Date
July 8, 2025, 4:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.566452] ================================================================== [ 20.566507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 20.566747] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.566864] [ 20.566925] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.567011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.567039] Hardware name: linux,dummy-virt (DT) [ 20.567099] Call trace: [ 20.567124] show_stack+0x20/0x38 (C) [ 20.567181] dump_stack_lvl+0x8c/0xd0 [ 20.567231] print_report+0x118/0x608 [ 20.567280] kasan_report+0xdc/0x128 [ 20.567325] kasan_check_range+0x100/0x1a8 [ 20.567386] __kasan_check_write+0x20/0x30 [ 20.567442] kasan_atomics_helper+0x16d0/0x4858 [ 20.567491] kasan_atomics+0x198/0x2e0 [ 20.567537] kunit_try_run_case+0x170/0x3f0 [ 20.567587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.567643] kthread+0x328/0x630 [ 20.567692] ret_from_fork+0x10/0x20 [ 20.567741] [ 20.567763] Allocated by task 267: [ 20.567802] kasan_save_stack+0x3c/0x68 [ 20.567854] kasan_save_track+0x20/0x40 [ 20.567893] kasan_save_alloc_info+0x40/0x58 [ 20.567935] __kasan_kmalloc+0xd4/0xd8 [ 20.567972] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.568014] kasan_atomics+0xb8/0x2e0 [ 20.568051] kunit_try_run_case+0x170/0x3f0 [ 20.568093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.568149] kthread+0x328/0x630 [ 20.568198] ret_from_fork+0x10/0x20 [ 20.568643] [ 20.568745] The buggy address belongs to the object at fff00000c6e72400 [ 20.568745] which belongs to the cache kmalloc-64 of size 64 [ 20.569120] The buggy address is located 0 bytes to the right of [ 20.569120] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.569234] [ 20.569312] The buggy address belongs to the physical page: [ 20.569388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.569535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.569588] page_type: f5(slab) [ 20.569659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.569714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.569758] page dumped because: kasan: bad access detected [ 20.569923] [ 20.569998] Memory state around the buggy address: [ 20.570065] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.570118] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.570181] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.570256] ^ [ 20.570537] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.570621] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.570707] ================================================================== [ 20.456762] ================================================================== [ 20.456813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 20.456909] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.457088] [ 20.457144] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.457257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.457305] Hardware name: linux,dummy-virt (DT) [ 20.457350] Call trace: [ 20.457374] show_stack+0x20/0x38 (C) [ 20.457427] dump_stack_lvl+0x8c/0xd0 [ 20.457496] print_report+0x118/0x608 [ 20.457563] kasan_report+0xdc/0x128 [ 20.457628] __asan_report_store8_noabort+0x20/0x30 [ 20.457719] kasan_atomics_helper+0x3e5c/0x4858 [ 20.457768] kasan_atomics+0x198/0x2e0 [ 20.457814] kunit_try_run_case+0x170/0x3f0 [ 20.457864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.457919] kthread+0x328/0x630 [ 20.458082] ret_from_fork+0x10/0x20 [ 20.458142] [ 20.458181] Allocated by task 267: [ 20.458229] kasan_save_stack+0x3c/0x68 [ 20.458272] kasan_save_track+0x20/0x40 [ 20.460638] kasan_save_alloc_info+0x40/0x58 [ 20.460702] __kasan_kmalloc+0xd4/0xd8 [ 20.460741] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.460785] kasan_atomics+0xb8/0x2e0 [ 20.460821] kunit_try_run_case+0x170/0x3f0 [ 20.460864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.460911] kthread+0x328/0x630 [ 20.460950] ret_from_fork+0x10/0x20 [ 20.460988] [ 20.461010] The buggy address belongs to the object at fff00000c6e72400 [ 20.461010] which belongs to the cache kmalloc-64 of size 64 [ 20.461071] The buggy address is located 0 bytes to the right of [ 20.461071] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.461137] [ 20.461158] The buggy address belongs to the physical page: [ 20.461191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.461247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.461297] page_type: f5(slab) [ 20.461350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.461431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.461507] page dumped because: kasan: bad access detected [ 20.461617] [ 20.461685] Memory state around the buggy address: [ 20.461738] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.461804] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.461901] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.461942] ^ [ 20.461975] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.462019] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.462060] ================================================================== [ 20.467414] ================================================================== [ 20.467702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 20.467768] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.467820] [ 20.467851] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.467952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.468029] Hardware name: linux,dummy-virt (DT) [ 20.468064] Call trace: [ 20.468104] show_stack+0x20/0x38 (C) [ 20.468175] dump_stack_lvl+0x8c/0xd0 [ 20.468236] print_report+0x118/0x608 [ 20.468314] kasan_report+0xdc/0x128 [ 20.468424] kasan_check_range+0x100/0x1a8 [ 20.468507] __kasan_check_write+0x20/0x30 [ 20.468581] kasan_atomics_helper+0xf20/0x4858 [ 20.468632] kasan_atomics+0x198/0x2e0 [ 20.468677] kunit_try_run_case+0x170/0x3f0 [ 20.468727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.468783] kthread+0x328/0x630 [ 20.468948] ret_from_fork+0x10/0x20 [ 20.469094] [ 20.469152] Allocated by task 267: [ 20.469234] kasan_save_stack+0x3c/0x68 [ 20.469540] kasan_save_track+0x20/0x40 [ 20.469645] kasan_save_alloc_info+0x40/0x58 [ 20.469714] __kasan_kmalloc+0xd4/0xd8 [ 20.469818] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.469895] kasan_atomics+0xb8/0x2e0 [ 20.469963] kunit_try_run_case+0x170/0x3f0 [ 20.470050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.470134] kthread+0x328/0x630 [ 20.470228] ret_from_fork+0x10/0x20 [ 20.470306] [ 20.470358] The buggy address belongs to the object at fff00000c6e72400 [ 20.470358] which belongs to the cache kmalloc-64 of size 64 [ 20.470420] The buggy address is located 0 bytes to the right of [ 20.470420] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.470698] [ 20.470933] The buggy address belongs to the physical page: [ 20.471184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.471606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.471679] page_type: f5(slab) [ 20.471794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.471894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.471938] page dumped because: kasan: bad access detected [ 20.471972] [ 20.471993] Memory state around the buggy address: [ 20.472036] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.472296] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.472362] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.472404] ^ [ 20.472464] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.472527] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.472571] ================================================================== [ 20.487009] ================================================================== [ 20.487063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 20.487142] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.487223] [ 20.487255] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.487351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.487380] Hardware name: linux,dummy-virt (DT) [ 20.487413] Call trace: [ 20.487473] show_stack+0x20/0x38 (C) [ 20.487616] dump_stack_lvl+0x8c/0xd0 [ 20.487692] print_report+0x118/0x608 [ 20.487749] kasan_report+0xdc/0x128 [ 20.487814] kasan_check_range+0x100/0x1a8 [ 20.487866] __kasan_check_write+0x20/0x30 [ 20.487991] kasan_atomics_helper+0x10c0/0x4858 [ 20.488118] kasan_atomics+0x198/0x2e0 [ 20.488194] kunit_try_run_case+0x170/0x3f0 [ 20.488296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.488396] kthread+0x328/0x630 [ 20.488474] ret_from_fork+0x10/0x20 [ 20.488581] [ 20.488677] Allocated by task 267: [ 20.488738] kasan_save_stack+0x3c/0x68 [ 20.488782] kasan_save_track+0x20/0x40 [ 20.488969] kasan_save_alloc_info+0x40/0x58 [ 20.489015] __kasan_kmalloc+0xd4/0xd8 [ 20.489052] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.489205] kasan_atomics+0xb8/0x2e0 [ 20.489290] kunit_try_run_case+0x170/0x3f0 [ 20.489378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.489501] kthread+0x328/0x630 [ 20.489587] ret_from_fork+0x10/0x20 [ 20.489863] [ 20.489947] The buggy address belongs to the object at fff00000c6e72400 [ 20.489947] which belongs to the cache kmalloc-64 of size 64 [ 20.490043] The buggy address is located 0 bytes to the right of [ 20.490043] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.490160] [ 20.490229] The buggy address belongs to the physical page: [ 20.490296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.490369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.490499] page_type: f5(slab) [ 20.490577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.490663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.490707] page dumped because: kasan: bad access detected [ 20.490741] [ 20.490761] Memory state around the buggy address: [ 20.490796] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.490845] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.490890] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.491092] ^ [ 20.491172] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.491279] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.491352] ================================================================== [ 20.441922] ================================================================== [ 20.442173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.442295] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.442362] [ 20.442394] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.442487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.442515] Hardware name: linux,dummy-virt (DT) [ 20.442595] Call trace: [ 20.442620] show_stack+0x20/0x38 (C) [ 20.442688] dump_stack_lvl+0x8c/0xd0 [ 20.442758] print_report+0x118/0x608 [ 20.442824] kasan_report+0xdc/0x128 [ 20.442881] kasan_check_range+0x100/0x1a8 [ 20.442929] __kasan_check_read+0x20/0x30 [ 20.442980] kasan_atomics_helper+0xdd4/0x4858 [ 20.443066] kasan_atomics+0x198/0x2e0 [ 20.443113] kunit_try_run_case+0x170/0x3f0 [ 20.443250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.443314] kthread+0x328/0x630 [ 20.443433] ret_from_fork+0x10/0x20 [ 20.443499] [ 20.443528] Allocated by task 267: [ 20.443575] kasan_save_stack+0x3c/0x68 [ 20.443847] kasan_save_track+0x20/0x40 [ 20.443919] kasan_save_alloc_info+0x40/0x58 [ 20.443970] __kasan_kmalloc+0xd4/0xd8 [ 20.444008] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.444051] kasan_atomics+0xb8/0x2e0 [ 20.444088] kunit_try_run_case+0x170/0x3f0 [ 20.444130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.444177] kthread+0x328/0x630 [ 20.444220] ret_from_fork+0x10/0x20 [ 20.444260] [ 20.444283] The buggy address belongs to the object at fff00000c6e72400 [ 20.444283] which belongs to the cache kmalloc-64 of size 64 [ 20.444354] The buggy address is located 0 bytes to the right of [ 20.444354] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.444420] [ 20.444442] The buggy address belongs to the physical page: [ 20.444589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.444647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.444729] page_type: f5(slab) [ 20.444771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.444823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.445104] page dumped because: kasan: bad access detected [ 20.445172] [ 20.445452] Memory state around the buggy address: [ 20.445550] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.445627] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.445719] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.445797] ^ [ 20.445845] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.445890] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.446108] ================================================================== [ 20.537552] ================================================================== [ 20.537607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 20.537695] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.537974] [ 20.538019] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.538104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.538134] Hardware name: linux,dummy-virt (DT) [ 20.538185] Call trace: [ 20.538210] show_stack+0x20/0x38 (C) [ 20.538303] dump_stack_lvl+0x8c/0xd0 [ 20.538365] print_report+0x118/0x608 [ 20.538432] kasan_report+0xdc/0x128 [ 20.538485] kasan_check_range+0x100/0x1a8 [ 20.538535] __kasan_check_write+0x20/0x30 [ 20.538585] kasan_atomics_helper+0x14e4/0x4858 [ 20.538632] kasan_atomics+0x198/0x2e0 [ 20.538678] kunit_try_run_case+0x170/0x3f0 [ 20.538728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.538846] kthread+0x328/0x630 [ 20.538987] ret_from_fork+0x10/0x20 [ 20.539062] [ 20.539091] Allocated by task 267: [ 20.539121] kasan_save_stack+0x3c/0x68 [ 20.539354] kasan_save_track+0x20/0x40 [ 20.539411] kasan_save_alloc_info+0x40/0x58 [ 20.539492] __kasan_kmalloc+0xd4/0xd8 [ 20.539566] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.539611] kasan_atomics+0xb8/0x2e0 [ 20.539648] kunit_try_run_case+0x170/0x3f0 [ 20.539691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.539736] kthread+0x328/0x630 [ 20.539793] ret_from_fork+0x10/0x20 [ 20.539849] [ 20.539883] The buggy address belongs to the object at fff00000c6e72400 [ 20.539883] which belongs to the cache kmalloc-64 of size 64 [ 20.539945] The buggy address is located 0 bytes to the right of [ 20.539945] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.540052] [ 20.540074] The buggy address belongs to the physical page: [ 20.540241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.540312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.540442] page_type: f5(slab) [ 20.540509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.540580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.540857] page dumped because: kasan: bad access detected [ 20.540920] [ 20.540989] Memory state around the buggy address: [ 20.541081] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.541157] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.541220] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.541260] ^ [ 20.541678] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.541730] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.541771] ================================================================== [ 20.544451] ================================================================== [ 20.544492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 20.544550] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.544958] [ 20.544991] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.545076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.545104] Hardware name: linux,dummy-virt (DT) [ 20.545136] Call trace: [ 20.545159] show_stack+0x20/0x38 (C) [ 20.545239] dump_stack_lvl+0x8c/0xd0 [ 20.545288] print_report+0x118/0x608 [ 20.545347] kasan_report+0xdc/0x128 [ 20.545498] kasan_check_range+0x100/0x1a8 [ 20.545628] __kasan_check_write+0x20/0x30 [ 20.545726] kasan_atomics_helper+0x15b4/0x4858 [ 20.545847] kasan_atomics+0x198/0x2e0 [ 20.546129] kunit_try_run_case+0x170/0x3f0 [ 20.546283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.546387] kthread+0x328/0x630 [ 20.546471] ret_from_fork+0x10/0x20 [ 20.546585] [ 20.546609] Allocated by task 267: [ 20.546676] kasan_save_stack+0x3c/0x68 [ 20.546776] kasan_save_track+0x20/0x40 [ 20.546859] kasan_save_alloc_info+0x40/0x58 [ 20.546936] __kasan_kmalloc+0xd4/0xd8 [ 20.547029] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.547071] kasan_atomics+0xb8/0x2e0 [ 20.547123] kunit_try_run_case+0x170/0x3f0 [ 20.547452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.547569] kthread+0x328/0x630 [ 20.547689] ret_from_fork+0x10/0x20 [ 20.547775] [ 20.547843] The buggy address belongs to the object at fff00000c6e72400 [ 20.547843] which belongs to the cache kmalloc-64 of size 64 [ 20.548046] The buggy address is located 0 bytes to the right of [ 20.548046] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.548112] [ 20.548134] The buggy address belongs to the physical page: [ 20.548167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.548395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.548529] page_type: f5(slab) [ 20.548600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.548876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.548964] page dumped because: kasan: bad access detected [ 20.549038] [ 20.549112] Memory state around the buggy address: [ 20.549189] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.549261] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.549306] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.549373] ^ [ 20.549410] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.549452] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.549764] ================================================================== [ 20.550646] ================================================================== [ 20.550696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 20.550764] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.550817] [ 20.550891] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.550991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.551045] Hardware name: linux,dummy-virt (DT) [ 20.551079] Call trace: [ 20.551120] show_stack+0x20/0x38 (C) [ 20.551346] dump_stack_lvl+0x8c/0xd0 [ 20.551502] print_report+0x118/0x608 [ 20.551577] kasan_report+0xdc/0x128 [ 20.551680] __asan_report_load8_noabort+0x20/0x30 [ 20.551734] kasan_atomics_helper+0x3db0/0x4858 [ 20.551812] kasan_atomics+0x198/0x2e0 [ 20.551865] kunit_try_run_case+0x170/0x3f0 [ 20.551931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.551995] kthread+0x328/0x630 [ 20.552060] ret_from_fork+0x10/0x20 [ 20.552111] [ 20.552131] Allocated by task 267: [ 20.552162] kasan_save_stack+0x3c/0x68 [ 20.552351] kasan_save_track+0x20/0x40 [ 20.552497] kasan_save_alloc_info+0x40/0x58 [ 20.552572] __kasan_kmalloc+0xd4/0xd8 [ 20.552697] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.552783] kasan_atomics+0xb8/0x2e0 [ 20.553070] kunit_try_run_case+0x170/0x3f0 [ 20.553162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.553248] kthread+0x328/0x630 [ 20.553369] ret_from_fork+0x10/0x20 [ 20.553455] [ 20.553523] The buggy address belongs to the object at fff00000c6e72400 [ 20.553523] which belongs to the cache kmalloc-64 of size 64 [ 20.553670] The buggy address is located 0 bytes to the right of [ 20.553670] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.553760] [ 20.553883] The buggy address belongs to the physical page: [ 20.553942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.553998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.554170] page_type: f5(slab) [ 20.554211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.554264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.554422] page dumped because: kasan: bad access detected [ 20.554494] [ 20.554527] Memory state around the buggy address: [ 20.554561] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.554608] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.554793] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.555120] ^ [ 20.555429] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.555549] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.555703] ================================================================== [ 20.577443] ================================================================== [ 20.577517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 20.577569] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.577731] [ 20.577790] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.577877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.577907] Hardware name: linux,dummy-virt (DT) [ 20.577953] Call trace: [ 20.577979] show_stack+0x20/0x38 (C) [ 20.578046] dump_stack_lvl+0x8c/0xd0 [ 20.578310] print_report+0x118/0x608 [ 20.578383] kasan_report+0xdc/0x128 [ 20.578448] kasan_check_range+0x100/0x1a8 [ 20.578504] __kasan_check_write+0x20/0x30 [ 20.578553] kasan_atomics_helper+0x175c/0x4858 [ 20.578602] kasan_atomics+0x198/0x2e0 [ 20.578655] kunit_try_run_case+0x170/0x3f0 [ 20.578723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.578808] kthread+0x328/0x630 [ 20.578862] ret_from_fork+0x10/0x20 [ 20.578912] [ 20.578932] Allocated by task 267: [ 20.578962] kasan_save_stack+0x3c/0x68 [ 20.579003] kasan_save_track+0x20/0x40 [ 20.579042] kasan_save_alloc_info+0x40/0x58 [ 20.579174] __kasan_kmalloc+0xd4/0xd8 [ 20.579223] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.579289] kasan_atomics+0xb8/0x2e0 [ 20.579374] kunit_try_run_case+0x170/0x3f0 [ 20.579422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.579475] kthread+0x328/0x630 [ 20.579644] ret_from_fork+0x10/0x20 [ 20.579686] [ 20.579805] The buggy address belongs to the object at fff00000c6e72400 [ 20.579805] which belongs to the cache kmalloc-64 of size 64 [ 20.579880] The buggy address is located 0 bytes to the right of [ 20.579880] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.579965] [ 20.579995] The buggy address belongs to the physical page: [ 20.580031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.580106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.580155] page_type: f5(slab) [ 20.580233] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.580326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.580401] page dumped because: kasan: bad access detected [ 20.580436] [ 20.580458] Memory state around the buggy address: [ 20.580491] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.580537] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.580597] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.580637] ^ [ 20.580672] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.580923] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.581113] ================================================================== [ 20.451898] ================================================================== [ 20.451968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 20.452030] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.452083] [ 20.452300] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.452412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.452515] Hardware name: linux,dummy-virt (DT) [ 20.452589] Call trace: [ 20.452622] show_stack+0x20/0x38 (C) [ 20.452845] dump_stack_lvl+0x8c/0xd0 [ 20.452940] print_report+0x118/0x608 [ 20.453028] kasan_report+0xdc/0x128 [ 20.453124] kasan_check_range+0x100/0x1a8 [ 20.453222] __kasan_check_write+0x20/0x30 [ 20.453319] kasan_atomics_helper+0xe44/0x4858 [ 20.453417] kasan_atomics+0x198/0x2e0 [ 20.453462] kunit_try_run_case+0x170/0x3f0 [ 20.453541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.453597] kthread+0x328/0x630 [ 20.453643] ret_from_fork+0x10/0x20 [ 20.453692] [ 20.453713] Allocated by task 267: [ 20.453876] kasan_save_stack+0x3c/0x68 [ 20.453963] kasan_save_track+0x20/0x40 [ 20.454024] kasan_save_alloc_info+0x40/0x58 [ 20.454089] __kasan_kmalloc+0xd4/0xd8 [ 20.454317] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.454414] kasan_atomics+0xb8/0x2e0 [ 20.454538] kunit_try_run_case+0x170/0x3f0 [ 20.454603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.454710] kthread+0x328/0x630 [ 20.454788] ret_from_fork+0x10/0x20 [ 20.454890] [ 20.454939] The buggy address belongs to the object at fff00000c6e72400 [ 20.454939] which belongs to the cache kmalloc-64 of size 64 [ 20.455011] The buggy address is located 0 bytes to the right of [ 20.455011] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.455076] [ 20.455099] The buggy address belongs to the physical page: [ 20.455133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.455194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.455254] page_type: f5(slab) [ 20.455294] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.455365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.455407] page dumped because: kasan: bad access detected [ 20.455442] [ 20.455472] Memory state around the buggy address: [ 20.455507] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.455553] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.455598] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.455653] ^ [ 20.455696] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.455749] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.455791] ================================================================== [ 20.561326] ================================================================== [ 20.561746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 20.561962] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.562043] [ 20.562077] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.562173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.562218] Hardware name: linux,dummy-virt (DT) [ 20.562251] Call trace: [ 20.562277] show_stack+0x20/0x38 (C) [ 20.562328] dump_stack_lvl+0x8c/0xd0 [ 20.562516] print_report+0x118/0x608 [ 20.562585] kasan_report+0xdc/0x128 [ 20.562652] __asan_report_load8_noabort+0x20/0x30 [ 20.562706] kasan_atomics_helper+0x3df4/0x4858 [ 20.562764] kasan_atomics+0x198/0x2e0 [ 20.562821] kunit_try_run_case+0x170/0x3f0 [ 20.562879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.562964] kthread+0x328/0x630 [ 20.563031] ret_from_fork+0x10/0x20 [ 20.563098] [ 20.563122] Allocated by task 267: [ 20.563165] kasan_save_stack+0x3c/0x68 [ 20.563224] kasan_save_track+0x20/0x40 [ 20.563281] kasan_save_alloc_info+0x40/0x58 [ 20.563375] __kasan_kmalloc+0xd4/0xd8 [ 20.563431] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.563475] kasan_atomics+0xb8/0x2e0 [ 20.563511] kunit_try_run_case+0x170/0x3f0 [ 20.563667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.563816] kthread+0x328/0x630 [ 20.563871] ret_from_fork+0x10/0x20 [ 20.563936] [ 20.563958] The buggy address belongs to the object at fff00000c6e72400 [ 20.563958] which belongs to the cache kmalloc-64 of size 64 [ 20.564034] The buggy address is located 0 bytes to the right of [ 20.564034] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.564103] [ 20.564142] The buggy address belongs to the physical page: [ 20.564187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.564494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.564597] page_type: f5(slab) [ 20.564698] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.564774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.564924] page dumped because: kasan: bad access detected [ 20.564992] [ 20.565049] Memory state around the buggy address: [ 20.565136] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.565206] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.565253] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.565457] ^ [ 20.565498] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.565544] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.565584] ================================================================== [ 20.429090] ================================================================== [ 20.429166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.429235] Read of size 4 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.429287] [ 20.429353] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.429591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.429649] Hardware name: linux,dummy-virt (DT) [ 20.429683] Call trace: [ 20.429723] show_stack+0x20/0x38 (C) [ 20.429777] dump_stack_lvl+0x8c/0xd0 [ 20.429844] print_report+0x118/0x608 [ 20.429947] kasan_report+0xdc/0x128 [ 20.430013] __asan_report_load4_noabort+0x20/0x30 [ 20.430065] kasan_atomics_helper+0x3dd8/0x4858 [ 20.430129] kasan_atomics+0x198/0x2e0 [ 20.430174] kunit_try_run_case+0x170/0x3f0 [ 20.430242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.430312] kthread+0x328/0x630 [ 20.430398] ret_from_fork+0x10/0x20 [ 20.430449] [ 20.430469] Allocated by task 267: [ 20.430498] kasan_save_stack+0x3c/0x68 [ 20.430540] kasan_save_track+0x20/0x40 [ 20.430612] kasan_save_alloc_info+0x40/0x58 [ 20.430652] __kasan_kmalloc+0xd4/0xd8 [ 20.430775] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.430844] kasan_atomics+0xb8/0x2e0 [ 20.430893] kunit_try_run_case+0x170/0x3f0 [ 20.430937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.431004] kthread+0x328/0x630 [ 20.431059] ret_from_fork+0x10/0x20 [ 20.431187] [ 20.431283] The buggy address belongs to the object at fff00000c6e72400 [ 20.431283] which belongs to the cache kmalloc-64 of size 64 [ 20.431389] The buggy address is located 0 bytes to the right of [ 20.431389] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.431474] [ 20.431547] The buggy address belongs to the physical page: [ 20.431582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.431656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.431728] page_type: f5(slab) [ 20.431776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.431829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.431872] page dumped because: kasan: bad access detected [ 20.431905] [ 20.431926] Memory state around the buggy address: [ 20.431959] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.432115] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.432229] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.432307] ^ [ 20.432435] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.432520] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.432616] ================================================================== [ 20.491965] ================================================================== [ 20.492018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.492385] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.492480] [ 20.492531] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.492645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.492726] Hardware name: linux,dummy-virt (DT) [ 20.492902] Call trace: [ 20.493066] show_stack+0x20/0x38 (C) [ 20.493173] dump_stack_lvl+0x8c/0xd0 [ 20.493258] print_report+0x118/0x608 [ 20.493397] kasan_report+0xdc/0x128 [ 20.493494] kasan_check_range+0x100/0x1a8 [ 20.493613] __kasan_check_write+0x20/0x30 [ 20.493665] kasan_atomics_helper+0x1128/0x4858 [ 20.493729] kasan_atomics+0x198/0x2e0 [ 20.493777] kunit_try_run_case+0x170/0x3f0 [ 20.494100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.494228] kthread+0x328/0x630 [ 20.494354] ret_from_fork+0x10/0x20 [ 20.494616] [ 20.494681] Allocated by task 267: [ 20.494723] kasan_save_stack+0x3c/0x68 [ 20.494830] kasan_save_track+0x20/0x40 [ 20.494920] kasan_save_alloc_info+0x40/0x58 [ 20.495031] __kasan_kmalloc+0xd4/0xd8 [ 20.495110] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.495220] kasan_atomics+0xb8/0x2e0 [ 20.495315] kunit_try_run_case+0x170/0x3f0 [ 20.495419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.495468] kthread+0x328/0x630 [ 20.495505] ret_from_fork+0x10/0x20 [ 20.495587] [ 20.495777] The buggy address belongs to the object at fff00000c6e72400 [ 20.495777] which belongs to the cache kmalloc-64 of size 64 [ 20.495952] The buggy address is located 0 bytes to the right of [ 20.495952] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.496237] [ 20.496312] The buggy address belongs to the physical page: [ 20.496385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.496577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.496633] page_type: f5(slab) [ 20.496674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.496875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.496971] page dumped because: kasan: bad access detected [ 20.497078] [ 20.497136] Memory state around the buggy address: [ 20.497202] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.497488] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.497559] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.497636] ^ [ 20.497722] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.497812] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.497926] ================================================================== [ 20.477737] ================================================================== [ 20.477793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 20.477843] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.477992] [ 20.478080] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.478189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.478243] Hardware name: linux,dummy-virt (DT) [ 20.478436] Call trace: [ 20.478472] show_stack+0x20/0x38 (C) [ 20.478525] dump_stack_lvl+0x8c/0xd0 [ 20.478637] print_report+0x118/0x608 [ 20.478702] kasan_report+0xdc/0x128 [ 20.478808] kasan_check_range+0x100/0x1a8 [ 20.478865] __kasan_check_write+0x20/0x30 [ 20.478931] kasan_atomics_helper+0xff0/0x4858 [ 20.479000] kasan_atomics+0x198/0x2e0 [ 20.479066] kunit_try_run_case+0x170/0x3f0 [ 20.479121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.479178] kthread+0x328/0x630 [ 20.479243] ret_from_fork+0x10/0x20 [ 20.479293] [ 20.479313] Allocated by task 267: [ 20.479356] kasan_save_stack+0x3c/0x68 [ 20.479471] kasan_save_track+0x20/0x40 [ 20.479628] kasan_save_alloc_info+0x40/0x58 [ 20.479686] __kasan_kmalloc+0xd4/0xd8 [ 20.479734] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.479791] kasan_atomics+0xb8/0x2e0 [ 20.479852] kunit_try_run_case+0x170/0x3f0 [ 20.480051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.480154] kthread+0x328/0x630 [ 20.480218] ret_from_fork+0x10/0x20 [ 20.480297] [ 20.480379] The buggy address belongs to the object at fff00000c6e72400 [ 20.480379] which belongs to the cache kmalloc-64 of size 64 [ 20.480478] The buggy address is located 0 bytes to the right of [ 20.480478] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.480603] [ 20.480668] The buggy address belongs to the physical page: [ 20.480725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.480807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.480910] page_type: f5(slab) [ 20.480969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.481024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.481249] page dumped because: kasan: bad access detected [ 20.481288] [ 20.481309] Memory state around the buggy address: [ 20.481844] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.481939] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.482035] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.482112] ^ [ 20.482160] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.482213] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.482262] ================================================================== [ 20.524177] ================================================================== [ 20.524237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 20.524287] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.524509] [ 20.524545] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.524630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.524691] Hardware name: linux,dummy-virt (DT) [ 20.524770] Call trace: [ 20.524805] show_stack+0x20/0x38 (C) [ 20.525028] dump_stack_lvl+0x8c/0xd0 [ 20.525143] print_report+0x118/0x608 [ 20.525221] kasan_report+0xdc/0x128 [ 20.525288] __asan_report_load8_noabort+0x20/0x30 [ 20.525352] kasan_atomics_helper+0x3f04/0x4858 [ 20.525402] kasan_atomics+0x198/0x2e0 [ 20.525447] kunit_try_run_case+0x170/0x3f0 [ 20.525602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.525659] kthread+0x328/0x630 [ 20.525705] ret_from_fork+0x10/0x20 [ 20.525755] [ 20.525775] Allocated by task 267: [ 20.525931] kasan_save_stack+0x3c/0x68 [ 20.526027] kasan_save_track+0x20/0x40 [ 20.526115] kasan_save_alloc_info+0x40/0x58 [ 20.526165] __kasan_kmalloc+0xd4/0xd8 [ 20.526224] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.526292] kasan_atomics+0xb8/0x2e0 [ 20.526555] kunit_try_run_case+0x170/0x3f0 [ 20.526682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.526778] kthread+0x328/0x630 [ 20.526866] ret_from_fork+0x10/0x20 [ 20.526943] [ 20.526992] The buggy address belongs to the object at fff00000c6e72400 [ 20.526992] which belongs to the cache kmalloc-64 of size 64 [ 20.527097] The buggy address is located 0 bytes to the right of [ 20.527097] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.527190] [ 20.527211] The buggy address belongs to the physical page: [ 20.527244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.527301] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.527377] page_type: f5(slab) [ 20.527418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.527471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.527531] page dumped because: kasan: bad access detected [ 20.527575] [ 20.527598] Memory state around the buggy address: [ 20.527632] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.527678] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.527731] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.527772] ^ [ 20.527808] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.527851] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.527901] ================================================================== [ 20.503806] ================================================================== [ 20.503857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.503905] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.503967] [ 20.503999] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.504082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.504119] Hardware name: linux,dummy-virt (DT) [ 20.504151] Call trace: [ 20.504176] show_stack+0x20/0x38 (C) [ 20.504224] dump_stack_lvl+0x8c/0xd0 [ 20.504274] print_report+0x118/0x608 [ 20.504319] kasan_report+0xdc/0x128 [ 20.504378] kasan_check_range+0x100/0x1a8 [ 20.504427] __kasan_check_write+0x20/0x30 [ 20.504474] kasan_atomics_helper+0x11f8/0x4858 [ 20.505107] kasan_atomics+0x198/0x2e0 [ 20.505195] kunit_try_run_case+0x170/0x3f0 [ 20.505278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.505394] kthread+0x328/0x630 [ 20.505452] ret_from_fork+0x10/0x20 [ 20.505555] [ 20.505605] Allocated by task 267: [ 20.505635] kasan_save_stack+0x3c/0x68 [ 20.505701] kasan_save_track+0x20/0x40 [ 20.505788] kasan_save_alloc_info+0x40/0x58 [ 20.505913] __kasan_kmalloc+0xd4/0xd8 [ 20.505956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.505998] kasan_atomics+0xb8/0x2e0 [ 20.506037] kunit_try_run_case+0x170/0x3f0 [ 20.506077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.506250] kthread+0x328/0x630 [ 20.506386] ret_from_fork+0x10/0x20 [ 20.506473] [ 20.506574] The buggy address belongs to the object at fff00000c6e72400 [ 20.506574] which belongs to the cache kmalloc-64 of size 64 [ 20.506686] The buggy address is located 0 bytes to the right of [ 20.506686] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.506791] [ 20.506847] The buggy address belongs to the physical page: [ 20.506943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.507229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.507352] page_type: f5(slab) [ 20.507477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.507529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.507728] page dumped because: kasan: bad access detected [ 20.507878] [ 20.507928] Memory state around the buggy address: [ 20.507984] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.508106] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.508219] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.508420] ^ [ 20.508556] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.508609] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.508649] ================================================================== [ 20.595012] ================================================================== [ 20.595083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 20.595136] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.595188] [ 20.595240] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.595345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.595384] Hardware name: linux,dummy-virt (DT) [ 20.595418] Call trace: [ 20.595468] show_stack+0x20/0x38 (C) [ 20.595649] dump_stack_lvl+0x8c/0xd0 [ 20.595769] print_report+0x118/0x608 [ 20.595846] kasan_report+0xdc/0x128 [ 20.595911] kasan_check_range+0x100/0x1a8 [ 20.595988] __kasan_check_write+0x20/0x30 [ 20.596054] kasan_atomics_helper+0x17ec/0x4858 [ 20.596128] kasan_atomics+0x198/0x2e0 [ 20.596195] kunit_try_run_case+0x170/0x3f0 [ 20.596273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.596413] kthread+0x328/0x630 [ 20.596524] ret_from_fork+0x10/0x20 [ 20.596901] [ 20.596937] Allocated by task 267: [ 20.597053] kasan_save_stack+0x3c/0x68 [ 20.597119] kasan_save_track+0x20/0x40 [ 20.597222] kasan_save_alloc_info+0x40/0x58 [ 20.597311] __kasan_kmalloc+0xd4/0xd8 [ 20.597383] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.597425] kasan_atomics+0xb8/0x2e0 [ 20.597462] kunit_try_run_case+0x170/0x3f0 [ 20.597504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.597575] kthread+0x328/0x630 [ 20.597613] ret_from_fork+0x10/0x20 [ 20.597651] [ 20.597674] The buggy address belongs to the object at fff00000c6e72400 [ 20.597674] which belongs to the cache kmalloc-64 of size 64 [ 20.597732] The buggy address is located 0 bytes to the right of [ 20.597732] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.597797] [ 20.597819] The buggy address belongs to the physical page: [ 20.597854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.597907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.597957] page_type: f5(slab) [ 20.597995] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.598124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.598205] page dumped because: kasan: bad access detected [ 20.598269] [ 20.598291] Memory state around the buggy address: [ 20.598355] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.598418] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.598534] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.598621] ^ [ 20.599005] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.599091] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.599219] ================================================================== [ 20.514072] ================================================================== [ 20.514307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 20.514383] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.514434] [ 20.514553] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.514654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.514708] Hardware name: linux,dummy-virt (DT) [ 20.514756] Call trace: [ 20.514809] show_stack+0x20/0x38 (C) [ 20.514881] dump_stack_lvl+0x8c/0xd0 [ 20.514933] print_report+0x118/0x608 [ 20.515005] kasan_report+0xdc/0x128 [ 20.515143] kasan_check_range+0x100/0x1a8 [ 20.515282] __kasan_check_write+0x20/0x30 [ 20.515351] kasan_atomics_helper+0x12d8/0x4858 [ 20.515427] kasan_atomics+0x198/0x2e0 [ 20.515486] kunit_try_run_case+0x170/0x3f0 [ 20.515563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.515643] kthread+0x328/0x630 [ 20.515743] ret_from_fork+0x10/0x20 [ 20.515809] [ 20.515848] Allocated by task 267: [ 20.515886] kasan_save_stack+0x3c/0x68 [ 20.515927] kasan_save_track+0x20/0x40 [ 20.515966] kasan_save_alloc_info+0x40/0x58 [ 20.516006] __kasan_kmalloc+0xd4/0xd8 [ 20.516044] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.516247] kasan_atomics+0xb8/0x2e0 [ 20.516393] kunit_try_run_case+0x170/0x3f0 [ 20.516464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.516514] kthread+0x328/0x630 [ 20.516599] ret_from_fork+0x10/0x20 [ 20.516675] [ 20.516917] The buggy address belongs to the object at fff00000c6e72400 [ 20.516917] which belongs to the cache kmalloc-64 of size 64 [ 20.517029] The buggy address is located 0 bytes to the right of [ 20.517029] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.517135] [ 20.517166] The buggy address belongs to the physical page: [ 20.517209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.517278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.517354] page_type: f5(slab) [ 20.517395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.517614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.517659] page dumped because: kasan: bad access detected [ 20.517695] [ 20.517717] Memory state around the buggy address: [ 20.517751] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.517796] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.517841] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.517881] ^ [ 20.517917] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.518224] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.518299] ================================================================== [ 20.541972] ================================================================== [ 20.542021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 20.542071] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.542123] [ 20.542152] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.542236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.542263] Hardware name: linux,dummy-virt (DT) [ 20.542296] Call trace: [ 20.542319] show_stack+0x20/0x38 (C) [ 20.542429] dump_stack_lvl+0x8c/0xd0 [ 20.542505] print_report+0x118/0x608 [ 20.542582] kasan_report+0xdc/0x128 [ 20.542634] kasan_check_range+0x100/0x1a8 [ 20.542685] __kasan_check_write+0x20/0x30 [ 20.542734] kasan_atomics_helper+0x154c/0x4858 [ 20.542782] kasan_atomics+0x198/0x2e0 [ 20.542828] kunit_try_run_case+0x170/0x3f0 [ 20.542884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.542947] kthread+0x328/0x630 [ 20.542995] ret_from_fork+0x10/0x20 [ 20.543042] [ 20.543072] Allocated by task 267: [ 20.543101] kasan_save_stack+0x3c/0x68 [ 20.543143] kasan_save_track+0x20/0x40 [ 20.543181] kasan_save_alloc_info+0x40/0x58 [ 20.543222] __kasan_kmalloc+0xd4/0xd8 [ 20.543260] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.543307] kasan_atomics+0xb8/0x2e0 [ 20.543363] kunit_try_run_case+0x170/0x3f0 [ 20.543408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.543454] kthread+0x328/0x630 [ 20.543491] ret_from_fork+0x10/0x20 [ 20.543539] [ 20.543569] The buggy address belongs to the object at fff00000c6e72400 [ 20.543569] which belongs to the cache kmalloc-64 of size 64 [ 20.543630] The buggy address is located 0 bytes to the right of [ 20.543630] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.543701] [ 20.543723] The buggy address belongs to the physical page: [ 20.543756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.543809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.543864] page_type: f5(slab) [ 20.543902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.543955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.543998] page dumped because: kasan: bad access detected [ 20.544031] [ 20.544052] Memory state around the buggy address: [ 20.544087] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.544133] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.544178] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.544219] ^ [ 20.544254] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.544297] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.544347] ================================================================== [ 20.498466] ================================================================== [ 20.498518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.498885] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.498951] [ 20.499202] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.499315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.499374] Hardware name: linux,dummy-virt (DT) [ 20.499408] Call trace: [ 20.499456] show_stack+0x20/0x38 (C) [ 20.499684] dump_stack_lvl+0x8c/0xd0 [ 20.499769] print_report+0x118/0x608 [ 20.499846] kasan_report+0xdc/0x128 [ 20.499901] kasan_check_range+0x100/0x1a8 [ 20.499956] __kasan_check_write+0x20/0x30 [ 20.500007] kasan_atomics_helper+0x1190/0x4858 [ 20.500054] kasan_atomics+0x198/0x2e0 [ 20.500272] kunit_try_run_case+0x170/0x3f0 [ 20.500389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.500510] kthread+0x328/0x630 [ 20.500625] ret_from_fork+0x10/0x20 [ 20.500880] [ 20.500942] Allocated by task 267: [ 20.501002] kasan_save_stack+0x3c/0x68 [ 20.501123] kasan_save_track+0x20/0x40 [ 20.501224] kasan_save_alloc_info+0x40/0x58 [ 20.501365] __kasan_kmalloc+0xd4/0xd8 [ 20.501434] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.501517] kasan_atomics+0xb8/0x2e0 [ 20.501627] kunit_try_run_case+0x170/0x3f0 [ 20.501685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.501737] kthread+0x328/0x630 [ 20.501802] ret_from_fork+0x10/0x20 [ 20.501840] [ 20.501862] The buggy address belongs to the object at fff00000c6e72400 [ 20.501862] which belongs to the cache kmalloc-64 of size 64 [ 20.502169] The buggy address is located 0 bytes to the right of [ 20.502169] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.502273] [ 20.502342] The buggy address belongs to the physical page: [ 20.502414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.502698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.502795] page_type: f5(slab) [ 20.502918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.503021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.503135] page dumped because: kasan: bad access detected [ 20.503171] [ 20.503193] Memory state around the buggy address: [ 20.503227] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.503284] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.503330] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.503381] ^ [ 20.503418] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.503463] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.503514] ================================================================== [ 20.473249] ================================================================== [ 20.473300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 20.473366] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.473418] [ 20.473494] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.473597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.473628] Hardware name: linux,dummy-virt (DT) [ 20.473942] Call trace: [ 20.473984] show_stack+0x20/0x38 (C) [ 20.474055] dump_stack_lvl+0x8c/0xd0 [ 20.474106] print_report+0x118/0x608 [ 20.474152] kasan_report+0xdc/0x128 [ 20.474223] kasan_check_range+0x100/0x1a8 [ 20.474274] __kasan_check_write+0x20/0x30 [ 20.474351] kasan_atomics_helper+0xf88/0x4858 [ 20.474419] kasan_atomics+0x198/0x2e0 [ 20.474493] kunit_try_run_case+0x170/0x3f0 [ 20.474572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.474647] kthread+0x328/0x630 [ 20.474703] ret_from_fork+0x10/0x20 [ 20.474774] [ 20.474795] Allocated by task 267: [ 20.474827] kasan_save_stack+0x3c/0x68 [ 20.474874] kasan_save_track+0x20/0x40 [ 20.474913] kasan_save_alloc_info+0x40/0x58 [ 20.475055] __kasan_kmalloc+0xd4/0xd8 [ 20.475098] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.475142] kasan_atomics+0xb8/0x2e0 [ 20.475180] kunit_try_run_case+0x170/0x3f0 [ 20.475222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.475380] kthread+0x328/0x630 [ 20.475564] ret_from_fork+0x10/0x20 [ 20.475616] [ 20.475638] The buggy address belongs to the object at fff00000c6e72400 [ 20.475638] which belongs to the cache kmalloc-64 of size 64 [ 20.475699] The buggy address is located 0 bytes to the right of [ 20.475699] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.475764] [ 20.475798] The buggy address belongs to the physical page: [ 20.475831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.475886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.475938] page_type: f5(slab) [ 20.475977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.476030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.476074] page dumped because: kasan: bad access detected [ 20.476108] [ 20.476128] Memory state around the buggy address: [ 20.476163] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.476207] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.476252] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.476293] ^ [ 20.476698] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.476910] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.477018] ================================================================== [ 20.433151] ================================================================== [ 20.433200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.433369] Write of size 4 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.433426] [ 20.433547] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.433676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.433723] Hardware name: linux,dummy-virt (DT) [ 20.433758] Call trace: [ 20.433809] show_stack+0x20/0x38 (C) [ 20.433860] dump_stack_lvl+0x8c/0xd0 [ 20.434036] print_report+0x118/0x608 [ 20.434114] kasan_report+0xdc/0x128 [ 20.434190] kasan_check_range+0x100/0x1a8 [ 20.434280] __kasan_check_write+0x20/0x30 [ 20.434353] kasan_atomics_helper+0xd3c/0x4858 [ 20.434421] kasan_atomics+0x198/0x2e0 [ 20.434485] kunit_try_run_case+0x170/0x3f0 [ 20.434536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.434592] kthread+0x328/0x630 [ 20.434638] ret_from_fork+0x10/0x20 [ 20.434686] [ 20.434706] Allocated by task 267: [ 20.434737] kasan_save_stack+0x3c/0x68 [ 20.434778] kasan_save_track+0x20/0x40 [ 20.434914] kasan_save_alloc_info+0x40/0x58 [ 20.434960] __kasan_kmalloc+0xd4/0xd8 [ 20.435116] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.435170] kasan_atomics+0xb8/0x2e0 [ 20.435237] kunit_try_run_case+0x170/0x3f0 [ 20.435403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.435525] kthread+0x328/0x630 [ 20.435571] ret_from_fork+0x10/0x20 [ 20.435649] [ 20.435710] The buggy address belongs to the object at fff00000c6e72400 [ 20.435710] which belongs to the cache kmalloc-64 of size 64 [ 20.435771] The buggy address is located 0 bytes to the right of [ 20.435771] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.435835] [ 20.435858] The buggy address belongs to the physical page: [ 20.435939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.436013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.436065] page_type: f5(slab) [ 20.436121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.436191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.436240] page dumped because: kasan: bad access detected [ 20.436319] [ 20.436707] Memory state around the buggy address: [ 20.436774] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.436819] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.436930] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.437005] ^ [ 20.437043] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.437227] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.437274] ================================================================== [ 20.482744] ================================================================== [ 20.482797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 20.482854] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.482905] [ 20.482936] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.483027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.483055] Hardware name: linux,dummy-virt (DT) [ 20.483088] Call trace: [ 20.483111] show_stack+0x20/0x38 (C) [ 20.483161] dump_stack_lvl+0x8c/0xd0 [ 20.483209] print_report+0x118/0x608 [ 20.483256] kasan_report+0xdc/0x128 [ 20.483302] kasan_check_range+0x100/0x1a8 [ 20.483364] __kasan_check_write+0x20/0x30 [ 20.483422] kasan_atomics_helper+0x1058/0x4858 [ 20.483470] kasan_atomics+0x198/0x2e0 [ 20.483516] kunit_try_run_case+0x170/0x3f0 [ 20.483567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.483632] kthread+0x328/0x630 [ 20.483680] ret_from_fork+0x10/0x20 [ 20.483738] [ 20.483759] Allocated by task 267: [ 20.483788] kasan_save_stack+0x3c/0x68 [ 20.483829] kasan_save_track+0x20/0x40 [ 20.483867] kasan_save_alloc_info+0x40/0x58 [ 20.483908] __kasan_kmalloc+0xd4/0xd8 [ 20.483945] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.483995] kasan_atomics+0xb8/0x2e0 [ 20.484032] kunit_try_run_case+0x170/0x3f0 [ 20.484075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.484128] kthread+0x328/0x630 [ 20.484166] ret_from_fork+0x10/0x20 [ 20.484803] [ 20.484875] The buggy address belongs to the object at fff00000c6e72400 [ 20.484875] which belongs to the cache kmalloc-64 of size 64 [ 20.485023] The buggy address is located 0 bytes to the right of [ 20.485023] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.485224] [ 20.485363] The buggy address belongs to the physical page: [ 20.485443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.485518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.485606] page_type: f5(slab) [ 20.485691] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.485755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.485817] page dumped because: kasan: bad access detected [ 20.485851] [ 20.485872] Memory state around the buggy address: [ 20.486017] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.486137] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.486216] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.486326] ^ [ 20.486460] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.486547] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.486605] ================================================================== [ 20.582072] ================================================================== [ 20.582120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 20.582257] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.582420] [ 20.582476] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.582562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.582608] Hardware name: linux,dummy-virt (DT) [ 20.582658] Call trace: [ 20.582769] show_stack+0x20/0x38 (C) [ 20.582938] dump_stack_lvl+0x8c/0xd0 [ 20.583001] print_report+0x118/0x608 [ 20.584712] kasan_report+0xdc/0x128 [ 20.584799] __asan_report_load8_noabort+0x20/0x30 [ 20.584854] kasan_atomics_helper+0x3e20/0x4858 [ 20.585372] kasan_atomics+0x198/0x2e0 [ 20.585430] kunit_try_run_case+0x170/0x3f0 [ 20.586167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.587159] kthread+0x328/0x630 [ 20.587231] ret_from_fork+0x10/0x20 [ 20.587283] [ 20.587326] Allocated by task 267: [ 20.587802] kasan_save_stack+0x3c/0x68 [ 20.587858] kasan_save_track+0x20/0x40 [ 20.589074] kasan_save_alloc_info+0x40/0x58 [ 20.589189] __kasan_kmalloc+0xd4/0xd8 [ 20.589874] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.589930] kasan_atomics+0xb8/0x2e0 [ 20.589967] kunit_try_run_case+0x170/0x3f0 [ 20.590008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.590057] kthread+0x328/0x630 [ 20.590096] ret_from_fork+0x10/0x20 [ 20.590133] [ 20.590157] The buggy address belongs to the object at fff00000c6e72400 [ 20.590157] which belongs to the cache kmalloc-64 of size 64 [ 20.590217] The buggy address is located 0 bytes to the right of [ 20.590217] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.591538] [ 20.591567] The buggy address belongs to the physical page: [ 20.591605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.593027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.593093] page_type: f5(slab) [ 20.593147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.593202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.593564] page dumped because: kasan: bad access detected [ 20.593681] [ 20.593759] Memory state around the buggy address: [ 20.593898] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.593993] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.594046] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.594099] ^ [ 20.594135] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.594188] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.594231] ================================================================== [ 20.509847] ================================================================== [ 20.509941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 20.509995] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.510047] [ 20.510122] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.510224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.510278] Hardware name: linux,dummy-virt (DT) [ 20.510326] Call trace: [ 20.510386] show_stack+0x20/0x38 (C) [ 20.510442] dump_stack_lvl+0x8c/0xd0 [ 20.510494] print_report+0x118/0x608 [ 20.510540] kasan_report+0xdc/0x128 [ 20.510716] kasan_check_range+0x100/0x1a8 [ 20.510771] __kasan_check_write+0x20/0x30 [ 20.510819] kasan_atomics_helper+0x126c/0x4858 [ 20.510982] kasan_atomics+0x198/0x2e0 [ 20.511047] kunit_try_run_case+0x170/0x3f0 [ 20.511120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.511200] kthread+0x328/0x630 [ 20.511444] ret_from_fork+0x10/0x20 [ 20.511511] [ 20.511563] Allocated by task 267: [ 20.511600] kasan_save_stack+0x3c/0x68 [ 20.511658] kasan_save_track+0x20/0x40 [ 20.511713] kasan_save_alloc_info+0x40/0x58 [ 20.511781] __kasan_kmalloc+0xd4/0xd8 [ 20.511847] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.511910] kasan_atomics+0xb8/0x2e0 [ 20.511962] kunit_try_run_case+0x170/0x3f0 [ 20.512009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.512074] kthread+0x328/0x630 [ 20.512136] ret_from_fork+0x10/0x20 [ 20.512175] [ 20.512198] The buggy address belongs to the object at fff00000c6e72400 [ 20.512198] which belongs to the cache kmalloc-64 of size 64 [ 20.512268] The buggy address is located 0 bytes to the right of [ 20.512268] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.512481] [ 20.512574] The buggy address belongs to the physical page: [ 20.512642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.512710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.512768] page_type: f5(slab) [ 20.512809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.512862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.512905] page dumped because: kasan: bad access detected [ 20.512939] [ 20.512982] Memory state around the buggy address: [ 20.513016] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.513062] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.513293] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.513349] ^ [ 20.513386] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.513429] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.513468] ================================================================== [ 20.446721] ================================================================== [ 20.446789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.446847] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.446898] [ 20.447089] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.447200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.447242] Hardware name: linux,dummy-virt (DT) [ 20.447281] Call trace: [ 20.447306] show_stack+0x20/0x38 (C) [ 20.447394] dump_stack_lvl+0x8c/0xd0 [ 20.447471] print_report+0x118/0x608 [ 20.447521] kasan_report+0xdc/0x128 [ 20.447586] __asan_report_load8_noabort+0x20/0x30 [ 20.447641] kasan_atomics_helper+0x3f58/0x4858 [ 20.447689] kasan_atomics+0x198/0x2e0 [ 20.447756] kunit_try_run_case+0x170/0x3f0 [ 20.447813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.447871] kthread+0x328/0x630 [ 20.447917] ret_from_fork+0x10/0x20 [ 20.448098] [ 20.448139] Allocated by task 267: [ 20.448187] kasan_save_stack+0x3c/0x68 [ 20.448329] kasan_save_track+0x20/0x40 [ 20.448409] kasan_save_alloc_info+0x40/0x58 [ 20.448452] __kasan_kmalloc+0xd4/0xd8 [ 20.448488] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.448661] kasan_atomics+0xb8/0x2e0 [ 20.448734] kunit_try_run_case+0x170/0x3f0 [ 20.448812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.448876] kthread+0x328/0x630 [ 20.448916] ret_from_fork+0x10/0x20 [ 20.448954] [ 20.448975] The buggy address belongs to the object at fff00000c6e72400 [ 20.448975] which belongs to the cache kmalloc-64 of size 64 [ 20.449035] The buggy address is located 0 bytes to the right of [ 20.449035] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.449101] [ 20.449145] The buggy address belongs to the physical page: [ 20.449193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.449249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.449620] page_type: f5(slab) [ 20.449669] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.449723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.449766] page dumped because: kasan: bad access detected [ 20.449800] [ 20.449820] Memory state around the buggy address: [ 20.449854] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.449900] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.450188] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.450273] ^ [ 20.450371] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.450451] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.450727] ================================================================== [ 20.437838] ================================================================== [ 20.437919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.438205] Read of size 4 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.438289] [ 20.438323] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.438456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.438505] Hardware name: linux,dummy-virt (DT) [ 20.438538] Call trace: [ 20.438562] show_stack+0x20/0x38 (C) [ 20.438629] dump_stack_lvl+0x8c/0xd0 [ 20.438680] print_report+0x118/0x608 [ 20.438748] kasan_report+0xdc/0x128 [ 20.438824] __asan_report_load4_noabort+0x20/0x30 [ 20.438893] kasan_atomics_helper+0x3e04/0x4858 [ 20.438960] kasan_atomics+0x198/0x2e0 [ 20.439007] kunit_try_run_case+0x170/0x3f0 [ 20.439058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.439112] kthread+0x328/0x630 [ 20.439162] ret_from_fork+0x10/0x20 [ 20.439383] [ 20.439444] Allocated by task 267: [ 20.439479] kasan_save_stack+0x3c/0x68 [ 20.439557] kasan_save_track+0x20/0x40 [ 20.439614] kasan_save_alloc_info+0x40/0x58 [ 20.439655] __kasan_kmalloc+0xd4/0xd8 [ 20.439692] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.439885] kasan_atomics+0xb8/0x2e0 [ 20.439994] kunit_try_run_case+0x170/0x3f0 [ 20.440060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.440125] kthread+0x328/0x630 [ 20.440183] ret_from_fork+0x10/0x20 [ 20.440259] [ 20.440379] The buggy address belongs to the object at fff00000c6e72400 [ 20.440379] which belongs to the cache kmalloc-64 of size 64 [ 20.440485] The buggy address is located 0 bytes to the right of [ 20.440485] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.440574] [ 20.440643] The buggy address belongs to the physical page: [ 20.440713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.440775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.440864] page_type: f5(slab) [ 20.440969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.441021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.441064] page dumped because: kasan: bad access detected [ 20.441105] [ 20.441125] Memory state around the buggy address: [ 20.441159] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.441206] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.441250] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.441291] ^ [ 20.441325] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.441380] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.441609] ================================================================== [ 20.556962] ================================================================== [ 20.557015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 20.557090] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.557227] [ 20.557383] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.557512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.557561] Hardware name: linux,dummy-virt (DT) [ 20.557609] Call trace: [ 20.557635] show_stack+0x20/0x38 (C) [ 20.557692] dump_stack_lvl+0x8c/0xd0 [ 20.557763] print_report+0x118/0x608 [ 20.557828] kasan_report+0xdc/0x128 [ 20.557894] kasan_check_range+0x100/0x1a8 [ 20.557954] __kasan_check_write+0x20/0x30 [ 20.558020] kasan_atomics_helper+0x1644/0x4858 [ 20.558095] kasan_atomics+0x198/0x2e0 [ 20.558142] kunit_try_run_case+0x170/0x3f0 [ 20.558195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.558252] kthread+0x328/0x630 [ 20.558300] ret_from_fork+0x10/0x20 [ 20.558362] [ 20.558383] Allocated by task 267: [ 20.558414] kasan_save_stack+0x3c/0x68 [ 20.558663] kasan_save_track+0x20/0x40 [ 20.558758] kasan_save_alloc_info+0x40/0x58 [ 20.558878] __kasan_kmalloc+0xd4/0xd8 [ 20.558954] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.559201] kasan_atomics+0xb8/0x2e0 [ 20.559267] kunit_try_run_case+0x170/0x3f0 [ 20.559357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.559409] kthread+0x328/0x630 [ 20.559447] ret_from_fork+0x10/0x20 [ 20.559503] [ 20.559573] The buggy address belongs to the object at fff00000c6e72400 [ 20.559573] which belongs to the cache kmalloc-64 of size 64 [ 20.559645] The buggy address is located 0 bytes to the right of [ 20.559645] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.559758] [ 20.559843] The buggy address belongs to the physical page: [ 20.559931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.559987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.560036] page_type: f5(slab) [ 20.560293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.560377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.560472] page dumped because: kasan: bad access detected [ 20.560541] [ 20.560620] Memory state around the buggy address: [ 20.560656] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.560702] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.560747] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.560797] ^ [ 20.560834] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.560888] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.560936] ================================================================== [ 20.528807] ================================================================== [ 20.528861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 20.528917] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.528969] [ 20.529019] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.529121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.529167] Hardware name: linux,dummy-virt (DT) [ 20.529205] Call trace: [ 20.529232] show_stack+0x20/0x38 (C) [ 20.529371] dump_stack_lvl+0x8c/0xd0 [ 20.529430] print_report+0x118/0x608 [ 20.529476] kasan_report+0xdc/0x128 [ 20.529655] kasan_check_range+0x100/0x1a8 [ 20.529752] __kasan_check_write+0x20/0x30 [ 20.529819] kasan_atomics_helper+0x1414/0x4858 [ 20.529875] kasan_atomics+0x198/0x2e0 [ 20.529939] kunit_try_run_case+0x170/0x3f0 [ 20.530007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.530064] kthread+0x328/0x630 [ 20.530110] ret_from_fork+0x10/0x20 [ 20.530160] [ 20.530180] Allocated by task 267: [ 20.530211] kasan_save_stack+0x3c/0x68 [ 20.530294] kasan_save_track+0x20/0x40 [ 20.530347] kasan_save_alloc_info+0x40/0x58 [ 20.530387] __kasan_kmalloc+0xd4/0xd8 [ 20.530427] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.530469] kasan_atomics+0xb8/0x2e0 [ 20.530601] kunit_try_run_case+0x170/0x3f0 [ 20.530657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.530706] kthread+0x328/0x630 [ 20.530743] ret_from_fork+0x10/0x20 [ 20.530799] [ 20.530823] The buggy address belongs to the object at fff00000c6e72400 [ 20.530823] which belongs to the cache kmalloc-64 of size 64 [ 20.530904] The buggy address is located 0 bytes to the right of [ 20.530904] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.530987] [ 20.531196] The buggy address belongs to the physical page: [ 20.531265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.531377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.531434] page_type: f5(slab) [ 20.531490] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.531585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.531630] page dumped because: kasan: bad access detected [ 20.531664] [ 20.531685] Memory state around the buggy address: [ 20.531719] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.531796] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.531840] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.531887] ^ [ 20.531931] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.531974] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.532013] ================================================================== [ 20.571463] ================================================================== [ 20.571675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 20.571741] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.571795] [ 20.572052] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.572159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.572222] Hardware name: linux,dummy-virt (DT) [ 20.572429] Call trace: [ 20.572508] show_stack+0x20/0x38 (C) [ 20.572603] dump_stack_lvl+0x8c/0xd0 [ 20.572694] print_report+0x118/0x608 [ 20.572780] kasan_report+0xdc/0x128 [ 20.572870] __asan_report_load8_noabort+0x20/0x30 [ 20.572970] kasan_atomics_helper+0x3e10/0x4858 [ 20.573058] kasan_atomics+0x198/0x2e0 [ 20.573165] kunit_try_run_case+0x170/0x3f0 [ 20.573218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.573275] kthread+0x328/0x630 [ 20.573322] ret_from_fork+0x10/0x20 [ 20.573384] [ 20.573713] Allocated by task 267: [ 20.573800] kasan_save_stack+0x3c/0x68 [ 20.573888] kasan_save_track+0x20/0x40 [ 20.573964] kasan_save_alloc_info+0x40/0x58 [ 20.574045] __kasan_kmalloc+0xd4/0xd8 [ 20.574287] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.574418] kasan_atomics+0xb8/0x2e0 [ 20.574486] kunit_try_run_case+0x170/0x3f0 [ 20.574563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.574642] kthread+0x328/0x630 [ 20.574728] ret_from_fork+0x10/0x20 [ 20.574818] [ 20.574871] The buggy address belongs to the object at fff00000c6e72400 [ 20.574871] which belongs to the cache kmalloc-64 of size 64 [ 20.574961] The buggy address is located 0 bytes to the right of [ 20.574961] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.575028] [ 20.575235] The buggy address belongs to the physical page: [ 20.575279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.575408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.575506] page_type: f5(slab) [ 20.575581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.575662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.575866] page dumped because: kasan: bad access detected [ 20.575965] [ 20.576047] Memory state around the buggy address: [ 20.576113] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.576160] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.576213] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.576481] ^ [ 20.576550] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.576615] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.576697] ================================================================== [ 20.519234] ================================================================== [ 20.519288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 20.519454] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.519549] [ 20.519595] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.519709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.519801] Hardware name: linux,dummy-virt (DT) [ 20.519833] Call trace: [ 20.519859] show_stack+0x20/0x38 (C) [ 20.519908] dump_stack_lvl+0x8c/0xd0 [ 20.519959] print_report+0x118/0x608 [ 20.520005] kasan_report+0xdc/0x128 [ 20.520285] kasan_check_range+0x100/0x1a8 [ 20.520443] __kasan_check_write+0x20/0x30 [ 20.520539] kasan_atomics_helper+0x1384/0x4858 [ 20.520784] kasan_atomics+0x198/0x2e0 [ 20.520851] kunit_try_run_case+0x170/0x3f0 [ 20.520924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.520980] kthread+0x328/0x630 [ 20.521028] ret_from_fork+0x10/0x20 [ 20.521078] [ 20.521099] Allocated by task 267: [ 20.521130] kasan_save_stack+0x3c/0x68 [ 20.521308] kasan_save_track+0x20/0x40 [ 20.521363] kasan_save_alloc_info+0x40/0x58 [ 20.521403] __kasan_kmalloc+0xd4/0xd8 [ 20.521568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.521675] kasan_atomics+0xb8/0x2e0 [ 20.521752] kunit_try_run_case+0x170/0x3f0 [ 20.521840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.521941] kthread+0x328/0x630 [ 20.521980] ret_from_fork+0x10/0x20 [ 20.522149] [ 20.522223] The buggy address belongs to the object at fff00000c6e72400 [ 20.522223] which belongs to the cache kmalloc-64 of size 64 [ 20.522319] The buggy address is located 0 bytes to the right of [ 20.522319] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.522424] [ 20.522492] The buggy address belongs to the physical page: [ 20.522556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.522640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.522761] page_type: f5(slab) [ 20.522842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.522897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.522941] page dumped because: kasan: bad access detected [ 20.522974] [ 20.522995] Memory state around the buggy address: [ 20.523253] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.523311] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.523388] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.523466] ^ [ 20.523616] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.523837] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.523919] ================================================================== [ 20.532306] ================================================================== [ 20.532377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 20.532482] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.532571] [ 20.532638] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.532869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.532963] Hardware name: linux,dummy-virt (DT) [ 20.533028] Call trace: [ 20.533083] show_stack+0x20/0x38 (C) [ 20.533165] dump_stack_lvl+0x8c/0xd0 [ 20.533250] print_report+0x118/0x608 [ 20.533364] kasan_report+0xdc/0x128 [ 20.533461] kasan_check_range+0x100/0x1a8 [ 20.533523] __kasan_check_write+0x20/0x30 [ 20.533573] kasan_atomics_helper+0x147c/0x4858 [ 20.533620] kasan_atomics+0x198/0x2e0 [ 20.533909] kunit_try_run_case+0x170/0x3f0 [ 20.534051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.534156] kthread+0x328/0x630 [ 20.534496] ret_from_fork+0x10/0x20 [ 20.534605] [ 20.534681] Allocated by task 267: [ 20.534758] kasan_save_stack+0x3c/0x68 [ 20.534831] kasan_save_track+0x20/0x40 [ 20.534948] kasan_save_alloc_info+0x40/0x58 [ 20.535001] __kasan_kmalloc+0xd4/0xd8 [ 20.535038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.535291] kasan_atomics+0xb8/0x2e0 [ 20.535386] kunit_try_run_case+0x170/0x3f0 [ 20.535442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.535488] kthread+0x328/0x630 [ 20.535526] ret_from_fork+0x10/0x20 [ 20.535574] [ 20.535605] The buggy address belongs to the object at fff00000c6e72400 [ 20.535605] which belongs to the cache kmalloc-64 of size 64 [ 20.535681] The buggy address is located 0 bytes to the right of [ 20.535681] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.535747] [ 20.535784] The buggy address belongs to the physical page: [ 20.535816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.535878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.535926] page_type: f5(slab) [ 20.535964] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.536017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.536061] page dumped because: kasan: bad access detected [ 20.536094] [ 20.536137] Memory state around the buggy address: [ 20.536181] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.536629] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.536717] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.536801] ^ [ 20.536858] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.536901] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.536941] ================================================================== [ 20.462558] ================================================================== [ 20.462608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.462675] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267 [ 20.462729] [ 20.462759] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 20.462865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.462893] Hardware name: linux,dummy-virt (DT) [ 20.462926] Call trace: [ 20.462949] show_stack+0x20/0x38 (C) [ 20.462999] dump_stack_lvl+0x8c/0xd0 [ 20.463047] print_report+0x118/0x608 [ 20.463094] kasan_report+0xdc/0x128 [ 20.463149] kasan_check_range+0x100/0x1a8 [ 20.463208] __kasan_check_write+0x20/0x30 [ 20.463261] kasan_atomics_helper+0xeb8/0x4858 [ 20.463317] kasan_atomics+0x198/0x2e0 [ 20.463672] kunit_try_run_case+0x170/0x3f0 [ 20.463744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.463868] kthread+0x328/0x630 [ 20.463934] ret_from_fork+0x10/0x20 [ 20.464000] [ 20.464035] Allocated by task 267: [ 20.464070] kasan_save_stack+0x3c/0x68 [ 20.464113] kasan_save_track+0x20/0x40 [ 20.464151] kasan_save_alloc_info+0x40/0x58 [ 20.464382] __kasan_kmalloc+0xd4/0xd8 [ 20.464501] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.464567] kasan_atomics+0xb8/0x2e0 [ 20.464662] kunit_try_run_case+0x170/0x3f0 [ 20.464725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.464995] kthread+0x328/0x630 [ 20.465065] ret_from_fork+0x10/0x20 [ 20.465144] [ 20.465235] The buggy address belongs to the object at fff00000c6e72400 [ 20.465235] which belongs to the cache kmalloc-64 of size 64 [ 20.465330] The buggy address is located 0 bytes to the right of [ 20.465330] allocated 48-byte region [fff00000c6e72400, fff00000c6e72430) [ 20.465473] [ 20.465581] The buggy address belongs to the physical page: [ 20.465650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72 [ 20.465733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.465784] page_type: f5(slab) [ 20.465824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.465877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.465919] page dumped because: kasan: bad access detected [ 20.465954] [ 20.465974] Memory state around the buggy address: [ 20.466007] fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.466053] fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.466098] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.466377] ^ [ 20.466474] fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.466632] fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.466701] ==================================================================
[ 14.365354] ================================================================== [ 14.365663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.366340] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.367178] [ 14.367409] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.367460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.367475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.367498] Call Trace: [ 14.367516] <TASK> [ 14.367532] dump_stack_lvl+0x73/0xb0 [ 14.367561] print_report+0xd1/0x650 [ 14.367597] ? __virt_addr_valid+0x1db/0x2d0 [ 14.367621] ? kasan_atomics_helper+0xf10/0x5450 [ 14.367646] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.367673] ? kasan_atomics_helper+0xf10/0x5450 [ 14.367698] kasan_report+0x141/0x180 [ 14.367724] ? kasan_atomics_helper+0xf10/0x5450 [ 14.367754] kasan_check_range+0x10c/0x1c0 [ 14.367777] __kasan_check_write+0x18/0x20 [ 14.367800] kasan_atomics_helper+0xf10/0x5450 [ 14.367827] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.367852] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.367904] ? kasan_atomics+0x152/0x310 [ 14.367931] kasan_atomics+0x1dc/0x310 [ 14.367953] ? __pfx_kasan_atomics+0x10/0x10 [ 14.367977] ? __pfx_read_tsc+0x10/0x10 [ 14.368000] ? ktime_get_ts64+0x86/0x230 [ 14.368028] kunit_try_run_case+0x1a5/0x480 [ 14.368053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.368075] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.368102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.368130] ? __kthread_parkme+0x82/0x180 [ 14.368154] ? preempt_count_sub+0x50/0x80 [ 14.368182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.368206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.368232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.368259] kthread+0x337/0x6f0 [ 14.368279] ? trace_preempt_on+0x20/0xc0 [ 14.368304] ? __pfx_kthread+0x10/0x10 [ 14.368325] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.368351] ? calculate_sigpending+0x7b/0xa0 [ 14.368375] ? __pfx_kthread+0x10/0x10 [ 14.368395] ret_from_fork+0x41/0x80 [ 14.368419] ? __pfx_kthread+0x10/0x10 [ 14.368439] ret_from_fork_asm+0x1a/0x30 [ 14.368471] </TASK> [ 14.368484] [ 14.379140] Allocated by task 285: [ 14.379307] kasan_save_stack+0x45/0x70 [ 14.379523] kasan_save_track+0x18/0x40 [ 14.379704] kasan_save_alloc_info+0x3b/0x50 [ 14.379857] __kasan_kmalloc+0xb7/0xc0 [ 14.380007] __kmalloc_cache_noprof+0x189/0x420 [ 14.380217] kasan_atomics+0x95/0x310 [ 14.380409] kunit_try_run_case+0x1a5/0x480 [ 14.380661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.381144] kthread+0x337/0x6f0 [ 14.381333] ret_from_fork+0x41/0x80 [ 14.381480] ret_from_fork_asm+0x1a/0x30 [ 14.381702] [ 14.381804] The buggy address belongs to the object at ffff8881029e6b00 [ 14.381804] which belongs to the cache kmalloc-64 of size 64 [ 14.382337] The buggy address is located 0 bytes to the right of [ 14.382337] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.383072] [ 14.383154] The buggy address belongs to the physical page: [ 14.383332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.383693] flags: 0x200000000000000(node=0|zone=2) [ 14.383947] page_type: f5(slab) [ 14.384244] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.384729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.385108] page dumped because: kasan: bad access detected [ 14.385364] [ 14.385441] Memory state around the buggy address: [ 14.385603] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.385945] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.386270] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.386745] ^ [ 14.387030] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.387335] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.387605] ================================================================== [ 15.091732] ================================================================== [ 15.092440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.093027] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 15.093742] [ 15.093865] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.093959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.093974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.093998] Call Trace: [ 15.094015] <TASK> [ 15.094033] dump_stack_lvl+0x73/0xb0 [ 15.094061] print_report+0xd1/0x650 [ 15.094087] ? __virt_addr_valid+0x1db/0x2d0 [ 15.094111] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.094135] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.094160] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.094185] kasan_report+0x141/0x180 [ 15.094210] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.094240] kasan_check_range+0x10c/0x1c0 [ 15.094262] __kasan_check_write+0x18/0x20 [ 15.094285] kasan_atomics_helper+0x1f43/0x5450 [ 15.094310] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.094336] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.094360] ? kasan_atomics+0x152/0x310 [ 15.094385] kasan_atomics+0x1dc/0x310 [ 15.094407] ? __pfx_kasan_atomics+0x10/0x10 [ 15.094431] ? __pfx_read_tsc+0x10/0x10 [ 15.094453] ? ktime_get_ts64+0x86/0x230 [ 15.094480] kunit_try_run_case+0x1a5/0x480 [ 15.094525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.094548] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.094574] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.094602] ? __kthread_parkme+0x82/0x180 [ 15.094627] ? preempt_count_sub+0x50/0x80 [ 15.094655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.094678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.094704] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.094730] kthread+0x337/0x6f0 [ 15.094749] ? trace_preempt_on+0x20/0xc0 [ 15.094775] ? __pfx_kthread+0x10/0x10 [ 15.094796] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.094822] ? calculate_sigpending+0x7b/0xa0 [ 15.094846] ? __pfx_kthread+0x10/0x10 [ 15.094867] ret_from_fork+0x41/0x80 [ 15.094903] ? __pfx_kthread+0x10/0x10 [ 15.094924] ret_from_fork_asm+0x1a/0x30 [ 15.094957] </TASK> [ 15.094969] [ 15.104028] Allocated by task 285: [ 15.104166] kasan_save_stack+0x45/0x70 [ 15.104404] kasan_save_track+0x18/0x40 [ 15.104713] kasan_save_alloc_info+0x3b/0x50 [ 15.104951] __kasan_kmalloc+0xb7/0xc0 [ 15.105136] __kmalloc_cache_noprof+0x189/0x420 [ 15.105333] kasan_atomics+0x95/0x310 [ 15.105545] kunit_try_run_case+0x1a5/0x480 [ 15.105757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.106000] kthread+0x337/0x6f0 [ 15.106194] ret_from_fork+0x41/0x80 [ 15.106400] ret_from_fork_asm+0x1a/0x30 [ 15.106631] [ 15.106707] The buggy address belongs to the object at ffff8881029e6b00 [ 15.106707] which belongs to the cache kmalloc-64 of size 64 [ 15.107211] The buggy address is located 0 bytes to the right of [ 15.107211] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.107762] [ 15.107852] The buggy address belongs to the physical page: [ 15.108138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.108552] flags: 0x200000000000000(node=0|zone=2) [ 15.108747] page_type: f5(slab) [ 15.108869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.109223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.109546] page dumped because: kasan: bad access detected [ 15.109881] [ 15.110000] Memory state around the buggy address: [ 15.110198] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.110495] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.110849] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.111206] ^ [ 15.111433] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.111854] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.112114] ================================================================== [ 15.112500] ================================================================== [ 15.112862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.113463] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 15.113857] [ 15.113985] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.114033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.114047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.114069] Call Trace: [ 15.114086] <TASK> [ 15.114102] dump_stack_lvl+0x73/0xb0 [ 15.114129] print_report+0xd1/0x650 [ 15.114155] ? __virt_addr_valid+0x1db/0x2d0 [ 15.114179] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.114204] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.114230] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.114255] kasan_report+0x141/0x180 [ 15.114279] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.114331] __asan_report_load8_noabort+0x18/0x20 [ 15.114356] kasan_atomics_helper+0x4f71/0x5450 [ 15.114383] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.114424] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.114448] ? kasan_atomics+0x152/0x310 [ 15.114487] kasan_atomics+0x1dc/0x310 [ 15.114519] ? __pfx_kasan_atomics+0x10/0x10 [ 15.114542] ? __pfx_read_tsc+0x10/0x10 [ 15.114565] ? ktime_get_ts64+0x86/0x230 [ 15.114611] kunit_try_run_case+0x1a5/0x480 [ 15.114635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.114673] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.114700] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.114744] ? __kthread_parkme+0x82/0x180 [ 15.114768] ? preempt_count_sub+0x50/0x80 [ 15.114796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.114819] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.114846] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.114885] kthread+0x337/0x6f0 [ 15.114905] ? trace_preempt_on+0x20/0xc0 [ 15.114930] ? __pfx_kthread+0x10/0x10 [ 15.114950] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.114975] ? calculate_sigpending+0x7b/0xa0 [ 15.114999] ? __pfx_kthread+0x10/0x10 [ 15.115020] ret_from_fork+0x41/0x80 [ 15.115043] ? __pfx_kthread+0x10/0x10 [ 15.115064] ret_from_fork_asm+0x1a/0x30 [ 15.115096] </TASK> [ 15.115126] [ 15.123187] Allocated by task 285: [ 15.123323] kasan_save_stack+0x45/0x70 [ 15.123476] kasan_save_track+0x18/0x40 [ 15.123713] kasan_save_alloc_info+0x3b/0x50 [ 15.123966] __kasan_kmalloc+0xb7/0xc0 [ 15.124183] __kmalloc_cache_noprof+0x189/0x420 [ 15.124412] kasan_atomics+0x95/0x310 [ 15.124642] kunit_try_run_case+0x1a5/0x480 [ 15.124866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.125142] kthread+0x337/0x6f0 [ 15.125317] ret_from_fork+0x41/0x80 [ 15.125505] ret_from_fork_asm+0x1a/0x30 [ 15.125717] [ 15.125816] The buggy address belongs to the object at ffff8881029e6b00 [ 15.125816] which belongs to the cache kmalloc-64 of size 64 [ 15.126338] The buggy address is located 0 bytes to the right of [ 15.126338] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.126970] [ 15.127072] The buggy address belongs to the physical page: [ 15.127349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.127807] flags: 0x200000000000000(node=0|zone=2) [ 15.127991] page_type: f5(slab) [ 15.128118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.128356] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.128813] page dumped because: kasan: bad access detected [ 15.129091] [ 15.129219] Memory state around the buggy address: [ 15.129480] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.129869] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.130373] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.130787] ^ [ 15.131017] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.131378] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.131738] ================================================================== [ 14.066063] ================================================================== [ 14.066350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.066617] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.067253] [ 14.067374] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.067425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.067440] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.067464] Call Trace: [ 14.067483] <TASK> [ 14.067501] dump_stack_lvl+0x73/0xb0 [ 14.067531] print_report+0xd1/0x650 [ 14.067576] ? __virt_addr_valid+0x1db/0x2d0 [ 14.067601] ? kasan_atomics_helper+0x860/0x5450 [ 14.067626] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.067652] ? kasan_atomics_helper+0x860/0x5450 [ 14.067676] kasan_report+0x141/0x180 [ 14.067702] ? kasan_atomics_helper+0x860/0x5450 [ 14.067731] kasan_check_range+0x10c/0x1c0 [ 14.067754] __kasan_check_write+0x18/0x20 [ 14.067777] kasan_atomics_helper+0x860/0x5450 [ 14.067803] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.067828] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.067950] ? kasan_atomics+0x152/0x310 [ 14.067978] kasan_atomics+0x1dc/0x310 [ 14.068001] ? __pfx_kasan_atomics+0x10/0x10 [ 14.068025] ? __pfx_read_tsc+0x10/0x10 [ 14.068048] ? ktime_get_ts64+0x86/0x230 [ 14.068077] kunit_try_run_case+0x1a5/0x480 [ 14.068103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.068125] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.068152] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.068179] ? __kthread_parkme+0x82/0x180 [ 14.068203] ? preempt_count_sub+0x50/0x80 [ 14.068231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.068253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.068280] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.068306] kthread+0x337/0x6f0 [ 14.068326] ? trace_preempt_on+0x20/0xc0 [ 14.068351] ? __pfx_kthread+0x10/0x10 [ 14.068374] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.068398] ? calculate_sigpending+0x7b/0xa0 [ 14.068422] ? __pfx_kthread+0x10/0x10 [ 14.068443] ret_from_fork+0x41/0x80 [ 14.068467] ? __pfx_kthread+0x10/0x10 [ 14.068487] ret_from_fork_asm+0x1a/0x30 [ 14.068531] </TASK> [ 14.068546] [ 14.076748] Allocated by task 285: [ 14.076954] kasan_save_stack+0x45/0x70 [ 14.077328] kasan_save_track+0x18/0x40 [ 14.077710] kasan_save_alloc_info+0x3b/0x50 [ 14.077977] __kasan_kmalloc+0xb7/0xc0 [ 14.078215] __kmalloc_cache_noprof+0x189/0x420 [ 14.078475] kasan_atomics+0x95/0x310 [ 14.078616] kunit_try_run_case+0x1a5/0x480 [ 14.078767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.079000] kthread+0x337/0x6f0 [ 14.079176] ret_from_fork+0x41/0x80 [ 14.079417] ret_from_fork_asm+0x1a/0x30 [ 14.079710] [ 14.079790] The buggy address belongs to the object at ffff8881029e6b00 [ 14.079790] which belongs to the cache kmalloc-64 of size 64 [ 14.080300] The buggy address is located 0 bytes to the right of [ 14.080300] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.081346] [ 14.081466] The buggy address belongs to the physical page: [ 14.081800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.082180] flags: 0x200000000000000(node=0|zone=2) [ 14.082439] page_type: f5(slab) [ 14.082627] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.083049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.083341] page dumped because: kasan: bad access detected [ 14.083645] [ 14.083744] Memory state around the buggy address: [ 14.084044] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.084345] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.084649] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.085171] ^ [ 14.085347] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.085570] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.085870] ================================================================== [ 15.132229] ================================================================== [ 15.132472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.132885] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 15.133228] [ 15.133340] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.133414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.133428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.133450] Call Trace: [ 15.133482] <TASK> [ 15.133498] dump_stack_lvl+0x73/0xb0 [ 15.133524] print_report+0xd1/0x650 [ 15.133577] ? __virt_addr_valid+0x1db/0x2d0 [ 15.133615] ? kasan_atomics_helper+0x2006/0x5450 [ 15.133653] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.133692] ? kasan_atomics_helper+0x2006/0x5450 [ 15.133730] kasan_report+0x141/0x180 [ 15.133756] ? kasan_atomics_helper+0x2006/0x5450 [ 15.133785] kasan_check_range+0x10c/0x1c0 [ 15.133808] __kasan_check_write+0x18/0x20 [ 15.133831] kasan_atomics_helper+0x2006/0x5450 [ 15.133857] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.133892] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.133917] ? kasan_atomics+0x152/0x310 [ 15.133942] kasan_atomics+0x1dc/0x310 [ 15.133964] ? __pfx_kasan_atomics+0x10/0x10 [ 15.133988] ? __pfx_read_tsc+0x10/0x10 [ 15.134010] ? ktime_get_ts64+0x86/0x230 [ 15.134037] kunit_try_run_case+0x1a5/0x480 [ 15.134061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.134083] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.134109] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.134136] ? __kthread_parkme+0x82/0x180 [ 15.134160] ? preempt_count_sub+0x50/0x80 [ 15.134187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.134210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.134236] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.134263] kthread+0x337/0x6f0 [ 15.134283] ? trace_preempt_on+0x20/0xc0 [ 15.134309] ? __pfx_kthread+0x10/0x10 [ 15.134329] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.134354] ? calculate_sigpending+0x7b/0xa0 [ 15.134378] ? __pfx_kthread+0x10/0x10 [ 15.134399] ret_from_fork+0x41/0x80 [ 15.134422] ? __pfx_kthread+0x10/0x10 [ 15.134443] ret_from_fork_asm+0x1a/0x30 [ 15.134475] </TASK> [ 15.134487] [ 15.142921] Allocated by task 285: [ 15.143142] kasan_save_stack+0x45/0x70 [ 15.143374] kasan_save_track+0x18/0x40 [ 15.143586] kasan_save_alloc_info+0x3b/0x50 [ 15.143763] __kasan_kmalloc+0xb7/0xc0 [ 15.143914] __kmalloc_cache_noprof+0x189/0x420 [ 15.144171] kasan_atomics+0x95/0x310 [ 15.144365] kunit_try_run_case+0x1a5/0x480 [ 15.144570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.144890] kthread+0x337/0x6f0 [ 15.145105] ret_from_fork+0x41/0x80 [ 15.145305] ret_from_fork_asm+0x1a/0x30 [ 15.145504] [ 15.145603] The buggy address belongs to the object at ffff8881029e6b00 [ 15.145603] which belongs to the cache kmalloc-64 of size 64 [ 15.146369] The buggy address is located 0 bytes to the right of [ 15.146369] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.146737] [ 15.146813] The buggy address belongs to the physical page: [ 15.147227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.147633] flags: 0x200000000000000(node=0|zone=2) [ 15.147972] page_type: f5(slab) [ 15.148366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.148809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.149169] page dumped because: kasan: bad access detected [ 15.149388] [ 15.149460] Memory state around the buggy address: [ 15.149855] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.150284] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.150647] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.150867] ^ [ 15.151032] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.151286] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.151808] ================================================================== [ 14.732677] ================================================================== [ 14.732966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.733691] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.734247] [ 14.734387] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.734503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.734528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.734551] Call Trace: [ 14.734569] <TASK> [ 14.734587] dump_stack_lvl+0x73/0xb0 [ 14.734617] print_report+0xd1/0x650 [ 14.734643] ? __virt_addr_valid+0x1db/0x2d0 [ 14.734667] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.734691] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.734717] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.734742] kasan_report+0x141/0x180 [ 14.734768] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.734797] kasan_check_range+0x10c/0x1c0 [ 14.734821] __kasan_check_write+0x18/0x20 [ 14.734844] kasan_atomics_helper+0x15b6/0x5450 [ 14.734869] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.734908] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.734933] ? kasan_atomics+0x152/0x310 [ 14.734959] kasan_atomics+0x1dc/0x310 [ 14.734981] ? __pfx_kasan_atomics+0x10/0x10 [ 14.735180] ? __pfx_read_tsc+0x10/0x10 [ 14.735209] ? ktime_get_ts64+0x86/0x230 [ 14.735240] kunit_try_run_case+0x1a5/0x480 [ 14.735265] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.735288] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.735315] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.735342] ? __kthread_parkme+0x82/0x180 [ 14.735366] ? preempt_count_sub+0x50/0x80 [ 14.735395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.735419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.735446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.735472] kthread+0x337/0x6f0 [ 14.735491] ? trace_preempt_on+0x20/0xc0 [ 14.735530] ? __pfx_kthread+0x10/0x10 [ 14.735551] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.735581] ? calculate_sigpending+0x7b/0xa0 [ 14.735607] ? __pfx_kthread+0x10/0x10 [ 14.735628] ret_from_fork+0x41/0x80 [ 14.735651] ? __pfx_kthread+0x10/0x10 [ 14.735672] ret_from_fork_asm+0x1a/0x30 [ 14.735705] </TASK> [ 14.735718] [ 14.746174] Allocated by task 285: [ 14.746556] kasan_save_stack+0x45/0x70 [ 14.746774] kasan_save_track+0x18/0x40 [ 14.747011] kasan_save_alloc_info+0x3b/0x50 [ 14.747384] __kasan_kmalloc+0xb7/0xc0 [ 14.747584] __kmalloc_cache_noprof+0x189/0x420 [ 14.747783] kasan_atomics+0x95/0x310 [ 14.748025] kunit_try_run_case+0x1a5/0x480 [ 14.748195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.748438] kthread+0x337/0x6f0 [ 14.748677] ret_from_fork+0x41/0x80 [ 14.748816] ret_from_fork_asm+0x1a/0x30 [ 14.749043] [ 14.749149] The buggy address belongs to the object at ffff8881029e6b00 [ 14.749149] which belongs to the cache kmalloc-64 of size 64 [ 14.749584] The buggy address is located 0 bytes to the right of [ 14.749584] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.750250] [ 14.750327] The buggy address belongs to the physical page: [ 14.750558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.750855] flags: 0x200000000000000(node=0|zone=2) [ 14.751174] page_type: f5(slab) [ 14.751345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.751819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.752125] page dumped because: kasan: bad access detected [ 14.752368] [ 14.752456] Memory state around the buggy address: [ 14.752753] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.752977] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.753281] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.753698] ^ [ 14.753850] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.754427] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.754696] ================================================================== [ 13.752608] ================================================================== [ 13.753421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.753829] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 13.754258] [ 13.754384] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.754457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.754470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.754494] Call Trace: [ 13.754509] <TASK> [ 13.754540] dump_stack_lvl+0x73/0xb0 [ 13.754571] print_report+0xd1/0x650 [ 13.754598] ? __virt_addr_valid+0x1db/0x2d0 [ 13.754623] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.754647] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.754672] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.754716] kasan_report+0x141/0x180 [ 13.754742] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.754771] __asan_report_load4_noabort+0x18/0x20 [ 13.754794] kasan_atomics_helper+0x4bbc/0x5450 [ 13.754820] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.754913] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.754943] ? kasan_atomics+0x152/0x310 [ 13.754992] kasan_atomics+0x1dc/0x310 [ 13.755014] ? __pfx_kasan_atomics+0x10/0x10 [ 13.755038] ? __pfx_read_tsc+0x10/0x10 [ 13.755060] ? ktime_get_ts64+0x86/0x230 [ 13.755089] kunit_try_run_case+0x1a5/0x480 [ 13.755113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.755151] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.755179] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.755205] ? __kthread_parkme+0x82/0x180 [ 13.755230] ? preempt_count_sub+0x50/0x80 [ 13.755258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.755280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.755306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.755331] kthread+0x337/0x6f0 [ 13.755349] ? trace_preempt_on+0x20/0xc0 [ 13.755375] ? __pfx_kthread+0x10/0x10 [ 13.755394] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.755418] ? calculate_sigpending+0x7b/0xa0 [ 13.755442] ? __pfx_kthread+0x10/0x10 [ 13.755463] ret_from_fork+0x41/0x80 [ 13.755485] ? __pfx_kthread+0x10/0x10 [ 13.755504] ret_from_fork_asm+0x1a/0x30 [ 13.755538] </TASK> [ 13.755552] [ 13.765461] Allocated by task 285: [ 13.765769] kasan_save_stack+0x45/0x70 [ 13.766044] kasan_save_track+0x18/0x40 [ 13.766195] kasan_save_alloc_info+0x3b/0x50 [ 13.766435] __kasan_kmalloc+0xb7/0xc0 [ 13.766733] __kmalloc_cache_noprof+0x189/0x420 [ 13.767069] kasan_atomics+0x95/0x310 [ 13.767291] kunit_try_run_case+0x1a5/0x480 [ 13.767440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.767791] kthread+0x337/0x6f0 [ 13.767977] ret_from_fork+0x41/0x80 [ 13.768253] ret_from_fork_asm+0x1a/0x30 [ 13.768456] [ 13.768548] The buggy address belongs to the object at ffff8881029e6b00 [ 13.768548] which belongs to the cache kmalloc-64 of size 64 [ 13.769220] The buggy address is located 0 bytes to the right of [ 13.769220] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 13.769736] [ 13.769854] The buggy address belongs to the physical page: [ 13.770224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 13.770615] flags: 0x200000000000000(node=0|zone=2) [ 13.770845] page_type: f5(slab) [ 13.771069] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.771407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.771737] page dumped because: kasan: bad access detected [ 13.772133] [ 13.772239] Memory state around the buggy address: [ 13.772495] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.772916] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.773260] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.773482] ^ [ 13.774017] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.774351] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.774649] ================================================================== [ 15.193396] ================================================================== [ 15.193733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.194138] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 15.194475] [ 15.194693] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.194743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.194771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.194795] Call Trace: [ 15.194813] <TASK> [ 15.194832] dump_stack_lvl+0x73/0xb0 [ 15.194866] print_report+0xd1/0x650 [ 15.194905] ? __virt_addr_valid+0x1db/0x2d0 [ 15.194929] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.194955] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.194981] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.195006] kasan_report+0x141/0x180 [ 15.195031] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.195060] __asan_report_load8_noabort+0x18/0x20 [ 15.195084] kasan_atomics_helper+0x4fb2/0x5450 [ 15.195110] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.195136] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.195161] ? kasan_atomics+0x152/0x310 [ 15.195186] kasan_atomics+0x1dc/0x310 [ 15.195208] ? __pfx_kasan_atomics+0x10/0x10 [ 15.195232] ? __pfx_read_tsc+0x10/0x10 [ 15.195254] ? ktime_get_ts64+0x86/0x230 [ 15.195284] kunit_try_run_case+0x1a5/0x480 [ 15.195308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.195330] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.195358] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.195384] ? __kthread_parkme+0x82/0x180 [ 15.195409] ? preempt_count_sub+0x50/0x80 [ 15.195438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.195462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.195488] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.195514] kthread+0x337/0x6f0 [ 15.195534] ? trace_preempt_on+0x20/0xc0 [ 15.195560] ? __pfx_kthread+0x10/0x10 [ 15.195587] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.195650] ? calculate_sigpending+0x7b/0xa0 [ 15.195677] ? __pfx_kthread+0x10/0x10 [ 15.195698] ret_from_fork+0x41/0x80 [ 15.195722] ? __pfx_kthread+0x10/0x10 [ 15.195743] ret_from_fork_asm+0x1a/0x30 [ 15.195776] </TASK> [ 15.195789] [ 15.211327] Allocated by task 285: [ 15.211640] kasan_save_stack+0x45/0x70 [ 15.211844] kasan_save_track+0x18/0x40 [ 15.212053] kasan_save_alloc_info+0x3b/0x50 [ 15.212246] __kasan_kmalloc+0xb7/0xc0 [ 15.212433] __kmalloc_cache_noprof+0x189/0x420 [ 15.212914] kasan_atomics+0x95/0x310 [ 15.213166] kunit_try_run_case+0x1a5/0x480 [ 15.213479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.213847] kthread+0x337/0x6f0 [ 15.214110] ret_from_fork+0x41/0x80 [ 15.214303] ret_from_fork_asm+0x1a/0x30 [ 15.214617] [ 15.214721] The buggy address belongs to the object at ffff8881029e6b00 [ 15.214721] which belongs to the cache kmalloc-64 of size 64 [ 15.215282] The buggy address is located 0 bytes to the right of [ 15.215282] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.216046] [ 15.216219] The buggy address belongs to the physical page: [ 15.216526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.216991] flags: 0x200000000000000(node=0|zone=2) [ 15.217280] page_type: f5(slab) [ 15.217474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.218034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.218472] page dumped because: kasan: bad access detected [ 15.218846] [ 15.218941] Memory state around the buggy address: [ 15.219163] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.219634] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.219927] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.220250] ^ [ 15.220474] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.221012] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.221393] ================================================================== [ 13.888785] ================================================================== [ 13.889167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 13.889514] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 13.889832] [ 13.890015] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.890064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.890078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.890102] Call Trace: [ 13.890119] <TASK> [ 13.890135] dump_stack_lvl+0x73/0xb0 [ 13.890164] print_report+0xd1/0x650 [ 13.890189] ? __virt_addr_valid+0x1db/0x2d0 [ 13.890212] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.890238] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.890414] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.890447] kasan_report+0x141/0x180 [ 13.890474] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.890504] kasan_check_range+0x10c/0x1c0 [ 13.890543] __kasan_check_write+0x18/0x20 [ 13.890567] kasan_atomics_helper+0x4a0/0x5450 [ 13.890594] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.890620] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.890644] ? kasan_atomics+0x152/0x310 [ 13.890670] kasan_atomics+0x1dc/0x310 [ 13.890693] ? __pfx_kasan_atomics+0x10/0x10 [ 13.890717] ? __pfx_read_tsc+0x10/0x10 [ 13.890739] ? ktime_get_ts64+0x86/0x230 [ 13.890768] kunit_try_run_case+0x1a5/0x480 [ 13.890794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.890816] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.890844] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.890870] ? __kthread_parkme+0x82/0x180 [ 13.890981] ? preempt_count_sub+0x50/0x80 [ 13.891009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.891033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.891060] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.891087] kthread+0x337/0x6f0 [ 13.891106] ? trace_preempt_on+0x20/0xc0 [ 13.891134] ? __pfx_kthread+0x10/0x10 [ 13.891156] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.891181] ? calculate_sigpending+0x7b/0xa0 [ 13.891206] ? __pfx_kthread+0x10/0x10 [ 13.891229] ret_from_fork+0x41/0x80 [ 13.891251] ? __pfx_kthread+0x10/0x10 [ 13.891273] ret_from_fork_asm+0x1a/0x30 [ 13.891306] </TASK> [ 13.891319] [ 13.904915] Allocated by task 285: [ 13.905262] kasan_save_stack+0x45/0x70 [ 13.905448] kasan_save_track+0x18/0x40 [ 13.905653] kasan_save_alloc_info+0x3b/0x50 [ 13.905997] __kasan_kmalloc+0xb7/0xc0 [ 13.906253] __kmalloc_cache_noprof+0x189/0x420 [ 13.906485] kasan_atomics+0x95/0x310 [ 13.906696] kunit_try_run_case+0x1a5/0x480 [ 13.907064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.907299] kthread+0x337/0x6f0 [ 13.907475] ret_from_fork+0x41/0x80 [ 13.907643] ret_from_fork_asm+0x1a/0x30 [ 13.908165] [ 13.908346] The buggy address belongs to the object at ffff8881029e6b00 [ 13.908346] which belongs to the cache kmalloc-64 of size 64 [ 13.908888] The buggy address is located 0 bytes to the right of [ 13.908888] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 13.909642] [ 13.909813] The buggy address belongs to the physical page: [ 13.910174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 13.910549] flags: 0x200000000000000(node=0|zone=2) [ 13.911037] page_type: f5(slab) [ 13.911220] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.911836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.912138] page dumped because: kasan: bad access detected [ 13.912385] [ 13.912481] Memory state around the buggy address: [ 13.913199] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.913564] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.914328] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.914772] ^ [ 13.915372] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.916081] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.916397] ================================================================== [ 14.388132] ================================================================== [ 14.388679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.389138] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.389381] [ 14.389470] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.389532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.389547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.389570] Call Trace: [ 14.389587] <TASK> [ 14.389604] dump_stack_lvl+0x73/0xb0 [ 14.389633] print_report+0xd1/0x650 [ 14.389659] ? __virt_addr_valid+0x1db/0x2d0 [ 14.389683] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.389707] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.389733] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.389758] kasan_report+0x141/0x180 [ 14.389783] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.389813] kasan_check_range+0x10c/0x1c0 [ 14.389836] __kasan_check_write+0x18/0x20 [ 14.389859] kasan_atomics_helper+0xfa9/0x5450 [ 14.389897] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.389923] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.389948] ? kasan_atomics+0x152/0x310 [ 14.389973] kasan_atomics+0x1dc/0x310 [ 14.389995] ? __pfx_kasan_atomics+0x10/0x10 [ 14.390019] ? __pfx_read_tsc+0x10/0x10 [ 14.390041] ? ktime_get_ts64+0x86/0x230 [ 14.390069] kunit_try_run_case+0x1a5/0x480 [ 14.390094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.390117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.390144] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.390171] ? __kthread_parkme+0x82/0x180 [ 14.390196] ? preempt_count_sub+0x50/0x80 [ 14.390224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.390247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.390273] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.390300] kthread+0x337/0x6f0 [ 14.390319] ? trace_preempt_on+0x20/0xc0 [ 14.390345] ? __pfx_kthread+0x10/0x10 [ 14.390366] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.390391] ? calculate_sigpending+0x7b/0xa0 [ 14.390415] ? __pfx_kthread+0x10/0x10 [ 14.390436] ret_from_fork+0x41/0x80 [ 14.390460] ? __pfx_kthread+0x10/0x10 [ 14.390482] ret_from_fork_asm+0x1a/0x30 [ 14.390668] </TASK> [ 14.390687] [ 14.399431] Allocated by task 285: [ 14.399682] kasan_save_stack+0x45/0x70 [ 14.400074] kasan_save_track+0x18/0x40 [ 14.400246] kasan_save_alloc_info+0x3b/0x50 [ 14.400399] __kasan_kmalloc+0xb7/0xc0 [ 14.400539] __kmalloc_cache_noprof+0x189/0x420 [ 14.400768] kasan_atomics+0x95/0x310 [ 14.401090] kunit_try_run_case+0x1a5/0x480 [ 14.401319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.401503] kthread+0x337/0x6f0 [ 14.401631] ret_from_fork+0x41/0x80 [ 14.401812] ret_from_fork_asm+0x1a/0x30 [ 14.402182] [ 14.402292] The buggy address belongs to the object at ffff8881029e6b00 [ 14.402292] which belongs to the cache kmalloc-64 of size 64 [ 14.402951] The buggy address is located 0 bytes to the right of [ 14.402951] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.403370] [ 14.403447] The buggy address belongs to the physical page: [ 14.403803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.404271] flags: 0x200000000000000(node=0|zone=2) [ 14.404526] page_type: f5(slab) [ 14.404705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.405113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.405570] page dumped because: kasan: bad access detected [ 14.405793] [ 14.405956] Memory state around the buggy address: [ 14.406164] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.406464] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.407063] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.407356] ^ [ 14.407524] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.407964] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.408185] ================================================================== [ 15.222168] ================================================================== [ 15.222818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.223177] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 15.223708] [ 15.223943] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.224250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.224269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.224296] Call Trace: [ 15.224317] <TASK> [ 15.224341] dump_stack_lvl+0x73/0xb0 [ 15.224375] print_report+0xd1/0x650 [ 15.224401] ? __virt_addr_valid+0x1db/0x2d0 [ 15.224427] ? kasan_atomics_helper+0x218a/0x5450 [ 15.224451] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.224477] ? kasan_atomics_helper+0x218a/0x5450 [ 15.224502] kasan_report+0x141/0x180 [ 15.224527] ? kasan_atomics_helper+0x218a/0x5450 [ 15.224556] kasan_check_range+0x10c/0x1c0 [ 15.224579] __kasan_check_write+0x18/0x20 [ 15.224602] kasan_atomics_helper+0x218a/0x5450 [ 15.224628] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.224653] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.224678] ? kasan_atomics+0x152/0x310 [ 15.224704] kasan_atomics+0x1dc/0x310 [ 15.224726] ? __pfx_kasan_atomics+0x10/0x10 [ 15.224750] ? __pfx_read_tsc+0x10/0x10 [ 15.224772] ? ktime_get_ts64+0x86/0x230 [ 15.224800] kunit_try_run_case+0x1a5/0x480 [ 15.224825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.224848] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.224889] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.224916] ? __kthread_parkme+0x82/0x180 [ 15.224941] ? preempt_count_sub+0x50/0x80 [ 15.224970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.224993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.225019] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.225046] kthread+0x337/0x6f0 [ 15.225064] ? trace_preempt_on+0x20/0xc0 [ 15.225091] ? __pfx_kthread+0x10/0x10 [ 15.225111] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.225136] ? calculate_sigpending+0x7b/0xa0 [ 15.225161] ? __pfx_kthread+0x10/0x10 [ 15.225182] ret_from_fork+0x41/0x80 [ 15.225204] ? __pfx_kthread+0x10/0x10 [ 15.225225] ret_from_fork_asm+0x1a/0x30 [ 15.225257] </TASK> [ 15.225271] [ 15.235965] Allocated by task 285: [ 15.236240] kasan_save_stack+0x45/0x70 [ 15.236528] kasan_save_track+0x18/0x40 [ 15.236708] kasan_save_alloc_info+0x3b/0x50 [ 15.236930] __kasan_kmalloc+0xb7/0xc0 [ 15.237134] __kmalloc_cache_noprof+0x189/0x420 [ 15.237352] kasan_atomics+0x95/0x310 [ 15.237527] kunit_try_run_case+0x1a5/0x480 [ 15.238118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.238453] kthread+0x337/0x6f0 [ 15.238635] ret_from_fork+0x41/0x80 [ 15.238978] ret_from_fork_asm+0x1a/0x30 [ 15.239285] [ 15.239372] The buggy address belongs to the object at ffff8881029e6b00 [ 15.239372] which belongs to the cache kmalloc-64 of size 64 [ 15.240235] The buggy address is located 0 bytes to the right of [ 15.240235] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.240987] [ 15.241157] The buggy address belongs to the physical page: [ 15.241416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.241895] flags: 0x200000000000000(node=0|zone=2) [ 15.242114] page_type: f5(slab) [ 15.242293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.242804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.243199] page dumped because: kasan: bad access detected [ 15.243409] [ 15.243602] Memory state around the buggy address: [ 15.243893] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.244340] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.244755] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.245034] ^ [ 15.245393] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.245845] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.246158] ================================================================== [ 13.776003] ================================================================== [ 13.776533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.777178] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 13.777507] [ 13.777608] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.777678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.777691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.777715] Call Trace: [ 13.777728] <TASK> [ 13.777757] dump_stack_lvl+0x73/0xb0 [ 13.777788] print_report+0xd1/0x650 [ 13.777813] ? __virt_addr_valid+0x1db/0x2d0 [ 13.777920] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.777951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.777998] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.778023] kasan_report+0x141/0x180 [ 13.778048] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.778077] __asan_report_store4_noabort+0x1b/0x30 [ 13.778100] kasan_atomics_helper+0x4ba2/0x5450 [ 13.778125] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.778150] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.778174] ? kasan_atomics+0x152/0x310 [ 13.778200] kasan_atomics+0x1dc/0x310 [ 13.778221] ? __pfx_kasan_atomics+0x10/0x10 [ 13.778245] ? __pfx_read_tsc+0x10/0x10 [ 13.778268] ? ktime_get_ts64+0x86/0x230 [ 13.778296] kunit_try_run_case+0x1a5/0x480 [ 13.778321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.778361] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.778388] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.778414] ? __kthread_parkme+0x82/0x180 [ 13.778437] ? preempt_count_sub+0x50/0x80 [ 13.778465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.778487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.778529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.778555] kthread+0x337/0x6f0 [ 13.778573] ? trace_preempt_on+0x20/0xc0 [ 13.778598] ? __pfx_kthread+0x10/0x10 [ 13.778618] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.778641] ? calculate_sigpending+0x7b/0xa0 [ 13.778665] ? __pfx_kthread+0x10/0x10 [ 13.778685] ret_from_fork+0x41/0x80 [ 13.778707] ? __pfx_kthread+0x10/0x10 [ 13.778727] ret_from_fork_asm+0x1a/0x30 [ 13.778759] </TASK> [ 13.778770] [ 13.787395] Allocated by task 285: [ 13.787529] kasan_save_stack+0x45/0x70 [ 13.788086] kasan_save_track+0x18/0x40 [ 13.788411] kasan_save_alloc_info+0x3b/0x50 [ 13.788628] __kasan_kmalloc+0xb7/0xc0 [ 13.788932] __kmalloc_cache_noprof+0x189/0x420 [ 13.789182] kasan_atomics+0x95/0x310 [ 13.789354] kunit_try_run_case+0x1a5/0x480 [ 13.789500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.789792] kthread+0x337/0x6f0 [ 13.790170] ret_from_fork+0x41/0x80 [ 13.790354] ret_from_fork_asm+0x1a/0x30 [ 13.790563] [ 13.790693] The buggy address belongs to the object at ffff8881029e6b00 [ 13.790693] which belongs to the cache kmalloc-64 of size 64 [ 13.791409] The buggy address is located 0 bytes to the right of [ 13.791409] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 13.791835] [ 13.792084] The buggy address belongs to the physical page: [ 13.792361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 13.792966] flags: 0x200000000000000(node=0|zone=2) [ 13.793238] page_type: f5(slab) [ 13.793385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.793701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.794130] page dumped because: kasan: bad access detected [ 13.794398] [ 13.794499] Memory state around the buggy address: [ 13.794675] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.794906] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.795244] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.795587] ^ [ 13.795856] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.796494] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.796759] ================================================================== [ 14.825007] ================================================================== [ 14.825321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.825708] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.826143] [ 14.826249] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.826298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.826312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.826334] Call Trace: [ 14.826348] <TASK> [ 14.826363] dump_stack_lvl+0x73/0xb0 [ 14.826388] print_report+0xd1/0x650 [ 14.826414] ? __virt_addr_valid+0x1db/0x2d0 [ 14.826437] ? kasan_atomics_helper+0x1818/0x5450 [ 14.826462] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.826487] ? kasan_atomics_helper+0x1818/0x5450 [ 14.826521] kasan_report+0x141/0x180 [ 14.826546] ? kasan_atomics_helper+0x1818/0x5450 [ 14.826575] kasan_check_range+0x10c/0x1c0 [ 14.826598] __kasan_check_write+0x18/0x20 [ 14.826621] kasan_atomics_helper+0x1818/0x5450 [ 14.826646] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.826671] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.826696] ? kasan_atomics+0x152/0x310 [ 14.826721] kasan_atomics+0x1dc/0x310 [ 14.826743] ? __pfx_kasan_atomics+0x10/0x10 [ 14.826767] ? __pfx_read_tsc+0x10/0x10 [ 14.826788] ? ktime_get_ts64+0x86/0x230 [ 14.826815] kunit_try_run_case+0x1a5/0x480 [ 14.826848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.826870] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.826907] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.826935] ? __kthread_parkme+0x82/0x180 [ 14.826959] ? preempt_count_sub+0x50/0x80 [ 14.826987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.827009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.827036] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.827062] kthread+0x337/0x6f0 [ 14.827082] ? trace_preempt_on+0x20/0xc0 [ 14.827107] ? __pfx_kthread+0x10/0x10 [ 14.827127] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.827152] ? calculate_sigpending+0x7b/0xa0 [ 14.827175] ? __pfx_kthread+0x10/0x10 [ 14.827196] ret_from_fork+0x41/0x80 [ 14.827219] ? __pfx_kthread+0x10/0x10 [ 14.827239] ret_from_fork_asm+0x1a/0x30 [ 14.827272] </TASK> [ 14.827284] [ 14.835558] Allocated by task 285: [ 14.835799] kasan_save_stack+0x45/0x70 [ 14.836005] kasan_save_track+0x18/0x40 [ 14.836192] kasan_save_alloc_info+0x3b/0x50 [ 14.836393] __kasan_kmalloc+0xb7/0xc0 [ 14.836530] __kmalloc_cache_noprof+0x189/0x420 [ 14.836683] kasan_atomics+0x95/0x310 [ 14.836817] kunit_try_run_case+0x1a5/0x480 [ 14.836971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.837148] kthread+0x337/0x6f0 [ 14.837270] ret_from_fork+0x41/0x80 [ 14.837401] ret_from_fork_asm+0x1a/0x30 [ 14.837739] [ 14.837945] The buggy address belongs to the object at ffff8881029e6b00 [ 14.837945] which belongs to the cache kmalloc-64 of size 64 [ 14.838526] The buggy address is located 0 bytes to the right of [ 14.838526] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.839083] [ 14.839182] The buggy address belongs to the physical page: [ 14.839434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.839908] flags: 0x200000000000000(node=0|zone=2) [ 14.840072] page_type: f5(slab) [ 14.840195] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.840424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.841068] page dumped because: kasan: bad access detected [ 14.841336] [ 14.841435] Memory state around the buggy address: [ 14.841764] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.842138] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.842354] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.842650] ^ [ 14.842892] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.843244] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.843682] ================================================================== [ 14.869589] ================================================================== [ 14.870023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.870265] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.870597] [ 14.870711] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.870762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.870776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.870799] Call Trace: [ 14.870814] <TASK> [ 14.870831] dump_stack_lvl+0x73/0xb0 [ 14.870856] print_report+0xd1/0x650 [ 14.870895] ? __virt_addr_valid+0x1db/0x2d0 [ 14.870919] ? kasan_atomics_helper+0x194a/0x5450 [ 14.870943] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.870968] ? kasan_atomics_helper+0x194a/0x5450 [ 14.870993] kasan_report+0x141/0x180 [ 14.871018] ? kasan_atomics_helper+0x194a/0x5450 [ 14.871047] kasan_check_range+0x10c/0x1c0 [ 14.871069] __kasan_check_write+0x18/0x20 [ 14.871092] kasan_atomics_helper+0x194a/0x5450 [ 14.871117] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.871143] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.871167] ? kasan_atomics+0x152/0x310 [ 14.871193] kasan_atomics+0x1dc/0x310 [ 14.871215] ? __pfx_kasan_atomics+0x10/0x10 [ 14.871238] ? __pfx_read_tsc+0x10/0x10 [ 14.871260] ? ktime_get_ts64+0x86/0x230 [ 14.871288] kunit_try_run_case+0x1a5/0x480 [ 14.871312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.871333] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.871359] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.871386] ? __kthread_parkme+0x82/0x180 [ 14.871409] ? preempt_count_sub+0x50/0x80 [ 14.871436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.871459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.871484] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.871511] kthread+0x337/0x6f0 [ 14.871623] ? trace_preempt_on+0x20/0xc0 [ 14.871649] ? __pfx_kthread+0x10/0x10 [ 14.871670] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.871696] ? calculate_sigpending+0x7b/0xa0 [ 14.871719] ? __pfx_kthread+0x10/0x10 [ 14.871740] ret_from_fork+0x41/0x80 [ 14.871763] ? __pfx_kthread+0x10/0x10 [ 14.871783] ret_from_fork_asm+0x1a/0x30 [ 14.871816] </TASK> [ 14.871828] [ 14.880573] Allocated by task 285: [ 14.880737] kasan_save_stack+0x45/0x70 [ 14.881082] kasan_save_track+0x18/0x40 [ 14.881254] kasan_save_alloc_info+0x3b/0x50 [ 14.881441] __kasan_kmalloc+0xb7/0xc0 [ 14.881732] __kmalloc_cache_noprof+0x189/0x420 [ 14.882015] kasan_atomics+0x95/0x310 [ 14.882214] kunit_try_run_case+0x1a5/0x480 [ 14.882399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.882633] kthread+0x337/0x6f0 [ 14.882914] ret_from_fork+0x41/0x80 [ 14.883091] ret_from_fork_asm+0x1a/0x30 [ 14.883280] [ 14.883366] The buggy address belongs to the object at ffff8881029e6b00 [ 14.883366] which belongs to the cache kmalloc-64 of size 64 [ 14.884030] The buggy address is located 0 bytes to the right of [ 14.884030] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.884485] [ 14.884562] The buggy address belongs to the physical page: [ 14.884738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.885071] flags: 0x200000000000000(node=0|zone=2) [ 14.885528] page_type: f5(slab) [ 14.885741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.886278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.886675] page dumped because: kasan: bad access detected [ 14.886854] [ 14.886941] Memory state around the buggy address: [ 14.887101] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.887624] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.888007] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.888548] ^ [ 14.888968] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.889259] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.889480] ================================================================== [ 15.172558] ================================================================== [ 15.172919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.173290] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 15.173616] [ 15.173740] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.173822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.173836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.173860] Call Trace: [ 15.173887] <TASK> [ 15.173932] dump_stack_lvl+0x73/0xb0 [ 15.173962] print_report+0xd1/0x650 [ 15.173987] ? __virt_addr_valid+0x1db/0x2d0 [ 15.174010] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.174034] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.174060] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.174084] kasan_report+0x141/0x180 [ 15.174110] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.174139] kasan_check_range+0x10c/0x1c0 [ 15.174162] __kasan_check_write+0x18/0x20 [ 15.174186] kasan_atomics_helper+0x20c8/0x5450 [ 15.174243] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.174269] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.174294] ? kasan_atomics+0x152/0x310 [ 15.174320] kasan_atomics+0x1dc/0x310 [ 15.174372] ? __pfx_kasan_atomics+0x10/0x10 [ 15.174397] ? __pfx_read_tsc+0x10/0x10 [ 15.174419] ? ktime_get_ts64+0x86/0x230 [ 15.174447] kunit_try_run_case+0x1a5/0x480 [ 15.174472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.174536] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.174563] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.174590] ? __kthread_parkme+0x82/0x180 [ 15.174614] ? preempt_count_sub+0x50/0x80 [ 15.174669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.174694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.174720] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.174746] kthread+0x337/0x6f0 [ 15.174765] ? trace_preempt_on+0x20/0xc0 [ 15.174821] ? __pfx_kthread+0x10/0x10 [ 15.174900] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.174925] ? calculate_sigpending+0x7b/0xa0 [ 15.174949] ? __pfx_kthread+0x10/0x10 [ 15.174970] ret_from_fork+0x41/0x80 [ 15.174993] ? __pfx_kthread+0x10/0x10 [ 15.175014] ret_from_fork_asm+0x1a/0x30 [ 15.175047] </TASK> [ 15.175060] [ 15.183716] Allocated by task 285: [ 15.183926] kasan_save_stack+0x45/0x70 [ 15.184157] kasan_save_track+0x18/0x40 [ 15.184372] kasan_save_alloc_info+0x3b/0x50 [ 15.184640] __kasan_kmalloc+0xb7/0xc0 [ 15.184851] __kmalloc_cache_noprof+0x189/0x420 [ 15.185163] kasan_atomics+0x95/0x310 [ 15.185352] kunit_try_run_case+0x1a5/0x480 [ 15.185557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.185813] kthread+0x337/0x6f0 [ 15.185989] ret_from_fork+0x41/0x80 [ 15.186262] ret_from_fork_asm+0x1a/0x30 [ 15.186407] [ 15.186518] The buggy address belongs to the object at ffff8881029e6b00 [ 15.186518] which belongs to the cache kmalloc-64 of size 64 [ 15.187363] The buggy address is located 0 bytes to the right of [ 15.187363] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.187940] [ 15.188042] The buggy address belongs to the physical page: [ 15.188297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.188783] flags: 0x200000000000000(node=0|zone=2) [ 15.189145] page_type: f5(slab) [ 15.189330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.189674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.189917] page dumped because: kasan: bad access detected [ 15.190141] [ 15.190278] Memory state around the buggy address: [ 15.190602] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.190950] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.191317] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.191786] ^ [ 15.191992] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.192369] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.192717] ================================================================== [ 13.797695] ================================================================== [ 13.798008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.798622] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 13.799063] [ 13.799166] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.799251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.799265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.799288] Call Trace: [ 13.799316] <TASK> [ 13.799449] dump_stack_lvl+0x73/0xb0 [ 13.799482] print_report+0xd1/0x650 [ 13.799528] ? __virt_addr_valid+0x1db/0x2d0 [ 13.799553] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.799586] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.799612] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.799638] kasan_report+0x141/0x180 [ 13.799663] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.799693] __asan_report_load4_noabort+0x18/0x20 [ 13.799717] kasan_atomics_helper+0x4b88/0x5450 [ 13.799768] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.799794] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.799818] ? kasan_atomics+0x152/0x310 [ 13.800024] kasan_atomics+0x1dc/0x310 [ 13.800061] ? __pfx_kasan_atomics+0x10/0x10 [ 13.800086] ? __pfx_read_tsc+0x10/0x10 [ 13.800109] ? ktime_get_ts64+0x86/0x230 [ 13.800138] kunit_try_run_case+0x1a5/0x480 [ 13.800163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.800185] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.800213] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.800240] ? __kthread_parkme+0x82/0x180 [ 13.800264] ? preempt_count_sub+0x50/0x80 [ 13.800293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.800318] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.800345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.800371] kthread+0x337/0x6f0 [ 13.800390] ? trace_preempt_on+0x20/0xc0 [ 13.800416] ? __pfx_kthread+0x10/0x10 [ 13.800436] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.800461] ? calculate_sigpending+0x7b/0xa0 [ 13.800485] ? __pfx_kthread+0x10/0x10 [ 13.800506] ret_from_fork+0x41/0x80 [ 13.800529] ? __pfx_kthread+0x10/0x10 [ 13.800550] ret_from_fork_asm+0x1a/0x30 [ 13.800582] </TASK> [ 13.800595] [ 13.809800] Allocated by task 285: [ 13.810124] kasan_save_stack+0x45/0x70 [ 13.810311] kasan_save_track+0x18/0x40 [ 13.810462] kasan_save_alloc_info+0x3b/0x50 [ 13.810802] __kasan_kmalloc+0xb7/0xc0 [ 13.811083] __kmalloc_cache_noprof+0x189/0x420 [ 13.811409] kasan_atomics+0x95/0x310 [ 13.811727] kunit_try_run_case+0x1a5/0x480 [ 13.812214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.812525] kthread+0x337/0x6f0 [ 13.812714] ret_from_fork+0x41/0x80 [ 13.812985] ret_from_fork_asm+0x1a/0x30 [ 13.813176] [ 13.813306] The buggy address belongs to the object at ffff8881029e6b00 [ 13.813306] which belongs to the cache kmalloc-64 of size 64 [ 13.813772] The buggy address is located 0 bytes to the right of [ 13.813772] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 13.814428] [ 13.814555] The buggy address belongs to the physical page: [ 13.814994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 13.815369] flags: 0x200000000000000(node=0|zone=2) [ 13.815602] page_type: f5(slab) [ 13.815804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.816204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.816456] page dumped because: kasan: bad access detected [ 13.817044] [ 13.817179] Memory state around the buggy address: [ 13.817384] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.817727] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.818120] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.818444] ^ [ 13.818701] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.819110] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.819438] ================================================================== [ 14.543026] ================================================================== [ 14.543433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.543848] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.544258] [ 14.544378] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.544427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.544441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.544464] Call Trace: [ 14.544478] <TASK> [ 14.544493] dump_stack_lvl+0x73/0xb0 [ 14.544523] print_report+0xd1/0x650 [ 14.544547] ? __virt_addr_valid+0x1db/0x2d0 [ 14.544596] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.544622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.544647] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.544673] kasan_report+0x141/0x180 [ 14.544698] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.544745] __asan_report_load4_noabort+0x18/0x20 [ 14.544769] kasan_atomics_helper+0x49e8/0x5450 [ 14.544795] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.544821] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.544845] ? kasan_atomics+0x152/0x310 [ 14.544870] kasan_atomics+0x1dc/0x310 [ 14.545096] ? __pfx_kasan_atomics+0x10/0x10 [ 14.545157] ? __pfx_read_tsc+0x10/0x10 [ 14.545195] ? ktime_get_ts64+0x86/0x230 [ 14.545223] kunit_try_run_case+0x1a5/0x480 [ 14.545248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.545269] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.545296] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.545324] ? __kthread_parkme+0x82/0x180 [ 14.545348] ? preempt_count_sub+0x50/0x80 [ 14.545376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.545399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.545426] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.545453] kthread+0x337/0x6f0 [ 14.545473] ? trace_preempt_on+0x20/0xc0 [ 14.545499] ? __pfx_kthread+0x10/0x10 [ 14.545521] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.545546] ? calculate_sigpending+0x7b/0xa0 [ 14.545570] ? __pfx_kthread+0x10/0x10 [ 14.545591] ret_from_fork+0x41/0x80 [ 14.545614] ? __pfx_kthread+0x10/0x10 [ 14.545635] ret_from_fork_asm+0x1a/0x30 [ 14.545667] </TASK> [ 14.545680] [ 14.555029] Allocated by task 285: [ 14.555350] kasan_save_stack+0x45/0x70 [ 14.555555] kasan_save_track+0x18/0x40 [ 14.555818] kasan_save_alloc_info+0x3b/0x50 [ 14.556070] __kasan_kmalloc+0xb7/0xc0 [ 14.556273] __kmalloc_cache_noprof+0x189/0x420 [ 14.556514] kasan_atomics+0x95/0x310 [ 14.556673] kunit_try_run_case+0x1a5/0x480 [ 14.556898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.557109] kthread+0x337/0x6f0 [ 14.557236] ret_from_fork+0x41/0x80 [ 14.557373] ret_from_fork_asm+0x1a/0x30 [ 14.557925] [ 14.558039] The buggy address belongs to the object at ffff8881029e6b00 [ 14.558039] which belongs to the cache kmalloc-64 of size 64 [ 14.558567] The buggy address is located 0 bytes to the right of [ 14.558567] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.558950] [ 14.559028] The buggy address belongs to the physical page: [ 14.559266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.559968] flags: 0x200000000000000(node=0|zone=2) [ 14.560222] page_type: f5(slab) [ 14.560397] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.560709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.561240] page dumped because: kasan: bad access detected [ 14.561488] [ 14.561590] Memory state around the buggy address: [ 14.561818] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.562189] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.562415] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.562632] ^ [ 14.562824] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.563171] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.563496] ================================================================== [ 13.820117] ================================================================== [ 13.820421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.821216] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 13.821543] [ 13.821661] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.821709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.821723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.821747] Call Trace: [ 13.821762] <TASK> [ 13.821779] dump_stack_lvl+0x73/0xb0 [ 13.821809] print_report+0xd1/0x650 [ 13.821834] ? __virt_addr_valid+0x1db/0x2d0 [ 13.821983] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.822029] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.822056] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.822082] kasan_report+0x141/0x180 [ 13.822108] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.822138] __asan_report_store4_noabort+0x1b/0x30 [ 13.822162] kasan_atomics_helper+0x4b6e/0x5450 [ 13.822189] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.822216] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.822241] ? kasan_atomics+0x152/0x310 [ 13.822286] kasan_atomics+0x1dc/0x310 [ 13.822310] ? __pfx_kasan_atomics+0x10/0x10 [ 13.822334] ? __pfx_read_tsc+0x10/0x10 [ 13.822357] ? ktime_get_ts64+0x86/0x230 [ 13.822386] kunit_try_run_case+0x1a5/0x480 [ 13.822410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.822448] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.822476] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.822504] ? __kthread_parkme+0x82/0x180 [ 13.822537] ? preempt_count_sub+0x50/0x80 [ 13.822566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.822590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.822616] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.822643] kthread+0x337/0x6f0 [ 13.822663] ? trace_preempt_on+0x20/0xc0 [ 13.822689] ? __pfx_kthread+0x10/0x10 [ 13.822710] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.822735] ? calculate_sigpending+0x7b/0xa0 [ 13.822760] ? __pfx_kthread+0x10/0x10 [ 13.822783] ret_from_fork+0x41/0x80 [ 13.822805] ? __pfx_kthread+0x10/0x10 [ 13.822825] ret_from_fork_asm+0x1a/0x30 [ 13.822917] </TASK> [ 13.822932] [ 13.832385] Allocated by task 285: [ 13.832610] kasan_save_stack+0x45/0x70 [ 13.832801] kasan_save_track+0x18/0x40 [ 13.832991] kasan_save_alloc_info+0x3b/0x50 [ 13.833452] __kasan_kmalloc+0xb7/0xc0 [ 13.833734] __kmalloc_cache_noprof+0x189/0x420 [ 13.834052] kasan_atomics+0x95/0x310 [ 13.834291] kunit_try_run_case+0x1a5/0x480 [ 13.834483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.834665] kthread+0x337/0x6f0 [ 13.834844] ret_from_fork+0x41/0x80 [ 13.835153] ret_from_fork_asm+0x1a/0x30 [ 13.835371] [ 13.835473] The buggy address belongs to the object at ffff8881029e6b00 [ 13.835473] which belongs to the cache kmalloc-64 of size 64 [ 13.836012] The buggy address is located 0 bytes to the right of [ 13.836012] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 13.836662] [ 13.836773] The buggy address belongs to the physical page: [ 13.837129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 13.837429] flags: 0x200000000000000(node=0|zone=2) [ 13.838082] page_type: f5(slab) [ 13.838255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.838564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.839051] page dumped because: kasan: bad access detected [ 13.839283] [ 13.839411] Memory state around the buggy address: [ 13.839773] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.840188] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.840488] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.840820] ^ [ 13.841159] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.841467] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.842045] ================================================================== [ 14.451663] ================================================================== [ 14.451935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.452412] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.452981] [ 14.453076] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.453125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.453138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.453160] Call Trace: [ 14.453176] <TASK> [ 14.453192] dump_stack_lvl+0x73/0xb0 [ 14.453221] print_report+0xd1/0x650 [ 14.453247] ? __virt_addr_valid+0x1db/0x2d0 [ 14.453272] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.453296] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.453323] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.453348] kasan_report+0x141/0x180 [ 14.453373] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.453404] __asan_report_load4_noabort+0x18/0x20 [ 14.453427] kasan_atomics_helper+0x4a1c/0x5450 [ 14.453454] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.453479] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.453504] ? kasan_atomics+0x152/0x310 [ 14.453530] kasan_atomics+0x1dc/0x310 [ 14.453551] ? __pfx_kasan_atomics+0x10/0x10 [ 14.453575] ? __pfx_read_tsc+0x10/0x10 [ 14.453597] ? ktime_get_ts64+0x86/0x230 [ 14.453625] kunit_try_run_case+0x1a5/0x480 [ 14.453649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.453671] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.453698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.453726] ? __kthread_parkme+0x82/0x180 [ 14.453750] ? preempt_count_sub+0x50/0x80 [ 14.453778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.453801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.453828] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.453867] kthread+0x337/0x6f0 [ 14.453898] ? trace_preempt_on+0x20/0xc0 [ 14.453924] ? __pfx_kthread+0x10/0x10 [ 14.453944] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.453969] ? calculate_sigpending+0x7b/0xa0 [ 14.453993] ? __pfx_kthread+0x10/0x10 [ 14.454014] ret_from_fork+0x41/0x80 [ 14.454037] ? __pfx_kthread+0x10/0x10 [ 14.454058] ret_from_fork_asm+0x1a/0x30 [ 14.454090] </TASK> [ 14.454102] [ 14.461991] Allocated by task 285: [ 14.462128] kasan_save_stack+0x45/0x70 [ 14.462282] kasan_save_track+0x18/0x40 [ 14.462473] kasan_save_alloc_info+0x3b/0x50 [ 14.462692] __kasan_kmalloc+0xb7/0xc0 [ 14.462906] __kmalloc_cache_noprof+0x189/0x420 [ 14.463239] kasan_atomics+0x95/0x310 [ 14.463438] kunit_try_run_case+0x1a5/0x480 [ 14.463787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.464262] kthread+0x337/0x6f0 [ 14.464419] ret_from_fork+0x41/0x80 [ 14.464636] ret_from_fork_asm+0x1a/0x30 [ 14.464781] [ 14.464858] The buggy address belongs to the object at ffff8881029e6b00 [ 14.464858] which belongs to the cache kmalloc-64 of size 64 [ 14.465436] The buggy address is located 0 bytes to the right of [ 14.465436] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.466015] [ 14.466114] The buggy address belongs to the physical page: [ 14.466544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.466970] flags: 0x200000000000000(node=0|zone=2) [ 14.467197] page_type: f5(slab) [ 14.467371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.468733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.469280] page dumped because: kasan: bad access detected [ 14.469620] [ 14.469707] Memory state around the buggy address: [ 14.470097] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.470397] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.471025] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.471334] ^ [ 14.471727] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.472235] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.472505] ================================================================== [ 14.928640] ================================================================== [ 14.929050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 14.929436] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.930054] [ 14.930175] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.930223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.930236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.930267] Call Trace: [ 14.930282] <TASK> [ 14.930299] dump_stack_lvl+0x73/0xb0 [ 14.930325] print_report+0xd1/0x650 [ 14.930350] ? __virt_addr_valid+0x1db/0x2d0 [ 14.930374] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.930398] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.930424] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.930448] kasan_report+0x141/0x180 [ 14.930473] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.930503] kasan_check_range+0x10c/0x1c0 [ 14.930525] __kasan_check_write+0x18/0x20 [ 14.930549] kasan_atomics_helper+0x1b22/0x5450 [ 14.930574] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.930600] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.930623] ? kasan_atomics+0x152/0x310 [ 14.930649] kasan_atomics+0x1dc/0x310 [ 14.930671] ? __pfx_kasan_atomics+0x10/0x10 [ 14.930695] ? __pfx_read_tsc+0x10/0x10 [ 14.930717] ? ktime_get_ts64+0x86/0x230 [ 14.930744] kunit_try_run_case+0x1a5/0x480 [ 14.930769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.930791] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.930817] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.930844] ? __kthread_parkme+0x82/0x180 [ 14.930868] ? preempt_count_sub+0x50/0x80 [ 14.930906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.930928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.930955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.930981] kthread+0x337/0x6f0 [ 14.931000] ? trace_preempt_on+0x20/0xc0 [ 14.931025] ? __pfx_kthread+0x10/0x10 [ 14.931045] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.931070] ? calculate_sigpending+0x7b/0xa0 [ 14.931094] ? __pfx_kthread+0x10/0x10 [ 14.931115] ret_from_fork+0x41/0x80 [ 14.931137] ? __pfx_kthread+0x10/0x10 [ 14.931157] ret_from_fork_asm+0x1a/0x30 [ 14.931190] </TASK> [ 14.931204] [ 14.941092] Allocated by task 285: [ 14.941289] kasan_save_stack+0x45/0x70 [ 14.941506] kasan_save_track+0x18/0x40 [ 14.941714] kasan_save_alloc_info+0x3b/0x50 [ 14.943259] __kasan_kmalloc+0xb7/0xc0 [ 14.943486] __kmalloc_cache_noprof+0x189/0x420 [ 14.944558] kasan_atomics+0x95/0x310 [ 14.945347] kunit_try_run_case+0x1a5/0x480 [ 14.945947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.946810] kthread+0x337/0x6f0 [ 14.947567] ret_from_fork+0x41/0x80 [ 14.947725] ret_from_fork_asm+0x1a/0x30 [ 14.948018] [ 14.948140] The buggy address belongs to the object at ffff8881029e6b00 [ 14.948140] which belongs to the cache kmalloc-64 of size 64 [ 14.948635] The buggy address is located 0 bytes to the right of [ 14.948635] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.949217] [ 14.949320] The buggy address belongs to the physical page: [ 14.949497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.949866] flags: 0x200000000000000(node=0|zone=2) [ 14.950526] page_type: f5(slab) [ 14.950677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.951309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.951961] page dumped because: kasan: bad access detected [ 14.952342] [ 14.952439] Memory state around the buggy address: [ 14.952868] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.953332] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.953636] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.954337] ^ [ 14.954860] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.955595] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.956207] ================================================================== [ 14.631739] ================================================================== [ 14.632210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.632588] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.632993] [ 14.633087] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.633135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.633149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.633171] Call Trace: [ 14.633186] <TASK> [ 14.633202] dump_stack_lvl+0x73/0xb0 [ 14.633229] print_report+0xd1/0x650 [ 14.633255] ? __virt_addr_valid+0x1db/0x2d0 [ 14.633279] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.633304] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.633330] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.633355] kasan_report+0x141/0x180 [ 14.633380] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.633410] __asan_report_load8_noabort+0x18/0x20 [ 14.633434] kasan_atomics_helper+0x4eae/0x5450 [ 14.633460] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.633486] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.633521] ? kasan_atomics+0x152/0x310 [ 14.633547] kasan_atomics+0x1dc/0x310 [ 14.633569] ? __pfx_kasan_atomics+0x10/0x10 [ 14.633592] ? __pfx_read_tsc+0x10/0x10 [ 14.633614] ? ktime_get_ts64+0x86/0x230 [ 14.633642] kunit_try_run_case+0x1a5/0x480 [ 14.633667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.633689] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.633715] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.633743] ? __kthread_parkme+0x82/0x180 [ 14.633766] ? preempt_count_sub+0x50/0x80 [ 14.633794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.633817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.633909] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.633941] kthread+0x337/0x6f0 [ 14.633961] ? trace_preempt_on+0x20/0xc0 [ 14.633987] ? __pfx_kthread+0x10/0x10 [ 14.634008] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.634033] ? calculate_sigpending+0x7b/0xa0 [ 14.634056] ? __pfx_kthread+0x10/0x10 [ 14.634078] ret_from_fork+0x41/0x80 [ 14.634101] ? __pfx_kthread+0x10/0x10 [ 14.634122] ret_from_fork_asm+0x1a/0x30 [ 14.634154] </TASK> [ 14.634168] [ 14.642457] Allocated by task 285: [ 14.642687] kasan_save_stack+0x45/0x70 [ 14.643128] kasan_save_track+0x18/0x40 [ 14.643304] kasan_save_alloc_info+0x3b/0x50 [ 14.643531] __kasan_kmalloc+0xb7/0xc0 [ 14.643727] __kmalloc_cache_noprof+0x189/0x420 [ 14.643900] kasan_atomics+0x95/0x310 [ 14.644036] kunit_try_run_case+0x1a5/0x480 [ 14.644248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.644716] kthread+0x337/0x6f0 [ 14.645070] ret_from_fork+0x41/0x80 [ 14.645226] ret_from_fork_asm+0x1a/0x30 [ 14.645430] [ 14.645507] The buggy address belongs to the object at ffff8881029e6b00 [ 14.645507] which belongs to the cache kmalloc-64 of size 64 [ 14.646161] The buggy address is located 0 bytes to the right of [ 14.646161] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.646648] [ 14.646761] The buggy address belongs to the physical page: [ 14.646956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.647324] flags: 0x200000000000000(node=0|zone=2) [ 14.647695] page_type: f5(slab) [ 14.648066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.648402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.648636] page dumped because: kasan: bad access detected [ 14.648813] [ 14.649035] Memory state around the buggy address: [ 14.649279] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.649609] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.649926] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.650263] ^ [ 14.650492] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.650769] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.651003] ================================================================== [ 14.844211] ================================================================== [ 14.844513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.844766] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.845097] [ 14.845316] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.845365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.845379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.845403] Call Trace: [ 14.845418] <TASK> [ 14.845435] dump_stack_lvl+0x73/0xb0 [ 14.845461] print_report+0xd1/0x650 [ 14.845486] ? __virt_addr_valid+0x1db/0x2d0 [ 14.845510] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.845534] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.845559] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.845584] kasan_report+0x141/0x180 [ 14.845608] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.845638] kasan_check_range+0x10c/0x1c0 [ 14.845661] __kasan_check_write+0x18/0x20 [ 14.845683] kasan_atomics_helper+0x18b1/0x5450 [ 14.845708] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.845733] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.845757] ? kasan_atomics+0x152/0x310 [ 14.845782] kasan_atomics+0x1dc/0x310 [ 14.845804] ? __pfx_kasan_atomics+0x10/0x10 [ 14.845827] ? __pfx_read_tsc+0x10/0x10 [ 14.845849] ? ktime_get_ts64+0x86/0x230 [ 14.845888] kunit_try_run_case+0x1a5/0x480 [ 14.845913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.845934] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.846000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.846028] ? __kthread_parkme+0x82/0x180 [ 14.846053] ? preempt_count_sub+0x50/0x80 [ 14.846081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.846106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.846134] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.846160] kthread+0x337/0x6f0 [ 14.846180] ? trace_preempt_on+0x20/0xc0 [ 14.846206] ? __pfx_kthread+0x10/0x10 [ 14.846226] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.846251] ? calculate_sigpending+0x7b/0xa0 [ 14.846274] ? __pfx_kthread+0x10/0x10 [ 14.846295] ret_from_fork+0x41/0x80 [ 14.846318] ? __pfx_kthread+0x10/0x10 [ 14.846338] ret_from_fork_asm+0x1a/0x30 [ 14.846371] </TASK> [ 14.846383] [ 14.858384] Allocated by task 285: [ 14.858736] kasan_save_stack+0x45/0x70 [ 14.859178] kasan_save_track+0x18/0x40 [ 14.859592] kasan_save_alloc_info+0x3b/0x50 [ 14.860028] __kasan_kmalloc+0xb7/0xc0 [ 14.860409] __kmalloc_cache_noprof+0x189/0x420 [ 14.860701] kasan_atomics+0x95/0x310 [ 14.861087] kunit_try_run_case+0x1a5/0x480 [ 14.861779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.862196] kthread+0x337/0x6f0 [ 14.862333] ret_from_fork+0x41/0x80 [ 14.862472] ret_from_fork_asm+0x1a/0x30 [ 14.862664] [ 14.862742] The buggy address belongs to the object at ffff8881029e6b00 [ 14.862742] which belongs to the cache kmalloc-64 of size 64 [ 14.863455] The buggy address is located 0 bytes to the right of [ 14.863455] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.864227] [ 14.864339] The buggy address belongs to the physical page: [ 14.864744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.865026] flags: 0x200000000000000(node=0|zone=2) [ 14.865269] page_type: f5(slab) [ 14.865672] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.866114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.866440] page dumped because: kasan: bad access detected [ 14.866684] [ 14.866786] Memory state around the buggy address: [ 14.867088] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.867376] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.867774] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.868079] ^ [ 14.868302] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.868687] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.869059] ================================================================== [ 13.948113] ================================================================== [ 13.948375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 13.948771] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 13.949153] [ 13.949271] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.949323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.949336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.949361] Call Trace: [ 13.949383] <TASK> [ 13.949405] dump_stack_lvl+0x73/0xb0 [ 13.949435] print_report+0xd1/0x650 [ 13.949460] ? __virt_addr_valid+0x1db/0x2d0 [ 13.949486] ? kasan_atomics_helper+0x565/0x5450 [ 13.949510] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.949705] ? kasan_atomics_helper+0x565/0x5450 [ 13.949732] kasan_report+0x141/0x180 [ 13.949759] ? kasan_atomics_helper+0x565/0x5450 [ 13.949797] kasan_check_range+0x10c/0x1c0 [ 13.949821] __kasan_check_write+0x18/0x20 [ 13.949930] kasan_atomics_helper+0x565/0x5450 [ 13.949964] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.949990] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.950016] ? kasan_atomics+0x152/0x310 [ 13.950042] kasan_atomics+0x1dc/0x310 [ 13.950065] ? __pfx_kasan_atomics+0x10/0x10 [ 13.950088] ? __pfx_read_tsc+0x10/0x10 [ 13.950111] ? ktime_get_ts64+0x86/0x230 [ 13.950139] kunit_try_run_case+0x1a5/0x480 [ 13.950165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.950187] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.950215] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.950242] ? __kthread_parkme+0x82/0x180 [ 13.950266] ? preempt_count_sub+0x50/0x80 [ 13.950295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.950319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.950346] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.950372] kthread+0x337/0x6f0 [ 13.950393] ? trace_preempt_on+0x20/0xc0 [ 13.950418] ? __pfx_kthread+0x10/0x10 [ 13.950439] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.950464] ? calculate_sigpending+0x7b/0xa0 [ 13.950489] ? __pfx_kthread+0x10/0x10 [ 13.950510] ret_from_fork+0x41/0x80 [ 13.950533] ? __pfx_kthread+0x10/0x10 [ 13.950553] ret_from_fork_asm+0x1a/0x30 [ 13.950587] </TASK> [ 13.950600] [ 13.959199] Allocated by task 285: [ 13.959342] kasan_save_stack+0x45/0x70 [ 13.959502] kasan_save_track+0x18/0x40 [ 13.959799] kasan_save_alloc_info+0x3b/0x50 [ 13.960108] __kasan_kmalloc+0xb7/0xc0 [ 13.960317] __kmalloc_cache_noprof+0x189/0x420 [ 13.960582] kasan_atomics+0x95/0x310 [ 13.960785] kunit_try_run_case+0x1a5/0x480 [ 13.961044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.961225] kthread+0x337/0x6f0 [ 13.961351] ret_from_fork+0x41/0x80 [ 13.961605] ret_from_fork_asm+0x1a/0x30 [ 13.962164] [ 13.962280] The buggy address belongs to the object at ffff8881029e6b00 [ 13.962280] which belongs to the cache kmalloc-64 of size 64 [ 13.962960] The buggy address is located 0 bytes to the right of [ 13.962960] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 13.963342] [ 13.963442] The buggy address belongs to the physical page: [ 13.963712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 13.964105] flags: 0x200000000000000(node=0|zone=2) [ 13.964443] page_type: f5(slab) [ 13.964698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.964957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.965365] page dumped because: kasan: bad access detected [ 13.965968] [ 13.966076] Memory state around the buggy address: [ 13.966263] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.966578] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.966951] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.967248] ^ [ 13.967411] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.967703] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.968044] ================================================================== [ 14.563978] ================================================================== [ 14.564279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.564728] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.565186] [ 14.565281] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.565330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.565344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.565367] Call Trace: [ 14.565383] <TASK> [ 14.565398] dump_stack_lvl+0x73/0xb0 [ 14.565427] print_report+0xd1/0x650 [ 14.565452] ? __virt_addr_valid+0x1db/0x2d0 [ 14.565476] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.565500] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.565535] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.565561] kasan_report+0x141/0x180 [ 14.565586] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.565615] kasan_check_range+0x10c/0x1c0 [ 14.565638] __kasan_check_write+0x18/0x20 [ 14.565661] kasan_atomics_helper+0x12e6/0x5450 [ 14.565687] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.565713] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.565739] ? kasan_atomics+0x152/0x310 [ 14.565765] kasan_atomics+0x1dc/0x310 [ 14.565789] ? __pfx_kasan_atomics+0x10/0x10 [ 14.565812] ? __pfx_read_tsc+0x10/0x10 [ 14.565834] ? ktime_get_ts64+0x86/0x230 [ 14.565862] kunit_try_run_case+0x1a5/0x480 [ 14.565903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.565925] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.565952] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.565979] ? __kthread_parkme+0x82/0x180 [ 14.566002] ? preempt_count_sub+0x50/0x80 [ 14.566030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.566053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.566079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.566106] kthread+0x337/0x6f0 [ 14.566126] ? trace_preempt_on+0x20/0xc0 [ 14.566151] ? __pfx_kthread+0x10/0x10 [ 14.566172] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.566197] ? calculate_sigpending+0x7b/0xa0 [ 14.566220] ? __pfx_kthread+0x10/0x10 [ 14.566241] ret_from_fork+0x41/0x80 [ 14.566264] ? __pfx_kthread+0x10/0x10 [ 14.566286] ret_from_fork_asm+0x1a/0x30 [ 14.566319] </TASK> [ 14.566332] [ 14.574328] Allocated by task 285: [ 14.574531] kasan_save_stack+0x45/0x70 [ 14.574747] kasan_save_track+0x18/0x40 [ 14.575008] kasan_save_alloc_info+0x3b/0x50 [ 14.575185] __kasan_kmalloc+0xb7/0xc0 [ 14.575392] __kmalloc_cache_noprof+0x189/0x420 [ 14.575665] kasan_atomics+0x95/0x310 [ 14.575815] kunit_try_run_case+0x1a5/0x480 [ 14.576122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.576362] kthread+0x337/0x6f0 [ 14.576524] ret_from_fork+0x41/0x80 [ 14.576703] ret_from_fork_asm+0x1a/0x30 [ 14.577042] [ 14.577124] The buggy address belongs to the object at ffff8881029e6b00 [ 14.577124] which belongs to the cache kmalloc-64 of size 64 [ 14.577484] The buggy address is located 0 bytes to the right of [ 14.577484] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.577858] [ 14.577947] The buggy address belongs to the physical page: [ 14.578141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.578389] flags: 0x200000000000000(node=0|zone=2) [ 14.578555] page_type: f5(slab) [ 14.578680] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.579246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.580172] page dumped because: kasan: bad access detected [ 14.580655] [ 14.580828] Memory state around the buggy address: [ 14.581344] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.582126] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.582769] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.583555] ^ [ 14.584074] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.584715] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.585540] ================================================================== [ 14.975648] ================================================================== [ 14.976494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 14.976944] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.977260] [ 14.977349] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.977397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.977412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.977434] Call Trace: [ 14.977450] <TASK> [ 14.977466] dump_stack_lvl+0x73/0xb0 [ 14.977493] print_report+0xd1/0x650 [ 14.977529] ? __virt_addr_valid+0x1db/0x2d0 [ 14.977553] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.977578] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.977604] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.977630] kasan_report+0x141/0x180 [ 14.977655] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.977685] __asan_report_load8_noabort+0x18/0x20 [ 14.977708] kasan_atomics_helper+0x4f30/0x5450 [ 14.977734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.977759] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.977783] ? kasan_atomics+0x152/0x310 [ 14.977809] kasan_atomics+0x1dc/0x310 [ 14.977831] ? __pfx_kasan_atomics+0x10/0x10 [ 14.977855] ? __pfx_read_tsc+0x10/0x10 [ 14.977889] ? ktime_get_ts64+0x86/0x230 [ 14.977917] kunit_try_run_case+0x1a5/0x480 [ 14.977941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.977963] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.977989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.978016] ? __kthread_parkme+0x82/0x180 [ 14.978040] ? preempt_count_sub+0x50/0x80 [ 14.978066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.978089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.978115] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.978141] kthread+0x337/0x6f0 [ 14.978160] ? trace_preempt_on+0x20/0xc0 [ 14.978186] ? __pfx_kthread+0x10/0x10 [ 14.978207] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.978231] ? calculate_sigpending+0x7b/0xa0 [ 14.978255] ? __pfx_kthread+0x10/0x10 [ 14.978277] ret_from_fork+0x41/0x80 [ 14.978299] ? __pfx_kthread+0x10/0x10 [ 14.978320] ret_from_fork_asm+0x1a/0x30 [ 14.978352] </TASK> [ 14.978364] [ 14.986038] Allocated by task 285: [ 14.986170] kasan_save_stack+0x45/0x70 [ 14.986361] kasan_save_track+0x18/0x40 [ 14.986607] kasan_save_alloc_info+0x3b/0x50 [ 14.986824] __kasan_kmalloc+0xb7/0xc0 [ 14.987040] __kmalloc_cache_noprof+0x189/0x420 [ 14.987280] kasan_atomics+0x95/0x310 [ 14.987486] kunit_try_run_case+0x1a5/0x480 [ 14.987711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.987931] kthread+0x337/0x6f0 [ 14.988057] ret_from_fork+0x41/0x80 [ 14.988241] ret_from_fork_asm+0x1a/0x30 [ 14.988446] [ 14.988556] The buggy address belongs to the object at ffff8881029e6b00 [ 14.988556] which belongs to the cache kmalloc-64 of size 64 [ 14.989029] The buggy address is located 0 bytes to the right of [ 14.989029] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.989582] [ 14.989670] The buggy address belongs to the physical page: [ 14.989903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.990198] flags: 0x200000000000000(node=0|zone=2) [ 14.990365] page_type: f5(slab) [ 14.990491] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.990729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.991063] page dumped because: kasan: bad access detected [ 14.991580] [ 14.991678] Memory state around the buggy address: [ 14.991915] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.992236] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.992457] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.993096] ^ [ 14.993258] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.993482] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.993817] ================================================================== [ 13.917247] ================================================================== [ 13.918045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 13.918389] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 13.919345] [ 13.919628] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.919689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.919822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.919847] Call Trace: [ 13.919864] <TASK> [ 13.919971] dump_stack_lvl+0x73/0xb0 [ 13.920007] print_report+0xd1/0x650 [ 13.920034] ? __virt_addr_valid+0x1db/0x2d0 [ 13.920057] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.920085] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.920111] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.920175] kasan_report+0x141/0x180 [ 13.920202] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.920231] __asan_report_store4_noabort+0x1b/0x30 [ 13.920256] kasan_atomics_helper+0x4b3a/0x5450 [ 13.920282] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.920307] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.920332] ? kasan_atomics+0x152/0x310 [ 13.920358] kasan_atomics+0x1dc/0x310 [ 13.920381] ? __pfx_kasan_atomics+0x10/0x10 [ 13.920405] ? __pfx_read_tsc+0x10/0x10 [ 13.920426] ? ktime_get_ts64+0x86/0x230 [ 13.920456] kunit_try_run_case+0x1a5/0x480 [ 13.920483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.920505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.920532] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.920559] ? __kthread_parkme+0x82/0x180 [ 13.920584] ? preempt_count_sub+0x50/0x80 [ 13.920612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.920635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.920661] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.920688] kthread+0x337/0x6f0 [ 13.920707] ? trace_preempt_on+0x20/0xc0 [ 13.920733] ? __pfx_kthread+0x10/0x10 [ 13.920754] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.920780] ? calculate_sigpending+0x7b/0xa0 [ 13.920804] ? __pfx_kthread+0x10/0x10 [ 13.920825] ret_from_fork+0x41/0x80 [ 13.920947] ? __pfx_kthread+0x10/0x10 [ 13.920970] ret_from_fork_asm+0x1a/0x30 [ 13.921003] </TASK> [ 13.921017] [ 13.933383] Allocated by task 285: [ 13.933794] kasan_save_stack+0x45/0x70 [ 13.934234] kasan_save_track+0x18/0x40 [ 13.934437] kasan_save_alloc_info+0x3b/0x50 [ 13.935005] __kasan_kmalloc+0xb7/0xc0 [ 13.935495] __kmalloc_cache_noprof+0x189/0x420 [ 13.936059] kasan_atomics+0x95/0x310 [ 13.936268] kunit_try_run_case+0x1a5/0x480 [ 13.936467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.937222] kthread+0x337/0x6f0 [ 13.937447] ret_from_fork+0x41/0x80 [ 13.937773] ret_from_fork_asm+0x1a/0x30 [ 13.938204] [ 13.938308] The buggy address belongs to the object at ffff8881029e6b00 [ 13.938308] which belongs to the cache kmalloc-64 of size 64 [ 13.939446] The buggy address is located 0 bytes to the right of [ 13.939446] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 13.940308] [ 13.940417] The buggy address belongs to the physical page: [ 13.940851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 13.941457] flags: 0x200000000000000(node=0|zone=2) [ 13.941824] page_type: f5(slab) [ 13.942075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.942400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.943166] page dumped because: kasan: bad access detected [ 13.943860] [ 13.944092] Memory state around the buggy address: [ 13.944324] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.945092] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.945587] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.946004] ^ [ 13.946234] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.946770] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.947558] ================================================================== [ 15.152325] ================================================================== [ 15.152707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.153128] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 15.153461] [ 15.153649] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.153698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.153712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.153735] Call Trace: [ 15.153751] <TASK> [ 15.153799] dump_stack_lvl+0x73/0xb0 [ 15.153827] print_report+0xd1/0x650 [ 15.153852] ? __virt_addr_valid+0x1db/0x2d0 [ 15.153888] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.153948] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.153975] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.154000] kasan_report+0x141/0x180 [ 15.154025] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.154055] __asan_report_load8_noabort+0x18/0x20 [ 15.154107] kasan_atomics_helper+0x4f98/0x5450 [ 15.154133] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.154159] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.154183] ? kasan_atomics+0x152/0x310 [ 15.154235] kasan_atomics+0x1dc/0x310 [ 15.154258] ? __pfx_kasan_atomics+0x10/0x10 [ 15.154281] ? __pfx_read_tsc+0x10/0x10 [ 15.154304] ? ktime_get_ts64+0x86/0x230 [ 15.154331] kunit_try_run_case+0x1a5/0x480 [ 15.154356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.154378] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.154404] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.154431] ? __kthread_parkme+0x82/0x180 [ 15.154454] ? preempt_count_sub+0x50/0x80 [ 15.154482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.154505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.154560] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.154587] kthread+0x337/0x6f0 [ 15.154606] ? trace_preempt_on+0x20/0xc0 [ 15.154632] ? __pfx_kthread+0x10/0x10 [ 15.154652] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.154677] ? calculate_sigpending+0x7b/0xa0 [ 15.154700] ? __pfx_kthread+0x10/0x10 [ 15.154721] ret_from_fork+0x41/0x80 [ 15.154745] ? __pfx_kthread+0x10/0x10 [ 15.154765] ret_from_fork_asm+0x1a/0x30 [ 15.154798] </TASK> [ 15.154811] [ 15.163055] Allocated by task 285: [ 15.163251] kasan_save_stack+0x45/0x70 [ 15.163488] kasan_save_track+0x18/0x40 [ 15.163714] kasan_save_alloc_info+0x3b/0x50 [ 15.163957] __kasan_kmalloc+0xb7/0xc0 [ 15.164164] __kmalloc_cache_noprof+0x189/0x420 [ 15.164396] kasan_atomics+0x95/0x310 [ 15.164618] kunit_try_run_case+0x1a5/0x480 [ 15.164855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.165139] kthread+0x337/0x6f0 [ 15.165270] ret_from_fork+0x41/0x80 [ 15.165448] ret_from_fork_asm+0x1a/0x30 [ 15.165769] [ 15.165867] The buggy address belongs to the object at ffff8881029e6b00 [ 15.165867] which belongs to the cache kmalloc-64 of size 64 [ 15.166726] The buggy address is located 0 bytes to the right of [ 15.166726] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.167288] [ 15.167387] The buggy address belongs to the physical page: [ 15.167630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.167868] flags: 0x200000000000000(node=0|zone=2) [ 15.168041] page_type: f5(slab) [ 15.168164] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.168641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.169046] page dumped because: kasan: bad access detected [ 15.169339] [ 15.169442] Memory state around the buggy address: [ 15.169914] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.170279] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.170617] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.170905] ^ [ 15.171060] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.171410] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.172030] ================================================================== [ 14.957615] ================================================================== [ 14.957883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 14.958336] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.958760] [ 14.959100] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.959154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.959168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.959192] Call Trace: [ 14.959206] <TASK> [ 14.959222] dump_stack_lvl+0x73/0xb0 [ 14.959252] print_report+0xd1/0x650 [ 14.959278] ? __virt_addr_valid+0x1db/0x2d0 [ 14.959304] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.959330] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.959355] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.959381] kasan_report+0x141/0x180 [ 14.959406] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.959436] kasan_check_range+0x10c/0x1c0 [ 14.959459] __kasan_check_write+0x18/0x20 [ 14.959481] kasan_atomics_helper+0x1c18/0x5450 [ 14.959507] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.959532] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.959558] ? kasan_atomics+0x152/0x310 [ 14.959588] kasan_atomics+0x1dc/0x310 [ 14.959610] ? __pfx_kasan_atomics+0x10/0x10 [ 14.959633] ? __pfx_read_tsc+0x10/0x10 [ 14.959655] ? ktime_get_ts64+0x86/0x230 [ 14.959683] kunit_try_run_case+0x1a5/0x480 [ 14.959708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.959730] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.959756] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.959783] ? __kthread_parkme+0x82/0x180 [ 14.959807] ? preempt_count_sub+0x50/0x80 [ 14.959835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.959858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.959895] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.959922] kthread+0x337/0x6f0 [ 14.959941] ? trace_preempt_on+0x20/0xc0 [ 14.959967] ? __pfx_kthread+0x10/0x10 [ 14.959987] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.960012] ? calculate_sigpending+0x7b/0xa0 [ 14.960036] ? __pfx_kthread+0x10/0x10 [ 14.960056] ret_from_fork+0x41/0x80 [ 14.960079] ? __pfx_kthread+0x10/0x10 [ 14.960100] ret_from_fork_asm+0x1a/0x30 [ 14.960132] </TASK> [ 14.960146] [ 14.967610] Allocated by task 285: [ 14.967796] kasan_save_stack+0x45/0x70 [ 14.968020] kasan_save_track+0x18/0x40 [ 14.968187] kasan_save_alloc_info+0x3b/0x50 [ 14.968400] __kasan_kmalloc+0xb7/0xc0 [ 14.968623] __kmalloc_cache_noprof+0x189/0x420 [ 14.968819] kasan_atomics+0x95/0x310 [ 14.969000] kunit_try_run_case+0x1a5/0x480 [ 14.969152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.969373] kthread+0x337/0x6f0 [ 14.969578] ret_from_fork+0x41/0x80 [ 14.969778] ret_from_fork_asm+0x1a/0x30 [ 14.969999] [ 14.970102] The buggy address belongs to the object at ffff8881029e6b00 [ 14.970102] which belongs to the cache kmalloc-64 of size 64 [ 14.970613] The buggy address is located 0 bytes to the right of [ 14.970613] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.971105] [ 14.971208] The buggy address belongs to the physical page: [ 14.971424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.971770] flags: 0x200000000000000(node=0|zone=2) [ 14.972030] page_type: f5(slab) [ 14.972208] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.972530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.972854] page dumped because: kasan: bad access detected [ 14.973090] [ 14.973185] Memory state around the buggy address: [ 14.973381] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.973648] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.973869] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.974098] ^ [ 14.974285] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.974732] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.975064] ================================================================== [ 15.246733] ================================================================== [ 15.246999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.247819] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 15.248283] [ 15.248475] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.248589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.248608] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.248633] Call Trace: [ 15.248654] <TASK> [ 15.248675] dump_stack_lvl+0x73/0xb0 [ 15.248707] print_report+0xd1/0x650 [ 15.248735] ? __virt_addr_valid+0x1db/0x2d0 [ 15.248759] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.248783] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.248809] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.248833] kasan_report+0x141/0x180 [ 15.248859] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.248901] __asan_report_load8_noabort+0x18/0x20 [ 15.248925] kasan_atomics_helper+0x4fa5/0x5450 [ 15.248951] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.248976] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.249001] ? kasan_atomics+0x152/0x310 [ 15.249027] kasan_atomics+0x1dc/0x310 [ 15.249049] ? __pfx_kasan_atomics+0x10/0x10 [ 15.249073] ? __pfx_read_tsc+0x10/0x10 [ 15.249094] ? ktime_get_ts64+0x86/0x230 [ 15.249123] kunit_try_run_case+0x1a5/0x480 [ 15.249149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.249171] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.249198] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.249225] ? __kthread_parkme+0x82/0x180 [ 15.249250] ? preempt_count_sub+0x50/0x80 [ 15.249278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.249302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.249328] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.249355] kthread+0x337/0x6f0 [ 15.249373] ? trace_preempt_on+0x20/0xc0 [ 15.249400] ? __pfx_kthread+0x10/0x10 [ 15.249420] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.249446] ? calculate_sigpending+0x7b/0xa0 [ 15.249470] ? __pfx_kthread+0x10/0x10 [ 15.249492] ret_from_fork+0x41/0x80 [ 15.249514] ? __pfx_kthread+0x10/0x10 [ 15.249535] ret_from_fork_asm+0x1a/0x30 [ 15.249568] </TASK> [ 15.249582] [ 15.260461] Allocated by task 285: [ 15.260694] kasan_save_stack+0x45/0x70 [ 15.261037] kasan_save_track+0x18/0x40 [ 15.261334] kasan_save_alloc_info+0x3b/0x50 [ 15.261677] __kasan_kmalloc+0xb7/0xc0 [ 15.261979] __kmalloc_cache_noprof+0x189/0x420 [ 15.262295] kasan_atomics+0x95/0x310 [ 15.262582] kunit_try_run_case+0x1a5/0x480 [ 15.262902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.263176] kthread+0x337/0x6f0 [ 15.263335] ret_from_fork+0x41/0x80 [ 15.263480] ret_from_fork_asm+0x1a/0x30 [ 15.263950] [ 15.264035] The buggy address belongs to the object at ffff8881029e6b00 [ 15.264035] which belongs to the cache kmalloc-64 of size 64 [ 15.264959] The buggy address is located 0 bytes to the right of [ 15.264959] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.265656] [ 15.265952] The buggy address belongs to the physical page: [ 15.266218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.266667] flags: 0x200000000000000(node=0|zone=2) [ 15.267050] page_type: f5(slab) [ 15.267321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.267863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.268303] page dumped because: kasan: bad access detected [ 15.268704] [ 15.268919] Memory state around the buggy address: [ 15.269254] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.269560] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.269899] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.270163] ^ [ 15.270340] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.270700] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.271074] ================================================================== [ 14.519969] ================================================================== [ 14.520321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.520834] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.521266] [ 14.521362] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.521410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.521425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.521447] Call Trace: [ 14.521462] <TASK> [ 14.521479] dump_stack_lvl+0x73/0xb0 [ 14.521507] print_report+0xd1/0x650 [ 14.521533] ? __virt_addr_valid+0x1db/0x2d0 [ 14.521557] ? kasan_atomics_helper+0x1217/0x5450 [ 14.521582] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.521607] ? kasan_atomics_helper+0x1217/0x5450 [ 14.521633] kasan_report+0x141/0x180 [ 14.521658] ? kasan_atomics_helper+0x1217/0x5450 [ 14.521687] kasan_check_range+0x10c/0x1c0 [ 14.521710] __kasan_check_write+0x18/0x20 [ 14.521733] kasan_atomics_helper+0x1217/0x5450 [ 14.521759] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.521784] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.521809] ? kasan_atomics+0x152/0x310 [ 14.521907] kasan_atomics+0x1dc/0x310 [ 14.521936] ? __pfx_kasan_atomics+0x10/0x10 [ 14.521961] ? __pfx_read_tsc+0x10/0x10 [ 14.521984] ? ktime_get_ts64+0x86/0x230 [ 14.522012] kunit_try_run_case+0x1a5/0x480 [ 14.522036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.522059] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.522085] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.522112] ? __kthread_parkme+0x82/0x180 [ 14.522136] ? preempt_count_sub+0x50/0x80 [ 14.522163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.522187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.522214] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.522241] kthread+0x337/0x6f0 [ 14.522260] ? trace_preempt_on+0x20/0xc0 [ 14.522285] ? __pfx_kthread+0x10/0x10 [ 14.522306] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.522331] ? calculate_sigpending+0x7b/0xa0 [ 14.522355] ? __pfx_kthread+0x10/0x10 [ 14.522377] ret_from_fork+0x41/0x80 [ 14.522399] ? __pfx_kthread+0x10/0x10 [ 14.522420] ret_from_fork_asm+0x1a/0x30 [ 14.522453] </TASK> [ 14.522465] [ 14.532024] Allocated by task 285: [ 14.532231] kasan_save_stack+0x45/0x70 [ 14.533035] kasan_save_track+0x18/0x40 [ 14.533313] kasan_save_alloc_info+0x3b/0x50 [ 14.533494] __kasan_kmalloc+0xb7/0xc0 [ 14.533737] __kmalloc_cache_noprof+0x189/0x420 [ 14.534165] kasan_atomics+0x95/0x310 [ 14.534370] kunit_try_run_case+0x1a5/0x480 [ 14.534992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.535255] kthread+0x337/0x6f0 [ 14.535413] ret_from_fork+0x41/0x80 [ 14.535642] ret_from_fork_asm+0x1a/0x30 [ 14.535828] [ 14.536044] The buggy address belongs to the object at ffff8881029e6b00 [ 14.536044] which belongs to the cache kmalloc-64 of size 64 [ 14.536622] The buggy address is located 0 bytes to the right of [ 14.536622] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.537086] [ 14.537373] The buggy address belongs to the physical page: [ 14.537925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.538266] flags: 0x200000000000000(node=0|zone=2) [ 14.538508] page_type: f5(slab) [ 14.538657] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.539151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.539496] page dumped because: kasan: bad access detected [ 14.539773] [ 14.539848] Memory state around the buggy address: [ 14.540228] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.540540] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.540823] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.541341] ^ [ 14.541562] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.542078] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.542402] ================================================================== [ 14.299258] ================================================================== [ 14.299998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.300489] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.301173] [ 14.301274] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.301324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.301339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.301362] Call Trace: [ 14.301379] <TASK> [ 14.301396] dump_stack_lvl+0x73/0xb0 [ 14.301425] print_report+0xd1/0x650 [ 14.301452] ? __virt_addr_valid+0x1db/0x2d0 [ 14.301477] ? kasan_atomics_helper+0xde0/0x5450 [ 14.301501] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.301528] ? kasan_atomics_helper+0xde0/0x5450 [ 14.301553] kasan_report+0x141/0x180 [ 14.301580] ? kasan_atomics_helper+0xde0/0x5450 [ 14.301609] kasan_check_range+0x10c/0x1c0 [ 14.301633] __kasan_check_write+0x18/0x20 [ 14.301656] kasan_atomics_helper+0xde0/0x5450 [ 14.301681] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.301707] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.301731] ? kasan_atomics+0x152/0x310 [ 14.301757] kasan_atomics+0x1dc/0x310 [ 14.301779] ? __pfx_kasan_atomics+0x10/0x10 [ 14.301803] ? __pfx_read_tsc+0x10/0x10 [ 14.301825] ? ktime_get_ts64+0x86/0x230 [ 14.301864] kunit_try_run_case+0x1a5/0x480 [ 14.301904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.301926] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.302007] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.302053] ? __kthread_parkme+0x82/0x180 [ 14.302080] ? preempt_count_sub+0x50/0x80 [ 14.302118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.302142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.302168] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.302195] kthread+0x337/0x6f0 [ 14.302214] ? trace_preempt_on+0x20/0xc0 [ 14.302240] ? __pfx_kthread+0x10/0x10 [ 14.302261] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.302285] ? calculate_sigpending+0x7b/0xa0 [ 14.302309] ? __pfx_kthread+0x10/0x10 [ 14.302330] ret_from_fork+0x41/0x80 [ 14.302353] ? __pfx_kthread+0x10/0x10 [ 14.302374] ret_from_fork_asm+0x1a/0x30 [ 14.302407] </TASK> [ 14.302419] [ 14.317349] Allocated by task 285: [ 14.317489] kasan_save_stack+0x45/0x70 [ 14.317643] kasan_save_track+0x18/0x40 [ 14.317786] kasan_save_alloc_info+0x3b/0x50 [ 14.318110] __kasan_kmalloc+0xb7/0xc0 [ 14.319208] __kmalloc_cache_noprof+0x189/0x420 [ 14.319382] kasan_atomics+0x95/0x310 [ 14.319530] kunit_try_run_case+0x1a5/0x480 [ 14.320092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.320596] kthread+0x337/0x6f0 [ 14.320980] ret_from_fork+0x41/0x80 [ 14.321327] ret_from_fork_asm+0x1a/0x30 [ 14.321763] [ 14.322026] The buggy address belongs to the object at ffff8881029e6b00 [ 14.322026] which belongs to the cache kmalloc-64 of size 64 [ 14.322500] The buggy address is located 0 bytes to the right of [ 14.322500] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.322986] [ 14.323153] The buggy address belongs to the physical page: [ 14.323637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.324578] flags: 0x200000000000000(node=0|zone=2) [ 14.325120] page_type: f5(slab) [ 14.325483] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.326315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.327076] page dumped because: kasan: bad access detected [ 14.327376] [ 14.327454] Memory state around the buggy address: [ 14.327725] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.328600] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.329363] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.329842] ^ [ 14.330061] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.330749] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.331482] ================================================================== [ 14.755249] ================================================================== [ 14.755524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.755764] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.756290] [ 14.757061] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.757116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.757131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.757154] Call Trace: [ 14.757171] <TASK> [ 14.757189] dump_stack_lvl+0x73/0xb0 [ 14.757218] print_report+0xd1/0x650 [ 14.757243] ? __virt_addr_valid+0x1db/0x2d0 [ 14.757267] ? kasan_atomics_helper+0x164f/0x5450 [ 14.757293] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.757319] ? kasan_atomics_helper+0x164f/0x5450 [ 14.757344] kasan_report+0x141/0x180 [ 14.757369] ? kasan_atomics_helper+0x164f/0x5450 [ 14.757399] kasan_check_range+0x10c/0x1c0 [ 14.757422] __kasan_check_write+0x18/0x20 [ 14.757445] kasan_atomics_helper+0x164f/0x5450 [ 14.757471] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.757496] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.757535] ? kasan_atomics+0x152/0x310 [ 14.757561] kasan_atomics+0x1dc/0x310 [ 14.757583] ? __pfx_kasan_atomics+0x10/0x10 [ 14.757607] ? __pfx_read_tsc+0x10/0x10 [ 14.757629] ? ktime_get_ts64+0x86/0x230 [ 14.757657] kunit_try_run_case+0x1a5/0x480 [ 14.757681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.757704] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.757730] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.757757] ? __kthread_parkme+0x82/0x180 [ 14.757781] ? preempt_count_sub+0x50/0x80 [ 14.757809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.757832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.758102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.758130] kthread+0x337/0x6f0 [ 14.758151] ? trace_preempt_on+0x20/0xc0 [ 14.758178] ? __pfx_kthread+0x10/0x10 [ 14.758199] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.758224] ? calculate_sigpending+0x7b/0xa0 [ 14.758248] ? __pfx_kthread+0x10/0x10 [ 14.758523] ret_from_fork+0x41/0x80 [ 14.758549] ? __pfx_kthread+0x10/0x10 [ 14.758570] ret_from_fork_asm+0x1a/0x30 [ 14.758603] </TASK> [ 14.758616] [ 14.769299] Allocated by task 285: [ 14.769439] kasan_save_stack+0x45/0x70 [ 14.769724] kasan_save_track+0x18/0x40 [ 14.770169] kasan_save_alloc_info+0x3b/0x50 [ 14.770533] __kasan_kmalloc+0xb7/0xc0 [ 14.770816] __kmalloc_cache_noprof+0x189/0x420 [ 14.771076] kasan_atomics+0x95/0x310 [ 14.771245] kunit_try_run_case+0x1a5/0x480 [ 14.771462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.771962] kthread+0x337/0x6f0 [ 14.772134] ret_from_fork+0x41/0x80 [ 14.772397] ret_from_fork_asm+0x1a/0x30 [ 14.772734] [ 14.772830] The buggy address belongs to the object at ffff8881029e6b00 [ 14.772830] which belongs to the cache kmalloc-64 of size 64 [ 14.773499] The buggy address is located 0 bytes to the right of [ 14.773499] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.774221] [ 14.774322] The buggy address belongs to the physical page: [ 14.774676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.775173] flags: 0x200000000000000(node=0|zone=2) [ 14.775355] page_type: f5(slab) [ 14.775537] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.776116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.776424] page dumped because: kasan: bad access detected [ 14.776891] [ 14.777064] Memory state around the buggy address: [ 14.777313] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.777693] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.778259] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.778666] ^ [ 14.778833] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.779317] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.779691] ================================================================== [ 14.408697] ================================================================== [ 14.409091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.409370] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.409829] [ 14.409953] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.410002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.410015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.410039] Call Trace: [ 14.410054] <TASK> [ 14.410069] dump_stack_lvl+0x73/0xb0 [ 14.410096] print_report+0xd1/0x650 [ 14.410121] ? __virt_addr_valid+0x1db/0x2d0 [ 14.410145] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.410170] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.410195] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.410221] kasan_report+0x141/0x180 [ 14.410246] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.410276] __asan_report_load4_noabort+0x18/0x20 [ 14.410300] kasan_atomics_helper+0x4a36/0x5450 [ 14.410326] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.410351] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.410375] ? kasan_atomics+0x152/0x310 [ 14.410402] kasan_atomics+0x1dc/0x310 [ 14.410424] ? __pfx_kasan_atomics+0x10/0x10 [ 14.410447] ? __pfx_read_tsc+0x10/0x10 [ 14.410470] ? ktime_get_ts64+0x86/0x230 [ 14.410498] kunit_try_run_case+0x1a5/0x480 [ 14.410715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.410746] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.410773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.410800] ? __kthread_parkme+0x82/0x180 [ 14.410824] ? preempt_count_sub+0x50/0x80 [ 14.410852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.410890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.410916] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.410944] kthread+0x337/0x6f0 [ 14.410964] ? trace_preempt_on+0x20/0xc0 [ 14.410989] ? __pfx_kthread+0x10/0x10 [ 14.411010] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.411035] ? calculate_sigpending+0x7b/0xa0 [ 14.411062] ? __pfx_kthread+0x10/0x10 [ 14.411084] ret_from_fork+0x41/0x80 [ 14.411107] ? __pfx_kthread+0x10/0x10 [ 14.411128] ret_from_fork_asm+0x1a/0x30 [ 14.411214] </TASK> [ 14.411228] [ 14.421089] Allocated by task 285: [ 14.421243] kasan_save_stack+0x45/0x70 [ 14.421403] kasan_save_track+0x18/0x40 [ 14.421564] kasan_save_alloc_info+0x3b/0x50 [ 14.421720] __kasan_kmalloc+0xb7/0xc0 [ 14.421946] __kmalloc_cache_noprof+0x189/0x420 [ 14.422250] kasan_atomics+0x95/0x310 [ 14.422432] kunit_try_run_case+0x1a5/0x480 [ 14.422607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.422791] kthread+0x337/0x6f0 [ 14.422981] ret_from_fork+0x41/0x80 [ 14.423173] ret_from_fork_asm+0x1a/0x30 [ 14.423377] [ 14.423479] The buggy address belongs to the object at ffff8881029e6b00 [ 14.423479] which belongs to the cache kmalloc-64 of size 64 [ 14.424062] The buggy address is located 0 bytes to the right of [ 14.424062] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.425376] [ 14.425477] The buggy address belongs to the physical page: [ 14.425685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.426017] flags: 0x200000000000000(node=0|zone=2) [ 14.426264] page_type: f5(slab) [ 14.426441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.427188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.427429] page dumped because: kasan: bad access detected [ 14.427609] [ 14.427684] Memory state around the buggy address: [ 14.428355] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.429081] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.429314] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.429914] ^ [ 14.430123] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.430415] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.430820] ================================================================== [ 14.586422] ================================================================== [ 14.587157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.588030] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.588849] [ 14.589102] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.589153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.589167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.589190] Call Trace: [ 14.589206] <TASK> [ 14.589223] dump_stack_lvl+0x73/0xb0 [ 14.589251] print_report+0xd1/0x650 [ 14.589277] ? __virt_addr_valid+0x1db/0x2d0 [ 14.589300] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.589325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.589351] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.589375] kasan_report+0x141/0x180 [ 14.589402] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.589431] __asan_report_load4_noabort+0x18/0x20 [ 14.589455] kasan_atomics_helper+0x49ce/0x5450 [ 14.589481] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.589507] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.589531] ? kasan_atomics+0x152/0x310 [ 14.589559] kasan_atomics+0x1dc/0x310 [ 14.589582] ? __pfx_kasan_atomics+0x10/0x10 [ 14.589606] ? __pfx_read_tsc+0x10/0x10 [ 14.589628] ? ktime_get_ts64+0x86/0x230 [ 14.589656] kunit_try_run_case+0x1a5/0x480 [ 14.589680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.589702] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.589728] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.589755] ? __kthread_parkme+0x82/0x180 [ 14.589779] ? preempt_count_sub+0x50/0x80 [ 14.589807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.589830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.589947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.589975] kthread+0x337/0x6f0 [ 14.589995] ? trace_preempt_on+0x20/0xc0 [ 14.590022] ? __pfx_kthread+0x10/0x10 [ 14.590042] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.590067] ? calculate_sigpending+0x7b/0xa0 [ 14.590091] ? __pfx_kthread+0x10/0x10 [ 14.590113] ret_from_fork+0x41/0x80 [ 14.590136] ? __pfx_kthread+0x10/0x10 [ 14.590157] ret_from_fork_asm+0x1a/0x30 [ 14.590190] </TASK> [ 14.590202] [ 14.603153] Allocated by task 285: [ 14.603342] kasan_save_stack+0x45/0x70 [ 14.603497] kasan_save_track+0x18/0x40 [ 14.603699] kasan_save_alloc_info+0x3b/0x50 [ 14.604091] __kasan_kmalloc+0xb7/0xc0 [ 14.604293] __kmalloc_cache_noprof+0x189/0x420 [ 14.604491] kasan_atomics+0x95/0x310 [ 14.604690] kunit_try_run_case+0x1a5/0x480 [ 14.604986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.605188] kthread+0x337/0x6f0 [ 14.605363] ret_from_fork+0x41/0x80 [ 14.605593] ret_from_fork_asm+0x1a/0x30 [ 14.605775] [ 14.605856] The buggy address belongs to the object at ffff8881029e6b00 [ 14.605856] which belongs to the cache kmalloc-64 of size 64 [ 14.606375] The buggy address is located 0 bytes to the right of [ 14.606375] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.606911] [ 14.607064] The buggy address belongs to the physical page: [ 14.607552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.607946] flags: 0x200000000000000(node=0|zone=2) [ 14.608156] page_type: f5(slab) [ 14.608317] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.608661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.608971] page dumped because: kasan: bad access detected [ 14.609192] [ 14.609291] Memory state around the buggy address: [ 14.609542] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.609826] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.610111] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.610410] ^ [ 14.610640] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.610861] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.611122] ================================================================== [ 14.224741] ================================================================== [ 14.226034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.227357] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.228472] [ 14.228977] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.229064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.229082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.229107] Call Trace: [ 14.229123] <TASK> [ 14.229141] dump_stack_lvl+0x73/0xb0 [ 14.229172] print_report+0xd1/0x650 [ 14.229199] ? __virt_addr_valid+0x1db/0x2d0 [ 14.229231] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.229255] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.229281] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.229305] kasan_report+0x141/0x180 [ 14.229330] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.229360] __asan_report_load4_noabort+0x18/0x20 [ 14.229383] kasan_atomics_helper+0x4a84/0x5450 [ 14.229409] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.229434] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.229458] ? kasan_atomics+0x152/0x310 [ 14.229483] kasan_atomics+0x1dc/0x310 [ 14.229505] ? __pfx_kasan_atomics+0x10/0x10 [ 14.229530] ? __pfx_read_tsc+0x10/0x10 [ 14.229552] ? ktime_get_ts64+0x86/0x230 [ 14.229581] kunit_try_run_case+0x1a5/0x480 [ 14.229607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.229628] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.229655] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.229681] ? __kthread_parkme+0x82/0x180 [ 14.229704] ? preempt_count_sub+0x50/0x80 [ 14.229732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.229754] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.229780] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.229807] kthread+0x337/0x6f0 [ 14.229826] ? trace_preempt_on+0x20/0xc0 [ 14.229894] ? __pfx_kthread+0x10/0x10 [ 14.229916] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.229941] ? calculate_sigpending+0x7b/0xa0 [ 14.229965] ? __pfx_kthread+0x10/0x10 [ 14.229986] ret_from_fork+0x41/0x80 [ 14.230009] ? __pfx_kthread+0x10/0x10 [ 14.230028] ret_from_fork_asm+0x1a/0x30 [ 14.230061] </TASK> [ 14.230075] [ 14.248137] Allocated by task 285: [ 14.248982] kasan_save_stack+0x45/0x70 [ 14.249599] kasan_save_track+0x18/0x40 [ 14.250331] kasan_save_alloc_info+0x3b/0x50 [ 14.251077] __kasan_kmalloc+0xb7/0xc0 [ 14.251626] __kmalloc_cache_noprof+0x189/0x420 [ 14.252331] kasan_atomics+0x95/0x310 [ 14.252482] kunit_try_run_case+0x1a5/0x480 [ 14.253317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.254016] kthread+0x337/0x6f0 [ 14.254175] ret_from_fork+0x41/0x80 [ 14.254314] ret_from_fork_asm+0x1a/0x30 [ 14.254470] [ 14.254547] The buggy address belongs to the object at ffff8881029e6b00 [ 14.254547] which belongs to the cache kmalloc-64 of size 64 [ 14.255772] The buggy address is located 0 bytes to the right of [ 14.255772] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.257188] [ 14.257357] The buggy address belongs to the physical page: [ 14.257702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.258368] flags: 0x200000000000000(node=0|zone=2) [ 14.258892] page_type: f5(slab) [ 14.259232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.259660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.260156] page dumped because: kasan: bad access detected [ 14.260584] [ 14.260761] Memory state around the buggy address: [ 14.261312] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.261850] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.262294] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.263025] ^ [ 14.263242] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.263800] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.264608] ================================================================== [ 14.611631] ================================================================== [ 14.612081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.612399] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.612749] [ 14.612857] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.612915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.612929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.612951] Call Trace: [ 14.612968] <TASK> [ 14.612984] dump_stack_lvl+0x73/0xb0 [ 14.613010] print_report+0xd1/0x650 [ 14.613037] ? __virt_addr_valid+0x1db/0x2d0 [ 14.613061] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.613085] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.613111] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.613136] kasan_report+0x141/0x180 [ 14.613162] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.613191] kasan_check_range+0x10c/0x1c0 [ 14.613214] __kasan_check_read+0x15/0x20 [ 14.613237] kasan_atomics_helper+0x13b5/0x5450 [ 14.613262] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.613288] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.613312] ? kasan_atomics+0x152/0x310 [ 14.613338] kasan_atomics+0x1dc/0x310 [ 14.613360] ? __pfx_kasan_atomics+0x10/0x10 [ 14.613383] ? __pfx_read_tsc+0x10/0x10 [ 14.613406] ? ktime_get_ts64+0x86/0x230 [ 14.613434] kunit_try_run_case+0x1a5/0x480 [ 14.613458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.613479] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.613521] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.613549] ? __kthread_parkme+0x82/0x180 [ 14.613572] ? preempt_count_sub+0x50/0x80 [ 14.613601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.613628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.613656] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.613682] kthread+0x337/0x6f0 [ 14.613702] ? trace_preempt_on+0x20/0xc0 [ 14.613728] ? __pfx_kthread+0x10/0x10 [ 14.613748] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.613773] ? calculate_sigpending+0x7b/0xa0 [ 14.613797] ? __pfx_kthread+0x10/0x10 [ 14.613818] ret_from_fork+0x41/0x80 [ 14.613841] ? __pfx_kthread+0x10/0x10 [ 14.613861] ret_from_fork_asm+0x1a/0x30 [ 14.613904] </TASK> [ 14.613916] [ 14.622130] Allocated by task 285: [ 14.622318] kasan_save_stack+0x45/0x70 [ 14.622568] kasan_save_track+0x18/0x40 [ 14.622775] kasan_save_alloc_info+0x3b/0x50 [ 14.623180] __kasan_kmalloc+0xb7/0xc0 [ 14.623350] __kmalloc_cache_noprof+0x189/0x420 [ 14.623509] kasan_atomics+0x95/0x310 [ 14.623652] kunit_try_run_case+0x1a5/0x480 [ 14.623801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.624057] kthread+0x337/0x6f0 [ 14.624236] ret_from_fork+0x41/0x80 [ 14.624458] ret_from_fork_asm+0x1a/0x30 [ 14.624913] [ 14.625031] The buggy address belongs to the object at ffff8881029e6b00 [ 14.625031] which belongs to the cache kmalloc-64 of size 64 [ 14.625667] The buggy address is located 0 bytes to the right of [ 14.625667] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.626197] [ 14.626278] The buggy address belongs to the physical page: [ 14.626454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.627166] flags: 0x200000000000000(node=0|zone=2) [ 14.627435] page_type: f5(slab) [ 14.627617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.627902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.628133] page dumped because: kasan: bad access detected [ 14.628728] [ 14.628835] Memory state around the buggy address: [ 14.629179] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.629494] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.629795] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.630165] ^ [ 14.630350] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.630572] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.630790] ================================================================== [ 14.909632] ================================================================== [ 14.909990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.910298] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.910738] [ 14.910921] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.910969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.910982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.911005] Call Trace: [ 14.911019] <TASK> [ 14.911034] dump_stack_lvl+0x73/0xb0 [ 14.911059] print_report+0xd1/0x650 [ 14.911085] ? __virt_addr_valid+0x1db/0x2d0 [ 14.911107] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.911132] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.911157] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.911182] kasan_report+0x141/0x180 [ 14.911207] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.911237] kasan_check_range+0x10c/0x1c0 [ 14.911260] __kasan_check_write+0x18/0x20 [ 14.911283] kasan_atomics_helper+0x1a7f/0x5450 [ 14.911309] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.911335] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.911360] ? kasan_atomics+0x152/0x310 [ 14.911386] kasan_atomics+0x1dc/0x310 [ 14.911409] ? __pfx_kasan_atomics+0x10/0x10 [ 14.911433] ? __pfx_read_tsc+0x10/0x10 [ 14.911454] ? ktime_get_ts64+0x86/0x230 [ 14.911482] kunit_try_run_case+0x1a5/0x480 [ 14.911507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.911528] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.911554] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.911596] ? __kthread_parkme+0x82/0x180 [ 14.911619] ? preempt_count_sub+0x50/0x80 [ 14.911648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.911670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.911697] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.911723] kthread+0x337/0x6f0 [ 14.911742] ? trace_preempt_on+0x20/0xc0 [ 14.911768] ? __pfx_kthread+0x10/0x10 [ 14.911789] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.911813] ? calculate_sigpending+0x7b/0xa0 [ 14.911849] ? __pfx_kthread+0x10/0x10 [ 14.911871] ret_from_fork+0x41/0x80 [ 14.911903] ? __pfx_kthread+0x10/0x10 [ 14.911924] ret_from_fork_asm+0x1a/0x30 [ 14.911957] </TASK> [ 14.911969] [ 14.920060] Allocated by task 285: [ 14.920195] kasan_save_stack+0x45/0x70 [ 14.920407] kasan_save_track+0x18/0x40 [ 14.920714] kasan_save_alloc_info+0x3b/0x50 [ 14.921074] __kasan_kmalloc+0xb7/0xc0 [ 14.921294] __kmalloc_cache_noprof+0x189/0x420 [ 14.921547] kasan_atomics+0x95/0x310 [ 14.921716] kunit_try_run_case+0x1a5/0x480 [ 14.921865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.922055] kthread+0x337/0x6f0 [ 14.922179] ret_from_fork+0x41/0x80 [ 14.922315] ret_from_fork_asm+0x1a/0x30 [ 14.922656] [ 14.922848] The buggy address belongs to the object at ffff8881029e6b00 [ 14.922848] which belongs to the cache kmalloc-64 of size 64 [ 14.923387] The buggy address is located 0 bytes to the right of [ 14.923387] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.923939] [ 14.924017] The buggy address belongs to the physical page: [ 14.924194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.924440] flags: 0x200000000000000(node=0|zone=2) [ 14.924674] page_type: f5(slab) [ 14.924849] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.925274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.925648] page dumped because: kasan: bad access detected [ 14.925871] [ 14.925954] Memory state around the buggy address: [ 14.926114] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.926335] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.926744] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.927176] ^ [ 14.927463] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.927843] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.928194] ================================================================== [ 14.199304] ================================================================== [ 14.199690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.200030] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.200363] [ 14.200474] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.200521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.200533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.200571] Call Trace: [ 14.200587] <TASK> [ 14.200604] dump_stack_lvl+0x73/0xb0 [ 14.200633] print_report+0xd1/0x650 [ 14.200774] ? __virt_addr_valid+0x1db/0x2d0 [ 14.200821] ? kasan_atomics_helper+0xc70/0x5450 [ 14.200933] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.200969] ? kasan_atomics_helper+0xc70/0x5450 [ 14.200994] kasan_report+0x141/0x180 [ 14.201020] ? kasan_atomics_helper+0xc70/0x5450 [ 14.201050] kasan_check_range+0x10c/0x1c0 [ 14.201074] __kasan_check_write+0x18/0x20 [ 14.201097] kasan_atomics_helper+0xc70/0x5450 [ 14.201123] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.201149] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.201173] ? kasan_atomics+0x152/0x310 [ 14.201199] kasan_atomics+0x1dc/0x310 [ 14.201221] ? __pfx_kasan_atomics+0x10/0x10 [ 14.201245] ? __pfx_read_tsc+0x10/0x10 [ 14.201268] ? ktime_get_ts64+0x86/0x230 [ 14.201296] kunit_try_run_case+0x1a5/0x480 [ 14.201320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.201342] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.201370] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.201396] ? __kthread_parkme+0x82/0x180 [ 14.201422] ? preempt_count_sub+0x50/0x80 [ 14.201450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.201474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.201501] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.201528] kthread+0x337/0x6f0 [ 14.201548] ? trace_preempt_on+0x20/0xc0 [ 14.201573] ? __pfx_kthread+0x10/0x10 [ 14.201594] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.201619] ? calculate_sigpending+0x7b/0xa0 [ 14.201643] ? __pfx_kthread+0x10/0x10 [ 14.201665] ret_from_fork+0x41/0x80 [ 14.201688] ? __pfx_kthread+0x10/0x10 [ 14.201709] ret_from_fork_asm+0x1a/0x30 [ 14.201742] </TASK> [ 14.201755] [ 14.210405] Allocated by task 285: [ 14.210630] kasan_save_stack+0x45/0x70 [ 14.210820] kasan_save_track+0x18/0x40 [ 14.211058] kasan_save_alloc_info+0x3b/0x50 [ 14.211216] __kasan_kmalloc+0xb7/0xc0 [ 14.211398] __kmalloc_cache_noprof+0x189/0x420 [ 14.211628] kasan_atomics+0x95/0x310 [ 14.211830] kunit_try_run_case+0x1a5/0x480 [ 14.212062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.212262] kthread+0x337/0x6f0 [ 14.212390] ret_from_fork+0x41/0x80 [ 14.212725] ret_from_fork_asm+0x1a/0x30 [ 14.213174] [ 14.213288] The buggy address belongs to the object at ffff8881029e6b00 [ 14.213288] which belongs to the cache kmalloc-64 of size 64 [ 14.213649] The buggy address is located 0 bytes to the right of [ 14.213649] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.215222] [ 14.215472] The buggy address belongs to the physical page: [ 14.216063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.216320] flags: 0x200000000000000(node=0|zone=2) [ 14.216493] page_type: f5(slab) [ 14.216630] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.216870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.217115] page dumped because: kasan: bad access detected [ 14.217292] [ 14.217367] Memory state around the buggy address: [ 14.217527] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.217749] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.218806] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.220111] ^ [ 14.221127] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.222271] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.223444] ================================================================== [ 15.066368] ================================================================== [ 15.066785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.067360] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 15.067990] [ 15.068223] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.068377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.068394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.068418] Call Trace: [ 15.068434] <TASK> [ 15.068451] dump_stack_lvl+0x73/0xb0 [ 15.068480] print_report+0xd1/0x650 [ 15.068516] ? __virt_addr_valid+0x1db/0x2d0 [ 15.068540] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.068565] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.068591] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.068616] kasan_report+0x141/0x180 [ 15.068641] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.068671] kasan_check_range+0x10c/0x1c0 [ 15.068694] __kasan_check_write+0x18/0x20 [ 15.068716] kasan_atomics_helper+0x1eaa/0x5450 [ 15.068742] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.068768] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.068792] ? kasan_atomics+0x152/0x310 [ 15.068818] kasan_atomics+0x1dc/0x310 [ 15.068840] ? __pfx_kasan_atomics+0x10/0x10 [ 15.068864] ? __pfx_read_tsc+0x10/0x10 [ 15.068899] ? ktime_get_ts64+0x86/0x230 [ 15.068927] kunit_try_run_case+0x1a5/0x480 [ 15.068951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.068975] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.069001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.069028] ? __kthread_parkme+0x82/0x180 [ 15.069052] ? preempt_count_sub+0x50/0x80 [ 15.069080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.069104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.069129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.069156] kthread+0x337/0x6f0 [ 15.069174] ? trace_preempt_on+0x20/0xc0 [ 15.069199] ? __pfx_kthread+0x10/0x10 [ 15.069220] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.069246] ? calculate_sigpending+0x7b/0xa0 [ 15.069269] ? __pfx_kthread+0x10/0x10 [ 15.069291] ret_from_fork+0x41/0x80 [ 15.069313] ? __pfx_kthread+0x10/0x10 [ 15.069333] ret_from_fork_asm+0x1a/0x30 [ 15.069366] </TASK> [ 15.069378] [ 15.080108] Allocated by task 285: [ 15.080439] kasan_save_stack+0x45/0x70 [ 15.080840] kasan_save_track+0x18/0x40 [ 15.081163] kasan_save_alloc_info+0x3b/0x50 [ 15.081459] __kasan_kmalloc+0xb7/0xc0 [ 15.081772] __kmalloc_cache_noprof+0x189/0x420 [ 15.082102] kasan_atomics+0x95/0x310 [ 15.082381] kunit_try_run_case+0x1a5/0x480 [ 15.082693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.082938] kthread+0x337/0x6f0 [ 15.083116] ret_from_fork+0x41/0x80 [ 15.083288] ret_from_fork_asm+0x1a/0x30 [ 15.083458] [ 15.083917] The buggy address belongs to the object at ffff8881029e6b00 [ 15.083917] which belongs to the cache kmalloc-64 of size 64 [ 15.084534] The buggy address is located 0 bytes to the right of [ 15.084534] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.085247] [ 15.085356] The buggy address belongs to the physical page: [ 15.085792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.086246] flags: 0x200000000000000(node=0|zone=2) [ 15.086591] page_type: f5(slab) [ 15.086776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.087090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.087383] page dumped because: kasan: bad access detected [ 15.087900] [ 15.088005] Memory state around the buggy address: [ 15.088371] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.088947] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.089359] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.089785] ^ [ 15.090106] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.090491] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.090944] ================================================================== [ 13.868603] ================================================================== [ 13.868853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 13.869428] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 13.869730] [ 13.870037] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.870093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.870108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.870133] Call Trace: [ 13.870150] <TASK> [ 13.870168] dump_stack_lvl+0x73/0xb0 [ 13.870198] print_report+0xd1/0x650 [ 13.870224] ? __virt_addr_valid+0x1db/0x2d0 [ 13.870249] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.870274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.870301] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.870326] kasan_report+0x141/0x180 [ 13.870352] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.870383] __asan_report_load4_noabort+0x18/0x20 [ 13.870408] kasan_atomics_helper+0x4b54/0x5450 [ 13.870433] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.870460] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.870485] ? kasan_atomics+0x152/0x310 [ 13.870511] kasan_atomics+0x1dc/0x310 [ 13.870542] ? __pfx_kasan_atomics+0x10/0x10 [ 13.870566] ? __pfx_read_tsc+0x10/0x10 [ 13.870589] ? ktime_get_ts64+0x86/0x230 [ 13.870616] kunit_try_run_case+0x1a5/0x480 [ 13.870641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.870664] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.870692] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.870719] ? __kthread_parkme+0x82/0x180 [ 13.870744] ? preempt_count_sub+0x50/0x80 [ 13.870773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.870796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.870824] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.870852] kthread+0x337/0x6f0 [ 13.870871] ? trace_preempt_on+0x20/0xc0 [ 13.870913] ? __pfx_kthread+0x10/0x10 [ 13.870935] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.870960] ? calculate_sigpending+0x7b/0xa0 [ 13.870986] ? __pfx_kthread+0x10/0x10 [ 13.871007] ret_from_fork+0x41/0x80 [ 13.871031] ? __pfx_kthread+0x10/0x10 [ 13.871051] ret_from_fork_asm+0x1a/0x30 [ 13.871086] </TASK> [ 13.871100] [ 13.879689] Allocated by task 285: [ 13.880127] kasan_save_stack+0x45/0x70 [ 13.880326] kasan_save_track+0x18/0x40 [ 13.880506] kasan_save_alloc_info+0x3b/0x50 [ 13.880701] __kasan_kmalloc+0xb7/0xc0 [ 13.880843] __kmalloc_cache_noprof+0x189/0x420 [ 13.881137] kasan_atomics+0x95/0x310 [ 13.881338] kunit_try_run_case+0x1a5/0x480 [ 13.881555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.882078] kthread+0x337/0x6f0 [ 13.882260] ret_from_fork+0x41/0x80 [ 13.882447] ret_from_fork_asm+0x1a/0x30 [ 13.882632] [ 13.882796] The buggy address belongs to the object at ffff8881029e6b00 [ 13.882796] which belongs to the cache kmalloc-64 of size 64 [ 13.883297] The buggy address is located 0 bytes to the right of [ 13.883297] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 13.883785] [ 13.883929] The buggy address belongs to the physical page: [ 13.884189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 13.884576] flags: 0x200000000000000(node=0|zone=2) [ 13.884799] page_type: f5(slab) [ 13.885121] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.885383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.885615] page dumped because: kasan: bad access detected [ 13.885894] [ 13.886000] Memory state around the buggy address: [ 13.886234] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.886864] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.887293] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.887597] ^ [ 13.887768] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.888039] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.888385] ================================================================== [ 13.988791] ================================================================== [ 13.989390] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 13.989993] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 13.990300] [ 13.990397] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.990448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.990461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.990486] Call Trace: [ 13.990504] <TASK> [ 13.990523] dump_stack_lvl+0x73/0xb0 [ 13.990566] print_report+0xd1/0x650 [ 13.990593] ? __virt_addr_valid+0x1db/0x2d0 [ 13.990617] ? kasan_atomics_helper+0x697/0x5450 [ 13.990642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.990667] ? kasan_atomics_helper+0x697/0x5450 [ 13.990692] kasan_report+0x141/0x180 [ 13.990717] ? kasan_atomics_helper+0x697/0x5450 [ 13.990746] kasan_check_range+0x10c/0x1c0 [ 13.990770] __kasan_check_write+0x18/0x20 [ 13.990792] kasan_atomics_helper+0x697/0x5450 [ 13.990818] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.990861] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.990897] ? kasan_atomics+0x152/0x310 [ 13.990923] kasan_atomics+0x1dc/0x310 [ 13.990945] ? __pfx_kasan_atomics+0x10/0x10 [ 13.990970] ? __pfx_read_tsc+0x10/0x10 [ 13.990992] ? ktime_get_ts64+0x86/0x230 [ 13.991020] kunit_try_run_case+0x1a5/0x480 [ 13.991045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.991067] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.991094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.991122] ? __kthread_parkme+0x82/0x180 [ 13.991147] ? preempt_count_sub+0x50/0x80 [ 13.991176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.991200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.991227] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.991253] kthread+0x337/0x6f0 [ 13.991273] ? trace_preempt_on+0x20/0xc0 [ 13.991299] ? __pfx_kthread+0x10/0x10 [ 13.991319] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.991344] ? calculate_sigpending+0x7b/0xa0 [ 13.991369] ? __pfx_kthread+0x10/0x10 [ 13.991390] ret_from_fork+0x41/0x80 [ 13.991413] ? __pfx_kthread+0x10/0x10 [ 13.991434] ret_from_fork_asm+0x1a/0x30 [ 13.991467] </TASK> [ 13.991481] [ 14.003185] Allocated by task 285: [ 14.003395] kasan_save_stack+0x45/0x70 [ 14.003847] kasan_save_track+0x18/0x40 [ 14.004271] kasan_save_alloc_info+0x3b/0x50 [ 14.004484] __kasan_kmalloc+0xb7/0xc0 [ 14.005123] __kmalloc_cache_noprof+0x189/0x420 [ 14.005384] kasan_atomics+0x95/0x310 [ 14.005776] kunit_try_run_case+0x1a5/0x480 [ 14.006402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.006765] kthread+0x337/0x6f0 [ 14.007267] ret_from_fork+0x41/0x80 [ 14.007469] ret_from_fork_asm+0x1a/0x30 [ 14.007957] [ 14.008204] The buggy address belongs to the object at ffff8881029e6b00 [ 14.008204] which belongs to the cache kmalloc-64 of size 64 [ 14.009236] The buggy address is located 0 bytes to the right of [ 14.009236] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.010095] [ 14.010345] The buggy address belongs to the physical page: [ 14.010790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.011329] flags: 0x200000000000000(node=0|zone=2) [ 14.011998] page_type: f5(slab) [ 14.012323] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.012996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.013431] page dumped because: kasan: bad access detected [ 14.013941] [ 14.014056] Memory state around the buggy address: [ 14.014283] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.014771] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.015518] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.016293] ^ [ 14.016777] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.017391] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.018023] ================================================================== [ 14.332314] ================================================================== [ 14.332744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.333350] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.334118] [ 14.334290] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.334342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.334356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.334380] Call Trace: [ 14.334396] <TASK> [ 14.334413] dump_stack_lvl+0x73/0xb0 [ 14.334442] print_report+0xd1/0x650 [ 14.334468] ? __virt_addr_valid+0x1db/0x2d0 [ 14.334491] ? kasan_atomics_helper+0xe78/0x5450 [ 14.334527] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.334554] ? kasan_atomics_helper+0xe78/0x5450 [ 14.334578] kasan_report+0x141/0x180 [ 14.334604] ? kasan_atomics_helper+0xe78/0x5450 [ 14.334635] kasan_check_range+0x10c/0x1c0 [ 14.334657] __kasan_check_write+0x18/0x20 [ 14.334681] kasan_atomics_helper+0xe78/0x5450 [ 14.334706] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.334732] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.334757] ? kasan_atomics+0x152/0x310 [ 14.334783] kasan_atomics+0x1dc/0x310 [ 14.334805] ? __pfx_kasan_atomics+0x10/0x10 [ 14.334829] ? __pfx_read_tsc+0x10/0x10 [ 14.334852] ? ktime_get_ts64+0x86/0x230 [ 14.334894] kunit_try_run_case+0x1a5/0x480 [ 14.334919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.334941] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.334968] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.334995] ? __kthread_parkme+0x82/0x180 [ 14.335019] ? preempt_count_sub+0x50/0x80 [ 14.335047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.335070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.335096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.335123] kthread+0x337/0x6f0 [ 14.335142] ? trace_preempt_on+0x20/0xc0 [ 14.335168] ? __pfx_kthread+0x10/0x10 [ 14.335188] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.335214] ? calculate_sigpending+0x7b/0xa0 [ 14.335237] ? __pfx_kthread+0x10/0x10 [ 14.335257] ret_from_fork+0x41/0x80 [ 14.335280] ? __pfx_kthread+0x10/0x10 [ 14.335300] ret_from_fork_asm+0x1a/0x30 [ 14.335332] </TASK> [ 14.335345] [ 14.350382] Allocated by task 285: [ 14.350526] kasan_save_stack+0x45/0x70 [ 14.350684] kasan_save_track+0x18/0x40 [ 14.350829] kasan_save_alloc_info+0x3b/0x50 [ 14.351303] __kasan_kmalloc+0xb7/0xc0 [ 14.351677] __kmalloc_cache_noprof+0x189/0x420 [ 14.352315] kasan_atomics+0x95/0x310 [ 14.352704] kunit_try_run_case+0x1a5/0x480 [ 14.353172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.353675] kthread+0x337/0x6f0 [ 14.354103] ret_from_fork+0x41/0x80 [ 14.354454] ret_from_fork_asm+0x1a/0x30 [ 14.354830] [ 14.355068] The buggy address belongs to the object at ffff8881029e6b00 [ 14.355068] which belongs to the cache kmalloc-64 of size 64 [ 14.355460] The buggy address is located 0 bytes to the right of [ 14.355460] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.356725] [ 14.356909] The buggy address belongs to the physical page: [ 14.357460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.358160] flags: 0x200000000000000(node=0|zone=2) [ 14.358337] page_type: f5(slab) [ 14.358464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.359208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.360162] page dumped because: kasan: bad access detected [ 14.360672] [ 14.360866] Memory state around the buggy address: [ 14.361345] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.361660] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.361980] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.362590] ^ [ 14.363085] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.364095] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.364526] ================================================================== [ 15.271793] ================================================================== [ 15.272115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.272484] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 15.272730] [ 15.272825] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.272889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.272903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.272928] Call Trace: [ 15.272950] <TASK> [ 15.272972] dump_stack_lvl+0x73/0xb0 [ 15.273003] print_report+0xd1/0x650 [ 15.273053] ? __virt_addr_valid+0x1db/0x2d0 [ 15.273077] ? kasan_atomics_helper+0x224c/0x5450 [ 15.273102] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.273128] ? kasan_atomics_helper+0x224c/0x5450 [ 15.273152] kasan_report+0x141/0x180 [ 15.273179] ? kasan_atomics_helper+0x224c/0x5450 [ 15.273227] kasan_check_range+0x10c/0x1c0 [ 15.273252] __kasan_check_write+0x18/0x20 [ 15.273276] kasan_atomics_helper+0x224c/0x5450 [ 15.273302] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.273327] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.273352] ? kasan_atomics+0x152/0x310 [ 15.273396] kasan_atomics+0x1dc/0x310 [ 15.273418] ? __pfx_kasan_atomics+0x10/0x10 [ 15.273442] ? __pfx_read_tsc+0x10/0x10 [ 15.273466] ? ktime_get_ts64+0x86/0x230 [ 15.273495] kunit_try_run_case+0x1a5/0x480 [ 15.273531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.273554] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.273584] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.273611] ? __kthread_parkme+0x82/0x180 [ 15.273636] ? preempt_count_sub+0x50/0x80 [ 15.273664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.273688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.273714] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.273757] kthread+0x337/0x6f0 [ 15.273777] ? trace_preempt_on+0x20/0xc0 [ 15.273805] ? __pfx_kthread+0x10/0x10 [ 15.273826] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.273851] ? calculate_sigpending+0x7b/0xa0 [ 15.273886] ? __pfx_kthread+0x10/0x10 [ 15.273906] ret_from_fork+0x41/0x80 [ 15.273930] ? __pfx_kthread+0x10/0x10 [ 15.273950] ret_from_fork_asm+0x1a/0x30 [ 15.274003] </TASK> [ 15.274016] [ 15.281879] Allocated by task 285: [ 15.282077] kasan_save_stack+0x45/0x70 [ 15.282319] kasan_save_track+0x18/0x40 [ 15.282464] kasan_save_alloc_info+0x3b/0x50 [ 15.282907] __kasan_kmalloc+0xb7/0xc0 [ 15.283115] __kmalloc_cache_noprof+0x189/0x420 [ 15.283342] kasan_atomics+0x95/0x310 [ 15.283524] kunit_try_run_case+0x1a5/0x480 [ 15.283712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.284012] kthread+0x337/0x6f0 [ 15.284188] ret_from_fork+0x41/0x80 [ 15.284376] ret_from_fork_asm+0x1a/0x30 [ 15.284615] [ 15.284704] The buggy address belongs to the object at ffff8881029e6b00 [ 15.284704] which belongs to the cache kmalloc-64 of size 64 [ 15.285199] The buggy address is located 0 bytes to the right of [ 15.285199] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.285787] [ 15.285868] The buggy address belongs to the physical page: [ 15.286064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.286336] flags: 0x200000000000000(node=0|zone=2) [ 15.286625] page_type: f5(slab) [ 15.286805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.287180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.287533] page dumped because: kasan: bad access detected [ 15.287809] [ 15.287899] Memory state around the buggy address: [ 15.288137] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.288360] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.288579] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.288797] ^ [ 15.289051] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.289410] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.289763] ================================================================== [ 14.176291] ================================================================== [ 14.176633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.177449] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.178048] [ 14.178146] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.178196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.178211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.178236] Call Trace: [ 14.178250] <TASK> [ 14.178267] dump_stack_lvl+0x73/0xb0 [ 14.178298] print_report+0xd1/0x650 [ 14.178323] ? __virt_addr_valid+0x1db/0x2d0 [ 14.178347] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.178373] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.178399] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.178423] kasan_report+0x141/0x180 [ 14.178448] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.178477] kasan_check_range+0x10c/0x1c0 [ 14.178501] __kasan_check_write+0x18/0x20 [ 14.178524] kasan_atomics_helper+0xb6a/0x5450 [ 14.178550] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.178576] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.178601] ? kasan_atomics+0x152/0x310 [ 14.178655] kasan_atomics+0x1dc/0x310 [ 14.178678] ? __pfx_kasan_atomics+0x10/0x10 [ 14.178718] ? __pfx_read_tsc+0x10/0x10 [ 14.178741] ? ktime_get_ts64+0x86/0x230 [ 14.178770] kunit_try_run_case+0x1a5/0x480 [ 14.178796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.178817] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.178845] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.178886] ? __kthread_parkme+0x82/0x180 [ 14.178988] ? preempt_count_sub+0x50/0x80 [ 14.179023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.179046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.179074] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.179101] kthread+0x337/0x6f0 [ 14.179121] ? trace_preempt_on+0x20/0xc0 [ 14.179148] ? __pfx_kthread+0x10/0x10 [ 14.179169] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.179194] ? calculate_sigpending+0x7b/0xa0 [ 14.179219] ? __pfx_kthread+0x10/0x10 [ 14.179240] ret_from_fork+0x41/0x80 [ 14.179263] ? __pfx_kthread+0x10/0x10 [ 14.179283] ret_from_fork_asm+0x1a/0x30 [ 14.179317] </TASK> [ 14.179331] [ 14.189099] Allocated by task 285: [ 14.189324] kasan_save_stack+0x45/0x70 [ 14.189564] kasan_save_track+0x18/0x40 [ 14.189803] kasan_save_alloc_info+0x3b/0x50 [ 14.190049] __kasan_kmalloc+0xb7/0xc0 [ 14.190363] __kmalloc_cache_noprof+0x189/0x420 [ 14.190604] kasan_atomics+0x95/0x310 [ 14.190797] kunit_try_run_case+0x1a5/0x480 [ 14.191071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.191352] kthread+0x337/0x6f0 [ 14.191522] ret_from_fork+0x41/0x80 [ 14.191719] ret_from_fork_asm+0x1a/0x30 [ 14.192078] [ 14.192193] The buggy address belongs to the object at ffff8881029e6b00 [ 14.192193] which belongs to the cache kmalloc-64 of size 64 [ 14.192721] The buggy address is located 0 bytes to the right of [ 14.192721] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.193310] [ 14.193605] The buggy address belongs to the physical page: [ 14.193783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.194472] flags: 0x200000000000000(node=0|zone=2) [ 14.194769] page_type: f5(slab) [ 14.195038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.195399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.195756] page dumped because: kasan: bad access detected [ 14.195946] [ 14.196022] Memory state around the buggy address: [ 14.196471] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.196751] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.197318] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.197675] ^ [ 14.198011] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.198238] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.198603] ================================================================== [ 14.473154] ================================================================== [ 14.473500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.473819] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.474295] [ 14.474418] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.474467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.474482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.474505] Call Trace: [ 14.474521] <TASK> [ 14.474539] dump_stack_lvl+0x73/0xb0 [ 14.474567] print_report+0xd1/0x650 [ 14.474593] ? __virt_addr_valid+0x1db/0x2d0 [ 14.474616] ? kasan_atomics_helper+0x1148/0x5450 [ 14.474641] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.474667] ? kasan_atomics_helper+0x1148/0x5450 [ 14.474692] kasan_report+0x141/0x180 [ 14.474718] ? kasan_atomics_helper+0x1148/0x5450 [ 14.474747] kasan_check_range+0x10c/0x1c0 [ 14.474786] __kasan_check_write+0x18/0x20 [ 14.474809] kasan_atomics_helper+0x1148/0x5450 [ 14.474835] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.474871] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.474907] ? kasan_atomics+0x152/0x310 [ 14.474933] kasan_atomics+0x1dc/0x310 [ 14.474955] ? __pfx_kasan_atomics+0x10/0x10 [ 14.474979] ? __pfx_read_tsc+0x10/0x10 [ 14.475000] ? ktime_get_ts64+0x86/0x230 [ 14.475029] kunit_try_run_case+0x1a5/0x480 [ 14.475053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.475076] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.475102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.475129] ? __kthread_parkme+0x82/0x180 [ 14.475153] ? preempt_count_sub+0x50/0x80 [ 14.475180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.475204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.475230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.475256] kthread+0x337/0x6f0 [ 14.475275] ? trace_preempt_on+0x20/0xc0 [ 14.475301] ? __pfx_kthread+0x10/0x10 [ 14.475322] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.475347] ? calculate_sigpending+0x7b/0xa0 [ 14.475372] ? __pfx_kthread+0x10/0x10 [ 14.475392] ret_from_fork+0x41/0x80 [ 14.475415] ? __pfx_kthread+0x10/0x10 [ 14.475436] ret_from_fork_asm+0x1a/0x30 [ 14.475469] </TASK> [ 14.475481] [ 14.487806] Allocated by task 285: [ 14.488322] kasan_save_stack+0x45/0x70 [ 14.488535] kasan_save_track+0x18/0x40 [ 14.488773] kasan_save_alloc_info+0x3b/0x50 [ 14.489423] __kasan_kmalloc+0xb7/0xc0 [ 14.489827] __kmalloc_cache_noprof+0x189/0x420 [ 14.490220] kasan_atomics+0x95/0x310 [ 14.490415] kunit_try_run_case+0x1a5/0x480 [ 14.490682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.491277] kthread+0x337/0x6f0 [ 14.491420] ret_from_fork+0x41/0x80 [ 14.491917] ret_from_fork_asm+0x1a/0x30 [ 14.492235] [ 14.492423] The buggy address belongs to the object at ffff8881029e6b00 [ 14.492423] which belongs to the cache kmalloc-64 of size 64 [ 14.493337] The buggy address is located 0 bytes to the right of [ 14.493337] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.494187] [ 14.494293] The buggy address belongs to the physical page: [ 14.494700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.495304] flags: 0x200000000000000(node=0|zone=2) [ 14.495733] page_type: f5(slab) [ 14.495985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.496344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.496829] page dumped because: kasan: bad access detected [ 14.497116] [ 14.497568] Memory state around the buggy address: [ 14.497808] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.498283] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.498669] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.499068] ^ [ 14.499298] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.499578] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.500027] ================================================================== [ 14.805480] ================================================================== [ 14.805895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.806167] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.806595] [ 14.806758] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.806807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.806821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.806844] Call Trace: [ 14.806860] <TASK> [ 14.806887] dump_stack_lvl+0x73/0xb0 [ 14.806926] print_report+0xd1/0x650 [ 14.806953] ? __virt_addr_valid+0x1db/0x2d0 [ 14.806976] ? kasan_atomics_helper+0x177f/0x5450 [ 14.807001] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.807027] ? kasan_atomics_helper+0x177f/0x5450 [ 14.807051] kasan_report+0x141/0x180 [ 14.807076] ? kasan_atomics_helper+0x177f/0x5450 [ 14.807105] kasan_check_range+0x10c/0x1c0 [ 14.807128] __kasan_check_write+0x18/0x20 [ 14.807150] kasan_atomics_helper+0x177f/0x5450 [ 14.807176] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.807202] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.807226] ? kasan_atomics+0x152/0x310 [ 14.807252] kasan_atomics+0x1dc/0x310 [ 14.807275] ? __pfx_kasan_atomics+0x10/0x10 [ 14.807299] ? __pfx_read_tsc+0x10/0x10 [ 14.807322] ? ktime_get_ts64+0x86/0x230 [ 14.807351] kunit_try_run_case+0x1a5/0x480 [ 14.807375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.807397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.807431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.807458] ? __kthread_parkme+0x82/0x180 [ 14.807485] ? preempt_count_sub+0x50/0x80 [ 14.807523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.807546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.807579] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.807606] kthread+0x337/0x6f0 [ 14.807626] ? trace_preempt_on+0x20/0xc0 [ 14.807651] ? __pfx_kthread+0x10/0x10 [ 14.807672] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.807697] ? calculate_sigpending+0x7b/0xa0 [ 14.807720] ? __pfx_kthread+0x10/0x10 [ 14.807741] ret_from_fork+0x41/0x80 [ 14.807764] ? __pfx_kthread+0x10/0x10 [ 14.807785] ret_from_fork_asm+0x1a/0x30 [ 14.807817] </TASK> [ 14.807829] [ 14.815991] Allocated by task 285: [ 14.816169] kasan_save_stack+0x45/0x70 [ 14.816350] kasan_save_track+0x18/0x40 [ 14.816493] kasan_save_alloc_info+0x3b/0x50 [ 14.816720] __kasan_kmalloc+0xb7/0xc0 [ 14.817018] __kmalloc_cache_noprof+0x189/0x420 [ 14.817209] kasan_atomics+0x95/0x310 [ 14.817361] kunit_try_run_case+0x1a5/0x480 [ 14.817582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.817817] kthread+0x337/0x6f0 [ 14.817992] ret_from_fork+0x41/0x80 [ 14.818129] ret_from_fork_asm+0x1a/0x30 [ 14.818272] [ 14.818347] The buggy address belongs to the object at ffff8881029e6b00 [ 14.818347] which belongs to the cache kmalloc-64 of size 64 [ 14.819284] The buggy address is located 0 bytes to the right of [ 14.819284] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.819825] [ 14.819910] The buggy address belongs to the physical page: [ 14.820083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.820326] flags: 0x200000000000000(node=0|zone=2) [ 14.820689] page_type: f5(slab) [ 14.820911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.821589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.822004] page dumped because: kasan: bad access detected [ 14.822182] [ 14.822255] Memory state around the buggy address: [ 14.822414] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.822970] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.823308] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.823657] ^ [ 14.823917] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.824236] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.824563] ================================================================== [ 14.431420] ================================================================== [ 14.431767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.432167] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.432431] [ 14.432541] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.432590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.432604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.432627] Call Trace: [ 14.432641] <TASK> [ 14.432716] dump_stack_lvl+0x73/0xb0 [ 14.432748] print_report+0xd1/0x650 [ 14.432776] ? __virt_addr_valid+0x1db/0x2d0 [ 14.432801] ? kasan_atomics_helper+0x1079/0x5450 [ 14.432825] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.432851] ? kasan_atomics_helper+0x1079/0x5450 [ 14.433080] kasan_report+0x141/0x180 [ 14.433109] ? kasan_atomics_helper+0x1079/0x5450 [ 14.433139] kasan_check_range+0x10c/0x1c0 [ 14.433163] __kasan_check_write+0x18/0x20 [ 14.433186] kasan_atomics_helper+0x1079/0x5450 [ 14.433213] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.433238] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.433262] ? kasan_atomics+0x152/0x310 [ 14.433288] kasan_atomics+0x1dc/0x310 [ 14.433310] ? __pfx_kasan_atomics+0x10/0x10 [ 14.433334] ? __pfx_read_tsc+0x10/0x10 [ 14.433356] ? ktime_get_ts64+0x86/0x230 [ 14.433384] kunit_try_run_case+0x1a5/0x480 [ 14.433409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.433431] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.433457] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.433484] ? __kthread_parkme+0x82/0x180 [ 14.433508] ? preempt_count_sub+0x50/0x80 [ 14.433536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.433560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.433586] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.433613] kthread+0x337/0x6f0 [ 14.433632] ? trace_preempt_on+0x20/0xc0 [ 14.433658] ? __pfx_kthread+0x10/0x10 [ 14.433679] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.433703] ? calculate_sigpending+0x7b/0xa0 [ 14.433727] ? __pfx_kthread+0x10/0x10 [ 14.433748] ret_from_fork+0x41/0x80 [ 14.433770] ? __pfx_kthread+0x10/0x10 [ 14.433791] ret_from_fork_asm+0x1a/0x30 [ 14.433824] </TASK> [ 14.433896] [ 14.441944] Allocated by task 285: [ 14.442138] kasan_save_stack+0x45/0x70 [ 14.442297] kasan_save_track+0x18/0x40 [ 14.442440] kasan_save_alloc_info+0x3b/0x50 [ 14.443034] __kasan_kmalloc+0xb7/0xc0 [ 14.443260] __kmalloc_cache_noprof+0x189/0x420 [ 14.443495] kasan_atomics+0x95/0x310 [ 14.443694] kunit_try_run_case+0x1a5/0x480 [ 14.444013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.444245] kthread+0x337/0x6f0 [ 14.444398] ret_from_fork+0x41/0x80 [ 14.444604] ret_from_fork_asm+0x1a/0x30 [ 14.444750] [ 14.445070] The buggy address belongs to the object at ffff8881029e6b00 [ 14.445070] which belongs to the cache kmalloc-64 of size 64 [ 14.445544] The buggy address is located 0 bytes to the right of [ 14.445544] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.445979] [ 14.446082] The buggy address belongs to the physical page: [ 14.446342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.447067] flags: 0x200000000000000(node=0|zone=2) [ 14.447245] page_type: f5(slab) [ 14.447373] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.448008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.448359] page dumped because: kasan: bad access detected [ 14.448652] [ 14.448738] Memory state around the buggy address: [ 14.449067] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.449308] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.449531] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.449863] ^ [ 14.450119] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.450568] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.450790] ================================================================== [ 14.708806] ================================================================== [ 14.709161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.709483] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.709980] [ 14.710119] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.710181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.710195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.710220] Call Trace: [ 14.710249] <TASK> [ 14.710268] dump_stack_lvl+0x73/0xb0 [ 14.710299] print_report+0xd1/0x650 [ 14.710325] ? __virt_addr_valid+0x1db/0x2d0 [ 14.710350] ? kasan_atomics_helper+0x151d/0x5450 [ 14.710376] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.710401] ? kasan_atomics_helper+0x151d/0x5450 [ 14.710427] kasan_report+0x141/0x180 [ 14.710452] ? kasan_atomics_helper+0x151d/0x5450 [ 14.710492] kasan_check_range+0x10c/0x1c0 [ 14.710516] __kasan_check_write+0x18/0x20 [ 14.710550] kasan_atomics_helper+0x151d/0x5450 [ 14.710577] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.710603] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.710627] ? kasan_atomics+0x152/0x310 [ 14.710656] kasan_atomics+0x1dc/0x310 [ 14.710678] ? __pfx_kasan_atomics+0x10/0x10 [ 14.710710] ? __pfx_read_tsc+0x10/0x10 [ 14.710732] ? ktime_get_ts64+0x86/0x230 [ 14.710761] kunit_try_run_case+0x1a5/0x480 [ 14.710786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.710815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.710897] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.710926] ? __kthread_parkme+0x82/0x180 [ 14.710952] ? preempt_count_sub+0x50/0x80 [ 14.711075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.711102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.711130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.711156] kthread+0x337/0x6f0 [ 14.711176] ? trace_preempt_on+0x20/0xc0 [ 14.711202] ? __pfx_kthread+0x10/0x10 [ 14.711223] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.711248] ? calculate_sigpending+0x7b/0xa0 [ 14.711272] ? __pfx_kthread+0x10/0x10 [ 14.711292] ret_from_fork+0x41/0x80 [ 14.711316] ? __pfx_kthread+0x10/0x10 [ 14.711337] ret_from_fork_asm+0x1a/0x30 [ 14.711371] </TASK> [ 14.711385] [ 14.720626] Allocated by task 285: [ 14.720913] kasan_save_stack+0x45/0x70 [ 14.721161] kasan_save_track+0x18/0x40 [ 14.721352] kasan_save_alloc_info+0x3b/0x50 [ 14.721594] __kasan_kmalloc+0xb7/0xc0 [ 14.721801] __kmalloc_cache_noprof+0x189/0x420 [ 14.722028] kasan_atomics+0x95/0x310 [ 14.722305] kunit_try_run_case+0x1a5/0x480 [ 14.722466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.722650] kthread+0x337/0x6f0 [ 14.722920] ret_from_fork+0x41/0x80 [ 14.723115] ret_from_fork_asm+0x1a/0x30 [ 14.723317] [ 14.723424] The buggy address belongs to the object at ffff8881029e6b00 [ 14.723424] which belongs to the cache kmalloc-64 of size 64 [ 14.724314] The buggy address is located 0 bytes to the right of [ 14.724314] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.725373] [ 14.725487] The buggy address belongs to the physical page: [ 14.726358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.726735] flags: 0x200000000000000(node=0|zone=2) [ 14.727100] page_type: f5(slab) [ 14.727320] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.727885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.728288] page dumped because: kasan: bad access detected [ 14.728535] [ 14.728793] Memory state around the buggy address: [ 14.729279] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.729793] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.730325] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.730787] ^ [ 14.731146] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.731557] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.732102] ================================================================== [ 15.018535] ================================================================== [ 15.018945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.019295] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 15.019687] [ 15.019904] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.019956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.019970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.019994] Call Trace: [ 15.020009] <TASK> [ 15.020062] dump_stack_lvl+0x73/0xb0 [ 15.020091] print_report+0xd1/0x650 [ 15.020118] ? __virt_addr_valid+0x1db/0x2d0 [ 15.020142] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.020167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.020223] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.020249] kasan_report+0x141/0x180 [ 15.020275] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.020305] kasan_check_range+0x10c/0x1c0 [ 15.020330] __kasan_check_write+0x18/0x20 [ 15.020353] kasan_atomics_helper+0x1d7a/0x5450 [ 15.020379] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.020406] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.020430] ? kasan_atomics+0x152/0x310 [ 15.020456] kasan_atomics+0x1dc/0x310 [ 15.020517] ? __pfx_kasan_atomics+0x10/0x10 [ 15.020541] ? __pfx_read_tsc+0x10/0x10 [ 15.020562] ? ktime_get_ts64+0x86/0x230 [ 15.020589] kunit_try_run_case+0x1a5/0x480 [ 15.020614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.020635] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.020690] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.020763] ? __kthread_parkme+0x82/0x180 [ 15.020787] ? preempt_count_sub+0x50/0x80 [ 15.020839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.020898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.020925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.020951] kthread+0x337/0x6f0 [ 15.020970] ? trace_preempt_on+0x20/0xc0 [ 15.020996] ? __pfx_kthread+0x10/0x10 [ 15.021016] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.021041] ? calculate_sigpending+0x7b/0xa0 [ 15.021065] ? __pfx_kthread+0x10/0x10 [ 15.021085] ret_from_fork+0x41/0x80 [ 15.021108] ? __pfx_kthread+0x10/0x10 [ 15.021128] ret_from_fork_asm+0x1a/0x30 [ 15.021162] </TASK> [ 15.021174] [ 15.032000] Allocated by task 285: [ 15.032142] kasan_save_stack+0x45/0x70 [ 15.032297] kasan_save_track+0x18/0x40 [ 15.032441] kasan_save_alloc_info+0x3b/0x50 [ 15.032600] __kasan_kmalloc+0xb7/0xc0 [ 15.032795] __kmalloc_cache_noprof+0x189/0x420 [ 15.033019] kasan_atomics+0x95/0x310 [ 15.033156] kunit_try_run_case+0x1a5/0x480 [ 15.033355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.033765] kthread+0x337/0x6f0 [ 15.033956] ret_from_fork+0x41/0x80 [ 15.034134] ret_from_fork_asm+0x1a/0x30 [ 15.034298] [ 15.034400] The buggy address belongs to the object at ffff8881029e6b00 [ 15.034400] which belongs to the cache kmalloc-64 of size 64 [ 15.034869] The buggy address is located 0 bytes to the right of [ 15.034869] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.035375] [ 15.035470] The buggy address belongs to the physical page: [ 15.035800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.036063] flags: 0x200000000000000(node=0|zone=2) [ 15.036297] page_type: f5(slab) [ 15.036474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.036732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.037226] page dumped because: kasan: bad access detected [ 15.037605] [ 15.037707] Memory state around the buggy address: [ 15.037929] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.038149] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.038475] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.038762] ^ [ 15.038933] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.039318] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.039654] ================================================================== [ 14.018656] ================================================================== [ 14.018932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.019482] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.019804] [ 14.020009] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.020063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.020076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.020100] Call Trace: [ 14.020119] <TASK> [ 14.020139] dump_stack_lvl+0x73/0xb0 [ 14.020170] print_report+0xd1/0x650 [ 14.020196] ? __virt_addr_valid+0x1db/0x2d0 [ 14.020221] ? kasan_atomics_helper+0x72f/0x5450 [ 14.020301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.020330] ? kasan_atomics_helper+0x72f/0x5450 [ 14.020355] kasan_report+0x141/0x180 [ 14.020380] ? kasan_atomics_helper+0x72f/0x5450 [ 14.020410] kasan_check_range+0x10c/0x1c0 [ 14.020433] __kasan_check_write+0x18/0x20 [ 14.020455] kasan_atomics_helper+0x72f/0x5450 [ 14.020481] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.020506] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.020545] ? kasan_atomics+0x152/0x310 [ 14.020571] kasan_atomics+0x1dc/0x310 [ 14.020593] ? __pfx_kasan_atomics+0x10/0x10 [ 14.020616] ? __pfx_read_tsc+0x10/0x10 [ 14.020638] ? ktime_get_ts64+0x86/0x230 [ 14.020667] kunit_try_run_case+0x1a5/0x480 [ 14.020693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.020715] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.020743] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.020770] ? __kthread_parkme+0x82/0x180 [ 14.020794] ? preempt_count_sub+0x50/0x80 [ 14.020823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.020884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.020982] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.021013] kthread+0x337/0x6f0 [ 14.021034] ? trace_preempt_on+0x20/0xc0 [ 14.021060] ? __pfx_kthread+0x10/0x10 [ 14.021082] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.021106] ? calculate_sigpending+0x7b/0xa0 [ 14.021131] ? __pfx_kthread+0x10/0x10 [ 14.021152] ret_from_fork+0x41/0x80 [ 14.021176] ? __pfx_kthread+0x10/0x10 [ 14.021196] ret_from_fork_asm+0x1a/0x30 [ 14.021230] </TASK> [ 14.021244] [ 14.030461] Allocated by task 285: [ 14.030736] kasan_save_stack+0x45/0x70 [ 14.030913] kasan_save_track+0x18/0x40 [ 14.031119] kasan_save_alloc_info+0x3b/0x50 [ 14.031502] __kasan_kmalloc+0xb7/0xc0 [ 14.031749] __kmalloc_cache_noprof+0x189/0x420 [ 14.032119] kasan_atomics+0x95/0x310 [ 14.032306] kunit_try_run_case+0x1a5/0x480 [ 14.032543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.032739] kthread+0x337/0x6f0 [ 14.032943] ret_from_fork+0x41/0x80 [ 14.033263] ret_from_fork_asm+0x1a/0x30 [ 14.033437] [ 14.033568] The buggy address belongs to the object at ffff8881029e6b00 [ 14.033568] which belongs to the cache kmalloc-64 of size 64 [ 14.033982] The buggy address is located 0 bytes to the right of [ 14.033982] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.034841] [ 14.034964] The buggy address belongs to the physical page: [ 14.035452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.035829] flags: 0x200000000000000(node=0|zone=2) [ 14.036058] page_type: f5(slab) [ 14.036188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.036479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.037353] page dumped because: kasan: bad access detected [ 14.037643] [ 14.037748] Memory state around the buggy address: [ 14.037927] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.038323] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.038733] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.039331] ^ [ 14.039594] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.039966] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.040267] ================================================================== [ 14.678558] ================================================================== [ 14.678823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.679918] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.681265] [ 14.681622] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.681679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.681695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.681718] Call Trace: [ 14.681735] <TASK> [ 14.681760] dump_stack_lvl+0x73/0xb0 [ 14.681791] print_report+0xd1/0x650 [ 14.681818] ? __virt_addr_valid+0x1db/0x2d0 [ 14.681848] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.681884] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.681910] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.681935] kasan_report+0x141/0x180 [ 14.681960] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.681991] __asan_report_store8_noabort+0x1b/0x30 [ 14.682015] kasan_atomics_helper+0x50d4/0x5450 [ 14.682040] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.682066] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.682090] ? kasan_atomics+0x152/0x310 [ 14.682116] kasan_atomics+0x1dc/0x310 [ 14.682138] ? __pfx_kasan_atomics+0x10/0x10 [ 14.682163] ? __pfx_read_tsc+0x10/0x10 [ 14.682185] ? ktime_get_ts64+0x86/0x230 [ 14.682213] kunit_try_run_case+0x1a5/0x480 [ 14.682237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.682260] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.682286] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.682314] ? __kthread_parkme+0x82/0x180 [ 14.682337] ? preempt_count_sub+0x50/0x80 [ 14.682365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.682388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.682414] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.682440] kthread+0x337/0x6f0 [ 14.682459] ? trace_preempt_on+0x20/0xc0 [ 14.682485] ? __pfx_kthread+0x10/0x10 [ 14.682506] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.682531] ? calculate_sigpending+0x7b/0xa0 [ 14.682554] ? __pfx_kthread+0x10/0x10 [ 14.682574] ret_from_fork+0x41/0x80 [ 14.682597] ? __pfx_kthread+0x10/0x10 [ 14.682617] ret_from_fork_asm+0x1a/0x30 [ 14.682649] </TASK> [ 14.682663] [ 14.697446] Allocated by task 285: [ 14.697827] kasan_save_stack+0x45/0x70 [ 14.698298] kasan_save_track+0x18/0x40 [ 14.698521] kasan_save_alloc_info+0x3b/0x50 [ 14.698910] __kasan_kmalloc+0xb7/0xc0 [ 14.699215] __kmalloc_cache_noprof+0x189/0x420 [ 14.699449] kasan_atomics+0x95/0x310 [ 14.699676] kunit_try_run_case+0x1a5/0x480 [ 14.700232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.700566] kthread+0x337/0x6f0 [ 14.700756] ret_from_fork+0x41/0x80 [ 14.701098] ret_from_fork_asm+0x1a/0x30 [ 14.701330] [ 14.701465] The buggy address belongs to the object at ffff8881029e6b00 [ 14.701465] which belongs to the cache kmalloc-64 of size 64 [ 14.702109] The buggy address is located 0 bytes to the right of [ 14.702109] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.702721] [ 14.703097] The buggy address belongs to the physical page: [ 14.703376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.703825] flags: 0x200000000000000(node=0|zone=2) [ 14.704106] page_type: f5(slab) [ 14.704342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.704688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.705166] page dumped because: kasan: bad access detected [ 14.705455] [ 14.705574] Memory state around the buggy address: [ 14.705808] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.706271] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.706649] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.707048] ^ [ 14.707265] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.707775] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.708298] ================================================================== [ 14.127165] ================================================================== [ 14.127506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.127998] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.128432] [ 14.128569] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.128620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.128634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.128660] Call Trace: [ 14.128680] <TASK> [ 14.128699] dump_stack_lvl+0x73/0xb0 [ 14.128729] print_report+0xd1/0x650 [ 14.128754] ? __virt_addr_valid+0x1db/0x2d0 [ 14.128780] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.128805] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.128831] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.128922] kasan_report+0x141/0x180 [ 14.128949] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.128978] kasan_check_range+0x10c/0x1c0 [ 14.129002] __kasan_check_write+0x18/0x20 [ 14.129025] kasan_atomics_helper+0xa2b/0x5450 [ 14.129051] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.129077] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.129102] ? kasan_atomics+0x152/0x310 [ 14.129127] kasan_atomics+0x1dc/0x310 [ 14.129150] ? __pfx_kasan_atomics+0x10/0x10 [ 14.129174] ? __pfx_read_tsc+0x10/0x10 [ 14.129197] ? ktime_get_ts64+0x86/0x230 [ 14.129226] kunit_try_run_case+0x1a5/0x480 [ 14.129252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.129275] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.129302] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.129330] ? __kthread_parkme+0x82/0x180 [ 14.129355] ? preempt_count_sub+0x50/0x80 [ 14.129385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.129408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.129435] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.129462] kthread+0x337/0x6f0 [ 14.129481] ? trace_preempt_on+0x20/0xc0 [ 14.129508] ? __pfx_kthread+0x10/0x10 [ 14.129528] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.129553] ? calculate_sigpending+0x7b/0xa0 [ 14.129579] ? __pfx_kthread+0x10/0x10 [ 14.129600] ret_from_fork+0x41/0x80 [ 14.129623] ? __pfx_kthread+0x10/0x10 [ 14.129644] ret_from_fork_asm+0x1a/0x30 [ 14.129678] </TASK> [ 14.129691] [ 14.138819] Allocated by task 285: [ 14.139093] kasan_save_stack+0x45/0x70 [ 14.139308] kasan_save_track+0x18/0x40 [ 14.139516] kasan_save_alloc_info+0x3b/0x50 [ 14.139740] __kasan_kmalloc+0xb7/0xc0 [ 14.139973] __kmalloc_cache_noprof+0x189/0x420 [ 14.140177] kasan_atomics+0x95/0x310 [ 14.140313] kunit_try_run_case+0x1a5/0x480 [ 14.140463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.140837] kthread+0x337/0x6f0 [ 14.141149] ret_from_fork+0x41/0x80 [ 14.141359] ret_from_fork_asm+0x1a/0x30 [ 14.141622] [ 14.141724] The buggy address belongs to the object at ffff8881029e6b00 [ 14.141724] which belongs to the cache kmalloc-64 of size 64 [ 14.142096] The buggy address is located 0 bytes to the right of [ 14.142096] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.142635] [ 14.142739] The buggy address belongs to the physical page: [ 14.143072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.143478] flags: 0x200000000000000(node=0|zone=2) [ 14.143826] page_type: f5(slab) [ 14.143985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.144255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.144719] page dumped because: kasan: bad access detected [ 14.145098] [ 14.145211] Memory state around the buggy address: [ 14.145450] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.145911] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.146134] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.146458] ^ [ 14.146650] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.147146] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.147456] ================================================================== [ 14.994664] ================================================================== [ 14.995007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 14.995340] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.995672] [ 14.995786] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.995833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.995847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.995871] Call Trace: [ 14.995898] <TASK> [ 14.995914] dump_stack_lvl+0x73/0xb0 [ 14.995941] print_report+0xd1/0x650 [ 14.995967] ? __virt_addr_valid+0x1db/0x2d0 [ 14.995991] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.996015] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.996042] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.996067] kasan_report+0x141/0x180 [ 14.996092] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.996122] kasan_check_range+0x10c/0x1c0 [ 14.996145] __kasan_check_write+0x18/0x20 [ 14.996168] kasan_atomics_helper+0x1ce1/0x5450 [ 14.996195] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.996220] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.996245] ? kasan_atomics+0x152/0x310 [ 14.996270] kasan_atomics+0x1dc/0x310 [ 14.996291] ? __pfx_kasan_atomics+0x10/0x10 [ 14.996315] ? __pfx_read_tsc+0x10/0x10 [ 14.996337] ? ktime_get_ts64+0x86/0x230 [ 14.996365] kunit_try_run_case+0x1a5/0x480 [ 14.996389] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.996411] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.996437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.996464] ? __kthread_parkme+0x82/0x180 [ 14.996488] ? preempt_count_sub+0x50/0x80 [ 14.996515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.996538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.996565] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.996602] kthread+0x337/0x6f0 [ 14.996622] ? trace_preempt_on+0x20/0xc0 [ 14.996647] ? __pfx_kthread+0x10/0x10 [ 14.996667] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.996692] ? calculate_sigpending+0x7b/0xa0 [ 14.996716] ? __pfx_kthread+0x10/0x10 [ 14.996738] ret_from_fork+0x41/0x80 [ 14.996761] ? __pfx_kthread+0x10/0x10 [ 14.996781] ret_from_fork_asm+0x1a/0x30 [ 14.996814] </TASK> [ 14.996826] [ 15.007367] Allocated by task 285: [ 15.007728] kasan_save_stack+0x45/0x70 [ 15.008138] kasan_save_track+0x18/0x40 [ 15.008521] kasan_save_alloc_info+0x3b/0x50 [ 15.008961] __kasan_kmalloc+0xb7/0xc0 [ 15.009323] __kmalloc_cache_noprof+0x189/0x420 [ 15.009795] kasan_atomics+0x95/0x310 [ 15.009946] kunit_try_run_case+0x1a5/0x480 [ 15.010095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.010278] kthread+0x337/0x6f0 [ 15.010402] ret_from_fork+0x41/0x80 [ 15.010553] ret_from_fork_asm+0x1a/0x30 [ 15.010758] [ 15.010936] The buggy address belongs to the object at ffff8881029e6b00 [ 15.010936] which belongs to the cache kmalloc-64 of size 64 [ 15.012129] The buggy address is located 0 bytes to the right of [ 15.012129] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.013375] [ 15.013540] The buggy address belongs to the physical page: [ 15.013832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.014097] flags: 0x200000000000000(node=0|zone=2) [ 15.014266] page_type: f5(slab) [ 15.014392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.014689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.015330] page dumped because: kasan: bad access detected [ 15.015586] [ 15.015694] Memory state around the buggy address: [ 15.016065] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.016365] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.016739] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.017094] ^ [ 15.017278] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.017667] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.017941] ================================================================== [ 13.842484] ================================================================== [ 13.842929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.843260] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 13.843623] [ 13.843735] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.843803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.843831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.843855] Call Trace: [ 13.843882] <TASK> [ 13.843899] dump_stack_lvl+0x73/0xb0 [ 13.843927] print_report+0xd1/0x650 [ 13.844002] ? __virt_addr_valid+0x1db/0x2d0 [ 13.844032] ? kasan_atomics_helper+0x3df/0x5450 [ 13.844057] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.844082] ? kasan_atomics_helper+0x3df/0x5450 [ 13.844108] kasan_report+0x141/0x180 [ 13.844133] ? kasan_atomics_helper+0x3df/0x5450 [ 13.844164] kasan_check_range+0x10c/0x1c0 [ 13.844187] __kasan_check_read+0x15/0x20 [ 13.844233] kasan_atomics_helper+0x3df/0x5450 [ 13.844274] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.844313] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.844352] ? kasan_atomics+0x152/0x310 [ 13.844378] kasan_atomics+0x1dc/0x310 [ 13.844400] ? __pfx_kasan_atomics+0x10/0x10 [ 13.844438] ? __pfx_read_tsc+0x10/0x10 [ 13.844474] ? ktime_get_ts64+0x86/0x230 [ 13.844502] kunit_try_run_case+0x1a5/0x480 [ 13.844528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.844549] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.844577] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.844604] ? __kthread_parkme+0x82/0x180 [ 13.844628] ? preempt_count_sub+0x50/0x80 [ 13.844656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.844680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.844707] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.844735] kthread+0x337/0x6f0 [ 13.844754] ? trace_preempt_on+0x20/0xc0 [ 13.844780] ? __pfx_kthread+0x10/0x10 [ 13.844801] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.844826] ? calculate_sigpending+0x7b/0xa0 [ 13.845043] ? __pfx_kthread+0x10/0x10 [ 13.845067] ret_from_fork+0x41/0x80 [ 13.845091] ? __pfx_kthread+0x10/0x10 [ 13.845112] ret_from_fork_asm+0x1a/0x30 [ 13.845146] </TASK> [ 13.845159] [ 13.855317] Allocated by task 285: [ 13.855503] kasan_save_stack+0x45/0x70 [ 13.855713] kasan_save_track+0x18/0x40 [ 13.855916] kasan_save_alloc_info+0x3b/0x50 [ 13.856120] __kasan_kmalloc+0xb7/0xc0 [ 13.856308] __kmalloc_cache_noprof+0x189/0x420 [ 13.857046] kasan_atomics+0x95/0x310 [ 13.857323] kunit_try_run_case+0x1a5/0x480 [ 13.858106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.858558] kthread+0x337/0x6f0 [ 13.858748] ret_from_fork+0x41/0x80 [ 13.859039] ret_from_fork_asm+0x1a/0x30 [ 13.859240] [ 13.859339] The buggy address belongs to the object at ffff8881029e6b00 [ 13.859339] which belongs to the cache kmalloc-64 of size 64 [ 13.860152] The buggy address is located 0 bytes to the right of [ 13.860152] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 13.861084] [ 13.861209] The buggy address belongs to the physical page: [ 13.861766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 13.862318] flags: 0x200000000000000(node=0|zone=2) [ 13.862576] page_type: f5(slab) [ 13.862746] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.863259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.864039] page dumped because: kasan: bad access detected [ 13.864341] [ 13.864605] Memory state around the buggy address: [ 13.865078] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.865393] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.866024] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.866556] ^ [ 13.867069] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.867692] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.868168] ================================================================== [ 14.651781] ================================================================== [ 14.652165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.652818] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.653117] [ 14.653208] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.653259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.653273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.653298] Call Trace: [ 14.653313] <TASK> [ 14.653331] dump_stack_lvl+0x73/0xb0 [ 14.653359] print_report+0xd1/0x650 [ 14.653385] ? __virt_addr_valid+0x1db/0x2d0 [ 14.653408] ? kasan_atomics_helper+0x1467/0x5450 [ 14.653433] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.653459] ? kasan_atomics_helper+0x1467/0x5450 [ 14.653484] kasan_report+0x141/0x180 [ 14.653510] ? kasan_atomics_helper+0x1467/0x5450 [ 14.653541] kasan_check_range+0x10c/0x1c0 [ 14.653564] __kasan_check_write+0x18/0x20 [ 14.653587] kasan_atomics_helper+0x1467/0x5450 [ 14.653613] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.653639] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.653663] ? kasan_atomics+0x152/0x310 [ 14.653689] kasan_atomics+0x1dc/0x310 [ 14.653711] ? __pfx_kasan_atomics+0x10/0x10 [ 14.653735] ? __pfx_read_tsc+0x10/0x10 [ 14.653757] ? ktime_get_ts64+0x86/0x230 [ 14.653785] kunit_try_run_case+0x1a5/0x480 [ 14.653809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.653831] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.653857] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.653895] ? __kthread_parkme+0x82/0x180 [ 14.653919] ? preempt_count_sub+0x50/0x80 [ 14.653946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.653969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.653996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.654023] kthread+0x337/0x6f0 [ 14.654043] ? trace_preempt_on+0x20/0xc0 [ 14.654068] ? __pfx_kthread+0x10/0x10 [ 14.654090] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.654115] ? calculate_sigpending+0x7b/0xa0 [ 14.654140] ? __pfx_kthread+0x10/0x10 [ 14.654161] ret_from_fork+0x41/0x80 [ 14.654185] ? __pfx_kthread+0x10/0x10 [ 14.654205] ret_from_fork_asm+0x1a/0x30 [ 14.654238] </TASK> [ 14.654251] [ 14.664166] Allocated by task 285: [ 14.664535] kasan_save_stack+0x45/0x70 [ 14.664712] kasan_save_track+0x18/0x40 [ 14.665167] kasan_save_alloc_info+0x3b/0x50 [ 14.665440] __kasan_kmalloc+0xb7/0xc0 [ 14.665864] __kmalloc_cache_noprof+0x189/0x420 [ 14.666326] kasan_atomics+0x95/0x310 [ 14.666674] kunit_try_run_case+0x1a5/0x480 [ 14.666890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.667304] kthread+0x337/0x6f0 [ 14.667668] ret_from_fork+0x41/0x80 [ 14.668024] ret_from_fork_asm+0x1a/0x30 [ 14.668285] [ 14.668524] The buggy address belongs to the object at ffff8881029e6b00 [ 14.668524] which belongs to the cache kmalloc-64 of size 64 [ 14.669271] The buggy address is located 0 bytes to the right of [ 14.669271] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.670388] [ 14.670498] The buggy address belongs to the physical page: [ 14.670966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.671745] flags: 0x200000000000000(node=0|zone=2) [ 14.672116] page_type: f5(slab) [ 14.672497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.673130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.673658] page dumped because: kasan: bad access detected [ 14.674102] [ 14.674187] Memory state around the buggy address: [ 14.674534] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.675012] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.675451] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.675791] ^ [ 14.676200] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.676824] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.677368] ================================================================== [ 14.265427] ================================================================== [ 14.265747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.266122] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.266825] [ 14.267021] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.267074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.267089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.267113] Call Trace: [ 14.267132] <TASK> [ 14.267172] dump_stack_lvl+0x73/0xb0 [ 14.267202] print_report+0xd1/0x650 [ 14.267227] ? __virt_addr_valid+0x1db/0x2d0 [ 14.267251] ? kasan_atomics_helper+0xd47/0x5450 [ 14.267287] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.267313] ? kasan_atomics_helper+0xd47/0x5450 [ 14.267349] kasan_report+0x141/0x180 [ 14.267375] ? kasan_atomics_helper+0xd47/0x5450 [ 14.267404] kasan_check_range+0x10c/0x1c0 [ 14.267427] __kasan_check_write+0x18/0x20 [ 14.267449] kasan_atomics_helper+0xd47/0x5450 [ 14.267475] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.267500] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.267533] ? kasan_atomics+0x152/0x310 [ 14.267558] kasan_atomics+0x1dc/0x310 [ 14.267584] ? __pfx_kasan_atomics+0x10/0x10 [ 14.267607] ? __pfx_read_tsc+0x10/0x10 [ 14.267630] ? ktime_get_ts64+0x86/0x230 [ 14.267658] kunit_try_run_case+0x1a5/0x480 [ 14.267682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.267704] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.267731] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.267758] ? __kthread_parkme+0x82/0x180 [ 14.267782] ? preempt_count_sub+0x50/0x80 [ 14.267810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.267833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.267867] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.267904] kthread+0x337/0x6f0 [ 14.267923] ? trace_preempt_on+0x20/0xc0 [ 14.267949] ? __pfx_kthread+0x10/0x10 [ 14.267969] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.267994] ? calculate_sigpending+0x7b/0xa0 [ 14.268018] ? __pfx_kthread+0x10/0x10 [ 14.268038] ret_from_fork+0x41/0x80 [ 14.268061] ? __pfx_kthread+0x10/0x10 [ 14.268081] ret_from_fork_asm+0x1a/0x30 [ 14.268114] </TASK> [ 14.268126] [ 14.284152] Allocated by task 285: [ 14.284297] kasan_save_stack+0x45/0x70 [ 14.284452] kasan_save_track+0x18/0x40 [ 14.284771] kasan_save_alloc_info+0x3b/0x50 [ 14.285332] __kasan_kmalloc+0xb7/0xc0 [ 14.285829] __kmalloc_cache_noprof+0x189/0x420 [ 14.286401] kasan_atomics+0x95/0x310 [ 14.286801] kunit_try_run_case+0x1a5/0x480 [ 14.287260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.287456] kthread+0x337/0x6f0 [ 14.287724] ret_from_fork+0x41/0x80 [ 14.288133] ret_from_fork_asm+0x1a/0x30 [ 14.288655] [ 14.288819] The buggy address belongs to the object at ffff8881029e6b00 [ 14.288819] which belongs to the cache kmalloc-64 of size 64 [ 14.290065] The buggy address is located 0 bytes to the right of [ 14.290065] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.290446] [ 14.290532] The buggy address belongs to the physical page: [ 14.291026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.292118] flags: 0x200000000000000(node=0|zone=2) [ 14.292611] page_type: f5(slab) [ 14.293054] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.293785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.294378] page dumped because: kasan: bad access detected [ 14.294582] [ 14.294657] Memory state around the buggy address: [ 14.295320] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.295967] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.296357] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.296609] ^ [ 14.297171] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.297900] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.298527] ================================================================== [ 14.086539] ================================================================== [ 14.086944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.087231] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.087528] [ 14.087648] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.087699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.087714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.087739] Call Trace: [ 14.087759] <TASK> [ 14.087779] dump_stack_lvl+0x73/0xb0 [ 14.087808] print_report+0xd1/0x650 [ 14.087834] ? __virt_addr_valid+0x1db/0x2d0 [ 14.087859] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.087898] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.087923] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.087948] kasan_report+0x141/0x180 [ 14.087975] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.088005] kasan_check_range+0x10c/0x1c0 [ 14.088028] __kasan_check_write+0x18/0x20 [ 14.088050] kasan_atomics_helper+0x8f9/0x5450 [ 14.088077] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.088102] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.088127] ? kasan_atomics+0x152/0x310 [ 14.088153] kasan_atomics+0x1dc/0x310 [ 14.088177] ? __pfx_kasan_atomics+0x10/0x10 [ 14.088200] ? __pfx_read_tsc+0x10/0x10 [ 14.088225] ? ktime_get_ts64+0x86/0x230 [ 14.088255] kunit_try_run_case+0x1a5/0x480 [ 14.088282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.088304] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.088332] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.088358] ? __kthread_parkme+0x82/0x180 [ 14.088383] ? preempt_count_sub+0x50/0x80 [ 14.088411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.088434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.088461] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.088487] kthread+0x337/0x6f0 [ 14.088506] ? trace_preempt_on+0x20/0xc0 [ 14.088532] ? __pfx_kthread+0x10/0x10 [ 14.088552] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.088578] ? calculate_sigpending+0x7b/0xa0 [ 14.088602] ? __pfx_kthread+0x10/0x10 [ 14.088724] ret_from_fork+0x41/0x80 [ 14.088748] ? __pfx_kthread+0x10/0x10 [ 14.088769] ret_from_fork_asm+0x1a/0x30 [ 14.088802] </TASK> [ 14.088816] [ 14.097379] Allocated by task 285: [ 14.097572] kasan_save_stack+0x45/0x70 [ 14.097786] kasan_save_track+0x18/0x40 [ 14.098250] kasan_save_alloc_info+0x3b/0x50 [ 14.098412] __kasan_kmalloc+0xb7/0xc0 [ 14.098641] __kmalloc_cache_noprof+0x189/0x420 [ 14.098909] kasan_atomics+0x95/0x310 [ 14.099107] kunit_try_run_case+0x1a5/0x480 [ 14.099317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.099500] kthread+0x337/0x6f0 [ 14.099862] ret_from_fork+0x41/0x80 [ 14.100099] ret_from_fork_asm+0x1a/0x30 [ 14.100314] [ 14.100566] The buggy address belongs to the object at ffff8881029e6b00 [ 14.100566] which belongs to the cache kmalloc-64 of size 64 [ 14.101230] The buggy address is located 0 bytes to the right of [ 14.101230] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.101628] [ 14.101739] The buggy address belongs to the physical page: [ 14.102043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.102633] flags: 0x200000000000000(node=0|zone=2) [ 14.102820] page_type: f5(slab) [ 14.103012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.103518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.103767] page dumped because: kasan: bad access detected [ 14.103994] [ 14.104095] Memory state around the buggy address: [ 14.104409] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.104789] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.105304] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.105536] ^ [ 14.105769] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.106228] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.106619] ================================================================== [ 15.040202] ================================================================== [ 15.040522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.040850] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 15.041369] [ 15.041481] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.041526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.041540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.041561] Call Trace: [ 15.041577] <TASK> [ 15.041592] dump_stack_lvl+0x73/0xb0 [ 15.041618] print_report+0xd1/0x650 [ 15.041644] ? __virt_addr_valid+0x1db/0x2d0 [ 15.041668] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.041692] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.041717] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.043094] kasan_report+0x141/0x180 [ 15.043133] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.043184] kasan_check_range+0x10c/0x1c0 [ 15.043210] __kasan_check_write+0x18/0x20 [ 15.043233] kasan_atomics_helper+0x1e12/0x5450 [ 15.043260] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.043285] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.043310] ? kasan_atomics+0x152/0x310 [ 15.043336] kasan_atomics+0x1dc/0x310 [ 15.043358] ? __pfx_kasan_atomics+0x10/0x10 [ 15.043381] ? __pfx_read_tsc+0x10/0x10 [ 15.043405] ? ktime_get_ts64+0x86/0x230 [ 15.043433] kunit_try_run_case+0x1a5/0x480 [ 15.043458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.043480] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.043532] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.043559] ? __kthread_parkme+0x82/0x180 [ 15.043611] ? preempt_count_sub+0x50/0x80 [ 15.043638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.043661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.043687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.043713] kthread+0x337/0x6f0 [ 15.043733] ? trace_preempt_on+0x20/0xc0 [ 15.043758] ? __pfx_kthread+0x10/0x10 [ 15.043779] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.043803] ? calculate_sigpending+0x7b/0xa0 [ 15.043827] ? __pfx_kthread+0x10/0x10 [ 15.043847] ret_from_fork+0x41/0x80 [ 15.043871] ? __pfx_kthread+0x10/0x10 [ 15.043900] ret_from_fork_asm+0x1a/0x30 [ 15.043933] </TASK> [ 15.043946] [ 15.055390] Allocated by task 285: [ 15.055602] kasan_save_stack+0x45/0x70 [ 15.055826] kasan_save_track+0x18/0x40 [ 15.056187] kasan_save_alloc_info+0x3b/0x50 [ 15.056485] __kasan_kmalloc+0xb7/0xc0 [ 15.056866] __kmalloc_cache_noprof+0x189/0x420 [ 15.057206] kasan_atomics+0x95/0x310 [ 15.057348] kunit_try_run_case+0x1a5/0x480 [ 15.057500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.057688] kthread+0x337/0x6f0 [ 15.057921] ret_from_fork+0x41/0x80 [ 15.058151] ret_from_fork_asm+0x1a/0x30 [ 15.058633] [ 15.058745] The buggy address belongs to the object at ffff8881029e6b00 [ 15.058745] which belongs to the cache kmalloc-64 of size 64 [ 15.059253] The buggy address is located 0 bytes to the right of [ 15.059253] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.059705] [ 15.059903] The buggy address belongs to the physical page: [ 15.060185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.060511] flags: 0x200000000000000(node=0|zone=2) [ 15.060681] page_type: f5(slab) [ 15.060924] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.061439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.061958] page dumped because: kasan: bad access detected [ 15.062202] [ 15.062306] Memory state around the buggy address: [ 15.062740] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.063039] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.063474] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.064003] ^ [ 15.064347] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.064826] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.065123] ================================================================== [ 13.968468] ================================================================== [ 13.969225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 13.969591] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 13.970005] [ 13.970104] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.970156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.970171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.970195] Call Trace: [ 13.970216] <TASK> [ 13.970235] dump_stack_lvl+0x73/0xb0 [ 13.970265] print_report+0xd1/0x650 [ 13.970291] ? __virt_addr_valid+0x1db/0x2d0 [ 13.970315] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.970340] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.970365] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.970389] kasan_report+0x141/0x180 [ 13.970415] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.970444] kasan_check_range+0x10c/0x1c0 [ 13.970467] __kasan_check_write+0x18/0x20 [ 13.970490] kasan_atomics_helper+0x5fe/0x5450 [ 13.970529] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.970556] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.970581] ? kasan_atomics+0x152/0x310 [ 13.970606] kasan_atomics+0x1dc/0x310 [ 13.970628] ? __pfx_kasan_atomics+0x10/0x10 [ 13.970651] ? __pfx_read_tsc+0x10/0x10 [ 13.970676] ? ktime_get_ts64+0x86/0x230 [ 13.970704] kunit_try_run_case+0x1a5/0x480 [ 13.970730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.970752] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.970779] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.970806] ? __kthread_parkme+0x82/0x180 [ 13.970830] ? preempt_count_sub+0x50/0x80 [ 13.970870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.970907] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.970935] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.970962] kthread+0x337/0x6f0 [ 13.970981] ? trace_preempt_on+0x20/0xc0 [ 13.971008] ? __pfx_kthread+0x10/0x10 [ 13.971029] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.971054] ? calculate_sigpending+0x7b/0xa0 [ 13.971079] ? __pfx_kthread+0x10/0x10 [ 13.971100] ret_from_fork+0x41/0x80 [ 13.971123] ? __pfx_kthread+0x10/0x10 [ 13.971143] ret_from_fork_asm+0x1a/0x30 [ 13.971176] </TASK> [ 13.971188] [ 13.980088] Allocated by task 285: [ 13.980286] kasan_save_stack+0x45/0x70 [ 13.980502] kasan_save_track+0x18/0x40 [ 13.980707] kasan_save_alloc_info+0x3b/0x50 [ 13.980964] __kasan_kmalloc+0xb7/0xc0 [ 13.981117] __kmalloc_cache_noprof+0x189/0x420 [ 13.981278] kasan_atomics+0x95/0x310 [ 13.981415] kunit_try_run_case+0x1a5/0x480 [ 13.981949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.982236] kthread+0x337/0x6f0 [ 13.982423] ret_from_fork+0x41/0x80 [ 13.982733] ret_from_fork_asm+0x1a/0x30 [ 13.983037] [ 13.983126] The buggy address belongs to the object at ffff8881029e6b00 [ 13.983126] which belongs to the cache kmalloc-64 of size 64 [ 13.983637] The buggy address is located 0 bytes to the right of [ 13.983637] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 13.984195] [ 13.984305] The buggy address belongs to the physical page: [ 13.984506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 13.985027] flags: 0x200000000000000(node=0|zone=2) [ 13.985268] page_type: f5(slab) [ 13.985428] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.985725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.986075] page dumped because: kasan: bad access detected [ 13.986332] [ 13.986432] Memory state around the buggy address: [ 13.986691] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.987020] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.987309] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.987663] ^ [ 13.987896] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.988154] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.988372] ================================================================== [ 14.780375] ================================================================== [ 14.780743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.781363] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.781706] [ 14.781796] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.781928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.781944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.781968] Call Trace: [ 14.781996] <TASK> [ 14.782012] dump_stack_lvl+0x73/0xb0 [ 14.782041] print_report+0xd1/0x650 [ 14.782067] ? __virt_addr_valid+0x1db/0x2d0 [ 14.782092] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.782117] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.782142] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.782167] kasan_report+0x141/0x180 [ 14.782193] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.782222] kasan_check_range+0x10c/0x1c0 [ 14.782246] __kasan_check_write+0x18/0x20 [ 14.782268] kasan_atomics_helper+0x16e7/0x5450 [ 14.782294] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.782319] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.782344] ? kasan_atomics+0x152/0x310 [ 14.782369] kasan_atomics+0x1dc/0x310 [ 14.782391] ? __pfx_kasan_atomics+0x10/0x10 [ 14.782415] ? __pfx_read_tsc+0x10/0x10 [ 14.782437] ? ktime_get_ts64+0x86/0x230 [ 14.782467] kunit_try_run_case+0x1a5/0x480 [ 14.782491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.782712] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.782746] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.782773] ? __kthread_parkme+0x82/0x180 [ 14.782797] ? preempt_count_sub+0x50/0x80 [ 14.782826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.782849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.782891] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.782918] kthread+0x337/0x6f0 [ 14.782937] ? trace_preempt_on+0x20/0xc0 [ 14.782963] ? __pfx_kthread+0x10/0x10 [ 14.782984] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.783008] ? calculate_sigpending+0x7b/0xa0 [ 14.783032] ? __pfx_kthread+0x10/0x10 [ 14.783054] ret_from_fork+0x41/0x80 [ 14.783077] ? __pfx_kthread+0x10/0x10 [ 14.783097] ret_from_fork_asm+0x1a/0x30 [ 14.783130] </TASK> [ 14.783143] [ 14.793994] Allocated by task 285: [ 14.794141] kasan_save_stack+0x45/0x70 [ 14.794358] kasan_save_track+0x18/0x40 [ 14.794684] kasan_save_alloc_info+0x3b/0x50 [ 14.795045] __kasan_kmalloc+0xb7/0xc0 [ 14.795428] __kmalloc_cache_noprof+0x189/0x420 [ 14.795638] kasan_atomics+0x95/0x310 [ 14.795975] kunit_try_run_case+0x1a5/0x480 [ 14.796223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.796555] kthread+0x337/0x6f0 [ 14.796865] ret_from_fork+0x41/0x80 [ 14.797096] ret_from_fork_asm+0x1a/0x30 [ 14.797415] [ 14.797529] The buggy address belongs to the object at ffff8881029e6b00 [ 14.797529] which belongs to the cache kmalloc-64 of size 64 [ 14.798131] The buggy address is located 0 bytes to the right of [ 14.798131] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.798800] [ 14.798953] The buggy address belongs to the physical page: [ 14.799352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.799928] flags: 0x200000000000000(node=0|zone=2) [ 14.800183] page_type: f5(slab) [ 14.800344] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.800885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.801315] page dumped because: kasan: bad access detected [ 14.801748] [ 14.801835] Memory state around the buggy address: [ 14.802199] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.802717] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.803059] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.803627] ^ [ 14.803984] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.804439] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.804809] ================================================================== [ 14.040767] ================================================================== [ 14.041357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.041674] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.042116] [ 14.042243] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.042293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.042307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.042331] Call Trace: [ 14.042350] <TASK> [ 14.042369] dump_stack_lvl+0x73/0xb0 [ 14.042423] print_report+0xd1/0x650 [ 14.042450] ? __virt_addr_valid+0x1db/0x2d0 [ 14.042473] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.042498] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.042523] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.042548] kasan_report+0x141/0x180 [ 14.042573] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.042602] kasan_check_range+0x10c/0x1c0 [ 14.042625] __kasan_check_write+0x18/0x20 [ 14.042647] kasan_atomics_helper+0x7c7/0x5450 [ 14.042680] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.042727] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.042752] ? kasan_atomics+0x152/0x310 [ 14.042777] kasan_atomics+0x1dc/0x310 [ 14.042799] ? __pfx_kasan_atomics+0x10/0x10 [ 14.042823] ? __pfx_read_tsc+0x10/0x10 [ 14.042845] ? ktime_get_ts64+0x86/0x230 [ 14.042896] kunit_try_run_case+0x1a5/0x480 [ 14.043071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.043096] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.043123] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.043149] ? __kthread_parkme+0x82/0x180 [ 14.043174] ? preempt_count_sub+0x50/0x80 [ 14.043291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.043316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.043343] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.043369] kthread+0x337/0x6f0 [ 14.043389] ? trace_preempt_on+0x20/0xc0 [ 14.043415] ? __pfx_kthread+0x10/0x10 [ 14.043435] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.043460] ? calculate_sigpending+0x7b/0xa0 [ 14.043484] ? __pfx_kthread+0x10/0x10 [ 14.043505] ret_from_fork+0x41/0x80 [ 14.043528] ? __pfx_kthread+0x10/0x10 [ 14.043549] ret_from_fork_asm+0x1a/0x30 [ 14.043589] </TASK> [ 14.043602] [ 14.052740] Allocated by task 285: [ 14.052954] kasan_save_stack+0x45/0x70 [ 14.053244] kasan_save_track+0x18/0x40 [ 14.053590] kasan_save_alloc_info+0x3b/0x50 [ 14.053818] __kasan_kmalloc+0xb7/0xc0 [ 14.054122] __kmalloc_cache_noprof+0x189/0x420 [ 14.054364] kasan_atomics+0x95/0x310 [ 14.054566] kunit_try_run_case+0x1a5/0x480 [ 14.054772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.055061] kthread+0x337/0x6f0 [ 14.055366] ret_from_fork+0x41/0x80 [ 14.055668] ret_from_fork_asm+0x1a/0x30 [ 14.055822] [ 14.055914] The buggy address belongs to the object at ffff8881029e6b00 [ 14.055914] which belongs to the cache kmalloc-64 of size 64 [ 14.056540] The buggy address is located 0 bytes to the right of [ 14.056540] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.057149] [ 14.057252] The buggy address belongs to the physical page: [ 14.057495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.057834] flags: 0x200000000000000(node=0|zone=2) [ 14.058074] page_type: f5(slab) [ 14.058242] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.059521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.060661] page dumped because: kasan: bad access detected [ 14.061075] [ 14.061179] Memory state around the buggy address: [ 14.061399] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.062244] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.063046] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.063368] ^ [ 14.063741] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.064451] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.065087] ================================================================== [ 15.290442] ================================================================== [ 15.291109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.291548] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 15.291805] [ 15.291911] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 15.291961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.291975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.291999] Call Trace: [ 15.292019] <TASK> [ 15.292039] dump_stack_lvl+0x73/0xb0 [ 15.292070] print_report+0xd1/0x650 [ 15.292096] ? __virt_addr_valid+0x1db/0x2d0 [ 15.292120] ? kasan_atomics_helper+0x5115/0x5450 [ 15.292145] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.292171] ? kasan_atomics_helper+0x5115/0x5450 [ 15.292196] kasan_report+0x141/0x180 [ 15.292221] ? kasan_atomics_helper+0x5115/0x5450 [ 15.292252] __asan_report_load8_noabort+0x18/0x20 [ 15.292276] kasan_atomics_helper+0x5115/0x5450 [ 15.292327] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.292353] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.292378] ? kasan_atomics+0x152/0x310 [ 15.292403] kasan_atomics+0x1dc/0x310 [ 15.292425] ? __pfx_kasan_atomics+0x10/0x10 [ 15.292448] ? __pfx_read_tsc+0x10/0x10 [ 15.292471] ? ktime_get_ts64+0x86/0x230 [ 15.292500] kunit_try_run_case+0x1a5/0x480 [ 15.292524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.292546] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.292574] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.292602] ? __kthread_parkme+0x82/0x180 [ 15.292646] ? preempt_count_sub+0x50/0x80 [ 15.292675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.292698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.292724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.292750] kthread+0x337/0x6f0 [ 15.292770] ? trace_preempt_on+0x20/0xc0 [ 15.292796] ? __pfx_kthread+0x10/0x10 [ 15.292817] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.292841] ? calculate_sigpending+0x7b/0xa0 [ 15.292865] ? __pfx_kthread+0x10/0x10 [ 15.292895] ret_from_fork+0x41/0x80 [ 15.292918] ? __pfx_kthread+0x10/0x10 [ 15.292938] ret_from_fork_asm+0x1a/0x30 [ 15.292971] </TASK> [ 15.292985] [ 15.300801] Allocated by task 285: [ 15.301014] kasan_save_stack+0x45/0x70 [ 15.301253] kasan_save_track+0x18/0x40 [ 15.301458] kasan_save_alloc_info+0x3b/0x50 [ 15.301692] __kasan_kmalloc+0xb7/0xc0 [ 15.301983] __kmalloc_cache_noprof+0x189/0x420 [ 15.302243] kasan_atomics+0x95/0x310 [ 15.302407] kunit_try_run_case+0x1a5/0x480 [ 15.302559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.302887] kthread+0x337/0x6f0 [ 15.303051] ret_from_fork+0x41/0x80 [ 15.303202] ret_from_fork_asm+0x1a/0x30 [ 15.303401] [ 15.303506] The buggy address belongs to the object at ffff8881029e6b00 [ 15.303506] which belongs to the cache kmalloc-64 of size 64 [ 15.303935] The buggy address is located 0 bytes to the right of [ 15.303935] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 15.304389] [ 15.304490] The buggy address belongs to the physical page: [ 15.304746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 15.305107] flags: 0x200000000000000(node=0|zone=2) [ 15.305277] page_type: f5(slab) [ 15.305403] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.305634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.305993] page dumped because: kasan: bad access detected [ 15.306276] [ 15.306377] Memory state around the buggy address: [ 15.306631] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.307187] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.307400] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.307744] ^ [ 15.307985] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.308327] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.308537] ================================================================== [ 14.107253] ================================================================== [ 14.107603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.108025] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.108354] [ 14.108472] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.108535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.108550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.108574] Call Trace: [ 14.108595] <TASK> [ 14.108612] dump_stack_lvl+0x73/0xb0 [ 14.108641] print_report+0xd1/0x650 [ 14.108667] ? __virt_addr_valid+0x1db/0x2d0 [ 14.108692] ? kasan_atomics_helper+0x992/0x5450 [ 14.108716] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.108742] ? kasan_atomics_helper+0x992/0x5450 [ 14.108769] kasan_report+0x141/0x180 [ 14.108794] ? kasan_atomics_helper+0x992/0x5450 [ 14.108824] kasan_check_range+0x10c/0x1c0 [ 14.108859] __kasan_check_write+0x18/0x20 [ 14.108894] kasan_atomics_helper+0x992/0x5450 [ 14.108922] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.108948] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.108973] ? kasan_atomics+0x152/0x310 [ 14.108998] kasan_atomics+0x1dc/0x310 [ 14.109021] ? __pfx_kasan_atomics+0x10/0x10 [ 14.109045] ? __pfx_read_tsc+0x10/0x10 [ 14.109069] ? ktime_get_ts64+0x86/0x230 [ 14.109099] kunit_try_run_case+0x1a5/0x480 [ 14.109123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.109145] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.109173] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.109200] ? __kthread_parkme+0x82/0x180 [ 14.109225] ? preempt_count_sub+0x50/0x80 [ 14.109254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.109277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.109304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.109330] kthread+0x337/0x6f0 [ 14.109350] ? trace_preempt_on+0x20/0xc0 [ 14.109376] ? __pfx_kthread+0x10/0x10 [ 14.109397] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.109422] ? calculate_sigpending+0x7b/0xa0 [ 14.109446] ? __pfx_kthread+0x10/0x10 [ 14.109467] ret_from_fork+0x41/0x80 [ 14.109490] ? __pfx_kthread+0x10/0x10 [ 14.109511] ret_from_fork_asm+0x1a/0x30 [ 14.109544] </TASK> [ 14.109557] [ 14.117398] Allocated by task 285: [ 14.117579] kasan_save_stack+0x45/0x70 [ 14.117987] kasan_save_track+0x18/0x40 [ 14.118214] kasan_save_alloc_info+0x3b/0x50 [ 14.118432] __kasan_kmalloc+0xb7/0xc0 [ 14.118770] __kmalloc_cache_noprof+0x189/0x420 [ 14.119055] kasan_atomics+0x95/0x310 [ 14.119209] kunit_try_run_case+0x1a5/0x480 [ 14.119359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.119647] kthread+0x337/0x6f0 [ 14.119835] ret_from_fork+0x41/0x80 [ 14.120129] ret_from_fork_asm+0x1a/0x30 [ 14.120345] [ 14.120453] The buggy address belongs to the object at ffff8881029e6b00 [ 14.120453] which belongs to the cache kmalloc-64 of size 64 [ 14.121178] The buggy address is located 0 bytes to the right of [ 14.121178] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.121794] [ 14.122104] The buggy address belongs to the physical page: [ 14.122341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.122719] flags: 0x200000000000000(node=0|zone=2) [ 14.122934] page_type: f5(slab) [ 14.123230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.123531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.123993] page dumped because: kasan: bad access detected [ 14.124258] [ 14.124341] Memory state around the buggy address: [ 14.124683] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.125059] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.125290] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.125612] ^ [ 14.125894] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.126396] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.126768] ================================================================== [ 14.147908] ================================================================== [ 14.148611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.149133] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.149390] [ 14.149512] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.149560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.149574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.149597] Call Trace: [ 14.149614] <TASK> [ 14.149631] dump_stack_lvl+0x73/0xb0 [ 14.149659] print_report+0xd1/0x650 [ 14.149685] ? __virt_addr_valid+0x1db/0x2d0 [ 14.149710] ? kasan_atomics_helper+0xac7/0x5450 [ 14.149734] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.149772] ? kasan_atomics_helper+0xac7/0x5450 [ 14.149798] kasan_report+0x141/0x180 [ 14.149824] ? kasan_atomics_helper+0xac7/0x5450 [ 14.149853] kasan_check_range+0x10c/0x1c0 [ 14.149898] __kasan_check_write+0x18/0x20 [ 14.149925] kasan_atomics_helper+0xac7/0x5450 [ 14.149951] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.149978] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.150003] ? kasan_atomics+0x152/0x310 [ 14.150029] kasan_atomics+0x1dc/0x310 [ 14.150051] ? __pfx_kasan_atomics+0x10/0x10 [ 14.150075] ? __pfx_read_tsc+0x10/0x10 [ 14.150097] ? ktime_get_ts64+0x86/0x230 [ 14.150126] kunit_try_run_case+0x1a5/0x480 [ 14.150152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.150174] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.150201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.150228] ? __kthread_parkme+0x82/0x180 [ 14.150252] ? preempt_count_sub+0x50/0x80 [ 14.150280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.150304] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.150331] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.150357] kthread+0x337/0x6f0 [ 14.150377] ? trace_preempt_on+0x20/0xc0 [ 14.150403] ? __pfx_kthread+0x10/0x10 [ 14.150424] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.150449] ? calculate_sigpending+0x7b/0xa0 [ 14.150473] ? __pfx_kthread+0x10/0x10 [ 14.150494] ret_from_fork+0x41/0x80 [ 14.150569] ? __pfx_kthread+0x10/0x10 [ 14.150593] ret_from_fork_asm+0x1a/0x30 [ 14.150625] </TASK> [ 14.150638] [ 14.164469] Allocated by task 285: [ 14.164900] kasan_save_stack+0x45/0x70 [ 14.165265] kasan_save_track+0x18/0x40 [ 14.165441] kasan_save_alloc_info+0x3b/0x50 [ 14.165775] __kasan_kmalloc+0xb7/0xc0 [ 14.166378] __kmalloc_cache_noprof+0x189/0x420 [ 14.166717] kasan_atomics+0x95/0x310 [ 14.167118] kunit_try_run_case+0x1a5/0x480 [ 14.167425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.167895] kthread+0x337/0x6f0 [ 14.168090] ret_from_fork+0x41/0x80 [ 14.168241] ret_from_fork_asm+0x1a/0x30 [ 14.168454] [ 14.168599] The buggy address belongs to the object at ffff8881029e6b00 [ 14.168599] which belongs to the cache kmalloc-64 of size 64 [ 14.169337] The buggy address is located 0 bytes to the right of [ 14.169337] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.170023] [ 14.170124] The buggy address belongs to the physical page: [ 14.170398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.170783] flags: 0x200000000000000(node=0|zone=2) [ 14.171135] page_type: f5(slab) [ 14.171310] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.171654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.172132] page dumped because: kasan: bad access detected [ 14.172377] [ 14.172482] Memory state around the buggy address: [ 14.172810] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.173198] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.173736] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.174145] ^ [ 14.174434] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.174902] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.175363] ================================================================== [ 14.500421] ================================================================== [ 14.500753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.501087] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.501363] [ 14.501476] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.501541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.501555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.501579] Call Trace: [ 14.501595] <TASK> [ 14.501611] dump_stack_lvl+0x73/0xb0 [ 14.501639] print_report+0xd1/0x650 [ 14.501664] ? __virt_addr_valid+0x1db/0x2d0 [ 14.501687] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.501712] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.501738] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.501762] kasan_report+0x141/0x180 [ 14.501787] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.501817] __asan_report_load4_noabort+0x18/0x20 [ 14.501840] kasan_atomics_helper+0x4a02/0x5450 [ 14.501867] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.501905] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.501929] ? kasan_atomics+0x152/0x310 [ 14.501954] kasan_atomics+0x1dc/0x310 [ 14.501976] ? __pfx_kasan_atomics+0x10/0x10 [ 14.502000] ? __pfx_read_tsc+0x10/0x10 [ 14.502021] ? ktime_get_ts64+0x86/0x230 [ 14.502050] kunit_try_run_case+0x1a5/0x480 [ 14.502074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.502096] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.502122] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.502149] ? __kthread_parkme+0x82/0x180 [ 14.502172] ? preempt_count_sub+0x50/0x80 [ 14.502200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.502223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.502249] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.502276] kthread+0x337/0x6f0 [ 14.502295] ? trace_preempt_on+0x20/0xc0 [ 14.502320] ? __pfx_kthread+0x10/0x10 [ 14.502341] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.502366] ? calculate_sigpending+0x7b/0xa0 [ 14.502390] ? __pfx_kthread+0x10/0x10 [ 14.502411] ret_from_fork+0x41/0x80 [ 14.502434] ? __pfx_kthread+0x10/0x10 [ 14.502455] ret_from_fork_asm+0x1a/0x30 [ 14.502488] </TASK> [ 14.502500] [ 14.510665] Allocated by task 285: [ 14.510854] kasan_save_stack+0x45/0x70 [ 14.511237] kasan_save_track+0x18/0x40 [ 14.511478] kasan_save_alloc_info+0x3b/0x50 [ 14.511783] __kasan_kmalloc+0xb7/0xc0 [ 14.512063] __kmalloc_cache_noprof+0x189/0x420 [ 14.512260] kasan_atomics+0x95/0x310 [ 14.512452] kunit_try_run_case+0x1a5/0x480 [ 14.512715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.513018] kthread+0x337/0x6f0 [ 14.513206] ret_from_fork+0x41/0x80 [ 14.513377] ret_from_fork_asm+0x1a/0x30 [ 14.513599] [ 14.513693] The buggy address belongs to the object at ffff8881029e6b00 [ 14.513693] which belongs to the cache kmalloc-64 of size 64 [ 14.514086] The buggy address is located 0 bytes to the right of [ 14.514086] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.514610] [ 14.514687] The buggy address belongs to the physical page: [ 14.514914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.515299] flags: 0x200000000000000(node=0|zone=2) [ 14.515501] page_type: f5(slab) [ 14.515927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.516191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.516495] page dumped because: kasan: bad access detected [ 14.517014] [ 14.517095] Memory state around the buggy address: [ 14.517302] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.517562] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.517785] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.518090] ^ [ 14.518329] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.519057] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.519356] ================================================================== [ 14.890106] ================================================================== [ 14.890446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.890973] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285 [ 14.891295] [ 14.891393] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 14.891441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.891454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.891477] Call Trace: [ 14.891494] <TASK> [ 14.891511] dump_stack_lvl+0x73/0xb0 [ 14.891538] print_report+0xd1/0x650 [ 14.891564] ? __virt_addr_valid+0x1db/0x2d0 [ 14.891595] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.891619] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.891646] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.891670] kasan_report+0x141/0x180 [ 14.891695] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.891726] kasan_check_range+0x10c/0x1c0 [ 14.891751] __kasan_check_write+0x18/0x20 [ 14.891775] kasan_atomics_helper+0x19e3/0x5450 [ 14.891803] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.891828] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.891921] ? kasan_atomics+0x152/0x310 [ 14.891946] kasan_atomics+0x1dc/0x310 [ 14.891969] ? __pfx_kasan_atomics+0x10/0x10 [ 14.891992] ? __pfx_read_tsc+0x10/0x10 [ 14.892015] ? ktime_get_ts64+0x86/0x230 [ 14.892043] kunit_try_run_case+0x1a5/0x480 [ 14.892067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.892089] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.892115] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.892141] ? __kthread_parkme+0x82/0x180 [ 14.892165] ? preempt_count_sub+0x50/0x80 [ 14.892192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.892214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.892241] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.892266] kthread+0x337/0x6f0 [ 14.892285] ? trace_preempt_on+0x20/0xc0 [ 14.892312] ? __pfx_kthread+0x10/0x10 [ 14.892332] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.892357] ? calculate_sigpending+0x7b/0xa0 [ 14.892382] ? __pfx_kthread+0x10/0x10 [ 14.892403] ret_from_fork+0x41/0x80 [ 14.892427] ? __pfx_kthread+0x10/0x10 [ 14.892448] ret_from_fork_asm+0x1a/0x30 [ 14.892481] </TASK> [ 14.892493] [ 14.900827] Allocated by task 285: [ 14.900973] kasan_save_stack+0x45/0x70 [ 14.901198] kasan_save_track+0x18/0x40 [ 14.901401] kasan_save_alloc_info+0x3b/0x50 [ 14.901801] __kasan_kmalloc+0xb7/0xc0 [ 14.902227] __kmalloc_cache_noprof+0x189/0x420 [ 14.902448] kasan_atomics+0x95/0x310 [ 14.902646] kunit_try_run_case+0x1a5/0x480 [ 14.902854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.903096] kthread+0x337/0x6f0 [ 14.903258] ret_from_fork+0x41/0x80 [ 14.903410] ret_from_fork_asm+0x1a/0x30 [ 14.903643] [ 14.903737] The buggy address belongs to the object at ffff8881029e6b00 [ 14.903737] which belongs to the cache kmalloc-64 of size 64 [ 14.904235] The buggy address is located 0 bytes to the right of [ 14.904235] allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30) [ 14.904783] [ 14.904894] The buggy address belongs to the physical page: [ 14.905147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6 [ 14.905393] flags: 0x200000000000000(node=0|zone=2) [ 14.905563] page_type: f5(slab) [ 14.905689] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.905979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.906335] page dumped because: kasan: bad access detected [ 14.906657] [ 14.906755] Memory state around the buggy address: [ 14.907188] ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.907487] ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.907711] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.907939] ^ [ 14.908098] ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.908318] ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.908947] ==================================================================