4858 [ 18.134287] kasan_atomics+0x198/0x2e0 [ 18.134332] kunit_try_run_case+0x170/0x3f0 [ 18.134380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.134441] kthread+0x328/0x630 [ 18.134487] ret_from_fork+0x10/0x20 [ 18.134533] [ 18.134553] Allocated by task 268: [ 18.134584] kasan_save_stack+0x3c/0x68 [ 18.134622] kasan_save_track+0x20/0x40 [ 18.134660] kasan_save_alloc_info+0x40/0x58 [ 18.134699] __kasan_kmalloc+0xd4/0xd8 [ 18.134736] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.134775] kasan_atomics+0xb8/0x2e0 [ 18.135131] kunit_try_run_case+0x170/0x3f0 [ 18.135218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.135276] kthread+0x328/0x630 [ 18.135315] ret_from_fork+0x10/0x20 [ 18.135668] [ 18.135728] The buggy address belongs to the object at fff00000c77e9a80 [ 18.135728] which belongs to the cache kmalloc-64 of size 64 [ 18.135812] The buggy address is located 0 bytes to the right of [ 18.135812] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.136137] [ 18.136291] The buggy address belongs to the physical page: [ 18.136327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.136668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.137007] page_type: f5(slab) [ 18.137088] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.137186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.137264] page dumped because: kasan: bad access detected [ 18.137322] [ 18.137421] Memory state around the buggy address: [ 18.137458] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.137696] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.137846] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.137914] ^ [ 18.138096] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.138303] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.138372] ================================================================== [ 18.204525] ================================================================== [ 18.204579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 18.204631] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.204684] [ 18.204720] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.204913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.204985] Hardware name: linux,dummy-virt (DT) [ 18.205019] Call trace: [ 18.205271] show_stack+0x20/0x38 (C) [ 18.205397] dump_stack_lvl+0x8c/0xd0 [ 18.205450] print_report+0x118/0x608 [ 18.205878] kasan_report+0xdc/0x128 [ 18.205940] kasan_check_range+0x100/0x1a8 [ 18.206140] __kasan_check_write+0x20/0x30 [ 18.206385] kasan_atomics_helper+0x11f8/0x4858 [ 18.206538] kasan_atomics+0x198/0x2e0 [ 18.206613] kunit_try_run_case+0x170/0x3f0 [ 18.206693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.206763] kthread+0x328/0x630 [ 18.206808] ret_from_fork+0x10/0x20 [ 18.207180] [ 18.207263] Allocated by task 268: [ 18.207321] kasan_save_stack+0x3c/0x68 [ 18.207388] kasan_save_track+0x20/0x40 [ 18.207668] kasan_save_alloc_info+0x40/0x58 [ 18.207844] __kasan_kmalloc+0xd4/0xd8 [ 18.207942] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.208027] kasan_atomics+0xb8/0x2e0 [ 18.208148] kunit_try_run_case+0x170/0x3f0 [ 18.208262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.208315] kthread+0x328/0x630 [ 18.208471] ret_from_fork+0x10/0x20 [ 18.209056] [ 18.209405] The buggy address belongs to the object at fff00000c77e9a80 [ 18.209405] which belongs to the cache kmalloc-64 of size 64 [ 18.209501] The buggy address is located 0 bytes to the right of [ 18.209501] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.209621] [ 18.209666] The buggy address belongs to the physical page: [ 18.209730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.209788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.210277] page_type: f5(slab) [ 18.210341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.210393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.210443] page dumped because: kasan: bad access detected [ 18.210478] [ 18.210500] Memory state around the buggy address: [ 18.210534] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.210580] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.210625] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.210665] ^ [ 18.210701] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.210745] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.210784] ================================================================== [ 18.214318] ================================================================== [ 18.214514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 18.214570] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.214620] [ 18.214651] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.214734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.214763] Hardware name: linux,dummy-virt (DT) [ 18.214795] Call trace: [ 18.214827] show_stack+0x20/0x38 (C) [ 18.214873] dump_stack_lvl+0x8c/0xd0 [ 18.214923] print_report+0x118/0x608 [ 18.215010] kasan_report+0xdc/0x128 [ 18.215055] kasan_check_range+0x100/0x1a8 [ 18.215103] __kasan_check_write+0x20/0x30 [ 18.215150] kasan_atomics_helper+0x12d8/0x4858 [ 18.215244] kasan_atomics+0x198/0x2e0 [ 18.215288] kunit_try_run_case+0x170/0x3f0 [ 18.215352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.215408] kthread+0x328/0x630 [ 18.215452] ret_from_fork+0x10/0x20 [ 18.215607] [ 18.215631] Allocated by task 268: [ 18.215664] kasan_save_stack+0x3c/0x68 [ 18.215705] kasan_save_track+0x20/0x40 [ 18.215847] kasan_save_alloc_info+0x40/0x58 [ 18.215906] __kasan_kmalloc+0xd4/0xd8 [ 18.215989] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.216035] kasan_atomics+0xb8/0x2e0 [ 18.216081] kunit_try_run_case+0x170/0x3f0 [ 18.216126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.216193] kthread+0x328/0x630 [ 18.216237] ret_from_fork+0x10/0x20 [ 18.216284] [ 18.216323] The buggy address belongs to the object at fff00000c77e9a80 [ 18.216323] which belongs to the cache kmalloc-64 of size 64 [ 18.216558] The buggy address is located 0 bytes to the right of [ 18.216558] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.216644] [ 18.216682] The buggy address belongs to the physical page: [ 18.216716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.216779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.216979] page_type: f5(slab) [ 18.217049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.217107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.217232] page dumped because: kasan: bad access detected [ 18.217289] [ 18.217318] Memory state around the buggy address: [ 18.217353] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.217406] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.217465] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.217505] ^ [ 18.217540] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.217583] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.217814] ================================================================== [ 18.245845] ================================================================== [ 18.245907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 18.245990] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.246146] [ 18.246295] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.246404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.246479] Hardware name: linux,dummy-virt (DT) [ 18.246569] Call trace: [ 18.246654] show_stack+0x20/0x38 (C) [ 18.246723] dump_stack_lvl+0x8c/0xd0 [ 18.246827] print_report+0x118/0x608 [ 18.246913] kasan_report+0xdc/0x128 [ 18.246992] kasan_check_range+0x100/0x1a8 [ 18.247048] __kasan_check_write+0x20/0x30 [ 18.247097] kasan_atomics_helper+0x15b4/0x4858 [ 18.247177] kasan_atomics+0x198/0x2e0 [ 18.247311] kunit_try_run_case+0x170/0x3f0 [ 18.247361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.247417] kthread+0x328/0x630 [ 18.247461] ret_from_fork+0x10/0x20 [ 18.247508] [ 18.247530] Allocated by task 268: [ 18.247793] kasan_save_stack+0x3c/0x68 [ 18.247896] kasan_save_track+0x20/0x40 [ 18.247972] kasan_save_alloc_info+0x40/0x58 [ 18.248081] __kasan_kmalloc+0xd4/0xd8 [ 18.248161] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.248453] kasan_atomics+0xb8/0x2e0 [ 18.248525] kunit_try_run_case+0x170/0x3f0 [ 18.248578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.248625] kthread+0x328/0x630 [ 18.248662] ret_from_fork+0x10/0x20 [ 18.248700] [ 18.248723] The buggy address belongs to the object at fff00000c77e9a80 [ 18.248723] which belongs to the cache kmalloc-64 of size 64 [ 18.248783] The buggy address is located 0 bytes to the right of [ 18.248783] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.248848] [ 18.248869] The buggy address belongs to the physical page: [ 18.248912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.248988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.249036] page_type: f5(slab) [ 18.249075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.249126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.249175] page dumped because: kasan: bad access detected [ 18.249219] [ 18.249241] Memory state around the buggy address: [ 18.249274] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.249319] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.249362] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.249418] ^ [ 18.249454] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.249514] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.249571] ================================================================== [ 18.167287] ================================================================== [ 18.167349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 18.167549] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.167615] [ 18.167789] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.167886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.168000] Hardware name: linux,dummy-virt (DT) [ 18.168038] Call trace: [ 18.168064] show_stack+0x20/0x38 (C) [ 18.168137] dump_stack_lvl+0x8c/0xd0 [ 18.168444] print_report+0x118/0x608 [ 18.168502] kasan_report+0xdc/0x128 [ 18.168564] kasan_check_range+0x100/0x1a8 [ 18.168614] __kasan_check_write+0x20/0x30 [ 18.168660] kasan_atomics_helper+0xff0/0x4858 [ 18.168750] kasan_atomics+0x198/0x2e0 [ 18.168816] kunit_try_run_case+0x170/0x3f0 [ 18.168864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.168919] kthread+0x328/0x630 [ 18.168977] ret_from_fork+0x10/0x20 [ 18.169023] [ 18.169055] Allocated by task 268: [ 18.169094] kasan_save_stack+0x3c/0x68 [ 18.169143] kasan_save_track+0x20/0x40 [ 18.169191] kasan_save_alloc_info+0x40/0x58 [ 18.169231] __kasan_kmalloc+0xd4/0xd8 [ 18.169269] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.169315] kasan_atomics+0xb8/0x2e0 [ 18.169355] kunit_try_run_case+0x170/0x3f0 [ 18.169395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.169440] kthread+0x328/0x630 [ 18.169478] ret_from_fork+0x10/0x20 [ 18.169516] [ 18.169537] The buggy address belongs to the object at fff00000c77e9a80 [ 18.169537] which belongs to the cache kmalloc-64 of size 64 [ 18.169598] The buggy address is located 0 bytes to the right of [ 18.169598] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.169669] [ 18.169700] The buggy address belongs to the physical page: [ 18.169732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.169795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.169852] page_type: f5(slab) [ 18.169899] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.170684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.170751] page dumped because: kasan: bad access detected [ 18.170804] [ 18.170847] Memory state around the buggy address: [ 18.170922] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.170981] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.171025] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.171067] ^ [ 18.171286] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.171560] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.171643] ================================================================== [ 18.278873] ================================================================== [ 18.278926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 18.278986] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.279050] [ 18.279082] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.279184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.279249] Hardware name: linux,dummy-virt (DT) [ 18.279465] Call trace: [ 18.279638] show_stack+0x20/0x38 (C) [ 18.280077] dump_stack_lvl+0x8c/0xd0 [ 18.280668] print_report+0x118/0x608 [ 18.280782] kasan_report+0xdc/0x128 [ 18.281228] __asan_report_load8_noabort+0x20/0x30 [ 18.281285] kasan_atomics_helper+0x3e10/0x4858 [ 18.281749] kasan_atomics+0x198/0x2e0 [ 18.282074] kunit_try_run_case+0x170/0x3f0 [ 18.282311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.282479] kthread+0x328/0x630 [ 18.282556] ret_from_fork+0x10/0x20 [ 18.282776] [ 18.282986] Allocated by task 268: [ 18.283048] kasan_save_stack+0x3c/0x68 [ 18.283199] kasan_save_track+0x20/0x40 [ 18.283295] kasan_save_alloc_info+0x40/0x58 [ 18.283598] __kasan_kmalloc+0xd4/0xd8 [ 18.283693] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.283760] kasan_atomics+0xb8/0x2e0 [ 18.283895] kunit_try_run_case+0x170/0x3f0 [ 18.284037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.284121] kthread+0x328/0x630 [ 18.284160] ret_from_fork+0x10/0x20 [ 18.284235] [ 18.284558] The buggy address belongs to the object at fff00000c77e9a80 [ 18.284558] which belongs to the cache kmalloc-64 of size 64 [ 18.284665] The buggy address is located 0 bytes to the right of [ 18.284665] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.284996] [ 18.285099] The buggy address belongs to the physical page: [ 18.285159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.285256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.285390] page_type: f5(slab) [ 18.285468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.285548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.285672] page dumped because: kasan: bad access detected [ 18.285732] [ 18.285770] Memory state around the buggy address: [ 18.286106] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.286219] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.286323] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.286394] ^ [ 18.286456] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.286922] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.286978] ================================================================== [ 18.288266] ================================================================== [ 18.288320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 18.288373] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.288425] [ 18.288505] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.288618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.288909] Hardware name: linux,dummy-virt (DT) [ 18.289191] Call trace: [ 18.289300] show_stack+0x20/0x38 (C) [ 18.289360] dump_stack_lvl+0x8c/0xd0 [ 18.289487] print_report+0x118/0x608 [ 18.289565] kasan_report+0xdc/0x128 [ 18.289631] kasan_check_range+0x100/0x1a8 [ 18.289698] __kasan_check_write+0x20/0x30 [ 18.289832] kasan_atomics_helper+0x175c/0x4858 [ 18.289885] kasan_atomics+0x198/0x2e0 [ 18.289929] kunit_try_run_case+0x170/0x3f0 [ 18.290016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.290080] kthread+0x328/0x630 [ 18.290125] ret_from_fork+0x10/0x20 [ 18.290748] [ 18.290797] Allocated by task 268: [ 18.290855] kasan_save_stack+0x3c/0x68 [ 18.290992] kasan_save_track+0x20/0x40 [ 18.291060] kasan_save_alloc_info+0x40/0x58 [ 18.291146] __kasan_kmalloc+0xd4/0xd8 [ 18.291280] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.291322] kasan_atomics+0xb8/0x2e0 [ 18.291359] kunit_try_run_case+0x170/0x3f0 [ 18.291399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.291666] kthread+0x328/0x630 [ 18.291830] ret_from_fork+0x10/0x20 [ 18.291895] [ 18.291934] The buggy address belongs to the object at fff00000c77e9a80 [ 18.291934] which belongs to the cache kmalloc-64 of size 64 [ 18.292463] The buggy address is located 0 bytes to the right of [ 18.292463] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.292549] [ 18.292583] The buggy address belongs to the physical page: [ 18.292634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.292689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.292739] page_type: f5(slab) [ 18.292896] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.292977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.293020] page dumped because: kasan: bad access detected [ 18.293055] [ 18.293104] Memory state around the buggy address: [ 18.293138] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.293183] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.293227] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.293268] ^ [ 18.293329] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.293398] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.293445] ================================================================== [ 18.227859] ================================================================== [ 18.228240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 18.228346] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.228399] [ 18.228437] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.228552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.228589] Hardware name: linux,dummy-virt (DT) [ 18.228638] Call trace: [ 18.228663] show_stack+0x20/0x38 (C) [ 18.228716] dump_stack_lvl+0x8c/0xd0 [ 18.228881] print_report+0x118/0x608 [ 18.228940] kasan_report+0xdc/0x128 [ 18.228998] kasan_check_range+0x100/0x1a8 [ 18.229046] __kasan_check_write+0x20/0x30 [ 18.229169] kasan_atomics_helper+0x1414/0x4858 [ 18.229245] kasan_atomics+0x198/0x2e0 [ 18.229289] kunit_try_run_case+0x170/0x3f0 [ 18.229352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.229415] kthread+0x328/0x630 [ 18.229467] ret_from_fork+0x10/0x20 [ 18.229516] [ 18.229562] Allocated by task 268: [ 18.229594] kasan_save_stack+0x3c/0x68 [ 18.229639] kasan_save_track+0x20/0x40 [ 18.229678] kasan_save_alloc_info+0x40/0x58 [ 18.229717] __kasan_kmalloc+0xd4/0xd8 [ 18.229762] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.229800] kasan_atomics+0xb8/0x2e0 [ 18.229836] kunit_try_run_case+0x170/0x3f0 [ 18.229875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.229923] kthread+0x328/0x630 [ 18.229972] ret_from_fork+0x10/0x20 [ 18.230009] [ 18.230031] The buggy address belongs to the object at fff00000c77e9a80 [ 18.230031] which belongs to the cache kmalloc-64 of size 64 [ 18.230089] The buggy address is located 0 bytes to the right of [ 18.230089] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.230354] [ 18.230392] The buggy address belongs to the physical page: [ 18.230478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.230552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.230611] page_type: f5(slab) [ 18.230650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.230793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.230883] page dumped because: kasan: bad access detected [ 18.230979] [ 18.231030] Memory state around the buggy address: [ 18.231100] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.231181] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.231257] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.231299] ^ [ 18.231335] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.231377] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.231440] ================================================================== [ 18.273595] ================================================================== [ 18.273668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 18.273723] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.273775] [ 18.274075] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.274263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.274334] Hardware name: linux,dummy-virt (DT) [ 18.274406] Call trace: [ 18.274476] show_stack+0x20/0x38 (C) [ 18.274583] dump_stack_lvl+0x8c/0xd0 [ 18.274630] print_report+0x118/0x608 [ 18.274678] kasan_report+0xdc/0x128 [ 18.274864] kasan_check_range+0x100/0x1a8 [ 18.275357] __kasan_check_write+0x20/0x30 [ 18.275591] kasan_atomics_helper+0x16d0/0x4858 [ 18.275726] kasan_atomics+0x198/0x2e0 [ 18.275794] kunit_try_run_case+0x170/0x3f0 [ 18.275935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.276007] kthread+0x328/0x630 [ 18.276218] ret_from_fork+0x10/0x20 [ 18.276297] [ 18.276325] Allocated by task 268: [ 18.276370] kasan_save_stack+0x3c/0x68 [ 18.276425] kasan_save_track+0x20/0x40 [ 18.276485] kasan_save_alloc_info+0x40/0x58 [ 18.276527] __kasan_kmalloc+0xd4/0xd8 [ 18.276572] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.276613] kasan_atomics+0xb8/0x2e0 [ 18.276657] kunit_try_run_case+0x170/0x3f0 [ 18.276698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.276758] kthread+0x328/0x630 [ 18.276805] ret_from_fork+0x10/0x20 [ 18.276842] [ 18.276868] The buggy address belongs to the object at fff00000c77e9a80 [ 18.276868] which belongs to the cache kmalloc-64 of size 64 [ 18.276934] The buggy address is located 0 bytes to the right of [ 18.276934] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.277015] [ 18.277039] The buggy address belongs to the physical page: [ 18.277088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.277152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.277209] page_type: f5(slab) [ 18.277271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.277324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.277386] page dumped because: kasan: bad access detected [ 18.277421] [ 18.277443] Memory state around the buggy address: [ 18.277477] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.277522] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.277576] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.277625] ^ [ 18.277662] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.277707] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.277745] ================================================================== [ 18.015983] ================================================================== [ 18.016032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 18.016084] Read of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.016135] [ 18.016166] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.016246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.016428] print_report+0x118/0x608 [ 18.016999] kasan_save_alloc_info+0x40/0x58 [ 18.017075] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.017386] The buggy address is located 0 bytes to the right of [ 18.017386] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.018217] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.019025] Call trace: [ 18.019049] show_stack+0x20/0x38 (C) [ 18.019099] dump_stack_lvl+0x8c/0xd0 [ 18.019145] print_report+0x118/0x608 [ 18.019190] kasan_report+0xdc/0x128 [ 18.019235] kasan_check_range+0x100/0x1a8 [ 18.019281] __kasan_check_write+0x20/0x30 [ 18.019329] kasan_atomics_helper+0x934/0x4858 [ 18.019375] kasan_atomics+0x198/0x2e0 [ 18.019420] kunit_try_run_case+0x170/0x3f0 [ 18.019471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.019536] kthread+0x328/0x630 [ 18.019581] ret_from_fork+0x10/0x20 [ 18.019629] [ 18.019650] Allocated by task 268: [ 18.019688] kasan_save_stack+0x3c/0x68 [ 18.019730] kasan_save_track+0x20/0x40 [ 18.019766] kasan_save_alloc_info+0x40/0x58 [ 18.019807] __kasan_kmalloc+0xd4/0xd8 [ 18.019845] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.019882] kasan_atomics+0xb8/0x2e0 [ 18.019918] kunit_try_run_case+0x170/0x3f0 [ 18.019971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.020018] kthread+0x328/0x630 [ 18.020056] ret_from_fork+0x10/0x20 [ 18.020093] [ 18.020113] The buggy address belongs to the object at fff00000c77e9a80 [ 18.020113] which belongs to the cache kmalloc-64 of size 64 [ 18.020167] The buggy address is located 0 bytes to the right of [ 18.020167] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.020259] [ 18.020281] The buggy address belongs to the physical page: [ 18.020320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.020372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.020417] page_type: f5(slab) [ 18.020465] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.020524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.020566] page dumped because: kasan: bad access detected [ 18.020609] [ 18.020629] Memory state around the buggy address: [ 18.020660] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.020704] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.020757] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.020805] ^ [ 18.020839] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.020883] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.020924] ================================================================== [ 18.031422] ================================================================== [ 18.031630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 18.031693] Write of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.031761] [ 18.031828] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.031985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.032022] Hardware name: linux,dummy-virt (DT) [ 18.032055] Call trace: [ 18.032079] show_stack+0x20/0x38 (C) [ 18.032127] dump_stack_lvl+0x8c/0xd0 [ 18.032174] print_report+0x118/0x608 [ 18.032220] kasan_report+0xdc/0x128 [ 18.032265] kasan_check_range+0x100/0x1a8 [ 18.032312] __kasan_check_write+0x20/0x30 [ 18.032360] kasan_atomics_helper+0xa6c/0x4858 [ 18.032407] kasan_atomics+0x198/0x2e0 [ 18.032763] kasan_save_track+0x20/0x40 [ 18.032940] kasan_save_alloc_info+0x40/0x58 [ 18.032994] __kasan_kmalloc+0xd4/0xd8 [ 18.033031] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.033116] kasan_atomics+0xb8/0x2e0 [ 18.033183] kunit_try_run_case+0x170/0x3f0 [ 18.033226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.033273] kthread+0x328/0x630 [ 18.033310] ret_from_fork+0x10/0x20 [ 18.033349] [ 18.033376] The buggy address belongs to the object at fff00000c77e9a80 [ 18.033376] which belongs to the cache kmalloc-64 of size 64 [ 18.034114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.034426] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.035742] Call trace: [ 18.036057] kasan_check_range+0x100/0x1a8 [ 18.037088] kasan_save_alloc_info+0x40/0x58 [ 18.037138] __kasan_kmalloc+0xd4/0xd8 [ 18.037213] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.037315] kasan_atomics+0xb8/0x2e0 [ 18.037382] kunit_try_run_case+0x170/0x3f0 [ 18.037440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.037487] kthread+0x328/0x630 [ 18.037559] ret_from_fork+0x10/0x20 [ 18.037598] [ 18.037619] The buggy address belongs to the object at fff00000c77e9a80 [ 18.037619] which belongs to the cache kmalloc-64 of size 64 [ 18.037679] The buggy address is located 0 bytes to the right of [ 18.037679] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.037746] [ 18.037768] The buggy address belongs to the physical page: [ 18.037800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.037928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.037997] page_type: f5(slab) [ 18.038034] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.038088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.038554] [ 18.038837] ^ [ 18.039345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 18.040260] kasan_atomics_helper+0x3dcc/0x4858 [ 18.041676] __kasan_kmalloc+0xd4/0xd8 [ 18.042147] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.042609] ret_from_fork+0x10/0x20 [ 18.043593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.044807] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.045168] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.045964] dump_stack_lvl+0x8c/0xd0 [ 18.049659] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.050959] The buggy address is located 0 bytes to the right of [ 18.050959] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.051984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.052774] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.053806] ================================================================== [ 18.249759] ================================================================== [ 18.249804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 18.249860] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.250425] [ 18.250606] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.250709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.250737] Hardware name: linux,dummy-virt (DT) [ 18.250770] Call trace: [ 18.250793] show_stack+0x20/0x38 (C) [ 18.250845] dump_stack_lvl+0x8c/0xd0 [ 18.250995] print_report+0x118/0x608 [ 18.251073] kasan_report+0xdc/0x128 [ 18.251148] __asan_report_load8_noabort+0x20/0x30 [ 18.251255] kasan_atomics_helper+0x3db0/0x4858 [ 18.251535] kasan_atomics+0x198/0x2e0 [ 18.251602] kunit_try_run_case+0x170/0x3f0 [ 18.251653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.252003] kthread+0x328/0x630 [ 18.252121] ret_from_fork+0x10/0x20 [ 18.252194] [ 18.252604] Allocated by task 268: [ 18.252741] kasan_save_stack+0x3c/0x68 [ 18.252816] kasan_save_track+0x20/0x40 [ 18.252920] kasan_save_alloc_info+0x40/0x58 [ 18.252995] __kasan_kmalloc+0xd4/0xd8 [ 18.253092] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.253132] kasan_atomics+0xb8/0x2e0 [ 18.253352] kunit_try_run_case+0x170/0x3f0 [ 18.253764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.253852] kthread+0x328/0x630 [ 18.253964] ret_from_fork+0x10/0x20 [ 18.254078] [ 18.254175] The buggy address belongs to the object at fff00000c77e9a80 [ 18.254175] which belongs to the cache kmalloc-64 of size 64 [ 18.254260] The buggy address is located 0 bytes to the right of [ 18.254260] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.254435] [ 18.254476] The buggy address belongs to the physical page: [ 18.254510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.254683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.254899] page_type: f5(slab) [ 18.254985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.255088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.255162] page dumped because: kasan: bad access detected [ 18.255489] [ 18.255534] Memory state around the buggy address: [ 18.255626] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.255675] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.255742] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.255925] ^ [ 18.256132] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.256184] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.256510] ================================================================== [ 18.147110] ================================================================== [ 18.147166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 18.147238] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.147433] [ 18.147792] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.147905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.148085] Hardware name: linux,dummy-virt (DT) [ 18.148180] Call trace: [ 18.148228] show_stack+0x20/0x38 (C) [ 18.148280] dump_stack_lvl+0x8c/0xd0 [ 18.148381] print_report+0x118/0x608 [ 18.148449] kasan_report+0xdc/0x128 [ 18.148513] kasan_check_range+0x100/0x1a8 [ 18.148560] __kasan_check_write+0x20/0x30 [ 18.150003] kasan_atomics_helper+0xf20/0x4858 [ 18.150472] kasan_atomics+0x198/0x2e0 [ 18.150653] kunit_try_run_case+0x170/0x3f0 [ 18.150711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.151099] kthread+0x328/0x630 [ 18.151278] ret_from_fork+0x10/0x20 [ 18.151378] [ 18.151521] Allocated by task 268: [ 18.151613] kasan_save_stack+0x3c/0x68 [ 18.151680] kasan_save_track+0x20/0x40 [ 18.151735] kasan_save_alloc_info+0x40/0x58 [ 18.152140] __kasan_kmalloc+0xd4/0xd8 [ 18.153076] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.153617] kasan_atomics+0xb8/0x2e0 [ 18.153807] kunit_try_run_case+0x170/0x3f0 [ 18.153995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.154061] kthread+0x328/0x630 [ 18.154174] ret_from_fork+0x10/0x20 [ 18.154217] [ 18.154548] The buggy address belongs to the object at fff00000c77e9a80 [ 18.154548] which belongs to the cache kmalloc-64 of size 64 [ 18.154640] The buggy address is located 0 bytes to the right of [ 18.154640] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.155021] [ 18.155068] The buggy address belongs to the physical page: [ 18.155419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.155515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.155603] page_type: f5(slab) [ 18.155938] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.156085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.156130] page dumped because: kasan: bad access detected [ 18.156172] [ 18.156492] Memory state around the buggy address: [ 18.156540] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.156588] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.156634] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.156676] ^ [ 18.156761] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.156817] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.156855] ================================================================== [ 18.197379] ================================================================== [ 18.197429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 18.197474] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.197525] [ 18.197556] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.197640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.197668] Hardware name: linux,dummy-virt (DT) [ 18.197704] Call trace: [ 18.197728] show_stack+0x20/0x38 (C) [ 18.197775] dump_stack_lvl+0x8c/0xd0 [ 18.197822] print_report+0x118/0x608 [ 18.197869] kasan_report+0xdc/0x128 [ 18.198036] kasan_check_range+0x100/0x1a8 [ 18.198093] __kasan_check_write+0x20/0x30 [ 18.198165] kasan_atomics_helper+0x1190/0x4858 [ 18.198213] kasan_atomics+0x198/0x2e0 [ 18.198258] kunit_try_run_case+0x170/0x3f0 [ 18.198926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.199122] kthread+0x328/0x630 [ 18.199258] ret_from_fork+0x10/0x20 [ 18.199344] [ 18.199412] Allocated by task 268: [ 18.199731] kasan_save_stack+0x3c/0x68 [ 18.199829] kasan_save_track+0x20/0x40 [ 18.199898] kasan_save_alloc_info+0x40/0x58 [ 18.199940] __kasan_kmalloc+0xd4/0xd8 [ 18.200016] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.200081] kasan_atomics+0xb8/0x2e0 [ 18.200135] kunit_try_run_case+0x170/0x3f0 [ 18.200196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.200285] kthread+0x328/0x630 [ 18.200371] ret_from_fork+0x10/0x20 [ 18.200614] [ 18.200675] The buggy address belongs to the object at fff00000c77e9a80 [ 18.200675] which belongs to the cache kmalloc-64 of size 64 [ 18.200967] The buggy address is located 0 bytes to the right of [ 18.200967] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.201080] [ 18.201164] The buggy address belongs to the physical page: [ 18.201509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.201991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.202245] page_type: f5(slab) [ 18.202303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.202499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.202552] page dumped because: kasan: bad access detected [ 18.202617] [ 18.202653] Memory state around the buggy address: [ 18.202693] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.202740] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.202791] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.202856] ^ [ 18.202893] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.202937] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.203534] ================================================================== [ 18.117442] ================================================================== [ 18.117495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 18.117563] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.117664] [ 18.117698] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.117789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.117888] Hardware name: linux,dummy-virt (DT) [ 18.117933] Call trace: [ 18.117967] show_stack+0x20/0x38 (C) [ 18.118018] dump_stack_lvl+0x8c/0xd0 [ 18.118072] print_report+0x118/0x608 [ 18.118119] kasan_report+0xdc/0x128 [ 18.118505] __asan_report_load8_noabort+0x20/0x30 [ 18.118584] kasan_atomics_helper+0x3f58/0x4858 [ 18.118647] kasan_atomics+0x198/0x2e0 [ 18.118709] kunit_try_run_case+0x170/0x3f0 [ 18.118766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.118828] kthread+0x328/0x630 [ 18.119269] ret_from_fork+0x10/0x20 [ 18.119372] [ 18.119639] Allocated by task 268: [ 18.119745] kasan_save_stack+0x3c/0x68 [ 18.119895] kasan_save_track+0x20/0x40 [ 18.119971] kasan_save_alloc_info+0x40/0x58 [ 18.120383] __kasan_kmalloc+0xd4/0xd8 [ 18.120480] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.120547] kasan_atomics+0xb8/0x2e0 [ 18.120983] kunit_try_run_case+0x170/0x3f0 [ 18.121048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.121381] kthread+0x328/0x630 [ 18.121478] ret_from_fork+0x10/0x20 [ 18.121582] [ 18.121604] The buggy address belongs to the object at fff00000c77e9a80 [ 18.121604] which belongs to the cache kmalloc-64 of size 64 [ 18.121978] The buggy address is located 0 bytes to the right of [ 18.121978] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.122181] [ 18.122301] The buggy address belongs to the physical page: [ 18.122506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.122703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.122911] page_type: f5(slab) [ 18.123018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.123091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.123317] page dumped because: kasan: bad access detected [ 18.123357] [ 18.123386] Memory state around the buggy address: [ 18.123523] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.124074] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.124161] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.124204] ^ [ 18.124245] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.124314] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.124354] ================================================================== [ 18.257844] ================================================================== [ 18.257908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 18.258333] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.258517] [ 18.258802] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.258994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.259054] Hardware name: linux,dummy-virt (DT) [ 18.259119] Call trace: [ 18.259187] show_stack+0x20/0x38 (C) [ 18.259460] dump_stack_lvl+0x8c/0xd0 [ 18.259536] print_report+0x118/0x608 [ 18.259624] kasan_report+0xdc/0x128 [ 18.259695] kasan_check_range+0x100/0x1a8 [ 18.259759] __kasan_check_write+0x20/0x30 [ 18.259808] kasan_atomics_helper+0x1644/0x4858 [ 18.259864] kasan_atomics+0x198/0x2e0 [ 18.259908] kunit_try_run_case+0x170/0x3f0 [ 18.259985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.260041] kthread+0x328/0x630 [ 18.260087] ret_from_fork+0x10/0x20 [ 18.260143] [ 18.260170] Allocated by task 268: [ 18.260215] kasan_save_stack+0x3c/0x68 [ 18.260268] kasan_save_track+0x20/0x40 [ 18.260316] kasan_save_alloc_info+0x40/0x58 [ 18.260377] __kasan_kmalloc+0xd4/0xd8 [ 18.260414] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.260452] kasan_atomics+0xb8/0x2e0 [ 18.260504] kunit_try_run_case+0x170/0x3f0 [ 18.260544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.260600] kthread+0x328/0x630 [ 18.260636] ret_from_fork+0x10/0x20 [ 18.260673] [ 18.260710] The buggy address belongs to the object at fff00000c77e9a80 [ 18.260710] which belongs to the cache kmalloc-64 of size 64 [ 18.260783] The buggy address is located 0 bytes to the right of [ 18.260783] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.260848] [ 18.260872] The buggy address belongs to the physical page: [ 18.260904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.260970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.261244] page_type: f5(slab) [ 18.261683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.262046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.262352] page dumped because: kasan: bad access detected [ 18.262486] [ 18.262512] Memory state around the buggy address: [ 18.262835] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.263920] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.264135] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.264214] ^ [ 18.264412] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.264486] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.264535] ================================================================== [ 18.094306] ================================================================== [ 18.094562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 18.094751] Write of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.095114] [ 18.095189] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.095392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.095452] Hardware name: linux,dummy-virt (DT) [ 18.095547] Call trace: [ 18.095649] show_stack+0x20/0x38 (C) [ 18.095705] dump_stack_lvl+0x8c/0xd0 [ 18.095754] print_report+0x118/0x608 [ 18.095826] kasan_report+0xdc/0x128 [ 18.096263] kasan_check_range+0x100/0x1a8 [ 18.096492] __kasan_check_write+0x20/0x30 [ 18.096670] kasan_atomics_helper+0xd3c/0x4858 [ 18.096766] kasan_atomics+0x198/0x2e0 [ 18.096841] kunit_try_run_case+0x170/0x3f0 [ 18.097006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.097076] kthread+0x328/0x630 [ 18.097459] ret_from_fork+0x10/0x20 [ 18.097557] [ 18.097602] Allocated by task 268: [ 18.097978] kasan_save_stack+0x3c/0x68 [ 18.098063] kasan_save_track+0x20/0x40 [ 18.098205] kasan_save_alloc_info+0x40/0x58 [ 18.098252] __kasan_kmalloc+0xd4/0xd8 [ 18.098535] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.098646] kasan_atomics+0xb8/0x2e0 [ 18.098930] kunit_try_run_case+0x170/0x3f0 [ 18.099016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.099292] kthread+0x328/0x630 [ 18.099507] ret_from_fork+0x10/0x20 [ 18.099718] [ 18.099783] The buggy address belongs to the object at fff00000c77e9a80 [ 18.099783] which belongs to the cache kmalloc-64 of size 64 [ 18.099968] The buggy address is located 0 bytes to the right of [ 18.099968] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.100181] [ 18.100226] The buggy address belongs to the physical page: [ 18.100263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.100347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.100668] page_type: f5(slab) [ 18.100728] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.101058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.101135] page dumped because: kasan: bad access detected [ 18.101191] [ 18.101224] Memory state around the buggy address: [ 18.101308] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.101379] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.101424] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.101467] ^ [ 18.101509] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.101552] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.101591] ================================================================== [ 18.223884] ================================================================== [ 18.223930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 18.224075] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.224221] [ 18.224288] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.224400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.224445] Hardware name: linux,dummy-virt (DT) [ 18.224479] Call trace: [ 18.224509] show_stack+0x20/0x38 (C) [ 18.224570] dump_stack_lvl+0x8c/0xd0 [ 18.224676] print_report+0x118/0x608 [ 18.224745] kasan_report+0xdc/0x128 [ 18.224876] __asan_report_load8_noabort+0x20/0x30 [ 18.224987] kasan_atomics_helper+0x3f04/0x4858 [ 18.225038] kasan_atomics+0x198/0x2e0 [ 18.225082] kunit_try_run_case+0x170/0x3f0 [ 18.225144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.225209] kthread+0x328/0x630 [ 18.225263] ret_from_fork+0x10/0x20 [ 18.225327] [ 18.225353] Allocated by task 268: [ 18.225394] kasan_save_stack+0x3c/0x68 [ 18.225435] kasan_save_track+0x20/0x40 [ 18.225473] kasan_save_alloc_info+0x40/0x58 [ 18.225520] __kasan_kmalloc+0xd4/0xd8 [ 18.225670] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.225819] kasan_atomics+0xb8/0x2e0 [ 18.225864] kunit_try_run_case+0x170/0x3f0 [ 18.225910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.225972] kthread+0x328/0x630 [ 18.226080] ret_from_fork+0x10/0x20 [ 18.226118] [ 18.226140] The buggy address belongs to the object at fff00000c77e9a80 [ 18.226140] which belongs to the cache kmalloc-64 of size 64 [ 18.226310] The buggy address is located 0 bytes to the right of [ 18.226310] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.226433] [ 18.226481] The buggy address belongs to the physical page: [ 18.226538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.226787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.227021] page_type: f5(slab) [ 18.227076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.227135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.227180] page dumped because: kasan: bad access detected [ 18.227213] [ 18.227364] Memory state around the buggy address: [ 18.227398] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.227443] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.227489] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.227529] ^ [ 18.227565] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.227610] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.227650] ================================================================== [ 18.240967] ================================================================== [ 18.241039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 18.241093] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.241143] [ 18.241180] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.241270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.241509] Hardware name: linux,dummy-virt (DT) [ 18.241579] Call trace: [ 18.241605] show_stack+0x20/0x38 (C) [ 18.241657] dump_stack_lvl+0x8c/0xd0 [ 18.241714] print_report+0x118/0x608 [ 18.241767] kasan_report+0xdc/0x128 [ 18.241812] kasan_check_range+0x100/0x1a8 [ 18.241868] __kasan_check_write+0x20/0x30 [ 18.241926] kasan_atomics_helper+0x154c/0x4858 [ 18.241993] kasan_atomics+0x198/0x2e0 [ 18.242047] kunit_try_run_case+0x170/0x3f0 [ 18.242107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.242169] kthread+0x328/0x630 [ 18.242233] ret_from_fork+0x10/0x20 [ 18.242321] [ 18.242364] Allocated by task 268: [ 18.242394] kasan_save_stack+0x3c/0x68 [ 18.242659] kasan_save_track+0x20/0x40 [ 18.242705] kasan_save_alloc_info+0x40/0x58 [ 18.242760] __kasan_kmalloc+0xd4/0xd8 [ 18.242864] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.242943] kasan_atomics+0xb8/0x2e0 [ 18.243021] kunit_try_run_case+0x170/0x3f0 [ 18.243101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.243188] kthread+0x328/0x630 [ 18.243225] ret_from_fork+0x10/0x20 [ 18.243263] [ 18.243421] The buggy address belongs to the object at fff00000c77e9a80 [ 18.243421] which belongs to the cache kmalloc-64 of size 64 [ 18.243497] The buggy address is located 0 bytes to the right of [ 18.243497] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.243580] [ 18.243616] The buggy address belongs to the physical page: [ 18.243678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.243740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.243798] page_type: f5(slab) [ 18.243837] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.243889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.243931] page dumped because: kasan: bad access detected [ 18.244456] [ 18.244519] Memory state around the buggy address: [ 18.244607] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.244705] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.245023] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.245085] ^ [ 18.245181] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.245248] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.245349] ================================================================== [ 18.191305] ================================================================== [ 18.191361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 18.191416] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.191467] [ 18.191500] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.191817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.191862] Hardware name: linux,dummy-virt (DT) [ 18.191898] Call trace: [ 18.192146] show_stack+0x20/0x38 (C) [ 18.192224] dump_stack_lvl+0x8c/0xd0 [ 18.192414] print_report+0x118/0x608 [ 18.192476] kasan_report+0xdc/0x128 [ 18.192541] kasan_check_range+0x100/0x1a8 [ 18.192880] __kasan_check_write+0x20/0x30 [ 18.192994] kasan_atomics_helper+0x1128/0x4858 [ 18.193044] kasan_atomics+0x198/0x2e0 [ 18.193090] kunit_try_run_case+0x170/0x3f0 [ 18.193303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.193375] kthread+0x328/0x630 [ 18.193420] ret_from_fork+0x10/0x20 [ 18.193694] [ 18.193738] Allocated by task 268: [ 18.193773] kasan_save_stack+0x3c/0x68 [ 18.193818] kasan_save_track+0x20/0x40 [ 18.194045] kasan_save_alloc_info+0x40/0x58 [ 18.194196] __kasan_kmalloc+0xd4/0xd8 [ 18.194326] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.194373] kasan_atomics+0xb8/0x2e0 [ 18.194410] kunit_try_run_case+0x170/0x3f0 [ 18.194457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.194504] kthread+0x328/0x630 [ 18.194678] ret_from_fork+0x10/0x20 [ 18.194908] [ 18.194937] The buggy address belongs to the object at fff00000c77e9a80 [ 18.194937] which belongs to the cache kmalloc-64 of size 64 [ 18.195011] The buggy address is located 0 bytes to the right of [ 18.195011] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.195369] [ 18.195507] The buggy address belongs to the physical page: [ 18.195554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.195900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.195977] page_type: f5(slab) [ 18.196017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.196350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.196494] page dumped because: kasan: bad access detected [ 18.196836] [ 18.196867] Memory state around the buggy address: [ 18.196904] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.196961] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.197007] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.197047] ^ [ 18.197084] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.197128] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.197166] ================================================================== [ 18.211091] ================================================================== [ 18.211141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 18.211187] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.211373] [ 18.211419] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.211518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.211549] Hardware name: linux,dummy-virt (DT) [ 18.211589] Call trace: [ 18.211623] show_stack+0x20/0x38 (C) [ 18.211680] dump_stack_lvl+0x8c/0xd0 [ 18.211730] print_report+0x118/0x608 [ 18.211775] kasan_report+0xdc/0x128 [ 18.211819] kasan_check_range+0x100/0x1a8 [ 18.211867] __kasan_check_write+0x20/0x30 [ 18.211913] kasan_atomics_helper+0x126c/0x4858 [ 18.211983] kasan_atomics+0x198/0x2e0 [ 18.212036] kunit_try_run_case+0x170/0x3f0 [ 18.212085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.212140] kthread+0x328/0x630 [ 18.212184] ret_from_fork+0x10/0x20 [ 18.212238] [ 18.212259] Allocated by task 268: [ 18.212298] kasan_save_stack+0x3c/0x68 [ 18.212353] kasan_save_track+0x20/0x40 [ 18.212392] kasan_save_alloc_info+0x40/0x58 [ 18.212432] __kasan_kmalloc+0xd4/0xd8 [ 18.212469] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.212507] kasan_atomics+0xb8/0x2e0 [ 18.212544] kunit_try_run_case+0x170/0x3f0 [ 18.212591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.212639] kthread+0x328/0x630 [ 18.212677] ret_from_fork+0x10/0x20 [ 18.212716] [ 18.212738] The buggy address belongs to the object at fff00000c77e9a80 [ 18.212738] which belongs to the cache kmalloc-64 of size 64 [ 18.212796] The buggy address is located 0 bytes to the right of [ 18.212796] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.212861] [ 18.212893] The buggy address belongs to the physical page: [ 18.212926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.212988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.213035] page_type: f5(slab) [ 18.213074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.213127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.213170] page dumped because: kasan: bad access detected [ 18.213203] [ 18.213225] Memory state around the buggy address: [ 18.213723] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.213785] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.213849] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.213896] ^ [ 18.213942] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.214005] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.214061] ================================================================== [ 18.218141] ================================================================== [ 18.218339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 18.218392] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.218561] [ 18.218854] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.219063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.219111] Hardware name: linux,dummy-virt (DT) [ 18.219174] Call trace: [ 18.219223] show_stack+0x20/0x38 (C) [ 18.219300] dump_stack_lvl+0x8c/0xd0 [ 18.219378] print_report+0x118/0x608 [ 18.219445] kasan_report+0xdc/0x128 [ 18.219508] kasan_check_range+0x100/0x1a8 [ 18.219801] __kasan_check_write+0x20/0x30 [ 18.219892] kasan_atomics_helper+0x1384/0x4858 [ 18.219969] kasan_atomics+0x198/0x2e0 [ 18.220037] kunit_try_run_case+0x170/0x3f0 [ 18.220147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.220234] kthread+0x328/0x630 [ 18.220297] ret_from_fork+0x10/0x20 [ 18.220381] [ 18.220441] Allocated by task 268: [ 18.220483] kasan_save_stack+0x3c/0x68 [ 18.220523] kasan_save_track+0x20/0x40 [ 18.220711] kasan_save_alloc_info+0x40/0x58 [ 18.220753] __kasan_kmalloc+0xd4/0xd8 [ 18.221809] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.221857] kasan_atomics+0xb8/0x2e0 [ 18.221933] kunit_try_run_case+0x170/0x3f0 [ 18.222011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.222082] kthread+0x328/0x630 [ 18.222145] ret_from_fork+0x10/0x20 [ 18.222230] [ 18.222290] The buggy address belongs to the object at fff00000c77e9a80 [ 18.222290] which belongs to the cache kmalloc-64 of size 64 [ 18.222364] The buggy address is located 0 bytes to the right of [ 18.222364] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.222434] [ 18.222457] The buggy address belongs to the physical page: [ 18.222489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.222541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.222589] page_type: f5(slab) [ 18.222628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.222680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.222841] page dumped because: kasan: bad access detected [ 18.222888] [ 18.222926] Memory state around the buggy address: [ 18.222990] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.223058] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.223158] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.223248] ^ [ 18.223489] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.223544] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.223597] ================================================================== [ 18.084104] ================================================================== [ 18.084435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 18.084602] Read of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.084665] [ 18.084698] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.084974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.085005] Hardware name: linux,dummy-virt (DT) [ 18.085150] Call trace: [ 18.085191] show_stack+0x20/0x38 (C) [ 18.085361] dump_stack_lvl+0x8c/0xd0 [ 18.085417] print_report+0x118/0x608 [ 18.085466] kasan_report+0xdc/0x128 [ 18.085780] __asan_report_load4_noabort+0x20/0x30 [ 18.085971] kasan_atomics_helper+0x3dd8/0x4858 [ 18.086153] kasan_atomics+0x198/0x2e0 [ 18.086269] kunit_try_run_case+0x170/0x3f0 [ 18.086459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.086554] kthread+0x328/0x630 [ 18.086707] ret_from_fork+0x10/0x20 [ 18.086761] [ 18.086781] Allocated by task 268: [ 18.087028] kasan_save_stack+0x3c/0x68 [ 18.087199] kasan_save_track+0x20/0x40 [ 18.087277] kasan_save_alloc_info+0x40/0x58 [ 18.087472] __kasan_kmalloc+0xd4/0xd8 [ 18.087520] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.087561] kasan_atomics+0xb8/0x2e0 [ 18.087744] kunit_try_run_case+0x170/0x3f0 [ 18.088333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.088476] kthread+0x328/0x630 [ 18.090057] ret_from_fork+0x10/0x20 [ 18.090179] [ 18.090221] The buggy address belongs to the object at fff00000c77e9a80 [ 18.090221] which belongs to the cache kmalloc-64 of size 64 [ 18.090783] The buggy address is located 0 bytes to the right of [ 18.090783] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.090915] [ 18.090957] The buggy address belongs to the physical page: [ 18.091155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.091522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.091747] page_type: f5(slab) [ 18.091794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.091848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.092242] page dumped because: kasan: bad access detected [ 18.092563] [ 18.092627] Memory state around the buggy address: [ 18.092694] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.092739] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.093210] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.093280] ^ [ 18.093328] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.093383] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.093437] ================================================================== [ 18.294576] ================================================================== [ 18.294665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 18.294727] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.294780] [ 18.294813] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.295237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.295442] Hardware name: linux,dummy-virt (DT) [ 18.295485] Call trace: [ 18.295596] show_stack+0x20/0x38 (C) [ 18.295650] dump_stack_lvl+0x8c/0xd0 [ 18.295753] print_report+0x118/0x608 [ 18.295820] kasan_report+0xdc/0x128 [ 18.295875] __asan_report_load8_noabort+0x20/0x30 [ 18.296111] kasan_atomics_helper+0x3e20/0x4858 [ 18.296256] kasan_atomics+0x198/0x2e0 [ 18.296312] kunit_try_run_case+0x170/0x3f0 [ 18.296609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.296698] kthread+0x328/0x630 [ 18.296768] ret_from_fork+0x10/0x20 [ 18.296827] [ 18.296931] Allocated by task 268: [ 18.297005] kasan_save_stack+0x3c/0x68 [ 18.297049] kasan_save_track+0x20/0x40 [ 18.297093] kasan_save_alloc_info+0x40/0x58 [ 18.297211] __kasan_kmalloc+0xd4/0xd8 [ 18.297251] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.297291] kasan_atomics+0xb8/0x2e0 [ 18.297344] kunit_try_run_case+0x170/0x3f0 [ 18.297404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.297701] kthread+0x328/0x630 [ 18.297789] ret_from_fork+0x10/0x20 [ 18.297838] [ 18.298128] The buggy address belongs to the object at fff00000c77e9a80 [ 18.298128] which belongs to the cache kmalloc-64 of size 64 [ 18.298241] The buggy address is located 0 bytes to the right of [ 18.298241] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.298717] [ 18.298757] The buggy address belongs to the physical page: [ 18.298819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.298878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.299264] page_type: f5(slab) [ 18.299361] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.299444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.299693] page dumped because: kasan: bad access detected [ 18.299822] [ 18.299857] Memory state around the buggy address: [ 18.299892] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.300174] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.300272] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.300553] ^ [ 18.300627] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.300764] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.300839] ================================================================== [ 18.158129] ================================================================== [ 18.158455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 18.158532] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.158644] [ 18.158722] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.158923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.159238] Hardware name: linux,dummy-virt (DT) [ 18.159329] Call trace: [ 18.159389] show_stack+0x20/0x38 (C) [ 18.159465] dump_stack_lvl+0x8c/0xd0 [ 18.159909] print_report+0x118/0x608 [ 18.160010] kasan_report+0xdc/0x128 [ 18.160374] kasan_check_range+0x100/0x1a8 [ 18.160536] __kasan_check_write+0x20/0x30 [ 18.160613] kasan_atomics_helper+0xf88/0x4858 [ 18.160999] kasan_atomics+0x198/0x2e0 [ 18.161130] kunit_try_run_case+0x170/0x3f0 [ 18.161279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.161409] kthread+0x328/0x630 [ 18.161463] ret_from_fork+0x10/0x20 [ 18.161682] [ 18.161908] Allocated by task 268: [ 18.161972] kasan_save_stack+0x3c/0x68 [ 18.162026] kasan_save_track+0x20/0x40 [ 18.162085] kasan_save_alloc_info+0x40/0x58 [ 18.162124] __kasan_kmalloc+0xd4/0xd8 [ 18.162317] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.162460] kasan_atomics+0xb8/0x2e0 [ 18.162507] kunit_try_run_case+0x170/0x3f0 [ 18.162982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.163075] kthread+0x328/0x630 [ 18.163119] ret_from_fork+0x10/0x20 [ 18.163249] [ 18.163445] The buggy address belongs to the object at fff00000c77e9a80 [ 18.163445] which belongs to the cache kmalloc-64 of size 64 [ 18.163670] The buggy address is located 0 bytes to the right of [ 18.163670] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.164003] [ 18.164129] The buggy address belongs to the physical page: [ 18.164166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.164241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.164448] page_type: f5(slab) [ 18.164600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.164832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.165036] page dumped because: kasan: bad access detected [ 18.165233] [ 18.165392] Memory state around the buggy address: [ 18.165457] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.165573] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.165647] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.165982] ^ [ 18.166173] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.166521] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.166684] ================================================================== [ 18.236718] ================================================================== [ 18.236767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 18.236922] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.237005] [ 18.237069] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.237156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.237184] Hardware name: linux,dummy-virt (DT) [ 18.237217] Call trace: [ 18.237256] show_stack+0x20/0x38 (C) [ 18.237323] dump_stack_lvl+0x8c/0xd0 [ 18.237373] print_report+0x118/0x608 [ 18.237418] kasan_report+0xdc/0x128 [ 18.237513] kasan_check_range+0x100/0x1a8 [ 18.237590] __kasan_check_write+0x20/0x30 [ 18.237749] kasan_atomics_helper+0x14e4/0x4858 [ 18.237826] kasan_atomics+0x198/0x2e0 [ 18.237887] kunit_try_run_case+0x170/0x3f0 [ 18.237938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.238088] kthread+0x328/0x630 [ 18.238157] ret_from_fork+0x10/0x20 [ 18.238363] [ 18.238412] Allocated by task 268: [ 18.238524] kasan_save_stack+0x3c/0x68 [ 18.238637] kasan_save_track+0x20/0x40 [ 18.238690] kasan_save_alloc_info+0x40/0x58 [ 18.238740] __kasan_kmalloc+0xd4/0xd8 [ 18.238776] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.238830] kasan_atomics+0xb8/0x2e0 [ 18.238866] kunit_try_run_case+0x170/0x3f0 [ 18.238909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.238975] kthread+0x328/0x630 [ 18.239012] ret_from_fork+0x10/0x20 [ 18.239050] [ 18.239072] The buggy address belongs to the object at fff00000c77e9a80 [ 18.239072] which belongs to the cache kmalloc-64 of size 64 [ 18.239422] The buggy address is located 0 bytes to the right of [ 18.239422] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.239516] [ 18.239574] The buggy address belongs to the physical page: [ 18.239633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.239711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.239777] page_type: f5(slab) [ 18.239863] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.239928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.239985] page dumped because: kasan: bad access detected [ 18.240018] [ 18.240039] Memory state around the buggy address: [ 18.240163] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.240284] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.240386] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.240452] ^ [ 18.240494] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.240536] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.240576] ================================================================== [ 18.182375] ================================================================== [ 18.182642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 18.182745] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.182983] [ 18.183073] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.183354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.183507] Hardware name: linux,dummy-virt (DT) [ 18.183585] Call trace: [ 18.183639] show_stack+0x20/0x38 (C) [ 18.183935] dump_stack_lvl+0x8c/0xd0 [ 18.184036] print_report+0x118/0x608 [ 18.184186] kasan_report+0xdc/0x128 [ 18.184305] kasan_check_range+0x100/0x1a8 [ 18.184364] __kasan_check_write+0x20/0x30 [ 18.184845] kasan_atomics_helper+0x10c0/0x4858 [ 18.185101] kasan_atomics+0x198/0x2e0 [ 18.185320] kunit_try_run_case+0x170/0x3f0 [ 18.185499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.185576] kthread+0x328/0x630 [ 18.185890] ret_from_fork+0x10/0x20 [ 18.186061] [ 18.186177] Allocated by task 268: [ 18.186304] kasan_save_stack+0x3c/0x68 [ 18.186369] kasan_save_track+0x20/0x40 [ 18.186427] kasan_save_alloc_info+0x40/0x58 [ 18.186469] __kasan_kmalloc+0xd4/0xd8 [ 18.186505] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.186555] kasan_atomics+0xb8/0x2e0 [ 18.186590] kunit_try_run_case+0x170/0x3f0 [ 18.186659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.186706] kthread+0x328/0x630 [ 18.187138] ret_from_fork+0x10/0x20 [ 18.187349] [ 18.187403] The buggy address belongs to the object at fff00000c77e9a80 [ 18.187403] which belongs to the cache kmalloc-64 of size 64 [ 18.187580] The buggy address is located 0 bytes to the right of [ 18.187580] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.187659] [ 18.187682] The buggy address belongs to the physical page: [ 18.187715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.188075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.188392] page_type: f5(slab) [ 18.188536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.188626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.188671] page dumped because: kasan: bad access detected [ 18.188966] [ 18.189013] Memory state around the buggy address: [ 18.189210] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.189284] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.189466] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.189528] ^ [ 18.189816] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.189961] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.190336] ================================================================== [ 18.301621] ================================================================== [ 18.301750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 18.301804] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.301936] [ 18.301991] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.302209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.302380] Hardware name: linux,dummy-virt (DT) [ 18.302479] Call trace: [ 18.302538] show_stack+0x20/0x38 (C) [ 18.302683] dump_stack_lvl+0x8c/0xd0 [ 18.302771] print_report+0x118/0x608 [ 18.302818] kasan_report+0xdc/0x128 [ 18.302891] kasan_check_range+0x100/0x1a8 [ 18.302941] __kasan_check_write+0x20/0x30 [ 18.303000] kasan_atomics_helper+0x17ec/0x4858 [ 18.303048] kasan_atomics+0x198/0x2e0 [ 18.303109] kunit_try_run_case+0x170/0x3f0 [ 18.303158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.303228] kthread+0x328/0x630 [ 18.303287] ret_from_fork+0x10/0x20 [ 18.303335] [ 18.303356] Allocated by task 268: [ 18.303395] kasan_save_stack+0x3c/0x68 [ 18.303437] kasan_save_track+0x20/0x40 [ 18.303474] kasan_save_alloc_info+0x40/0x58 [ 18.303532] __kasan_kmalloc+0xd4/0xd8 [ 18.303568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.303608] kasan_atomics+0xb8/0x2e0 [ 18.303643] kunit_try_run_case+0x170/0x3f0 [ 18.303692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.303739] kthread+0x328/0x630 [ 18.303775] ret_from_fork+0x10/0x20 [ 18.303823] [ 18.303846] The buggy address belongs to the object at fff00000c77e9a80 [ 18.303846] which belongs to the cache kmalloc-64 of size 64 [ 18.303918] The buggy address is located 0 bytes to the right of [ 18.303918] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.305061] [ 18.305114] The buggy address belongs to the physical page: [ 18.305156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.306112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.306179] page_type: f5(slab) [ 18.306606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.306663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.306706] page dumped because: kasan: bad access detected [ 18.306742] [ 18.307755] Memory state around the buggy address: [ 18.308140] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.308217] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.308264] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.308580] ^ [ 18.308980] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.309066] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.309230] ================================================================== [ 18.139104] ================================================================== [ 18.139167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 18.139231] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.139283] [ 18.139318] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.139412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.139452] Hardware name: linux,dummy-virt (DT) [ 18.139501] Call trace: [ 18.139535] show_stack+0x20/0x38 (C) [ 18.139583] dump_stack_lvl+0x8c/0xd0 [ 18.139633] print_report+0x118/0x608 [ 18.139680] kasan_report+0xdc/0x128 [ 18.139734] kasan_check_range+0x100/0x1a8 [ 18.139781] __kasan_check_write+0x20/0x30 [ 18.139829] kasan_atomics_helper+0xeb8/0x4858 [ 18.139876] kasan_atomics+0x198/0x2e0 [ 18.139919] kunit_try_run_case+0x170/0x3f0 [ 18.139981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.140036] kthread+0x328/0x630 [ 18.140080] ret_from_fork+0x10/0x20 [ 18.140786] [ 18.140834] Allocated by task 268: [ 18.140869] kasan_save_stack+0x3c/0x68 [ 18.140914] kasan_save_track+0x20/0x40 [ 18.140972] kasan_save_alloc_info+0x40/0x58 [ 18.141014] __kasan_kmalloc+0xd4/0xd8 [ 18.141049] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.141268] kasan_atomics+0xb8/0x2e0 [ 18.141320] kunit_try_run_case+0x170/0x3f0 [ 18.141472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.141582] kthread+0x328/0x630 [ 18.141625] ret_from_fork+0x10/0x20 [ 18.141999] [ 18.142041] The buggy address belongs to the object at fff00000c77e9a80 [ 18.142041] which belongs to the cache kmalloc-64 of size 64 [ 18.142103] The buggy address is located 0 bytes to the right of [ 18.142103] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.142588] [ 18.142638] The buggy address belongs to the physical page: [ 18.143136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.143204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.143479] page_type: f5(slab) [ 18.143550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.143710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.143767] page dumped because: kasan: bad access detected [ 18.144019] [ 18.144282] Memory state around the buggy address: [ 18.144351] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.144420] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.144697] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.144945] ^ [ 18.145016] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.145070] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.145444] ================================================================== [ 18.265269] ================================================================== [ 18.265649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 18.265716] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268 [ 18.265769] [ 18.265884] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT [ 18.266006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.266241] Hardware name: linux,dummy-virt (DT) [ 18.266414] Call trace: [ 18.266735] show_stack+0x20/0x38 (C) [ 18.266885] dump_stack_lvl+0x8c/0xd0 [ 18.267054] print_report+0x118/0x608 [ 18.267129] kasan_report+0xdc/0x128 [ 18.267255] __asan_report_load8_noabort+0x20/0x30 [ 18.267328] kasan_atomics_helper+0x3df4/0x4858 [ 18.267376] kasan_atomics+0x198/0x2e0 [ 18.267429] kunit_try_run_case+0x170/0x3f0 [ 18.267478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.267859] kthread+0x328/0x630 [ 18.268241] ret_from_fork+0x10/0x20 [ 18.268398] [ 18.268456] Allocated by task 268: [ 18.268538] kasan_save_stack+0x3c/0x68 [ 18.268976] kasan_save_track+0x20/0x40 [ 18.269093] kasan_save_alloc_info+0x40/0x58 [ 18.269363] __kasan_kmalloc+0xd4/0xd8 [ 18.269584] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.269668] kasan_atomics+0xb8/0x2e0 [ 18.269740] kunit_try_run_case+0x170/0x3f0 [ 18.269871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.269925] kthread+0x328/0x630 [ 18.270148] ret_from_fork+0x10/0x20 [ 18.270207] [ 18.270352] The buggy address belongs to the object at fff00000c77e9a80 [ 18.270352] which belongs to the cache kmalloc-64 of size 64 [ 18.270581] The buggy address is located 0 bytes to the right of [ 18.270581] allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0) [ 18.270802] [ 18.270943] The buggy address belongs to the physical page: [ 18.271009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9 [ 18.271154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.271241] page_type: f5(slab) [ 18.271309] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.271447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.271523] page dumped because: kasan: bad access detected [ 18.271558] [ 18.271586] Memory state around the buggy address: [ 18.271925] fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.272002] fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.272152] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.272229] ^ [ 18.272557] fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.272618] fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.272657] ==================================================================
[ 14.890707] ================================================================== [ 14.891057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 14.891414] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.891644] [ 14.891734] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.891796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.891810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.891832] Call Trace: [ 14.891849] <TASK> [ 14.891866] dump_stack_lvl+0x73/0xb0 [ 14.891895] print_report+0xd1/0x650 [ 14.891919] ? __virt_addr_valid+0x1db/0x2d0 [ 14.891941] ? kasan_atomics_helper+0x2006/0x5450 [ 14.891964] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.891988] ? kasan_atomics_helper+0x2006/0x5450 [ 14.892011] kasan_report+0x141/0x180 [ 14.892036] ? kasan_atomics_helper+0x2006/0x5450 [ 14.892064] kasan_check_range+0x10c/0x1c0 [ 14.892086] __kasan_check_write+0x18/0x20 [ 14.892108] kasan_atomics_helper+0x2006/0x5450 [ 14.892133] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.892157] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.892181] ? kasan_atomics+0x152/0x310 [ 14.892205] kasan_atomics+0x1dc/0x310 [ 14.892237] ? __pfx_kasan_atomics+0x10/0x10 [ 14.892260] ? __pfx_read_tsc+0x10/0x10 [ 14.892281] ? ktime_get_ts64+0x86/0x230 [ 14.892308] kunit_try_run_case+0x1a5/0x480 [ 14.892334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.892358] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.892383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.892409] ? __kthread_parkme+0x82/0x180 [ 14.892432] ? preempt_count_sub+0x50/0x80 [ 14.892459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.892485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.892509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.892534] kthread+0x337/0x6f0 [ 14.892552] ? trace_preempt_on+0x20/0xc0 [ 14.892577] ? __pfx_kthread+0x10/0x10 [ 14.892597] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.892621] ? calculate_sigpending+0x7b/0xa0 [ 14.892654] ? __pfx_kthread+0x10/0x10 [ 14.892675] ret_from_fork+0x41/0x80 [ 14.892697] ? __pfx_kthread+0x10/0x10 [ 14.892716] ret_from_fork_asm+0x1a/0x30 [ 14.892748] </TASK> [ 14.892759] [ 14.900044] Allocated by task 284: [ 14.900202] kasan_save_stack+0x45/0x70 [ 14.900425] kasan_save_track+0x18/0x40 [ 14.900589] kasan_save_alloc_info+0x3b/0x50 [ 14.900893] __kasan_kmalloc+0xb7/0xc0 [ 14.901085] __kmalloc_cache_noprof+0x189/0x420 [ 14.901266] kasan_atomics+0x95/0x310 [ 14.901401] kunit_try_run_case+0x1a5/0x480 [ 14.901551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.901772] kthread+0x337/0x6f0 [ 14.901951] ret_from_fork+0x41/0x80 [ 14.902145] ret_from_fork_asm+0x1a/0x30 [ 14.902359] [ 14.902452] The buggy address belongs to the object at ffff8881039f4880 [ 14.902452] which belongs to the cache kmalloc-64 of size 64 [ 14.903087] The buggy address is located 0 bytes to the right of [ 14.903087] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.903594] [ 14.903696] The buggy address belongs to the physical page: [ 14.903915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.904236] flags: 0x200000000000000(node=0|zone=2) [ 14.904403] page_type: f5(slab) [ 14.904578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.905055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.905327] page dumped because: kasan: bad access detected [ 14.905587] [ 14.905706] Memory state around the buggy address: [ 14.905876] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.906183] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.906488] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.906833] ^ [ 14.906989] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.907206] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.907535] ================================================================== [ 14.486554] ================================================================== [ 14.486951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.487292] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.487622] [ 14.487809] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.487862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.487875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.487899] Call Trace: [ 14.487920] <TASK> [ 14.487951] dump_stack_lvl+0x73/0xb0 [ 14.487979] print_report+0xd1/0x650 [ 14.488015] ? __virt_addr_valid+0x1db/0x2d0 [ 14.488039] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.488062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.488087] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.488120] kasan_report+0x141/0x180 [ 14.488144] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.488183] __asan_report_store8_noabort+0x1b/0x30 [ 14.488206] kasan_atomics_helper+0x50d4/0x5450 [ 14.488240] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.488274] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.488297] ? kasan_atomics+0x152/0x310 [ 14.488322] kasan_atomics+0x1dc/0x310 [ 14.488354] ? __pfx_kasan_atomics+0x10/0x10 [ 14.488376] ? __pfx_read_tsc+0x10/0x10 [ 14.488398] ? ktime_get_ts64+0x86/0x230 [ 14.488425] kunit_try_run_case+0x1a5/0x480 [ 14.488452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.488476] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.488502] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.488527] ? __kthread_parkme+0x82/0x180 [ 14.488551] ? preempt_count_sub+0x50/0x80 [ 14.488579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.488604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.488628] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.488653] kthread+0x337/0x6f0 [ 14.488671] ? trace_preempt_on+0x20/0xc0 [ 14.488697] ? __pfx_kthread+0x10/0x10 [ 14.488716] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.488739] ? calculate_sigpending+0x7b/0xa0 [ 14.488772] ? __pfx_kthread+0x10/0x10 [ 14.488792] ret_from_fork+0x41/0x80 [ 14.488814] ? __pfx_kthread+0x10/0x10 [ 14.488844] ret_from_fork_asm+0x1a/0x30 [ 14.488876] </TASK> [ 14.488889] [ 14.496319] Allocated by task 284: [ 14.496461] kasan_save_stack+0x45/0x70 [ 14.496614] kasan_save_track+0x18/0x40 [ 14.496800] kasan_save_alloc_info+0x3b/0x50 [ 14.497087] __kasan_kmalloc+0xb7/0xc0 [ 14.497314] __kmalloc_cache_noprof+0x189/0x420 [ 14.497668] kasan_atomics+0x95/0x310 [ 14.497893] kunit_try_run_case+0x1a5/0x480 [ 14.498101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.498290] kthread+0x337/0x6f0 [ 14.498491] ret_from_fork+0x41/0x80 [ 14.498688] ret_from_fork_asm+0x1a/0x30 [ 14.498904] [ 14.499009] The buggy address belongs to the object at ffff8881039f4880 [ 14.499009] which belongs to the cache kmalloc-64 of size 64 [ 14.499512] The buggy address is located 0 bytes to the right of [ 14.499512] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.499958] [ 14.500062] The buggy address belongs to the physical page: [ 14.500322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.500681] flags: 0x200000000000000(node=0|zone=2) [ 14.500902] page_type: f5(slab) [ 14.501074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.501398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.501728] page dumped because: kasan: bad access detected [ 14.501956] [ 14.502042] Memory state around the buggy address: [ 14.502254] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.502532] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.502749] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.502964] ^ [ 14.503118] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.503431] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.504094] ================================================================== [ 14.037737] ================================================================== [ 14.038084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.038455] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.038709] [ 14.038792] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.038835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.038848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.038870] Call Trace: [ 14.038885] <TASK> [ 14.038900] dump_stack_lvl+0x73/0xb0 [ 14.038924] print_report+0xd1/0x650 [ 14.038948] ? __virt_addr_valid+0x1db/0x2d0 [ 14.038970] ? kasan_atomics_helper+0xac7/0x5450 [ 14.038993] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.039017] ? kasan_atomics_helper+0xac7/0x5450 [ 14.039040] kasan_report+0x141/0x180 [ 14.039065] ? kasan_atomics_helper+0xac7/0x5450 [ 14.039093] kasan_check_range+0x10c/0x1c0 [ 14.039116] __kasan_check_write+0x18/0x20 [ 14.039138] kasan_atomics_helper+0xac7/0x5450 [ 14.039161] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.039186] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.039210] ? kasan_atomics+0x152/0x310 [ 14.039245] kasan_atomics+0x1dc/0x310 [ 14.039265] ? __pfx_kasan_atomics+0x10/0x10 [ 14.039288] ? __pfx_read_tsc+0x10/0x10 [ 14.039308] ? ktime_get_ts64+0x86/0x230 [ 14.039335] kunit_try_run_case+0x1a5/0x480 [ 14.039360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.039384] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.039409] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.039434] ? __kthread_parkme+0x82/0x180 [ 14.039456] ? preempt_count_sub+0x50/0x80 [ 14.039481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.039507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.039531] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.039556] kthread+0x337/0x6f0 [ 14.039574] ? trace_preempt_on+0x20/0xc0 [ 14.039598] ? __pfx_kthread+0x10/0x10 [ 14.039618] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.039661] ? calculate_sigpending+0x7b/0xa0 [ 14.039683] ? __pfx_kthread+0x10/0x10 [ 14.039704] ret_from_fork+0x41/0x80 [ 14.039726] ? __pfx_kthread+0x10/0x10 [ 14.039746] ret_from_fork_asm+0x1a/0x30 [ 14.039778] </TASK> [ 14.039790] [ 14.047250] Allocated by task 284: [ 14.047430] kasan_save_stack+0x45/0x70 [ 14.047603] kasan_save_track+0x18/0x40 [ 14.047800] kasan_save_alloc_info+0x3b/0x50 [ 14.047981] __kasan_kmalloc+0xb7/0xc0 [ 14.048160] __kmalloc_cache_noprof+0x189/0x420 [ 14.048369] kasan_atomics+0x95/0x310 [ 14.048532] kunit_try_run_case+0x1a5/0x480 [ 14.048741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.048948] kthread+0x337/0x6f0 [ 14.049117] ret_from_fork+0x41/0x80 [ 14.049284] ret_from_fork_asm+0x1a/0x30 [ 14.049488] [ 14.049569] The buggy address belongs to the object at ffff8881039f4880 [ 14.049569] which belongs to the cache kmalloc-64 of size 64 [ 14.050023] The buggy address is located 0 bytes to the right of [ 14.050023] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.050401] [ 14.050476] The buggy address belongs to the physical page: [ 14.050671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.050912] flags: 0x200000000000000(node=0|zone=2) [ 14.051091] page_type: f5(slab) [ 14.051265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.051610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.051963] page dumped because: kasan: bad access detected [ 14.052213] [ 14.052315] Memory state around the buggy address: [ 14.052540] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.052808] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.053030] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.053253] ^ [ 14.053408] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.053629] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.053957] ================================================================== [ 14.101723] ================================================================== [ 14.102308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.102784] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.103163] [ 14.103292] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.103338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.103352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.103376] Call Trace: [ 14.103388] <TASK> [ 14.103403] dump_stack_lvl+0x73/0xb0 [ 14.103619] print_report+0xd1/0x650 [ 14.103658] ? __virt_addr_valid+0x1db/0x2d0 [ 14.103681] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.103704] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.103728] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.103752] kasan_report+0x141/0x180 [ 14.103777] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.103806] __asan_report_load4_noabort+0x18/0x20 [ 14.103827] kasan_atomics_helper+0x4a84/0x5450 [ 14.103851] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.103875] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.103897] ? kasan_atomics+0x152/0x310 [ 14.103922] kasan_atomics+0x1dc/0x310 [ 14.103944] ? __pfx_kasan_atomics+0x10/0x10 [ 14.103967] ? __pfx_read_tsc+0x10/0x10 [ 14.103987] ? ktime_get_ts64+0x86/0x230 [ 14.104013] kunit_try_run_case+0x1a5/0x480 [ 14.104038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.104061] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.104085] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.104110] ? __kthread_parkme+0x82/0x180 [ 14.104133] ? preempt_count_sub+0x50/0x80 [ 14.104158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.104184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.104208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.104246] kthread+0x337/0x6f0 [ 14.104264] ? trace_preempt_on+0x20/0xc0 [ 14.104288] ? __pfx_kthread+0x10/0x10 [ 14.104307] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.104331] ? calculate_sigpending+0x7b/0xa0 [ 14.104353] ? __pfx_kthread+0x10/0x10 [ 14.104373] ret_from_fork+0x41/0x80 [ 14.104394] ? __pfx_kthread+0x10/0x10 [ 14.104414] ret_from_fork_asm+0x1a/0x30 [ 14.104445] </TASK> [ 14.104458] [ 14.114165] Allocated by task 284: [ 14.114416] kasan_save_stack+0x45/0x70 [ 14.114745] kasan_save_track+0x18/0x40 [ 14.114923] kasan_save_alloc_info+0x3b/0x50 [ 14.115246] __kasan_kmalloc+0xb7/0xc0 [ 14.115511] __kmalloc_cache_noprof+0x189/0x420 [ 14.115786] kasan_atomics+0x95/0x310 [ 14.116038] kunit_try_run_case+0x1a5/0x480 [ 14.116224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.116487] kthread+0x337/0x6f0 [ 14.116644] ret_from_fork+0x41/0x80 [ 14.117047] ret_from_fork_asm+0x1a/0x30 [ 14.117324] [ 14.117405] The buggy address belongs to the object at ffff8881039f4880 [ 14.117405] which belongs to the cache kmalloc-64 of size 64 [ 14.118104] The buggy address is located 0 bytes to the right of [ 14.118104] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.118707] [ 14.118950] The buggy address belongs to the physical page: [ 14.119167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.119625] flags: 0x200000000000000(node=0|zone=2) [ 14.119867] page_type: f5(slab) [ 14.120018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.120358] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.120665] page dumped because: kasan: bad access detected [ 14.120891] [ 14.120974] Memory state around the buggy address: [ 14.121180] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.121871] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.122247] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.122623] ^ [ 14.122918] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.123340] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.123717] ================================================================== [ 13.930525] ================================================================== [ 13.931075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 13.931437] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.931955] [ 13.932101] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.932147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.932161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.932184] Call Trace: [ 13.932197] <TASK> [ 13.932212] dump_stack_lvl+0x73/0xb0 [ 13.932251] print_report+0xd1/0x650 [ 13.932275] ? __virt_addr_valid+0x1db/0x2d0 [ 13.932298] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.932321] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.932346] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.932370] kasan_report+0x141/0x180 [ 13.932395] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.932433] kasan_check_range+0x10c/0x1c0 [ 13.932455] __kasan_check_write+0x18/0x20 [ 13.932488] kasan_atomics_helper+0x7c7/0x5450 [ 13.932513] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.932537] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.932561] ? kasan_atomics+0x152/0x310 [ 13.932585] kasan_atomics+0x1dc/0x310 [ 13.932606] ? __pfx_kasan_atomics+0x10/0x10 [ 13.932629] ? __pfx_read_tsc+0x10/0x10 [ 13.932650] ? ktime_get_ts64+0x86/0x230 [ 13.932730] kunit_try_run_case+0x1a5/0x480 [ 13.932760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.932784] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.932809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.932835] ? __kthread_parkme+0x82/0x180 [ 13.932869] ? preempt_count_sub+0x50/0x80 [ 13.932895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.932920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.932956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.932981] kthread+0x337/0x6f0 [ 13.932999] ? trace_preempt_on+0x20/0xc0 [ 13.933023] ? __pfx_kthread+0x10/0x10 [ 13.933043] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.933065] ? calculate_sigpending+0x7b/0xa0 [ 13.933089] ? __pfx_kthread+0x10/0x10 [ 13.933109] ret_from_fork+0x41/0x80 [ 13.933130] ? __pfx_kthread+0x10/0x10 [ 13.933159] ret_from_fork_asm+0x1a/0x30 [ 13.933190] </TASK> [ 13.933201] [ 13.942072] Allocated by task 284: [ 13.942281] kasan_save_stack+0x45/0x70 [ 13.942485] kasan_save_track+0x18/0x40 [ 13.942679] kasan_save_alloc_info+0x3b/0x50 [ 13.942863] __kasan_kmalloc+0xb7/0xc0 [ 13.943003] __kmalloc_cache_noprof+0x189/0x420 [ 13.943701] kasan_atomics+0x95/0x310 [ 13.943923] kunit_try_run_case+0x1a5/0x480 [ 13.944091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.944278] kthread+0x337/0x6f0 [ 13.944425] ret_from_fork+0x41/0x80 [ 13.944640] ret_from_fork_asm+0x1a/0x30 [ 13.944837] [ 13.944949] The buggy address belongs to the object at ffff8881039f4880 [ 13.944949] which belongs to the cache kmalloc-64 of size 64 [ 13.945350] The buggy address is located 0 bytes to the right of [ 13.945350] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.946096] [ 13.946203] The buggy address belongs to the physical page: [ 13.946493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.947002] flags: 0x200000000000000(node=0|zone=2) [ 13.947247] page_type: f5(slab) [ 13.947593] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.947940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.948257] page dumped because: kasan: bad access detected [ 13.948552] [ 13.948661] Memory state around the buggy address: [ 13.948853] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.949082] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.949474] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.949942] ^ [ 13.950158] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.950730] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.951030] ================================================================== [ 14.249176] ================================================================== [ 14.250466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.250880] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.251456] [ 14.251708] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.251764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.251778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.251801] Call Trace: [ 14.251822] <TASK> [ 14.251842] dump_stack_lvl+0x73/0xb0 [ 14.251913] print_report+0xd1/0x650 [ 14.251938] ? __virt_addr_valid+0x1db/0x2d0 [ 14.251962] ? kasan_atomics_helper+0x1079/0x5450 [ 14.251985] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.252010] ? kasan_atomics_helper+0x1079/0x5450 [ 14.252033] kasan_report+0x141/0x180 [ 14.252058] ? kasan_atomics_helper+0x1079/0x5450 [ 14.252086] kasan_check_range+0x10c/0x1c0 [ 14.252108] __kasan_check_write+0x18/0x20 [ 14.252129] kasan_atomics_helper+0x1079/0x5450 [ 14.252154] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.252179] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.252203] ? kasan_atomics+0x152/0x310 [ 14.252239] kasan_atomics+0x1dc/0x310 [ 14.252259] ? __pfx_kasan_atomics+0x10/0x10 [ 14.252282] ? __pfx_read_tsc+0x10/0x10 [ 14.252304] ? ktime_get_ts64+0x86/0x230 [ 14.252331] kunit_try_run_case+0x1a5/0x480 [ 14.252357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.252381] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.252407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.252434] ? __kthread_parkme+0x82/0x180 [ 14.252459] ? preempt_count_sub+0x50/0x80 [ 14.252486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.252511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.252536] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.252560] kthread+0x337/0x6f0 [ 14.252579] ? trace_preempt_on+0x20/0xc0 [ 14.252605] ? __pfx_kthread+0x10/0x10 [ 14.252625] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.252657] ? calculate_sigpending+0x7b/0xa0 [ 14.252682] ? __pfx_kthread+0x10/0x10 [ 14.252702] ret_from_fork+0x41/0x80 [ 14.252724] ? __pfx_kthread+0x10/0x10 [ 14.252743] ret_from_fork_asm+0x1a/0x30 [ 14.252776] </TASK> [ 14.252788] [ 14.263265] Allocated by task 284: [ 14.263643] kasan_save_stack+0x45/0x70 [ 14.263944] kasan_save_track+0x18/0x40 [ 14.264104] kasan_save_alloc_info+0x3b/0x50 [ 14.264359] __kasan_kmalloc+0xb7/0xc0 [ 14.264498] __kmalloc_cache_noprof+0x189/0x420 [ 14.264714] kasan_atomics+0x95/0x310 [ 14.264932] kunit_try_run_case+0x1a5/0x480 [ 14.265164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.265452] kthread+0x337/0x6f0 [ 14.265615] ret_from_fork+0x41/0x80 [ 14.265750] ret_from_fork_asm+0x1a/0x30 [ 14.266050] [ 14.266151] The buggy address belongs to the object at ffff8881039f4880 [ 14.266151] which belongs to the cache kmalloc-64 of size 64 [ 14.266658] The buggy address is located 0 bytes to the right of [ 14.266658] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.267194] [ 14.267312] The buggy address belongs to the physical page: [ 14.267572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.267980] flags: 0x200000000000000(node=0|zone=2) [ 14.268199] page_type: f5(slab) [ 14.268389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.268753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.269119] page dumped because: kasan: bad access detected [ 14.269395] [ 14.269474] Memory state around the buggy address: [ 14.269636] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.269852] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.270507] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.270922] ^ [ 14.271311] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.271552] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.272051] ================================================================== [ 14.054568] ================================================================== [ 14.055115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.056127] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.056490] [ 14.056600] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.056643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.056656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.056678] Call Trace: [ 14.056694] <TASK> [ 14.056710] dump_stack_lvl+0x73/0xb0 [ 14.056736] print_report+0xd1/0x650 [ 14.056759] ? __virt_addr_valid+0x1db/0x2d0 [ 14.056781] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.056803] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.056827] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.056853] kasan_report+0x141/0x180 [ 14.056877] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.056905] kasan_check_range+0x10c/0x1c0 [ 14.056926] __kasan_check_write+0x18/0x20 [ 14.056948] kasan_atomics_helper+0xb6a/0x5450 [ 14.056972] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.056995] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.057018] ? kasan_atomics+0x152/0x310 [ 14.057042] kasan_atomics+0x1dc/0x310 [ 14.057062] ? __pfx_kasan_atomics+0x10/0x10 [ 14.057084] ? __pfx_read_tsc+0x10/0x10 [ 14.057104] ? ktime_get_ts64+0x86/0x230 [ 14.057130] kunit_try_run_case+0x1a5/0x480 [ 14.057154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.057178] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.057203] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.058148] ? __kthread_parkme+0x82/0x180 [ 14.058180] ? preempt_count_sub+0x50/0x80 [ 14.058208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.058246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.058272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.058297] kthread+0x337/0x6f0 [ 14.058315] ? trace_preempt_on+0x20/0xc0 [ 14.058339] ? __pfx_kthread+0x10/0x10 [ 14.058359] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.058382] ? calculate_sigpending+0x7b/0xa0 [ 14.058405] ? __pfx_kthread+0x10/0x10 [ 14.058426] ret_from_fork+0x41/0x80 [ 14.058449] ? __pfx_kthread+0x10/0x10 [ 14.058469] ret_from_fork_asm+0x1a/0x30 [ 14.058502] </TASK> [ 14.058515] [ 14.068450] Allocated by task 284: [ 14.068879] kasan_save_stack+0x45/0x70 [ 14.069138] kasan_save_track+0x18/0x40 [ 14.069421] kasan_save_alloc_info+0x3b/0x50 [ 14.069593] __kasan_kmalloc+0xb7/0xc0 [ 14.069903] __kmalloc_cache_noprof+0x189/0x420 [ 14.070198] kasan_atomics+0x95/0x310 [ 14.070349] kunit_try_run_case+0x1a5/0x480 [ 14.070699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.070916] kthread+0x337/0x6f0 [ 14.071196] ret_from_fork+0x41/0x80 [ 14.071465] ret_from_fork_asm+0x1a/0x30 [ 14.071739] [ 14.071835] The buggy address belongs to the object at ffff8881039f4880 [ 14.071835] which belongs to the cache kmalloc-64 of size 64 [ 14.072443] The buggy address is located 0 bytes to the right of [ 14.072443] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.073129] [ 14.073351] The buggy address belongs to the physical page: [ 14.073574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.074097] flags: 0x200000000000000(node=0|zone=2) [ 14.074473] page_type: f5(slab) [ 14.074607] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.075072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.075465] page dumped because: kasan: bad access detected [ 14.075812] [ 14.075913] Memory state around the buggy address: [ 14.076286] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.076599] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.076943] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.077430] ^ [ 14.077705] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.077963] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.078393] ================================================================== [ 14.272612] ================================================================== [ 14.273211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.273695] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.274491] [ 14.274746] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.274812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.274825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.274861] Call Trace: [ 14.274880] <TASK> [ 14.274898] dump_stack_lvl+0x73/0xb0 [ 14.274927] print_report+0xd1/0x650 [ 14.274951] ? __virt_addr_valid+0x1db/0x2d0 [ 14.274974] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.274997] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.275021] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.275045] kasan_report+0x141/0x180 [ 14.275068] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.275096] __asan_report_load4_noabort+0x18/0x20 [ 14.275118] kasan_atomics_helper+0x4a1c/0x5450 [ 14.275142] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.275166] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.275189] ? kasan_atomics+0x152/0x310 [ 14.275213] kasan_atomics+0x1dc/0x310 [ 14.275245] ? __pfx_kasan_atomics+0x10/0x10 [ 14.275286] ? __pfx_read_tsc+0x10/0x10 [ 14.275307] ? ktime_get_ts64+0x86/0x230 [ 14.275334] kunit_try_run_case+0x1a5/0x480 [ 14.275382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.275406] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.275431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.275471] ? __kthread_parkme+0x82/0x180 [ 14.275495] ? preempt_count_sub+0x50/0x80 [ 14.275522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.275546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.275571] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.275596] kthread+0x337/0x6f0 [ 14.275614] ? trace_preempt_on+0x20/0xc0 [ 14.275639] ? __pfx_kthread+0x10/0x10 [ 14.275659] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.275682] ? calculate_sigpending+0x7b/0xa0 [ 14.275705] ? __pfx_kthread+0x10/0x10 [ 14.275725] ret_from_fork+0x41/0x80 [ 14.275746] ? __pfx_kthread+0x10/0x10 [ 14.275766] ret_from_fork_asm+0x1a/0x30 [ 14.275797] </TASK> [ 14.275809] [ 14.286193] Allocated by task 284: [ 14.286392] kasan_save_stack+0x45/0x70 [ 14.286590] kasan_save_track+0x18/0x40 [ 14.287135] kasan_save_alloc_info+0x3b/0x50 [ 14.287324] __kasan_kmalloc+0xb7/0xc0 [ 14.287510] __kmalloc_cache_noprof+0x189/0x420 [ 14.288042] kasan_atomics+0x95/0x310 [ 14.288309] kunit_try_run_case+0x1a5/0x480 [ 14.288635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.289072] kthread+0x337/0x6f0 [ 14.289256] ret_from_fork+0x41/0x80 [ 14.289431] ret_from_fork_asm+0x1a/0x30 [ 14.289619] [ 14.290055] The buggy address belongs to the object at ffff8881039f4880 [ 14.290055] which belongs to the cache kmalloc-64 of size 64 [ 14.290488] The buggy address is located 0 bytes to the right of [ 14.290488] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.291508] [ 14.291734] The buggy address belongs to the physical page: [ 14.292158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.292676] flags: 0x200000000000000(node=0|zone=2) [ 14.292920] page_type: f5(slab) [ 14.293084] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.293364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.293672] page dumped because: kasan: bad access detected [ 14.294209] [ 14.294339] Memory state around the buggy address: [ 14.294539] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.295014] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.295333] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.295622] ^ [ 14.295841] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.296139] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.296446] ================================================================== [ 14.580368] ================================================================== [ 14.580678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.581284] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.581512] [ 14.581608] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.581653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.581667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.581689] Call Trace: [ 14.581705] <TASK> [ 14.581724] dump_stack_lvl+0x73/0xb0 [ 14.581750] print_report+0xd1/0x650 [ 14.581773] ? __virt_addr_valid+0x1db/0x2d0 [ 14.581796] ? kasan_atomics_helper+0x177f/0x5450 [ 14.581819] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.581843] ? kasan_atomics_helper+0x177f/0x5450 [ 14.581867] kasan_report+0x141/0x180 [ 14.581892] ? kasan_atomics_helper+0x177f/0x5450 [ 14.581920] kasan_check_range+0x10c/0x1c0 [ 14.581941] __kasan_check_write+0x18/0x20 [ 14.581963] kasan_atomics_helper+0x177f/0x5450 [ 14.581988] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.582012] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.582034] ? kasan_atomics+0x152/0x310 [ 14.582059] kasan_atomics+0x1dc/0x310 [ 14.582079] ? __pfx_kasan_atomics+0x10/0x10 [ 14.582102] ? __pfx_read_tsc+0x10/0x10 [ 14.582122] ? ktime_get_ts64+0x86/0x230 [ 14.582149] kunit_try_run_case+0x1a5/0x480 [ 14.582174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.582198] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.582246] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.582272] ? __kthread_parkme+0x82/0x180 [ 14.582294] ? preempt_count_sub+0x50/0x80 [ 14.582333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.582359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.582384] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.582409] kthread+0x337/0x6f0 [ 14.582428] ? trace_preempt_on+0x20/0xc0 [ 14.582453] ? __pfx_kthread+0x10/0x10 [ 14.582473] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.582497] ? calculate_sigpending+0x7b/0xa0 [ 14.582520] ? __pfx_kthread+0x10/0x10 [ 14.582541] ret_from_fork+0x41/0x80 [ 14.582564] ? __pfx_kthread+0x10/0x10 [ 14.582583] ret_from_fork_asm+0x1a/0x30 [ 14.582615] </TASK> [ 14.582628] [ 14.591048] Allocated by task 284: [ 14.591237] kasan_save_stack+0x45/0x70 [ 14.591414] kasan_save_track+0x18/0x40 [ 14.591626] kasan_save_alloc_info+0x3b/0x50 [ 14.591828] __kasan_kmalloc+0xb7/0xc0 [ 14.592023] __kmalloc_cache_noprof+0x189/0x420 [ 14.592192] kasan_atomics+0x95/0x310 [ 14.592358] kunit_try_run_case+0x1a5/0x480 [ 14.592532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.592745] kthread+0x337/0x6f0 [ 14.592889] ret_from_fork+0x41/0x80 [ 14.593121] ret_from_fork_asm+0x1a/0x30 [ 14.593366] [ 14.593468] The buggy address belongs to the object at ffff8881039f4880 [ 14.593468] which belongs to the cache kmalloc-64 of size 64 [ 14.594159] The buggy address is located 0 bytes to the right of [ 14.594159] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.594807] [ 14.594920] The buggy address belongs to the physical page: [ 14.595213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.595470] flags: 0x200000000000000(node=0|zone=2) [ 14.595674] page_type: f5(slab) [ 14.595859] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.596219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.596566] page dumped because: kasan: bad access detected [ 14.596820] [ 14.596918] Memory state around the buggy address: [ 14.597136] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.597460] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.597855] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.598147] ^ [ 14.598353] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.598572] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.599138] ================================================================== [ 14.755902] ================================================================== [ 14.756475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 14.756746] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.756974] [ 14.757087] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.757133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.757146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.757170] Call Trace: [ 14.757185] <TASK> [ 14.757202] dump_stack_lvl+0x73/0xb0 [ 14.757240] print_report+0xd1/0x650 [ 14.757276] ? __virt_addr_valid+0x1db/0x2d0 [ 14.757299] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.757323] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.757359] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.757383] kasan_report+0x141/0x180 [ 14.757408] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.757436] kasan_check_range+0x10c/0x1c0 [ 14.757460] __kasan_check_write+0x18/0x20 [ 14.757482] kasan_atomics_helper+0x1ce1/0x5450 [ 14.757506] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.757531] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.757559] ? kasan_atomics+0x152/0x310 [ 14.757583] kasan_atomics+0x1dc/0x310 [ 14.757604] ? __pfx_kasan_atomics+0x10/0x10 [ 14.757627] ? __pfx_read_tsc+0x10/0x10 [ 14.757669] ? ktime_get_ts64+0x86/0x230 [ 14.757695] kunit_try_run_case+0x1a5/0x480 [ 14.757721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.757745] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.757771] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.757795] ? __kthread_parkme+0x82/0x180 [ 14.757818] ? preempt_count_sub+0x50/0x80 [ 14.757845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.757870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.757895] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.757919] kthread+0x337/0x6f0 [ 14.757937] ? trace_preempt_on+0x20/0xc0 [ 14.757962] ? __pfx_kthread+0x10/0x10 [ 14.757992] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.758015] ? calculate_sigpending+0x7b/0xa0 [ 14.758038] ? __pfx_kthread+0x10/0x10 [ 14.758069] ret_from_fork+0x41/0x80 [ 14.758090] ? __pfx_kthread+0x10/0x10 [ 14.758110] ret_from_fork_asm+0x1a/0x30 [ 14.758141] </TASK> [ 14.758153] [ 14.765689] Allocated by task 284: [ 14.765888] kasan_save_stack+0x45/0x70 [ 14.766128] kasan_save_track+0x18/0x40 [ 14.766334] kasan_save_alloc_info+0x3b/0x50 [ 14.766550] __kasan_kmalloc+0xb7/0xc0 [ 14.766795] __kmalloc_cache_noprof+0x189/0x420 [ 14.767014] kasan_atomics+0x95/0x310 [ 14.767199] kunit_try_run_case+0x1a5/0x480 [ 14.767414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.767689] kthread+0x337/0x6f0 [ 14.767853] ret_from_fork+0x41/0x80 [ 14.768039] ret_from_fork_asm+0x1a/0x30 [ 14.768246] [ 14.768358] The buggy address belongs to the object at ffff8881039f4880 [ 14.768358] which belongs to the cache kmalloc-64 of size 64 [ 14.768832] The buggy address is located 0 bytes to the right of [ 14.768832] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.769202] [ 14.769331] The buggy address belongs to the physical page: [ 14.769664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.770058] flags: 0x200000000000000(node=0|zone=2) [ 14.770288] page_type: f5(slab) [ 14.770414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.770726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.771090] page dumped because: kasan: bad access detected [ 14.771378] [ 14.771452] Memory state around the buggy address: [ 14.771708] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.772018] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.772351] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.772658] ^ [ 14.772848] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.773133] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.773419] ================================================================== [ 14.943756] ================================================================== [ 14.944204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 14.944552] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.945036] [ 14.945134] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.945182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.945195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.945220] Call Trace: [ 14.945247] <TASK> [ 14.945265] dump_stack_lvl+0x73/0xb0 [ 14.945291] print_report+0xd1/0x650 [ 14.945316] ? __virt_addr_valid+0x1db/0x2d0 [ 14.945340] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.945363] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.945388] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.945411] kasan_report+0x141/0x180 [ 14.945436] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.945465] __asan_report_load8_noabort+0x18/0x20 [ 14.945487] kasan_atomics_helper+0x4fb2/0x5450 [ 14.945512] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.945537] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.945565] ? kasan_atomics+0x152/0x310 [ 14.945593] kasan_atomics+0x1dc/0x310 [ 14.945614] ? __pfx_kasan_atomics+0x10/0x10 [ 14.945637] ? __pfx_read_tsc+0x10/0x10 [ 14.945659] ? ktime_get_ts64+0x86/0x230 [ 14.945686] kunit_try_run_case+0x1a5/0x480 [ 14.945712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.945736] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.945763] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.945788] ? __kthread_parkme+0x82/0x180 [ 14.945812] ? preempt_count_sub+0x50/0x80 [ 14.945840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.945866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.945891] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.945916] kthread+0x337/0x6f0 [ 14.945934] ? trace_preempt_on+0x20/0xc0 [ 14.945959] ? __pfx_kthread+0x10/0x10 [ 14.945979] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.946002] ? calculate_sigpending+0x7b/0xa0 [ 14.946026] ? __pfx_kthread+0x10/0x10 [ 14.946045] ret_from_fork+0x41/0x80 [ 14.946068] ? __pfx_kthread+0x10/0x10 [ 14.946087] ret_from_fork_asm+0x1a/0x30 [ 14.946119] </TASK> [ 14.946130] [ 14.953170] Allocated by task 284: [ 14.953362] kasan_save_stack+0x45/0x70 [ 14.953567] kasan_save_track+0x18/0x40 [ 14.953768] kasan_save_alloc_info+0x3b/0x50 [ 14.954002] __kasan_kmalloc+0xb7/0xc0 [ 14.954150] __kmalloc_cache_noprof+0x189/0x420 [ 14.954357] kasan_atomics+0x95/0x310 [ 14.954551] kunit_try_run_case+0x1a5/0x480 [ 14.954818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.954994] kthread+0x337/0x6f0 [ 14.955115] ret_from_fork+0x41/0x80 [ 14.955293] ret_from_fork_asm+0x1a/0x30 [ 14.955497] [ 14.955594] The buggy address belongs to the object at ffff8881039f4880 [ 14.955594] which belongs to the cache kmalloc-64 of size 64 [ 14.956280] The buggy address is located 0 bytes to the right of [ 14.956280] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.956861] [ 14.956945] The buggy address belongs to the physical page: [ 14.957172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.957508] flags: 0x200000000000000(node=0|zone=2) [ 14.957758] page_type: f5(slab) [ 14.957913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.958177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.958417] page dumped because: kasan: bad access detected [ 14.958591] [ 14.958672] Memory state around the buggy address: [ 14.958902] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.959221] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.959548] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.960090] ^ [ 14.960318] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.960570] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.961064] ================================================================== [ 13.724127] ================================================================== [ 13.724750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.725001] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.725355] [ 13.725538] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.725590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.725602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.725624] Call Trace: [ 13.725640] <TASK> [ 13.725668] dump_stack_lvl+0x73/0xb0 [ 13.725693] print_report+0xd1/0x650 [ 13.725719] ? __virt_addr_valid+0x1db/0x2d0 [ 13.725741] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.725777] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.725803] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.725827] kasan_report+0x141/0x180 [ 13.725864] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.725893] __asan_report_store4_noabort+0x1b/0x30 [ 13.725916] kasan_atomics_helper+0x4b6e/0x5450 [ 13.725940] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.725964] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.725997] ? kasan_atomics+0x152/0x310 [ 13.726022] kasan_atomics+0x1dc/0x310 [ 13.726044] ? __pfx_kasan_atomics+0x10/0x10 [ 13.726076] ? __pfx_read_tsc+0x10/0x10 [ 13.726097] ? ktime_get_ts64+0x86/0x230 [ 13.726124] kunit_try_run_case+0x1a5/0x480 [ 13.726149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.726173] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.726206] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.726247] ? __kthread_parkme+0x82/0x180 [ 13.726270] ? preempt_count_sub+0x50/0x80 [ 13.726341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.726369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.726394] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.726419] kthread+0x337/0x6f0 [ 13.726438] ? trace_preempt_on+0x20/0xc0 [ 13.726464] ? __pfx_kthread+0x10/0x10 [ 13.726484] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.726508] ? calculate_sigpending+0x7b/0xa0 [ 13.726531] ? __pfx_kthread+0x10/0x10 [ 13.726562] ret_from_fork+0x41/0x80 [ 13.726585] ? __pfx_kthread+0x10/0x10 [ 13.726605] ret_from_fork_asm+0x1a/0x30 [ 13.726647] </TASK> [ 13.726660] [ 13.735968] Allocated by task 284: [ 13.736156] kasan_save_stack+0x45/0x70 [ 13.736469] kasan_save_track+0x18/0x40 [ 13.736869] kasan_save_alloc_info+0x3b/0x50 [ 13.737085] __kasan_kmalloc+0xb7/0xc0 [ 13.737327] __kmalloc_cache_noprof+0x189/0x420 [ 13.737612] kasan_atomics+0x95/0x310 [ 13.737827] kunit_try_run_case+0x1a5/0x480 [ 13.738019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.738200] kthread+0x337/0x6f0 [ 13.738332] ret_from_fork+0x41/0x80 [ 13.738513] ret_from_fork_asm+0x1a/0x30 [ 13.738793] [ 13.738891] The buggy address belongs to the object at ffff8881039f4880 [ 13.738891] which belongs to the cache kmalloc-64 of size 64 [ 13.739290] The buggy address is located 0 bytes to the right of [ 13.739290] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.740554] [ 13.740670] The buggy address belongs to the physical page: [ 13.740848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.741471] flags: 0x200000000000000(node=0|zone=2) [ 13.741659] page_type: f5(slab) [ 13.741838] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.742256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.742623] page dumped because: kasan: bad access detected [ 13.742922] [ 13.743020] Memory state around the buggy address: [ 13.743188] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.743485] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.743924] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.744236] ^ [ 13.744531] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.744904] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.745518] ================================================================== [ 14.321463] ================================================================== [ 14.321800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.322088] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.322461] [ 14.322596] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.322643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.322656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.322678] Call Trace: [ 14.322697] <TASK> [ 14.322716] dump_stack_lvl+0x73/0xb0 [ 14.322742] print_report+0xd1/0x650 [ 14.322765] ? __virt_addr_valid+0x1db/0x2d0 [ 14.322789] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.322811] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.322836] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.322860] kasan_report+0x141/0x180 [ 14.322883] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.322911] __asan_report_load4_noabort+0x18/0x20 [ 14.322933] kasan_atomics_helper+0x4a02/0x5450 [ 14.322958] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.322982] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.323005] ? kasan_atomics+0x152/0x310 [ 14.323030] kasan_atomics+0x1dc/0x310 [ 14.323050] ? __pfx_kasan_atomics+0x10/0x10 [ 14.323072] ? __pfx_read_tsc+0x10/0x10 [ 14.323094] ? ktime_get_ts64+0x86/0x230 [ 14.323120] kunit_try_run_case+0x1a5/0x480 [ 14.323146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.323171] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.323197] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.323222] ? __kthread_parkme+0x82/0x180 [ 14.323258] ? preempt_count_sub+0x50/0x80 [ 14.323285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.323310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.323333] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.323359] kthread+0x337/0x6f0 [ 14.323377] ? trace_preempt_on+0x20/0xc0 [ 14.323403] ? __pfx_kthread+0x10/0x10 [ 14.323422] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.323446] ? calculate_sigpending+0x7b/0xa0 [ 14.323469] ? __pfx_kthread+0x10/0x10 [ 14.323489] ret_from_fork+0x41/0x80 [ 14.323510] ? __pfx_kthread+0x10/0x10 [ 14.323530] ret_from_fork_asm+0x1a/0x30 [ 14.323561] </TASK> [ 14.323573] [ 14.330672] Allocated by task 284: [ 14.330858] kasan_save_stack+0x45/0x70 [ 14.331062] kasan_save_track+0x18/0x40 [ 14.331269] kasan_save_alloc_info+0x3b/0x50 [ 14.331478] __kasan_kmalloc+0xb7/0xc0 [ 14.331693] __kmalloc_cache_noprof+0x189/0x420 [ 14.331861] kasan_atomics+0x95/0x310 [ 14.331990] kunit_try_run_case+0x1a5/0x480 [ 14.332137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.332323] kthread+0x337/0x6f0 [ 14.332459] ret_from_fork+0x41/0x80 [ 14.332646] ret_from_fork_asm+0x1a/0x30 [ 14.332852] [ 14.332949] The buggy address belongs to the object at ffff8881039f4880 [ 14.332949] which belongs to the cache kmalloc-64 of size 64 [ 14.333504] The buggy address is located 0 bytes to the right of [ 14.333504] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.334045] [ 14.334149] The buggy address belongs to the physical page: [ 14.334369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.334757] flags: 0x200000000000000(node=0|zone=2) [ 14.334971] page_type: f5(slab) [ 14.335146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.335472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.335816] page dumped because: kasan: bad access detected [ 14.336039] [ 14.336136] Memory state around the buggy address: [ 14.336357] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.336645] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.336933] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.337221] ^ [ 14.337430] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.337763] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.338028] ================================================================== [ 13.882728] ================================================================== [ 13.883206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 13.883683] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.884146] [ 13.884343] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.884417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.884431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.884453] Call Trace: [ 13.884469] <TASK> [ 13.884523] dump_stack_lvl+0x73/0xb0 [ 13.884549] print_report+0xd1/0x650 [ 13.884572] ? __virt_addr_valid+0x1db/0x2d0 [ 13.884601] ? kasan_atomics_helper+0x697/0x5450 [ 13.884624] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.884657] ? kasan_atomics_helper+0x697/0x5450 [ 13.884682] kasan_report+0x141/0x180 [ 13.884707] ? kasan_atomics_helper+0x697/0x5450 [ 13.884736] kasan_check_range+0x10c/0x1c0 [ 13.884757] __kasan_check_write+0x18/0x20 [ 13.884777] kasan_atomics_helper+0x697/0x5450 [ 13.884802] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.884825] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.884850] ? kasan_atomics+0x152/0x310 [ 13.884874] kasan_atomics+0x1dc/0x310 [ 13.884895] ? __pfx_kasan_atomics+0x10/0x10 [ 13.884917] ? __pfx_read_tsc+0x10/0x10 [ 13.884938] ? ktime_get_ts64+0x86/0x230 [ 13.884964] kunit_try_run_case+0x1a5/0x480 [ 13.884990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.885014] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.885039] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.885064] ? __kthread_parkme+0x82/0x180 [ 13.885087] ? preempt_count_sub+0x50/0x80 [ 13.885113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.885139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.885164] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.885189] kthread+0x337/0x6f0 [ 13.885207] ? trace_preempt_on+0x20/0xc0 [ 13.885240] ? __pfx_kthread+0x10/0x10 [ 13.885260] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.885311] ? calculate_sigpending+0x7b/0xa0 [ 13.885335] ? __pfx_kthread+0x10/0x10 [ 13.885355] ret_from_fork+0x41/0x80 [ 13.885387] ? __pfx_kthread+0x10/0x10 [ 13.885407] ret_from_fork_asm+0x1a/0x30 [ 13.885438] </TASK> [ 13.885448] [ 13.895179] Allocated by task 284: [ 13.895533] kasan_save_stack+0x45/0x70 [ 13.895856] kasan_save_track+0x18/0x40 [ 13.896032] kasan_save_alloc_info+0x3b/0x50 [ 13.896175] __kasan_kmalloc+0xb7/0xc0 [ 13.896318] __kmalloc_cache_noprof+0x189/0x420 [ 13.896469] kasan_atomics+0x95/0x310 [ 13.896852] kunit_try_run_case+0x1a5/0x480 [ 13.897400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.897951] kthread+0x337/0x6f0 [ 13.898203] ret_from_fork+0x41/0x80 [ 13.898697] ret_from_fork_asm+0x1a/0x30 [ 13.898915] [ 13.899063] The buggy address belongs to the object at ffff8881039f4880 [ 13.899063] which belongs to the cache kmalloc-64 of size 64 [ 13.899815] The buggy address is located 0 bytes to the right of [ 13.899815] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.900170] [ 13.900603] The buggy address belongs to the physical page: [ 13.901189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.901923] flags: 0x200000000000000(node=0|zone=2) [ 13.902161] page_type: f5(slab) [ 13.902361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.903215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.903788] page dumped because: kasan: bad access detected [ 13.904267] [ 13.904697] Memory state around the buggy address: [ 13.905072] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.905974] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.906444] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.907101] ^ [ 13.907377] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.907705] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.907996] ================================================================== [ 14.363472] ================================================================== [ 14.364173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.364891] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.365567] [ 14.365792] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.365852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.365865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.365890] Call Trace: [ 14.365909] <TASK> [ 14.365941] dump_stack_lvl+0x73/0xb0 [ 14.365973] print_report+0xd1/0x650 [ 14.365999] ? __virt_addr_valid+0x1db/0x2d0 [ 14.366022] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.366046] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.366071] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.366095] kasan_report+0x141/0x180 [ 14.366119] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.366147] __asan_report_load4_noabort+0x18/0x20 [ 14.366169] kasan_atomics_helper+0x49e8/0x5450 [ 14.366194] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.366218] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.366251] ? kasan_atomics+0x152/0x310 [ 14.366275] kasan_atomics+0x1dc/0x310 [ 14.366296] ? __pfx_kasan_atomics+0x10/0x10 [ 14.366317] ? __pfx_read_tsc+0x10/0x10 [ 14.366340] ? ktime_get_ts64+0x86/0x230 [ 14.366366] kunit_try_run_case+0x1a5/0x480 [ 14.366392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.366415] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.366441] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.366466] ? __kthread_parkme+0x82/0x180 [ 14.366489] ? preempt_count_sub+0x50/0x80 [ 14.366516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.366541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.366566] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.366590] kthread+0x337/0x6f0 [ 14.366608] ? trace_preempt_on+0x20/0xc0 [ 14.366653] ? __pfx_kthread+0x10/0x10 [ 14.366673] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.366696] ? calculate_sigpending+0x7b/0xa0 [ 14.366720] ? __pfx_kthread+0x10/0x10 [ 14.366740] ret_from_fork+0x41/0x80 [ 14.366762] ? __pfx_kthread+0x10/0x10 [ 14.366781] ret_from_fork_asm+0x1a/0x30 [ 14.366813] </TASK> [ 14.366825] [ 14.379222] Allocated by task 284: [ 14.379568] kasan_save_stack+0x45/0x70 [ 14.380097] kasan_save_track+0x18/0x40 [ 14.380392] kasan_save_alloc_info+0x3b/0x50 [ 14.380602] __kasan_kmalloc+0xb7/0xc0 [ 14.381019] __kmalloc_cache_noprof+0x189/0x420 [ 14.381354] kasan_atomics+0x95/0x310 [ 14.381487] kunit_try_run_case+0x1a5/0x480 [ 14.381642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.381819] kthread+0x337/0x6f0 [ 14.381939] ret_from_fork+0x41/0x80 [ 14.382076] ret_from_fork_asm+0x1a/0x30 [ 14.382217] [ 14.382305] The buggy address belongs to the object at ffff8881039f4880 [ 14.382305] which belongs to the cache kmalloc-64 of size 64 [ 14.382811] The buggy address is located 0 bytes to the right of [ 14.382811] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.383349] [ 14.383535] The buggy address belongs to the physical page: [ 14.383788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.384036] flags: 0x200000000000000(node=0|zone=2) [ 14.384386] page_type: f5(slab) [ 14.384572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.385049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.385330] page dumped because: kasan: bad access detected [ 14.385613] [ 14.385744] Memory state around the buggy address: [ 14.385970] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.386299] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.386614] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.386953] ^ [ 14.387159] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.387446] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.387696] ================================================================== [ 14.599692] ================================================================== [ 14.600330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.600580] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.601113] [ 14.601235] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.601282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.601295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.601328] Call Trace: [ 14.601344] <TASK> [ 14.601362] dump_stack_lvl+0x73/0xb0 [ 14.601388] print_report+0xd1/0x650 [ 14.601423] ? __virt_addr_valid+0x1db/0x2d0 [ 14.601445] ? kasan_atomics_helper+0x1818/0x5450 [ 14.601469] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.601492] ? kasan_atomics_helper+0x1818/0x5450 [ 14.601517] kasan_report+0x141/0x180 [ 14.601541] ? kasan_atomics_helper+0x1818/0x5450 [ 14.601573] kasan_check_range+0x10c/0x1c0 [ 14.601594] __kasan_check_write+0x18/0x20 [ 14.601616] kasan_atomics_helper+0x1818/0x5450 [ 14.601641] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.601665] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.601687] ? kasan_atomics+0x152/0x310 [ 14.601721] kasan_atomics+0x1dc/0x310 [ 14.601741] ? __pfx_kasan_atomics+0x10/0x10 [ 14.601764] ? __pfx_read_tsc+0x10/0x10 [ 14.601796] ? ktime_get_ts64+0x86/0x230 [ 14.601822] kunit_try_run_case+0x1a5/0x480 [ 14.601847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.601870] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.601896] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.601922] ? __kthread_parkme+0x82/0x180 [ 14.601945] ? preempt_count_sub+0x50/0x80 [ 14.601972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.601997] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.602021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.602045] kthread+0x337/0x6f0 [ 14.602064] ? trace_preempt_on+0x20/0xc0 [ 14.602089] ? __pfx_kthread+0x10/0x10 [ 14.602108] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.602131] ? calculate_sigpending+0x7b/0xa0 [ 14.602154] ? __pfx_kthread+0x10/0x10 [ 14.602174] ret_from_fork+0x41/0x80 [ 14.602195] ? __pfx_kthread+0x10/0x10 [ 14.602217] ret_from_fork_asm+0x1a/0x30 [ 14.602256] </TASK> [ 14.602267] [ 14.610193] Allocated by task 284: [ 14.610422] kasan_save_stack+0x45/0x70 [ 14.610633] kasan_save_track+0x18/0x40 [ 14.610853] kasan_save_alloc_info+0x3b/0x50 [ 14.611063] __kasan_kmalloc+0xb7/0xc0 [ 14.611284] __kmalloc_cache_noprof+0x189/0x420 [ 14.611462] kasan_atomics+0x95/0x310 [ 14.611595] kunit_try_run_case+0x1a5/0x480 [ 14.611744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.612112] kthread+0x337/0x6f0 [ 14.612317] ret_from_fork+0x41/0x80 [ 14.612508] ret_from_fork_asm+0x1a/0x30 [ 14.612707] [ 14.612807] The buggy address belongs to the object at ffff8881039f4880 [ 14.612807] which belongs to the cache kmalloc-64 of size 64 [ 14.613232] The buggy address is located 0 bytes to the right of [ 14.613232] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.613826] [ 14.613924] The buggy address belongs to the physical page: [ 14.614179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.614531] flags: 0x200000000000000(node=0|zone=2) [ 14.614767] page_type: f5(slab) [ 14.614927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.615241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.615539] page dumped because: kasan: bad access detected [ 14.615775] [ 14.615847] Memory state around the buggy address: [ 14.616074] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.616367] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.616638] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.616993] ^ [ 14.617217] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.617552] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.617868] ================================================================== [ 13.702965] ================================================================== [ 13.703288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.703725] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.704013] [ 13.704143] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.704188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.704200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.704222] Call Trace: [ 13.704247] <TASK> [ 13.704261] dump_stack_lvl+0x73/0xb0 [ 13.704284] print_report+0xd1/0x650 [ 13.704308] ? __virt_addr_valid+0x1db/0x2d0 [ 13.704329] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.704352] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.704375] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.704397] kasan_report+0x141/0x180 [ 13.704430] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.704457] __asan_report_load4_noabort+0x18/0x20 [ 13.704480] kasan_atomics_helper+0x4b88/0x5450 [ 13.704622] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.704715] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.704764] ? kasan_atomics+0x152/0x310 [ 13.704790] kasan_atomics+0x1dc/0x310 [ 13.704811] ? __pfx_kasan_atomics+0x10/0x10 [ 13.704834] ? __pfx_read_tsc+0x10/0x10 [ 13.704855] ? ktime_get_ts64+0x86/0x230 [ 13.704881] kunit_try_run_case+0x1a5/0x480 [ 13.704907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.704931] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.704955] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.704981] ? __kthread_parkme+0x82/0x180 [ 13.705004] ? preempt_count_sub+0x50/0x80 [ 13.705032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.705060] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.705086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.705111] kthread+0x337/0x6f0 [ 13.705131] ? trace_preempt_on+0x20/0xc0 [ 13.705156] ? __pfx_kthread+0x10/0x10 [ 13.705178] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.705203] ? calculate_sigpending+0x7b/0xa0 [ 13.705242] ? __pfx_kthread+0x10/0x10 [ 13.705264] ret_from_fork+0x41/0x80 [ 13.705334] ? __pfx_kthread+0x10/0x10 [ 13.705357] ret_from_fork_asm+0x1a/0x30 [ 13.705389] </TASK> [ 13.705402] [ 13.714378] Allocated by task 284: [ 13.714632] kasan_save_stack+0x45/0x70 [ 13.714843] kasan_save_track+0x18/0x40 [ 13.715037] kasan_save_alloc_info+0x3b/0x50 [ 13.715257] __kasan_kmalloc+0xb7/0xc0 [ 13.715434] __kmalloc_cache_noprof+0x189/0x420 [ 13.715751] kasan_atomics+0x95/0x310 [ 13.715919] kunit_try_run_case+0x1a5/0x480 [ 13.716132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.716564] kthread+0x337/0x6f0 [ 13.716767] ret_from_fork+0x41/0x80 [ 13.716938] ret_from_fork_asm+0x1a/0x30 [ 13.717145] [ 13.717219] The buggy address belongs to the object at ffff8881039f4880 [ 13.717219] which belongs to the cache kmalloc-64 of size 64 [ 13.717594] The buggy address is located 0 bytes to the right of [ 13.717594] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.718596] [ 13.718753] The buggy address belongs to the physical page: [ 13.718932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.719224] flags: 0x200000000000000(node=0|zone=2) [ 13.719788] page_type: f5(slab) [ 13.719981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.720309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.720595] page dumped because: kasan: bad access detected [ 13.721091] [ 13.721199] Memory state around the buggy address: [ 13.721615] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.721986] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.722206] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.722602] ^ [ 13.722805] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.723171] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.723409] ================================================================== [ 13.996062] ================================================================== [ 13.996747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 13.997168] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.997669] [ 13.997886] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.997936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.997950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.997972] Call Trace: [ 13.997986] <TASK> [ 13.998095] dump_stack_lvl+0x73/0xb0 [ 13.998127] print_report+0xd1/0x650 [ 13.998151] ? __virt_addr_valid+0x1db/0x2d0 [ 13.998174] ? kasan_atomics_helper+0x992/0x5450 [ 13.998196] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.998220] ? kasan_atomics_helper+0x992/0x5450 [ 13.998253] kasan_report+0x141/0x180 [ 13.998278] ? kasan_atomics_helper+0x992/0x5450 [ 13.998307] kasan_check_range+0x10c/0x1c0 [ 13.998328] __kasan_check_write+0x18/0x20 [ 13.998350] kasan_atomics_helper+0x992/0x5450 [ 13.998376] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.998399] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.998425] ? kasan_atomics+0x152/0x310 [ 13.998449] kasan_atomics+0x1dc/0x310 [ 13.998470] ? __pfx_kasan_atomics+0x10/0x10 [ 13.998492] ? __pfx_read_tsc+0x10/0x10 [ 13.998513] ? ktime_get_ts64+0x86/0x230 [ 13.998540] kunit_try_run_case+0x1a5/0x480 [ 13.998566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.998590] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.998614] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.998664] ? __kthread_parkme+0x82/0x180 [ 13.998688] ? preempt_count_sub+0x50/0x80 [ 13.998714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.998740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.998765] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.998790] kthread+0x337/0x6f0 [ 13.998808] ? trace_preempt_on+0x20/0xc0 [ 13.998833] ? __pfx_kthread+0x10/0x10 [ 13.998853] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.998876] ? calculate_sigpending+0x7b/0xa0 [ 13.998900] ? __pfx_kthread+0x10/0x10 [ 13.998921] ret_from_fork+0x41/0x80 [ 13.998943] ? __pfx_kthread+0x10/0x10 [ 13.998963] ret_from_fork_asm+0x1a/0x30 [ 13.998995] </TASK> [ 13.999007] [ 14.009520] Allocated by task 284: [ 14.009869] kasan_save_stack+0x45/0x70 [ 14.010158] kasan_save_track+0x18/0x40 [ 14.010327] kasan_save_alloc_info+0x3b/0x50 [ 14.010669] __kasan_kmalloc+0xb7/0xc0 [ 14.010944] __kmalloc_cache_noprof+0x189/0x420 [ 14.011266] kasan_atomics+0x95/0x310 [ 14.011451] kunit_try_run_case+0x1a5/0x480 [ 14.011788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.012128] kthread+0x337/0x6f0 [ 14.012402] ret_from_fork+0x41/0x80 [ 14.012556] ret_from_fork_asm+0x1a/0x30 [ 14.012931] [ 14.013017] The buggy address belongs to the object at ffff8881039f4880 [ 14.013017] which belongs to the cache kmalloc-64 of size 64 [ 14.013583] The buggy address is located 0 bytes to the right of [ 14.013583] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.014449] [ 14.014559] The buggy address belongs to the physical page: [ 14.014954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.015392] flags: 0x200000000000000(node=0|zone=2) [ 14.015631] page_type: f5(slab) [ 14.015963] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.016393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.016828] page dumped because: kasan: bad access detected [ 14.017063] [ 14.017309] Memory state around the buggy address: [ 14.017517] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.018034] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.018455] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.018930] ^ [ 14.019265] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.019684] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.020126] ================================================================== [ 14.124431] ================================================================== [ 14.124732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.125553] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.126029] [ 14.126210] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.126335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.126350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.126430] Call Trace: [ 14.126448] <TASK> [ 14.126466] dump_stack_lvl+0x73/0xb0 [ 14.126492] print_report+0xd1/0x650 [ 14.126516] ? __virt_addr_valid+0x1db/0x2d0 [ 14.126538] ? kasan_atomics_helper+0xd47/0x5450 [ 14.126561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.126586] ? kasan_atomics_helper+0xd47/0x5450 [ 14.126609] kasan_report+0x141/0x180 [ 14.126633] ? kasan_atomics_helper+0xd47/0x5450 [ 14.126661] kasan_check_range+0x10c/0x1c0 [ 14.126683] __kasan_check_write+0x18/0x20 [ 14.126704] kasan_atomics_helper+0xd47/0x5450 [ 14.126728] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.126753] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.126776] ? kasan_atomics+0x152/0x310 [ 14.126800] kasan_atomics+0x1dc/0x310 [ 14.126821] ? __pfx_kasan_atomics+0x10/0x10 [ 14.126844] ? __pfx_read_tsc+0x10/0x10 [ 14.126864] ? ktime_get_ts64+0x86/0x230 [ 14.126890] kunit_try_run_case+0x1a5/0x480 [ 14.126915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.126938] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.126963] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.126988] ? __kthread_parkme+0x82/0x180 [ 14.127010] ? preempt_count_sub+0x50/0x80 [ 14.127036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.127061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.127085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.127110] kthread+0x337/0x6f0 [ 14.127129] ? trace_preempt_on+0x20/0xc0 [ 14.127153] ? __pfx_kthread+0x10/0x10 [ 14.127172] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.127195] ? calculate_sigpending+0x7b/0xa0 [ 14.127217] ? __pfx_kthread+0x10/0x10 [ 14.127250] ret_from_fork+0x41/0x80 [ 14.127272] ? __pfx_kthread+0x10/0x10 [ 14.127292] ret_from_fork_asm+0x1a/0x30 [ 14.127323] </TASK> [ 14.127334] [ 14.137192] Allocated by task 284: [ 14.137365] kasan_save_stack+0x45/0x70 [ 14.137744] kasan_save_track+0x18/0x40 [ 14.137927] kasan_save_alloc_info+0x3b/0x50 [ 14.138282] __kasan_kmalloc+0xb7/0xc0 [ 14.138534] __kmalloc_cache_noprof+0x189/0x420 [ 14.138755] kasan_atomics+0x95/0x310 [ 14.138948] kunit_try_run_case+0x1a5/0x480 [ 14.139297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.139629] kthread+0x337/0x6f0 [ 14.139845] ret_from_fork+0x41/0x80 [ 14.140036] ret_from_fork_asm+0x1a/0x30 [ 14.140296] [ 14.140401] The buggy address belongs to the object at ffff8881039f4880 [ 14.140401] which belongs to the cache kmalloc-64 of size 64 [ 14.141097] The buggy address is located 0 bytes to the right of [ 14.141097] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.141659] [ 14.141840] The buggy address belongs to the physical page: [ 14.142205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.142626] flags: 0x200000000000000(node=0|zone=2) [ 14.142826] page_type: f5(slab) [ 14.143109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.143496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.143840] page dumped because: kasan: bad access detected [ 14.144124] [ 14.144224] Memory state around the buggy address: [ 14.144424] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.144962] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.145331] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.145747] ^ [ 14.146045] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.146427] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.146870] ================================================================== [ 14.644483] ================================================================== [ 14.645174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.645905] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.646578] [ 14.646802] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.646853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.646867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.646891] Call Trace: [ 14.646922] <TASK> [ 14.646944] dump_stack_lvl+0x73/0xb0 [ 14.646972] print_report+0xd1/0x650 [ 14.647010] ? __virt_addr_valid+0x1db/0x2d0 [ 14.647034] ? kasan_atomics_helper+0x194a/0x5450 [ 14.647058] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.647084] ? kasan_atomics_helper+0x194a/0x5450 [ 14.647108] kasan_report+0x141/0x180 [ 14.647132] ? kasan_atomics_helper+0x194a/0x5450 [ 14.647160] kasan_check_range+0x10c/0x1c0 [ 14.647182] __kasan_check_write+0x18/0x20 [ 14.647203] kasan_atomics_helper+0x194a/0x5450 [ 14.647236] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.647260] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.647284] ? kasan_atomics+0x152/0x310 [ 14.647309] kasan_atomics+0x1dc/0x310 [ 14.647331] ? __pfx_kasan_atomics+0x10/0x10 [ 14.647356] ? __pfx_read_tsc+0x10/0x10 [ 14.647378] ? ktime_get_ts64+0x86/0x230 [ 14.647405] kunit_try_run_case+0x1a5/0x480 [ 14.647432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.647454] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.647480] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.647506] ? __kthread_parkme+0x82/0x180 [ 14.647530] ? preempt_count_sub+0x50/0x80 [ 14.647556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.647581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.647605] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.647649] kthread+0x337/0x6f0 [ 14.647668] ? trace_preempt_on+0x20/0xc0 [ 14.647693] ? __pfx_kthread+0x10/0x10 [ 14.647713] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.647736] ? calculate_sigpending+0x7b/0xa0 [ 14.647759] ? __pfx_kthread+0x10/0x10 [ 14.647779] ret_from_fork+0x41/0x80 [ 14.647800] ? __pfx_kthread+0x10/0x10 [ 14.647819] ret_from_fork_asm+0x1a/0x30 [ 14.647852] </TASK> [ 14.647864] [ 14.656521] Allocated by task 284: [ 14.656737] kasan_save_stack+0x45/0x70 [ 14.656944] kasan_save_track+0x18/0x40 [ 14.657116] kasan_save_alloc_info+0x3b/0x50 [ 14.657350] __kasan_kmalloc+0xb7/0xc0 [ 14.657485] __kmalloc_cache_noprof+0x189/0x420 [ 14.657673] kasan_atomics+0x95/0x310 [ 14.657808] kunit_try_run_case+0x1a5/0x480 [ 14.658049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.658313] kthread+0x337/0x6f0 [ 14.658481] ret_from_fork+0x41/0x80 [ 14.658694] ret_from_fork_asm+0x1a/0x30 [ 14.658895] [ 14.658996] The buggy address belongs to the object at ffff8881039f4880 [ 14.658996] which belongs to the cache kmalloc-64 of size 64 [ 14.659479] The buggy address is located 0 bytes to the right of [ 14.659479] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.660014] [ 14.660090] The buggy address belongs to the physical page: [ 14.660353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.660735] flags: 0x200000000000000(node=0|zone=2) [ 14.660954] page_type: f5(slab) [ 14.661144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.661480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.661823] page dumped because: kasan: bad access detected [ 14.662079] [ 14.662176] Memory state around the buggy address: [ 14.662395] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.662727] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.663034] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.663299] ^ [ 14.663458] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.663726] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.664058] ================================================================== [ 14.542850] ================================================================== [ 14.543335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.543742] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.544064] [ 14.544165] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.544212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.544238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.544262] Call Trace: [ 14.544283] <TASK> [ 14.544302] dump_stack_lvl+0x73/0xb0 [ 14.544329] print_report+0xd1/0x650 [ 14.544353] ? __virt_addr_valid+0x1db/0x2d0 [ 14.544377] ? kasan_atomics_helper+0x164f/0x5450 [ 14.544400] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.544424] ? kasan_atomics_helper+0x164f/0x5450 [ 14.544450] kasan_report+0x141/0x180 [ 14.544473] ? kasan_atomics_helper+0x164f/0x5450 [ 14.544501] kasan_check_range+0x10c/0x1c0 [ 14.544523] __kasan_check_write+0x18/0x20 [ 14.544544] kasan_atomics_helper+0x164f/0x5450 [ 14.544568] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.544593] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.544617] ? kasan_atomics+0x152/0x310 [ 14.544642] kasan_atomics+0x1dc/0x310 [ 14.544664] ? __pfx_kasan_atomics+0x10/0x10 [ 14.544688] ? __pfx_read_tsc+0x10/0x10 [ 14.544709] ? ktime_get_ts64+0x86/0x230 [ 14.544735] kunit_try_run_case+0x1a5/0x480 [ 14.544761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.544786] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.544811] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.544837] ? __kthread_parkme+0x82/0x180 [ 14.544861] ? preempt_count_sub+0x50/0x80 [ 14.544887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.544912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.544937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.544963] kthread+0x337/0x6f0 [ 14.544981] ? trace_preempt_on+0x20/0xc0 [ 14.545006] ? __pfx_kthread+0x10/0x10 [ 14.545026] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.545052] ? calculate_sigpending+0x7b/0xa0 [ 14.545075] ? __pfx_kthread+0x10/0x10 [ 14.545095] ret_from_fork+0x41/0x80 [ 14.545129] ? __pfx_kthread+0x10/0x10 [ 14.545149] ret_from_fork_asm+0x1a/0x30 [ 14.545181] </TASK> [ 14.545205] [ 14.552893] Allocated by task 284: [ 14.553085] kasan_save_stack+0x45/0x70 [ 14.553363] kasan_save_track+0x18/0x40 [ 14.553500] kasan_save_alloc_info+0x3b/0x50 [ 14.553655] __kasan_kmalloc+0xb7/0xc0 [ 14.553789] __kmalloc_cache_noprof+0x189/0x420 [ 14.553942] kasan_atomics+0x95/0x310 [ 14.554073] kunit_try_run_case+0x1a5/0x480 [ 14.554220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.554485] kthread+0x337/0x6f0 [ 14.554666] ret_from_fork+0x41/0x80 [ 14.554858] ret_from_fork_asm+0x1a/0x30 [ 14.555060] [ 14.555159] The buggy address belongs to the object at ffff8881039f4880 [ 14.555159] which belongs to the cache kmalloc-64 of size 64 [ 14.555834] The buggy address is located 0 bytes to the right of [ 14.555834] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.556429] [ 14.556556] The buggy address belongs to the physical page: [ 14.556815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.557058] flags: 0x200000000000000(node=0|zone=2) [ 14.557233] page_type: f5(slab) [ 14.557384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.557877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.558218] page dumped because: kasan: bad access detected [ 14.558476] [ 14.558598] Memory state around the buggy address: [ 14.558797] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.559105] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.559412] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.559756] ^ [ 14.559993] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.560307] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.560594] ================================================================== [ 13.671766] ================================================================== [ 13.672475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.672856] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.673338] [ 13.673523] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.673637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.673661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.673683] Call Trace: [ 13.673694] <TASK> [ 13.673715] dump_stack_lvl+0x73/0xb0 [ 13.673740] print_report+0xd1/0x650 [ 13.673763] ? __virt_addr_valid+0x1db/0x2d0 [ 13.673784] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.673806] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.673829] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.673853] kasan_report+0x141/0x180 [ 13.673876] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.673903] __asan_report_store4_noabort+0x1b/0x30 [ 13.673924] kasan_atomics_helper+0x4ba2/0x5450 [ 13.673948] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.673972] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.673994] ? kasan_atomics+0x152/0x310 [ 13.674017] kasan_atomics+0x1dc/0x310 [ 13.674037] ? __pfx_kasan_atomics+0x10/0x10 [ 13.674058] ? __pfx_read_tsc+0x10/0x10 [ 13.674077] ? ktime_get_ts64+0x86/0x230 [ 13.674102] kunit_try_run_case+0x1a5/0x480 [ 13.674127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.674149] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.674173] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.674197] ? __kthread_parkme+0x82/0x180 [ 13.674219] ? preempt_count_sub+0x50/0x80 [ 13.674253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.674395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.674429] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.674453] kthread+0x337/0x6f0 [ 13.674470] ? trace_preempt_on+0x20/0xc0 [ 13.674494] ? __pfx_kthread+0x10/0x10 [ 13.674513] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.674535] ? calculate_sigpending+0x7b/0xa0 [ 13.674557] ? __pfx_kthread+0x10/0x10 [ 13.674576] ret_from_fork+0x41/0x80 [ 13.674597] ? __pfx_kthread+0x10/0x10 [ 13.674616] ret_from_fork_asm+0x1a/0x30 [ 13.674646] </TASK> [ 13.674657] [ 13.688472] Allocated by task 284: [ 13.688896] kasan_save_stack+0x45/0x70 [ 13.689356] kasan_save_track+0x18/0x40 [ 13.689665] kasan_save_alloc_info+0x3b/0x50 [ 13.689975] __kasan_kmalloc+0xb7/0xc0 [ 13.690112] __kmalloc_cache_noprof+0x189/0x420 [ 13.690329] kasan_atomics+0x95/0x310 [ 13.690712] kunit_try_run_case+0x1a5/0x480 [ 13.691273] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.691960] kthread+0x337/0x6f0 [ 13.692335] ret_from_fork+0x41/0x80 [ 13.692563] ret_from_fork_asm+0x1a/0x30 [ 13.692816] [ 13.692996] The buggy address belongs to the object at ffff8881039f4880 [ 13.692996] which belongs to the cache kmalloc-64 of size 64 [ 13.694134] The buggy address is located 0 bytes to the right of [ 13.694134] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.694983] [ 13.695101] The buggy address belongs to the physical page: [ 13.695758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.696522] flags: 0x200000000000000(node=0|zone=2) [ 13.696713] page_type: f5(slab) [ 13.697030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.698000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.698246] page dumped because: kasan: bad access detected [ 13.698934] [ 13.699127] Memory state around the buggy address: [ 13.699702] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.700376] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.700746] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.701076] ^ [ 13.701310] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.701653] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.701999] ================================================================== [ 13.839400] ================================================================== [ 13.839960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 13.840344] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.840627] [ 13.840887] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.840949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.840963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.840986] Call Trace: [ 13.840999] <TASK> [ 13.841014] dump_stack_lvl+0x73/0xb0 [ 13.841041] print_report+0xd1/0x650 [ 13.841065] ? __virt_addr_valid+0x1db/0x2d0 [ 13.841088] ? kasan_atomics_helper+0x565/0x5450 [ 13.841111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.841137] ? kasan_atomics_helper+0x565/0x5450 [ 13.841161] kasan_report+0x141/0x180 [ 13.841214] ? kasan_atomics_helper+0x565/0x5450 [ 13.841259] kasan_check_range+0x10c/0x1c0 [ 13.841297] __kasan_check_write+0x18/0x20 [ 13.841372] kasan_atomics_helper+0x565/0x5450 [ 13.841414] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.841438] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.841462] ? kasan_atomics+0x152/0x310 [ 13.841487] kasan_atomics+0x1dc/0x310 [ 13.841507] ? __pfx_kasan_atomics+0x10/0x10 [ 13.841530] ? __pfx_read_tsc+0x10/0x10 [ 13.841556] ? ktime_get_ts64+0x86/0x230 [ 13.841582] kunit_try_run_case+0x1a5/0x480 [ 13.841606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.841630] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.841663] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.841689] ? __kthread_parkme+0x82/0x180 [ 13.841713] ? preempt_count_sub+0x50/0x80 [ 13.841739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.841764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.841788] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.841813] kthread+0x337/0x6f0 [ 13.841831] ? trace_preempt_on+0x20/0xc0 [ 13.841856] ? __pfx_kthread+0x10/0x10 [ 13.841875] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.841900] ? calculate_sigpending+0x7b/0xa0 [ 13.841923] ? __pfx_kthread+0x10/0x10 [ 13.841943] ret_from_fork+0x41/0x80 [ 13.841965] ? __pfx_kthread+0x10/0x10 [ 13.841984] ret_from_fork_asm+0x1a/0x30 [ 13.842015] </TASK> [ 13.842027] [ 13.851393] Allocated by task 284: [ 13.851587] kasan_save_stack+0x45/0x70 [ 13.851736] kasan_save_track+0x18/0x40 [ 13.851998] kasan_save_alloc_info+0x3b/0x50 [ 13.852140] __kasan_kmalloc+0xb7/0xc0 [ 13.852566] __kmalloc_cache_noprof+0x189/0x420 [ 13.852770] kasan_atomics+0x95/0x310 [ 13.852899] kunit_try_run_case+0x1a5/0x480 [ 13.853041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.853211] kthread+0x337/0x6f0 [ 13.853338] ret_from_fork+0x41/0x80 [ 13.853465] ret_from_fork_asm+0x1a/0x30 [ 13.853685] [ 13.853790] The buggy address belongs to the object at ffff8881039f4880 [ 13.853790] which belongs to the cache kmalloc-64 of size 64 [ 13.854534] The buggy address is located 0 bytes to the right of [ 13.854534] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.855378] [ 13.855515] The buggy address belongs to the physical page: [ 13.855866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.856213] flags: 0x200000000000000(node=0|zone=2) [ 13.856543] page_type: f5(slab) [ 13.856844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.857166] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.857403] page dumped because: kasan: bad access detected [ 13.857578] [ 13.857678] Memory state around the buggy address: [ 13.857979] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.858352] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.858876] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.859337] ^ [ 13.859554] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.859996] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.860395] ================================================================== [ 13.791799] ================================================================== [ 13.792532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 13.793029] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.793508] [ 13.793626] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.793726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.793739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.793846] Call Trace: [ 13.793881] <TASK> [ 13.793898] dump_stack_lvl+0x73/0xb0 [ 13.793925] print_report+0xd1/0x650 [ 13.793950] ? __virt_addr_valid+0x1db/0x2d0 [ 13.793973] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.793996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.794020] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.794044] kasan_report+0x141/0x180 [ 13.794068] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.794097] kasan_check_range+0x10c/0x1c0 [ 13.794119] __kasan_check_write+0x18/0x20 [ 13.794141] kasan_atomics_helper+0x4a0/0x5450 [ 13.794205] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.794252] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.794367] ? kasan_atomics+0x152/0x310 [ 13.794399] kasan_atomics+0x1dc/0x310 [ 13.794557] ? __pfx_kasan_atomics+0x10/0x10 [ 13.794586] ? __pfx_read_tsc+0x10/0x10 [ 13.794606] ? ktime_get_ts64+0x86/0x230 [ 13.794633] kunit_try_run_case+0x1a5/0x480 [ 13.794668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.794692] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.794718] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.794743] ? __kthread_parkme+0x82/0x180 [ 13.794765] ? preempt_count_sub+0x50/0x80 [ 13.794792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.794817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.794840] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.794866] kthread+0x337/0x6f0 [ 13.794885] ? trace_preempt_on+0x20/0xc0 [ 13.794910] ? __pfx_kthread+0x10/0x10 [ 13.794930] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.794953] ? calculate_sigpending+0x7b/0xa0 [ 13.794975] ? __pfx_kthread+0x10/0x10 [ 13.794995] ret_from_fork+0x41/0x80 [ 13.795017] ? __pfx_kthread+0x10/0x10 [ 13.795037] ret_from_fork_asm+0x1a/0x30 [ 13.795070] </TASK> [ 13.795082] [ 13.805381] Allocated by task 284: [ 13.805520] kasan_save_stack+0x45/0x70 [ 13.805953] kasan_save_track+0x18/0x40 [ 13.806176] kasan_save_alloc_info+0x3b/0x50 [ 13.806605] __kasan_kmalloc+0xb7/0xc0 [ 13.806869] __kmalloc_cache_noprof+0x189/0x420 [ 13.807175] kasan_atomics+0x95/0x310 [ 13.807509] kunit_try_run_case+0x1a5/0x480 [ 13.807769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.808017] kthread+0x337/0x6f0 [ 13.808141] ret_from_fork+0x41/0x80 [ 13.808400] ret_from_fork_asm+0x1a/0x30 [ 13.808689] [ 13.808790] The buggy address belongs to the object at ffff8881039f4880 [ 13.808790] which belongs to the cache kmalloc-64 of size 64 [ 13.809320] The buggy address is located 0 bytes to the right of [ 13.809320] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.810013] [ 13.810114] The buggy address belongs to the physical page: [ 13.810644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.811072] flags: 0x200000000000000(node=0|zone=2) [ 13.811298] page_type: f5(slab) [ 13.811484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.811990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.812318] page dumped because: kasan: bad access detected [ 13.812544] [ 13.812643] Memory state around the buggy address: [ 13.812823] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.813111] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.813442] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.813840] ^ [ 13.814005] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.814306] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.814852] ================================================================== [ 14.446527] ================================================================== [ 14.446884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.447274] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.447618] [ 14.447752] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.447812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.447826] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.447860] Call Trace: [ 14.447881] <TASK> [ 14.447900] dump_stack_lvl+0x73/0xb0 [ 14.447927] print_report+0xd1/0x650 [ 14.447961] ? __virt_addr_valid+0x1db/0x2d0 [ 14.447985] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.448007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.448042] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.448067] kasan_report+0x141/0x180 [ 14.448091] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.448119] __asan_report_load8_noabort+0x18/0x20 [ 14.448143] kasan_atomics_helper+0x4eae/0x5450 [ 14.448167] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.448191] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.448215] ? kasan_atomics+0x152/0x310 [ 14.448252] kasan_atomics+0x1dc/0x310 [ 14.448273] ? __pfx_kasan_atomics+0x10/0x10 [ 14.448295] ? __pfx_read_tsc+0x10/0x10 [ 14.448316] ? ktime_get_ts64+0x86/0x230 [ 14.448344] kunit_try_run_case+0x1a5/0x480 [ 14.448370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.448403] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.448429] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.448465] ? __kthread_parkme+0x82/0x180 [ 14.448488] ? preempt_count_sub+0x50/0x80 [ 14.448515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.448539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.448572] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.448597] kthread+0x337/0x6f0 [ 14.448615] ? trace_preempt_on+0x20/0xc0 [ 14.448651] ? __pfx_kthread+0x10/0x10 [ 14.448671] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.448693] ? calculate_sigpending+0x7b/0xa0 [ 14.448716] ? __pfx_kthread+0x10/0x10 [ 14.448737] ret_from_fork+0x41/0x80 [ 14.448759] ? __pfx_kthread+0x10/0x10 [ 14.448779] ret_from_fork_asm+0x1a/0x30 [ 14.448811] </TASK> [ 14.448823] [ 14.456602] Allocated by task 284: [ 14.456814] kasan_save_stack+0x45/0x70 [ 14.456995] kasan_save_track+0x18/0x40 [ 14.457129] kasan_save_alloc_info+0x3b/0x50 [ 14.457283] __kasan_kmalloc+0xb7/0xc0 [ 14.457413] __kmalloc_cache_noprof+0x189/0x420 [ 14.457578] kasan_atomics+0x95/0x310 [ 14.457786] kunit_try_run_case+0x1a5/0x480 [ 14.457996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.458255] kthread+0x337/0x6f0 [ 14.458421] ret_from_fork+0x41/0x80 [ 14.458790] ret_from_fork_asm+0x1a/0x30 [ 14.458983] [ 14.459053] The buggy address belongs to the object at ffff8881039f4880 [ 14.459053] which belongs to the cache kmalloc-64 of size 64 [ 14.459437] The buggy address is located 0 bytes to the right of [ 14.459437] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.460151] [ 14.460276] The buggy address belongs to the physical page: [ 14.460528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.461017] flags: 0x200000000000000(node=0|zone=2) [ 14.461252] page_type: f5(slab) [ 14.461451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.461788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.462067] page dumped because: kasan: bad access detected [ 14.462254] [ 14.462326] Memory state around the buggy address: [ 14.462484] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.462702] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.463341] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.463674] ^ [ 14.464059] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.464318] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.464616] ================================================================== [ 13.860833] ================================================================== [ 13.861525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 13.861905] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.862200] [ 13.862342] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.862387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.862430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.862453] Call Trace: [ 13.862469] <TASK> [ 13.862486] dump_stack_lvl+0x73/0xb0 [ 13.862522] print_report+0xd1/0x650 [ 13.862546] ? __virt_addr_valid+0x1db/0x2d0 [ 13.862568] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.862618] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.862645] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.862669] kasan_report+0x141/0x180 [ 13.862715] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.862744] kasan_check_range+0x10c/0x1c0 [ 13.862766] __kasan_check_write+0x18/0x20 [ 13.862814] kasan_atomics_helper+0x5fe/0x5450 [ 13.862839] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.862873] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.862897] ? kasan_atomics+0x152/0x310 [ 13.862947] kasan_atomics+0x1dc/0x310 [ 13.862969] ? __pfx_kasan_atomics+0x10/0x10 [ 13.862991] ? __pfx_read_tsc+0x10/0x10 [ 13.863023] ? ktime_get_ts64+0x86/0x230 [ 13.863049] kunit_try_run_case+0x1a5/0x480 [ 13.863100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.863124] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.863149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.863185] ? __kthread_parkme+0x82/0x180 [ 13.863207] ? preempt_count_sub+0x50/0x80 [ 13.863267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.863293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.863329] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.863354] kthread+0x337/0x6f0 [ 13.863373] ? trace_preempt_on+0x20/0xc0 [ 13.863409] ? __pfx_kthread+0x10/0x10 [ 13.863429] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.863452] ? calculate_sigpending+0x7b/0xa0 [ 13.863486] ? __pfx_kthread+0x10/0x10 [ 13.863506] ret_from_fork+0x41/0x80 [ 13.863528] ? __pfx_kthread+0x10/0x10 [ 13.863548] ret_from_fork_asm+0x1a/0x30 [ 13.863590] </TASK> [ 13.863602] [ 13.873408] Allocated by task 284: [ 13.873595] kasan_save_stack+0x45/0x70 [ 13.873789] kasan_save_track+0x18/0x40 [ 13.873975] kasan_save_alloc_info+0x3b/0x50 [ 13.874203] __kasan_kmalloc+0xb7/0xc0 [ 13.874487] __kmalloc_cache_noprof+0x189/0x420 [ 13.874711] kasan_atomics+0x95/0x310 [ 13.874893] kunit_try_run_case+0x1a5/0x480 [ 13.875184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.875481] kthread+0x337/0x6f0 [ 13.875704] ret_from_fork+0x41/0x80 [ 13.875834] ret_from_fork_asm+0x1a/0x30 [ 13.876100] [ 13.876220] The buggy address belongs to the object at ffff8881039f4880 [ 13.876220] which belongs to the cache kmalloc-64 of size 64 [ 13.876839] The buggy address is located 0 bytes to the right of [ 13.876839] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.877623] [ 13.877700] The buggy address belongs to the physical page: [ 13.877958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.878330] flags: 0x200000000000000(node=0|zone=2) [ 13.878596] page_type: f5(slab) [ 13.878798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.879104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.879527] page dumped because: kasan: bad access detected [ 13.879819] [ 13.879929] Memory state around the buggy address: [ 13.880177] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.880500] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.880816] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.881056] ^ [ 13.881208] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.881427] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.881913] ================================================================== [ 14.407671] ================================================================== [ 14.408169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.408751] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.409053] [ 14.409221] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.409309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.409323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.409347] Call Trace: [ 14.409377] <TASK> [ 14.409399] dump_stack_lvl+0x73/0xb0 [ 14.409427] print_report+0xd1/0x650 [ 14.409451] ? __virt_addr_valid+0x1db/0x2d0 [ 14.409475] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.409498] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.409522] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.409553] kasan_report+0x141/0x180 [ 14.409578] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.409606] __asan_report_load4_noabort+0x18/0x20 [ 14.409629] kasan_atomics_helper+0x49ce/0x5450 [ 14.409661] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.409685] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.409708] ? kasan_atomics+0x152/0x310 [ 14.409732] kasan_atomics+0x1dc/0x310 [ 14.409786] ? __pfx_kasan_atomics+0x10/0x10 [ 14.409808] ? __pfx_read_tsc+0x10/0x10 [ 14.409853] ? ktime_get_ts64+0x86/0x230 [ 14.409880] kunit_try_run_case+0x1a5/0x480 [ 14.409906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.409957] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.409995] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.410057] ? __kthread_parkme+0x82/0x180 [ 14.410081] ? preempt_count_sub+0x50/0x80 [ 14.410131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.410156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.410181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.410205] kthread+0x337/0x6f0 [ 14.410233] ? trace_preempt_on+0x20/0xc0 [ 14.410258] ? __pfx_kthread+0x10/0x10 [ 14.410278] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.410302] ? calculate_sigpending+0x7b/0xa0 [ 14.410353] ? __pfx_kthread+0x10/0x10 [ 14.410374] ret_from_fork+0x41/0x80 [ 14.410398] ? __pfx_kthread+0x10/0x10 [ 14.410428] ret_from_fork_asm+0x1a/0x30 [ 14.410460] </TASK> [ 14.410472] [ 14.418492] Allocated by task 284: [ 14.418704] kasan_save_stack+0x45/0x70 [ 14.419041] kasan_save_track+0x18/0x40 [ 14.419260] kasan_save_alloc_info+0x3b/0x50 [ 14.419480] __kasan_kmalloc+0xb7/0xc0 [ 14.419729] __kmalloc_cache_noprof+0x189/0x420 [ 14.419944] kasan_atomics+0x95/0x310 [ 14.420078] kunit_try_run_case+0x1a5/0x480 [ 14.420292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.420612] kthread+0x337/0x6f0 [ 14.420824] ret_from_fork+0x41/0x80 [ 14.421164] ret_from_fork_asm+0x1a/0x30 [ 14.421380] [ 14.421454] The buggy address belongs to the object at ffff8881039f4880 [ 14.421454] which belongs to the cache kmalloc-64 of size 64 [ 14.422323] The buggy address is located 0 bytes to the right of [ 14.422323] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.422872] [ 14.422949] The buggy address belongs to the physical page: [ 14.423239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.423674] flags: 0x200000000000000(node=0|zone=2) [ 14.423894] page_type: f5(slab) [ 14.424022] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.424268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.424592] page dumped because: kasan: bad access detected [ 14.424994] [ 14.425104] Memory state around the buggy address: [ 14.425345] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.425636] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.426021] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.426350] ^ [ 14.426630] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.426897] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.427115] ================================================================== [ 13.815723] ================================================================== [ 13.816110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 13.816580] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.817045] [ 13.817159] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.817265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.817304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.817336] Call Trace: [ 13.817411] <TASK> [ 13.817428] dump_stack_lvl+0x73/0xb0 [ 13.817465] print_report+0xd1/0x650 [ 13.817490] ? __virt_addr_valid+0x1db/0x2d0 [ 13.817513] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.817537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.817565] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.817589] kasan_report+0x141/0x180 [ 13.817614] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.817642] __asan_report_store4_noabort+0x1b/0x30 [ 13.817665] kasan_atomics_helper+0x4b3a/0x5450 [ 13.817706] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.817730] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.817755] ? kasan_atomics+0x152/0x310 [ 13.817780] kasan_atomics+0x1dc/0x310 [ 13.817800] ? __pfx_kasan_atomics+0x10/0x10 [ 13.817823] ? __pfx_read_tsc+0x10/0x10 [ 13.817844] ? ktime_get_ts64+0x86/0x230 [ 13.817870] kunit_try_run_case+0x1a5/0x480 [ 13.817895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.817919] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.817944] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.817969] ? __kthread_parkme+0x82/0x180 [ 13.817991] ? preempt_count_sub+0x50/0x80 [ 13.818018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.818043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.818067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.818092] kthread+0x337/0x6f0 [ 13.818110] ? trace_preempt_on+0x20/0xc0 [ 13.818135] ? __pfx_kthread+0x10/0x10 [ 13.818155] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.818178] ? calculate_sigpending+0x7b/0xa0 [ 13.818201] ? __pfx_kthread+0x10/0x10 [ 13.818222] ret_from_fork+0x41/0x80 [ 13.818255] ? __pfx_kthread+0x10/0x10 [ 13.818275] ret_from_fork_asm+0x1a/0x30 [ 13.818307] </TASK> [ 13.818319] [ 13.828647] Allocated by task 284: [ 13.828840] kasan_save_stack+0x45/0x70 [ 13.829051] kasan_save_track+0x18/0x40 [ 13.829264] kasan_save_alloc_info+0x3b/0x50 [ 13.829479] __kasan_kmalloc+0xb7/0xc0 [ 13.829685] __kmalloc_cache_noprof+0x189/0x420 [ 13.830058] kasan_atomics+0x95/0x310 [ 13.830194] kunit_try_run_case+0x1a5/0x480 [ 13.830348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.830519] kthread+0x337/0x6f0 [ 13.830690] ret_from_fork+0x41/0x80 [ 13.830956] ret_from_fork_asm+0x1a/0x30 [ 13.831218] [ 13.831357] The buggy address belongs to the object at ffff8881039f4880 [ 13.831357] which belongs to the cache kmalloc-64 of size 64 [ 13.832545] The buggy address is located 0 bytes to the right of [ 13.832545] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.833199] [ 13.833520] The buggy address belongs to the physical page: [ 13.833865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.834173] flags: 0x200000000000000(node=0|zone=2) [ 13.834593] page_type: f5(slab) [ 13.834820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.835447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.835798] page dumped because: kasan: bad access detected [ 13.836061] [ 13.836188] Memory state around the buggy address: [ 13.836506] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.836940] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.837412] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.837788] ^ [ 13.838051] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.838550] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.838864] ================================================================== [ 14.855555] ================================================================== [ 14.855829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 14.856159] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.856510] [ 14.856698] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.856746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.856760] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.856784] Call Trace: [ 14.856803] <TASK> [ 14.856824] dump_stack_lvl+0x73/0xb0 [ 14.856850] print_report+0xd1/0x650 [ 14.856875] ? __virt_addr_valid+0x1db/0x2d0 [ 14.856898] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.856921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.856946] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.856971] kasan_report+0x141/0x180 [ 14.856995] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.857024] kasan_check_range+0x10c/0x1c0 [ 14.857046] __kasan_check_write+0x18/0x20 [ 14.857067] kasan_atomics_helper+0x1f43/0x5450 [ 14.857093] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.857118] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.857142] ? kasan_atomics+0x152/0x310 [ 14.857166] kasan_atomics+0x1dc/0x310 [ 14.857188] ? __pfx_kasan_atomics+0x10/0x10 [ 14.857210] ? __pfx_read_tsc+0x10/0x10 [ 14.857246] ? ktime_get_ts64+0x86/0x230 [ 14.857274] kunit_try_run_case+0x1a5/0x480 [ 14.857302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.857326] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.857353] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.857379] ? __kthread_parkme+0x82/0x180 [ 14.857403] ? preempt_count_sub+0x50/0x80 [ 14.857430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.857456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.857481] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.857506] kthread+0x337/0x6f0 [ 14.857524] ? trace_preempt_on+0x20/0xc0 [ 14.857555] ? __pfx_kthread+0x10/0x10 [ 14.857574] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.857598] ? calculate_sigpending+0x7b/0xa0 [ 14.857622] ? __pfx_kthread+0x10/0x10 [ 14.857642] ret_from_fork+0x41/0x80 [ 14.857665] ? __pfx_kthread+0x10/0x10 [ 14.857685] ret_from_fork_asm+0x1a/0x30 [ 14.857717] </TASK> [ 14.857728] [ 14.865022] Allocated by task 284: [ 14.865208] kasan_save_stack+0x45/0x70 [ 14.865422] kasan_save_track+0x18/0x40 [ 14.865628] kasan_save_alloc_info+0x3b/0x50 [ 14.865823] __kasan_kmalloc+0xb7/0xc0 [ 14.865965] __kmalloc_cache_noprof+0x189/0x420 [ 14.866191] kasan_atomics+0x95/0x310 [ 14.866391] kunit_try_run_case+0x1a5/0x480 [ 14.866594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.866827] kthread+0x337/0x6f0 [ 14.867021] ret_from_fork+0x41/0x80 [ 14.867159] ret_from_fork_asm+0x1a/0x30 [ 14.867320] [ 14.867419] The buggy address belongs to the object at ffff8881039f4880 [ 14.867419] which belongs to the cache kmalloc-64 of size 64 [ 14.867991] The buggy address is located 0 bytes to the right of [ 14.867991] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.868369] [ 14.868444] The buggy address belongs to the physical page: [ 14.868688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.869044] flags: 0x200000000000000(node=0|zone=2) [ 14.869295] page_type: f5(slab) [ 14.869467] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.869815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.870176] page dumped because: kasan: bad access detected [ 14.870360] [ 14.870431] Memory state around the buggy address: [ 14.870589] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.871261] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.871571] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.871874] ^ [ 14.872092] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.872377] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.872645] ================================================================== [ 14.979642] ================================================================== [ 14.979994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 14.980411] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.980733] [ 14.980829] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.980878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.980890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.980913] Call Trace: [ 14.980932] <TASK> [ 14.980951] dump_stack_lvl+0x73/0xb0 [ 14.980978] print_report+0xd1/0x650 [ 14.981002] ? __virt_addr_valid+0x1db/0x2d0 [ 14.981024] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.981049] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.981073] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.981097] kasan_report+0x141/0x180 [ 14.981121] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.981150] __asan_report_load8_noabort+0x18/0x20 [ 14.981173] kasan_atomics_helper+0x4fa5/0x5450 [ 14.981198] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.981235] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.981260] ? kasan_atomics+0x152/0x310 [ 14.981286] kasan_atomics+0x1dc/0x310 [ 14.981310] ? __pfx_kasan_atomics+0x10/0x10 [ 14.981333] ? __pfx_read_tsc+0x10/0x10 [ 14.981354] ? ktime_get_ts64+0x86/0x230 [ 14.981381] kunit_try_run_case+0x1a5/0x480 [ 14.981406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.981430] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.981455] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.981481] ? __kthread_parkme+0x82/0x180 [ 14.981505] ? preempt_count_sub+0x50/0x80 [ 14.981532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.981560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.981585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.981610] kthread+0x337/0x6f0 [ 14.981630] ? trace_preempt_on+0x20/0xc0 [ 14.981656] ? __pfx_kthread+0x10/0x10 [ 14.981675] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.981698] ? calculate_sigpending+0x7b/0xa0 [ 14.981722] ? __pfx_kthread+0x10/0x10 [ 14.981743] ret_from_fork+0x41/0x80 [ 14.981765] ? __pfx_kthread+0x10/0x10 [ 14.981784] ret_from_fork_asm+0x1a/0x30 [ 14.981816] </TASK> [ 14.981829] [ 14.989030] Allocated by task 284: [ 14.989232] kasan_save_stack+0x45/0x70 [ 14.989434] kasan_save_track+0x18/0x40 [ 14.989607] kasan_save_alloc_info+0x3b/0x50 [ 14.989838] __kasan_kmalloc+0xb7/0xc0 [ 14.990015] __kmalloc_cache_noprof+0x189/0x420 [ 14.990182] kasan_atomics+0x95/0x310 [ 14.990324] kunit_try_run_case+0x1a5/0x480 [ 14.990516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.990931] kthread+0x337/0x6f0 [ 14.991098] ret_from_fork+0x41/0x80 [ 14.991284] ret_from_fork_asm+0x1a/0x30 [ 14.991463] [ 14.991560] The buggy address belongs to the object at ffff8881039f4880 [ 14.991560] which belongs to the cache kmalloc-64 of size 64 [ 14.992059] The buggy address is located 0 bytes to the right of [ 14.992059] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.992555] [ 14.992665] The buggy address belongs to the physical page: [ 14.992891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.993166] flags: 0x200000000000000(node=0|zone=2) [ 14.993342] page_type: f5(slab) [ 14.993464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.993833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.994172] page dumped because: kasan: bad access detected [ 14.994435] [ 14.994530] Memory state around the buggy address: [ 14.994833] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.995152] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.995408] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.995624] ^ [ 14.995859] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.996183] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.996494] ================================================================== [ 14.338641] ================================================================== [ 14.339021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.339371] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.339850] [ 14.339939] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.339984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.339997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.340020] Call Trace: [ 14.340037] <TASK> [ 14.340053] dump_stack_lvl+0x73/0xb0 [ 14.340078] print_report+0xd1/0x650 [ 14.340102] ? __virt_addr_valid+0x1db/0x2d0 [ 14.340310] ? kasan_atomics_helper+0x1217/0x5450 [ 14.340339] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.340364] ? kasan_atomics_helper+0x1217/0x5450 [ 14.340388] kasan_report+0x141/0x180 [ 14.340412] ? kasan_atomics_helper+0x1217/0x5450 [ 14.340441] kasan_check_range+0x10c/0x1c0 [ 14.340463] __kasan_check_write+0x18/0x20 [ 14.340484] kasan_atomics_helper+0x1217/0x5450 [ 14.340509] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.340534] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.340556] ? kasan_atomics+0x152/0x310 [ 14.340580] kasan_atomics+0x1dc/0x310 [ 14.340600] ? __pfx_kasan_atomics+0x10/0x10 [ 14.340622] ? __pfx_read_tsc+0x10/0x10 [ 14.340644] ? ktime_get_ts64+0x86/0x230 [ 14.340671] kunit_try_run_case+0x1a5/0x480 [ 14.340697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.340720] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.340745] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.340771] ? __kthread_parkme+0x82/0x180 [ 14.340794] ? preempt_count_sub+0x50/0x80 [ 14.340820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.340844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.340869] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.340894] kthread+0x337/0x6f0 [ 14.340912] ? trace_preempt_on+0x20/0xc0 [ 14.340936] ? __pfx_kthread+0x10/0x10 [ 14.340956] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.340979] ? calculate_sigpending+0x7b/0xa0 [ 14.341002] ? __pfx_kthread+0x10/0x10 [ 14.341021] ret_from_fork+0x41/0x80 [ 14.341044] ? __pfx_kthread+0x10/0x10 [ 14.341063] ret_from_fork_asm+0x1a/0x30 [ 14.341095] </TASK> [ 14.341106] [ 14.348467] Allocated by task 284: [ 14.348603] kasan_save_stack+0x45/0x70 [ 14.349018] kasan_save_track+0x18/0x40 [ 14.349214] kasan_save_alloc_info+0x3b/0x50 [ 14.349443] __kasan_kmalloc+0xb7/0xc0 [ 14.349639] __kmalloc_cache_noprof+0x189/0x420 [ 14.349868] kasan_atomics+0x95/0x310 [ 14.350053] kunit_try_run_case+0x1a5/0x480 [ 14.350662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.350885] kthread+0x337/0x6f0 [ 14.351205] ret_from_fork+0x41/0x80 [ 14.351510] ret_from_fork_asm+0x1a/0x30 [ 14.351843] [ 14.351924] The buggy address belongs to the object at ffff8881039f4880 [ 14.351924] which belongs to the cache kmalloc-64 of size 64 [ 14.352295] The buggy address is located 0 bytes to the right of [ 14.352295] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.352675] [ 14.353829] The buggy address belongs to the physical page: [ 14.354581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.355652] flags: 0x200000000000000(node=0|zone=2) [ 14.356465] page_type: f5(slab) [ 14.357107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.357984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.358833] page dumped because: kasan: bad access detected [ 14.359029] [ 14.359103] Memory state around the buggy address: [ 14.359276] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.360016] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.360704] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.361329] ^ [ 14.361799] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.362448] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.362883] ================================================================== [ 14.925816] ================================================================== [ 14.926075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 14.926373] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.926966] [ 14.927062] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.927110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.927124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.927148] Call Trace: [ 14.927167] <TASK> [ 14.927186] dump_stack_lvl+0x73/0xb0 [ 14.927213] print_report+0xd1/0x650 [ 14.927248] ? __virt_addr_valid+0x1db/0x2d0 [ 14.927272] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.927296] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.927320] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.927344] kasan_report+0x141/0x180 [ 14.927368] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.927396] kasan_check_range+0x10c/0x1c0 [ 14.927418] __kasan_check_write+0x18/0x20 [ 14.927440] kasan_atomics_helper+0x20c8/0x5450 [ 14.927465] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.927489] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.927513] ? kasan_atomics+0x152/0x310 [ 14.927537] kasan_atomics+0x1dc/0x310 [ 14.927558] ? __pfx_kasan_atomics+0x10/0x10 [ 14.927581] ? __pfx_read_tsc+0x10/0x10 [ 14.927602] ? ktime_get_ts64+0x86/0x230 [ 14.927630] kunit_try_run_case+0x1a5/0x480 [ 14.927656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.927679] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.927705] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.927731] ? __kthread_parkme+0x82/0x180 [ 14.927754] ? preempt_count_sub+0x50/0x80 [ 14.927781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.927806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.927831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.927856] kthread+0x337/0x6f0 [ 14.927874] ? trace_preempt_on+0x20/0xc0 [ 14.927899] ? __pfx_kthread+0x10/0x10 [ 14.927921] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.927945] ? calculate_sigpending+0x7b/0xa0 [ 14.927969] ? __pfx_kthread+0x10/0x10 [ 14.927989] ret_from_fork+0x41/0x80 [ 14.928011] ? __pfx_kthread+0x10/0x10 [ 14.928031] ret_from_fork_asm+0x1a/0x30 [ 14.928063] </TASK> [ 14.928075] [ 14.935695] Allocated by task 284: [ 14.935876] kasan_save_stack+0x45/0x70 [ 14.936080] kasan_save_track+0x18/0x40 [ 14.936293] kasan_save_alloc_info+0x3b/0x50 [ 14.936506] __kasan_kmalloc+0xb7/0xc0 [ 14.936718] __kmalloc_cache_noprof+0x189/0x420 [ 14.936884] kasan_atomics+0x95/0x310 [ 14.937016] kunit_try_run_case+0x1a5/0x480 [ 14.937164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.937352] kthread+0x337/0x6f0 [ 14.937475] ret_from_fork+0x41/0x80 [ 14.937674] ret_from_fork_asm+0x1a/0x30 [ 14.937875] [ 14.937973] The buggy address belongs to the object at ffff8881039f4880 [ 14.937973] which belongs to the cache kmalloc-64 of size 64 [ 14.938515] The buggy address is located 0 bytes to the right of [ 14.938515] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.939084] [ 14.939187] The buggy address belongs to the physical page: [ 14.939423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.939694] flags: 0x200000000000000(node=0|zone=2) [ 14.939932] page_type: f5(slab) [ 14.940103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.940463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.940893] page dumped because: kasan: bad access detected [ 14.941111] [ 14.941200] Memory state around the buggy address: [ 14.941398] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.941727] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.941944] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.942158] ^ [ 14.942325] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.942593] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.943257] ================================================================== [ 14.737874] ================================================================== [ 14.738244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 14.738531] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.738755] [ 14.738876] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.738924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.738937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.738960] Call Trace: [ 14.738979] <TASK> [ 14.738999] dump_stack_lvl+0x73/0xb0 [ 14.739025] print_report+0xd1/0x650 [ 14.739049] ? __virt_addr_valid+0x1db/0x2d0 [ 14.739073] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.739096] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.739120] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.739145] kasan_report+0x141/0x180 [ 14.739168] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.739197] __asan_report_load8_noabort+0x18/0x20 [ 14.739257] kasan_atomics_helper+0x4f30/0x5450 [ 14.739285] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.739309] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.739344] ? kasan_atomics+0x152/0x310 [ 14.739369] kasan_atomics+0x1dc/0x310 [ 14.739390] ? __pfx_kasan_atomics+0x10/0x10 [ 14.739413] ? __pfx_read_tsc+0x10/0x10 [ 14.739434] ? ktime_get_ts64+0x86/0x230 [ 14.739461] kunit_try_run_case+0x1a5/0x480 [ 14.739488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.739511] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.739536] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.739561] ? __kthread_parkme+0x82/0x180 [ 14.739584] ? preempt_count_sub+0x50/0x80 [ 14.739612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.739650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.739674] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.739708] kthread+0x337/0x6f0 [ 14.739727] ? trace_preempt_on+0x20/0xc0 [ 14.739752] ? __pfx_kthread+0x10/0x10 [ 14.739782] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.739806] ? calculate_sigpending+0x7b/0xa0 [ 14.739830] ? __pfx_kthread+0x10/0x10 [ 14.739859] ret_from_fork+0x41/0x80 [ 14.739881] ? __pfx_kthread+0x10/0x10 [ 14.739900] ret_from_fork_asm+0x1a/0x30 [ 14.739943] </TASK> [ 14.739954] [ 14.747614] Allocated by task 284: [ 14.747763] kasan_save_stack+0x45/0x70 [ 14.747909] kasan_save_track+0x18/0x40 [ 14.748048] kasan_save_alloc_info+0x3b/0x50 [ 14.748193] __kasan_kmalloc+0xb7/0xc0 [ 14.748397] __kmalloc_cache_noprof+0x189/0x420 [ 14.748679] kasan_atomics+0x95/0x310 [ 14.748872] kunit_try_run_case+0x1a5/0x480 [ 14.749082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.749348] kthread+0x337/0x6f0 [ 14.749518] ret_from_fork+0x41/0x80 [ 14.749734] ret_from_fork_asm+0x1a/0x30 [ 14.749877] [ 14.749950] The buggy address belongs to the object at ffff8881039f4880 [ 14.749950] which belongs to the cache kmalloc-64 of size 64 [ 14.750399] The buggy address is located 0 bytes to the right of [ 14.750399] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.751035] [ 14.751150] The buggy address belongs to the physical page: [ 14.751395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.751783] flags: 0x200000000000000(node=0|zone=2) [ 14.752027] page_type: f5(slab) [ 14.752201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.752540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.752886] page dumped because: kasan: bad access detected [ 14.753139] [ 14.753266] Memory state around the buggy address: [ 14.753484] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.753854] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.754166] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.754491] ^ [ 14.754742] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.754959] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.755311] ================================================================== [ 13.641372] ================================================================== [ 13.642140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.643110] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.644296] [ 13.644489] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.644555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.644568] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.644592] Call Trace: [ 13.644604] <TASK> [ 13.644623] dump_stack_lvl+0x73/0xb0 [ 13.644671] print_report+0xd1/0x650 [ 13.644695] ? __virt_addr_valid+0x1db/0x2d0 [ 13.644717] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.644749] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.644773] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.644796] kasan_report+0x141/0x180 [ 13.644831] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.644858] __asan_report_load4_noabort+0x18/0x20 [ 13.644880] kasan_atomics_helper+0x4bbc/0x5450 [ 13.644903] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.644927] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.644951] ? kasan_atomics+0x152/0x310 [ 13.644974] kasan_atomics+0x1dc/0x310 [ 13.644994] ? __pfx_kasan_atomics+0x10/0x10 [ 13.645017] ? __pfx_read_tsc+0x10/0x10 [ 13.645038] ? ktime_get_ts64+0x86/0x230 [ 13.645066] kunit_try_run_case+0x1a5/0x480 [ 13.645093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.645117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.645141] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.645167] ? __kthread_parkme+0x82/0x180 [ 13.645190] ? preempt_count_sub+0x50/0x80 [ 13.645216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.645252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.645433] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.645461] kthread+0x337/0x6f0 [ 13.645479] ? trace_preempt_on+0x20/0xc0 [ 13.645503] ? __pfx_kthread+0x10/0x10 [ 13.645521] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.645552] ? calculate_sigpending+0x7b/0xa0 [ 13.645575] ? __pfx_kthread+0x10/0x10 [ 13.645594] ret_from_fork+0x41/0x80 [ 13.645615] ? __pfx_kthread+0x10/0x10 [ 13.645655] ret_from_fork_asm+0x1a/0x30 [ 13.645688] </TASK> [ 13.645700] [ 13.658538] Allocated by task 284: [ 13.658917] kasan_save_stack+0x45/0x70 [ 13.659413] kasan_save_track+0x18/0x40 [ 13.659612] kasan_save_alloc_info+0x3b/0x50 [ 13.660047] __kasan_kmalloc+0xb7/0xc0 [ 13.660185] __kmalloc_cache_noprof+0x189/0x420 [ 13.660670] kasan_atomics+0x95/0x310 [ 13.661033] kunit_try_run_case+0x1a5/0x480 [ 13.661182] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.661818] kthread+0x337/0x6f0 [ 13.662158] ret_from_fork+0x41/0x80 [ 13.662591] ret_from_fork_asm+0x1a/0x30 [ 13.662960] [ 13.663034] The buggy address belongs to the object at ffff8881039f4880 [ 13.663034] which belongs to the cache kmalloc-64 of size 64 [ 13.663826] The buggy address is located 0 bytes to the right of [ 13.663826] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.664868] [ 13.664944] The buggy address belongs to the physical page: [ 13.665115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.665536] flags: 0x200000000000000(node=0|zone=2) [ 13.666031] page_type: f5(slab) [ 13.666306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.666806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.667257] page dumped because: kasan: bad access detected [ 13.667618] [ 13.667794] Memory state around the buggy address: [ 13.668125] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.668429] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.669132] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.670049] ^ [ 13.670505] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.670959] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.671175] ================================================================== [ 14.719729] ================================================================== [ 14.720067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 14.720435] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.720785] [ 14.720905] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.720956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.720969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.721003] Call Trace: [ 14.721023] <TASK> [ 14.721043] dump_stack_lvl+0x73/0xb0 [ 14.721081] print_report+0xd1/0x650 [ 14.721106] ? __virt_addr_valid+0x1db/0x2d0 [ 14.721130] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.721154] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.721179] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.721203] kasan_report+0x141/0x180 [ 14.721236] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.721265] kasan_check_range+0x10c/0x1c0 [ 14.721286] __kasan_check_write+0x18/0x20 [ 14.721308] kasan_atomics_helper+0x1c18/0x5450 [ 14.721333] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.721357] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.721381] ? kasan_atomics+0x152/0x310 [ 14.721406] kasan_atomics+0x1dc/0x310 [ 14.721436] ? __pfx_kasan_atomics+0x10/0x10 [ 14.721459] ? __pfx_read_tsc+0x10/0x10 [ 14.721480] ? ktime_get_ts64+0x86/0x230 [ 14.721517] kunit_try_run_case+0x1a5/0x480 [ 14.721549] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.721572] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.721598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.721623] ? __kthread_parkme+0x82/0x180 [ 14.721665] ? preempt_count_sub+0x50/0x80 [ 14.721692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.721717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.721744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.721769] kthread+0x337/0x6f0 [ 14.721786] ? trace_preempt_on+0x20/0xc0 [ 14.721812] ? __pfx_kthread+0x10/0x10 [ 14.721831] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.721855] ? calculate_sigpending+0x7b/0xa0 [ 14.721879] ? __pfx_kthread+0x10/0x10 [ 14.721898] ret_from_fork+0x41/0x80 [ 14.721920] ? __pfx_kthread+0x10/0x10 [ 14.721939] ret_from_fork_asm+0x1a/0x30 [ 14.721981] </TASK> [ 14.721992] [ 14.729567] Allocated by task 284: [ 14.729721] kasan_save_stack+0x45/0x70 [ 14.729968] kasan_save_track+0x18/0x40 [ 14.730164] kasan_save_alloc_info+0x3b/0x50 [ 14.730382] __kasan_kmalloc+0xb7/0xc0 [ 14.730572] __kmalloc_cache_noprof+0x189/0x420 [ 14.730819] kasan_atomics+0x95/0x310 [ 14.730984] kunit_try_run_case+0x1a5/0x480 [ 14.731149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.731415] kthread+0x337/0x6f0 [ 14.731589] ret_from_fork+0x41/0x80 [ 14.731751] ret_from_fork_asm+0x1a/0x30 [ 14.731893] [ 14.731966] The buggy address belongs to the object at ffff8881039f4880 [ 14.731966] which belongs to the cache kmalloc-64 of size 64 [ 14.732483] The buggy address is located 0 bytes to the right of [ 14.732483] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.733087] [ 14.733187] The buggy address belongs to the physical page: [ 14.733377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.733627] flags: 0x200000000000000(node=0|zone=2) [ 14.733902] page_type: f5(slab) [ 14.734103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.734506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.734842] page dumped because: kasan: bad access detected [ 14.735017] [ 14.735088] Memory state around the buggy address: [ 14.735329] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.735702] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.735964] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.736181] ^ [ 14.736421] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.736787] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.737111] ================================================================== [ 14.799091] ================================================================== [ 14.799872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 14.800156] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.800400] [ 14.800494] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.800542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.800555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.800580] Call Trace: [ 14.800601] <TASK> [ 14.800622] dump_stack_lvl+0x73/0xb0 [ 14.800679] print_report+0xd1/0x650 [ 14.800704] ? __virt_addr_valid+0x1db/0x2d0 [ 14.800729] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.800752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.800777] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.800801] kasan_report+0x141/0x180 [ 14.800826] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.800854] kasan_check_range+0x10c/0x1c0 [ 14.800877] __kasan_check_write+0x18/0x20 [ 14.800898] kasan_atomics_helper+0x1e12/0x5450 [ 14.800923] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.800947] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.800972] ? kasan_atomics+0x152/0x310 [ 14.800997] kasan_atomics+0x1dc/0x310 [ 14.801019] ? __pfx_kasan_atomics+0x10/0x10 [ 14.801041] ? __pfx_read_tsc+0x10/0x10 [ 14.801063] ? ktime_get_ts64+0x86/0x230 [ 14.801090] kunit_try_run_case+0x1a5/0x480 [ 14.801117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.801141] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.801167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.801192] ? __kthread_parkme+0x82/0x180 [ 14.801216] ? preempt_count_sub+0x50/0x80 [ 14.801254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.801280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.801305] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.801329] kthread+0x337/0x6f0 [ 14.801347] ? trace_preempt_on+0x20/0xc0 [ 14.801372] ? __pfx_kthread+0x10/0x10 [ 14.801392] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.801414] ? calculate_sigpending+0x7b/0xa0 [ 14.801437] ? __pfx_kthread+0x10/0x10 [ 14.801458] ret_from_fork+0x41/0x80 [ 14.801479] ? __pfx_kthread+0x10/0x10 [ 14.801499] ret_from_fork_asm+0x1a/0x30 [ 14.801530] </TASK> [ 14.801550] [ 14.814985] Allocated by task 284: [ 14.815341] kasan_save_stack+0x45/0x70 [ 14.815738] kasan_save_track+0x18/0x40 [ 14.816051] kasan_save_alloc_info+0x3b/0x50 [ 14.816201] __kasan_kmalloc+0xb7/0xc0 [ 14.816569] __kmalloc_cache_noprof+0x189/0x420 [ 14.817012] kasan_atomics+0x95/0x310 [ 14.817353] kunit_try_run_case+0x1a5/0x480 [ 14.817724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.817906] kthread+0x337/0x6f0 [ 14.818030] ret_from_fork+0x41/0x80 [ 14.818171] ret_from_fork_asm+0x1a/0x30 [ 14.818462] [ 14.818626] The buggy address belongs to the object at ffff8881039f4880 [ 14.818626] which belongs to the cache kmalloc-64 of size 64 [ 14.819594] The buggy address is located 0 bytes to the right of [ 14.819594] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.820386] [ 14.820464] The buggy address belongs to the physical page: [ 14.820662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.821348] flags: 0x200000000000000(node=0|zone=2) [ 14.821798] page_type: f5(slab) [ 14.822094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.822771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.823364] page dumped because: kasan: bad access detected [ 14.823539] [ 14.823610] Memory state around the buggy address: [ 14.824048] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.824675] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.825288] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.825755] ^ [ 14.825917] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.826134] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.826362] ================================================================== [ 14.222758] ================================================================== [ 14.223071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.223435] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.223914] [ 14.224011] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.224061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.224090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.224114] Call Trace: [ 14.224134] <TASK> [ 14.224155] dump_stack_lvl+0x73/0xb0 [ 14.224184] print_report+0xd1/0x650 [ 14.224209] ? __virt_addr_valid+0x1db/0x2d0 [ 14.224243] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.224284] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.224309] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.224334] kasan_report+0x141/0x180 [ 14.224358] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.224387] __asan_report_load4_noabort+0x18/0x20 [ 14.224409] kasan_atomics_helper+0x4a36/0x5450 [ 14.224433] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.224457] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.224862] ? kasan_atomics+0x152/0x310 [ 14.224888] kasan_atomics+0x1dc/0x310 [ 14.224908] ? __pfx_kasan_atomics+0x10/0x10 [ 14.224931] ? __pfx_read_tsc+0x10/0x10 [ 14.224952] ? ktime_get_ts64+0x86/0x230 [ 14.226729] kunit_try_run_case+0x1a5/0x480 [ 14.226763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.226787] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.226813] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.226839] ? __kthread_parkme+0x82/0x180 [ 14.226863] ? preempt_count_sub+0x50/0x80 [ 14.226889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.226915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.226940] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.226964] kthread+0x337/0x6f0 [ 14.226983] ? trace_preempt_on+0x20/0xc0 [ 14.227008] ? __pfx_kthread+0x10/0x10 [ 14.227027] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.227051] ? calculate_sigpending+0x7b/0xa0 [ 14.227075] ? __pfx_kthread+0x10/0x10 [ 14.227095] ret_from_fork+0x41/0x80 [ 14.227117] ? __pfx_kthread+0x10/0x10 [ 14.227135] ret_from_fork_asm+0x1a/0x30 [ 14.227168] </TASK> [ 14.227180] [ 14.237703] Allocated by task 284: [ 14.237889] kasan_save_stack+0x45/0x70 [ 14.238088] kasan_save_track+0x18/0x40 [ 14.238268] kasan_save_alloc_info+0x3b/0x50 [ 14.238467] __kasan_kmalloc+0xb7/0xc0 [ 14.238646] __kmalloc_cache_noprof+0x189/0x420 [ 14.238851] kasan_atomics+0x95/0x310 [ 14.239018] kunit_try_run_case+0x1a5/0x480 [ 14.239199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.239951] kthread+0x337/0x6f0 [ 14.240086] ret_from_fork+0x41/0x80 [ 14.240369] ret_from_fork_asm+0x1a/0x30 [ 14.240814] [ 14.240906] The buggy address belongs to the object at ffff8881039f4880 [ 14.240906] which belongs to the cache kmalloc-64 of size 64 [ 14.241777] The buggy address is located 0 bytes to the right of [ 14.241777] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.242528] [ 14.242758] The buggy address belongs to the physical page: [ 14.243160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.243668] flags: 0x200000000000000(node=0|zone=2) [ 14.244073] page_type: f5(slab) [ 14.244262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.244579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.245331] page dumped because: kasan: bad access detected [ 14.245760] [ 14.245977] Memory state around the buggy address: [ 14.246331] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.246913] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.247358] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.247660] ^ [ 14.247872] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.248159] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.248457] ================================================================== [ 14.873256] ================================================================== [ 14.873604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 14.873967] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.874286] [ 14.874389] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.874435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.874448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.874471] Call Trace: [ 14.874489] <TASK> [ 14.874508] dump_stack_lvl+0x73/0xb0 [ 14.874533] print_report+0xd1/0x650 [ 14.874558] ? __virt_addr_valid+0x1db/0x2d0 [ 14.874582] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.874606] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.874631] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.874654] kasan_report+0x141/0x180 [ 14.874679] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.874708] __asan_report_load8_noabort+0x18/0x20 [ 14.874730] kasan_atomics_helper+0x4f71/0x5450 [ 14.874755] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.874779] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.874803] ? kasan_atomics+0x152/0x310 [ 14.874828] kasan_atomics+0x1dc/0x310 [ 14.874848] ? __pfx_kasan_atomics+0x10/0x10 [ 14.874871] ? __pfx_read_tsc+0x10/0x10 [ 14.874892] ? ktime_get_ts64+0x86/0x230 [ 14.874919] kunit_try_run_case+0x1a5/0x480 [ 14.874944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.874969] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.874995] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.875020] ? __kthread_parkme+0x82/0x180 [ 14.875044] ? preempt_count_sub+0x50/0x80 [ 14.875071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.875096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.875121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.875146] kthread+0x337/0x6f0 [ 14.875165] ? trace_preempt_on+0x20/0xc0 [ 14.875190] ? __pfx_kthread+0x10/0x10 [ 14.875209] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.875243] ? calculate_sigpending+0x7b/0xa0 [ 14.875267] ? __pfx_kthread+0x10/0x10 [ 14.875287] ret_from_fork+0x41/0x80 [ 14.875310] ? __pfx_kthread+0x10/0x10 [ 14.875329] ret_from_fork_asm+0x1a/0x30 [ 14.875362] </TASK> [ 14.875374] [ 14.882536] Allocated by task 284: [ 14.882785] kasan_save_stack+0x45/0x70 [ 14.882990] kasan_save_track+0x18/0x40 [ 14.883130] kasan_save_alloc_info+0x3b/0x50 [ 14.883289] __kasan_kmalloc+0xb7/0xc0 [ 14.883424] __kmalloc_cache_noprof+0x189/0x420 [ 14.883579] kasan_atomics+0x95/0x310 [ 14.883711] kunit_try_run_case+0x1a5/0x480 [ 14.883858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.884150] kthread+0x337/0x6f0 [ 14.884328] ret_from_fork+0x41/0x80 [ 14.884514] ret_from_fork_asm+0x1a/0x30 [ 14.884771] [ 14.884868] The buggy address belongs to the object at ffff8881039f4880 [ 14.884868] which belongs to the cache kmalloc-64 of size 64 [ 14.885417] The buggy address is located 0 bytes to the right of [ 14.885417] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.885964] [ 14.886073] The buggy address belongs to the physical page: [ 14.886271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.886514] flags: 0x200000000000000(node=0|zone=2) [ 14.886678] page_type: f5(slab) [ 14.886799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.887184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.887540] page dumped because: kasan: bad access detected [ 14.887797] [ 14.887897] Memory state around the buggy address: [ 14.888129] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.888623] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.888958] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.889288] ^ [ 14.889517] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.889861] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.890107] ================================================================== [ 14.997048] ================================================================== [ 14.997343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 14.997662] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.997960] [ 14.998048] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.998095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.998107] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.998130] Call Trace: [ 14.998146] <TASK> [ 14.998161] dump_stack_lvl+0x73/0xb0 [ 14.998186] print_report+0xd1/0x650 [ 14.998210] ? __virt_addr_valid+0x1db/0x2d0 [ 14.998244] ? kasan_atomics_helper+0x224c/0x5450 [ 14.998268] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.998292] ? kasan_atomics_helper+0x224c/0x5450 [ 14.998315] kasan_report+0x141/0x180 [ 14.998340] ? kasan_atomics_helper+0x224c/0x5450 [ 14.998368] kasan_check_range+0x10c/0x1c0 [ 14.998391] __kasan_check_write+0x18/0x20 [ 14.998412] kasan_atomics_helper+0x224c/0x5450 [ 14.998436] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.998460] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.998483] ? kasan_atomics+0x152/0x310 [ 14.998508] kasan_atomics+0x1dc/0x310 [ 14.998530] ? __pfx_kasan_atomics+0x10/0x10 [ 14.998552] ? __pfx_read_tsc+0x10/0x10 [ 14.998573] ? ktime_get_ts64+0x86/0x230 [ 14.998600] kunit_try_run_case+0x1a5/0x480 [ 14.998626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.998649] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.998675] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.998701] ? __kthread_parkme+0x82/0x180 [ 14.998724] ? preempt_count_sub+0x50/0x80 [ 14.998751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.998776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.998801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.998826] kthread+0x337/0x6f0 [ 14.998845] ? trace_preempt_on+0x20/0xc0 [ 14.998870] ? __pfx_kthread+0x10/0x10 [ 14.998889] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.998912] ? calculate_sigpending+0x7b/0xa0 [ 14.998936] ? __pfx_kthread+0x10/0x10 [ 14.998956] ret_from_fork+0x41/0x80 [ 14.998977] ? __pfx_kthread+0x10/0x10 [ 14.998996] ret_from_fork_asm+0x1a/0x30 [ 14.999028] </TASK> [ 14.999039] [ 15.006525] Allocated by task 284: [ 15.006772] kasan_save_stack+0x45/0x70 [ 15.006944] kasan_save_track+0x18/0x40 [ 15.007123] kasan_save_alloc_info+0x3b/0x50 [ 15.007318] __kasan_kmalloc+0xb7/0xc0 [ 15.007472] __kmalloc_cache_noprof+0x189/0x420 [ 15.007701] kasan_atomics+0x95/0x310 [ 15.007831] kunit_try_run_case+0x1a5/0x480 [ 15.007977] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.008219] kthread+0x337/0x6f0 [ 15.008399] ret_from_fork+0x41/0x80 [ 15.008586] ret_from_fork_asm+0x1a/0x30 [ 15.008795] [ 15.008897] The buggy address belongs to the object at ffff8881039f4880 [ 15.008897] which belongs to the cache kmalloc-64 of size 64 [ 15.009318] The buggy address is located 0 bytes to the right of [ 15.009318] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 15.009745] [ 15.009845] The buggy address belongs to the physical page: [ 15.010094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 15.010457] flags: 0x200000000000000(node=0|zone=2) [ 15.010703] page_type: f5(slab) [ 15.010825] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.011052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.011305] page dumped because: kasan: bad access detected [ 15.011564] [ 15.011668] Memory state around the buggy address: [ 15.011897] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.012179] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.012463] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.012742] ^ [ 15.012939] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.013241] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.013504] ================================================================== [ 15.014109] ================================================================== [ 15.014491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.014808] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 15.015110] [ 15.015213] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 15.015271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.015286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.015309] Call Trace: [ 15.015328] <TASK> [ 15.015347] dump_stack_lvl+0x73/0xb0 [ 15.015374] print_report+0xd1/0x650 [ 15.015398] ? __virt_addr_valid+0x1db/0x2d0 [ 15.015421] ? kasan_atomics_helper+0x5115/0x5450 [ 15.015445] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.015469] ? kasan_atomics_helper+0x5115/0x5450 [ 15.015493] kasan_report+0x141/0x180 [ 15.015518] ? kasan_atomics_helper+0x5115/0x5450 [ 15.015546] __asan_report_load8_noabort+0x18/0x20 [ 15.015569] kasan_atomics_helper+0x5115/0x5450 [ 15.015597] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.015621] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.015655] ? kasan_atomics+0x152/0x310 [ 15.015680] kasan_atomics+0x1dc/0x310 [ 15.015701] ? __pfx_kasan_atomics+0x10/0x10 [ 15.015724] ? __pfx_read_tsc+0x10/0x10 [ 15.015745] ? ktime_get_ts64+0x86/0x230 [ 15.015772] kunit_try_run_case+0x1a5/0x480 [ 15.015798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.015822] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.015848] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.015874] ? __kthread_parkme+0x82/0x180 [ 15.015897] ? preempt_count_sub+0x50/0x80 [ 15.015924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.015949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.015974] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.015999] kthread+0x337/0x6f0 [ 15.016017] ? trace_preempt_on+0x20/0xc0 [ 15.016042] ? __pfx_kthread+0x10/0x10 [ 15.016062] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.016085] ? calculate_sigpending+0x7b/0xa0 [ 15.016108] ? __pfx_kthread+0x10/0x10 [ 15.016129] ret_from_fork+0x41/0x80 [ 15.016150] ? __pfx_kthread+0x10/0x10 [ 15.016170] ret_from_fork_asm+0x1a/0x30 [ 15.016202] </TASK> [ 15.016213] [ 15.023661] Allocated by task 284: [ 15.023815] kasan_save_stack+0x45/0x70 [ 15.023997] kasan_save_track+0x18/0x40 [ 15.024186] kasan_save_alloc_info+0x3b/0x50 [ 15.024389] __kasan_kmalloc+0xb7/0xc0 [ 15.024552] __kmalloc_cache_noprof+0x189/0x420 [ 15.024778] kasan_atomics+0x95/0x310 [ 15.024966] kunit_try_run_case+0x1a5/0x480 [ 15.025167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.025379] kthread+0x337/0x6f0 [ 15.025501] ret_from_fork+0x41/0x80 [ 15.025637] ret_from_fork_asm+0x1a/0x30 [ 15.025840] [ 15.025936] The buggy address belongs to the object at ffff8881039f4880 [ 15.025936] which belongs to the cache kmalloc-64 of size 64 [ 15.026431] The buggy address is located 0 bytes to the right of [ 15.026431] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 15.027329] [ 15.027426] The buggy address belongs to the physical page: [ 15.027626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 15.027867] flags: 0x200000000000000(node=0|zone=2) [ 15.028034] page_type: f5(slab) [ 15.028217] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.028575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.029065] page dumped because: kasan: bad access detected [ 15.029247] [ 15.029318] Memory state around the buggy address: [ 15.029479] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.029854] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.030177] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.030509] ^ [ 15.030849] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.031182] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.031482] ================================================================== [ 13.745943] ================================================================== [ 13.746315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.746826] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.747160] [ 13.747286] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.747331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.747344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.747409] Call Trace: [ 13.747425] <TASK> [ 13.747454] dump_stack_lvl+0x73/0xb0 [ 13.747482] print_report+0xd1/0x650 [ 13.747506] ? __virt_addr_valid+0x1db/0x2d0 [ 13.747528] ? kasan_atomics_helper+0x3df/0x5450 [ 13.747560] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.747584] ? kasan_atomics_helper+0x3df/0x5450 [ 13.747619] kasan_report+0x141/0x180 [ 13.747642] ? kasan_atomics_helper+0x3df/0x5450 [ 13.747671] kasan_check_range+0x10c/0x1c0 [ 13.747693] __kasan_check_read+0x15/0x20 [ 13.747723] kasan_atomics_helper+0x3df/0x5450 [ 13.747748] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.747772] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.747806] ? kasan_atomics+0x152/0x310 [ 13.747831] kasan_atomics+0x1dc/0x310 [ 13.747852] ? __pfx_kasan_atomics+0x10/0x10 [ 13.747875] ? __pfx_read_tsc+0x10/0x10 [ 13.747896] ? ktime_get_ts64+0x86/0x230 [ 13.747931] kunit_try_run_case+0x1a5/0x480 [ 13.747956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.747981] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.748016] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.748041] ? __kthread_parkme+0x82/0x180 [ 13.748064] ? preempt_count_sub+0x50/0x80 [ 13.748090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.748115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.748140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.748172] kthread+0x337/0x6f0 [ 13.748190] ? trace_preempt_on+0x20/0xc0 [ 13.748215] ? __pfx_kthread+0x10/0x10 [ 13.748249] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.748273] ? calculate_sigpending+0x7b/0xa0 [ 13.748296] ? __pfx_kthread+0x10/0x10 [ 13.748315] ret_from_fork+0x41/0x80 [ 13.748338] ? __pfx_kthread+0x10/0x10 [ 13.748357] ret_from_fork_asm+0x1a/0x30 [ 13.748515] </TASK> [ 13.748533] [ 13.757116] Allocated by task 284: [ 13.757337] kasan_save_stack+0x45/0x70 [ 13.757543] kasan_save_track+0x18/0x40 [ 13.757743] kasan_save_alloc_info+0x3b/0x50 [ 13.758087] __kasan_kmalloc+0xb7/0xc0 [ 13.758224] __kmalloc_cache_noprof+0x189/0x420 [ 13.758423] kasan_atomics+0x95/0x310 [ 13.758611] kunit_try_run_case+0x1a5/0x480 [ 13.758962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.759142] kthread+0x337/0x6f0 [ 13.759277] ret_from_fork+0x41/0x80 [ 13.759440] ret_from_fork_asm+0x1a/0x30 [ 13.759638] [ 13.759803] The buggy address belongs to the object at ffff8881039f4880 [ 13.759803] which belongs to the cache kmalloc-64 of size 64 [ 13.760348] The buggy address is located 0 bytes to the right of [ 13.760348] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.761011] [ 13.761094] The buggy address belongs to the physical page: [ 13.761281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.761651] flags: 0x200000000000000(node=0|zone=2) [ 13.761914] page_type: f5(slab) [ 13.762263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.762740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.762975] page dumped because: kasan: bad access detected [ 13.763242] [ 13.763419] Memory state around the buggy address: [ 13.763648] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.764027] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.764534] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.764943] ^ [ 13.765185] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.765623] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.765918] ================================================================== [ 13.972818] ================================================================== [ 13.973099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 13.973469] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.973874] [ 13.973962] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.974072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.974086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.974109] Call Trace: [ 13.974125] <TASK> [ 13.974143] dump_stack_lvl+0x73/0xb0 [ 13.974177] print_report+0xd1/0x650 [ 13.974202] ? __virt_addr_valid+0x1db/0x2d0 [ 13.974224] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.974264] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.974325] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.974351] kasan_report+0x141/0x180 [ 13.974386] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.974414] kasan_check_range+0x10c/0x1c0 [ 13.974437] __kasan_check_write+0x18/0x20 [ 13.974470] kasan_atomics_helper+0x8f9/0x5450 [ 13.974496] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.974521] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.974553] ? kasan_atomics+0x152/0x310 [ 13.974578] kasan_atomics+0x1dc/0x310 [ 13.974601] ? __pfx_kasan_atomics+0x10/0x10 [ 13.974636] ? __pfx_read_tsc+0x10/0x10 [ 13.974660] ? ktime_get_ts64+0x86/0x230 [ 13.974689] kunit_try_run_case+0x1a5/0x480 [ 13.974714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.974738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.974764] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.974790] ? __kthread_parkme+0x82/0x180 [ 13.974813] ? preempt_count_sub+0x50/0x80 [ 13.974839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.974865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.974890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.974915] kthread+0x337/0x6f0 [ 13.974933] ? trace_preempt_on+0x20/0xc0 [ 13.974956] ? __pfx_kthread+0x10/0x10 [ 13.974976] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.974999] ? calculate_sigpending+0x7b/0xa0 [ 13.975022] ? __pfx_kthread+0x10/0x10 [ 13.975042] ret_from_fork+0x41/0x80 [ 13.975064] ? __pfx_kthread+0x10/0x10 [ 13.975083] ret_from_fork_asm+0x1a/0x30 [ 13.975115] </TASK> [ 13.975126] [ 13.984173] Allocated by task 284: [ 13.984351] kasan_save_stack+0x45/0x70 [ 13.984789] kasan_save_track+0x18/0x40 [ 13.985099] kasan_save_alloc_info+0x3b/0x50 [ 13.985357] __kasan_kmalloc+0xb7/0xc0 [ 13.985597] __kmalloc_cache_noprof+0x189/0x420 [ 13.985853] kasan_atomics+0x95/0x310 [ 13.986025] kunit_try_run_case+0x1a5/0x480 [ 13.986225] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.986601] kthread+0x337/0x6f0 [ 13.986826] ret_from_fork+0x41/0x80 [ 13.987000] ret_from_fork_asm+0x1a/0x30 [ 13.987219] [ 13.987303] The buggy address belongs to the object at ffff8881039f4880 [ 13.987303] which belongs to the cache kmalloc-64 of size 64 [ 13.987908] The buggy address is located 0 bytes to the right of [ 13.987908] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.988587] [ 13.988788] The buggy address belongs to the physical page: [ 13.988990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.989244] flags: 0x200000000000000(node=0|zone=2) [ 13.989408] page_type: f5(slab) [ 13.989658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.990336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.990671] page dumped because: kasan: bad access detected [ 13.990914] [ 13.990995] Memory state around the buggy address: [ 13.991199] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.991635] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.991967] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.992325] ^ [ 13.992573] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.992925] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.994021] ================================================================== [ 13.766443] ================================================================== [ 13.766883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 13.767223] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.767670] [ 13.767785] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.767839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.767852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.767874] Call Trace: [ 13.767887] <TASK> [ 13.767912] dump_stack_lvl+0x73/0xb0 [ 13.767937] print_report+0xd1/0x650 [ 13.767960] ? __virt_addr_valid+0x1db/0x2d0 [ 13.767982] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.768005] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.768030] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.768053] kasan_report+0x141/0x180 [ 13.768077] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.768105] __asan_report_load4_noabort+0x18/0x20 [ 13.768129] kasan_atomics_helper+0x4b54/0x5450 [ 13.768153] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.768176] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.768199] ? kasan_atomics+0x152/0x310 [ 13.768224] kasan_atomics+0x1dc/0x310 [ 13.768255] ? __pfx_kasan_atomics+0x10/0x10 [ 13.768278] ? __pfx_read_tsc+0x10/0x10 [ 13.768299] ? ktime_get_ts64+0x86/0x230 [ 13.768325] kunit_try_run_case+0x1a5/0x480 [ 13.768350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.768374] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.768408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.768433] ? __kthread_parkme+0x82/0x180 [ 13.768456] ? preempt_count_sub+0x50/0x80 [ 13.768493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.768518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.768543] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.768567] kthread+0x337/0x6f0 [ 13.768586] ? trace_preempt_on+0x20/0xc0 [ 13.768610] ? __pfx_kthread+0x10/0x10 [ 13.768630] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.768653] ? calculate_sigpending+0x7b/0xa0 [ 13.768676] ? __pfx_kthread+0x10/0x10 [ 13.768696] ret_from_fork+0x41/0x80 [ 13.768718] ? __pfx_kthread+0x10/0x10 [ 13.768738] ret_from_fork_asm+0x1a/0x30 [ 13.768770] </TASK> [ 13.768781] [ 13.780026] Allocated by task 284: [ 13.780425] kasan_save_stack+0x45/0x70 [ 13.780904] kasan_save_track+0x18/0x40 [ 13.781166] kasan_save_alloc_info+0x3b/0x50 [ 13.781558] __kasan_kmalloc+0xb7/0xc0 [ 13.781901] __kmalloc_cache_noprof+0x189/0x420 [ 13.782325] kasan_atomics+0x95/0x310 [ 13.782755] kunit_try_run_case+0x1a5/0x480 [ 13.783031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.783540] kthread+0x337/0x6f0 [ 13.783851] ret_from_fork+0x41/0x80 [ 13.784174] ret_from_fork_asm+0x1a/0x30 [ 13.784520] [ 13.784629] The buggy address belongs to the object at ffff8881039f4880 [ 13.784629] which belongs to the cache kmalloc-64 of size 64 [ 13.785110] The buggy address is located 0 bytes to the right of [ 13.785110] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.785511] [ 13.785690] The buggy address belongs to the physical page: [ 13.786189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.786559] flags: 0x200000000000000(node=0|zone=2) [ 13.786855] page_type: f5(slab) [ 13.786977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.787324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.787813] page dumped because: kasan: bad access detected [ 13.788137] [ 13.788258] Memory state around the buggy address: [ 13.788556] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.788909] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.789144] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.789506] ^ [ 13.789806] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.790205] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.790691] ================================================================== [ 14.773947] ================================================================== [ 14.774297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 14.774699] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.774983] [ 14.775075] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.775121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.775135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.775159] Call Trace: [ 14.775176] <TASK> [ 14.775195] dump_stack_lvl+0x73/0xb0 [ 14.775221] print_report+0xd1/0x650 [ 14.775254] ? __virt_addr_valid+0x1db/0x2d0 [ 14.775277] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.775301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.775325] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.775349] kasan_report+0x141/0x180 [ 14.775383] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.775412] kasan_check_range+0x10c/0x1c0 [ 14.775434] __kasan_check_write+0x18/0x20 [ 14.775467] kasan_atomics_helper+0x1d7a/0x5450 [ 14.775492] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.775517] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.775543] ? kasan_atomics+0x152/0x310 [ 14.775569] kasan_atomics+0x1dc/0x310 [ 14.775590] ? __pfx_kasan_atomics+0x10/0x10 [ 14.775613] ? __pfx_read_tsc+0x10/0x10 [ 14.775653] ? ktime_get_ts64+0x86/0x230 [ 14.775680] kunit_try_run_case+0x1a5/0x480 [ 14.775706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.775730] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.775756] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.775781] ? __kthread_parkme+0x82/0x180 [ 14.775808] ? preempt_count_sub+0x50/0x80 [ 14.775835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.775869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.775893] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.775918] kthread+0x337/0x6f0 [ 14.775947] ? trace_preempt_on+0x20/0xc0 [ 14.775973] ? __pfx_kthread+0x10/0x10 [ 14.775993] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.776025] ? calculate_sigpending+0x7b/0xa0 [ 14.776049] ? __pfx_kthread+0x10/0x10 [ 14.776069] ret_from_fork+0x41/0x80 [ 14.776101] ? __pfx_kthread+0x10/0x10 [ 14.776121] ret_from_fork_asm+0x1a/0x30 [ 14.776152] </TASK> [ 14.776163] [ 14.785330] Allocated by task 284: [ 14.785699] kasan_save_stack+0x45/0x70 [ 14.786052] kasan_save_track+0x18/0x40 [ 14.786425] kasan_save_alloc_info+0x3b/0x50 [ 14.786834] __kasan_kmalloc+0xb7/0xc0 [ 14.787175] __kmalloc_cache_noprof+0x189/0x420 [ 14.787592] kasan_atomics+0x95/0x310 [ 14.787951] kunit_try_run_case+0x1a5/0x480 [ 14.788205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.788715] kthread+0x337/0x6f0 [ 14.788976] ret_from_fork+0x41/0x80 [ 14.789111] ret_from_fork_asm+0x1a/0x30 [ 14.789264] [ 14.789340] The buggy address belongs to the object at ffff8881039f4880 [ 14.789340] which belongs to the cache kmalloc-64 of size 64 [ 14.789840] The buggy address is located 0 bytes to the right of [ 14.789840] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.790932] [ 14.791095] The buggy address belongs to the physical page: [ 14.791568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.792251] flags: 0x200000000000000(node=0|zone=2) [ 14.792700] page_type: f5(slab) [ 14.793002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.793682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.794320] page dumped because: kasan: bad access detected [ 14.794808] [ 14.794883] Memory state around the buggy address: [ 14.795043] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.795320] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.795944] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.796561] ^ [ 14.797008] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.797622] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.798251] ================================================================== [ 14.187039] ================================================================== [ 14.187551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.187892] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.188134] [ 14.188244] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.188292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.188305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.188328] Call Trace: [ 14.188349] <TASK> [ 14.188369] dump_stack_lvl+0x73/0xb0 [ 14.188396] print_report+0xd1/0x650 [ 14.188419] ? __virt_addr_valid+0x1db/0x2d0 [ 14.188444] ? kasan_atomics_helper+0xf10/0x5450 [ 14.188466] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.188490] ? kasan_atomics_helper+0xf10/0x5450 [ 14.188514] kasan_report+0x141/0x180 [ 14.188538] ? kasan_atomics_helper+0xf10/0x5450 [ 14.188565] kasan_check_range+0x10c/0x1c0 [ 14.188588] __kasan_check_write+0x18/0x20 [ 14.188610] kasan_atomics_helper+0xf10/0x5450 [ 14.188635] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.188659] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.188682] ? kasan_atomics+0x152/0x310 [ 14.188708] kasan_atomics+0x1dc/0x310 [ 14.188728] ? __pfx_kasan_atomics+0x10/0x10 [ 14.188751] ? __pfx_read_tsc+0x10/0x10 [ 14.188772] ? ktime_get_ts64+0x86/0x230 [ 14.188799] kunit_try_run_case+0x1a5/0x480 [ 14.188825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.188849] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.188875] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.188899] ? __kthread_parkme+0x82/0x180 [ 14.188923] ? preempt_count_sub+0x50/0x80 [ 14.188950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.188976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.189001] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.189025] kthread+0x337/0x6f0 [ 14.189044] ? trace_preempt_on+0x20/0xc0 [ 14.189069] ? __pfx_kthread+0x10/0x10 [ 14.189088] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.189112] ? calculate_sigpending+0x7b/0xa0 [ 14.189135] ? __pfx_kthread+0x10/0x10 [ 14.189155] ret_from_fork+0x41/0x80 [ 14.189177] ? __pfx_kthread+0x10/0x10 [ 14.189196] ret_from_fork_asm+0x1a/0x30 [ 14.189237] </TASK> [ 14.189249] [ 14.196765] Allocated by task 284: [ 14.196959] kasan_save_stack+0x45/0x70 [ 14.197149] kasan_save_track+0x18/0x40 [ 14.197324] kasan_save_alloc_info+0x3b/0x50 [ 14.197536] __kasan_kmalloc+0xb7/0xc0 [ 14.197727] __kmalloc_cache_noprof+0x189/0x420 [ 14.197894] kasan_atomics+0x95/0x310 [ 14.198083] kunit_try_run_case+0x1a5/0x480 [ 14.198285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.198497] kthread+0x337/0x6f0 [ 14.198618] ret_from_fork+0x41/0x80 [ 14.198750] ret_from_fork_asm+0x1a/0x30 [ 14.198891] [ 14.198963] The buggy address belongs to the object at ffff8881039f4880 [ 14.198963] which belongs to the cache kmalloc-64 of size 64 [ 14.199478] The buggy address is located 0 bytes to the right of [ 14.199478] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.200090] [ 14.200166] The buggy address belongs to the physical page: [ 14.200348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.200587] flags: 0x200000000000000(node=0|zone=2) [ 14.200855] page_type: f5(slab) [ 14.201028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.201393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.201741] page dumped because: kasan: bad access detected [ 14.202047] [ 14.202119] Memory state around the buggy address: [ 14.202288] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.202506] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.202724] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.203049] ^ [ 14.203287] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.203606] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.203923] ================================================================== [ 13.951544] ================================================================== [ 13.952009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 13.952416] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.952854] [ 13.952941] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.952985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.952998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.953020] Call Trace: [ 13.953036] <TASK> [ 13.953051] dump_stack_lvl+0x73/0xb0 [ 13.953076] print_report+0xd1/0x650 [ 13.953112] ? __virt_addr_valid+0x1db/0x2d0 [ 13.953134] ? kasan_atomics_helper+0x860/0x5450 [ 13.953158] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.953194] ? kasan_atomics_helper+0x860/0x5450 [ 13.953218] kasan_report+0x141/0x180 [ 13.953252] ? kasan_atomics_helper+0x860/0x5450 [ 13.953328] kasan_check_range+0x10c/0x1c0 [ 13.953369] __kasan_check_write+0x18/0x20 [ 13.953391] kasan_atomics_helper+0x860/0x5450 [ 13.953428] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.953453] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.953476] ? kasan_atomics+0x152/0x310 [ 13.953501] kasan_atomics+0x1dc/0x310 [ 13.953531] ? __pfx_kasan_atomics+0x10/0x10 [ 13.953557] ? __pfx_read_tsc+0x10/0x10 [ 13.953588] ? ktime_get_ts64+0x86/0x230 [ 13.953614] kunit_try_run_case+0x1a5/0x480 [ 13.953640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.953666] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.953691] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.953715] ? __kthread_parkme+0x82/0x180 [ 13.953737] ? preempt_count_sub+0x50/0x80 [ 13.953763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.953788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.953813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.953838] kthread+0x337/0x6f0 [ 13.953856] ? trace_preempt_on+0x20/0xc0 [ 13.953880] ? __pfx_kthread+0x10/0x10 [ 13.953899] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.953932] ? calculate_sigpending+0x7b/0xa0 [ 13.953953] ? __pfx_kthread+0x10/0x10 [ 13.953974] ret_from_fork+0x41/0x80 [ 13.954006] ? __pfx_kthread+0x10/0x10 [ 13.954025] ret_from_fork_asm+0x1a/0x30 [ 13.954056] </TASK> [ 13.954067] [ 13.963198] Allocated by task 284: [ 13.963471] kasan_save_stack+0x45/0x70 [ 13.963714] kasan_save_track+0x18/0x40 [ 13.963876] kasan_save_alloc_info+0x3b/0x50 [ 13.964109] __kasan_kmalloc+0xb7/0xc0 [ 13.964272] __kmalloc_cache_noprof+0x189/0x420 [ 13.964560] kasan_atomics+0x95/0x310 [ 13.964823] kunit_try_run_case+0x1a5/0x480 [ 13.964986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.965161] kthread+0x337/0x6f0 [ 13.965293] ret_from_fork+0x41/0x80 [ 13.965428] ret_from_fork_asm+0x1a/0x30 [ 13.965898] [ 13.966078] The buggy address belongs to the object at ffff8881039f4880 [ 13.966078] which belongs to the cache kmalloc-64 of size 64 [ 13.966862] The buggy address is located 0 bytes to the right of [ 13.966862] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.967283] [ 13.967360] The buggy address belongs to the physical page: [ 13.967671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.968073] flags: 0x200000000000000(node=0|zone=2) [ 13.968349] page_type: f5(slab) [ 13.968586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.969027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.969393] page dumped because: kasan: bad access detected [ 13.969653] [ 13.969749] Memory state around the buggy address: [ 13.969942] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.970222] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.970448] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.970894] ^ [ 13.971522] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.971874] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.972213] ================================================================== [ 14.147652] ================================================================== [ 14.148183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.148566] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.149000] [ 14.149126] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.149180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.149194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.149217] Call Trace: [ 14.149249] <TASK> [ 14.149269] dump_stack_lvl+0x73/0xb0 [ 14.149502] print_report+0xd1/0x650 [ 14.149528] ? __virt_addr_valid+0x1db/0x2d0 [ 14.149558] ? kasan_atomics_helper+0xde0/0x5450 [ 14.149581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.149605] ? kasan_atomics_helper+0xde0/0x5450 [ 14.149628] kasan_report+0x141/0x180 [ 14.149664] ? kasan_atomics_helper+0xde0/0x5450 [ 14.149691] kasan_check_range+0x10c/0x1c0 [ 14.149713] __kasan_check_write+0x18/0x20 [ 14.149734] kasan_atomics_helper+0xde0/0x5450 [ 14.149759] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.149783] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.149806] ? kasan_atomics+0x152/0x310 [ 14.149831] kasan_atomics+0x1dc/0x310 [ 14.149852] ? __pfx_kasan_atomics+0x10/0x10 [ 14.149875] ? __pfx_read_tsc+0x10/0x10 [ 14.149895] ? ktime_get_ts64+0x86/0x230 [ 14.149922] kunit_try_run_case+0x1a5/0x480 [ 14.149948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.149971] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.149996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.150021] ? __kthread_parkme+0x82/0x180 [ 14.150045] ? preempt_count_sub+0x50/0x80 [ 14.150072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.150096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.150120] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.150145] kthread+0x337/0x6f0 [ 14.150164] ? trace_preempt_on+0x20/0xc0 [ 14.150189] ? __pfx_kthread+0x10/0x10 [ 14.150208] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.150244] ? calculate_sigpending+0x7b/0xa0 [ 14.150269] ? __pfx_kthread+0x10/0x10 [ 14.150289] ret_from_fork+0x41/0x80 [ 14.150310] ? __pfx_kthread+0x10/0x10 [ 14.150330] ret_from_fork_asm+0x1a/0x30 [ 14.150361] </TASK> [ 14.150373] [ 14.160398] Allocated by task 284: [ 14.160766] kasan_save_stack+0x45/0x70 [ 14.160940] kasan_save_track+0x18/0x40 [ 14.161141] kasan_save_alloc_info+0x3b/0x50 [ 14.161355] __kasan_kmalloc+0xb7/0xc0 [ 14.161541] __kmalloc_cache_noprof+0x189/0x420 [ 14.162011] kasan_atomics+0x95/0x310 [ 14.162179] kunit_try_run_case+0x1a5/0x480 [ 14.162478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.162887] kthread+0x337/0x6f0 [ 14.163036] ret_from_fork+0x41/0x80 [ 14.163321] ret_from_fork_asm+0x1a/0x30 [ 14.163477] [ 14.163733] The buggy address belongs to the object at ffff8881039f4880 [ 14.163733] which belongs to the cache kmalloc-64 of size 64 [ 14.164217] The buggy address is located 0 bytes to the right of [ 14.164217] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.164669] [ 14.164769] The buggy address belongs to the physical page: [ 14.165003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.165356] flags: 0x200000000000000(node=0|zone=2) [ 14.165584] page_type: f5(slab) [ 14.165788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.166030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.166393] page dumped because: kasan: bad access detected [ 14.166646] [ 14.166733] Memory state around the buggy address: [ 14.166937] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.167248] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.167494] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.167798] ^ [ 14.167955] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.168258] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.168534] ================================================================== [ 14.388471] ================================================================== [ 14.388768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.389391] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.389681] [ 14.389818] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.389866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.389879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.389902] Call Trace: [ 14.389921] <TASK> [ 14.389941] dump_stack_lvl+0x73/0xb0 [ 14.389968] print_report+0xd1/0x650 [ 14.389992] ? __virt_addr_valid+0x1db/0x2d0 [ 14.390015] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.390051] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.390075] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.390109] kasan_report+0x141/0x180 [ 14.390134] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.390162] kasan_check_range+0x10c/0x1c0 [ 14.390183] __kasan_check_write+0x18/0x20 [ 14.390205] kasan_atomics_helper+0x12e6/0x5450 [ 14.390245] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.390269] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.390303] ? kasan_atomics+0x152/0x310 [ 14.390328] kasan_atomics+0x1dc/0x310 [ 14.390348] ? __pfx_kasan_atomics+0x10/0x10 [ 14.390371] ? __pfx_read_tsc+0x10/0x10 [ 14.390392] ? ktime_get_ts64+0x86/0x230 [ 14.390420] kunit_try_run_case+0x1a5/0x480 [ 14.390446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.390470] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.390496] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.390521] ? __kthread_parkme+0x82/0x180 [ 14.390547] ? preempt_count_sub+0x50/0x80 [ 14.390575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.390601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.390625] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.390650] kthread+0x337/0x6f0 [ 14.390668] ? trace_preempt_on+0x20/0xc0 [ 14.390694] ? __pfx_kthread+0x10/0x10 [ 14.390714] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.390738] ? calculate_sigpending+0x7b/0xa0 [ 14.390761] ? __pfx_kthread+0x10/0x10 [ 14.390780] ret_from_fork+0x41/0x80 [ 14.390803] ? __pfx_kthread+0x10/0x10 [ 14.390823] ret_from_fork_asm+0x1a/0x30 [ 14.390855] </TASK> [ 14.390866] [ 14.399208] Allocated by task 284: [ 14.399368] kasan_save_stack+0x45/0x70 [ 14.399560] kasan_save_track+0x18/0x40 [ 14.399786] kasan_save_alloc_info+0x3b/0x50 [ 14.399990] __kasan_kmalloc+0xb7/0xc0 [ 14.400173] __kmalloc_cache_noprof+0x189/0x420 [ 14.400383] kasan_atomics+0x95/0x310 [ 14.400549] kunit_try_run_case+0x1a5/0x480 [ 14.400822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.401120] kthread+0x337/0x6f0 [ 14.401297] ret_from_fork+0x41/0x80 [ 14.401440] ret_from_fork_asm+0x1a/0x30 [ 14.401586] [ 14.401659] The buggy address belongs to the object at ffff8881039f4880 [ 14.401659] which belongs to the cache kmalloc-64 of size 64 [ 14.402099] The buggy address is located 0 bytes to the right of [ 14.402099] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.402690] [ 14.402791] The buggy address belongs to the physical page: [ 14.403041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.403413] flags: 0x200000000000000(node=0|zone=2) [ 14.403675] page_type: f5(slab) [ 14.403908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.404237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.404554] page dumped because: kasan: bad access detected [ 14.404729] [ 14.404800] Memory state around the buggy address: [ 14.404959] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.405401] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.405777] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.406105] ^ [ 14.406332] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.406739] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.406991] ================================================================== [ 14.561335] ================================================================== [ 14.561693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.561984] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.562214] [ 14.562396] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.562442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.562467] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.562491] Call Trace: [ 14.562509] <TASK> [ 14.562528] dump_stack_lvl+0x73/0xb0 [ 14.562554] print_report+0xd1/0x650 [ 14.562579] ? __virt_addr_valid+0x1db/0x2d0 [ 14.562602] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.562625] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.562658] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.562683] kasan_report+0x141/0x180 [ 14.562707] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.562745] kasan_check_range+0x10c/0x1c0 [ 14.562768] __kasan_check_write+0x18/0x20 [ 14.562789] kasan_atomics_helper+0x16e7/0x5450 [ 14.562824] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.562849] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.562872] ? kasan_atomics+0x152/0x310 [ 14.562897] kasan_atomics+0x1dc/0x310 [ 14.562919] ? __pfx_kasan_atomics+0x10/0x10 [ 14.562940] ? __pfx_read_tsc+0x10/0x10 [ 14.562961] ? ktime_get_ts64+0x86/0x230 [ 14.562988] kunit_try_run_case+0x1a5/0x480 [ 14.563014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.563037] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.563063] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.563089] ? __kthread_parkme+0x82/0x180 [ 14.563113] ? preempt_count_sub+0x50/0x80 [ 14.563140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.563165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.563190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.563217] kthread+0x337/0x6f0 [ 14.563246] ? trace_preempt_on+0x20/0xc0 [ 14.563272] ? __pfx_kthread+0x10/0x10 [ 14.563292] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.563316] ? calculate_sigpending+0x7b/0xa0 [ 14.563339] ? __pfx_kthread+0x10/0x10 [ 14.563359] ret_from_fork+0x41/0x80 [ 14.563382] ? __pfx_kthread+0x10/0x10 [ 14.563401] ret_from_fork_asm+0x1a/0x30 [ 14.563434] </TASK> [ 14.563447] [ 14.571408] Allocated by task 284: [ 14.571596] kasan_save_stack+0x45/0x70 [ 14.571805] kasan_save_track+0x18/0x40 [ 14.572149] kasan_save_alloc_info+0x3b/0x50 [ 14.572372] __kasan_kmalloc+0xb7/0xc0 [ 14.572563] __kmalloc_cache_noprof+0x189/0x420 [ 14.572835] kasan_atomics+0x95/0x310 [ 14.573023] kunit_try_run_case+0x1a5/0x480 [ 14.573243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.573493] kthread+0x337/0x6f0 [ 14.573619] ret_from_fork+0x41/0x80 [ 14.573813] ret_from_fork_asm+0x1a/0x30 [ 14.574012] [ 14.574100] The buggy address belongs to the object at ffff8881039f4880 [ 14.574100] which belongs to the cache kmalloc-64 of size 64 [ 14.574524] The buggy address is located 0 bytes to the right of [ 14.574524] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.575294] [ 14.575401] The buggy address belongs to the physical page: [ 14.575576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.576252] flags: 0x200000000000000(node=0|zone=2) [ 14.576419] page_type: f5(slab) [ 14.576541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.576773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.577067] page dumped because: kasan: bad access detected [ 14.577357] [ 14.577468] Memory state around the buggy address: [ 14.577732] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.578060] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.578347] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.578563] ^ [ 14.578904] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.579318] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.579646] ================================================================== [ 13.908434] ================================================================== [ 13.908674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 13.909162] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 13.909640] [ 13.909786] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.909846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.909861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.909883] Call Trace: [ 13.909900] <TASK> [ 13.909916] dump_stack_lvl+0x73/0xb0 [ 13.909943] print_report+0xd1/0x650 [ 13.909967] ? __virt_addr_valid+0x1db/0x2d0 [ 13.909990] ? kasan_atomics_helper+0x72f/0x5450 [ 13.910013] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.910038] ? kasan_atomics_helper+0x72f/0x5450 [ 13.910062] kasan_report+0x141/0x180 [ 13.910086] ? kasan_atomics_helper+0x72f/0x5450 [ 13.910115] kasan_check_range+0x10c/0x1c0 [ 13.910146] __kasan_check_write+0x18/0x20 [ 13.910167] kasan_atomics_helper+0x72f/0x5450 [ 13.910192] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.910242] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.910265] ? kasan_atomics+0x152/0x310 [ 13.910301] kasan_atomics+0x1dc/0x310 [ 13.910322] ? __pfx_kasan_atomics+0x10/0x10 [ 13.910344] ? __pfx_read_tsc+0x10/0x10 [ 13.910365] ? ktime_get_ts64+0x86/0x230 [ 13.910391] kunit_try_run_case+0x1a5/0x480 [ 13.910417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.910441] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.910466] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.910490] ? __kthread_parkme+0x82/0x180 [ 13.910513] ? preempt_count_sub+0x50/0x80 [ 13.910540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.910566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.910590] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.910616] kthread+0x337/0x6f0 [ 13.910634] ? trace_preempt_on+0x20/0xc0 [ 13.910658] ? __pfx_kthread+0x10/0x10 [ 13.910678] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.910701] ? calculate_sigpending+0x7b/0xa0 [ 13.910724] ? __pfx_kthread+0x10/0x10 [ 13.910743] ret_from_fork+0x41/0x80 [ 13.910765] ? __pfx_kthread+0x10/0x10 [ 13.911010] ret_from_fork_asm+0x1a/0x30 [ 13.911047] </TASK> [ 13.911059] [ 13.920359] Allocated by task 284: [ 13.920634] kasan_save_stack+0x45/0x70 [ 13.920902] kasan_save_track+0x18/0x40 [ 13.921126] kasan_save_alloc_info+0x3b/0x50 [ 13.921299] __kasan_kmalloc+0xb7/0xc0 [ 13.921489] __kmalloc_cache_noprof+0x189/0x420 [ 13.921795] kasan_atomics+0x95/0x310 [ 13.922010] kunit_try_run_case+0x1a5/0x480 [ 13.922306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.922552] kthread+0x337/0x6f0 [ 13.922735] ret_from_fork+0x41/0x80 [ 13.922899] ret_from_fork_asm+0x1a/0x30 [ 13.923412] [ 13.923517] The buggy address belongs to the object at ffff8881039f4880 [ 13.923517] which belongs to the cache kmalloc-64 of size 64 [ 13.924025] The buggy address is located 0 bytes to the right of [ 13.924025] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 13.924752] [ 13.924851] The buggy address belongs to the physical page: [ 13.925106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.925625] flags: 0x200000000000000(node=0|zone=2) [ 13.925872] page_type: f5(slab) [ 13.926042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.926436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.926968] page dumped because: kasan: bad access detected [ 13.927200] [ 13.927352] Memory state around the buggy address: [ 13.927640] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.927972] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.928216] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.928847] ^ [ 13.929064] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.929526] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.929884] ================================================================== [ 14.169273] ================================================================== [ 14.169672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.169989] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.170264] [ 14.170471] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.170518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.170531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.170554] Call Trace: [ 14.170571] <TASK> [ 14.170591] dump_stack_lvl+0x73/0xb0 [ 14.170617] print_report+0xd1/0x650 [ 14.170641] ? __virt_addr_valid+0x1db/0x2d0 [ 14.170665] ? kasan_atomics_helper+0xe78/0x5450 [ 14.170688] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.170712] ? kasan_atomics_helper+0xe78/0x5450 [ 14.170735] kasan_report+0x141/0x180 [ 14.170759] ? kasan_atomics_helper+0xe78/0x5450 [ 14.170787] kasan_check_range+0x10c/0x1c0 [ 14.170808] __kasan_check_write+0x18/0x20 [ 14.170830] kasan_atomics_helper+0xe78/0x5450 [ 14.170855] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.170879] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.170902] ? kasan_atomics+0x152/0x310 [ 14.170927] kasan_atomics+0x1dc/0x310 [ 14.170948] ? __pfx_kasan_atomics+0x10/0x10 [ 14.170971] ? __pfx_read_tsc+0x10/0x10 [ 14.170992] ? ktime_get_ts64+0x86/0x230 [ 14.171019] kunit_try_run_case+0x1a5/0x480 [ 14.171045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.171069] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.171094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.171119] ? __kthread_parkme+0x82/0x180 [ 14.171142] ? preempt_count_sub+0x50/0x80 [ 14.171169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.171194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.171218] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.171255] kthread+0x337/0x6f0 [ 14.171273] ? trace_preempt_on+0x20/0xc0 [ 14.171298] ? __pfx_kthread+0x10/0x10 [ 14.171318] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.171342] ? calculate_sigpending+0x7b/0xa0 [ 14.171364] ? __pfx_kthread+0x10/0x10 [ 14.171384] ret_from_fork+0x41/0x80 [ 14.171406] ? __pfx_kthread+0x10/0x10 [ 14.171425] ret_from_fork_asm+0x1a/0x30 [ 14.171457] </TASK> [ 14.171469] [ 14.179086] Allocated by task 284: [ 14.179289] kasan_save_stack+0x45/0x70 [ 14.179475] kasan_save_track+0x18/0x40 [ 14.179665] kasan_save_alloc_info+0x3b/0x50 [ 14.179854] __kasan_kmalloc+0xb7/0xc0 [ 14.180020] __kmalloc_cache_noprof+0x189/0x420 [ 14.180174] kasan_atomics+0x95/0x310 [ 14.180357] kunit_try_run_case+0x1a5/0x480 [ 14.180569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.180820] kthread+0x337/0x6f0 [ 14.181029] ret_from_fork+0x41/0x80 [ 14.181162] ret_from_fork_asm+0x1a/0x30 [ 14.181374] [ 14.181469] The buggy address belongs to the object at ffff8881039f4880 [ 14.181469] which belongs to the cache kmalloc-64 of size 64 [ 14.181989] The buggy address is located 0 bytes to the right of [ 14.181989] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.182474] [ 14.182573] The buggy address belongs to the physical page: [ 14.182793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.183140] flags: 0x200000000000000(node=0|zone=2) [ 14.183365] page_type: f5(slab) [ 14.183492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.183723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.183953] page dumped because: kasan: bad access detected [ 14.184124] [ 14.184219] Memory state around the buggy address: [ 14.184490] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.185026] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.185301] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.185517] ^ [ 14.185729] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.186053] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.186383] ================================================================== [ 14.204754] ================================================================== [ 14.205084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.205507] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.205844] [ 14.205948] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.205995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.206008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.206032] Call Trace: [ 14.206051] <TASK> [ 14.206071] dump_stack_lvl+0x73/0xb0 [ 14.206097] print_report+0xd1/0x650 [ 14.206121] ? __virt_addr_valid+0x1db/0x2d0 [ 14.206145] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.206168] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.206319] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.206346] kasan_report+0x141/0x180 [ 14.206372] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.206400] kasan_check_range+0x10c/0x1c0 [ 14.206422] __kasan_check_write+0x18/0x20 [ 14.206443] kasan_atomics_helper+0xfa9/0x5450 [ 14.206468] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.206492] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.206516] ? kasan_atomics+0x152/0x310 [ 14.206540] kasan_atomics+0x1dc/0x310 [ 14.206560] ? __pfx_kasan_atomics+0x10/0x10 [ 14.206583] ? __pfx_read_tsc+0x10/0x10 [ 14.206605] ? ktime_get_ts64+0x86/0x230 [ 14.206631] kunit_try_run_case+0x1a5/0x480 [ 14.206657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.206681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.206707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.206733] ? __kthread_parkme+0x82/0x180 [ 14.206757] ? preempt_count_sub+0x50/0x80 [ 14.206783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.206808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.206833] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.206858] kthread+0x337/0x6f0 [ 14.206875] ? trace_preempt_on+0x20/0xc0 [ 14.206901] ? __pfx_kthread+0x10/0x10 [ 14.206932] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.206956] ? calculate_sigpending+0x7b/0xa0 [ 14.206979] ? __pfx_kthread+0x10/0x10 [ 14.206999] ret_from_fork+0x41/0x80 [ 14.207020] ? __pfx_kthread+0x10/0x10 [ 14.207040] ret_from_fork_asm+0x1a/0x30 [ 14.207072] </TASK> [ 14.207084] [ 14.214466] Allocated by task 284: [ 14.214606] kasan_save_stack+0x45/0x70 [ 14.214832] kasan_save_track+0x18/0x40 [ 14.215038] kasan_save_alloc_info+0x3b/0x50 [ 14.215329] __kasan_kmalloc+0xb7/0xc0 [ 14.215527] __kmalloc_cache_noprof+0x189/0x420 [ 14.215860] kasan_atomics+0x95/0x310 [ 14.216020] kunit_try_run_case+0x1a5/0x480 [ 14.216246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.216420] kthread+0x337/0x6f0 [ 14.216541] ret_from_fork+0x41/0x80 [ 14.216670] ret_from_fork_asm+0x1a/0x30 [ 14.216820] [ 14.216929] The buggy address belongs to the object at ffff8881039f4880 [ 14.216929] which belongs to the cache kmalloc-64 of size 64 [ 14.217463] The buggy address is located 0 bytes to the right of [ 14.217463] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.218113] [ 14.218187] The buggy address belongs to the physical page: [ 14.218364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.218595] flags: 0x200000000000000(node=0|zone=2) [ 14.218756] page_type: f5(slab) [ 14.218876] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.219098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.219546] page dumped because: kasan: bad access detected [ 14.219984] [ 14.220080] Memory state around the buggy address: [ 14.220321] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.220651] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.220977] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.221306] ^ [ 14.221477] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.221693] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.222016] ================================================================== [ 14.079184] ================================================================== [ 14.079839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.080187] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.080510] [ 14.080615] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.080841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.080857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.080880] Call Trace: [ 14.080897] <TASK> [ 14.080914] dump_stack_lvl+0x73/0xb0 [ 14.080941] print_report+0xd1/0x650 [ 14.080964] ? __virt_addr_valid+0x1db/0x2d0 [ 14.081084] ? kasan_atomics_helper+0xc70/0x5450 [ 14.081107] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.081133] ? kasan_atomics_helper+0xc70/0x5450 [ 14.081156] kasan_report+0x141/0x180 [ 14.081180] ? kasan_atomics_helper+0xc70/0x5450 [ 14.081208] kasan_check_range+0x10c/0x1c0 [ 14.081244] __kasan_check_write+0x18/0x20 [ 14.081265] kasan_atomics_helper+0xc70/0x5450 [ 14.081290] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.081315] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.081337] ? kasan_atomics+0x152/0x310 [ 14.081361] kasan_atomics+0x1dc/0x310 [ 14.081382] ? __pfx_kasan_atomics+0x10/0x10 [ 14.081404] ? __pfx_read_tsc+0x10/0x10 [ 14.081425] ? ktime_get_ts64+0x86/0x230 [ 14.081451] kunit_try_run_case+0x1a5/0x480 [ 14.081476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.081500] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.081525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.081556] ? __kthread_parkme+0x82/0x180 [ 14.081579] ? preempt_count_sub+0x50/0x80 [ 14.081605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.081629] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.081676] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.081701] kthread+0x337/0x6f0 [ 14.081719] ? trace_preempt_on+0x20/0xc0 [ 14.081743] ? __pfx_kthread+0x10/0x10 [ 14.081762] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.081786] ? calculate_sigpending+0x7b/0xa0 [ 14.081808] ? __pfx_kthread+0x10/0x10 [ 14.081829] ret_from_fork+0x41/0x80 [ 14.081851] ? __pfx_kthread+0x10/0x10 [ 14.081871] ret_from_fork_asm+0x1a/0x30 [ 14.081902] </TASK> [ 14.081914] [ 14.091342] Allocated by task 284: [ 14.091527] kasan_save_stack+0x45/0x70 [ 14.092099] kasan_save_track+0x18/0x40 [ 14.092286] kasan_save_alloc_info+0x3b/0x50 [ 14.092585] __kasan_kmalloc+0xb7/0xc0 [ 14.092918] __kmalloc_cache_noprof+0x189/0x420 [ 14.093138] kasan_atomics+0x95/0x310 [ 14.093330] kunit_try_run_case+0x1a5/0x480 [ 14.093530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.094013] kthread+0x337/0x6f0 [ 14.094167] ret_from_fork+0x41/0x80 [ 14.094480] ret_from_fork_asm+0x1a/0x30 [ 14.094766] [ 14.094846] The buggy address belongs to the object at ffff8881039f4880 [ 14.094846] which belongs to the cache kmalloc-64 of size 64 [ 14.095475] The buggy address is located 0 bytes to the right of [ 14.095475] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.096092] [ 14.096185] The buggy address belongs to the physical page: [ 14.096625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.097061] flags: 0x200000000000000(node=0|zone=2) [ 14.097365] page_type: f5(slab) [ 14.097510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.097964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.098386] page dumped because: kasan: bad access detected [ 14.098697] [ 14.098794] Memory state around the buggy address: [ 14.098963] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.099299] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.099599] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.099906] ^ [ 14.100131] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.100815] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.101181] ================================================================== [ 14.618520] ================================================================== [ 14.618881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.619308] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.619644] [ 14.619735] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.619784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.619797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.619821] Call Trace: [ 14.619841] <TASK> [ 14.619862] dump_stack_lvl+0x73/0xb0 [ 14.619887] print_report+0xd1/0x650 [ 14.619914] ? __virt_addr_valid+0x1db/0x2d0 [ 14.619937] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.619961] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.619984] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.620022] kasan_report+0x141/0x180 [ 14.620047] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.620086] kasan_check_range+0x10c/0x1c0 [ 14.620109] __kasan_check_write+0x18/0x20 [ 14.620141] kasan_atomics_helper+0x18b1/0x5450 [ 14.620174] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.620198] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.620221] ? kasan_atomics+0x152/0x310 [ 14.620256] kasan_atomics+0x1dc/0x310 [ 14.620276] ? __pfx_kasan_atomics+0x10/0x10 [ 14.620299] ? __pfx_read_tsc+0x10/0x10 [ 14.620319] ? ktime_get_ts64+0x86/0x230 [ 14.620347] kunit_try_run_case+0x1a5/0x480 [ 14.620372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.620396] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.620423] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.620447] ? __kthread_parkme+0x82/0x180 [ 14.620471] ? preempt_count_sub+0x50/0x80 [ 14.620499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.620524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.620549] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.620573] kthread+0x337/0x6f0 [ 14.620591] ? trace_preempt_on+0x20/0xc0 [ 14.620617] ? __pfx_kthread+0x10/0x10 [ 14.620635] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.620659] ? calculate_sigpending+0x7b/0xa0 [ 14.620681] ? __pfx_kthread+0x10/0x10 [ 14.620701] ret_from_fork+0x41/0x80 [ 14.620722] ? __pfx_kthread+0x10/0x10 [ 14.620742] ret_from_fork_asm+0x1a/0x30 [ 14.620773] </TASK> [ 14.620784] [ 14.631020] Allocated by task 284: [ 14.631174] kasan_save_stack+0x45/0x70 [ 14.631565] kasan_save_track+0x18/0x40 [ 14.631928] kasan_save_alloc_info+0x3b/0x50 [ 14.632346] __kasan_kmalloc+0xb7/0xc0 [ 14.632713] __kmalloc_cache_noprof+0x189/0x420 [ 14.633132] kasan_atomics+0x95/0x310 [ 14.633365] kunit_try_run_case+0x1a5/0x480 [ 14.633517] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.633884] kthread+0x337/0x6f0 [ 14.634211] ret_from_fork+0x41/0x80 [ 14.634576] ret_from_fork_asm+0x1a/0x30 [ 14.634977] [ 14.635155] The buggy address belongs to the object at ffff8881039f4880 [ 14.635155] which belongs to the cache kmalloc-64 of size 64 [ 14.636143] The buggy address is located 0 bytes to the right of [ 14.636143] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.636528] [ 14.636605] The buggy address belongs to the physical page: [ 14.637129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.637850] flags: 0x200000000000000(node=0|zone=2) [ 14.638306] page_type: f5(slab) [ 14.638627] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.639302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.639974] page dumped because: kasan: bad access detected [ 14.640371] [ 14.640444] Memory state around the buggy address: [ 14.640604] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.641263] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.641902] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.642531] ^ [ 14.642900] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.643296] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.643517] ================================================================== [ 14.664714] ================================================================== [ 14.665081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.665441] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.665816] [ 14.665934] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.665982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.665996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.666020] Call Trace: [ 14.666039] <TASK> [ 14.666058] dump_stack_lvl+0x73/0xb0 [ 14.666085] print_report+0xd1/0x650 [ 14.666110] ? __virt_addr_valid+0x1db/0x2d0 [ 14.666134] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.666157] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.666182] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.666206] kasan_report+0x141/0x180 [ 14.666243] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.666272] kasan_check_range+0x10c/0x1c0 [ 14.666295] __kasan_check_write+0x18/0x20 [ 14.666316] kasan_atomics_helper+0x19e3/0x5450 [ 14.666342] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.666365] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.666390] ? kasan_atomics+0x152/0x310 [ 14.666415] kasan_atomics+0x1dc/0x310 [ 14.666447] ? __pfx_kasan_atomics+0x10/0x10 [ 14.666469] ? __pfx_read_tsc+0x10/0x10 [ 14.666492] ? ktime_get_ts64+0x86/0x230 [ 14.666531] kunit_try_run_case+0x1a5/0x480 [ 14.666558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.666586] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.666613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.666643] ? __kthread_parkme+0x82/0x180 [ 14.666667] ? preempt_count_sub+0x50/0x80 [ 14.666694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.666719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.666743] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.666768] kthread+0x337/0x6f0 [ 14.666786] ? trace_preempt_on+0x20/0xc0 [ 14.666811] ? __pfx_kthread+0x10/0x10 [ 14.666832] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.666856] ? calculate_sigpending+0x7b/0xa0 [ 14.666878] ? __pfx_kthread+0x10/0x10 [ 14.666899] ret_from_fork+0x41/0x80 [ 14.666920] ? __pfx_kthread+0x10/0x10 [ 14.666940] ret_from_fork_asm+0x1a/0x30 [ 14.666972] </TASK> [ 14.666985] [ 14.674730] Allocated by task 284: [ 14.674897] kasan_save_stack+0x45/0x70 [ 14.675102] kasan_save_track+0x18/0x40 [ 14.675324] kasan_save_alloc_info+0x3b/0x50 [ 14.675521] __kasan_kmalloc+0xb7/0xc0 [ 14.675728] __kmalloc_cache_noprof+0x189/0x420 [ 14.675954] kasan_atomics+0x95/0x310 [ 14.676134] kunit_try_run_case+0x1a5/0x480 [ 14.676342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.676563] kthread+0x337/0x6f0 [ 14.676704] ret_from_fork+0x41/0x80 [ 14.676837] ret_from_fork_asm+0x1a/0x30 [ 14.676978] [ 14.677049] The buggy address belongs to the object at ffff8881039f4880 [ 14.677049] which belongs to the cache kmalloc-64 of size 64 [ 14.677566] The buggy address is located 0 bytes to the right of [ 14.677566] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.678146] [ 14.678254] The buggy address belongs to the physical page: [ 14.678513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.678885] flags: 0x200000000000000(node=0|zone=2) [ 14.679052] page_type: f5(slab) [ 14.679175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.679421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.679705] page dumped because: kasan: bad access detected [ 14.679974] [ 14.680071] Memory state around the buggy address: [ 14.680358] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.680736] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.681091] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.681429] ^ [ 14.681705] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.682001] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.682299] ================================================================== [ 14.682922] ================================================================== [ 14.683264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.683578] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.683952] [ 14.684066] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.684112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.684125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.684151] Call Trace: [ 14.684166] <TASK> [ 14.684183] dump_stack_lvl+0x73/0xb0 [ 14.684210] print_report+0xd1/0x650 [ 14.684244] ? __virt_addr_valid+0x1db/0x2d0 [ 14.684268] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.684291] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.684316] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.684340] kasan_report+0x141/0x180 [ 14.684364] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.684403] kasan_check_range+0x10c/0x1c0 [ 14.684425] __kasan_check_write+0x18/0x20 [ 14.684447] kasan_atomics_helper+0x1a7f/0x5450 [ 14.684484] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.684507] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.684532] ? kasan_atomics+0x152/0x310 [ 14.684565] kasan_atomics+0x1dc/0x310 [ 14.684586] ? __pfx_kasan_atomics+0x10/0x10 [ 14.684609] ? __pfx_read_tsc+0x10/0x10 [ 14.684658] ? ktime_get_ts64+0x86/0x230 [ 14.684685] kunit_try_run_case+0x1a5/0x480 [ 14.684710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.684734] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.684760] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.684785] ? __kthread_parkme+0x82/0x180 [ 14.684809] ? preempt_count_sub+0x50/0x80 [ 14.684834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.684859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.684884] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.684909] kthread+0x337/0x6f0 [ 14.684927] ? trace_preempt_on+0x20/0xc0 [ 14.684952] ? __pfx_kthread+0x10/0x10 [ 14.684971] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.684994] ? calculate_sigpending+0x7b/0xa0 [ 14.685017] ? __pfx_kthread+0x10/0x10 [ 14.685038] ret_from_fork+0x41/0x80 [ 14.685059] ? __pfx_kthread+0x10/0x10 [ 14.685089] ret_from_fork_asm+0x1a/0x30 [ 14.685120] </TASK> [ 14.685132] [ 14.693179] Allocated by task 284: [ 14.693358] kasan_save_stack+0x45/0x70 [ 14.693576] kasan_save_track+0x18/0x40 [ 14.693802] kasan_save_alloc_info+0x3b/0x50 [ 14.694023] __kasan_kmalloc+0xb7/0xc0 [ 14.694219] __kmalloc_cache_noprof+0x189/0x420 [ 14.694449] kasan_atomics+0x95/0x310 [ 14.694582] kunit_try_run_case+0x1a5/0x480 [ 14.694757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.694996] kthread+0x337/0x6f0 [ 14.695177] ret_from_fork+0x41/0x80 [ 14.695375] ret_from_fork_asm+0x1a/0x30 [ 14.695572] [ 14.695700] The buggy address belongs to the object at ffff8881039f4880 [ 14.695700] which belongs to the cache kmalloc-64 of size 64 [ 14.696191] The buggy address is located 0 bytes to the right of [ 14.696191] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.696698] [ 14.696822] The buggy address belongs to the physical page: [ 14.697081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.697430] flags: 0x200000000000000(node=0|zone=2) [ 14.697695] page_type: f5(slab) [ 14.697859] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.698213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.698500] page dumped because: kasan: bad access detected [ 14.698799] [ 14.698895] Memory state around the buggy address: [ 14.699099] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.699333] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.699550] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.699913] ^ [ 14.700141] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.700474] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.700821] ================================================================== [ 14.465362] ================================================================== [ 14.465704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.466148] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.466430] [ 14.466556] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.466607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.466620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.466666] Call Trace: [ 14.466686] <TASK> [ 14.466718] dump_stack_lvl+0x73/0xb0 [ 14.466747] print_report+0xd1/0x650 [ 14.466773] ? __virt_addr_valid+0x1db/0x2d0 [ 14.466797] ? kasan_atomics_helper+0x1467/0x5450 [ 14.466821] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.466844] ? kasan_atomics_helper+0x1467/0x5450 [ 14.466868] kasan_report+0x141/0x180 [ 14.466892] ? kasan_atomics_helper+0x1467/0x5450 [ 14.466920] kasan_check_range+0x10c/0x1c0 [ 14.466941] __kasan_check_write+0x18/0x20 [ 14.466963] kasan_atomics_helper+0x1467/0x5450 [ 14.466987] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.467011] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.467035] ? kasan_atomics+0x152/0x310 [ 14.467060] kasan_atomics+0x1dc/0x310 [ 14.467080] ? __pfx_kasan_atomics+0x10/0x10 [ 14.467102] ? __pfx_read_tsc+0x10/0x10 [ 14.467124] ? ktime_get_ts64+0x86/0x230 [ 14.467150] kunit_try_run_case+0x1a5/0x480 [ 14.467175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.467200] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.467235] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.467260] ? __kthread_parkme+0x82/0x180 [ 14.467283] ? preempt_count_sub+0x50/0x80 [ 14.467310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.467335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.467360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.467384] kthread+0x337/0x6f0 [ 14.467405] ? trace_preempt_on+0x20/0xc0 [ 14.467431] ? __pfx_kthread+0x10/0x10 [ 14.467459] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.467482] ? calculate_sigpending+0x7b/0xa0 [ 14.467506] ? __pfx_kthread+0x10/0x10 [ 14.467537] ret_from_fork+0x41/0x80 [ 14.467559] ? __pfx_kthread+0x10/0x10 [ 14.467579] ret_from_fork_asm+0x1a/0x30 [ 14.467611] </TASK> [ 14.467623] [ 14.478138] Allocated by task 284: [ 14.478356] kasan_save_stack+0x45/0x70 [ 14.478583] kasan_save_track+0x18/0x40 [ 14.478792] kasan_save_alloc_info+0x3b/0x50 [ 14.478977] __kasan_kmalloc+0xb7/0xc0 [ 14.479180] __kmalloc_cache_noprof+0x189/0x420 [ 14.479408] kasan_atomics+0x95/0x310 [ 14.479588] kunit_try_run_case+0x1a5/0x480 [ 14.479813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.480058] kthread+0x337/0x6f0 [ 14.480222] ret_from_fork+0x41/0x80 [ 14.480393] ret_from_fork_asm+0x1a/0x30 [ 14.480581] [ 14.480679] The buggy address belongs to the object at ffff8881039f4880 [ 14.480679] which belongs to the cache kmalloc-64 of size 64 [ 14.481167] The buggy address is located 0 bytes to the right of [ 14.481167] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.481674] [ 14.481777] The buggy address belongs to the physical page: [ 14.482034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.482385] flags: 0x200000000000000(node=0|zone=2) [ 14.482627] page_type: f5(slab) [ 14.482809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.483046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.483311] page dumped because: kasan: bad access detected [ 14.483566] [ 14.483685] Memory state around the buggy address: [ 14.483914] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.484247] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.484678] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.484891] ^ [ 14.485299] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.485653] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.485971] ================================================================== [ 14.826923] ================================================================== [ 14.827599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 14.828279] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.828902] [ 14.829087] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.829136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.829149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.829173] Call Trace: [ 14.829194] <TASK> [ 14.829215] dump_stack_lvl+0x73/0xb0 [ 14.829251] print_report+0xd1/0x650 [ 14.829277] ? __virt_addr_valid+0x1db/0x2d0 [ 14.829301] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.829326] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.829351] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.829374] kasan_report+0x141/0x180 [ 14.829398] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.829427] kasan_check_range+0x10c/0x1c0 [ 14.829449] __kasan_check_write+0x18/0x20 [ 14.829470] kasan_atomics_helper+0x1eaa/0x5450 [ 14.829494] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.829519] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.829549] ? kasan_atomics+0x152/0x310 [ 14.829573] kasan_atomics+0x1dc/0x310 [ 14.829594] ? __pfx_kasan_atomics+0x10/0x10 [ 14.829616] ? __pfx_read_tsc+0x10/0x10 [ 14.829658] ? ktime_get_ts64+0x86/0x230 [ 14.829686] kunit_try_run_case+0x1a5/0x480 [ 14.829713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.829737] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.829763] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.829788] ? __kthread_parkme+0x82/0x180 [ 14.829814] ? preempt_count_sub+0x50/0x80 [ 14.829841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.829866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.829891] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.829916] kthread+0x337/0x6f0 [ 14.829934] ? trace_preempt_on+0x20/0xc0 [ 14.829960] ? __pfx_kthread+0x10/0x10 [ 14.829979] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.830003] ? calculate_sigpending+0x7b/0xa0 [ 14.830026] ? __pfx_kthread+0x10/0x10 [ 14.830046] ret_from_fork+0x41/0x80 [ 14.830068] ? __pfx_kthread+0x10/0x10 [ 14.830087] ret_from_fork_asm+0x1a/0x30 [ 14.830119] </TASK> [ 14.830132] [ 14.843598] Allocated by task 284: [ 14.843939] kasan_save_stack+0x45/0x70 [ 14.844243] kasan_save_track+0x18/0x40 [ 14.844380] kasan_save_alloc_info+0x3b/0x50 [ 14.844528] __kasan_kmalloc+0xb7/0xc0 [ 14.844703] __kmalloc_cache_noprof+0x189/0x420 [ 14.845098] kasan_atomics+0x95/0x310 [ 14.845433] kunit_try_run_case+0x1a5/0x480 [ 14.845832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.846369] kthread+0x337/0x6f0 [ 14.846677] ret_from_fork+0x41/0x80 [ 14.846994] ret_from_fork_asm+0x1a/0x30 [ 14.847367] [ 14.847539] The buggy address belongs to the object at ffff8881039f4880 [ 14.847539] which belongs to the cache kmalloc-64 of size 64 [ 14.848159] The buggy address is located 0 bytes to the right of [ 14.848159] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.848538] [ 14.848614] The buggy address belongs to the physical page: [ 14.849096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.849796] flags: 0x200000000000000(node=0|zone=2) [ 14.850280] page_type: f5(slab) [ 14.850572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.851290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.851968] page dumped because: kasan: bad access detected [ 14.852593] [ 14.852773] Memory state around the buggy address: [ 14.853200] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.853572] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.853815] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.854032] ^ [ 14.854188] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.854483] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.854714] ================================================================== [ 14.020675] ================================================================== [ 14.020985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.021327] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.021695] [ 14.021808] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.021854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.021867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.021890] Call Trace: [ 14.021902] <TASK> [ 14.021917] dump_stack_lvl+0x73/0xb0 [ 14.021941] print_report+0xd1/0x650 [ 14.021965] ? __virt_addr_valid+0x1db/0x2d0 [ 14.021987] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.022011] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.022035] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.022059] kasan_report+0x141/0x180 [ 14.022083] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.022110] kasan_check_range+0x10c/0x1c0 [ 14.022133] __kasan_check_write+0x18/0x20 [ 14.022153] kasan_atomics_helper+0xa2b/0x5450 [ 14.022178] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.022203] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.022239] ? kasan_atomics+0x152/0x310 [ 14.022263] kasan_atomics+0x1dc/0x310 [ 14.022284] ? __pfx_kasan_atomics+0x10/0x10 [ 14.022307] ? __pfx_read_tsc+0x10/0x10 [ 14.022327] ? ktime_get_ts64+0x86/0x230 [ 14.022353] kunit_try_run_case+0x1a5/0x480 [ 14.022378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.022401] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.022427] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.022453] ? __kthread_parkme+0x82/0x180 [ 14.022476] ? preempt_count_sub+0x50/0x80 [ 14.022501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.022526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.022551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.022576] kthread+0x337/0x6f0 [ 14.022594] ? trace_preempt_on+0x20/0xc0 [ 14.022619] ? __pfx_kthread+0x10/0x10 [ 14.022657] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.022681] ? calculate_sigpending+0x7b/0xa0 [ 14.022705] ? __pfx_kthread+0x10/0x10 [ 14.022725] ret_from_fork+0x41/0x80 [ 14.022747] ? __pfx_kthread+0x10/0x10 [ 14.022767] ret_from_fork_asm+0x1a/0x30 [ 14.022799] </TASK> [ 14.022812] [ 14.030078] Allocated by task 284: [ 14.030250] kasan_save_stack+0x45/0x70 [ 14.030426] kasan_save_track+0x18/0x40 [ 14.030619] kasan_save_alloc_info+0x3b/0x50 [ 14.030829] __kasan_kmalloc+0xb7/0xc0 [ 14.030996] __kmalloc_cache_noprof+0x189/0x420 [ 14.031205] kasan_atomics+0x95/0x310 [ 14.031374] kunit_try_run_case+0x1a5/0x480 [ 14.031580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.031841] kthread+0x337/0x6f0 [ 14.032001] ret_from_fork+0x41/0x80 [ 14.032166] ret_from_fork_asm+0x1a/0x30 [ 14.032345] [ 14.032420] The buggy address belongs to the object at ffff8881039f4880 [ 14.032420] which belongs to the cache kmalloc-64 of size 64 [ 14.032919] The buggy address is located 0 bytes to the right of [ 14.032919] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.033443] [ 14.033547] The buggy address belongs to the physical page: [ 14.033784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.034138] flags: 0x200000000000000(node=0|zone=2) [ 14.034346] page_type: f5(slab) [ 14.034516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.034852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.035105] page dumped because: kasan: bad access detected [ 14.035288] [ 14.035361] Memory state around the buggy address: [ 14.035518] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.035761] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.036082] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.036407] ^ [ 14.036631] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.036968] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.037294] ================================================================== [ 14.701423] ================================================================== [ 14.701905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 14.702286] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.702553] [ 14.702666] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.702714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.702727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.702751] Call Trace: [ 14.702769] <TASK> [ 14.702788] dump_stack_lvl+0x73/0xb0 [ 14.702814] print_report+0xd1/0x650 [ 14.702839] ? __virt_addr_valid+0x1db/0x2d0 [ 14.702862] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.702886] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.702921] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.702946] kasan_report+0x141/0x180 [ 14.702984] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.703013] kasan_check_range+0x10c/0x1c0 [ 14.703035] __kasan_check_write+0x18/0x20 [ 14.703056] kasan_atomics_helper+0x1b22/0x5450 [ 14.703081] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.703107] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.703131] ? kasan_atomics+0x152/0x310 [ 14.703156] kasan_atomics+0x1dc/0x310 [ 14.703176] ? __pfx_kasan_atomics+0x10/0x10 [ 14.703198] ? __pfx_read_tsc+0x10/0x10 [ 14.703219] ? ktime_get_ts64+0x86/0x230 [ 14.703253] kunit_try_run_case+0x1a5/0x480 [ 14.703279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.703303] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.703328] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.703353] ? __kthread_parkme+0x82/0x180 [ 14.703376] ? preempt_count_sub+0x50/0x80 [ 14.703403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.703428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.703461] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.703486] kthread+0x337/0x6f0 [ 14.703504] ? trace_preempt_on+0x20/0xc0 [ 14.703540] ? __pfx_kthread+0x10/0x10 [ 14.703560] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.703583] ? calculate_sigpending+0x7b/0xa0 [ 14.703605] ? __pfx_kthread+0x10/0x10 [ 14.703625] ret_from_fork+0x41/0x80 [ 14.703673] ? __pfx_kthread+0x10/0x10 [ 14.703693] ret_from_fork_asm+0x1a/0x30 [ 14.703735] </TASK> [ 14.703747] [ 14.711170] Allocated by task 284: [ 14.711339] kasan_save_stack+0x45/0x70 [ 14.711558] kasan_save_track+0x18/0x40 [ 14.711801] kasan_save_alloc_info+0x3b/0x50 [ 14.712055] __kasan_kmalloc+0xb7/0xc0 [ 14.712260] __kmalloc_cache_noprof+0x189/0x420 [ 14.712508] kasan_atomics+0x95/0x310 [ 14.712722] kunit_try_run_case+0x1a5/0x480 [ 14.712956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.713178] kthread+0x337/0x6f0 [ 14.713341] ret_from_fork+0x41/0x80 [ 14.713548] ret_from_fork_asm+0x1a/0x30 [ 14.713768] [ 14.713878] The buggy address belongs to the object at ffff8881039f4880 [ 14.713878] which belongs to the cache kmalloc-64 of size 64 [ 14.714404] The buggy address is located 0 bytes to the right of [ 14.714404] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.714938] [ 14.715066] The buggy address belongs to the physical page: [ 14.715312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.715569] flags: 0x200000000000000(node=0|zone=2) [ 14.715760] page_type: f5(slab) [ 14.715886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.716253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.716607] page dumped because: kasan: bad access detected [ 14.716876] [ 14.716948] Memory state around the buggy address: [ 14.717104] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.717334] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.717601] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.717980] ^ [ 14.718251] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.718613] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.718976] ================================================================== [ 14.908327] ================================================================== [ 14.908692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 14.908957] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.909185] [ 14.909315] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.909361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.909375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.909397] Call Trace: [ 14.909415] <TASK> [ 14.909432] dump_stack_lvl+0x73/0xb0 [ 14.909457] print_report+0xd1/0x650 [ 14.909481] ? __virt_addr_valid+0x1db/0x2d0 [ 14.909505] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.909527] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.909558] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.909582] kasan_report+0x141/0x180 [ 14.909606] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.909634] __asan_report_load8_noabort+0x18/0x20 [ 14.909656] kasan_atomics_helper+0x4f98/0x5450 [ 14.909681] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.909705] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.909728] ? kasan_atomics+0x152/0x310 [ 14.909753] kasan_atomics+0x1dc/0x310 [ 14.909774] ? __pfx_kasan_atomics+0x10/0x10 [ 14.909797] ? __pfx_read_tsc+0x10/0x10 [ 14.909818] ? ktime_get_ts64+0x86/0x230 [ 14.909845] kunit_try_run_case+0x1a5/0x480 [ 14.909869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.909893] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.909919] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.909944] ? __kthread_parkme+0x82/0x180 [ 14.909967] ? preempt_count_sub+0x50/0x80 [ 14.909993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.910018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.910043] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.910068] kthread+0x337/0x6f0 [ 14.910087] ? trace_preempt_on+0x20/0xc0 [ 14.910112] ? __pfx_kthread+0x10/0x10 [ 14.910132] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.910155] ? calculate_sigpending+0x7b/0xa0 [ 14.910178] ? __pfx_kthread+0x10/0x10 [ 14.910199] ret_from_fork+0x41/0x80 [ 14.910221] ? __pfx_kthread+0x10/0x10 [ 14.910250] ret_from_fork_asm+0x1a/0x30 [ 14.910283] </TASK> [ 14.910294] [ 14.917754] Allocated by task 284: [ 14.917931] kasan_save_stack+0x45/0x70 [ 14.918142] kasan_save_track+0x18/0x40 [ 14.918309] kasan_save_alloc_info+0x3b/0x50 [ 14.918525] __kasan_kmalloc+0xb7/0xc0 [ 14.918736] __kmalloc_cache_noprof+0x189/0x420 [ 14.918935] kasan_atomics+0x95/0x310 [ 14.919119] kunit_try_run_case+0x1a5/0x480 [ 14.919336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.919515] kthread+0x337/0x6f0 [ 14.919636] ret_from_fork+0x41/0x80 [ 14.919824] ret_from_fork_asm+0x1a/0x30 [ 14.920030] [ 14.920123] The buggy address belongs to the object at ffff8881039f4880 [ 14.920123] which belongs to the cache kmalloc-64 of size 64 [ 14.920685] The buggy address is located 0 bytes to the right of [ 14.920685] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.921064] [ 14.921139] The buggy address belongs to the physical page: [ 14.921373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.921817] flags: 0x200000000000000(node=0|zone=2) [ 14.922069] page_type: f5(slab) [ 14.922298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.922536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.922843] page dumped because: kasan: bad access detected [ 14.923097] [ 14.923192] Memory state around the buggy address: [ 14.923430] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.923753] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.924067] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.924326] ^ [ 14.924554] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.924880] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.925199] ================================================================== [ 14.523847] ================================================================== [ 14.524204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.524947] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.525204] [ 14.525327] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.525385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.525399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.525421] Call Trace: [ 14.525451] <TASK> [ 14.525471] dump_stack_lvl+0x73/0xb0 [ 14.525498] print_report+0xd1/0x650 [ 14.525521] ? __virt_addr_valid+0x1db/0x2d0 [ 14.525559] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.525583] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.525619] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.525653] kasan_report+0x141/0x180 [ 14.525678] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.525707] kasan_check_range+0x10c/0x1c0 [ 14.525739] __kasan_check_write+0x18/0x20 [ 14.525762] kasan_atomics_helper+0x15b6/0x5450 [ 14.525786] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.525822] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.525846] ? kasan_atomics+0x152/0x310 [ 14.525871] kasan_atomics+0x1dc/0x310 [ 14.525892] ? __pfx_kasan_atomics+0x10/0x10 [ 14.525923] ? __pfx_read_tsc+0x10/0x10 [ 14.525944] ? ktime_get_ts64+0x86/0x230 [ 14.525971] kunit_try_run_case+0x1a5/0x480 [ 14.526008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.526032] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.526067] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.526092] ? __kthread_parkme+0x82/0x180 [ 14.526118] ? preempt_count_sub+0x50/0x80 [ 14.526157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.526185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.526210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.526251] kthread+0x337/0x6f0 [ 14.526271] ? trace_preempt_on+0x20/0xc0 [ 14.526307] ? __pfx_kthread+0x10/0x10 [ 14.526327] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.526350] ? calculate_sigpending+0x7b/0xa0 [ 14.526374] ? __pfx_kthread+0x10/0x10 [ 14.526395] ret_from_fork+0x41/0x80 [ 14.526428] ? __pfx_kthread+0x10/0x10 [ 14.526448] ret_from_fork_asm+0x1a/0x30 [ 14.526490] </TASK> [ 14.526502] [ 14.534331] Allocated by task 284: [ 14.534470] kasan_save_stack+0x45/0x70 [ 14.534617] kasan_save_track+0x18/0x40 [ 14.534754] kasan_save_alloc_info+0x3b/0x50 [ 14.535032] __kasan_kmalloc+0xb7/0xc0 [ 14.535256] __kmalloc_cache_noprof+0x189/0x420 [ 14.535483] kasan_atomics+0x95/0x310 [ 14.535685] kunit_try_run_case+0x1a5/0x480 [ 14.535897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.536153] kthread+0x337/0x6f0 [ 14.536334] ret_from_fork+0x41/0x80 [ 14.536549] ret_from_fork_asm+0x1a/0x30 [ 14.536849] [ 14.536948] The buggy address belongs to the object at ffff8881039f4880 [ 14.536948] which belongs to the cache kmalloc-64 of size 64 [ 14.537518] The buggy address is located 0 bytes to the right of [ 14.537518] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.538113] [ 14.538190] The buggy address belongs to the physical page: [ 14.538377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.538620] flags: 0x200000000000000(node=0|zone=2) [ 14.538785] page_type: f5(slab) [ 14.538910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.539391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.539746] page dumped because: kasan: bad access detected [ 14.540018] [ 14.540114] Memory state around the buggy address: [ 14.540384] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.540757] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.540973] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.541184] ^ [ 14.541348] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.541877] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.542217] ================================================================== [ 14.961771] ================================================================== [ 14.962038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 14.962328] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.962673] [ 14.962795] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.962852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.962866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.962889] Call Trace: [ 14.962907] <TASK> [ 14.962927] dump_stack_lvl+0x73/0xb0 [ 14.962953] print_report+0xd1/0x650 [ 14.962977] ? __virt_addr_valid+0x1db/0x2d0 [ 14.963001] ? kasan_atomics_helper+0x218a/0x5450 [ 14.963023] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.963048] ? kasan_atomics_helper+0x218a/0x5450 [ 14.963072] kasan_report+0x141/0x180 [ 14.963095] ? kasan_atomics_helper+0x218a/0x5450 [ 14.963136] kasan_check_range+0x10c/0x1c0 [ 14.963158] __kasan_check_write+0x18/0x20 [ 14.963180] kasan_atomics_helper+0x218a/0x5450 [ 14.963206] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.963243] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.963269] ? kasan_atomics+0x152/0x310 [ 14.963301] kasan_atomics+0x1dc/0x310 [ 14.963324] ? __pfx_kasan_atomics+0x10/0x10 [ 14.963349] ? __pfx_read_tsc+0x10/0x10 [ 14.963373] ? ktime_get_ts64+0x86/0x230 [ 14.963400] kunit_try_run_case+0x1a5/0x480 [ 14.963427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.963454] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.963482] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.963510] ? __kthread_parkme+0x82/0x180 [ 14.963534] ? preempt_count_sub+0x50/0x80 [ 14.963561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.963587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.963613] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.963638] kthread+0x337/0x6f0 [ 14.963668] ? trace_preempt_on+0x20/0xc0 [ 14.963693] ? __pfx_kthread+0x10/0x10 [ 14.963713] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.963737] ? calculate_sigpending+0x7b/0xa0 [ 14.963761] ? __pfx_kthread+0x10/0x10 [ 14.963782] ret_from_fork+0x41/0x80 [ 14.963805] ? __pfx_kthread+0x10/0x10 [ 14.963824] ret_from_fork_asm+0x1a/0x30 [ 14.963857] </TASK> [ 14.963869] [ 14.971806] Allocated by task 284: [ 14.972002] kasan_save_stack+0x45/0x70 [ 14.972219] kasan_save_track+0x18/0x40 [ 14.972430] kasan_save_alloc_info+0x3b/0x50 [ 14.972628] __kasan_kmalloc+0xb7/0xc0 [ 14.972803] __kmalloc_cache_noprof+0x189/0x420 [ 14.972970] kasan_atomics+0x95/0x310 [ 14.973106] kunit_try_run_case+0x1a5/0x480 [ 14.973276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.973535] kthread+0x337/0x6f0 [ 14.973772] ret_from_fork+0x41/0x80 [ 14.973957] ret_from_fork_asm+0x1a/0x30 [ 14.974150] [ 14.974232] The buggy address belongs to the object at ffff8881039f4880 [ 14.974232] which belongs to the cache kmalloc-64 of size 64 [ 14.974783] The buggy address is located 0 bytes to the right of [ 14.974783] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.975262] [ 14.975363] The buggy address belongs to the physical page: [ 14.975595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.975975] flags: 0x200000000000000(node=0|zone=2) [ 14.976170] page_type: f5(slab) [ 14.976330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.976649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.976894] page dumped because: kasan: bad access detected [ 14.977069] [ 14.977140] Memory state around the buggy address: [ 14.977342] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.977673] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.978000] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.978336] ^ [ 14.978557] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.978821] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.979039] ================================================================== [ 14.504955] ================================================================== [ 14.505434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.505833] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.506150] [ 14.506257] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.506306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.506319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.506343] Call Trace: [ 14.506362] <TASK> [ 14.506382] dump_stack_lvl+0x73/0xb0 [ 14.506409] print_report+0xd1/0x650 [ 14.506435] ? __virt_addr_valid+0x1db/0x2d0 [ 14.506458] ? kasan_atomics_helper+0x151d/0x5450 [ 14.506481] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.506506] ? kasan_atomics_helper+0x151d/0x5450 [ 14.506530] kasan_report+0x141/0x180 [ 14.506554] ? kasan_atomics_helper+0x151d/0x5450 [ 14.506583] kasan_check_range+0x10c/0x1c0 [ 14.506605] __kasan_check_write+0x18/0x20 [ 14.506627] kasan_atomics_helper+0x151d/0x5450 [ 14.506662] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.506687] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.506711] ? kasan_atomics+0x152/0x310 [ 14.506736] kasan_atomics+0x1dc/0x310 [ 14.506758] ? __pfx_kasan_atomics+0x10/0x10 [ 14.506780] ? __pfx_read_tsc+0x10/0x10 [ 14.506801] ? ktime_get_ts64+0x86/0x230 [ 14.506829] kunit_try_run_case+0x1a5/0x480 [ 14.506867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.506890] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.506928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.506963] ? __kthread_parkme+0x82/0x180 [ 14.506987] ? preempt_count_sub+0x50/0x80 [ 14.507014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.507040] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.507065] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.507111] kthread+0x337/0x6f0 [ 14.507131] ? trace_preempt_on+0x20/0xc0 [ 14.507156] ? __pfx_kthread+0x10/0x10 [ 14.507176] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.507199] ? calculate_sigpending+0x7b/0xa0 [ 14.507223] ? __pfx_kthread+0x10/0x10 [ 14.507253] ret_from_fork+0x41/0x80 [ 14.507275] ? __pfx_kthread+0x10/0x10 [ 14.507295] ret_from_fork_asm+0x1a/0x30 [ 14.507328] </TASK> [ 14.507340] [ 14.515986] Allocated by task 284: [ 14.516170] kasan_save_stack+0x45/0x70 [ 14.516389] kasan_save_track+0x18/0x40 [ 14.516577] kasan_save_alloc_info+0x3b/0x50 [ 14.516810] __kasan_kmalloc+0xb7/0xc0 [ 14.516962] __kmalloc_cache_noprof+0x189/0x420 [ 14.517183] kasan_atomics+0x95/0x310 [ 14.517372] kunit_try_run_case+0x1a5/0x480 [ 14.517560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.517849] kthread+0x337/0x6f0 [ 14.518003] ret_from_fork+0x41/0x80 [ 14.518155] ret_from_fork_asm+0x1a/0x30 [ 14.518393] [ 14.518492] The buggy address belongs to the object at ffff8881039f4880 [ 14.518492] which belongs to the cache kmalloc-64 of size 64 [ 14.518944] The buggy address is located 0 bytes to the right of [ 14.518944] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.519322] [ 14.519398] The buggy address belongs to the physical page: [ 14.519573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.519815] flags: 0x200000000000000(node=0|zone=2) [ 14.520055] page_type: f5(slab) [ 14.520326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.520682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.521019] page dumped because: kasan: bad access detected [ 14.521251] [ 14.521322] Memory state around the buggy address: [ 14.521479] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.521702] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.521919] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.522132] ^ [ 14.522406] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.522810] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.523159] ================================================================== [ 14.427904] ================================================================== [ 14.428335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.428779] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.429003] [ 14.429195] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.429287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.429302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.429337] Call Trace: [ 14.429360] <TASK> [ 14.429379] dump_stack_lvl+0x73/0xb0 [ 14.429406] print_report+0xd1/0x650 [ 14.429431] ? __virt_addr_valid+0x1db/0x2d0 [ 14.429454] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.429478] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.429503] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.429562] kasan_report+0x141/0x180 [ 14.429587] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.429627] kasan_check_range+0x10c/0x1c0 [ 14.429648] __kasan_check_read+0x15/0x20 [ 14.429669] kasan_atomics_helper+0x13b5/0x5450 [ 14.429694] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.429718] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.429742] ? kasan_atomics+0x152/0x310 [ 14.429767] kasan_atomics+0x1dc/0x310 [ 14.429787] ? __pfx_kasan_atomics+0x10/0x10 [ 14.429809] ? __pfx_read_tsc+0x10/0x10 [ 14.429831] ? ktime_get_ts64+0x86/0x230 [ 14.429857] kunit_try_run_case+0x1a5/0x480 [ 14.429883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.429906] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.429932] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.429956] ? __kthread_parkme+0x82/0x180 [ 14.429980] ? preempt_count_sub+0x50/0x80 [ 14.430008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.430033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.430057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.430081] kthread+0x337/0x6f0 [ 14.430110] ? trace_preempt_on+0x20/0xc0 [ 14.430134] ? __pfx_kthread+0x10/0x10 [ 14.430154] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.430188] ? calculate_sigpending+0x7b/0xa0 [ 14.430212] ? __pfx_kthread+0x10/0x10 [ 14.430240] ret_from_fork+0x41/0x80 [ 14.430263] ? __pfx_kthread+0x10/0x10 [ 14.430282] ret_from_fork_asm+0x1a/0x30 [ 14.430314] </TASK> [ 14.430325] [ 14.438050] Allocated by task 284: [ 14.438243] kasan_save_stack+0x45/0x70 [ 14.438448] kasan_save_track+0x18/0x40 [ 14.438643] kasan_save_alloc_info+0x3b/0x50 [ 14.438941] __kasan_kmalloc+0xb7/0xc0 [ 14.439098] __kmalloc_cache_noprof+0x189/0x420 [ 14.439277] kasan_atomics+0x95/0x310 [ 14.439469] kunit_try_run_case+0x1a5/0x480 [ 14.439685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.439890] kthread+0x337/0x6f0 [ 14.440092] ret_from_fork+0x41/0x80 [ 14.440250] ret_from_fork_asm+0x1a/0x30 [ 14.440444] [ 14.440517] The buggy address belongs to the object at ffff8881039f4880 [ 14.440517] which belongs to the cache kmalloc-64 of size 64 [ 14.441247] The buggy address is located 0 bytes to the right of [ 14.441247] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.441689] [ 14.441806] The buggy address belongs to the physical page: [ 14.442105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.442472] flags: 0x200000000000000(node=0|zone=2) [ 14.442755] page_type: f5(slab) [ 14.442883] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.443114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.443409] page dumped because: kasan: bad access detected [ 14.443661] [ 14.443758] Memory state around the buggy address: [ 14.444026] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.444289] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.444513] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.444979] ^ [ 14.445207] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.445567] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.445891] ================================================================== [ 14.298180] ================================================================== [ 14.298910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.299328] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284 [ 14.300055] [ 14.300296] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 14.300353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.300367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.300391] Call Trace: [ 14.300411] <TASK> [ 14.300469] dump_stack_lvl+0x73/0xb0 [ 14.300500] print_report+0xd1/0x650 [ 14.300526] ? __virt_addr_valid+0x1db/0x2d0 [ 14.300549] ? kasan_atomics_helper+0x1148/0x5450 [ 14.300574] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.300598] ? kasan_atomics_helper+0x1148/0x5450 [ 14.300621] kasan_report+0x141/0x180 [ 14.300660] ? kasan_atomics_helper+0x1148/0x5450 [ 14.300689] kasan_check_range+0x10c/0x1c0 [ 14.300710] __kasan_check_write+0x18/0x20 [ 14.300731] kasan_atomics_helper+0x1148/0x5450 [ 14.300756] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.300781] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.300804] ? kasan_atomics+0x152/0x310 [ 14.300830] kasan_atomics+0x1dc/0x310 [ 14.300850] ? __pfx_kasan_atomics+0x10/0x10 [ 14.300873] ? __pfx_read_tsc+0x10/0x10 [ 14.300894] ? ktime_get_ts64+0x86/0x230 [ 14.300921] kunit_try_run_case+0x1a5/0x480 [ 14.300948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.300971] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.300997] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.301022] ? __kthread_parkme+0x82/0x180 [ 14.301045] ? preempt_count_sub+0x50/0x80 [ 14.301072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.301096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.301121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.301145] kthread+0x337/0x6f0 [ 14.301162] ? trace_preempt_on+0x20/0xc0 [ 14.301187] ? __pfx_kthread+0x10/0x10 [ 14.301207] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.301242] ? calculate_sigpending+0x7b/0xa0 [ 14.301265] ? __pfx_kthread+0x10/0x10 [ 14.301285] ret_from_fork+0x41/0x80 [ 14.301306] ? __pfx_kthread+0x10/0x10 [ 14.301325] ret_from_fork_asm+0x1a/0x30 [ 14.301358] </TASK> [ 14.301370] [ 14.312553] Allocated by task 284: [ 14.312883] kasan_save_stack+0x45/0x70 [ 14.313273] kasan_save_track+0x18/0x40 [ 14.313589] kasan_save_alloc_info+0x3b/0x50 [ 14.313935] __kasan_kmalloc+0xb7/0xc0 [ 14.314124] __kmalloc_cache_noprof+0x189/0x420 [ 14.314345] kasan_atomics+0x95/0x310 [ 14.314521] kunit_try_run_case+0x1a5/0x480 [ 14.314800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.315045] kthread+0x337/0x6f0 [ 14.315202] ret_from_fork+0x41/0x80 [ 14.315351] ret_from_fork_asm+0x1a/0x30 [ 14.315553] [ 14.315653] The buggy address belongs to the object at ffff8881039f4880 [ 14.315653] which belongs to the cache kmalloc-64 of size 64 [ 14.316019] The buggy address is located 0 bytes to the right of [ 14.316019] allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0) [ 14.316780] [ 14.316859] The buggy address belongs to the physical page: [ 14.317035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 14.317380] flags: 0x200000000000000(node=0|zone=2) [ 14.317640] page_type: f5(slab) [ 14.317829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.318160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.318492] page dumped because: kasan: bad access detected [ 14.318744] [ 14.318830] Memory state around the buggy address: [ 14.319031] ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.319318] ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.319615] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.319882] ^ [ 14.320038] ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.320350] ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.320678] ==================================================================