Date
July 15, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.700994] ================================================================== [ 20.701051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.701101] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.701642] [ 20.701709] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.701821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.701852] Hardware name: linux,dummy-virt (DT) [ 20.701886] Call trace: [ 20.702108] show_stack+0x20/0x38 (C) [ 20.702201] dump_stack_lvl+0x8c/0xd0 [ 20.702308] print_report+0x118/0x5d0 [ 20.702428] kasan_report+0xdc/0x128 [ 20.702474] __asan_report_load8_noabort+0x20/0x30 [ 20.702527] kasan_atomics_helper+0x3f58/0x4858 [ 20.702624] kasan_atomics+0x198/0x2e0 [ 20.702857] kunit_try_run_case+0x170/0x3f0 [ 20.702942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.703000] kthread+0x328/0x630 [ 20.703046] ret_from_fork+0x10/0x20 [ 20.703095] [ 20.703115] Allocated by task 267: [ 20.703145] kasan_save_stack+0x3c/0x68 [ 20.703211] kasan_save_track+0x20/0x40 [ 20.703251] kasan_save_alloc_info+0x40/0x58 [ 20.703389] __kasan_kmalloc+0xd4/0xd8 [ 20.703568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.703609] kasan_atomics+0xb8/0x2e0 [ 20.703666] kunit_try_run_case+0x170/0x3f0 [ 20.703832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.703900] kthread+0x328/0x630 [ 20.703992] ret_from_fork+0x10/0x20 [ 20.704105] [ 20.704183] The buggy address belongs to the object at fff00000c59c9e00 [ 20.704183] which belongs to the cache kmalloc-64 of size 64 [ 20.704261] The buggy address is located 0 bytes to the right of [ 20.704261] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.704331] [ 20.704354] The buggy address belongs to the physical page: [ 20.704387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.704444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.704494] page_type: f5(slab) [ 20.705023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.705184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.705569] page dumped because: kasan: bad access detected [ 20.705616] [ 20.705711] Memory state around the buggy address: [ 20.705961] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.706013] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.706057] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.706100] ^ [ 20.706134] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.706181] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.706232] ================================================================== [ 20.830159] ================================================================== [ 20.830233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 20.830413] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.830478] [ 20.830510] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.830814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.830857] Hardware name: linux,dummy-virt (DT) [ 20.830892] Call trace: [ 20.831269] show_stack+0x20/0x38 (C) [ 20.831471] dump_stack_lvl+0x8c/0xd0 [ 20.831634] print_report+0x118/0x5d0 [ 20.831695] kasan_report+0xdc/0x128 [ 20.831742] kasan_check_range+0x100/0x1a8 [ 20.831792] __kasan_check_write+0x20/0x30 [ 20.832171] kasan_atomics_helper+0x1384/0x4858 [ 20.832262] kasan_atomics+0x198/0x2e0 [ 20.832668] kunit_try_run_case+0x170/0x3f0 [ 20.832747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.833071] kthread+0x328/0x630 [ 20.833142] ret_from_fork+0x10/0x20 [ 20.834042] [ 20.834588] Allocated by task 267: [ 20.834883] kasan_save_stack+0x3c/0x68 [ 20.835065] kasan_save_track+0x20/0x40 [ 20.835285] kasan_save_alloc_info+0x40/0x58 [ 20.835403] __kasan_kmalloc+0xd4/0xd8 [ 20.835645] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.835841] kasan_atomics+0xb8/0x2e0 [ 20.836028] kunit_try_run_case+0x170/0x3f0 [ 20.836180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.836336] kthread+0x328/0x630 [ 20.836398] ret_from_fork+0x10/0x20 [ 20.836440] [ 20.836462] The buggy address belongs to the object at fff00000c59c9e00 [ 20.836462] which belongs to the cache kmalloc-64 of size 64 [ 20.836529] The buggy address is located 0 bytes to the right of [ 20.836529] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.836600] [ 20.836640] The buggy address belongs to the physical page: [ 20.836674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.836730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.836781] page_type: f5(slab) [ 20.836821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.836885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.836932] page dumped because: kasan: bad access detected [ 20.836976] [ 20.837015] Memory state around the buggy address: [ 20.837060] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.837107] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.837153] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.837214] ^ [ 20.837248] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.837307] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.837742] ================================================================== [ 20.963144] ================================================================== [ 20.963199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 20.963267] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.963320] [ 20.963351] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.963562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.963602] Hardware name: linux,dummy-virt (DT) [ 20.963659] Call trace: [ 20.963686] show_stack+0x20/0x38 (C) [ 20.963737] dump_stack_lvl+0x8c/0xd0 [ 20.963798] print_report+0x118/0x5d0 [ 20.963845] kasan_report+0xdc/0x128 [ 20.963902] kasan_check_range+0x100/0x1a8 [ 20.963952] __kasan_check_write+0x20/0x30 [ 20.964000] kasan_atomics_helper+0x17ec/0x4858 [ 20.964051] kasan_atomics+0x198/0x2e0 [ 20.964103] kunit_try_run_case+0x170/0x3f0 [ 20.964154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.964225] kthread+0x328/0x630 [ 20.964272] ret_from_fork+0x10/0x20 [ 20.964321] [ 20.964351] Allocated by task 267: [ 20.964382] kasan_save_stack+0x3c/0x68 [ 20.964431] kasan_save_track+0x20/0x40 [ 20.964472] kasan_save_alloc_info+0x40/0x58 [ 20.964520] __kasan_kmalloc+0xd4/0xd8 [ 20.964559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.964603] kasan_atomics+0xb8/0x2e0 [ 20.964649] kunit_try_run_case+0x170/0x3f0 [ 20.964690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.964737] kthread+0x328/0x630 [ 20.964795] ret_from_fork+0x10/0x20 [ 20.964841] [ 20.964867] The buggy address belongs to the object at fff00000c59c9e00 [ 20.964867] which belongs to the cache kmalloc-64 of size 64 [ 20.964929] The buggy address is located 0 bytes to the right of [ 20.964929] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.965003] [ 20.965024] The buggy address belongs to the physical page: [ 20.965068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.965140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.965191] page_type: f5(slab) [ 20.965240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.965293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.965841] page dumped because: kasan: bad access detected [ 20.966100] [ 20.966129] Memory state around the buggy address: [ 20.966740] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.967225] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.967322] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.967396] ^ [ 20.967492] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.967569] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.967924] ================================================================== [ 20.896888] ================================================================== [ 20.897444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 20.897525] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.897650] [ 20.897719] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.898244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.898630] Hardware name: linux,dummy-virt (DT) [ 20.898709] Call trace: [ 20.898950] show_stack+0x20/0x38 (C) [ 20.899391] dump_stack_lvl+0x8c/0xd0 [ 20.899620] print_report+0x118/0x5d0 [ 20.899737] kasan_report+0xdc/0x128 [ 20.899990] __asan_report_load8_noabort+0x20/0x30 [ 20.900137] kasan_atomics_helper+0x3db0/0x4858 [ 20.900296] kasan_atomics+0x198/0x2e0 [ 20.900349] kunit_try_run_case+0x170/0x3f0 [ 20.900906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.901171] kthread+0x328/0x630 [ 20.901394] ret_from_fork+0x10/0x20 [ 20.901691] [ 20.901859] Allocated by task 267: [ 20.902083] kasan_save_stack+0x3c/0x68 [ 20.902318] kasan_save_track+0x20/0x40 [ 20.902702] kasan_save_alloc_info+0x40/0x58 [ 20.902831] __kasan_kmalloc+0xd4/0xd8 [ 20.902931] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.902972] kasan_atomics+0xb8/0x2e0 [ 20.903061] kunit_try_run_case+0x170/0x3f0 [ 20.903269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.903661] kthread+0x328/0x630 [ 20.903833] ret_from_fork+0x10/0x20 [ 20.904116] [ 20.904334] The buggy address belongs to the object at fff00000c59c9e00 [ 20.904334] which belongs to the cache kmalloc-64 of size 64 [ 20.904419] The buggy address is located 0 bytes to the right of [ 20.904419] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.904491] [ 20.904748] The buggy address belongs to the physical page: [ 20.904860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.904921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.905005] page_type: f5(slab) [ 20.905052] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.905119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.905165] page dumped because: kasan: bad access detected [ 20.905220] [ 20.905240] Memory state around the buggy address: [ 20.905295] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.905597] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.905944] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.906016] ^ [ 20.906067] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.906122] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.906303] ================================================================== [ 20.952623] ================================================================== [ 20.952788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 20.953311] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.953399] [ 20.953432] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.953516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.953544] Hardware name: linux,dummy-virt (DT) [ 20.953953] Call trace: [ 20.954313] show_stack+0x20/0x38 (C) [ 20.954397] dump_stack_lvl+0x8c/0xd0 [ 20.954558] print_report+0x118/0x5d0 [ 20.954744] kasan_report+0xdc/0x128 [ 20.954813] __asan_report_load8_noabort+0x20/0x30 [ 20.955085] kasan_atomics_helper+0x3e20/0x4858 [ 20.955309] kasan_atomics+0x198/0x2e0 [ 20.955585] kunit_try_run_case+0x170/0x3f0 [ 20.955800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.955927] kthread+0x328/0x630 [ 20.956318] ret_from_fork+0x10/0x20 [ 20.956427] [ 20.956637] Allocated by task 267: [ 20.956847] kasan_save_stack+0x3c/0x68 [ 20.956918] kasan_save_track+0x20/0x40 [ 20.957110] kasan_save_alloc_info+0x40/0x58 [ 20.957189] __kasan_kmalloc+0xd4/0xd8 [ 20.957245] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.957469] kasan_atomics+0xb8/0x2e0 [ 20.957679] kunit_try_run_case+0x170/0x3f0 [ 20.957920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.958080] kthread+0x328/0x630 [ 20.958562] ret_from_fork+0x10/0x20 [ 20.958876] [ 20.958938] The buggy address belongs to the object at fff00000c59c9e00 [ 20.958938] which belongs to the cache kmalloc-64 of size 64 [ 20.959020] The buggy address is located 0 bytes to the right of [ 20.959020] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.959333] [ 20.959398] The buggy address belongs to the physical page: [ 20.959643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.959848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.959995] page_type: f5(slab) [ 20.960291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.960652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.960731] page dumped because: kasan: bad access detected [ 20.961106] [ 20.961473] Memory state around the buggy address: [ 20.961632] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.961724] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.961780] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.961822] ^ [ 20.962031] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.962440] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.962631] ================================================================== [ 20.761599] ================================================================== [ 20.761740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 20.761787] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.761857] [ 20.761925] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.762038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.762107] Hardware name: linux,dummy-virt (DT) [ 20.762141] Call trace: [ 20.762184] show_stack+0x20/0x38 (C) [ 20.762247] dump_stack_lvl+0x8c/0xd0 [ 20.762294] print_report+0x118/0x5d0 [ 20.762341] kasan_report+0xdc/0x128 [ 20.762386] kasan_check_range+0x100/0x1a8 [ 20.762435] __kasan_check_write+0x20/0x30 [ 20.762516] kasan_atomics_helper+0xff0/0x4858 [ 20.762573] kasan_atomics+0x198/0x2e0 [ 20.762618] kunit_try_run_case+0x170/0x3f0 [ 20.762698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.762782] kthread+0x328/0x630 [ 20.762843] ret_from_fork+0x10/0x20 [ 20.762909] [ 20.762967] Allocated by task 267: [ 20.762996] kasan_save_stack+0x3c/0x68 [ 20.763054] kasan_save_track+0x20/0x40 [ 20.763111] kasan_save_alloc_info+0x40/0x58 [ 20.763166] __kasan_kmalloc+0xd4/0xd8 [ 20.763211] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.763252] kasan_atomics+0xb8/0x2e0 [ 20.763289] kunit_try_run_case+0x170/0x3f0 [ 20.763328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.763375] kthread+0x328/0x630 [ 20.763463] ret_from_fork+0x10/0x20 [ 20.763523] [ 20.763562] The buggy address belongs to the object at fff00000c59c9e00 [ 20.763562] which belongs to the cache kmalloc-64 of size 64 [ 20.763675] The buggy address is located 0 bytes to the right of [ 20.763675] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.763791] [ 20.763815] The buggy address belongs to the physical page: [ 20.763855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.763919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.763971] page_type: f5(slab) [ 20.764010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.764063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.764409] page dumped because: kasan: bad access detected [ 20.764449] [ 20.764468] Memory state around the buggy address: [ 20.764503] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.764549] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.764596] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.764709] ^ [ 20.764750] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.764805] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.764846] ================================================================== [ 20.778689] ================================================================== [ 20.778745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.778795] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.778848] [ 20.778880] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.778991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.779022] Hardware name: linux,dummy-virt (DT) [ 20.779055] Call trace: [ 20.779080] show_stack+0x20/0x38 (C) [ 20.779128] dump_stack_lvl+0x8c/0xd0 [ 20.779186] print_report+0x118/0x5d0 [ 20.779245] kasan_report+0xdc/0x128 [ 20.779291] kasan_check_range+0x100/0x1a8 [ 20.779341] __kasan_check_write+0x20/0x30 [ 20.779389] kasan_atomics_helper+0x1128/0x4858 [ 20.779437] kasan_atomics+0x198/0x2e0 [ 20.779482] kunit_try_run_case+0x170/0x3f0 [ 20.779531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.779586] kthread+0x328/0x630 [ 20.779643] ret_from_fork+0x10/0x20 [ 20.779690] [ 20.779711] Allocated by task 267: [ 20.779751] kasan_save_stack+0x3c/0x68 [ 20.779803] kasan_save_track+0x20/0x40 [ 20.779841] kasan_save_alloc_info+0x40/0x58 [ 20.779882] __kasan_kmalloc+0xd4/0xd8 [ 20.779918] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.779958] kasan_atomics+0xb8/0x2e0 [ 20.780002] kunit_try_run_case+0x170/0x3f0 [ 20.780044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.780093] kthread+0x328/0x630 [ 20.780131] ret_from_fork+0x10/0x20 [ 20.780167] [ 20.780187] The buggy address belongs to the object at fff00000c59c9e00 [ 20.780187] which belongs to the cache kmalloc-64 of size 64 [ 20.780607] The buggy address is located 0 bytes to the right of [ 20.780607] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.780694] [ 20.780961] The buggy address belongs to the physical page: [ 20.781044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.781105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.781434] page_type: f5(slab) [ 20.781550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.781795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.781861] page dumped because: kasan: bad access detected [ 20.782103] [ 20.782174] Memory state around the buggy address: [ 20.782519] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.782662] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.782719] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.782994] ^ [ 20.783103] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.783335] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.783587] ================================================================== [ 20.545195] ================================================================== [ 20.545263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 20.545339] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.545457] [ 20.545488] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.545572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.545602] Hardware name: linux,dummy-virt (DT) [ 20.546239] kasan_report+0xdc/0x128 [ 20.547081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.547257] kthread+0x328/0x630 [ 20.547384] ret_from_fork+0x10/0x20 [ 20.547620] [ 20.547641] Allocated by task 267: [ 20.547691] kasan_save_stack+0x3c/0x68 [ 20.547735] kasan_save_track+0x20/0x40 [ 20.547821] kasan_save_alloc_info+0x40/0x58 [ 20.547911] __kasan_kmalloc+0xd4/0xd8 [ 20.547948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.547989] kasan_atomics+0xb8/0x2e0 [ 20.548026] kunit_try_run_case+0x170/0x3f0 [ 20.548088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.548241] kthread+0x328/0x630 [ 20.548278] ret_from_fork+0x10/0x20 [ 20.548317] [ 20.548338] The buggy address belongs to the object at fff00000c59c9e00 [ 20.548338] which belongs to the cache kmalloc-64 of size 64 [ 20.548408] The buggy address is located 0 bytes to the right of [ 20.548408] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.548525] [ 20.548547] The buggy address belongs to the physical page: [ 20.548580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.548633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.549136] page_type: f5(slab) [ 20.549184] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.549251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.549551] page dumped because: kasan: bad access detected [ 20.549588] [ 20.549626] Memory state around the buggy address: [ 20.549692] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.549740] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.549804] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.549847] ^ [ 20.549882] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.549928] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.549969] ================================================================== [ 20.745848] ================================================================== [ 20.746056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 20.746252] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.746306] [ 20.746338] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.746423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.746453] Hardware name: linux,dummy-virt (DT) [ 20.746487] Call trace: [ 20.746509] show_stack+0x20/0x38 (C) [ 20.746556] dump_stack_lvl+0x8c/0xd0 [ 20.746606] print_report+0x118/0x5d0 [ 20.746653] kasan_report+0xdc/0x128 [ 20.746699] kasan_check_range+0x100/0x1a8 [ 20.749361] __kasan_check_write+0x20/0x30 [ 20.750157] kasan_atomics_helper+0xf20/0x4858 [ 20.750406] kasan_atomics+0x198/0x2e0 [ 20.750708] kunit_try_run_case+0x170/0x3f0 [ 20.751553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.752381] kthread+0x328/0x630 [ 20.752641] ret_from_fork+0x10/0x20 [ 20.752830] [ 20.752853] Allocated by task 267: [ 20.752963] kasan_save_stack+0x3c/0x68 [ 20.753008] kasan_save_track+0x20/0x40 [ 20.753046] kasan_save_alloc_info+0x40/0x58 [ 20.753088] __kasan_kmalloc+0xd4/0xd8 [ 20.754558] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.755029] kasan_atomics+0xb8/0x2e0 [ 20.755082] kunit_try_run_case+0x170/0x3f0 [ 20.756241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.756304] kthread+0x328/0x630 [ 20.756345] ret_from_fork+0x10/0x20 [ 20.756384] [ 20.756406] The buggy address belongs to the object at fff00000c59c9e00 [ 20.756406] which belongs to the cache kmalloc-64 of size 64 [ 20.756471] The buggy address is located 0 bytes to the right of [ 20.756471] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.756539] [ 20.756561] The buggy address belongs to the physical page: [ 20.756595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.756650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.756702] page_type: f5(slab) [ 20.756742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.756796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.756841] page dumped because: kasan: bad access detected [ 20.756877] [ 20.756897] Memory state around the buggy address: [ 20.756933] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.756982] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.757029] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.757116] ^ [ 20.757246] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.757364] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.757470] ================================================================== [ 20.784752] ================================================================== [ 20.784809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.785062] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.785224] [ 20.785268] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.786988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.787139] Hardware name: linux,dummy-virt (DT) [ 20.787312] Call trace: [ 20.787397] show_stack+0x20/0x38 (C) [ 20.789351] dump_stack_lvl+0x8c/0xd0 [ 20.789425] print_report+0x118/0x5d0 [ 20.789472] kasan_report+0xdc/0x128 [ 20.789521] kasan_check_range+0x100/0x1a8 [ 20.790312] __kasan_check_write+0x20/0x30 [ 20.790384] kasan_atomics_helper+0x1190/0x4858 [ 20.791254] kasan_atomics+0x198/0x2e0 [ 20.791754] kunit_try_run_case+0x170/0x3f0 [ 20.791843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.791904] kthread+0x328/0x630 [ 20.792100] ret_from_fork+0x10/0x20 [ 20.792369] [ 20.792677] Allocated by task 267: [ 20.792730] kasan_save_stack+0x3c/0x68 [ 20.792931] kasan_save_track+0x20/0x40 [ 20.793013] kasan_save_alloc_info+0x40/0x58 [ 20.793128] __kasan_kmalloc+0xd4/0xd8 [ 20.793185] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.793467] kasan_atomics+0xb8/0x2e0 [ 20.793757] kunit_try_run_case+0x170/0x3f0 [ 20.794025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.794133] kthread+0x328/0x630 [ 20.794331] ret_from_fork+0x10/0x20 [ 20.794388] [ 20.794411] The buggy address belongs to the object at fff00000c59c9e00 [ 20.794411] which belongs to the cache kmalloc-64 of size 64 [ 20.794476] The buggy address is located 0 bytes to the right of [ 20.794476] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.794546] [ 20.794568] The buggy address belongs to the physical page: [ 20.795265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.795357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.795411] page_type: f5(slab) [ 20.795477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.795544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.795598] page dumped because: kasan: bad access detected [ 20.795648] [ 20.795678] Memory state around the buggy address: [ 20.795733] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.795782] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.795828] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.795872] ^ [ 20.795909] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.795962] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.796004] ================================================================== [ 20.808935] ================================================================== [ 20.809086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 20.809138] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.809213] [ 20.809248] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.809638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.810021] Hardware name: linux,dummy-virt (DT) [ 20.810225] Call trace: [ 20.810467] show_stack+0x20/0x38 (C) [ 20.810606] dump_stack_lvl+0x8c/0xd0 [ 20.810784] print_report+0x118/0x5d0 [ 20.811117] kasan_report+0xdc/0x128 [ 20.811482] kasan_check_range+0x100/0x1a8 [ 20.811665] __kasan_check_write+0x20/0x30 [ 20.811839] kasan_atomics_helper+0x126c/0x4858 [ 20.811931] kasan_atomics+0x198/0x2e0 [ 20.811980] kunit_try_run_case+0x170/0x3f0 [ 20.812286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.812771] kthread+0x328/0x630 [ 20.812836] ret_from_fork+0x10/0x20 [ 20.812969] [ 20.812999] Allocated by task 267: [ 20.813061] kasan_save_stack+0x3c/0x68 [ 20.813107] kasan_save_track+0x20/0x40 [ 20.813145] kasan_save_alloc_info+0x40/0x58 [ 20.813195] __kasan_kmalloc+0xd4/0xd8 [ 20.813251] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.813293] kasan_atomics+0xb8/0x2e0 [ 20.813435] kunit_try_run_case+0x170/0x3f0 [ 20.813873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.813944] kthread+0x328/0x630 [ 20.813983] ret_from_fork+0x10/0x20 [ 20.814023] [ 20.814044] The buggy address belongs to the object at fff00000c59c9e00 [ 20.814044] which belongs to the cache kmalloc-64 of size 64 [ 20.814616] The buggy address is located 0 bytes to the right of [ 20.814616] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.815632] [ 20.815682] The buggy address belongs to the physical page: [ 20.815730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.815799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.815871] page_type: f5(slab) [ 20.815944] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.816187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.816343] page dumped because: kasan: bad access detected [ 20.816585] [ 20.816613] Memory state around the buggy address: [ 20.816802] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.817249] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.817309] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.817465] ^ [ 20.817511] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.817558] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.817909] ================================================================== [ 20.945599] ================================================================== [ 20.945654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 20.945705] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.945758] [ 20.946161] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.946278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.946314] Hardware name: linux,dummy-virt (DT) [ 20.946542] Call trace: [ 20.946577] show_stack+0x20/0x38 (C) [ 20.946631] dump_stack_lvl+0x8c/0xd0 [ 20.946847] print_report+0x118/0x5d0 [ 20.947078] kasan_report+0xdc/0x128 [ 20.947141] kasan_check_range+0x100/0x1a8 [ 20.947191] __kasan_check_write+0x20/0x30 [ 20.947458] kasan_atomics_helper+0x175c/0x4858 [ 20.947694] kasan_atomics+0x198/0x2e0 [ 20.947957] kunit_try_run_case+0x170/0x3f0 [ 20.948038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.948221] kthread+0x328/0x630 [ 20.948282] ret_from_fork+0x10/0x20 [ 20.948332] [ 20.948621] Allocated by task 267: [ 20.948863] kasan_save_stack+0x3c/0x68 [ 20.948933] kasan_save_track+0x20/0x40 [ 20.949062] kasan_save_alloc_info+0x40/0x58 [ 20.949115] __kasan_kmalloc+0xd4/0xd8 [ 20.949151] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.949391] kasan_atomics+0xb8/0x2e0 [ 20.949652] kunit_try_run_case+0x170/0x3f0 [ 20.949854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.949949] kthread+0x328/0x630 [ 20.950351] ret_from_fork+0x10/0x20 [ 20.950479] [ 20.950569] The buggy address belongs to the object at fff00000c59c9e00 [ 20.950569] which belongs to the cache kmalloc-64 of size 64 [ 20.950676] The buggy address is located 0 bytes to the right of [ 20.950676] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.950861] [ 20.950886] The buggy address belongs to the physical page: [ 20.950921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.951170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.951333] page_type: f5(slab) [ 20.951498] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.951569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.951616] page dumped because: kasan: bad access detected [ 20.951652] [ 20.951673] Memory state around the buggy address: [ 20.951718] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.951775] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.951831] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.951873] ^ [ 20.951910] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.951956] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.951997] ================================================================== [ 20.850618] ================================================================== [ 20.850776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 20.850980] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.851261] [ 20.851305] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.851394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.851431] Hardware name: linux,dummy-virt (DT) [ 20.851464] Call trace: [ 20.851728] show_stack+0x20/0x38 (C) [ 20.851808] dump_stack_lvl+0x8c/0xd0 [ 20.852036] print_report+0x118/0x5d0 [ 20.852101] kasan_report+0xdc/0x128 [ 20.852513] kasan_check_range+0x100/0x1a8 [ 20.852742] __kasan_check_write+0x20/0x30 [ 20.852805] kasan_atomics_helper+0x1414/0x4858 [ 20.852923] kasan_atomics+0x198/0x2e0 [ 20.852980] kunit_try_run_case+0x170/0x3f0 [ 20.853308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.853389] kthread+0x328/0x630 [ 20.853694] ret_from_fork+0x10/0x20 [ 20.853759] [ 20.853790] Allocated by task 267: [ 20.853819] kasan_save_stack+0x3c/0x68 [ 20.854020] kasan_save_track+0x20/0x40 [ 20.854307] kasan_save_alloc_info+0x40/0x58 [ 20.854485] __kasan_kmalloc+0xd4/0xd8 [ 20.854872] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.855021] kasan_atomics+0xb8/0x2e0 [ 20.855187] kunit_try_run_case+0x170/0x3f0 [ 20.855873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.855960] kthread+0x328/0x630 [ 20.856027] ret_from_fork+0x10/0x20 [ 20.856100] [ 20.856169] The buggy address belongs to the object at fff00000c59c9e00 [ 20.856169] which belongs to the cache kmalloc-64 of size 64 [ 20.856780] The buggy address is located 0 bytes to the right of [ 20.856780] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.856905] [ 20.857067] The buggy address belongs to the physical page: [ 20.857727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.857811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.857865] page_type: f5(slab) [ 20.858078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.858425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.858478] page dumped because: kasan: bad access detected [ 20.858514] [ 20.858535] Memory state around the buggy address: [ 20.858771] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.858845] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.858913] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.858965] ^ [ 20.859001] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.859057] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.859100] ================================================================== [ 20.770575] ================================================================== [ 20.770631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 20.770868] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.770942] [ 20.771003] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.771094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.771141] Hardware name: linux,dummy-virt (DT) [ 20.771175] Call trace: [ 20.771228] show_stack+0x20/0x38 (C) [ 20.771289] dump_stack_lvl+0x8c/0xd0 [ 20.771366] print_report+0x118/0x5d0 [ 20.771446] kasan_report+0xdc/0x128 [ 20.771513] kasan_check_range+0x100/0x1a8 [ 20.771562] __kasan_check_write+0x20/0x30 [ 20.771610] kasan_atomics_helper+0x10c0/0x4858 [ 20.771659] kasan_atomics+0x198/0x2e0 [ 20.771842] kunit_try_run_case+0x170/0x3f0 [ 20.771896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.772063] kthread+0x328/0x630 [ 20.772333] ret_from_fork+0x10/0x20 [ 20.772468] [ 20.772545] Allocated by task 267: [ 20.772579] kasan_save_stack+0x3c/0x68 [ 20.772638] kasan_save_track+0x20/0x40 [ 20.772679] kasan_save_alloc_info+0x40/0x58 [ 20.772720] __kasan_kmalloc+0xd4/0xd8 [ 20.772769] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.772817] kasan_atomics+0xb8/0x2e0 [ 20.772856] kunit_try_run_case+0x170/0x3f0 [ 20.772898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.772945] kthread+0x328/0x630 [ 20.772983] ret_from_fork+0x10/0x20 [ 20.773319] [ 20.773362] The buggy address belongs to the object at fff00000c59c9e00 [ 20.773362] which belongs to the cache kmalloc-64 of size 64 [ 20.773608] The buggy address is located 0 bytes to the right of [ 20.773608] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.773703] [ 20.773728] The buggy address belongs to the physical page: [ 20.773761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.774192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.774546] page_type: f5(slab) [ 20.774830] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.775123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.775389] page dumped because: kasan: bad access detected [ 20.775677] [ 20.775721] Memory state around the buggy address: [ 20.775787] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.776358] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.776477] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.776651] ^ [ 20.776996] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.777252] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.777322] ================================================================== [ 20.877559] ================================================================== [ 20.877614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 20.877663] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.877717] [ 20.878215] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.878639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.878682] Hardware name: linux,dummy-virt (DT) [ 20.878753] Call trace: [ 20.878779] show_stack+0x20/0x38 (C) [ 20.878919] dump_stack_lvl+0x8c/0xd0 [ 20.878978] print_report+0x118/0x5d0 [ 20.879350] kasan_report+0xdc/0x128 [ 20.879744] kasan_check_range+0x100/0x1a8 [ 20.880003] __kasan_check_write+0x20/0x30 [ 20.880087] kasan_atomics_helper+0x154c/0x4858 [ 20.880147] kasan_atomics+0x198/0x2e0 [ 20.880194] kunit_try_run_case+0x170/0x3f0 [ 20.880529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.880771] kthread+0x328/0x630 [ 20.881027] ret_from_fork+0x10/0x20 [ 20.881095] [ 20.881217] Allocated by task 267: [ 20.881253] kasan_save_stack+0x3c/0x68 [ 20.881295] kasan_save_track+0x20/0x40 [ 20.881386] kasan_save_alloc_info+0x40/0x58 [ 20.881451] __kasan_kmalloc+0xd4/0xd8 [ 20.881491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.881548] kasan_atomics+0xb8/0x2e0 [ 20.881587] kunit_try_run_case+0x170/0x3f0 [ 20.882333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.882486] kthread+0x328/0x630 [ 20.882550] ret_from_fork+0x10/0x20 [ 20.883025] [ 20.883095] The buggy address belongs to the object at fff00000c59c9e00 [ 20.883095] which belongs to the cache kmalloc-64 of size 64 [ 20.883173] The buggy address is located 0 bytes to the right of [ 20.883173] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.883433] [ 20.883459] The buggy address belongs to the physical page: [ 20.883598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.884192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.884337] page_type: f5(slab) [ 20.884378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.884607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.884727] page dumped because: kasan: bad access detected [ 20.884939] [ 20.885119] Memory state around the buggy address: [ 20.885696] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.885966] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.886160] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.886343] ^ [ 20.886470] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.886852] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.886956] ================================================================== [ 20.690434] ================================================================== [ 20.690497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.690546] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.690598] [ 20.690632] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.690717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.690747] Hardware name: linux,dummy-virt (DT) [ 20.690778] Call trace: [ 20.690803] show_stack+0x20/0x38 (C) [ 20.690850] dump_stack_lvl+0x8c/0xd0 [ 20.690899] print_report+0x118/0x5d0 [ 20.690946] kasan_report+0xdc/0x128 [ 20.690992] kasan_check_range+0x100/0x1a8 [ 20.691042] __kasan_check_read+0x20/0x30 [ 20.691089] kasan_atomics_helper+0xdd4/0x4858 [ 20.691137] kasan_atomics+0x198/0x2e0 [ 20.691181] kunit_try_run_case+0x170/0x3f0 [ 20.691240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.693247] kthread+0x328/0x630 [ 20.694164] ret_from_fork+0x10/0x20 [ 20.694368] [ 20.695059] Allocated by task 267: [ 20.695097] kasan_save_stack+0x3c/0x68 [ 20.695328] kasan_save_track+0x20/0x40 [ 20.695445] kasan_save_alloc_info+0x40/0x58 [ 20.695546] __kasan_kmalloc+0xd4/0xd8 [ 20.695624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.695713] kasan_atomics+0xb8/0x2e0 [ 20.695764] kunit_try_run_case+0x170/0x3f0 [ 20.695817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.695913] kthread+0x328/0x630 [ 20.695950] ret_from_fork+0x10/0x20 [ 20.695989] [ 20.696012] The buggy address belongs to the object at fff00000c59c9e00 [ 20.696012] which belongs to the cache kmalloc-64 of size 64 [ 20.696073] The buggy address is located 0 bytes to the right of [ 20.696073] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.696175] [ 20.696964] The buggy address belongs to the physical page: [ 20.697068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.697126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.697180] page_type: f5(slab) [ 20.697917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.698101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.698151] page dumped because: kasan: bad access detected [ 20.698186] [ 20.698250] Memory state around the buggy address: [ 20.698354] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.698762] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.698813] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.698854] ^ [ 20.698892] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.698941] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.698984] ================================================================== [ 20.871681] ================================================================== [ 20.871765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 20.871817] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.871908] [ 20.871942] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.872025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.872443] Hardware name: linux,dummy-virt (DT) [ 20.872615] Call trace: [ 20.872651] show_stack+0x20/0x38 (C) [ 20.872850] dump_stack_lvl+0x8c/0xd0 [ 20.872903] print_report+0x118/0x5d0 [ 20.872949] kasan_report+0xdc/0x128 [ 20.873014] kasan_check_range+0x100/0x1a8 [ 20.873068] __kasan_check_write+0x20/0x30 [ 20.873141] kasan_atomics_helper+0x14e4/0x4858 [ 20.873624] kasan_atomics+0x198/0x2e0 [ 20.873816] kunit_try_run_case+0x170/0x3f0 [ 20.874057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.874124] kthread+0x328/0x630 [ 20.874170] ret_from_fork+0x10/0x20 [ 20.874232] [ 20.874253] Allocated by task 267: [ 20.874285] kasan_save_stack+0x3c/0x68 [ 20.874489] kasan_save_track+0x20/0x40 [ 20.874660] kasan_save_alloc_info+0x40/0x58 [ 20.874727] __kasan_kmalloc+0xd4/0xd8 [ 20.874775] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.874841] kasan_atomics+0xb8/0x2e0 [ 20.874880] kunit_try_run_case+0x170/0x3f0 [ 20.874926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.874972] kthread+0x328/0x630 [ 20.875021] ret_from_fork+0x10/0x20 [ 20.875060] [ 20.875082] The buggy address belongs to the object at fff00000c59c9e00 [ 20.875082] which belongs to the cache kmalloc-64 of size 64 [ 20.875156] The buggy address is located 0 bytes to the right of [ 20.875156] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.875254] [ 20.875277] The buggy address belongs to the physical page: [ 20.875319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.875375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.875427] page_type: f5(slab) [ 20.875468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.875523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.875570] page dumped because: kasan: bad access detected [ 20.875624] [ 20.875653] Memory state around the buggy address: [ 20.875697] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.875743] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.875790] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.875840] ^ [ 20.875883] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.875929] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.875978] ================================================================== [ 20.860189] ================================================================== [ 20.860553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 20.860635] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.860823] [ 20.861012] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.861110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.861276] Hardware name: linux,dummy-virt (DT) [ 20.861525] Call trace: [ 20.861585] show_stack+0x20/0x38 (C) [ 20.861700] dump_stack_lvl+0x8c/0xd0 [ 20.861768] print_report+0x118/0x5d0 [ 20.862037] kasan_report+0xdc/0x128 [ 20.862412] kasan_check_range+0x100/0x1a8 [ 20.862537] __kasan_check_write+0x20/0x30 [ 20.862712] kasan_atomics_helper+0x147c/0x4858 [ 20.862975] kasan_atomics+0x198/0x2e0 [ 20.863141] kunit_try_run_case+0x170/0x3f0 [ 20.863358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.863752] kthread+0x328/0x630 [ 20.863823] ret_from_fork+0x10/0x20 [ 20.864176] [ 20.864296] Allocated by task 267: [ 20.864463] kasan_save_stack+0x3c/0x68 [ 20.864599] kasan_save_track+0x20/0x40 [ 20.864640] kasan_save_alloc_info+0x40/0x58 [ 20.864681] __kasan_kmalloc+0xd4/0xd8 [ 20.864891] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.865394] kasan_atomics+0xb8/0x2e0 [ 20.865587] kunit_try_run_case+0x170/0x3f0 [ 20.866183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.866540] kthread+0x328/0x630 [ 20.866737] ret_from_fork+0x10/0x20 [ 20.866854] [ 20.866905] The buggy address belongs to the object at fff00000c59c9e00 [ 20.866905] which belongs to the cache kmalloc-64 of size 64 [ 20.867327] The buggy address is located 0 bytes to the right of [ 20.867327] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.867585] [ 20.867834] The buggy address belongs to the physical page: [ 20.868131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.868427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.868516] page_type: f5(slab) [ 20.868855] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.869200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.869466] page dumped because: kasan: bad access detected [ 20.869619] [ 20.869695] Memory state around the buggy address: [ 20.869742] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.869805] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.869852] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.869895] ^ [ 20.869929] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.869976] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.870016] ================================================================== [ 20.539346] ================================================================== [ 20.539581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.539829] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.539890] [ 20.539955] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.540196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.540292] Hardware name: linux,dummy-virt (DT) [ 20.540340] Call trace: [ 20.540460] show_stack+0x20/0x38 (C) [ 20.540514] dump_stack_lvl+0x8c/0xd0 [ 20.540572] print_report+0x118/0x5d0 [ 20.540687] kasan_report+0xdc/0x128 [ 20.540919] kasan_check_range+0x100/0x1a8 [ 20.541230] __kasan_check_write+0x20/0x30 [ 20.541284] kasan_atomics_helper+0x99c/0x4858 [ 20.541399] kasan_atomics+0x198/0x2e0 [ 20.541447] kunit_try_run_case+0x170/0x3f0 [ 20.541496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.541570] kthread+0x328/0x630 [ 20.541619] ret_from_fork+0x10/0x20 [ 20.541666] [ 20.541686] Allocated by task 267: [ 20.541715] kasan_save_stack+0x3c/0x68 [ 20.541837] kasan_save_track+0x20/0x40 [ 20.541878] kasan_save_alloc_info+0x40/0x58 [ 20.541918] __kasan_kmalloc+0xd4/0xd8 [ 20.541957] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.541996] kasan_atomics+0xb8/0x2e0 [ 20.542034] kunit_try_run_case+0x170/0x3f0 [ 20.542074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.542122] kthread+0x328/0x630 [ 20.542420] ret_from_fork+0x10/0x20 [ 20.542479] [ 20.542501] The buggy address belongs to the object at fff00000c59c9e00 [ 20.542501] which belongs to the cache kmalloc-64 of size 64 [ 20.542563] The buggy address is located 0 bytes to the right of [ 20.542563] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.542684] [ 20.542739] The buggy address belongs to the physical page: [ 20.542778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.542874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.542923] page_type: f5(slab) [ 20.542963] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.543073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.543303] page dumped because: kasan: bad access detected [ 20.543450] [ 20.543470] Memory state around the buggy address: [ 20.543530] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.543578] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.543624] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.543699] ^ [ 20.543794] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.543840] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.543902] ================================================================== [ 20.907298] ================================================================== [ 20.907489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 20.907560] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.907614] [ 20.908081] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.908189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.908235] Hardware name: linux,dummy-virt (DT) [ 20.908628] Call trace: [ 20.908688] show_stack+0x20/0x38 (C) [ 20.908775] dump_stack_lvl+0x8c/0xd0 [ 20.908830] print_report+0x118/0x5d0 [ 20.908936] kasan_report+0xdc/0x128 [ 20.908982] kasan_check_range+0x100/0x1a8 [ 20.909046] __kasan_check_write+0x20/0x30 [ 20.909097] kasan_atomics_helper+0x1644/0x4858 [ 20.909281] kasan_atomics+0x198/0x2e0 [ 20.909697] kunit_try_run_case+0x170/0x3f0 [ 20.909813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.909985] kthread+0x328/0x630 [ 20.910136] ret_from_fork+0x10/0x20 [ 20.910198] [ 20.910234] Allocated by task 267: [ 20.910263] kasan_save_stack+0x3c/0x68 [ 20.910661] kasan_save_track+0x20/0x40 [ 20.910967] kasan_save_alloc_info+0x40/0x58 [ 20.911238] __kasan_kmalloc+0xd4/0xd8 [ 20.911427] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.911523] kasan_atomics+0xb8/0x2e0 [ 20.911561] kunit_try_run_case+0x170/0x3f0 [ 20.911827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.912283] kthread+0x328/0x630 [ 20.912535] ret_from_fork+0x10/0x20 [ 20.912635] [ 20.912691] The buggy address belongs to the object at fff00000c59c9e00 [ 20.912691] which belongs to the cache kmalloc-64 of size 64 [ 20.912983] The buggy address is located 0 bytes to the right of [ 20.912983] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.913061] [ 20.913457] The buggy address belongs to the physical page: [ 20.913768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.913956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.914012] page_type: f5(slab) [ 20.914050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.914835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.915226] page dumped because: kasan: bad access detected [ 20.915293] [ 20.915471] Memory state around the buggy address: [ 20.915682] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.915736] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.916145] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.916196] ^ [ 20.916256] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.916301] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.916354] ================================================================== [ 20.887756] ================================================================== [ 20.887817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 20.887872] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.887981] [ 20.888016] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.888114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.888278] Hardware name: linux,dummy-virt (DT) [ 20.888316] Call trace: [ 20.888343] show_stack+0x20/0x38 (C) [ 20.888561] dump_stack_lvl+0x8c/0xd0 [ 20.888652] print_report+0x118/0x5d0 [ 20.888904] kasan_report+0xdc/0x128 [ 20.889168] kasan_check_range+0x100/0x1a8 [ 20.889252] __kasan_check_write+0x20/0x30 [ 20.889303] kasan_atomics_helper+0x15b4/0x4858 [ 20.889926] kasan_atomics+0x198/0x2e0 [ 20.890094] kunit_try_run_case+0x170/0x3f0 [ 20.890170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.890243] kthread+0x328/0x630 [ 20.890289] ret_from_fork+0x10/0x20 [ 20.890953] [ 20.891002] Allocated by task 267: [ 20.891192] kasan_save_stack+0x3c/0x68 [ 20.891358] kasan_save_track+0x20/0x40 [ 20.891455] kasan_save_alloc_info+0x40/0x58 [ 20.891588] __kasan_kmalloc+0xd4/0xd8 [ 20.891819] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.892225] kasan_atomics+0xb8/0x2e0 [ 20.892416] kunit_try_run_case+0x170/0x3f0 [ 20.892697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.893195] kthread+0x328/0x630 [ 20.893781] ret_from_fork+0x10/0x20 [ 20.893845] [ 20.894003] The buggy address belongs to the object at fff00000c59c9e00 [ 20.894003] which belongs to the cache kmalloc-64 of size 64 [ 20.894184] The buggy address is located 0 bytes to the right of [ 20.894184] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.894404] [ 20.894432] The buggy address belongs to the physical page: [ 20.894925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.895174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.895443] page_type: f5(slab) [ 20.895617] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.895702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.895860] page dumped because: kasan: bad access detected [ 20.895906] [ 20.895926] Memory state around the buggy address: [ 20.895964] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.896011] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.896059] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.896103] ^ [ 20.896338] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.896418] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.896469] ================================================================== [ 20.527881] ================================================================== [ 20.527928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 20.527993] Read of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.528259] [ 20.528407] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.528597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.528633] Hardware name: linux,dummy-virt (DT) [ 20.528667] Call trace: [ 20.528688] show_stack+0x20/0x38 (C) [ 20.528746] dump_stack_lvl+0x8c/0xd0 [ 20.528989] print_report+0x118/0x5d0 [ 20.529043] kasan_report+0xdc/0x128 [ 20.529192] __asan_report_load4_noabort+0x20/0x30 [ 20.529282] kasan_atomics_helper+0x42d8/0x4858 [ 20.529402] kasan_atomics+0x198/0x2e0 [ 20.529448] kunit_try_run_case+0x170/0x3f0 [ 20.529499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.529557] kthread+0x328/0x630 [ 20.529644] ret_from_fork+0x10/0x20 [ 20.529692] [ 20.529940] Allocated by task 267: [ 20.530089] kasan_save_track+0x20/0x40 [ 20.530348] kasan_save_alloc_info+0x40/0x58 [ 20.530400] __kasan_kmalloc+0xd4/0xd8 [ 20.530439] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.530723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.531236] [ 20.531335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.532286] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.533689] ================================================================== [ 20.757918] ================================================================== [ 20.758000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 20.758076] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.758129] [ 20.758191] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.758290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.758343] Hardware name: linux,dummy-virt (DT) [ 20.758378] Call trace: [ 20.758401] show_stack+0x20/0x38 (C) [ 20.758450] dump_stack_lvl+0x8c/0xd0 [ 20.758515] print_report+0x118/0x5d0 [ 20.758590] kasan_report+0xdc/0x128 [ 20.758777] kasan_check_range+0x100/0x1a8 [ 20.758856] __kasan_check_write+0x20/0x30 [ 20.758955] kasan_atomics_helper+0xf88/0x4858 [ 20.759051] kasan_atomics+0x198/0x2e0 [ 20.759097] kunit_try_run_case+0x170/0x3f0 [ 20.759192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.759275] kthread+0x328/0x630 [ 20.759321] ret_from_fork+0x10/0x20 [ 20.759396] [ 20.759436] Allocated by task 267: [ 20.759483] kasan_save_stack+0x3c/0x68 [ 20.759525] kasan_save_track+0x20/0x40 [ 20.759562] kasan_save_alloc_info+0x40/0x58 [ 20.759603] __kasan_kmalloc+0xd4/0xd8 [ 20.759914] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.759963] kasan_atomics+0xb8/0x2e0 [ 20.760000] kunit_try_run_case+0x170/0x3f0 [ 20.760096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.760154] kthread+0x328/0x630 [ 20.760193] ret_from_fork+0x10/0x20 [ 20.760244] [ 20.760264] The buggy address belongs to the object at fff00000c59c9e00 [ 20.760264] which belongs to the cache kmalloc-64 of size 64 [ 20.760494] The buggy address is located 0 bytes to the right of [ 20.760494] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.760562] [ 20.760621] The buggy address belongs to the physical page: [ 20.760678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.760753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.760821] page_type: f5(slab) [ 20.760890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.760974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.761029] page dumped because: kasan: bad access detected [ 20.761075] [ 20.761095] Memory state around the buggy address: [ 20.761129] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.761176] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.761232] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.761274] ^ [ 20.761307] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.761364] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.761406] ================================================================== [ 20.652631] ================================================================== [ 20.652690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.652740] Read of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.652795] [ 20.652826] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.653720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.653984] Hardware name: linux,dummy-virt (DT) [ 20.654152] Call trace: [ 20.654326] show_stack+0x20/0x38 (C) [ 20.654805] dump_stack_lvl+0x8c/0xd0 [ 20.654863] print_report+0x118/0x5d0 [ 20.655801] kasan_report+0xdc/0x128 [ 20.656161] __asan_report_load4_noabort+0x20/0x30 [ 20.656300] kasan_atomics_helper+0x3dd8/0x4858 [ 20.656350] kasan_atomics+0x198/0x2e0 [ 20.656398] kunit_try_run_case+0x170/0x3f0 [ 20.656449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.656505] kthread+0x328/0x630 [ 20.656553] ret_from_fork+0x10/0x20 [ 20.656951] [ 20.657264] Allocated by task 267: [ 20.657302] kasan_save_stack+0x3c/0x68 [ 20.657347] kasan_save_track+0x20/0x40 [ 20.657384] kasan_save_alloc_info+0x40/0x58 [ 20.657433] __kasan_kmalloc+0xd4/0xd8 [ 20.657471] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.657511] kasan_atomics+0xb8/0x2e0 [ 20.658421] kunit_try_run_case+0x170/0x3f0 [ 20.658494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.658651] kthread+0x328/0x630 [ 20.658721] ret_from_fork+0x10/0x20 [ 20.659046] [ 20.659072] The buggy address belongs to the object at fff00000c59c9e00 [ 20.659072] which belongs to the cache kmalloc-64 of size 64 [ 20.659400] The buggy address is located 0 bytes to the right of [ 20.659400] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.659563] [ 20.659587] The buggy address belongs to the physical page: [ 20.659780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.660030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.660502] page_type: f5(slab) [ 20.660699] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.660953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.661077] page dumped because: kasan: bad access detected [ 20.661395] [ 20.661574] Memory state around the buggy address: [ 20.661617] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.661732] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.661781] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.661824] ^ [ 20.662252] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.662355] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.662397] ================================================================== [ 20.818699] ================================================================== [ 20.818762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 20.819056] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.819295] [ 20.819340] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.819428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.819586] Hardware name: linux,dummy-virt (DT) [ 20.819623] Call trace: [ 20.819698] show_stack+0x20/0x38 (C) [ 20.819887] dump_stack_lvl+0x8c/0xd0 [ 20.820099] print_report+0x118/0x5d0 [ 20.820310] kasan_report+0xdc/0x128 [ 20.820372] kasan_check_range+0x100/0x1a8 [ 20.820568] __kasan_check_write+0x20/0x30 [ 20.820695] kasan_atomics_helper+0x12d8/0x4858 [ 20.820859] kasan_atomics+0x198/0x2e0 [ 20.820913] kunit_try_run_case+0x170/0x3f0 [ 20.820964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.821019] kthread+0x328/0x630 [ 20.821066] ret_from_fork+0x10/0x20 [ 20.821113] [ 20.821136] Allocated by task 267: [ 20.821165] kasan_save_stack+0x3c/0x68 [ 20.821573] kasan_save_track+0x20/0x40 [ 20.821867] kasan_save_alloc_info+0x40/0x58 [ 20.821984] __kasan_kmalloc+0xd4/0xd8 [ 20.822254] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.822352] kasan_atomics+0xb8/0x2e0 [ 20.822451] kunit_try_run_case+0x170/0x3f0 [ 20.822498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.822544] kthread+0x328/0x630 [ 20.822603] ret_from_fork+0x10/0x20 [ 20.823128] [ 20.823199] The buggy address belongs to the object at fff00000c59c9e00 [ 20.823199] which belongs to the cache kmalloc-64 of size 64 [ 20.823439] The buggy address is located 0 bytes to the right of [ 20.823439] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.823517] [ 20.823739] The buggy address belongs to the physical page: [ 20.824035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.824164] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.824353] page_type: f5(slab) [ 20.824703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.824947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.825272] page dumped because: kasan: bad access detected [ 20.825810] [ 20.827223] Memory state around the buggy address: [ 20.827762] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.827964] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.828156] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.828351] ^ [ 20.828397] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.828871] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.829169] ================================================================== [ 20.715515] ================================================================== [ 20.715696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 20.715751] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.715805] [ 20.715837] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.715921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.716265] Hardware name: linux,dummy-virt (DT) [ 20.716506] Call trace: [ 20.716606] show_stack+0x20/0x38 (C) [ 20.716658] dump_stack_lvl+0x8c/0xd0 [ 20.716815] print_report+0x118/0x5d0 [ 20.717048] kasan_report+0xdc/0x128 [ 20.717191] __asan_report_store8_noabort+0x20/0x30 [ 20.717255] kasan_atomics_helper+0x3e5c/0x4858 [ 20.717306] kasan_atomics+0x198/0x2e0 [ 20.717389] kunit_try_run_case+0x170/0x3f0 [ 20.717719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.717916] kthread+0x328/0x630 [ 20.717971] ret_from_fork+0x10/0x20 [ 20.718239] [ 20.718665] Allocated by task 267: [ 20.718765] kasan_save_stack+0x3c/0x68 [ 20.719098] kasan_save_track+0x20/0x40 [ 20.719366] kasan_save_alloc_info+0x40/0x58 [ 20.719601] __kasan_kmalloc+0xd4/0xd8 [ 20.719725] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.720016] kasan_atomics+0xb8/0x2e0 [ 20.720305] kunit_try_run_case+0x170/0x3f0 [ 20.720509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.720598] kthread+0x328/0x630 [ 20.720638] ret_from_fork+0x10/0x20 [ 20.720677] [ 20.720744] The buggy address belongs to the object at fff00000c59c9e00 [ 20.720744] which belongs to the cache kmalloc-64 of size 64 [ 20.721018] The buggy address is located 0 bytes to the right of [ 20.721018] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.721092] [ 20.721119] The buggy address belongs to the physical page: [ 20.721186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.721275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.721377] page_type: f5(slab) [ 20.721419] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.721529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.722072] page dumped because: kasan: bad access detected [ 20.722113] [ 20.722133] Memory state around the buggy address: [ 20.722169] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.722227] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.722633] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.722696] ^ [ 20.722799] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.722846] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.723146] ================================================================== [ 20.707652] ================================================================== [ 20.707807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 20.708043] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.708195] [ 20.708290] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.708375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.708411] Hardware name: linux,dummy-virt (DT) [ 20.708580] Call trace: [ 20.708687] show_stack+0x20/0x38 (C) [ 20.708865] dump_stack_lvl+0x8c/0xd0 [ 20.708948] print_report+0x118/0x5d0 [ 20.708993] kasan_report+0xdc/0x128 [ 20.709039] kasan_check_range+0x100/0x1a8 [ 20.709088] __kasan_check_write+0x20/0x30 [ 20.709137] kasan_atomics_helper+0xe44/0x4858 [ 20.709190] kasan_atomics+0x198/0x2e0 [ 20.709619] kunit_try_run_case+0x170/0x3f0 [ 20.709825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.709885] kthread+0x328/0x630 [ 20.710430] ret_from_fork+0x10/0x20 [ 20.710629] [ 20.710650] Allocated by task 267: [ 20.710679] kasan_save_stack+0x3c/0x68 [ 20.710723] kasan_save_track+0x20/0x40 [ 20.710761] kasan_save_alloc_info+0x40/0x58 [ 20.711083] __kasan_kmalloc+0xd4/0xd8 [ 20.711129] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.711349] kasan_atomics+0xb8/0x2e0 [ 20.711393] kunit_try_run_case+0x170/0x3f0 [ 20.711436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.711485] kthread+0x328/0x630 [ 20.711802] ret_from_fork+0x10/0x20 [ 20.711845] [ 20.711867] The buggy address belongs to the object at fff00000c59c9e00 [ 20.711867] which belongs to the cache kmalloc-64 of size 64 [ 20.712214] The buggy address is located 0 bytes to the right of [ 20.712214] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.712285] [ 20.712309] The buggy address belongs to the physical page: [ 20.712354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.712411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.712824] page_type: f5(slab) [ 20.712866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.713299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.713377] page dumped because: kasan: bad access detected [ 20.713413] [ 20.713435] Memory state around the buggy address: [ 20.713470] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.713665] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.713854] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.713898] ^ [ 20.713944] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.714236] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.714513] ================================================================== [ 20.924361] ================================================================== [ 20.924412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 20.924459] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.924519] [ 20.924549] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.924633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.924673] Hardware name: linux,dummy-virt (DT) [ 20.924716] Call trace: [ 20.924748] show_stack+0x20/0x38 (C) [ 20.924797] dump_stack_lvl+0x8c/0xd0 [ 20.924848] print_report+0x118/0x5d0 [ 20.924898] kasan_report+0xdc/0x128 [ 20.924945] kasan_check_range+0x100/0x1a8 [ 20.924994] __kasan_check_write+0x20/0x30 [ 20.925041] kasan_atomics_helper+0x16d0/0x4858 [ 20.925095] kasan_atomics+0x198/0x2e0 [ 20.925139] kunit_try_run_case+0x170/0x3f0 [ 20.925189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.925728] kthread+0x328/0x630 [ 20.925830] ret_from_fork+0x10/0x20 [ 20.925894] [ 20.925914] Allocated by task 267: [ 20.925945] kasan_save_stack+0x3c/0x68 [ 20.925985] kasan_save_track+0x20/0x40 [ 20.926515] kasan_save_alloc_info+0x40/0x58 [ 20.926593] __kasan_kmalloc+0xd4/0xd8 [ 20.926670] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.926983] kasan_atomics+0xb8/0x2e0 [ 20.927106] kunit_try_run_case+0x170/0x3f0 [ 20.927176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.927236] kthread+0x328/0x630 [ 20.927586] ret_from_fork+0x10/0x20 [ 20.927960] [ 20.928079] The buggy address belongs to the object at fff00000c59c9e00 [ 20.928079] which belongs to the cache kmalloc-64 of size 64 [ 20.928556] The buggy address is located 0 bytes to the right of [ 20.928556] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.928983] [ 20.929359] The buggy address belongs to the physical page: [ 20.929436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.929514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.929849] page_type: f5(slab) [ 20.929901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.930094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.930309] page dumped because: kasan: bad access detected [ 20.930429] [ 20.930621] Memory state around the buggy address: [ 20.930715] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.930766] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.931198] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.931449] ^ [ 20.931604] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.931934] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.932194] ================================================================== [ 20.764952] ================================================================== [ 20.765063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 20.765176] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.765242] [ 20.765271] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.765364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.765394] Hardware name: linux,dummy-virt (DT) [ 20.765426] Call trace: [ 20.765450] show_stack+0x20/0x38 (C) [ 20.765497] dump_stack_lvl+0x8c/0xd0 [ 20.765581] print_report+0x118/0x5d0 [ 20.765689] kasan_report+0xdc/0x128 [ 20.765765] kasan_check_range+0x100/0x1a8 [ 20.765852] __kasan_check_write+0x20/0x30 [ 20.765951] kasan_atomics_helper+0x1058/0x4858 [ 20.766002] kasan_atomics+0x198/0x2e0 [ 20.766071] kunit_try_run_case+0x170/0x3f0 [ 20.766120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.766175] kthread+0x328/0x630 [ 20.766232] ret_from_fork+0x10/0x20 [ 20.766279] [ 20.766300] Allocated by task 267: [ 20.766329] kasan_save_stack+0x3c/0x68 [ 20.766368] kasan_save_track+0x20/0x40 [ 20.766406] kasan_save_alloc_info+0x40/0x58 [ 20.766669] __kasan_kmalloc+0xd4/0xd8 [ 20.766782] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.766894] kasan_atomics+0xb8/0x2e0 [ 20.766971] kunit_try_run_case+0x170/0x3f0 [ 20.767101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.767498] kthread+0x328/0x630 [ 20.767574] ret_from_fork+0x10/0x20 [ 20.767723] [ 20.767752] The buggy address belongs to the object at fff00000c59c9e00 [ 20.767752] which belongs to the cache kmalloc-64 of size 64 [ 20.767815] The buggy address is located 0 bytes to the right of [ 20.767815] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.767916] [ 20.767949] The buggy address belongs to the physical page: [ 20.767996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.768060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.768110] page_type: f5(slab) [ 20.768148] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.768364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.768660] page dumped because: kasan: bad access detected [ 20.768697] [ 20.768764] Memory state around the buggy address: [ 20.768839] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.768950] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.769016] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.769419] ^ [ 20.769498] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.769607] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.769648] ================================================================== [ 20.664370] ================================================================== [ 20.664425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.664476] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.664529] [ 20.664561] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.664646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.666105] Hardware name: linux,dummy-virt (DT) [ 20.666297] Call trace: [ 20.666328] show_stack+0x20/0x38 (C) [ 20.666798] dump_stack_lvl+0x8c/0xd0 [ 20.666865] print_report+0x118/0x5d0 [ 20.667282] kasan_report+0xdc/0x128 [ 20.667343] kasan_check_range+0x100/0x1a8 [ 20.667392] __kasan_check_write+0x20/0x30 [ 20.667997] kasan_atomics_helper+0xd3c/0x4858 [ 20.668219] kasan_atomics+0x198/0x2e0 [ 20.668270] kunit_try_run_case+0x170/0x3f0 [ 20.668823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.669425] kthread+0x328/0x630 [ 20.670002] ret_from_fork+0x10/0x20 [ 20.670072] [ 20.670146] Allocated by task 267: [ 20.670235] kasan_save_stack+0x3c/0x68 [ 20.670309] kasan_save_track+0x20/0x40 [ 20.670648] kasan_save_alloc_info+0x40/0x58 [ 20.670736] __kasan_kmalloc+0xd4/0xd8 [ 20.671321] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.671378] kasan_atomics+0xb8/0x2e0 [ 20.671418] kunit_try_run_case+0x170/0x3f0 [ 20.671798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.672161] kthread+0x328/0x630 [ 20.672496] ret_from_fork+0x10/0x20 [ 20.672615] [ 20.672819] The buggy address belongs to the object at fff00000c59c9e00 [ 20.672819] which belongs to the cache kmalloc-64 of size 64 [ 20.673301] The buggy address is located 0 bytes to the right of [ 20.673301] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.673698] [ 20.673727] The buggy address belongs to the physical page: [ 20.673880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.673940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.674263] page_type: f5(slab) [ 20.674311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.674365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.674932] page dumped because: kasan: bad access detected [ 20.674982] [ 20.675003] Memory state around the buggy address: [ 20.675040] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.675086] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.675133] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.675175] ^ [ 20.676154] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.676447] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.677023] ================================================================== [ 20.550984] ================================================================== [ 20.551101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.551148] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.551214] [ 20.551250] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.551606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.551639] Hardware name: linux,dummy-virt (DT) [ 20.551673] Call trace: [ 20.551696] show_stack+0x20/0x38 (C) [ 20.551747] dump_stack_lvl+0x8c/0xd0 [ 20.551807] print_report+0x118/0x5d0 [ 20.551855] kasan_report+0xdc/0x128 [ 20.551901] kasan_check_range+0x100/0x1a8 [ 20.552056] __kasan_check_write+0x20/0x30 [ 20.552313] kasan_atomics_helper+0xa6c/0x4858 [ 20.552408] kasan_atomics+0x198/0x2e0 [ 20.552455] kunit_try_run_case+0x170/0x3f0 [ 20.552505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.552801] kthread+0x328/0x630 [ 20.552856] ret_from_fork+0x10/0x20 [ 20.553016] [ 20.553036] Allocated by task 267: [ 20.553124] kasan_save_stack+0x3c/0x68 [ 20.553172] kasan_save_track+0x20/0x40 [ 20.553227] kasan_save_alloc_info+0x40/0x58 [ 20.553358] __kasan_kmalloc+0xd4/0xd8 [ 20.553397] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.553439] kasan_atomics+0xb8/0x2e0 [ 20.553475] kunit_try_run_case+0x170/0x3f0 [ 20.553517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.553762] kthread+0x328/0x630 [ 20.553941] ret_from_fork+0x10/0x20 [ 20.553987] [ 20.554008] The buggy address belongs to the object at fff00000c59c9e00 [ 20.554008] which belongs to the cache kmalloc-64 of size 64 [ 20.554071] The buggy address is located 0 bytes to the right of [ 20.554071] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.554143] [ 20.554165] The buggy address belongs to the physical page: [ 20.554197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.554423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.554492] page_type: f5(slab) [ 20.554532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.554586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.554630] page dumped because: kasan: bad access detected [ 20.554666] [ 20.554696] Memory state around the buggy address: [ 20.554730] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.554776] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.554949] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.555005] ^ [ 20.555040] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.555086] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.555697] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.556993] kasan_atomics+0x198/0x2e0 [ 20.557256] [ 20.557278] Allocated by task 267: [ 20.557306] kasan_save_stack+0x3c/0x68 [ 20.557463] kasan_save_track+0x20/0x40 [ 20.557539] kasan_save_alloc_info+0x40/0x58 [ 20.557699] __kasan_kmalloc+0xd4/0xd8 [ 20.557951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.557999] kasan_atomics+0xb8/0x2e0 [ 20.558062] kunit_try_run_case+0x170/0x3f0 [ 20.558105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.558156] kthread+0x328/0x630 [ 20.558193] ret_from_fork+0x10/0x20 [ 20.558242] [ 20.558265] The buggy address belongs to the object at fff00000c59c9e00 [ 20.558265] which belongs to the cache kmalloc-64 of size 64 [ 20.558327] The buggy address is located 0 bytes to the right of [ 20.558327] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.558697] [ 20.558718] The buggy address belongs to the physical page: [ 20.558780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.559155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.559222] page_type: f5(slab) [ 20.559296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.559383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.559585] page dumped because: kasan: bad access detected [ 20.559713] [ 20.559812] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.561922] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.562264] show_stack+0x20/0x38 (C) [ 20.563801] kthread+0x328/0x630 [ 20.564150] kasan_save_stack+0x3c/0x68 [ 20.564539] kasan_save_track+0x20/0x40 [ 20.565824] kunit_try_run_case+0x170/0x3f0 [ 20.567114] The buggy address is located 0 bytes to the right of [ 20.567114] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.570122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.572456] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.575587] ================================================================== [ 20.724134] ================================================================== [ 20.724188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.724256] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.724770] [ 20.724892] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.724980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.725011] Hardware name: linux,dummy-virt (DT) [ 20.725045] Call trace: [ 20.725693] show_stack+0x20/0x38 (C) [ 20.725958] dump_stack_lvl+0x8c/0xd0 [ 20.726412] print_report+0x118/0x5d0 [ 20.726513] kasan_report+0xdc/0x128 [ 20.726651] kasan_check_range+0x100/0x1a8 [ 20.726718] __kasan_check_write+0x20/0x30 [ 20.726828] kasan_atomics_helper+0xeb8/0x4858 [ 20.727275] kasan_atomics+0x198/0x2e0 [ 20.727325] kunit_try_run_case+0x170/0x3f0 [ 20.728112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.728932] kthread+0x328/0x630 [ 20.729616] ret_from_fork+0x10/0x20 [ 20.730221] [ 20.730296] Allocated by task 267: [ 20.730884] kasan_save_stack+0x3c/0x68 [ 20.731097] kasan_save_track+0x20/0x40 [ 20.731421] kasan_save_alloc_info+0x40/0x58 [ 20.732145] __kasan_kmalloc+0xd4/0xd8 [ 20.732910] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.733094] kasan_atomics+0xb8/0x2e0 [ 20.733166] kunit_try_run_case+0x170/0x3f0 [ 20.734028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.734388] kthread+0x328/0x630 [ 20.734516] ret_from_fork+0x10/0x20 [ 20.734862] [ 20.735115] The buggy address belongs to the object at fff00000c59c9e00 [ 20.735115] which belongs to the cache kmalloc-64 of size 64 [ 20.735660] The buggy address is located 0 bytes to the right of [ 20.735660] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.736433] [ 20.736488] The buggy address belongs to the physical page: [ 20.737112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.737624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.737983] page_type: f5(slab) [ 20.738050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.738579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.739101] page dumped because: kasan: bad access detected [ 20.739148] [ 20.739415] Memory state around the buggy address: [ 20.740087] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.740393] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.741484] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.741582] ^ [ 20.741650] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.741697] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.741739] ================================================================== [ 20.797125] ================================================================== [ 20.797214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.797692] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.797843] [ 20.797907] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.798033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.798326] Hardware name: linux,dummy-virt (DT) [ 20.798560] Call trace: [ 20.798708] show_stack+0x20/0x38 (C) [ 20.799139] dump_stack_lvl+0x8c/0xd0 [ 20.799315] print_report+0x118/0x5d0 [ 20.799395] kasan_report+0xdc/0x128 [ 20.799632] kasan_check_range+0x100/0x1a8 [ 20.799810] __kasan_check_write+0x20/0x30 [ 20.800012] kasan_atomics_helper+0x11f8/0x4858 [ 20.800300] kasan_atomics+0x198/0x2e0 [ 20.800445] kunit_try_run_case+0x170/0x3f0 [ 20.800500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.800909] kthread+0x328/0x630 [ 20.801354] ret_from_fork+0x10/0x20 [ 20.801516] [ 20.801566] Allocated by task 267: [ 20.801636] kasan_save_stack+0x3c/0x68 [ 20.801868] kasan_save_track+0x20/0x40 [ 20.802111] kasan_save_alloc_info+0x40/0x58 [ 20.802224] __kasan_kmalloc+0xd4/0xd8 [ 20.802469] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.802650] kasan_atomics+0xb8/0x2e0 [ 20.802848] kunit_try_run_case+0x170/0x3f0 [ 20.802929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.803089] kthread+0x328/0x630 [ 20.803129] ret_from_fork+0x10/0x20 [ 20.803527] [ 20.803572] The buggy address belongs to the object at fff00000c59c9e00 [ 20.803572] which belongs to the cache kmalloc-64 of size 64 [ 20.804001] The buggy address is located 0 bytes to the right of [ 20.804001] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.804438] [ 20.804498] The buggy address belongs to the physical page: [ 20.804546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.804843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.805228] page_type: f5(slab) [ 20.805642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.805717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.805765] page dumped because: kasan: bad access detected [ 20.805801] [ 20.806066] Memory state around the buggy address: [ 20.806449] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.806612] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.806688] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.806734] ^ [ 20.806803] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.806859] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.806913] ================================================================== [ 20.933393] ================================================================== [ 20.933492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 20.933554] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.933607] [ 20.933638] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.934102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.934162] Hardware name: linux,dummy-virt (DT) [ 20.934427] Call trace: [ 20.934454] show_stack+0x20/0x38 (C) [ 20.934825] dump_stack_lvl+0x8c/0xd0 [ 20.935095] print_report+0x118/0x5d0 [ 20.935414] kasan_report+0xdc/0x128 [ 20.935698] __asan_report_load8_noabort+0x20/0x30 [ 20.936152] kasan_atomics_helper+0x3e10/0x4858 [ 20.936245] kasan_atomics+0x198/0x2e0 [ 20.936514] kunit_try_run_case+0x170/0x3f0 [ 20.936682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.937129] kthread+0x328/0x630 [ 20.937282] ret_from_fork+0x10/0x20 [ 20.937552] [ 20.937609] Allocated by task 267: [ 20.937799] kasan_save_stack+0x3c/0x68 [ 20.938010] kasan_save_track+0x20/0x40 [ 20.938089] kasan_save_alloc_info+0x40/0x58 [ 20.938366] __kasan_kmalloc+0xd4/0xd8 [ 20.938507] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.938748] kasan_atomics+0xb8/0x2e0 [ 20.938819] kunit_try_run_case+0x170/0x3f0 [ 20.938890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.939135] kthread+0x328/0x630 [ 20.939418] ret_from_fork+0x10/0x20 [ 20.939685] [ 20.940013] The buggy address belongs to the object at fff00000c59c9e00 [ 20.940013] which belongs to the cache kmalloc-64 of size 64 [ 20.940150] The buggy address is located 0 bytes to the right of [ 20.940150] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.940681] [ 20.940838] The buggy address belongs to the physical page: [ 20.941075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.941374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.941565] page_type: f5(slab) [ 20.941826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.942103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.942167] page dumped because: kasan: bad access detected [ 20.942482] [ 20.942789] Memory state around the buggy address: [ 20.942855] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.943018] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.943088] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.943375] ^ [ 20.943663] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.943914] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.944006] ================================================================== [ 20.918237] ================================================================== [ 20.918295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 20.918669] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.918739] [ 20.919082] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.919186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.919226] Hardware name: linux,dummy-virt (DT) [ 20.919261] Call trace: [ 20.919530] show_stack+0x20/0x38 (C) [ 20.919603] dump_stack_lvl+0x8c/0xd0 [ 20.919703] print_report+0x118/0x5d0 [ 20.919811] kasan_report+0xdc/0x128 [ 20.919908] __asan_report_load8_noabort+0x20/0x30 [ 20.919970] kasan_atomics_helper+0x3df4/0x4858 [ 20.920312] kasan_atomics+0x198/0x2e0 [ 20.920503] kunit_try_run_case+0x170/0x3f0 [ 20.920573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.920787] kthread+0x328/0x630 [ 20.921154] ret_from_fork+0x10/0x20 [ 20.921233] [ 20.921568] Allocated by task 267: [ 20.921641] kasan_save_stack+0x3c/0x68 [ 20.921807] kasan_save_track+0x20/0x40 [ 20.921876] kasan_save_alloc_info+0x40/0x58 [ 20.922092] __kasan_kmalloc+0xd4/0xd8 [ 20.922153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.922535] kasan_atomics+0xb8/0x2e0 [ 20.922761] kunit_try_run_case+0x170/0x3f0 [ 20.922979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.923115] kthread+0x328/0x630 [ 20.923156] ret_from_fork+0x10/0x20 [ 20.923193] [ 20.923237] The buggy address belongs to the object at fff00000c59c9e00 [ 20.923237] which belongs to the cache kmalloc-64 of size 64 [ 20.923302] The buggy address is located 0 bytes to the right of [ 20.923302] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.923371] [ 20.923402] The buggy address belongs to the physical page: [ 20.923445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.923502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.923554] page_type: f5(slab) [ 20.923594] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.923674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.923728] page dumped because: kasan: bad access detected [ 20.923762] [ 20.923784] Memory state around the buggy address: [ 20.923826] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.923891] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.923939] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.923983] ^ [ 20.924020] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.924066] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.924108] ================================================================== [ 20.838358] ================================================================== [ 20.838412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 20.838667] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.838754] [ 20.838856] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.838944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.839189] Hardware name: linux,dummy-virt (DT) [ 20.839249] Call trace: [ 20.839274] show_stack+0x20/0x38 (C) [ 20.839571] dump_stack_lvl+0x8c/0xd0 [ 20.839795] print_report+0x118/0x5d0 [ 20.839857] kasan_report+0xdc/0x128 [ 20.839965] __asan_report_load8_noabort+0x20/0x30 [ 20.840282] kasan_atomics_helper+0x3f04/0x4858 [ 20.840347] kasan_atomics+0x198/0x2e0 [ 20.840648] kunit_try_run_case+0x170/0x3f0 [ 20.840866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.840950] kthread+0x328/0x630 [ 20.841002] ret_from_fork+0x10/0x20 [ 20.841268] [ 20.841303] Allocated by task 267: [ 20.841767] kasan_save_stack+0x3c/0x68 [ 20.841891] kasan_save_track+0x20/0x40 [ 20.841955] kasan_save_alloc_info+0x40/0x58 [ 20.842258] __kasan_kmalloc+0xd4/0xd8 [ 20.842301] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.842350] kasan_atomics+0xb8/0x2e0 [ 20.842387] kunit_try_run_case+0x170/0x3f0 [ 20.843073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.843371] kthread+0x328/0x630 [ 20.843819] ret_from_fork+0x10/0x20 [ 20.844098] [ 20.844167] The buggy address belongs to the object at fff00000c59c9e00 [ 20.844167] which belongs to the cache kmalloc-64 of size 64 [ 20.844445] The buggy address is located 0 bytes to the right of [ 20.844445] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.844804] [ 20.845258] The buggy address belongs to the physical page: [ 20.845426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.845489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.845689] page_type: f5(slab) [ 20.846284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.846731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.846838] page dumped because: kasan: bad access detected [ 20.847019] [ 20.847197] Memory state around the buggy address: [ 20.847459] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.847539] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.847950] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.848288] ^ [ 20.848715] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.848768] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.849404] ================================================================== [ 20.678591] ================================================================== [ 20.678654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.678716] Read of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267 [ 20.678771] [ 20.678804] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.678889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.678917] Hardware name: linux,dummy-virt (DT) [ 20.679849] Call trace: [ 20.679888] show_stack+0x20/0x38 (C) [ 20.680048] dump_stack_lvl+0x8c/0xd0 [ 20.680134] print_report+0x118/0x5d0 [ 20.680342] kasan_report+0xdc/0x128 [ 20.680697] __asan_report_load4_noabort+0x20/0x30 [ 20.680857] kasan_atomics_helper+0x3e04/0x4858 [ 20.680909] kasan_atomics+0x198/0x2e0 [ 20.681375] kunit_try_run_case+0x170/0x3f0 [ 20.681938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.682359] kthread+0x328/0x630 [ 20.682789] ret_from_fork+0x10/0x20 [ 20.682996] [ 20.683019] Allocated by task 267: [ 20.683049] kasan_save_stack+0x3c/0x68 [ 20.683458] kasan_save_track+0x20/0x40 [ 20.683538] kasan_save_alloc_info+0x40/0x58 [ 20.683877] __kasan_kmalloc+0xd4/0xd8 [ 20.683919] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.683960] kasan_atomics+0xb8/0x2e0 [ 20.683998] kunit_try_run_case+0x170/0x3f0 [ 20.684461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.684525] kthread+0x328/0x630 [ 20.684804] ret_from_fork+0x10/0x20 [ 20.685123] [ 20.685214] The buggy address belongs to the object at fff00000c59c9e00 [ 20.685214] which belongs to the cache kmalloc-64 of size 64 [ 20.685283] The buggy address is located 0 bytes to the right of [ 20.685283] allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30) [ 20.685362] [ 20.685974] The buggy address belongs to the physical page: [ 20.686017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.686079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.686133] page_type: f5(slab) [ 20.686173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.686808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.687320] page dumped because: kasan: bad access detected [ 20.687365] [ 20.687697] Memory state around the buggy address: [ 20.687737] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.688082] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.688330] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.688494] ^ [ 20.688597] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.689019] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.689071] ==================================================================
[ 13.371990] ================================================================== [ 13.372444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.372674] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.373348] [ 13.373589] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.373636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.373647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.373669] Call Trace: [ 13.373682] <TASK> [ 13.373698] dump_stack_lvl+0x73/0xb0 [ 13.373723] print_report+0xd1/0x610 [ 13.373746] ? __virt_addr_valid+0x1db/0x2d0 [ 13.373766] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.373787] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.373810] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.373831] kasan_report+0x141/0x180 [ 13.373853] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.373891] __asan_report_load4_noabort+0x18/0x20 [ 13.373912] kasan_atomics_helper+0x4bbc/0x5450 [ 13.373934] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.373957] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.373977] ? ret_from_fork_asm+0x1a/0x30 [ 13.373998] ? kasan_atomics+0x152/0x310 [ 13.374021] kasan_atomics+0x1dc/0x310 [ 13.374040] ? __pfx_kasan_atomics+0x10/0x10 [ 13.374061] ? __pfx_read_tsc+0x10/0x10 [ 13.374080] ? ktime_get_ts64+0x86/0x230 [ 13.374129] kunit_try_run_case+0x1a5/0x480 [ 13.374151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.374169] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.374193] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.374216] ? __kthread_parkme+0x82/0x180 [ 13.374239] ? preempt_count_sub+0x50/0x80 [ 13.374264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.374284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.374306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.374329] kthread+0x337/0x6f0 [ 13.374345] ? trace_preempt_on+0x20/0xc0 [ 13.374368] ? __pfx_kthread+0x10/0x10 [ 13.374386] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.374407] ? calculate_sigpending+0x7b/0xa0 [ 13.374429] ? __pfx_kthread+0x10/0x10 [ 13.374446] ret_from_fork+0x41/0x80 [ 13.374466] ? __pfx_kthread+0x10/0x10 [ 13.374483] ret_from_fork_asm+0x1a/0x30 [ 13.374513] </TASK> [ 13.374524] [ 13.387219] Allocated by task 284: [ 13.387542] kasan_save_stack+0x45/0x70 [ 13.387906] kasan_save_track+0x18/0x40 [ 13.388198] kasan_save_alloc_info+0x3b/0x50 [ 13.388507] __kasan_kmalloc+0xb7/0xc0 [ 13.388986] __kmalloc_cache_noprof+0x189/0x420 [ 13.389206] kasan_atomics+0x95/0x310 [ 13.389467] kunit_try_run_case+0x1a5/0x480 [ 13.389651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.390280] kthread+0x337/0x6f0 [ 13.390416] ret_from_fork+0x41/0x80 [ 13.390871] ret_from_fork_asm+0x1a/0x30 [ 13.391323] [ 13.391539] The buggy address belongs to the object at ffff888103a31d80 [ 13.391539] which belongs to the cache kmalloc-64 of size 64 [ 13.392326] The buggy address is located 0 bytes to the right of [ 13.392326] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.392898] [ 13.392976] The buggy address belongs to the physical page: [ 13.393234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.393533] flags: 0x200000000000000(node=0|zone=2) [ 13.393744] page_type: f5(slab) [ 13.394130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.394416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.394648] page dumped because: kasan: bad access detected [ 13.395227] [ 13.395336] Memory state around the buggy address: [ 13.395556] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.396182] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.396519] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.396894] ^ [ 13.397069] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.397394] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.397908] ================================================================== [ 14.633985] ================================================================== [ 14.634278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 14.634606] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.635065] [ 14.635166] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.635210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.635224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.635244] Call Trace: [ 14.635259] <TASK> [ 14.635274] dump_stack_lvl+0x73/0xb0 [ 14.635299] print_report+0xd1/0x610 [ 14.635322] ? __virt_addr_valid+0x1db/0x2d0 [ 14.635343] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.635366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.635389] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.635411] kasan_report+0x141/0x180 [ 14.635434] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.635462] kasan_check_range+0x10c/0x1c0 [ 14.635482] __kasan_check_write+0x18/0x20 [ 14.635502] kasan_atomics_helper+0x20c8/0x5450 [ 14.635525] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.635548] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.635569] ? ret_from_fork_asm+0x1a/0x30 [ 14.635590] ? kasan_atomics+0x152/0x310 [ 14.635613] kasan_atomics+0x1dc/0x310 [ 14.635633] ? __pfx_kasan_atomics+0x10/0x10 [ 14.635654] ? __pfx_read_tsc+0x10/0x10 [ 14.635674] ? ktime_get_ts64+0x86/0x230 [ 14.635698] kunit_try_run_case+0x1a5/0x480 [ 14.635719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.635738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.635762] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.635785] ? __kthread_parkme+0x82/0x180 [ 14.635819] ? preempt_count_sub+0x50/0x80 [ 14.635844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.635865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.635900] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.635923] kthread+0x337/0x6f0 [ 14.635940] ? trace_preempt_on+0x20/0xc0 [ 14.635964] ? __pfx_kthread+0x10/0x10 [ 14.635982] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.636005] ? calculate_sigpending+0x7b/0xa0 [ 14.636026] ? __pfx_kthread+0x10/0x10 [ 14.636045] ret_from_fork+0x41/0x80 [ 14.636065] ? __pfx_kthread+0x10/0x10 [ 14.636084] ret_from_fork_asm+0x1a/0x30 [ 14.636113] </TASK> [ 14.636124] [ 14.643470] Allocated by task 284: [ 14.643651] kasan_save_stack+0x45/0x70 [ 14.643851] kasan_save_track+0x18/0x40 [ 14.645009] kasan_save_alloc_info+0x3b/0x50 [ 14.645219] __kasan_kmalloc+0xb7/0xc0 [ 14.645393] __kmalloc_cache_noprof+0x189/0x420 [ 14.645598] kasan_atomics+0x95/0x310 [ 14.645782] kunit_try_run_case+0x1a5/0x480 [ 14.646049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.646284] kthread+0x337/0x6f0 [ 14.646433] ret_from_fork+0x41/0x80 [ 14.646615] ret_from_fork_asm+0x1a/0x30 [ 14.646806] [ 14.647498] The buggy address belongs to the object at ffff888103a31d80 [ 14.647498] which belongs to the cache kmalloc-64 of size 64 [ 14.648039] The buggy address is located 0 bytes to the right of [ 14.648039] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.648673] [ 14.648926] The buggy address belongs to the physical page: [ 14.649178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.649631] flags: 0x200000000000000(node=0|zone=2) [ 14.649966] page_type: f5(slab) [ 14.650115] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.650580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.650926] page dumped because: kasan: bad access detected [ 14.651230] [ 14.651332] Memory state around the buggy address: [ 14.651528] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.651829] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.652138] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.652438] ^ [ 14.652650] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.653361] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.653613] ================================================================== [ 14.090452] ================================================================== [ 14.091033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.091342] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.091565] [ 14.091646] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.091688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.091700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.091720] Call Trace: [ 14.091734] <TASK> [ 14.091749] dump_stack_lvl+0x73/0xb0 [ 14.091772] print_report+0xd1/0x610 [ 14.091796] ? __virt_addr_valid+0x1db/0x2d0 [ 14.091827] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.091849] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.091872] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.091906] kasan_report+0x141/0x180 [ 14.091929] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.091957] kasan_check_range+0x10c/0x1c0 [ 14.091977] __kasan_check_write+0x18/0x20 [ 14.091997] kasan_atomics_helper+0x12e6/0x5450 [ 14.092020] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.092044] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.092065] ? ret_from_fork_asm+0x1a/0x30 [ 14.092086] ? kasan_atomics+0x152/0x310 [ 14.092110] kasan_atomics+0x1dc/0x310 [ 14.092129] ? __pfx_kasan_atomics+0x10/0x10 [ 14.092150] ? __pfx_read_tsc+0x10/0x10 [ 14.092170] ? ktime_get_ts64+0x86/0x230 [ 14.092195] kunit_try_run_case+0x1a5/0x480 [ 14.092216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.092235] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.092260] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.092284] ? __kthread_parkme+0x82/0x180 [ 14.092305] ? preempt_count_sub+0x50/0x80 [ 14.092331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.092352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.092375] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.092399] kthread+0x337/0x6f0 [ 14.092416] ? trace_preempt_on+0x20/0xc0 [ 14.092439] ? __pfx_kthread+0x10/0x10 [ 14.092458] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.092482] ? calculate_sigpending+0x7b/0xa0 [ 14.092505] ? __pfx_kthread+0x10/0x10 [ 14.092524] ret_from_fork+0x41/0x80 [ 14.092547] ? __pfx_kthread+0x10/0x10 [ 14.092565] ret_from_fork_asm+0x1a/0x30 [ 14.092596] </TASK> [ 14.092607] [ 14.100091] Allocated by task 284: [ 14.100265] kasan_save_stack+0x45/0x70 [ 14.100460] kasan_save_track+0x18/0x40 [ 14.100653] kasan_save_alloc_info+0x3b/0x50 [ 14.100905] __kasan_kmalloc+0xb7/0xc0 [ 14.101077] __kmalloc_cache_noprof+0x189/0x420 [ 14.101231] kasan_atomics+0x95/0x310 [ 14.101358] kunit_try_run_case+0x1a5/0x480 [ 14.101500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.101734] kthread+0x337/0x6f0 [ 14.101998] ret_from_fork+0x41/0x80 [ 14.102184] ret_from_fork_asm+0x1a/0x30 [ 14.102382] [ 14.102480] The buggy address belongs to the object at ffff888103a31d80 [ 14.102480] which belongs to the cache kmalloc-64 of size 64 [ 14.102989] The buggy address is located 0 bytes to the right of [ 14.102989] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.103482] [ 14.103569] The buggy address belongs to the physical page: [ 14.103785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.104114] flags: 0x200000000000000(node=0|zone=2) [ 14.104318] page_type: f5(slab) [ 14.104475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.104719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.104951] page dumped because: kasan: bad access detected [ 14.105119] [ 14.105193] Memory state around the buggy address: [ 14.105344] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.105556] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.105799] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.106179] ^ [ 14.106400] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.106714] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.107335] ================================================================== [ 14.423264] ================================================================== [ 14.423523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 14.423942] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.424266] [ 14.424374] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.424428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.424441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.424463] Call Trace: [ 14.424489] <TASK> [ 14.424503] dump_stack_lvl+0x73/0xb0 [ 14.424529] print_report+0xd1/0x610 [ 14.424552] ? __virt_addr_valid+0x1db/0x2d0 [ 14.424582] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.424604] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.424627] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.424661] kasan_report+0x141/0x180 [ 14.424683] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.424711] kasan_check_range+0x10c/0x1c0 [ 14.424742] __kasan_check_write+0x18/0x20 [ 14.424762] kasan_atomics_helper+0x1c18/0x5450 [ 14.424786] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.424829] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.424850] ? ret_from_fork_asm+0x1a/0x30 [ 14.424872] ? kasan_atomics+0x152/0x310 [ 14.424904] kasan_atomics+0x1dc/0x310 [ 14.424924] ? __pfx_kasan_atomics+0x10/0x10 [ 14.424946] ? __pfx_read_tsc+0x10/0x10 [ 14.424965] ? ktime_get_ts64+0x86/0x230 [ 14.424999] kunit_try_run_case+0x1a5/0x480 [ 14.425020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.425039] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.425075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.425099] ? __kthread_parkme+0x82/0x180 [ 14.425121] ? preempt_count_sub+0x50/0x80 [ 14.425150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.425170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.425193] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.425217] kthread+0x337/0x6f0 [ 14.425244] ? trace_preempt_on+0x20/0xc0 [ 14.425270] ? __pfx_kthread+0x10/0x10 [ 14.425288] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.425322] ? calculate_sigpending+0x7b/0xa0 [ 14.425344] ? __pfx_kthread+0x10/0x10 [ 14.425363] ret_from_fork+0x41/0x80 [ 14.425384] ? __pfx_kthread+0x10/0x10 [ 14.425402] ret_from_fork_asm+0x1a/0x30 [ 14.425432] </TASK> [ 14.425443] [ 14.435168] Allocated by task 284: [ 14.435498] kasan_save_stack+0x45/0x70 [ 14.435827] kasan_save_track+0x18/0x40 [ 14.436030] kasan_save_alloc_info+0x3b/0x50 [ 14.436321] __kasan_kmalloc+0xb7/0xc0 [ 14.436460] __kmalloc_cache_noprof+0x189/0x420 [ 14.436832] kasan_atomics+0x95/0x310 [ 14.437021] kunit_try_run_case+0x1a5/0x480 [ 14.437241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.437487] kthread+0x337/0x6f0 [ 14.437650] ret_from_fork+0x41/0x80 [ 14.437815] ret_from_fork_asm+0x1a/0x30 [ 14.438300] [ 14.438395] The buggy address belongs to the object at ffff888103a31d80 [ 14.438395] which belongs to the cache kmalloc-64 of size 64 [ 14.439143] The buggy address is located 0 bytes to the right of [ 14.439143] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.439739] [ 14.439824] The buggy address belongs to the physical page: [ 14.440270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.440558] flags: 0x200000000000000(node=0|zone=2) [ 14.440796] page_type: f5(slab) [ 14.440953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.441275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.441573] page dumped because: kasan: bad access detected [ 14.441790] [ 14.442332] Memory state around the buggy address: [ 14.442519] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.442993] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.443397] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.443868] ^ [ 14.444186] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.444540] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.444979] ================================================================== [ 14.505515] ================================================================== [ 14.505918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 14.506167] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.506698] [ 14.506778] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.506835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.506848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.506868] Call Trace: [ 14.506893] <TASK> [ 14.506906] dump_stack_lvl+0x73/0xb0 [ 14.506928] print_report+0xd1/0x610 [ 14.506951] ? __virt_addr_valid+0x1db/0x2d0 [ 14.506999] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.507021] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.507043] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.507065] kasan_report+0x141/0x180 [ 14.507088] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.507115] kasan_check_range+0x10c/0x1c0 [ 14.507136] __kasan_check_write+0x18/0x20 [ 14.507156] kasan_atomics_helper+0x1e12/0x5450 [ 14.507179] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.507202] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.507223] ? ret_from_fork_asm+0x1a/0x30 [ 14.507244] ? kasan_atomics+0x152/0x310 [ 14.507267] kasan_atomics+0x1dc/0x310 [ 14.507286] ? __pfx_kasan_atomics+0x10/0x10 [ 14.507308] ? __pfx_read_tsc+0x10/0x10 [ 14.507327] ? ktime_get_ts64+0x86/0x230 [ 14.507352] kunit_try_run_case+0x1a5/0x480 [ 14.507373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.507392] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.507434] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.507459] ? __kthread_parkme+0x82/0x180 [ 14.507481] ? preempt_count_sub+0x50/0x80 [ 14.507504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.507526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.507549] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.507572] kthread+0x337/0x6f0 [ 14.507589] ? trace_preempt_on+0x20/0xc0 [ 14.507612] ? __pfx_kthread+0x10/0x10 [ 14.507630] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.507652] ? calculate_sigpending+0x7b/0xa0 [ 14.507673] ? __pfx_kthread+0x10/0x10 [ 14.507692] ret_from_fork+0x41/0x80 [ 14.507732] ? __pfx_kthread+0x10/0x10 [ 14.507750] ret_from_fork_asm+0x1a/0x30 [ 14.507780] </TASK> [ 14.507792] [ 14.516841] Allocated by task 284: [ 14.516986] kasan_save_stack+0x45/0x70 [ 14.517194] kasan_save_track+0x18/0x40 [ 14.517432] kasan_save_alloc_info+0x3b/0x50 [ 14.517637] __kasan_kmalloc+0xb7/0xc0 [ 14.517796] __kmalloc_cache_noprof+0x189/0x420 [ 14.518001] kasan_atomics+0x95/0x310 [ 14.518186] kunit_try_run_case+0x1a5/0x480 [ 14.518359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.518544] kthread+0x337/0x6f0 [ 14.518713] ret_from_fork+0x41/0x80 [ 14.518960] ret_from_fork_asm+0x1a/0x30 [ 14.519127] [ 14.519223] The buggy address belongs to the object at ffff888103a31d80 [ 14.519223] which belongs to the cache kmalloc-64 of size 64 [ 14.519658] The buggy address is located 0 bytes to the right of [ 14.519658] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.520028] [ 14.520125] The buggy address belongs to the physical page: [ 14.520375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.520726] flags: 0x200000000000000(node=0|zone=2) [ 14.520960] page_type: f5(slab) [ 14.521082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.521317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.521652] page dumped because: kasan: bad access detected [ 14.522004] [ 14.522098] Memory state around the buggy address: [ 14.522325] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.522623] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.522968] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.523182] ^ [ 14.523412] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.523670] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.524047] ================================================================== [ 13.879363] ================================================================== [ 13.879663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 13.880090] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.880429] [ 13.880535] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.880576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.880588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.880609] Call Trace: [ 13.880622] <TASK> [ 13.880637] dump_stack_lvl+0x73/0xb0 [ 13.880661] print_report+0xd1/0x610 [ 13.880684] ? __virt_addr_valid+0x1db/0x2d0 [ 13.880705] ? kasan_atomics_helper+0xde0/0x5450 [ 13.880726] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.880749] ? kasan_atomics_helper+0xde0/0x5450 [ 13.880772] kasan_report+0x141/0x180 [ 13.880795] ? kasan_atomics_helper+0xde0/0x5450 [ 13.880822] kasan_check_range+0x10c/0x1c0 [ 13.880843] __kasan_check_write+0x18/0x20 [ 13.880864] kasan_atomics_helper+0xde0/0x5450 [ 13.880897] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.880920] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.880941] ? ret_from_fork_asm+0x1a/0x30 [ 13.880963] ? kasan_atomics+0x152/0x310 [ 13.880986] kasan_atomics+0x1dc/0x310 [ 13.881006] ? __pfx_kasan_atomics+0x10/0x10 [ 13.881026] ? __pfx_read_tsc+0x10/0x10 [ 13.881046] ? ktime_get_ts64+0x86/0x230 [ 13.881070] kunit_try_run_case+0x1a5/0x480 [ 13.881091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.881111] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.881139] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.881162] ? __kthread_parkme+0x82/0x180 [ 13.881184] ? preempt_count_sub+0x50/0x80 [ 13.881209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.881230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.881253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.881277] kthread+0x337/0x6f0 [ 13.881305] ? trace_preempt_on+0x20/0xc0 [ 13.881329] ? __pfx_kthread+0x10/0x10 [ 13.881347] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.881381] ? calculate_sigpending+0x7b/0xa0 [ 13.881403] ? __pfx_kthread+0x10/0x10 [ 13.881422] ret_from_fork+0x41/0x80 [ 13.881443] ? __pfx_kthread+0x10/0x10 [ 13.881460] ret_from_fork_asm+0x1a/0x30 [ 13.881490] </TASK> [ 13.881501] [ 13.889091] Allocated by task 284: [ 13.889227] kasan_save_stack+0x45/0x70 [ 13.889467] kasan_save_track+0x18/0x40 [ 13.889657] kasan_save_alloc_info+0x3b/0x50 [ 13.889863] __kasan_kmalloc+0xb7/0xc0 [ 13.890055] __kmalloc_cache_noprof+0x189/0x420 [ 13.890270] kasan_atomics+0x95/0x310 [ 13.890444] kunit_try_run_case+0x1a5/0x480 [ 13.890587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.890761] kthread+0x337/0x6f0 [ 13.890980] ret_from_fork+0x41/0x80 [ 13.891164] ret_from_fork_asm+0x1a/0x30 [ 13.891376] [ 13.891487] The buggy address belongs to the object at ffff888103a31d80 [ 13.891487] which belongs to the cache kmalloc-64 of size 64 [ 13.892202] The buggy address is located 0 bytes to the right of [ 13.892202] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.892635] [ 13.892705] The buggy address belongs to the physical page: [ 13.893032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.893415] flags: 0x200000000000000(node=0|zone=2) [ 13.893587] page_type: f5(slab) [ 13.893706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.894020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.894389] page dumped because: kasan: bad access detected [ 13.894668] [ 13.894775] Memory state around the buggy address: [ 13.895085] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.895350] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.895562] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.895770] ^ [ 13.896002] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.896315] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.896641] ================================================================== [ 14.717830] ================================================================== [ 14.718192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 14.718517] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.718916] [ 14.719051] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.719095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.719108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.719126] Call Trace: [ 14.719142] <TASK> [ 14.719156] dump_stack_lvl+0x73/0xb0 [ 14.719180] print_report+0xd1/0x610 [ 14.719223] ? __virt_addr_valid+0x1db/0x2d0 [ 14.719244] ? kasan_atomics_helper+0x224c/0x5450 [ 14.719266] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.719289] ? kasan_atomics_helper+0x224c/0x5450 [ 14.719312] kasan_report+0x141/0x180 [ 14.719335] ? kasan_atomics_helper+0x224c/0x5450 [ 14.719362] kasan_check_range+0x10c/0x1c0 [ 14.719402] __kasan_check_write+0x18/0x20 [ 14.719423] kasan_atomics_helper+0x224c/0x5450 [ 14.719447] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.719469] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.719490] ? ret_from_fork_asm+0x1a/0x30 [ 14.719512] ? kasan_atomics+0x152/0x310 [ 14.719535] kasan_atomics+0x1dc/0x310 [ 14.719555] ? __pfx_kasan_atomics+0x10/0x10 [ 14.719576] ? __pfx_read_tsc+0x10/0x10 [ 14.719595] ? ktime_get_ts64+0x86/0x230 [ 14.719619] kunit_try_run_case+0x1a5/0x480 [ 14.719641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.719660] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.719684] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.719709] ? __kthread_parkme+0x82/0x180 [ 14.719731] ? preempt_count_sub+0x50/0x80 [ 14.719755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.719776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.719836] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.719860] kthread+0x337/0x6f0 [ 14.719877] ? trace_preempt_on+0x20/0xc0 [ 14.719909] ? __pfx_kthread+0x10/0x10 [ 14.719928] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.719970] ? calculate_sigpending+0x7b/0xa0 [ 14.719992] ? __pfx_kthread+0x10/0x10 [ 14.720011] ret_from_fork+0x41/0x80 [ 14.720032] ? __pfx_kthread+0x10/0x10 [ 14.720051] ret_from_fork_asm+0x1a/0x30 [ 14.720081] </TASK> [ 14.720091] [ 14.727365] Allocated by task 284: [ 14.727491] kasan_save_stack+0x45/0x70 [ 14.727631] kasan_save_track+0x18/0x40 [ 14.727778] kasan_save_alloc_info+0x3b/0x50 [ 14.728018] __kasan_kmalloc+0xb7/0xc0 [ 14.728233] __kmalloc_cache_noprof+0x189/0x420 [ 14.728490] kasan_atomics+0x95/0x310 [ 14.728677] kunit_try_run_case+0x1a5/0x480 [ 14.728919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.729182] kthread+0x337/0x6f0 [ 14.729369] ret_from_fork+0x41/0x80 [ 14.729530] ret_from_fork_asm+0x1a/0x30 [ 14.729704] [ 14.729846] The buggy address belongs to the object at ffff888103a31d80 [ 14.729846] which belongs to the cache kmalloc-64 of size 64 [ 14.730232] The buggy address is located 0 bytes to the right of [ 14.730232] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.730583] [ 14.730651] The buggy address belongs to the physical page: [ 14.730944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.731294] flags: 0x200000000000000(node=0|zone=2) [ 14.731523] page_type: f5(slab) [ 14.731685] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.732061] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.732394] page dumped because: kasan: bad access detected [ 14.732580] [ 14.732647] Memory state around the buggy address: [ 14.732814] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.733094] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.733437] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.733756] ^ [ 14.734029] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.734336] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.734634] ================================================================== [ 13.659352] ================================================================== [ 13.659610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 13.660093] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.660419] [ 13.660503] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.660544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.660556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.660575] Call Trace: [ 13.660587] <TASK> [ 13.660602] dump_stack_lvl+0x73/0xb0 [ 13.660624] print_report+0xd1/0x610 [ 13.660647] ? __virt_addr_valid+0x1db/0x2d0 [ 13.660667] ? kasan_atomics_helper+0x72f/0x5450 [ 13.660767] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.660796] ? kasan_atomics_helper+0x72f/0x5450 [ 13.660820] kasan_report+0x141/0x180 [ 13.660858] ? kasan_atomics_helper+0x72f/0x5450 [ 13.660892] kasan_check_range+0x10c/0x1c0 [ 13.660913] __kasan_check_write+0x18/0x20 [ 13.660942] kasan_atomics_helper+0x72f/0x5450 [ 13.660965] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.660988] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.661019] ? ret_from_fork_asm+0x1a/0x30 [ 13.661041] ? kasan_atomics+0x152/0x310 [ 13.661064] kasan_atomics+0x1dc/0x310 [ 13.661084] ? __pfx_kasan_atomics+0x10/0x10 [ 13.661105] ? __pfx_read_tsc+0x10/0x10 [ 13.661124] ? ktime_get_ts64+0x86/0x230 [ 13.661156] kunit_try_run_case+0x1a5/0x480 [ 13.661177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.661195] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.661219] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.661243] ? __kthread_parkme+0x82/0x180 [ 13.661264] ? preempt_count_sub+0x50/0x80 [ 13.661303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.661323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.661347] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.661397] kthread+0x337/0x6f0 [ 13.661414] ? trace_preempt_on+0x20/0xc0 [ 13.661437] ? __pfx_kthread+0x10/0x10 [ 13.661456] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.661478] ? calculate_sigpending+0x7b/0xa0 [ 13.661499] ? __pfx_kthread+0x10/0x10 [ 13.661518] ret_from_fork+0x41/0x80 [ 13.661539] ? __pfx_kthread+0x10/0x10 [ 13.661558] ret_from_fork_asm+0x1a/0x30 [ 13.661588] </TASK> [ 13.661599] [ 13.670394] Allocated by task 284: [ 13.670580] kasan_save_stack+0x45/0x70 [ 13.670973] kasan_save_track+0x18/0x40 [ 13.671204] kasan_save_alloc_info+0x3b/0x50 [ 13.671415] __kasan_kmalloc+0xb7/0xc0 [ 13.671618] __kmalloc_cache_noprof+0x189/0x420 [ 13.671979] kasan_atomics+0x95/0x310 [ 13.672155] kunit_try_run_case+0x1a5/0x480 [ 13.672392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.672628] kthread+0x337/0x6f0 [ 13.672861] ret_from_fork+0x41/0x80 [ 13.673007] ret_from_fork_asm+0x1a/0x30 [ 13.673155] [ 13.673227] The buggy address belongs to the object at ffff888103a31d80 [ 13.673227] which belongs to the cache kmalloc-64 of size 64 [ 13.673689] The buggy address is located 0 bytes to the right of [ 13.673689] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.674242] [ 13.674337] The buggy address belongs to the physical page: [ 13.674593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.675181] flags: 0x200000000000000(node=0|zone=2) [ 13.675446] page_type: f5(slab) [ 13.675629] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.676232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.676571] page dumped because: kasan: bad access detected [ 13.677041] [ 13.677162] Memory state around the buggy address: [ 13.677390] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.677629] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.678062] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.678387] ^ [ 13.678536] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.679025] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.679342] ================================================================== [ 13.584649] ================================================================== [ 13.585003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 13.585447] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.585764] [ 13.585945] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.585991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.586004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.586024] Call Trace: [ 13.586039] <TASK> [ 13.586055] dump_stack_lvl+0x73/0xb0 [ 13.586079] print_report+0xd1/0x610 [ 13.586102] ? __virt_addr_valid+0x1db/0x2d0 [ 13.586122] ? kasan_atomics_helper+0x565/0x5450 [ 13.586188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.586223] ? kasan_atomics_helper+0x565/0x5450 [ 13.586254] kasan_report+0x141/0x180 [ 13.586278] ? kasan_atomics_helper+0x565/0x5450 [ 13.586306] kasan_check_range+0x10c/0x1c0 [ 13.586337] __kasan_check_write+0x18/0x20 [ 13.586358] kasan_atomics_helper+0x565/0x5450 [ 13.586382] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.586405] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.586425] ? ret_from_fork_asm+0x1a/0x30 [ 13.586447] ? kasan_atomics+0x152/0x310 [ 13.586470] kasan_atomics+0x1dc/0x310 [ 13.586489] ? __pfx_kasan_atomics+0x10/0x10 [ 13.586510] ? __pfx_read_tsc+0x10/0x10 [ 13.586530] ? ktime_get_ts64+0x86/0x230 [ 13.586563] kunit_try_run_case+0x1a5/0x480 [ 13.586585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.586603] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.586638] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.586661] ? __kthread_parkme+0x82/0x180 [ 13.586684] ? preempt_count_sub+0x50/0x80 [ 13.586768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.586800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.586824] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.586848] kthread+0x337/0x6f0 [ 13.586876] ? trace_preempt_on+0x20/0xc0 [ 13.586908] ? __pfx_kthread+0x10/0x10 [ 13.586927] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.586950] ? calculate_sigpending+0x7b/0xa0 [ 13.586972] ? __pfx_kthread+0x10/0x10 [ 13.586990] ret_from_fork+0x41/0x80 [ 13.587012] ? __pfx_kthread+0x10/0x10 [ 13.587030] ret_from_fork_asm+0x1a/0x30 [ 13.587059] </TASK> [ 13.587070] [ 13.597548] Allocated by task 284: [ 13.597895] kasan_save_stack+0x45/0x70 [ 13.598086] kasan_save_track+0x18/0x40 [ 13.598449] kasan_save_alloc_info+0x3b/0x50 [ 13.599058] __kasan_kmalloc+0xb7/0xc0 [ 13.599198] __kmalloc_cache_noprof+0x189/0x420 [ 13.599346] kasan_atomics+0x95/0x310 [ 13.599471] kunit_try_run_case+0x1a5/0x480 [ 13.599609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.599777] kthread+0x337/0x6f0 [ 13.600133] ret_from_fork+0x41/0x80 [ 13.600937] ret_from_fork_asm+0x1a/0x30 [ 13.601475] [ 13.601670] The buggy address belongs to the object at ffff888103a31d80 [ 13.601670] which belongs to the cache kmalloc-64 of size 64 [ 13.603142] The buggy address is located 0 bytes to the right of [ 13.603142] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.604515] [ 13.604687] The buggy address belongs to the physical page: [ 13.605088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.605335] flags: 0x200000000000000(node=0|zone=2) [ 13.605494] page_type: f5(slab) [ 13.605610] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.605852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.606826] page dumped because: kasan: bad access detected [ 13.607159] [ 13.607234] Memory state around the buggy address: [ 13.607602] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.608189] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.608696] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.609246] ^ [ 13.609420] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.609986] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.610534] ================================================================== [ 13.976091] ================================================================== [ 13.976833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 13.977146] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.977513] [ 13.977615] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.977657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.977680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.977700] Call Trace: [ 13.977715] <TASK> [ 13.977730] dump_stack_lvl+0x73/0xb0 [ 13.977765] print_report+0xd1/0x610 [ 13.977789] ? __virt_addr_valid+0x1db/0x2d0 [ 13.977820] ? kasan_atomics_helper+0x1079/0x5450 [ 13.977842] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.977865] ? kasan_atomics_helper+0x1079/0x5450 [ 13.977906] kasan_report+0x141/0x180 [ 13.977930] ? kasan_atomics_helper+0x1079/0x5450 [ 13.977958] kasan_check_range+0x10c/0x1c0 [ 13.977991] __kasan_check_write+0x18/0x20 [ 13.978012] kasan_atomics_helper+0x1079/0x5450 [ 13.978035] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.978058] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.978088] ? ret_from_fork_asm+0x1a/0x30 [ 13.978109] ? kasan_atomics+0x152/0x310 [ 13.978132] kasan_atomics+0x1dc/0x310 [ 13.978164] ? __pfx_kasan_atomics+0x10/0x10 [ 13.978186] ? __pfx_read_tsc+0x10/0x10 [ 13.978206] ? ktime_get_ts64+0x86/0x230 [ 13.978238] kunit_try_run_case+0x1a5/0x480 [ 13.978260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.978279] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.978304] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.978339] ? __kthread_parkme+0x82/0x180 [ 13.978362] ? preempt_count_sub+0x50/0x80 [ 13.978387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.978416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.978439] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.978463] kthread+0x337/0x6f0 [ 13.978491] ? trace_preempt_on+0x20/0xc0 [ 13.978514] ? __pfx_kthread+0x10/0x10 [ 13.978533] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.978555] ? calculate_sigpending+0x7b/0xa0 [ 13.978576] ? __pfx_kthread+0x10/0x10 [ 13.978595] ret_from_fork+0x41/0x80 [ 13.978616] ? __pfx_kthread+0x10/0x10 [ 13.978634] ret_from_fork_asm+0x1a/0x30 [ 13.978664] </TASK> [ 13.978675] [ 13.986456] Allocated by task 284: [ 13.986630] kasan_save_stack+0x45/0x70 [ 13.986836] kasan_save_track+0x18/0x40 [ 13.987009] kasan_save_alloc_info+0x3b/0x50 [ 13.987157] __kasan_kmalloc+0xb7/0xc0 [ 13.987289] __kmalloc_cache_noprof+0x189/0x420 [ 13.987470] kasan_atomics+0x95/0x310 [ 13.987653] kunit_try_run_case+0x1a5/0x480 [ 13.987912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.988168] kthread+0x337/0x6f0 [ 13.988309] ret_from_fork+0x41/0x80 [ 13.988499] ret_from_fork_asm+0x1a/0x30 [ 13.988681] [ 13.988789] The buggy address belongs to the object at ffff888103a31d80 [ 13.988789] which belongs to the cache kmalloc-64 of size 64 [ 13.989291] The buggy address is located 0 bytes to the right of [ 13.989291] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.989826] [ 13.989913] The buggy address belongs to the physical page: [ 13.990167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.990405] flags: 0x200000000000000(node=0|zone=2) [ 13.990564] page_type: f5(slab) [ 13.990682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.991209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.991564] page dumped because: kasan: bad access detected [ 13.991812] [ 13.991911] Memory state around the buggy address: [ 13.992135] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.992432] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.992679] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.993088] ^ [ 13.993318] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.993595] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.993830] ================================================================== [ 13.551804] ================================================================== [ 13.552389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 13.553232] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.554030] [ 13.554287] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.554342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.554354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.554376] Call Trace: [ 13.554388] <TASK> [ 13.554403] dump_stack_lvl+0x73/0xb0 [ 13.554428] print_report+0xd1/0x610 [ 13.554451] ? __virt_addr_valid+0x1db/0x2d0 [ 13.554472] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.554494] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.554531] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.554553] kasan_report+0x141/0x180 [ 13.554583] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.554611] __asan_report_store4_noabort+0x1b/0x30 [ 13.554632] kasan_atomics_helper+0x4b3a/0x5450 [ 13.554655] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.554699] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.554720] ? ret_from_fork_asm+0x1a/0x30 [ 13.554741] ? kasan_atomics+0x152/0x310 [ 13.554765] kasan_atomics+0x1dc/0x310 [ 13.554784] ? __pfx_kasan_atomics+0x10/0x10 [ 13.554805] ? __pfx_read_tsc+0x10/0x10 [ 13.554825] ? ktime_get_ts64+0x86/0x230 [ 13.554866] kunit_try_run_case+0x1a5/0x480 [ 13.554904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.554923] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.554947] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.554971] ? __kthread_parkme+0x82/0x180 [ 13.554994] ? preempt_count_sub+0x50/0x80 [ 13.555018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.555039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.555063] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.555087] kthread+0x337/0x6f0 [ 13.555104] ? trace_preempt_on+0x20/0xc0 [ 13.555128] ? __pfx_kthread+0x10/0x10 [ 13.555146] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.555168] ? calculate_sigpending+0x7b/0xa0 [ 13.555189] ? __pfx_kthread+0x10/0x10 [ 13.555208] ret_from_fork+0x41/0x80 [ 13.555228] ? __pfx_kthread+0x10/0x10 [ 13.555247] ret_from_fork_asm+0x1a/0x30 [ 13.555277] </TASK> [ 13.555287] [ 13.569953] Allocated by task 284: [ 13.570352] kasan_save_stack+0x45/0x70 [ 13.570817] kasan_save_track+0x18/0x40 [ 13.571019] kasan_save_alloc_info+0x3b/0x50 [ 13.571476] __kasan_kmalloc+0xb7/0xc0 [ 13.571948] __kmalloc_cache_noprof+0x189/0x420 [ 13.572343] kasan_atomics+0x95/0x310 [ 13.572554] kunit_try_run_case+0x1a5/0x480 [ 13.572749] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.573384] kthread+0x337/0x6f0 [ 13.573800] ret_from_fork+0x41/0x80 [ 13.574225] ret_from_fork_asm+0x1a/0x30 [ 13.574523] [ 13.574714] The buggy address belongs to the object at ffff888103a31d80 [ 13.574714] which belongs to the cache kmalloc-64 of size 64 [ 13.575632] The buggy address is located 0 bytes to the right of [ 13.575632] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.576517] [ 13.576743] The buggy address belongs to the physical page: [ 13.577312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.577558] flags: 0x200000000000000(node=0|zone=2) [ 13.577777] page_type: f5(slab) [ 13.578235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.579100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.579799] page dumped because: kasan: bad access detected [ 13.580343] [ 13.580540] Memory state around the buggy address: [ 13.580767] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.581427] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.581648] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.582318] ^ [ 13.582857] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.583483] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.584210] ================================================================== [ 14.469662] ================================================================== [ 14.470179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 14.470527] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.470899] [ 14.470981] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.471023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.471035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.471055] Call Trace: [ 14.471070] <TASK> [ 14.471085] dump_stack_lvl+0x73/0xb0 [ 14.471109] print_report+0xd1/0x610 [ 14.471153] ? __virt_addr_valid+0x1db/0x2d0 [ 14.471174] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.471197] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.471219] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.471242] kasan_report+0x141/0x180 [ 14.471265] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.471292] kasan_check_range+0x10c/0x1c0 [ 14.471312] __kasan_check_write+0x18/0x20 [ 14.471332] kasan_atomics_helper+0x1ce1/0x5450 [ 14.471356] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.471379] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.471399] ? ret_from_fork_asm+0x1a/0x30 [ 14.471420] ? kasan_atomics+0x152/0x310 [ 14.471443] kasan_atomics+0x1dc/0x310 [ 14.471462] ? __pfx_kasan_atomics+0x10/0x10 [ 14.471483] ? __pfx_read_tsc+0x10/0x10 [ 14.471503] ? ktime_get_ts64+0x86/0x230 [ 14.471546] kunit_try_run_case+0x1a5/0x480 [ 14.471567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.471587] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.471611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.471635] ? __kthread_parkme+0x82/0x180 [ 14.471657] ? preempt_count_sub+0x50/0x80 [ 14.471682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.471703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.471726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.471750] kthread+0x337/0x6f0 [ 14.471766] ? trace_preempt_on+0x20/0xc0 [ 14.471790] ? __pfx_kthread+0x10/0x10 [ 14.471818] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.471840] ? calculate_sigpending+0x7b/0xa0 [ 14.471862] ? __pfx_kthread+0x10/0x10 [ 14.471890] ret_from_fork+0x41/0x80 [ 14.471912] ? __pfx_kthread+0x10/0x10 [ 14.471930] ret_from_fork_asm+0x1a/0x30 [ 14.471960] </TASK> [ 14.471970] [ 14.479549] Allocated by task 284: [ 14.479721] kasan_save_stack+0x45/0x70 [ 14.479986] kasan_save_track+0x18/0x40 [ 14.480200] kasan_save_alloc_info+0x3b/0x50 [ 14.480388] __kasan_kmalloc+0xb7/0xc0 [ 14.480520] __kmalloc_cache_noprof+0x189/0x420 [ 14.480726] kasan_atomics+0x95/0x310 [ 14.480919] kunit_try_run_case+0x1a5/0x480 [ 14.481202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.481376] kthread+0x337/0x6f0 [ 14.481494] ret_from_fork+0x41/0x80 [ 14.481624] ret_from_fork_asm+0x1a/0x30 [ 14.481794] [ 14.481897] The buggy address belongs to the object at ffff888103a31d80 [ 14.481897] which belongs to the cache kmalloc-64 of size 64 [ 14.482417] The buggy address is located 0 bytes to the right of [ 14.482417] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.482933] [ 14.483004] The buggy address belongs to the physical page: [ 14.483173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.483407] flags: 0x200000000000000(node=0|zone=2) [ 14.483640] page_type: f5(slab) [ 14.483825] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.484188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.484554] page dumped because: kasan: bad access detected [ 14.484814] [ 14.484932] Memory state around the buggy address: [ 14.485087] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.485310] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.485627] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.486104] ^ [ 14.486268] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.486589] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.486801] ================================================================== [ 13.473021] ================================================================== [ 13.473274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.474303] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.474895] [ 13.474991] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.475141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.475157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.475178] Call Trace: [ 13.475193] <TASK> [ 13.475209] dump_stack_lvl+0x73/0xb0 [ 13.475236] print_report+0xd1/0x610 [ 13.475258] ? __virt_addr_valid+0x1db/0x2d0 [ 13.475280] ? kasan_atomics_helper+0x3df/0x5450 [ 13.475302] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.475325] ? kasan_atomics_helper+0x3df/0x5450 [ 13.475348] kasan_report+0x141/0x180 [ 13.475371] ? kasan_atomics_helper+0x3df/0x5450 [ 13.475398] kasan_check_range+0x10c/0x1c0 [ 13.475419] __kasan_check_read+0x15/0x20 [ 13.475438] kasan_atomics_helper+0x3df/0x5450 [ 13.475463] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.475486] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.475507] ? ret_from_fork_asm+0x1a/0x30 [ 13.475528] ? kasan_atomics+0x152/0x310 [ 13.475552] kasan_atomics+0x1dc/0x310 [ 13.475571] ? __pfx_kasan_atomics+0x10/0x10 [ 13.475592] ? __pfx_read_tsc+0x10/0x10 [ 13.475612] ? ktime_get_ts64+0x86/0x230 [ 13.475636] kunit_try_run_case+0x1a5/0x480 [ 13.475657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.475676] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.475701] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.475726] ? __kthread_parkme+0x82/0x180 [ 13.475771] ? preempt_count_sub+0x50/0x80 [ 13.475797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.475818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.475842] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.475866] kthread+0x337/0x6f0 [ 13.475895] ? trace_preempt_on+0x20/0xc0 [ 13.475919] ? __pfx_kthread+0x10/0x10 [ 13.475937] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.475959] ? calculate_sigpending+0x7b/0xa0 [ 13.475981] ? __pfx_kthread+0x10/0x10 [ 13.475999] ret_from_fork+0x41/0x80 [ 13.476020] ? __pfx_kthread+0x10/0x10 [ 13.476039] ret_from_fork_asm+0x1a/0x30 [ 13.476069] </TASK> [ 13.476080] [ 13.488093] Allocated by task 284: [ 13.488271] kasan_save_stack+0x45/0x70 [ 13.488426] kasan_save_track+0x18/0x40 [ 13.488850] kasan_save_alloc_info+0x3b/0x50 [ 13.489177] __kasan_kmalloc+0xb7/0xc0 [ 13.489457] __kmalloc_cache_noprof+0x189/0x420 [ 13.489738] kasan_atomics+0x95/0x310 [ 13.489895] kunit_try_run_case+0x1a5/0x480 [ 13.490149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.490500] kthread+0x337/0x6f0 [ 13.490665] ret_from_fork+0x41/0x80 [ 13.490812] ret_from_fork_asm+0x1a/0x30 [ 13.491367] [ 13.491569] The buggy address belongs to the object at ffff888103a31d80 [ 13.491569] which belongs to the cache kmalloc-64 of size 64 [ 13.492452] The buggy address is located 0 bytes to the right of [ 13.492452] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.493374] [ 13.493457] The buggy address belongs to the physical page: [ 13.493728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.494362] flags: 0x200000000000000(node=0|zone=2) [ 13.494686] page_type: f5(slab) [ 13.495048] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.495385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.495949] page dumped because: kasan: bad access detected [ 13.496190] [ 13.496275] Memory state around the buggy address: [ 13.496631] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.497106] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.497536] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.498134] ^ [ 13.498314] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.498914] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.499252] ================================================================== [ 13.734626] ================================================================== [ 13.734923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 13.735217] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.735553] [ 13.735688] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.735733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.735745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.735766] Call Trace: [ 13.735779] <TASK> [ 13.735813] dump_stack_lvl+0x73/0xb0 [ 13.735838] print_report+0xd1/0x610 [ 13.735862] ? __virt_addr_valid+0x1db/0x2d0 [ 13.735892] ? kasan_atomics_helper+0x992/0x5450 [ 13.735915] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.735939] ? kasan_atomics_helper+0x992/0x5450 [ 13.735964] kasan_report+0x141/0x180 [ 13.735988] ? kasan_atomics_helper+0x992/0x5450 [ 13.736016] kasan_check_range+0x10c/0x1c0 [ 13.736048] __kasan_check_write+0x18/0x20 [ 13.736070] kasan_atomics_helper+0x992/0x5450 [ 13.736095] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.736130] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.736152] ? ret_from_fork_asm+0x1a/0x30 [ 13.736174] ? kasan_atomics+0x152/0x310 [ 13.736200] kasan_atomics+0x1dc/0x310 [ 13.736221] ? __pfx_kasan_atomics+0x10/0x10 [ 13.736244] ? __pfx_read_tsc+0x10/0x10 [ 13.736264] ? ktime_get_ts64+0x86/0x230 [ 13.736290] kunit_try_run_case+0x1a5/0x480 [ 13.736313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.736333] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.736359] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.736385] ? __kthread_parkme+0x82/0x180 [ 13.736408] ? preempt_count_sub+0x50/0x80 [ 13.736434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.736456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.736481] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.736507] kthread+0x337/0x6f0 [ 13.736525] ? trace_preempt_on+0x20/0xc0 [ 13.736550] ? __pfx_kthread+0x10/0x10 [ 13.736569] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.736593] ? calculate_sigpending+0x7b/0xa0 [ 13.736616] ? __pfx_kthread+0x10/0x10 [ 13.736645] ret_from_fork+0x41/0x80 [ 13.736667] ? __pfx_kthread+0x10/0x10 [ 13.736686] ret_from_fork_asm+0x1a/0x30 [ 13.736728] </TASK> [ 13.736739] [ 13.745598] Allocated by task 284: [ 13.745772] kasan_save_stack+0x45/0x70 [ 13.745978] kasan_save_track+0x18/0x40 [ 13.746161] kasan_save_alloc_info+0x3b/0x50 [ 13.746352] __kasan_kmalloc+0xb7/0xc0 [ 13.746520] __kmalloc_cache_noprof+0x189/0x420 [ 13.746724] kasan_atomics+0x95/0x310 [ 13.747482] kunit_try_run_case+0x1a5/0x480 [ 13.747702] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.748217] kthread+0x337/0x6f0 [ 13.748659] ret_from_fork+0x41/0x80 [ 13.749060] ret_from_fork_asm+0x1a/0x30 [ 13.749397] [ 13.749619] The buggy address belongs to the object at ffff888103a31d80 [ 13.749619] which belongs to the cache kmalloc-64 of size 64 [ 13.750497] The buggy address is located 0 bytes to the right of [ 13.750497] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.751447] [ 13.751562] The buggy address belongs to the physical page: [ 13.751803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.752139] flags: 0x200000000000000(node=0|zone=2) [ 13.752362] page_type: f5(slab) [ 13.752514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.753153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.753628] page dumped because: kasan: bad access detected [ 13.754267] [ 13.754512] Memory state around the buggy address: [ 13.754747] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.755402] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.755894] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.756400] ^ [ 13.756829] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.757301] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.757605] ================================================================== [ 13.861183] ================================================================== [ 13.861599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 13.861951] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.862172] [ 13.862250] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.862304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.862316] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.862336] Call Trace: [ 13.862349] <TASK> [ 13.862363] dump_stack_lvl+0x73/0xb0 [ 13.862387] print_report+0xd1/0x610 [ 13.862409] ? __virt_addr_valid+0x1db/0x2d0 [ 13.862442] ? kasan_atomics_helper+0xd47/0x5450 [ 13.862464] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.862487] ? kasan_atomics_helper+0xd47/0x5450 [ 13.862521] kasan_report+0x141/0x180 [ 13.862544] ? kasan_atomics_helper+0xd47/0x5450 [ 13.862571] kasan_check_range+0x10c/0x1c0 [ 13.862592] __kasan_check_write+0x18/0x20 [ 13.862612] kasan_atomics_helper+0xd47/0x5450 [ 13.862636] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.862658] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.862679] ? ret_from_fork_asm+0x1a/0x30 [ 13.862700] ? kasan_atomics+0x152/0x310 [ 13.862723] kasan_atomics+0x1dc/0x310 [ 13.862743] ? __pfx_kasan_atomics+0x10/0x10 [ 13.862774] ? __pfx_read_tsc+0x10/0x10 [ 13.862794] ? ktime_get_ts64+0x86/0x230 [ 13.862818] kunit_try_run_case+0x1a5/0x480 [ 13.862850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.862869] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.862902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.862926] ? __kthread_parkme+0x82/0x180 [ 13.862948] ? preempt_count_sub+0x50/0x80 [ 13.862972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.862993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.863017] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.863041] kthread+0x337/0x6f0 [ 13.863058] ? trace_preempt_on+0x20/0xc0 [ 13.863081] ? __pfx_kthread+0x10/0x10 [ 13.863099] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.863121] ? calculate_sigpending+0x7b/0xa0 [ 13.863142] ? __pfx_kthread+0x10/0x10 [ 13.863161] ret_from_fork+0x41/0x80 [ 13.863181] ? __pfx_kthread+0x10/0x10 [ 13.863199] ret_from_fork_asm+0x1a/0x30 [ 13.863240] </TASK> [ 13.863250] [ 13.871293] Allocated by task 284: [ 13.871417] kasan_save_stack+0x45/0x70 [ 13.871613] kasan_save_track+0x18/0x40 [ 13.871840] kasan_save_alloc_info+0x3b/0x50 [ 13.872034] __kasan_kmalloc+0xb7/0xc0 [ 13.872166] __kmalloc_cache_noprof+0x189/0x420 [ 13.872317] kasan_atomics+0x95/0x310 [ 13.872525] kunit_try_run_case+0x1a5/0x480 [ 13.872731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.873032] kthread+0x337/0x6f0 [ 13.873244] ret_from_fork+0x41/0x80 [ 13.873415] ret_from_fork_asm+0x1a/0x30 [ 13.873650] [ 13.873744] The buggy address belongs to the object at ffff888103a31d80 [ 13.873744] which belongs to the cache kmalloc-64 of size 64 [ 13.874230] The buggy address is located 0 bytes to the right of [ 13.874230] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.874593] [ 13.874665] The buggy address belongs to the physical page: [ 13.874869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.875253] flags: 0x200000000000000(node=0|zone=2) [ 13.875485] page_type: f5(slab) [ 13.875651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.876230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.876465] page dumped because: kasan: bad access detected [ 13.876634] [ 13.876704] Memory state around the buggy address: [ 13.876976] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.877330] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.877673] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.878050] ^ [ 13.878272] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.878540] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.878892] ================================================================== [ 14.073082] ================================================================== [ 14.073392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.073672] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.074102] [ 14.074187] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.074229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.074241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.074262] Call Trace: [ 14.074274] <TASK> [ 14.074288] dump_stack_lvl+0x73/0xb0 [ 14.074312] print_report+0xd1/0x610 [ 14.074335] ? __virt_addr_valid+0x1db/0x2d0 [ 14.074356] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.074378] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.074401] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.074423] kasan_report+0x141/0x180 [ 14.074447] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.074474] __asan_report_load4_noabort+0x18/0x20 [ 14.074495] kasan_atomics_helper+0x49e8/0x5450 [ 14.074518] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.074541] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.074562] ? ret_from_fork_asm+0x1a/0x30 [ 14.074583] ? kasan_atomics+0x152/0x310 [ 14.074606] kasan_atomics+0x1dc/0x310 [ 14.074626] ? __pfx_kasan_atomics+0x10/0x10 [ 14.074647] ? __pfx_read_tsc+0x10/0x10 [ 14.074667] ? ktime_get_ts64+0x86/0x230 [ 14.074691] kunit_try_run_case+0x1a5/0x480 [ 14.074712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.074731] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.074755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.074779] ? __kthread_parkme+0x82/0x180 [ 14.074801] ? preempt_count_sub+0x50/0x80 [ 14.074826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.074847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.074870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.074906] kthread+0x337/0x6f0 [ 14.074924] ? trace_preempt_on+0x20/0xc0 [ 14.074947] ? __pfx_kthread+0x10/0x10 [ 14.074965] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.074987] ? calculate_sigpending+0x7b/0xa0 [ 14.075009] ? __pfx_kthread+0x10/0x10 [ 14.075028] ret_from_fork+0x41/0x80 [ 14.075049] ? __pfx_kthread+0x10/0x10 [ 14.075068] ret_from_fork_asm+0x1a/0x30 [ 14.075098] </TASK> [ 14.075108] [ 14.082524] Allocated by task 284: [ 14.082664] kasan_save_stack+0x45/0x70 [ 14.082912] kasan_save_track+0x18/0x40 [ 14.083067] kasan_save_alloc_info+0x3b/0x50 [ 14.083215] __kasan_kmalloc+0xb7/0xc0 [ 14.083350] __kmalloc_cache_noprof+0x189/0x420 [ 14.083560] kasan_atomics+0x95/0x310 [ 14.083749] kunit_try_run_case+0x1a5/0x480 [ 14.084121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.084359] kthread+0x337/0x6f0 [ 14.084499] ret_from_fork+0x41/0x80 [ 14.084667] ret_from_fork_asm+0x1a/0x30 [ 14.084853] [ 14.084944] The buggy address belongs to the object at ffff888103a31d80 [ 14.084944] which belongs to the cache kmalloc-64 of size 64 [ 14.085418] The buggy address is located 0 bytes to the right of [ 14.085418] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.085938] [ 14.086033] The buggy address belongs to the physical page: [ 14.086249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.086562] flags: 0x200000000000000(node=0|zone=2) [ 14.086778] page_type: f5(slab) [ 14.086941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.087258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.087550] page dumped because: kasan: bad access detected [ 14.087779] [ 14.087913] Memory state around the buggy address: [ 14.088078] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.088291] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.088502] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.088711] ^ [ 14.088902] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.089230] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.089815] ================================================================== [ 14.252870] ================================================================== [ 14.253225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.253489] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.253870] [ 14.253999] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.254041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.254053] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.254073] Call Trace: [ 14.254088] <TASK> [ 14.254102] dump_stack_lvl+0x73/0xb0 [ 14.254126] print_report+0xd1/0x610 [ 14.254149] ? __virt_addr_valid+0x1db/0x2d0 [ 14.254170] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.254192] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.254216] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.254239] kasan_report+0x141/0x180 [ 14.254262] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.254290] kasan_check_range+0x10c/0x1c0 [ 14.254311] __kasan_check_write+0x18/0x20 [ 14.254331] kasan_atomics_helper+0x16e7/0x5450 [ 14.254355] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.254377] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.254398] ? ret_from_fork_asm+0x1a/0x30 [ 14.254420] ? kasan_atomics+0x152/0x310 [ 14.254443] kasan_atomics+0x1dc/0x310 [ 14.254463] ? __pfx_kasan_atomics+0x10/0x10 [ 14.254485] ? __pfx_read_tsc+0x10/0x10 [ 14.254504] ? ktime_get_ts64+0x86/0x230 [ 14.254529] kunit_try_run_case+0x1a5/0x480 [ 14.254551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.254570] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.254594] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.254619] ? __kthread_parkme+0x82/0x180 [ 14.254641] ? preempt_count_sub+0x50/0x80 [ 14.254666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.254687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.254710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.254733] kthread+0x337/0x6f0 [ 14.254749] ? trace_preempt_on+0x20/0xc0 [ 14.254772] ? __pfx_kthread+0x10/0x10 [ 14.254791] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.254829] ? calculate_sigpending+0x7b/0xa0 [ 14.254851] ? __pfx_kthread+0x10/0x10 [ 14.254869] ret_from_fork+0x41/0x80 [ 14.254899] ? __pfx_kthread+0x10/0x10 [ 14.254918] ret_from_fork_asm+0x1a/0x30 [ 14.254948] </TASK> [ 14.254959] [ 14.262498] Allocated by task 284: [ 14.262679] kasan_save_stack+0x45/0x70 [ 14.262902] kasan_save_track+0x18/0x40 [ 14.263040] kasan_save_alloc_info+0x3b/0x50 [ 14.263243] __kasan_kmalloc+0xb7/0xc0 [ 14.263416] __kmalloc_cache_noprof+0x189/0x420 [ 14.263625] kasan_atomics+0x95/0x310 [ 14.263785] kunit_try_run_case+0x1a5/0x480 [ 14.264001] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.264201] kthread+0x337/0x6f0 [ 14.264370] ret_from_fork+0x41/0x80 [ 14.264520] ret_from_fork_asm+0x1a/0x30 [ 14.264718] [ 14.264798] The buggy address belongs to the object at ffff888103a31d80 [ 14.264798] which belongs to the cache kmalloc-64 of size 64 [ 14.265169] The buggy address is located 0 bytes to the right of [ 14.265169] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.265527] [ 14.265599] The buggy address belongs to the physical page: [ 14.265769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.266199] flags: 0x200000000000000(node=0|zone=2) [ 14.266430] page_type: f5(slab) [ 14.266594] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.266963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.267294] page dumped because: kasan: bad access detected [ 14.267540] [ 14.267619] Memory state around the buggy address: [ 14.267772] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.268016] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.268232] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.268533] ^ [ 14.268781] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.269130] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.269452] ================================================================== [ 14.309761] ================================================================== [ 14.310145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.310578] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.311118] [ 14.311226] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.311270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.311283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.311303] Call Trace: [ 14.311319] <TASK> [ 14.311334] dump_stack_lvl+0x73/0xb0 [ 14.311359] print_report+0xd1/0x610 [ 14.311381] ? __virt_addr_valid+0x1db/0x2d0 [ 14.311402] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.311424] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.311447] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.311470] kasan_report+0x141/0x180 [ 14.311492] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.311520] kasan_check_range+0x10c/0x1c0 [ 14.311540] __kasan_check_write+0x18/0x20 [ 14.311560] kasan_atomics_helper+0x18b1/0x5450 [ 14.311584] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.311607] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.311628] ? ret_from_fork_asm+0x1a/0x30 [ 14.311650] ? kasan_atomics+0x152/0x310 [ 14.311673] kasan_atomics+0x1dc/0x310 [ 14.311692] ? __pfx_kasan_atomics+0x10/0x10 [ 14.311714] ? __pfx_read_tsc+0x10/0x10 [ 14.311733] ? ktime_get_ts64+0x86/0x230 [ 14.311757] kunit_try_run_case+0x1a5/0x480 [ 14.311778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.311991] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.312026] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.312052] ? __kthread_parkme+0x82/0x180 [ 14.312074] ? preempt_count_sub+0x50/0x80 [ 14.312099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.312120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.312179] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.312203] kthread+0x337/0x6f0 [ 14.312221] ? trace_preempt_on+0x20/0xc0 [ 14.312245] ? __pfx_kthread+0x10/0x10 [ 14.312263] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.312286] ? calculate_sigpending+0x7b/0xa0 [ 14.312307] ? __pfx_kthread+0x10/0x10 [ 14.312327] ret_from_fork+0x41/0x80 [ 14.312347] ? __pfx_kthread+0x10/0x10 [ 14.312365] ret_from_fork_asm+0x1a/0x30 [ 14.312396] </TASK> [ 14.312406] [ 14.324065] Allocated by task 284: [ 14.324338] kasan_save_stack+0x45/0x70 [ 14.324539] kasan_save_track+0x18/0x40 [ 14.324714] kasan_save_alloc_info+0x3b/0x50 [ 14.325144] __kasan_kmalloc+0xb7/0xc0 [ 14.325514] __kmalloc_cache_noprof+0x189/0x420 [ 14.325859] kasan_atomics+0x95/0x310 [ 14.326048] kunit_try_run_case+0x1a5/0x480 [ 14.326239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.326474] kthread+0x337/0x6f0 [ 14.326627] ret_from_fork+0x41/0x80 [ 14.327107] ret_from_fork_asm+0x1a/0x30 [ 14.327382] [ 14.327609] The buggy address belongs to the object at ffff888103a31d80 [ 14.327609] which belongs to the cache kmalloc-64 of size 64 [ 14.328383] The buggy address is located 0 bytes to the right of [ 14.328383] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.329088] [ 14.329191] The buggy address belongs to the physical page: [ 14.329427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.329754] flags: 0x200000000000000(node=0|zone=2) [ 14.330335] page_type: f5(slab) [ 14.330634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.331296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.331719] page dumped because: kasan: bad access detected [ 14.332159] [ 14.332258] Memory state around the buggy address: [ 14.332702] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.333232] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.333658] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.334174] ^ [ 14.334515] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.334999] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.335434] ================================================================== [ 14.337001] ================================================================== [ 14.337271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.337509] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.337760] [ 14.337978] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.338047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.338059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.338079] Call Trace: [ 14.338094] <TASK> [ 14.338110] dump_stack_lvl+0x73/0xb0 [ 14.338135] print_report+0xd1/0x610 [ 14.338158] ? __virt_addr_valid+0x1db/0x2d0 [ 14.338179] ? kasan_atomics_helper+0x194a/0x5450 [ 14.338200] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.338223] ? kasan_atomics_helper+0x194a/0x5450 [ 14.338245] kasan_report+0x141/0x180 [ 14.338268] ? kasan_atomics_helper+0x194a/0x5450 [ 14.338295] kasan_check_range+0x10c/0x1c0 [ 14.338316] __kasan_check_write+0x18/0x20 [ 14.338335] kasan_atomics_helper+0x194a/0x5450 [ 14.338359] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.338381] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.338402] ? ret_from_fork_asm+0x1a/0x30 [ 14.338423] ? kasan_atomics+0x152/0x310 [ 14.338446] kasan_atomics+0x1dc/0x310 [ 14.338465] ? __pfx_kasan_atomics+0x10/0x10 [ 14.338486] ? __pfx_read_tsc+0x10/0x10 [ 14.338505] ? ktime_get_ts64+0x86/0x230 [ 14.338530] kunit_try_run_case+0x1a5/0x480 [ 14.338551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.338569] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.338594] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.338618] ? __kthread_parkme+0x82/0x180 [ 14.338640] ? preempt_count_sub+0x50/0x80 [ 14.338665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.338686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.338710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.338733] kthread+0x337/0x6f0 [ 14.338751] ? trace_preempt_on+0x20/0xc0 [ 14.338775] ? __pfx_kthread+0x10/0x10 [ 14.338794] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.338816] ? calculate_sigpending+0x7b/0xa0 [ 14.338838] ? __pfx_kthread+0x10/0x10 [ 14.338857] ret_from_fork+0x41/0x80 [ 14.338887] ? __pfx_kthread+0x10/0x10 [ 14.338905] ret_from_fork_asm+0x1a/0x30 [ 14.338935] </TASK> [ 14.338946] [ 14.350196] Allocated by task 284: [ 14.350467] kasan_save_stack+0x45/0x70 [ 14.350662] kasan_save_track+0x18/0x40 [ 14.350839] kasan_save_alloc_info+0x3b/0x50 [ 14.351011] __kasan_kmalloc+0xb7/0xc0 [ 14.351233] __kmalloc_cache_noprof+0x189/0x420 [ 14.351488] kasan_atomics+0x95/0x310 [ 14.351635] kunit_try_run_case+0x1a5/0x480 [ 14.351771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.351946] kthread+0x337/0x6f0 [ 14.352295] ret_from_fork+0x41/0x80 [ 14.352472] ret_from_fork_asm+0x1a/0x30 [ 14.352644] [ 14.352712] The buggy address belongs to the object at ffff888103a31d80 [ 14.352712] which belongs to the cache kmalloc-64 of size 64 [ 14.353359] The buggy address is located 0 bytes to the right of [ 14.353359] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.353822] [ 14.353926] The buggy address belongs to the physical page: [ 14.354177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.354469] flags: 0x200000000000000(node=0|zone=2) [ 14.354697] page_type: f5(slab) [ 14.354894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.355189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.355467] page dumped because: kasan: bad access detected [ 14.355679] [ 14.355757] Memory state around the buggy address: [ 14.355981] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.356258] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.356514] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.356790] ^ [ 14.356989] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.357231] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.357434] ================================================================== [ 13.758766] ================================================================== [ 13.759500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 13.760209] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.760602] [ 13.760826] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.760995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.761014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.761035] Call Trace: [ 13.761051] <TASK> [ 13.761081] dump_stack_lvl+0x73/0xb0 [ 13.761111] print_report+0xd1/0x610 [ 13.761147] ? __virt_addr_valid+0x1db/0x2d0 [ 13.761170] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.761194] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.761219] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.761243] kasan_report+0x141/0x180 [ 13.761267] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.761295] kasan_check_range+0x10c/0x1c0 [ 13.761317] __kasan_check_write+0x18/0x20 [ 13.761339] kasan_atomics_helper+0xa2b/0x5450 [ 13.761363] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.761388] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.761410] ? ret_from_fork_asm+0x1a/0x30 [ 13.761433] ? kasan_atomics+0x152/0x310 [ 13.761458] kasan_atomics+0x1dc/0x310 [ 13.761479] ? __pfx_kasan_atomics+0x10/0x10 [ 13.761501] ? __pfx_read_tsc+0x10/0x10 [ 13.761522] ? ktime_get_ts64+0x86/0x230 [ 13.761548] kunit_try_run_case+0x1a5/0x480 [ 13.761570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.761591] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.761618] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.761644] ? __kthread_parkme+0x82/0x180 [ 13.761668] ? preempt_count_sub+0x50/0x80 [ 13.761694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.761716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.761742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.761767] kthread+0x337/0x6f0 [ 13.761786] ? trace_preempt_on+0x20/0xc0 [ 13.761837] ? __pfx_kthread+0x10/0x10 [ 13.761859] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.761892] ? calculate_sigpending+0x7b/0xa0 [ 13.761915] ? __pfx_kthread+0x10/0x10 [ 13.761935] ret_from_fork+0x41/0x80 [ 13.761957] ? __pfx_kthread+0x10/0x10 [ 13.761976] ret_from_fork_asm+0x1a/0x30 [ 13.762008] </TASK> [ 13.762020] [ 13.773855] Allocated by task 284: [ 13.774243] kasan_save_stack+0x45/0x70 [ 13.774569] kasan_save_track+0x18/0x40 [ 13.774983] kasan_save_alloc_info+0x3b/0x50 [ 13.775185] __kasan_kmalloc+0xb7/0xc0 [ 13.775359] __kmalloc_cache_noprof+0x189/0x420 [ 13.775560] kasan_atomics+0x95/0x310 [ 13.775730] kunit_try_run_case+0x1a5/0x480 [ 13.776203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.776667] kthread+0x337/0x6f0 [ 13.777035] ret_from_fork+0x41/0x80 [ 13.777229] ret_from_fork_asm+0x1a/0x30 [ 13.777415] [ 13.777509] The buggy address belongs to the object at ffff888103a31d80 [ 13.777509] which belongs to the cache kmalloc-64 of size 64 [ 13.778286] The buggy address is located 0 bytes to the right of [ 13.778286] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.778788] [ 13.779268] The buggy address belongs to the physical page: [ 13.779711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.780274] flags: 0x200000000000000(node=0|zone=2) [ 13.780705] page_type: f5(slab) [ 13.781032] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.781599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.782055] page dumped because: kasan: bad access detected [ 13.782518] [ 13.782621] Memory state around the buggy address: [ 13.783055] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.783429] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.783728] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.784500] ^ [ 13.784788] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.785096] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.785391] ================================================================== [ 14.357840] ================================================================== [ 14.358187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.358515] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.359089] [ 14.359170] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.359212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.359225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.359244] Call Trace: [ 14.359258] <TASK> [ 14.359273] dump_stack_lvl+0x73/0xb0 [ 14.359297] print_report+0xd1/0x610 [ 14.359320] ? __virt_addr_valid+0x1db/0x2d0 [ 14.359342] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.359363] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.359386] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.359409] kasan_report+0x141/0x180 [ 14.359432] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.359459] kasan_check_range+0x10c/0x1c0 [ 14.359479] __kasan_check_write+0x18/0x20 [ 14.359500] kasan_atomics_helper+0x19e3/0x5450 [ 14.359523] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.359546] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.359567] ? ret_from_fork_asm+0x1a/0x30 [ 14.359588] ? kasan_atomics+0x152/0x310 [ 14.359612] kasan_atomics+0x1dc/0x310 [ 14.359632] ? __pfx_kasan_atomics+0x10/0x10 [ 14.359654] ? __pfx_read_tsc+0x10/0x10 [ 14.359673] ? ktime_get_ts64+0x86/0x230 [ 14.359699] kunit_try_run_case+0x1a5/0x480 [ 14.359721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.359740] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.359765] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.359789] ? __kthread_parkme+0x82/0x180 [ 14.359811] ? preempt_count_sub+0x50/0x80 [ 14.359836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.359857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.359894] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.359918] kthread+0x337/0x6f0 [ 14.359937] ? trace_preempt_on+0x20/0xc0 [ 14.359961] ? __pfx_kthread+0x10/0x10 [ 14.359980] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.360003] ? calculate_sigpending+0x7b/0xa0 [ 14.360024] ? __pfx_kthread+0x10/0x10 [ 14.360042] ret_from_fork+0x41/0x80 [ 14.360063] ? __pfx_kthread+0x10/0x10 [ 14.360081] ret_from_fork_asm+0x1a/0x30 [ 14.360111] </TASK> [ 14.360122] [ 14.368379] Allocated by task 284: [ 14.368540] kasan_save_stack+0x45/0x70 [ 14.368685] kasan_save_track+0x18/0x40 [ 14.368821] kasan_save_alloc_info+0x3b/0x50 [ 14.369046] __kasan_kmalloc+0xb7/0xc0 [ 14.369240] __kmalloc_cache_noprof+0x189/0x420 [ 14.369456] kasan_atomics+0x95/0x310 [ 14.369637] kunit_try_run_case+0x1a5/0x480 [ 14.369858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.370052] kthread+0x337/0x6f0 [ 14.370170] ret_from_fork+0x41/0x80 [ 14.370299] ret_from_fork_asm+0x1a/0x30 [ 14.370483] [ 14.370579] The buggy address belongs to the object at ffff888103a31d80 [ 14.370579] which belongs to the cache kmalloc-64 of size 64 [ 14.371341] The buggy address is located 0 bytes to the right of [ 14.371341] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.371903] [ 14.371977] The buggy address belongs to the physical page: [ 14.372222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.372530] flags: 0x200000000000000(node=0|zone=2) [ 14.372742] page_type: f5(slab) [ 14.372898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.373217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.373469] page dumped because: kasan: bad access detected [ 14.373716] [ 14.373810] Memory state around the buggy address: [ 14.373974] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.374189] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.374403] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.374713] ^ [ 14.374939] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.375244] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.375511] ================================================================== [ 14.445547] ================================================================== [ 14.446275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 14.446729] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.447331] [ 14.447443] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.447572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.447589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.447609] Call Trace: [ 14.447623] <TASK> [ 14.447638] dump_stack_lvl+0x73/0xb0 [ 14.447665] print_report+0xd1/0x610 [ 14.447689] ? __virt_addr_valid+0x1db/0x2d0 [ 14.447710] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.447731] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.447754] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.447777] kasan_report+0x141/0x180 [ 14.447799] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.447827] __asan_report_load8_noabort+0x18/0x20 [ 14.447848] kasan_atomics_helper+0x4f30/0x5450 [ 14.447873] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.447909] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.447930] ? ret_from_fork_asm+0x1a/0x30 [ 14.447951] ? kasan_atomics+0x152/0x310 [ 14.447974] kasan_atomics+0x1dc/0x310 [ 14.447994] ? __pfx_kasan_atomics+0x10/0x10 [ 14.448015] ? __pfx_read_tsc+0x10/0x10 [ 14.448034] ? ktime_get_ts64+0x86/0x230 [ 14.448059] kunit_try_run_case+0x1a5/0x480 [ 14.448080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.448099] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.448123] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.448146] ? __kthread_parkme+0x82/0x180 [ 14.448168] ? preempt_count_sub+0x50/0x80 [ 14.448193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.448213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.448236] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.448260] kthread+0x337/0x6f0 [ 14.448277] ? trace_preempt_on+0x20/0xc0 [ 14.448300] ? __pfx_kthread+0x10/0x10 [ 14.448317] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.448340] ? calculate_sigpending+0x7b/0xa0 [ 14.448361] ? __pfx_kthread+0x10/0x10 [ 14.448380] ret_from_fork+0x41/0x80 [ 14.448400] ? __pfx_kthread+0x10/0x10 [ 14.448418] ret_from_fork_asm+0x1a/0x30 [ 14.448448] </TASK> [ 14.448459] [ 14.458711] Allocated by task 284: [ 14.459111] kasan_save_stack+0x45/0x70 [ 14.459414] kasan_save_track+0x18/0x40 [ 14.459571] kasan_save_alloc_info+0x3b/0x50 [ 14.459927] __kasan_kmalloc+0xb7/0xc0 [ 14.460220] __kmalloc_cache_noprof+0x189/0x420 [ 14.460518] kasan_atomics+0x95/0x310 [ 14.460811] kunit_try_run_case+0x1a5/0x480 [ 14.461030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.461365] kthread+0x337/0x6f0 [ 14.461538] ret_from_fork+0x41/0x80 [ 14.461708] ret_from_fork_asm+0x1a/0x30 [ 14.462113] [ 14.462363] The buggy address belongs to the object at ffff888103a31d80 [ 14.462363] which belongs to the cache kmalloc-64 of size 64 [ 14.462977] The buggy address is located 0 bytes to the right of [ 14.462977] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.463527] [ 14.463767] The buggy address belongs to the physical page: [ 14.464116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.464503] flags: 0x200000000000000(node=0|zone=2) [ 14.464829] page_type: f5(slab) [ 14.464981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.465315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.465637] page dumped because: kasan: bad access detected [ 14.465891] [ 14.466258] Memory state around the buggy address: [ 14.466454] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.466875] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.467276] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.467657] ^ [ 14.468006] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.468261] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.468571] ================================================================== [ 14.654297] ================================================================== [ 14.654639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 14.655049] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.655725] [ 14.655837] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.655965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.655977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.655997] Call Trace: [ 14.656011] <TASK> [ 14.656126] dump_stack_lvl+0x73/0xb0 [ 14.656157] print_report+0xd1/0x610 [ 14.656180] ? __virt_addr_valid+0x1db/0x2d0 [ 14.656202] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.656223] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.656247] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.656270] kasan_report+0x141/0x180 [ 14.656293] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.656321] __asan_report_load8_noabort+0x18/0x20 [ 14.656343] kasan_atomics_helper+0x4fb2/0x5450 [ 14.656366] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.656389] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.656410] ? ret_from_fork_asm+0x1a/0x30 [ 14.656431] ? kasan_atomics+0x152/0x310 [ 14.656455] kasan_atomics+0x1dc/0x310 [ 14.656474] ? __pfx_kasan_atomics+0x10/0x10 [ 14.656495] ? __pfx_read_tsc+0x10/0x10 [ 14.656515] ? ktime_get_ts64+0x86/0x230 [ 14.656539] kunit_try_run_case+0x1a5/0x480 [ 14.656561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.656579] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.656604] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.656628] ? __kthread_parkme+0x82/0x180 [ 14.656650] ? preempt_count_sub+0x50/0x80 [ 14.656675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.656696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.656719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.656743] kthread+0x337/0x6f0 [ 14.656760] ? trace_preempt_on+0x20/0xc0 [ 14.656783] ? __pfx_kthread+0x10/0x10 [ 14.656801] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.656823] ? calculate_sigpending+0x7b/0xa0 [ 14.656845] ? __pfx_kthread+0x10/0x10 [ 14.656863] ret_from_fork+0x41/0x80 [ 14.656895] ? __pfx_kthread+0x10/0x10 [ 14.656914] ret_from_fork_asm+0x1a/0x30 [ 14.656944] </TASK> [ 14.656955] [ 14.666615] Allocated by task 284: [ 14.666966] kasan_save_stack+0x45/0x70 [ 14.667150] kasan_save_track+0x18/0x40 [ 14.667324] kasan_save_alloc_info+0x3b/0x50 [ 14.667500] __kasan_kmalloc+0xb7/0xc0 [ 14.667671] __kmalloc_cache_noprof+0x189/0x420 [ 14.667875] kasan_atomics+0x95/0x310 [ 14.668408] kunit_try_run_case+0x1a5/0x480 [ 14.668563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.668904] kthread+0x337/0x6f0 [ 14.669058] ret_from_fork+0x41/0x80 [ 14.669308] ret_from_fork_asm+0x1a/0x30 [ 14.669612] [ 14.669706] The buggy address belongs to the object at ffff888103a31d80 [ 14.669706] which belongs to the cache kmalloc-64 of size 64 [ 14.670398] The buggy address is located 0 bytes to the right of [ 14.670398] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.670979] [ 14.671065] The buggy address belongs to the physical page: [ 14.671295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.671614] flags: 0x200000000000000(node=0|zone=2) [ 14.671827] page_type: f5(slab) [ 14.672306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.672587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.673010] page dumped because: kasan: bad access detected [ 14.673324] [ 14.673398] Memory state around the buggy address: [ 14.673627] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.674223] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.674606] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.674857] ^ [ 14.675290] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.675662] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.676066] ================================================================== [ 13.994392] ================================================================== [ 13.994772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 13.995093] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.995349] [ 13.995431] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.995471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.995483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.995502] Call Trace: [ 13.995515] <TASK> [ 13.995529] dump_stack_lvl+0x73/0xb0 [ 13.995552] print_report+0xd1/0x610 [ 13.995574] ? __virt_addr_valid+0x1db/0x2d0 [ 13.995595] ? kasan_atomics_helper+0x4a1c/0x5450 [ 13.995617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.995640] ? kasan_atomics_helper+0x4a1c/0x5450 [ 13.995662] kasan_report+0x141/0x180 [ 13.995686] ? kasan_atomics_helper+0x4a1c/0x5450 [ 13.995724] __asan_report_load4_noabort+0x18/0x20 [ 13.995746] kasan_atomics_helper+0x4a1c/0x5450 [ 13.995769] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.995803] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.995833] ? ret_from_fork_asm+0x1a/0x30 [ 13.995854] ? kasan_atomics+0x152/0x310 [ 13.995891] kasan_atomics+0x1dc/0x310 [ 13.995920] ? __pfx_kasan_atomics+0x10/0x10 [ 13.995942] ? __pfx_read_tsc+0x10/0x10 [ 13.995961] ? ktime_get_ts64+0x86/0x230 [ 13.995996] kunit_try_run_case+0x1a5/0x480 [ 13.996017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.996036] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.996061] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.996085] ? __kthread_parkme+0x82/0x180 [ 13.996107] ? preempt_count_sub+0x50/0x80 [ 13.996131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.996152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.996175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.996199] kthread+0x337/0x6f0 [ 13.996216] ? trace_preempt_on+0x20/0xc0 [ 13.996239] ? __pfx_kthread+0x10/0x10 [ 13.996258] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.996289] ? calculate_sigpending+0x7b/0xa0 [ 13.996310] ? __pfx_kthread+0x10/0x10 [ 13.996329] ret_from_fork+0x41/0x80 [ 13.996360] ? __pfx_kthread+0x10/0x10 [ 13.996379] ret_from_fork_asm+0x1a/0x30 [ 13.996409] </TASK> [ 13.996420] [ 14.004189] Allocated by task 284: [ 14.004373] kasan_save_stack+0x45/0x70 [ 14.004558] kasan_save_track+0x18/0x40 [ 14.004694] kasan_save_alloc_info+0x3b/0x50 [ 14.004838] __kasan_kmalloc+0xb7/0xc0 [ 14.004980] __kmalloc_cache_noprof+0x189/0x420 [ 14.005141] kasan_atomics+0x95/0x310 [ 14.005272] kunit_try_run_case+0x1a5/0x480 [ 14.005413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.005666] kthread+0x337/0x6f0 [ 14.006024] ret_from_fork+0x41/0x80 [ 14.006229] ret_from_fork_asm+0x1a/0x30 [ 14.006424] [ 14.006518] The buggy address belongs to the object at ffff888103a31d80 [ 14.006518] which belongs to the cache kmalloc-64 of size 64 [ 14.006922] The buggy address is located 0 bytes to the right of [ 14.006922] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.007285] [ 14.007355] The buggy address belongs to the physical page: [ 14.007525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.007953] flags: 0x200000000000000(node=0|zone=2) [ 14.008201] page_type: f5(slab) [ 14.008392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.008779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.009166] page dumped because: kasan: bad access detected [ 14.009430] [ 14.009547] Memory state around the buggy address: [ 14.009769] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.010348] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.010568] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.011014] ^ [ 14.011212] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.011425] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.011634] ================================================================== [ 13.898178] ================================================================== [ 13.898960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 13.899321] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.899655] [ 13.899933] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.899979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.899991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.900012] Call Trace: [ 13.900025] <TASK> [ 13.900050] dump_stack_lvl+0x73/0xb0 [ 13.900075] print_report+0xd1/0x610 [ 13.900099] ? __virt_addr_valid+0x1db/0x2d0 [ 13.900131] ? kasan_atomics_helper+0xe78/0x5450 [ 13.900154] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.900177] ? kasan_atomics_helper+0xe78/0x5450 [ 13.900200] kasan_report+0x141/0x180 [ 13.900223] ? kasan_atomics_helper+0xe78/0x5450 [ 13.900251] kasan_check_range+0x10c/0x1c0 [ 13.900271] __kasan_check_write+0x18/0x20 [ 13.900291] kasan_atomics_helper+0xe78/0x5450 [ 13.900315] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.900348] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.900369] ? ret_from_fork_asm+0x1a/0x30 [ 13.900390] ? kasan_atomics+0x152/0x310 [ 13.900423] kasan_atomics+0x1dc/0x310 [ 13.900444] ? __pfx_kasan_atomics+0x10/0x10 [ 13.900465] ? __pfx_read_tsc+0x10/0x10 [ 13.900484] ? ktime_get_ts64+0x86/0x230 [ 13.900509] kunit_try_run_case+0x1a5/0x480 [ 13.900530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.900550] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.900574] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.900598] ? __kthread_parkme+0x82/0x180 [ 13.900620] ? preempt_count_sub+0x50/0x80 [ 13.900644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.900675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.900698] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.900721] kthread+0x337/0x6f0 [ 13.900748] ? trace_preempt_on+0x20/0xc0 [ 13.900773] ? __pfx_kthread+0x10/0x10 [ 13.900791] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.900826] ? calculate_sigpending+0x7b/0xa0 [ 13.900848] ? __pfx_kthread+0x10/0x10 [ 13.900873] ret_from_fork+0x41/0x80 [ 13.900903] ? __pfx_kthread+0x10/0x10 [ 13.900921] ret_from_fork_asm+0x1a/0x30 [ 13.900963] </TASK> [ 13.900974] [ 13.908777] Allocated by task 284: [ 13.908991] kasan_save_stack+0x45/0x70 [ 13.909183] kasan_save_track+0x18/0x40 [ 13.909462] kasan_save_alloc_info+0x3b/0x50 [ 13.909652] __kasan_kmalloc+0xb7/0xc0 [ 13.909863] __kmalloc_cache_noprof+0x189/0x420 [ 13.910076] kasan_atomics+0x95/0x310 [ 13.910229] kunit_try_run_case+0x1a5/0x480 [ 13.910382] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.910651] kthread+0x337/0x6f0 [ 13.910814] ret_from_fork+0x41/0x80 [ 13.910994] ret_from_fork_asm+0x1a/0x30 [ 13.911263] [ 13.911334] The buggy address belongs to the object at ffff888103a31d80 [ 13.911334] which belongs to the cache kmalloc-64 of size 64 [ 13.911897] The buggy address is located 0 bytes to the right of [ 13.911897] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.912278] [ 13.912348] The buggy address belongs to the physical page: [ 13.912519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.912823] flags: 0x200000000000000(node=0|zone=2) [ 13.913142] page_type: f5(slab) [ 13.913333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.913671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.914119] page dumped because: kasan: bad access detected [ 13.914287] [ 13.914356] Memory state around the buggy address: [ 13.914507] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.914716] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.915320] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.915643] ^ [ 13.915906] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.916237] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.916446] ================================================================== [ 14.145551] ================================================================== [ 14.146017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.146249] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.146569] [ 14.146672] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.146713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.146725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.146745] Call Trace: [ 14.146759] <TASK> [ 14.146772] dump_stack_lvl+0x73/0xb0 [ 14.146795] print_report+0xd1/0x610 [ 14.146818] ? __virt_addr_valid+0x1db/0x2d0 [ 14.146839] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.146860] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.146894] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.146917] kasan_report+0x141/0x180 [ 14.146939] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.146967] __asan_report_load8_noabort+0x18/0x20 [ 14.146988] kasan_atomics_helper+0x4eae/0x5450 [ 14.147012] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.147035] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.147056] ? ret_from_fork_asm+0x1a/0x30 [ 14.147077] ? kasan_atomics+0x152/0x310 [ 14.147101] kasan_atomics+0x1dc/0x310 [ 14.147121] ? __pfx_kasan_atomics+0x10/0x10 [ 14.147143] ? __pfx_read_tsc+0x10/0x10 [ 14.147162] ? ktime_get_ts64+0x86/0x230 [ 14.147186] kunit_try_run_case+0x1a5/0x480 [ 14.147207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.147227] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.147251] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.147276] ? __kthread_parkme+0x82/0x180 [ 14.147298] ? preempt_count_sub+0x50/0x80 [ 14.147323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.147343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.147366] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.147389] kthread+0x337/0x6f0 [ 14.147406] ? trace_preempt_on+0x20/0xc0 [ 14.147429] ? __pfx_kthread+0x10/0x10 [ 14.147448] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.147469] ? calculate_sigpending+0x7b/0xa0 [ 14.147491] ? __pfx_kthread+0x10/0x10 [ 14.147510] ret_from_fork+0x41/0x80 [ 14.147531] ? __pfx_kthread+0x10/0x10 [ 14.147549] ret_from_fork_asm+0x1a/0x30 [ 14.147579] </TASK> [ 14.147589] [ 14.154709] Allocated by task 284: [ 14.154945] kasan_save_stack+0x45/0x70 [ 14.155147] kasan_save_track+0x18/0x40 [ 14.155343] kasan_save_alloc_info+0x3b/0x50 [ 14.155552] __kasan_kmalloc+0xb7/0xc0 [ 14.155751] __kmalloc_cache_noprof+0x189/0x420 [ 14.156142] kasan_atomics+0x95/0x310 [ 14.156368] kunit_try_run_case+0x1a5/0x480 [ 14.156574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.156790] kthread+0x337/0x6f0 [ 14.156938] ret_from_fork+0x41/0x80 [ 14.157114] ret_from_fork_asm+0x1a/0x30 [ 14.157253] [ 14.157348] The buggy address belongs to the object at ffff888103a31d80 [ 14.157348] which belongs to the cache kmalloc-64 of size 64 [ 14.157840] The buggy address is located 0 bytes to the right of [ 14.157840] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.158378] [ 14.158448] The buggy address belongs to the physical page: [ 14.158617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.158851] flags: 0x200000000000000(node=0|zone=2) [ 14.159252] page_type: f5(slab) [ 14.159422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.159746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.160152] page dumped because: kasan: bad access detected [ 14.160373] [ 14.160455] Memory state around the buggy address: [ 14.160661] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.160959] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.161225] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.161436] ^ [ 14.161587] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.161799] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.162083] ================================================================== [ 14.162787] ================================================================== [ 14.163184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.163524] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.164081] [ 14.164190] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.164232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.164243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.164263] Call Trace: [ 14.164277] <TASK> [ 14.164291] dump_stack_lvl+0x73/0xb0 [ 14.164313] print_report+0xd1/0x610 [ 14.164336] ? __virt_addr_valid+0x1db/0x2d0 [ 14.164357] ? kasan_atomics_helper+0x1467/0x5450 [ 14.164379] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.164405] ? kasan_atomics_helper+0x1467/0x5450 [ 14.164429] kasan_report+0x141/0x180 [ 14.164452] ? kasan_atomics_helper+0x1467/0x5450 [ 14.164480] kasan_check_range+0x10c/0x1c0 [ 14.164501] __kasan_check_write+0x18/0x20 [ 14.164521] kasan_atomics_helper+0x1467/0x5450 [ 14.164544] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.164567] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.164587] ? ret_from_fork_asm+0x1a/0x30 [ 14.164608] ? kasan_atomics+0x152/0x310 [ 14.164631] kasan_atomics+0x1dc/0x310 [ 14.164653] ? __pfx_kasan_atomics+0x10/0x10 [ 14.164674] ? __pfx_read_tsc+0x10/0x10 [ 14.164694] ? ktime_get_ts64+0x86/0x230 [ 14.164719] kunit_try_run_case+0x1a5/0x480 [ 14.164739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.164758] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.164782] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.164806] ? __kthread_parkme+0x82/0x180 [ 14.164827] ? preempt_count_sub+0x50/0x80 [ 14.164852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.164872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.164906] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.164929] kthread+0x337/0x6f0 [ 14.164946] ? trace_preempt_on+0x20/0xc0 [ 14.164970] ? __pfx_kthread+0x10/0x10 [ 14.164987] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.165010] ? calculate_sigpending+0x7b/0xa0 [ 14.165030] ? __pfx_kthread+0x10/0x10 [ 14.165049] ret_from_fork+0x41/0x80 [ 14.165069] ? __pfx_kthread+0x10/0x10 [ 14.165088] ret_from_fork_asm+0x1a/0x30 [ 14.165118] </TASK> [ 14.165132] [ 14.172852] Allocated by task 284: [ 14.173016] kasan_save_stack+0x45/0x70 [ 14.173211] kasan_save_track+0x18/0x40 [ 14.173369] kasan_save_alloc_info+0x3b/0x50 [ 14.173566] __kasan_kmalloc+0xb7/0xc0 [ 14.173723] __kmalloc_cache_noprof+0x189/0x420 [ 14.173967] kasan_atomics+0x95/0x310 [ 14.174097] kunit_try_run_case+0x1a5/0x480 [ 14.174238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.174437] kthread+0x337/0x6f0 [ 14.174609] ret_from_fork+0x41/0x80 [ 14.174790] ret_from_fork_asm+0x1a/0x30 [ 14.175017] [ 14.175088] The buggy address belongs to the object at ffff888103a31d80 [ 14.175088] which belongs to the cache kmalloc-64 of size 64 [ 14.175672] The buggy address is located 0 bytes to the right of [ 14.175672] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.176223] [ 14.176308] The buggy address belongs to the physical page: [ 14.176530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.176949] flags: 0x200000000000000(node=0|zone=2) [ 14.177201] page_type: f5(slab) [ 14.177360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.177655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.177919] page dumped because: kasan: bad access detected [ 14.178093] [ 14.178166] Memory state around the buggy address: [ 14.178324] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.178538] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.178750] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.179074] ^ [ 14.179296] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.179612] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.179936] ================================================================== [ 13.447642] ================================================================== [ 13.448050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.448314] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.448700] [ 13.448784] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.448939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.448952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.448991] Call Trace: [ 13.449004] <TASK> [ 13.449019] dump_stack_lvl+0x73/0xb0 [ 13.449296] print_report+0xd1/0x610 [ 13.449319] ? __virt_addr_valid+0x1db/0x2d0 [ 13.449341] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.449363] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.449386] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.449409] kasan_report+0x141/0x180 [ 13.449432] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.449459] __asan_report_store4_noabort+0x1b/0x30 [ 13.449480] kasan_atomics_helper+0x4b6e/0x5450 [ 13.449504] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.449527] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.449548] ? ret_from_fork_asm+0x1a/0x30 [ 13.449570] ? kasan_atomics+0x152/0x310 [ 13.449593] kasan_atomics+0x1dc/0x310 [ 13.449613] ? __pfx_kasan_atomics+0x10/0x10 [ 13.449634] ? __pfx_read_tsc+0x10/0x10 [ 13.449654] ? ktime_get_ts64+0x86/0x230 [ 13.449679] kunit_try_run_case+0x1a5/0x480 [ 13.449701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.449719] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.449744] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.449768] ? __kthread_parkme+0x82/0x180 [ 13.449790] ? preempt_count_sub+0x50/0x80 [ 13.449815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.449836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.449859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.449893] kthread+0x337/0x6f0 [ 13.449911] ? trace_preempt_on+0x20/0xc0 [ 13.449934] ? __pfx_kthread+0x10/0x10 [ 13.449952] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.450463] ? calculate_sigpending+0x7b/0xa0 [ 13.450496] ? __pfx_kthread+0x10/0x10 [ 13.450517] ret_from_fork+0x41/0x80 [ 13.450539] ? __pfx_kthread+0x10/0x10 [ 13.450558] ret_from_fork_asm+0x1a/0x30 [ 13.450589] </TASK> [ 13.450601] [ 13.461484] Allocated by task 284: [ 13.461675] kasan_save_stack+0x45/0x70 [ 13.461858] kasan_save_track+0x18/0x40 [ 13.462032] kasan_save_alloc_info+0x3b/0x50 [ 13.462222] __kasan_kmalloc+0xb7/0xc0 [ 13.462389] __kmalloc_cache_noprof+0x189/0x420 [ 13.462582] kasan_atomics+0x95/0x310 [ 13.462738] kunit_try_run_case+0x1a5/0x480 [ 13.463634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.463895] kthread+0x337/0x6f0 [ 13.464069] ret_from_fork+0x41/0x80 [ 13.464565] ret_from_fork_asm+0x1a/0x30 [ 13.464869] [ 13.464984] The buggy address belongs to the object at ffff888103a31d80 [ 13.464984] which belongs to the cache kmalloc-64 of size 64 [ 13.465909] The buggy address is located 0 bytes to the right of [ 13.465909] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.466633] [ 13.466890] The buggy address belongs to the physical page: [ 13.467249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.467685] flags: 0x200000000000000(node=0|zone=2) [ 13.467936] page_type: f5(slab) [ 13.468104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.468396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.468731] page dumped because: kasan: bad access detected [ 13.469341] [ 13.469427] Memory state around the buggy address: [ 13.469585] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.470232] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.470753] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.471108] ^ [ 13.471481] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.472024] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.472441] ================================================================== [ 14.198759] ================================================================== [ 14.199255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.199627] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.199972] [ 14.200057] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.200099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.200111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.200130] Call Trace: [ 14.200143] <TASK> [ 14.200157] dump_stack_lvl+0x73/0xb0 [ 14.200179] print_report+0xd1/0x610 [ 14.200202] ? __virt_addr_valid+0x1db/0x2d0 [ 14.200222] ? kasan_atomics_helper+0x151d/0x5450 [ 14.200244] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.200267] ? kasan_atomics_helper+0x151d/0x5450 [ 14.200290] kasan_report+0x141/0x180 [ 14.200313] ? kasan_atomics_helper+0x151d/0x5450 [ 14.200340] kasan_check_range+0x10c/0x1c0 [ 14.200360] __kasan_check_write+0x18/0x20 [ 14.200380] kasan_atomics_helper+0x151d/0x5450 [ 14.200403] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.200426] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.200447] ? ret_from_fork_asm+0x1a/0x30 [ 14.200468] ? kasan_atomics+0x152/0x310 [ 14.200491] kasan_atomics+0x1dc/0x310 [ 14.200511] ? __pfx_kasan_atomics+0x10/0x10 [ 14.200531] ? __pfx_read_tsc+0x10/0x10 [ 14.200551] ? ktime_get_ts64+0x86/0x230 [ 14.200575] kunit_try_run_case+0x1a5/0x480 [ 14.200596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.200614] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.200638] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.200662] ? __kthread_parkme+0x82/0x180 [ 14.200683] ? preempt_count_sub+0x50/0x80 [ 14.200707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.200728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.200751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.200773] kthread+0x337/0x6f0 [ 14.200790] ? trace_preempt_on+0x20/0xc0 [ 14.200813] ? __pfx_kthread+0x10/0x10 [ 14.200831] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.200853] ? calculate_sigpending+0x7b/0xa0 [ 14.200874] ? __pfx_kthread+0x10/0x10 [ 14.200904] ret_from_fork+0x41/0x80 [ 14.200925] ? __pfx_kthread+0x10/0x10 [ 14.200942] ret_from_fork_asm+0x1a/0x30 [ 14.200972] </TASK> [ 14.200983] [ 14.208329] Allocated by task 284: [ 14.208452] kasan_save_stack+0x45/0x70 [ 14.208758] kasan_save_track+0x18/0x40 [ 14.209139] kasan_save_alloc_info+0x3b/0x50 [ 14.209348] __kasan_kmalloc+0xb7/0xc0 [ 14.209537] __kmalloc_cache_noprof+0x189/0x420 [ 14.209758] kasan_atomics+0x95/0x310 [ 14.210000] kunit_try_run_case+0x1a5/0x480 [ 14.210147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.210324] kthread+0x337/0x6f0 [ 14.210444] ret_from_fork+0x41/0x80 [ 14.210575] ret_from_fork_asm+0x1a/0x30 [ 14.210712] [ 14.210781] The buggy address belongs to the object at ffff888103a31d80 [ 14.210781] which belongs to the cache kmalloc-64 of size 64 [ 14.211146] The buggy address is located 0 bytes to the right of [ 14.211146] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.211702] [ 14.211798] The buggy address belongs to the physical page: [ 14.212063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.212656] flags: 0x200000000000000(node=0|zone=2) [ 14.212827] page_type: f5(slab) [ 14.212955] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.213187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.213412] page dumped because: kasan: bad access detected [ 14.213580] [ 14.213648] Memory state around the buggy address: [ 14.213799] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.214133] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.214448] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.214763] ^ [ 14.214991] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.215309] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.215642] ================================================================== [ 14.216462] ================================================================== [ 14.216791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.217038] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.217268] [ 14.217350] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.217391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.217403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.217462] Call Trace: [ 14.217478] <TASK> [ 14.217492] dump_stack_lvl+0x73/0xb0 [ 14.217516] print_report+0xd1/0x610 [ 14.217538] ? __virt_addr_valid+0x1db/0x2d0 [ 14.217559] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.217581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.217605] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.217627] kasan_report+0x141/0x180 [ 14.217650] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.217678] kasan_check_range+0x10c/0x1c0 [ 14.217698] __kasan_check_write+0x18/0x20 [ 14.217719] kasan_atomics_helper+0x15b6/0x5450 [ 14.217742] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.217764] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.217785] ? ret_from_fork_asm+0x1a/0x30 [ 14.217807] ? kasan_atomics+0x152/0x310 [ 14.217832] kasan_atomics+0x1dc/0x310 [ 14.217851] ? __pfx_kasan_atomics+0x10/0x10 [ 14.217872] ? __pfx_read_tsc+0x10/0x10 [ 14.217900] ? ktime_get_ts64+0x86/0x230 [ 14.217925] kunit_try_run_case+0x1a5/0x480 [ 14.217947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.217966] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.217990] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.218014] ? __kthread_parkme+0x82/0x180 [ 14.218036] ? preempt_count_sub+0x50/0x80 [ 14.218061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.218082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.218106] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.218129] kthread+0x337/0x6f0 [ 14.218146] ? trace_preempt_on+0x20/0xc0 [ 14.218168] ? __pfx_kthread+0x10/0x10 [ 14.218186] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.218208] ? calculate_sigpending+0x7b/0xa0 [ 14.218230] ? __pfx_kthread+0x10/0x10 [ 14.218248] ret_from_fork+0x41/0x80 [ 14.218269] ? __pfx_kthread+0x10/0x10 [ 14.218287] ret_from_fork_asm+0x1a/0x30 [ 14.218317] </TASK> [ 14.218328] [ 14.226330] Allocated by task 284: [ 14.226561] kasan_save_stack+0x45/0x70 [ 14.226767] kasan_save_track+0x18/0x40 [ 14.226971] kasan_save_alloc_info+0x3b/0x50 [ 14.227179] __kasan_kmalloc+0xb7/0xc0 [ 14.227378] __kmalloc_cache_noprof+0x189/0x420 [ 14.227757] kasan_atomics+0x95/0x310 [ 14.228087] kunit_try_run_case+0x1a5/0x480 [ 14.228305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.228479] kthread+0x337/0x6f0 [ 14.228596] ret_from_fork+0x41/0x80 [ 14.228724] ret_from_fork_asm+0x1a/0x30 [ 14.228906] [ 14.229004] The buggy address belongs to the object at ffff888103a31d80 [ 14.229004] which belongs to the cache kmalloc-64 of size 64 [ 14.229538] The buggy address is located 0 bytes to the right of [ 14.229538] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.230136] [ 14.230207] The buggy address belongs to the physical page: [ 14.230377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.230614] flags: 0x200000000000000(node=0|zone=2) [ 14.230780] page_type: f5(slab) [ 14.231109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.231459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.231806] page dumped because: kasan: bad access detected [ 14.232268] [ 14.232372] Memory state around the buggy address: [ 14.232599] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.232930] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.233215] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.233461] ^ [ 14.233687] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.234004] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.234261] ================================================================== [ 13.698846] ================================================================== [ 13.699181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 13.699526] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.699869] [ 13.699999] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.700056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.700069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.700101] Call Trace: [ 13.700115] <TASK> [ 13.700130] dump_stack_lvl+0x73/0xb0 [ 13.700155] print_report+0xd1/0x610 [ 13.700179] ? __virt_addr_valid+0x1db/0x2d0 [ 13.700201] ? kasan_atomics_helper+0x860/0x5450 [ 13.700224] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.700249] ? kasan_atomics_helper+0x860/0x5450 [ 13.700273] kasan_report+0x141/0x180 [ 13.700297] ? kasan_atomics_helper+0x860/0x5450 [ 13.700325] kasan_check_range+0x10c/0x1c0 [ 13.700347] __kasan_check_write+0x18/0x20 [ 13.700369] kasan_atomics_helper+0x860/0x5450 [ 13.700394] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.700417] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.700441] ? ret_from_fork_asm+0x1a/0x30 [ 13.700473] ? kasan_atomics+0x152/0x310 [ 13.700498] kasan_atomics+0x1dc/0x310 [ 13.700520] ? __pfx_kasan_atomics+0x10/0x10 [ 13.700553] ? __pfx_read_tsc+0x10/0x10 [ 13.700574] ? ktime_get_ts64+0x86/0x230 [ 13.700599] kunit_try_run_case+0x1a5/0x480 [ 13.700622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.700643] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.700667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.700694] ? __kthread_parkme+0x82/0x180 [ 13.700716] ? preempt_count_sub+0x50/0x80 [ 13.700742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.700765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.700789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.700834] kthread+0x337/0x6f0 [ 13.700852] ? trace_preempt_on+0x20/0xc0 [ 13.700876] ? __pfx_kthread+0x10/0x10 [ 13.700903] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.700927] ? calculate_sigpending+0x7b/0xa0 [ 13.700950] ? __pfx_kthread+0x10/0x10 [ 13.700969] ret_from_fork+0x41/0x80 [ 13.700991] ? __pfx_kthread+0x10/0x10 [ 13.701010] ret_from_fork_asm+0x1a/0x30 [ 13.701042] </TASK> [ 13.701052] [ 13.708544] Allocated by task 284: [ 13.708724] kasan_save_stack+0x45/0x70 [ 13.708954] kasan_save_track+0x18/0x40 [ 13.709166] kasan_save_alloc_info+0x3b/0x50 [ 13.709359] __kasan_kmalloc+0xb7/0xc0 [ 13.709558] __kmalloc_cache_noprof+0x189/0x420 [ 13.709772] kasan_atomics+0x95/0x310 [ 13.709995] kunit_try_run_case+0x1a5/0x480 [ 13.710191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.710419] kthread+0x337/0x6f0 [ 13.710603] ret_from_fork+0x41/0x80 [ 13.710754] ret_from_fork_asm+0x1a/0x30 [ 13.710930] [ 13.711003] The buggy address belongs to the object at ffff888103a31d80 [ 13.711003] which belongs to the cache kmalloc-64 of size 64 [ 13.711358] The buggy address is located 0 bytes to the right of [ 13.711358] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.711961] [ 13.712063] The buggy address belongs to the physical page: [ 13.712322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.712677] flags: 0x200000000000000(node=0|zone=2) [ 13.712964] page_type: f5(slab) [ 13.713140] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.713428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.713655] page dumped because: kasan: bad access detected [ 13.713852] [ 13.713953] Memory state around the buggy address: [ 13.714206] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.714558] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.714935] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.715281] ^ [ 13.715506] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.715752] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.716127] ================================================================== [ 13.785955] ================================================================== [ 13.787026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 13.787340] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.787646] [ 13.787746] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.787792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.787804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.787825] Call Trace: [ 13.787838] <TASK> [ 13.787853] dump_stack_lvl+0x73/0xb0 [ 13.787888] print_report+0xd1/0x610 [ 13.787923] ? __virt_addr_valid+0x1db/0x2d0 [ 13.787946] ? kasan_atomics_helper+0xac7/0x5450 [ 13.787969] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.788005] ? kasan_atomics_helper+0xac7/0x5450 [ 13.788028] kasan_report+0x141/0x180 [ 13.788053] ? kasan_atomics_helper+0xac7/0x5450 [ 13.788082] kasan_check_range+0x10c/0x1c0 [ 13.788104] __kasan_check_write+0x18/0x20 [ 13.788126] kasan_atomics_helper+0xac7/0x5450 [ 13.788151] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.788175] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.788199] ? ret_from_fork_asm+0x1a/0x30 [ 13.788222] ? kasan_atomics+0x152/0x310 [ 13.788256] kasan_atomics+0x1dc/0x310 [ 13.788277] ? __pfx_kasan_atomics+0x10/0x10 [ 13.788299] ? __pfx_read_tsc+0x10/0x10 [ 13.788330] ? ktime_get_ts64+0x86/0x230 [ 13.788357] kunit_try_run_case+0x1a5/0x480 [ 13.788380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.788400] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.788426] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.788452] ? __kthread_parkme+0x82/0x180 [ 13.788475] ? preempt_count_sub+0x50/0x80 [ 13.788502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.788524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.788550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.788575] kthread+0x337/0x6f0 [ 13.788602] ? trace_preempt_on+0x20/0xc0 [ 13.788627] ? __pfx_kthread+0x10/0x10 [ 13.788647] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.788681] ? calculate_sigpending+0x7b/0xa0 [ 13.788703] ? __pfx_kthread+0x10/0x10 [ 13.788723] ret_from_fork+0x41/0x80 [ 13.788754] ? __pfx_kthread+0x10/0x10 [ 13.788774] ret_from_fork_asm+0x1a/0x30 [ 13.788805] </TASK> [ 13.788816] [ 13.796587] Allocated by task 284: [ 13.796722] kasan_save_stack+0x45/0x70 [ 13.797081] kasan_save_track+0x18/0x40 [ 13.797286] kasan_save_alloc_info+0x3b/0x50 [ 13.797525] __kasan_kmalloc+0xb7/0xc0 [ 13.797721] __kmalloc_cache_noprof+0x189/0x420 [ 13.797953] kasan_atomics+0x95/0x310 [ 13.798087] kunit_try_run_case+0x1a5/0x480 [ 13.798293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.798578] kthread+0x337/0x6f0 [ 13.798749] ret_from_fork+0x41/0x80 [ 13.798995] ret_from_fork_asm+0x1a/0x30 [ 13.799164] [ 13.799280] The buggy address belongs to the object at ffff888103a31d80 [ 13.799280] which belongs to the cache kmalloc-64 of size 64 [ 13.799767] The buggy address is located 0 bytes to the right of [ 13.799767] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.800401] [ 13.800520] The buggy address belongs to the physical page: [ 13.800720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.800972] flags: 0x200000000000000(node=0|zone=2) [ 13.801141] page_type: f5(slab) [ 13.801272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.801641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.801981] page dumped because: kasan: bad access detected [ 13.802489] [ 13.802583] Memory state around the buggy address: [ 13.802776] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.803161] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.803439] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.803654] ^ [ 13.803834] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.804194] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.804545] ================================================================== [ 14.566059] ================================================================== [ 14.566788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 14.567131] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.567466] [ 14.567679] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.567725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.567736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.567756] Call Trace: [ 14.567771] <TASK> [ 14.567902] dump_stack_lvl+0x73/0xb0 [ 14.567934] print_report+0xd1/0x610 [ 14.567957] ? __virt_addr_valid+0x1db/0x2d0 [ 14.567979] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.568001] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.568023] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.568045] kasan_report+0x141/0x180 [ 14.568068] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.568190] __asan_report_load8_noabort+0x18/0x20 [ 14.568212] kasan_atomics_helper+0x4f71/0x5450 [ 14.568235] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.568258] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.568279] ? ret_from_fork_asm+0x1a/0x30 [ 14.568300] ? kasan_atomics+0x152/0x310 [ 14.568324] kasan_atomics+0x1dc/0x310 [ 14.568344] ? __pfx_kasan_atomics+0x10/0x10 [ 14.568365] ? __pfx_read_tsc+0x10/0x10 [ 14.568384] ? ktime_get_ts64+0x86/0x230 [ 14.568409] kunit_try_run_case+0x1a5/0x480 [ 14.568431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.568451] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.568476] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.568500] ? __kthread_parkme+0x82/0x180 [ 14.568522] ? preempt_count_sub+0x50/0x80 [ 14.568546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.568568] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.568592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.568615] kthread+0x337/0x6f0 [ 14.568632] ? trace_preempt_on+0x20/0xc0 [ 14.568655] ? __pfx_kthread+0x10/0x10 [ 14.568674] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.568696] ? calculate_sigpending+0x7b/0xa0 [ 14.568718] ? __pfx_kthread+0x10/0x10 [ 14.568737] ret_from_fork+0x41/0x80 [ 14.568757] ? __pfx_kthread+0x10/0x10 [ 14.568775] ret_from_fork_asm+0x1a/0x30 [ 14.568815] </TASK> [ 14.568826] [ 14.578502] Allocated by task 284: [ 14.578787] kasan_save_stack+0x45/0x70 [ 14.579130] kasan_save_track+0x18/0x40 [ 14.579291] kasan_save_alloc_info+0x3b/0x50 [ 14.579602] __kasan_kmalloc+0xb7/0xc0 [ 14.579784] __kmalloc_cache_noprof+0x189/0x420 [ 14.580151] kasan_atomics+0x95/0x310 [ 14.580295] kunit_try_run_case+0x1a5/0x480 [ 14.580497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.580727] kthread+0x337/0x6f0 [ 14.580927] ret_from_fork+0x41/0x80 [ 14.581365] ret_from_fork_asm+0x1a/0x30 [ 14.581561] [ 14.581650] The buggy address belongs to the object at ffff888103a31d80 [ 14.581650] which belongs to the cache kmalloc-64 of size 64 [ 14.582350] The buggy address is located 0 bytes to the right of [ 14.582350] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.582999] [ 14.583080] The buggy address belongs to the physical page: [ 14.583316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.583781] flags: 0x200000000000000(node=0|zone=2) [ 14.584059] page_type: f5(slab) [ 14.584221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.584535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.584844] page dumped because: kasan: bad access detected [ 14.585081] [ 14.585168] Memory state around the buggy address: [ 14.585374] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.585675] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.586386] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.586643] ^ [ 14.587045] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.587419] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.587695] ================================================================== [ 13.716620] ================================================================== [ 13.717050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 13.717371] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.717654] [ 13.717770] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.717834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.717847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.717868] Call Trace: [ 13.717890] <TASK> [ 13.717905] dump_stack_lvl+0x73/0xb0 [ 13.717931] print_report+0xd1/0x610 [ 13.717954] ? __virt_addr_valid+0x1db/0x2d0 [ 13.717976] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.717999] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.718024] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.718047] kasan_report+0x141/0x180 [ 13.718071] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.718099] kasan_check_range+0x10c/0x1c0 [ 13.718121] __kasan_check_write+0x18/0x20 [ 13.718142] kasan_atomics_helper+0x8f9/0x5450 [ 13.718166] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.718191] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.718212] ? ret_from_fork_asm+0x1a/0x30 [ 13.718235] ? kasan_atomics+0x152/0x310 [ 13.718259] kasan_atomics+0x1dc/0x310 [ 13.718280] ? __pfx_kasan_atomics+0x10/0x10 [ 13.718302] ? __pfx_read_tsc+0x10/0x10 [ 13.718323] ? ktime_get_ts64+0x86/0x230 [ 13.718348] kunit_try_run_case+0x1a5/0x480 [ 13.718372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.718392] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.718428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.718454] ? __kthread_parkme+0x82/0x180 [ 13.718478] ? preempt_count_sub+0x50/0x80 [ 13.718515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.718537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.718562] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.718588] kthread+0x337/0x6f0 [ 13.718605] ? trace_preempt_on+0x20/0xc0 [ 13.718629] ? __pfx_kthread+0x10/0x10 [ 13.718649] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.718672] ? calculate_sigpending+0x7b/0xa0 [ 13.718695] ? __pfx_kthread+0x10/0x10 [ 13.718714] ret_from_fork+0x41/0x80 [ 13.718736] ? __pfx_kthread+0x10/0x10 [ 13.718755] ret_from_fork_asm+0x1a/0x30 [ 13.718786] </TASK> [ 13.718815] [ 13.726641] Allocated by task 284: [ 13.726836] kasan_save_stack+0x45/0x70 [ 13.726988] kasan_save_track+0x18/0x40 [ 13.727124] kasan_save_alloc_info+0x3b/0x50 [ 13.727300] __kasan_kmalloc+0xb7/0xc0 [ 13.727503] __kmalloc_cache_noprof+0x189/0x420 [ 13.727722] kasan_atomics+0x95/0x310 [ 13.727941] kunit_try_run_case+0x1a5/0x480 [ 13.728147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.728383] kthread+0x337/0x6f0 [ 13.728500] ret_from_fork+0x41/0x80 [ 13.728682] ret_from_fork_asm+0x1a/0x30 [ 13.728933] [ 13.729028] The buggy address belongs to the object at ffff888103a31d80 [ 13.729028] which belongs to the cache kmalloc-64 of size 64 [ 13.729518] The buggy address is located 0 bytes to the right of [ 13.729518] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.730074] [ 13.730173] The buggy address belongs to the physical page: [ 13.730416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.730658] flags: 0x200000000000000(node=0|zone=2) [ 13.730841] page_type: f5(slab) [ 13.730983] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.731250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.731599] page dumped because: kasan: bad access detected [ 13.731885] [ 13.731980] Memory state around the buggy address: [ 13.732204] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.732539] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.732847] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.733183] ^ [ 13.733425] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.733708] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.734071] ================================================================== [ 14.180583] ================================================================== [ 14.181041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.181282] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.181517] [ 14.181625] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.181667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.181679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.181700] Call Trace: [ 14.181714] <TASK> [ 14.181729] dump_stack_lvl+0x73/0xb0 [ 14.181751] print_report+0xd1/0x610 [ 14.181775] ? __virt_addr_valid+0x1db/0x2d0 [ 14.181796] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.181817] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.181840] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.181862] kasan_report+0x141/0x180 [ 14.181897] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.181925] __asan_report_store8_noabort+0x1b/0x30 [ 14.181947] kasan_atomics_helper+0x50d4/0x5450 [ 14.181970] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.181992] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.182013] ? ret_from_fork_asm+0x1a/0x30 [ 14.182035] ? kasan_atomics+0x152/0x310 [ 14.182059] kasan_atomics+0x1dc/0x310 [ 14.182079] ? __pfx_kasan_atomics+0x10/0x10 [ 14.182099] ? __pfx_read_tsc+0x10/0x10 [ 14.182118] ? ktime_get_ts64+0x86/0x230 [ 14.182143] kunit_try_run_case+0x1a5/0x480 [ 14.182163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.182182] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.182206] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.182230] ? __kthread_parkme+0x82/0x180 [ 14.182251] ? preempt_count_sub+0x50/0x80 [ 14.182277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.182297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.182320] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.182343] kthread+0x337/0x6f0 [ 14.182360] ? trace_preempt_on+0x20/0xc0 [ 14.182383] ? __pfx_kthread+0x10/0x10 [ 14.182401] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.182424] ? calculate_sigpending+0x7b/0xa0 [ 14.182445] ? __pfx_kthread+0x10/0x10 [ 14.182464] ret_from_fork+0x41/0x80 [ 14.182485] ? __pfx_kthread+0x10/0x10 [ 14.182502] ret_from_fork_asm+0x1a/0x30 [ 14.182533] </TASK> [ 14.182543] [ 14.190827] Allocated by task 284: [ 14.191017] kasan_save_stack+0x45/0x70 [ 14.191229] kasan_save_track+0x18/0x40 [ 14.191397] kasan_save_alloc_info+0x3b/0x50 [ 14.191596] __kasan_kmalloc+0xb7/0xc0 [ 14.191762] __kmalloc_cache_noprof+0x189/0x420 [ 14.192044] kasan_atomics+0x95/0x310 [ 14.192234] kunit_try_run_case+0x1a5/0x480 [ 14.192392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.192566] kthread+0x337/0x6f0 [ 14.192684] ret_from_fork+0x41/0x80 [ 14.192813] ret_from_fork_asm+0x1a/0x30 [ 14.193034] [ 14.193141] The buggy address belongs to the object at ffff888103a31d80 [ 14.193141] which belongs to the cache kmalloc-64 of size 64 [ 14.193616] The buggy address is located 0 bytes to the right of [ 14.193616] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.194357] [ 14.194456] The buggy address belongs to the physical page: [ 14.194710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.195072] flags: 0x200000000000000(node=0|zone=2) [ 14.195274] page_type: f5(slab) [ 14.195425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.195654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.195927] page dumped because: kasan: bad access detected [ 14.196188] [ 14.196280] Memory state around the buggy address: [ 14.196441] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.196742] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.197120] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.197338] ^ [ 14.197492] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.197794] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.198131] ================================================================== [ 14.699599] ================================================================== [ 14.700057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 14.700624] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.701174] [ 14.701306] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.701351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.701364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.701383] Call Trace: [ 14.701398] <TASK> [ 14.701414] dump_stack_lvl+0x73/0xb0 [ 14.701440] print_report+0xd1/0x610 [ 14.701536] ? __virt_addr_valid+0x1db/0x2d0 [ 14.701560] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.701583] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.701607] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.701629] kasan_report+0x141/0x180 [ 14.701653] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.701679] __asan_report_load8_noabort+0x18/0x20 [ 14.701701] kasan_atomics_helper+0x4fa5/0x5450 [ 14.701725] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.701748] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.701768] ? ret_from_fork_asm+0x1a/0x30 [ 14.701790] ? kasan_atomics+0x152/0x310 [ 14.701815] kasan_atomics+0x1dc/0x310 [ 14.701835] ? __pfx_kasan_atomics+0x10/0x10 [ 14.701856] ? __pfx_read_tsc+0x10/0x10 [ 14.701875] ? ktime_get_ts64+0x86/0x230 [ 14.701914] kunit_try_run_case+0x1a5/0x480 [ 14.701937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.701955] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.701980] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.702004] ? __kthread_parkme+0x82/0x180 [ 14.702025] ? preempt_count_sub+0x50/0x80 [ 14.702051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.702071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.702095] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.702119] kthread+0x337/0x6f0 [ 14.702136] ? trace_preempt_on+0x20/0xc0 [ 14.702158] ? __pfx_kthread+0x10/0x10 [ 14.702177] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.702199] ? calculate_sigpending+0x7b/0xa0 [ 14.702220] ? __pfx_kthread+0x10/0x10 [ 14.702239] ret_from_fork+0x41/0x80 [ 14.702261] ? __pfx_kthread+0x10/0x10 [ 14.702279] ret_from_fork_asm+0x1a/0x30 [ 14.702309] </TASK> [ 14.702320] [ 14.709650] Allocated by task 284: [ 14.709824] kasan_save_stack+0x45/0x70 [ 14.709977] kasan_save_track+0x18/0x40 [ 14.710112] kasan_save_alloc_info+0x3b/0x50 [ 14.710273] __kasan_kmalloc+0xb7/0xc0 [ 14.710464] __kmalloc_cache_noprof+0x189/0x420 [ 14.710670] kasan_atomics+0x95/0x310 [ 14.710904] kunit_try_run_case+0x1a5/0x480 [ 14.711164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.711472] kthread+0x337/0x6f0 [ 14.711642] ret_from_fork+0x41/0x80 [ 14.711832] ret_from_fork_asm+0x1a/0x30 [ 14.712062] [ 14.712137] The buggy address belongs to the object at ffff888103a31d80 [ 14.712137] which belongs to the cache kmalloc-64 of size 64 [ 14.712787] The buggy address is located 0 bytes to the right of [ 14.712787] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.713255] [ 14.713329] The buggy address belongs to the physical page: [ 14.713499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.713864] flags: 0x200000000000000(node=0|zone=2) [ 14.714131] page_type: f5(slab) [ 14.714295] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.714625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.714933] page dumped because: kasan: bad access detected [ 14.715100] [ 14.715168] Memory state around the buggy address: [ 14.715372] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.715716] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.716075] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.716365] ^ [ 14.716591] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.716929] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.717228] ================================================================== [ 14.012584] ================================================================== [ 14.013492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.013950] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.014283] [ 14.014405] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.014447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.014469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.014489] Call Trace: [ 14.014504] <TASK> [ 14.014520] dump_stack_lvl+0x73/0xb0 [ 14.014556] print_report+0xd1/0x610 [ 14.014580] ? __virt_addr_valid+0x1db/0x2d0 [ 14.014601] ? kasan_atomics_helper+0x1148/0x5450 [ 14.014632] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.014656] ? kasan_atomics_helper+0x1148/0x5450 [ 14.014679] kasan_report+0x141/0x180 [ 14.014712] ? kasan_atomics_helper+0x1148/0x5450 [ 14.014739] kasan_check_range+0x10c/0x1c0 [ 14.014762] __kasan_check_write+0x18/0x20 [ 14.014791] kasan_atomics_helper+0x1148/0x5450 [ 14.014814] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.014837] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.014888] ? ret_from_fork_asm+0x1a/0x30 [ 14.014910] ? kasan_atomics+0x152/0x310 [ 14.014934] kasan_atomics+0x1dc/0x310 [ 14.014954] ? __pfx_kasan_atomics+0x10/0x10 [ 14.014975] ? __pfx_read_tsc+0x10/0x10 [ 14.015003] ? ktime_get_ts64+0x86/0x230 [ 14.015028] kunit_try_run_case+0x1a5/0x480 [ 14.015050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.015079] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.015104] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.015128] ? __kthread_parkme+0x82/0x180 [ 14.015158] ? preempt_count_sub+0x50/0x80 [ 14.015184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.015205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.015238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.015261] kthread+0x337/0x6f0 [ 14.015278] ? trace_preempt_on+0x20/0xc0 [ 14.015302] ? __pfx_kthread+0x10/0x10 [ 14.015320] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.015352] ? calculate_sigpending+0x7b/0xa0 [ 14.015374] ? __pfx_kthread+0x10/0x10 [ 14.015392] ret_from_fork+0x41/0x80 [ 14.015423] ? __pfx_kthread+0x10/0x10 [ 14.015442] ret_from_fork_asm+0x1a/0x30 [ 14.015472] </TASK> [ 14.015484] [ 14.023063] Allocated by task 284: [ 14.023190] kasan_save_stack+0x45/0x70 [ 14.023332] kasan_save_track+0x18/0x40 [ 14.023468] kasan_save_alloc_info+0x3b/0x50 [ 14.023678] __kasan_kmalloc+0xb7/0xc0 [ 14.023938] __kmalloc_cache_noprof+0x189/0x420 [ 14.024189] kasan_atomics+0x95/0x310 [ 14.024384] kunit_try_run_case+0x1a5/0x480 [ 14.024595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.024958] kthread+0x337/0x6f0 [ 14.025156] ret_from_fork+0x41/0x80 [ 14.025369] ret_from_fork_asm+0x1a/0x30 [ 14.025577] [ 14.025698] The buggy address belongs to the object at ffff888103a31d80 [ 14.025698] which belongs to the cache kmalloc-64 of size 64 [ 14.026249] The buggy address is located 0 bytes to the right of [ 14.026249] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.026707] [ 14.026815] The buggy address belongs to the physical page: [ 14.027091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.027443] flags: 0x200000000000000(node=0|zone=2) [ 14.027639] page_type: f5(slab) [ 14.027788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.028145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.028395] page dumped because: kasan: bad access detected [ 14.028648] [ 14.028740] Memory state around the buggy address: [ 14.028974] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.029289] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.029587] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.029898] ^ [ 14.030121] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.030419] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.030693] ================================================================== [ 14.542513] ================================================================== [ 14.543236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 14.543561] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.544333] [ 14.544448] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.544492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.544503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.544524] Call Trace: [ 14.544536] <TASK> [ 14.544550] dump_stack_lvl+0x73/0xb0 [ 14.544574] print_report+0xd1/0x610 [ 14.544596] ? __virt_addr_valid+0x1db/0x2d0 [ 14.544617] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.544639] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.544661] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.544684] kasan_report+0x141/0x180 [ 14.544707] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.544735] kasan_check_range+0x10c/0x1c0 [ 14.544756] __kasan_check_write+0x18/0x20 [ 14.544776] kasan_atomics_helper+0x1f43/0x5450 [ 14.544799] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.544821] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.544842] ? ret_from_fork_asm+0x1a/0x30 [ 14.544863] ? kasan_atomics+0x152/0x310 [ 14.544899] kasan_atomics+0x1dc/0x310 [ 14.544919] ? __pfx_kasan_atomics+0x10/0x10 [ 14.544941] ? __pfx_read_tsc+0x10/0x10 [ 14.544962] ? ktime_get_ts64+0x86/0x230 [ 14.544986] kunit_try_run_case+0x1a5/0x480 [ 14.545007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.545026] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.545051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.545075] ? __kthread_parkme+0x82/0x180 [ 14.545097] ? preempt_count_sub+0x50/0x80 [ 14.545121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.545147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.545171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.545195] kthread+0x337/0x6f0 [ 14.545212] ? trace_preempt_on+0x20/0xc0 [ 14.545235] ? __pfx_kthread+0x10/0x10 [ 14.545253] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.545276] ? calculate_sigpending+0x7b/0xa0 [ 14.545297] ? __pfx_kthread+0x10/0x10 [ 14.545316] ret_from_fork+0x41/0x80 [ 14.545337] ? __pfx_kthread+0x10/0x10 [ 14.545354] ret_from_fork_asm+0x1a/0x30 [ 14.545384] </TASK> [ 14.545396] [ 14.555991] Allocated by task 284: [ 14.556311] kasan_save_stack+0x45/0x70 [ 14.556612] kasan_save_track+0x18/0x40 [ 14.556898] kasan_save_alloc_info+0x3b/0x50 [ 14.557054] __kasan_kmalloc+0xb7/0xc0 [ 14.557327] __kmalloc_cache_noprof+0x189/0x420 [ 14.557572] kasan_atomics+0x95/0x310 [ 14.557855] kunit_try_run_case+0x1a5/0x480 [ 14.558056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.558361] kthread+0x337/0x6f0 [ 14.558523] ret_from_fork+0x41/0x80 [ 14.558684] ret_from_fork_asm+0x1a/0x30 [ 14.559083] [ 14.559161] The buggy address belongs to the object at ffff888103a31d80 [ 14.559161] which belongs to the cache kmalloc-64 of size 64 [ 14.559808] The buggy address is located 0 bytes to the right of [ 14.559808] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.560430] [ 14.560524] The buggy address belongs to the physical page: [ 14.560723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.561255] flags: 0x200000000000000(node=0|zone=2) [ 14.561538] page_type: f5(slab) [ 14.561665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.562021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.562479] page dumped because: kasan: bad access detected [ 14.562780] [ 14.562861] Memory state around the buggy address: [ 14.563193] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.563469] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.563765] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.564342] ^ [ 14.564559] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.564984] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.565356] ================================================================== [ 13.823751] ================================================================== [ 13.824432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 13.824680] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.824920] [ 13.825055] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.825102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.825113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.825139] Call Trace: [ 13.825151] <TASK> [ 13.825165] dump_stack_lvl+0x73/0xb0 [ 13.825191] print_report+0xd1/0x610 [ 13.825216] ? __virt_addr_valid+0x1db/0x2d0 [ 13.825238] ? kasan_atomics_helper+0xc70/0x5450 [ 13.825261] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.825286] ? kasan_atomics_helper+0xc70/0x5450 [ 13.825310] kasan_report+0x141/0x180 [ 13.825334] ? kasan_atomics_helper+0xc70/0x5450 [ 13.825363] kasan_check_range+0x10c/0x1c0 [ 13.825384] __kasan_check_write+0x18/0x20 [ 13.825406] kasan_atomics_helper+0xc70/0x5450 [ 13.825431] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.825455] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.825477] ? ret_from_fork_asm+0x1a/0x30 [ 13.825499] ? kasan_atomics+0x152/0x310 [ 13.825524] kasan_atomics+0x1dc/0x310 [ 13.825544] ? __pfx_kasan_atomics+0x10/0x10 [ 13.825567] ? __pfx_read_tsc+0x10/0x10 [ 13.825587] ? ktime_get_ts64+0x86/0x230 [ 13.825613] kunit_try_run_case+0x1a5/0x480 [ 13.825636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.825657] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.825682] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.825708] ? __kthread_parkme+0x82/0x180 [ 13.825731] ? preempt_count_sub+0x50/0x80 [ 13.825757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.825779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.825804] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.825838] kthread+0x337/0x6f0 [ 13.825856] ? trace_preempt_on+0x20/0xc0 [ 13.825897] ? __pfx_kthread+0x10/0x10 [ 13.825918] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.825942] ? calculate_sigpending+0x7b/0xa0 [ 13.825965] ? __pfx_kthread+0x10/0x10 [ 13.825985] ret_from_fork+0x41/0x80 [ 13.826006] ? __pfx_kthread+0x10/0x10 [ 13.826026] ret_from_fork_asm+0x1a/0x30 [ 13.826058] </TASK> [ 13.826070] [ 13.833915] Allocated by task 284: [ 13.834125] kasan_save_stack+0x45/0x70 [ 13.834333] kasan_save_track+0x18/0x40 [ 13.834556] kasan_save_alloc_info+0x3b/0x50 [ 13.834773] __kasan_kmalloc+0xb7/0xc0 [ 13.835169] __kmalloc_cache_noprof+0x189/0x420 [ 13.835344] kasan_atomics+0x95/0x310 [ 13.835474] kunit_try_run_case+0x1a5/0x480 [ 13.835665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.836066] kthread+0x337/0x6f0 [ 13.836226] ret_from_fork+0x41/0x80 [ 13.836403] ret_from_fork_asm+0x1a/0x30 [ 13.836605] [ 13.836715] The buggy address belongs to the object at ffff888103a31d80 [ 13.836715] which belongs to the cache kmalloc-64 of size 64 [ 13.837265] The buggy address is located 0 bytes to the right of [ 13.837265] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.837780] [ 13.837941] The buggy address belongs to the physical page: [ 13.838200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.838538] flags: 0x200000000000000(node=0|zone=2) [ 13.838761] page_type: f5(slab) [ 13.839026] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.839386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.839719] page dumped because: kasan: bad access detected [ 13.839986] [ 13.840070] Memory state around the buggy address: [ 13.840262] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.840523] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.840868] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.841208] ^ [ 13.841431] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.841752] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.842010] ================================================================== [ 13.611239] ================================================================== [ 13.611928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 13.612240] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.612581] [ 13.612996] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.613044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.613057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.613077] Call Trace: [ 13.613092] <TASK> [ 13.613107] dump_stack_lvl+0x73/0xb0 [ 13.613139] print_report+0xd1/0x610 [ 13.613162] ? __virt_addr_valid+0x1db/0x2d0 [ 13.613305] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.613329] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.613352] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.613374] kasan_report+0x141/0x180 [ 13.613398] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.613425] kasan_check_range+0x10c/0x1c0 [ 13.613445] __kasan_check_write+0x18/0x20 [ 13.613465] kasan_atomics_helper+0x5fe/0x5450 [ 13.613488] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.613511] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.613531] ? ret_from_fork_asm+0x1a/0x30 [ 13.613552] ? kasan_atomics+0x152/0x310 [ 13.613576] kasan_atomics+0x1dc/0x310 [ 13.613595] ? __pfx_kasan_atomics+0x10/0x10 [ 13.613617] ? __pfx_read_tsc+0x10/0x10 [ 13.613636] ? ktime_get_ts64+0x86/0x230 [ 13.613661] kunit_try_run_case+0x1a5/0x480 [ 13.613705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.613724] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.613748] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.613773] ? __kthread_parkme+0x82/0x180 [ 13.613794] ? preempt_count_sub+0x50/0x80 [ 13.613818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.613838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.613861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.613895] kthread+0x337/0x6f0 [ 13.613911] ? trace_preempt_on+0x20/0xc0 [ 13.613934] ? __pfx_kthread+0x10/0x10 [ 13.613953] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.613975] ? calculate_sigpending+0x7b/0xa0 [ 13.613996] ? __pfx_kthread+0x10/0x10 [ 13.614015] ret_from_fork+0x41/0x80 [ 13.614035] ? __pfx_kthread+0x10/0x10 [ 13.614055] ret_from_fork_asm+0x1a/0x30 [ 13.614086] </TASK> [ 13.614097] [ 13.626660] Allocated by task 284: [ 13.627082] kasan_save_stack+0x45/0x70 [ 13.627255] kasan_save_track+0x18/0x40 [ 13.627648] kasan_save_alloc_info+0x3b/0x50 [ 13.628019] __kasan_kmalloc+0xb7/0xc0 [ 13.628339] __kmalloc_cache_noprof+0x189/0x420 [ 13.628781] kasan_atomics+0x95/0x310 [ 13.629202] kunit_try_run_case+0x1a5/0x480 [ 13.629662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.630201] kthread+0x337/0x6f0 [ 13.630340] ret_from_fork+0x41/0x80 [ 13.630827] ret_from_fork_asm+0x1a/0x30 [ 13.631245] [ 13.631393] The buggy address belongs to the object at ffff888103a31d80 [ 13.631393] which belongs to the cache kmalloc-64 of size 64 [ 13.632401] The buggy address is located 0 bytes to the right of [ 13.632401] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.633416] [ 13.633524] The buggy address belongs to the physical page: [ 13.633797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.634383] flags: 0x200000000000000(node=0|zone=2) [ 13.634630] page_type: f5(slab) [ 13.634773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.635252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.635689] page dumped because: kasan: bad access detected [ 13.635959] [ 13.636030] Memory state around the buggy address: [ 13.636212] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.636721] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.637294] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.637592] ^ [ 13.637757] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.638289] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.638619] ================================================================== [ 13.499929] ================================================================== [ 13.500260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 13.500582] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.501286] [ 13.501390] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.501436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.501519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.501540] Call Trace: [ 13.501554] <TASK> [ 13.501626] dump_stack_lvl+0x73/0xb0 [ 13.501656] print_report+0xd1/0x610 [ 13.501681] ? __virt_addr_valid+0x1db/0x2d0 [ 13.501703] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.501726] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.501750] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.501773] kasan_report+0x141/0x180 [ 13.501798] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.501826] __asan_report_load4_noabort+0x18/0x20 [ 13.501847] kasan_atomics_helper+0x4b54/0x5450 [ 13.501871] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.501907] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.501928] ? ret_from_fork_asm+0x1a/0x30 [ 13.501949] ? kasan_atomics+0x152/0x310 [ 13.501973] kasan_atomics+0x1dc/0x310 [ 13.501993] ? __pfx_kasan_atomics+0x10/0x10 [ 13.502014] ? __pfx_read_tsc+0x10/0x10 [ 13.502033] ? ktime_get_ts64+0x86/0x230 [ 13.502059] kunit_try_run_case+0x1a5/0x480 [ 13.502080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.502098] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.502123] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.502147] ? __kthread_parkme+0x82/0x180 [ 13.502169] ? preempt_count_sub+0x50/0x80 [ 13.502194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.502214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.502237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.502261] kthread+0x337/0x6f0 [ 13.502278] ? trace_preempt_on+0x20/0xc0 [ 13.502301] ? __pfx_kthread+0x10/0x10 [ 13.502320] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.502342] ? calculate_sigpending+0x7b/0xa0 [ 13.502363] ? __pfx_kthread+0x10/0x10 [ 13.502382] ret_from_fork+0x41/0x80 [ 13.502402] ? __pfx_kthread+0x10/0x10 [ 13.502421] ret_from_fork_asm+0x1a/0x30 [ 13.502452] </TASK> [ 13.502464] [ 13.513241] Allocated by task 284: [ 13.513433] kasan_save_stack+0x45/0x70 [ 13.513629] kasan_save_track+0x18/0x40 [ 13.513918] kasan_save_alloc_info+0x3b/0x50 [ 13.514128] __kasan_kmalloc+0xb7/0xc0 [ 13.514501] __kmalloc_cache_noprof+0x189/0x420 [ 13.514824] kasan_atomics+0x95/0x310 [ 13.515087] kunit_try_run_case+0x1a5/0x480 [ 13.515364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.515550] kthread+0x337/0x6f0 [ 13.515841] ret_from_fork+0x41/0x80 [ 13.516152] ret_from_fork_asm+0x1a/0x30 [ 13.516381] [ 13.516488] The buggy address belongs to the object at ffff888103a31d80 [ 13.516488] which belongs to the cache kmalloc-64 of size 64 [ 13.517289] The buggy address is located 0 bytes to the right of [ 13.517289] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.517999] [ 13.518093] The buggy address belongs to the physical page: [ 13.518316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.518734] flags: 0x200000000000000(node=0|zone=2) [ 13.519159] page_type: f5(slab) [ 13.519331] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.519785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.520056] page dumped because: kasan: bad access detected [ 13.520443] [ 13.520536] Memory state around the buggy address: [ 13.520868] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.521197] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.521482] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.521772] ^ [ 13.522171] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.522716] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.523044] ================================================================== [ 14.588494] ================================================================== [ 14.589221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 14.589680] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.590112] [ 14.590212] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.590256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.590269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.590290] Call Trace: [ 14.590305] <TASK> [ 14.590319] dump_stack_lvl+0x73/0xb0 [ 14.590343] print_report+0xd1/0x610 [ 14.590367] ? __virt_addr_valid+0x1db/0x2d0 [ 14.590388] ? kasan_atomics_helper+0x2006/0x5450 [ 14.590485] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.590509] ? kasan_atomics_helper+0x2006/0x5450 [ 14.590531] kasan_report+0x141/0x180 [ 14.590554] ? kasan_atomics_helper+0x2006/0x5450 [ 14.590581] kasan_check_range+0x10c/0x1c0 [ 14.590602] __kasan_check_write+0x18/0x20 [ 14.590623] kasan_atomics_helper+0x2006/0x5450 [ 14.590791] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.590814] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.590835] ? ret_from_fork_asm+0x1a/0x30 [ 14.590856] ? kasan_atomics+0x152/0x310 [ 14.590893] kasan_atomics+0x1dc/0x310 [ 14.590912] ? __pfx_kasan_atomics+0x10/0x10 [ 14.590934] ? __pfx_read_tsc+0x10/0x10 [ 14.590953] ? ktime_get_ts64+0x86/0x230 [ 14.590978] kunit_try_run_case+0x1a5/0x480 [ 14.591000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.591019] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.591043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.591068] ? __kthread_parkme+0x82/0x180 [ 14.591090] ? preempt_count_sub+0x50/0x80 [ 14.591116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.591136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.591160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.591183] kthread+0x337/0x6f0 [ 14.591200] ? trace_preempt_on+0x20/0xc0 [ 14.591223] ? __pfx_kthread+0x10/0x10 [ 14.591241] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.591264] ? calculate_sigpending+0x7b/0xa0 [ 14.591286] ? __pfx_kthread+0x10/0x10 [ 14.591304] ret_from_fork+0x41/0x80 [ 14.591325] ? __pfx_kthread+0x10/0x10 [ 14.591343] ret_from_fork_asm+0x1a/0x30 [ 14.591373] </TASK> [ 14.591383] [ 14.601408] Allocated by task 284: [ 14.601701] kasan_save_stack+0x45/0x70 [ 14.601931] kasan_save_track+0x18/0x40 [ 14.602103] kasan_save_alloc_info+0x3b/0x50 [ 14.602297] __kasan_kmalloc+0xb7/0xc0 [ 14.602473] __kmalloc_cache_noprof+0x189/0x420 [ 14.602676] kasan_atomics+0x95/0x310 [ 14.602842] kunit_try_run_case+0x1a5/0x480 [ 14.603464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.603775] kthread+0x337/0x6f0 [ 14.603923] ret_from_fork+0x41/0x80 [ 14.604254] ret_from_fork_asm+0x1a/0x30 [ 14.604412] [ 14.604578] The buggy address belongs to the object at ffff888103a31d80 [ 14.604578] which belongs to the cache kmalloc-64 of size 64 [ 14.605391] The buggy address is located 0 bytes to the right of [ 14.605391] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.606035] [ 14.606141] The buggy address belongs to the physical page: [ 14.606479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.606910] flags: 0x200000000000000(node=0|zone=2) [ 14.607146] page_type: f5(slab) [ 14.607426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.607817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.608113] page dumped because: kasan: bad access detected [ 14.608346] [ 14.608434] Memory state around the buggy address: [ 14.608625] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.609216] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.609577] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.609844] ^ [ 14.610207] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.610512] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.610912] ================================================================== [ 14.270103] ================================================================== [ 14.270444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.270835] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.271166] [ 14.271262] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.271304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.271316] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.271336] Call Trace: [ 14.271349] <TASK> [ 14.271364] dump_stack_lvl+0x73/0xb0 [ 14.271387] print_report+0xd1/0x610 [ 14.271410] ? __virt_addr_valid+0x1db/0x2d0 [ 14.271431] ? kasan_atomics_helper+0x177f/0x5450 [ 14.271454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.271478] ? kasan_atomics_helper+0x177f/0x5450 [ 14.271500] kasan_report+0x141/0x180 [ 14.271524] ? kasan_atomics_helper+0x177f/0x5450 [ 14.271551] kasan_check_range+0x10c/0x1c0 [ 14.271572] __kasan_check_write+0x18/0x20 [ 14.271592] kasan_atomics_helper+0x177f/0x5450 [ 14.271616] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.271639] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.271660] ? ret_from_fork_asm+0x1a/0x30 [ 14.271682] ? kasan_atomics+0x152/0x310 [ 14.271706] kasan_atomics+0x1dc/0x310 [ 14.271725] ? __pfx_kasan_atomics+0x10/0x10 [ 14.271747] ? __pfx_read_tsc+0x10/0x10 [ 14.271766] ? ktime_get_ts64+0x86/0x230 [ 14.271790] kunit_try_run_case+0x1a5/0x480 [ 14.271833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.271852] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.271877] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.271909] ? __kthread_parkme+0x82/0x180 [ 14.271931] ? preempt_count_sub+0x50/0x80 [ 14.271957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.271978] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.272001] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.272025] kthread+0x337/0x6f0 [ 14.272042] ? trace_preempt_on+0x20/0xc0 [ 14.272065] ? __pfx_kthread+0x10/0x10 [ 14.272084] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.272106] ? calculate_sigpending+0x7b/0xa0 [ 14.272127] ? __pfx_kthread+0x10/0x10 [ 14.272146] ret_from_fork+0x41/0x80 [ 14.272167] ? __pfx_kthread+0x10/0x10 [ 14.272184] ret_from_fork_asm+0x1a/0x30 [ 14.272215] </TASK> [ 14.272225] [ 14.279633] Allocated by task 284: [ 14.279790] kasan_save_stack+0x45/0x70 [ 14.280007] kasan_save_track+0x18/0x40 [ 14.280176] kasan_save_alloc_info+0x3b/0x50 [ 14.280319] __kasan_kmalloc+0xb7/0xc0 [ 14.280451] __kmalloc_cache_noprof+0x189/0x420 [ 14.280602] kasan_atomics+0x95/0x310 [ 14.280729] kunit_try_run_case+0x1a5/0x480 [ 14.280901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.281075] kthread+0x337/0x6f0 [ 14.281198] ret_from_fork+0x41/0x80 [ 14.281326] ret_from_fork_asm+0x1a/0x30 [ 14.281518] [ 14.281613] The buggy address belongs to the object at ffff888103a31d80 [ 14.281613] which belongs to the cache kmalloc-64 of size 64 [ 14.282164] The buggy address is located 0 bytes to the right of [ 14.282164] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.282713] [ 14.282835] The buggy address belongs to the physical page: [ 14.283094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.283382] flags: 0x200000000000000(node=0|zone=2) [ 14.283540] page_type: f5(slab) [ 14.283658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.283917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.284141] page dumped because: kasan: bad access detected [ 14.284325] [ 14.284417] Memory state around the buggy address: [ 14.284639] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.284992] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.285332] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.285653] ^ [ 14.285919] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.286247] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.286564] ================================================================== [ 13.842474] ================================================================== [ 13.843013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 13.843393] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.843780] [ 13.843956] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.844018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.844033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.844071] Call Trace: [ 13.844086] <TASK> [ 13.844103] dump_stack_lvl+0x73/0xb0 [ 13.844129] print_report+0xd1/0x610 [ 13.844156] ? __virt_addr_valid+0x1db/0x2d0 [ 13.844181] ? kasan_atomics_helper+0x4a84/0x5450 [ 13.844208] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.844236] ? kasan_atomics_helper+0x4a84/0x5450 [ 13.844263] kasan_report+0x141/0x180 [ 13.844289] ? kasan_atomics_helper+0x4a84/0x5450 [ 13.844321] __asan_report_load4_noabort+0x18/0x20 [ 13.844347] kasan_atomics_helper+0x4a84/0x5450 [ 13.844375] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.844402] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.844428] ? ret_from_fork_asm+0x1a/0x30 [ 13.844454] ? kasan_atomics+0x152/0x310 [ 13.844482] kasan_atomics+0x1dc/0x310 [ 13.844504] ? __pfx_kasan_atomics+0x10/0x10 [ 13.844529] ? __pfx_read_tsc+0x10/0x10 [ 13.844551] ? ktime_get_ts64+0x86/0x230 [ 13.844580] kunit_try_run_case+0x1a5/0x480 [ 13.844605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.844628] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.844660] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.844699] ? __kthread_parkme+0x82/0x180 [ 13.844725] ? preempt_count_sub+0x50/0x80 [ 13.844765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.844790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.844819] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.844850] kthread+0x337/0x6f0 [ 13.844869] ? trace_preempt_on+0x20/0xc0 [ 13.844904] ? __pfx_kthread+0x10/0x10 [ 13.844925] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.844951] ? calculate_sigpending+0x7b/0xa0 [ 13.844977] ? __pfx_kthread+0x10/0x10 [ 13.844998] ret_from_fork+0x41/0x80 [ 13.845022] ? __pfx_kthread+0x10/0x10 [ 13.845044] ret_from_fork_asm+0x1a/0x30 [ 13.845077] </TASK> [ 13.845090] [ 13.853102] Allocated by task 284: [ 13.853283] kasan_save_stack+0x45/0x70 [ 13.853485] kasan_save_track+0x18/0x40 [ 13.853624] kasan_save_alloc_info+0x3b/0x50 [ 13.853772] __kasan_kmalloc+0xb7/0xc0 [ 13.853935] __kmalloc_cache_noprof+0x189/0x420 [ 13.854157] kasan_atomics+0x95/0x310 [ 13.854370] kunit_try_run_case+0x1a5/0x480 [ 13.854599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.854858] kthread+0x337/0x6f0 [ 13.854993] ret_from_fork+0x41/0x80 [ 13.855123] ret_from_fork_asm+0x1a/0x30 [ 13.855314] [ 13.855409] The buggy address belongs to the object at ffff888103a31d80 [ 13.855409] which belongs to the cache kmalloc-64 of size 64 [ 13.855962] The buggy address is located 0 bytes to the right of [ 13.855962] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.856485] [ 13.856582] The buggy address belongs to the physical page: [ 13.856844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.857102] flags: 0x200000000000000(node=0|zone=2) [ 13.857269] page_type: f5(slab) [ 13.857387] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.857621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.858173] page dumped because: kasan: bad access detected [ 13.858423] [ 13.858515] Memory state around the buggy address: [ 13.858736] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.859264] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.859480] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.859691] ^ [ 13.859863] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.860195] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.860561] ================================================================== [ 13.680293] ================================================================== [ 13.680597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 13.681171] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.681598] [ 13.681736] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.681787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.681822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.681842] Call Trace: [ 13.681854] <TASK> [ 13.681868] dump_stack_lvl+0x73/0xb0 [ 13.681900] print_report+0xd1/0x610 [ 13.681924] ? __virt_addr_valid+0x1db/0x2d0 [ 13.681945] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.681967] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.681990] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.682012] kasan_report+0x141/0x180 [ 13.682036] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.682072] kasan_check_range+0x10c/0x1c0 [ 13.682093] __kasan_check_write+0x18/0x20 [ 13.682113] kasan_atomics_helper+0x7c7/0x5450 [ 13.682146] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.682169] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.682190] ? ret_from_fork_asm+0x1a/0x30 [ 13.682212] ? kasan_atomics+0x152/0x310 [ 13.682235] kasan_atomics+0x1dc/0x310 [ 13.682254] ? __pfx_kasan_atomics+0x10/0x10 [ 13.682275] ? __pfx_read_tsc+0x10/0x10 [ 13.682295] ? ktime_get_ts64+0x86/0x230 [ 13.682319] kunit_try_run_case+0x1a5/0x480 [ 13.682349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.682368] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.682392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.682426] ? __kthread_parkme+0x82/0x180 [ 13.682448] ? preempt_count_sub+0x50/0x80 [ 13.682472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.682493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.682526] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.682549] kthread+0x337/0x6f0 [ 13.682566] ? trace_preempt_on+0x20/0xc0 [ 13.682599] ? __pfx_kthread+0x10/0x10 [ 13.682617] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.682639] ? calculate_sigpending+0x7b/0xa0 [ 13.682660] ? __pfx_kthread+0x10/0x10 [ 13.682679] ret_from_fork+0x41/0x80 [ 13.682699] ? __pfx_kthread+0x10/0x10 [ 13.682718] ret_from_fork_asm+0x1a/0x30 [ 13.682748] </TASK> [ 13.682759] [ 13.690619] Allocated by task 284: [ 13.690823] kasan_save_stack+0x45/0x70 [ 13.690977] kasan_save_track+0x18/0x40 [ 13.691147] kasan_save_alloc_info+0x3b/0x50 [ 13.691375] __kasan_kmalloc+0xb7/0xc0 [ 13.691571] __kmalloc_cache_noprof+0x189/0x420 [ 13.691725] kasan_atomics+0x95/0x310 [ 13.691917] kunit_try_run_case+0x1a5/0x480 [ 13.692127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.692406] kthread+0x337/0x6f0 [ 13.692548] ret_from_fork+0x41/0x80 [ 13.692748] ret_from_fork_asm+0x1a/0x30 [ 13.692974] [ 13.693082] The buggy address belongs to the object at ffff888103a31d80 [ 13.693082] which belongs to the cache kmalloc-64 of size 64 [ 13.693603] The buggy address is located 0 bytes to the right of [ 13.693603] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.694036] [ 13.694109] The buggy address belongs to the physical page: [ 13.694279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.694643] flags: 0x200000000000000(node=0|zone=2) [ 13.694916] page_type: f5(slab) [ 13.695086] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.695424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.695647] page dumped because: kasan: bad access detected [ 13.695838] [ 13.695918] Memory state around the buggy address: [ 13.696143] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.696492] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.696866] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.697220] ^ [ 13.697457] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.697776] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.698082] ================================================================== [ 14.107901] ================================================================== [ 14.108252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.108595] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.108958] [ 14.109041] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.109082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.109093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.109113] Call Trace: [ 14.109134] <TASK> [ 14.109148] dump_stack_lvl+0x73/0xb0 [ 14.109171] print_report+0xd1/0x610 [ 14.109194] ? __virt_addr_valid+0x1db/0x2d0 [ 14.109215] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.109237] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.109260] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.109282] kasan_report+0x141/0x180 [ 14.109305] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.109333] __asan_report_load4_noabort+0x18/0x20 [ 14.109354] kasan_atomics_helper+0x49ce/0x5450 [ 14.109377] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.109400] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.109421] ? ret_from_fork_asm+0x1a/0x30 [ 14.109443] ? kasan_atomics+0x152/0x310 [ 14.109466] kasan_atomics+0x1dc/0x310 [ 14.109486] ? __pfx_kasan_atomics+0x10/0x10 [ 14.109507] ? __pfx_read_tsc+0x10/0x10 [ 14.109526] ? ktime_get_ts64+0x86/0x230 [ 14.109551] kunit_try_run_case+0x1a5/0x480 [ 14.109572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.109591] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.109614] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.109638] ? __kthread_parkme+0x82/0x180 [ 14.109660] ? preempt_count_sub+0x50/0x80 [ 14.109685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.109705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.109728] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.109752] kthread+0x337/0x6f0 [ 14.109769] ? trace_preempt_on+0x20/0xc0 [ 14.109792] ? __pfx_kthread+0x10/0x10 [ 14.109821] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.109843] ? calculate_sigpending+0x7b/0xa0 [ 14.109864] ? __pfx_kthread+0x10/0x10 [ 14.109892] ret_from_fork+0x41/0x80 [ 14.109913] ? __pfx_kthread+0x10/0x10 [ 14.109931] ret_from_fork_asm+0x1a/0x30 [ 14.109961] </TASK> [ 14.109972] [ 14.117588] Allocated by task 284: [ 14.117765] kasan_save_stack+0x45/0x70 [ 14.118099] kasan_save_track+0x18/0x40 [ 14.118264] kasan_save_alloc_info+0x3b/0x50 [ 14.118445] __kasan_kmalloc+0xb7/0xc0 [ 14.118629] __kmalloc_cache_noprof+0x189/0x420 [ 14.118859] kasan_atomics+0x95/0x310 [ 14.119036] kunit_try_run_case+0x1a5/0x480 [ 14.119178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.119352] kthread+0x337/0x6f0 [ 14.119468] ret_from_fork+0x41/0x80 [ 14.119596] ret_from_fork_asm+0x1a/0x30 [ 14.119732] [ 14.119803] The buggy address belongs to the object at ffff888103a31d80 [ 14.119803] which belongs to the cache kmalloc-64 of size 64 [ 14.120156] The buggy address is located 0 bytes to the right of [ 14.120156] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.120604] [ 14.120699] The buggy address belongs to the physical page: [ 14.121264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.121616] flags: 0x200000000000000(node=0|zone=2) [ 14.121848] page_type: f5(slab) [ 14.122023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.122271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.122495] page dumped because: kasan: bad access detected [ 14.122664] [ 14.122732] Memory state around the buggy address: [ 14.122892] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.123105] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.123316] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.123681] ^ [ 14.124017] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.124336] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.124654] ================================================================== [ 13.916989] ================================================================== [ 13.917532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 13.917988] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.918211] [ 13.918319] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.918371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.918383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.918403] Call Trace: [ 13.918417] <TASK> [ 13.918430] dump_stack_lvl+0x73/0xb0 [ 13.918465] print_report+0xd1/0x610 [ 13.918489] ? __virt_addr_valid+0x1db/0x2d0 [ 13.918509] ? kasan_atomics_helper+0xf10/0x5450 [ 13.918539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.918563] ? kasan_atomics_helper+0xf10/0x5450 [ 13.918587] kasan_report+0x141/0x180 [ 13.918621] ? kasan_atomics_helper+0xf10/0x5450 [ 13.918648] kasan_check_range+0x10c/0x1c0 [ 13.918670] __kasan_check_write+0x18/0x20 [ 13.918698] kasan_atomics_helper+0xf10/0x5450 [ 13.918722] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.918744] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.918776] ? ret_from_fork_asm+0x1a/0x30 [ 13.918797] ? kasan_atomics+0x152/0x310 [ 13.918821] kasan_atomics+0x1dc/0x310 [ 13.918840] ? __pfx_kasan_atomics+0x10/0x10 [ 13.918861] ? __pfx_read_tsc+0x10/0x10 [ 13.918896] ? ktime_get_ts64+0x86/0x230 [ 13.918922] kunit_try_run_case+0x1a5/0x480 [ 13.918943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.918972] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.918996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.919020] ? __kthread_parkme+0x82/0x180 [ 13.919042] ? preempt_count_sub+0x50/0x80 [ 13.919075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.919095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.919119] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.919152] kthread+0x337/0x6f0 [ 13.919170] ? trace_preempt_on+0x20/0xc0 [ 13.919193] ? __pfx_kthread+0x10/0x10 [ 13.919211] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.919233] ? calculate_sigpending+0x7b/0xa0 [ 13.919255] ? __pfx_kthread+0x10/0x10 [ 13.919273] ret_from_fork+0x41/0x80 [ 13.919294] ? __pfx_kthread+0x10/0x10 [ 13.919312] ret_from_fork_asm+0x1a/0x30 [ 13.919351] </TASK> [ 13.919362] [ 13.927330] Allocated by task 284: [ 13.927551] kasan_save_stack+0x45/0x70 [ 13.927775] kasan_save_track+0x18/0x40 [ 13.928066] kasan_save_alloc_info+0x3b/0x50 [ 13.928242] __kasan_kmalloc+0xb7/0xc0 [ 13.928427] __kmalloc_cache_noprof+0x189/0x420 [ 13.928579] kasan_atomics+0x95/0x310 [ 13.928785] kunit_try_run_case+0x1a5/0x480 [ 13.928999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.929232] kthread+0x337/0x6f0 [ 13.929350] ret_from_fork+0x41/0x80 [ 13.929479] ret_from_fork_asm+0x1a/0x30 [ 13.929688] [ 13.929782] The buggy address belongs to the object at ffff888103a31d80 [ 13.929782] which belongs to the cache kmalloc-64 of size 64 [ 13.930350] The buggy address is located 0 bytes to the right of [ 13.930350] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.930871] [ 13.930958] The buggy address belongs to the physical page: [ 13.931201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.931457] flags: 0x200000000000000(node=0|zone=2) [ 13.931617] page_type: f5(slab) [ 13.931737] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.931973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.932345] page dumped because: kasan: bad access detected [ 13.932595] [ 13.932686] Memory state around the buggy address: [ 13.932913] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.933197] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.933409] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.933617] ^ [ 13.933769] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.934377] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.934695] ================================================================== [ 13.425796] ================================================================== [ 13.426462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.427091] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.427313] [ 13.427396] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.427442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.427453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.427473] Call Trace: [ 13.427485] <TASK> [ 13.427499] dump_stack_lvl+0x73/0xb0 [ 13.427523] print_report+0xd1/0x610 [ 13.427545] ? __virt_addr_valid+0x1db/0x2d0 [ 13.427566] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.427614] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.427733] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.427758] kasan_report+0x141/0x180 [ 13.427781] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.427911] __asan_report_load4_noabort+0x18/0x20 [ 13.427953] kasan_atomics_helper+0x4b88/0x5450 [ 13.427976] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.428146] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.428171] ? ret_from_fork_asm+0x1a/0x30 [ 13.428193] ? kasan_atomics+0x152/0x310 [ 13.428215] kasan_atomics+0x1dc/0x310 [ 13.428234] ? __pfx_kasan_atomics+0x10/0x10 [ 13.428255] ? __pfx_read_tsc+0x10/0x10 [ 13.428274] ? ktime_get_ts64+0x86/0x230 [ 13.428298] kunit_try_run_case+0x1a5/0x480 [ 13.428318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.428336] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.428361] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.428385] ? __kthread_parkme+0x82/0x180 [ 13.428406] ? preempt_count_sub+0x50/0x80 [ 13.428430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.428450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.428473] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.428496] kthread+0x337/0x6f0 [ 13.428512] ? trace_preempt_on+0x20/0xc0 [ 13.428535] ? __pfx_kthread+0x10/0x10 [ 13.428552] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.428573] ? calculate_sigpending+0x7b/0xa0 [ 13.428594] ? __pfx_kthread+0x10/0x10 [ 13.428611] ret_from_fork+0x41/0x80 [ 13.428630] ? __pfx_kthread+0x10/0x10 [ 13.428647] ret_from_fork_asm+0x1a/0x30 [ 13.428676] </TASK> [ 13.428686] [ 13.439019] Allocated by task 284: [ 13.439389] kasan_save_stack+0x45/0x70 [ 13.439601] kasan_save_track+0x18/0x40 [ 13.439974] kasan_save_alloc_info+0x3b/0x50 [ 13.440240] __kasan_kmalloc+0xb7/0xc0 [ 13.440464] __kmalloc_cache_noprof+0x189/0x420 [ 13.440680] kasan_atomics+0x95/0x310 [ 13.440930] kunit_try_run_case+0x1a5/0x480 [ 13.441093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.441318] kthread+0x337/0x6f0 [ 13.441465] ret_from_fork+0x41/0x80 [ 13.441595] ret_from_fork_asm+0x1a/0x30 [ 13.441785] [ 13.441927] The buggy address belongs to the object at ffff888103a31d80 [ 13.441927] which belongs to the cache kmalloc-64 of size 64 [ 13.442423] The buggy address is located 0 bytes to the right of [ 13.442423] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.442875] [ 13.442953] The buggy address belongs to the physical page: [ 13.443193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.443553] flags: 0x200000000000000(node=0|zone=2) [ 13.443716] page_type: f5(slab) [ 13.443831] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.444308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.444855] page dumped because: kasan: bad access detected [ 13.445073] [ 13.445175] Memory state around the buggy address: [ 13.445343] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.445549] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.445855] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.446124] ^ [ 13.446270] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.446672] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.447116] ================================================================== [ 14.052369] ================================================================== [ 14.052851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.053147] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.053370] [ 14.053455] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.053497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.053509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.053530] Call Trace: [ 14.053544] <TASK> [ 14.053560] dump_stack_lvl+0x73/0xb0 [ 14.053583] print_report+0xd1/0x610 [ 14.053606] ? __virt_addr_valid+0x1db/0x2d0 [ 14.053627] ? kasan_atomics_helper+0x1217/0x5450 [ 14.053650] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.053674] ? kasan_atomics_helper+0x1217/0x5450 [ 14.053697] kasan_report+0x141/0x180 [ 14.053720] ? kasan_atomics_helper+0x1217/0x5450 [ 14.053748] kasan_check_range+0x10c/0x1c0 [ 14.053769] __kasan_check_write+0x18/0x20 [ 14.053789] kasan_atomics_helper+0x1217/0x5450 [ 14.053827] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.053850] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.053871] ? ret_from_fork_asm+0x1a/0x30 [ 14.053903] ? kasan_atomics+0x152/0x310 [ 14.053927] kasan_atomics+0x1dc/0x310 [ 14.053946] ? __pfx_kasan_atomics+0x10/0x10 [ 14.053968] ? __pfx_read_tsc+0x10/0x10 [ 14.053987] ? ktime_get_ts64+0x86/0x230 [ 14.054011] kunit_try_run_case+0x1a5/0x480 [ 14.054032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.054051] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.054076] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.054100] ? __kthread_parkme+0x82/0x180 [ 14.054122] ? preempt_count_sub+0x50/0x80 [ 14.054147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.054167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.054191] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.054215] kthread+0x337/0x6f0 [ 14.054232] ? trace_preempt_on+0x20/0xc0 [ 14.054255] ? __pfx_kthread+0x10/0x10 [ 14.054273] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.054295] ? calculate_sigpending+0x7b/0xa0 [ 14.054317] ? __pfx_kthread+0x10/0x10 [ 14.054336] ret_from_fork+0x41/0x80 [ 14.054356] ? __pfx_kthread+0x10/0x10 [ 14.054374] ret_from_fork_asm+0x1a/0x30 [ 14.054404] </TASK> [ 14.054415] [ 14.065347] Allocated by task 284: [ 14.065495] kasan_save_stack+0x45/0x70 [ 14.065698] kasan_save_track+0x18/0x40 [ 14.065934] kasan_save_alloc_info+0x3b/0x50 [ 14.066112] __kasan_kmalloc+0xb7/0xc0 [ 14.066263] __kmalloc_cache_noprof+0x189/0x420 [ 14.066480] kasan_atomics+0x95/0x310 [ 14.066645] kunit_try_run_case+0x1a5/0x480 [ 14.066840] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.067087] kthread+0x337/0x6f0 [ 14.067237] ret_from_fork+0x41/0x80 [ 14.067390] ret_from_fork_asm+0x1a/0x30 [ 14.067562] [ 14.067632] The buggy address belongs to the object at ffff888103a31d80 [ 14.067632] which belongs to the cache kmalloc-64 of size 64 [ 14.067986] The buggy address is located 0 bytes to the right of [ 14.067986] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.068722] [ 14.068820] The buggy address belongs to the physical page: [ 14.069100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.069344] flags: 0x200000000000000(node=0|zone=2) [ 14.069505] page_type: f5(slab) [ 14.069623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.070010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.070347] page dumped because: kasan: bad access detected [ 14.070601] [ 14.070696] Memory state around the buggy address: [ 14.070935] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.071263] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.071587] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.071942] ^ [ 14.072135] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.072348] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.072618] ================================================================== [ 14.235133] ================================================================== [ 14.235388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.235621] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.235842] [ 14.235935] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.235978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.235990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.236010] Call Trace: [ 14.236024] <TASK> [ 14.236037] dump_stack_lvl+0x73/0xb0 [ 14.236060] print_report+0xd1/0x610 [ 14.236083] ? __virt_addr_valid+0x1db/0x2d0 [ 14.236105] ? kasan_atomics_helper+0x164f/0x5450 [ 14.236127] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.236150] ? kasan_atomics_helper+0x164f/0x5450 [ 14.236173] kasan_report+0x141/0x180 [ 14.236195] ? kasan_atomics_helper+0x164f/0x5450 [ 14.236223] kasan_check_range+0x10c/0x1c0 [ 14.236243] __kasan_check_write+0x18/0x20 [ 14.236263] kasan_atomics_helper+0x164f/0x5450 [ 14.236287] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.236310] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.236331] ? ret_from_fork_asm+0x1a/0x30 [ 14.236352] ? kasan_atomics+0x152/0x310 [ 14.236375] kasan_atomics+0x1dc/0x310 [ 14.236394] ? __pfx_kasan_atomics+0x10/0x10 [ 14.236416] ? __pfx_read_tsc+0x10/0x10 [ 14.236436] ? ktime_get_ts64+0x86/0x230 [ 14.236460] kunit_try_run_case+0x1a5/0x480 [ 14.236480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.236499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.236523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.236547] ? __kthread_parkme+0x82/0x180 [ 14.236569] ? preempt_count_sub+0x50/0x80 [ 14.236593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.236613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.236636] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.236660] kthread+0x337/0x6f0 [ 14.236676] ? trace_preempt_on+0x20/0xc0 [ 14.236700] ? __pfx_kthread+0x10/0x10 [ 14.236717] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.236740] ? calculate_sigpending+0x7b/0xa0 [ 14.236761] ? __pfx_kthread+0x10/0x10 [ 14.236780] ret_from_fork+0x41/0x80 [ 14.236800] ? __pfx_kthread+0x10/0x10 [ 14.236818] ret_from_fork_asm+0x1a/0x30 [ 14.236847] </TASK> [ 14.236858] [ 14.245076] Allocated by task 284: [ 14.245206] kasan_save_stack+0x45/0x70 [ 14.245348] kasan_save_track+0x18/0x40 [ 14.245483] kasan_save_alloc_info+0x3b/0x50 [ 14.245626] __kasan_kmalloc+0xb7/0xc0 [ 14.245757] __kmalloc_cache_noprof+0x189/0x420 [ 14.246180] kasan_atomics+0x95/0x310 [ 14.246367] kunit_try_run_case+0x1a5/0x480 [ 14.246573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.246836] kthread+0x337/0x6f0 [ 14.247014] ret_from_fork+0x41/0x80 [ 14.247201] ret_from_fork_asm+0x1a/0x30 [ 14.247401] [ 14.247496] The buggy address belongs to the object at ffff888103a31d80 [ 14.247496] which belongs to the cache kmalloc-64 of size 64 [ 14.248028] The buggy address is located 0 bytes to the right of [ 14.248028] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.248514] [ 14.248587] The buggy address belongs to the physical page: [ 14.248757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.249017] flags: 0x200000000000000(node=0|zone=2) [ 14.249257] page_type: f5(slab) [ 14.249425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.249772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.250116] page dumped because: kasan: bad access detected [ 14.250335] [ 14.250420] Memory state around the buggy address: [ 14.250607] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.250943] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.251200] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.251413] ^ [ 14.251580] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.252019] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.252339] ================================================================== [ 14.031362] ================================================================== [ 14.031766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.032103] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.032424] [ 14.032538] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.032589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.032602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.032621] Call Trace: [ 14.032645] <TASK> [ 14.032658] dump_stack_lvl+0x73/0xb0 [ 14.032682] print_report+0xd1/0x610 [ 14.032705] ? __virt_addr_valid+0x1db/0x2d0 [ 14.032726] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.032747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.032781] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.032803] kasan_report+0x141/0x180 [ 14.032838] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.032865] __asan_report_load4_noabort+0x18/0x20 [ 14.032894] kasan_atomics_helper+0x4a02/0x5450 [ 14.032918] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.032941] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.032962] ? ret_from_fork_asm+0x1a/0x30 [ 14.032983] ? kasan_atomics+0x152/0x310 [ 14.033007] kasan_atomics+0x1dc/0x310 [ 14.033027] ? __pfx_kasan_atomics+0x10/0x10 [ 14.033048] ? __pfx_read_tsc+0x10/0x10 [ 14.033067] ? ktime_get_ts64+0x86/0x230 [ 14.033092] kunit_try_run_case+0x1a5/0x480 [ 14.033113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.033140] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.033164] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.033189] ? __kthread_parkme+0x82/0x180 [ 14.033210] ? preempt_count_sub+0x50/0x80 [ 14.033235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.033255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.033279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.033303] kthread+0x337/0x6f0 [ 14.033320] ? trace_preempt_on+0x20/0xc0 [ 14.033344] ? __pfx_kthread+0x10/0x10 [ 14.033361] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.033393] ? calculate_sigpending+0x7b/0xa0 [ 14.033414] ? __pfx_kthread+0x10/0x10 [ 14.033433] ret_from_fork+0x41/0x80 [ 14.033465] ? __pfx_kthread+0x10/0x10 [ 14.033484] ret_from_fork_asm+0x1a/0x30 [ 14.033515] </TASK> [ 14.033525] [ 14.041246] Allocated by task 284: [ 14.041369] kasan_save_stack+0x45/0x70 [ 14.041511] kasan_save_track+0x18/0x40 [ 14.041669] kasan_save_alloc_info+0x3b/0x50 [ 14.041894] __kasan_kmalloc+0xb7/0xc0 [ 14.042083] __kmalloc_cache_noprof+0x189/0x420 [ 14.042302] kasan_atomics+0x95/0x310 [ 14.042492] kunit_try_run_case+0x1a5/0x480 [ 14.042725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.042968] kthread+0x337/0x6f0 [ 14.043102] ret_from_fork+0x41/0x80 [ 14.043286] ret_from_fork_asm+0x1a/0x30 [ 14.043477] [ 14.043594] The buggy address belongs to the object at ffff888103a31d80 [ 14.043594] which belongs to the cache kmalloc-64 of size 64 [ 14.044231] The buggy address is located 0 bytes to the right of [ 14.044231] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.044762] [ 14.044915] The buggy address belongs to the physical page: [ 14.045140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.045431] flags: 0x200000000000000(node=0|zone=2) [ 14.045591] page_type: f5(slab) [ 14.045709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.046193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.046528] page dumped because: kasan: bad access detected [ 14.046734] [ 14.046804] Memory state around the buggy address: [ 14.047438] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.048253] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.048481] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.048692] ^ [ 14.049939] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.050541] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.051346] ================================================================== [ 14.611444] ================================================================== [ 14.611742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 14.612202] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.612431] [ 14.612542] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.612586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.612599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.612619] Call Trace: [ 14.612633] <TASK> [ 14.612649] dump_stack_lvl+0x73/0xb0 [ 14.612674] print_report+0xd1/0x610 [ 14.612698] ? __virt_addr_valid+0x1db/0x2d0 [ 14.612720] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.612741] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.612764] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.612787] kasan_report+0x141/0x180 [ 14.613351] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.613388] __asan_report_load8_noabort+0x18/0x20 [ 14.613411] kasan_atomics_helper+0x4f98/0x5450 [ 14.613435] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.613459] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.613480] ? ret_from_fork_asm+0x1a/0x30 [ 14.613501] ? kasan_atomics+0x152/0x310 [ 14.613525] kasan_atomics+0x1dc/0x310 [ 14.613545] ? __pfx_kasan_atomics+0x10/0x10 [ 14.613567] ? __pfx_read_tsc+0x10/0x10 [ 14.613586] ? ktime_get_ts64+0x86/0x230 [ 14.613611] kunit_try_run_case+0x1a5/0x480 [ 14.613632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.613652] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.613676] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.613700] ? __kthread_parkme+0x82/0x180 [ 14.613722] ? preempt_count_sub+0x50/0x80 [ 14.613747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.613768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.613792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.613816] kthread+0x337/0x6f0 [ 14.613832] ? trace_preempt_on+0x20/0xc0 [ 14.613856] ? __pfx_kthread+0x10/0x10 [ 14.613874] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.613908] ? calculate_sigpending+0x7b/0xa0 [ 14.613929] ? __pfx_kthread+0x10/0x10 [ 14.613948] ret_from_fork+0x41/0x80 [ 14.613969] ? __pfx_kthread+0x10/0x10 [ 14.613987] ret_from_fork_asm+0x1a/0x30 [ 14.614017] </TASK> [ 14.614028] [ 14.623657] Allocated by task 284: [ 14.623993] kasan_save_stack+0x45/0x70 [ 14.624184] kasan_save_track+0x18/0x40 [ 14.624491] kasan_save_alloc_info+0x3b/0x50 [ 14.624677] __kasan_kmalloc+0xb7/0xc0 [ 14.625007] __kmalloc_cache_noprof+0x189/0x420 [ 14.625229] kasan_atomics+0x95/0x310 [ 14.625499] kunit_try_run_case+0x1a5/0x480 [ 14.625669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.626104] kthread+0x337/0x6f0 [ 14.626336] ret_from_fork+0x41/0x80 [ 14.626610] ret_from_fork_asm+0x1a/0x30 [ 14.626799] [ 14.626930] The buggy address belongs to the object at ffff888103a31d80 [ 14.626930] which belongs to the cache kmalloc-64 of size 64 [ 14.627659] The buggy address is located 0 bytes to the right of [ 14.627659] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.628296] [ 14.628379] The buggy address belongs to the physical page: [ 14.628611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.629179] flags: 0x200000000000000(node=0|zone=2) [ 14.629403] page_type: f5(slab) [ 14.629717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.630162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.630568] page dumped because: kasan: bad access detected [ 14.630818] [ 14.630994] Memory state around the buggy address: [ 14.631263] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.631543] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.632002] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.632286] ^ [ 14.632602] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.633009] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.633266] ================================================================== [ 14.375905] ================================================================== [ 14.376241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.376573] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.376994] [ 14.377101] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.377150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.377162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.377182] Call Trace: [ 14.377194] <TASK> [ 14.377208] dump_stack_lvl+0x73/0xb0 [ 14.377231] print_report+0xd1/0x610 [ 14.377254] ? __virt_addr_valid+0x1db/0x2d0 [ 14.377275] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.377296] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.377319] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.377342] kasan_report+0x141/0x180 [ 14.377365] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.377392] kasan_check_range+0x10c/0x1c0 [ 14.377413] __kasan_check_write+0x18/0x20 [ 14.377433] kasan_atomics_helper+0x1a7f/0x5450 [ 14.377456] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.377479] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.377500] ? ret_from_fork_asm+0x1a/0x30 [ 14.377521] ? kasan_atomics+0x152/0x310 [ 14.377545] kasan_atomics+0x1dc/0x310 [ 14.377564] ? __pfx_kasan_atomics+0x10/0x10 [ 14.377585] ? __pfx_read_tsc+0x10/0x10 [ 14.377605] ? ktime_get_ts64+0x86/0x230 [ 14.377629] kunit_try_run_case+0x1a5/0x480 [ 14.377650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.377669] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.377694] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.377718] ? __kthread_parkme+0x82/0x180 [ 14.377741] ? preempt_count_sub+0x50/0x80 [ 14.377766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.377786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.377818] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.377842] kthread+0x337/0x6f0 [ 14.377860] ? trace_preempt_on+0x20/0xc0 [ 14.377893] ? __pfx_kthread+0x10/0x10 [ 14.377912] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.377935] ? calculate_sigpending+0x7b/0xa0 [ 14.377958] ? __pfx_kthread+0x10/0x10 [ 14.377978] ret_from_fork+0x41/0x80 [ 14.377999] ? __pfx_kthread+0x10/0x10 [ 14.378017] ret_from_fork_asm+0x1a/0x30 [ 14.378048] </TASK> [ 14.378059] [ 14.385274] Allocated by task 284: [ 14.385532] kasan_save_stack+0x45/0x70 [ 14.385680] kasan_save_track+0x18/0x40 [ 14.385822] kasan_save_alloc_info+0x3b/0x50 [ 14.386038] __kasan_kmalloc+0xb7/0xc0 [ 14.386227] __kmalloc_cache_noprof+0x189/0x420 [ 14.386405] kasan_atomics+0x95/0x310 [ 14.386584] kunit_try_run_case+0x1a5/0x480 [ 14.386726] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.386997] kthread+0x337/0x6f0 [ 14.387219] ret_from_fork+0x41/0x80 [ 14.387382] ret_from_fork_asm+0x1a/0x30 [ 14.387561] [ 14.387629] The buggy address belongs to the object at ffff888103a31d80 [ 14.387629] which belongs to the cache kmalloc-64 of size 64 [ 14.388150] The buggy address is located 0 bytes to the right of [ 14.388150] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.388550] [ 14.388641] The buggy address belongs to the physical page: [ 14.388995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.389345] flags: 0x200000000000000(node=0|zone=2) [ 14.389542] page_type: f5(slab) [ 14.389675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.390054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.390312] page dumped because: kasan: bad access detected [ 14.390477] [ 14.390543] Memory state around the buggy address: [ 14.390691] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.390959] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.391268] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.391570] ^ [ 14.391799] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.392129] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.392348] ================================================================== [ 14.524551] ================================================================== [ 14.525027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 14.525264] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.525591] [ 14.525696] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.525738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.525749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.525769] Call Trace: [ 14.525783] <TASK> [ 14.525797] dump_stack_lvl+0x73/0xb0 [ 14.525821] print_report+0xd1/0x610 [ 14.525843] ? __virt_addr_valid+0x1db/0x2d0 [ 14.525864] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.525897] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.525921] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.525943] kasan_report+0x141/0x180 [ 14.525966] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.525993] kasan_check_range+0x10c/0x1c0 [ 14.526014] __kasan_check_write+0x18/0x20 [ 14.526034] kasan_atomics_helper+0x1eaa/0x5450 [ 14.526057] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.526079] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.526101] ? ret_from_fork_asm+0x1a/0x30 [ 14.526122] ? kasan_atomics+0x152/0x310 [ 14.526146] kasan_atomics+0x1dc/0x310 [ 14.526166] ? __pfx_kasan_atomics+0x10/0x10 [ 14.526187] ? __pfx_read_tsc+0x10/0x10 [ 14.526206] ? ktime_get_ts64+0x86/0x230 [ 14.526230] kunit_try_run_case+0x1a5/0x480 [ 14.526250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.526269] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.526293] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.526317] ? __kthread_parkme+0x82/0x180 [ 14.526339] ? preempt_count_sub+0x50/0x80 [ 14.526364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.526384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.526407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.526431] kthread+0x337/0x6f0 [ 14.526448] ? trace_preempt_on+0x20/0xc0 [ 14.526471] ? __pfx_kthread+0x10/0x10 [ 14.526489] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.526511] ? calculate_sigpending+0x7b/0xa0 [ 14.526532] ? __pfx_kthread+0x10/0x10 [ 14.526551] ret_from_fork+0x41/0x80 [ 14.526571] ? __pfx_kthread+0x10/0x10 [ 14.526589] ret_from_fork_asm+0x1a/0x30 [ 14.526619] </TASK> [ 14.526630] [ 14.534356] Allocated by task 284: [ 14.534503] kasan_save_stack+0x45/0x70 [ 14.534664] kasan_save_track+0x18/0x40 [ 14.534852] kasan_save_alloc_info+0x3b/0x50 [ 14.535098] __kasan_kmalloc+0xb7/0xc0 [ 14.535247] __kmalloc_cache_noprof+0x189/0x420 [ 14.535454] kasan_atomics+0x95/0x310 [ 14.535582] kunit_try_run_case+0x1a5/0x480 [ 14.535731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.536064] kthread+0x337/0x6f0 [ 14.536261] ret_from_fork+0x41/0x80 [ 14.536408] ret_from_fork_asm+0x1a/0x30 [ 14.536546] [ 14.536615] The buggy address belongs to the object at ffff888103a31d80 [ 14.536615] which belongs to the cache kmalloc-64 of size 64 [ 14.537404] The buggy address is located 0 bytes to the right of [ 14.537404] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.537786] [ 14.537856] The buggy address belongs to the physical page: [ 14.538247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.538596] flags: 0x200000000000000(node=0|zone=2) [ 14.538844] page_type: f5(slab) [ 14.539003] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.539258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.539480] page dumped because: kasan: bad access detected [ 14.539691] [ 14.539785] Memory state around the buggy address: [ 14.540264] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.540558] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.540770] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.541210] ^ [ 14.541428] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.541639] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.542031] ================================================================== [ 14.735132] ================================================================== [ 14.735474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 14.735807] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.736151] [ 14.736248] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.736291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.736303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.736324] Call Trace: [ 14.736338] <TASK> [ 14.736351] dump_stack_lvl+0x73/0xb0 [ 14.736374] print_report+0xd1/0x610 [ 14.736397] ? __virt_addr_valid+0x1db/0x2d0 [ 14.736418] ? kasan_atomics_helper+0x5115/0x5450 [ 14.736441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.736463] ? kasan_atomics_helper+0x5115/0x5450 [ 14.736487] kasan_report+0x141/0x180 [ 14.736510] ? kasan_atomics_helper+0x5115/0x5450 [ 14.736537] __asan_report_load8_noabort+0x18/0x20 [ 14.736559] kasan_atomics_helper+0x5115/0x5450 [ 14.736583] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.736605] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.736627] ? ret_from_fork_asm+0x1a/0x30 [ 14.736648] ? kasan_atomics+0x152/0x310 [ 14.736672] kasan_atomics+0x1dc/0x310 [ 14.736691] ? __pfx_kasan_atomics+0x10/0x10 [ 14.736712] ? __pfx_read_tsc+0x10/0x10 [ 14.736756] ? ktime_get_ts64+0x86/0x230 [ 14.736781] kunit_try_run_case+0x1a5/0x480 [ 14.736825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.736845] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.736869] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.736904] ? __kthread_parkme+0x82/0x180 [ 14.736927] ? preempt_count_sub+0x50/0x80 [ 14.736951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.736972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.736996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.737019] kthread+0x337/0x6f0 [ 14.737036] ? trace_preempt_on+0x20/0xc0 [ 14.737059] ? __pfx_kthread+0x10/0x10 [ 14.737077] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.737099] ? calculate_sigpending+0x7b/0xa0 [ 14.737121] ? __pfx_kthread+0x10/0x10 [ 14.737144] ret_from_fork+0x41/0x80 [ 14.737164] ? __pfx_kthread+0x10/0x10 [ 14.737183] ret_from_fork_asm+0x1a/0x30 [ 14.737213] </TASK> [ 14.737223] [ 14.744632] Allocated by task 284: [ 14.744839] kasan_save_stack+0x45/0x70 [ 14.745072] kasan_save_track+0x18/0x40 [ 14.745275] kasan_save_alloc_info+0x3b/0x50 [ 14.745485] __kasan_kmalloc+0xb7/0xc0 [ 14.745676] __kmalloc_cache_noprof+0x189/0x420 [ 14.745933] kasan_atomics+0x95/0x310 [ 14.746136] kunit_try_run_case+0x1a5/0x480 [ 14.746324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.746569] kthread+0x337/0x6f0 [ 14.746737] ret_from_fork+0x41/0x80 [ 14.746904] ret_from_fork_asm+0x1a/0x30 [ 14.747043] [ 14.747113] The buggy address belongs to the object at ffff888103a31d80 [ 14.747113] which belongs to the cache kmalloc-64 of size 64 [ 14.747564] The buggy address is located 0 bytes to the right of [ 14.747564] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.748145] [ 14.748239] The buggy address belongs to the physical page: [ 14.748487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.748818] flags: 0x200000000000000(node=0|zone=2) [ 14.748991] page_type: f5(slab) [ 14.749111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.749460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.749843] page dumped because: kasan: bad access detected [ 14.750090] [ 14.750159] Memory state around the buggy address: [ 14.750310] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.750524] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.750852] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.751195] ^ [ 14.751393] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.751610] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.751853] ================================================================== [ 13.953668] ================================================================== [ 13.954077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 13.954311] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.954531] [ 13.954613] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.954653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.954665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.954685] Call Trace: [ 13.954698] <TASK> [ 13.954711] dump_stack_lvl+0x73/0xb0 [ 13.954733] print_report+0xd1/0x610 [ 13.954755] ? __virt_addr_valid+0x1db/0x2d0 [ 13.954775] ? kasan_atomics_helper+0x4a36/0x5450 [ 13.954797] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.954820] ? kasan_atomics_helper+0x4a36/0x5450 [ 13.954843] kasan_report+0x141/0x180 [ 13.954866] ? kasan_atomics_helper+0x4a36/0x5450 [ 13.954904] __asan_report_load4_noabort+0x18/0x20 [ 13.954940] kasan_atomics_helper+0x4a36/0x5450 [ 13.954964] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.954987] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.955020] ? ret_from_fork_asm+0x1a/0x30 [ 13.955042] ? kasan_atomics+0x152/0x310 [ 13.955066] kasan_atomics+0x1dc/0x310 [ 13.955085] ? __pfx_kasan_atomics+0x10/0x10 [ 13.955115] ? __pfx_read_tsc+0x10/0x10 [ 13.955135] ? ktime_get_ts64+0x86/0x230 [ 13.955159] kunit_try_run_case+0x1a5/0x480 [ 13.955192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.955212] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.955236] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.955260] ? __kthread_parkme+0x82/0x180 [ 13.955282] ? preempt_count_sub+0x50/0x80 [ 13.955306] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.955327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.955351] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.955374] kthread+0x337/0x6f0 [ 13.955391] ? trace_preempt_on+0x20/0xc0 [ 13.955414] ? __pfx_kthread+0x10/0x10 [ 13.955441] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.955464] ? calculate_sigpending+0x7b/0xa0 [ 13.955485] ? __pfx_kthread+0x10/0x10 [ 13.955514] ret_from_fork+0x41/0x80 [ 13.955535] ? __pfx_kthread+0x10/0x10 [ 13.955553] ret_from_fork_asm+0x1a/0x30 [ 13.955584] </TASK> [ 13.955594] [ 13.968063] Allocated by task 284: [ 13.968331] kasan_save_stack+0x45/0x70 [ 13.968538] kasan_save_track+0x18/0x40 [ 13.968747] kasan_save_alloc_info+0x3b/0x50 [ 13.968901] __kasan_kmalloc+0xb7/0xc0 [ 13.969040] __kmalloc_cache_noprof+0x189/0x420 [ 13.969289] kasan_atomics+0x95/0x310 [ 13.969472] kunit_try_run_case+0x1a5/0x480 [ 13.969636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.969809] kthread+0x337/0x6f0 [ 13.969987] ret_from_fork+0x41/0x80 [ 13.970176] ret_from_fork_asm+0x1a/0x30 [ 13.970405] [ 13.970515] The buggy address belongs to the object at ffff888103a31d80 [ 13.970515] which belongs to the cache kmalloc-64 of size 64 [ 13.970933] The buggy address is located 0 bytes to the right of [ 13.970933] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.971517] [ 13.971626] The buggy address belongs to the physical page: [ 13.971876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.972222] flags: 0x200000000000000(node=0|zone=2) [ 13.972458] page_type: f5(slab) [ 13.972612] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.972841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.973214] page dumped because: kasan: bad access detected [ 13.973462] [ 13.973704] Memory state around the buggy address: [ 13.973947] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.974269] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.974583] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.974918] ^ [ 13.975116] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.975357] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.975568] ================================================================== [ 13.398389] ================================================================== [ 13.398790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.399335] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.399697] [ 13.399808] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.399851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.399863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.399930] Call Trace: [ 13.399945] <TASK> [ 13.399959] dump_stack_lvl+0x73/0xb0 [ 13.399983] print_report+0xd1/0x610 [ 13.400005] ? __virt_addr_valid+0x1db/0x2d0 [ 13.400025] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.400046] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.400068] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.400117] kasan_report+0x141/0x180 [ 13.400163] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.400189] __asan_report_store4_noabort+0x1b/0x30 [ 13.400209] kasan_atomics_helper+0x4ba2/0x5450 [ 13.400232] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.400254] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.400273] ? ret_from_fork_asm+0x1a/0x30 [ 13.400294] ? kasan_atomics+0x152/0x310 [ 13.400316] kasan_atomics+0x1dc/0x310 [ 13.400334] ? __pfx_kasan_atomics+0x10/0x10 [ 13.400354] ? __pfx_read_tsc+0x10/0x10 [ 13.400373] ? ktime_get_ts64+0x86/0x230 [ 13.400397] kunit_try_run_case+0x1a5/0x480 [ 13.400417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.400435] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.400459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.400483] ? __kthread_parkme+0x82/0x180 [ 13.400504] ? preempt_count_sub+0x50/0x80 [ 13.400528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.400547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.400570] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.400592] kthread+0x337/0x6f0 [ 13.400609] ? trace_preempt_on+0x20/0xc0 [ 13.400631] ? __pfx_kthread+0x10/0x10 [ 13.400649] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.400670] ? calculate_sigpending+0x7b/0xa0 [ 13.400691] ? __pfx_kthread+0x10/0x10 [ 13.400723] ret_from_fork+0x41/0x80 [ 13.400743] ? __pfx_kthread+0x10/0x10 [ 13.400760] ret_from_fork_asm+0x1a/0x30 [ 13.400790] </TASK> [ 13.400799] [ 13.412621] Allocated by task 284: [ 13.413048] kasan_save_stack+0x45/0x70 [ 13.413419] kasan_save_track+0x18/0x40 [ 13.413598] kasan_save_alloc_info+0x3b/0x50 [ 13.413964] __kasan_kmalloc+0xb7/0xc0 [ 13.414300] __kmalloc_cache_noprof+0x189/0x420 [ 13.414715] kasan_atomics+0x95/0x310 [ 13.414964] kunit_try_run_case+0x1a5/0x480 [ 13.415385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.415601] kthread+0x337/0x6f0 [ 13.416083] ret_from_fork+0x41/0x80 [ 13.416259] ret_from_fork_asm+0x1a/0x30 [ 13.416555] [ 13.416741] The buggy address belongs to the object at ffff888103a31d80 [ 13.416741] which belongs to the cache kmalloc-64 of size 64 [ 13.417424] The buggy address is located 0 bytes to the right of [ 13.417424] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.418253] [ 13.418341] The buggy address belongs to the physical page: [ 13.418828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.419385] flags: 0x200000000000000(node=0|zone=2) [ 13.419732] page_type: f5(slab) [ 13.420042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.420615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.421076] page dumped because: kasan: bad access detected [ 13.421574] [ 13.421735] Memory state around the buggy address: [ 13.421905] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.422657] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.423327] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.423709] ^ [ 13.424220] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.424527] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.424937] ================================================================== [ 14.676632] ================================================================== [ 14.677144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 14.677677] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.678128] [ 14.678336] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.678384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.678396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.678417] Call Trace: [ 14.678434] <TASK> [ 14.678449] dump_stack_lvl+0x73/0xb0 [ 14.678474] print_report+0xd1/0x610 [ 14.678497] ? __virt_addr_valid+0x1db/0x2d0 [ 14.678519] ? kasan_atomics_helper+0x218a/0x5450 [ 14.678541] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.678564] ? kasan_atomics_helper+0x218a/0x5450 [ 14.678587] kasan_report+0x141/0x180 [ 14.678610] ? kasan_atomics_helper+0x218a/0x5450 [ 14.678637] kasan_check_range+0x10c/0x1c0 [ 14.678658] __kasan_check_write+0x18/0x20 [ 14.678678] kasan_atomics_helper+0x218a/0x5450 [ 14.678702] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.678725] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.678745] ? ret_from_fork_asm+0x1a/0x30 [ 14.678767] ? kasan_atomics+0x152/0x310 [ 14.678790] kasan_atomics+0x1dc/0x310 [ 14.679006] ? __pfx_kasan_atomics+0x10/0x10 [ 14.679034] ? __pfx_read_tsc+0x10/0x10 [ 14.679054] ? ktime_get_ts64+0x86/0x230 [ 14.679080] kunit_try_run_case+0x1a5/0x480 [ 14.679103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.679122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.679147] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.679171] ? __kthread_parkme+0x82/0x180 [ 14.679193] ? preempt_count_sub+0x50/0x80 [ 14.679218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.679238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.679262] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.679286] kthread+0x337/0x6f0 [ 14.679303] ? trace_preempt_on+0x20/0xc0 [ 14.679326] ? __pfx_kthread+0x10/0x10 [ 14.679344] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.679367] ? calculate_sigpending+0x7b/0xa0 [ 14.679388] ? __pfx_kthread+0x10/0x10 [ 14.679407] ret_from_fork+0x41/0x80 [ 14.679428] ? __pfx_kthread+0x10/0x10 [ 14.679446] ret_from_fork_asm+0x1a/0x30 [ 14.679476] </TASK> [ 14.679487] [ 14.689556] Allocated by task 284: [ 14.689964] kasan_save_stack+0x45/0x70 [ 14.690160] kasan_save_track+0x18/0x40 [ 14.690444] kasan_save_alloc_info+0x3b/0x50 [ 14.690655] __kasan_kmalloc+0xb7/0xc0 [ 14.690831] __kmalloc_cache_noprof+0x189/0x420 [ 14.691198] kasan_atomics+0x95/0x310 [ 14.691378] kunit_try_run_case+0x1a5/0x480 [ 14.691680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.691963] kthread+0x337/0x6f0 [ 14.692243] ret_from_fork+0x41/0x80 [ 14.692417] ret_from_fork_asm+0x1a/0x30 [ 14.692593] [ 14.692693] The buggy address belongs to the object at ffff888103a31d80 [ 14.692693] which belongs to the cache kmalloc-64 of size 64 [ 14.693400] The buggy address is located 0 bytes to the right of [ 14.693400] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.694033] [ 14.694278] The buggy address belongs to the physical page: [ 14.694510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.695020] flags: 0x200000000000000(node=0|zone=2) [ 14.695251] page_type: f5(slab) [ 14.695472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.695753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.696250] page dumped because: kasan: bad access detected [ 14.696548] [ 14.696638] Memory state around the buggy address: [ 14.696815] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.697320] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.697625] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.698042] ^ [ 14.698201] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.698623] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.698996] ================================================================== [ 13.935339] ================================================================== [ 13.935689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 13.935933] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.936597] [ 13.936680] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.936721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.936732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.936752] Call Trace: [ 13.936765] <TASK> [ 13.936780] dump_stack_lvl+0x73/0xb0 [ 13.936803] print_report+0xd1/0x610 [ 13.936825] ? __virt_addr_valid+0x1db/0x2d0 [ 13.936847] ? kasan_atomics_helper+0xfa9/0x5450 [ 13.936868] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.936902] ? kasan_atomics_helper+0xfa9/0x5450 [ 13.936924] kasan_report+0x141/0x180 [ 13.936947] ? kasan_atomics_helper+0xfa9/0x5450 [ 13.936975] kasan_check_range+0x10c/0x1c0 [ 13.936996] __kasan_check_write+0x18/0x20 [ 13.937016] kasan_atomics_helper+0xfa9/0x5450 [ 13.937039] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.937062] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.937083] ? ret_from_fork_asm+0x1a/0x30 [ 13.937104] ? kasan_atomics+0x152/0x310 [ 13.937132] kasan_atomics+0x1dc/0x310 [ 13.937152] ? __pfx_kasan_atomics+0x10/0x10 [ 13.937173] ? __pfx_read_tsc+0x10/0x10 [ 13.937192] ? ktime_get_ts64+0x86/0x230 [ 13.937217] kunit_try_run_case+0x1a5/0x480 [ 13.937238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.937257] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.937281] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.937306] ? __kthread_parkme+0x82/0x180 [ 13.937327] ? preempt_count_sub+0x50/0x80 [ 13.937353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.937373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.937396] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.937420] kthread+0x337/0x6f0 [ 13.937437] ? trace_preempt_on+0x20/0xc0 [ 13.937460] ? __pfx_kthread+0x10/0x10 [ 13.937478] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.937500] ? calculate_sigpending+0x7b/0xa0 [ 13.937521] ? __pfx_kthread+0x10/0x10 [ 13.937540] ret_from_fork+0x41/0x80 [ 13.937560] ? __pfx_kthread+0x10/0x10 [ 13.937578] ret_from_fork_asm+0x1a/0x30 [ 13.937608] </TASK> [ 13.937619] [ 13.945576] Allocated by task 284: [ 13.945716] kasan_save_stack+0x45/0x70 [ 13.945859] kasan_save_track+0x18/0x40 [ 13.946004] kasan_save_alloc_info+0x3b/0x50 [ 13.946148] __kasan_kmalloc+0xb7/0xc0 [ 13.946279] __kmalloc_cache_noprof+0x189/0x420 [ 13.946429] kasan_atomics+0x95/0x310 [ 13.946557] kunit_try_run_case+0x1a5/0x480 [ 13.946819] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.947098] kthread+0x337/0x6f0 [ 13.947265] ret_from_fork+0x41/0x80 [ 13.947443] ret_from_fork_asm+0x1a/0x30 [ 13.947636] [ 13.947730] The buggy address belongs to the object at ffff888103a31d80 [ 13.947730] which belongs to the cache kmalloc-64 of size 64 [ 13.948404] The buggy address is located 0 bytes to the right of [ 13.948404] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.948766] [ 13.948902] The buggy address belongs to the physical page: [ 13.949161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.949543] flags: 0x200000000000000(node=0|zone=2) [ 13.949802] page_type: f5(slab) [ 13.949973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.950305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.950533] page dumped because: kasan: bad access detected [ 13.950718] [ 13.950810] Memory state around the buggy address: [ 13.951060] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.951395] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.951739] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.952155] ^ [ 13.952386] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.952687] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.953091] ================================================================== [ 13.639269] ================================================================== [ 13.639590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 13.640107] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.640608] [ 13.640782] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.640827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.640840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.640860] Call Trace: [ 13.640874] <TASK> [ 13.640899] dump_stack_lvl+0x73/0xb0 [ 13.640924] print_report+0xd1/0x610 [ 13.640946] ? __virt_addr_valid+0x1db/0x2d0 [ 13.640967] ? kasan_atomics_helper+0x697/0x5450 [ 13.640999] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.641041] ? kasan_atomics_helper+0x697/0x5450 [ 13.641064] kasan_report+0x141/0x180 [ 13.641087] ? kasan_atomics_helper+0x697/0x5450 [ 13.641114] kasan_check_range+0x10c/0x1c0 [ 13.641142] __kasan_check_write+0x18/0x20 [ 13.641161] kasan_atomics_helper+0x697/0x5450 [ 13.641186] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.641209] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.641229] ? ret_from_fork_asm+0x1a/0x30 [ 13.641318] ? kasan_atomics+0x152/0x310 [ 13.641353] kasan_atomics+0x1dc/0x310 [ 13.641373] ? __pfx_kasan_atomics+0x10/0x10 [ 13.641394] ? __pfx_read_tsc+0x10/0x10 [ 13.641413] ? ktime_get_ts64+0x86/0x230 [ 13.641437] kunit_try_run_case+0x1a5/0x480 [ 13.641459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.641478] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.641502] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.641526] ? __kthread_parkme+0x82/0x180 [ 13.641548] ? preempt_count_sub+0x50/0x80 [ 13.641573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.641592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.641615] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.641639] kthread+0x337/0x6f0 [ 13.641655] ? trace_preempt_on+0x20/0xc0 [ 13.641679] ? __pfx_kthread+0x10/0x10 [ 13.641697] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.641720] ? calculate_sigpending+0x7b/0xa0 [ 13.641741] ? __pfx_kthread+0x10/0x10 [ 13.641760] ret_from_fork+0x41/0x80 [ 13.641780] ? __pfx_kthread+0x10/0x10 [ 13.641799] ret_from_fork_asm+0x1a/0x30 [ 13.641829] </TASK> [ 13.641840] [ 13.650241] Allocated by task 284: [ 13.650422] kasan_save_stack+0x45/0x70 [ 13.650674] kasan_save_track+0x18/0x40 [ 13.651053] kasan_save_alloc_info+0x3b/0x50 [ 13.651286] __kasan_kmalloc+0xb7/0xc0 [ 13.651476] __kmalloc_cache_noprof+0x189/0x420 [ 13.651689] kasan_atomics+0x95/0x310 [ 13.651981] kunit_try_run_case+0x1a5/0x480 [ 13.652258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.652445] kthread+0x337/0x6f0 [ 13.652561] ret_from_fork+0x41/0x80 [ 13.652796] ret_from_fork_asm+0x1a/0x30 [ 13.652999] [ 13.653095] The buggy address belongs to the object at ffff888103a31d80 [ 13.653095] which belongs to the cache kmalloc-64 of size 64 [ 13.653571] The buggy address is located 0 bytes to the right of [ 13.653571] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.654139] [ 13.654317] The buggy address belongs to the physical page: [ 13.654572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.655137] flags: 0x200000000000000(node=0|zone=2) [ 13.655363] page_type: f5(slab) [ 13.655556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.656014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.656343] page dumped because: kasan: bad access detected [ 13.656571] [ 13.656741] Memory state around the buggy address: [ 13.657015] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.657238] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.657450] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.657818] ^ [ 13.658061] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.658376] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.658847] ================================================================== [ 14.126995] ================================================================== [ 14.127498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.127845] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.128189] [ 14.128302] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.128343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.128355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.128615] Call Trace: [ 14.128636] <TASK> [ 14.128650] dump_stack_lvl+0x73/0xb0 [ 14.128676] print_report+0xd1/0x610 [ 14.128708] ? __virt_addr_valid+0x1db/0x2d0 [ 14.128730] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.128752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.128775] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.128798] kasan_report+0x141/0x180 [ 14.128821] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.128848] kasan_check_range+0x10c/0x1c0 [ 14.128869] __kasan_check_read+0x15/0x20 [ 14.128903] kasan_atomics_helper+0x13b5/0x5450 [ 14.128927] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.128950] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.128971] ? ret_from_fork_asm+0x1a/0x30 [ 14.128992] ? kasan_atomics+0x152/0x310 [ 14.129016] kasan_atomics+0x1dc/0x310 [ 14.129035] ? __pfx_kasan_atomics+0x10/0x10 [ 14.129057] ? __pfx_read_tsc+0x10/0x10 [ 14.129077] ? ktime_get_ts64+0x86/0x230 [ 14.129102] kunit_try_run_case+0x1a5/0x480 [ 14.129123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.129151] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.129175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.129200] ? __kthread_parkme+0x82/0x180 [ 14.129221] ? preempt_count_sub+0x50/0x80 [ 14.129246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.129267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.129291] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.129315] kthread+0x337/0x6f0 [ 14.129332] ? trace_preempt_on+0x20/0xc0 [ 14.129355] ? __pfx_kthread+0x10/0x10 [ 14.129374] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.129396] ? calculate_sigpending+0x7b/0xa0 [ 14.129418] ? __pfx_kthread+0x10/0x10 [ 14.129436] ret_from_fork+0x41/0x80 [ 14.129457] ? __pfx_kthread+0x10/0x10 [ 14.129475] ret_from_fork_asm+0x1a/0x30 [ 14.129505] </TASK> [ 14.129515] [ 14.137173] Allocated by task 284: [ 14.137351] kasan_save_stack+0x45/0x70 [ 14.137524] kasan_save_track+0x18/0x40 [ 14.137659] kasan_save_alloc_info+0x3b/0x50 [ 14.137803] __kasan_kmalloc+0xb7/0xc0 [ 14.138003] __kmalloc_cache_noprof+0x189/0x420 [ 14.138228] kasan_atomics+0x95/0x310 [ 14.138410] kunit_try_run_case+0x1a5/0x480 [ 14.138606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.138779] kthread+0x337/0x6f0 [ 14.139134] ret_from_fork+0x41/0x80 [ 14.139318] ret_from_fork_asm+0x1a/0x30 [ 14.139486] [ 14.139578] The buggy address belongs to the object at ffff888103a31d80 [ 14.139578] which belongs to the cache kmalloc-64 of size 64 [ 14.140085] The buggy address is located 0 bytes to the right of [ 14.140085] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.140591] [ 14.140674] The buggy address belongs to the physical page: [ 14.140890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.141132] flags: 0x200000000000000(node=0|zone=2) [ 14.141291] page_type: f5(slab) [ 14.141407] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.141634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.142353] page dumped because: kasan: bad access detected [ 14.142608] [ 14.142699] Memory state around the buggy address: [ 14.143074] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.143396] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.143714] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.144086] ^ [ 14.144287] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.144564] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.144774] ================================================================== [ 14.287181] ================================================================== [ 14.287518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.287888] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.288111] [ 14.288193] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.288233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.288245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.288265] Call Trace: [ 14.288277] <TASK> [ 14.288291] dump_stack_lvl+0x73/0xb0 [ 14.288313] print_report+0xd1/0x610 [ 14.288336] ? __virt_addr_valid+0x1db/0x2d0 [ 14.288357] ? kasan_atomics_helper+0x1818/0x5450 [ 14.288379] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.288401] ? kasan_atomics_helper+0x1818/0x5450 [ 14.288424] kasan_report+0x141/0x180 [ 14.288447] ? kasan_atomics_helper+0x1818/0x5450 [ 14.288474] kasan_check_range+0x10c/0x1c0 [ 14.288495] __kasan_check_write+0x18/0x20 [ 14.288515] kasan_atomics_helper+0x1818/0x5450 [ 14.288539] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.288562] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.288583] ? ret_from_fork_asm+0x1a/0x30 [ 14.288604] ? kasan_atomics+0x152/0x310 [ 14.288627] kasan_atomics+0x1dc/0x310 [ 14.288647] ? __pfx_kasan_atomics+0x10/0x10 [ 14.288668] ? __pfx_read_tsc+0x10/0x10 [ 14.288688] ? ktime_get_ts64+0x86/0x230 [ 14.288712] kunit_try_run_case+0x1a5/0x480 [ 14.288734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.288753] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.288777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.288822] ? __kthread_parkme+0x82/0x180 [ 14.288844] ? preempt_count_sub+0x50/0x80 [ 14.288869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.288897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.288921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.288944] kthread+0x337/0x6f0 [ 14.288962] ? trace_preempt_on+0x20/0xc0 [ 14.288985] ? __pfx_kthread+0x10/0x10 [ 14.289003] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.289025] ? calculate_sigpending+0x7b/0xa0 [ 14.289047] ? __pfx_kthread+0x10/0x10 [ 14.289065] ret_from_fork+0x41/0x80 [ 14.289086] ? __pfx_kthread+0x10/0x10 [ 14.289104] ret_from_fork_asm+0x1a/0x30 [ 14.289138] </TASK> [ 14.289149] [ 14.296447] Allocated by task 284: [ 14.296574] kasan_save_stack+0x45/0x70 [ 14.296767] kasan_save_track+0x18/0x40 [ 14.296969] kasan_save_alloc_info+0x3b/0x50 [ 14.297179] __kasan_kmalloc+0xb7/0xc0 [ 14.297364] __kmalloc_cache_noprof+0x189/0x420 [ 14.297579] kasan_atomics+0x95/0x310 [ 14.297759] kunit_try_run_case+0x1a5/0x480 [ 14.299443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.299728] kthread+0x337/0x6f0 [ 14.299937] ret_from_fork+0x41/0x80 [ 14.300120] ret_from_fork_asm+0x1a/0x30 [ 14.300317] [ 14.300412] The buggy address belongs to the object at ffff888103a31d80 [ 14.300412] which belongs to the cache kmalloc-64 of size 64 [ 14.300769] The buggy address is located 0 bytes to the right of [ 14.300769] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.302125] [ 14.302242] The buggy address belongs to the physical page: [ 14.302695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.303326] flags: 0x200000000000000(node=0|zone=2) [ 14.303678] page_type: f5(slab) [ 14.304073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.304580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.305225] page dumped because: kasan: bad access detected [ 14.305537] [ 14.305638] Memory state around the buggy address: [ 14.306060] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.306494] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.306996] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.307476] ^ [ 14.307701] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.308211] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.308517] ================================================================== [ 13.523723] ================================================================== [ 13.524240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 13.524477] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.525414] [ 13.525532] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.525576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.525588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.525608] Call Trace: [ 13.525621] <TASK> [ 13.525637] dump_stack_lvl+0x73/0xb0 [ 13.525662] print_report+0xd1/0x610 [ 13.525706] ? __virt_addr_valid+0x1db/0x2d0 [ 13.525727] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.525749] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.525773] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.525795] kasan_report+0x141/0x180 [ 13.525819] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.525845] kasan_check_range+0x10c/0x1c0 [ 13.525866] __kasan_check_write+0x18/0x20 [ 13.525898] kasan_atomics_helper+0x4a0/0x5450 [ 13.525922] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.525944] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.525965] ? ret_from_fork_asm+0x1a/0x30 [ 13.525986] ? kasan_atomics+0x152/0x310 [ 13.526010] kasan_atomics+0x1dc/0x310 [ 13.526029] ? __pfx_kasan_atomics+0x10/0x10 [ 13.526050] ? __pfx_read_tsc+0x10/0x10 [ 13.526069] ? ktime_get_ts64+0x86/0x230 [ 13.526094] kunit_try_run_case+0x1a5/0x480 [ 13.526115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.526134] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.526158] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.526182] ? __kthread_parkme+0x82/0x180 [ 13.526204] ? preempt_count_sub+0x50/0x80 [ 13.526228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.526249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.526272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.526296] kthread+0x337/0x6f0 [ 13.526312] ? trace_preempt_on+0x20/0xc0 [ 13.526335] ? __pfx_kthread+0x10/0x10 [ 13.526354] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.526376] ? calculate_sigpending+0x7b/0xa0 [ 13.526397] ? __pfx_kthread+0x10/0x10 [ 13.526416] ret_from_fork+0x41/0x80 [ 13.526436] ? __pfx_kthread+0x10/0x10 [ 13.526454] ret_from_fork_asm+0x1a/0x30 [ 13.526484] </TASK> [ 13.526495] [ 13.535826] Allocated by task 284: [ 13.536537] kasan_save_stack+0x45/0x70 [ 13.537448] kasan_save_track+0x18/0x40 [ 13.537925] kasan_save_alloc_info+0x3b/0x50 [ 13.538385] __kasan_kmalloc+0xb7/0xc0 [ 13.538807] __kmalloc_cache_noprof+0x189/0x420 [ 13.539301] kasan_atomics+0x95/0x310 [ 13.539670] kunit_try_run_case+0x1a5/0x480 [ 13.540197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.540796] kthread+0x337/0x6f0 [ 13.541194] ret_from_fork+0x41/0x80 [ 13.541676] ret_from_fork_asm+0x1a/0x30 [ 13.542178] [ 13.542257] The buggy address belongs to the object at ffff888103a31d80 [ 13.542257] which belongs to the cache kmalloc-64 of size 64 [ 13.542595] The buggy address is located 0 bytes to the right of [ 13.542595] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.543646] [ 13.543931] The buggy address belongs to the physical page: [ 13.544456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.545184] flags: 0x200000000000000(node=0|zone=2) [ 13.545495] page_type: f5(slab) [ 13.545617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.546186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.546615] page dumped because: kasan: bad access detected [ 13.547185] [ 13.547368] Memory state around the buggy address: [ 13.547590] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.548312] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.549064] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.549646] ^ [ 13.550151] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.550704] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.551325] ================================================================== [ 14.487382] ================================================================== [ 14.487854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 14.488110] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.488379] [ 14.488509] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.488553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.488565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.488585] Call Trace: [ 14.488598] <TASK> [ 14.488612] dump_stack_lvl+0x73/0xb0 [ 14.488635] print_report+0xd1/0x610 [ 14.488657] ? __virt_addr_valid+0x1db/0x2d0 [ 14.488678] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.488700] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.488722] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.488745] kasan_report+0x141/0x180 [ 14.488768] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.488795] kasan_check_range+0x10c/0x1c0 [ 14.488816] __kasan_check_write+0x18/0x20 [ 14.488857] kasan_atomics_helper+0x1d7a/0x5450 [ 14.488890] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.488913] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.488933] ? ret_from_fork_asm+0x1a/0x30 [ 14.488955] ? kasan_atomics+0x152/0x310 [ 14.488978] kasan_atomics+0x1dc/0x310 [ 14.488997] ? __pfx_kasan_atomics+0x10/0x10 [ 14.489037] ? __pfx_read_tsc+0x10/0x10 [ 14.489057] ? ktime_get_ts64+0x86/0x230 [ 14.489081] kunit_try_run_case+0x1a5/0x480 [ 14.489102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.489121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.489149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.489174] ? __kthread_parkme+0x82/0x180 [ 14.489196] ? preempt_count_sub+0x50/0x80 [ 14.489220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.489241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.489264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.489288] kthread+0x337/0x6f0 [ 14.489304] ? trace_preempt_on+0x20/0xc0 [ 14.489328] ? __pfx_kthread+0x10/0x10 [ 14.489346] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.489368] ? calculate_sigpending+0x7b/0xa0 [ 14.489390] ? __pfx_kthread+0x10/0x10 [ 14.489409] ret_from_fork+0x41/0x80 [ 14.489429] ? __pfx_kthread+0x10/0x10 [ 14.489466] ret_from_fork_asm+0x1a/0x30 [ 14.489496] </TASK> [ 14.489506] [ 14.497328] Allocated by task 284: [ 14.497521] kasan_save_stack+0x45/0x70 [ 14.497931] kasan_save_track+0x18/0x40 [ 14.498165] kasan_save_alloc_info+0x3b/0x50 [ 14.498377] __kasan_kmalloc+0xb7/0xc0 [ 14.498511] __kmalloc_cache_noprof+0x189/0x420 [ 14.498662] kasan_atomics+0x95/0x310 [ 14.498841] kunit_try_run_case+0x1a5/0x480 [ 14.499058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.499309] kthread+0x337/0x6f0 [ 14.499475] ret_from_fork+0x41/0x80 [ 14.499655] ret_from_fork_asm+0x1a/0x30 [ 14.499921] [ 14.500024] The buggy address belongs to the object at ffff888103a31d80 [ 14.500024] which belongs to the cache kmalloc-64 of size 64 [ 14.500456] The buggy address is located 0 bytes to the right of [ 14.500456] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.501026] [ 14.501096] The buggy address belongs to the physical page: [ 14.501275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.501512] flags: 0x200000000000000(node=0|zone=2) [ 14.501672] page_type: f5(slab) [ 14.501847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.502203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.502547] page dumped because: kasan: bad access detected [ 14.502832] [ 14.502956] Memory state around the buggy address: [ 14.503201] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.503455] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.503699] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.504022] ^ [ 14.504222] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.504434] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.504710] ================================================================== [ 13.805198] ================================================================== [ 13.805564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 13.805935] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 13.806258] [ 13.806393] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.806438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.806450] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.806470] Call Trace: [ 13.806485] <TASK> [ 13.806500] dump_stack_lvl+0x73/0xb0 [ 13.806524] print_report+0xd1/0x610 [ 13.806557] ? __virt_addr_valid+0x1db/0x2d0 [ 13.806580] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.806613] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.806638] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.806663] kasan_report+0x141/0x180 [ 13.806687] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.806716] kasan_check_range+0x10c/0x1c0 [ 13.806739] __kasan_check_write+0x18/0x20 [ 13.806760] kasan_atomics_helper+0xb6a/0x5450 [ 13.806785] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.806818] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.806841] ? ret_from_fork_asm+0x1a/0x30 [ 13.806863] ? kasan_atomics+0x152/0x310 [ 13.806897] kasan_atomics+0x1dc/0x310 [ 13.806918] ? __pfx_kasan_atomics+0x10/0x10 [ 13.806941] ? __pfx_read_tsc+0x10/0x10 [ 13.806961] ? ktime_get_ts64+0x86/0x230 [ 13.806996] kunit_try_run_case+0x1a5/0x480 [ 13.807019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.807039] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.807075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.807102] ? __kthread_parkme+0x82/0x180 [ 13.807125] ? preempt_count_sub+0x50/0x80 [ 13.807160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.807183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.807208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.807244] kthread+0x337/0x6f0 [ 13.807262] ? trace_preempt_on+0x20/0xc0 [ 13.807286] ? __pfx_kthread+0x10/0x10 [ 13.807314] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.807338] ? calculate_sigpending+0x7b/0xa0 [ 13.807361] ? __pfx_kthread+0x10/0x10 [ 13.807391] ret_from_fork+0x41/0x80 [ 13.807412] ? __pfx_kthread+0x10/0x10 [ 13.807432] ret_from_fork_asm+0x1a/0x30 [ 13.807463] </TASK> [ 13.807474] [ 13.815453] Allocated by task 284: [ 13.815580] kasan_save_stack+0x45/0x70 [ 13.815721] kasan_save_track+0x18/0x40 [ 13.815856] kasan_save_alloc_info+0x3b/0x50 [ 13.816010] __kasan_kmalloc+0xb7/0xc0 [ 13.816228] __kmalloc_cache_noprof+0x189/0x420 [ 13.816449] kasan_atomics+0x95/0x310 [ 13.816632] kunit_try_run_case+0x1a5/0x480 [ 13.816837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.817245] kthread+0x337/0x6f0 [ 13.817412] ret_from_fork+0x41/0x80 [ 13.817577] ret_from_fork_asm+0x1a/0x30 [ 13.817715] [ 13.817785] The buggy address belongs to the object at ffff888103a31d80 [ 13.817785] which belongs to the cache kmalloc-64 of size 64 [ 13.818324] The buggy address is located 0 bytes to the right of [ 13.818324] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 13.818739] [ 13.818811] The buggy address belongs to the physical page: [ 13.819065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 13.819456] flags: 0x200000000000000(node=0|zone=2) [ 13.819719] page_type: f5(slab) [ 13.819923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.820251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.820588] page dumped because: kasan: bad access detected [ 13.820820] [ 13.820946] Memory state around the buggy address: [ 13.821159] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.821460] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.821762] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.822072] ^ [ 13.822311] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.822611] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.823006] ================================================================== [ 14.392755] ================================================================== [ 14.393231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 14.393572] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284 [ 14.393916] [ 14.394431] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 14.394477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.394490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.394509] Call Trace: [ 14.394524] <TASK> [ 14.394538] dump_stack_lvl+0x73/0xb0 [ 14.394563] print_report+0xd1/0x610 [ 14.394585] ? __virt_addr_valid+0x1db/0x2d0 [ 14.394606] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.394628] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.394650] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.394673] kasan_report+0x141/0x180 [ 14.394696] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.394723] kasan_check_range+0x10c/0x1c0 [ 14.394744] __kasan_check_write+0x18/0x20 [ 14.394764] kasan_atomics_helper+0x1b22/0x5450 [ 14.394787] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.395061] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.395091] ? ret_from_fork_asm+0x1a/0x30 [ 14.395114] ? kasan_atomics+0x152/0x310 [ 14.395138] kasan_atomics+0x1dc/0x310 [ 14.395158] ? __pfx_kasan_atomics+0x10/0x10 [ 14.395180] ? __pfx_read_tsc+0x10/0x10 [ 14.395200] ? ktime_get_ts64+0x86/0x230 [ 14.395224] kunit_try_run_case+0x1a5/0x480 [ 14.395245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.395264] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.395288] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.395312] ? __kthread_parkme+0x82/0x180 [ 14.395334] ? preempt_count_sub+0x50/0x80 [ 14.395358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.395379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.395402] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.395426] kthread+0x337/0x6f0 [ 14.395443] ? trace_preempt_on+0x20/0xc0 [ 14.395467] ? __pfx_kthread+0x10/0x10 [ 14.395485] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.395507] ? calculate_sigpending+0x7b/0xa0 [ 14.395528] ? __pfx_kthread+0x10/0x10 [ 14.395546] ret_from_fork+0x41/0x80 [ 14.395567] ? __pfx_kthread+0x10/0x10 [ 14.395585] ret_from_fork_asm+0x1a/0x30 [ 14.395616] </TASK> [ 14.395627] [ 14.413576] Allocated by task 284: [ 14.413711] kasan_save_stack+0x45/0x70 [ 14.414123] kasan_save_track+0x18/0x40 [ 14.414546] kasan_save_alloc_info+0x3b/0x50 [ 14.415127] __kasan_kmalloc+0xb7/0xc0 [ 14.415652] __kmalloc_cache_noprof+0x189/0x420 [ 14.416234] kasan_atomics+0x95/0x310 [ 14.416377] kunit_try_run_case+0x1a5/0x480 [ 14.416525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.416704] kthread+0x337/0x6f0 [ 14.416828] ret_from_fork+0x41/0x80 [ 14.417030] ret_from_fork_asm+0x1a/0x30 [ 14.417242] [ 14.417315] The buggy address belongs to the object at ffff888103a31d80 [ 14.417315] which belongs to the cache kmalloc-64 of size 64 [ 14.417789] The buggy address is located 0 bytes to the right of [ 14.417789] allocated 48-byte region [ffff888103a31d80, ffff888103a31db0) [ 14.418280] [ 14.418379] The buggy address belongs to the physical page: [ 14.418638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31 [ 14.418900] flags: 0x200000000000000(node=0|zone=2) [ 14.419134] page_type: f5(slab) [ 14.419306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.419545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.420213] page dumped because: kasan: bad access detected [ 14.420450] [ 14.420567] Memory state around the buggy address: [ 14.420809] ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.421065] ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.421378] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.421710] ^ [ 14.421939] ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.422270] ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.422565] ==================================================================