Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 49.379314] ================================================================== [ 49.386371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 49.393661] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 49.401040] [ 49.402520] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 49.402566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.402583] Hardware name: WinLink E850-96 board (DT) [ 49.402602] Call trace: [ 49.402615] show_stack+0x20/0x38 (C) [ 49.402645] dump_stack_lvl+0x8c/0xd0 [ 49.402677] print_report+0x118/0x608 [ 49.402706] kasan_report+0xdc/0x128 [ 49.402735] kasan_check_range+0x100/0x1a8 [ 49.402767] __kasan_check_write+0x20/0x30 [ 49.402800] kasan_atomics_helper+0x894/0x4858 [ 49.402827] kasan_atomics+0x198/0x2e0 [ 49.402854] kunit_try_run_case+0x170/0x3f0 [ 49.402885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.402924] kthread+0x328/0x630 [ 49.402957] ret_from_fork+0x10/0x20 [ 49.402986] [ 49.472740] Allocated by task 314: [ 49.476127] kasan_save_stack+0x3c/0x68 [ 49.479944] kasan_save_track+0x20/0x40 [ 49.483764] kasan_save_alloc_info+0x40/0x58 [ 49.488018] __kasan_kmalloc+0xd4/0xd8 [ 49.491750] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.496264] kasan_atomics+0xb8/0x2e0 [ 49.499909] kunit_try_run_case+0x170/0x3f0 [ 49.504076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.509545] kthread+0x328/0x630 [ 49.512757] ret_from_fork+0x10/0x20 [ 49.516315] [ 49.517791] The buggy address belongs to the object at ffff000803afab80 [ 49.517791] which belongs to the cache kmalloc-64 of size 64 [ 49.530118] The buggy address is located 0 bytes to the right of [ 49.530118] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 49.542964] [ 49.544440] The buggy address belongs to the physical page: [ 49.549996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 49.557982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.564492] page_type: f5(slab) [ 49.567624] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.575349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.583068] page dumped because: kasan: bad access detected [ 49.588623] [ 49.590099] Memory state around the buggy address: [ 49.594878] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.602082] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.609287] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.616488] ^ [ 49.621266] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.628470] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.635671] ================================================================== [ 47.269626] ================================================================== [ 47.276680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 47.283971] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 47.291349] [ 47.292831] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 47.292878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.292894] Hardware name: WinLink E850-96 board (DT) [ 47.292913] Call trace: [ 47.292925] show_stack+0x20/0x38 (C) [ 47.292956] dump_stack_lvl+0x8c/0xd0 [ 47.292990] print_report+0x118/0x608 [ 47.293019] kasan_report+0xdc/0x128 [ 47.293049] kasan_check_range+0x100/0x1a8 [ 47.293079] __kasan_check_write+0x20/0x30 [ 47.293111] kasan_atomics_helper+0x4e4/0x4858 [ 47.293138] kasan_atomics+0x198/0x2e0 [ 47.293167] kunit_try_run_case+0x170/0x3f0 [ 47.293200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.293237] kthread+0x328/0x630 [ 47.293268] ret_from_fork+0x10/0x20 [ 47.293296] [ 47.363049] Allocated by task 314: [ 47.366435] kasan_save_stack+0x3c/0x68 [ 47.370254] kasan_save_track+0x20/0x40 [ 47.374073] kasan_save_alloc_info+0x40/0x58 [ 47.378327] __kasan_kmalloc+0xd4/0xd8 [ 47.382059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.386573] kasan_atomics+0xb8/0x2e0 [ 47.390219] kunit_try_run_case+0x170/0x3f0 [ 47.394386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.399854] kthread+0x328/0x630 [ 47.403066] ret_from_fork+0x10/0x20 [ 47.406625] [ 47.408100] The buggy address belongs to the object at ffff000803afab80 [ 47.408100] which belongs to the cache kmalloc-64 of size 64 [ 47.420427] The buggy address is located 0 bytes to the right of [ 47.420427] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 47.433274] [ 47.434750] The buggy address belongs to the physical page: [ 47.440306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 47.448291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.454801] page_type: f5(slab) [ 47.457934] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.465659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.473377] page dumped because: kasan: bad access detected [ 47.478933] [ 47.480408] Memory state around the buggy address: [ 47.485188] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.492392] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.499596] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.506797] ^ [ 47.511575] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.518780] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.525982] ================================================================== [ 44.374859] ================================================================== [ 44.389056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 44.396429] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 44.403719] [ 44.405207] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 44.405265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.405284] Hardware name: WinLink E850-96 board (DT) [ 44.405306] Call trace: [ 44.405323] show_stack+0x20/0x38 (C) [ 44.405357] dump_stack_lvl+0x8c/0xd0 [ 44.405395] print_report+0x118/0x608 [ 44.405430] kasan_report+0xdc/0x128 [ 44.405460] __asan_report_load4_noabort+0x20/0x30 [ 44.405496] kasan_atomics_helper+0x40a8/0x4858 [ 44.405529] kasan_atomics+0x198/0x2e0 [ 44.405556] kunit_try_run_case+0x170/0x3f0 [ 44.405594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.405634] kthread+0x328/0x630 [ 44.405669] ret_from_fork+0x10/0x20 [ 44.405706] [ 44.472122] Allocated by task 314: [ 44.475510] kasan_save_stack+0x3c/0x68 [ 44.479325] kasan_save_track+0x20/0x40 [ 44.483145] kasan_save_alloc_info+0x40/0x58 [ 44.487398] __kasan_kmalloc+0xd4/0xd8 [ 44.491130] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.495644] kasan_atomics+0xb8/0x2e0 [ 44.499291] kunit_try_run_case+0x170/0x3f0 [ 44.503456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.508925] kthread+0x328/0x630 [ 44.512137] ret_from_fork+0x10/0x20 [ 44.515696] [ 44.517175] The buggy address belongs to the object at ffff000803afab80 [ 44.517175] which belongs to the cache kmalloc-64 of size 64 [ 44.529502] The buggy address is located 0 bytes to the right of [ 44.529502] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 44.542345] [ 44.543824] The buggy address belongs to the physical page: [ 44.549380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 44.557364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.563874] page_type: f5(slab) [ 44.567011] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 44.574730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.582451] page dumped because: kasan: bad access detected [ 44.588004] [ 44.589479] Memory state around the buggy address: [ 44.594260] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.601464] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.608669] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 44.615868] ^ [ 44.620648] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.627851] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.635054] ================================================================== [ 53.054767] ================================================================== [ 53.061836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 53.069127] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 53.076505] [ 53.077985] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 53.078030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.078046] Hardware name: WinLink E850-96 board (DT) [ 53.078064] Call trace: [ 53.078076] show_stack+0x20/0x38 (C) [ 53.078105] dump_stack_lvl+0x8c/0xd0 [ 53.078140] print_report+0x118/0x608 [ 53.078170] kasan_report+0xdc/0x128 [ 53.078198] kasan_check_range+0x100/0x1a8 [ 53.078231] __kasan_check_write+0x20/0x30 [ 53.078262] kasan_atomics_helper+0xd3c/0x4858 [ 53.078291] kasan_atomics+0x198/0x2e0 [ 53.078317] kunit_try_run_case+0x170/0x3f0 [ 53.078352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.078390] kthread+0x328/0x630 [ 53.078425] ret_from_fork+0x10/0x20 [ 53.078453] [ 53.148205] Allocated by task 314: [ 53.151591] kasan_save_stack+0x3c/0x68 [ 53.155410] kasan_save_track+0x20/0x40 [ 53.159229] kasan_save_alloc_info+0x40/0x58 [ 53.163483] __kasan_kmalloc+0xd4/0xd8 [ 53.167215] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.171729] kasan_atomics+0xb8/0x2e0 [ 53.175375] kunit_try_run_case+0x170/0x3f0 [ 53.179542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.185010] kthread+0x328/0x630 [ 53.188222] ret_from_fork+0x10/0x20 [ 53.191781] [ 53.193257] The buggy address belongs to the object at ffff000803afab80 [ 53.193257] which belongs to the cache kmalloc-64 of size 64 [ 53.205583] The buggy address is located 0 bytes to the right of [ 53.205583] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 53.218430] [ 53.219906] The buggy address belongs to the physical page: [ 53.225462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 53.233447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.239958] page_type: f5(slab) [ 53.243090] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.250815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.258534] page dumped because: kasan: bad access detected [ 53.264089] [ 53.265565] Memory state around the buggy address: [ 53.270346] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.277548] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.284753] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.291953] ^ [ 53.296731] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.303936] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.311139] ================================================================== [ 49.643032] ================================================================== [ 49.650086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 49.657460] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 49.664751] [ 49.666233] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 49.666281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.666295] Hardware name: WinLink E850-96 board (DT) [ 49.666316] Call trace: [ 49.666328] show_stack+0x20/0x38 (C) [ 49.666360] dump_stack_lvl+0x8c/0xd0 [ 49.666395] print_report+0x118/0x608 [ 49.666424] kasan_report+0xdc/0x128 [ 49.666451] __asan_report_load4_noabort+0x20/0x30 [ 49.666488] kasan_atomics_helper+0x42d8/0x4858 [ 49.666519] kasan_atomics+0x198/0x2e0 [ 49.666548] kunit_try_run_case+0x170/0x3f0 [ 49.666581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.666619] kthread+0x328/0x630 [ 49.666653] ret_from_fork+0x10/0x20 [ 49.666686] [ 49.733153] Allocated by task 314: [ 49.736538] kasan_save_stack+0x3c/0x68 [ 49.740357] kasan_save_track+0x20/0x40 [ 49.744176] kasan_save_alloc_info+0x40/0x58 [ 49.748430] __kasan_kmalloc+0xd4/0xd8 [ 49.752163] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.756676] kasan_atomics+0xb8/0x2e0 [ 49.760324] kunit_try_run_case+0x170/0x3f0 [ 49.764489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.769958] kthread+0x328/0x630 [ 49.773169] ret_from_fork+0x10/0x20 [ 49.776728] [ 49.778205] The buggy address belongs to the object at ffff000803afab80 [ 49.778205] which belongs to the cache kmalloc-64 of size 64 [ 49.790531] The buggy address is located 0 bytes to the right of [ 49.790531] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 49.803377] [ 49.804853] The buggy address belongs to the physical page: [ 49.810410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 49.818394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.824905] page_type: f5(slab) [ 49.828040] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.835762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.843482] page dumped because: kasan: bad access detected [ 49.849036] [ 49.850512] Memory state around the buggy address: [ 49.855292] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.862495] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.869699] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.876900] ^ [ 49.881678] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.888883] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.896085] ================================================================== [ 51.222013] ================================================================== [ 51.229052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 51.236429] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 51.243720] [ 51.245200] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 51.245244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.245261] Hardware name: WinLink E850-96 board (DT) [ 51.245278] Call trace: [ 51.245292] show_stack+0x20/0x38 (C) [ 51.245322] dump_stack_lvl+0x8c/0xd0 [ 51.245354] print_report+0x118/0x608 [ 51.245383] kasan_report+0xdc/0x128 [ 51.245411] __asan_report_load4_noabort+0x20/0x30 [ 51.245444] kasan_atomics_helper+0x3dcc/0x4858 [ 51.245474] kasan_atomics+0x198/0x2e0 [ 51.245502] kunit_try_run_case+0x170/0x3f0 [ 51.245537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.245574] kthread+0x328/0x630 [ 51.245606] ret_from_fork+0x10/0x20 [ 51.245635] [ 51.312122] Allocated by task 314: [ 51.315507] kasan_save_stack+0x3c/0x68 [ 51.319326] kasan_save_track+0x20/0x40 [ 51.323146] kasan_save_alloc_info+0x40/0x58 [ 51.327399] __kasan_kmalloc+0xd4/0xd8 [ 51.331132] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.335646] kasan_atomics+0xb8/0x2e0 [ 51.339292] kunit_try_run_case+0x170/0x3f0 [ 51.343458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.348927] kthread+0x328/0x630 [ 51.352139] ret_from_fork+0x10/0x20 [ 51.355697] [ 51.357173] The buggy address belongs to the object at ffff000803afab80 [ 51.357173] which belongs to the cache kmalloc-64 of size 64 [ 51.369500] The buggy address is located 0 bytes to the right of [ 51.369500] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 51.382347] [ 51.383822] The buggy address belongs to the physical page: [ 51.389378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 51.397364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.403874] page_type: f5(slab) [ 51.407007] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.414731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.422450] page dumped because: kasan: bad access detected [ 51.428005] [ 51.429481] Memory state around the buggy address: [ 51.434259] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.441464] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.448669] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.455870] ^ [ 51.460647] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.467853] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.475055] ================================================================== [ 54.102879] ================================================================== [ 54.109913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 54.117202] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 54.124580] [ 54.126059] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 54.126107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.126122] Hardware name: WinLink E850-96 board (DT) [ 54.126141] Call trace: [ 54.126153] show_stack+0x20/0x38 (C) [ 54.126184] dump_stack_lvl+0x8c/0xd0 [ 54.126219] print_report+0x118/0x608 [ 54.126247] kasan_report+0xdc/0x128 [ 54.126277] kasan_check_range+0x100/0x1a8 [ 54.126308] __kasan_check_write+0x20/0x30 [ 54.126338] kasan_atomics_helper+0xe44/0x4858 [ 54.126367] kasan_atomics+0x198/0x2e0 [ 54.126394] kunit_try_run_case+0x170/0x3f0 [ 54.126427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.126465] kthread+0x328/0x630 [ 54.126497] ret_from_fork+0x10/0x20 [ 54.126528] [ 54.196280] Allocated by task 314: [ 54.199665] kasan_save_stack+0x3c/0x68 [ 54.203485] kasan_save_track+0x20/0x40 [ 54.207304] kasan_save_alloc_info+0x40/0x58 [ 54.211557] __kasan_kmalloc+0xd4/0xd8 [ 54.215290] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.219804] kasan_atomics+0xb8/0x2e0 [ 54.223450] kunit_try_run_case+0x170/0x3f0 [ 54.227616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.233085] kthread+0x328/0x630 [ 54.236297] ret_from_fork+0x10/0x20 [ 54.239856] [ 54.241331] The buggy address belongs to the object at ffff000803afab80 [ 54.241331] which belongs to the cache kmalloc-64 of size 64 [ 54.253658] The buggy address is located 0 bytes to the right of [ 54.253658] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 54.266504] [ 54.267981] The buggy address belongs to the physical page: [ 54.273536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 54.281522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.288032] page_type: f5(slab) [ 54.291165] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.298889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.306608] page dumped because: kasan: bad access detected [ 54.312163] [ 54.313639] Memory state around the buggy address: [ 54.318419] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.325622] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.332827] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.340028] ^ [ 54.344806] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.352011] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.359212] ================================================================== [ 57.001433] ================================================================== [ 57.008479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 57.015856] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 57.023234] [ 57.024714] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 57.024759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.024773] Hardware name: WinLink E850-96 board (DT) [ 57.024791] Call trace: [ 57.024804] show_stack+0x20/0x38 (C) [ 57.024834] dump_stack_lvl+0x8c/0xd0 [ 57.024867] print_report+0x118/0x608 [ 57.024895] kasan_report+0xdc/0x128 [ 57.024924] kasan_check_range+0x100/0x1a8 [ 57.024955] __kasan_check_write+0x20/0x30 [ 57.024987] kasan_atomics_helper+0x126c/0x4858 [ 57.025018] kasan_atomics+0x198/0x2e0 [ 57.025046] kunit_try_run_case+0x170/0x3f0 [ 57.025080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.025118] kthread+0x328/0x630 [ 57.025150] ret_from_fork+0x10/0x20 [ 57.025181] [ 57.095021] Allocated by task 314: [ 57.098406] kasan_save_stack+0x3c/0x68 [ 57.102226] kasan_save_track+0x20/0x40 [ 57.106045] kasan_save_alloc_info+0x40/0x58 [ 57.110299] __kasan_kmalloc+0xd4/0xd8 [ 57.114031] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.118545] kasan_atomics+0xb8/0x2e0 [ 57.122191] kunit_try_run_case+0x170/0x3f0 [ 57.126357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.131826] kthread+0x328/0x630 [ 57.135038] ret_from_fork+0x10/0x20 [ 57.138597] [ 57.140072] The buggy address belongs to the object at ffff000803afab80 [ 57.140072] which belongs to the cache kmalloc-64 of size 64 [ 57.152399] The buggy address is located 0 bytes to the right of [ 57.152399] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 57.165246] [ 57.166722] The buggy address belongs to the physical page: [ 57.172278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 57.180263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.186773] page_type: f5(slab) [ 57.189906] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.197631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.205349] page dumped because: kasan: bad access detected [ 57.210905] [ 57.212380] Memory state around the buggy address: [ 57.217160] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.224363] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.231568] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.238769] ^ [ 57.243547] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.250752] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.257953] ================================================================== [ 44.642448] ================================================================== [ 44.649468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 44.656840] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 44.664218] [ 44.665704] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 44.665760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.665778] Hardware name: WinLink E850-96 board (DT) [ 44.665797] Call trace: [ 44.665811] show_stack+0x20/0x38 (C) [ 44.665843] dump_stack_lvl+0x8c/0xd0 [ 44.665882] print_report+0x118/0x608 [ 44.665913] kasan_report+0xdc/0x128 [ 44.665940] __asan_report_store4_noabort+0x20/0x30 [ 44.665977] kasan_atomics_helper+0x3f7c/0x4858 [ 44.666007] kasan_atomics+0x198/0x2e0 [ 44.666033] kunit_try_run_case+0x170/0x3f0 [ 44.666070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.666108] kthread+0x328/0x630 [ 44.666140] ret_from_fork+0x10/0x20 [ 44.666175] [ 44.732707] Allocated by task 314: [ 44.736095] kasan_save_stack+0x3c/0x68 [ 44.739912] kasan_save_track+0x20/0x40 [ 44.743731] kasan_save_alloc_info+0x40/0x58 [ 44.747984] __kasan_kmalloc+0xd4/0xd8 [ 44.751717] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.756231] kasan_atomics+0xb8/0x2e0 [ 44.759877] kunit_try_run_case+0x170/0x3f0 [ 44.764043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.769512] kthread+0x328/0x630 [ 44.772723] ret_from_fork+0x10/0x20 [ 44.776282] [ 44.777761] The buggy address belongs to the object at ffff000803afab80 [ 44.777761] which belongs to the cache kmalloc-64 of size 64 [ 44.790085] The buggy address is located 0 bytes to the right of [ 44.790085] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 44.802931] [ 44.804411] The buggy address belongs to the physical page: [ 44.809967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 44.817951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.824460] page_type: f5(slab) [ 44.827595] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 44.835316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.843035] page dumped because: kasan: bad access detected [ 44.848590] [ 44.850066] Memory state around the buggy address: [ 44.854846] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.862049] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.869255] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 44.876455] ^ [ 44.881234] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.888439] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.895640] ================================================================== [ 46.742171] ================================================================== [ 46.749258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 46.756548] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 46.763926] [ 46.765409] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 46.765456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.765471] Hardware name: WinLink E850-96 board (DT) [ 46.765489] Call trace: [ 46.765502] show_stack+0x20/0x38 (C) [ 46.765536] dump_stack_lvl+0x8c/0xd0 [ 46.765570] print_report+0x118/0x608 [ 46.765600] kasan_report+0xdc/0x128 [ 46.765628] kasan_check_range+0x100/0x1a8 [ 46.765659] __kasan_check_write+0x20/0x30 [ 46.765692] kasan_atomics_helper+0x414/0x4858 [ 46.765720] kasan_atomics+0x198/0x2e0 [ 46.765747] kunit_try_run_case+0x170/0x3f0 [ 46.765783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.765820] kthread+0x328/0x630 [ 46.765853] ret_from_fork+0x10/0x20 [ 46.765887] [ 46.835626] Allocated by task 314: [ 46.839012] kasan_save_stack+0x3c/0x68 [ 46.842832] kasan_save_track+0x20/0x40 [ 46.846651] kasan_save_alloc_info+0x40/0x58 [ 46.850904] __kasan_kmalloc+0xd4/0xd8 [ 46.854637] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.859151] kasan_atomics+0xb8/0x2e0 [ 46.862796] kunit_try_run_case+0x170/0x3f0 [ 46.866963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.872432] kthread+0x328/0x630 [ 46.875643] ret_from_fork+0x10/0x20 [ 46.879202] [ 46.880678] The buggy address belongs to the object at ffff000803afab80 [ 46.880678] which belongs to the cache kmalloc-64 of size 64 [ 46.893005] The buggy address is located 0 bytes to the right of [ 46.893005] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 46.905851] [ 46.907327] The buggy address belongs to the physical page: [ 46.912883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 46.920869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.927379] page_type: f5(slab) [ 46.930513] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.938236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.945955] page dumped because: kasan: bad access detected [ 46.951510] [ 46.952986] Memory state around the buggy address: [ 46.957764] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.964969] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.972174] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.979374] ^ [ 46.984152] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.991357] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.998560] ================================================================== [ 48.588171] ================================================================== [ 48.595237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 48.602527] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 48.609906] [ 48.611387] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 48.611435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.611453] Hardware name: WinLink E850-96 board (DT) [ 48.611471] Call trace: [ 48.611482] show_stack+0x20/0x38 (C) [ 48.611512] dump_stack_lvl+0x8c/0xd0 [ 48.611545] print_report+0x118/0x608 [ 48.611573] kasan_report+0xdc/0x128 [ 48.611603] kasan_check_range+0x100/0x1a8 [ 48.611635] __kasan_check_write+0x20/0x30 [ 48.611667] kasan_atomics_helper+0x6ec/0x4858 [ 48.611698] kasan_atomics+0x198/0x2e0 [ 48.611724] kunit_try_run_case+0x170/0x3f0 [ 48.611758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.611797] kthread+0x328/0x630 [ 48.611827] ret_from_fork+0x10/0x20 [ 48.611858] [ 48.681606] Allocated by task 314: [ 48.684991] kasan_save_stack+0x3c/0x68 [ 48.688810] kasan_save_track+0x20/0x40 [ 48.692630] kasan_save_alloc_info+0x40/0x58 [ 48.696883] __kasan_kmalloc+0xd4/0xd8 [ 48.700616] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.705130] kasan_atomics+0xb8/0x2e0 [ 48.708775] kunit_try_run_case+0x170/0x3f0 [ 48.712942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.718411] kthread+0x328/0x630 [ 48.721623] ret_from_fork+0x10/0x20 [ 48.725182] [ 48.726657] The buggy address belongs to the object at ffff000803afab80 [ 48.726657] which belongs to the cache kmalloc-64 of size 64 [ 48.738984] The buggy address is located 0 bytes to the right of [ 48.738984] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 48.751830] [ 48.753307] The buggy address belongs to the physical page: [ 48.758862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 48.766848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.773358] page_type: f5(slab) [ 48.776492] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.784215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.791934] page dumped because: kasan: bad access detected [ 48.797489] [ 48.798965] Memory state around the buggy address: [ 48.803743] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.810948] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.818153] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.825354] ^ [ 48.830131] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.837336] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.844537] ================================================================== [ 48.851889] ================================================================== [ 48.858949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 48.866239] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 48.873617] [ 48.875099] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 48.875148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.875166] Hardware name: WinLink E850-96 board (DT) [ 48.875186] Call trace: [ 48.875201] show_stack+0x20/0x38 (C) [ 48.875231] dump_stack_lvl+0x8c/0xd0 [ 48.875265] print_report+0x118/0x608 [ 48.875293] kasan_report+0xdc/0x128 [ 48.875322] kasan_check_range+0x100/0x1a8 [ 48.875353] __kasan_check_write+0x20/0x30 [ 48.875385] kasan_atomics_helper+0x760/0x4858 [ 48.875413] kasan_atomics+0x198/0x2e0 [ 48.875439] kunit_try_run_case+0x170/0x3f0 [ 48.875473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.875512] kthread+0x328/0x630 [ 48.875543] ret_from_fork+0x10/0x20 [ 48.875572] [ 48.945318] Allocated by task 314: [ 48.948704] kasan_save_stack+0x3c/0x68 [ 48.952522] kasan_save_track+0x20/0x40 [ 48.956341] kasan_save_alloc_info+0x40/0x58 [ 48.960595] __kasan_kmalloc+0xd4/0xd8 [ 48.964327] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.968841] kasan_atomics+0xb8/0x2e0 [ 48.972487] kunit_try_run_case+0x170/0x3f0 [ 48.976653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.982122] kthread+0x328/0x630 [ 48.985334] ret_from_fork+0x10/0x20 [ 48.988893] [ 48.990368] The buggy address belongs to the object at ffff000803afab80 [ 48.990368] which belongs to the cache kmalloc-64 of size 64 [ 49.002695] The buggy address is located 0 bytes to the right of [ 49.002695] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 49.015542] [ 49.017018] The buggy address belongs to the physical page: [ 49.022573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 49.030559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.037069] page_type: f5(slab) [ 49.040202] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.047927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.055645] page dumped because: kasan: bad access detected [ 49.061200] [ 49.062676] Memory state around the buggy address: [ 49.067457] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.074659] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.081864] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.089065] ^ [ 49.093843] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.101048] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.108250] ================================================================== [ 55.681994] ================================================================== [ 55.689054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 55.696431] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 55.703809] [ 55.705289] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 55.705335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.705353] Hardware name: WinLink E850-96 board (DT) [ 55.705371] Call trace: [ 55.705383] show_stack+0x20/0x38 (C) [ 55.705414] dump_stack_lvl+0x8c/0xd0 [ 55.705449] print_report+0x118/0x608 [ 55.705478] kasan_report+0xdc/0x128 [ 55.705506] kasan_check_range+0x100/0x1a8 [ 55.705535] __kasan_check_write+0x20/0x30 [ 55.705567] kasan_atomics_helper+0x1058/0x4858 [ 55.705596] kasan_atomics+0x198/0x2e0 [ 55.705624] kunit_try_run_case+0x170/0x3f0 [ 55.705657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.705694] kthread+0x328/0x630 [ 55.705727] ret_from_fork+0x10/0x20 [ 55.705758] [ 55.775597] Allocated by task 314: [ 55.778982] kasan_save_stack+0x3c/0x68 [ 55.782801] kasan_save_track+0x20/0x40 [ 55.786621] kasan_save_alloc_info+0x40/0x58 [ 55.790874] __kasan_kmalloc+0xd4/0xd8 [ 55.794607] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.799120] kasan_atomics+0xb8/0x2e0 [ 55.802766] kunit_try_run_case+0x170/0x3f0 [ 55.806933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.812401] kthread+0x328/0x630 [ 55.815613] ret_from_fork+0x10/0x20 [ 55.819172] [ 55.820647] The buggy address belongs to the object at ffff000803afab80 [ 55.820647] which belongs to the cache kmalloc-64 of size 64 [ 55.832975] The buggy address is located 0 bytes to the right of [ 55.832975] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 55.845821] [ 55.847297] The buggy address belongs to the physical page: [ 55.852853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 55.860838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.867349] page_type: f5(slab) [ 55.870482] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.878206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.885925] page dumped because: kasan: bad access detected [ 55.891480] [ 55.892955] Memory state around the buggy address: [ 55.897734] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.904939] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.912143] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.919344] ^ [ 55.924122] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.931327] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.938528] ================================================================== [ 58.845138] ================================================================== [ 58.852201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 58.859578] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 58.866956] [ 58.868436] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 58.868482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.868499] Hardware name: WinLink E850-96 board (DT) [ 58.868519] Call trace: [ 58.868530] show_stack+0x20/0x38 (C) [ 58.868560] dump_stack_lvl+0x8c/0xd0 [ 58.868593] print_report+0x118/0x608 [ 58.868622] kasan_report+0xdc/0x128 [ 58.868652] kasan_check_range+0x100/0x1a8 [ 58.868682] __kasan_check_write+0x20/0x30 [ 58.868714] kasan_atomics_helper+0x154c/0x4858 [ 58.868746] kasan_atomics+0x198/0x2e0 [ 58.868773] kunit_try_run_case+0x170/0x3f0 [ 58.868809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.868847] kthread+0x328/0x630 [ 58.868878] ret_from_fork+0x10/0x20 [ 58.868908] [ 58.938743] Allocated by task 314: [ 58.942129] kasan_save_stack+0x3c/0x68 [ 58.945948] kasan_save_track+0x20/0x40 [ 58.949767] kasan_save_alloc_info+0x40/0x58 [ 58.954021] __kasan_kmalloc+0xd4/0xd8 [ 58.957754] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.962267] kasan_atomics+0xb8/0x2e0 [ 58.965913] kunit_try_run_case+0x170/0x3f0 [ 58.970080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.975549] kthread+0x328/0x630 [ 58.978760] ret_from_fork+0x10/0x20 [ 58.982319] [ 58.983795] The buggy address belongs to the object at ffff000803afab80 [ 58.983795] which belongs to the cache kmalloc-64 of size 64 [ 58.996122] The buggy address is located 0 bytes to the right of [ 58.996122] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 59.008968] [ 59.010444] The buggy address belongs to the physical page: [ 59.016001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 59.023985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.030496] page_type: f5(slab) [ 59.033629] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.041353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.049072] page dumped because: kasan: bad access detected [ 59.054627] [ 59.056103] Memory state around the buggy address: [ 59.060882] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.068086] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.075291] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.082491] ^ [ 59.087269] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.094474] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.101676] ================================================================== [ 58.317374] ================================================================== [ 58.324431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 58.331809] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 58.339187] [ 58.340666] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 58.340712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.340728] Hardware name: WinLink E850-96 board (DT) [ 58.340746] Call trace: [ 58.340759] show_stack+0x20/0x38 (C) [ 58.340788] dump_stack_lvl+0x8c/0xd0 [ 58.340821] print_report+0x118/0x608 [ 58.340851] kasan_report+0xdc/0x128 [ 58.340880] kasan_check_range+0x100/0x1a8 [ 58.340911] __kasan_check_write+0x20/0x30 [ 58.340942] kasan_atomics_helper+0x147c/0x4858 [ 58.340971] kasan_atomics+0x198/0x2e0 [ 58.340997] kunit_try_run_case+0x170/0x3f0 [ 58.341033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.341070] kthread+0x328/0x630 [ 58.341102] ret_from_fork+0x10/0x20 [ 58.341134] [ 58.410974] Allocated by task 314: [ 58.414359] kasan_save_stack+0x3c/0x68 [ 58.418179] kasan_save_track+0x20/0x40 [ 58.421998] kasan_save_alloc_info+0x40/0x58 [ 58.426251] __kasan_kmalloc+0xd4/0xd8 [ 58.429984] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.434497] kasan_atomics+0xb8/0x2e0 [ 58.438143] kunit_try_run_case+0x170/0x3f0 [ 58.442310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.447779] kthread+0x328/0x630 [ 58.450990] ret_from_fork+0x10/0x20 [ 58.454550] [ 58.456025] The buggy address belongs to the object at ffff000803afab80 [ 58.456025] which belongs to the cache kmalloc-64 of size 64 [ 58.468352] The buggy address is located 0 bytes to the right of [ 58.468352] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 58.481198] [ 58.482674] The buggy address belongs to the physical page: [ 58.488230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 58.496216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.502725] page_type: f5(slab) [ 58.505860] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.513583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.521302] page dumped because: kasan: bad access detected [ 58.526857] [ 58.528333] Memory state around the buggy address: [ 58.533112] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.540316] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.547521] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.554721] ^ [ 58.559499] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.566704] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.573905] ================================================================== [ 45.166488] ================================================================== [ 45.173591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 45.180877] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 45.188255] [ 45.189742] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 45.189794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.189808] Hardware name: WinLink E850-96 board (DT) [ 45.189828] Call trace: [ 45.189839] show_stack+0x20/0x38 (C) [ 45.189872] dump_stack_lvl+0x8c/0xd0 [ 45.189908] print_report+0x118/0x608 [ 45.189938] kasan_report+0xdc/0x128 [ 45.189968] kasan_check_range+0x100/0x1a8 [ 45.190000] __kasan_check_write+0x20/0x30 [ 45.190033] kasan_atomics_helper+0x24c/0x4858 [ 45.190061] kasan_atomics+0x198/0x2e0 [ 45.190090] kunit_try_run_case+0x170/0x3f0 [ 45.190124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.190163] kthread+0x328/0x630 [ 45.190197] ret_from_fork+0x10/0x20 [ 45.190231] [ 45.259955] Allocated by task 314: [ 45.263341] kasan_save_stack+0x3c/0x68 [ 45.267161] kasan_save_track+0x20/0x40 [ 45.270980] kasan_save_alloc_info+0x40/0x58 [ 45.275233] __kasan_kmalloc+0xd4/0xd8 [ 45.278966] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.283480] kasan_atomics+0xb8/0x2e0 [ 45.287125] kunit_try_run_case+0x170/0x3f0 [ 45.291292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.296761] kthread+0x328/0x630 [ 45.299972] ret_from_fork+0x10/0x20 [ 45.303532] [ 45.305007] The buggy address belongs to the object at ffff000803afab80 [ 45.305007] which belongs to the cache kmalloc-64 of size 64 [ 45.317333] The buggy address is located 0 bytes to the right of [ 45.317333] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 45.330181] [ 45.331656] The buggy address belongs to the physical page: [ 45.337215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 45.345198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.351708] page_type: f5(slab) [ 45.354842] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.362565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.370284] page dumped because: kasan: bad access detected [ 45.375839] [ 45.377315] Memory state around the buggy address: [ 45.382096] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.389298] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.396504] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.403704] ^ [ 45.408482] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.415687] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.422889] ================================================================== [ 51.482375] ================================================================== [ 51.489466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 51.496755] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 51.504133] [ 51.505613] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 51.505659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.505674] Hardware name: WinLink E850-96 board (DT) [ 51.505695] Call trace: [ 51.505706] show_stack+0x20/0x38 (C) [ 51.505736] dump_stack_lvl+0x8c/0xd0 [ 51.505769] print_report+0x118/0x608 [ 51.505799] kasan_report+0xdc/0x128 [ 51.505828] kasan_check_range+0x100/0x1a8 [ 51.505860] __kasan_check_write+0x20/0x30 [ 51.505891] kasan_atomics_helper+0xb70/0x4858 [ 51.505922] kasan_atomics+0x198/0x2e0 [ 51.505948] kunit_try_run_case+0x170/0x3f0 [ 51.505981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.506020] kthread+0x328/0x630 [ 51.506053] ret_from_fork+0x10/0x20 [ 51.506082] [ 51.575833] Allocated by task 314: [ 51.579219] kasan_save_stack+0x3c/0x68 [ 51.583038] kasan_save_track+0x20/0x40 [ 51.586857] kasan_save_alloc_info+0x40/0x58 [ 51.591111] __kasan_kmalloc+0xd4/0xd8 [ 51.594843] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.599357] kasan_atomics+0xb8/0x2e0 [ 51.603003] kunit_try_run_case+0x170/0x3f0 [ 51.607170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.612638] kthread+0x328/0x630 [ 51.615850] ret_from_fork+0x10/0x20 [ 51.619409] [ 51.620884] The buggy address belongs to the object at ffff000803afab80 [ 51.620884] which belongs to the cache kmalloc-64 of size 64 [ 51.633211] The buggy address is located 0 bytes to the right of [ 51.633211] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 51.646058] [ 51.647534] The buggy address belongs to the physical page: [ 51.653089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 51.661075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.667585] page_type: f5(slab) [ 51.670718] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.678442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.686161] page dumped because: kasan: bad access detected [ 51.691717] [ 51.693192] Memory state around the buggy address: [ 51.697971] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.705175] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.712380] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.719581] ^ [ 51.724359] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.731564] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.738765] ================================================================== [ 52.006545] ================================================================== [ 52.013590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 52.020879] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 52.028257] [ 52.029739] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 52.029785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.029802] Hardware name: WinLink E850-96 board (DT) [ 52.029818] Call trace: [ 52.029830] show_stack+0x20/0x38 (C) [ 52.029860] dump_stack_lvl+0x8c/0xd0 [ 52.029893] print_report+0x118/0x608 [ 52.029923] kasan_report+0xdc/0x128 [ 52.029952] kasan_check_range+0x100/0x1a8 [ 52.029982] __kasan_check_write+0x20/0x30 [ 52.030016] kasan_atomics_helper+0xc08/0x4858 [ 52.030046] kasan_atomics+0x198/0x2e0 [ 52.030074] kunit_try_run_case+0x170/0x3f0 [ 52.030108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.030146] kthread+0x328/0x630 [ 52.030180] ret_from_fork+0x10/0x20 [ 52.030211] [ 52.099957] Allocated by task 314: [ 52.103343] kasan_save_stack+0x3c/0x68 [ 52.107162] kasan_save_track+0x20/0x40 [ 52.110981] kasan_save_alloc_info+0x40/0x58 [ 52.115235] __kasan_kmalloc+0xd4/0xd8 [ 52.118967] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.123481] kasan_atomics+0xb8/0x2e0 [ 52.127127] kunit_try_run_case+0x170/0x3f0 [ 52.131294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.136762] kthread+0x328/0x630 [ 52.139974] ret_from_fork+0x10/0x20 [ 52.143533] [ 52.145010] The buggy address belongs to the object at ffff000803afab80 [ 52.145010] which belongs to the cache kmalloc-64 of size 64 [ 52.157335] The buggy address is located 0 bytes to the right of [ 52.157335] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 52.170182] [ 52.171658] The buggy address belongs to the physical page: [ 52.177213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 52.185199] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.191710] page_type: f5(slab) [ 52.194842] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.202567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.210285] page dumped because: kasan: bad access detected [ 52.215841] [ 52.217316] Memory state around the buggy address: [ 52.222097] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.229300] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.236504] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.243705] ^ [ 52.248483] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.255688] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.262889] ================================================================== [ 53.318454] ================================================================== [ 53.325548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 53.332925] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 53.340216] [ 53.341697] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 53.341743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.341761] Hardware name: WinLink E850-96 board (DT) [ 53.341779] Call trace: [ 53.341793] show_stack+0x20/0x38 (C) [ 53.341825] dump_stack_lvl+0x8c/0xd0 [ 53.341858] print_report+0x118/0x608 [ 53.341886] kasan_report+0xdc/0x128 [ 53.341915] __asan_report_load4_noabort+0x20/0x30 [ 53.341949] kasan_atomics_helper+0x3e04/0x4858 [ 53.341980] kasan_atomics+0x198/0x2e0 [ 53.342007] kunit_try_run_case+0x170/0x3f0 [ 53.342041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.342079] kthread+0x328/0x630 [ 53.342110] ret_from_fork+0x10/0x20 [ 53.342140] [ 53.408618] Allocated by task 314: [ 53.412004] kasan_save_stack+0x3c/0x68 [ 53.415823] kasan_save_track+0x20/0x40 [ 53.419642] kasan_save_alloc_info+0x40/0x58 [ 53.423896] __kasan_kmalloc+0xd4/0xd8 [ 53.427628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.432142] kasan_atomics+0xb8/0x2e0 [ 53.435788] kunit_try_run_case+0x170/0x3f0 [ 53.439955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.445423] kthread+0x328/0x630 [ 53.448635] ret_from_fork+0x10/0x20 [ 53.452194] [ 53.453669] The buggy address belongs to the object at ffff000803afab80 [ 53.453669] which belongs to the cache kmalloc-64 of size 64 [ 53.465996] The buggy address is located 0 bytes to the right of [ 53.465996] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 53.478843] [ 53.480319] The buggy address belongs to the physical page: [ 53.485875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 53.493860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.500370] page_type: f5(slab) [ 53.503503] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.511227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.518946] page dumped because: kasan: bad access detected [ 53.524502] [ 53.525977] Memory state around the buggy address: [ 53.530755] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.537960] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.545165] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.552366] ^ [ 53.557144] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.564349] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.571550] ================================================================== [ 54.890853] ================================================================== [ 54.897922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 54.905210] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 54.912589] [ 54.914069] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 54.914116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.914132] Hardware name: WinLink E850-96 board (DT) [ 54.914150] Call trace: [ 54.914160] show_stack+0x20/0x38 (C) [ 54.914189] dump_stack_lvl+0x8c/0xd0 [ 54.914222] print_report+0x118/0x608 [ 54.914251] kasan_report+0xdc/0x128 [ 54.914280] kasan_check_range+0x100/0x1a8 [ 54.914311] __kasan_check_write+0x20/0x30 [ 54.914343] kasan_atomics_helper+0xf20/0x4858 [ 54.914371] kasan_atomics+0x198/0x2e0 [ 54.914399] kunit_try_run_case+0x170/0x3f0 [ 54.914434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.914473] kthread+0x328/0x630 [ 54.914506] ret_from_fork+0x10/0x20 [ 54.914537] [ 54.984290] Allocated by task 314: [ 54.987674] kasan_save_stack+0x3c/0x68 [ 54.991494] kasan_save_track+0x20/0x40 [ 54.995313] kasan_save_alloc_info+0x40/0x58 [ 54.999567] __kasan_kmalloc+0xd4/0xd8 [ 55.003299] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.007813] kasan_atomics+0xb8/0x2e0 [ 55.011458] kunit_try_run_case+0x170/0x3f0 [ 55.015625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.021094] kthread+0x328/0x630 [ 55.024306] ret_from_fork+0x10/0x20 [ 55.027865] [ 55.029340] The buggy address belongs to the object at ffff000803afab80 [ 55.029340] which belongs to the cache kmalloc-64 of size 64 [ 55.041667] The buggy address is located 0 bytes to the right of [ 55.041667] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 55.054514] [ 55.055990] The buggy address belongs to the physical page: [ 55.061545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 55.069531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.076041] page_type: f5(slab) [ 55.079174] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.086898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.094617] page dumped because: kasan: bad access detected [ 55.100172] [ 55.101648] Memory state around the buggy address: [ 55.106427] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.113631] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.120836] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.128036] ^ [ 55.132814] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.140020] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.147221] ================================================================== [ 60.421504] ================================================================== [ 60.428566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 60.435943] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 60.443235] [ 60.444716] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 60.444764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.444780] Hardware name: WinLink E850-96 board (DT) [ 60.444798] Call trace: [ 60.444811] show_stack+0x20/0x38 (C) [ 60.444842] dump_stack_lvl+0x8c/0xd0 [ 60.444877] print_report+0x118/0x608 [ 60.444905] kasan_report+0xdc/0x128 [ 60.444935] __asan_report_load8_noabort+0x20/0x30 [ 60.444968] kasan_atomics_helper+0x3e10/0x4858 [ 60.444997] kasan_atomics+0x198/0x2e0 [ 60.445024] kunit_try_run_case+0x170/0x3f0 [ 60.445059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.445100] kthread+0x328/0x630 [ 60.445132] ret_from_fork+0x10/0x20 [ 60.445161] [ 60.511636] Allocated by task 314: [ 60.515022] kasan_save_stack+0x3c/0x68 [ 60.518841] kasan_save_track+0x20/0x40 [ 60.522661] kasan_save_alloc_info+0x40/0x58 [ 60.526914] __kasan_kmalloc+0xd4/0xd8 [ 60.530647] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.535160] kasan_atomics+0xb8/0x2e0 [ 60.538806] kunit_try_run_case+0x170/0x3f0 [ 60.542973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.548442] kthread+0x328/0x630 [ 60.551653] ret_from_fork+0x10/0x20 [ 60.555212] [ 60.556688] The buggy address belongs to the object at ffff000803afab80 [ 60.556688] which belongs to the cache kmalloc-64 of size 64 [ 60.569015] The buggy address is located 0 bytes to the right of [ 60.569015] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 60.581861] [ 60.583337] The buggy address belongs to the physical page: [ 60.588893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 60.596878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.603389] page_type: f5(slab) [ 60.606523] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.614246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.621965] page dumped because: kasan: bad access detected [ 60.627520] [ 60.628996] Memory state around the buggy address: [ 60.633775] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.640978] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.648183] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.655384] ^ [ 60.660162] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.667367] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.674568] ================================================================== [ 60.945771] ================================================================== [ 60.952866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 60.960241] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 60.967533] [ 60.969014] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 60.969062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.969077] Hardware name: WinLink E850-96 board (DT) [ 60.969095] Call trace: [ 60.969106] show_stack+0x20/0x38 (C) [ 60.969138] dump_stack_lvl+0x8c/0xd0 [ 60.969170] print_report+0x118/0x608 [ 60.969200] kasan_report+0xdc/0x128 [ 60.969229] __asan_report_load8_noabort+0x20/0x30 [ 60.969263] kasan_atomics_helper+0x3e20/0x4858 [ 60.969292] kasan_atomics+0x198/0x2e0 [ 60.969319] kunit_try_run_case+0x170/0x3f0 [ 60.969352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.969390] kthread+0x328/0x630 [ 60.969421] ret_from_fork+0x10/0x20 [ 60.969450] [ 61.035934] Allocated by task 314: [ 61.039320] kasan_save_stack+0x3c/0x68 [ 61.043139] kasan_save_track+0x20/0x40 [ 61.046958] kasan_save_alloc_info+0x40/0x58 [ 61.051212] __kasan_kmalloc+0xd4/0xd8 [ 61.054944] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.059458] kasan_atomics+0xb8/0x2e0 [ 61.063104] kunit_try_run_case+0x170/0x3f0 [ 61.067270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.072739] kthread+0x328/0x630 [ 61.075951] ret_from_fork+0x10/0x20 [ 61.079510] [ 61.080986] The buggy address belongs to the object at ffff000803afab80 [ 61.080986] which belongs to the cache kmalloc-64 of size 64 [ 61.093312] The buggy address is located 0 bytes to the right of [ 61.093312] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 61.106159] [ 61.107634] The buggy address belongs to the physical page: [ 61.113191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 61.121176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.127686] page_type: f5(slab) [ 61.130819] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.138544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.146262] page dumped because: kasan: bad access detected [ 61.151818] [ 61.153293] Memory state around the buggy address: [ 61.158072] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.165276] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.172481] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.179682] ^ [ 61.184460] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.191665] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.198866] ================================================================== [ 57.793044] ================================================================== [ 57.800134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 57.807511] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 57.814802] [ 57.816281] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 57.816327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.816343] Hardware name: WinLink E850-96 board (DT) [ 57.816360] Call trace: [ 57.816370] show_stack+0x20/0x38 (C) [ 57.816401] dump_stack_lvl+0x8c/0xd0 [ 57.816433] print_report+0x118/0x608 [ 57.816464] kasan_report+0xdc/0x128 [ 57.816494] __asan_report_load8_noabort+0x20/0x30 [ 57.816527] kasan_atomics_helper+0x3f04/0x4858 [ 57.816555] kasan_atomics+0x198/0x2e0 [ 57.816583] kunit_try_run_case+0x170/0x3f0 [ 57.816615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.816653] kthread+0x328/0x630 [ 57.816686] ret_from_fork+0x10/0x20 [ 57.816717] [ 57.883203] Allocated by task 314: [ 57.886589] kasan_save_stack+0x3c/0x68 [ 57.890408] kasan_save_track+0x20/0x40 [ 57.894228] kasan_save_alloc_info+0x40/0x58 [ 57.898481] __kasan_kmalloc+0xd4/0xd8 [ 57.902214] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.906728] kasan_atomics+0xb8/0x2e0 [ 57.910374] kunit_try_run_case+0x170/0x3f0 [ 57.914540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.920009] kthread+0x328/0x630 [ 57.923220] ret_from_fork+0x10/0x20 [ 57.926779] [ 57.928255] The buggy address belongs to the object at ffff000803afab80 [ 57.928255] which belongs to the cache kmalloc-64 of size 64 [ 57.940582] The buggy address is located 0 bytes to the right of [ 57.940582] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 57.953429] [ 57.954904] The buggy address belongs to the physical page: [ 57.960460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 57.968446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.974956] page_type: f5(slab) [ 57.978089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.985813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.993532] page dumped because: kasan: bad access detected [ 57.999087] [ 58.000563] Memory state around the buggy address: [ 58.005341] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.012546] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.019752] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.026952] ^ [ 58.031730] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.038934] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.046136] ================================================================== [ 44.903038] ================================================================== [ 44.910055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 44.917342] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 44.924632] [ 44.926116] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 44.926172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.926188] Hardware name: WinLink E850-96 board (DT) [ 44.926210] Call trace: [ 44.926224] show_stack+0x20/0x38 (C) [ 44.926259] dump_stack_lvl+0x8c/0xd0 [ 44.926298] print_report+0x118/0x608 [ 44.926329] kasan_report+0xdc/0x128 [ 44.926358] kasan_check_range+0x100/0x1a8 [ 44.926390] __kasan_check_read+0x20/0x30 [ 44.926421] kasan_atomics_helper+0x1ec/0x4858 [ 44.926451] kasan_atomics+0x198/0x2e0 [ 44.926480] kunit_try_run_case+0x170/0x3f0 [ 44.926518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.926558] kthread+0x328/0x630 [ 44.926592] ret_from_fork+0x10/0x20 [ 44.926626] [ 44.996244] Allocated by task 314: [ 44.999634] kasan_save_stack+0x3c/0x68 [ 45.003449] kasan_save_track+0x20/0x40 [ 45.007269] kasan_save_alloc_info+0x40/0x58 [ 45.011522] __kasan_kmalloc+0xd4/0xd8 [ 45.015255] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.019768] kasan_atomics+0xb8/0x2e0 [ 45.023416] kunit_try_run_case+0x170/0x3f0 [ 45.027581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.033049] kthread+0x328/0x630 [ 45.036261] ret_from_fork+0x10/0x20 [ 45.039820] [ 45.041296] The buggy address belongs to the object at ffff000803afab80 [ 45.041296] which belongs to the cache kmalloc-64 of size 64 [ 45.053623] The buggy address is located 0 bytes to the right of [ 45.053623] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 45.066469] [ 45.067948] The buggy address belongs to the physical page: [ 45.073505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 45.081488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.087997] page_type: f5(slab) [ 45.091133] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.098854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.106573] page dumped because: kasan: bad access detected [ 45.112128] [ 45.113603] Memory state around the buggy address: [ 45.118385] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.125588] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.132792] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.139992] ^ [ 45.144771] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.151975] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.159178] ================================================================== [ 45.954234] ================================================================== [ 45.961252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 45.968539] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 45.975917] [ 45.977400] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 45.977450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.977465] Hardware name: WinLink E850-96 board (DT) [ 45.977486] Call trace: [ 45.977499] show_stack+0x20/0x38 (C) [ 45.977533] dump_stack_lvl+0x8c/0xd0 [ 45.977566] print_report+0x118/0x608 [ 45.977598] kasan_report+0xdc/0x128 [ 45.977627] kasan_check_range+0x100/0x1a8 [ 45.977659] __kasan_check_write+0x20/0x30 [ 45.977691] kasan_atomics_helper+0x32c/0x4858 [ 45.977721] kasan_atomics+0x198/0x2e0 [ 45.977748] kunit_try_run_case+0x170/0x3f0 [ 45.977784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.977821] kthread+0x328/0x630 [ 45.977854] ret_from_fork+0x10/0x20 [ 45.977886] [ 46.047617] Allocated by task 314: [ 46.051005] kasan_save_stack+0x3c/0x68 [ 46.054822] kasan_save_track+0x20/0x40 [ 46.058642] kasan_save_alloc_info+0x40/0x58 [ 46.062895] __kasan_kmalloc+0xd4/0xd8 [ 46.066628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.071141] kasan_atomics+0xb8/0x2e0 [ 46.074787] kunit_try_run_case+0x170/0x3f0 [ 46.078954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.084422] kthread+0x328/0x630 [ 46.087634] ret_from_fork+0x10/0x20 [ 46.091193] [ 46.092669] The buggy address belongs to the object at ffff000803afab80 [ 46.092669] which belongs to the cache kmalloc-64 of size 64 [ 46.104996] The buggy address is located 0 bytes to the right of [ 46.104996] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 46.117842] [ 46.119319] The buggy address belongs to the physical page: [ 46.124875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 46.132859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.139370] page_type: f5(slab) [ 46.142506] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.150227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.157946] page dumped because: kasan: bad access detected [ 46.163501] [ 46.164976] Memory state around the buggy address: [ 46.169757] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.176960] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.184166] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.191365] ^ [ 46.196143] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.203348] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.210549] ================================================================== [ 58.053455] ================================================================== [ 58.060548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 58.067923] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 58.075302] [ 58.076781] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 58.076829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.076844] Hardware name: WinLink E850-96 board (DT) [ 58.076861] Call trace: [ 58.076873] show_stack+0x20/0x38 (C) [ 58.076903] dump_stack_lvl+0x8c/0xd0 [ 58.076936] print_report+0x118/0x608 [ 58.076966] kasan_report+0xdc/0x128 [ 58.076994] kasan_check_range+0x100/0x1a8 [ 58.077024] __kasan_check_write+0x20/0x30 [ 58.077056] kasan_atomics_helper+0x1414/0x4858 [ 58.077084] kasan_atomics+0x198/0x2e0 [ 58.077111] kunit_try_run_case+0x170/0x3f0 [ 58.077143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.077181] kthread+0x328/0x630 [ 58.077214] ret_from_fork+0x10/0x20 [ 58.077244] [ 58.147089] Allocated by task 314: [ 58.150474] kasan_save_stack+0x3c/0x68 [ 58.154293] kasan_save_track+0x20/0x40 [ 58.158113] kasan_save_alloc_info+0x40/0x58 [ 58.162366] __kasan_kmalloc+0xd4/0xd8 [ 58.166099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.170613] kasan_atomics+0xb8/0x2e0 [ 58.174258] kunit_try_run_case+0x170/0x3f0 [ 58.178425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.183894] kthread+0x328/0x630 [ 58.187105] ret_from_fork+0x10/0x20 [ 58.190664] [ 58.192140] The buggy address belongs to the object at ffff000803afab80 [ 58.192140] which belongs to the cache kmalloc-64 of size 64 [ 58.204467] The buggy address is located 0 bytes to the right of [ 58.204467] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 58.217313] [ 58.218789] The buggy address belongs to the physical page: [ 58.224345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 58.232331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.238841] page_type: f5(slab) [ 58.241973] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.249698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.257417] page dumped because: kasan: bad access detected [ 58.262972] [ 58.264448] Memory state around the buggy address: [ 58.269227] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.276431] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.283636] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.290837] ^ [ 58.295615] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.302820] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.310020] ================================================================== [ 59.633321] ================================================================== [ 59.640385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 59.647761] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 59.655139] [ 59.656619] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 59.656664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.656679] Hardware name: WinLink E850-96 board (DT) [ 59.656697] Call trace: [ 59.656711] show_stack+0x20/0x38 (C) [ 59.656743] dump_stack_lvl+0x8c/0xd0 [ 59.656774] print_report+0x118/0x608 [ 59.656801] kasan_report+0xdc/0x128 [ 59.656829] kasan_check_range+0x100/0x1a8 [ 59.656858] __kasan_check_write+0x20/0x30 [ 59.656890] kasan_atomics_helper+0x1644/0x4858 [ 59.656919] kasan_atomics+0x198/0x2e0 [ 59.656946] kunit_try_run_case+0x170/0x3f0 [ 59.656981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.657019] kthread+0x328/0x630 [ 59.657052] ret_from_fork+0x10/0x20 [ 59.657084] [ 59.726926] Allocated by task 314: [ 59.730312] kasan_save_stack+0x3c/0x68 [ 59.734131] kasan_save_track+0x20/0x40 [ 59.737950] kasan_save_alloc_info+0x40/0x58 [ 59.742204] __kasan_kmalloc+0xd4/0xd8 [ 59.745936] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.750450] kasan_atomics+0xb8/0x2e0 [ 59.754096] kunit_try_run_case+0x170/0x3f0 [ 59.758262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.763731] kthread+0x328/0x630 [ 59.766943] ret_from_fork+0x10/0x20 [ 59.770502] [ 59.771977] The buggy address belongs to the object at ffff000803afab80 [ 59.771977] which belongs to the cache kmalloc-64 of size 64 [ 59.784304] The buggy address is located 0 bytes to the right of [ 59.784304] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 59.797151] [ 59.798627] The buggy address belongs to the physical page: [ 59.804182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 59.812168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.818678] page_type: f5(slab) [ 59.821811] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.829535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.837254] page dumped because: kasan: bad access detected [ 59.842809] [ 59.844285] Memory state around the buggy address: [ 59.849065] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.856268] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.863473] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.870674] ^ [ 59.875452] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.882657] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.889858] ================================================================== [ 49.903416] ================================================================== [ 49.910495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 49.917785] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 49.925164] [ 49.926646] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 49.926691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.926707] Hardware name: WinLink E850-96 board (DT) [ 49.926728] Call trace: [ 49.926740] show_stack+0x20/0x38 (C) [ 49.926771] dump_stack_lvl+0x8c/0xd0 [ 49.926805] print_report+0x118/0x608 [ 49.926833] kasan_report+0xdc/0x128 [ 49.926862] kasan_check_range+0x100/0x1a8 [ 49.926894] __kasan_check_write+0x20/0x30 [ 49.926925] kasan_atomics_helper+0x934/0x4858 [ 49.926956] kasan_atomics+0x198/0x2e0 [ 49.926981] kunit_try_run_case+0x170/0x3f0 [ 49.927014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.927052] kthread+0x328/0x630 [ 49.927083] ret_from_fork+0x10/0x20 [ 49.927115] [ 49.996864] Allocated by task 314: [ 50.000249] kasan_save_stack+0x3c/0x68 [ 50.004069] kasan_save_track+0x20/0x40 [ 50.007888] kasan_save_alloc_info+0x40/0x58 [ 50.012141] __kasan_kmalloc+0xd4/0xd8 [ 50.015874] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.020388] kasan_atomics+0xb8/0x2e0 [ 50.024034] kunit_try_run_case+0x170/0x3f0 [ 50.028200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.033669] kthread+0x328/0x630 [ 50.036881] ret_from_fork+0x10/0x20 [ 50.040440] [ 50.041915] The buggy address belongs to the object at ffff000803afab80 [ 50.041915] which belongs to the cache kmalloc-64 of size 64 [ 50.054242] The buggy address is located 0 bytes to the right of [ 50.054242] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 50.067088] [ 50.068566] The buggy address belongs to the physical page: [ 50.074120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 50.082106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.088616] page_type: f5(slab) [ 50.091749] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.099473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.107192] page dumped because: kasan: bad access detected [ 50.112747] [ 50.114223] Memory state around the buggy address: [ 50.119003] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.126206] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.133411] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.140612] ^ [ 50.145390] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.152595] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.159797] ================================================================== [ 51.746082] ================================================================== [ 51.753176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 51.760553] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 51.767844] [ 51.769323] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 51.769367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.769382] Hardware name: WinLink E850-96 board (DT) [ 51.769403] Call trace: [ 51.769415] show_stack+0x20/0x38 (C) [ 51.769446] dump_stack_lvl+0x8c/0xd0 [ 51.769478] print_report+0x118/0x608 [ 51.769508] kasan_report+0xdc/0x128 [ 51.769539] __asan_report_load4_noabort+0x20/0x30 [ 51.769571] kasan_atomics_helper+0x3dbc/0x4858 [ 51.769600] kasan_atomics+0x198/0x2e0 [ 51.769627] kunit_try_run_case+0x170/0x3f0 [ 51.769662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.769700] kthread+0x328/0x630 [ 51.769733] ret_from_fork+0x10/0x20 [ 51.769762] [ 51.836246] Allocated by task 314: [ 51.839631] kasan_save_stack+0x3c/0x68 [ 51.843451] kasan_save_track+0x20/0x40 [ 51.847270] kasan_save_alloc_info+0x40/0x58 [ 51.851524] __kasan_kmalloc+0xd4/0xd8 [ 51.855256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.859770] kasan_atomics+0xb8/0x2e0 [ 51.863416] kunit_try_run_case+0x170/0x3f0 [ 51.867582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.873051] kthread+0x328/0x630 [ 51.876263] ret_from_fork+0x10/0x20 [ 51.879821] [ 51.881297] The buggy address belongs to the object at ffff000803afab80 [ 51.881297] which belongs to the cache kmalloc-64 of size 64 [ 51.893624] The buggy address is located 0 bytes to the right of [ 51.893624] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 51.906471] [ 51.907946] The buggy address belongs to the physical page: [ 51.913504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 51.921488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.927998] page_type: f5(slab) [ 51.931131] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.938855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.946574] page dumped because: kasan: bad access detected [ 51.952129] [ 51.953605] Memory state around the buggy address: [ 51.958383] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.965588] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.972793] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.979994] ^ [ 51.984772] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.991977] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.999178] ================================================================== [ 52.270236] ================================================================== [ 52.277301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 52.284677] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 52.291968] [ 52.293449] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 52.293493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.293507] Hardware name: WinLink E850-96 board (DT) [ 52.293523] Call trace: [ 52.293536] show_stack+0x20/0x38 (C) [ 52.293566] dump_stack_lvl+0x8c/0xd0 [ 52.293598] print_report+0x118/0x608 [ 52.293628] kasan_report+0xdc/0x128 [ 52.293657] __asan_report_load4_noabort+0x20/0x30 [ 52.293692] kasan_atomics_helper+0x3de4/0x4858 [ 52.293721] kasan_atomics+0x198/0x2e0 [ 52.293748] kunit_try_run_case+0x170/0x3f0 [ 52.293782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.293820] kthread+0x328/0x630 [ 52.293852] ret_from_fork+0x10/0x20 [ 52.293884] [ 52.360370] Allocated by task 314: [ 52.363755] kasan_save_stack+0x3c/0x68 [ 52.367575] kasan_save_track+0x20/0x40 [ 52.371394] kasan_save_alloc_info+0x40/0x58 [ 52.375648] __kasan_kmalloc+0xd4/0xd8 [ 52.379380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.383894] kasan_atomics+0xb8/0x2e0 [ 52.387540] kunit_try_run_case+0x170/0x3f0 [ 52.391707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.397175] kthread+0x328/0x630 [ 52.400387] ret_from_fork+0x10/0x20 [ 52.403946] [ 52.405421] The buggy address belongs to the object at ffff000803afab80 [ 52.405421] which belongs to the cache kmalloc-64 of size 64 [ 52.417748] The buggy address is located 0 bytes to the right of [ 52.417748] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 52.430595] [ 52.432071] The buggy address belongs to the physical page: [ 52.437626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 52.445612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.452122] page_type: f5(slab) [ 52.455255] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.462979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.470698] page dumped because: kasan: bad access detected [ 52.476253] [ 52.477729] Memory state around the buggy address: [ 52.482510] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.489712] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.496917] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.504118] ^ [ 52.508896] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.516100] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.523302] ================================================================== [ 59.109019] ================================================================== [ 59.116086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 59.123463] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 59.130841] [ 59.132321] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 59.132366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.132384] Hardware name: WinLink E850-96 board (DT) [ 59.132402] Call trace: [ 59.132414] show_stack+0x20/0x38 (C) [ 59.132443] dump_stack_lvl+0x8c/0xd0 [ 59.132477] print_report+0x118/0x608 [ 59.132507] kasan_report+0xdc/0x128 [ 59.132536] kasan_check_range+0x100/0x1a8 [ 59.132568] __kasan_check_write+0x20/0x30 [ 59.132600] kasan_atomics_helper+0x15b4/0x4858 [ 59.132629] kasan_atomics+0x198/0x2e0 [ 59.132655] kunit_try_run_case+0x170/0x3f0 [ 59.132690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.132729] kthread+0x328/0x630 [ 59.132762] ret_from_fork+0x10/0x20 [ 59.132792] [ 59.202629] Allocated by task 314: [ 59.206014] kasan_save_stack+0x3c/0x68 [ 59.209833] kasan_save_track+0x20/0x40 [ 59.213653] kasan_save_alloc_info+0x40/0x58 [ 59.217906] __kasan_kmalloc+0xd4/0xd8 [ 59.221639] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.226152] kasan_atomics+0xb8/0x2e0 [ 59.229798] kunit_try_run_case+0x170/0x3f0 [ 59.233965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.239433] kthread+0x328/0x630 [ 59.242645] ret_from_fork+0x10/0x20 [ 59.246204] [ 59.247680] The buggy address belongs to the object at ffff000803afab80 [ 59.247680] which belongs to the cache kmalloc-64 of size 64 [ 59.260007] The buggy address is located 0 bytes to the right of [ 59.260007] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 59.272853] [ 59.274329] The buggy address belongs to the physical page: [ 59.279885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 59.287871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.294381] page_type: f5(slab) [ 59.297513] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.305238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.312956] page dumped because: kasan: bad access detected [ 59.318512] [ 59.319988] Memory state around the buggy address: [ 59.324767] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.331970] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.339176] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.346376] ^ [ 59.351154] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.358359] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.365560] ================================================================== [ 50.430857] ================================================================== [ 50.437917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 50.445208] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 50.452586] [ 50.454067] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 50.454115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.454129] Hardware name: WinLink E850-96 board (DT) [ 50.454148] Call trace: [ 50.454159] show_stack+0x20/0x38 (C) [ 50.454189] dump_stack_lvl+0x8c/0xd0 [ 50.454220] print_report+0x118/0x608 [ 50.454251] kasan_report+0xdc/0x128 [ 50.454279] kasan_check_range+0x100/0x1a8 [ 50.454310] __kasan_check_write+0x20/0x30 [ 50.454342] kasan_atomics_helper+0xa04/0x4858 [ 50.454372] kasan_atomics+0x198/0x2e0 [ 50.454399] kunit_try_run_case+0x170/0x3f0 [ 50.454434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.454470] kthread+0x328/0x630 [ 50.454502] ret_from_fork+0x10/0x20 [ 50.454532] [ 50.524286] Allocated by task 314: [ 50.527673] kasan_save_stack+0x3c/0x68 [ 50.531491] kasan_save_track+0x20/0x40 [ 50.535311] kasan_save_alloc_info+0x40/0x58 [ 50.539564] __kasan_kmalloc+0xd4/0xd8 [ 50.543296] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.547810] kasan_atomics+0xb8/0x2e0 [ 50.551456] kunit_try_run_case+0x170/0x3f0 [ 50.555623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.561092] kthread+0x328/0x630 [ 50.564303] ret_from_fork+0x10/0x20 [ 50.567862] [ 50.569338] The buggy address belongs to the object at ffff000803afab80 [ 50.569338] which belongs to the cache kmalloc-64 of size 64 [ 50.581664] The buggy address is located 0 bytes to the right of [ 50.581664] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 50.594511] [ 50.595987] The buggy address belongs to the physical page: [ 50.601543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 50.609528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.616039] page_type: f5(slab) [ 50.619171] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.626896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.634615] page dumped because: kasan: bad access detected [ 50.640170] [ 50.641646] Memory state around the buggy address: [ 50.646427] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.653629] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.660834] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.668035] ^ [ 50.672812] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.680017] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.687219] ================================================================== [ 55.945899] ================================================================== [ 55.952940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 55.960316] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 55.967694] [ 55.969175] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 55.969219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.969233] Hardware name: WinLink E850-96 board (DT) [ 55.969252] Call trace: [ 55.969265] show_stack+0x20/0x38 (C) [ 55.969297] dump_stack_lvl+0x8c/0xd0 [ 55.969330] print_report+0x118/0x608 [ 55.969358] kasan_report+0xdc/0x128 [ 55.969387] kasan_check_range+0x100/0x1a8 [ 55.969419] __kasan_check_write+0x20/0x30 [ 55.969449] kasan_atomics_helper+0x10c0/0x4858 [ 55.969479] kasan_atomics+0x198/0x2e0 [ 55.969504] kunit_try_run_case+0x170/0x3f0 [ 55.969539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.969577] kthread+0x328/0x630 [ 55.969607] ret_from_fork+0x10/0x20 [ 55.969637] [ 56.039481] Allocated by task 314: [ 56.042867] kasan_save_stack+0x3c/0x68 [ 56.046686] kasan_save_track+0x20/0x40 [ 56.050506] kasan_save_alloc_info+0x40/0x58 [ 56.054759] __kasan_kmalloc+0xd4/0xd8 [ 56.058491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.063005] kasan_atomics+0xb8/0x2e0 [ 56.066651] kunit_try_run_case+0x170/0x3f0 [ 56.070818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.076286] kthread+0x328/0x630 [ 56.079498] ret_from_fork+0x10/0x20 [ 56.083057] [ 56.084532] The buggy address belongs to the object at ffff000803afab80 [ 56.084532] which belongs to the cache kmalloc-64 of size 64 [ 56.096860] The buggy address is located 0 bytes to the right of [ 56.096860] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 56.109706] [ 56.111182] The buggy address belongs to the physical page: [ 56.116738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 56.124723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.131234] page_type: f5(slab) [ 56.134366] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.142091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.149810] page dumped because: kasan: bad access detected [ 56.155365] [ 56.156841] Memory state around the buggy address: [ 56.161620] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.168824] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.176028] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.183229] ^ [ 56.188007] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.195212] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.202413] ================================================================== [ 56.473640] ================================================================== [ 56.480709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 56.488086] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 56.495464] [ 56.496944] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 56.496991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.497007] Hardware name: WinLink E850-96 board (DT) [ 56.497027] Call trace: [ 56.497038] show_stack+0x20/0x38 (C) [ 56.497069] dump_stack_lvl+0x8c/0xd0 [ 56.497102] print_report+0x118/0x608 [ 56.497130] kasan_report+0xdc/0x128 [ 56.497159] kasan_check_range+0x100/0x1a8 [ 56.497190] __kasan_check_write+0x20/0x30 [ 56.497221] kasan_atomics_helper+0x1190/0x4858 [ 56.497250] kasan_atomics+0x198/0x2e0 [ 56.497277] kunit_try_run_case+0x170/0x3f0 [ 56.497312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.497349] kthread+0x328/0x630 [ 56.497379] ret_from_fork+0x10/0x20 [ 56.497412] [ 56.567251] Allocated by task 314: [ 56.570637] kasan_save_stack+0x3c/0x68 [ 56.574456] kasan_save_track+0x20/0x40 [ 56.578275] kasan_save_alloc_info+0x40/0x58 [ 56.582529] __kasan_kmalloc+0xd4/0xd8 [ 56.586261] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.590775] kasan_atomics+0xb8/0x2e0 [ 56.594421] kunit_try_run_case+0x170/0x3f0 [ 56.598587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.604056] kthread+0x328/0x630 [ 56.607268] ret_from_fork+0x10/0x20 [ 56.610827] [ 56.612303] The buggy address belongs to the object at ffff000803afab80 [ 56.612303] which belongs to the cache kmalloc-64 of size 64 [ 56.624629] The buggy address is located 0 bytes to the right of [ 56.624629] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 56.637476] [ 56.638952] The buggy address belongs to the physical page: [ 56.644508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 56.652493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.659004] page_type: f5(slab) [ 56.662138] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.669861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.677580] page dumped because: kasan: bad access detected [ 56.683135] [ 56.684610] Memory state around the buggy address: [ 56.689390] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.696594] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.703798] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.710999] ^ [ 56.715777] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.722982] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.730183] ================================================================== [ 47.797043] ================================================================== [ 47.804103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 47.811393] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 47.818772] [ 47.820253] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 47.820301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.820318] Hardware name: WinLink E850-96 board (DT) [ 47.820335] Call trace: [ 47.820347] show_stack+0x20/0x38 (C) [ 47.820377] dump_stack_lvl+0x8c/0xd0 [ 47.820412] print_report+0x118/0x608 [ 47.820443] kasan_report+0xdc/0x128 [ 47.820473] kasan_check_range+0x100/0x1a8 [ 47.820504] __kasan_check_write+0x20/0x30 [ 47.820536] kasan_atomics_helper+0x5b4/0x4858 [ 47.820566] kasan_atomics+0x198/0x2e0 [ 47.820593] kunit_try_run_case+0x170/0x3f0 [ 47.820628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.820665] kthread+0x328/0x630 [ 47.820699] ret_from_fork+0x10/0x20 [ 47.820731] [ 47.890472] Allocated by task 314: [ 47.893857] kasan_save_stack+0x3c/0x68 [ 47.897677] kasan_save_track+0x20/0x40 [ 47.901496] kasan_save_alloc_info+0x40/0x58 [ 47.905749] __kasan_kmalloc+0xd4/0xd8 [ 47.909482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.913996] kasan_atomics+0xb8/0x2e0 [ 47.917642] kunit_try_run_case+0x170/0x3f0 [ 47.921808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.927277] kthread+0x328/0x630 [ 47.930489] ret_from_fork+0x10/0x20 [ 47.934047] [ 47.935523] The buggy address belongs to the object at ffff000803afab80 [ 47.935523] which belongs to the cache kmalloc-64 of size 64 [ 47.947850] The buggy address is located 0 bytes to the right of [ 47.947850] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 47.960697] [ 47.962174] The buggy address belongs to the physical page: [ 47.967728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 47.975714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.982224] page_type: f5(slab) [ 47.985357] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.993081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.000800] page dumped because: kasan: bad access detected [ 48.006355] [ 48.007831] Memory state around the buggy address: [ 48.012609] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.019814] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.027019] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.034220] ^ [ 48.038998] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.046202] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.053403] ================================================================== [ 45.693725] ================================================================== [ 45.700837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 45.708213] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 45.715505] [ 45.716988] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 45.717035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.717052] Hardware name: WinLink E850-96 board (DT) [ 45.717071] Call trace: [ 45.717085] show_stack+0x20/0x38 (C) [ 45.717119] dump_stack_lvl+0x8c/0xd0 [ 45.717151] print_report+0x118/0x608 [ 45.717179] kasan_report+0xdc/0x128 [ 45.717209] __asan_report_load4_noabort+0x20/0x30 [ 45.717244] kasan_atomics_helper+0x40fc/0x4858 [ 45.717274] kasan_atomics+0x198/0x2e0 [ 45.717301] kunit_try_run_case+0x170/0x3f0 [ 45.717334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.717373] kthread+0x328/0x630 [ 45.717403] ret_from_fork+0x10/0x20 [ 45.717437] [ 45.783906] Allocated by task 314: [ 45.787292] kasan_save_stack+0x3c/0x68 [ 45.791111] kasan_save_track+0x20/0x40 [ 45.794931] kasan_save_alloc_info+0x40/0x58 [ 45.799184] __kasan_kmalloc+0xd4/0xd8 [ 45.802917] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.807430] kasan_atomics+0xb8/0x2e0 [ 45.811076] kunit_try_run_case+0x170/0x3f0 [ 45.815243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.820711] kthread+0x328/0x630 [ 45.823923] ret_from_fork+0x10/0x20 [ 45.827482] [ 45.828958] The buggy address belongs to the object at ffff000803afab80 [ 45.828958] which belongs to the cache kmalloc-64 of size 64 [ 45.841285] The buggy address is located 0 bytes to the right of [ 45.841285] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 45.854131] [ 45.855607] The buggy address belongs to the physical page: [ 45.861164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 45.869148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.875658] page_type: f5(slab) [ 45.878791] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.886516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.894235] page dumped because: kasan: bad access detected [ 45.899790] [ 45.901265] Memory state around the buggy address: [ 45.906046] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.913248] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.920455] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.927654] ^ [ 45.932432] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.939637] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.946840] ================================================================== [ 49.115617] ================================================================== [ 49.122660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 49.129950] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 49.137328] [ 49.138811] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 49.138857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.138872] Hardware name: WinLink E850-96 board (DT) [ 49.138890] Call trace: [ 49.138901] show_stack+0x20/0x38 (C) [ 49.138931] dump_stack_lvl+0x8c/0xd0 [ 49.138964] print_report+0x118/0x608 [ 49.138994] kasan_report+0xdc/0x128 [ 49.139022] kasan_check_range+0x100/0x1a8 [ 49.139052] __kasan_check_write+0x20/0x30 [ 49.139084] kasan_atomics_helper+0x7cc/0x4858 [ 49.139113] kasan_atomics+0x198/0x2e0 [ 49.139139] kunit_try_run_case+0x170/0x3f0 [ 49.139173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.139212] kthread+0x328/0x630 [ 49.139245] ret_from_fork+0x10/0x20 [ 49.139275] [ 49.209029] Allocated by task 314: [ 49.212414] kasan_save_stack+0x3c/0x68 [ 49.216233] kasan_save_track+0x20/0x40 [ 49.220053] kasan_save_alloc_info+0x40/0x58 [ 49.224306] __kasan_kmalloc+0xd4/0xd8 [ 49.228039] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.232552] kasan_atomics+0xb8/0x2e0 [ 49.236198] kunit_try_run_case+0x170/0x3f0 [ 49.240364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.245833] kthread+0x328/0x630 [ 49.249045] ret_from_fork+0x10/0x20 [ 49.252604] [ 49.254079] The buggy address belongs to the object at ffff000803afab80 [ 49.254079] which belongs to the cache kmalloc-64 of size 64 [ 49.266406] The buggy address is located 0 bytes to the right of [ 49.266406] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 49.279253] [ 49.280729] The buggy address belongs to the physical page: [ 49.286285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 49.294270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.300781] page_type: f5(slab) [ 49.303913] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.311638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.319357] page dumped because: kasan: bad access detected [ 49.324912] [ 49.326387] Memory state around the buggy address: [ 49.331166] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.338371] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.345575] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.352776] ^ [ 49.357554] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.364759] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.371962] ================================================================== [ 60.157639] ================================================================== [ 60.164682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 60.172059] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 60.179437] [ 60.180918] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 60.180964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.180981] Hardware name: WinLink E850-96 board (DT) [ 60.180998] Call trace: [ 60.181010] show_stack+0x20/0x38 (C) [ 60.181039] dump_stack_lvl+0x8c/0xd0 [ 60.181073] print_report+0x118/0x608 [ 60.181100] kasan_report+0xdc/0x128 [ 60.181130] kasan_check_range+0x100/0x1a8 [ 60.181162] __kasan_check_write+0x20/0x30 [ 60.181194] kasan_atomics_helper+0x16d0/0x4858 [ 60.181223] kasan_atomics+0x198/0x2e0 [ 60.181251] kunit_try_run_case+0x170/0x3f0 [ 60.181285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.181323] kthread+0x328/0x630 [ 60.181354] ret_from_fork+0x10/0x20 [ 60.181387] [ 60.251224] Allocated by task 314: [ 60.254611] kasan_save_stack+0x3c/0x68 [ 60.258428] kasan_save_track+0x20/0x40 [ 60.262248] kasan_save_alloc_info+0x40/0x58 [ 60.266501] __kasan_kmalloc+0xd4/0xd8 [ 60.270234] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.274748] kasan_atomics+0xb8/0x2e0 [ 60.278393] kunit_try_run_case+0x170/0x3f0 [ 60.282560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.288029] kthread+0x328/0x630 [ 60.291240] ret_from_fork+0x10/0x20 [ 60.294800] [ 60.296275] The buggy address belongs to the object at ffff000803afab80 [ 60.296275] which belongs to the cache kmalloc-64 of size 64 [ 60.308602] The buggy address is located 0 bytes to the right of [ 60.308602] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 60.321448] [ 60.322925] The buggy address belongs to the physical page: [ 60.328480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 60.336466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.342976] page_type: f5(slab) [ 60.346108] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.353833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.361552] page dumped because: kasan: bad access detected [ 60.367107] [ 60.368583] Memory state around the buggy address: [ 60.373361] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.380566] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.387771] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.394972] ^ [ 60.399750] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.406954] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.414155] ================================================================== [ 45.430204] ================================================================== [ 45.437301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 45.444589] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 45.451880] [ 45.453365] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 45.453413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.453430] Hardware name: WinLink E850-96 board (DT) [ 45.453448] Call trace: [ 45.453463] show_stack+0x20/0x38 (C) [ 45.453496] dump_stack_lvl+0x8c/0xd0 [ 45.453529] print_report+0x118/0x608 [ 45.453563] kasan_report+0xdc/0x128 [ 45.453589] kasan_check_range+0x100/0x1a8 [ 45.453621] __kasan_check_read+0x20/0x30 [ 45.453652] kasan_atomics_helper+0x2b0/0x4858 [ 45.453681] kasan_atomics+0x198/0x2e0 [ 45.453708] kunit_try_run_case+0x170/0x3f0 [ 45.453743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.453782] kthread+0x328/0x630 [ 45.453815] ret_from_fork+0x10/0x20 [ 45.453848] [ 45.523493] Allocated by task 314: [ 45.526881] kasan_save_stack+0x3c/0x68 [ 45.530698] kasan_save_track+0x20/0x40 [ 45.534518] kasan_save_alloc_info+0x40/0x58 [ 45.538771] __kasan_kmalloc+0xd4/0xd8 [ 45.542504] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.547017] kasan_atomics+0xb8/0x2e0 [ 45.550663] kunit_try_run_case+0x170/0x3f0 [ 45.554830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.560298] kthread+0x328/0x630 [ 45.563510] ret_from_fork+0x10/0x20 [ 45.567069] [ 45.568545] The buggy address belongs to the object at ffff000803afab80 [ 45.568545] which belongs to the cache kmalloc-64 of size 64 [ 45.580872] The buggy address is located 0 bytes to the right of [ 45.580872] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 45.593718] [ 45.595194] The buggy address belongs to the physical page: [ 45.600752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 45.608735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.615246] page_type: f5(slab) [ 45.618381] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.626103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.633822] page dumped because: kasan: bad access detected [ 45.639377] [ 45.640853] Memory state around the buggy address: [ 45.645632] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.652836] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.660042] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 45.667241] ^ [ 45.672019] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.679224] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.686425] ================================================================== [ 61.206209] ================================================================== [ 61.213277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 61.220654] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 61.228032] [ 61.229513] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 61.229559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.229574] Hardware name: WinLink E850-96 board (DT) [ 61.229596] Call trace: [ 61.229609] show_stack+0x20/0x38 (C) [ 61.229639] dump_stack_lvl+0x8c/0xd0 [ 61.229671] print_report+0x118/0x608 [ 61.229700] kasan_report+0xdc/0x128 [ 61.229728] kasan_check_range+0x100/0x1a8 [ 61.229759] __kasan_check_write+0x20/0x30 [ 61.229791] kasan_atomics_helper+0x17ec/0x4858 [ 61.229821] kasan_atomics+0x198/0x2e0 [ 61.229847] kunit_try_run_case+0x170/0x3f0 [ 61.229881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.229920] kthread+0x328/0x630 [ 61.229953] ret_from_fork+0x10/0x20 [ 61.229986] [ 61.299819] Allocated by task 314: [ 61.303205] kasan_save_stack+0x3c/0x68 [ 61.307024] kasan_save_track+0x20/0x40 [ 61.310843] kasan_save_alloc_info+0x40/0x58 [ 61.315097] __kasan_kmalloc+0xd4/0xd8 [ 61.318829] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.323343] kasan_atomics+0xb8/0x2e0 [ 61.326989] kunit_try_run_case+0x170/0x3f0 [ 61.331155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.336624] kthread+0x328/0x630 [ 61.339836] ret_from_fork+0x10/0x20 [ 61.343395] [ 61.344871] The buggy address belongs to the object at ffff000803afab80 [ 61.344871] which belongs to the cache kmalloc-64 of size 64 [ 61.357197] The buggy address is located 0 bytes to the right of [ 61.357197] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 61.370044] [ 61.371522] The buggy address belongs to the physical page: [ 61.377076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 61.385061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.391571] page_type: f5(slab) [ 61.394704] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.402428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.410147] page dumped because: kasan: bad access detected [ 61.415703] [ 61.417178] Memory state around the buggy address: [ 61.421957] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.429161] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.436366] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.443567] ^ [ 61.448345] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.455550] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.462751] ================================================================== [ 47.005903] ================================================================== [ 47.012969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 47.020260] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 47.027638] [ 47.029120] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 47.029167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.029181] Hardware name: WinLink E850-96 board (DT) [ 47.029202] Call trace: [ 47.029214] show_stack+0x20/0x38 (C) [ 47.029244] dump_stack_lvl+0x8c/0xd0 [ 47.029281] print_report+0x118/0x608 [ 47.029309] kasan_report+0xdc/0x128 [ 47.029337] kasan_check_range+0x100/0x1a8 [ 47.029368] __kasan_check_write+0x20/0x30 [ 47.029399] kasan_atomics_helper+0x47c/0x4858 [ 47.029429] kasan_atomics+0x198/0x2e0 [ 47.029454] kunit_try_run_case+0x170/0x3f0 [ 47.029489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.029527] kthread+0x328/0x630 [ 47.029557] ret_from_fork+0x10/0x20 [ 47.029590] [ 47.099338] Allocated by task 314: [ 47.102724] kasan_save_stack+0x3c/0x68 [ 47.106542] kasan_save_track+0x20/0x40 [ 47.110362] kasan_save_alloc_info+0x40/0x58 [ 47.114615] __kasan_kmalloc+0xd4/0xd8 [ 47.118348] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.122862] kasan_atomics+0xb8/0x2e0 [ 47.126507] kunit_try_run_case+0x170/0x3f0 [ 47.130674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.136143] kthread+0x328/0x630 [ 47.139355] ret_from_fork+0x10/0x20 [ 47.142914] [ 47.144389] The buggy address belongs to the object at ffff000803afab80 [ 47.144389] which belongs to the cache kmalloc-64 of size 64 [ 47.156716] The buggy address is located 0 bytes to the right of [ 47.156716] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 47.169562] [ 47.171038] The buggy address belongs to the physical page: [ 47.176594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 47.184580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.191090] page_type: f5(slab) [ 47.194223] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.201947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.209666] page dumped because: kasan: bad access detected [ 47.215221] [ 47.216697] Memory state around the buggy address: [ 47.221477] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.228680] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.235885] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.243086] ^ [ 47.247864] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.255068] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.262271] ================================================================== [ 54.366560] ================================================================== [ 54.373624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 54.381000] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 54.388378] [ 54.389859] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 54.389903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.389920] Hardware name: WinLink E850-96 board (DT) [ 54.389940] Call trace: [ 54.389955] show_stack+0x20/0x38 (C) [ 54.389987] dump_stack_lvl+0x8c/0xd0 [ 54.390019] print_report+0x118/0x608 [ 54.390047] kasan_report+0xdc/0x128 [ 54.390077] __asan_report_store8_noabort+0x20/0x30 [ 54.390109] kasan_atomics_helper+0x3e5c/0x4858 [ 54.390137] kasan_atomics+0x198/0x2e0 [ 54.390164] kunit_try_run_case+0x170/0x3f0 [ 54.390198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.390236] kthread+0x328/0x630 [ 54.390268] ret_from_fork+0x10/0x20 [ 54.390299] [ 54.456866] Allocated by task 314: [ 54.460252] kasan_save_stack+0x3c/0x68 [ 54.464071] kasan_save_track+0x20/0x40 [ 54.467891] kasan_save_alloc_info+0x40/0x58 [ 54.472144] __kasan_kmalloc+0xd4/0xd8 [ 54.475876] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.480390] kasan_atomics+0xb8/0x2e0 [ 54.484036] kunit_try_run_case+0x170/0x3f0 [ 54.488203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.493671] kthread+0x328/0x630 [ 54.496883] ret_from_fork+0x10/0x20 [ 54.500442] [ 54.501917] The buggy address belongs to the object at ffff000803afab80 [ 54.501917] which belongs to the cache kmalloc-64 of size 64 [ 54.514244] The buggy address is located 0 bytes to the right of [ 54.514244] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 54.527091] [ 54.528567] The buggy address belongs to the physical page: [ 54.534122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 54.542108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.548619] page_type: f5(slab) [ 54.551751] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.559476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.567194] page dumped because: kasan: bad access detected [ 54.572750] [ 54.574225] Memory state around the buggy address: [ 54.579003] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.586208] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.593413] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.600614] ^ [ 54.605392] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.612597] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.619798] ================================================================== [ 50.167140] ================================================================== [ 50.174206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 50.181496] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 50.188875] [ 50.190356] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 50.190402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.190418] Hardware name: WinLink E850-96 board (DT) [ 50.190435] Call trace: [ 50.190448] show_stack+0x20/0x38 (C) [ 50.190479] dump_stack_lvl+0x8c/0xd0 [ 50.190512] print_report+0x118/0x608 [ 50.190543] kasan_report+0xdc/0x128 [ 50.190571] kasan_check_range+0x100/0x1a8 [ 50.190601] __kasan_check_write+0x20/0x30 [ 50.190632] kasan_atomics_helper+0x99c/0x4858 [ 50.190661] kasan_atomics+0x198/0x2e0 [ 50.190687] kunit_try_run_case+0x170/0x3f0 [ 50.190724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.190759] kthread+0x328/0x630 [ 50.190791] ret_from_fork+0x10/0x20 [ 50.190819] [ 50.260575] Allocated by task 314: [ 50.263961] kasan_save_stack+0x3c/0x68 [ 50.267780] kasan_save_track+0x20/0x40 [ 50.271599] kasan_save_alloc_info+0x40/0x58 [ 50.275853] __kasan_kmalloc+0xd4/0xd8 [ 50.279585] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.284099] kasan_atomics+0xb8/0x2e0 [ 50.287745] kunit_try_run_case+0x170/0x3f0 [ 50.291911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.297380] kthread+0x328/0x630 [ 50.300592] ret_from_fork+0x10/0x20 [ 50.304151] [ 50.305626] The buggy address belongs to the object at ffff000803afab80 [ 50.305626] which belongs to the cache kmalloc-64 of size 64 [ 50.317953] The buggy address is located 0 bytes to the right of [ 50.317953] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 50.330800] [ 50.332275] The buggy address belongs to the physical page: [ 50.337831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 50.345817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.352327] page_type: f5(slab) [ 50.355460] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.363184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.370904] page dumped because: kasan: bad access detected [ 50.376459] [ 50.377934] Memory state around the buggy address: [ 50.382714] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.389918] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.397122] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.404323] ^ [ 50.409101] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.416306] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.423506] ================================================================== [ 54.627114] ================================================================== [ 54.634209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 54.641499] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 54.648877] [ 54.650357] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 54.650405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.650421] Hardware name: WinLink E850-96 board (DT) [ 54.650440] Call trace: [ 54.650450] show_stack+0x20/0x38 (C) [ 54.650479] dump_stack_lvl+0x8c/0xd0 [ 54.650511] print_report+0x118/0x608 [ 54.650541] kasan_report+0xdc/0x128 [ 54.650571] kasan_check_range+0x100/0x1a8 [ 54.650601] __kasan_check_write+0x20/0x30 [ 54.650634] kasan_atomics_helper+0xeb8/0x4858 [ 54.650661] kasan_atomics+0x198/0x2e0 [ 54.650689] kunit_try_run_case+0x170/0x3f0 [ 54.650724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.650761] kthread+0x328/0x630 [ 54.650793] ret_from_fork+0x10/0x20 [ 54.650827] [ 54.720578] Allocated by task 314: [ 54.723963] kasan_save_stack+0x3c/0x68 [ 54.727782] kasan_save_track+0x20/0x40 [ 54.731602] kasan_save_alloc_info+0x40/0x58 [ 54.735855] __kasan_kmalloc+0xd4/0xd8 [ 54.739588] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.744101] kasan_atomics+0xb8/0x2e0 [ 54.747747] kunit_try_run_case+0x170/0x3f0 [ 54.751914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.757383] kthread+0x328/0x630 [ 54.760594] ret_from_fork+0x10/0x20 [ 54.764153] [ 54.765629] The buggy address belongs to the object at ffff000803afab80 [ 54.765629] which belongs to the cache kmalloc-64 of size 64 [ 54.777956] The buggy address is located 0 bytes to the right of [ 54.777956] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 54.790802] [ 54.792278] The buggy address belongs to the physical page: [ 54.797835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 54.805819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.812330] page_type: f5(slab) [ 54.815464] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.823187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.830906] page dumped because: kasan: bad access detected [ 54.836461] [ 54.837937] Memory state around the buggy address: [ 54.842716] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.849920] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.857125] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.864326] ^ [ 54.869104] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.876308] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.883509] ================================================================== [ 52.530671] ================================================================== [ 52.537713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 52.545003] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 52.552381] [ 52.553862] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 52.553910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.553924] Hardware name: WinLink E850-96 board (DT) [ 52.553943] Call trace: [ 52.553954] show_stack+0x20/0x38 (C) [ 52.553983] dump_stack_lvl+0x8c/0xd0 [ 52.554018] print_report+0x118/0x608 [ 52.554047] kasan_report+0xdc/0x128 [ 52.554076] kasan_check_range+0x100/0x1a8 [ 52.554108] __kasan_check_write+0x20/0x30 [ 52.554137] kasan_atomics_helper+0xca0/0x4858 [ 52.554168] kasan_atomics+0x198/0x2e0 [ 52.554196] kunit_try_run_case+0x170/0x3f0 [ 52.554231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.554268] kthread+0x328/0x630 [ 52.554301] ret_from_fork+0x10/0x20 [ 52.554333] [ 52.624081] Allocated by task 314: [ 52.627467] kasan_save_stack+0x3c/0x68 [ 52.631286] kasan_save_track+0x20/0x40 [ 52.635106] kasan_save_alloc_info+0x40/0x58 [ 52.639359] __kasan_kmalloc+0xd4/0xd8 [ 52.643091] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.647605] kasan_atomics+0xb8/0x2e0 [ 52.651251] kunit_try_run_case+0x170/0x3f0 [ 52.655418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.660886] kthread+0x328/0x630 [ 52.664098] ret_from_fork+0x10/0x20 [ 52.667657] [ 52.669132] The buggy address belongs to the object at ffff000803afab80 [ 52.669132] which belongs to the cache kmalloc-64 of size 64 [ 52.681459] The buggy address is located 0 bytes to the right of [ 52.681459] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 52.694306] [ 52.695782] The buggy address belongs to the physical page: [ 52.701338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 52.709323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.715833] page_type: f5(slab) [ 52.718968] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.726691] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.734410] page dumped because: kasan: bad access detected [ 52.739965] [ 52.741440] Memory state around the buggy address: [ 52.746221] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.753423] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.760628] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.767829] ^ [ 52.772607] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.779812] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.787015] ================================================================== [ 46.478502] ================================================================== [ 46.485548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 46.492837] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 46.500215] [ 46.501697] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 46.501750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.501765] Hardware name: WinLink E850-96 board (DT) [ 46.501784] Call trace: [ 46.501795] show_stack+0x20/0x38 (C) [ 46.501827] dump_stack_lvl+0x8c/0xd0 [ 46.501862] print_report+0x118/0x608 [ 46.501890] kasan_report+0xdc/0x128 [ 46.501917] kasan_check_range+0x100/0x1a8 [ 46.501948] __kasan_check_write+0x20/0x30 [ 46.501978] kasan_atomics_helper+0x3ac/0x4858 [ 46.502007] kasan_atomics+0x198/0x2e0 [ 46.502034] kunit_try_run_case+0x170/0x3f0 [ 46.502070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.502109] kthread+0x328/0x630 [ 46.502142] ret_from_fork+0x10/0x20 [ 46.502174] [ 46.571915] Allocated by task 314: [ 46.575302] kasan_save_stack+0x3c/0x68 [ 46.579120] kasan_save_track+0x20/0x40 [ 46.582939] kasan_save_alloc_info+0x40/0x58 [ 46.587193] __kasan_kmalloc+0xd4/0xd8 [ 46.590925] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.595439] kasan_atomics+0xb8/0x2e0 [ 46.599085] kunit_try_run_case+0x170/0x3f0 [ 46.603251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.608720] kthread+0x328/0x630 [ 46.611932] ret_from_fork+0x10/0x20 [ 46.615491] [ 46.616966] The buggy address belongs to the object at ffff000803afab80 [ 46.616966] which belongs to the cache kmalloc-64 of size 64 [ 46.629294] The buggy address is located 0 bytes to the right of [ 46.629294] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 46.642140] [ 46.643616] The buggy address belongs to the physical page: [ 46.649174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 46.657157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.663667] page_type: f5(slab) [ 46.666802] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.674525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.682244] page dumped because: kasan: bad access detected [ 46.687799] [ 46.689274] Memory state around the buggy address: [ 46.694055] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.701257] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.708462] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.715663] ^ [ 46.720441] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.727646] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.734847] ================================================================== [ 53.578920] ================================================================== [ 53.585962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 53.593251] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 53.600542] [ 53.602023] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 53.602070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.602084] Hardware name: WinLink E850-96 board (DT) [ 53.602103] Call trace: [ 53.602115] show_stack+0x20/0x38 (C) [ 53.602144] dump_stack_lvl+0x8c/0xd0 [ 53.602179] print_report+0x118/0x608 [ 53.602210] kasan_report+0xdc/0x128 [ 53.602239] kasan_check_range+0x100/0x1a8 [ 53.602270] __kasan_check_read+0x20/0x30 [ 53.602301] kasan_atomics_helper+0xdd4/0x4858 [ 53.602330] kasan_atomics+0x198/0x2e0 [ 53.602358] kunit_try_run_case+0x170/0x3f0 [ 53.602392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.602431] kthread+0x328/0x630 [ 53.602464] ret_from_fork+0x10/0x20 [ 53.602495] [ 53.672155] Allocated by task 314: [ 53.675542] kasan_save_stack+0x3c/0x68 [ 53.679361] kasan_save_track+0x20/0x40 [ 53.683180] kasan_save_alloc_info+0x40/0x58 [ 53.687433] __kasan_kmalloc+0xd4/0xd8 [ 53.691166] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.695680] kasan_atomics+0xb8/0x2e0 [ 53.699326] kunit_try_run_case+0x170/0x3f0 [ 53.703492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.708961] kthread+0x328/0x630 [ 53.712173] ret_from_fork+0x10/0x20 [ 53.715731] [ 53.717207] The buggy address belongs to the object at ffff000803afab80 [ 53.717207] which belongs to the cache kmalloc-64 of size 64 [ 53.729534] The buggy address is located 0 bytes to the right of [ 53.729534] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 53.742380] [ 53.743857] The buggy address belongs to the physical page: [ 53.749412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 53.757398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.763908] page_type: f5(slab) [ 53.767041] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.774765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.782484] page dumped because: kasan: bad access detected [ 53.788040] [ 53.789515] Memory state around the buggy address: [ 53.794295] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.801498] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.808703] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.815904] ^ [ 53.820682] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.827887] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.835088] ================================================================== [ 59.372882] ================================================================== [ 59.379971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 59.387348] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 59.394640] [ 59.396119] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 59.396163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.396179] Hardware name: WinLink E850-96 board (DT) [ 59.396197] Call trace: [ 59.396208] show_stack+0x20/0x38 (C) [ 59.396238] dump_stack_lvl+0x8c/0xd0 [ 59.396270] print_report+0x118/0x608 [ 59.396299] kasan_report+0xdc/0x128 [ 59.396328] __asan_report_load8_noabort+0x20/0x30 [ 59.396362] kasan_atomics_helper+0x3db0/0x4858 [ 59.396391] kasan_atomics+0x198/0x2e0 [ 59.396418] kunit_try_run_case+0x170/0x3f0 [ 59.396451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.396488] kthread+0x328/0x630 [ 59.396522] ret_from_fork+0x10/0x20 [ 59.396552] [ 59.463041] Allocated by task 314: [ 59.466426] kasan_save_stack+0x3c/0x68 [ 59.470246] kasan_save_track+0x20/0x40 [ 59.474065] kasan_save_alloc_info+0x40/0x58 [ 59.478319] __kasan_kmalloc+0xd4/0xd8 [ 59.482051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.486565] kasan_atomics+0xb8/0x2e0 [ 59.490211] kunit_try_run_case+0x170/0x3f0 [ 59.494378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.499846] kthread+0x328/0x630 [ 59.503058] ret_from_fork+0x10/0x20 [ 59.506617] [ 59.508092] The buggy address belongs to the object at ffff000803afab80 [ 59.508092] which belongs to the cache kmalloc-64 of size 64 [ 59.520419] The buggy address is located 0 bytes to the right of [ 59.520419] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 59.533266] [ 59.534742] The buggy address belongs to the physical page: [ 59.540297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 59.548283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.554794] page_type: f5(slab) [ 59.557926] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.565650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.573369] page dumped because: kasan: bad access detected [ 59.578925] [ 59.580400] Memory state around the buggy address: [ 59.585181] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.592383] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.599588] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.606789] ^ [ 59.611567] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.618772] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.625973] ================================================================== [ 55.154573] ================================================================== [ 55.161631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 55.168922] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 55.176300] [ 55.177780] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 55.177825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.177840] Hardware name: WinLink E850-96 board (DT) [ 55.177858] Call trace: [ 55.177870] show_stack+0x20/0x38 (C) [ 55.177901] dump_stack_lvl+0x8c/0xd0 [ 55.177934] print_report+0x118/0x608 [ 55.177966] kasan_report+0xdc/0x128 [ 55.177992] kasan_check_range+0x100/0x1a8 [ 55.178024] __kasan_check_write+0x20/0x30 [ 55.178055] kasan_atomics_helper+0xf88/0x4858 [ 55.178084] kasan_atomics+0x198/0x2e0 [ 55.178109] kunit_try_run_case+0x170/0x3f0 [ 55.178144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.178183] kthread+0x328/0x630 [ 55.178215] ret_from_fork+0x10/0x20 [ 55.178248] [ 55.248000] Allocated by task 314: [ 55.251386] kasan_save_stack+0x3c/0x68 [ 55.255205] kasan_save_track+0x20/0x40 [ 55.259024] kasan_save_alloc_info+0x40/0x58 [ 55.263278] __kasan_kmalloc+0xd4/0xd8 [ 55.267011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.271524] kasan_atomics+0xb8/0x2e0 [ 55.275170] kunit_try_run_case+0x170/0x3f0 [ 55.279337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.284805] kthread+0x328/0x630 [ 55.288017] ret_from_fork+0x10/0x20 [ 55.291576] [ 55.293052] The buggy address belongs to the object at ffff000803afab80 [ 55.293052] which belongs to the cache kmalloc-64 of size 64 [ 55.305378] The buggy address is located 0 bytes to the right of [ 55.305378] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 55.318225] [ 55.319701] The buggy address belongs to the physical page: [ 55.325257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 55.333242] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.339752] page_type: f5(slab) [ 55.342885] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.350610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.358329] page dumped because: kasan: bad access detected [ 55.363884] [ 55.365359] Memory state around the buggy address: [ 55.370139] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.377342] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.384547] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.391748] ^ [ 55.396526] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.403731] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.410932] ================================================================== [ 55.418297] ================================================================== [ 55.425344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 55.432633] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 55.440011] [ 55.441491] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 55.441537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.441552] Hardware name: WinLink E850-96 board (DT) [ 55.441570] Call trace: [ 55.441580] show_stack+0x20/0x38 (C) [ 55.441612] dump_stack_lvl+0x8c/0xd0 [ 55.441643] print_report+0x118/0x608 [ 55.441671] kasan_report+0xdc/0x128 [ 55.441699] kasan_check_range+0x100/0x1a8 [ 55.441729] __kasan_check_write+0x20/0x30 [ 55.441760] kasan_atomics_helper+0xff0/0x4858 [ 55.441791] kasan_atomics+0x198/0x2e0 [ 55.441818] kunit_try_run_case+0x170/0x3f0 [ 55.441851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.441889] kthread+0x328/0x630 [ 55.441920] ret_from_fork+0x10/0x20 [ 55.441950] [ 55.511712] Allocated by task 314: [ 55.515097] kasan_save_stack+0x3c/0x68 [ 55.518916] kasan_save_track+0x20/0x40 [ 55.522736] kasan_save_alloc_info+0x40/0x58 [ 55.526989] __kasan_kmalloc+0xd4/0xd8 [ 55.530722] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.535236] kasan_atomics+0xb8/0x2e0 [ 55.538881] kunit_try_run_case+0x170/0x3f0 [ 55.543048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.548517] kthread+0x328/0x630 [ 55.551728] ret_from_fork+0x10/0x20 [ 55.555287] [ 55.556763] The buggy address belongs to the object at ffff000803afab80 [ 55.556763] which belongs to the cache kmalloc-64 of size 64 [ 55.569089] The buggy address is located 0 bytes to the right of [ 55.569089] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 55.581936] [ 55.583412] The buggy address belongs to the physical page: [ 55.588968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 55.596953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.603464] page_type: f5(slab) [ 55.606596] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.614321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.622040] page dumped because: kasan: bad access detected [ 55.627595] [ 55.629071] Memory state around the buggy address: [ 55.633852] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.641054] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.648258] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.655459] ^ [ 55.660237] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.667442] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.674643] ================================================================== [ 50.694568] ================================================================== [ 50.701629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 50.708919] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 50.716297] [ 50.717779] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 50.717824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.717840] Hardware name: WinLink E850-96 board (DT) [ 50.717858] Call trace: [ 50.717873] show_stack+0x20/0x38 (C) [ 50.717902] dump_stack_lvl+0x8c/0xd0 [ 50.717936] print_report+0x118/0x608 [ 50.717966] kasan_report+0xdc/0x128 [ 50.717994] kasan_check_range+0x100/0x1a8 [ 50.718025] __kasan_check_write+0x20/0x30 [ 50.718056] kasan_atomics_helper+0xa6c/0x4858 [ 50.718085] kasan_atomics+0x198/0x2e0 [ 50.718113] kunit_try_run_case+0x170/0x3f0 [ 50.718146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.718184] kthread+0x328/0x630 [ 50.718217] ret_from_fork+0x10/0x20 [ 50.718247] [ 50.787998] Allocated by task 314: [ 50.791383] kasan_save_stack+0x3c/0x68 [ 50.795203] kasan_save_track+0x20/0x40 [ 50.799022] kasan_save_alloc_info+0x40/0x58 [ 50.803275] __kasan_kmalloc+0xd4/0xd8 [ 50.807008] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.811522] kasan_atomics+0xb8/0x2e0 [ 50.815168] kunit_try_run_case+0x170/0x3f0 [ 50.819334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.824803] kthread+0x328/0x630 [ 50.828015] ret_from_fork+0x10/0x20 [ 50.831574] [ 50.833049] The buggy address belongs to the object at ffff000803afab80 [ 50.833049] which belongs to the cache kmalloc-64 of size 64 [ 50.845376] The buggy address is located 0 bytes to the right of [ 50.845376] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 50.858222] [ 50.859698] The buggy address belongs to the physical page: [ 50.865254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 50.873240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.879750] page_type: f5(slab) [ 50.882883] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.890607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.898326] page dumped because: kasan: bad access detected [ 50.903881] [ 50.905357] Memory state around the buggy address: [ 50.910135] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.917340] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.924545] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.931745] ^ [ 50.936524] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.943729] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.950930] ================================================================== [ 46.217947] ================================================================== [ 46.224960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 46.232337] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 46.239715] [ 46.241198] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 46.241247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.241262] Hardware name: WinLink E850-96 board (DT) [ 46.241282] Call trace: [ 46.241296] show_stack+0x20/0x38 (C) [ 46.241329] dump_stack_lvl+0x8c/0xd0 [ 46.241362] print_report+0x118/0x608 [ 46.241391] kasan_report+0xdc/0x128 [ 46.241421] __asan_report_store4_noabort+0x20/0x30 [ 46.241454] kasan_atomics_helper+0x3f94/0x4858 [ 46.241481] kasan_atomics+0x198/0x2e0 [ 46.241508] kunit_try_run_case+0x170/0x3f0 [ 46.241542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.241579] kthread+0x328/0x630 [ 46.241610] ret_from_fork+0x10/0x20 [ 46.241644] [ 46.308204] Allocated by task 314: [ 46.311591] kasan_save_stack+0x3c/0x68 [ 46.315409] kasan_save_track+0x20/0x40 [ 46.319228] kasan_save_alloc_info+0x40/0x58 [ 46.323482] __kasan_kmalloc+0xd4/0xd8 [ 46.327214] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.331728] kasan_atomics+0xb8/0x2e0 [ 46.335374] kunit_try_run_case+0x170/0x3f0 [ 46.339540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.345009] kthread+0x328/0x630 [ 46.348221] ret_from_fork+0x10/0x20 [ 46.351780] [ 46.353255] The buggy address belongs to the object at ffff000803afab80 [ 46.353255] which belongs to the cache kmalloc-64 of size 64 [ 46.365582] The buggy address is located 0 bytes to the right of [ 46.365582] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 46.378428] [ 46.379905] The buggy address belongs to the physical page: [ 46.385462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 46.393445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.399956] page_type: f5(slab) [ 46.403089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.410813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.418532] page dumped because: kasan: bad access detected [ 46.424087] [ 46.425563] Memory state around the buggy address: [ 46.430341] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.437546] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.444751] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.451952] ^ [ 46.456730] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.463935] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.471136] ================================================================== [ 56.209731] ================================================================== [ 56.216824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 56.224201] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 56.231579] [ 56.233059] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 56.233106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.233122] Hardware name: WinLink E850-96 board (DT) [ 56.233143] Call trace: [ 56.233155] show_stack+0x20/0x38 (C) [ 56.233187] dump_stack_lvl+0x8c/0xd0 [ 56.233219] print_report+0x118/0x608 [ 56.233250] kasan_report+0xdc/0x128 [ 56.233279] kasan_check_range+0x100/0x1a8 [ 56.233312] __kasan_check_write+0x20/0x30 [ 56.233345] kasan_atomics_helper+0x1128/0x4858 [ 56.233373] kasan_atomics+0x198/0x2e0 [ 56.233399] kunit_try_run_case+0x170/0x3f0 [ 56.233431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.233469] kthread+0x328/0x630 [ 56.233502] ret_from_fork+0x10/0x20 [ 56.233529] [ 56.303366] Allocated by task 314: [ 56.306752] kasan_save_stack+0x3c/0x68 [ 56.310571] kasan_save_track+0x20/0x40 [ 56.314391] kasan_save_alloc_info+0x40/0x58 [ 56.318644] __kasan_kmalloc+0xd4/0xd8 [ 56.322376] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.326890] kasan_atomics+0xb8/0x2e0 [ 56.330536] kunit_try_run_case+0x170/0x3f0 [ 56.334703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.340171] kthread+0x328/0x630 [ 56.343383] ret_from_fork+0x10/0x20 [ 56.346942] [ 56.348418] The buggy address belongs to the object at ffff000803afab80 [ 56.348418] which belongs to the cache kmalloc-64 of size 64 [ 56.360744] The buggy address is located 0 bytes to the right of [ 56.360744] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 56.373591] [ 56.375067] The buggy address belongs to the physical page: [ 56.380623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 56.388608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.395119] page_type: f5(slab) [ 56.398251] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.405976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.413695] page dumped because: kasan: bad access detected [ 56.419250] [ 56.420725] Memory state around the buggy address: [ 56.425505] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.432709] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.439913] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.447114] ^ [ 56.451892] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.459097] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.466298] ================================================================== [ 59.897211] ================================================================== [ 59.904270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 59.911646] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 59.918937] [ 59.920419] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 59.920466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.920481] Hardware name: WinLink E850-96 board (DT) [ 59.920499] Call trace: [ 59.920511] show_stack+0x20/0x38 (C) [ 59.920543] dump_stack_lvl+0x8c/0xd0 [ 59.920575] print_report+0x118/0x608 [ 59.920604] kasan_report+0xdc/0x128 [ 59.920632] __asan_report_load8_noabort+0x20/0x30 [ 59.920666] kasan_atomics_helper+0x3df4/0x4858 [ 59.920697] kasan_atomics+0x198/0x2e0 [ 59.920724] kunit_try_run_case+0x170/0x3f0 [ 59.920760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.920797] kthread+0x328/0x630 [ 59.920829] ret_from_fork+0x10/0x20 [ 59.920861] [ 59.987340] Allocated by task 314: [ 59.990725] kasan_save_stack+0x3c/0x68 [ 59.994544] kasan_save_track+0x20/0x40 [ 59.998363] kasan_save_alloc_info+0x40/0x58 [ 60.002617] __kasan_kmalloc+0xd4/0xd8 [ 60.006349] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.010863] kasan_atomics+0xb8/0x2e0 [ 60.014509] kunit_try_run_case+0x170/0x3f0 [ 60.018675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.024144] kthread+0x328/0x630 [ 60.027356] ret_from_fork+0x10/0x20 [ 60.030915] [ 60.032390] The buggy address belongs to the object at ffff000803afab80 [ 60.032390] which belongs to the cache kmalloc-64 of size 64 [ 60.044717] The buggy address is located 0 bytes to the right of [ 60.044717] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 60.057563] [ 60.059039] The buggy address belongs to the physical page: [ 60.064595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 60.072581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.079091] page_type: f5(slab) [ 60.082224] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.089948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.097667] page dumped because: kasan: bad access detected [ 60.103222] [ 60.104698] Memory state around the buggy address: [ 60.109476] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.116681] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.123886] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.131087] ^ [ 60.135865] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.143069] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.150272] ================================================================== [ 57.529209] ================================================================== [ 57.536249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 57.543626] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 57.551004] [ 57.552484] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 57.552532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.552547] Hardware name: WinLink E850-96 board (DT) [ 57.552566] Call trace: [ 57.552578] show_stack+0x20/0x38 (C) [ 57.552612] dump_stack_lvl+0x8c/0xd0 [ 57.552645] print_report+0x118/0x608 [ 57.552672] kasan_report+0xdc/0x128 [ 57.552700] kasan_check_range+0x100/0x1a8 [ 57.552731] __kasan_check_write+0x20/0x30 [ 57.552762] kasan_atomics_helper+0x1384/0x4858 [ 57.552792] kasan_atomics+0x198/0x2e0 [ 57.552819] kunit_try_run_case+0x170/0x3f0 [ 57.552852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.552889] kthread+0x328/0x630 [ 57.552922] ret_from_fork+0x10/0x20 [ 57.552956] [ 57.622791] Allocated by task 314: [ 57.626177] kasan_save_stack+0x3c/0x68 [ 57.629996] kasan_save_track+0x20/0x40 [ 57.633815] kasan_save_alloc_info+0x40/0x58 [ 57.638069] __kasan_kmalloc+0xd4/0xd8 [ 57.641801] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.646315] kasan_atomics+0xb8/0x2e0 [ 57.649961] kunit_try_run_case+0x170/0x3f0 [ 57.654127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.659596] kthread+0x328/0x630 [ 57.662808] ret_from_fork+0x10/0x20 [ 57.666367] [ 57.667842] The buggy address belongs to the object at ffff000803afab80 [ 57.667842] which belongs to the cache kmalloc-64 of size 64 [ 57.680169] The buggy address is located 0 bytes to the right of [ 57.680169] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 57.693016] [ 57.694491] The buggy address belongs to the physical page: [ 57.700047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 57.708033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.714543] page_type: f5(slab) [ 57.717676] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.725400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.733119] page dumped because: kasan: bad access detected [ 57.738674] [ 57.740150] Memory state around the buggy address: [ 57.744928] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.752133] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.759338] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.766539] ^ [ 57.771317] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.778522] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.785722] ================================================================== [ 60.681930] ================================================================== [ 60.688979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 60.696356] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 60.703734] [ 60.705216] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 60.705263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.705279] Hardware name: WinLink E850-96 board (DT) [ 60.705296] Call trace: [ 60.705307] show_stack+0x20/0x38 (C) [ 60.705339] dump_stack_lvl+0x8c/0xd0 [ 60.705370] print_report+0x118/0x608 [ 60.705401] kasan_report+0xdc/0x128 [ 60.705429] kasan_check_range+0x100/0x1a8 [ 60.705461] __kasan_check_write+0x20/0x30 [ 60.705493] kasan_atomics_helper+0x175c/0x4858 [ 60.705521] kasan_atomics+0x198/0x2e0 [ 60.705548] kunit_try_run_case+0x170/0x3f0 [ 60.705583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.705620] kthread+0x328/0x630 [ 60.705651] ret_from_fork+0x10/0x20 [ 60.705679] [ 60.775521] Allocated by task 314: [ 60.778907] kasan_save_stack+0x3c/0x68 [ 60.782726] kasan_save_track+0x20/0x40 [ 60.786545] kasan_save_alloc_info+0x40/0x58 [ 60.790799] __kasan_kmalloc+0xd4/0xd8 [ 60.794531] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.799045] kasan_atomics+0xb8/0x2e0 [ 60.802691] kunit_try_run_case+0x170/0x3f0 [ 60.806857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.812326] kthread+0x328/0x630 [ 60.815538] ret_from_fork+0x10/0x20 [ 60.819097] [ 60.820573] The buggy address belongs to the object at ffff000803afab80 [ 60.820573] which belongs to the cache kmalloc-64 of size 64 [ 60.832899] The buggy address is located 0 bytes to the right of [ 60.832899] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 60.845746] [ 60.847222] The buggy address belongs to the physical page: [ 60.852778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 60.860763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.867274] page_type: f5(slab) [ 60.870408] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.878131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.885850] page dumped because: kasan: bad access detected [ 60.891405] [ 60.892880] Memory state around the buggy address: [ 60.897659] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.904864] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.912068] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.919269] ^ [ 60.924047] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.931252] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.938453] ================================================================== [ 47.533354] ================================================================== [ 47.540393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 47.547682] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 47.555060] [ 47.556542] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 47.556587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.556602] Hardware name: WinLink E850-96 board (DT) [ 47.556622] Call trace: [ 47.556636] show_stack+0x20/0x38 (C) [ 47.556666] dump_stack_lvl+0x8c/0xd0 [ 47.556702] print_report+0x118/0x608 [ 47.556731] kasan_report+0xdc/0x128 [ 47.556759] kasan_check_range+0x100/0x1a8 [ 47.556789] __kasan_check_write+0x20/0x30 [ 47.556822] kasan_atomics_helper+0x54c/0x4858 [ 47.556851] kasan_atomics+0x198/0x2e0 [ 47.556879] kunit_try_run_case+0x170/0x3f0 [ 47.556914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.556951] kthread+0x328/0x630 [ 47.556982] ret_from_fork+0x10/0x20 [ 47.557014] [ 47.626761] Allocated by task 314: [ 47.630146] kasan_save_stack+0x3c/0x68 [ 47.633965] kasan_save_track+0x20/0x40 [ 47.637785] kasan_save_alloc_info+0x40/0x58 [ 47.642038] __kasan_kmalloc+0xd4/0xd8 [ 47.645771] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.650284] kasan_atomics+0xb8/0x2e0 [ 47.653930] kunit_try_run_case+0x170/0x3f0 [ 47.658097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.663565] kthread+0x328/0x630 [ 47.666777] ret_from_fork+0x10/0x20 [ 47.670336] [ 47.671812] The buggy address belongs to the object at ffff000803afab80 [ 47.671812] which belongs to the cache kmalloc-64 of size 64 [ 47.684139] The buggy address is located 0 bytes to the right of [ 47.684139] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 47.696985] [ 47.698461] The buggy address belongs to the physical page: [ 47.704017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 47.712003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.718513] page_type: f5(slab) [ 47.721645] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.729370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.737089] page dumped because: kasan: bad access detected [ 47.742644] [ 47.744120] Memory state around the buggy address: [ 47.748898] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.756103] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.763307] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.770508] ^ [ 47.775286] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.782491] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.789692] ================================================================== [ 50.958276] ================================================================== [ 50.965340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 50.972631] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 50.980009] [ 50.981490] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 50.981537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.981551] Hardware name: WinLink E850-96 board (DT) [ 50.981569] Call trace: [ 50.981580] show_stack+0x20/0x38 (C) [ 50.981610] dump_stack_lvl+0x8c/0xd0 [ 50.981645] print_report+0x118/0x608 [ 50.981675] kasan_report+0xdc/0x128 [ 50.981703] kasan_check_range+0x100/0x1a8 [ 50.981735] __kasan_check_write+0x20/0x30 [ 50.981767] kasan_atomics_helper+0xad4/0x4858 [ 50.981798] kasan_atomics+0x198/0x2e0 [ 50.981825] kunit_try_run_case+0x170/0x3f0 [ 50.981862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.981901] kthread+0x328/0x630 [ 50.981933] ret_from_fork+0x10/0x20 [ 50.981963] [ 51.051709] Allocated by task 314: [ 51.055095] kasan_save_stack+0x3c/0x68 [ 51.058914] kasan_save_track+0x20/0x40 [ 51.062733] kasan_save_alloc_info+0x40/0x58 [ 51.066987] __kasan_kmalloc+0xd4/0xd8 [ 51.070719] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.075233] kasan_atomics+0xb8/0x2e0 [ 51.078879] kunit_try_run_case+0x170/0x3f0 [ 51.083045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.088514] kthread+0x328/0x630 [ 51.091726] ret_from_fork+0x10/0x20 [ 51.095285] [ 51.096760] The buggy address belongs to the object at ffff000803afab80 [ 51.096760] which belongs to the cache kmalloc-64 of size 64 [ 51.109087] The buggy address is located 0 bytes to the right of [ 51.109087] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 51.121934] [ 51.123410] The buggy address belongs to the physical page: [ 51.128965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 51.136951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.143461] page_type: f5(slab) [ 51.146595] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.154318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.162037] page dumped because: kasan: bad access detected [ 51.167593] [ 51.169068] Memory state around the buggy address: [ 51.173848] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.181051] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.188256] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.195457] ^ [ 51.200235] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.207440] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.214641] ================================================================== [ 48.060792] ================================================================== [ 48.067814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 48.075105] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 48.082483] [ 48.083964] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 48.084010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.084024] Hardware name: WinLink E850-96 board (DT) [ 48.084044] Call trace: [ 48.084057] show_stack+0x20/0x38 (C) [ 48.084089] dump_stack_lvl+0x8c/0xd0 [ 48.084123] print_report+0x118/0x608 [ 48.084154] kasan_report+0xdc/0x128 [ 48.084182] kasan_check_range+0x100/0x1a8 [ 48.084212] __kasan_check_write+0x20/0x30 [ 48.084245] kasan_atomics_helper+0x61c/0x4858 [ 48.084274] kasan_atomics+0x198/0x2e0 [ 48.084301] kunit_try_run_case+0x170/0x3f0 [ 48.084338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.084375] kthread+0x328/0x630 [ 48.084406] ret_from_fork+0x10/0x20 [ 48.084437] [ 48.154183] Allocated by task 314: [ 48.157569] kasan_save_stack+0x3c/0x68 [ 48.161388] kasan_save_track+0x20/0x40 [ 48.165207] kasan_save_alloc_info+0x40/0x58 [ 48.169461] __kasan_kmalloc+0xd4/0xd8 [ 48.173193] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.177707] kasan_atomics+0xb8/0x2e0 [ 48.181353] kunit_try_run_case+0x170/0x3f0 [ 48.185520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.190988] kthread+0x328/0x630 [ 48.194200] ret_from_fork+0x10/0x20 [ 48.197759] [ 48.199234] The buggy address belongs to the object at ffff000803afab80 [ 48.199234] which belongs to the cache kmalloc-64 of size 64 [ 48.211561] The buggy address is located 0 bytes to the right of [ 48.211561] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 48.224408] [ 48.225884] The buggy address belongs to the physical page: [ 48.231440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 48.239425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.245935] page_type: f5(slab) [ 48.249068] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.256792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.264511] page dumped because: kasan: bad access detected [ 48.270067] [ 48.271542] Memory state around the buggy address: [ 48.276324] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.283526] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.290730] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.297931] ^ [ 48.302709] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.309914] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.317115] ================================================================== [ 52.794357] ================================================================== [ 52.801425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 52.808801] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 52.816092] [ 52.817573] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 52.817620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.817636] Hardware name: WinLink E850-96 board (DT) [ 52.817655] Call trace: [ 52.817665] show_stack+0x20/0x38 (C) [ 52.817695] dump_stack_lvl+0x8c/0xd0 [ 52.817728] print_report+0x118/0x608 [ 52.817757] kasan_report+0xdc/0x128 [ 52.817787] __asan_report_load4_noabort+0x20/0x30 [ 52.817820] kasan_atomics_helper+0x3dd8/0x4858 [ 52.817851] kasan_atomics+0x198/0x2e0 [ 52.817877] kunit_try_run_case+0x170/0x3f0 [ 52.817911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.817949] kthread+0x328/0x630 [ 52.817981] ret_from_fork+0x10/0x20 [ 52.818014] [ 52.884494] Allocated by task 314: [ 52.887879] kasan_save_stack+0x3c/0x68 [ 52.891699] kasan_save_track+0x20/0x40 [ 52.895518] kasan_save_alloc_info+0x40/0x58 [ 52.899772] __kasan_kmalloc+0xd4/0xd8 [ 52.903504] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.908018] kasan_atomics+0xb8/0x2e0 [ 52.911664] kunit_try_run_case+0x170/0x3f0 [ 52.915830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.921299] kthread+0x328/0x630 [ 52.924511] ret_from_fork+0x10/0x20 [ 52.928070] [ 52.929545] The buggy address belongs to the object at ffff000803afab80 [ 52.929545] which belongs to the cache kmalloc-64 of size 64 [ 52.941872] The buggy address is located 0 bytes to the right of [ 52.941872] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 52.954719] [ 52.956195] The buggy address belongs to the physical page: [ 52.961751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 52.969736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.976246] page_type: f5(slab) [ 52.979379] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.987103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.994822] page dumped because: kasan: bad access detected [ 53.000378] [ 53.001853] Memory state around the buggy address: [ 53.006633] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.013836] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.021041] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.028242] ^ [ 53.033020] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.040225] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.047427] ================================================================== [ 58.581273] ================================================================== [ 58.588316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 58.595693] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 58.603072] [ 58.604552] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 58.604597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.604613] Hardware name: WinLink E850-96 board (DT) [ 58.604631] Call trace: [ 58.604643] show_stack+0x20/0x38 (C) [ 58.604672] dump_stack_lvl+0x8c/0xd0 [ 58.604705] print_report+0x118/0x608 [ 58.604735] kasan_report+0xdc/0x128 [ 58.604762] kasan_check_range+0x100/0x1a8 [ 58.604794] __kasan_check_write+0x20/0x30 [ 58.604826] kasan_atomics_helper+0x14e4/0x4858 [ 58.604855] kasan_atomics+0x198/0x2e0 [ 58.604881] kunit_try_run_case+0x170/0x3f0 [ 58.604914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.604951] kthread+0x328/0x630 [ 58.604983] ret_from_fork+0x10/0x20 [ 58.605011] [ 58.674858] Allocated by task 314: [ 58.678244] kasan_save_stack+0x3c/0x68 [ 58.682063] kasan_save_track+0x20/0x40 [ 58.685883] kasan_save_alloc_info+0x40/0x58 [ 58.690136] __kasan_kmalloc+0xd4/0xd8 [ 58.693869] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.698383] kasan_atomics+0xb8/0x2e0 [ 58.702028] kunit_try_run_case+0x170/0x3f0 [ 58.706195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.711664] kthread+0x328/0x630 [ 58.714875] ret_from_fork+0x10/0x20 [ 58.718434] [ 58.719910] The buggy address belongs to the object at ffff000803afab80 [ 58.719910] which belongs to the cache kmalloc-64 of size 64 [ 58.732237] The buggy address is located 0 bytes to the right of [ 58.732237] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 58.745083] [ 58.746559] The buggy address belongs to the physical page: [ 58.752115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 58.760101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.766611] page_type: f5(slab) [ 58.769743] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.777468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.785187] page dumped because: kasan: bad access detected [ 58.790742] [ 58.792218] Memory state around the buggy address: [ 58.796997] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.804201] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.811406] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.818606] ^ [ 58.823385] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.830589] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.837790] ================================================================== [ 53.842441] ================================================================== [ 53.849498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 53.856876] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 53.864167] [ 53.865648] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 53.865694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.865709] Hardware name: WinLink E850-96 board (DT) [ 53.865727] Call trace: [ 53.865739] show_stack+0x20/0x38 (C) [ 53.865771] dump_stack_lvl+0x8c/0xd0 [ 53.865805] print_report+0x118/0x608 [ 53.865835] kasan_report+0xdc/0x128 [ 53.865863] __asan_report_load8_noabort+0x20/0x30 [ 53.865897] kasan_atomics_helper+0x3f58/0x4858 [ 53.865928] kasan_atomics+0x198/0x2e0 [ 53.865955] kunit_try_run_case+0x170/0x3f0 [ 53.865990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.866026] kthread+0x328/0x630 [ 53.866058] ret_from_fork+0x10/0x20 [ 53.866089] [ 53.932569] Allocated by task 314: [ 53.935954] kasan_save_stack+0x3c/0x68 [ 53.939774] kasan_save_track+0x20/0x40 [ 53.943593] kasan_save_alloc_info+0x40/0x58 [ 53.947846] __kasan_kmalloc+0xd4/0xd8 [ 53.951579] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.956093] kasan_atomics+0xb8/0x2e0 [ 53.959738] kunit_try_run_case+0x170/0x3f0 [ 53.963905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.969374] kthread+0x328/0x630 [ 53.972585] ret_from_fork+0x10/0x20 [ 53.976144] [ 53.977620] The buggy address belongs to the object at ffff000803afab80 [ 53.977620] which belongs to the cache kmalloc-64 of size 64 [ 53.989947] The buggy address is located 0 bytes to the right of [ 53.989947] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 54.002793] [ 54.004270] The buggy address belongs to the physical page: [ 54.009825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 54.017811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.024321] page_type: f5(slab) [ 54.027453] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.035178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.042897] page dumped because: kasan: bad access detected [ 54.048452] [ 54.049928] Memory state around the buggy address: [ 54.054707] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.061911] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.069116] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.076317] ^ [ 54.081094] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.088299] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.095500] ================================================================== [ 56.737533] ================================================================== [ 56.744594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 56.751971] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 56.759349] [ 56.760829] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 56.760876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.760891] Hardware name: WinLink E850-96 board (DT) [ 56.760908] Call trace: [ 56.760920] show_stack+0x20/0x38 (C) [ 56.760950] dump_stack_lvl+0x8c/0xd0 [ 56.760980] print_report+0x118/0x608 [ 56.761012] kasan_report+0xdc/0x128 [ 56.761038] kasan_check_range+0x100/0x1a8 [ 56.761069] __kasan_check_write+0x20/0x30 [ 56.761102] kasan_atomics_helper+0x11f8/0x4858 [ 56.761130] kasan_atomics+0x198/0x2e0 [ 56.761157] kunit_try_run_case+0x170/0x3f0 [ 56.761189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.761227] kthread+0x328/0x630 [ 56.761258] ret_from_fork+0x10/0x20 [ 56.761289] [ 56.831136] Allocated by task 314: [ 56.834522] kasan_save_stack+0x3c/0x68 [ 56.838341] kasan_save_track+0x20/0x40 [ 56.842160] kasan_save_alloc_info+0x40/0x58 [ 56.846414] __kasan_kmalloc+0xd4/0xd8 [ 56.850146] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.854660] kasan_atomics+0xb8/0x2e0 [ 56.858306] kunit_try_run_case+0x170/0x3f0 [ 56.862472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.867941] kthread+0x328/0x630 [ 56.871153] ret_from_fork+0x10/0x20 [ 56.874712] [ 56.876188] The buggy address belongs to the object at ffff000803afab80 [ 56.876188] which belongs to the cache kmalloc-64 of size 64 [ 56.888514] The buggy address is located 0 bytes to the right of [ 56.888514] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 56.901361] [ 56.902837] The buggy address belongs to the physical page: [ 56.908393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 56.916378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.922888] page_type: f5(slab) [ 56.926021] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.933745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.941465] page dumped because: kasan: bad access detected [ 56.947020] [ 56.948495] Memory state around the buggy address: [ 56.953274] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.960479] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.967683] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.974884] ^ [ 56.979662] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.986867] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.994068] ================================================================== [ 57.265299] ================================================================== [ 57.272365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 57.279741] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 57.287119] [ 57.288599] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 57.288645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.288662] Hardware name: WinLink E850-96 board (DT) [ 57.288678] Call trace: [ 57.288692] show_stack+0x20/0x38 (C) [ 57.288725] dump_stack_lvl+0x8c/0xd0 [ 57.288757] print_report+0x118/0x608 [ 57.288787] kasan_report+0xdc/0x128 [ 57.288815] kasan_check_range+0x100/0x1a8 [ 57.288845] __kasan_check_write+0x20/0x30 [ 57.288879] kasan_atomics_helper+0x12d8/0x4858 [ 57.288907] kasan_atomics+0x198/0x2e0 [ 57.288935] kunit_try_run_case+0x170/0x3f0 [ 57.288967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.289004] kthread+0x328/0x630 [ 57.289037] ret_from_fork+0x10/0x20 [ 57.289069] [ 57.358906] Allocated by task 314: [ 57.362292] kasan_save_stack+0x3c/0x68 [ 57.366111] kasan_save_track+0x20/0x40 [ 57.369930] kasan_save_alloc_info+0x40/0x58 [ 57.374184] __kasan_kmalloc+0xd4/0xd8 [ 57.377916] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.382430] kasan_atomics+0xb8/0x2e0 [ 57.386076] kunit_try_run_case+0x170/0x3f0 [ 57.390242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.395711] kthread+0x328/0x630 [ 57.398923] ret_from_fork+0x10/0x20 [ 57.402482] [ 57.403957] The buggy address belongs to the object at ffff000803afab80 [ 57.403957] which belongs to the cache kmalloc-64 of size 64 [ 57.416284] The buggy address is located 0 bytes to the right of [ 57.416284] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 57.429131] [ 57.430606] The buggy address belongs to the physical page: [ 57.436163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 57.444148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.450658] page_type: f5(slab) [ 57.453791] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.461516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.469234] page dumped because: kasan: bad access detected [ 57.474790] [ 57.476265] Memory state around the buggy address: [ 57.481044] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.488248] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.495453] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.502654] ^ [ 57.507432] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.514637] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.521838] ================================================================== [ 48.324435] ================================================================== [ 48.331526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 48.338816] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314 [ 48.346194] [ 48.347675] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 48.347720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.347736] Hardware name: WinLink E850-96 board (DT) [ 48.347755] Call trace: [ 48.347765] show_stack+0x20/0x38 (C) [ 48.347796] dump_stack_lvl+0x8c/0xd0 [ 48.347830] print_report+0x118/0x608 [ 48.347862] kasan_report+0xdc/0x128 [ 48.347889] kasan_check_range+0x100/0x1a8 [ 48.347922] __kasan_check_write+0x20/0x30 [ 48.347955] kasan_atomics_helper+0x684/0x4858 [ 48.347983] kasan_atomics+0x198/0x2e0 [ 48.348009] kunit_try_run_case+0x170/0x3f0 [ 48.348044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.348081] kthread+0x328/0x630 [ 48.348113] ret_from_fork+0x10/0x20 [ 48.348145] [ 48.417894] Allocated by task 314: [ 48.421280] kasan_save_stack+0x3c/0x68 [ 48.425100] kasan_save_track+0x20/0x40 [ 48.428919] kasan_save_alloc_info+0x40/0x58 [ 48.433172] __kasan_kmalloc+0xd4/0xd8 [ 48.436904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.441418] kasan_atomics+0xb8/0x2e0 [ 48.445064] kunit_try_run_case+0x170/0x3f0 [ 48.449231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.454699] kthread+0x328/0x630 [ 48.457911] ret_from_fork+0x10/0x20 [ 48.461470] [ 48.462945] The buggy address belongs to the object at ffff000803afab80 [ 48.462945] which belongs to the cache kmalloc-64 of size 64 [ 48.475272] The buggy address is located 0 bytes to the right of [ 48.475272] allocated 48-byte region [ffff000803afab80, ffff000803afabb0) [ 48.488119] [ 48.489595] The buggy address belongs to the physical page: [ 48.495151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa [ 48.503137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.509647] page_type: f5(slab) [ 48.512779] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.520504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.528223] page dumped because: kasan: bad access detected [ 48.533778] [ 48.535254] Memory state around the buggy address: [ 48.540033] ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.547237] ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.554441] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.561642] ^ [ 48.566420] ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.573625] ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.580826] ==================================================================
[ 18.453258] ================================================================== [ 18.453320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 18.453412] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.453515] [ 18.453552] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.453789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.453818] Hardware name: linux,dummy-virt (DT) [ 18.454040] Call trace: [ 18.454378] show_stack+0x20/0x38 (C) [ 18.454530] dump_stack_lvl+0x8c/0xd0 [ 18.454583] print_report+0x118/0x608 [ 18.454685] kasan_report+0xdc/0x128 [ 18.454774] kasan_check_range+0x100/0x1a8 [ 18.454954] __kasan_check_write+0x20/0x30 [ 18.455008] kasan_atomics_helper+0x154c/0x4858 [ 18.455341] kasan_atomics+0x198/0x2e0 [ 18.455410] kunit_try_run_case+0x170/0x3f0 [ 18.455495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.455550] kthread+0x328/0x630 [ 18.455883] ret_from_fork+0x10/0x20 [ 18.455958] [ 18.456250] Allocated by task 270: [ 18.456344] kasan_save_stack+0x3c/0x68 [ 18.456515] kasan_save_track+0x20/0x40 [ 18.456882] kasan_save_alloc_info+0x40/0x58 [ 18.457204] __kasan_kmalloc+0xd4/0xd8 [ 18.457331] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.457441] kasan_atomics+0xb8/0x2e0 [ 18.457476] kunit_try_run_case+0x170/0x3f0 [ 18.457868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.457948] kthread+0x328/0x630 [ 18.458115] ret_from_fork+0x10/0x20 [ 18.458465] [ 18.458606] The buggy address belongs to the object at fff00000c7948980 [ 18.458606] which belongs to the cache kmalloc-64 of size 64 [ 18.458984] The buggy address is located 0 bytes to the right of [ 18.458984] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.459062] [ 18.459084] The buggy address belongs to the physical page: [ 18.459118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.459390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.459786] page_type: f5(slab) [ 18.459882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.460277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.460343] page dumped because: kasan: bad access detected [ 18.460380] [ 18.460409] Memory state around the buggy address: [ 18.460460] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.460663] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.460878] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.460963] ^ [ 18.461024] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.461399] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.461477] ================================================================== [ 18.204711] ================================================================== [ 18.204768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 18.205097] Write of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.205322] [ 18.205367] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.205520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.205578] Hardware name: linux,dummy-virt (DT) [ 18.205615] Call trace: [ 18.205808] show_stack+0x20/0x38 (C) [ 18.205893] dump_stack_lvl+0x8c/0xd0 [ 18.205950] print_report+0x118/0x608 [ 18.206000] kasan_report+0xdc/0x128 [ 18.206324] kasan_check_range+0x100/0x1a8 [ 18.206689] __kasan_check_write+0x20/0x30 [ 18.207007] kasan_atomics_helper+0xad4/0x4858 [ 18.207079] kasan_atomics+0x198/0x2e0 [ 18.207439] kunit_try_run_case+0x170/0x3f0 [ 18.207516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.207600] kthread+0x328/0x630 [ 18.207673] ret_from_fork+0x10/0x20 [ 18.207722] [ 18.207978] Allocated by task 270: [ 18.208070] kasan_save_stack+0x3c/0x68 [ 18.208398] kasan_save_track+0x20/0x40 [ 18.208744] kasan_save_alloc_info+0x40/0x58 [ 18.208967] __kasan_kmalloc+0xd4/0xd8 [ 18.209049] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.209449] kasan_atomics+0xb8/0x2e0 [ 18.209520] kunit_try_run_case+0x170/0x3f0 [ 18.209666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.209717] kthread+0x328/0x630 [ 18.210089] ret_from_fork+0x10/0x20 [ 18.210171] [ 18.210392] The buggy address belongs to the object at fff00000c7948980 [ 18.210392] which belongs to the cache kmalloc-64 of size 64 [ 18.210548] The buggy address is located 0 bytes to the right of [ 18.210548] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.210621] [ 18.210654] The buggy address belongs to the physical page: [ 18.210936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.211270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.211349] page_type: f5(slab) [ 18.211487] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.211553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.211604] page dumped because: kasan: bad access detected [ 18.211700] [ 18.211723] Memory state around the buggy address: [ 18.211774] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.211819] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.211865] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.211905] ^ [ 18.212203] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.212295] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.212772] ================================================================== [ 18.388569] ================================================================== [ 18.388783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 18.388855] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.389040] [ 18.389076] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.389396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.389466] Hardware name: linux,dummy-virt (DT) [ 18.389501] Call trace: [ 18.389667] show_stack+0x20/0x38 (C) [ 18.389748] dump_stack_lvl+0x8c/0xd0 [ 18.389800] print_report+0x118/0x608 [ 18.389844] kasan_report+0xdc/0x128 [ 18.389890] kasan_check_range+0x100/0x1a8 [ 18.389937] __kasan_check_write+0x20/0x30 [ 18.389987] kasan_atomics_helper+0x11f8/0x4858 [ 18.390106] kasan_atomics+0x198/0x2e0 [ 18.390156] kunit_try_run_case+0x170/0x3f0 [ 18.390206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.390261] kthread+0x328/0x630 [ 18.390312] ret_from_fork+0x10/0x20 [ 18.390361] [ 18.390392] Allocated by task 270: [ 18.390423] kasan_save_stack+0x3c/0x68 [ 18.390462] kasan_save_track+0x20/0x40 [ 18.390501] kasan_save_alloc_info+0x40/0x58 [ 18.390540] __kasan_kmalloc+0xd4/0xd8 [ 18.390577] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.390614] kasan_atomics+0xb8/0x2e0 [ 18.391109] kunit_try_run_case+0x170/0x3f0 [ 18.391377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.391447] kthread+0x328/0x630 [ 18.391493] ret_from_fork+0x10/0x20 [ 18.391530] [ 18.391964] The buggy address belongs to the object at fff00000c7948980 [ 18.391964] which belongs to the cache kmalloc-64 of size 64 [ 18.392332] The buggy address is located 0 bytes to the right of [ 18.392332] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.392475] [ 18.392869] The buggy address belongs to the physical page: [ 18.393034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.393216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.393310] page_type: f5(slab) [ 18.393699] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.393823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.394067] page dumped because: kasan: bad access detected [ 18.394148] [ 18.394236] Memory state around the buggy address: [ 18.394549] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.394694] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.394782] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.394822] ^ [ 18.395133] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.395210] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.395394] ================================================================== [ 18.339382] ================================================================== [ 18.339505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 18.339874] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.339937] [ 18.340388] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.340540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.340607] Hardware name: linux,dummy-virt (DT) [ 18.340770] Call trace: [ 18.340850] show_stack+0x20/0x38 (C) [ 18.341069] dump_stack_lvl+0x8c/0xd0 [ 18.341127] print_report+0x118/0x608 [ 18.341360] kasan_report+0xdc/0x128 [ 18.341541] kasan_check_range+0x100/0x1a8 [ 18.341937] __kasan_check_write+0x20/0x30 [ 18.342046] kasan_atomics_helper+0xf88/0x4858 [ 18.342176] kasan_atomics+0x198/0x2e0 [ 18.342288] kunit_try_run_case+0x170/0x3f0 [ 18.342369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.342424] kthread+0x328/0x630 [ 18.342472] ret_from_fork+0x10/0x20 [ 18.343169] [ 18.343209] Allocated by task 270: [ 18.343326] kasan_save_stack+0x3c/0x68 [ 18.343405] kasan_save_track+0x20/0x40 [ 18.343775] kasan_save_alloc_info+0x40/0x58 [ 18.343980] __kasan_kmalloc+0xd4/0xd8 [ 18.344065] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.344146] kasan_atomics+0xb8/0x2e0 [ 18.344224] kunit_try_run_case+0x170/0x3f0 [ 18.344625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.344791] kthread+0x328/0x630 [ 18.344836] ret_from_fork+0x10/0x20 [ 18.344876] [ 18.345086] The buggy address belongs to the object at fff00000c7948980 [ 18.345086] which belongs to the cache kmalloc-64 of size 64 [ 18.345280] The buggy address is located 0 bytes to the right of [ 18.345280] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.345668] [ 18.345698] The buggy address belongs to the physical page: [ 18.345733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.345788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.345839] page_type: f5(slab) [ 18.345897] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.345949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.345998] page dumped because: kasan: bad access detected [ 18.346041] [ 18.346071] Memory state around the buggy address: [ 18.346108] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.346153] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.346199] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.346237] ^ [ 18.346288] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.346346] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.346397] ================================================================== [ 18.500557] ================================================================== [ 18.500609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 18.500680] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.500732] [ 18.500774] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.501045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.501095] Hardware name: linux,dummy-virt (DT) [ 18.501156] Call trace: [ 18.501431] show_stack+0x20/0x38 (C) [ 18.501594] dump_stack_lvl+0x8c/0xd0 [ 18.501839] print_report+0x118/0x608 [ 18.501910] kasan_report+0xdc/0x128 [ 18.502379] __asan_report_load8_noabort+0x20/0x30 [ 18.502525] kasan_atomics_helper+0x3e10/0x4858 [ 18.502900] kasan_atomics+0x198/0x2e0 [ 18.502970] kunit_try_run_case+0x170/0x3f0 [ 18.503021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.503094] kthread+0x328/0x630 [ 18.503190] ret_from_fork+0x10/0x20 [ 18.503280] [ 18.503329] Allocated by task 270: [ 18.503397] kasan_save_stack+0x3c/0x68 [ 18.503677] kasan_save_track+0x20/0x40 [ 18.503757] kasan_save_alloc_info+0x40/0x58 [ 18.503838] __kasan_kmalloc+0xd4/0xd8 [ 18.503881] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.503920] kasan_atomics+0xb8/0x2e0 [ 18.503956] kunit_try_run_case+0x170/0x3f0 [ 18.504411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.504574] kthread+0x328/0x630 [ 18.504719] ret_from_fork+0x10/0x20 [ 18.504771] [ 18.504798] The buggy address belongs to the object at fff00000c7948980 [ 18.504798] which belongs to the cache kmalloc-64 of size 64 [ 18.504865] The buggy address is located 0 bytes to the right of [ 18.504865] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.504931] [ 18.505256] The buggy address belongs to the physical page: [ 18.505364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.505720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.505788] page_type: f5(slab) [ 18.505829] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.506107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.506499] page dumped because: kasan: bad access detected [ 18.506573] [ 18.506623] Memory state around the buggy address: [ 18.506783] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.506833] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.507146] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.507229] ^ [ 18.507435] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.507617] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.507738] ================================================================== [ 18.315101] ================================================================== [ 18.315449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 18.315526] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.315643] [ 18.315679] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.315759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.315788] Hardware name: linux,dummy-virt (DT) [ 18.315945] Call trace: [ 18.316006] show_stack+0x20/0x38 (C) [ 18.316318] dump_stack_lvl+0x8c/0xd0 [ 18.316487] print_report+0x118/0x608 [ 18.316660] kasan_report+0xdc/0x128 [ 18.316779] __asan_report_store8_noabort+0x20/0x30 [ 18.316968] kasan_atomics_helper+0x3e5c/0x4858 [ 18.317137] kasan_atomics+0x198/0x2e0 [ 18.317264] kunit_try_run_case+0x170/0x3f0 [ 18.317390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.317841] kthread+0x328/0x630 [ 18.317964] ret_from_fork+0x10/0x20 [ 18.318202] [ 18.318521] Allocated by task 270: [ 18.318581] kasan_save_stack+0x3c/0x68 [ 18.318890] kasan_save_track+0x20/0x40 [ 18.318966] kasan_save_alloc_info+0x40/0x58 [ 18.319139] __kasan_kmalloc+0xd4/0xd8 [ 18.319435] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.319622] kasan_atomics+0xb8/0x2e0 [ 18.319779] kunit_try_run_case+0x170/0x3f0 [ 18.319843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.320256] kthread+0x328/0x630 [ 18.320341] ret_from_fork+0x10/0x20 [ 18.320711] [ 18.320738] The buggy address belongs to the object at fff00000c7948980 [ 18.320738] which belongs to the cache kmalloc-64 of size 64 [ 18.320801] The buggy address is located 0 bytes to the right of [ 18.320801] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.321152] [ 18.321213] The buggy address belongs to the physical page: [ 18.321516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.321579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.321694] page_type: f5(slab) [ 18.321765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.321828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.321880] page dumped because: kasan: bad access detected [ 18.321922] [ 18.321951] Memory state around the buggy address: [ 18.321989] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.322034] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.322078] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.322116] ^ [ 18.322152] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.322205] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.322245] ================================================================== [ 18.373293] ================================================================== [ 18.373346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 18.373396] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.373449] [ 18.373480] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.373590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.373640] Hardware name: linux,dummy-virt (DT) [ 18.373673] Call trace: [ 18.373699] show_stack+0x20/0x38 (C) [ 18.373747] dump_stack_lvl+0x8c/0xd0 [ 18.373795] print_report+0x118/0x608 [ 18.373849] kasan_report+0xdc/0x128 [ 18.373896] kasan_check_range+0x100/0x1a8 [ 18.373942] __kasan_check_write+0x20/0x30 [ 18.373996] kasan_atomics_helper+0x1128/0x4858 [ 18.374053] kasan_atomics+0x198/0x2e0 [ 18.374106] kunit_try_run_case+0x170/0x3f0 [ 18.374155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.374209] kthread+0x328/0x630 [ 18.374259] ret_from_fork+0x10/0x20 [ 18.374308] [ 18.374329] Allocated by task 270: [ 18.374366] kasan_save_stack+0x3c/0x68 [ 18.374408] kasan_save_track+0x20/0x40 [ 18.374476] kasan_save_alloc_info+0x40/0x58 [ 18.374515] __kasan_kmalloc+0xd4/0xd8 [ 18.374553] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.374590] kasan_atomics+0xb8/0x2e0 [ 18.374637] kunit_try_run_case+0x170/0x3f0 [ 18.374677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.374723] kthread+0x328/0x630 [ 18.374940] ret_from_fork+0x10/0x20 [ 18.375088] [ 18.375175] The buggy address belongs to the object at fff00000c7948980 [ 18.375175] which belongs to the cache kmalloc-64 of size 64 [ 18.375883] The buggy address is located 0 bytes to the right of [ 18.375883] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.375999] [ 18.376042] The buggy address belongs to the physical page: [ 18.376106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.376515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.376599] page_type: f5(slab) [ 18.376651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.376704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.377000] page dumped because: kasan: bad access detected [ 18.377165] [ 18.377417] Memory state around the buggy address: [ 18.377488] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.377567] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.377613] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.377982] ^ [ 18.378050] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.378119] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.378438] ================================================================== [ 18.197750] ================================================================== [ 18.197835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 18.197935] Write of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.198015] [ 18.198047] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.198372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.198428] Hardware name: linux,dummy-virt (DT) [ 18.198462] Call trace: [ 18.198486] show_stack+0x20/0x38 (C) [ 18.198697] dump_stack_lvl+0x8c/0xd0 [ 18.198863] print_report+0x118/0x608 [ 18.199201] kasan_report+0xdc/0x128 [ 18.199270] kasan_check_range+0x100/0x1a8 [ 18.199319] __kasan_check_write+0x20/0x30 [ 18.199590] kasan_atomics_helper+0xa6c/0x4858 [ 18.199679] kasan_atomics+0x198/0x2e0 [ 18.199725] kunit_try_run_case+0x170/0x3f0 [ 18.200057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.200235] kthread+0x328/0x630 [ 18.200291] ret_from_fork+0x10/0x20 [ 18.200338] [ 18.200479] Allocated by task 270: [ 18.200513] kasan_save_stack+0x3c/0x68 [ 18.200557] kasan_save_track+0x20/0x40 [ 18.200823] kasan_save_alloc_info+0x40/0x58 [ 18.200993] __kasan_kmalloc+0xd4/0xd8 [ 18.201070] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.201435] kasan_atomics+0xb8/0x2e0 [ 18.201488] kunit_try_run_case+0x170/0x3f0 [ 18.201529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.201807] kthread+0x328/0x630 [ 18.202157] ret_from_fork+0x10/0x20 [ 18.202233] [ 18.202289] The buggy address belongs to the object at fff00000c7948980 [ 18.202289] which belongs to the cache kmalloc-64 of size 64 [ 18.202407] The buggy address is located 0 bytes to the right of [ 18.202407] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.202522] [ 18.202707] The buggy address belongs to the physical page: [ 18.202889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.202950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.203075] page_type: f5(slab) [ 18.203126] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.203178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.203226] page dumped because: kasan: bad access detected [ 18.203269] [ 18.203297] Memory state around the buggy address: [ 18.203336] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.203392] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.203436] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.203485] ^ [ 18.203528] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.203573] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.203622] ================================================================== [ 18.189984] ================================================================== [ 18.190311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 18.190377] Write of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.190429] [ 18.190683] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.190826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.190884] Hardware name: linux,dummy-virt (DT) [ 18.190917] Call trace: [ 18.191227] show_stack+0x20/0x38 (C) [ 18.191331] dump_stack_lvl+0x8c/0xd0 [ 18.191383] print_report+0x118/0x608 [ 18.191429] kasan_report+0xdc/0x128 [ 18.191473] kasan_check_range+0x100/0x1a8 [ 18.191855] __kasan_check_write+0x20/0x30 [ 18.191948] kasan_atomics_helper+0xa04/0x4858 [ 18.192150] kasan_atomics+0x198/0x2e0 [ 18.192238] kunit_try_run_case+0x170/0x3f0 [ 18.192549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.192700] kthread+0x328/0x630 [ 18.192754] ret_from_fork+0x10/0x20 [ 18.192810] [ 18.192832] Allocated by task 270: [ 18.192895] kasan_save_stack+0x3c/0x68 [ 18.192959] kasan_save_track+0x20/0x40 [ 18.193014] kasan_save_alloc_info+0x40/0x58 [ 18.193061] __kasan_kmalloc+0xd4/0xd8 [ 18.193109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.193149] kasan_atomics+0xb8/0x2e0 [ 18.193184] kunit_try_run_case+0x170/0x3f0 [ 18.193233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.193294] kthread+0x328/0x630 [ 18.193341] ret_from_fork+0x10/0x20 [ 18.193379] [ 18.193399] The buggy address belongs to the object at fff00000c7948980 [ 18.193399] which belongs to the cache kmalloc-64 of size 64 [ 18.193471] The buggy address is located 0 bytes to the right of [ 18.193471] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.193536] [ 18.193559] The buggy address belongs to the physical page: [ 18.193599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.193943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.194310] page_type: f5(slab) [ 18.194385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.194462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.194548] page dumped because: kasan: bad access detected [ 18.194849] [ 18.195126] Memory state around the buggy address: [ 18.195220] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.195369] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.195449] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.195776] ^ [ 18.195950] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.196015] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.196391] ================================================================== [ 18.404200] ================================================================== [ 18.404389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 18.404475] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.404528] [ 18.404566] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.404976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.405283] Hardware name: linux,dummy-virt (DT) [ 18.405397] Call trace: [ 18.405429] show_stack+0x20/0x38 (C) [ 18.405797] dump_stack_lvl+0x8c/0xd0 [ 18.406066] print_report+0x118/0x608 [ 18.406433] kasan_report+0xdc/0x128 [ 18.406728] kasan_check_range+0x100/0x1a8 [ 18.406819] __kasan_check_write+0x20/0x30 [ 18.407005] kasan_atomics_helper+0x12d8/0x4858 [ 18.407165] kasan_atomics+0x198/0x2e0 [ 18.407253] kunit_try_run_case+0x170/0x3f0 [ 18.407479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.407544] kthread+0x328/0x630 [ 18.407589] ret_from_fork+0x10/0x20 [ 18.407691] [ 18.407722] Allocated by task 270: [ 18.407773] kasan_save_stack+0x3c/0x68 [ 18.407815] kasan_save_track+0x20/0x40 [ 18.407869] kasan_save_alloc_info+0x40/0x58 [ 18.407918] __kasan_kmalloc+0xd4/0xd8 [ 18.407969] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.408016] kasan_atomics+0xb8/0x2e0 [ 18.408053] kunit_try_run_case+0x170/0x3f0 [ 18.408093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.408141] kthread+0x328/0x630 [ 18.408177] ret_from_fork+0x10/0x20 [ 18.408229] [ 18.408258] The buggy address belongs to the object at fff00000c7948980 [ 18.408258] which belongs to the cache kmalloc-64 of size 64 [ 18.408338] The buggy address is located 0 bytes to the right of [ 18.408338] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.408403] [ 18.408424] The buggy address belongs to the physical page: [ 18.408472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.408534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.408582] page_type: f5(slab) [ 18.408918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.409330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.409400] page dumped because: kasan: bad access detected [ 18.409477] [ 18.409549] Memory state around the buggy address: [ 18.409637] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.409941] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.410138] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.410491] ^ [ 18.410560] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.410904] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.411013] ================================================================== [ 18.356875] ================================================================== [ 18.356942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 18.357212] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.357293] [ 18.357325] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.357615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.357706] Hardware name: linux,dummy-virt (DT) [ 18.357749] Call trace: [ 18.358093] show_stack+0x20/0x38 (C) [ 18.358183] dump_stack_lvl+0x8c/0xd0 [ 18.358235] print_report+0x118/0x608 [ 18.358281] kasan_report+0xdc/0x128 [ 18.358326] kasan_check_range+0x100/0x1a8 [ 18.358453] __kasan_check_write+0x20/0x30 [ 18.358547] kasan_atomics_helper+0x1058/0x4858 [ 18.358595] kasan_atomics+0x198/0x2e0 [ 18.358781] kunit_try_run_case+0x170/0x3f0 [ 18.358936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.359004] kthread+0x328/0x630 [ 18.359364] ret_from_fork+0x10/0x20 [ 18.359434] [ 18.359579] Allocated by task 270: [ 18.359615] kasan_save_stack+0x3c/0x68 [ 18.359769] kasan_save_track+0x20/0x40 [ 18.359859] kasan_save_alloc_info+0x40/0x58 [ 18.360359] __kasan_kmalloc+0xd4/0xd8 [ 18.360681] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.360799] kasan_atomics+0xb8/0x2e0 [ 18.360898] kunit_try_run_case+0x170/0x3f0 [ 18.361059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.361401] kthread+0x328/0x630 [ 18.361482] ret_from_fork+0x10/0x20 [ 18.361663] [ 18.361700] The buggy address belongs to the object at fff00000c7948980 [ 18.361700] which belongs to the cache kmalloc-64 of size 64 [ 18.362004] The buggy address is located 0 bytes to the right of [ 18.362004] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.362181] [ 18.362207] The buggy address belongs to the physical page: [ 18.362241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.362323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.362599] page_type: f5(slab) [ 18.362779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.362873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.362916] page dumped because: kasan: bad access detected [ 18.362956] [ 18.362978] Memory state around the buggy address: [ 18.363022] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.363084] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.363143] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.363194] ^ [ 18.363236] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.363281] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.363330] ================================================================== [ 18.462057] ================================================================== [ 18.462112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 18.462519] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.462591] [ 18.462624] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.462719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.462746] Hardware name: linux,dummy-virt (DT) [ 18.462992] Call trace: [ 18.463291] show_stack+0x20/0x38 (C) [ 18.463420] dump_stack_lvl+0x8c/0xd0 [ 18.463469] print_report+0x118/0x608 [ 18.463534] kasan_report+0xdc/0x128 [ 18.463581] kasan_check_range+0x100/0x1a8 [ 18.463650] __kasan_check_write+0x20/0x30 [ 18.463699] kasan_atomics_helper+0x15b4/0x4858 [ 18.463745] kasan_atomics+0x198/0x2e0 [ 18.463790] kunit_try_run_case+0x170/0x3f0 [ 18.463848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.463902] kthread+0x328/0x630 [ 18.463948] ret_from_fork+0x10/0x20 [ 18.463994] [ 18.464383] Allocated by task 270: [ 18.464456] kasan_save_stack+0x3c/0x68 [ 18.464656] kasan_save_track+0x20/0x40 [ 18.464698] kasan_save_alloc_info+0x40/0x58 [ 18.464752] __kasan_kmalloc+0xd4/0xd8 [ 18.464788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.465129] kasan_atomics+0xb8/0x2e0 [ 18.465500] kunit_try_run_case+0x170/0x3f0 [ 18.465579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.465790] kthread+0x328/0x630 [ 18.466064] ret_from_fork+0x10/0x20 [ 18.466109] [ 18.466131] The buggy address belongs to the object at fff00000c7948980 [ 18.466131] which belongs to the cache kmalloc-64 of size 64 [ 18.466477] The buggy address is located 0 bytes to the right of [ 18.466477] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.466782] [ 18.466819] The buggy address belongs to the physical page: [ 18.466941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.467133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.467185] page_type: f5(slab) [ 18.467496] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.467587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.468005] page dumped because: kasan: bad access detected [ 18.468156] [ 18.468181] Memory state around the buggy address: [ 18.468218] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.468438] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.468491] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.468871] ^ [ 18.468944] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.469015] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.469056] ================================================================== [ 18.523304] ================================================================== [ 18.523657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 18.523789] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.523881] [ 18.524062] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.524317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.524381] Hardware name: linux,dummy-virt (DT) [ 18.524486] Call trace: [ 18.524764] show_stack+0x20/0x38 (C) [ 18.524832] dump_stack_lvl+0x8c/0xd0 [ 18.525014] print_report+0x118/0x608 [ 18.525186] kasan_report+0xdc/0x128 [ 18.525492] kasan_check_range+0x100/0x1a8 [ 18.525823] __kasan_check_write+0x20/0x30 [ 18.525890] kasan_atomics_helper+0x17ec/0x4858 [ 18.526318] kasan_atomics+0x198/0x2e0 [ 18.526556] kunit_try_run_case+0x170/0x3f0 [ 18.526639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.526858] kthread+0x328/0x630 [ 18.527102] ret_from_fork+0x10/0x20 [ 18.527348] [ 18.527394] Allocated by task 270: [ 18.527647] kasan_save_stack+0x3c/0x68 [ 18.527720] kasan_save_track+0x20/0x40 [ 18.527777] kasan_save_alloc_info+0x40/0x58 [ 18.527818] __kasan_kmalloc+0xd4/0xd8 [ 18.527854] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.527904] kasan_atomics+0xb8/0x2e0 [ 18.527938] kunit_try_run_case+0x170/0x3f0 [ 18.527979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.528182] kthread+0x328/0x630 [ 18.528422] ret_from_fork+0x10/0x20 [ 18.528667] [ 18.529175] The buggy address belongs to the object at fff00000c7948980 [ 18.529175] which belongs to the cache kmalloc-64 of size 64 [ 18.529264] The buggy address is located 0 bytes to the right of [ 18.529264] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.529332] [ 18.529353] The buggy address belongs to the physical page: [ 18.530018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.530095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.530376] page_type: f5(slab) [ 18.530458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.530789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.531014] page dumped because: kasan: bad access detected [ 18.531067] [ 18.531090] Memory state around the buggy address: [ 18.531127] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.531719] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.531850] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.532059] ^ [ 18.532261] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.532325] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.532549] ================================================================== [ 18.279275] ================================================================== [ 18.279331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 18.279388] Read of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.279439] [ 18.279481] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.279562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.279592] Hardware name: linux,dummy-virt (DT) [ 18.279624] Call trace: [ 18.280589] show_stack+0x20/0x38 (C) [ 18.280677] dump_stack_lvl+0x8c/0xd0 [ 18.280760] print_report+0x118/0x608 [ 18.280834] kasan_report+0xdc/0x128 [ 18.280891] __asan_report_load4_noabort+0x20/0x30 [ 18.280940] kasan_atomics_helper+0x3e04/0x4858 [ 18.280990] kasan_atomics+0x198/0x2e0 [ 18.281034] kunit_try_run_case+0x170/0x3f0 [ 18.281638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.282315] kthread+0x328/0x630 [ 18.282473] ret_from_fork+0x10/0x20 [ 18.282563] [ 18.282584] Allocated by task 270: [ 18.282933] kasan_save_stack+0x3c/0x68 [ 18.283008] kasan_save_track+0x20/0x40 [ 18.283198] kasan_save_alloc_info+0x40/0x58 [ 18.283245] __kasan_kmalloc+0xd4/0xd8 [ 18.284022] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.284089] kasan_atomics+0xb8/0x2e0 [ 18.284127] kunit_try_run_case+0x170/0x3f0 [ 18.284502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.284678] kthread+0x328/0x630 [ 18.285050] ret_from_fork+0x10/0x20 [ 18.285120] [ 18.285294] The buggy address belongs to the object at fff00000c7948980 [ 18.285294] which belongs to the cache kmalloc-64 of size 64 [ 18.285476] The buggy address is located 0 bytes to the right of [ 18.285476] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.285954] [ 18.285999] The buggy address belongs to the physical page: [ 18.286032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.286444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.286758] page_type: f5(slab) [ 18.286920] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.287007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.287052] page dumped because: kasan: bad access detected [ 18.287437] [ 18.287493] Memory state around the buggy address: [ 18.287547] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.288050] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.288122] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.288193] ^ [ 18.288554] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.288620] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.288771] ================================================================== [ 18.363564] ================================================================== [ 18.363613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 18.363734] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.364341] [ 18.364424] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.364658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.364710] Hardware name: linux,dummy-virt (DT) [ 18.364887] Call trace: [ 18.364941] show_stack+0x20/0x38 (C) [ 18.365040] dump_stack_lvl+0x8c/0xd0 [ 18.365319] print_report+0x118/0x608 [ 18.365492] kasan_report+0xdc/0x128 [ 18.365783] kasan_check_range+0x100/0x1a8 [ 18.365885] __kasan_check_write+0x20/0x30 [ 18.365955] kasan_atomics_helper+0x10c0/0x4858 [ 18.366033] kasan_atomics+0x198/0x2e0 [ 18.366392] kunit_try_run_case+0x170/0x3f0 [ 18.366484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.366966] kthread+0x328/0x630 [ 18.367078] ret_from_fork+0x10/0x20 [ 18.367515] [ 18.367611] Allocated by task 270: [ 18.367742] kasan_save_stack+0x3c/0x68 [ 18.367872] kasan_save_track+0x20/0x40 [ 18.367930] kasan_save_alloc_info+0x40/0x58 [ 18.367970] __kasan_kmalloc+0xd4/0xd8 [ 18.368196] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.368366] kasan_atomics+0xb8/0x2e0 [ 18.368622] kunit_try_run_case+0x170/0x3f0 [ 18.368848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.368931] kthread+0x328/0x630 [ 18.369139] ret_from_fork+0x10/0x20 [ 18.369369] [ 18.369560] The buggy address belongs to the object at fff00000c7948980 [ 18.369560] which belongs to the cache kmalloc-64 of size 64 [ 18.369720] The buggy address is located 0 bytes to the right of [ 18.369720] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.369950] [ 18.370126] The buggy address belongs to the physical page: [ 18.370166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.370465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.370564] page_type: f5(slab) [ 18.370640] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.371014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.371121] page dumped because: kasan: bad access detected [ 18.371159] [ 18.371179] Memory state around the buggy address: [ 18.371574] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.371984] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.372048] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.372175] ^ [ 18.372215] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.372270] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.372317] ================================================================== [ 18.330036] ================================================================== [ 18.330401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 18.330542] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.330648] [ 18.330682] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.330863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.330969] Hardware name: linux,dummy-virt (DT) [ 18.331004] Call trace: [ 18.331191] show_stack+0x20/0x38 (C) [ 18.331347] dump_stack_lvl+0x8c/0xd0 [ 18.331405] print_report+0x118/0x608 [ 18.331452] kasan_report+0xdc/0x128 [ 18.331496] kasan_check_range+0x100/0x1a8 [ 18.331824] __kasan_check_write+0x20/0x30 [ 18.331897] kasan_atomics_helper+0xf20/0x4858 [ 18.332073] kasan_atomics+0x198/0x2e0 [ 18.332509] kunit_try_run_case+0x170/0x3f0 [ 18.332588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.332756] kthread+0x328/0x630 [ 18.332861] ret_from_fork+0x10/0x20 [ 18.333352] [ 18.333434] Allocated by task 270: [ 18.333558] kasan_save_stack+0x3c/0x68 [ 18.333606] kasan_save_track+0x20/0x40 [ 18.333655] kasan_save_alloc_info+0x40/0x58 [ 18.334000] __kasan_kmalloc+0xd4/0xd8 [ 18.334253] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.334350] kasan_atomics+0xb8/0x2e0 [ 18.334732] kunit_try_run_case+0x170/0x3f0 [ 18.334804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.335102] kthread+0x328/0x630 [ 18.335158] ret_from_fork+0x10/0x20 [ 18.335198] [ 18.335938] The buggy address belongs to the object at fff00000c7948980 [ 18.335938] which belongs to the cache kmalloc-64 of size 64 [ 18.336021] The buggy address is located 0 bytes to the right of [ 18.336021] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.336087] [ 18.336208] The buggy address belongs to the physical page: [ 18.336362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.336540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.336664] page_type: f5(slab) [ 18.337083] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.337176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.337243] page dumped because: kasan: bad access detected [ 18.337279] [ 18.337299] Memory state around the buggy address: [ 18.337898] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.337973] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.338030] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.338159] ^ [ 18.338209] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.338340] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.338382] ================================================================== [ 18.411647] ================================================================== [ 18.411702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 18.412011] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.412503] [ 18.412701] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.412884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.413042] Hardware name: linux,dummy-virt (DT) [ 18.413119] Call trace: [ 18.413152] show_stack+0x20/0x38 (C) [ 18.413202] dump_stack_lvl+0x8c/0xd0 [ 18.413253] print_report+0x118/0x608 [ 18.413511] kasan_report+0xdc/0x128 [ 18.414039] kasan_check_range+0x100/0x1a8 [ 18.414174] __kasan_check_write+0x20/0x30 [ 18.414341] kasan_atomics_helper+0x1384/0x4858 [ 18.414477] kasan_atomics+0x198/0x2e0 [ 18.414545] kunit_try_run_case+0x170/0x3f0 [ 18.414620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.417355] kthread+0x328/0x630 [ 18.417812] ret_from_fork+0x10/0x20 [ 18.418216] [ 18.418260] Allocated by task 270: [ 18.419428] kasan_save_stack+0x3c/0x68 [ 18.419516] kasan_save_track+0x20/0x40 [ 18.419579] kasan_save_alloc_info+0x40/0x58 [ 18.419690] __kasan_kmalloc+0xd4/0xd8 [ 18.419730] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.420223] kasan_atomics+0xb8/0x2e0 [ 18.420301] kunit_try_run_case+0x170/0x3f0 [ 18.420376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.421445] kthread+0x328/0x630 [ 18.421891] ret_from_fork+0x10/0x20 [ 18.422726] [ 18.422758] The buggy address belongs to the object at fff00000c7948980 [ 18.422758] which belongs to the cache kmalloc-64 of size 64 [ 18.424116] The buggy address is located 0 bytes to the right of [ 18.424116] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.424185] [ 18.424207] The buggy address belongs to the physical page: [ 18.424241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.424295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.424344] page_type: f5(slab) [ 18.424383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.424436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.424480] page dumped because: kasan: bad access detected [ 18.424514] [ 18.424534] Memory state around the buggy address: [ 18.424568] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.424614] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.424677] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.424718] ^ [ 18.424753] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.424796] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.424835] ================================================================== [ 18.430987] ================================================================== [ 18.431041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 18.431099] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.431161] [ 18.431193] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.431275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.431304] Hardware name: linux,dummy-virt (DT) [ 18.431335] Call trace: [ 18.431360] show_stack+0x20/0x38 (C) [ 18.431406] dump_stack_lvl+0x8c/0xd0 [ 18.431456] print_report+0x118/0x608 [ 18.431501] kasan_report+0xdc/0x128 [ 18.431546] kasan_check_range+0x100/0x1a8 [ 18.431601] __kasan_check_write+0x20/0x30 [ 18.431663] kasan_atomics_helper+0x1414/0x4858 [ 18.431711] kasan_atomics+0x198/0x2e0 [ 18.431765] kunit_try_run_case+0x170/0x3f0 [ 18.431815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.431869] kthread+0x328/0x630 [ 18.431913] ret_from_fork+0x10/0x20 [ 18.431970] [ 18.432248] Allocated by task 270: [ 18.432564] kasan_save_stack+0x3c/0x68 [ 18.432644] kasan_save_track+0x20/0x40 [ 18.432713] kasan_save_alloc_info+0x40/0x58 [ 18.432788] __kasan_kmalloc+0xd4/0xd8 [ 18.433102] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.433174] kasan_atomics+0xb8/0x2e0 [ 18.433307] kunit_try_run_case+0x170/0x3f0 [ 18.433352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.433401] kthread+0x328/0x630 [ 18.433446] ret_from_fork+0x10/0x20 [ 18.433949] [ 18.434124] The buggy address belongs to the object at fff00000c7948980 [ 18.434124] which belongs to the cache kmalloc-64 of size 64 [ 18.434302] The buggy address is located 0 bytes to the right of [ 18.434302] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.434619] [ 18.434721] The buggy address belongs to the physical page: [ 18.434814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.434947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.435328] page_type: f5(slab) [ 18.435381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.435742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.435852] page dumped because: kasan: bad access detected [ 18.436116] [ 18.436252] Memory state around the buggy address: [ 18.436398] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.436540] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.436770] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.437092] ^ [ 18.437234] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.437369] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.437478] ================================================================== [ 18.379093] ================================================================== [ 18.379244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 18.379305] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.379356] [ 18.379387] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.379468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.379495] Hardware name: linux,dummy-virt (DT) [ 18.379815] Call trace: [ 18.379950] show_stack+0x20/0x38 (C) [ 18.380253] dump_stack_lvl+0x8c/0xd0 [ 18.380302] print_report+0x118/0x608 [ 18.380492] kasan_report+0xdc/0x128 [ 18.380817] kasan_check_range+0x100/0x1a8 [ 18.381086] __kasan_check_write+0x20/0x30 [ 18.381323] kasan_atomics_helper+0x1190/0x4858 [ 18.381658] kasan_atomics+0x198/0x2e0 [ 18.381812] kunit_try_run_case+0x170/0x3f0 [ 18.381947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.382115] kthread+0x328/0x630 [ 18.382199] ret_from_fork+0x10/0x20 [ 18.382249] [ 18.382273] Allocated by task 270: [ 18.382589] kasan_save_stack+0x3c/0x68 [ 18.382768] kasan_save_track+0x20/0x40 [ 18.382822] kasan_save_alloc_info+0x40/0x58 [ 18.383153] __kasan_kmalloc+0xd4/0xd8 [ 18.383243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.383353] kasan_atomics+0xb8/0x2e0 [ 18.383495] kunit_try_run_case+0x170/0x3f0 [ 18.383567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.383863] kthread+0x328/0x630 [ 18.383983] ret_from_fork+0x10/0x20 [ 18.384260] [ 18.384311] The buggy address belongs to the object at fff00000c7948980 [ 18.384311] which belongs to the cache kmalloc-64 of size 64 [ 18.384391] The buggy address is located 0 bytes to the right of [ 18.384391] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.384758] [ 18.384807] The buggy address belongs to the physical page: [ 18.384865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.385070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.385223] page_type: f5(slab) [ 18.385491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.385588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.386009] page dumped because: kasan: bad access detected [ 18.386118] [ 18.386185] Memory state around the buggy address: [ 18.386221] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.386288] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.386658] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.386739] ^ [ 18.387006] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.387147] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.387231] ================================================================== [ 18.514125] ================================================================== [ 18.514182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 18.514233] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.514554] [ 18.514775] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.514877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.515215] Hardware name: linux,dummy-virt (DT) [ 18.515285] Call trace: [ 18.515312] show_stack+0x20/0x38 (C) [ 18.515364] dump_stack_lvl+0x8c/0xd0 [ 18.515413] print_report+0x118/0x608 [ 18.515466] kasan_report+0xdc/0x128 [ 18.515513] __asan_report_load8_noabort+0x20/0x30 [ 18.515565] kasan_atomics_helper+0x3e20/0x4858 [ 18.515611] kasan_atomics+0x198/0x2e0 [ 18.515666] kunit_try_run_case+0x170/0x3f0 [ 18.516308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.516732] kthread+0x328/0x630 [ 18.516831] ret_from_fork+0x10/0x20 [ 18.516962] [ 18.517185] Allocated by task 270: [ 18.517226] kasan_save_stack+0x3c/0x68 [ 18.517270] kasan_save_track+0x20/0x40 [ 18.517307] kasan_save_alloc_info+0x40/0x58 [ 18.517354] __kasan_kmalloc+0xd4/0xd8 [ 18.517736] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.517947] kasan_atomics+0xb8/0x2e0 [ 18.518153] kunit_try_run_case+0x170/0x3f0 [ 18.518380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.518582] kthread+0x328/0x630 [ 18.518624] ret_from_fork+0x10/0x20 [ 18.518838] [ 18.519052] The buggy address belongs to the object at fff00000c7948980 [ 18.519052] which belongs to the cache kmalloc-64 of size 64 [ 18.519300] The buggy address is located 0 bytes to the right of [ 18.519300] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.519587] [ 18.519793] The buggy address belongs to the physical page: [ 18.520001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.520118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.520313] page_type: f5(slab) [ 18.520567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.520726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.520963] page dumped because: kasan: bad access detected [ 18.521164] [ 18.521193] Memory state around the buggy address: [ 18.521229] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.521279] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.521616] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.521887] ^ [ 18.522063] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.522253] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.522338] ================================================================== [ 18.469782] ================================================================== [ 18.469841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 18.470186] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.470265] [ 18.470300] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.470381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.470408] Hardware name: linux,dummy-virt (DT) [ 18.470442] Call trace: [ 18.470464] show_stack+0x20/0x38 (C) [ 18.470670] dump_stack_lvl+0x8c/0xd0 [ 18.470745] print_report+0x118/0x608 [ 18.470795] kasan_report+0xdc/0x128 [ 18.470841] __asan_report_load8_noabort+0x20/0x30 [ 18.470892] kasan_atomics_helper+0x3db0/0x4858 [ 18.470949] kasan_atomics+0x198/0x2e0 [ 18.471004] kunit_try_run_case+0x170/0x3f0 [ 18.471061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.471118] kthread+0x328/0x630 [ 18.471164] ret_from_fork+0x10/0x20 [ 18.471213] [ 18.471239] Allocated by task 270: [ 18.471271] kasan_save_stack+0x3c/0x68 [ 18.471312] kasan_save_track+0x20/0x40 [ 18.471361] kasan_save_alloc_info+0x40/0x58 [ 18.471400] __kasan_kmalloc+0xd4/0xd8 [ 18.471438] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.471474] kasan_atomics+0xb8/0x2e0 [ 18.471510] kunit_try_run_case+0x170/0x3f0 [ 18.471557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.471604] kthread+0x328/0x630 [ 18.471810] ret_from_fork+0x10/0x20 [ 18.471864] [ 18.472079] The buggy address belongs to the object at fff00000c7948980 [ 18.472079] which belongs to the cache kmalloc-64 of size 64 [ 18.472505] The buggy address is located 0 bytes to the right of [ 18.472505] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.473036] [ 18.473096] The buggy address belongs to the physical page: [ 18.473149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.473371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.473461] page_type: f5(slab) [ 18.473902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.474004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.474501] page dumped because: kasan: bad access detected [ 18.474574] [ 18.474910] Memory state around the buggy address: [ 18.474985] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.475068] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.475300] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.475397] ^ [ 18.475677] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.475741] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.475949] ================================================================== [ 18.322492] ================================================================== [ 18.322550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 18.322606] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.322670] [ 18.322702] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.322784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.322823] Hardware name: linux,dummy-virt (DT) [ 18.322855] Call trace: [ 18.322888] show_stack+0x20/0x38 (C) [ 18.322935] dump_stack_lvl+0x8c/0xd0 [ 18.322983] print_report+0x118/0x608 [ 18.323027] kasan_report+0xdc/0x128 [ 18.323072] kasan_check_range+0x100/0x1a8 [ 18.323118] __kasan_check_write+0x20/0x30 [ 18.323175] kasan_atomics_helper+0xeb8/0x4858 [ 18.323223] kasan_atomics+0x198/0x2e0 [ 18.323272] kunit_try_run_case+0x170/0x3f0 [ 18.323321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.323374] kthread+0x328/0x630 [ 18.323419] ret_from_fork+0x10/0x20 [ 18.323465] [ 18.323485] Allocated by task 270: [ 18.323514] kasan_save_stack+0x3c/0x68 [ 18.323553] kasan_save_track+0x20/0x40 [ 18.323592] kasan_save_alloc_info+0x40/0x58 [ 18.324064] __kasan_kmalloc+0xd4/0xd8 [ 18.324585] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.324645] kasan_atomics+0xb8/0x2e0 [ 18.324683] kunit_try_run_case+0x170/0x3f0 [ 18.324725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.324818] kthread+0x328/0x630 [ 18.325152] ret_from_fork+0x10/0x20 [ 18.325474] [ 18.325661] The buggy address belongs to the object at fff00000c7948980 [ 18.325661] which belongs to the cache kmalloc-64 of size 64 [ 18.325726] The buggy address is located 0 bytes to the right of [ 18.325726] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.326215] [ 18.326360] The buggy address belongs to the physical page: [ 18.326440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.326608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.326675] page_type: f5(slab) [ 18.326715] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.327103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.327558] page dumped because: kasan: bad access detected [ 18.327602] [ 18.327860] Memory state around the buggy address: [ 18.328038] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.328113] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.328424] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.328504] ^ [ 18.328541] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.328973] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.329079] ================================================================== [ 18.347238] ================================================================== [ 18.347396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 18.347546] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.347749] [ 18.347792] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.347877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.348331] Hardware name: linux,dummy-virt (DT) [ 18.348619] Call trace: [ 18.348710] show_stack+0x20/0x38 (C) [ 18.348887] dump_stack_lvl+0x8c/0xd0 [ 18.348944] print_report+0x118/0x608 [ 18.349254] kasan_report+0xdc/0x128 [ 18.349389] kasan_check_range+0x100/0x1a8 [ 18.349784] __kasan_check_write+0x20/0x30 [ 18.349902] kasan_atomics_helper+0xff0/0x4858 [ 18.350050] kasan_atomics+0x198/0x2e0 [ 18.350433] kunit_try_run_case+0x170/0x3f0 [ 18.350587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.351046] kthread+0x328/0x630 [ 18.351197] ret_from_fork+0x10/0x20 [ 18.351364] [ 18.351460] Allocated by task 270: [ 18.351494] kasan_save_stack+0x3c/0x68 [ 18.352431] kasan_save_track+0x20/0x40 [ 18.352518] kasan_save_alloc_info+0x40/0x58 [ 18.352579] __kasan_kmalloc+0xd4/0xd8 [ 18.352651] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.352713] kasan_atomics+0xb8/0x2e0 [ 18.352834] kunit_try_run_case+0x170/0x3f0 [ 18.352877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.353147] kthread+0x328/0x630 [ 18.353365] ret_from_fork+0x10/0x20 [ 18.353957] [ 18.354013] The buggy address belongs to the object at fff00000c7948980 [ 18.354013] which belongs to the cache kmalloc-64 of size 64 [ 18.354235] The buggy address is located 0 bytes to the right of [ 18.354235] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.354329] [ 18.354452] The buggy address belongs to the physical page: [ 18.354512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.354704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.354902] page_type: f5(slab) [ 18.355068] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.355422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.355484] page dumped because: kasan: bad access detected [ 18.355548] [ 18.355569] Memory state around the buggy address: [ 18.355604] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.355690] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.355742] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.355783] ^ [ 18.355828] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.355873] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.355913] ================================================================== [ 18.494076] ================================================================== [ 18.494205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 18.494301] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.494369] [ 18.494402] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.494486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.494513] Hardware name: linux,dummy-virt (DT) [ 18.494919] Call trace: [ 18.494980] show_stack+0x20/0x38 (C) [ 18.495064] dump_stack_lvl+0x8c/0xd0 [ 18.495401] print_report+0x118/0x608 [ 18.495495] kasan_report+0xdc/0x128 [ 18.495605] kasan_check_range+0x100/0x1a8 [ 18.495687] __kasan_check_write+0x20/0x30 [ 18.495738] kasan_atomics_helper+0x16d0/0x4858 [ 18.495831] kasan_atomics+0x198/0x2e0 [ 18.496129] kunit_try_run_case+0x170/0x3f0 [ 18.496191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.496247] kthread+0x328/0x630 [ 18.496680] ret_from_fork+0x10/0x20 [ 18.496827] [ 18.496897] Allocated by task 270: [ 18.496929] kasan_save_stack+0x3c/0x68 [ 18.496971] kasan_save_track+0x20/0x40 [ 18.497112] kasan_save_alloc_info+0x40/0x58 [ 18.497161] __kasan_kmalloc+0xd4/0xd8 [ 18.497315] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.497439] kasan_atomics+0xb8/0x2e0 [ 18.497566] kunit_try_run_case+0x170/0x3f0 [ 18.497937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.498265] kthread+0x328/0x630 [ 18.498437] ret_from_fork+0x10/0x20 [ 18.498479] [ 18.499141] The buggy address belongs to the object at fff00000c7948980 [ 18.499141] which belongs to the cache kmalloc-64 of size 64 [ 18.499214] The buggy address is located 0 bytes to the right of [ 18.499214] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.499282] [ 18.499373] The buggy address belongs to the physical page: [ 18.499428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.499499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.499548] page_type: f5(slab) [ 18.499588] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.499653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.499706] page dumped because: kasan: bad access detected [ 18.499740] [ 18.499762] Memory state around the buggy address: [ 18.499809] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.499856] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.499912] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.499965] ^ [ 18.500002] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.500047] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.500086] ================================================================== [ 18.299126] ================================================================== [ 18.299195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 18.299252] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.299642] [ 18.299799] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.299960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.300108] Hardware name: linux,dummy-virt (DT) [ 18.300229] Call trace: [ 18.300410] show_stack+0x20/0x38 (C) [ 18.300622] dump_stack_lvl+0x8c/0xd0 [ 18.300880] print_report+0x118/0x608 [ 18.300991] kasan_report+0xdc/0x128 [ 18.301329] __asan_report_load8_noabort+0x20/0x30 [ 18.301500] kasan_atomics_helper+0x3f58/0x4858 [ 18.301577] kasan_atomics+0x198/0x2e0 [ 18.301702] kunit_try_run_case+0x170/0x3f0 [ 18.301814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.301900] kthread+0x328/0x630 [ 18.301949] ret_from_fork+0x10/0x20 [ 18.302003] [ 18.302035] Allocated by task 270: [ 18.302074] kasan_save_stack+0x3c/0x68 [ 18.302124] kasan_save_track+0x20/0x40 [ 18.302173] kasan_save_alloc_info+0x40/0x58 [ 18.302223] __kasan_kmalloc+0xd4/0xd8 [ 18.302261] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.302300] kasan_atomics+0xb8/0x2e0 [ 18.302351] kunit_try_run_case+0x170/0x3f0 [ 18.302392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.302447] kthread+0x328/0x630 [ 18.302491] ret_from_fork+0x10/0x20 [ 18.302526] [ 18.302549] The buggy address belongs to the object at fff00000c7948980 [ 18.302549] which belongs to the cache kmalloc-64 of size 64 [ 18.302606] The buggy address is located 0 bytes to the right of [ 18.302606] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.302683] [ 18.302714] The buggy address belongs to the physical page: [ 18.302761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.302821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.302869] page_type: f5(slab) [ 18.302925] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.302990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.303051] page dumped because: kasan: bad access detected [ 18.303086] [ 18.303112] Memory state around the buggy address: [ 18.303143] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.303189] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.303233] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.303274] ^ [ 18.303307] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.303351] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.303392] ================================================================== [ 18.264481] ================================================================== [ 18.264534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 18.265041] Read of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.265153] [ 18.265189] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.265376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.265441] Hardware name: linux,dummy-virt (DT) [ 18.265490] Call trace: [ 18.265566] show_stack+0x20/0x38 (C) [ 18.265620] dump_stack_lvl+0x8c/0xd0 [ 18.265681] print_report+0x118/0x608 [ 18.265733] kasan_report+0xdc/0x128 [ 18.266033] __asan_report_load4_noabort+0x20/0x30 [ 18.266390] kasan_atomics_helper+0x3dd8/0x4858 [ 18.266468] kasan_atomics+0x198/0x2e0 [ 18.266687] kunit_try_run_case+0x170/0x3f0 [ 18.266847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.266909] kthread+0x328/0x630 [ 18.266974] ret_from_fork+0x10/0x20 [ 18.267026] [ 18.267048] Allocated by task 270: [ 18.267322] kasan_save_stack+0x3c/0x68 [ 18.267384] kasan_save_track+0x20/0x40 [ 18.267726] kasan_save_alloc_info+0x40/0x58 [ 18.267789] __kasan_kmalloc+0xd4/0xd8 [ 18.267826] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.267864] kasan_atomics+0xb8/0x2e0 [ 18.268184] kunit_try_run_case+0x170/0x3f0 [ 18.268338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.268409] kthread+0x328/0x630 [ 18.268925] ret_from_fork+0x10/0x20 [ 18.269182] [ 18.269293] The buggy address belongs to the object at fff00000c7948980 [ 18.269293] which belongs to the cache kmalloc-64 of size 64 [ 18.269791] The buggy address is located 0 bytes to the right of [ 18.269791] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.269881] [ 18.270221] The buggy address belongs to the physical page: [ 18.270275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.270647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.270781] page_type: f5(slab) [ 18.270825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.271185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.271258] page dumped because: kasan: bad access detected [ 18.271565] [ 18.271681] Memory state around the buggy address: [ 18.271818] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.272161] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.272278] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.272344] ^ [ 18.272382] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.272426] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.272468] ================================================================== [ 18.166389] ================================================================== [ 18.166442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 18.166492] Read of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.166542] [ 18.166573] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.166669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.166700] Hardware name: linux,dummy-virt (DT) [ 18.166734] Call trace: [ 18.166756] show_stack+0x20/0x38 (C) [ 18.166816] dump_stack_lvl+0x8c/0xd0 [ 18.166865] print_report+0x118/0x608 [ 18.166920] kasan_report+0xdc/0x128 [ 18.166977] __asan_report_load4_noabort+0x20/0x30 [ 18.167031] kasan_atomics_helper+0x42d8/0x4858 [ 18.167087] kasan_atomics+0x198/0x2e0 [ 18.167133] kunit_try_run_case+0x170/0x3f0 [ 18.167192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.167246] kthread+0x328/0x630 [ 18.167302] ret_from_fork+0x10/0x20 [ 18.167359] [ 18.167495] kasan_save_alloc_info+0x40/0x58 [ 18.167542] __kasan_kmalloc+0xd4/0xd8 [ 18.167579] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.167622] kasan_atomics+0xb8/0x2e0 [ 18.167680] kunit_try_run_case+0x170/0x3f0 [ 18.167719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.168365] [ 18.169222] [ 18.169910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.171555] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.173499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 18.174041] Call trace: [ 18.174240] show_stack+0x20/0x38 (C) [ 18.174294] dump_stack_lvl+0x8c/0xd0 [ 18.174357] print_report+0x118/0x608 [ 18.174408] kasan_report+0xdc/0x128 [ 18.174454] kasan_check_range+0x100/0x1a8 [ 18.174500] __kasan_check_write+0x20/0x30 [ 18.174901] kasan_atomics_helper+0x934/0x4858 [ 18.175113] kasan_atomics+0x198/0x2e0 [ 18.175173] kunit_try_run_case+0x170/0x3f0 [ 18.175348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.175456] kthread+0x328/0x630 [ 18.175654] ret_from_fork+0x10/0x20 [ 18.175894] [ 18.175963] Allocated by task 270: [ 18.176036] kasan_save_stack+0x3c/0x68 [ 18.176088] kasan_save_track+0x20/0x40 [ 18.176213] kasan_save_alloc_info+0x40/0x58 [ 18.176313] __kasan_kmalloc+0xd4/0xd8 [ 18.176456] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.176497] kasan_atomics+0xb8/0x2e0 [ 18.176539] kunit_try_run_case+0x170/0x3f0 [ 18.176579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.176956] kthread+0x328/0x630 [ 18.177119] ret_from_fork+0x10/0x20 [ 18.177298] [ 18.177413] The buggy address belongs to the object at fff00000c7948980 [ 18.177413] which belongs to the cache kmalloc-64 of size 64 [ 18.177495] The buggy address is located 0 bytes to the right of [ 18.177495] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.177906] [ 18.178004] The buggy address belongs to the physical page: [ 18.178240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.178334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.178564] page_type: f5(slab) [ 18.178776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.178940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.179004] page dumped because: kasan: bad access detected [ 18.179358] [ 18.179508] Memory state around the buggy address: [ 18.179716] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.180215] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.180354] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.180480] ^ [ 18.180602] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.180801] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.180876] ================================================================== [ 18.438101] ================================================================== [ 18.438157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 18.438534] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.438815] [ 18.438887] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.439015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.439231] Hardware name: linux,dummy-virt (DT) [ 18.439372] Call trace: [ 18.439647] show_stack+0x20/0x38 (C) [ 18.439718] dump_stack_lvl+0x8c/0xd0 [ 18.439846] print_report+0x118/0x608 [ 18.439901] kasan_report+0xdc/0x128 [ 18.439979] kasan_check_range+0x100/0x1a8 [ 18.440163] __kasan_check_write+0x20/0x30 [ 18.440251] kasan_atomics_helper+0x147c/0x4858 [ 18.440478] kasan_atomics+0x198/0x2e0 [ 18.440743] kunit_try_run_case+0x170/0x3f0 [ 18.440970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.441158] kthread+0x328/0x630 [ 18.441210] ret_from_fork+0x10/0x20 [ 18.441664] [ 18.441708] Allocated by task 270: [ 18.441859] kasan_save_stack+0x3c/0x68 [ 18.441936] kasan_save_track+0x20/0x40 [ 18.441987] kasan_save_alloc_info+0x40/0x58 [ 18.442029] __kasan_kmalloc+0xd4/0xd8 [ 18.442066] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.442115] kasan_atomics+0xb8/0x2e0 [ 18.442152] kunit_try_run_case+0x170/0x3f0 [ 18.442203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.442248] kthread+0x328/0x630 [ 18.442294] ret_from_fork+0x10/0x20 [ 18.442341] [ 18.442371] The buggy address belongs to the object at fff00000c7948980 [ 18.442371] which belongs to the cache kmalloc-64 of size 64 [ 18.442452] The buggy address is located 0 bytes to the right of [ 18.442452] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.442525] [ 18.442561] The buggy address belongs to the physical page: [ 18.442601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.442677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.442726] page_type: f5(slab) [ 18.442764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.442839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.442891] page dumped because: kasan: bad access detected [ 18.442924] [ 18.442943] Memory state around the buggy address: [ 18.442992] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.443043] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.443088] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.443128] ^ [ 18.443163] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.443213] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.443272] ================================================================== [ 18.483862] ================================================================== [ 18.483916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 18.484484] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.484565] [ 18.484717] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.484922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.485082] Hardware name: linux,dummy-virt (DT) [ 18.485478] Call trace: [ 18.485545] show_stack+0x20/0x38 (C) [ 18.485620] dump_stack_lvl+0x8c/0xd0 [ 18.485939] print_report+0x118/0x608 [ 18.486218] kasan_report+0xdc/0x128 [ 18.486366] __asan_report_load8_noabort+0x20/0x30 [ 18.486697] kasan_atomics_helper+0x3df4/0x4858 [ 18.487055] kasan_atomics+0x198/0x2e0 [ 18.487194] kunit_try_run_case+0x170/0x3f0 [ 18.487337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.487526] kthread+0x328/0x630 [ 18.487578] ret_from_fork+0x10/0x20 [ 18.488151] [ 18.488276] Allocated by task 270: [ 18.488417] kasan_save_stack+0x3c/0x68 [ 18.488588] kasan_save_track+0x20/0x40 [ 18.488702] kasan_save_alloc_info+0x40/0x58 [ 18.488855] __kasan_kmalloc+0xd4/0xd8 [ 18.488894] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.488956] kasan_atomics+0xb8/0x2e0 [ 18.488998] kunit_try_run_case+0x170/0x3f0 [ 18.489645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.489814] kthread+0x328/0x630 [ 18.489999] ret_from_fork+0x10/0x20 [ 18.490171] [ 18.490284] The buggy address belongs to the object at fff00000c7948980 [ 18.490284] which belongs to the cache kmalloc-64 of size 64 [ 18.490504] The buggy address is located 0 bytes to the right of [ 18.490504] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.490718] [ 18.490761] The buggy address belongs to the physical page: [ 18.491055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.491140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.491398] page_type: f5(slab) [ 18.491557] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.491653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.491700] page dumped because: kasan: bad access detected [ 18.491734] [ 18.491755] Memory state around the buggy address: [ 18.491798] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.491860] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.491907] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.492237] ^ [ 18.492446] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.492497] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.492536] ================================================================== [ 18.508711] ================================================================== [ 18.508762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 18.509049] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.509245] [ 18.509294] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.509379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.509576] Hardware name: linux,dummy-virt (DT) [ 18.509799] Call trace: [ 18.509858] show_stack+0x20/0x38 (C) [ 18.510079] dump_stack_lvl+0x8c/0xd0 [ 18.510251] print_report+0x118/0x608 [ 18.510309] kasan_report+0xdc/0x128 [ 18.510359] kasan_check_range+0x100/0x1a8 [ 18.510407] __kasan_check_write+0x20/0x30 [ 18.510491] kasan_atomics_helper+0x175c/0x4858 [ 18.510544] kasan_atomics+0x198/0x2e0 [ 18.510588] kunit_try_run_case+0x170/0x3f0 [ 18.510656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.510712] kthread+0x328/0x630 [ 18.510766] ret_from_fork+0x10/0x20 [ 18.510815] [ 18.510844] Allocated by task 270: [ 18.510875] kasan_save_stack+0x3c/0x68 [ 18.510922] kasan_save_track+0x20/0x40 [ 18.510969] kasan_save_alloc_info+0x40/0x58 [ 18.511016] __kasan_kmalloc+0xd4/0xd8 [ 18.511053] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.511091] kasan_atomics+0xb8/0x2e0 [ 18.511135] kunit_try_run_case+0x170/0x3f0 [ 18.511174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.511220] kthread+0x328/0x630 [ 18.511256] ret_from_fork+0x10/0x20 [ 18.511294] [ 18.511320] The buggy address belongs to the object at fff00000c7948980 [ 18.511320] which belongs to the cache kmalloc-64 of size 64 [ 18.511387] The buggy address is located 0 bytes to the right of [ 18.511387] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.511462] [ 18.511488] The buggy address belongs to the physical page: [ 18.511522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.511583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.511643] page_type: f5(slab) [ 18.511683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.511744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.511787] page dumped because: kasan: bad access detected [ 18.511821] [ 18.511843] Memory state around the buggy address: [ 18.511877] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.511921] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.512722] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.512806] ^ [ 18.512866] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.513089] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.513160] ================================================================== [ 18.303659] ================================================================== [ 18.304599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 18.304683] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.304758] [ 18.304822] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.305149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.305270] Hardware name: linux,dummy-virt (DT) [ 18.305348] Call trace: [ 18.305757] show_stack+0x20/0x38 (C) [ 18.306182] dump_stack_lvl+0x8c/0xd0 [ 18.306273] print_report+0x118/0x608 [ 18.306343] kasan_report+0xdc/0x128 [ 18.306427] kasan_check_range+0x100/0x1a8 [ 18.306528] __kasan_check_write+0x20/0x30 [ 18.306903] kasan_atomics_helper+0xe44/0x4858 [ 18.307213] kasan_atomics+0x198/0x2e0 [ 18.307318] kunit_try_run_case+0x170/0x3f0 [ 18.307691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.308103] kthread+0x328/0x630 [ 18.308251] ret_from_fork+0x10/0x20 [ 18.308432] [ 18.308534] Allocated by task 270: [ 18.308683] kasan_save_stack+0x3c/0x68 [ 18.308761] kasan_save_track+0x20/0x40 [ 18.308800] kasan_save_alloc_info+0x40/0x58 [ 18.308847] __kasan_kmalloc+0xd4/0xd8 [ 18.309016] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.309288] kasan_atomics+0xb8/0x2e0 [ 18.309925] kunit_try_run_case+0x170/0x3f0 [ 18.310296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.310393] kthread+0x328/0x630 [ 18.310664] ret_from_fork+0x10/0x20 [ 18.310817] [ 18.310901] The buggy address belongs to the object at fff00000c7948980 [ 18.310901] which belongs to the cache kmalloc-64 of size 64 [ 18.311019] The buggy address is located 0 bytes to the right of [ 18.311019] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.311378] [ 18.311453] The buggy address belongs to the physical page: [ 18.311573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.311939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.312132] page_type: f5(slab) [ 18.312211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.312552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.312597] page dumped because: kasan: bad access detected [ 18.312646] [ 18.312666] Memory state around the buggy address: [ 18.312699] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.313137] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.313441] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.313815] ^ [ 18.313907] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.314120] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.314298] ================================================================== [ 18.476677] ================================================================== [ 18.477068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 18.477181] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.477236] [ 18.477270] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.477408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.477439] Hardware name: linux,dummy-virt (DT) [ 18.477470] Call trace: [ 18.477495] show_stack+0x20/0x38 (C) [ 18.477549] dump_stack_lvl+0x8c/0xd0 [ 18.477598] print_report+0x118/0x608 [ 18.478023] kasan_report+0xdc/0x128 [ 18.478316] kasan_check_range+0x100/0x1a8 [ 18.478541] __kasan_check_write+0x20/0x30 [ 18.478649] kasan_atomics_helper+0x1644/0x4858 [ 18.478951] kasan_atomics+0x198/0x2e0 [ 18.479060] kunit_try_run_case+0x170/0x3f0 [ 18.479115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.479242] kthread+0x328/0x630 [ 18.479296] ret_from_fork+0x10/0x20 [ 18.479363] [ 18.479448] Allocated by task 270: [ 18.479483] kasan_save_stack+0x3c/0x68 [ 18.479523] kasan_save_track+0x20/0x40 [ 18.479850] kasan_save_alloc_info+0x40/0x58 [ 18.479937] __kasan_kmalloc+0xd4/0xd8 [ 18.480190] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.480279] kasan_atomics+0xb8/0x2e0 [ 18.480341] kunit_try_run_case+0x170/0x3f0 [ 18.480512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.480647] kthread+0x328/0x630 [ 18.480746] ret_from_fork+0x10/0x20 [ 18.480824] [ 18.480849] The buggy address belongs to the object at fff00000c7948980 [ 18.480849] which belongs to the cache kmalloc-64 of size 64 [ 18.480909] The buggy address is located 0 bytes to the right of [ 18.480909] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.480974] [ 18.481522] The buggy address belongs to the physical page: [ 18.481849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.482063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.482221] page_type: f5(slab) [ 18.482349] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.482415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.482677] page dumped because: kasan: bad access detected [ 18.482728] [ 18.482750] Memory state around the buggy address: [ 18.482793] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.482840] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.482903] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.482952] ^ [ 18.482988] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.483032] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.483072] ================================================================== [ 18.054960] ================================================================== [ 18.055013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 18.055096] Read of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.055511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.055551] Hardware name: linux,dummy-virt (DT) [ 18.055592] Call trace: [ 18.055616] show_stack+0x20/0x38 (C) [ 18.055823] dump_stack_lvl+0x8c/0xd0 [ 18.055954] print_report+0x118/0x608 [ 18.061386] Hardware name: linux,dummy-virt (DT) [ 18.062542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.064329] The buggy address is located 0 bytes to the right of [ 18.064329] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.064981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.066149] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.067259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.067900] __asan_report_store4_noabort+0x20/0x30 [ 18.069057] Allocated by task 270: [ 18.069611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.069936] The buggy address belongs to the physical page: [ 18.070168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.070527] ^ [ 18.070910] ================================================================== [ 18.181774] ================================================================== [ 18.181857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 18.182578] Write of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.182865] [ 18.182905] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.183012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.183051] Hardware name: linux,dummy-virt (DT) [ 18.183186] Call trace: [ 18.183222] show_stack+0x20/0x38 (C) [ 18.183275] dump_stack_lvl+0x8c/0xd0 [ 18.183323] print_report+0x118/0x608 [ 18.183369] kasan_report+0xdc/0x128 [ 18.183436] kasan_check_range+0x100/0x1a8 [ 18.183488] __kasan_check_write+0x20/0x30 [ 18.183538] kasan_atomics_helper+0x99c/0x4858 [ 18.183584] kasan_atomics+0x198/0x2e0 [ 18.183640] kunit_try_run_case+0x170/0x3f0 [ 18.183757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.183820] kthread+0x328/0x630 [ 18.184140] ret_from_fork+0x10/0x20 [ 18.184260] [ 18.184316] Allocated by task 270: [ 18.184576] kasan_save_stack+0x3c/0x68 [ 18.184819] kasan_save_track+0x20/0x40 [ 18.185117] kasan_save_alloc_info+0x40/0x58 [ 18.185449] __kasan_kmalloc+0xd4/0xd8 [ 18.185589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.185769] kasan_atomics+0xb8/0x2e0 [ 18.185810] kunit_try_run_case+0x170/0x3f0 [ 18.186122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.186242] kthread+0x328/0x630 [ 18.186350] ret_from_fork+0x10/0x20 [ 18.186600] [ 18.186669] The buggy address belongs to the object at fff00000c7948980 [ 18.186669] which belongs to the cache kmalloc-64 of size 64 [ 18.186794] The buggy address is located 0 bytes to the right of [ 18.186794] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.186953] [ 18.187245] The buggy address belongs to the physical page: [ 18.187311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.187380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.187674] page_type: f5(slab) [ 18.187804] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.187918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.188186] page dumped because: kasan: bad access detected [ 18.188252] [ 18.188304] Memory state around the buggy address: [ 18.188359] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.188407] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.188452] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.188502] ^ [ 18.188549] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.188593] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.188662] ================================================================== [ 18.396599] ================================================================== [ 18.396821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 18.396988] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.397063] [ 18.397174] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.397263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.397292] Hardware name: linux,dummy-virt (DT) [ 18.397338] Call trace: [ 18.397365] show_stack+0x20/0x38 (C) [ 18.397822] dump_stack_lvl+0x8c/0xd0 [ 18.397916] print_report+0x118/0x608 [ 18.397977] kasan_report+0xdc/0x128 [ 18.398066] kasan_check_range+0x100/0x1a8 [ 18.398120] __kasan_check_write+0x20/0x30 [ 18.398280] kasan_atomics_helper+0x126c/0x4858 [ 18.398335] kasan_atomics+0x198/0x2e0 [ 18.398378] kunit_try_run_case+0x170/0x3f0 [ 18.398679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.398767] kthread+0x328/0x630 [ 18.399026] ret_from_fork+0x10/0x20 [ 18.399228] [ 18.399284] Allocated by task 270: [ 18.399318] kasan_save_stack+0x3c/0x68 [ 18.399360] kasan_save_track+0x20/0x40 [ 18.399435] kasan_save_alloc_info+0x40/0x58 [ 18.399477] __kasan_kmalloc+0xd4/0xd8 [ 18.399523] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.399562] kasan_atomics+0xb8/0x2e0 [ 18.399598] kunit_try_run_case+0x170/0x3f0 [ 18.399656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.399703] kthread+0x328/0x630 [ 18.399740] ret_from_fork+0x10/0x20 [ 18.399776] [ 18.399804] The buggy address belongs to the object at fff00000c7948980 [ 18.399804] which belongs to the cache kmalloc-64 of size 64 [ 18.399864] The buggy address is located 0 bytes to the right of [ 18.399864] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.399929] [ 18.399951] The buggy address belongs to the physical page: [ 18.399995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.400399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.400690] page_type: f5(slab) [ 18.400931] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.401030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.401074] page dumped because: kasan: bad access detected [ 18.401753] [ 18.401815] Memory state around the buggy address: [ 18.401876] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.401947] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.402166] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.402222] ^ [ 18.402592] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.402693] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.403041] ================================================================== [ 18.425621] ================================================================== [ 18.425698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 18.425748] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.425799] [ 18.425831] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.425911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.425939] Hardware name: linux,dummy-virt (DT) [ 18.425980] Call trace: [ 18.426003] show_stack+0x20/0x38 (C) [ 18.426053] dump_stack_lvl+0x8c/0xd0 [ 18.426101] print_report+0x118/0x608 [ 18.426148] kasan_report+0xdc/0x128 [ 18.426192] __asan_report_load8_noabort+0x20/0x30 [ 18.426243] kasan_atomics_helper+0x3f04/0x4858 [ 18.426291] kasan_atomics+0x198/0x2e0 [ 18.426335] kunit_try_run_case+0x170/0x3f0 [ 18.426384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.426439] kthread+0x328/0x630 [ 18.426485] ret_from_fork+0x10/0x20 [ 18.426534] [ 18.426554] Allocated by task 270: [ 18.426584] kasan_save_stack+0x3c/0x68 [ 18.426622] kasan_save_track+0x20/0x40 [ 18.426726] kasan_save_alloc_info+0x40/0x58 [ 18.426770] __kasan_kmalloc+0xd4/0xd8 [ 18.426807] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.426917] kasan_atomics+0xb8/0x2e0 [ 18.426964] kunit_try_run_case+0x170/0x3f0 [ 18.427006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.427172] kthread+0x328/0x630 [ 18.427213] ret_from_fork+0x10/0x20 [ 18.427249] [ 18.427272] The buggy address belongs to the object at fff00000c7948980 [ 18.427272] which belongs to the cache kmalloc-64 of size 64 [ 18.427561] The buggy address is located 0 bytes to the right of [ 18.427561] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.427718] [ 18.427743] The buggy address belongs to the physical page: [ 18.428016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.428226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.428503] page_type: f5(slab) [ 18.428619] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.428718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.428796] page dumped because: kasan: bad access detected [ 18.428904] [ 18.429216] Memory state around the buggy address: [ 18.429281] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.429393] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.429487] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.429602] ^ [ 18.429654] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.429700] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.430206] ================================================================== [ 18.444414] ================================================================== [ 18.444528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 18.444609] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.444702] [ 18.444854] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.445232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.445267] Hardware name: linux,dummy-virt (DT) [ 18.445301] Call trace: [ 18.445324] show_stack+0x20/0x38 (C) [ 18.445377] dump_stack_lvl+0x8c/0xd0 [ 18.445992] print_report+0x118/0x608 [ 18.446077] kasan_report+0xdc/0x128 [ 18.446487] kasan_check_range+0x100/0x1a8 [ 18.446662] __kasan_check_write+0x20/0x30 [ 18.446784] kasan_atomics_helper+0x14e4/0x4858 [ 18.446850] kasan_atomics+0x198/0x2e0 [ 18.447219] kunit_try_run_case+0x170/0x3f0 [ 18.447479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.447594] kthread+0x328/0x630 [ 18.447971] ret_from_fork+0x10/0x20 [ 18.448099] [ 18.448143] Allocated by task 270: [ 18.448320] kasan_save_stack+0x3c/0x68 [ 18.448671] kasan_save_track+0x20/0x40 [ 18.448779] kasan_save_alloc_info+0x40/0x58 [ 18.448868] __kasan_kmalloc+0xd4/0xd8 [ 18.449003] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.449110] kasan_atomics+0xb8/0x2e0 [ 18.449196] kunit_try_run_case+0x170/0x3f0 [ 18.449460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.449527] kthread+0x328/0x630 [ 18.449662] ret_from_fork+0x10/0x20 [ 18.449771] [ 18.449842] The buggy address belongs to the object at fff00000c7948980 [ 18.449842] which belongs to the cache kmalloc-64 of size 64 [ 18.450190] The buggy address is located 0 bytes to the right of [ 18.450190] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.450398] [ 18.450465] The buggy address belongs to the physical page: [ 18.450500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.450812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.450915] page_type: f5(slab) [ 18.451233] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.451350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.451418] page dumped because: kasan: bad access detected [ 18.451453] [ 18.451473] Memory state around the buggy address: [ 18.451795] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.451858] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.452181] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.452305] ^ [ 18.452380] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.452423] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.452463] ================================================================== [ 18.289322] ================================================================== [ 18.289375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 18.289731] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.289806] [ 18.290203] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.290311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.290645] Hardware name: linux,dummy-virt (DT) [ 18.290723] Call trace: [ 18.290764] show_stack+0x20/0x38 (C) [ 18.290815] dump_stack_lvl+0x8c/0xd0 [ 18.290972] print_report+0x118/0x608 [ 18.291022] kasan_report+0xdc/0x128 [ 18.291068] kasan_check_range+0x100/0x1a8 [ 18.291566] __kasan_check_read+0x20/0x30 [ 18.291745] kasan_atomics_helper+0xdd4/0x4858 [ 18.291838] kasan_atomics+0x198/0x2e0 [ 18.291892] kunit_try_run_case+0x170/0x3f0 [ 18.291978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.292283] kthread+0x328/0x630 [ 18.292491] ret_from_fork+0x10/0x20 [ 18.292547] [ 18.292599] Allocated by task 270: [ 18.292681] kasan_save_stack+0x3c/0x68 [ 18.292981] kasan_save_track+0x20/0x40 [ 18.293298] kasan_save_alloc_info+0x40/0x58 [ 18.293471] __kasan_kmalloc+0xd4/0xd8 [ 18.293513] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.293815] kasan_atomics+0xb8/0x2e0 [ 18.293952] kunit_try_run_case+0x170/0x3f0 [ 18.294249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.294716] kthread+0x328/0x630 [ 18.295152] ret_from_fork+0x10/0x20 [ 18.295298] [ 18.295324] The buggy address belongs to the object at fff00000c7948980 [ 18.295324] which belongs to the cache kmalloc-64 of size 64 [ 18.295811] The buggy address is located 0 bytes to the right of [ 18.295811] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.296049] [ 18.296079] The buggy address belongs to the physical page: [ 18.296113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.296341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.296413] page_type: f5(slab) [ 18.296485] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.296860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.296943] page dumped because: kasan: bad access detected [ 18.296978] [ 18.297000] Memory state around the buggy address: [ 18.297035] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.297485] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.297654] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.297725] ^ [ 18.297810] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.297871] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.297919] ================================================================== [ 18.272824] ================================================================== [ 18.272874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 18.273324] Write of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270 [ 18.273395] [ 18.273605] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 18.274062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.274129] Hardware name: linux,dummy-virt (DT) [ 18.274164] Call trace: [ 18.274458] show_stack+0x20/0x38 (C) [ 18.274643] dump_stack_lvl+0x8c/0xd0 [ 18.274718] print_report+0x118/0x608 [ 18.274846] kasan_report+0xdc/0x128 [ 18.274909] kasan_check_range+0x100/0x1a8 [ 18.274997] __kasan_check_write+0x20/0x30 [ 18.275046] kasan_atomics_helper+0xd3c/0x4858 [ 18.275414] kasan_atomics+0x198/0x2e0 [ 18.275474] kunit_try_run_case+0x170/0x3f0 [ 18.275816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.275964] kthread+0x328/0x630 [ 18.276520] ret_from_fork+0x10/0x20 [ 18.276583] [ 18.276647] Allocated by task 270: [ 18.276680] kasan_save_stack+0x3c/0x68 [ 18.276915] kasan_save_track+0x20/0x40 [ 18.277003] kasan_save_alloc_info+0x40/0x58 [ 18.277354] __kasan_kmalloc+0xd4/0xd8 [ 18.277429] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.277860] kasan_atomics+0xb8/0x2e0 [ 18.277910] kunit_try_run_case+0x170/0x3f0 [ 18.277960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.278010] kthread+0x328/0x630 [ 18.278106] ret_from_fork+0x10/0x20 [ 18.278146] [ 18.278168] The buggy address belongs to the object at fff00000c7948980 [ 18.278168] which belongs to the cache kmalloc-64 of size 64 [ 18.278240] The buggy address is located 0 bytes to the right of [ 18.278240] allocated 48-byte region [fff00000c7948980, fff00000c79489b0) [ 18.278324] [ 18.278346] The buggy address belongs to the physical page: [ 18.278389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948 [ 18.278451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.278507] page_type: f5(slab) [ 18.278554] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.278607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.278660] page dumped because: kasan: bad access detected [ 18.278701] [ 18.278731] Memory state around the buggy address: [ 18.278775] fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.278829] fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.278873] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.278922] ^ [ 18.278958] fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.279011] fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.279060] ==================================================================
[ 18.166543] ================================================================== [ 18.166997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 18.167358] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.168031] [ 18.168586] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.168699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.168718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.168746] Call Trace: [ 18.168774] <TASK> [ 18.168804] dump_stack_lvl+0x73/0xb0 [ 18.168844] print_report+0xd1/0x650 [ 18.168872] ? __virt_addr_valid+0x1db/0x2d0 [ 18.168901] ? kasan_atomics_helper+0xd47/0x5450 [ 18.168927] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.168955] ? kasan_atomics_helper+0xd47/0x5450 [ 18.168981] kasan_report+0x141/0x180 [ 18.169007] ? kasan_atomics_helper+0xd47/0x5450 [ 18.169054] kasan_check_range+0x10c/0x1c0 [ 18.169122] __kasan_check_write+0x18/0x20 [ 18.169181] kasan_atomics_helper+0xd47/0x5450 [ 18.169236] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.169316] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.169390] ? kasan_atomics+0x152/0x310 [ 18.169461] kasan_atomics+0x1dc/0x310 [ 18.169505] ? __pfx_kasan_atomics+0x10/0x10 [ 18.169534] ? __pfx_read_tsc+0x10/0x10 [ 18.169558] ? ktime_get_ts64+0x86/0x230 [ 18.169591] kunit_try_run_case+0x1a5/0x480 [ 18.169620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.169647] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.169677] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.169706] ? __kthread_parkme+0x82/0x180 [ 18.169733] ? preempt_count_sub+0x50/0x80 [ 18.169762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.169791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.169819] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.169848] kthread+0x337/0x6f0 [ 18.169871] ? trace_preempt_on+0x20/0xc0 [ 18.169899] ? __pfx_kthread+0x10/0x10 [ 18.169921] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.169948] ? calculate_sigpending+0x7b/0xa0 [ 18.169975] ? __pfx_kthread+0x10/0x10 [ 18.169997] ret_from_fork+0x41/0x80 [ 18.170021] ? __pfx_kthread+0x10/0x10 [ 18.170043] ret_from_fork_asm+0x1a/0x30 [ 18.170106] </TASK> [ 18.170121] [ 18.183591] Allocated by task 286: [ 18.185444] kasan_save_stack+0x45/0x70 [ 18.185836] kasan_save_track+0x18/0x40 [ 18.186254] kasan_save_alloc_info+0x3b/0x50 [ 18.186994] __kasan_kmalloc+0xb7/0xc0 [ 18.187421] __kmalloc_cache_noprof+0x189/0x420 [ 18.187693] kasan_atomics+0x95/0x310 [ 18.188002] kunit_try_run_case+0x1a5/0x480 [ 18.188373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.189062] kthread+0x337/0x6f0 [ 18.189422] ret_from_fork+0x41/0x80 [ 18.189647] ret_from_fork_asm+0x1a/0x30 [ 18.189891] [ 18.190068] The buggy address belongs to the object at ffff888102b21f80 [ 18.190068] which belongs to the cache kmalloc-64 of size 64 [ 18.190933] The buggy address is located 0 bytes to the right of [ 18.190933] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.191770] [ 18.192046] The buggy address belongs to the physical page: [ 18.192322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.192898] flags: 0x200000000000000(node=0|zone=2) [ 18.193315] page_type: f5(slab) [ 18.193585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.193977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.194312] page dumped because: kasan: bad access detected [ 18.195172] [ 18.195257] Memory state around the buggy address: [ 18.195421] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.196391] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.196874] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.197556] ^ [ 18.197820] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.198429] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.198716] ================================================================== [ 18.200657] ================================================================== [ 18.201241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 18.201515] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.202701] [ 18.203196] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.203273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.203298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.203359] Call Trace: [ 18.203406] <TASK> [ 18.203590] dump_stack_lvl+0x73/0xb0 [ 18.203644] print_report+0xd1/0x650 [ 18.203675] ? __virt_addr_valid+0x1db/0x2d0 [ 18.203704] ? kasan_atomics_helper+0xde0/0x5450 [ 18.203730] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.203759] ? kasan_atomics_helper+0xde0/0x5450 [ 18.203786] kasan_report+0x141/0x180 [ 18.203812] ? kasan_atomics_helper+0xde0/0x5450 [ 18.203843] kasan_check_range+0x10c/0x1c0 [ 18.203868] __kasan_check_write+0x18/0x20 [ 18.203892] kasan_atomics_helper+0xde0/0x5450 [ 18.203920] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.203947] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.203974] ? kasan_atomics+0x152/0x310 [ 18.204001] kasan_atomics+0x1dc/0x310 [ 18.204024] ? __pfx_kasan_atomics+0x10/0x10 [ 18.204049] ? __pfx_read_tsc+0x10/0x10 [ 18.204098] ? ktime_get_ts64+0x86/0x230 [ 18.204129] kunit_try_run_case+0x1a5/0x480 [ 18.204159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.204185] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.204214] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.204242] ? __kthread_parkme+0x82/0x180 [ 18.204269] ? preempt_count_sub+0x50/0x80 [ 18.204299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.204328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.204377] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.204407] kthread+0x337/0x6f0 [ 18.204429] ? trace_preempt_on+0x20/0xc0 [ 18.204457] ? __pfx_kthread+0x10/0x10 [ 18.204479] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.204505] ? calculate_sigpending+0x7b/0xa0 [ 18.204531] ? __pfx_kthread+0x10/0x10 [ 18.204554] ret_from_fork+0x41/0x80 [ 18.204578] ? __pfx_kthread+0x10/0x10 [ 18.204600] ret_from_fork_asm+0x1a/0x30 [ 18.204636] </TASK> [ 18.204651] [ 18.215819] Allocated by task 286: [ 18.216067] kasan_save_stack+0x45/0x70 [ 18.216378] kasan_save_track+0x18/0x40 [ 18.216580] kasan_save_alloc_info+0x3b/0x50 [ 18.216789] __kasan_kmalloc+0xb7/0xc0 [ 18.217005] __kmalloc_cache_noprof+0x189/0x420 [ 18.217448] kasan_atomics+0x95/0x310 [ 18.217796] kunit_try_run_case+0x1a5/0x480 [ 18.218213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.218685] kthread+0x337/0x6f0 [ 18.218996] ret_from_fork+0x41/0x80 [ 18.219455] ret_from_fork_asm+0x1a/0x30 [ 18.219729] [ 18.219853] The buggy address belongs to the object at ffff888102b21f80 [ 18.219853] which belongs to the cache kmalloc-64 of size 64 [ 18.220723] The buggy address is located 0 bytes to the right of [ 18.220723] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.221321] [ 18.221538] The buggy address belongs to the physical page: [ 18.221902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.222328] flags: 0x200000000000000(node=0|zone=2) [ 18.222767] page_type: f5(slab) [ 18.223059] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.223492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.223773] page dumped because: kasan: bad access detected [ 18.223991] [ 18.224100] Memory state around the buggy address: [ 18.224539] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.225117] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.225716] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.226396] ^ [ 18.226641] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.227026] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.227600] ================================================================== [ 18.230138] ================================================================== [ 18.230813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 18.231370] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.232059] [ 18.232237] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.232352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.232382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.232433] Call Trace: [ 18.232477] <TASK> [ 18.232522] dump_stack_lvl+0x73/0xb0 [ 18.232593] print_report+0xd1/0x650 [ 18.232651] ? __virt_addr_valid+0x1db/0x2d0 [ 18.232706] ? kasan_atomics_helper+0xe78/0x5450 [ 18.232759] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.232807] ? kasan_atomics_helper+0xe78/0x5450 [ 18.232856] kasan_report+0x141/0x180 [ 18.232904] ? kasan_atomics_helper+0xe78/0x5450 [ 18.232961] kasan_check_range+0x10c/0x1c0 [ 18.233007] __kasan_check_write+0x18/0x20 [ 18.233068] kasan_atomics_helper+0xe78/0x5450 [ 18.233120] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.233176] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.233232] ? kasan_atomics+0x152/0x310 [ 18.233292] kasan_atomics+0x1dc/0x310 [ 18.233346] ? __pfx_kasan_atomics+0x10/0x10 [ 18.233393] ? __pfx_read_tsc+0x10/0x10 [ 18.233434] ? ktime_get_ts64+0x86/0x230 [ 18.233488] kunit_try_run_case+0x1a5/0x480 [ 18.233544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.233596] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.233655] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.233712] ? __kthread_parkme+0x82/0x180 [ 18.233761] ? preempt_count_sub+0x50/0x80 [ 18.233815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.233868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.233929] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.233992] kthread+0x337/0x6f0 [ 18.234037] ? trace_preempt_on+0x20/0xc0 [ 18.234102] ? __pfx_kthread+0x10/0x10 [ 18.234150] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.234207] ? calculate_sigpending+0x7b/0xa0 [ 18.234262] ? __pfx_kthread+0x10/0x10 [ 18.234312] ret_from_fork+0x41/0x80 [ 18.234382] ? __pfx_kthread+0x10/0x10 [ 18.234430] ret_from_fork_asm+0x1a/0x30 [ 18.234511] </TASK> [ 18.234542] [ 18.244571] Allocated by task 286: [ 18.244908] kasan_save_stack+0x45/0x70 [ 18.245383] kasan_save_track+0x18/0x40 [ 18.245749] kasan_save_alloc_info+0x3b/0x50 [ 18.246177] __kasan_kmalloc+0xb7/0xc0 [ 18.246611] __kmalloc_cache_noprof+0x189/0x420 [ 18.247065] kasan_atomics+0x95/0x310 [ 18.247455] kunit_try_run_case+0x1a5/0x480 [ 18.247883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.248269] kthread+0x337/0x6f0 [ 18.248613] ret_from_fork+0x41/0x80 [ 18.248952] ret_from_fork_asm+0x1a/0x30 [ 18.249457] [ 18.249661] The buggy address belongs to the object at ffff888102b21f80 [ 18.249661] which belongs to the cache kmalloc-64 of size 64 [ 18.250100] The buggy address is located 0 bytes to the right of [ 18.250100] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.250807] [ 18.251071] The buggy address belongs to the physical page: [ 18.251692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.252509] flags: 0x200000000000000(node=0|zone=2) [ 18.252983] page_type: f5(slab) [ 18.253353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.253865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.254488] page dumped because: kasan: bad access detected [ 18.254763] [ 18.254884] Memory state around the buggy address: [ 18.255101] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.255391] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.255657] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.256245] ^ [ 18.256666] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.257428] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.258059] ================================================================== [ 18.595447] ================================================================== [ 18.596038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 18.596466] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.597212] [ 18.597558] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.597676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.597709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.597762] Call Trace: [ 18.597811] <TASK> [ 18.597862] dump_stack_lvl+0x73/0xb0 [ 18.597923] print_report+0xd1/0x650 [ 18.597965] ? __virt_addr_valid+0x1db/0x2d0 [ 18.598009] ? kasan_atomics_helper+0x13b5/0x5450 [ 18.598046] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.598089] ? kasan_atomics_helper+0x13b5/0x5450 [ 18.598128] kasan_report+0x141/0x180 [ 18.598166] ? kasan_atomics_helper+0x13b5/0x5450 [ 18.598213] kasan_check_range+0x10c/0x1c0 [ 18.598251] __kasan_check_read+0x15/0x20 [ 18.598285] kasan_atomics_helper+0x13b5/0x5450 [ 18.598327] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.598396] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.598439] ? kasan_atomics+0x152/0x310 [ 18.598480] kasan_atomics+0x1dc/0x310 [ 18.598515] ? __pfx_kasan_atomics+0x10/0x10 [ 18.598650] ? __pfx_read_tsc+0x10/0x10 [ 18.598709] ? ktime_get_ts64+0x86/0x230 [ 18.598768] kunit_try_run_case+0x1a5/0x480 [ 18.598833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.598887] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.598946] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.599007] ? __kthread_parkme+0x82/0x180 [ 18.599061] ? preempt_count_sub+0x50/0x80 [ 18.599114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.599146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.599176] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.599205] kthread+0x337/0x6f0 [ 18.599227] ? trace_preempt_on+0x20/0xc0 [ 18.599254] ? __pfx_kthread+0x10/0x10 [ 18.599276] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.599303] ? calculate_sigpending+0x7b/0xa0 [ 18.599329] ? __pfx_kthread+0x10/0x10 [ 18.599374] ret_from_fork+0x41/0x80 [ 18.599399] ? __pfx_kthread+0x10/0x10 [ 18.599421] ret_from_fork_asm+0x1a/0x30 [ 18.599463] </TASK> [ 18.599477] [ 18.610478] Allocated by task 286: [ 18.610688] kasan_save_stack+0x45/0x70 [ 18.610895] kasan_save_track+0x18/0x40 [ 18.611107] kasan_save_alloc_info+0x3b/0x50 [ 18.611531] __kasan_kmalloc+0xb7/0xc0 [ 18.611841] __kmalloc_cache_noprof+0x189/0x420 [ 18.612472] kasan_atomics+0x95/0x310 [ 18.613217] kunit_try_run_case+0x1a5/0x480 [ 18.613668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.614178] kthread+0x337/0x6f0 [ 18.614501] ret_from_fork+0x41/0x80 [ 18.614824] ret_from_fork_asm+0x1a/0x30 [ 18.615195] [ 18.615394] The buggy address belongs to the object at ffff888102b21f80 [ 18.615394] which belongs to the cache kmalloc-64 of size 64 [ 18.616405] The buggy address is located 0 bytes to the right of [ 18.616405] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.617384] [ 18.617595] The buggy address belongs to the physical page: [ 18.617959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.618680] flags: 0x200000000000000(node=0|zone=2) [ 18.619484] page_type: f5(slab) [ 18.619879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.620226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.620526] page dumped because: kasan: bad access detected [ 18.620748] [ 18.620867] Memory state around the buggy address: [ 18.621090] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.621716] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.622413] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.623144] ^ [ 18.623577] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.624127] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.624713] ================================================================== [ 18.048427] ================================================================== [ 18.048998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 18.049378] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.049689] [ 18.049859] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.049970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.050001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.050053] Call Trace: [ 18.050097] <TASK> [ 18.050139] dump_stack_lvl+0x73/0xb0 [ 18.050205] print_report+0xd1/0x650 [ 18.050255] ? __virt_addr_valid+0x1db/0x2d0 [ 18.050317] ? kasan_atomics_helper+0xac7/0x5450 [ 18.050386] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.050435] ? kasan_atomics_helper+0xac7/0x5450 [ 18.050483] kasan_report+0x141/0x180 [ 18.050533] ? kasan_atomics_helper+0xac7/0x5450 [ 18.050599] kasan_check_range+0x10c/0x1c0 [ 18.050651] __kasan_check_write+0x18/0x20 [ 18.050704] kasan_atomics_helper+0xac7/0x5450 [ 18.050765] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.050827] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.050883] ? kasan_atomics+0x152/0x310 [ 18.050944] kasan_atomics+0x1dc/0x310 [ 18.050994] ? __pfx_kasan_atomics+0x10/0x10 [ 18.051050] ? __pfx_read_tsc+0x10/0x10 [ 18.051097] ? ktime_get_ts64+0x86/0x230 [ 18.051160] kunit_try_run_case+0x1a5/0x480 [ 18.051224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.051320] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.051399] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.051461] ? __kthread_parkme+0x82/0x180 [ 18.051516] ? preempt_count_sub+0x50/0x80 [ 18.051580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.051642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.051705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.051768] kthread+0x337/0x6f0 [ 18.051812] ? trace_preempt_on+0x20/0xc0 [ 18.051870] ? __pfx_kthread+0x10/0x10 [ 18.051918] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.051976] ? calculate_sigpending+0x7b/0xa0 [ 18.052030] ? __pfx_kthread+0x10/0x10 [ 18.052073] ret_from_fork+0x41/0x80 [ 18.052115] ? __pfx_kthread+0x10/0x10 [ 18.052155] ret_from_fork_asm+0x1a/0x30 [ 18.052219] </TASK> [ 18.052244] [ 18.067303] Allocated by task 286: [ 18.067649] kasan_save_stack+0x45/0x70 [ 18.068026] kasan_save_track+0x18/0x40 [ 18.068285] kasan_save_alloc_info+0x3b/0x50 [ 18.068560] __kasan_kmalloc+0xb7/0xc0 [ 18.068873] __kmalloc_cache_noprof+0x189/0x420 [ 18.069145] kasan_atomics+0x95/0x310 [ 18.069354] kunit_try_run_case+0x1a5/0x480 [ 18.069706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.070150] kthread+0x337/0x6f0 [ 18.070470] ret_from_fork+0x41/0x80 [ 18.070790] ret_from_fork_asm+0x1a/0x30 [ 18.071181] [ 18.071409] The buggy address belongs to the object at ffff888102b21f80 [ 18.071409] which belongs to the cache kmalloc-64 of size 64 [ 18.071893] The buggy address is located 0 bytes to the right of [ 18.071893] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.072370] [ 18.072560] The buggy address belongs to the physical page: [ 18.072979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.073660] flags: 0x200000000000000(node=0|zone=2) [ 18.074056] page_type: f5(slab) [ 18.074418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.074806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.075126] page dumped because: kasan: bad access detected [ 18.075421] [ 18.075592] Memory state around the buggy address: [ 18.076036] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.076488] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.076888] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.077437] ^ [ 18.077660] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.077934] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.078503] ================================================================== [ 17.814625] ================================================================== [ 17.815705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 17.816265] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.816947] [ 17.817350] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.817562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.817592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.817620] Call Trace: [ 17.817648] <TASK> [ 17.817678] dump_stack_lvl+0x73/0xb0 [ 17.817719] print_report+0xd1/0x650 [ 17.817749] ? __virt_addr_valid+0x1db/0x2d0 [ 17.817778] ? kasan_atomics_helper+0x5fe/0x5450 [ 17.817806] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.817834] ? kasan_atomics_helper+0x5fe/0x5450 [ 17.817861] kasan_report+0x141/0x180 [ 17.817888] ? kasan_atomics_helper+0x5fe/0x5450 [ 17.817952] kasan_check_range+0x10c/0x1c0 [ 17.817978] __kasan_check_write+0x18/0x20 [ 17.818003] kasan_atomics_helper+0x5fe/0x5450 [ 17.818031] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.818061] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.818101] ? kasan_atomics+0x152/0x310 [ 17.818130] kasan_atomics+0x1dc/0x310 [ 17.818153] ? __pfx_kasan_atomics+0x10/0x10 [ 17.818180] ? __pfx_read_tsc+0x10/0x10 [ 17.818205] ? ktime_get_ts64+0x86/0x230 [ 17.818236] kunit_try_run_case+0x1a5/0x480 [ 17.818267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.818294] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.818323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.818373] ? __kthread_parkme+0x82/0x180 [ 17.818401] ? preempt_count_sub+0x50/0x80 [ 17.818432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.818461] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.818490] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.818519] kthread+0x337/0x6f0 [ 17.818542] ? trace_preempt_on+0x20/0xc0 [ 17.818569] ? __pfx_kthread+0x10/0x10 [ 17.818591] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.818617] ? calculate_sigpending+0x7b/0xa0 [ 17.818642] ? __pfx_kthread+0x10/0x10 [ 17.818665] ret_from_fork+0x41/0x80 [ 17.818688] ? __pfx_kthread+0x10/0x10 [ 17.818709] ret_from_fork_asm+0x1a/0x30 [ 17.818744] </TASK> [ 17.818758] [ 17.831440] Allocated by task 286: [ 17.831739] kasan_save_stack+0x45/0x70 [ 17.832109] kasan_save_track+0x18/0x40 [ 17.832471] kasan_save_alloc_info+0x3b/0x50 [ 17.832783] __kasan_kmalloc+0xb7/0xc0 [ 17.832985] __kmalloc_cache_noprof+0x189/0x420 [ 17.833216] kasan_atomics+0x95/0x310 [ 17.833587] kunit_try_run_case+0x1a5/0x480 [ 17.834127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.834777] kthread+0x337/0x6f0 [ 17.835155] ret_from_fork+0x41/0x80 [ 17.835485] ret_from_fork_asm+0x1a/0x30 [ 17.835851] [ 17.836093] The buggy address belongs to the object at ffff888102b21f80 [ 17.836093] which belongs to the cache kmalloc-64 of size 64 [ 17.836756] The buggy address is located 0 bytes to the right of [ 17.836756] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.837211] [ 17.837346] The buggy address belongs to the physical page: [ 17.837580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.838257] flags: 0x200000000000000(node=0|zone=2) [ 17.838704] page_type: f5(slab) [ 17.839022] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.840306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.840806] page dumped because: kasan: bad access detected [ 17.841107] [ 17.841365] Memory state around the buggy address: [ 17.841741] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.842469] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.843025] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.843713] ^ [ 17.844073] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.844727] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.845208] ================================================================== [ 18.878934] ================================================================== [ 18.879382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 18.879972] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.880429] [ 18.880583] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.880682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.880710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.880768] Call Trace: [ 18.880831] <TASK> [ 18.880889] dump_stack_lvl+0x73/0xb0 [ 18.880978] print_report+0xd1/0x650 [ 18.881048] ? __virt_addr_valid+0x1db/0x2d0 [ 18.881136] ? kasan_atomics_helper+0x1818/0x5450 [ 18.881189] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.881244] ? kasan_atomics_helper+0x1818/0x5450 [ 18.881369] kasan_report+0x141/0x180 [ 18.881433] ? kasan_atomics_helper+0x1818/0x5450 [ 18.881513] kasan_check_range+0x10c/0x1c0 [ 18.881573] __kasan_check_write+0x18/0x20 [ 18.881628] kasan_atomics_helper+0x1818/0x5450 [ 18.881688] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.881745] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.881810] ? kasan_atomics+0x152/0x310 [ 18.881883] kasan_atomics+0x1dc/0x310 [ 18.881935] ? __pfx_kasan_atomics+0x10/0x10 [ 18.881978] ? __pfx_read_tsc+0x10/0x10 [ 18.882013] ? ktime_get_ts64+0x86/0x230 [ 18.882046] kunit_try_run_case+0x1a5/0x480 [ 18.882102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.882131] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.882162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.882190] ? __kthread_parkme+0x82/0x180 [ 18.882218] ? preempt_count_sub+0x50/0x80 [ 18.882248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.882276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.882305] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.882353] kthread+0x337/0x6f0 [ 18.882378] ? trace_preempt_on+0x20/0xc0 [ 18.882409] ? __pfx_kthread+0x10/0x10 [ 18.882431] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.882458] ? calculate_sigpending+0x7b/0xa0 [ 18.882485] ? __pfx_kthread+0x10/0x10 [ 18.882508] ret_from_fork+0x41/0x80 [ 18.882531] ? __pfx_kthread+0x10/0x10 [ 18.882554] ret_from_fork_asm+0x1a/0x30 [ 18.882591] </TASK> [ 18.882605] [ 18.892330] Allocated by task 286: [ 18.892713] kasan_save_stack+0x45/0x70 [ 18.893134] kasan_save_track+0x18/0x40 [ 18.893536] kasan_save_alloc_info+0x3b/0x50 [ 18.893928] __kasan_kmalloc+0xb7/0xc0 [ 18.894350] __kmalloc_cache_noprof+0x189/0x420 [ 18.894748] kasan_atomics+0x95/0x310 [ 18.895098] kunit_try_run_case+0x1a5/0x480 [ 18.895484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.895928] kthread+0x337/0x6f0 [ 18.896256] ret_from_fork+0x41/0x80 [ 18.896514] ret_from_fork_asm+0x1a/0x30 [ 18.896723] [ 18.896843] The buggy address belongs to the object at ffff888102b21f80 [ 18.896843] which belongs to the cache kmalloc-64 of size 64 [ 18.898046] The buggy address is located 0 bytes to the right of [ 18.898046] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.898787] [ 18.898951] The buggy address belongs to the physical page: [ 18.899291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.899840] flags: 0x200000000000000(node=0|zone=2) [ 18.900270] page_type: f5(slab) [ 18.900486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.900780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.901069] page dumped because: kasan: bad access detected [ 18.901579] [ 18.901777] Memory state around the buggy address: [ 18.902219] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.902800] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.903503] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.904043] ^ [ 18.904394] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.904672] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.904938] ================================================================== [ 19.290049] ================================================================== [ 19.290469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 19.291864] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.292535] [ 19.292780] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.292890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.292920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.292971] Call Trace: [ 19.293031] <TASK> [ 19.293082] dump_stack_lvl+0x73/0xb0 [ 19.293161] print_report+0xd1/0x650 [ 19.293193] ? __virt_addr_valid+0x1db/0x2d0 [ 19.293224] ? kasan_atomics_helper+0x4f71/0x5450 [ 19.293251] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.293281] ? kasan_atomics_helper+0x4f71/0x5450 [ 19.293308] kasan_report+0x141/0x180 [ 19.293354] ? kasan_atomics_helper+0x4f71/0x5450 [ 19.293392] __asan_report_load8_noabort+0x18/0x20 [ 19.293421] kasan_atomics_helper+0x4f71/0x5450 [ 19.293450] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.293478] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.293506] ? kasan_atomics+0x152/0x310 [ 19.293534] kasan_atomics+0x1dc/0x310 [ 19.293559] ? __pfx_kasan_atomics+0x10/0x10 [ 19.293585] ? __pfx_read_tsc+0x10/0x10 [ 19.293610] ? ktime_get_ts64+0x86/0x230 [ 19.293643] kunit_try_run_case+0x1a5/0x480 [ 19.293675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.293702] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.293732] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.293761] ? __kthread_parkme+0x82/0x180 [ 19.293789] ? preempt_count_sub+0x50/0x80 [ 19.293820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.293849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.293879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.293909] kthread+0x337/0x6f0 [ 19.293931] ? trace_preempt_on+0x20/0xc0 [ 19.293960] ? __pfx_kthread+0x10/0x10 [ 19.293983] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.294010] ? calculate_sigpending+0x7b/0xa0 [ 19.294038] ? __pfx_kthread+0x10/0x10 [ 19.294062] ret_from_fork+0x41/0x80 [ 19.294096] ? __pfx_kthread+0x10/0x10 [ 19.294119] ret_from_fork_asm+0x1a/0x30 [ 19.294156] </TASK> [ 19.294170] [ 19.305161] Allocated by task 286: [ 19.305516] kasan_save_stack+0x45/0x70 [ 19.305901] kasan_save_track+0x18/0x40 [ 19.306222] kasan_save_alloc_info+0x3b/0x50 [ 19.306656] __kasan_kmalloc+0xb7/0xc0 [ 19.306894] __kmalloc_cache_noprof+0x189/0x420 [ 19.307151] kasan_atomics+0x95/0x310 [ 19.307369] kunit_try_run_case+0x1a5/0x480 [ 19.307747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.308175] kthread+0x337/0x6f0 [ 19.308523] ret_from_fork+0x41/0x80 [ 19.308880] ret_from_fork_asm+0x1a/0x30 [ 19.309292] [ 19.309508] The buggy address belongs to the object at ffff888102b21f80 [ 19.309508] which belongs to the cache kmalloc-64 of size 64 [ 19.310327] The buggy address is located 0 bytes to the right of [ 19.310327] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.310801] [ 19.311000] The buggy address belongs to the physical page: [ 19.311573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.312130] flags: 0x200000000000000(node=0|zone=2) [ 19.312382] page_type: f5(slab) [ 19.312625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.312956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.313546] page dumped because: kasan: bad access detected [ 19.314003] [ 19.314187] Memory state around the buggy address: [ 19.314641] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.315234] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.315601] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.315884] ^ [ 19.316372] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.316935] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.317657] ================================================================== [ 19.437897] ================================================================== [ 19.438609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 19.439192] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.439700] [ 19.439926] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.440061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.440109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.440160] Call Trace: [ 19.440210] <TASK> [ 19.440258] dump_stack_lvl+0x73/0xb0 [ 19.440329] print_report+0xd1/0x650 [ 19.440401] ? __virt_addr_valid+0x1db/0x2d0 [ 19.440478] ? kasan_atomics_helper+0x218a/0x5450 [ 19.440531] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.440600] ? kasan_atomics_helper+0x218a/0x5450 [ 19.440658] kasan_report+0x141/0x180 [ 19.440724] ? kasan_atomics_helper+0x218a/0x5450 [ 19.440801] kasan_check_range+0x10c/0x1c0 [ 19.440869] __kasan_check_write+0x18/0x20 [ 19.440928] kasan_atomics_helper+0x218a/0x5450 [ 19.440988] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.441068] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.441121] ? kasan_atomics+0x152/0x310 [ 19.441171] kasan_atomics+0x1dc/0x310 [ 19.441216] ? __pfx_kasan_atomics+0x10/0x10 [ 19.441273] ? __pfx_read_tsc+0x10/0x10 [ 19.441378] ? ktime_get_ts64+0x86/0x230 [ 19.441445] kunit_try_run_case+0x1a5/0x480 [ 19.441510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.441567] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.441621] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.441681] ? __kthread_parkme+0x82/0x180 [ 19.441738] ? preempt_count_sub+0x50/0x80 [ 19.441802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.441862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.441926] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.441988] kthread+0x337/0x6f0 [ 19.442036] ? trace_preempt_on+0x20/0xc0 [ 19.442103] ? __pfx_kthread+0x10/0x10 [ 19.442168] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.442218] ? calculate_sigpending+0x7b/0xa0 [ 19.442271] ? __pfx_kthread+0x10/0x10 [ 19.442318] ret_from_fork+0x41/0x80 [ 19.442386] ? __pfx_kthread+0x10/0x10 [ 19.442425] ret_from_fork_asm+0x1a/0x30 [ 19.442488] </TASK> [ 19.442516] [ 19.455187] Allocated by task 286: [ 19.455609] kasan_save_stack+0x45/0x70 [ 19.456157] kasan_save_track+0x18/0x40 [ 19.456526] kasan_save_alloc_info+0x3b/0x50 [ 19.456908] __kasan_kmalloc+0xb7/0xc0 [ 19.457794] __kmalloc_cache_noprof+0x189/0x420 [ 19.458615] kasan_atomics+0x95/0x310 [ 19.458803] kunit_try_run_case+0x1a5/0x480 [ 19.459245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.459692] kthread+0x337/0x6f0 [ 19.460051] ret_from_fork+0x41/0x80 [ 19.460310] ret_from_fork_asm+0x1a/0x30 [ 19.460781] [ 19.461027] The buggy address belongs to the object at ffff888102b21f80 [ 19.461027] which belongs to the cache kmalloc-64 of size 64 [ 19.462052] The buggy address is located 0 bytes to the right of [ 19.462052] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.462989] [ 19.463449] The buggy address belongs to the physical page: [ 19.463776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.464478] flags: 0x200000000000000(node=0|zone=2) [ 19.464873] page_type: f5(slab) [ 19.465398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.465970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.466583] page dumped because: kasan: bad access detected [ 19.466947] [ 19.467103] Memory state around the buggy address: [ 19.467855] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.468417] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.469035] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.469735] ^ [ 19.470015] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.470798] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.471253] ================================================================== [ 18.535157] ================================================================== [ 18.535492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 18.535895] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.536673] [ 18.536908] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.537052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.537097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.537146] Call Trace: [ 18.537194] <TASK> [ 18.537250] dump_stack_lvl+0x73/0xb0 [ 18.537350] print_report+0xd1/0x650 [ 18.537412] ? __virt_addr_valid+0x1db/0x2d0 [ 18.537471] ? kasan_atomics_helper+0x12e6/0x5450 [ 18.537522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.537578] ? kasan_atomics_helper+0x12e6/0x5450 [ 18.537632] kasan_report+0x141/0x180 [ 18.537698] ? kasan_atomics_helper+0x12e6/0x5450 [ 18.537781] kasan_check_range+0x10c/0x1c0 [ 18.537836] __kasan_check_write+0x18/0x20 [ 18.537894] kasan_atomics_helper+0x12e6/0x5450 [ 18.537954] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.538028] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.538104] ? kasan_atomics+0x152/0x310 [ 18.538159] kasan_atomics+0x1dc/0x310 [ 18.538221] ? __pfx_kasan_atomics+0x10/0x10 [ 18.538290] ? __pfx_read_tsc+0x10/0x10 [ 18.538328] ? ktime_get_ts64+0x86/0x230 [ 18.538389] kunit_try_run_case+0x1a5/0x480 [ 18.538429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.538461] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.538512] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.538559] ? __kthread_parkme+0x82/0x180 [ 18.538604] ? preempt_count_sub+0x50/0x80 [ 18.538661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.538723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.538794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.538854] kthread+0x337/0x6f0 [ 18.538893] ? trace_preempt_on+0x20/0xc0 [ 18.538947] ? __pfx_kthread+0x10/0x10 [ 18.539000] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.539064] ? calculate_sigpending+0x7b/0xa0 [ 18.539114] ? __pfx_kthread+0x10/0x10 [ 18.539160] ret_from_fork+0x41/0x80 [ 18.539203] ? __pfx_kthread+0x10/0x10 [ 18.539245] ret_from_fork_asm+0x1a/0x30 [ 18.539317] </TASK> [ 18.539367] [ 18.550015] Allocated by task 286: [ 18.550380] kasan_save_stack+0x45/0x70 [ 18.550631] kasan_save_track+0x18/0x40 [ 18.550841] kasan_save_alloc_info+0x3b/0x50 [ 18.551298] __kasan_kmalloc+0xb7/0xc0 [ 18.551664] __kmalloc_cache_noprof+0x189/0x420 [ 18.552021] kasan_atomics+0x95/0x310 [ 18.552387] kunit_try_run_case+0x1a5/0x480 [ 18.552686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.553095] kthread+0x337/0x6f0 [ 18.553392] ret_from_fork+0x41/0x80 [ 18.553657] ret_from_fork_asm+0x1a/0x30 [ 18.554012] [ 18.554271] The buggy address belongs to the object at ffff888102b21f80 [ 18.554271] which belongs to the cache kmalloc-64 of size 64 [ 18.554935] The buggy address is located 0 bytes to the right of [ 18.554935] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.555570] [ 18.555779] The buggy address belongs to the physical page: [ 18.556216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.556702] flags: 0x200000000000000(node=0|zone=2) [ 18.557035] page_type: f5(slab) [ 18.557396] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.557868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.558530] page dumped because: kasan: bad access detected [ 18.558849] [ 18.559032] Memory state around the buggy address: [ 18.559368] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.559828] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.560144] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.560709] ^ [ 18.560932] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.561219] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.561496] ================================================================== [ 17.618457] ================================================================== [ 17.618749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 17.619621] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.620923] [ 17.621436] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.621573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.621602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.621651] Call Trace: [ 17.621953] <TASK> [ 17.622037] dump_stack_lvl+0x73/0xb0 [ 17.622263] print_report+0xd1/0x650 [ 17.622328] ? __virt_addr_valid+0x1db/0x2d0 [ 17.622403] ? kasan_atomics_helper+0x4b6e/0x5450 [ 17.622456] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.622543] ? kasan_atomics_helper+0x4b6e/0x5450 [ 17.622610] kasan_report+0x141/0x180 [ 17.622693] ? kasan_atomics_helper+0x4b6e/0x5450 [ 17.622776] __asan_report_store4_noabort+0x1b/0x30 [ 17.622838] kasan_atomics_helper+0x4b6e/0x5450 [ 17.622898] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.622940] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.622968] ? kasan_atomics+0x152/0x310 [ 17.622997] kasan_atomics+0x1dc/0x310 [ 17.623021] ? __pfx_kasan_atomics+0x10/0x10 [ 17.623047] ? __pfx_read_tsc+0x10/0x10 [ 17.623119] ? ktime_get_ts64+0x86/0x230 [ 17.623155] kunit_try_run_case+0x1a5/0x480 [ 17.623185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.623212] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.623242] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.623270] ? __kthread_parkme+0x82/0x180 [ 17.623297] ? preempt_count_sub+0x50/0x80 [ 17.623327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.623377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.623408] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.623438] kthread+0x337/0x6f0 [ 17.623459] ? trace_preempt_on+0x20/0xc0 [ 17.623488] ? __pfx_kthread+0x10/0x10 [ 17.623512] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.623539] ? calculate_sigpending+0x7b/0xa0 [ 17.623567] ? __pfx_kthread+0x10/0x10 [ 17.623590] ret_from_fork+0x41/0x80 [ 17.623615] ? __pfx_kthread+0x10/0x10 [ 17.623637] ret_from_fork_asm+0x1a/0x30 [ 17.623674] </TASK> [ 17.623690] [ 17.637101] Allocated by task 286: [ 17.637480] kasan_save_stack+0x45/0x70 [ 17.637827] kasan_save_track+0x18/0x40 [ 17.638232] kasan_save_alloc_info+0x3b/0x50 [ 17.638477] __kasan_kmalloc+0xb7/0xc0 [ 17.638677] __kmalloc_cache_noprof+0x189/0x420 [ 17.638892] kasan_atomics+0x95/0x310 [ 17.639327] kunit_try_run_case+0x1a5/0x480 [ 17.640186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.640691] kthread+0x337/0x6f0 [ 17.641019] ret_from_fork+0x41/0x80 [ 17.641824] ret_from_fork_asm+0x1a/0x30 [ 17.642039] [ 17.643667] The buggy address belongs to the object at ffff888102b21f80 [ 17.643667] which belongs to the cache kmalloc-64 of size 64 [ 17.645681] The buggy address is located 0 bytes to the right of [ 17.645681] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.646637] [ 17.646765] The buggy address belongs to the physical page: [ 17.646970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.649359] flags: 0x200000000000000(node=0|zone=2) [ 17.650195] page_type: f5(slab) [ 17.650800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.652404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.652911] page dumped because: kasan: bad access detected [ 17.653665] [ 17.653794] Memory state around the buggy address: [ 17.654294] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.654981] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.655359] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.656106] ^ [ 17.656465] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.656943] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.657392] ================================================================== [ 18.354022] ================================================================== [ 18.354734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 18.356040] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.356390] [ 18.356562] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.356672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.356702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.356752] Call Trace: [ 18.356801] <TASK> [ 18.356850] dump_stack_lvl+0x73/0xb0 [ 18.356921] print_report+0xd1/0x650 [ 18.356979] ? __virt_addr_valid+0x1db/0x2d0 [ 18.357044] ? kasan_atomics_helper+0x1079/0x5450 [ 18.357096] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.357150] ? kasan_atomics_helper+0x1079/0x5450 [ 18.357197] kasan_report+0x141/0x180 [ 18.357252] ? kasan_atomics_helper+0x1079/0x5450 [ 18.357312] kasan_check_range+0x10c/0x1c0 [ 18.357380] __kasan_check_write+0x18/0x20 [ 18.357432] kasan_atomics_helper+0x1079/0x5450 [ 18.357494] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.357554] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.357669] ? kasan_atomics+0x152/0x310 [ 18.357728] kasan_atomics+0x1dc/0x310 [ 18.357771] ? __pfx_kasan_atomics+0x10/0x10 [ 18.357820] ? __pfx_read_tsc+0x10/0x10 [ 18.357871] ? ktime_get_ts64+0x86/0x230 [ 18.357939] kunit_try_run_case+0x1a5/0x480 [ 18.358003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.358058] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.358116] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.358176] ? __kthread_parkme+0x82/0x180 [ 18.358233] ? preempt_count_sub+0x50/0x80 [ 18.358296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.358375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.358441] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.358504] kthread+0x337/0x6f0 [ 18.358549] ? trace_preempt_on+0x20/0xc0 [ 18.358605] ? __pfx_kthread+0x10/0x10 [ 18.358633] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.358660] ? calculate_sigpending+0x7b/0xa0 [ 18.358685] ? __pfx_kthread+0x10/0x10 [ 18.358707] ret_from_fork+0x41/0x80 [ 18.358733] ? __pfx_kthread+0x10/0x10 [ 18.358755] ret_from_fork_asm+0x1a/0x30 [ 18.358792] </TASK> [ 18.358807] [ 18.369796] Allocated by task 286: [ 18.370172] kasan_save_stack+0x45/0x70 [ 18.370601] kasan_save_track+0x18/0x40 [ 18.370929] kasan_save_alloc_info+0x3b/0x50 [ 18.371218] __kasan_kmalloc+0xb7/0xc0 [ 18.371515] __kmalloc_cache_noprof+0x189/0x420 [ 18.371734] kasan_atomics+0x95/0x310 [ 18.371920] kunit_try_run_case+0x1a5/0x480 [ 18.372204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.372670] kthread+0x337/0x6f0 [ 18.372970] ret_from_fork+0x41/0x80 [ 18.373413] ret_from_fork_asm+0x1a/0x30 [ 18.373771] [ 18.373973] The buggy address belongs to the object at ffff888102b21f80 [ 18.373973] which belongs to the cache kmalloc-64 of size 64 [ 18.374508] The buggy address is located 0 bytes to the right of [ 18.374508] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.374941] [ 18.375065] The buggy address belongs to the physical page: [ 18.375294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.375971] flags: 0x200000000000000(node=0|zone=2) [ 18.376474] page_type: f5(slab) [ 18.376837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.377600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.378196] page dumped because: kasan: bad access detected [ 18.378616] [ 18.378767] Memory state around the buggy address: [ 18.378986] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.379257] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.379818] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.380358] ^ [ 18.380753] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.381043] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.381310] ================================================================== [ 18.847436] ================================================================== [ 18.848025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 18.848463] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.849117] [ 18.849413] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.849527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.849559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.849610] Call Trace: [ 18.849658] <TASK> [ 18.849709] dump_stack_lvl+0x73/0xb0 [ 18.849773] print_report+0xd1/0x650 [ 18.849868] ? __virt_addr_valid+0x1db/0x2d0 [ 18.849974] ? kasan_atomics_helper+0x177f/0x5450 [ 18.850020] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.850118] ? kasan_atomics_helper+0x177f/0x5450 [ 18.850170] kasan_report+0x141/0x180 [ 18.850214] ? kasan_atomics_helper+0x177f/0x5450 [ 18.850264] kasan_check_range+0x10c/0x1c0 [ 18.850307] __kasan_check_write+0x18/0x20 [ 18.850363] kasan_atomics_helper+0x177f/0x5450 [ 18.850408] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.850455] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.850506] ? kasan_atomics+0x152/0x310 [ 18.850589] kasan_atomics+0x1dc/0x310 [ 18.850651] ? __pfx_kasan_atomics+0x10/0x10 [ 18.850704] ? __pfx_read_tsc+0x10/0x10 [ 18.850754] ? ktime_get_ts64+0x86/0x230 [ 18.850819] kunit_try_run_case+0x1a5/0x480 [ 18.850880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.850928] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.850960] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.850990] ? __kthread_parkme+0x82/0x180 [ 18.851017] ? preempt_count_sub+0x50/0x80 [ 18.851047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.851115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.851171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.851253] kthread+0x337/0x6f0 [ 18.851384] ? trace_preempt_on+0x20/0xc0 [ 18.851457] ? __pfx_kthread+0x10/0x10 [ 18.851506] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.851561] ? calculate_sigpending+0x7b/0xa0 [ 18.851609] ? __pfx_kthread+0x10/0x10 [ 18.851643] ret_from_fork+0x41/0x80 [ 18.851670] ? __pfx_kthread+0x10/0x10 [ 18.851693] ret_from_fork_asm+0x1a/0x30 [ 18.851732] </TASK> [ 18.851747] [ 18.863520] Allocated by task 286: [ 18.863826] kasan_save_stack+0x45/0x70 [ 18.864272] kasan_save_track+0x18/0x40 [ 18.864760] kasan_save_alloc_info+0x3b/0x50 [ 18.865040] __kasan_kmalloc+0xb7/0xc0 [ 18.866325] __kmalloc_cache_noprof+0x189/0x420 [ 18.866781] kasan_atomics+0x95/0x310 [ 18.867004] kunit_try_run_case+0x1a5/0x480 [ 18.867252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.867538] kthread+0x337/0x6f0 [ 18.867734] ret_from_fork+0x41/0x80 [ 18.867940] ret_from_fork_asm+0x1a/0x30 [ 18.868398] [ 18.868663] The buggy address belongs to the object at ffff888102b21f80 [ 18.868663] which belongs to the cache kmalloc-64 of size 64 [ 18.869023] The buggy address is located 0 bytes to the right of [ 18.869023] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.870676] [ 18.870820] The buggy address belongs to the physical page: [ 18.871104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.872179] flags: 0x200000000000000(node=0|zone=2) [ 18.872641] page_type: f5(slab) [ 18.872975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.873464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.873955] page dumped because: kasan: bad access detected [ 18.874362] [ 18.874556] Memory state around the buggy address: [ 18.874891] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.875354] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.875793] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.876275] ^ [ 18.876622] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.877109] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.877548] ================================================================== [ 17.783135] ================================================================== [ 17.783620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 17.784430] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.784853] [ 17.785109] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.785226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.785258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.785355] Call Trace: [ 17.785405] <TASK> [ 17.785482] dump_stack_lvl+0x73/0xb0 [ 17.785574] print_report+0xd1/0x650 [ 17.785637] ? __virt_addr_valid+0x1db/0x2d0 [ 17.785692] ? kasan_atomics_helper+0x565/0x5450 [ 17.785746] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.785840] ? kasan_atomics_helper+0x565/0x5450 [ 17.785937] kasan_report+0x141/0x180 [ 17.786013] ? kasan_atomics_helper+0x565/0x5450 [ 17.786095] kasan_check_range+0x10c/0x1c0 [ 17.786146] __kasan_check_write+0x18/0x20 [ 17.786196] kasan_atomics_helper+0x565/0x5450 [ 17.786253] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.786312] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.786382] ? kasan_atomics+0x152/0x310 [ 17.786453] kasan_atomics+0x1dc/0x310 [ 17.786499] ? __pfx_kasan_atomics+0x10/0x10 [ 17.786560] ? __pfx_read_tsc+0x10/0x10 [ 17.786609] ? ktime_get_ts64+0x86/0x230 [ 17.786690] kunit_try_run_case+0x1a5/0x480 [ 17.786752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.786780] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.786812] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.786840] ? __kthread_parkme+0x82/0x180 [ 17.786867] ? preempt_count_sub+0x50/0x80 [ 17.786897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.786925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.786953] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.786982] kthread+0x337/0x6f0 [ 17.787002] ? trace_preempt_on+0x20/0xc0 [ 17.787030] ? __pfx_kthread+0x10/0x10 [ 17.787052] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.787100] ? calculate_sigpending+0x7b/0xa0 [ 17.787127] ? __pfx_kthread+0x10/0x10 [ 17.787149] ret_from_fork+0x41/0x80 [ 17.787173] ? __pfx_kthread+0x10/0x10 [ 17.787194] ret_from_fork_asm+0x1a/0x30 [ 17.787231] </TASK> [ 17.787246] [ 17.797918] Allocated by task 286: [ 17.798695] kasan_save_stack+0x45/0x70 [ 17.799799] kasan_save_track+0x18/0x40 [ 17.800258] kasan_save_alloc_info+0x3b/0x50 [ 17.800695] __kasan_kmalloc+0xb7/0xc0 [ 17.801039] __kmalloc_cache_noprof+0x189/0x420 [ 17.801525] kasan_atomics+0x95/0x310 [ 17.801754] kunit_try_run_case+0x1a5/0x480 [ 17.801975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.802635] kthread+0x337/0x6f0 [ 17.802964] ret_from_fork+0x41/0x80 [ 17.803379] ret_from_fork_asm+0x1a/0x30 [ 17.803783] [ 17.803993] The buggy address belongs to the object at ffff888102b21f80 [ 17.803993] which belongs to the cache kmalloc-64 of size 64 [ 17.804511] The buggy address is located 0 bytes to the right of [ 17.804511] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.805365] [ 17.805642] The buggy address belongs to the physical page: [ 17.806163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.806668] flags: 0x200000000000000(node=0|zone=2) [ 17.806903] page_type: f5(slab) [ 17.807266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.807914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.808452] page dumped because: kasan: bad access detected [ 17.808948] [ 17.809142] Memory state around the buggy address: [ 17.809413] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.809997] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.810806] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.811362] ^ [ 17.811669] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.812131] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.812749] ================================================================== [ 17.965103] ================================================================== [ 17.965753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 17.966542] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.967063] [ 17.967282] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.967397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.967430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.967478] Call Trace: [ 17.967526] <TASK> [ 17.967570] dump_stack_lvl+0x73/0xb0 [ 17.967634] print_report+0xd1/0x650 [ 17.967690] ? __virt_addr_valid+0x1db/0x2d0 [ 17.967748] ? kasan_atomics_helper+0x8f9/0x5450 [ 17.967806] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.967866] ? kasan_atomics_helper+0x8f9/0x5450 [ 17.967923] kasan_report+0x141/0x180 [ 17.967980] ? kasan_atomics_helper+0x8f9/0x5450 [ 17.968047] kasan_check_range+0x10c/0x1c0 [ 17.968107] __kasan_check_write+0x18/0x20 [ 17.968154] kasan_atomics_helper+0x8f9/0x5450 [ 17.968212] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.968269] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.968326] ? kasan_atomics+0x152/0x310 [ 17.968404] kasan_atomics+0x1dc/0x310 [ 17.968456] ? __pfx_kasan_atomics+0x10/0x10 [ 17.968512] ? __pfx_read_tsc+0x10/0x10 [ 17.968566] ? ktime_get_ts64+0x86/0x230 [ 17.968625] kunit_try_run_case+0x1a5/0x480 [ 17.968688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.968744] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.968806] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.968859] ? __kthread_parkme+0x82/0x180 [ 17.968916] ? preempt_count_sub+0x50/0x80 [ 17.968981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.969050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.969112] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.969176] kthread+0x337/0x6f0 [ 17.969225] ? trace_preempt_on+0x20/0xc0 [ 17.969284] ? __pfx_kthread+0x10/0x10 [ 17.969348] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.969409] ? calculate_sigpending+0x7b/0xa0 [ 17.969470] ? __pfx_kthread+0x10/0x10 [ 17.969520] ret_from_fork+0x41/0x80 [ 17.969570] ? __pfx_kthread+0x10/0x10 [ 17.969611] ret_from_fork_asm+0x1a/0x30 [ 17.969671] </TASK> [ 17.969696] [ 17.979667] Allocated by task 286: [ 17.979878] kasan_save_stack+0x45/0x70 [ 17.980107] kasan_save_track+0x18/0x40 [ 17.980466] kasan_save_alloc_info+0x3b/0x50 [ 17.980814] __kasan_kmalloc+0xb7/0xc0 [ 17.981156] __kmalloc_cache_noprof+0x189/0x420 [ 17.981588] kasan_atomics+0x95/0x310 [ 17.981838] kunit_try_run_case+0x1a5/0x480 [ 17.982100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.982386] kthread+0x337/0x6f0 [ 17.982573] ret_from_fork+0x41/0x80 [ 17.982766] ret_from_fork_asm+0x1a/0x30 [ 17.982962] [ 17.983083] The buggy address belongs to the object at ffff888102b21f80 [ 17.983083] which belongs to the cache kmalloc-64 of size 64 [ 17.984309] The buggy address is located 0 bytes to the right of [ 17.984309] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.985278] [ 17.985432] The buggy address belongs to the physical page: [ 17.985674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.985982] flags: 0x200000000000000(node=0|zone=2) [ 17.986528] page_type: f5(slab) [ 17.986814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.987441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.987979] page dumped because: kasan: bad access detected [ 17.988418] [ 17.988537] Memory state around the buggy address: [ 17.988757] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.989039] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.989600] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.990301] ^ [ 17.990706] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.991108] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.991466] ================================================================== [ 19.156984] ================================================================== [ 19.158025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 19.158587] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.159458] [ 19.159631] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.159735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.159766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.159799] Call Trace: [ 19.159832] <TASK> [ 19.159863] dump_stack_lvl+0x73/0xb0 [ 19.159902] print_report+0xd1/0x650 [ 19.159931] ? __virt_addr_valid+0x1db/0x2d0 [ 19.159960] ? kasan_atomics_helper+0x1d7a/0x5450 [ 19.159987] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.160014] ? kasan_atomics_helper+0x1d7a/0x5450 [ 19.160042] kasan_report+0x141/0x180 [ 19.160371] ? kasan_atomics_helper+0x1d7a/0x5450 [ 19.160481] kasan_check_range+0x10c/0x1c0 [ 19.160534] __kasan_check_write+0x18/0x20 [ 19.160585] kasan_atomics_helper+0x1d7a/0x5450 [ 19.160674] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.160732] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.160782] ? kasan_atomics+0x152/0x310 [ 19.160835] kasan_atomics+0x1dc/0x310 [ 19.160885] ? __pfx_kasan_atomics+0x10/0x10 [ 19.160935] ? __pfx_read_tsc+0x10/0x10 [ 19.160979] ? ktime_get_ts64+0x86/0x230 [ 19.161055] kunit_try_run_case+0x1a5/0x480 [ 19.161123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.161153] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.161186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.161214] ? __kthread_parkme+0x82/0x180 [ 19.161243] ? preempt_count_sub+0x50/0x80 [ 19.161307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.161359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.161391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.161422] kthread+0x337/0x6f0 [ 19.161444] ? trace_preempt_on+0x20/0xc0 [ 19.161472] ? __pfx_kthread+0x10/0x10 [ 19.161496] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.161522] ? calculate_sigpending+0x7b/0xa0 [ 19.161550] ? __pfx_kthread+0x10/0x10 [ 19.161573] ret_from_fork+0x41/0x80 [ 19.161599] ? __pfx_kthread+0x10/0x10 [ 19.161622] ret_from_fork_asm+0x1a/0x30 [ 19.161660] </TASK> [ 19.161676] [ 19.175577] Allocated by task 286: [ 19.175982] kasan_save_stack+0x45/0x70 [ 19.176434] kasan_save_track+0x18/0x40 [ 19.176846] kasan_save_alloc_info+0x3b/0x50 [ 19.177287] __kasan_kmalloc+0xb7/0xc0 [ 19.177679] __kmalloc_cache_noprof+0x189/0x420 [ 19.178105] kasan_atomics+0x95/0x310 [ 19.178365] kunit_try_run_case+0x1a5/0x480 [ 19.178898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.179146] kthread+0x337/0x6f0 [ 19.179581] ret_from_fork+0x41/0x80 [ 19.179916] ret_from_fork_asm+0x1a/0x30 [ 19.180385] [ 19.180584] The buggy address belongs to the object at ffff888102b21f80 [ 19.180584] which belongs to the cache kmalloc-64 of size 64 [ 19.181562] The buggy address is located 0 bytes to the right of [ 19.181562] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.182432] [ 19.182582] The buggy address belongs to the physical page: [ 19.182825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.183731] flags: 0x200000000000000(node=0|zone=2) [ 19.184022] page_type: f5(slab) [ 19.184468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.185053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.185520] page dumped because: kasan: bad access detected [ 19.186068] [ 19.186280] Memory state around the buggy address: [ 19.186854] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.187659] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.188010] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.188846] ^ [ 19.189165] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.189651] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.190372] ================================================================== [ 18.259487] ================================================================== [ 18.259857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 18.260876] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.261595] [ 18.261839] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.262033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.262081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.262130] Call Trace: [ 18.262180] <TASK> [ 18.262228] dump_stack_lvl+0x73/0xb0 [ 18.262303] print_report+0xd1/0x650 [ 18.262375] ? __virt_addr_valid+0x1db/0x2d0 [ 18.262431] ? kasan_atomics_helper+0xf10/0x5450 [ 18.262513] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.262591] ? kasan_atomics_helper+0xf10/0x5450 [ 18.262647] kasan_report+0x141/0x180 [ 18.262694] ? kasan_atomics_helper+0xf10/0x5450 [ 18.262757] kasan_check_range+0x10c/0x1c0 [ 18.262842] __kasan_check_write+0x18/0x20 [ 18.262909] kasan_atomics_helper+0xf10/0x5450 [ 18.262969] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.263031] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.263094] ? kasan_atomics+0x152/0x310 [ 18.263145] kasan_atomics+0x1dc/0x310 [ 18.263194] ? __pfx_kasan_atomics+0x10/0x10 [ 18.263273] ? __pfx_read_tsc+0x10/0x10 [ 18.263347] ? ktime_get_ts64+0x86/0x230 [ 18.263413] kunit_try_run_case+0x1a5/0x480 [ 18.263475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.263528] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.263589] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.263649] ? __kthread_parkme+0x82/0x180 [ 18.263705] ? preempt_count_sub+0x50/0x80 [ 18.263768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.263827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.263887] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.263949] kthread+0x337/0x6f0 [ 18.263980] ? trace_preempt_on+0x20/0xc0 [ 18.264017] ? __pfx_kthread+0x10/0x10 [ 18.264041] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.264073] ? calculate_sigpending+0x7b/0xa0 [ 18.264107] ? __pfx_kthread+0x10/0x10 [ 18.264129] ret_from_fork+0x41/0x80 [ 18.264154] ? __pfx_kthread+0x10/0x10 [ 18.264176] ret_from_fork_asm+0x1a/0x30 [ 18.264213] </TASK> [ 18.264228] [ 18.276769] Allocated by task 286: [ 18.277161] kasan_save_stack+0x45/0x70 [ 18.277639] kasan_save_track+0x18/0x40 [ 18.277974] kasan_save_alloc_info+0x3b/0x50 [ 18.278281] __kasan_kmalloc+0xb7/0xc0 [ 18.278672] __kmalloc_cache_noprof+0x189/0x420 [ 18.278981] kasan_atomics+0x95/0x310 [ 18.279401] kunit_try_run_case+0x1a5/0x480 [ 18.279732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.280198] kthread+0x337/0x6f0 [ 18.280516] ret_from_fork+0x41/0x80 [ 18.280854] ret_from_fork_asm+0x1a/0x30 [ 18.281261] [ 18.281543] The buggy address belongs to the object at ffff888102b21f80 [ 18.281543] which belongs to the cache kmalloc-64 of size 64 [ 18.282412] The buggy address is located 0 bytes to the right of [ 18.282412] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.283261] [ 18.283513] The buggy address belongs to the physical page: [ 18.283850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.284382] flags: 0x200000000000000(node=0|zone=2) [ 18.284842] page_type: f5(slab) [ 18.285263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.285818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.286353] page dumped because: kasan: bad access detected [ 18.286795] [ 18.287018] Memory state around the buggy address: [ 18.287445] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.287968] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.288637] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.289234] ^ [ 18.289678] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.290178] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.290857] ================================================================== [ 18.659453] ================================================================== [ 18.659867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 18.660377] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.661038] [ 18.661330] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.661477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.661512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.661561] Call Trace: [ 18.661612] <TASK> [ 18.661659] dump_stack_lvl+0x73/0xb0 [ 18.661727] print_report+0xd1/0x650 [ 18.661849] ? __virt_addr_valid+0x1db/0x2d0 [ 18.661896] ? kasan_atomics_helper+0x1467/0x5450 [ 18.661940] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.661988] ? kasan_atomics_helper+0x1467/0x5450 [ 18.662037] kasan_report+0x141/0x180 [ 18.662112] ? kasan_atomics_helper+0x1467/0x5450 [ 18.662177] kasan_check_range+0x10c/0x1c0 [ 18.662256] __kasan_check_write+0x18/0x20 [ 18.662306] kasan_atomics_helper+0x1467/0x5450 [ 18.662374] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.662425] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.662472] ? kasan_atomics+0x152/0x310 [ 18.662522] kasan_atomics+0x1dc/0x310 [ 18.662563] ? __pfx_kasan_atomics+0x10/0x10 [ 18.662608] ? __pfx_read_tsc+0x10/0x10 [ 18.662650] ? ktime_get_ts64+0x86/0x230 [ 18.662706] kunit_try_run_case+0x1a5/0x480 [ 18.662756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.662800] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.662852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.662903] ? __kthread_parkme+0x82/0x180 [ 18.662948] ? preempt_count_sub+0x50/0x80 [ 18.663004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.663056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.663104] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.663151] kthread+0x337/0x6f0 [ 18.663185] ? trace_preempt_on+0x20/0xc0 [ 18.663239] ? __pfx_kthread+0x10/0x10 [ 18.663289] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.663358] ? calculate_sigpending+0x7b/0xa0 [ 18.663412] ? __pfx_kthread+0x10/0x10 [ 18.663455] ret_from_fork+0x41/0x80 [ 18.664194] ? __pfx_kthread+0x10/0x10 [ 18.664250] ret_from_fork_asm+0x1a/0x30 [ 18.664319] </TASK> [ 18.664364] [ 18.674228] Allocated by task 286: [ 18.674465] kasan_save_stack+0x45/0x70 [ 18.674703] kasan_save_track+0x18/0x40 [ 18.674897] kasan_save_alloc_info+0x3b/0x50 [ 18.675217] __kasan_kmalloc+0xb7/0xc0 [ 18.675565] __kmalloc_cache_noprof+0x189/0x420 [ 18.675965] kasan_atomics+0x95/0x310 [ 18.676365] kunit_try_run_case+0x1a5/0x480 [ 18.676764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.676993] kthread+0x337/0x6f0 [ 18.677205] ret_from_fork+0x41/0x80 [ 18.677401] ret_from_fork_asm+0x1a/0x30 [ 18.677589] [ 18.677698] The buggy address belongs to the object at ffff888102b21f80 [ 18.677698] which belongs to the cache kmalloc-64 of size 64 [ 18.678117] The buggy address is located 0 bytes to the right of [ 18.678117] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.678564] [ 18.678706] The buggy address belongs to the physical page: [ 18.678942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.679493] flags: 0x200000000000000(node=0|zone=2) [ 18.679961] page_type: f5(slab) [ 18.680362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.680893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.681443] page dumped because: kasan: bad access detected [ 18.681937] [ 18.682194] Memory state around the buggy address: [ 18.682414] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.682781] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.683094] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.683375] ^ [ 18.683565] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.683818] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.684091] ================================================================== [ 19.319495] ================================================================== [ 19.320164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 19.320721] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.321033] [ 19.321268] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.321440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.321473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.321524] Call Trace: [ 19.321574] <TASK> [ 19.321624] dump_stack_lvl+0x73/0xb0 [ 19.321695] print_report+0xd1/0x650 [ 19.321756] ? __virt_addr_valid+0x1db/0x2d0 [ 19.321815] ? kasan_atomics_helper+0x2006/0x5450 [ 19.321872] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.321931] ? kasan_atomics_helper+0x2006/0x5450 [ 19.321989] kasan_report+0x141/0x180 [ 19.322045] ? kasan_atomics_helper+0x2006/0x5450 [ 19.322112] kasan_check_range+0x10c/0x1c0 [ 19.322167] __kasan_check_write+0x18/0x20 [ 19.322221] kasan_atomics_helper+0x2006/0x5450 [ 19.322282] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.322354] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.322404] ? kasan_atomics+0x152/0x310 [ 19.322456] kasan_atomics+0x1dc/0x310 [ 19.322493] ? __pfx_kasan_atomics+0x10/0x10 [ 19.322535] ? __pfx_read_tsc+0x10/0x10 [ 19.322580] ? ktime_get_ts64+0x86/0x230 [ 19.322638] kunit_try_run_case+0x1a5/0x480 [ 19.322728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.322799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.322861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.322940] ? __kthread_parkme+0x82/0x180 [ 19.323006] ? preempt_count_sub+0x50/0x80 [ 19.323095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.323152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.323210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.323269] kthread+0x337/0x6f0 [ 19.323312] ? trace_preempt_on+0x20/0xc0 [ 19.323390] ? __pfx_kthread+0x10/0x10 [ 19.323440] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.323496] ? calculate_sigpending+0x7b/0xa0 [ 19.323545] ? __pfx_kthread+0x10/0x10 [ 19.323594] ret_from_fork+0x41/0x80 [ 19.323647] ? __pfx_kthread+0x10/0x10 [ 19.323695] ret_from_fork_asm+0x1a/0x30 [ 19.323770] </TASK> [ 19.323798] [ 19.337710] Allocated by task 286: [ 19.338081] kasan_save_stack+0x45/0x70 [ 19.338547] kasan_save_track+0x18/0x40 [ 19.338861] kasan_save_alloc_info+0x3b/0x50 [ 19.339103] __kasan_kmalloc+0xb7/0xc0 [ 19.339538] __kmalloc_cache_noprof+0x189/0x420 [ 19.340617] kasan_atomics+0x95/0x310 [ 19.340967] kunit_try_run_case+0x1a5/0x480 [ 19.341498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.341846] kthread+0x337/0x6f0 [ 19.342069] ret_from_fork+0x41/0x80 [ 19.342316] ret_from_fork_asm+0x1a/0x30 [ 19.342547] [ 19.342700] The buggy address belongs to the object at ffff888102b21f80 [ 19.342700] which belongs to the cache kmalloc-64 of size 64 [ 19.343298] The buggy address is located 0 bytes to the right of [ 19.343298] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.343818] [ 19.343948] The buggy address belongs to the physical page: [ 19.344179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.344818] flags: 0x200000000000000(node=0|zone=2) [ 19.345267] page_type: f5(slab) [ 19.345714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.346300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.346909] page dumped because: kasan: bad access detected [ 19.347283] [ 19.347424] Memory state around the buggy address: [ 19.347643] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.347910] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.348445] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.349213] ^ [ 19.350055] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.350912] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.351510] ================================================================== [ 19.380876] ================================================================== [ 19.382024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 19.382473] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.382969] [ 19.383214] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.383311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.383355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.383419] Call Trace: [ 19.383481] <TASK> [ 19.383531] dump_stack_lvl+0x73/0xb0 [ 19.383621] print_report+0xd1/0x650 [ 19.383690] ? __virt_addr_valid+0x1db/0x2d0 [ 19.383757] ? kasan_atomics_helper+0x20c8/0x5450 [ 19.383813] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.383879] ? kasan_atomics_helper+0x20c8/0x5450 [ 19.383943] kasan_report+0x141/0x180 [ 19.383994] ? kasan_atomics_helper+0x20c8/0x5450 [ 19.384053] kasan_check_range+0x10c/0x1c0 [ 19.384109] __kasan_check_write+0x18/0x20 [ 19.384156] kasan_atomics_helper+0x20c8/0x5450 [ 19.384214] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.384270] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.384325] ? kasan_atomics+0x152/0x310 [ 19.384405] kasan_atomics+0x1dc/0x310 [ 19.384459] ? __pfx_kasan_atomics+0x10/0x10 [ 19.384517] ? __pfx_read_tsc+0x10/0x10 [ 19.384569] ? ktime_get_ts64+0x86/0x230 [ 19.384634] kunit_try_run_case+0x1a5/0x480 [ 19.384695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.384752] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.384813] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.384874] ? __kthread_parkme+0x82/0x180 [ 19.384930] ? preempt_count_sub+0x50/0x80 [ 19.384993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.385068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.385121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.385174] kthread+0x337/0x6f0 [ 19.385210] ? trace_preempt_on+0x20/0xc0 [ 19.385259] ? __pfx_kthread+0x10/0x10 [ 19.385302] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.385392] ? calculate_sigpending+0x7b/0xa0 [ 19.385450] ? __pfx_kthread+0x10/0x10 [ 19.385508] ret_from_fork+0x41/0x80 [ 19.385569] ? __pfx_kthread+0x10/0x10 [ 19.385619] ret_from_fork_asm+0x1a/0x30 [ 19.385701] </TASK> [ 19.385729] [ 19.396621] Allocated by task 286: [ 19.396927] kasan_save_stack+0x45/0x70 [ 19.397391] kasan_save_track+0x18/0x40 [ 19.397742] kasan_save_alloc_info+0x3b/0x50 [ 19.398048] __kasan_kmalloc+0xb7/0xc0 [ 19.398293] __kmalloc_cache_noprof+0x189/0x420 [ 19.398720] kasan_atomics+0x95/0x310 [ 19.398966] kunit_try_run_case+0x1a5/0x480 [ 19.399424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.399694] kthread+0x337/0x6f0 [ 19.399883] ret_from_fork+0x41/0x80 [ 19.400077] ret_from_fork_asm+0x1a/0x30 [ 19.400565] [ 19.400742] The buggy address belongs to the object at ffff888102b21f80 [ 19.400742] which belongs to the cache kmalloc-64 of size 64 [ 19.401746] The buggy address is located 0 bytes to the right of [ 19.401746] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.402272] [ 19.402437] The buggy address belongs to the physical page: [ 19.402707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.403060] flags: 0x200000000000000(node=0|zone=2) [ 19.403320] page_type: f5(slab) [ 19.403646] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.404237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.405038] page dumped because: kasan: bad access detected [ 19.405657] [ 19.405844] Memory state around the buggy address: [ 19.406227] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.406521] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.406798] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.407053] ^ [ 19.407466] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.408024] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.408511] ================================================================== [ 19.000731] ================================================================== [ 19.001097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 19.001686] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.003009] [ 19.003210] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.003298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.003326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.003394] Call Trace: [ 19.003441] <TASK> [ 19.003632] dump_stack_lvl+0x73/0xb0 [ 19.003682] print_report+0xd1/0x650 [ 19.003714] ? __virt_addr_valid+0x1db/0x2d0 [ 19.003743] ? kasan_atomics_helper+0x1a7f/0x5450 [ 19.003769] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.003797] ? kasan_atomics_helper+0x1a7f/0x5450 [ 19.003824] kasan_report+0x141/0x180 [ 19.003850] ? kasan_atomics_helper+0x1a7f/0x5450 [ 19.003881] kasan_check_range+0x10c/0x1c0 [ 19.003906] __kasan_check_write+0x18/0x20 [ 19.003930] kasan_atomics_helper+0x1a7f/0x5450 [ 19.003958] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.003985] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.004012] ? kasan_atomics+0x152/0x310 [ 19.004039] kasan_atomics+0x1dc/0x310 [ 19.004062] ? __pfx_kasan_atomics+0x10/0x10 [ 19.004100] ? __pfx_read_tsc+0x10/0x10 [ 19.004125] ? ktime_get_ts64+0x86/0x230 [ 19.004155] kunit_try_run_case+0x1a5/0x480 [ 19.004185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.004211] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.004240] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.004269] ? __kthread_parkme+0x82/0x180 [ 19.004295] ? preempt_count_sub+0x50/0x80 [ 19.004325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.004374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.004404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.004433] kthread+0x337/0x6f0 [ 19.004454] ? trace_preempt_on+0x20/0xc0 [ 19.004481] ? __pfx_kthread+0x10/0x10 [ 19.004503] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.004530] ? calculate_sigpending+0x7b/0xa0 [ 19.004555] ? __pfx_kthread+0x10/0x10 [ 19.004578] ret_from_fork+0x41/0x80 [ 19.004602] ? __pfx_kthread+0x10/0x10 [ 19.004623] ret_from_fork_asm+0x1a/0x30 [ 19.004658] </TASK> [ 19.004672] [ 19.017331] Allocated by task 286: [ 19.017726] kasan_save_stack+0x45/0x70 [ 19.018183] kasan_save_track+0x18/0x40 [ 19.018522] kasan_save_alloc_info+0x3b/0x50 [ 19.018913] __kasan_kmalloc+0xb7/0xc0 [ 19.019177] __kmalloc_cache_noprof+0x189/0x420 [ 19.019605] kasan_atomics+0x95/0x310 [ 19.019937] kunit_try_run_case+0x1a5/0x480 [ 19.020349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.020772] kthread+0x337/0x6f0 [ 19.021134] ret_from_fork+0x41/0x80 [ 19.021452] ret_from_fork_asm+0x1a/0x30 [ 19.021807] [ 19.021938] The buggy address belongs to the object at ffff888102b21f80 [ 19.021938] which belongs to the cache kmalloc-64 of size 64 [ 19.022412] The buggy address is located 0 bytes to the right of [ 19.022412] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.023407] [ 19.023601] The buggy address belongs to the physical page: [ 19.024038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.024616] flags: 0x200000000000000(node=0|zone=2) [ 19.024901] page_type: f5(slab) [ 19.025281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.025885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.026361] page dumped because: kasan: bad access detected [ 19.026743] [ 19.026948] Memory state around the buggy address: [ 19.027246] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.027732] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.028225] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.028732] ^ [ 19.028954] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.029281] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.029862] ================================================================== [ 19.353400] ================================================================== [ 19.353795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 19.354802] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.355169] [ 19.355465] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.355594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.355625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.355690] Call Trace: [ 19.355737] <TASK> [ 19.355782] dump_stack_lvl+0x73/0xb0 [ 19.355851] print_report+0xd1/0x650 [ 19.355909] ? __virt_addr_valid+0x1db/0x2d0 [ 19.355967] ? kasan_atomics_helper+0x4f98/0x5450 [ 19.356019] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.356093] ? kasan_atomics_helper+0x4f98/0x5450 [ 19.356147] kasan_report+0x141/0x180 [ 19.356206] ? kasan_atomics_helper+0x4f98/0x5450 [ 19.356284] __asan_report_load8_noabort+0x18/0x20 [ 19.356349] kasan_atomics_helper+0x4f98/0x5450 [ 19.356408] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.356464] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.356523] ? kasan_atomics+0x152/0x310 [ 19.356574] kasan_atomics+0x1dc/0x310 [ 19.356607] ? __pfx_kasan_atomics+0x10/0x10 [ 19.356642] ? __pfx_read_tsc+0x10/0x10 [ 19.356673] ? ktime_get_ts64+0x86/0x230 [ 19.356712] kunit_try_run_case+0x1a5/0x480 [ 19.356743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.356768] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.356799] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.356827] ? __kthread_parkme+0x82/0x180 [ 19.356854] ? preempt_count_sub+0x50/0x80 [ 19.356896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.356941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.356971] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.357000] kthread+0x337/0x6f0 [ 19.357034] ? trace_preempt_on+0x20/0xc0 [ 19.357069] ? __pfx_kthread+0x10/0x10 [ 19.357101] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.357129] ? calculate_sigpending+0x7b/0xa0 [ 19.357156] ? __pfx_kthread+0x10/0x10 [ 19.357179] ret_from_fork+0x41/0x80 [ 19.357204] ? __pfx_kthread+0x10/0x10 [ 19.357227] ret_from_fork_asm+0x1a/0x30 [ 19.357265] </TASK> [ 19.357282] [ 19.367417] Allocated by task 286: [ 19.367775] kasan_save_stack+0x45/0x70 [ 19.368134] kasan_save_track+0x18/0x40 [ 19.368547] kasan_save_alloc_info+0x3b/0x50 [ 19.368901] __kasan_kmalloc+0xb7/0xc0 [ 19.369215] __kmalloc_cache_noprof+0x189/0x420 [ 19.369555] kasan_atomics+0x95/0x310 [ 19.369904] kunit_try_run_case+0x1a5/0x480 [ 19.370136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.370594] kthread+0x337/0x6f0 [ 19.370852] ret_from_fork+0x41/0x80 [ 19.371194] ret_from_fork_asm+0x1a/0x30 [ 19.371562] [ 19.371710] The buggy address belongs to the object at ffff888102b21f80 [ 19.371710] which belongs to the cache kmalloc-64 of size 64 [ 19.372428] The buggy address is located 0 bytes to the right of [ 19.372428] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.373145] [ 19.373386] The buggy address belongs to the physical page: [ 19.373725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.374076] flags: 0x200000000000000(node=0|zone=2) [ 19.374362] page_type: f5(slab) [ 19.374588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.374923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.375235] page dumped because: kasan: bad access detected [ 19.375784] [ 19.375966] Memory state around the buggy address: [ 19.376382] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.376936] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.377620] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.378196] ^ [ 19.378623] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.379173] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.379717] ================================================================== [ 17.512967] ================================================================== [ 17.514506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 17.514956] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.515224] [ 17.516048] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.516133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.516149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.516176] Call Trace: [ 17.516194] <TASK> [ 17.516228] dump_stack_lvl+0x73/0xb0 [ 17.516282] print_report+0xd1/0x650 [ 17.516313] ? __virt_addr_valid+0x1db/0x2d0 [ 17.516363] ? kasan_atomics_helper+0x4bbc/0x5450 [ 17.516394] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.516420] ? kasan_atomics_helper+0x4bbc/0x5450 [ 17.516445] kasan_report+0x141/0x180 [ 17.516470] ? kasan_atomics_helper+0x4bbc/0x5450 [ 17.516499] __asan_report_load4_noabort+0x18/0x20 [ 17.516525] kasan_atomics_helper+0x4bbc/0x5450 [ 17.516552] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.516578] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.516605] ? kasan_atomics+0x152/0x310 [ 17.516632] kasan_atomics+0x1dc/0x310 [ 17.516653] ? __pfx_kasan_atomics+0x10/0x10 [ 17.516677] ? __pfx_read_tsc+0x10/0x10 [ 17.516701] ? ktime_get_ts64+0x86/0x230 [ 17.516732] kunit_try_run_case+0x1a5/0x480 [ 17.516762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.516786] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.516814] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.516841] ? __kthread_parkme+0x82/0x180 [ 17.516867] ? preempt_count_sub+0x50/0x80 [ 17.516896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.516922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.516949] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.516976] kthread+0x337/0x6f0 [ 17.516996] ? trace_preempt_on+0x20/0xc0 [ 17.517039] ? __pfx_kthread+0x10/0x10 [ 17.517065] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.517106] ? calculate_sigpending+0x7b/0xa0 [ 17.517149] ? __pfx_kthread+0x10/0x10 [ 17.517189] ret_from_fork+0x41/0x80 [ 17.517231] ? __pfx_kthread+0x10/0x10 [ 17.517272] ret_from_fork_asm+0x1a/0x30 [ 17.517346] </TASK> [ 17.517368] [ 17.531961] Allocated by task 286: [ 17.532406] kasan_save_stack+0x45/0x70 [ 17.532983] kasan_save_track+0x18/0x40 [ 17.533448] kasan_save_alloc_info+0x3b/0x50 [ 17.533901] __kasan_kmalloc+0xb7/0xc0 [ 17.534391] __kmalloc_cache_noprof+0x189/0x420 [ 17.534915] kasan_atomics+0x95/0x310 [ 17.535259] kunit_try_run_case+0x1a5/0x480 [ 17.535589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.535786] kthread+0x337/0x6f0 [ 17.535932] ret_from_fork+0x41/0x80 [ 17.536324] ret_from_fork_asm+0x1a/0x30 [ 17.536734] [ 17.536912] The buggy address belongs to the object at ffff888102b21f80 [ 17.536912] which belongs to the cache kmalloc-64 of size 64 [ 17.538073] The buggy address is located 0 bytes to the right of [ 17.538073] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.538946] [ 17.539247] The buggy address belongs to the physical page: [ 17.539792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.540980] flags: 0x200000000000000(node=0|zone=2) [ 17.541594] page_type: f5(slab) [ 17.541770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.542581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.543794] page dumped because: kasan: bad access detected [ 17.544095] [ 17.544414] Memory state around the buggy address: [ 17.544649] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.544998] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.546028] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.546970] ^ [ 17.547447] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.547758] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.548059] ================================================================== [ 17.877393] ================================================================== [ 17.877883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 17.878262] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.878976] [ 17.879815] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.879947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.879997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.880048] Call Trace: [ 17.880129] <TASK> [ 17.880179] dump_stack_lvl+0x73/0xb0 [ 17.880249] print_report+0xd1/0x650 [ 17.880304] ? __virt_addr_valid+0x1db/0x2d0 [ 17.880384] ? kasan_atomics_helper+0x72f/0x5450 [ 17.880455] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.880513] ? kasan_atomics_helper+0x72f/0x5450 [ 17.880567] kasan_report+0x141/0x180 [ 17.880619] ? kasan_atomics_helper+0x72f/0x5450 [ 17.880678] kasan_check_range+0x10c/0x1c0 [ 17.880740] __kasan_check_write+0x18/0x20 [ 17.880810] kasan_atomics_helper+0x72f/0x5450 [ 17.880853] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.880882] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.880909] ? kasan_atomics+0x152/0x310 [ 17.880937] kasan_atomics+0x1dc/0x310 [ 17.880961] ? __pfx_kasan_atomics+0x10/0x10 [ 17.880986] ? __pfx_read_tsc+0x10/0x10 [ 17.881020] ? ktime_get_ts64+0x86/0x230 [ 17.881059] kunit_try_run_case+0x1a5/0x480 [ 17.881112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.881141] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.881172] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.881201] ? __kthread_parkme+0x82/0x180 [ 17.881229] ? preempt_count_sub+0x50/0x80 [ 17.881291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.881324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.881375] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.881405] kthread+0x337/0x6f0 [ 17.881427] ? trace_preempt_on+0x20/0xc0 [ 17.881456] ? __pfx_kthread+0x10/0x10 [ 17.881479] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.881507] ? calculate_sigpending+0x7b/0xa0 [ 17.881534] ? __pfx_kthread+0x10/0x10 [ 17.881557] ret_from_fork+0x41/0x80 [ 17.881583] ? __pfx_kthread+0x10/0x10 [ 17.881605] ret_from_fork_asm+0x1a/0x30 [ 17.881643] </TASK> [ 17.881658] [ 17.891828] Allocated by task 286: [ 17.892036] kasan_save_stack+0x45/0x70 [ 17.892430] kasan_save_track+0x18/0x40 [ 17.892789] kasan_save_alloc_info+0x3b/0x50 [ 17.893310] __kasan_kmalloc+0xb7/0xc0 [ 17.893675] __kmalloc_cache_noprof+0x189/0x420 [ 17.894089] kasan_atomics+0x95/0x310 [ 17.894423] kunit_try_run_case+0x1a5/0x480 [ 17.894764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.895234] kthread+0x337/0x6f0 [ 17.895470] ret_from_fork+0x41/0x80 [ 17.895673] ret_from_fork_asm+0x1a/0x30 [ 17.895917] [ 17.896046] The buggy address belongs to the object at ffff888102b21f80 [ 17.896046] which belongs to the cache kmalloc-64 of size 64 [ 17.896634] The buggy address is located 0 bytes to the right of [ 17.896634] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.897075] [ 17.897205] The buggy address belongs to the physical page: [ 17.897457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.897765] flags: 0x200000000000000(node=0|zone=2) [ 17.898057] page_type: f5(slab) [ 17.898400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.898997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.899666] page dumped because: kasan: bad access detected [ 17.900107] [ 17.900291] Memory state around the buggy address: [ 17.900710] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.900991] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.901812] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.902262] ^ [ 17.902623] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.903005] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.903235] ================================================================== [ 18.382989] ================================================================== [ 18.383806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 18.384589] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.384876] [ 18.385050] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.385157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.385185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.385234] Call Trace: [ 18.385281] <TASK> [ 18.385331] dump_stack_lvl+0x73/0xb0 [ 18.385416] print_report+0xd1/0x650 [ 18.385471] ? __virt_addr_valid+0x1db/0x2d0 [ 18.385530] ? kasan_atomics_helper+0x4a1c/0x5450 [ 18.385585] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.385643] ? kasan_atomics_helper+0x4a1c/0x5450 [ 18.385691] kasan_report+0x141/0x180 [ 18.385748] ? kasan_atomics_helper+0x4a1c/0x5450 [ 18.385816] __asan_report_load4_noabort+0x18/0x20 [ 18.385871] kasan_atomics_helper+0x4a1c/0x5450 [ 18.385946] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.386027] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.386075] ? kasan_atomics+0x152/0x310 [ 18.386126] kasan_atomics+0x1dc/0x310 [ 18.386172] ? __pfx_kasan_atomics+0x10/0x10 [ 18.386243] ? __pfx_read_tsc+0x10/0x10 [ 18.386292] ? ktime_get_ts64+0x86/0x230 [ 18.386379] kunit_try_run_case+0x1a5/0x480 [ 18.386437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.386485] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.386544] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.386604] ? __kthread_parkme+0x82/0x180 [ 18.386655] ? preempt_count_sub+0x50/0x80 [ 18.386708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.386757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.386814] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.386872] kthread+0x337/0x6f0 [ 18.386915] ? trace_preempt_on+0x20/0xc0 [ 18.386972] ? __pfx_kthread+0x10/0x10 [ 18.387021] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.387075] ? calculate_sigpending+0x7b/0xa0 [ 18.387124] ? __pfx_kthread+0x10/0x10 [ 18.387173] ret_from_fork+0x41/0x80 [ 18.387222] ? __pfx_kthread+0x10/0x10 [ 18.387272] ret_from_fork_asm+0x1a/0x30 [ 18.387367] </TASK> [ 18.387399] [ 18.398049] Allocated by task 286: [ 18.398414] kasan_save_stack+0x45/0x70 [ 18.398827] kasan_save_track+0x18/0x40 [ 18.399109] kasan_save_alloc_info+0x3b/0x50 [ 18.399386] __kasan_kmalloc+0xb7/0xc0 [ 18.399584] __kmalloc_cache_noprof+0x189/0x420 [ 18.399976] kasan_atomics+0x95/0x310 [ 18.400465] kunit_try_run_case+0x1a5/0x480 [ 18.400841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.401086] kthread+0x337/0x6f0 [ 18.401274] ret_from_fork+0x41/0x80 [ 18.401584] ret_from_fork_asm+0x1a/0x30 [ 18.401966] [ 18.402173] The buggy address belongs to the object at ffff888102b21f80 [ 18.402173] which belongs to the cache kmalloc-64 of size 64 [ 18.402961] The buggy address is located 0 bytes to the right of [ 18.402961] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.403915] [ 18.404041] The buggy address belongs to the physical page: [ 18.404510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.404990] flags: 0x200000000000000(node=0|zone=2) [ 18.405234] page_type: f5(slab) [ 18.405625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.406220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.406661] page dumped because: kasan: bad access detected [ 18.406887] [ 18.407000] Memory state around the buggy address: [ 18.407214] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.407805] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.408480] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.409043] ^ [ 18.409417] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.409693] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.409961] ================================================================== [ 18.411759] ================================================================== [ 18.412548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 18.413195] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.413696] [ 18.413916] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.414031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.414064] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.414108] Call Trace: [ 18.414153] <TASK> [ 18.414200] dump_stack_lvl+0x73/0xb0 [ 18.414269] print_report+0xd1/0x650 [ 18.414320] ? __virt_addr_valid+0x1db/0x2d0 [ 18.414413] ? kasan_atomics_helper+0x1148/0x5450 [ 18.414463] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.414512] ? kasan_atomics_helper+0x1148/0x5450 [ 18.414556] kasan_report+0x141/0x180 [ 18.414606] ? kasan_atomics_helper+0x1148/0x5450 [ 18.414669] kasan_check_range+0x10c/0x1c0 [ 18.414721] __kasan_check_write+0x18/0x20 [ 18.414768] kasan_atomics_helper+0x1148/0x5450 [ 18.414828] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.414883] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.414932] ? kasan_atomics+0x152/0x310 [ 18.414990] kasan_atomics+0x1dc/0x310 [ 18.415039] ? __pfx_kasan_atomics+0x10/0x10 [ 18.415102] ? __pfx_read_tsc+0x10/0x10 [ 18.415146] ? ktime_get_ts64+0x86/0x230 [ 18.415207] kunit_try_run_case+0x1a5/0x480 [ 18.415266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.415321] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.415463] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.415520] ? __kthread_parkme+0x82/0x180 [ 18.415576] ? preempt_count_sub+0x50/0x80 [ 18.415639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.415696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.415758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.415819] kthread+0x337/0x6f0 [ 18.415866] ? trace_preempt_on+0x20/0xc0 [ 18.415922] ? __pfx_kthread+0x10/0x10 [ 18.415971] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.416025] ? calculate_sigpending+0x7b/0xa0 [ 18.416240] ? __pfx_kthread+0x10/0x10 [ 18.416302] ret_from_fork+0x41/0x80 [ 18.416367] ? __pfx_kthread+0x10/0x10 [ 18.416418] ret_from_fork_asm+0x1a/0x30 [ 18.416495] </TASK> [ 18.416526] [ 18.428688] Allocated by task 286: [ 18.428903] kasan_save_stack+0x45/0x70 [ 18.429141] kasan_save_track+0x18/0x40 [ 18.429387] kasan_save_alloc_info+0x3b/0x50 [ 18.429624] __kasan_kmalloc+0xb7/0xc0 [ 18.430305] __kmalloc_cache_noprof+0x189/0x420 [ 18.430746] kasan_atomics+0x95/0x310 [ 18.431048] kunit_try_run_case+0x1a5/0x480 [ 18.431427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.431885] kthread+0x337/0x6f0 [ 18.432444] ret_from_fork+0x41/0x80 [ 18.432943] ret_from_fork_asm+0x1a/0x30 [ 18.433237] [ 18.433454] The buggy address belongs to the object at ffff888102b21f80 [ 18.433454] which belongs to the cache kmalloc-64 of size 64 [ 18.434323] The buggy address is located 0 bytes to the right of [ 18.434323] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.435792] [ 18.435964] The buggy address belongs to the physical page: [ 18.436651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.436963] flags: 0x200000000000000(node=0|zone=2) [ 18.437226] page_type: f5(slab) [ 18.437427] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.437711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.437964] page dumped because: kasan: bad access detected [ 18.438526] [ 18.438662] Memory state around the buggy address: [ 18.438885] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.439924] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.440713] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.440991] ^ [ 18.441284] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.441611] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.441861] ================================================================== [ 18.443860] ================================================================== [ 18.444758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 18.445096] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.445785] [ 18.446045] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.446481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.446512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.446560] Call Trace: [ 18.446605] <TASK> [ 18.446649] dump_stack_lvl+0x73/0xb0 [ 18.446712] print_report+0xd1/0x650 [ 18.446760] ? __virt_addr_valid+0x1db/0x2d0 [ 18.446808] ? kasan_atomics_helper+0x4a02/0x5450 [ 18.446856] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.446905] ? kasan_atomics_helper+0x4a02/0x5450 [ 18.446955] kasan_report+0x141/0x180 [ 18.447005] ? kasan_atomics_helper+0x4a02/0x5450 [ 18.447077] __asan_report_load4_noabort+0x18/0x20 [ 18.447121] kasan_atomics_helper+0x4a02/0x5450 [ 18.447166] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.447216] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.447266] ? kasan_atomics+0x152/0x310 [ 18.447324] kasan_atomics+0x1dc/0x310 [ 18.448107] ? __pfx_kasan_atomics+0x10/0x10 [ 18.448193] ? __pfx_read_tsc+0x10/0x10 [ 18.448237] ? ktime_get_ts64+0x86/0x230 [ 18.448293] kunit_try_run_case+0x1a5/0x480 [ 18.448362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.448410] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.448464] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.448517] ? __kthread_parkme+0x82/0x180 [ 18.448563] ? preempt_count_sub+0x50/0x80 [ 18.448619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.448670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.448722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.448772] kthread+0x337/0x6f0 [ 18.448808] ? trace_preempt_on+0x20/0xc0 [ 18.448859] ? __pfx_kthread+0x10/0x10 [ 18.448900] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.448949] ? calculate_sigpending+0x7b/0xa0 [ 18.449000] ? __pfx_kthread+0x10/0x10 [ 18.449056] ret_from_fork+0x41/0x80 [ 18.449137] ? __pfx_kthread+0x10/0x10 [ 18.449182] ret_from_fork_asm+0x1a/0x30 [ 18.449253] </TASK> [ 18.449281] [ 18.462892] Allocated by task 286: [ 18.463856] kasan_save_stack+0x45/0x70 [ 18.464506] kasan_save_track+0x18/0x40 [ 18.464833] kasan_save_alloc_info+0x3b/0x50 [ 18.465247] __kasan_kmalloc+0xb7/0xc0 [ 18.465671] __kmalloc_cache_noprof+0x189/0x420 [ 18.465906] kasan_atomics+0x95/0x310 [ 18.466539] kunit_try_run_case+0x1a5/0x480 [ 18.466930] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.467572] kthread+0x337/0x6f0 [ 18.467925] ret_from_fork+0x41/0x80 [ 18.468240] ret_from_fork_asm+0x1a/0x30 [ 18.468623] [ 18.468866] The buggy address belongs to the object at ffff888102b21f80 [ 18.468866] which belongs to the cache kmalloc-64 of size 64 [ 18.469697] The buggy address is located 0 bytes to the right of [ 18.469697] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.470320] [ 18.470745] The buggy address belongs to the physical page: [ 18.471456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.471929] flags: 0x200000000000000(node=0|zone=2) [ 18.472575] page_type: f5(slab) [ 18.472857] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.473720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.474312] page dumped because: kasan: bad access detected [ 18.474552] [ 18.474749] Memory state around the buggy address: [ 18.475069] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.475442] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.476030] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.476407] ^ [ 18.476655] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.476989] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.478026] ================================================================== [ 19.537923] ================================================================== [ 19.538305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 19.538866] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.539263] [ 19.540021] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.540180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.540213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.540258] Call Trace: [ 19.540306] <TASK> [ 19.540365] dump_stack_lvl+0x73/0xb0 [ 19.540565] print_report+0xd1/0x650 [ 19.540612] ? __virt_addr_valid+0x1db/0x2d0 [ 19.540660] ? kasan_atomics_helper+0x5115/0x5450 [ 19.540714] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.540983] ? kasan_atomics_helper+0x5115/0x5450 [ 19.541031] kasan_report+0x141/0x180 [ 19.541101] ? kasan_atomics_helper+0x5115/0x5450 [ 19.541138] __asan_report_load8_noabort+0x18/0x20 [ 19.541166] kasan_atomics_helper+0x5115/0x5450 [ 19.541194] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.541223] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.541251] ? kasan_atomics+0x152/0x310 [ 19.541279] kasan_atomics+0x1dc/0x310 [ 19.541314] ? __pfx_kasan_atomics+0x10/0x10 [ 19.541368] ? __pfx_read_tsc+0x10/0x10 [ 19.541396] ? ktime_get_ts64+0x86/0x230 [ 19.541429] kunit_try_run_case+0x1a5/0x480 [ 19.541460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.541487] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.541518] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.541547] ? __kthread_parkme+0x82/0x180 [ 19.541574] ? preempt_count_sub+0x50/0x80 [ 19.541605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.541634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.541664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.541693] kthread+0x337/0x6f0 [ 19.541714] ? trace_preempt_on+0x20/0xc0 [ 19.541743] ? __pfx_kthread+0x10/0x10 [ 19.541767] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.541794] ? calculate_sigpending+0x7b/0xa0 [ 19.541820] ? __pfx_kthread+0x10/0x10 [ 19.541843] ret_from_fork+0x41/0x80 [ 19.541867] ? __pfx_kthread+0x10/0x10 [ 19.541888] ret_from_fork_asm+0x1a/0x30 [ 19.541925] </TASK> [ 19.541940] [ 19.555493] Allocated by task 286: [ 19.555767] kasan_save_stack+0x45/0x70 [ 19.556382] kasan_save_track+0x18/0x40 [ 19.556735] kasan_save_alloc_info+0x3b/0x50 [ 19.557176] __kasan_kmalloc+0xb7/0xc0 [ 19.557583] __kmalloc_cache_noprof+0x189/0x420 [ 19.558007] kasan_atomics+0x95/0x310 [ 19.558400] kunit_try_run_case+0x1a5/0x480 [ 19.558743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.559036] kthread+0x337/0x6f0 [ 19.559746] ret_from_fork+0x41/0x80 [ 19.559994] ret_from_fork_asm+0x1a/0x30 [ 19.560174] [ 19.560562] The buggy address belongs to the object at ffff888102b21f80 [ 19.560562] which belongs to the cache kmalloc-64 of size 64 [ 19.561359] The buggy address is located 0 bytes to the right of [ 19.561359] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.562110] [ 19.562313] The buggy address belongs to the physical page: [ 19.562625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.563041] flags: 0x200000000000000(node=0|zone=2) [ 19.563773] page_type: f5(slab) [ 19.563935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.564133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.564417] page dumped because: kasan: bad access detected [ 19.564850] [ 19.565046] Memory state around the buggy address: [ 19.565952] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.566266] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.566845] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.567157] ^ [ 19.567571] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.567883] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.568920] ================================================================== [ 17.906245] ================================================================== [ 17.906607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 17.906902] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.907167] [ 17.907321] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.907733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.907783] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.907835] Call Trace: [ 17.907886] <TASK> [ 17.907932] dump_stack_lvl+0x73/0xb0 [ 17.907998] print_report+0xd1/0x650 [ 17.908047] ? __virt_addr_valid+0x1db/0x2d0 [ 17.908115] ? kasan_atomics_helper+0x7c7/0x5450 [ 17.908159] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.908211] ? kasan_atomics_helper+0x7c7/0x5450 [ 17.908260] kasan_report+0x141/0x180 [ 17.908302] ? kasan_atomics_helper+0x7c7/0x5450 [ 17.908468] kasan_check_range+0x10c/0x1c0 [ 17.908939] __kasan_check_write+0x18/0x20 [ 17.909006] kasan_atomics_helper+0x7c7/0x5450 [ 17.909071] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.909117] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.909175] ? kasan_atomics+0x152/0x310 [ 17.909227] kasan_atomics+0x1dc/0x310 [ 17.910064] ? __pfx_kasan_atomics+0x10/0x10 [ 17.910157] ? __pfx_read_tsc+0x10/0x10 [ 17.910210] ? ktime_get_ts64+0x86/0x230 [ 17.910277] kunit_try_run_case+0x1a5/0x480 [ 17.910357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.910415] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.910477] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.910534] ? __kthread_parkme+0x82/0x180 [ 17.910588] ? preempt_count_sub+0x50/0x80 [ 17.910648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.912707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.912821] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.912876] kthread+0x337/0x6f0 [ 17.912917] ? trace_preempt_on+0x20/0xc0 [ 17.912967] ? __pfx_kthread+0x10/0x10 [ 17.913007] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.913069] ? calculate_sigpending+0x7b/0xa0 [ 17.913120] ? __pfx_kthread+0x10/0x10 [ 17.913164] ret_from_fork+0x41/0x80 [ 17.913209] ? __pfx_kthread+0x10/0x10 [ 17.913249] ret_from_fork_asm+0x1a/0x30 [ 17.913318] </TASK> [ 17.913364] [ 17.925490] Allocated by task 286: [ 17.925740] kasan_save_stack+0x45/0x70 [ 17.926071] kasan_save_track+0x18/0x40 [ 17.926432] kasan_save_alloc_info+0x3b/0x50 [ 17.926776] __kasan_kmalloc+0xb7/0xc0 [ 17.927104] __kmalloc_cache_noprof+0x189/0x420 [ 17.927504] kasan_atomics+0x95/0x310 [ 17.927836] kunit_try_run_case+0x1a5/0x480 [ 17.928225] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.928546] kthread+0x337/0x6f0 [ 17.928779] ret_from_fork+0x41/0x80 [ 17.929069] ret_from_fork_asm+0x1a/0x30 [ 17.929381] [ 17.929514] The buggy address belongs to the object at ffff888102b21f80 [ 17.929514] which belongs to the cache kmalloc-64 of size 64 [ 17.930154] The buggy address is located 0 bytes to the right of [ 17.930154] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.930685] [ 17.930820] The buggy address belongs to the physical page: [ 17.931054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.931652] flags: 0x200000000000000(node=0|zone=2) [ 17.932038] page_type: f5(slab) [ 17.932367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.932708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.933110] page dumped because: kasan: bad access detected [ 17.933557] [ 17.933744] Memory state around the buggy address: [ 17.934053] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.934460] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.934742] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.935228] ^ [ 17.935527] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.935985] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.936461] ================================================================== [ 18.934515] ================================================================== [ 18.935195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 18.935459] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.935996] [ 18.936228] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.936354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.936386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.936437] Call Trace: [ 18.936487] <TASK> [ 18.936537] dump_stack_lvl+0x73/0xb0 [ 18.936603] print_report+0xd1/0x650 [ 18.936662] ? __virt_addr_valid+0x1db/0x2d0 [ 18.936719] ? kasan_atomics_helper+0x194a/0x5450 [ 18.936773] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.936838] ? kasan_atomics_helper+0x194a/0x5450 [ 18.936895] kasan_report+0x141/0x180 [ 18.936953] ? kasan_atomics_helper+0x194a/0x5450 [ 18.937029] kasan_check_range+0x10c/0x1c0 [ 18.937082] __kasan_check_write+0x18/0x20 [ 18.937136] kasan_atomics_helper+0x194a/0x5450 [ 18.937196] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.937258] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.937318] ? kasan_atomics+0x152/0x310 [ 18.937388] kasan_atomics+0x1dc/0x310 [ 18.937435] ? __pfx_kasan_atomics+0x10/0x10 [ 18.937487] ? __pfx_read_tsc+0x10/0x10 [ 18.937538] ? ktime_get_ts64+0x86/0x230 [ 18.937603] kunit_try_run_case+0x1a5/0x480 [ 18.937666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.937724] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.937786] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.937847] ? __kthread_parkme+0x82/0x180 [ 18.937933] ? preempt_count_sub+0x50/0x80 [ 18.938035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.938117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.938198] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.938276] kthread+0x337/0x6f0 [ 18.938319] ? trace_preempt_on+0x20/0xc0 [ 18.938405] ? __pfx_kthread+0x10/0x10 [ 18.938455] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.938512] ? calculate_sigpending+0x7b/0xa0 [ 18.938567] ? __pfx_kthread+0x10/0x10 [ 18.938613] ret_from_fork+0x41/0x80 [ 18.938654] ? __pfx_kthread+0x10/0x10 [ 18.938700] ret_from_fork_asm+0x1a/0x30 [ 18.938777] </TASK> [ 18.938810] [ 18.949591] Allocated by task 286: [ 18.949867] kasan_save_stack+0x45/0x70 [ 18.950118] kasan_save_track+0x18/0x40 [ 18.950320] kasan_save_alloc_info+0x3b/0x50 [ 18.950554] __kasan_kmalloc+0xb7/0xc0 [ 18.950751] __kmalloc_cache_noprof+0x189/0x420 [ 18.950955] kasan_atomics+0x95/0x310 [ 18.951345] kunit_try_run_case+0x1a5/0x480 [ 18.951863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.952492] kthread+0x337/0x6f0 [ 18.952849] ret_from_fork+0x41/0x80 [ 18.953256] ret_from_fork_asm+0x1a/0x30 [ 18.953637] [ 18.953832] The buggy address belongs to the object at ffff888102b21f80 [ 18.953832] which belongs to the cache kmalloc-64 of size 64 [ 18.954791] The buggy address is located 0 bytes to the right of [ 18.954791] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.955773] [ 18.955993] The buggy address belongs to the physical page: [ 18.956423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.956927] flags: 0x200000000000000(node=0|zone=2) [ 18.957497] page_type: f5(slab) [ 18.957735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.958312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.960951] page dumped because: kasan: bad access detected [ 18.961650] [ 18.961804] Memory state around the buggy address: [ 18.962114] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.962530] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.962947] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.964648] ^ [ 18.964831] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.964979] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.965793] ================================================================== [ 17.690213] ================================================================== [ 17.690690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 17.690948] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.691154] [ 17.691275] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.691369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.691392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.691429] Call Trace: [ 17.691468] <TASK> [ 17.691508] dump_stack_lvl+0x73/0xb0 [ 17.691933] print_report+0xd1/0x650 [ 17.692048] ? __virt_addr_valid+0x1db/0x2d0 [ 17.692121] ? kasan_atomics_helper+0x4b54/0x5450 [ 17.692185] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.692314] ? kasan_atomics_helper+0x4b54/0x5450 [ 17.692398] kasan_report+0x141/0x180 [ 17.692466] ? kasan_atomics_helper+0x4b54/0x5450 [ 17.692540] __asan_report_load4_noabort+0x18/0x20 [ 17.692598] kasan_atomics_helper+0x4b54/0x5450 [ 17.692659] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.692719] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.692773] ? kasan_atomics+0x152/0x310 [ 17.692823] kasan_atomics+0x1dc/0x310 [ 17.692868] ? __pfx_kasan_atomics+0x10/0x10 [ 17.692961] ? __pfx_read_tsc+0x10/0x10 [ 17.693021] ? ktime_get_ts64+0x86/0x230 [ 17.693120] kunit_try_run_case+0x1a5/0x480 [ 17.693220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.693279] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.693352] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.693406] ? __kthread_parkme+0x82/0x180 [ 17.693437] ? preempt_count_sub+0x50/0x80 [ 17.693469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.693498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.693530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.693560] kthread+0x337/0x6f0 [ 17.693581] ? trace_preempt_on+0x20/0xc0 [ 17.693610] ? __pfx_kthread+0x10/0x10 [ 17.693632] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.693659] ? calculate_sigpending+0x7b/0xa0 [ 17.693686] ? __pfx_kthread+0x10/0x10 [ 17.693709] ret_from_fork+0x41/0x80 [ 17.693734] ? __pfx_kthread+0x10/0x10 [ 17.693756] ret_from_fork_asm+0x1a/0x30 [ 17.693793] </TASK> [ 17.693808] [ 17.705206] Allocated by task 286: [ 17.705495] kasan_save_stack+0x45/0x70 [ 17.705924] kasan_save_track+0x18/0x40 [ 17.706250] kasan_save_alloc_info+0x3b/0x50 [ 17.706622] __kasan_kmalloc+0xb7/0xc0 [ 17.706960] __kmalloc_cache_noprof+0x189/0x420 [ 17.707406] kasan_atomics+0x95/0x310 [ 17.707751] kunit_try_run_case+0x1a5/0x480 [ 17.708093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.708657] kthread+0x337/0x6f0 [ 17.708907] ret_from_fork+0x41/0x80 [ 17.709125] ret_from_fork_asm+0x1a/0x30 [ 17.709423] [ 17.709621] The buggy address belongs to the object at ffff888102b21f80 [ 17.709621] which belongs to the cache kmalloc-64 of size 64 [ 17.710602] The buggy address is located 0 bytes to the right of [ 17.710602] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.711677] [ 17.711867] The buggy address belongs to the physical page: [ 17.712144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.712471] flags: 0x200000000000000(node=0|zone=2) [ 17.712700] page_type: f5(slab) [ 17.713121] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.713810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.714517] page dumped because: kasan: bad access detected [ 17.714993] [ 17.715189] Memory state around the buggy address: [ 17.715522] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.715804] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.716113] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.716721] ^ [ 17.717257] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.717855] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.718444] ================================================================== [ 17.549689] ================================================================== [ 17.550128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 17.550841] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.551621] [ 17.551897] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.552013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.552043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.552119] Call Trace: [ 17.552150] <TASK> [ 17.552192] dump_stack_lvl+0x73/0xb0 [ 17.552647] print_report+0xd1/0x650 [ 17.552679] ? __virt_addr_valid+0x1db/0x2d0 [ 17.552709] ? kasan_atomics_helper+0x4ba2/0x5450 [ 17.552736] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.552763] ? kasan_atomics_helper+0x4ba2/0x5450 [ 17.552788] kasan_report+0x141/0x180 [ 17.552812] ? kasan_atomics_helper+0x4ba2/0x5450 [ 17.552842] __asan_report_store4_noabort+0x1b/0x30 [ 17.552867] kasan_atomics_helper+0x4ba2/0x5450 [ 17.552894] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.552920] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.552945] ? kasan_atomics+0x152/0x310 [ 17.552972] kasan_atomics+0x1dc/0x310 [ 17.552995] ? __pfx_kasan_atomics+0x10/0x10 [ 17.553034] ? __pfx_read_tsc+0x10/0x10 [ 17.553061] ? ktime_get_ts64+0x86/0x230 [ 17.553103] kunit_try_run_case+0x1a5/0x480 [ 17.553134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.553161] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.553190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.553238] ? __kthread_parkme+0x82/0x180 [ 17.553278] ? preempt_count_sub+0x50/0x80 [ 17.553327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.553376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.553405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.553434] kthread+0x337/0x6f0 [ 17.553454] ? trace_preempt_on+0x20/0xc0 [ 17.553482] ? __pfx_kthread+0x10/0x10 [ 17.553504] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.553530] ? calculate_sigpending+0x7b/0xa0 [ 17.553556] ? __pfx_kthread+0x10/0x10 [ 17.553577] ret_from_fork+0x41/0x80 [ 17.553601] ? __pfx_kthread+0x10/0x10 [ 17.553623] ret_from_fork_asm+0x1a/0x30 [ 17.553660] </TASK> [ 17.553673] [ 17.570128] Allocated by task 286: [ 17.570444] kasan_save_stack+0x45/0x70 [ 17.570910] kasan_save_track+0x18/0x40 [ 17.571437] kasan_save_alloc_info+0x3b/0x50 [ 17.571911] __kasan_kmalloc+0xb7/0xc0 [ 17.572035] __kmalloc_cache_noprof+0x189/0x420 [ 17.572245] kasan_atomics+0x95/0x310 [ 17.572607] kunit_try_run_case+0x1a5/0x480 [ 17.572840] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.573132] kthread+0x337/0x6f0 [ 17.573478] ret_from_fork+0x41/0x80 [ 17.573826] ret_from_fork_asm+0x1a/0x30 [ 17.574051] [ 17.574172] The buggy address belongs to the object at ffff888102b21f80 [ 17.574172] which belongs to the cache kmalloc-64 of size 64 [ 17.574783] The buggy address is located 0 bytes to the right of [ 17.574783] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.576566] [ 17.576690] The buggy address belongs to the physical page: [ 17.577759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.577944] flags: 0x200000000000000(node=0|zone=2) [ 17.578066] page_type: f5(slab) [ 17.578248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.578829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.579706] page dumped because: kasan: bad access detected [ 17.580177] [ 17.580429] Memory state around the buggy address: [ 17.580643] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.581132] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.581951] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.582801] ^ [ 17.583014] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.583308] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.583558] ================================================================== [ 19.097570] ================================================================== [ 19.097931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 19.099049] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.099422] [ 19.099556] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.099640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.099661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.099697] Call Trace: [ 19.099739] <TASK> [ 19.099778] dump_stack_lvl+0x73/0xb0 [ 19.099832] print_report+0xd1/0x650 [ 19.099872] ? __virt_addr_valid+0x1db/0x2d0 [ 19.099910] ? kasan_atomics_helper+0x4f30/0x5450 [ 19.099948] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.099986] ? kasan_atomics_helper+0x4f30/0x5450 [ 19.100024] kasan_report+0x141/0x180 [ 19.100063] ? kasan_atomics_helper+0x4f30/0x5450 [ 19.100111] __asan_report_load8_noabort+0x18/0x20 [ 19.100154] kasan_atomics_helper+0x4f30/0x5450 [ 19.100204] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.100256] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.100312] ? kasan_atomics+0x152/0x310 [ 19.100381] kasan_atomics+0x1dc/0x310 [ 19.100420] ? __pfx_kasan_atomics+0x10/0x10 [ 19.100464] ? __pfx_read_tsc+0x10/0x10 [ 19.100508] ? ktime_get_ts64+0x86/0x230 [ 19.100565] kunit_try_run_case+0x1a5/0x480 [ 19.100627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.100683] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.100742] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.100793] ? __kthread_parkme+0x82/0x180 [ 19.100870] ? preempt_count_sub+0x50/0x80 [ 19.100936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.100983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.101035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.101093] kthread+0x337/0x6f0 [ 19.101119] ? trace_preempt_on+0x20/0xc0 [ 19.101150] ? __pfx_kthread+0x10/0x10 [ 19.101172] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.101201] ? calculate_sigpending+0x7b/0xa0 [ 19.101228] ? __pfx_kthread+0x10/0x10 [ 19.101251] ret_from_fork+0x41/0x80 [ 19.101313] ? __pfx_kthread+0x10/0x10 [ 19.101358] ret_from_fork_asm+0x1a/0x30 [ 19.101398] </TASK> [ 19.101414] [ 19.112934] Allocated by task 286: [ 19.113256] kasan_save_stack+0x45/0x70 [ 19.113518] kasan_save_track+0x18/0x40 [ 19.113715] kasan_save_alloc_info+0x3b/0x50 [ 19.114059] __kasan_kmalloc+0xb7/0xc0 [ 19.114456] __kmalloc_cache_noprof+0x189/0x420 [ 19.114849] kasan_atomics+0x95/0x310 [ 19.115204] kunit_try_run_case+0x1a5/0x480 [ 19.115455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.115778] kthread+0x337/0x6f0 [ 19.116094] ret_from_fork+0x41/0x80 [ 19.116381] ret_from_fork_asm+0x1a/0x30 [ 19.116681] [ 19.116824] The buggy address belongs to the object at ffff888102b21f80 [ 19.116824] which belongs to the cache kmalloc-64 of size 64 [ 19.117442] The buggy address is located 0 bytes to the right of [ 19.117442] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.118145] [ 19.118345] The buggy address belongs to the physical page: [ 19.118773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.119398] flags: 0x200000000000000(node=0|zone=2) [ 19.119799] page_type: f5(slab) [ 19.120049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.120481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.120926] page dumped because: kasan: bad access detected [ 19.121192] [ 19.121302] Memory state around the buggy address: [ 19.121705] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.122289] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.122812] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.123131] ^ [ 19.123436] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.123948] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.124512] ================================================================== [ 19.256193] ================================================================== [ 19.256878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 19.257535] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.258130] [ 19.258356] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.258455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.258481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.258522] Call Trace: [ 19.258564] <TASK> [ 19.260308] dump_stack_lvl+0x73/0xb0 [ 19.260424] print_report+0xd1/0x650 [ 19.260481] ? __virt_addr_valid+0x1db/0x2d0 [ 19.260539] ? kasan_atomics_helper+0x1f43/0x5450 [ 19.260594] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.260653] ? kasan_atomics_helper+0x1f43/0x5450 [ 19.260711] kasan_report+0x141/0x180 [ 19.260766] ? kasan_atomics_helper+0x1f43/0x5450 [ 19.260830] kasan_check_range+0x10c/0x1c0 [ 19.260884] __kasan_check_write+0x18/0x20 [ 19.260936] kasan_atomics_helper+0x1f43/0x5450 [ 19.260996] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.261068] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.261128] ? kasan_atomics+0x152/0x310 [ 19.261191] kasan_atomics+0x1dc/0x310 [ 19.261243] ? __pfx_kasan_atomics+0x10/0x10 [ 19.261295] ? __pfx_read_tsc+0x10/0x10 [ 19.261360] ? ktime_get_ts64+0x86/0x230 [ 19.261427] kunit_try_run_case+0x1a5/0x480 [ 19.261492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.261540] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.261592] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.261646] ? __kthread_parkme+0x82/0x180 [ 19.261697] ? preempt_count_sub+0x50/0x80 [ 19.261760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.261813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.261862] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.261950] kthread+0x337/0x6f0 [ 19.262020] ? trace_preempt_on+0x20/0xc0 [ 19.262093] ? __pfx_kthread+0x10/0x10 [ 19.262147] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.262207] ? calculate_sigpending+0x7b/0xa0 [ 19.262274] ? __pfx_kthread+0x10/0x10 [ 19.262301] ret_from_fork+0x41/0x80 [ 19.262328] ? __pfx_kthread+0x10/0x10 [ 19.262375] ret_from_fork_asm+0x1a/0x30 [ 19.262416] </TASK> [ 19.262431] [ 19.273306] Allocated by task 286: [ 19.273726] kasan_save_stack+0x45/0x70 [ 19.274184] kasan_save_track+0x18/0x40 [ 19.274575] kasan_save_alloc_info+0x3b/0x50 [ 19.275007] __kasan_kmalloc+0xb7/0xc0 [ 19.275519] __kmalloc_cache_noprof+0x189/0x420 [ 19.275993] kasan_atomics+0x95/0x310 [ 19.276307] kunit_try_run_case+0x1a5/0x480 [ 19.276886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.277435] kthread+0x337/0x6f0 [ 19.277666] ret_from_fork+0x41/0x80 [ 19.277837] ret_from_fork_asm+0x1a/0x30 [ 19.278428] [ 19.278577] The buggy address belongs to the object at ffff888102b21f80 [ 19.278577] which belongs to the cache kmalloc-64 of size 64 [ 19.279643] The buggy address is located 0 bytes to the right of [ 19.279643] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.280577] [ 19.280967] The buggy address belongs to the physical page: [ 19.281208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.282112] flags: 0x200000000000000(node=0|zone=2) [ 19.282615] page_type: f5(slab) [ 19.282834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.283615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.284000] page dumped because: kasan: bad access detected [ 19.284563] [ 19.284756] Memory state around the buggy address: [ 19.285510] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.285868] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.286374] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.287098] ^ [ 19.287677] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.288217] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.288550] ================================================================== [ 19.409819] ================================================================== [ 19.410552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 19.411439] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.411831] [ 19.412002] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.412107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.412136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.412179] Call Trace: [ 19.412227] <TASK> [ 19.412298] dump_stack_lvl+0x73/0xb0 [ 19.412400] print_report+0xd1/0x650 [ 19.412470] ? __virt_addr_valid+0x1db/0x2d0 [ 19.412541] ? kasan_atomics_helper+0x4fb2/0x5450 [ 19.412607] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.412678] ? kasan_atomics_helper+0x4fb2/0x5450 [ 19.412746] kasan_report+0x141/0x180 [ 19.412812] ? kasan_atomics_helper+0x4fb2/0x5450 [ 19.412889] __asan_report_load8_noabort+0x18/0x20 [ 19.412946] kasan_atomics_helper+0x4fb2/0x5450 [ 19.413019] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.413074] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.413124] ? kasan_atomics+0x152/0x310 [ 19.413173] kasan_atomics+0x1dc/0x310 [ 19.413214] ? __pfx_kasan_atomics+0x10/0x10 [ 19.413264] ? __pfx_read_tsc+0x10/0x10 [ 19.413313] ? ktime_get_ts64+0x86/0x230 [ 19.413412] kunit_try_run_case+0x1a5/0x480 [ 19.413470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.413523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.413583] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.413642] ? __kthread_parkme+0x82/0x180 [ 19.413701] ? preempt_count_sub+0x50/0x80 [ 19.413767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.413828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.413892] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.413955] kthread+0x337/0x6f0 [ 19.414000] ? trace_preempt_on+0x20/0xc0 [ 19.414060] ? __pfx_kthread+0x10/0x10 [ 19.414099] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.414168] ? calculate_sigpending+0x7b/0xa0 [ 19.414220] ? __pfx_kthread+0x10/0x10 [ 19.414279] ret_from_fork+0x41/0x80 [ 19.414329] ? __pfx_kthread+0x10/0x10 [ 19.414404] ret_from_fork_asm+0x1a/0x30 [ 19.414478] </TASK> [ 19.414519] [ 19.423203] Allocated by task 286: [ 19.423449] kasan_save_stack+0x45/0x70 [ 19.423835] kasan_save_track+0x18/0x40 [ 19.424118] kasan_save_alloc_info+0x3b/0x50 [ 19.424409] __kasan_kmalloc+0xb7/0xc0 [ 19.424639] __kmalloc_cache_noprof+0x189/0x420 [ 19.424895] kasan_atomics+0x95/0x310 [ 19.425098] kunit_try_run_case+0x1a5/0x480 [ 19.425608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.426058] kthread+0x337/0x6f0 [ 19.426387] ret_from_fork+0x41/0x80 [ 19.426731] ret_from_fork_asm+0x1a/0x30 [ 19.427099] [ 19.427269] The buggy address belongs to the object at ffff888102b21f80 [ 19.427269] which belongs to the cache kmalloc-64 of size 64 [ 19.427825] The buggy address is located 0 bytes to the right of [ 19.427825] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.428621] [ 19.428855] The buggy address belongs to the physical page: [ 19.429418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.429797] flags: 0x200000000000000(node=0|zone=2) [ 19.430040] page_type: f5(slab) [ 19.430485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.431009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.431575] page dumped because: kasan: bad access detected [ 19.431839] [ 19.431977] Memory state around the buggy address: [ 19.432217] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.432545] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.432864] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.434430] ^ [ 19.434834] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.435483] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.436033] ================================================================== [ 19.472858] ================================================================== [ 19.473709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 19.474259] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.474676] [ 19.474879] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.475173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.475204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.475243] Call Trace: [ 19.475284] <TASK> [ 19.475324] dump_stack_lvl+0x73/0xb0 [ 19.475400] print_report+0xd1/0x650 [ 19.475443] ? __virt_addr_valid+0x1db/0x2d0 [ 19.475481] ? kasan_atomics_helper+0x4fa5/0x5450 [ 19.475519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.475562] ? kasan_atomics_helper+0x4fa5/0x5450 [ 19.475603] kasan_report+0x141/0x180 [ 19.475649] ? kasan_atomics_helper+0x4fa5/0x5450 [ 19.475917] __asan_report_load8_noabort+0x18/0x20 [ 19.476017] kasan_atomics_helper+0x4fa5/0x5450 [ 19.476110] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.476145] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.476188] ? kasan_atomics+0x152/0x310 [ 19.476219] kasan_atomics+0x1dc/0x310 [ 19.476244] ? __pfx_kasan_atomics+0x10/0x10 [ 19.476277] ? __pfx_read_tsc+0x10/0x10 [ 19.476300] ? ktime_get_ts64+0x86/0x230 [ 19.476360] kunit_try_run_case+0x1a5/0x480 [ 19.476415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.476467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.476509] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.476538] ? __kthread_parkme+0x82/0x180 [ 19.476565] ? preempt_count_sub+0x50/0x80 [ 19.476594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.476622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.476650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.476679] kthread+0x337/0x6f0 [ 19.476699] ? trace_preempt_on+0x20/0xc0 [ 19.476726] ? __pfx_kthread+0x10/0x10 [ 19.476749] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.476776] ? calculate_sigpending+0x7b/0xa0 [ 19.476803] ? __pfx_kthread+0x10/0x10 [ 19.476825] ret_from_fork+0x41/0x80 [ 19.476849] ? __pfx_kthread+0x10/0x10 [ 19.476872] ret_from_fork_asm+0x1a/0x30 [ 19.476908] </TASK> [ 19.476923] [ 19.491147] Allocated by task 286: [ 19.491692] kasan_save_stack+0x45/0x70 [ 19.492118] kasan_save_track+0x18/0x40 [ 19.492489] kasan_save_alloc_info+0x3b/0x50 [ 19.492763] __kasan_kmalloc+0xb7/0xc0 [ 19.493085] __kmalloc_cache_noprof+0x189/0x420 [ 19.493882] kasan_atomics+0x95/0x310 [ 19.494065] kunit_try_run_case+0x1a5/0x480 [ 19.494439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.495147] kthread+0x337/0x6f0 [ 19.495474] ret_from_fork+0x41/0x80 [ 19.495611] ret_from_fork_asm+0x1a/0x30 [ 19.495718] [ 19.495781] The buggy address belongs to the object at ffff888102b21f80 [ 19.495781] which belongs to the cache kmalloc-64 of size 64 [ 19.496001] The buggy address is located 0 bytes to the right of [ 19.496001] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.496559] [ 19.496754] The buggy address belongs to the physical page: [ 19.497050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.497732] flags: 0x200000000000000(node=0|zone=2) [ 19.497977] page_type: f5(slab) [ 19.498281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.498962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.499560] page dumped because: kasan: bad access detected [ 19.499785] [ 19.499930] Memory state around the buggy address: [ 19.500349] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.500920] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.501498] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.502065] ^ [ 19.502520] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.503047] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.503492] ================================================================== [ 18.326624] ================================================================== [ 18.327019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 18.327919] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.328204] [ 18.328380] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.328509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.328540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.328586] Call Trace: [ 18.328633] <TASK> [ 18.328684] dump_stack_lvl+0x73/0xb0 [ 18.328754] print_report+0xd1/0x650 [ 18.328811] ? __virt_addr_valid+0x1db/0x2d0 [ 18.328860] ? kasan_atomics_helper+0x4a36/0x5450 [ 18.328911] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.328982] ? kasan_atomics_helper+0x4a36/0x5450 [ 18.329045] kasan_report+0x141/0x180 [ 18.329147] ? kasan_atomics_helper+0x4a36/0x5450 [ 18.329207] __asan_report_load4_noabort+0x18/0x20 [ 18.329258] kasan_atomics_helper+0x4a36/0x5450 [ 18.329316] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.329392] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.329433] ? kasan_atomics+0x152/0x310 [ 18.329463] kasan_atomics+0x1dc/0x310 [ 18.329489] ? __pfx_kasan_atomics+0x10/0x10 [ 18.329514] ? __pfx_read_tsc+0x10/0x10 [ 18.329539] ? ktime_get_ts64+0x86/0x230 [ 18.329572] kunit_try_run_case+0x1a5/0x480 [ 18.329604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.329631] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.329662] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.329691] ? __kthread_parkme+0x82/0x180 [ 18.329718] ? preempt_count_sub+0x50/0x80 [ 18.329749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.329778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.329807] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.329836] kthread+0x337/0x6f0 [ 18.329859] ? trace_preempt_on+0x20/0xc0 [ 18.329887] ? __pfx_kthread+0x10/0x10 [ 18.329910] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.329937] ? calculate_sigpending+0x7b/0xa0 [ 18.329964] ? __pfx_kthread+0x10/0x10 [ 18.329986] ret_from_fork+0x41/0x80 [ 18.330011] ? __pfx_kthread+0x10/0x10 [ 18.330033] ret_from_fork_asm+0x1a/0x30 [ 18.330101] </TASK> [ 18.330120] [ 18.340150] Allocated by task 286: [ 18.340372] kasan_save_stack+0x45/0x70 [ 18.340593] kasan_save_track+0x18/0x40 [ 18.340787] kasan_save_alloc_info+0x3b/0x50 [ 18.341222] __kasan_kmalloc+0xb7/0xc0 [ 18.341594] __kmalloc_cache_noprof+0x189/0x420 [ 18.342003] kasan_atomics+0x95/0x310 [ 18.342453] kunit_try_run_case+0x1a5/0x480 [ 18.342835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.343325] kthread+0x337/0x6f0 [ 18.343532] ret_from_fork+0x41/0x80 [ 18.343730] ret_from_fork_asm+0x1a/0x30 [ 18.343929] [ 18.344131] The buggy address belongs to the object at ffff888102b21f80 [ 18.344131] which belongs to the cache kmalloc-64 of size 64 [ 18.345066] The buggy address is located 0 bytes to the right of [ 18.345066] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.345605] [ 18.345736] The buggy address belongs to the physical page: [ 18.345967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.346578] flags: 0x200000000000000(node=0|zone=2) [ 18.347041] page_type: f5(slab) [ 18.347479] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.348081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.348666] page dumped because: kasan: bad access detected [ 18.349009] [ 18.349261] Memory state around the buggy address: [ 18.349640] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.349922] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.350198] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.350484] ^ [ 18.350885] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.351493] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.352064] ================================================================== [ 17.846650] ================================================================== [ 17.847083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 17.847942] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.848361] [ 17.848599] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.848703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.848736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.848786] Call Trace: [ 17.848834] <TASK> [ 17.848899] dump_stack_lvl+0x73/0xb0 [ 17.848955] print_report+0xd1/0x650 [ 17.848997] ? __virt_addr_valid+0x1db/0x2d0 [ 17.849040] ? kasan_atomics_helper+0x697/0x5450 [ 17.849074] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.849112] ? kasan_atomics_helper+0x697/0x5450 [ 17.849139] kasan_report+0x141/0x180 [ 17.849167] ? kasan_atomics_helper+0x697/0x5450 [ 17.849199] kasan_check_range+0x10c/0x1c0 [ 17.849224] __kasan_check_write+0x18/0x20 [ 17.849249] kasan_atomics_helper+0x697/0x5450 [ 17.849277] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.849305] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.849348] ? kasan_atomics+0x152/0x310 [ 17.849397] kasan_atomics+0x1dc/0x310 [ 17.849441] ? __pfx_kasan_atomics+0x10/0x10 [ 17.849490] ? __pfx_read_tsc+0x10/0x10 [ 17.849540] ? ktime_get_ts64+0x86/0x230 [ 17.849604] kunit_try_run_case+0x1a5/0x480 [ 17.849664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.849721] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.849783] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.849828] ? __kthread_parkme+0x82/0x180 [ 17.849857] ? preempt_count_sub+0x50/0x80 [ 17.849888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.849918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.849947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.849977] kthread+0x337/0x6f0 [ 17.849997] ? trace_preempt_on+0x20/0xc0 [ 17.850026] ? __pfx_kthread+0x10/0x10 [ 17.850050] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.850088] ? calculate_sigpending+0x7b/0xa0 [ 17.850117] ? __pfx_kthread+0x10/0x10 [ 17.850142] ret_from_fork+0x41/0x80 [ 17.850166] ? __pfx_kthread+0x10/0x10 [ 17.850189] ret_from_fork_asm+0x1a/0x30 [ 17.850226] </TASK> [ 17.850241] [ 17.863525] Allocated by task 286: [ 17.863859] kasan_save_stack+0x45/0x70 [ 17.864352] kasan_save_track+0x18/0x40 [ 17.864602] kasan_save_alloc_info+0x3b/0x50 [ 17.864839] __kasan_kmalloc+0xb7/0xc0 [ 17.865056] __kmalloc_cache_noprof+0x189/0x420 [ 17.865320] kasan_atomics+0x95/0x310 [ 17.865570] kunit_try_run_case+0x1a5/0x480 [ 17.865810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.866419] kthread+0x337/0x6f0 [ 17.866607] ret_from_fork+0x41/0x80 [ 17.866781] ret_from_fork_asm+0x1a/0x30 [ 17.866972] [ 17.867104] The buggy address belongs to the object at ffff888102b21f80 [ 17.867104] which belongs to the cache kmalloc-64 of size 64 [ 17.867973] The buggy address is located 0 bytes to the right of [ 17.867973] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.868950] [ 17.869192] The buggy address belongs to the physical page: [ 17.869511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.870107] flags: 0x200000000000000(node=0|zone=2) [ 17.870509] page_type: f5(slab) [ 17.870711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.871165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.871836] page dumped because: kasan: bad access detected [ 17.872332] [ 17.872499] Memory state around the buggy address: [ 17.872723] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.873362] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.873843] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.874158] ^ [ 17.874606] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.875199] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.875560] ================================================================== [ 18.967098] ================================================================== [ 18.968574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 18.969128] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.969645] [ 18.969911] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.970029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.970097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.970165] Call Trace: [ 18.970216] <TASK> [ 18.970270] dump_stack_lvl+0x73/0xb0 [ 18.970354] print_report+0xd1/0x650 [ 18.970417] ? __virt_addr_valid+0x1db/0x2d0 [ 18.970470] ? kasan_atomics_helper+0x19e3/0x5450 [ 18.970527] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.970578] ? kasan_atomics_helper+0x19e3/0x5450 [ 18.970636] kasan_report+0x141/0x180 [ 18.970705] ? kasan_atomics_helper+0x19e3/0x5450 [ 18.970775] kasan_check_range+0x10c/0x1c0 [ 18.970832] __kasan_check_write+0x18/0x20 [ 18.970875] kasan_atomics_helper+0x19e3/0x5450 [ 18.970903] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.970932] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.970958] ? kasan_atomics+0x152/0x310 [ 18.970987] kasan_atomics+0x1dc/0x310 [ 18.971011] ? __pfx_kasan_atomics+0x10/0x10 [ 18.971036] ? __pfx_read_tsc+0x10/0x10 [ 18.971073] ? ktime_get_ts64+0x86/0x230 [ 18.971116] kunit_try_run_case+0x1a5/0x480 [ 18.971148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.971174] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.971203] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.971231] ? __kthread_parkme+0x82/0x180 [ 18.971259] ? preempt_count_sub+0x50/0x80 [ 18.971328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.971380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.971410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.971439] kthread+0x337/0x6f0 [ 18.971460] ? trace_preempt_on+0x20/0xc0 [ 18.971489] ? __pfx_kthread+0x10/0x10 [ 18.971511] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.971538] ? calculate_sigpending+0x7b/0xa0 [ 18.971565] ? __pfx_kthread+0x10/0x10 [ 18.971587] ret_from_fork+0x41/0x80 [ 18.971611] ? __pfx_kthread+0x10/0x10 [ 18.971633] ret_from_fork_asm+0x1a/0x30 [ 18.971669] </TASK> [ 18.971684] [ 18.982753] Allocated by task 286: [ 18.982959] kasan_save_stack+0x45/0x70 [ 18.985045] kasan_save_track+0x18/0x40 [ 18.985456] kasan_save_alloc_info+0x3b/0x50 [ 18.985769] __kasan_kmalloc+0xb7/0xc0 [ 18.985966] __kmalloc_cache_noprof+0x189/0x420 [ 18.986188] kasan_atomics+0x95/0x310 [ 18.986391] kunit_try_run_case+0x1a5/0x480 [ 18.986587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.986807] kthread+0x337/0x6f0 [ 18.986963] ret_from_fork+0x41/0x80 [ 18.987118] ret_from_fork_asm+0x1a/0x30 [ 18.987467] [ 18.987632] The buggy address belongs to the object at ffff888102b21f80 [ 18.987632] which belongs to the cache kmalloc-64 of size 64 [ 18.988059] The buggy address is located 0 bytes to the right of [ 18.988059] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.988501] [ 18.988666] The buggy address belongs to the physical page: [ 18.989108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.990772] flags: 0x200000000000000(node=0|zone=2) [ 18.991013] page_type: f5(slab) [ 18.991768] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.992585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.993620] page dumped because: kasan: bad access detected [ 18.994452] [ 18.994687] Memory state around the buggy address: [ 18.994979] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.995657] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.996321] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.996868] ^ [ 18.997461] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.998063] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.998703] ================================================================== [ 18.906022] ================================================================== [ 18.906836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 18.907553] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.908017] [ 18.908291] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.908410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.908441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.908488] Call Trace: [ 18.908536] <TASK> [ 18.908585] dump_stack_lvl+0x73/0xb0 [ 18.908659] print_report+0xd1/0x650 [ 18.908716] ? __virt_addr_valid+0x1db/0x2d0 [ 18.908775] ? kasan_atomics_helper+0x18b1/0x5450 [ 18.908831] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.908892] ? kasan_atomics_helper+0x18b1/0x5450 [ 18.908947] kasan_report+0x141/0x180 [ 18.909006] ? kasan_atomics_helper+0x18b1/0x5450 [ 18.909087] kasan_check_range+0x10c/0x1c0 [ 18.909143] __kasan_check_write+0x18/0x20 [ 18.909200] kasan_atomics_helper+0x18b1/0x5450 [ 18.909260] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.909320] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.909388] ? kasan_atomics+0x152/0x310 [ 18.909433] kasan_atomics+0x1dc/0x310 [ 18.909478] ? __pfx_kasan_atomics+0x10/0x10 [ 18.909526] ? __pfx_read_tsc+0x10/0x10 [ 18.909570] ? ktime_get_ts64+0x86/0x230 [ 18.909620] kunit_try_run_case+0x1a5/0x480 [ 18.909675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.909727] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.909780] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.909829] ? __kthread_parkme+0x82/0x180 [ 18.909877] ? preempt_count_sub+0x50/0x80 [ 18.909934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.909990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.910053] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.910105] kthread+0x337/0x6f0 [ 18.910147] ? trace_preempt_on+0x20/0xc0 [ 18.910202] ? __pfx_kthread+0x10/0x10 [ 18.910245] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.910298] ? calculate_sigpending+0x7b/0xa0 [ 18.910382] ? __pfx_kthread+0x10/0x10 [ 18.910450] ret_from_fork+0x41/0x80 [ 18.910508] ? __pfx_kthread+0x10/0x10 [ 18.910556] ret_from_fork_asm+0x1a/0x30 [ 18.910635] </TASK> [ 18.910662] [ 18.921236] Allocated by task 286: [ 18.921711] kasan_save_stack+0x45/0x70 [ 18.921971] kasan_save_track+0x18/0x40 [ 18.922324] kasan_save_alloc_info+0x3b/0x50 [ 18.922729] __kasan_kmalloc+0xb7/0xc0 [ 18.923166] __kmalloc_cache_noprof+0x189/0x420 [ 18.923488] kasan_atomics+0x95/0x310 [ 18.923787] kunit_try_run_case+0x1a5/0x480 [ 18.924058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.924562] kthread+0x337/0x6f0 [ 18.924893] ret_from_fork+0x41/0x80 [ 18.925117] ret_from_fork_asm+0x1a/0x30 [ 18.925485] [ 18.925663] The buggy address belongs to the object at ffff888102b21f80 [ 18.925663] which belongs to the cache kmalloc-64 of size 64 [ 18.926376] The buggy address is located 0 bytes to the right of [ 18.926376] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.926920] [ 18.927054] The buggy address belongs to the physical page: [ 18.927280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.927602] flags: 0x200000000000000(node=0|zone=2) [ 18.927831] page_type: f5(slab) [ 18.928024] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.928315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.928964] page dumped because: kasan: bad access detected [ 18.929568] [ 18.929763] Memory state around the buggy address: [ 18.930173] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.930803] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.931503] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.931961] ^ [ 18.932409] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.932814] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.933118] ================================================================== [ 18.080436] ================================================================== [ 18.081054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 18.081480] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.082044] [ 18.082305] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.082426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.082458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.082508] Call Trace: [ 18.082555] <TASK> [ 18.082600] dump_stack_lvl+0x73/0xb0 [ 18.082663] print_report+0xd1/0x650 [ 18.082715] ? __virt_addr_valid+0x1db/0x2d0 [ 18.082771] ? kasan_atomics_helper+0xb6a/0x5450 [ 18.082823] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.082878] ? kasan_atomics_helper+0xb6a/0x5450 [ 18.082923] kasan_report+0x141/0x180 [ 18.082974] ? kasan_atomics_helper+0xb6a/0x5450 [ 18.083030] kasan_check_range+0x10c/0x1c0 [ 18.083122] __kasan_check_write+0x18/0x20 [ 18.083174] kasan_atomics_helper+0xb6a/0x5450 [ 18.083227] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.083284] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.083356] ? kasan_atomics+0x152/0x310 [ 18.083417] kasan_atomics+0x1dc/0x310 [ 18.083467] ? __pfx_kasan_atomics+0x10/0x10 [ 18.083523] ? __pfx_read_tsc+0x10/0x10 [ 18.083573] ? ktime_get_ts64+0x86/0x230 [ 18.083637] kunit_try_run_case+0x1a5/0x480 [ 18.083700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.083755] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.083815] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.083875] ? __kthread_parkme+0x82/0x180 [ 18.083929] ? preempt_count_sub+0x50/0x80 [ 18.083991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.084051] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.084144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.084206] kthread+0x337/0x6f0 [ 18.084245] ? trace_preempt_on+0x20/0xc0 [ 18.084278] ? __pfx_kthread+0x10/0x10 [ 18.084301] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.084328] ? calculate_sigpending+0x7b/0xa0 [ 18.084374] ? __pfx_kthread+0x10/0x10 [ 18.084398] ret_from_fork+0x41/0x80 [ 18.084422] ? __pfx_kthread+0x10/0x10 [ 18.084444] ret_from_fork_asm+0x1a/0x30 [ 18.084480] </TASK> [ 18.084495] [ 18.095788] Allocated by task 286: [ 18.096124] kasan_save_stack+0x45/0x70 [ 18.096437] kasan_save_track+0x18/0x40 [ 18.096690] kasan_save_alloc_info+0x3b/0x50 [ 18.096922] __kasan_kmalloc+0xb7/0xc0 [ 18.097200] __kmalloc_cache_noprof+0x189/0x420 [ 18.097610] kasan_atomics+0x95/0x310 [ 18.097943] kunit_try_run_case+0x1a5/0x480 [ 18.098282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.098585] kthread+0x337/0x6f0 [ 18.098771] ret_from_fork+0x41/0x80 [ 18.099108] ret_from_fork_asm+0x1a/0x30 [ 18.099466] [ 18.099634] The buggy address belongs to the object at ffff888102b21f80 [ 18.099634] which belongs to the cache kmalloc-64 of size 64 [ 18.100497] The buggy address is located 0 bytes to the right of [ 18.100497] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.100942] [ 18.101079] The buggy address belongs to the physical page: [ 18.101463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.102271] flags: 0x200000000000000(node=0|zone=2) [ 18.102620] page_type: f5(slab) [ 18.102805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.103108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.103672] page dumped because: kasan: bad access detected [ 18.104099] [ 18.104267] Memory state around the buggy address: [ 18.104647] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.104982] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.105419] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.105888] ^ [ 18.106248] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.106533] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.106802] ================================================================== [ 18.480160] ================================================================== [ 18.480594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 18.480879] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.481150] [ 18.481367] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.481474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.481495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.481522] Call Trace: [ 18.481550] <TASK> [ 18.481581] dump_stack_lvl+0x73/0xb0 [ 18.481626] print_report+0xd1/0x650 [ 18.481676] ? __virt_addr_valid+0x1db/0x2d0 [ 18.481733] ? kasan_atomics_helper+0x1217/0x5450 [ 18.481786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.481844] ? kasan_atomics_helper+0x1217/0x5450 [ 18.481888] kasan_report+0x141/0x180 [ 18.481917] ? kasan_atomics_helper+0x1217/0x5450 [ 18.481952] kasan_check_range+0x10c/0x1c0 [ 18.481978] __kasan_check_write+0x18/0x20 [ 18.482003] kasan_atomics_helper+0x1217/0x5450 [ 18.482031] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.482060] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.482088] ? kasan_atomics+0x152/0x310 [ 18.482117] kasan_atomics+0x1dc/0x310 [ 18.482140] ? __pfx_kasan_atomics+0x10/0x10 [ 18.482165] ? __pfx_read_tsc+0x10/0x10 [ 18.482191] ? ktime_get_ts64+0x86/0x230 [ 18.482222] kunit_try_run_case+0x1a5/0x480 [ 18.482252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.482278] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.482309] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.482381] ? __kthread_parkme+0x82/0x180 [ 18.482448] ? preempt_count_sub+0x50/0x80 [ 18.482521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.482574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.482635] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.482696] kthread+0x337/0x6f0 [ 18.482740] ? trace_preempt_on+0x20/0xc0 [ 18.482790] ? __pfx_kthread+0x10/0x10 [ 18.482837] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.482891] ? calculate_sigpending+0x7b/0xa0 [ 18.482947] ? __pfx_kthread+0x10/0x10 [ 18.482996] ret_from_fork+0x41/0x80 [ 18.483045] ? __pfx_kthread+0x10/0x10 [ 18.483103] ret_from_fork_asm+0x1a/0x30 [ 18.483157] </TASK> [ 18.483175] [ 18.493824] Allocated by task 286: [ 18.494239] kasan_save_stack+0x45/0x70 [ 18.494519] kasan_save_track+0x18/0x40 [ 18.494871] kasan_save_alloc_info+0x3b/0x50 [ 18.495353] __kasan_kmalloc+0xb7/0xc0 [ 18.495569] __kmalloc_cache_noprof+0x189/0x420 [ 18.495787] kasan_atomics+0x95/0x310 [ 18.495975] kunit_try_run_case+0x1a5/0x480 [ 18.496408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.497034] kthread+0x337/0x6f0 [ 18.497378] ret_from_fork+0x41/0x80 [ 18.497702] ret_from_fork_asm+0x1a/0x30 [ 18.497926] [ 18.498050] The buggy address belongs to the object at ffff888102b21f80 [ 18.498050] which belongs to the cache kmalloc-64 of size 64 [ 18.498939] The buggy address is located 0 bytes to the right of [ 18.498939] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.499545] [ 18.499763] The buggy address belongs to the physical page: [ 18.500255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.500801] flags: 0x200000000000000(node=0|zone=2) [ 18.501313] page_type: f5(slab) [ 18.501528] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.502082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.502389] page dumped because: kasan: bad access detected [ 18.502614] [ 18.502722] Memory state around the buggy address: [ 18.502938] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.503210] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.503653] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.504262] ^ [ 18.504687] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.505299] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.505863] ================================================================== [ 17.584315] ================================================================== [ 17.584853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 17.585183] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.585856] [ 17.586122] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.586351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.586381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.586426] Call Trace: [ 17.586471] <TASK> [ 17.586514] dump_stack_lvl+0x73/0xb0 [ 17.586578] print_report+0xd1/0x650 [ 17.586630] ? __virt_addr_valid+0x1db/0x2d0 [ 17.586674] ? kasan_atomics_helper+0x4b88/0x5450 [ 17.586723] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.586774] ? kasan_atomics_helper+0x4b88/0x5450 [ 17.586821] kasan_report+0x141/0x180 [ 17.586871] ? kasan_atomics_helper+0x4b88/0x5450 [ 17.586930] __asan_report_load4_noabort+0x18/0x20 [ 17.586978] kasan_atomics_helper+0x4b88/0x5450 [ 17.587032] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.587119] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.587171] ? kasan_atomics+0x152/0x310 [ 17.587363] kasan_atomics+0x1dc/0x310 [ 17.587408] ? __pfx_kasan_atomics+0x10/0x10 [ 17.587439] ? __pfx_read_tsc+0x10/0x10 [ 17.587478] ? ktime_get_ts64+0x86/0x230 [ 17.587527] kunit_try_run_case+0x1a5/0x480 [ 17.587581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.587623] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.587668] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.587716] ? __kthread_parkme+0x82/0x180 [ 17.587762] ? preempt_count_sub+0x50/0x80 [ 17.587816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.587864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.587914] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.587969] kthread+0x337/0x6f0 [ 17.588002] ? trace_preempt_on+0x20/0xc0 [ 17.588053] ? __pfx_kthread+0x10/0x10 [ 17.588131] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.588162] ? calculate_sigpending+0x7b/0xa0 [ 17.588190] ? __pfx_kthread+0x10/0x10 [ 17.588263] ret_from_fork+0x41/0x80 [ 17.588314] ? __pfx_kthread+0x10/0x10 [ 17.588364] ret_from_fork_asm+0x1a/0x30 [ 17.588403] </TASK> [ 17.588417] [ 17.602493] Allocated by task 286: [ 17.602776] kasan_save_stack+0x45/0x70 [ 17.603068] kasan_save_track+0x18/0x40 [ 17.603764] kasan_save_alloc_info+0x3b/0x50 [ 17.604266] __kasan_kmalloc+0xb7/0xc0 [ 17.604491] __kmalloc_cache_noprof+0x189/0x420 [ 17.604887] kasan_atomics+0x95/0x310 [ 17.605411] kunit_try_run_case+0x1a5/0x480 [ 17.605964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.606300] kthread+0x337/0x6f0 [ 17.606585] ret_from_fork+0x41/0x80 [ 17.606843] ret_from_fork_asm+0x1a/0x30 [ 17.607294] [ 17.607687] The buggy address belongs to the object at ffff888102b21f80 [ 17.607687] which belongs to the cache kmalloc-64 of size 64 [ 17.608845] The buggy address is located 0 bytes to the right of [ 17.608845] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.609765] [ 17.610354] The buggy address belongs to the physical page: [ 17.610828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.611328] flags: 0x200000000000000(node=0|zone=2) [ 17.611905] page_type: f5(slab) [ 17.612433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.612756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.613179] page dumped because: kasan: bad access detected [ 17.613882] [ 17.614101] Memory state around the buggy address: [ 17.614635] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.615007] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.615731] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.616472] ^ [ 17.616831] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.617484] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.617643] ================================================================== [ 17.719686] ================================================================== [ 17.720457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 17.721135] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.721777] [ 17.722007] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.722151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.722185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.722271] Call Trace: [ 17.722322] <TASK> [ 17.722383] dump_stack_lvl+0x73/0xb0 [ 17.722456] print_report+0xd1/0x650 [ 17.722549] ? __virt_addr_valid+0x1db/0x2d0 [ 17.722605] ? kasan_atomics_helper+0x4a0/0x5450 [ 17.722657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.722714] ? kasan_atomics_helper+0x4a0/0x5450 [ 17.722802] kasan_report+0x141/0x180 [ 17.722860] ? kasan_atomics_helper+0x4a0/0x5450 [ 17.722925] kasan_check_range+0x10c/0x1c0 [ 17.723011] __kasan_check_write+0x18/0x20 [ 17.723096] kasan_atomics_helper+0x4a0/0x5450 [ 17.723151] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.723208] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.723299] ? kasan_atomics+0x152/0x310 [ 17.723374] kasan_atomics+0x1dc/0x310 [ 17.723422] ? __pfx_kasan_atomics+0x10/0x10 [ 17.723499] ? __pfx_read_tsc+0x10/0x10 [ 17.723546] ? ktime_get_ts64+0x86/0x230 [ 17.723630] kunit_try_run_case+0x1a5/0x480 [ 17.723689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.723736] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.723790] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.723849] ? __kthread_parkme+0x82/0x180 [ 17.723904] ? preempt_count_sub+0x50/0x80 [ 17.723955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.723988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.724020] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.724050] kthread+0x337/0x6f0 [ 17.724108] ? trace_preempt_on+0x20/0xc0 [ 17.724142] ? __pfx_kthread+0x10/0x10 [ 17.724164] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.724190] ? calculate_sigpending+0x7b/0xa0 [ 17.724217] ? __pfx_kthread+0x10/0x10 [ 17.724241] ret_from_fork+0x41/0x80 [ 17.724267] ? __pfx_kthread+0x10/0x10 [ 17.724290] ret_from_fork_asm+0x1a/0x30 [ 17.724327] </TASK> [ 17.724362] [ 17.739158] Allocated by task 286: [ 17.739414] kasan_save_stack+0x45/0x70 [ 17.739654] kasan_save_track+0x18/0x40 [ 17.740138] kasan_save_alloc_info+0x3b/0x50 [ 17.740512] __kasan_kmalloc+0xb7/0xc0 [ 17.740783] __kmalloc_cache_noprof+0x189/0x420 [ 17.741505] kasan_atomics+0x95/0x310 [ 17.741734] kunit_try_run_case+0x1a5/0x480 [ 17.742402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.742700] kthread+0x337/0x6f0 [ 17.743247] ret_from_fork+0x41/0x80 [ 17.743446] ret_from_fork_asm+0x1a/0x30 [ 17.744087] [ 17.744377] The buggy address belongs to the object at ffff888102b21f80 [ 17.744377] which belongs to the cache kmalloc-64 of size 64 [ 17.745393] The buggy address is located 0 bytes to the right of [ 17.745393] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.746434] [ 17.746669] The buggy address belongs to the physical page: [ 17.747180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.747585] flags: 0x200000000000000(node=0|zone=2) [ 17.747719] page_type: f5(slab) [ 17.747820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.747971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.748189] page dumped because: kasan: bad access detected [ 17.748619] [ 17.748831] Memory state around the buggy address: [ 17.749278] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.749802] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.750441] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.750736] ^ [ 17.751035] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.751500] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.752039] ================================================================== [ 19.063677] ================================================================== [ 19.063942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 19.064205] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.065872] [ 19.066478] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.066606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.066639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.066692] Call Trace: [ 19.066737] <TASK> [ 19.066786] dump_stack_lvl+0x73/0xb0 [ 19.066859] print_report+0xd1/0x650 [ 19.066919] ? __virt_addr_valid+0x1db/0x2d0 [ 19.066979] ? kasan_atomics_helper+0x1c18/0x5450 [ 19.067035] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.067096] ? kasan_atomics_helper+0x1c18/0x5450 [ 19.067153] kasan_report+0x141/0x180 [ 19.067209] ? kasan_atomics_helper+0x1c18/0x5450 [ 19.067280] kasan_check_range+0x10c/0x1c0 [ 19.067353] __kasan_check_write+0x18/0x20 [ 19.067408] kasan_atomics_helper+0x1c18/0x5450 [ 19.067469] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.067530] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.067578] ? kasan_atomics+0x152/0x310 [ 19.067624] kasan_atomics+0x1dc/0x310 [ 19.067699] ? __pfx_kasan_atomics+0x10/0x10 [ 19.067754] ? __pfx_read_tsc+0x10/0x10 [ 19.067803] ? ktime_get_ts64+0x86/0x230 [ 19.067867] kunit_try_run_case+0x1a5/0x480 [ 19.067931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.067986] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.068046] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.068107] ? __kthread_parkme+0x82/0x180 [ 19.068138] ? preempt_count_sub+0x50/0x80 [ 19.068167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.068195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.068225] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.068253] kthread+0x337/0x6f0 [ 19.068274] ? trace_preempt_on+0x20/0xc0 [ 19.068301] ? __pfx_kthread+0x10/0x10 [ 19.068323] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.068370] ? calculate_sigpending+0x7b/0xa0 [ 19.068397] ? __pfx_kthread+0x10/0x10 [ 19.068419] ret_from_fork+0x41/0x80 [ 19.068443] ? __pfx_kthread+0x10/0x10 [ 19.068465] ret_from_fork_asm+0x1a/0x30 [ 19.068500] </TASK> [ 19.068515] [ 19.082508] Allocated by task 286: [ 19.082756] kasan_save_stack+0x45/0x70 [ 19.083009] kasan_save_track+0x18/0x40 [ 19.083772] kasan_save_alloc_info+0x3b/0x50 [ 19.084217] __kasan_kmalloc+0xb7/0xc0 [ 19.084486] __kmalloc_cache_noprof+0x189/0x420 [ 19.084847] kasan_atomics+0x95/0x310 [ 19.085434] kunit_try_run_case+0x1a5/0x480 [ 19.085740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.086328] kthread+0x337/0x6f0 [ 19.086705] ret_from_fork+0x41/0x80 [ 19.086922] ret_from_fork_asm+0x1a/0x30 [ 19.087349] [ 19.087749] The buggy address belongs to the object at ffff888102b21f80 [ 19.087749] which belongs to the cache kmalloc-64 of size 64 [ 19.088817] The buggy address is located 0 bytes to the right of [ 19.088817] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.090010] [ 19.090390] The buggy address belongs to the physical page: [ 19.090793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.091360] flags: 0x200000000000000(node=0|zone=2) [ 19.091822] page_type: f5(slab) [ 19.092039] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.092422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.092768] page dumped because: kasan: bad access detected [ 19.093051] [ 19.093179] Memory state around the buggy address: [ 19.093447] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.093723] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.094178] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.094777] ^ [ 19.095274] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.095819] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.096407] ================================================================== [ 18.816702] ================================================================== [ 18.817122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 18.817477] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.818029] [ 18.818315] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.818438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.818469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.818521] Call Trace: [ 18.818571] <TASK> [ 18.818619] dump_stack_lvl+0x73/0xb0 [ 18.818686] print_report+0xd1/0x650 [ 18.818745] ? __virt_addr_valid+0x1db/0x2d0 [ 18.818803] ? kasan_atomics_helper+0x16e7/0x5450 [ 18.818860] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.818917] ? kasan_atomics_helper+0x16e7/0x5450 [ 18.818975] kasan_report+0x141/0x180 [ 18.819032] ? kasan_atomics_helper+0x16e7/0x5450 [ 18.819102] kasan_check_range+0x10c/0x1c0 [ 18.819150] __kasan_check_write+0x18/0x20 [ 18.819189] kasan_atomics_helper+0x16e7/0x5450 [ 18.819233] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.819282] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.819351] ? kasan_atomics+0x152/0x310 [ 18.819405] kasan_atomics+0x1dc/0x310 [ 18.819454] ? __pfx_kasan_atomics+0x10/0x10 [ 18.819506] ? __pfx_read_tsc+0x10/0x10 [ 18.819559] ? ktime_get_ts64+0x86/0x230 [ 18.819621] kunit_try_run_case+0x1a5/0x480 [ 18.819685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.819738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.819822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.819876] ? __kthread_parkme+0x82/0x180 [ 18.819926] ? preempt_count_sub+0x50/0x80 [ 18.819976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.820027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.820096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.820171] kthread+0x337/0x6f0 [ 18.820216] ? trace_preempt_on+0x20/0xc0 [ 18.820265] ? __pfx_kthread+0x10/0x10 [ 18.820309] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.820378] ? calculate_sigpending+0x7b/0xa0 [ 18.820432] ? __pfx_kthread+0x10/0x10 [ 18.820480] ret_from_fork+0x41/0x80 [ 18.820533] ? __pfx_kthread+0x10/0x10 [ 18.820581] ret_from_fork_asm+0x1a/0x30 [ 18.820660] </TASK> [ 18.820691] [ 18.831650] Allocated by task 286: [ 18.832663] kasan_save_stack+0x45/0x70 [ 18.832943] kasan_save_track+0x18/0x40 [ 18.833554] kasan_save_alloc_info+0x3b/0x50 [ 18.834329] __kasan_kmalloc+0xb7/0xc0 [ 18.834784] __kmalloc_cache_noprof+0x189/0x420 [ 18.835165] kasan_atomics+0x95/0x310 [ 18.835414] kunit_try_run_case+0x1a5/0x480 [ 18.835763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.836105] kthread+0x337/0x6f0 [ 18.836471] ret_from_fork+0x41/0x80 [ 18.836728] ret_from_fork_asm+0x1a/0x30 [ 18.837127] [ 18.837390] The buggy address belongs to the object at ffff888102b21f80 [ 18.837390] which belongs to the cache kmalloc-64 of size 64 [ 18.838140] The buggy address is located 0 bytes to the right of [ 18.838140] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.839092] [ 18.839250] The buggy address belongs to the physical page: [ 18.839720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.840358] flags: 0x200000000000000(node=0|zone=2) [ 18.840735] page_type: f5(slab) [ 18.841137] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.841756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.842259] page dumped because: kasan: bad access detected [ 18.842600] [ 18.842811] Memory state around the buggy address: [ 18.843218] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.843722] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.844272] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.844648] ^ [ 18.844847] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.845541] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.845831] ================================================================== [ 19.125666] ================================================================== [ 19.126743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 19.127394] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.127861] [ 19.128116] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.128222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.128254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.128297] Call Trace: [ 19.128354] <TASK> [ 19.128402] dump_stack_lvl+0x73/0xb0 [ 19.128465] print_report+0xd1/0x650 [ 19.128519] ? __virt_addr_valid+0x1db/0x2d0 [ 19.128574] ? kasan_atomics_helper+0x1ce1/0x5450 [ 19.128622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.128676] ? kasan_atomics_helper+0x1ce1/0x5450 [ 19.128726] kasan_report+0x141/0x180 [ 19.128776] ? kasan_atomics_helper+0x1ce1/0x5450 [ 19.128840] kasan_check_range+0x10c/0x1c0 [ 19.128889] __kasan_check_write+0x18/0x20 [ 19.128940] kasan_atomics_helper+0x1ce1/0x5450 [ 19.128993] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.129099] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.129155] ? kasan_atomics+0x152/0x310 [ 19.129189] kasan_atomics+0x1dc/0x310 [ 19.129215] ? __pfx_kasan_atomics+0x10/0x10 [ 19.129242] ? __pfx_read_tsc+0x10/0x10 [ 19.129268] ? ktime_get_ts64+0x86/0x230 [ 19.129306] kunit_try_run_case+0x1a5/0x480 [ 19.129373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.129419] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.129469] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.129525] ? __kthread_parkme+0x82/0x180 [ 19.129573] ? preempt_count_sub+0x50/0x80 [ 19.129625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.129673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.129729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.129786] kthread+0x337/0x6f0 [ 19.129829] ? trace_preempt_on+0x20/0xc0 [ 19.129884] ? __pfx_kthread+0x10/0x10 [ 19.129926] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.129978] ? calculate_sigpending+0x7b/0xa0 [ 19.130030] ? __pfx_kthread+0x10/0x10 [ 19.130110] ret_from_fork+0x41/0x80 [ 19.130163] ? __pfx_kthread+0x10/0x10 [ 19.130206] ret_from_fork_asm+0x1a/0x30 [ 19.130277] </TASK> [ 19.130305] [ 19.141319] Allocated by task 286: [ 19.141748] kasan_save_stack+0x45/0x70 [ 19.142225] kasan_save_track+0x18/0x40 [ 19.142461] kasan_save_alloc_info+0x3b/0x50 [ 19.142676] __kasan_kmalloc+0xb7/0xc0 [ 19.142864] __kmalloc_cache_noprof+0x189/0x420 [ 19.143203] kasan_atomics+0x95/0x310 [ 19.143395] kunit_try_run_case+0x1a5/0x480 [ 19.143693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.144005] kthread+0x337/0x6f0 [ 19.144241] ret_from_fork+0x41/0x80 [ 19.144510] ret_from_fork_asm+0x1a/0x30 [ 19.144872] [ 19.145077] The buggy address belongs to the object at ffff888102b21f80 [ 19.145077] which belongs to the cache kmalloc-64 of size 64 [ 19.146347] The buggy address is located 0 bytes to the right of [ 19.146347] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.148258] [ 19.148502] The buggy address belongs to the physical page: [ 19.148955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.150238] flags: 0x200000000000000(node=0|zone=2) [ 19.150729] page_type: f5(slab) [ 19.151073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.151440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.151851] page dumped because: kasan: bad access detected [ 19.152272] [ 19.152462] Memory state around the buggy address: [ 19.152770] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.153513] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.154030] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.154717] ^ [ 19.155082] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.155487] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.155861] ================================================================== [ 17.754183] ================================================================== [ 17.755009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 17.755413] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.755632] [ 17.755749] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.755823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.755842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.755875] Call Trace: [ 17.755910] <TASK> [ 17.755942] dump_stack_lvl+0x73/0xb0 [ 17.755978] print_report+0xd1/0x650 [ 17.756006] ? __virt_addr_valid+0x1db/0x2d0 [ 17.756035] ? kasan_atomics_helper+0x4b3a/0x5450 [ 17.756061] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.756104] ? kasan_atomics_helper+0x4b3a/0x5450 [ 17.756147] kasan_report+0x141/0x180 [ 17.756195] ? kasan_atomics_helper+0x4b3a/0x5450 [ 17.756255] __asan_report_store4_noabort+0x1b/0x30 [ 17.756307] kasan_atomics_helper+0x4b3a/0x5450 [ 17.756381] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.756437] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.756485] ? kasan_atomics+0x152/0x310 [ 17.756527] kasan_atomics+0x1dc/0x310 [ 17.756567] ? __pfx_kasan_atomics+0x10/0x10 [ 17.756615] ? __pfx_read_tsc+0x10/0x10 [ 17.756660] ? ktime_get_ts64+0x86/0x230 [ 17.756721] kunit_try_run_case+0x1a5/0x480 [ 17.756782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.756837] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.756896] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.756958] ? __kthread_parkme+0x82/0x180 [ 17.757003] ? preempt_count_sub+0x50/0x80 [ 17.757069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.757124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.757175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.757232] kthread+0x337/0x6f0 [ 17.757275] ? trace_preempt_on+0x20/0xc0 [ 17.757324] ? __pfx_kthread+0x10/0x10 [ 17.757384] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.757430] ? calculate_sigpending+0x7b/0xa0 [ 17.757481] ? __pfx_kthread+0x10/0x10 [ 17.757531] ret_from_fork+0x41/0x80 [ 17.757581] ? __pfx_kthread+0x10/0x10 [ 17.757628] ret_from_fork_asm+0x1a/0x30 [ 17.757668] </TASK> [ 17.757683] [ 17.769125] Allocated by task 286: [ 17.769538] kasan_save_stack+0x45/0x70 [ 17.769888] kasan_save_track+0x18/0x40 [ 17.770365] kasan_save_alloc_info+0x3b/0x50 [ 17.770680] __kasan_kmalloc+0xb7/0xc0 [ 17.771051] __kmalloc_cache_noprof+0x189/0x420 [ 17.771364] kasan_atomics+0x95/0x310 [ 17.771564] kunit_try_run_case+0x1a5/0x480 [ 17.771773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.772295] kthread+0x337/0x6f0 [ 17.772629] ret_from_fork+0x41/0x80 [ 17.772974] ret_from_fork_asm+0x1a/0x30 [ 17.773373] [ 17.773565] The buggy address belongs to the object at ffff888102b21f80 [ 17.773565] which belongs to the cache kmalloc-64 of size 64 [ 17.774418] The buggy address is located 0 bytes to the right of [ 17.774418] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.775181] [ 17.775452] The buggy address belongs to the physical page: [ 17.775863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.776436] flags: 0x200000000000000(node=0|zone=2) [ 17.776813] page_type: f5(slab) [ 17.777200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.777522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.777820] page dumped because: kasan: bad access detected [ 17.778357] [ 17.778554] Memory state around the buggy address: [ 17.778971] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.779591] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.780172] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.780649] ^ [ 17.780985] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.781517] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.782023] ================================================================== [ 18.108180] ================================================================== [ 18.109660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 18.110548] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.111133] [ 18.111400] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.111505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.111537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.111587] Call Trace: [ 18.111636] <TASK> [ 18.111681] dump_stack_lvl+0x73/0xb0 [ 18.111750] print_report+0xd1/0x650 [ 18.111808] ? __virt_addr_valid+0x1db/0x2d0 [ 18.111869] ? kasan_atomics_helper+0xc70/0x5450 [ 18.111925] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.111982] ? kasan_atomics_helper+0xc70/0x5450 [ 18.112028] kasan_report+0x141/0x180 [ 18.112075] ? kasan_atomics_helper+0xc70/0x5450 [ 18.112129] kasan_check_range+0x10c/0x1c0 [ 18.112174] __kasan_check_write+0x18/0x20 [ 18.112224] kasan_atomics_helper+0xc70/0x5450 [ 18.112286] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.112359] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.112415] ? kasan_atomics+0x152/0x310 [ 18.112475] kasan_atomics+0x1dc/0x310 [ 18.112526] ? __pfx_kasan_atomics+0x10/0x10 [ 18.112580] ? __pfx_read_tsc+0x10/0x10 [ 18.112633] ? ktime_get_ts64+0x86/0x230 [ 18.112695] kunit_try_run_case+0x1a5/0x480 [ 18.112757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.112812] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.112873] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.112934] ? __kthread_parkme+0x82/0x180 [ 18.112988] ? preempt_count_sub+0x50/0x80 [ 18.113065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.113115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.113168] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.113227] kthread+0x337/0x6f0 [ 18.113269] ? trace_preempt_on+0x20/0xc0 [ 18.113325] ? __pfx_kthread+0x10/0x10 [ 18.113385] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.113432] ? calculate_sigpending+0x7b/0xa0 [ 18.113477] ? __pfx_kthread+0x10/0x10 [ 18.113519] ret_from_fork+0x41/0x80 [ 18.113569] ? __pfx_kthread+0x10/0x10 [ 18.113616] ret_from_fork_asm+0x1a/0x30 [ 18.113696] </TASK> [ 18.113725] [ 18.123753] Allocated by task 286: [ 18.124066] kasan_save_stack+0x45/0x70 [ 18.124432] kasan_save_track+0x18/0x40 [ 18.124702] kasan_save_alloc_info+0x3b/0x50 [ 18.124916] __kasan_kmalloc+0xb7/0xc0 [ 18.125315] __kmalloc_cache_noprof+0x189/0x420 [ 18.125695] kasan_atomics+0x95/0x310 [ 18.125937] kunit_try_run_case+0x1a5/0x480 [ 18.126268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.126611] kthread+0x337/0x6f0 [ 18.126822] ret_from_fork+0x41/0x80 [ 18.127109] ret_from_fork_asm+0x1a/0x30 [ 18.127377] [ 18.127523] The buggy address belongs to the object at ffff888102b21f80 [ 18.127523] which belongs to the cache kmalloc-64 of size 64 [ 18.128102] The buggy address is located 0 bytes to the right of [ 18.128102] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.129062] [ 18.129191] The buggy address belongs to the physical page: [ 18.129443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.129759] flags: 0x200000000000000(node=0|zone=2) [ 18.129995] page_type: f5(slab) [ 18.130191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.130667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.131569] page dumped because: kasan: bad access detected [ 18.132018] [ 18.132212] Memory state around the buggy address: [ 18.132632] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.133219] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.133780] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.134316] ^ [ 18.134560] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.134837] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.135396] ================================================================== [ 18.789362] ================================================================== [ 18.789746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 18.790287] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.790799] [ 18.790983] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.791076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.791104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.791150] Call Trace: [ 18.791195] <TASK> [ 18.791244] dump_stack_lvl+0x73/0xb0 [ 18.791306] print_report+0xd1/0x650 [ 18.791374] ? __virt_addr_valid+0x1db/0x2d0 [ 18.791429] ? kasan_atomics_helper+0x164f/0x5450 [ 18.791837] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.791877] ? kasan_atomics_helper+0x164f/0x5450 [ 18.791906] kasan_report+0x141/0x180 [ 18.791934] ? kasan_atomics_helper+0x164f/0x5450 [ 18.791966] kasan_check_range+0x10c/0x1c0 [ 18.791991] __kasan_check_write+0x18/0x20 [ 18.792014] kasan_atomics_helper+0x164f/0x5450 [ 18.792043] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.792107] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.792141] ? kasan_atomics+0x152/0x310 [ 18.792170] kasan_atomics+0x1dc/0x310 [ 18.792193] ? __pfx_kasan_atomics+0x10/0x10 [ 18.792219] ? __pfx_read_tsc+0x10/0x10 [ 18.792244] ? ktime_get_ts64+0x86/0x230 [ 18.792275] kunit_try_run_case+0x1a5/0x480 [ 18.792305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.792351] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.792384] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.792412] ? __kthread_parkme+0x82/0x180 [ 18.792440] ? preempt_count_sub+0x50/0x80 [ 18.792470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.792498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.792528] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.792557] kthread+0x337/0x6f0 [ 18.792578] ? trace_preempt_on+0x20/0xc0 [ 18.792607] ? __pfx_kthread+0x10/0x10 [ 18.792629] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.792655] ? calculate_sigpending+0x7b/0xa0 [ 18.792682] ? __pfx_kthread+0x10/0x10 [ 18.792705] ret_from_fork+0x41/0x80 [ 18.792729] ? __pfx_kthread+0x10/0x10 [ 18.792752] ret_from_fork_asm+0x1a/0x30 [ 18.792789] </TASK> [ 18.792804] [ 18.803470] Allocated by task 286: [ 18.803697] kasan_save_stack+0x45/0x70 [ 18.803929] kasan_save_track+0x18/0x40 [ 18.804119] kasan_save_alloc_info+0x3b/0x50 [ 18.804501] __kasan_kmalloc+0xb7/0xc0 [ 18.804848] __kmalloc_cache_noprof+0x189/0x420 [ 18.805263] kasan_atomics+0x95/0x310 [ 18.805628] kunit_try_run_case+0x1a5/0x480 [ 18.806144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.806608] kthread+0x337/0x6f0 [ 18.806925] ret_from_fork+0x41/0x80 [ 18.807254] ret_from_fork_asm+0x1a/0x30 [ 18.807518] [ 18.807702] The buggy address belongs to the object at ffff888102b21f80 [ 18.807702] which belongs to the cache kmalloc-64 of size 64 [ 18.808350] The buggy address is located 0 bytes to the right of [ 18.808350] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.809043] [ 18.809245] The buggy address belongs to the physical page: [ 18.809894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.810285] flags: 0x200000000000000(node=0|zone=2) [ 18.810541] page_type: f5(slab) [ 18.810854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.811596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.812007] page dumped because: kasan: bad access detected [ 18.812513] [ 18.812632] Memory state around the buggy address: [ 18.812845] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.813138] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.813749] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.814420] ^ [ 18.814712] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.815192] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.815508] ================================================================== [ 18.626475] ================================================================== [ 18.627203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 18.627735] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.628428] [ 18.628712] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.628825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.628857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.628941] Call Trace: [ 18.628990] <TASK> [ 18.629066] dump_stack_lvl+0x73/0xb0 [ 18.629150] print_report+0xd1/0x650 [ 18.629182] ? __virt_addr_valid+0x1db/0x2d0 [ 18.629212] ? kasan_atomics_helper+0x4eae/0x5450 [ 18.629238] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.629266] ? kasan_atomics_helper+0x4eae/0x5450 [ 18.629293] kasan_report+0x141/0x180 [ 18.629320] ? kasan_atomics_helper+0x4eae/0x5450 [ 18.629373] __asan_report_load8_noabort+0x18/0x20 [ 18.629401] kasan_atomics_helper+0x4eae/0x5450 [ 18.629430] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.629458] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.629486] ? kasan_atomics+0x152/0x310 [ 18.629515] kasan_atomics+0x1dc/0x310 [ 18.629538] ? __pfx_kasan_atomics+0x10/0x10 [ 18.629565] ? __pfx_read_tsc+0x10/0x10 [ 18.629590] ? ktime_get_ts64+0x86/0x230 [ 18.629621] kunit_try_run_case+0x1a5/0x480 [ 18.629653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.629678] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.629707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.629735] ? __kthread_parkme+0x82/0x180 [ 18.629762] ? preempt_count_sub+0x50/0x80 [ 18.629791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.629819] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.629847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.629875] kthread+0x337/0x6f0 [ 18.629895] ? trace_preempt_on+0x20/0xc0 [ 18.629922] ? __pfx_kthread+0x10/0x10 [ 18.629943] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.629969] ? calculate_sigpending+0x7b/0xa0 [ 18.629995] ? __pfx_kthread+0x10/0x10 [ 18.630018] ret_from_fork+0x41/0x80 [ 18.630043] ? __pfx_kthread+0x10/0x10 [ 18.630073] ret_from_fork_asm+0x1a/0x30 [ 18.630115] </TASK> [ 18.630130] [ 18.642886] Allocated by task 286: [ 18.643776] kasan_save_stack+0x45/0x70 [ 18.644358] kasan_save_track+0x18/0x40 [ 18.644559] kasan_save_alloc_info+0x3b/0x50 [ 18.644832] __kasan_kmalloc+0xb7/0xc0 [ 18.645247] __kmalloc_cache_noprof+0x189/0x420 [ 18.645488] kasan_atomics+0x95/0x310 [ 18.645815] kunit_try_run_case+0x1a5/0x480 [ 18.646582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.646862] kthread+0x337/0x6f0 [ 18.647155] ret_from_fork+0x41/0x80 [ 18.647399] ret_from_fork_asm+0x1a/0x30 [ 18.648061] [ 18.648181] The buggy address belongs to the object at ffff888102b21f80 [ 18.648181] which belongs to the cache kmalloc-64 of size 64 [ 18.649518] The buggy address is located 0 bytes to the right of [ 18.649518] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.650267] [ 18.650491] The buggy address belongs to the physical page: [ 18.650941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.651394] flags: 0x200000000000000(node=0|zone=2) [ 18.651938] page_type: f5(slab) [ 18.652267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.653009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.653467] page dumped because: kasan: bad access detected [ 18.653759] [ 18.653948] Memory state around the buggy address: [ 18.654309] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.654641] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.654975] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.655932] ^ [ 18.656294] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.656793] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.657298] ================================================================== [ 18.562577] ================================================================== [ 18.563437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 18.564229] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.565243] [ 18.565529] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.565645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.565679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.565732] Call Trace: [ 18.565783] <TASK> [ 18.565833] dump_stack_lvl+0x73/0xb0 [ 18.565906] print_report+0xd1/0x650 [ 18.565967] ? __virt_addr_valid+0x1db/0x2d0 [ 18.566026] ? kasan_atomics_helper+0x49ce/0x5450 [ 18.566102] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.566151] ? kasan_atomics_helper+0x49ce/0x5450 [ 18.566204] kasan_report+0x141/0x180 [ 18.566266] ? kasan_atomics_helper+0x49ce/0x5450 [ 18.566366] __asan_report_load4_noabort+0x18/0x20 [ 18.566428] kasan_atomics_helper+0x49ce/0x5450 [ 18.566491] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.566545] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.566601] ? kasan_atomics+0x152/0x310 [ 18.566662] kasan_atomics+0x1dc/0x310 [ 18.566712] ? __pfx_kasan_atomics+0x10/0x10 [ 18.566768] ? __pfx_read_tsc+0x10/0x10 [ 18.566820] ? ktime_get_ts64+0x86/0x230 [ 18.566882] kunit_try_run_case+0x1a5/0x480 [ 18.566940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.566996] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.567052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.567100] ? __kthread_parkme+0x82/0x180 [ 18.567144] ? preempt_count_sub+0x50/0x80 [ 18.567197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.567251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.567311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.567386] kthread+0x337/0x6f0 [ 18.567431] ? trace_preempt_on+0x20/0xc0 [ 18.567489] ? __pfx_kthread+0x10/0x10 [ 18.567536] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.567590] ? calculate_sigpending+0x7b/0xa0 [ 18.567643] ? __pfx_kthread+0x10/0x10 [ 18.567692] ret_from_fork+0x41/0x80 [ 18.567744] ? __pfx_kthread+0x10/0x10 [ 18.567791] ret_from_fork_asm+0x1a/0x30 [ 18.567868] </TASK> [ 18.567897] [ 18.578274] Allocated by task 286: [ 18.578669] kasan_save_stack+0x45/0x70 [ 18.579051] kasan_save_track+0x18/0x40 [ 18.579422] kasan_save_alloc_info+0x3b/0x50 [ 18.579802] __kasan_kmalloc+0xb7/0xc0 [ 18.582452] __kmalloc_cache_noprof+0x189/0x420 [ 18.582823] kasan_atomics+0x95/0x310 [ 18.583141] kunit_try_run_case+0x1a5/0x480 [ 18.583428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.584560] kthread+0x337/0x6f0 [ 18.584779] ret_from_fork+0x41/0x80 [ 18.584973] ret_from_fork_asm+0x1a/0x30 [ 18.585196] [ 18.585328] The buggy address belongs to the object at ffff888102b21f80 [ 18.585328] which belongs to the cache kmalloc-64 of size 64 [ 18.585886] The buggy address is located 0 bytes to the right of [ 18.585886] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.586901] [ 18.587191] The buggy address belongs to the physical page: [ 18.587764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.588456] flags: 0x200000000000000(node=0|zone=2) [ 18.588754] page_type: f5(slab) [ 18.589146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.589558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.590092] page dumped because: kasan: bad access detected [ 18.590544] [ 18.590733] Memory state around the buggy address: [ 18.590991] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.591455] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.592018] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.592525] ^ [ 18.592877] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.593392] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.593863] ================================================================== [ 19.031607] ================================================================== [ 19.032328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 19.032821] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.033285] [ 19.033548] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.033691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.033734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.033784] Call Trace: [ 19.033850] <TASK> [ 19.033896] dump_stack_lvl+0x73/0xb0 [ 19.033971] print_report+0xd1/0x650 [ 19.034032] ? __virt_addr_valid+0x1db/0x2d0 [ 19.034125] ? kasan_atomics_helper+0x1b22/0x5450 [ 19.034172] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.034220] ? kasan_atomics_helper+0x1b22/0x5450 [ 19.034272] kasan_report+0x141/0x180 [ 19.034325] ? kasan_atomics_helper+0x1b22/0x5450 [ 19.034416] kasan_check_range+0x10c/0x1c0 [ 19.034487] __kasan_check_write+0x18/0x20 [ 19.034533] kasan_atomics_helper+0x1b22/0x5450 [ 19.034591] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.034657] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.034731] ? kasan_atomics+0x152/0x310 [ 19.034786] kasan_atomics+0x1dc/0x310 [ 19.034834] ? __pfx_kasan_atomics+0x10/0x10 [ 19.034895] ? __pfx_read_tsc+0x10/0x10 [ 19.034964] ? ktime_get_ts64+0x86/0x230 [ 19.035025] kunit_try_run_case+0x1a5/0x480 [ 19.035111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.035166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.035226] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.035283] ? __kthread_parkme+0x82/0x180 [ 19.035331] ? preempt_count_sub+0x50/0x80 [ 19.035424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.035496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.035559] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.035620] kthread+0x337/0x6f0 [ 19.035665] ? trace_preempt_on+0x20/0xc0 [ 19.035711] ? __pfx_kthread+0x10/0x10 [ 19.035734] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.035761] ? calculate_sigpending+0x7b/0xa0 [ 19.035789] ? __pfx_kthread+0x10/0x10 [ 19.035811] ret_from_fork+0x41/0x80 [ 19.035837] ? __pfx_kthread+0x10/0x10 [ 19.035858] ret_from_fork_asm+0x1a/0x30 [ 19.035896] </TASK> [ 19.035912] [ 19.049154] Allocated by task 286: [ 19.049356] kasan_save_stack+0x45/0x70 [ 19.049644] kasan_save_track+0x18/0x40 [ 19.049915] kasan_save_alloc_info+0x3b/0x50 [ 19.050231] __kasan_kmalloc+0xb7/0xc0 [ 19.050681] __kmalloc_cache_noprof+0x189/0x420 [ 19.050920] kasan_atomics+0x95/0x310 [ 19.051223] kunit_try_run_case+0x1a5/0x480 [ 19.051662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.052145] kthread+0x337/0x6f0 [ 19.052406] ret_from_fork+0x41/0x80 [ 19.052615] ret_from_fork_asm+0x1a/0x30 [ 19.052835] [ 19.052959] The buggy address belongs to the object at ffff888102b21f80 [ 19.052959] which belongs to the cache kmalloc-64 of size 64 [ 19.054564] The buggy address is located 0 bytes to the right of [ 19.054564] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.055113] [ 19.055231] The buggy address belongs to the physical page: [ 19.055443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.055701] flags: 0x200000000000000(node=0|zone=2) [ 19.057191] page_type: f5(slab) [ 19.057561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.058502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.058978] page dumped because: kasan: bad access detected [ 19.059193] [ 19.059703] Memory state around the buggy address: [ 19.060158] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.060822] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.061599] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.061887] ^ [ 19.062110] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.062492] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.062716] ================================================================== [ 19.226267] ================================================================== [ 19.226717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 19.227019] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.227792] [ 19.228056] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.228386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.228429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.228483] Call Trace: [ 19.228533] <TASK> [ 19.228581] dump_stack_lvl+0x73/0xb0 [ 19.228658] print_report+0xd1/0x650 [ 19.228717] ? __virt_addr_valid+0x1db/0x2d0 [ 19.228766] ? kasan_atomics_helper+0x1eaa/0x5450 [ 19.228813] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.228868] ? kasan_atomics_helper+0x1eaa/0x5450 [ 19.228918] kasan_report+0x141/0x180 [ 19.228962] ? kasan_atomics_helper+0x1eaa/0x5450 [ 19.229053] kasan_check_range+0x10c/0x1c0 [ 19.229143] __kasan_check_write+0x18/0x20 [ 19.229185] kasan_atomics_helper+0x1eaa/0x5450 [ 19.229231] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.229273] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.229315] ? kasan_atomics+0x152/0x310 [ 19.229377] kasan_atomics+0x1dc/0x310 [ 19.229416] ? __pfx_kasan_atomics+0x10/0x10 [ 19.229457] ? __pfx_read_tsc+0x10/0x10 [ 19.229494] ? ktime_get_ts64+0x86/0x230 [ 19.229544] kunit_try_run_case+0x1a5/0x480 [ 19.229595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.229638] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.229687] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.229733] ? __kthread_parkme+0x82/0x180 [ 19.229778] ? preempt_count_sub+0x50/0x80 [ 19.229835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.229895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.229936] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.229976] kthread+0x337/0x6f0 [ 19.230004] ? trace_preempt_on+0x20/0xc0 [ 19.230042] ? __pfx_kthread+0x10/0x10 [ 19.230105] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.230136] ? calculate_sigpending+0x7b/0xa0 [ 19.230164] ? __pfx_kthread+0x10/0x10 [ 19.230186] ret_from_fork+0x41/0x80 [ 19.230212] ? __pfx_kthread+0x10/0x10 [ 19.230235] ret_from_fork_asm+0x1a/0x30 [ 19.230272] </TASK> [ 19.230287] [ 19.242055] Allocated by task 286: [ 19.242312] kasan_save_stack+0x45/0x70 [ 19.242545] kasan_save_track+0x18/0x40 [ 19.242944] kasan_save_alloc_info+0x3b/0x50 [ 19.243222] __kasan_kmalloc+0xb7/0xc0 [ 19.243454] __kmalloc_cache_noprof+0x189/0x420 [ 19.243804] kasan_atomics+0x95/0x310 [ 19.244168] kunit_try_run_case+0x1a5/0x480 [ 19.244521] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.244929] kthread+0x337/0x6f0 [ 19.245317] ret_from_fork+0x41/0x80 [ 19.245520] ret_from_fork_asm+0x1a/0x30 [ 19.245700] [ 19.245806] The buggy address belongs to the object at ffff888102b21f80 [ 19.245806] which belongs to the cache kmalloc-64 of size 64 [ 19.246212] The buggy address is located 0 bytes to the right of [ 19.246212] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.246698] [ 19.246829] The buggy address belongs to the physical page: [ 19.247096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.247513] flags: 0x200000000000000(node=0|zone=2) [ 19.247696] page_type: f5(slab) [ 19.247941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.249685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.251639] page dumped because: kasan: bad access detected [ 19.252066] [ 19.252178] Memory state around the buggy address: [ 19.252376] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.252624] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.252863] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.253114] ^ [ 19.253304] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.253992] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.254598] ================================================================== [ 18.507064] ================================================================== [ 18.507463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 18.507789] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.508389] [ 18.508630] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.508742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.508773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.508825] Call Trace: [ 18.508875] <TASK> [ 18.508923] dump_stack_lvl+0x73/0xb0 [ 18.508994] print_report+0xd1/0x650 [ 18.509094] ? __virt_addr_valid+0x1db/0x2d0 [ 18.509139] ? kasan_atomics_helper+0x49e8/0x5450 [ 18.509179] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.509218] ? kasan_atomics_helper+0x49e8/0x5450 [ 18.509256] kasan_report+0x141/0x180 [ 18.509293] ? kasan_atomics_helper+0x49e8/0x5450 [ 18.509353] __asan_report_load4_noabort+0x18/0x20 [ 18.509395] kasan_atomics_helper+0x49e8/0x5450 [ 18.509434] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.509472] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.509510] ? kasan_atomics+0x152/0x310 [ 18.509557] kasan_atomics+0x1dc/0x310 [ 18.509599] ? __pfx_kasan_atomics+0x10/0x10 [ 18.509637] ? __pfx_read_tsc+0x10/0x10 [ 18.509676] ? ktime_get_ts64+0x86/0x230 [ 18.509732] kunit_try_run_case+0x1a5/0x480 [ 18.509789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.509847] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.509916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.509970] ? __kthread_parkme+0x82/0x180 [ 18.510023] ? preempt_count_sub+0x50/0x80 [ 18.510076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.510126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.510184] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.510249] kthread+0x337/0x6f0 [ 18.510309] ? trace_preempt_on+0x20/0xc0 [ 18.510379] ? __pfx_kthread+0x10/0x10 [ 18.510424] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.510475] ? calculate_sigpending+0x7b/0xa0 [ 18.510530] ? __pfx_kthread+0x10/0x10 [ 18.510576] ret_from_fork+0x41/0x80 [ 18.510630] ? __pfx_kthread+0x10/0x10 [ 18.510677] ret_from_fork_asm+0x1a/0x30 [ 18.510754] </TASK> [ 18.510783] [ 18.521277] Allocated by task 286: [ 18.521671] kasan_save_stack+0x45/0x70 [ 18.522071] kasan_save_track+0x18/0x40 [ 18.522382] kasan_save_alloc_info+0x3b/0x50 [ 18.522566] __kasan_kmalloc+0xb7/0xc0 [ 18.522929] __kmalloc_cache_noprof+0x189/0x420 [ 18.523398] kasan_atomics+0x95/0x310 [ 18.523658] kunit_try_run_case+0x1a5/0x480 [ 18.523973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.524537] kthread+0x337/0x6f0 [ 18.524712] ret_from_fork+0x41/0x80 [ 18.524894] ret_from_fork_asm+0x1a/0x30 [ 18.525104] [ 18.525228] The buggy address belongs to the object at ffff888102b21f80 [ 18.525228] which belongs to the cache kmalloc-64 of size 64 [ 18.526238] The buggy address is located 0 bytes to the right of [ 18.526238] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.527533] [ 18.527657] The buggy address belongs to the physical page: [ 18.528011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.528492] flags: 0x200000000000000(node=0|zone=2) [ 18.528905] page_type: f5(slab) [ 18.529112] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.529426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.529717] page dumped because: kasan: bad access detected [ 18.529946] [ 18.530068] Memory state around the buggy address: [ 18.530281] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.530860] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.531530] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.532093] ^ [ 18.532523] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.533290] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.533884] ================================================================== [ 17.659528] ================================================================== [ 17.659945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 17.660665] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.661605] [ 17.661858] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.661988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.662018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.662064] Call Trace: [ 17.662111] <TASK> [ 17.662182] dump_stack_lvl+0x73/0xb0 [ 17.662274] print_report+0xd1/0x650 [ 17.662318] ? __virt_addr_valid+0x1db/0x2d0 [ 17.662372] ? kasan_atomics_helper+0x3df/0x5450 [ 17.662400] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.662429] ? kasan_atomics_helper+0x3df/0x5450 [ 17.662467] kasan_report+0x141/0x180 [ 17.662502] ? kasan_atomics_helper+0x3df/0x5450 [ 17.662535] kasan_check_range+0x10c/0x1c0 [ 17.662560] __kasan_check_read+0x15/0x20 [ 17.662583] kasan_atomics_helper+0x3df/0x5450 [ 17.662611] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.662638] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.662666] ? kasan_atomics+0x152/0x310 [ 17.662694] kasan_atomics+0x1dc/0x310 [ 17.662717] ? __pfx_kasan_atomics+0x10/0x10 [ 17.662742] ? __pfx_read_tsc+0x10/0x10 [ 17.662767] ? ktime_get_ts64+0x86/0x230 [ 17.662797] kunit_try_run_case+0x1a5/0x480 [ 17.662827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.662852] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.662881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.662909] ? __kthread_parkme+0x82/0x180 [ 17.662936] ? preempt_count_sub+0x50/0x80 [ 17.662965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.662994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.663022] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.663052] kthread+0x337/0x6f0 [ 17.663095] ? trace_preempt_on+0x20/0xc0 [ 17.663123] ? __pfx_kthread+0x10/0x10 [ 17.663145] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.663171] ? calculate_sigpending+0x7b/0xa0 [ 17.663197] ? __pfx_kthread+0x10/0x10 [ 17.663220] ret_from_fork+0x41/0x80 [ 17.663244] ? __pfx_kthread+0x10/0x10 [ 17.663265] ret_from_fork_asm+0x1a/0x30 [ 17.663300] </TASK> [ 17.663315] [ 17.674862] Allocated by task 286: [ 17.675264] kasan_save_stack+0x45/0x70 [ 17.675693] kasan_save_track+0x18/0x40 [ 17.676092] kasan_save_alloc_info+0x3b/0x50 [ 17.676509] __kasan_kmalloc+0xb7/0xc0 [ 17.676866] __kmalloc_cache_noprof+0x189/0x420 [ 17.677421] kasan_atomics+0x95/0x310 [ 17.677828] kunit_try_run_case+0x1a5/0x480 [ 17.678282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.678792] kthread+0x337/0x6f0 [ 17.679164] ret_from_fork+0x41/0x80 [ 17.679547] ret_from_fork_asm+0x1a/0x30 [ 17.679937] [ 17.680190] The buggy address belongs to the object at ffff888102b21f80 [ 17.680190] which belongs to the cache kmalloc-64 of size 64 [ 17.681101] The buggy address is located 0 bytes to the right of [ 17.681101] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.681807] [ 17.682050] The buggy address belongs to the physical page: [ 17.682623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.683179] flags: 0x200000000000000(node=0|zone=2) [ 17.683506] page_type: f5(slab) [ 17.683884] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.684685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.685100] page dumped because: kasan: bad access detected [ 17.685537] [ 17.685730] Memory state around the buggy address: [ 17.686106] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.686617] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.686935] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.687199] ^ [ 17.687592] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.688204] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.688925] ================================================================== [ 17.937733] ================================================================== [ 17.938494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 17.938822] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.939458] [ 17.939628] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.939738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.939770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.939822] Call Trace: [ 17.939873] <TASK> [ 17.939924] dump_stack_lvl+0x73/0xb0 [ 17.939992] print_report+0xd1/0x650 [ 17.940052] ? __virt_addr_valid+0x1db/0x2d0 [ 17.940103] ? kasan_atomics_helper+0x860/0x5450 [ 17.940155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.940209] ? kasan_atomics_helper+0x860/0x5450 [ 17.940269] kasan_report+0x141/0x180 [ 17.940324] ? kasan_atomics_helper+0x860/0x5450 [ 17.940411] kasan_check_range+0x10c/0x1c0 [ 17.940463] __kasan_check_write+0x18/0x20 [ 17.940505] kasan_atomics_helper+0x860/0x5450 [ 17.940554] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.940609] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.940666] ? kasan_atomics+0x152/0x310 [ 17.940724] kasan_atomics+0x1dc/0x310 [ 17.940775] ? __pfx_kasan_atomics+0x10/0x10 [ 17.940831] ? __pfx_read_tsc+0x10/0x10 [ 17.940883] ? ktime_get_ts64+0x86/0x230 [ 17.940945] kunit_try_run_case+0x1a5/0x480 [ 17.941009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.941091] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.941147] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.941200] ? __kthread_parkme+0x82/0x180 [ 17.941250] ? preempt_count_sub+0x50/0x80 [ 17.941365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.941423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.941487] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.941545] kthread+0x337/0x6f0 [ 17.941584] ? trace_preempt_on+0x20/0xc0 [ 17.941630] ? __pfx_kthread+0x10/0x10 [ 17.941670] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.941722] ? calculate_sigpending+0x7b/0xa0 [ 17.941773] ? __pfx_kthread+0x10/0x10 [ 17.941823] ret_from_fork+0x41/0x80 [ 17.941874] ? __pfx_kthread+0x10/0x10 [ 17.941922] ret_from_fork_asm+0x1a/0x30 [ 17.941999] </TASK> [ 17.942031] [ 17.952330] Allocated by task 286: [ 17.952564] kasan_save_stack+0x45/0x70 [ 17.952797] kasan_save_track+0x18/0x40 [ 17.952995] kasan_save_alloc_info+0x3b/0x50 [ 17.953373] __kasan_kmalloc+0xb7/0xc0 [ 17.953693] __kmalloc_cache_noprof+0x189/0x420 [ 17.954027] kasan_atomics+0x95/0x310 [ 17.954331] kunit_try_run_case+0x1a5/0x480 [ 17.954683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.955105] kthread+0x337/0x6f0 [ 17.955418] ret_from_fork+0x41/0x80 [ 17.955743] ret_from_fork_asm+0x1a/0x30 [ 17.955961] [ 17.956129] The buggy address belongs to the object at ffff888102b21f80 [ 17.956129] which belongs to the cache kmalloc-64 of size 64 [ 17.956734] The buggy address is located 0 bytes to the right of [ 17.956734] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 17.957421] [ 17.957623] The buggy address belongs to the physical page: [ 17.958094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 17.958505] flags: 0x200000000000000(node=0|zone=2) [ 17.958740] page_type: f5(slab) [ 17.958935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.959221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.959514] page dumped because: kasan: bad access detected [ 17.959738] [ 17.959849] Memory state around the buggy address: [ 17.960062] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.960367] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.960890] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.961486] ^ [ 17.961908] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.962486] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.963227] ================================================================== [ 18.020881] ================================================================== [ 18.021959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 18.022621] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.023088] [ 18.023316] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.023453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.023483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.023535] Call Trace: [ 18.023582] <TASK> [ 18.023629] dump_stack_lvl+0x73/0xb0 [ 18.023696] print_report+0xd1/0x650 [ 18.023735] ? __virt_addr_valid+0x1db/0x2d0 [ 18.023773] ? kasan_atomics_helper+0xa2b/0x5450 [ 18.023817] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.023870] ? kasan_atomics_helper+0xa2b/0x5450 [ 18.023925] kasan_report+0x141/0x180 [ 18.023980] ? kasan_atomics_helper+0xa2b/0x5450 [ 18.024047] kasan_check_range+0x10c/0x1c0 [ 18.024108] __kasan_check_write+0x18/0x20 [ 18.024155] kasan_atomics_helper+0xa2b/0x5450 [ 18.024198] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.024248] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.024302] ? kasan_atomics+0x152/0x310 [ 18.024369] kasan_atomics+0x1dc/0x310 [ 18.024417] ? __pfx_kasan_atomics+0x10/0x10 [ 18.024464] ? __pfx_read_tsc+0x10/0x10 [ 18.024512] ? ktime_get_ts64+0x86/0x230 [ 18.024573] kunit_try_run_case+0x1a5/0x480 [ 18.024634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.024692] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.024754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.024814] ? __kthread_parkme+0x82/0x180 [ 18.024872] ? preempt_count_sub+0x50/0x80 [ 18.024936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.024999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.025077] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.025130] kthread+0x337/0x6f0 [ 18.025172] ? trace_preempt_on+0x20/0xc0 [ 18.025226] ? __pfx_kthread+0x10/0x10 [ 18.025274] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.025331] ? calculate_sigpending+0x7b/0xa0 [ 18.025407] ? __pfx_kthread+0x10/0x10 [ 18.025459] ret_from_fork+0x41/0x80 [ 18.025513] ? __pfx_kthread+0x10/0x10 [ 18.025564] ret_from_fork_asm+0x1a/0x30 [ 18.025643] </TASK> [ 18.025674] [ 18.035607] Allocated by task 286: [ 18.035807] kasan_save_stack+0x45/0x70 [ 18.036030] kasan_save_track+0x18/0x40 [ 18.036360] kasan_save_alloc_info+0x3b/0x50 [ 18.036731] __kasan_kmalloc+0xb7/0xc0 [ 18.037054] __kmalloc_cache_noprof+0x189/0x420 [ 18.037451] kasan_atomics+0x95/0x310 [ 18.037786] kunit_try_run_case+0x1a5/0x480 [ 18.038174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.038628] kthread+0x337/0x6f0 [ 18.038918] ret_from_fork+0x41/0x80 [ 18.039190] ret_from_fork_asm+0x1a/0x30 [ 18.039443] [ 18.039570] The buggy address belongs to the object at ffff888102b21f80 [ 18.039570] which belongs to the cache kmalloc-64 of size 64 [ 18.039994] The buggy address is located 0 bytes to the right of [ 18.039994] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.040942] [ 18.041148] The buggy address belongs to the physical page: [ 18.041657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.042145] flags: 0x200000000000000(node=0|zone=2) [ 18.042384] page_type: f5(slab) [ 18.042658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.042949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.043230] page dumped because: kasan: bad access detected [ 18.043605] [ 18.043784] Memory state around the buggy address: [ 18.044328] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.044883] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.045561] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.045902] ^ [ 18.046314] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.046664] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.047048] ================================================================== [ 19.504784] ================================================================== [ 19.505720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 19.506331] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.506900] [ 19.507148] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.507275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.507310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.507370] Call Trace: [ 19.507418] <TASK> [ 19.507465] dump_stack_lvl+0x73/0xb0 [ 19.507560] print_report+0xd1/0x650 [ 19.507616] ? __virt_addr_valid+0x1db/0x2d0 [ 19.507668] ? kasan_atomics_helper+0x224c/0x5450 [ 19.507720] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.507785] ? kasan_atomics_helper+0x224c/0x5450 [ 19.507856] kasan_report+0x141/0x180 [ 19.507904] ? kasan_atomics_helper+0x224c/0x5450 [ 19.507971] kasan_check_range+0x10c/0x1c0 [ 19.508030] __kasan_check_write+0x18/0x20 [ 19.508105] kasan_atomics_helper+0x224c/0x5450 [ 19.508164] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.508215] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.508268] ? kasan_atomics+0x152/0x310 [ 19.508325] kasan_atomics+0x1dc/0x310 [ 19.508399] ? __pfx_kasan_atomics+0x10/0x10 [ 19.508453] ? __pfx_read_tsc+0x10/0x10 [ 19.508497] ? ktime_get_ts64+0x86/0x230 [ 19.508536] kunit_try_run_case+0x1a5/0x480 [ 19.508567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.508593] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.508624] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.508652] ? __kthread_parkme+0x82/0x180 [ 19.508680] ? preempt_count_sub+0x50/0x80 [ 19.508709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.508738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.508766] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.508795] kthread+0x337/0x6f0 [ 19.508816] ? trace_preempt_on+0x20/0xc0 [ 19.508845] ? __pfx_kthread+0x10/0x10 [ 19.508868] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.508895] ? calculate_sigpending+0x7b/0xa0 [ 19.508922] ? __pfx_kthread+0x10/0x10 [ 19.508945] ret_from_fork+0x41/0x80 [ 19.508970] ? __pfx_kthread+0x10/0x10 [ 19.508992] ret_from_fork_asm+0x1a/0x30 [ 19.509043] </TASK> [ 19.509067] [ 19.522651] Allocated by task 286: [ 19.522847] kasan_save_stack+0x45/0x70 [ 19.523042] kasan_save_track+0x18/0x40 [ 19.523457] kasan_save_alloc_info+0x3b/0x50 [ 19.523845] __kasan_kmalloc+0xb7/0xc0 [ 19.524237] __kmalloc_cache_noprof+0x189/0x420 [ 19.524795] kasan_atomics+0x95/0x310 [ 19.525201] kunit_try_run_case+0x1a5/0x480 [ 19.525618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.526153] kthread+0x337/0x6f0 [ 19.526622] ret_from_fork+0x41/0x80 [ 19.527214] ret_from_fork_asm+0x1a/0x30 [ 19.527459] [ 19.527582] The buggy address belongs to the object at ffff888102b21f80 [ 19.527582] which belongs to the cache kmalloc-64 of size 64 [ 19.528420] The buggy address is located 0 bytes to the right of [ 19.528420] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.529510] [ 19.529757] The buggy address belongs to the physical page: [ 19.530295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.530984] flags: 0x200000000000000(node=0|zone=2) [ 19.531492] page_type: f5(slab) [ 19.531826] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.532300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.532889] page dumped because: kasan: bad access detected [ 19.533426] [ 19.533609] Memory state around the buggy address: [ 19.533928] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.534651] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.535019] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.535610] ^ [ 19.535990] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.536548] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.536781] ================================================================== [ 18.724318] ================================================================== [ 18.724833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 18.725803] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.726360] [ 18.726545] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.726657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.726688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.726739] Call Trace: [ 18.726789] <TASK> [ 18.726841] dump_stack_lvl+0x73/0xb0 [ 18.726914] print_report+0xd1/0x650 [ 18.726973] ? __virt_addr_valid+0x1db/0x2d0 [ 18.727034] ? kasan_atomics_helper+0x151d/0x5450 [ 18.727123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.727186] ? kasan_atomics_helper+0x151d/0x5450 [ 18.727244] kasan_report+0x141/0x180 [ 18.727294] ? kasan_atomics_helper+0x151d/0x5450 [ 18.727371] kasan_check_range+0x10c/0x1c0 [ 18.727464] __kasan_check_write+0x18/0x20 [ 18.727529] kasan_atomics_helper+0x151d/0x5450 [ 18.727587] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.727644] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.727700] ? kasan_atomics+0x152/0x310 [ 18.727786] kasan_atomics+0x1dc/0x310 [ 18.727854] ? __pfx_kasan_atomics+0x10/0x10 [ 18.727901] ? __pfx_read_tsc+0x10/0x10 [ 18.727951] ? ktime_get_ts64+0x86/0x230 [ 18.728014] kunit_try_run_case+0x1a5/0x480 [ 18.728106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.728163] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.728214] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.728245] ? __kthread_parkme+0x82/0x180 [ 18.728275] ? preempt_count_sub+0x50/0x80 [ 18.728305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.728353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.728395] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.728425] kthread+0x337/0x6f0 [ 18.728447] ? trace_preempt_on+0x20/0xc0 [ 18.728476] ? __pfx_kthread+0x10/0x10 [ 18.728499] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.728527] ? calculate_sigpending+0x7b/0xa0 [ 18.728554] ? __pfx_kthread+0x10/0x10 [ 18.728577] ret_from_fork+0x41/0x80 [ 18.728603] ? __pfx_kthread+0x10/0x10 [ 18.728626] ret_from_fork_asm+0x1a/0x30 [ 18.728663] </TASK> [ 18.728678] [ 18.739997] Allocated by task 286: [ 18.740255] kasan_save_stack+0x45/0x70 [ 18.740650] kasan_save_track+0x18/0x40 [ 18.741112] kasan_save_alloc_info+0x3b/0x50 [ 18.741446] __kasan_kmalloc+0xb7/0xc0 [ 18.741845] __kmalloc_cache_noprof+0x189/0x420 [ 18.742347] kasan_atomics+0x95/0x310 [ 18.742747] kunit_try_run_case+0x1a5/0x480 [ 18.743239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.743762] kthread+0x337/0x6f0 [ 18.744183] ret_from_fork+0x41/0x80 [ 18.744519] ret_from_fork_asm+0x1a/0x30 [ 18.744846] [ 18.745113] The buggy address belongs to the object at ffff888102b21f80 [ 18.745113] which belongs to the cache kmalloc-64 of size 64 [ 18.745792] The buggy address is located 0 bytes to the right of [ 18.745792] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.746522] [ 18.746660] The buggy address belongs to the physical page: [ 18.746893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.747576] flags: 0x200000000000000(node=0|zone=2) [ 18.747994] page_type: f5(slab) [ 18.748449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.748990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.749594] page dumped because: kasan: bad access detected [ 18.749880] [ 18.750119] Memory state around the buggy address: [ 18.750553] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.750840] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.751196] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.751599] ^ [ 18.752046] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.752659] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.753321] ================================================================== [ 17.992801] ================================================================== [ 17.993170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 17.994664] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 17.995276] [ 17.995555] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.995668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.995704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.995758] Call Trace: [ 17.995812] <TASK> [ 17.995860] dump_stack_lvl+0x73/0xb0 [ 17.995936] print_report+0xd1/0x650 [ 17.995997] ? __virt_addr_valid+0x1db/0x2d0 [ 17.996057] ? kasan_atomics_helper+0x992/0x5450 [ 17.996104] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.996155] ? kasan_atomics_helper+0x992/0x5450 [ 17.996204] kasan_report+0x141/0x180 [ 17.996250] ? kasan_atomics_helper+0x992/0x5450 [ 17.996306] kasan_check_range+0x10c/0x1c0 [ 17.996371] __kasan_check_write+0x18/0x20 [ 17.996417] kasan_atomics_helper+0x992/0x5450 [ 17.996467] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.996517] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.996572] ? kasan_atomics+0x152/0x310 [ 17.996620] kasan_atomics+0x1dc/0x310 [ 17.996663] ? __pfx_kasan_atomics+0x10/0x10 [ 17.996714] ? __pfx_read_tsc+0x10/0x10 [ 17.996760] ? ktime_get_ts64+0x86/0x230 [ 17.996820] kunit_try_run_case+0x1a5/0x480 [ 17.996872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.996923] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.996976] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.997041] ? __kthread_parkme+0x82/0x180 [ 17.997107] ? preempt_count_sub+0x50/0x80 [ 17.997171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.997233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.997297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.997379] kthread+0x337/0x6f0 [ 17.997427] ? trace_preempt_on+0x20/0xc0 [ 17.997489] ? __pfx_kthread+0x10/0x10 [ 17.997540] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.997600] ? calculate_sigpending+0x7b/0xa0 [ 17.997659] ? __pfx_kthread+0x10/0x10 [ 17.997709] ret_from_fork+0x41/0x80 [ 17.997764] ? __pfx_kthread+0x10/0x10 [ 17.997816] ret_from_fork_asm+0x1a/0x30 [ 17.997898] </TASK> [ 17.997928] [ 18.008715] Allocated by task 286: [ 18.009061] kasan_save_stack+0x45/0x70 [ 18.009454] kasan_save_track+0x18/0x40 [ 18.009666] kasan_save_alloc_info+0x3b/0x50 [ 18.009885] __kasan_kmalloc+0xb7/0xc0 [ 18.010096] __kmalloc_cache_noprof+0x189/0x420 [ 18.010511] kasan_atomics+0x95/0x310 [ 18.010816] kunit_try_run_case+0x1a5/0x480 [ 18.011214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.011700] kthread+0x337/0x6f0 [ 18.011872] ret_from_fork+0x41/0x80 [ 18.012219] ret_from_fork_asm+0x1a/0x30 [ 18.012559] [ 18.012684] The buggy address belongs to the object at ffff888102b21f80 [ 18.012684] which belongs to the cache kmalloc-64 of size 64 [ 18.013113] The buggy address is located 0 bytes to the right of [ 18.013113] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.014026] [ 18.014239] The buggy address belongs to the physical page: [ 18.014569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.014968] flags: 0x200000000000000(node=0|zone=2) [ 18.015400] page_type: f5(slab) [ 18.015598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.015906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.016433] page dumped because: kasan: bad access detected [ 18.016874] [ 18.017065] Memory state around the buggy address: [ 18.017450] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.017916] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.018440] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.018787] ^ [ 18.019048] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.019498] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.019772] ================================================================== [ 18.685511] ================================================================== [ 18.685837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 18.686194] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.686495] [ 18.686723] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.686834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.686867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.686916] Call Trace: [ 18.686964] <TASK> [ 18.687013] dump_stack_lvl+0x73/0xb0 [ 18.687113] print_report+0xd1/0x650 [ 18.687171] ? __virt_addr_valid+0x1db/0x2d0 [ 18.687230] ? kasan_atomics_helper+0x50d4/0x5450 [ 18.687284] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.687357] ? kasan_atomics_helper+0x50d4/0x5450 [ 18.687415] kasan_report+0x141/0x180 [ 18.687471] ? kasan_atomics_helper+0x50d4/0x5450 [ 18.687539] __asan_report_store8_noabort+0x1b/0x30 [ 18.687599] kasan_atomics_helper+0x50d4/0x5450 [ 18.687660] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.687721] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.687779] ? kasan_atomics+0x152/0x310 [ 18.687837] kasan_atomics+0x1dc/0x310 [ 18.687888] ? __pfx_kasan_atomics+0x10/0x10 [ 18.687941] ? __pfx_read_tsc+0x10/0x10 [ 18.687982] ? ktime_get_ts64+0x86/0x230 [ 18.688034] kunit_try_run_case+0x1a5/0x480 [ 18.688099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.688147] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.688200] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.688251] ? __kthread_parkme+0x82/0x180 [ 18.688388] ? preempt_count_sub+0x50/0x80 [ 18.688441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.688486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.688534] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.688578] kthread+0x337/0x6f0 [ 18.688961] ? trace_preempt_on+0x20/0xc0 [ 18.689110] ? __pfx_kthread+0x10/0x10 [ 18.689167] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.689216] ? calculate_sigpending+0x7b/0xa0 [ 18.689269] ? __pfx_kthread+0x10/0x10 [ 18.689319] ret_from_fork+0x41/0x80 [ 18.689392] ? __pfx_kthread+0x10/0x10 [ 18.689442] ret_from_fork_asm+0x1a/0x30 [ 18.689523] </TASK> [ 18.689552] [ 18.705831] Allocated by task 286: [ 18.706277] kasan_save_stack+0x45/0x70 [ 18.706690] kasan_save_track+0x18/0x40 [ 18.707029] kasan_save_alloc_info+0x3b/0x50 [ 18.707477] __kasan_kmalloc+0xb7/0xc0 [ 18.707805] __kmalloc_cache_noprof+0x189/0x420 [ 18.708004] kasan_atomics+0x95/0x310 [ 18.708206] kunit_try_run_case+0x1a5/0x480 [ 18.708436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.708787] kthread+0x337/0x6f0 [ 18.709008] ret_from_fork+0x41/0x80 [ 18.709246] ret_from_fork_asm+0x1a/0x30 [ 18.709465] [ 18.709588] The buggy address belongs to the object at ffff888102b21f80 [ 18.709588] which belongs to the cache kmalloc-64 of size 64 [ 18.710011] The buggy address is located 0 bytes to the right of [ 18.710011] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.710830] [ 18.711031] The buggy address belongs to the physical page: [ 18.711395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.711987] flags: 0x200000000000000(node=0|zone=2) [ 18.712447] page_type: f5(slab) [ 18.712758] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.713448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.714109] page dumped because: kasan: bad access detected [ 18.714332] [ 18.714555] Memory state around the buggy address: [ 18.714853] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.715276] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.715783] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.716145] ^ [ 18.718598] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.718887] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.719166] ================================================================== [ 18.292454] ================================================================== [ 18.293137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 18.294387] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.294943] [ 18.295114] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.295222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.295255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.295306] Call Trace: [ 18.295864] <TASK> [ 18.295917] dump_stack_lvl+0x73/0xb0 [ 18.295966] print_report+0xd1/0x650 [ 18.295996] ? __virt_addr_valid+0x1db/0x2d0 [ 18.296025] ? kasan_atomics_helper+0xfa9/0x5450 [ 18.296050] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.296100] ? kasan_atomics_helper+0xfa9/0x5450 [ 18.296128] kasan_report+0x141/0x180 [ 18.296155] ? kasan_atomics_helper+0xfa9/0x5450 [ 18.296186] kasan_check_range+0x10c/0x1c0 [ 18.296211] __kasan_check_write+0x18/0x20 [ 18.296235] kasan_atomics_helper+0xfa9/0x5450 [ 18.296261] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.296288] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.296318] ? kasan_atomics+0x152/0x310 [ 18.296363] kasan_atomics+0x1dc/0x310 [ 18.296389] ? __pfx_kasan_atomics+0x10/0x10 [ 18.296414] ? __pfx_read_tsc+0x10/0x10 [ 18.296438] ? ktime_get_ts64+0x86/0x230 [ 18.296468] kunit_try_run_case+0x1a5/0x480 [ 18.296498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.296523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.296553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.296581] ? __kthread_parkme+0x82/0x180 [ 18.296607] ? preempt_count_sub+0x50/0x80 [ 18.296637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.296665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.296693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.296721] kthread+0x337/0x6f0 [ 18.296741] ? trace_preempt_on+0x20/0xc0 [ 18.296769] ? __pfx_kthread+0x10/0x10 [ 18.296791] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.296817] ? calculate_sigpending+0x7b/0xa0 [ 18.296843] ? __pfx_kthread+0x10/0x10 [ 18.296865] ret_from_fork+0x41/0x80 [ 18.296889] ? __pfx_kthread+0x10/0x10 [ 18.296910] ret_from_fork_asm+0x1a/0x30 [ 18.296945] </TASK> [ 18.296960] [ 18.311643] Allocated by task 286: [ 18.311795] kasan_save_stack+0x45/0x70 [ 18.311927] kasan_save_track+0x18/0x40 [ 18.312022] kasan_save_alloc_info+0x3b/0x50 [ 18.312384] __kasan_kmalloc+0xb7/0xc0 [ 18.312726] __kmalloc_cache_noprof+0x189/0x420 [ 18.313383] kasan_atomics+0x95/0x310 [ 18.313642] kunit_try_run_case+0x1a5/0x480 [ 18.313906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.314202] kthread+0x337/0x6f0 [ 18.315150] ret_from_fork+0x41/0x80 [ 18.315373] ret_from_fork_asm+0x1a/0x30 [ 18.315910] [ 18.316411] The buggy address belongs to the object at ffff888102b21f80 [ 18.316411] which belongs to the cache kmalloc-64 of size 64 [ 18.317045] The buggy address is located 0 bytes to the right of [ 18.317045] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.318010] [ 18.318422] The buggy address belongs to the physical page: [ 18.318720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.319672] flags: 0x200000000000000(node=0|zone=2) [ 18.319899] page_type: f5(slab) [ 18.320203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.320891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.321722] page dumped because: kasan: bad access detected [ 18.322291] [ 18.322454] Memory state around the buggy address: [ 18.322769] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.323218] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.323777] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.324015] ^ [ 18.324466] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.324913] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.325356] ================================================================== [ 18.755154] ================================================================== [ 18.755649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 18.756531] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.757059] [ 18.757321] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.757444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.757476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.757547] Call Trace: [ 18.757599] <TASK> [ 18.757646] dump_stack_lvl+0x73/0xb0 [ 18.757732] print_report+0xd1/0x650 [ 18.757788] ? __virt_addr_valid+0x1db/0x2d0 [ 18.757842] ? kasan_atomics_helper+0x15b6/0x5450 [ 18.757907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.757959] ? kasan_atomics_helper+0x15b6/0x5450 [ 18.758010] kasan_report+0x141/0x180 [ 18.758062] ? kasan_atomics_helper+0x15b6/0x5450 [ 18.758127] kasan_check_range+0x10c/0x1c0 [ 18.758181] __kasan_check_write+0x18/0x20 [ 18.758228] kasan_atomics_helper+0x15b6/0x5450 [ 18.758280] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.758350] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.758426] ? kasan_atomics+0x152/0x310 [ 18.758484] kasan_atomics+0x1dc/0x310 [ 18.758536] ? __pfx_kasan_atomics+0x10/0x10 [ 18.758586] ? __pfx_read_tsc+0x10/0x10 [ 18.758632] ? ktime_get_ts64+0x86/0x230 [ 18.758711] kunit_try_run_case+0x1a5/0x480 [ 18.758771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.758820] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.758877] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.758933] ? __kthread_parkme+0x82/0x180 [ 18.758987] ? preempt_count_sub+0x50/0x80 [ 18.759041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.759116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.759172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.759232] kthread+0x337/0x6f0 [ 18.759276] ? trace_preempt_on+0x20/0xc0 [ 18.759321] ? __pfx_kthread+0x10/0x10 [ 18.759366] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.759397] ? calculate_sigpending+0x7b/0xa0 [ 18.759425] ? __pfx_kthread+0x10/0x10 [ 18.759449] ret_from_fork+0x41/0x80 [ 18.759475] ? __pfx_kthread+0x10/0x10 [ 18.759497] ret_from_fork_asm+0x1a/0x30 [ 18.759536] </TASK> [ 18.759551] [ 18.773537] Allocated by task 286: [ 18.773761] kasan_save_stack+0x45/0x70 [ 18.774196] kasan_save_track+0x18/0x40 [ 18.774594] kasan_save_alloc_info+0x3b/0x50 [ 18.775032] __kasan_kmalloc+0xb7/0xc0 [ 18.775467] __kmalloc_cache_noprof+0x189/0x420 [ 18.775893] kasan_atomics+0x95/0x310 [ 18.776308] kunit_try_run_case+0x1a5/0x480 [ 18.776587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.776818] kthread+0x337/0x6f0 [ 18.777588] ret_from_fork+0x41/0x80 [ 18.777798] ret_from_fork_asm+0x1a/0x30 [ 18.777969] [ 18.778081] The buggy address belongs to the object at ffff888102b21f80 [ 18.778081] which belongs to the cache kmalloc-64 of size 64 [ 18.779519] The buggy address is located 0 bytes to the right of [ 18.779519] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.780715] [ 18.780845] The buggy address belongs to the physical page: [ 18.781081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.781834] flags: 0x200000000000000(node=0|zone=2) [ 18.782381] page_type: f5(slab) [ 18.782685] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.783382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.783840] page dumped because: kasan: bad access detected [ 18.784292] [ 18.784499] Memory state around the buggy address: [ 18.784767] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.785424] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.786070] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.786439] ^ [ 18.786702] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.787075] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.787821] ================================================================== [ 19.192506] ================================================================== [ 19.192841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 19.193346] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 19.193662] [ 19.193874] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 19.193984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.194017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.194068] Call Trace: [ 19.194541] <TASK> [ 19.194581] dump_stack_lvl+0x73/0xb0 [ 19.194626] print_report+0xd1/0x650 [ 19.194655] ? __virt_addr_valid+0x1db/0x2d0 [ 19.194683] ? kasan_atomics_helper+0x1e12/0x5450 [ 19.194710] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.194738] ? kasan_atomics_helper+0x1e12/0x5450 [ 19.194765] kasan_report+0x141/0x180 [ 19.194790] ? kasan_atomics_helper+0x1e12/0x5450 [ 19.194822] kasan_check_range+0x10c/0x1c0 [ 19.194846] __kasan_check_write+0x18/0x20 [ 19.194870] kasan_atomics_helper+0x1e12/0x5450 [ 19.194899] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.194926] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.194953] ? kasan_atomics+0x152/0x310 [ 19.194980] kasan_atomics+0x1dc/0x310 [ 19.195004] ? __pfx_kasan_atomics+0x10/0x10 [ 19.195029] ? __pfx_read_tsc+0x10/0x10 [ 19.195053] ? ktime_get_ts64+0x86/0x230 [ 19.195096] kunit_try_run_case+0x1a5/0x480 [ 19.195127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.195153] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.195183] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.195210] ? __kthread_parkme+0x82/0x180 [ 19.195237] ? preempt_count_sub+0x50/0x80 [ 19.195267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.195295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.195324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.195373] kthread+0x337/0x6f0 [ 19.195395] ? trace_preempt_on+0x20/0xc0 [ 19.195422] ? __pfx_kthread+0x10/0x10 [ 19.195444] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.195470] ? calculate_sigpending+0x7b/0xa0 [ 19.195495] ? __pfx_kthread+0x10/0x10 [ 19.195517] ret_from_fork+0x41/0x80 [ 19.195541] ? __pfx_kthread+0x10/0x10 [ 19.195562] ret_from_fork_asm+0x1a/0x30 [ 19.195598] </TASK> [ 19.195612] [ 19.209950] Allocated by task 286: [ 19.210772] kasan_save_stack+0x45/0x70 [ 19.211028] kasan_save_track+0x18/0x40 [ 19.211212] kasan_save_alloc_info+0x3b/0x50 [ 19.211755] __kasan_kmalloc+0xb7/0xc0 [ 19.212367] __kmalloc_cache_noprof+0x189/0x420 [ 19.212664] kasan_atomics+0x95/0x310 [ 19.212998] kunit_try_run_case+0x1a5/0x480 [ 19.213525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.213758] kthread+0x337/0x6f0 [ 19.214100] ret_from_fork+0x41/0x80 [ 19.214392] ret_from_fork_asm+0x1a/0x30 [ 19.214734] [ 19.214860] The buggy address belongs to the object at ffff888102b21f80 [ 19.214860] which belongs to the cache kmalloc-64 of size 64 [ 19.215673] The buggy address is located 0 bytes to the right of [ 19.215673] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 19.216704] [ 19.217309] The buggy address belongs to the physical page: [ 19.217602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 19.217970] flags: 0x200000000000000(node=0|zone=2) [ 19.218704] page_type: f5(slab) [ 19.219130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.219570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.220002] page dumped because: kasan: bad access detected [ 19.220551] [ 19.220698] Memory state around the buggy address: [ 19.220967] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.221418] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.221962] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.222276] ^ [ 19.222681] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.223121] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.223533] ================================================================== [ 18.136936] ================================================================== [ 18.137797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 18.138370] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286 [ 18.138757] [ 18.138978] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 18.139079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.139109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.139166] Call Trace: [ 18.139212] <TASK> [ 18.139260] dump_stack_lvl+0x73/0xb0 [ 18.139324] print_report+0xd1/0x650 [ 18.139396] ? __virt_addr_valid+0x1db/0x2d0 [ 18.139451] ? kasan_atomics_helper+0x4a84/0x5450 [ 18.139507] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.139566] ? kasan_atomics_helper+0x4a84/0x5450 [ 18.139623] kasan_report+0x141/0x180 [ 18.139680] ? kasan_atomics_helper+0x4a84/0x5450 [ 18.139743] __asan_report_load4_noabort+0x18/0x20 [ 18.139792] kasan_atomics_helper+0x4a84/0x5450 [ 18.139843] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.139896] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.139953] ? kasan_atomics+0x152/0x310 [ 18.140013] kasan_atomics+0x1dc/0x310 [ 18.140065] ? __pfx_kasan_atomics+0x10/0x10 [ 18.140118] ? __pfx_read_tsc+0x10/0x10 [ 18.140166] ? ktime_get_ts64+0x86/0x230 [ 18.140230] kunit_try_run_case+0x1a5/0x480 [ 18.140291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.140359] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.140415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.140468] ? __kthread_parkme+0x82/0x180 [ 18.140510] ? preempt_count_sub+0x50/0x80 [ 18.140564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.140619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.140679] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.140738] kthread+0x337/0x6f0 [ 18.140782] ? trace_preempt_on+0x20/0xc0 [ 18.140840] ? __pfx_kthread+0x10/0x10 [ 18.140889] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.140944] ? calculate_sigpending+0x7b/0xa0 [ 18.141000] ? __pfx_kthread+0x10/0x10 [ 18.141059] ret_from_fork+0x41/0x80 [ 18.141109] ? __pfx_kthread+0x10/0x10 [ 18.141157] ret_from_fork_asm+0x1a/0x30 [ 18.141239] </TASK> [ 18.141304] [ 18.151043] Allocated by task 286: [ 18.151455] kasan_save_stack+0x45/0x70 [ 18.151794] kasan_save_track+0x18/0x40 [ 18.151979] kasan_save_alloc_info+0x3b/0x50 [ 18.152399] __kasan_kmalloc+0xb7/0xc0 [ 18.152730] __kmalloc_cache_noprof+0x189/0x420 [ 18.152947] kasan_atomics+0x95/0x310 [ 18.154835] kunit_try_run_case+0x1a5/0x480 [ 18.155213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.155592] kthread+0x337/0x6f0 [ 18.155824] ret_from_fork+0x41/0x80 [ 18.156055] ret_from_fork_asm+0x1a/0x30 [ 18.156315] [ 18.156511] The buggy address belongs to the object at ffff888102b21f80 [ 18.156511] which belongs to the cache kmalloc-64 of size 64 [ 18.157188] The buggy address is located 0 bytes to the right of [ 18.157188] allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0) [ 18.158505] [ 18.158651] The buggy address belongs to the physical page: [ 18.158887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21 [ 18.159189] flags: 0x200000000000000(node=0|zone=2) [ 18.159312] page_type: f5(slab) [ 18.159629] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.160479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.161206] page dumped because: kasan: bad access detected [ 18.161605] [ 18.161726] Memory state around the buggy address: [ 18.162459] ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.162852] ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.163190] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.163614] ^ [ 18.163866] ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.164497] ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.164774] ==================================================================